Phrack #16

EDB-ID:

42827

CVE:

N/A

Author:

phrack

Type:

papers

Platform:

Magazine

Published:

1987-11-01

		===== Phrack Magazine presents Phrack 16 =====
		  ===== File 1 of 12 : Phrack 16 Intro =====

	Greetings, and welcome to Phrack #16, we are a bit late, but bigger
	then ever. I think you will find this issue very interesting.
	Enjoy and have Phun

	Elric of Imrryr - Editor


Contents this issue:

16.1  Phrack 16 Intro by Elric of Imrryr			2K
16.2  BELLCORE Information by The Mad Phone-Man		11K
16.3  A Hacker's Guide to Primos:  Part 1 by Cosmos Kid	11K
16.4  Hacking GTN by The Kurgan					7K
16.5  Credit Card Laws Laws by Tom Brokow			7K
16.6  Tapping Telephone Lines by Agent Steal			9K
16.7  Reading Trans-Union Credit Reports by The Disk Jockey	6K

Phrack World News:

16.8  The Story Of the West German Hackers by Shooting Shark	3K
16.9  The Mad Phone-Man and the Gestapo by The Mad Phone-Man	2K
16.10 Flight of the Mad Phone-Man by The Mad Phone-Man		2K
16.11 Shadow Hawk Busted Again by Shooting Shark		2K
16.12 Coin Box Thief Wanted by The $muggler			2K



Submission to Phrack may be sent to the following BBSes:

Unlimited Reality	313-489-0747 Phrack
The Free World		301-668-7657 Phrack Inc. (*)
The Executive Inn	915-581-5145 Phrack
Lunatic Labs UnLtd.	415-278-7421 Phrack	(*)
House of the Rising Sun 401-789-1809 Phrack


* You will get the quickest reply from these systems.


--------------------------------------------------------------------------------


		===== Phrack Magazine presents Phrack 16 =====
			   ===== File 2 of 12 =====

--------------------------------------------------------------------
BELLCORE Information	  by The Mad Phone-man
--------------------------------------------------------------------

So, you've broken  into the  big phone box on the wall, and are looking at a
bunch of tags with numbers and letters on them. Which one is the modem line?
Which one is the 1-800 WATS line?  Which one is the Alarm line? Bell has a
specific set of codes that enable you to identify what you're looking at.
These are the same codes the installer gets from the wire center to enable him
to set	up the line, test it, and make	sure it	matches the  customers order.
Here are some extracts from the Bellcore book.

First lets take a hypothetical line number I'm familiar with:
     64FDDV 123456
-------------------------------------------------------------
The serial number format:

	Prefix +  service code + modifier +   serial number +
digits:	1,2	 3,4	   5,6	7,8,9,10,11,12    continued
-------------------------------------------------------------------------

	 Suffix	+  CO assigning circuit number +   segment
digits:	13,14,15	    16,17,18,19	      20,21,22
-------------------------------------------------------------------------

The important shit is in the 3rd thru 6th digit.

SERVICE CODES	Intra or Inter LATA Block 1-26
-------------
AA- Packet analog access line
AB- Packet switch trunk
AD- Attendant
AF- Commercial audio fulltime
AI- Automatic identified outward dialing
AL- Alternate services
AM- Packet, off-network access line
AN- Announcement service
AO- International/Overseas audio (full time)
AP- Commercial audio (part time)
AT- International/Overseas audio (part time)
AU- Autoscript
BA- Protective alarm (CD)
BL- Bell & lights
BS- Siren control
CA- SSN Access
CB- OCC Audio facilities
CC- OCC Digital facility-medium speed
CE- SSN Station line
CF- OCC Special facility
CG- OCC Telegraph facility
CH- OCC Digital facility high-speed
CI- Concentrator Identifier trunk
CJ- OCC Control facility
CK- OCC Overseas connecting facility wide-band
CL- Centrex CO line
CM- OCC Video facility
CN- SSN Network trunk
CO- OCC Overseas connecting facility
CP- Concentrator identifier signaling link
CR- OCC Backup facility
CS- Channel service
CT- SSN Tie trunk
CV- OCC Voice grade facility
CW- OCC Wire pair facility
CZ- OCC Access facility
DA- Digital data off-net extension
DB- HSSDS 1.5 mb/s access line
DF- HSSDS 1.5 mb/s hub to hub
DG- HSSDS 1.5 mb/s hub to earth station
DH- Digital service
DI- Direct-in dial
DJ- Digit trunk
DK- Data link
DL- Dictation line
DO- Direct-out dial
DP- Digital data-2 4 kb/s
DQ- Digital data-4 8 kb/s
DR- Digital data-9.6 kb/s
DW- Digital data-56  kb/s
DY- Digital service (under 1 mb/s)
EA- Switched access
EB- ENFIA II end office trunk
EC- ENFIA II tandem trunk
EE- Combined access
EF- Entrance facility-voice grade
EG- Type #2 Telegraph
EL- Emergency reporting line
EM- Emergency reporting center trunk
EN- Exchange network access facility
EP- Entrance facility-program grade
EQ- Equipment only-(network only) assignment
ES- Extension service-voice grade
ET- Entrance facility-telegraph grade
EU- Extension service-telegraph grade
EV- Enhanced Emergency reporting trunk
EW- Off network MTS/WATS equivalent service
FD- Private line-data
FG- Group-supergroup spectrum
FR- Fire dispatch
FT- Foreign exchange trunk
FW- Wideband channel
FV- Voice grade facility
FX- Foreign exchange
HP- Non-DDS Digital data 2.4 kb/s
HQ- Non-DDS Digital data 4.8 kb/s
HR- Non-DDS Digital data 9.6 kb/s
HW- Non-DDS Digital data 56  kb/s
IT- Intertandem tie trunk
LA- Local area data channel
LL- Long distance terminal line
LS- Local service
LT- Long distance terminal trunk
MA- Cellular access trunk 2-way
MT- Wired music
NA- CSACC link (EPSCS)
NC- CNCC link (EPSCS)
ND- Network data line
OI- Off premises intercommunication station line
ON- Off network access line
OP- Off premises extension
OS- Off premises PBX station line
PA- Protective alarm (AC)
PC- Switched digital-access line
PG- Paging
PL- Private line-voice
PM- Protective monitoring
PR- Protective relaying-voice grade
PS- MSC constructed spare facility
PV- Protective relaying-telegraph grade
PW- Protective relaying-signal grade
PX- PBX station line
PZ- MSC constructed circuit
QU- Packet asynchronous access line
QS- Packet synchronous access line
RA- Remote attendant
RT- Radio landline
SA- Satellite trunk
SG- Control/Remote metering signal grade
SL- Secretarial line
SM- Sampling
SN- Special access termination
SQ- Equipment only-customer premises
SS- Dataphone select-a-station
TA- Tandem tie-trunk
TC- Control/Remote metering-telegraph grade
TF- Telephoto/Facsimile
TK- Local PBX trunk
TL- Non-tandem tie trunk
TR- Turret or automatic call distributor (ACD) trunk
TT- Teletypewriter channel
TU- Turret or automatic call distributor (ACD) line
TX- Dedicated facility
VF- Commercial television (full time)
VH- Commercial television (part time)
VM- Control/Remote metering-voice grade
VO- International overseas television
VR- Non-commercial television (7003,7004)
WC- Special 800 surface trunk
WD- Special WATS trunk (OUT)
WI- 800 surface trunk
WO- WATS line (OUT)
WS- WATS trunk (OUT)
WX- 800 service line
WY- WATS trunk (2-way)
WZ- WATS line (2-way)
ZA- Alarm circuits
ZC- Call and talk circuits
ZE- Emergency patching circuits
ZF- Order circuits, facility
ZM- Measurement and recording circuits
ZP- Test circuit, plant service center
ZQ- Quality and management circuits
ZS- Switching, control and transfer circuits
ZT- Test circuits, central office
ZV- Order circuits, service

