==Phrack Inc.== Volume Four, Issue Forty, File 2 of 14 [-=:< Phrack Loopback >:=-] By Dispater & Mind Mage Phrack Loopback is a forum for you, the reader, to ask questions, air problems, and talk about what ever topic you would like to discuss. This is also the place Phrack Staff will make suggestions to you by reviewing various items of note; magazines, software, catalogs, hardware, etc. In this issue: Retirement of a Hacker : Jester Sluggo Truth Is Out Of Style : Dispater Tim Foley Virus : Guido Sanchez The Hacker Files (from DC Comics) : Newsbytes Sneakers (from Universal Pictures) : Press Release Pirates v. AT&T: Posters : Legacy Irreverent and Captain Picard Telco Trashing Yields Big Rewards : Anonymous Anonymous Mail On IBM VM Systems? : Apollo WWIV Link Hack : Mr. Bigg The Day Bell System Died : Anonymous The 1992 Consumer Electronics Show : Sarlo _______________________________________________________________________________ x x x | | | +------------+ | Retirement | | of a | | Hacker | +---+------------+---+ | by Jester Sluggo | +-+--------------------+-+ | Released: July 9, 1992 | +------------------------+ I would like to begin by saying "Hello" to all readers of this file, but unfortunately it will be my last time. I've been a member of the "hacker underground" for over a decade and am one of the few extremely lucky hackers who has successfully hacked a great number of computer systems, phone systems, and other technologies, yet has never been caught. I wish to take this last opportunity to reflect on my experiences, and express many personal views, because although there are feelings of sadness, it is my pleasure to announce my formal retirement from this "underground" community. My decision to retire has been a carefully planned path which began several years ago. During the early 1980's, the innocence of hacking and exploring computer systems for my quest of knowledge was a great thrill. Every system was like an unexplored door which lead to unlimited opportunities; various computer systems, operating systems, languages, networks, software, and data. But it was in the later part of the 1980's when I began to realize that I had to focus my interests, knowledge and experience towards a legitimate career. It's nearly impossible to earn a living solely within the resources of the hacker underground, and the idea of abusing technology for monetary gain is against the (unwritten) code of hacker ethics. Also at this time, the innocence of exploring various systems was being replaced by the realities of ruining my entire future at such a young age if I was caught and convicted by the United States' legal system. The media and law-enforcement agencies have almost always been biased against hackers, and these are two powerful entities that influence society. Hackers have always been presented in a negative context, whereas their discoveries, efforts, creativeness, and hard work have been ignored except among fellow hackers. In a way, it's similar to how the U.S. government and corporations support research and development: A group of researchers discover, explore, refine, or exploit a certain technology over a period of many years, yet their efforts go unnoticed unless their research results in a product acceptable to society. The researcher's results are shared, respected, and challenged among the scientific community and journals long before they ever result in a product (if they ever result in a product). In the same way that researchers and scientists relentlessly pursue their interests, I pursued answers to my curiosities and interests. It is the groups that want to control the society (the legal system, and police) which have labeled "hackers" as notorious people. Hackers can use technology to access a variety of information which was previously accessible only to these groups, and these controllers are afraid of losing their advantages and control. Currently in US, the FBI is afraid of losing their ability to easily tap fiber optics so they're proposing to make it mandatory for central offices to make it easier for them. If people knew how common illegal wiretaps occur, they'd be upset at the abuse of power. Police are making illegal search and seizures, and district attorneys are filing outrageous affidavits to protect their control of power and access to information. It was in the middle to late 1980's when the legal system and law enforcement agencies increased efforts to severely penalize hackers, when the risk of getting caught began to outweigh the excitement of discovering. It is unbelievably difficult to carry the burden of a "serious" criminal record throughout one's life when you're 20 years old (or for that matter 16 years old), as well as the eternal monetary debt which comes with these consequences. In the 1970's, the founders of Apple computer were caught selling Blue Boxes while they were in college and got off with a minimal fine. With todays laws, the potential jail time, monetary damages, and lawyer fees, the system would have wasted and banned the brilliance of Steve Wozniak and Steve Jobs. Apple Computer (and microcomputers) might not have been born (IBM would have loved that). Technology has changed faster than the legal system and society can adapt, so for now, unapproved exploring of these technologies has been declared a serious offense. Society trusts the legal systems' judgement, but even in 1992 law- makers are just barely beginning to understand technology: "Is software patentable (do not confuse with copyrightable), and to what degree?", "What privacy and freedom of speech should we have with electronic mail and communications?" Don't let unqualified law makers make decisions about technology-related issues that will affect you, without them knowing what you have to say. So it was in the late 1980's when I began preparing for my retirement. I outlined a set of goals and a plan to achieve them. Unfortunately this plan required several years to fulfill, but I knew it was the right time of my life to begin this ambitious plan. The goals I wanted to achieve were: 1) Pass the knowledge I've gained onto others. 