Copy Link
Add to Bookmark
Report

ASKInews Issue 02

eZine's profile picture
Published in 
ASKInews
 · 25 Apr 2019

  




T t 07-14-93
h h Issue #2
e e of

ßßßßß ßßßßß ßß ßß ßßßßßß ßßßßßß ßßß ßß ßßßßß
ßß ßß ßß ßß ßß ßß ßß ßßßß ßß ßß ßß
ßßßßßßß ßßßßß ßßßßß ßß ßß ßß ßß ßß ßßß
ßß ßß ßß ßß ßß ßß ÜÜ ßß ßß ßßßß ßß ßß
ßß ßß ßßßßß ßß ßß ßßßßßß ßÛ ßßßßßß ßß ßßß ßßßßß
s p n n
s r o f
o e w o
c a l r
i d e m
a d a
t o g t
i f e i
o o
n & n

f
o
r










"He wanders, like a day-appearing dream,
through the dim wildernesses of the mind;
Through desert woods and tracts, which seem
like ocean, homeless, boundless, unconfined."
---Percy Bysshe Shelley





ASKiNews 2.0
an A.S.K.i. publication

ASKi President: The White Ninja (WhiteNinja@AOL.COM)
ASKi VP: WiLD CHiLD
ASKiNews Editor: CRiMiNAL
ASKiNews Distributor: Doc Hench

. .
.......................
........ Index ........
.......................
. .


1. Comments from the editor...
2. ASKiNet/AquaNET Nodelist and Echolist
3. -=ðCrosstalkð=-
4. The Novice's Guide to Hacking!
5. BUSTED! What to do if you are arrested...
6. Cyberevolution!!
7. A Flame!
8. Beating Dial Locks and DTMF Recorders
9. Box of the Month: The Beige and Brown Boxes
10. Virus Corner -- The Theory of Self-Reproductive Software
11. On the Lighter Side....
12. News from Cyberspace
13. Coming Soon
14. Laid Her



ASKi Phile #1
Comments from the Editor

Well, welcome to ASKi02... Nashville's one and only hacker zine! First,
two apologies. One, SORRY about ASKi01!!! The thing was FILLED with horrid
typos and grammatical errors... That is the last time I spell check a document
at two in the morning!!! Two, SORRY this doc took a year to put together!!!
Thanks to WC we finally got thing back on track... Well, here it is!! This
should prove to all you fuckers that we are not dead and we still believe that
information should be free... One bitch... WHY ONLY ONE COMMENT ABOUT ASKi01!?!
I know someone read it and thought "THIS SUCKS!" I hope someone read it and
thought "This rules!" It would be nice if both of your MENTIONED it!! Write me
and tell me what you thought!! We would like to hold an ASKiFEST in the park in
late July, give us some ideas... Oh, and to TN Governor's School... A. Why was
I rejected, I must be one of the most qualified computer science high school
students in the state... B. Why did you CS teacher tell members of the class
that ASKi was a bunch of stupid kids who don't understand freedom of speech?
The kinderfeindlichkeit (German, look it up) bigotries hinted at in that
statement aside, when you made that statement we had just started to work on
ASKi01!! We had never made a public statement concerning free speech!! We have
gotten a lot of bad press from people who were mad at Lizard King, but he
does not represent this organization and his statements do not reflect the
official opinions of ASKi nor do they represent the opinions of its members!
If you have a problem with me or my opinions, TALK TO ME ABOUT IT instead of
talking about it behind my back! This brings me to MEDIATE... I'm not going
to drudge up all the bull shit again... I just hope its all over with, and
despite what was said, the people involved all know what REALLY happened...
I would like to make another point... Mediate is a BAD idea... I believe there
should be a Nashville Sysop's group, but I have a problem with people running
a SysOp vengeance forum, and I posted the following in the Mediate forum...
"...I think this is a fundamental problem with Mediate system. I'm
not trying to tell you how to do anything, I just have a few suggestions and
comments. In reality, Mediate doesn't mediate anything, in my opinion it serves
as a revenge tactic for disgruntled SysOps. A SysOp is angry at a user so he
goes into Mediate and tells everyone to lock him out! Everyone does so and the
SysOp has gotten back at that person for whatever he or she might have done.
That SysOp might have been lying, exaggerating, or making impossible
assumptions, but the user has no chance to give his side of the story. There
are no checks and balances. Things DO get out of hand.... I think that mediate
should be open to all users, and the moment allegation are brought against a
person, that person should be notified by the Mediate president so that he or
she can defend him/herself. This is a fair and reasonable way to deal with
problems in the BBS community. Otherwise, Mediate will remain a tool for
revenge..." 'Nuff said... I was at Defcon last weekend and a lot of people
present seemed interested in ASKi. However, many had one question. Why are you
rehashing all the old shit? Because there isn't a PHVA mag out there designed
for the new hacker... You need a lot of base knowledge to start hacking these
days, and noone seems willing to provide that knowledge. I think the reason so
many new phreaks get into CCs and Codes instead of more interesting and less
damaging exploration is that the only people willing to deal with new people
are the real fucking criminals... Information like this is quite different, it
provides people with the option of exploring much more interesting topics
non-maliciously. I'll write more about defcon next issue. Finally, this IS the
Cyberpunk era!! Stop waiting for 2020 and get out there and live this exiting
culture before its gone! The future won't be like the it is in the novels, it
will be VERY different, Gibson and Sterling are describing the PRESENT (with
all little boost in technology), and the time to act is now!!! LIVE THIS and
enjoy it before its gone!!! Well, have phun! HACK OR DIE!