SERVICE CODES FOR LATA ACCESS
---------------------------------------------------
HC- High capacity 1.544 mb/ps
HD- High capacity 3.152 mb/ps
HE- High capacity 6.312 mb/ps
HF- High capacity 6.312
HG- High capacity 274.176 mb/s
HS- High capacity subrate
LB- Voice-non switched line
LC- Voice-switched line
LD- Voice-switched trunk
LE- Voice and tone-radio landline
LF- Data low-speed
LG- Basic data
LH- Voice and data-PSN access trunk
LJ- Voice and data SSN access
LK- Voice and data-SSN-intermachine trunk
LN- Data extension, voice grade data facility
LP- Telephoto/Facsimile
LQ- Voice grade customized
LR- Protection relay-voice grade
LZ- Dedicated facility
MQ- Metallic customized
NQ- Telegraph customized
NT- Protection alarm-metallic
NU- Protection alarm
NV- Protective relaying/Telegraph grade
NW- Telegraph grade facility-75 baud
NY- Telegraph grade facility- 150 baud
PE- Program audio, 200-3500 hz
PF- Program audio, 100-5000 hz
PJ- Program audio, 50-8000 hz
PK- Program audio, 50-15000 hz
PQ- Program grade customized
SB- Switched access-standard
SD- Switched access-improved
SE- Special access WATS-access-std
SF- Special access WATS access line improved
SJ- Limited switched access line
TQ- Television grade customized
TV- TV Channel one way 15khz audio
TW- TV Channel one way 5khz audio
WB- Wideband digital, 19.2 kb/s
WE- Wideband digital, 50 kb/s
WF- Wideband digital, 230.4 kb/s
WH- Wideband digital, 56 kb/s
WJ- Wideband analog, 60-108 khz
WL- Wideband analog 312-552 khz
WN- Wideband analog 10hz-20 khz
WP- Wideband analog, 29-44 khz
WR- Wideband analog 564-3064 khz
XA- Dedicated digital, 2.4 kb/s
XB- Dedicated digital, 4.8 kb/s
XG- Dedicated digital, 9.6 kb/s
XH- Dedicated digital 56. kb/s



Now the last two positions of real importance, 5 & 6 translate thusly:

Modifier Character Position 5
------------------------------

INTRASTATE	    INTERSTATE
-------------------------------------
   A			B	   Alternate data & non data
-------------------------------------
   C				  Customer controlled service
-------------------------------------
   D			E	   Data
-------------------------------------
   N			L	   Non-data operation
-------------------------------------
   P				  Only offered under intra restructured
				      private line (RPL) tariff
-------------------------------------
   S			T	   Simultaneous data & non-data
-------------------------------------
   F				  Interexchange carriers is less than 50%
-------------------------------------
			  G	   Interstate carrier is more than 50%
				      usage
==============================================================================

MODIFIER CHARACTER POSITION 6
--------------------------------------------------------------

  TYPE OF SERVICE	Intra LATA
--------------------------------------
ALL EXCEPT US GOVT	US GOVERNMENT
--------------------------------------
       T		   M	  Circuit is BOC customer to BOC customer
				      all facilities are TELCO provided
--------------------------------------
       C		   P	  Circuit is BOC/BOC and part of
				      facilities or equipment is telco
				      provided
--------------------------------------
       A		   J	  Circuit is BOC/BOC all electrically
				      connected equip is customer provided
--------------------------------------
       L		   F	  Circuit terminates at interexchange
				      carrier customers location
--------------------------------------
       Z			      Official company service
--------------------------------------
			  Interlata
       S		   S	  Circuit terminates at interexchange
				      carriers point of term (POT)
--------------------------------------
       V		   V	  Circuit terminates at an interface of a
				      radio common carrier (RCC)
--------------------------------------
       Z			      Official company service
--------------------------------------

			   Corridor
       Y		   X	  Corridor circuit
--------------------------------------
			   International
       K		   H	  Circuit has at least 2 terminations in
				      different countries
--------------------------------------
			   Interexchange carrier
       Y		   X	  Transport circuit between interexchange
				      carrier terminals.
----------------------------------------

So 64FDDV would be a private line data circuit terminating at a	radiocommon
carrier.  Other examples can be decoded likewise.

Enjoy this information as much as I've had finding it.

    -= The Mad Phone-man =-


--------------------------------------------------------------------------------


		===== Phrack Magazine presents Phrack 16 =====
			   ===== File 3 of 12 =====

==========================================
====	Cosmos Kid Presents...     ====
====   A Hacker's Guide To:  PRIMOS   ====
====		Part I	      ====
====	(c) 1987 by Cosmos Kid	====
==========================================

Author's Note:
--------------
This file is the first of two files dealing with PRIMOS and its operations.
The next file will be in circulation soon so be sure to check it out at any
good BBS.


Preface:
--------
This file is written in a form to teach beginners as well as experienced
Primos users about the system. It is written primarily for beginners however.
PRIMOS, contrary to popular belief can be a very powerful system if used
correctly.  I have  outlined some  VERY BASIC  commands and  their use in this
file along with some extra commands, not so BASIC.


Logging On To A PRIMOS:
-----------------------
A PRIMOS system is best recognized by its unusual prompts. These are: 'OK',
and 'ER!'.  Once connected, these are not the prompts you get.	The System
should identify itself with a login such as:

Primenet V2.3
-or-
Primecom Network

The  system then  expects some	input from  you,preferably:  LOGIN.  You will
then be asked to enter	your user  identification and  password as  a security
measure.  The login onto a PRIMOS is as follows:

CONNECT
Primenet V 2.3 (system)
LOGIN<CR>      (you)
User id?       (system)
AA1234	 (you)
Password?      (system)
KILLME	 (you)
OK,	    (system)


Preceding the OK, will be the systems opening message.	Note that if you fail
to type login once connected, most other commands are ignored and the system
responds with:

Please Login
ER!


Logging Off Of A PRIMOS:
------------------------
If at any time you get bored with Primos, just type 'LOGOFF' to leave the
system.	Some systems have a TIMEOUT feature implemented meaning that if you
fail to type anything for the specified amount of time the system will
automatically log you out, telling you something like:

Maximum Inactive Time Limit Exceeded


System Prompts:
---------------
As stated previously, the prompts 'ER!' and 'OK,' are used on Primos. The
'OK,' denotes that last command was executed properly and it is now waiting
for your next command. The 'ER!' prompt denotes that you made an error in
typing	your last  command.  This  prompt is  usually  preceded	by  an	error
message.


Special Characters:
-------------------
Some terminals have certain characteristics that are built in to the terminal.
key

CONTROL-H
Deletes the last character typed.


Other Special Characters:
-------------------------
RETURN:	The return key signals PRIMOS that you have completed typing a
	 command and that you are ready for PRIMOS to process the command.

BREAK/CONTROL-P:  Stops whatever is currently being processed in memory and
		  will return PRIMOS to your control.  To restart a process,
		  type:
		  START (abbreviated with S).

CONTROL-S:  Stops the scrolling of the output on your terminal for viewing.

CONTROL-Q:  Resumes the output scrolling on your terminal for inspection.