2) Keep the "hacker" movement active. 3) Prepare myself to be legitimately successful so that I can help to influence society's views about technology as a member of the society. Due to the increasing danger of getting caught, and to become successful, I was forced to hide from the mainstream hacker community and make my actions and efforts unknown. The first two goals were closely related and took slightly longer to complete than my original plan. However, they were a much greater financial sacrifice than I ever imagined. The third goal will probably require the rest of my lifetime, but it's a challenge I accept. To complete goals 1 and 2, I've spent the last 5 years preparing a "tomb" of information and knowledge used within the hacker community. Not all of the information is complete, but neither is the seed that grows to become a tree. Anyone with a telephone can guess ("hack" according to the media and law enforcement) 4-digit passwords to telephone calling cards or PBX out-dial lines, but I wanted "real" hackers. I talked and met with 100's of hackers world-wide to find the right individuals who can responsibly learn and append to this "tomb" -- people who have the desire, respect, effort and ability to encourage new generations of hackers. This group has been selected and trained, and I feel they are some of the best prospects. Their international mixing should give them an almost unlimited number of opportunities, and some protection. I wish them the best of all luck in their endless journey of learning and knowledge. To become legitimately successful meant getting a respectable job. Obviously, with my interests, I knew it would have to be in the high technology industries. Unfortunately, getting a job interview or a job offer with these companies is difficult because the Human Resources departments always shun the hiring of hackers. This is ironic, because many of the engineers and programmers within these companies are made of ex-hackers, or people who share a similar intense interest in technology. Also, since some of best experiences of a hacker are discovered non-legitimately they can't be presented on a resume. My first step towards completing this goal was instinctive; to keep my excitement and enjoyment focused intensely on technology. This may sound strange, but many hackers know friends who "burn out" on hacking or working in the high-tech companies, and I didn't want to 'burn out' at 20 years of age, so I had to slow down my hacking activity. The next step was getting a college education, which I've completed. College is not the answer to everything... in fact it's not the answer to anything, however, college is an experience I wish everyone could experience -- it's a unique experience. A college degree will not guarantee a job, but it might get you past the Human Resources department. If you have the chance to attend college, don't miss this chance. I realize employers prefer experienced workers over inexperienced "fresh" college graduates, but if you have a focused interest on a certain technology, then you will find a way to keep updating yourself while suffering through college. And like me, you will find the college degree combined with the results of your focused efforts will open the best job opportunities to you. Be focused and patient... it worked for me! I am currently working on the inside of a technology-related company, enjoying the work I do for a living. In fact, sometimes I think to myself, "Wow, I get paid for doing this!?" It's a thrill to be doing what I do, yet I must work hard, and continue working hard to achieve the highest position I am able to reach to make the most of my abilities. In doing this, I hope someday to give something back to the non-hacking society which may show them that hackers are constructive to society, thus, changing their negative view which has labeled hackers synonymous to "criminals." I would like to see mature, legitimately- successful hackers, form an interest group to help cultivate the energy of the younger hackers. Although I am retiring from the community, I can never retire the curiosity and intense interest I have about technology. Instead, I now focus these aspects legitimately into my daily work and will continue to do so. I've immensely enjoyed my involvement in the hacking community and will always treasure it. I also hope to eventually persuade people to accept hackers and to not persecute them. This last goal is the most ambitious goal, but I feel it's the most important goal, because those groups that control society are wasting a group of young and talented individuals who could be inventors of future technologies. Now, I will formally say "goodbye" to my friends in the hacking community... but not for the last time. Persevere, Jester Sluggo _______________________________________________________________________________ "Truth Is Out Of Style" An Investigative Report Into Computer Security Corruption by Dispater It seems that these days the anti-virus industry/community has brainwashed the public into thinking that any use of a modem will put you in contact with an unfathomable array of dangers. It sounds like something your mom said, when she didn't want you to stay out after dark doesn't it? As it turns out the anti-virus community has all the moral fiber of television evangelists. As they preach on about the horrors of accessing information (without purchasing one of their products), they are engaging in the activity that they claim should be made a federal offense, in Congress. That is the "distribution of computer viruses. Not only have they been involved in this type of activity since they industry began, but now there is a self proclaimed "elite" [smirk] group of so-called professionals within the industry that wish to keep a monopoly on the virus trade, by ruining the reputation and lives of independent researchers. So in a way, we now have a "virus cartel" within the computer