The White Ninja




ASKi Phile #2
ASKi/AquaNET Nodelist

Cut Here
-------------------------------------------------------------------------------
Zone,10,AquaNET_North_America,Nashville_TN,Doc_Hench,1-615-228-9698,9600,CM,XA
;
Host,666,Middle_Tennessee_AquaNET,Nashville_TN,Doc_Hench,1-615-228-9698,9600,CM,XA
Hub,100,Binary_Degeneration,Nashville_TN,Doc_Hench,1-615-228-9698,9600,CM,XA
,1000,Binary_Degeneration,Nashville_TN,Doc_Hench,1-615-228-9698,9600,CM,XA
,101,Crosspoint,Lebanon_TN,Todd_Andrews,1-615-443-3664,2400,CM,XA
,103,Mount_Olympus,Gallatin_TN,Thunder,1-615-451-0739,9600,CM,XA
,105,On-Line_Gamers_Clinic,Mt.Juliet_TN,The_Doc,1-615-754-0473,9600,CM,XA
Pvt,107,The_Bandit's_Hideout,Nashville_TN,Bandit,-Unpublished-,9600,MO,XA
Hub,200,The_Ninja's_Domicile,Brentwood_TN,The_White_Ninja,1-615-370-8805,9600,CM,XA
,2000,The_Ninja's_Domicile,Brentwood_TN,The_White_Ninja,1-615-370-8805,9600,CM,XA
,201,The_Virtual_Reality_BBS,Nashville_TN,Walter_Anderson,1-615-383-4643,9600,CM,XA
,203,Aces_High,Hermitage_TN,Red_Baron,1-615-885-5876,2400,CM,XA
Hub,300,Post_Offis_][,Franklin_TN,Maverick,1-615-791-7595,9600,CM,XA
,3000,Post_Offis_][,Franklin_TN,Maverick,1-615-791-7595,9600,CM,XA
,301,Mondo_Gordo!,Franklin_TN,Reverend_Keith_A._Gordon,1-615-791-8050,2400,CM,XA
-------------------------------------------------------------------------------
Cut Here

ASKi/AquaNET Echolist

------------------------------------------------------------------------
Key: + Frequently used echos (large percentage of the messages)
* Mandatory echos (must turn on)
! READ-ONLY ECHO
***** Fairly new echos that we need nodes to carry!