SEMICOLON ';':	The logical end of line character.  The semicolon is used to
		enter more than one command on one line.

Getting Help:
-------------
You can get on-line information about the available PRIMOS commands by using
the 'HELP' command.  The HELP system is keyword driven.	That is, all
information is stored under keywords that indicate the content of the help
files.	This is similar to VAX.	Entering the single command 'HELP' will enter
the HELP sub-system and will display an informative page of text.  The next
page displayed will provide you with a list of topics and their keywords.
These topics include such items as PRIME, RAP, MAIL, and DOC.  If you entered
the MAIL keyword, you would be given information concerning the mail sub-
system available to users on P simply enter PRIME to obtain information on all
PRIMOS commands.  You could then enter COPY to obtain information on that
specific topic.


Files And Directories:
----------------------
The name of a file or sub-directory may have up to 32 characters.  The
filename may contain any of the following characters, with the only
restriction being that the first character of the filename may not be a digit.
Please note that BLANK spaces are NOT allowed ANYWHERE:

A-Z .....alphabet
0-9 .....numeric digits
&   .....ampersand
#   .....pound sign
$   .....dollar sign
-   .....dash/minus sign
*   .....asterisk/star
.   .....period/dot
/   .....slash/divide sign


Naming Conventions:
-------------------
There are very few restrictions on the name that you may give a file.
However, you should note that many of the compilers (language processors) and
commands on the PRIME will make certain assumptions if you follow certain
guidelines. File name suffixes help to identify the file contents with regard
to the language the source code was written in and the contents of the file.
For instance, if you wrote a PL/1 program and named the file containing the
source code 'PROG1.PL1' (SEGmented loader) would take the binary file, link
all the binary libraries that you specify and produce a file named
'PROG1.SEG', which would contain the binary code necessary to execute the
program.  Some common filename suffixes are:  F77, PAS, COBOL, PL1G, BASIC,
FTN, CC, SPIT (source  files).	These all  denote  separate languages  and get
into more advanced programming on PRIMOS.  (e.g. FTN=Fortran).

BIN=the binary code produced by the compiler
LIST=the program listing produced by the compiler
SEG=the linked binary code produced by SEG

Some files which do not use standard suffixes may instead use the filename
prefixes to identify the contents of the file.	Some common filename prefixes
are:

B  Binary code produced by the compiler
L  source program Listing
C  Command files
$  Temporary work files (e.g. T$0000)
#  Seg files


Commands For File Handling:
----------------------------
PRIMOS has several commands to control and access files and file contents.
These commands can be used to list the contents of files and directories, and
to copy, add, delete, edit, and print the contents of files.  The capitalized
letters of each are deleted.  A LIST must be enclosed in parenthesis.

Close arg	....Closes the file specified by 'arg'.  'Arg' could also be
		 a list of PRIMOS file unit numbers, or the word 'ALL' which
		 closes all open files and units.

LIMITS		....Displays information about the login account, including
		 information about resources allocated and used, grantor, and
		 expiration date.

Edit Access	....Edits the Access rights for the named directories and
		 files.

CName arg1 arg2	....Changes the Name of 'arg1' to 'arg2'.  The arguments can
		 be files or directories.

LD		....The List Directory command has several arguments that
		 allow for controlled listing format and selection of entries.

Attach arg	....allows you to Attach to the directory 'arg' with the
		 access rights specified in the directory Access Control List.

DOWN <arg>	....allows you to go 'DOWN into' a sub-ufd (directory).  You
		 can specify which one of several sub-ufds to descend into
		 with the optional 'arg'.

UP <arg>	 ....allows you to go 'UP into' a higher ufd (directory).  You
		 can specify which one of several to climb into with the
		 optional 'arg'.

WHERE		....Displays what the current directory attach point is and
		 your access rights.

CREATE arg	....CREATES a new sub-directory as specified by 'arg'.

COPY arg1 arg2	....COPIES the file or directory specified by 'arg1' into a
		 file by the same name specified by 'arg2'.  Both 'arg1' and
		 'arg2' can be filename with the SPOOL command, whose format
		 is:

SPOOL filename -AT destination
		 where filename is the name of the file you want printed, and
		 destination is the name of the printer where you want the
		 file printed.	For example if you want the file 'HACK.FTN'
		 printed at the destination 'LIB' type:

SPOOL HACK.FTN -AT LIB

PRIMOS then gives you some information telling you that the file named was
SPOOLed and the length of the file in PRIMOS records. To see the entries in
the SPOOL queue, type:

SPOOL -LIST

PRIMOS then lists out all the files waiting to be printed on the printers on
your login system. Also included in this information will be the filename of
the files waiting to print, the login account name of the user who SPOOLed the
file, the time that the file was SPOOLed, the size of the file in PRIMOS
records, and the printer name where the file is to print.


Changing The Password Of An Account:
------------------------------------
If you wish to change the password to your newly acquired account you must use
the 'CPW' command (Change PassWord).  To do this enter the current password on
the command line followed by RETURN.  PRIMOS will then prompt you for your
desired NEW password and then ask you to confirm your NEW password.  To change
your password of 'JOE' to 'SCHMOE' then type:

OK,		(system)
CPW JOE		(you)
New Password?	(system)

You can save a copy of your terminal session by using the COMO (COMmand
Output) command.  When you type:

COMO filename

Everything which is typed or displayed on your terminal is saved (recorded)
into the filename  on the command line (filename).  If a file by the same name
exists, then that file will be REPLACED with NO WARNING GIVEN!	When you have
finished doing whatever it was you wanted a hardcopy of, you type:

COMO -End

which will stop recording your session and will close the COMO file. You can
now print the COMO file using the SPOOL command as stated earlier.

Conclusion:
-----------
This  concludes	this  first  file on PRIMOS.  Please  remember this  file  is
written primarily for beginners, and some of  the text may have seemed BORING!
However, this filewaswrittenin	a verbose fashion to FULLYINTRODUCEPRIMOS
to beginners.  Part II will deal with more the several languages on PRIMOS and
some other commands.


Author's Endnote:
-----------------
I would like to thank the following people for the help in writing this file:

AMADEUS (an oldie who is LONG GONE!)
The University Of Kentucky
State University Of New York (SUNY) Primenet

And countless others.....

Questions, threats, or suggestions to direct towards me, I can be found on any
of the following:

The Freeworld ][.........301-668-7657
Digital Logic............305-395-6906
The Executive Inn........915-581-5146
OSUNY BBS................914-725-4060

	-=*< Cosmos Kid >*=-

========================================


--------------------------------------------------------------------------------


		===== Phrack Magazine presents Phrack 16 =====
			   ===== File 4 of 12 =====


Hacking the Global Telecommunications Network
Researched and written by:  The Kurgan
Compiled on 10/5/87


Network Procedure Differences

The Global Telecommunications Network (GTN) is Citibanks's international data
network, which allows Citicorp customers and personnel to access Citibank's
worldwide computerized services.

Two different sign on procedures exist: Type A and Type B.  All users, except
some  in  the U.S., must use Type B.  (U.S. users: the number  you dial into
and  the  Welcome  Banner  you	receive	determine  what  sign-on procedure to
follow.)  Welcome banners are as follows:

TYPE A:
WELCOME TO CITIBANK. PLEASE SIGN ON.
XXXXXXXX

@
PASSWORD =

@

TYPE B:
PLEASE ENTER YOUR ID:-1->
PLEASE ENTER YOUR PASSWORD:-2->

CITICORP (CITY NAME). KEY GHELP FOR HELP.
  XXX.XXX
 PLEASE SELECT SERVICE REQUIRED.-3->


Type A User Commands

User commands are either instructions or information you send to the network
for it to follow.  The commands available are listed below.