security industry. The Little Black Book of Computer Viruses ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The Little Black Book of Computer Viruses is a printed text that has been around for a few years, but is finally making waves with people who think Prodigy and CompuServe are the best networks ever invented. Anyway, this book contains printed out versions of viruses. Gee, viruses are SO difficult for people to get their hands on aren't they? Well, one of the information dinosaurs got his name in print for condemning such immorality. "Professional virus fighters such as Alan Solomon at S&S International are madder than angry hornets over the publication. They are encouraging anti-black book campaigns that include PICKETING THE AUTHOR'S HOUSE, boycotting shops that sell the book, petitioning Congress, and even bringing in lawyers." -- ComputerWorld, June 29, 1992, page 4 (emphasis added) Well isn't it interesting to note that while Mr. Solomon is encouraging personal and economic harassment of Mr. Ludwig, his close friend and business associate, Sarah Gordon is doing the dirty work for him. The Con ~~~~~~~ The National Computer Security Association's 1st Annual Conference on Viruses took place in Washington, D.C. this past June. Alan Solomon and Sarah Gordon were there in full force. Gordon has often been referred to as being Solomon's sidekick and nowhere did she live up to this distinctive title more than at this conference. At the conference, Gordon purchased not one, but two copies of Ludwig's book and then immediately ran to the conference organizer to make a dramatic scene over how immoral it was for Mr. Ludwig to be selling such a thing. As it turns out this is not the first time Sarah Gordon has engaged in such hypocritical behavior. Another interesting thing to note at the conference is the fact that one evening, Knight Lightning and a couple of others noticed some people sitting around a room and walked in out of curiosity to what was going on. As it turned out what was going on was a "midnight meeting" of sorts. KL and friends were asked to leave because "it was not appropriate that be here." Why wasn't it appropriate? It's because what these people were doing was discussing the ways they were going to "take down bulletin boards" and damage people's career's who distribute viruses. Sometime after this conference, I learned about their plan to use "the media to ruin these sysops. For example, to use influence with the media to call attention to this type of activity." These people even went so far as to compile a list of BBSes that they wish to "take down." The Hit List ~~~~~~~~~~~~ Phrack received anonymous mail containing the BBS "hit list" that the self- proclaimed "elite" group of modem vigilantes put together to target first. Upon our receipt of this list, Phrack staff members contacted the sysops of these boards and as a result, many of the numbers have since been changed. +1-206-481-2728 The Festering Pit of Vile Excretions [This phone number belongs to a construction company called Custom Building Co.] +1-213-274-1333 West Coast Technologies (Tymnet 311021300023) +1-213-274-2222 DII +1-213-PRI-VATE\ )BBS-A-Holic +1-ITS-PRI-VATE/ +1-301-PRI-VATE\ )Digital Underground +1-301-913-5915/ +1-301-948-7761 Cornerstone III [ ] +1-305-669-1347 The Penthouse +1-516-466-4620\ )Hamburger Heaven: this was down for +1-517-PRI-VATE/ software problems, was titled Sentinel's Gate +1-602-491-0703 The Final Frontier +1-708-541-1069 Pirate's Guild +1-717-367-3501 Night Eyes +1-818-831-3189 Pirate's Cove +1-901-756-4756 Silicon Central +1-916-729-2112 The Welfare Department [This is an insurance companies phone number] +1-213-274-1333 West Coast Technologies (Tymnet 311021300023) +1-213-274-aaaa DII +1-313-LIM-ITED Canterbury Woods +1-409-372-5511 The Crowbar Hotel +1-514-PRI-VATE\ )The Sacred Reich +1-514-975-9362/ +1-516-328-0847 The Grave of the Lost +1-516-541-6324 Realm of Heroes +1-708-459-7267 Hell Pit +1-713-464-9013 South of Heaven +1-818-831-3189 Pirate's Cove +1-819-PRI-VATE Brain Damage It is unclear as to whom is directly responsible for the organization of this group or who is responsible for creating and distributing the list, however there were representatives from CERT, ISPNews, and several other well known individuals who are self-proclaimed security experts as well as a slew of nobodies who wish to make a name for themselves. The Hell Pit BBS ~~~~~~~~~~~~~~~~ The Hell Pit is a BBS system in Chicago and operated by a sysop named Kato. Kato has a legitimate curiosity (as if a curiosity needs to be validated) about the inner-workings of viruses. I shall let him relate his experience: "I have been running The Hell Pit BBS for the past 3 years. It's gone through many phases in that time, but the most recent has been my affection for computer viruses. I became interested in viruses about one and a half years ago and I set up a virus file base on my system. At first I had a mere 5 or 6 viruses that I had collected from a system in the area. My collection has grown to about 700 IBM computer viruses." "It seems to be their objective to shut down my bulletin board system and therefore eliminate my virus database. Considering these anti-virus personnel claim to be interested in aspects of computer security, I find their tactics highly questionable. There was recently a NCSA anti-virus conference. I learned from sources that one of the people attending the conference [Sarah Gordon] had committed certain acts on my BBS. This person claimed to have called up, uploaded 3 fake viruses, gained access to my virus database and then downloaded several viruses. This is their proof that I do not adequately control virus access on my system. The anti-virus personnel do not allow me to defend myself." "Anti-virus personnel themselves have committed the same mistakes as I did, probably much more often. There is no set of rules that determines what makes someone an anti-virus authority. Certain people that seem to fit the mold are allowed to exchange