-------------- AquaNet Echolist - As of 06/10/93 ---------------

1STAMNT +1st Ammendment Discussions
ASKIGEN ASKI newsletter updates and ASKINEWS!
COCOT_THRASH ***** Cocot thrashing at it's best!
COUNTRY_BASH ***** Bash that country music white boy!
CURRENT +Current events within AquaNET
ELECTRON Electronics Forum
FORSALE For Sale / Trade echo
GENERAL +General Discussions on modeming and other topics
JUSTICE +American Justice and the Legal System
MODEMING BBS help and BBS Ads
MST3000 Mystery Science Theatre 3000 Discussions
MUSIK +Music, Movies, and Concerts
NC-CO !*Network Coordinator Comments / News
PHIL Philosophy and Religion
POLITICAL_CHAT ***** Chatter and thrashing of the government!
PROG Programmer's Corner
Q-ZAR ***** +Q-Zar discussion echo
REDNET Bitch out sessions present...REDNET
SCIENCE Science and Technology Updates
SWINGERS AquaNET's Luv Nest (USED)
SYSOP AquaNET SysOp and Co-SysOp Discussions
TESTECHO Testing echo for new AquaNet nodes
UNDER +Computer Underground Discussions
VIRTUAL Virtual Reality Discussions
WHEELS Hot babes, cool cars, that's the life for me!!
ZONE_10 *AquaNET Zone 10 news ans happenings
------------------------------------------------------------------------
List maintained by: Matt Coleman <Maverick> - AquaNET NEC - 10:666/1000
------------------------------------------------------------------------


ASKi Phile #3
-=ðCrosstalkð=-


Message #2718 - ÿLOCAL: To/From Sysop (Private) (Received)
Date: 07-29-92 14:31
From: Jaxx
To: THE WHITE NINJA
Subject:: ASKi/ShadowNET
-------------------------------------------------------------------------------
@PID: RA 1.11 2890
Hello! I've just re-started a BBS here in Crossville,...Just installed FD and
have sent in my request to join Fidonet....Was wondering how one could join
ShadowNET and ASKiNet and AquaNet?

I agree totally with everything that was in the NewsLetter! Found it
REFRESHING that there is a group started to help stop the right out
censorship that's going on with BBS's and everywhere else!
Also agree with your comments (except the part about no companies hiring
anyone like ourselves, I got lucky and I'm now part of a MIS dept. with
unlimited access to a modem and a budgeted amount for long-distance calls!)

ANYWAY....Please leave me a message about the my questions...

[=ûaxx=]

Jaxx,
Well, just send me your real name, BBS name, location, number, and
whether your system will be able to accept mail anytime. I will confirm that
your front end and mailer are working, and add you to the nodelist. Your system
must be able to accept zipped mail and you must be willing to let the
conferences go uncensored.
Thanks for the comments to the newsletter. We hope you like issue 2!
Congrats on the MIS job!!
The White Ninja



ASKi Phile #4
A Novice's Guide to Hacking...

I have reprinted this file from Phrack 22 'cause I thought it would
be of interest to most of Nashville's new Phreak community. Another
recommended file for beginning phreaks or people who are just interested
in forbidden knowledge is the Official Phreaker's Handbook, PKMAN.ZIP,
available on many ASKi BBSs...


=========================================================================

==Phrack Inc.==

Volume Two, Issue 22, File 4 of 12

+++++++++++++++++++++++++++++++++++++++++++++++++
| The LOD/H Presents |
++++++++++++++++ ++++++++++++++++
` A Novice's Guide to Hacking- 1989 edition /
` ========================================= /
` by /
` The Mentor /
` Legion of Doom/Legion of Hackers /
` /
` December, 1988 /
` Merry Christmas Everyone! /
`+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++/


The author hereby grants permission to reproduce, redistribute, or include this
file in your g-file section, electronic or print newletter, or any other form
of transmission that you choose, as long as it is kept intact and whole, with
no ommissions, deletions, or changes.

(C) The Mentor- Phoenix Project Productions 1988,1989 512/441-3088


Introduction: The State of the Hack
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
After surveying a rather large g-file collection, my attention was drawn to the
fact that there hasn't been a good introductory file written for absolute
beginners since back when Mark Tabas was cranking them out (and almost
*everyone* was a beginner!) The Arts of Hacking and Phreaking have changed
radically since that time, and as the 90's approach, the hack/phreak community
has recovered from the Summer '87 busts (just like it recovered from the Fall
'85 busts, and like it will always recover from attempts to shut it down), and
the progressive media (from Reality Hackers magazine to William Gibson and
Bruce Sterling's cyberpunk fables of hackerdom) is starting to take notice
of us for the first time in recent years in a positive light.

Unfortunately, it has also gotten more dangerous since the early 80's. Phone
cops have more resources, more awareness, and more intelligence than they
exhibited in the past. It is becoming more and more difficult to survive as a
hacker long enough to become skilled in the art. To this end this file is
dedicated. If it can help someone get started, and help them survive to
discover new systems and new information, it will have served it's purpose, and
served as a partial repayment to all the people who helped me out when was a
beginner.