User Action:  Purpose:

@ (CR)	To put you in command mode (mode in which you can put
	 your currently active service on hold and ask the network
	 for information, or log-off the service).  (NOTE: This
	 symbol also serves as the network prompt; see Type A
	 messages.)

BYE (CR)  To leave service from command mode.

Continue (CR)  To return to application from command mode (off hold)

D (CR)			To leave service from command mode.

ID			To be recognized as a user by the network (beginning of
			sign on procedure), type ID, then a space and your
			assigned network ID.  (Usually 5 or 6 characters long)

Status (CR)		To see a listing of network address (only from @
			prompt).  You need this address when "reporting a
			problem."

Type A messages

The network displays a variety of messages on your screen which either require
a user command or provide you with information.

Screen shows:  Explanation:

@   Network prompt -- request for Network ID.

BAD PASSWORD  Network does not except your password.

<address> BUSY		The address is busy, try back later.


WELCOME TO CITIBANK.	Network welcome banner.	Second line provides address
PLEASE SIGN ON.		# to be used when reporting "problems."
XXX.XXX

<address> ILLEGAL	You typed in an address that doesn't exist.

<address> CONNECTED	Your connection has been established.

DISCONNECTED		Your connect has been disconnected.

NOT CONNECTED		You're not connected to any service at the time.

NUI REQUIRED		Enter your network user ID.

PASSWORD =		Request for your assigned password.

STILL CONNECTED		You are still connected to the service you were using.

?			Network doesn't understand your entry.


Type B User Commands and Messages

Since the Type B procedure is used with GTN dial-ups, it requires fewer
commands to control the network.  There is only 1 Type B command.  Break plus
(CR) allows you to retain connection to one service, and connect with another.


Screen Shows:  Explanation:

CITICORP (CITY NAME).	Network Welcome banner.	Type in service address.
 PLEASE SELECT SERVICE

COM   Connection made.

DER   The port is closed out of order, or no open routes are
      available.

DISCONNECTED  You have disconnected from the service and the network.

ERR   Error in service selected.

INV   Error in system.

MOM   Wait, the connection is being made.

NA    Not authorized for this service.

NC    Circuits busy, try again.

NP    Check service address.

OCC   Service busy, try again.


Sign-on Procedures:

  There are two types of sign on procedures.  Type A and Type B.


Type A:

To log onto a system with type A logon procedure, the easiest way is through
Telenet.  Dial your local Telenet port.	When you receive the "@" prompt, type
in the Type-A service address (found later in the article) then follow the
instructions from there on.

  Type-B:
    Dial the your GTN telephone #, then hit return twice.  You will then see:

"PLEASE ENTER YOUR ID:-1->"

Type in a network ID number and hit return.

    You will then see

"PLEASE ENTER YOUR PASSWORD:-2->"

     Type in Network Password and hit return.

    Finally you will see the "CITICORP (city name)" welcome banner, and it
will ask you to select the service you wish to log onto.  Type the address and
hit return.  (A list of addresses will be provided later)

Trouble Shooting:

    If you should run into any problems, the Citicorp personnel will gladly
help their "employees" with any questions.  Just pretend you work for Citibank
and they will give you a lot.  This has been tried and tested.	Many times,
when you attempt to log on to a system and you make a mistake with the
password, the system will give you a number to call for help.  Call it and
tell them that you forgot your pass or something.  It usually works, since
they don't expect people to be lying to them.  If you have any questions about
the network itself, call 305-975-5223.	It is the Technical Operations Center
(TOC) in Pompano, Florida.

Dial-Ups:

    The following list of dial-ups is for North America.  I have a list of
others, but I don't think that they would be required by anyone.  Remember:
Dial-ups require Type-B log-on procedure.  Type-A is available on systems
accessible through Telenet.

Canada Toronto	416-947-2992     (1200 Baud V.22 Modem Standard)
U.S.A. Los Angeles   213-629-4025     (300/1200 Baud U.S.A. Modem Standard)
       Jersey City   201-798-8500
       New York City 212-269-1274
		     212-809-1164

Service Addresses:

     The following is a VERY short list of just some of the 100's of service
addresses.  In a later issue I will publish a complete list.

Application Name:   Type-A  Type-B

CITIADVICE    2240001600 CADV
CITIBANKING ATHENS   2240004000 :30
CITIBANKING PARIS   2240003300 :33
CITIBANKING TOKYO   2240008100	:81
CITICASH MANAGER
  INTERNATIONAL 1 (NAFG CORP)  2240001200      CCM1
  INTERNATIONAL 7 (DFI/WELLS FARGO) 2240013700 CCM7
COMPMARK ON-LINE   2240002000	CS4
ECONOMIC WEEK ON-LINE	2240011100	FAME1
INFOPOOL/INFOTEXT   2240003800	IP

EXAMPLE OF LOGON PROCEDURE:

THE FOLLOWING IS THE BUFFERED TEXT OF A LOG-ON TO CITIBANKING PARIS THROUGH
TELENET.



CONNECT 1200
TELENET
216 13.41

TERMINAL=VT100

@2240003300

223 90331E CONNECTED

ENTER TYPE NUMBER OR RETURN

TYPE B IS BEEHIVE DM20
TYPE 1 IS DEC VT100
TYPE A IS DEC VT100 ADV VIDEO
TYPE 5 IS DEC VT52
TYPE C IS CIFER 2684
TYPE 3 IS LSI ADM 3A
TYPE L IS LSI ADM 31
TYPE I IS IBM 3101
TYPE H IS HP 2621
TYPE P IS PERKIN ELMER 1200
TYPE K IS PRINTER KEYBOARD
TYPE M IS MAI BASIC 4
TYPE T IS TELEVIDEO 9XX
TYPE V IS VOLKER CRAIG 4404
TYPE S IS SORD MICRO WITH CBMP
RELEASE BSC9.5 - 06JUN85
FOR 300 BAUD KEY ! AND CARRIAGE RETURN
CONFIG.	K1.1-I11H-R-C-B128
ENTER TYPE NUMBER OR RETURN K

CONNECTED TO CITIBANK PARIS - CBP1 ,PORT 5

Have fun with this info, and remember, technology will rule in the end.


--------------------------------------------------------------------------------


		===== Phrack Magazine presents Phrack 16 =====
			   ===== File 5 of 12 =====

----------------------------------------------------------------------------
|		  The Laws Governing Credit Card Fraud			|
|									  |
|			Written by Tom Brokaw				|
|			 September 19, 1987				|
|									  |
|			Written exclusively for:			   |
|			  Phrack Magazine				 |
|									  |
----------------------------------------------------------------------------
		(A Tom Brokaw/Disk Jockey Law File Production)


Introduction:
------------

     In this article, I will try to explain the laws concerning the illegal
use of credit cards.  Explained will be the Michigan legislative view on the
misuse and definition of credit cards.


Definition:
----------

     Well, Michigan Law section 157, defines a credit card as  "Any instrument
or device which is sold, issued or otherwise distributed by a business
organization identified thereon for obtaining goods, property, services or
anything of value."  A credit card holder is defined as: 1) "The person or
organization who requests a credit card and to whom or for whose benefit a
credit card is subsequently issued" or	2) "The person or organization to whom
a credit  card was  issued and	who uses a credit card whether the issuance of
the credit card was requested or not."	In other words, if the company or
individual is issued a card, once using it, they automatically agree to all
the laws and conditions that bind it.