viruses with anti-virus personnel. What are the criteria for these people? Is there any? It has been my experience that if you get involved with the right circles, you are considered an anti- virus authority. However, there are many places in the anti-virus community for viruses to leak out. For one thing, you can never be certain who you are dealing with. Just because someone is smart and claims to hold an anti- virus attitude is no guarantee that that person isn't an "in the closet" virus writer. "At anti-virus conferences such as the NCSA anti-virus conference, guests were exchanging viruses like they were baseball cards. That isn't what I would consider controlling access." "They do help a lot of people with computer troubles. However, to criticize me for not properly controlling access to my collection of viruses is being hypocritical." "If anyone would like to call my system to check things out, feel free. I have a lot more to offer than just computer viruses. I have a good number of text files and some pretty active message bases. The Hell Pit BBS - (708)459-7267" - Kato Conclusions ~~~~~~~~~~~ It seems there is a move afoot in the anti-virus community to rid the world of bulletin board systems that disseminate viruses openly and freely. The anti- virus professionals believe that they must "defend the world" from this type of activity. Even though during a recent conference in Washington, D.C., it was disclosed that an anti-virus researcher recently uploaded three (3) viruses onto a virus BBS (Hell Pit). Why was this done? To "expose the fact that the sysop was not as careful as he claims to be." The person that did this was then able to download viruses which was against the policy the sysop claimed was in place (of course this statement is based upon the integrity of the anti- virus community and their integrity is obviously suspect). So, the anti-virus community set-up this sysop and made an example of him in a national conference without allowing him the opportunity to defend himself. In fact, the sysop may still be totally unaware that this event has even occurred, until now that is. These anti-virus researchers were openly exchanging copies of viruses for "research purposes only." It seems okay for them to disseminate viruses in the name of research because of their self-proclaimed importance in the anti-virus community, but others that threaten their elite (NOT!) status are subject to be framed and have examples made of them. Do As I Say, Not As I Do ~~~~~~~~~~~~~~~~~~~~~~~~ This type of activity raises a very interesting question. Who gives private sector computer security employees or consultants carte blanche to conduct this type of activity? Especially when they have the gall to turn around and label hackers as criminals for doing the exact same thing. The answer is not who, but what; money and ego. Perhaps the most frightening aspect of this whole situation is that the true battle being fought here is not over viruses and bulletin board systems, but instead the free dissemination of information. For a group of individuals so immersed in this world, there is a profound ignorance of the concepts of First Amendment rights. Phrack Magazine is ready to stand tall and vigorously keep a close watch and defend against any incursion of these rights. We've been around a long time, we know where the bodies are buried, our legion of followers and readers have their eyes and ears open all across the country. Those of you in the security industry be warned because every time you slip up, we will be there to expose you. Dispater _______________________________________________________________________________ Tim Foley Virus ~~~~~~~~~~~~~~~ By Guido Sanchez Right after I moved from 512 to 708, I had the misfortune to realize that Steve Jackson Games, a company whose games I readily buy and play, had a BBS up in my home town called the Illuminati BBS. This was my misfortune as I could have called it locally in Texas, but now instead had to spend my phone bill on it from Illinois. A good year after the Secret Service assault of Steve Jackson Games, after most of the "evidence" was returned with nifty little green stickers on it, a text file was put up on the BBS called FOLEY.TXT, a simple copy of the lawsuit that Steve Jackson Games had filed against the government, also known as JACKSUIT.TXT, distributed by the EFF I believe. [Editor's Note: We have been unable to confirm that EFF ever released a file called JACKSUIT.TXT, however details of the EFF's participation in the Steve Jackson Games lawsuit can be found in EFFector Online 1.04.] It was called FOLEY.TXT obviously because of Timothy Foley, a big-shot government guy [actually an agent for the U.S. Secret Service] who is one of the defendants in the case. I downloaded the file, and zipped it into a file called, surprisingly enough, FOLEY.ZIP. Within the next week, I was gleefully spreading information as usual, and uploaded the FOLEY.ZIP file along with a batch of viral files to a local BBS with a beginning virus base. The theory here is to spread viruses about, accessible to all so that wonderful little Anti-Viral programmers cannot succeed. Unfortunately, the FOLEY.ZIP file was put into the viral file base, and before I could warn the sysop to move it into the appropriate file base, about 8 lame warezwolves had downloaded it and by the end of the week it was widely spread around the 708 NPA. The moral of this story? None really, it's just an amusing vignette of what can happen when people become involved in the intense bartering of information that takes place via modem, and can get ridiculed if they're not sure of their commodity. That's all this huge business is, everyone is a courier. Whether they're pirated files, adult files, sound files, viruses, or text files; 90% of the time they're just downloaded from one 1.2 gig board and uploaded to the next one for more credits to download more files, etc. It's a great big cycle, just like life. So, to risk sounding cliche, my rally to all is this: "Slow