Contents
%%%%%%%%
This file will be divided into four parts:
Part 1: What is Hacking, A Hacker's Code of Ethics, Basic Hacking Safety
Part 2: Packet Switching Networks: Telenet- How it Works, How to Use it,
Outdials, Network Servers, Private PADs
Part 3: Identifying a Computer, How to Hack In, Operating System Defaults
Part 4: Conclusion; Final Thoughts, Books to Read, Boards to Call,
Acknowledgements

Part One: The Basics
%%%%%%%%%%%%%%%%%%%%%
As long as there have been computers, there have been hackers. In the 50's at
the Massachutes Institute of Technology (MIT), students devoted much time and
energy to ingenious exploration of the computers. Rules and the law were
disregarded in their pursuit for the 'hack.' Just as they were enthralled with
their pursuit of information, so are we. The thrill of the hack is not in
breaking the law, it's in the pursuit and capture of knowledge.

To this end, let me contribute my suggestions for guidelines to follow to
ensure that not only you stay out of trouble, but you pursue your craft without
damaging the computers you hack into or the companies who own them.

I. Do not intentionally damage *any* system.
II. Do not alter any system files other than ones needed to ensure your
escape from detection and your future access (Trojan Horses, Altering
Logs, and the like are all necessary to your survival for as long as
possible).
III. Do not leave your (or anyone else's) real name, real handle, or real
phone number on any system that you access illegally. They *can* and
will track you down from your handle!
IV. Be careful who you share information with. Feds are getting trickier
Generally, if you don't know their voice phone number, name, and
occupation or haven't spoken with them voice on non-info trading
conversations, be wary.
V. Do not leave your real phone number to anyone you don't know. This
includes logging on boards, no matter how k-rad they seem. If you don't
know the sysop, leave a note telling some trustworthy people that will
validate you.
VI. Do not hack government computers. Yes, there are government systems that
are safe to hack, but they are few and far between. And the government
has inifitely more time and resources to track you down than a company
who has to make a profit and justify expenses.
VII. Don't use codes unless there is *NO* way around it (you don't have a
local telenet or tymnet outdial and can't connect to anything 800). You
use codes long enough, you will get caught. Period.
VIII. Don't be afraid to be paranoid. Remember, you *are* breaking the law.
It doesn't hurt to store everything encrypted on your hard disk, or
keep your notes buried in the backyard or in the trunk of your car. You
may feel a little funny, but you'll feel a lot funnier when you when you
meet Bruno, your transvestite cellmate who axed his family to death.
IX. Watch what you post on boards. Most of the really great hackers in the
country post *nothing* about the system they're currently working except
in the broadest sense (I'm working on a UNIX, or a COSMOS, or something
generic. Not "I'm hacking into General Electric's Voice Mail
System" or something inane and revealing like that).
X. Don't be afraid to ask questions. That's what more experienced hackers
are for. Don't expect *everything* you ask to be answered, though.
There are some things (LMOS, for instance) that a begining hacker
shouldn't mess with. You'll either get caught, or screw it up for
others, or both.
XI. Finally, you have to actually hack. You can hang out on boards all you
want, and you can read all the text files in the world, but until you
actually start doing it, you'll never know what it's all about. There's
no thrill quite the same as getting into your first system (well, ok, I
can thinksavea couple of biggers thrills, but you get the picture).

One of the safest places to start your hacking career is on a computer system
belonging to a college. University computers have notoriously lax security,
and are more used to hackers, as every college computer department ment has one
or two, so are less likely to press charges if you should be detected. But the
odds of them detecting you and having the personel to committ to tracking you
down are slim as long as you aren't destructive.

If you are already a college student, this is ideal, as you can legally explore
your computer system to your heart's desire, then go out and look for similar
systems that you can penetrate with confidence, as you're already
familar with them.

So if you just want to get your feet wet, call your local college. Many of
them will provide accounts for local residents at a nominal (under $20) charge.

Finally, if you get caught, stay quiet until you get a lawyer. Don't volunteer
any information, no matter what kind of 'deals' they offer you. Nothing is
binding unless you make the deal through your lawyer, so you might as well shut
up and wait.