Stealing, Removing, Retaining or Concealment:
--------------------------------------------

     Michigan Law states, that it is illegal to "steal, knowingly take or
remove a credit card from a card holder." It also states that it is wrongful
to "conceal a credit card  without the consent of the card holder."  Notice
that it doesn't say anything about carbons  or numbers acquired from BBSes,
but I think that it could be considered part of the laws governing the access
of a persons account without the knowledge of the cardholder, as described
above.


Possession with Intent to Circulate or Sell
-------------------------------------------

     The law states that it is illegal to possess or have under one's control,
or receive a credit card if his	intent is to circulate or sell the card.  It
is also illegal to deliver, circulate or sell a credit card, knowing that such
a possession, control or receipt without the cardholders consent, shall be
guilty of a FELONY.  Notice again, they say nothing about possession of
carbons or numbers directly.  It also does not clearly state what circulation
or possession is, so we can only stipulate.  All it says is that possession of
a card (material plastic) is illegal.


Fraud, forgery, material alteration, counterfeiting.
----------------------------------------------------

     However, it might not be clearly illegal to possess a carbon or CC
number.	It IS illegal to defraud  a credit card holder.   Michigan law states
that any person who, with intent to defraud, forge, materially alter or
counterfeit a credit card, shall be guilty of a felony.


Revoked or cancelled card, use with intent to defraud.
------------------------------------------------------

    This states that "Any person who knowingly and with intent to defraud for
the purpose of obtaining goods, property or services or anything of value on a
credit card which has been revoked or cancelled or reported stolen by the
issuer or issuee, has been notified of the cancellation by registered or
certified mail or by another personal service shall be fined not more than
$1,000 and not imprisoned not more than a year, or both.  However, it does not
clearly say if it is a felony or misdemeanor or civil infraction.  My guess is
that it would be dependant on the amount and means that you used and received
when  you  defraud  the	company.   Usually,  if  it is	under	$100,  it is a
misdemeanor  but if it is over $100, it is a felony.  I guess they figure that
you should know these things.


The People of The State of Michigan vs. Anderson     (possession)
------------------------------------------------

     On April 4, 1980, H. Anderson attempted to purchase a pair of pants at
Danny's Fashion Shops, in the Detroit area.  He went up to the cashier to pay
for the pants and the cashier asked him if he had permission to use the credit
card.  He said "No, I won it last night in a card game".  The guy said that I
could purchase $50 dollars worth of goods to pay back the debt.	At the same
time, he presumed the card to be a valid one and not stolen.  Well, as it
turned out it was stolen but he had no knowledge of this.  Later, he went to
court and pleased guilty of attempted possession of a credit card of another
with intent or circulate or sell the same.  At the guilty hearings, Mr.
Anderson stated that the credit card that he attempted to use had been
acquired by him in payment of a gambling debt and assumed that the person was
the owner. The trial court accepted his plea of guilty.	At the sentencing,
Mr. Anderson, denied that he had any criminal intent.  Anderson appealed the
decision stating that the court had erred by accepting his plea of guilty on
the basis of insufficient factual data.	Therefore, the trial court should not
have convicted him of attempted possession and reversed the charges.


The People of the State of Michigan vs. Willie Dockery
------------------------------------------------------

     On June 23, 1977, Willie Dockery attempted to purchase gas at a Sears gas
station	by  using  a  stolen  credit  card. The  attendant noticed  that his
driver's license  picture was  pasted on  and  notified	the police.   Dockery
stated that he had found the credit  card and the license at an intersection,
in the city of Flint.  He admitted that	he knowingly used the credit card and
driver's license without the consent of the owner but he said that he only had
purchased  gasoline  on	the  card.  It	turns	out  that  the credit card and
driver's  license was  stolen from a man, whose grocery store had been robbed.
Dockery said  that he  had no knowledge of the robbery and previous charges on
the cardwhich totalled$1,373.21.  He admitted that he did paste his picture
on the driver's license.  Butagain the court screws up, they receive evidence
that the defendant had a record of felonies dating back to when he was sixteen
and then assumed that  he was guilty on	the basis of his prior offenses.  The
judge later said that  the present  sentence could  not stand in this court so
the case was referred to another court.


Conclusion
----------

     I hope that I have given you a better understanding about the law, that
considers the illegal aspects of using credit cards.  All this information was
taken from The Michigan Compiled Laws Annotated Volume 754.157a-s and from The
Michigan Appeals Report.

In my next file I will talk about the laws concerning Check Fraud.


					     -Tom Brokaw


--------------------------------------------------------------------------------


		===== Phrack Magazine presents Phrack 16 =====
			   ===== File 6 of 12 =====

******************************************************************************
*									    *
*			 Tapping Telephone Lines			    *
*									    *
*			      Voice or Data				 *
*									    *
*			For Phun, Money, and Passwords			*
*									    *
*		   Or How to Go to Jail for a Long Time.		    *
*									    *
******************************************************************************

Written by Agent Steal 08/87


  Included in this file is...

      * Equipment needed

      * Where to buy it

      * How to connect it

      * How to read recorded data


  But wait!!  There's more!!

      * How I found a Tymnet node

      * How I got in



*************
THE EQUIPMENT
*************

    First  thing you  need  is	an  audio  tape	recorder.   What you  will be
recording, whether  it be  voice or  data, will	be in an analog audio format.
>From now  on, most references	will be	towards data recording.  Most standard
cassette recorders will work  just fine.  However,  you are limited  to 1 hour
recording time	per side.   This can  present a problem in some situations.  A
reel to reel can also be used.	The limitations here are size and availability
of A.C.	Also, some  reel to  reels lack  a remote  jack that will be used to
start  and stop	the recorder  while the  line is being	used.	This  may not
present	a problem.   More later.  The two  types of recorders I would advise
staying away from (for data) are the micro cassette recorders and the standard
cassette recorders that have been modified for 8 to 10 hour record time.  The
speed  of these	units is too unstable.	The next item you need, oddly enough,
is  sold by  Radio Shack  under the  name "Telephone  recording control"  part
# 43-236 $24.95.  See page 153 of the 1987 Radio Shack catalog.



*****************
HOW TO CONNECT IT
*****************

  The Telephone recording control (TRC) has 3 wires coming out of it.

  #1 Telco wire with modular jack.  Cut this and replace with alligator clips.

  #2 Audio wire with miniature phone jack (not telephone).  This plugs
     into the microphone level input jack of the tape recorder.

  #3 Audio wire with sub miniature phone jack.	This plugs into the "REM"
     or remote control jack of the tape recorder.

    Now all you need to do is find the telephone line, connect the alligator
clips, turn the recorder on, and come back later.  Whenever the line goes off
hook, the recorder starts.  It's that simple.



****************
READING THE DATA
****************

    This is the tricky part.  Different modems and different software respond
differently but there are basics.  The modem should be connected as usual to
the telco line and computer.  Now connect the speaker output of the tape
player directly to the telephone line.	Pick up the phone and dial the high
side of a loop so your line doesn't make a lot of noise and garble up your
data.  Now, command your modem into the answer mode and press play.  The tape
should be lined up at the beginning of the recorded phone call, naturally, so
you can see the login.	Only one side of the transmission between the host and
terminal can be monitored at a time.  Going to the originate mode you will see
what the host transmitted.  This will include the echoes of the terminal. Of
course the password will be echoed as ####### for example, but going to the
answer mode will display exactly what the terminal typed.  You'll understand
when you see it.  A couple of problems you might run into will be hum and
garbage characters on the screen.  Try connecting the speaker output to the
microphone of the hand set in your phone.  Use a 1 to 1 coupling transformer
between the tape player input and the TRC audio output.	These problems are
usually caused when using A.C. powered equipment.  The common ground of this
equipment interferes with the telco ground which is D.C. based.