down! Sit back and pick the roses, eat them, digest them, and eventually excrete them!" Mr. Warhol, my fifteen minutes are up. The soapbox is now free. _______________________________________________________________________________ The Hacker Files June 22, 1992 ~~~~~~~~~~~~~~~~ By Barbara E. McMullen & John F. McMullen (Newsbytes) NEW YORK -- DC Comics has announced the introduction of a new twelve-issue series, "The Hacker Files." DC spokesperson Martha Thomases said that the first issue will ship on June 23rd. The series, created by science fiction author Lewis Shiner, deals with the adventures of "super-hacker" Jack Marshall who, prior to the events chronicled in the series, unjustly lost his job at Digitronix and now operates as a free- lance consultant. The first story line, covering the first four issues of the series, deals with Marshall's attempt to uncover those responsible for jamming ARPANET (Network of Advanced Research Projects Agency) and causing NORAD's Space Surveillance Center inside Cheyenne Mountain, Wyoming to malfunction, bringing the United States to the brink of nuclear war. In the course of his investigation, Marshall, AKA "Hacker," is assisted by a number of members of the hacker community -- "Master Blaster," "Sue Denim," and "Spider" (Master Blaster, whose real name is Mikey is a student at New York City's Bronx High School of Science). Fiction comes close to reality when it appears that the person responsible for the virus that caused the damage is Roger P. Sylvester, a student at Columbia University and the son of a high ranking official at the National Security Agency (NSA); on November 2, 1988 Robert T. Morris, Jr., a Cornell student and son of NSA's chief computer scientist, caused the crippling of the Internet through his release of the "Internet Worm." Shiner told Newsbytes, "The similarity of the characters was, of course done intentionally -- you might even note the somewhat subtle connection of the names: 'Sylvester The Cat' and 'Morris The Cat.' I did it partially to show those somewhat knowledgeable about computers that the plot was not made out of whole cloth but was the result of a good deal of research." Shiner continued, "When reading comics, I look for information density and I tried to make the Hacker Files rich in that regard. I'm hoping to attract some computer-literate young people to comics -- comics were one of the earliest forms of expression to make great use of computers and I hope, with the Hacker Files, to involve more computer types in the medium." Shiner also told Newsbytes that his experience as a programmer with a small Dallas software firm provided him with an ongoing interest in computer and communications technology. He added, "The firm was sold to EDS (Electronic Data Services), Ross Perot's firm, and, with long hair and jeans, I didn't fit into the EDS mold so I left and concentrated on writing." _______________________________________________________________________________ "Sneakers" by Universal Pictures June 24, 1992 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Taken from PR Newswire Follow A Team of High-Tech Security Experts Into The Complex World of Computer Crime "I was trying to break into Protovision. I wanted to get the programs for their new games." -- David Lightman (Matthew Broderick, "WarGames"). "The world isn't run by weapons anymore, or energy or money. It's run by little ones and zeros. Little bits of data. It's all just electrons." -- Cosmo (Ben Kingsley, "Sneakers"). In 1984, screenwriters Walter F. Parkes and Lawrence Lasker received an Academy Award nomination for their script which followed the adventures of a young high school hacker (Matthew Broderick) whose computer made contact with the mainframe computers at North American Air Defense Command (NORAD). A critical and box office success, "WarGames" was the first major motion picture to explore the emerging worlds of computer games, hacking, crashing and data piracy. It soon found a legion of fans who had also discovered the vast frontiers available through their personal computer. Eight years later, Parkes and Lasker along with writer-director Phil Alden Robinson ("Field of Dreams") have collaborated on "Sneakers," a Universal Pictures release which follows a team of high-tech security experts into the complex world of computer crime. The caper film, directed by Robinson, stars Robert Redford, Dan Aykroyd, Ben Kingsley, River Phoenix, Sidney Poitier, David Strathairn, James Earl Jones, and Mary McDonnell. Parkes and Lasker first heard the term "sneakers" at a computer convention in 1981 as a nickname for IBM's kid programmers. Months later, they met the editor of a small computer magazine who had a very different definition of the word. "Sneakers," their source explained, is a term that is synonymous with "black hatters" and "tiger teams," or individuals who are hired to break into places in order to test the security of the installation. Teaming up with Robinson, the trio wrote the basic outline of a story about a team of sneakers whose questionable pasts had brought them together. Robinson then embarked on some extensive research, but what had begun as basic fact- finding about computer outlaws soon evolved into clandestine meetings with underground hackers, FBI men, cryptologists, wire tappers, professional penetrators and an endless stream of cyberpunks who were the pioneers in system break-ins. The "Sneakers" research led to meetings with numerous characters, ranging from the notorious Captain Crunch (John Draper) to renowned mathematician Leonard Adelman, called the father of public-key encryption. Using computer encryption as a plot device, the writers were able to concoct an intricate "what if" story which explored the possibility of a "black box" that could potentially crack the code of any electronic information in the world. "'Sneakers' has to do with a new age... the information age," said Redford. "It's quite possible that a war in the future will be a war of information. Whoever has