Part Two: Networks
%%%%%%%%%%%%%%%%%%%
The best place to begin hacking (other than a college) is on one of the
bigger networks such as Telenet. Why? First, there is a wide variety of
computers to choose from, from small Micro-Vaxen to huge Crays. Second, the
networks are fairly well documented. It's easier to find someone who can help
you with a problem off of Telenet than it is to find assistance concerning your
local college computer or high school machine. Third, the networks are safer.
Because of the enormous number of calls that are fielded every day by the big
networks, it is not financially practical to keep track of where every call and
connection are made from. It is also very easy to disguise your location using
the network, which makes your hobby much more secure.

Telenet has more computers hooked to it than any other system in the world once
you consider that from Telenet you have access to Tymnet, ItaPAC, JANET,
DATAPAC, SBDN, PandaNet, THEnet, and a whole host of other networks, all of
which you can connect to from your terminal.

The first step that you need to take is to identify your local dialup port.
This is done by dialing 1-800-424-9494 (1200 7E1) and connecting. It will
spout some garbage at you and then you'll get a prompt saying 'TERMINAL= '.
This is your terminal type. If you have vt100 emulation, type it in now. Or
just hit return and it will default to dumb terminal mode.

You'll now get a prompt that looks like a @. From here, type @c mail <cr> and
then it will ask for a Username. Enter 'phones' for the username. When it
asks for a password, enter 'phones' again. From this point, it is menu driven.
Use this to locate your local dialup, and call it back locally. If you don't
have a local dialup, then use whatever means you wish to connect to one long
distance (more on this later).

When you call your local dialup, you will once again go through the TERMINAL=
stuff, and once again you'll be presented with a @. This prompt lets you know
you are connected to a Telenet PAD. PAD stands for either Packet
Assembler/Disassembler (if you talk to an engineer), or Public Access Device
(if you talk to Telenet's marketing people.) The first description is more
correct.

Telenet works by taking the data you enter in on the PAD you dialed into,
bundling it into a 128 byte chunk (normally... this can be changed), and then
transmitting it at speeds ranging from 9600 to 19,200 baud to another PAD, who
then takes the data and hands it down to whatever computer or system it's
connected to. Basically, the PAD allows two computers that have different baud
rates or communication protocols to communicate with each other over a long
distance. Sometimes you'll notice a time lag in the remote machines response.
This is called PAD Delay, and is to be expected when you're sending data
through several different links.

What do you do with this PAD? You use it to connect to remote computer
systems by typing 'C' for connect and then the Network User Address (NUA) of
the system you want to go to.

An NUA takes the form of 031103130002520
`___/`___/`___/
| | |
| | |____ network address
| |_________ area prefix
|______________ DNIC


This is a summary of DNIC's (taken from Blade Runner's file on ItaPAC)
according to their country and network name.


DNIC Network Name Country DNIC Network Name Country
_______________________________________________________________________________
|
02041 Datanet 1 Netherlands | 03110 Telenet USA
02062 DCS Belgium | 03340 Telepac Mexico
02080 Transpac France | 03400 UDTS-Curacau Curacau
02284 Telepac Switzerland | 04251 Isranet Israel
02322 Datex-P Austria | 04401 DDX-P Japan
02329 Radaus Austria | 04408 Venus-P Japan
02342 PSS UK | 04501 Dacom-Net South Korea
02382 Datapak Denmark | 04542 Intelpak Singapore
02402 Datapak Sweden | 05052 Austpac Australia
02405 Telepak Sweden | 05053 Midas Australia
02442 Finpak Finland | 05252 Telepac Hong Kong
02624 Datex-P West Germany | 05301 Pacnet New Zealand
02704 Luxpac Luxembourg | 06550 Saponet South Africa
02724 Eirpak Ireland | 07240 Interdata Brazil
03020 Datapac Canada | 07241 Renpac Brazil
03028 Infogram Canada | 09000 Dialnet USA
03103 ITT/UDTS USA | 07421 Dompac French Guiana
03106 Tymnet USA |

There are two ways to find interesting addresses to connect to. The first and
easiest way is to obtain a copy of the LOD/H Telenet Directory from the LOD/H
Technical Journal 4 or 2600 Magazine. Jester Sluggo also put out a good list
of non-US addresses in Phrack Inc. Newsletter Issue 21. These files will tell
you the NUA, whether it will accept collect calls or not, what type of computer
system it is (if known) and who it belongs to (also if known.)