    I was a little reluctant to write this file because I have been
unsuccessful in reading any of the 1200 baud data I have recorded.  I have
spoke with engineers and techs.	Even one of the engineers who designs modems.
All of them agree that it IS possible, but can't tell me why I am unable to do
this.  I believe that the problems is in my cheap ass modem.  One tech told me
I needed a modem with phase equalization circuitry which is found in most
expensive 2400 baud modems.  Well one of these days I'll find $500 lying on
the street and I'll have nothing better to spend it on!	Ha!  Actually, I have
a plan and that's another file.....

    I should point out one way of reading 1200 baud data.  This should work in
theory, however, I have not attempted it.

    Any fully Hayes compatible modem has a command that shuts off the carrier
and allows you to monitor the phone line.  The command is ATS10.  You would
then type either answer or originate depending on who you wanted to monitor.
It would be possible to write a program that records the first 300 or so
characters then writes it to disk, thus allowing unattended operation.

**************
HOW CRAZY I AM
**************

  PASSWORDS GALORE!!!!

    After numerous calls to several Bell offices, I found the one that handled
Tymnet's account.  Here's a rough transcript:

Op:  Pacific Bell priority customer order dept.	How may I help you?
Me:  Good Morning, this is Mr. Miller with Tymnet Inc.	We're interested in
     adding some service to our x town location.
Op:  I'll be happy to help you Mr. Miller.
Me:  I need to know how many lines we have coming in on our rotary and if we
     have extra pairs on our trunk.  We are considering adding ten additional
     lines on that rotary and maybe some FX service.
Op:  Ok....What's the number this is referenced to?
Me:  xxx-xxx-xxxx (local node #)
Op:  Hold on a min....Ok bla, bla, bla.

    Well you get the idea.  Anyway, after asking her a few more unimportant
questions I asked her for the address.	No problem, she didn't even hesitate.
Of course this could have been avoided if the CN/A in my area would give out
addresses, but they don't, just listings.  Dressed in my best telco outfit,
Pac*Bell baseball cap, tool belt and  test set, I was out the door.  There it
was, just  an office  building, even  had  a  computer	store  in  it.	After
exploring the building for awhile, I found it.	A large steel door with a push
button lock.  Back to the phone.  After finding the  number where  the service
techs were I called it and talked to the tech manager.

Mgr:  Hello this is Joe Moron.
Me:   Hi this is Mr. Miller (I like that name) with Pacific Bell.  I'm down
      here at your x town node and we're having problems locating a gas leak
      in one of our Trunks.  I believe our trunk terminates pressurization in
      your room.
Mgr:  I'm not sure...
Me:   Well could you have someone meet me down here or give me the entry code?
Mgr:  Sure the code is 1234.
Me:   Thanks, I'll let you know if there's any trouble.


    So, I ran home, got my VCR (stereo), and picked up another TRC from Trash
Shack.	I connected  the VCR to	the first  two incoming  lines on the rotary.
One went  to each channel (left,right).	Since the volume of calls is almost
consistent, it wasn't necessary to stop the recorder between calls.  I just
let it run.  I would come back the next day to change the tape.	The VCR was
placed under the floor in case a tech happened to come by for maintenance.
These nodes are little computer rooms with air conditioners and raised floors.
The modems and packet switching equipment are all rack mounted behind glass.
Also, most of the nodes are unmanned.  What did I get?	Well a lot of the
logins were 1200, so I never found out what they were.	Still have 'em on tape
though!	Also a large portion of traffic on both Tymnet and Telenet is those
little credit card verification machines calling up Visa or Amex.  The
transaction takes about 30 secs and there are 100's on my tapes.  The rest is
as follows:

   Easylink	  CompuServe	Quantumlink	3Mmail
   PeopleLink	Homebanking       USPS		Chrysler parts order
   Yamaha	    Ford	      Dow Jones

    And a few other misc. systems of little interest.  I'm sure if I was
persistent, I'd get something a little more interesting.  I spent several
months trying to figure out my 1200 baud problem.  When I went back down there
the code had been changed.  Why?  Well I didn't want to find out.  I was out
of there!  I had told a couple of people who I later found could not be
trusted.  Oh well.  Better safe than sorry.


**************************************

    Well, if you need to reach me,try my VMS at 415-338-7000 box 8130.	But no
telling how long that will last.  And of course there's always P-80 systems at
304-744-2253.  Probably be there forever.  Thanks Scan Man, whoever you are.
Also read my file on telco local loop wiring.  It will help you understand how
to find the line you are looking for.  It should be called Telcowiring.Txt

	  <<< AGENT STEAL >>>


--------------------------------------------------------------------------------


		===== Phrack Magazine presents Phrack 16 =====
			   ===== File 7 of 12 =====

------------------------------------------------------------------------
-			  The Disk Jockey			     -
-			     presents:				-
-								      -
-		     Reading Trans-Union Reports:		     -
-			A lesson in terms used			 -
-			(A 2af presentation)			  -
------------------------------------------------------------------------

This file is dedicated to all the phreaks/hacks that were busted in the summer
of 1987, perhaps one of the most crippling summers ever for us.

Preface:
-------
     Trans-Union is a credit service much like CBI, TRW or Chilton, but offers
more competitive rates, and is being used more and more by many credit
checking agencies.

Logging in:
----------
     Call one of the Trans Union dial-ups at 300,E,7,1, Half Duplex. Such a
dial-up is 314-XXX-XXXX.  After connecting, hit Ctrl-S.	The system will echo
back a 'GO ' and then awaits you to begin the procedure of entering the
account and  password, then  mode, i.e.:  S F1111,111,H,T.   The system	will
then  tell  you	what  database	you  are  logged  on  to,  which  is	mostly
insignificant  for your use.  To  then pull  a	report,	you  would  type  the
following:  P JONES,JIM* 2600,STREET,CHICAGO,IL,60604** <Ctrl-S>.   The name
is  Jim Jones, 2600 is his street address, street is the  street name, Chicago
is the city, IL is the state, 60604 is the zip.

The Report:
----------
     The report will come out, and will look rather odd, with all types of
notation.  An example of a Visa card would be:

SUB NAME/ACCT#	SUB#	OPEND	HICR DTRP/TERM BAL/MAX.DEL PAY.PAT   MOP

CITIBANK	 B453411  3/87	$1000	9/87A	$0	 12111     R01
4128XXXXXXXXX		$1500		5/87	$120


Ok, Citibank is the issuing bank.  B453411 is their subscriber code.  3/87 is
when the account was opened.  HICR is the most that has been spent on that
card.  9/87 is when the report was last updated (usually monthly if active).
$1000 is the credit line.  $0 is the current balance.  12111 is the payment
pattern, where 1=pays in 30 days and 2=pays in 60 days. R01 means that it is a
"Revolving" account, meaning that he can make payments rather than pay the
entire bill at once.  4128-etc is his account number (card number).  $1500 is
his credit line.  5/87 is when he was late on a payment last.  $120 is the
amount that he was late with.