it, wins." Coming to theaters this September. _______________________________________________________________________________ Pirates v. AT&T: Posters ~~~~~~~~~~~~~~~~~~~~~~~~ Special thanks to Legacy Irreverent and Captain Picard On May 24 1992, two lone pirates, Legacy (of CyberPunk System) and Captain Picard (of Holodeck) had finally had enough of AT&T. Together, they traveled to the AT&T Maintenance Facility (just west of Goddard, Kansas) and claimed the property in the name of pirates and hackers everywhere. They hoisted the Jolly Roger skull and crossbones high on the AT&T flagpole, where it stayed for two days until it was taken down by security. This event was photographed and videotaped by EGATOBAS Productions, to preserve this landmark in history. And now you can witness the event. For a limited time they are offering full color posters and t-shirts of the Jolly Roger Pirate flag flying high over AT&T, with the AT&T logo in plain view, with the caption; "WE CAME, WE SAW, WE CONQUERED." Prices: 11" x 17" Full Color poster........................... $ 7.00 US 20" x 30" Full Color poster $20.00 US T-shirts $20.00 US If you are interested in purchasing, simply send check or money order for the amount, plus $1.00 US for postage and handling to: CyberPunk System P.O. Box 771027 Wichita, KS 67277-1072 Be sure to specify size on T-shirt. A GIF of this is also available from CyberPunk System, 1:291/19, 23:316/0, 72:708/316, 69:2316/0. FREQ magicname PIRATE _______________________________________________________________________________ Telco Trashing Yields Big Rewards July 20, 1992 ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ by Anonymous A few days ago, I was faced with a decision about what to do that fine evening: Try and make amends with my girlfriend or go dumpster diving down at the Bell Central Office. Well I guess I am a true lamer since I opted for the telco, but my choice did not go unrewarded as I found a nice little treasure. The building is a old 1940's brick place with almost no security whatsoever, not even a guard on Sunday nights. So, it was no problem to jump the barbed wire fence that surrounded the truck lot where the dumpster was located. After rooting around through the dumpster for something worth my while, I came across a medium sized box that apparently had been used by one of the employees for moving since written on the were the words "pots and pans, kitchen." Naturally intrigued by this strange box in a telco dumpster, I opened it and found quite a surprise! There, staring up at me, was a binder with a label stuck on it that read "Phrack 23." Inside I found the entire collection of Phrack 1-39, Informatik 1-4, and LOD/H Technical Journals 1 and 2 (apparently they were too cheap to print out the rest). They were poorly printed on a laser printer (or well printed on a ink jet), but they were much better than the cheesy job I had done printing out mine. :-) Apparently someone at the telco is a phreaker that infiltrated the ranks of South Central Bell or they have been reading up on the latest and greatest in the phreaker/hacker community. Perhaps not as valuable as a list of COSMOS passwords or dialups, but still it was quite a find. _______________________________________________________________________________ Anonymous Mail On IBM VM Systems? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Date: Tue, 28 Apr 92 14:54:58 EST From: Apollo Subject: Anonymous Mail To: Phrack Staff Dear Phrack Staff, I was reading a past Phrack issue and noticed that you can send anonymous mail from a UNIX system. I know that there is a way to send it from a VM system. However, the people at my node don't want anonymous mail sent, so they do not tell us how it's done. Can someone PLEASE tell me how I can send anonymous mail via a VM system? -- Apollo -- From: Mind Mage Subject: Anonymous Mail To: Apollo I assume that you know you can telnet to any VM system on the Internet and send anonymous mail using port 25 and a commands that are very similar to that of the UNIX SMTP. If you want to send it from your particular system, you can try telneting to port 25 of your own machine and doing it from there. Mind Mage _______________________________________________________________________________ WWIV Link Hack ~~~~~~~~~~~~~~ By Mr. Bigg (Rebel-*-Jedi) Not that many people care but here is a nice little trick I happened to come across and feel like sharing. Hack for WWIV Systems Using Multi-Net v1.0 Mod Usually used for LinkNet Main Login: @-!NETWORK!-@ Link Login: 1 (or whoever is sysop) //edit config.dat find system password in file abort editing //dos enter system password Viola, access to Dos :) Lamely enough there is no password. Check for users when using this mod. _______________________________________________________________________________ The Day Bell System Died ~~~~~~~~~~~~~~~~~~~~~~~~ Sung to the tune of American Pie (with apologies to Don McLean) Long, long, time ago, I can still remember, When the local calls were "free". And I knew if I paid my bill, And never wished them any ill, That the phone company would let me be... But Uncle Sam said he knew better, Split 'em up, for all and ever! We'll foster competition: It's good capital-ism! I can't remember if I cried, When my phone bill first tripled in size. But something touched me deep inside, The day... Bell System... died. And we were singing... Bye, bye, Ma Bell, why did you die? We get static from Sprint and echo from MCI, "Our local calls have us in hock!" we all cry. Oh Ma Bell why did you have to die? Ma Bell why did you have to die? Is your office Step by Step, Or have you gotten some Crossbar yet? Everybody used to ask... Oh, is TSPS coming soon? IDDD will be a boon! And, I hope to get a Touch-Tone phone, real soon... The color phones are really neat, And direct dialing can't be beat! My area code is "low": The prestige way to go! Oh, they just raised phone booths to a dime! Well, I suppose it's about time. I remember how the payphones chimed, The day... Bell System... died. And