The second method of locating interesting addresses is to scan for them
manually. On Telenet, you do not have to enter the 03110 DNIC to connect to a
Telenet host. So if you saw that 031104120006140 had a VAX on it you wanted to
look at, you could type @c 412 614 (0's can be ignored most of the time).

If this node allows collect billed connections, it will say 412 614 CONNECTED
and then you'll possibly get an identifying header or just a Username: prompt.
If it doesn't allow collect connections, it will give you a message such as 412
614 REFUSED COLLECT CONNECTION with some error codes out to the right, and
return you to the @ prompt.

There are two primary ways to get around the REFUSED COLLECT message. The
first is to use a Network User Id (NUI) to connect. An NUI is a username/pw
combination that acts like a charge account on Telenet. To collect to node
412 614 with NUI junk4248, password 525332, I'd type the following:
@c 412 614,junk4248,525332 <---- the 525332 will *not* be echoed to the
screen. The problem with NUI's is that they're hard to come by unless you're a
good social engineer with a thorough knowledge of Telenet (in which case you
probably aren't reading this section), or you have someone who can provide you
with them.

The second way to connect is to use a private PAD, either through an X.25 PAD
or through something like Netlink off of a Prime computer (more on these two
below).

The prefix in a Telenet NUA oftentimes (not always) refers to the phone Area
Code that the computer is located in (i.e. 713 xxx would be a computer in
Houston, Texas). If there's a particular area you're interested in, (say, New
York City 914), you could begin by typing @c 914 001 <cr>. If it connects, you
make a note of it and go on to 914 002. You do this until you've found some
interesting systems to play with.

Not all systems are on a simple xxx yyy address. Some go out to four or five
digits (914 2354), and some have decimal or numeric extensions (422 121A = 422
121.01). You have to play with them, and you never know what you're going to
find. To fully scan out a prefix would take ten million attempts per prefix.
For example, if I want to scan 512 completely, I'd have to start with 512
00000.00 and go through 512 00000.99, then increment the address by 1 and try
512 00001.00 through 512 00001.99. A lot of scanning. There are plenty of
neat computers to play with in a 3-digit scan, however, so don't go berserk
with the extensions.

Sometimes you'll attempt to connect and it will just be sitting there after one
or two minutes. In this case, you want to abort the connect attempt by sending
a hard break (this varies with different term programs, on Procomm, it's
ALT-B), and then when you get the @ prompt back, type 'D' for disconnect.

If you connect to a computer and wish to disconnect, you can type <cr> @ <cr>
and you it should say TELENET and then give you the @ prompt. From there, type
D to disconnect or CONT to re-connect and continue your session uninterrupted.

Outdials, Network Servers, and PADs
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
In addition to computers, an NUA may connect you to several other things. One
of the most useful is the outdial. An outdial is nothing more than a modem
you can get to over telenet -- similar to the PC Pursuit concept, except that
these don't have passwords on them most of the time.

When you connect, you will get a message like 'Hayes 1200 baud outdial,
Detroit, MI', or 'VEN-TEL 212 Modem', or possibly 'Session 1234 established on
Modem 5588.' The best way to figure out the commands on these is to type ? or
H or HELP -- this will get you all the information that you need to use one.

Safety tip here -- when you are hacking *any* system through a phone dialup,
always use an outdial or a diverter, especially if it is a local phone number
to you. More people get popped hacking on local computers than you can
imagine, Intra-LATA calls are the easiest things in the world to trace
inexpensively.

Another nice trick you can do with an outdial is use the redial or macro
function that many of them have. First thing you do when you connect is to
invoke the 'Redial Last Number' facility. This will dial the last number used,
which will be the one the person using it before you typed. Write down the
number, as no one would be calling a number without a computer on it. This is
a good way to find new systems to hack. Also, on a VENTEL modem, type 'D' for
Display and it will display the five numbers stored as macros in the modem's
memory.

There are also different types of servers for remote Local Area Networks (LAN)
that have many machine all over the office or the nation connected to them.
I'll discuss identifying these later in the computer ID section.

And finally, you may connect to something that says 'X.25 Communication PAD'
and then some more stuff, followed by a new @ prompt. This is a PAD just like
the one you are on, except that all attempted connections are billed to the
PAD, allowing you to connect to those nodes who earlier refused collect
connections.