Here is a list of terms that will help you identify and understand the reports
better:

ECOA Inquiry and Account Designators
------------------------------------
I Individual account for sole use of applicant
C Joint spousal contractual liability
A Authorized user of shared account
P Participant in use of account that is neither C nor A
S Co-signer, not spouse
M Maker primarily liable for account, co-signer involved
T Relationship with account terminated
U Undesignated
N Non-Applicant spouse inquiry

Remarks and FCBA Dispute Codes
------------------------------
AJP Adjustment pending
BKL Bankruptcy loss
CCA Consumer counseling account
CLA Placed for collection
CLO Closed to further purchases
CTS Contact Subscriber
DIS Dispute following resolution
DRP Dispute resolution pending
FCL Foreclosure
MOV Moved, left no forwarding address
ND  No dispute
PRL Profit and loss write-off
RFN Account refinanced
RLD Repossession, paid by dealer
RLP Repossession, proceeds applied towards debt
RPO Repossession
RRE Repossession, redeemed
RS  Dispute resolved
RVD Returned voluntarily, paid by dealer
RVN Returned voluntarily
RVP Returned voluntarily, proceeds go towards debt
RVR Returned voluntarily, redeemed
SET Settled for less than full balance
STL Plate (card) stolen or lost
TRF Transferred to another office

Type of Account
---------------
O Open account (30 or 90 days)
R Revolving or option account (open-end)
I Installment (fixed number of payments)
M Mortgage
C Check credit (line of credit at a bank)

Usual Manner of Payment
-----------------------
00 Too new to rate; approved, but not used or not rated
01 Pays (or paid) within 30 days of billing, pays accounts as agreed
02 Pays in more than 30 days, but not more than 60 days
03 Pays in more than 60 days, but not more than 90 days
04 Pays in more than 90 days, but not more than 120 days
05 Pays in 120 days or more
07 Makes payments under wage earner plan or similar arrangement
08 Repossession
8A Voluntary repossession
8D Legal repossession
8R Redeemed repossession
09 Bad debt; placed for collection; suit; judgement; skip
9B Placed for collection
UR Unrated
UC Unclassified

Kinds of Business Classification
-------------------------------
A Automotive
B Banks
C Clothing
D Department and variety
F Finance
G Groceries
H Home furnishings
I Insurance
J Jewelry and cameras
K Contractors
L Lumber, building materials
M Medical and related health
N National credit card
O Oil and national credit card
P Personal services other than medical
Q Mail order houses
R Real estate and public accommodations
S Sporting goods
T Farm and garden supplies
U Utilities and fuel
V Government
W Wholesale
X Advertising
Y Collection services
Z Miscellaneous

Type of Installment Loan
------------------------
AF Appliance/Furniture
AP Airplane
AU Automobile
BT Boat
CA Camper
CL Credit line
CM Co-maker
CO Consolidation
EQ Equipment
FH FHA contract loan
FS Finance statement
HI Home improvement
IN Insurance
LE Leases
MB Mobile home
MC Miscellaneous
MT Motor home
PI Property improvement plan
PL Personal loan
RE Real estate
ST Student loan
SV Savings bond, stock, etc.
US Unsecured
VA Veteran loan

Date Codes
----------
A Automated, most current information available
C Closed date
F Repossessed/Written off
M Further updates stopped
P Paid
R Reported data
S Date of last sale
V Verified date

Employment Verification Indicator
---------------------------------
D Declined verification
I Indirect
N No record
R Reported, but not verified
S Slow answering
T Terminated
V Verified
X No reply


Hope  this helps.  Anyone  that has used  Trans-Union will  surely  appreciate
this, as the result codes are sometimes hard to decipher.

						     -The Disk Jockey


--------------------------------------------------------------------------------


		      #### PHRACK PRESENTS ISSUE 16 ####
		   ^*^*^*^Phrack World News, Part 1^*^*^*^
			    **** File 8 of 12 ****


>From the 9/16 San Francisco Chronicle, page A19:

GERMAN HACKERS BREAK INTO NASA NETWORK (excerpted)

Bonn
	A group of West German computer hobbyists broke into an international
computer network of the National Aeronautics and Space Administration and
rummaged freely among the data for at least three months before they were
discovered, computer enthusiasts and network users said yesterday.

	An organization in Hamburg called the Chaos Computer Club, which
claimed to be speaking for an anonymous group that broke into the network,
said the illicit users managed to install a "Trojan horse," and gain entry
into 135 computers on the European network.

	A "Trojan  Horse" is a	term for  a  permanent	program	that  enables
amateur computer enthusiasts  [as opposed  to professionals?], or "hackers,"
to use a password to bypass  all the security  procedures of a system and gain
access to all the data in a target computer.

[Actually, this type of program is a 'back door' or a 'trap door.' The group
may very well have *used* a Trojan horse to enable them to create the back
door, but it probably wasn't a Trojan horse per se.  A Trojan horse is a
program that does something illicit and unknown to the user in addition to its
expected task.	See Phrack xx-x, "Unix Trojan Horses," for info on how to
create a Trojan horse which in turn creates a trap door into someone's
account.]

	The NASA network that was broken into is called the Space Physics
Analysis Network [ooh!] and is chiefly designed to provide authorized
scientists and organizations with access to NASA data.	The security system in
the network was supplied by an American company, the Digital Equipment Corp.
[Probably DECNET.  Serves them right.]	Users said the network is widely used
by scientists in the United States, Britain, West Germany, Japan and five
other countries and does not carry classified information.

	A Chaos club spokesman, Wau Holland, denied that any data had been
changed.  This, he said, went against "hacker ethics."

	West German television reports said that computer piracy carries a
penalty of three years in prison in West Germany.  The government has not said
what it plans to do.

	The Chaos club clearly views its break-in as a major coup.  Holland,
reached by telephone in Hamburg, said it was "the most successful running of a
Trojan horse" to his knowledge, and the club sent a lengthy telex message to
news organizations.

	It said the "Trojan horse" was spotted by a user in August, and the
infiltrating group then decided to go public because "they feared that they
had entered the dangerous field of industry espionage, economic crime, East-
West conflict...and the legitimate security interests of high-tech
institutions."

	The weekly magazine Stern carried an interview with several anonymous
hobbyists who showed how they gained access to the network.  One described his
excitement when for the first time he saw on his screen, "Welcome to the NASA
headquarters VAX installation."

	According to Chaos, the hobbyists discovered a gap in the Digital VAX
systems 4.4 and 4.5 and used it to install their "Trojan Horse."

[Excerpted and Typed by Shooting Shark.	Comments by same.]



--------------------------------------------------------------------------------


		      #### PHRACK PRESENTS ISSUE 16 ####
		   ^*^*^*^Phrack World News, Part 2^*^*^*^
			    **** File 9 of 12 ****

[Ed's Note:  CertainThings in the article have been blanked (XXXXX) at the
request of the author]

		The Story of the Feds on XXXXXXX BBS
		By The Mad Phone Man

	Returninghome one afternoon with a friend, I knew something wasn't
right when I walked into the computer room.  I see a "Newuser" on the board...
and the language he's using is... well "Intimidating"...

"I want you all to know I'm with the OCC task force and we know who you are...
we are going to have a little get-together and 'talk' to you all."

     Hmmm... a loser?... I go into chat mode... "Hey dude, what's up?" I ask.
"Your number asshole" he says.... Well, fine way to log on to a board if I do
say.... "Hey, you know I talked to you and I know who you are.." "Oh
yeah...Who am I?." he hesitates and says... "Well uh.. you used to work for
Sprint didn't you?"
   I say, "No, you've got me confused with someone else I think, I'm a junior
in high school."
	"Ohyeah?.. You got some pretty big words for a high school kid," he
says....
	"Well, in case you didn't know, they teach English as a major these
days...."
	He says... "Do you really want to know which LD company I'm with?"
	I say "NO, but if it will make you happy, tell me."
	He  says  MCI.	(Whew! I  don't use  them)... "Well you're  outta luck
asshole, I pay for my calls, and I don't use MCI."  He's dumbfounded.
	I wish him the worst as he asks	me to	leave his rather  threatening
post up on my board and we hang up on him.