we were singing... Bye, bye, Ma Bell, why did you die? We get static from Sprint and echo from MCI, "Our local calls have us in hock!" we all cry. Oh Ma Bell why did you have to die? Ma Bell why did you have to die? Back then we were all at one rate, Phone installs didn't cause debate, About who'd put which wire where... Installers came right out to you, No "phone stores" with their ballyhoo, And 411 was free, seemed very fair! But FCC wanted it seems, To let others skim long-distance creams, No matter 'bout the locals, They're mostly all just yokels! And so one day it came to pass, That the great Bell System did collapse, In rubble now, we all do mass, The day... Bell System... died. So bye, bye, Ma Bell, why did you die? We get static from Sprint and echo from MCI, "Our local calls have us in hock!" we all cry. Oh Ma Bell why did you have to die? Ma Bell why did you have to die? I drove on out to Murray Hill, To see Bell Labs, some time to kill, But the sign there said the Labs were gone. I went back to my old CO, Where I'd had my phone lines, years ago, But it was empty, dark, and ever so forlorn... No relays pulsed, No data crooned, No MF tones did play their tunes, There wasn't a word spoken, All carrier paths were broken... And so that's how it all occurred, Microwave horns just nests for birds, Everything became so absurd, The day... Bell System... died. So bye, bye, Ma Bell, why did you die? We get static from Sprint and echo from MCI, "Our local calls have us in hock!" we all cry. Oh Ma Bell why did you have to die? Ma Bell why did you have to die? We were singing: Bye, bye, Ma Bell, why did you die? We get static from Sprint and echo from MCI, "Our local calls have us in hock!" we all cry. Oh Ma Bell why did you have to die? _______________________________________________________________________________ The 1992 Consumer Electronics Show ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ By Sarlo The Consumer Electronic Show is the annual event held in Chicago, Illinois, that gives a sneak peek at the electronic products to come to market, as well as products that are currently on the market. The show is usually closed to the public. This year however, for a MEASLY $10 fee, the common shmoe can waltz his ignorant ass right up to the door, get a green stamp on his hand, and walk up to several displays, oohing and ahhhing, and gape like landed fish at the wonderous booths set up by various participating companies such as AT&T, most major bell companies, IBM, Prodigy, dozens of cellular manufacturers, Nintendo, Sega, and more software producers than I really have the patience to list. I take a taxi to the McCormick center, a convention haven, and enter through the underground entrance. I walk down the nondescript hallway, noting that for a center that is supposed to be housing the latest in the future technology, nothing was that awe-inspiring. Expecting a lame show with shoddy video graphics, I purchased my ticket, got my hand stamped and entered the doors. Into an enormous room, filling my senses with an array of Lights and Sound. You could almost smell the silicon as I made my way down the aisle displaying the giant Phillips Digital Compact Cassettes screen. Not being a huge fan of stereo equipment, I head over to the Sharp Electronics Display. It was a turn in the right direction, as it brought me face to face with one of the clearest and, per the name, sharpest video displays I have seen in my life. Their LCD big-screen televisions, displaying a aquarium scene. Even close up, distortion of the images were at a minimum. Along the north wall, a smaller, gutted version of the LCD display was shown, giving electronics buffs a firsthand look at the inner workings of the viewscreens. Turning a corner, I came face to face with their dual-projection wallscreen television. Instead of ghost images and a fuzzy, indistinct picture, I found that it may have very well be the highest quality video projection system I have ever come in contact with. Cellular Mania ~~~~~~~~~~~~~~ The highlight of the Cellular Phone section was the Motorola Cordless/Cellular display area with a large sign showing the spokesperson for Motorola, the eye- catching slogan above him: "Cordless Phone Eavesdroppers Are Everywhere." Immediately catching my interest, I wandered over to check out the smaller print: "But with my Motorola Secure Clear (tm) Cordless Phone, my private conversations stay private." Secure Clear, as the literature explains it, is an exclusive technology that assures you that no eavesdroppers will be able to use another cordless phone, scanner or baby monitor to listen to your cordless conversations. As most of us know, security codes and multi-channels don't always prevent eavesdropping. With the latest technology these days, security codes, one of 65,000 possible codes that are randomly assigned every time you set the handset into the base, keeps someone from using your phone base as an outgoing phoneline. Using the Auto Channel Scan (ACS), the Secure Clear Cordless Phones automatically skip any channels that register noise or interference. Three guesses what Sarlo is getting himself for Christmas. For more information on this or any other Motorola product, call their Consumer Products Division at (800)331-6456. On other notes, Technophone had a wide variety of cellular accessories, including a Desk stand, spare batteries, an in-car charger, a new life of antennae, QuickCharge AC chargers, and a hands-free unit for safe operation in a car. Omni Cellular had one of their Model "A" V833k Portable Hand-Helds open for a demonstration, giving a static-free conversation with one of the salesmen. Many of the features of this phone were: o 90 Minutes of Talk Time o 10 hours of Stand-by Time. o and a sturdy design built right here in the USA. Other features included Auto-Power Shutoff, Electronic Lock, 50 number memory, and signal strength indicator. East Building Hipster Hi-Jinx ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Growing bored, I headed over to