This also has the added bonus of confusing where you are connecting from. When
a packet is transmitted from PAD to PAD, it contains a header that has the
location you're calling from. For instance, when you first connected to
Telenet, it might have said 212 44A CONNECTED if you called from the 212 area
code. This means you were calling PAD number 44A in the 212 area. That 21244A
will be sent out in the header of all packets leaving the PAD.

Once you connect to a private PAD, however, all the packets going out from *it*
will have it's address on them, not yours. This can be a valuable buffer
between yourself and detection.

Phone Scanning
%%%%%%%%%%%%%%
Finally, there's the time-honored method of computer hunting that was made
famous among the non-hacker crowd by that Oh-So-Technically-Accurate movie
Wargames. You pick a three digit phone prefix in your area and dial every
number from 0000 --> 9999 in that prefix, making a note of all the carriers you
find. There is software available to do this for nearly every computer in the
world, so you don't have to do it by hand.

Part Three: I've Found a Computer, Now What?
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
This next section is applicable universally. It doesn't matter how you found
this computer, it could be through a network, or it could be from carrier
scanning your High School's phone prefix, you've got this prompt this prompt,
what the hell is it?

I'm *NOT* going to attempt to tell you what to do once you're inside of any of
these operating systems. Each one is worth several G-files in its own right.
I'm going to tell you how to identify and recognize certain OpSystems, how to
approach hacking into them, and how to deal with something that you've never
seen before and have know idea what it is.


VMS - The VAX computer is made by Digital Equipment Corporation (DEC), and
runs the VMS (Virtual Memory System) operating system. VMS is
characterized by the 'Username:' prompt. It will not tell you if
you've entered a valid username or not, and will disconnect you
after three bad login attempts. It also keeps track of all failed
login attempts and informs the owner of the account next time s/he
logs in how many bad login attempts were made on the account. It is
one of the most secure operating systems around from the outside,
but once you're in there are many things that you can do to
circumvent system security. The VAX also has the best set of help
files in the world. Just type HELP and read to your heart's
content.

Common Accounts/Defaults: [username: password [[,password]]]

SYSTEM: OPERATOR or MANAGER or SYSTEM or SYSLIB
OPERATOR: OPERATOR
SYSTEST: UETP
SYSMAINT: SYSMAINT or SERVICE or DIGITAL
FIELD: FIELD or SERVICE
GUEST: GUEST or unpassworded
DEMO: DEMO or unpassworded
DECNET: DECNET


DEC-10 - An earlier line of DEC computer equipment, running the TOPS-10
operating system. These machines are recognized by their '.'
prompt. The DEC-10/20 series are remarkably hacker-friendly,
allowing you to enter several important commands without ever
logging into the system. Accounts are in the format [xxx,yyy]
where xxx and yyy are integers. You can get a listing of the
accounts and the process names of everyone on the system before
logging in with the command .systat (for SYstem STATus). If you
seen an account that reads [234,1001] BOB JONES, it might be wise
to try BOB or JONES or both for a password on this account. To
login, you type .login xxx,yyy and then type the password when
prompted for it.

The system will allow you unlimited tries at an account, and does
not keep records of bad login attempts. It will also inform you if
the UIC you're trying (UIC = User Identification Code, 1,2 for
example) is bad.

Common Accounts/Defaults:

1,2: SYSLIB or OPERATOR or MANAGER
2,7: MAINTAIN
5,30: GAMES

UNIX - There are dozens of different machines out there that run UNIX.
While some might argue it isn't the best operating system in the
world, it is certainly the most widely used. A UNIX system will
usually have a prompt like 'login:' in lower case. UNIX also will
give you unlimited shots at logging in (in most cases), and there is
usually no log kept of bad attempts.