	Now, I'm half paralyzed... hmmm.... Check his info-form... he left a
number in 303... Denver.... I grab the phone and call it.. It's the Stromberg
Telephone company... Bingo.. I've got him.
	I search my user files and come up with a user called "Cocheese" from
there, and I voice validated him, and he said he worked for a small telco
called Stromberg... I'm onto him now.
	Later in the week, I'm in a telco office in a nearby major city, I
happen	to  see a book, marked "Confidential  Employee	Numbers for AT&T."  I
thumb thru and lo and behold, an R.F. Stromberg works at  an office of AT&T in
Denver, and I can't cross  reference him to  an office. (A sure sign he's in
security).  Well, not to be out-done by this loser... I dial up NCIC and check
for a group search for	a driver's licence for him... Bingo.  Licence number,
cars he owns, his SS  number, and a cross reference of the licence files finds
his wife, two kids and a boat registered to him.
	I've never called him back, but If I do have any trouble with him, I'm
gonna pay a little visit to Colorado....


--------------------------------------------------------------------------------


		      #### PHRACK PRESENTS ISSUE 16 ####
		   ^*^*^*^Phrack World News, Part 3^*^*^*^
			   **** File 10 of 12 ****


 [Ed's Note:  Certain names have been change in the article to protect the
 author]

      The Flight of The Mad Phone-Man's BBS to a Friendly Foreign Country


	Using my knowledge that the pigs grab your computer when they bust
you,I got real worried about  losing a BIG investment I've got in my IBM. I
decide	there's a  better way.... Move it!  But where? Where's safe  from the
PhBI?  Well  in the old days, to escape the draft, you went to Canada, why not
expatriate my board....	Well the  costs of  a line  are very  high, let's see
what's available elsewhere.
	One afternoon, I'm working at a local hospital,(one I do telecom work
for) and I  ask the  comm mgr  if they	have any links to Canada?  He says why
yes, we have  an inter-medical link over  a 23ghz microwave into the city just
across the border. I ask to  see the equipment.	WOW!  My dreams  come true,
it's a D4 bank (Rockwell) and it's only got 4 channel cards in it. Now, being
a "nice" guy, I offer to  do maintenance  on this equipment if he would let me
put up another channel...he agrees.  The plot thickens.
	I've got a satellite office for a business near the hospital on the
other side, I quickly call up good ole Bell Canada, and have them run a 2 wire
line from the equipment room to my office. Now the only thing to get is a
couple of cards to plug into the MUX to put me on the air.
	A 2 wire E&M card goes for bout $319, and I'd need two.	Ilook around
the state, and find one bad one in Rochester.... I'm on my way that afternoon
via motorcycle.	The card  is mine,  and the  only thing I can find wrong is a
bad  voltage regulator. I stop by  the Rockwell office in  suburban Rochester
and exchange  the card, while I'm there, I buy a second one (Yeah, on my card)
and drive home.... by 9pm that night the circuit is up, and we are on the air.
	Results- Very good line, no noise, can be converted with another card
for a  modest fee  if I want  the bandwidth.  So that's the  story of how the
board went to a "friendly foreign country."


	 The Mad Phone-Man


--------------------------------------------------------------------------------


		      #### PHRACK PRESENTS ISSUE 16 ####
		   ^*^*^*^Phrack World News, Part 4^*^*^*^
			   **** File 11 of 12 ****


Shadow Hawk Busted Again
========================

	As many of you know, Shadow Hawk (a/k/a Shadow Hawk 1) had his home
searched by agents of the FBI, Secret Service, and the Defense Criminal
Investigative Services and had some of his property confiscated by them on
September 4th.	We're not going to reprint the Washington Post article as it's
available through other sources.  Instead, a summary:

	In early July, SH bought an AT&T 3B1 ("Unix PC") with a 67MB drive for
a dirt-cheap $525.  He got Sys V 3.5 for another $200 but was dissatisfied
with much of the software they gave him (e.g. they gave him uucp version 1.1).

	When he was tagged by the feds, he had been downloading software (in
the form of C sources) from various AT&T systems.  According to reports, these
included the Bell Labs installations at Naperville, Illinois and Murray Hill,
New Jersey.  Prosecutors said he also gained entry to (and downloaded software
from) AT&T systems at a NATO installation in Burlington, North Carolina and
Robins AFB in Georgia.	AT&T claims he stole $1 million worth of software.
Some of it was unreleased software taken from the Bell Labs systems that was
given hypothetical price tags by Bell Labs spokespersons.  Agents took his
3B1, two Atari STs he had in his room, and several diskettes.

	SH is 17 and apparently will be treated as a minor.  At the time of
this writing, he will either be subject to federal prosecution for 'computer
theft' or will be subject to prosecution only by the State of Illinois.

	SH's lawyer,  Karen Plant, was quoted as saying that SH "categorically
denies doing anything that he should not have been doing" and that he "had
absolutely no sinister motives in terms of stealing property."	As we said, he
was just collecting software for his new Unix PC.  When I talked to Ms. Plant
on September 25th, she told me that she had no idea if or when the U.S.
Attorney would prosecute. Karen Plant can be  reached at (312) 263-1355.  Her
address is 134 North LaSalle, #306, Chicago, Illinois.


---------

On July 9th SH wrote:

	So you see, I'm screwed. Oh yeah, even worse! In my infinite (wisdom
|| stupidity, take your pick 8-)) I set up a local AT&T owned 7300 to call me
up and send me their uucp files (my uucp works ok for receive) and guess what.
I don't think I've to elaborate further on THAT one... (holding my breath, so
to type)
				(_>Sh<_

---


--------------------------------------------------------------------------------


		      #### PHRACK PRESENTS ISSUE 16 ####
		   ^*^*^*^Phrack World News, Part 5^*^*^*^
			   **** File 12 of 12 ****


	 "Phone Companies Across U.S. Want Coins Box Thief's Number"
		  From the Tribune - Thursday, Nov. 5, 1987


 SAN FRANCISCO	-  Seven  telephone  companies	across	the country, including
   Pacific Bell, are so frazzled  by a coin box thief that they are offering a
   reward of $25,000 to catch him.

 He's very clever, telephone officials say,  and is the only known suspect  in
   the country	that is	able to  pick the  locks on  coin boxes  in telephone
   booths with relative ease.

 He is believed responsible for stealing hundreds of thousands of dollars from
   coin boxes in the Bay Area and Sacramento this year.

 The  suspect  has  been  identified  by  authorities  as  James Clark, 47, of
   Pennisula,  Ohio,  a	machinist  and	tool-and-die  maker,  who is believed
   responsible for coin box thefts in 24 other states.

 Other companies  sharing in  the reward  are Ohio  Bell, Southern Bell, South
   Carolina Bell,  South Central  Bell, Southwestern  Bell, Bell  Telephone of
   Pennsylvania and U.S. West.

 Clark	allegedly  hit	pay  phones  that  are	near  freeways and other major
   thoroughfares.  Clark, described  as	5  feet  9 inches tall, with shoulder
   length brown hair and gold-rimmed glasses, is reported to be driving a  new
   Chevrolet Astro van painted a dark metallic blue.

 He was recently in Arizona but is believed to be back in California.

 Written by a Tribune Staff Writer


 Typed by the $muggler



--------------------------------------------------------------------------------