the map. Searching it, I found, almost literally, my green light. On their illuminated map display, the green section of the map beamed out to me. "Computers" Hauling ass to the door, stopping for a quick inspection of my bags by the security guard, I strolled over to the east building (purchasing a way-keen CES-92 T-Shirt along the way), I burst into the building with a renewed vigor. Right smack-dab in the front of the entrance there is the awful stench of men in business suits and cheap computer services. Right away, I knew I had found the Prodigy display. With free trials and the salesmen prodding the consumers to subscribe to their system, I decided to take a look. "Where else can you get such a great service, allowing you access to such a wide variety of things such as an online message service, up-to-date news, an online encyclopedia, and thousands of interesting users, people just like yourselves?" The Online-Conman peddled his wares to the unsuspecting consumers, not only misinforming them as to think that Prodigy is a useful service at all, but to actually have the gall to shove a PS/1 in their faces and tell them it's a quality computer. "Umm... what about any Public Access Unix Site with an Internet or Usenet feed," I asked. The clod then got on his high-horse and addressed me. "Perhaps. But most Public Unix's, or bulletin boards, for that matter don't have high-quality graphics to accompany the information." The man had definitely done his homework. But apparently IBM and Sears soaped the man's brains out thoroughly enough to the point where he actually bought the bull that they were forcing down peoples throats. "Yea," I said. "But most public access sites don't waste a quarter of your screen space with worthless advertisements. I wasn't aware that pretty pictures made the news or messages any more informative, either. But I might also point out that they don't charge you a extra amount of money for every message over the 30th one, read your mail or censor your public posts, or, many times, even charge you a fee at all, other than possibly an optional subscription fee, around $50 a YEAR at most, nor do they have small datafiles that collects information from the fat table from the subscribers." As I was speaking, the salesman was trying to interrupt me, finally succeeding at this point. "Well, I can see you have a lot of questions," the salesman evades rather well. "So I'm sure this gentleman over here will be glad to answer any of your questions, while I can take this lady's question...Yes?" I was approached by another salesman who asked me what questions I needed answered. I said none, seeing as I didn't have much interest in his system anyhow, and that I was just seeing how good the Prodigy salespeople worked under pressure. He said he would be glad to answer any questions I had, but if I were only there to harass people, to please take it elsewhere. Then it was off to the various other setups. Magazines were on display and free for the taking here, including Mobile Office, Various Nintendo/Game System magazines, and Audio Equipment. Walking down one of the back isles, I heard a bit of conversation that caught my ears. Star Trek Straight To Your Home ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ "Computer. Recognize Picard, Jean-Luc. Kitchen Lights ON, Turn ON the VCR and hit RECORD. Close the Curtains, and turn on the Extasy Channel. Prepare to record "Chicks with Dicks." - Jean Luc Picard Stardate 1992.4, 2:45 A.M. Such a Scenario is something you would think you could find only on Star Trek, right? Wrong. With the Mastervoice, the "Ultimate in Home Automation", the mastervoice is much like your own personal butler, telling the correct time, activating and operating any device in your household, and even with it's own alarm system. All of this, at the command of your voice. Mastervoice can be designed to be used by up to four people, can be trained in any language. It distinguishes who is speaking, obeys the commands, but also speaks back to you -- in a HUMAN sounding voice. Male or Female. You can add or delete voices from it's recognition systems, you can also create new response words as well. Featuring control over lights, stereo, TV, coffee maker, heating and cooling systems. It also has a Household Noise Override that allows you to have stupid children racing around your home in an obnoxious manner without disturbing the unit. Plus, it is also a speakerphone/telephone with stored numbers. At the sound of your voice, it will dial or answer incoming calls and allow you to carry on a conversation without ever having to touch the system. It also interfaces with your PC for memory storage or control operations. Built in infrared sensor and intrusion detection systems are another highlight of this demonstration. As it recognizes up to four voices, you can assign a password for each voice, being anything from "I am home" to "Supercalafragilisticexpialidoshes". If all fails, it can call the police for you. Nutty as all hell. Mastervoice operates thru carrier current modules. This model, as one of the top of the line voice-recognition home-use systems, it is up there in the $4,000 plus range, but seeing all the stuff it does, it's well worth the price. Skipping the Game Module Section (Nintendo/Sega/TurboGraphix/etc) entirely, I ran into an interesting palmtop known as the Psion Series 3, and their new interlink software. Windows Compatable, the palmtop not only has communication software for a link between your PC and Palmtop, but also will support standard Hayes and Hayes compatible modems. Sporting a qwerty style keyboard and a romcard port, 128k and a 40 column screen, the Series 3 may be limited, but provides an acceptable amount of access to other online services. Though for now, a Windows based software package is only available, at the time of this writing, there will be DOS and UNIX compatible packages available to the public in 5 to 6 months. _______________________________________________________________________________