Common Accounts/Defaults: (note that some systems are case
sensitive, so use lower case as a general rule. Also, many times
the accounts will be unpassworded, you'll just drop right in!)

root: root
admin: admin
sysadmin: sysadmin or admin
unix: unix
uucp: uucp
rje: rje
guest: guest
demo: demo
daemon: daemon
sysbin: sysbin

Prime - Prime computer company's mainframe running the Primos operating
system. The are easy to spot, as the greet you with 'Primecon
18.23.05' or the like, depending on the version of the operating
system you run into. There will usually be no prompt offered, it
will just look like it's sitting there. At this point, type 'login
<username>'. If it is a pre-18.00.00 version of Primos, you can hit
a bunch of ^C's for the password and you'll drop in. Unfortunately,
most people are running versions 19+. Primos also comes with a good
set of help files. One of the most useful features of a Prime on
Telenet is a facility called NETLINK. Once you're inside, type
NETLINK and follow the help files. This allows you to connect to
NUA's all over the world using the 'nc' command.

For example, to connect to NUA 026245890040004, you would type
@nc :26245890040004 at the netlink prompt.

Common Accounts/Defaults:

PRIME PRIME or PRIMOS
PRIMOS_CS PRIME or PRIMOS
PRIMENET PRIMENET
SYSTEM SYSTEM or PRIME
NETLINK NETLINK
TEST TEST
GUEST GUEST
GUEST1 GUEST

HP-x000 - This system is made by Hewlett-Packard. It is characterized by the
':' prompt. The HP has one of the more complicated login sequneces
around -- you type 'HELLO SESSION NAME,USERNAME,ACCOUNTNAME,GROUP'.
Fortunately, some of these fields can be left blank in many cases.
Since any and all of these fields can be passworded, this is not the
easiest system to get into, except for the fact that there are
usually some unpassworded accounts around. In general, if the
defaults don't work, you'll have to brute force it using the common
password list (see below.) The HP-x000 runs the MPE operating
system, the prompt for it will be a ':', just like the logon prompt.

Common Accounts/Defaults:

MGR.TELESUP,PUB User: MGR Acct: HPONLYG rp: PUB
MGR.HPOFFICE,PUB unpassworded
MANAGER.ITF3000,PUB unpassworded
FIELD.SUPPORT,PUB user: FLD, others unpassworded
MAIL.TELESUP,PUB user: MAIL, others unpassworded
MGR.RJE unpassworded
FIELD.HPPl89 ,HPPl87,HPPl89,HPPl96 unpassworded
MGR.TELESUP,PUB,HPONLY,HP3 unpassworded

IRIS - IRIS stands for Interactive Real Time Information System. It
originally ran on PDP-11's, but now runs on many other minis. You
can spot an IRIS by the 'Welcome to "IRIS" R9.1.4 Timesharing'
banner, and the ACCOUNT ID? prompt. IRIS allows unlimited tries at
hacking in, and keeps no logs of bad attempts. I don't know any
default passwords, so just try the common ones from the password
database below.

Common Accounts:

MANAGER
BOSS
SOFTWARE
DEMO
PDP8
PDP11
ACCOUNTING

VM/CMS - The VM/CMS operating system runs in International Business Machines
(IBM) mainframes. When you connect to one of these, you will get
message similar to 'VM/370 ONLINE', and then give you a '.' prompt,
just like TOPS-10 does. To login, you type 'LOGON <username>'.

Common Accounts/Defaults are:

AUTOLOG1: AUTOLOG or AUTOLOG1
CMS: CMS
CMSBATCH: CMS or CMSBATCH
EREP: EREP
MAINT: MAINT or MAINTAIN
OPERATNS: OPERATNS or OPERATOR
OPERATOR: OPERATOR
RSCS: RSCS
SMART: SMART
SNA: SNA
VMTEST: VMTEST
VMUTIL: VMUTIL
VTAM: VTAM

NOS - NOS stands for Networking Operating System, and runs on the Cyber
computer made by Control Data Corporation. NOS identifies itself
quite readily, with a banner of 'WELCOME TO THE NOS SOFTWARE SYSTEM.
COPYRIGHT CONTROL DATA 1978,1987.' The first prompt you will get
will be FAMILY:. Just hit return here. Then you'll get a USER
NAME: prompt. Usernames are typically 7 alpha-numerics characters
long, and are *extremely* site dependent. Operator accounts begin
with a digit, such as 7ETPDOC.

Common Accounts/Defaults:

$SYSTEM unknown
SYSTEMV unknown

Decserver- This is not truly a computer system, but is a network server that
has many different machines available from it. A Decserver will say
'Enter Username>' when you first connect. This can be anything, it
doesn't matter, it's just an identifier. Type 'c', as this is the
least conspicuous thing to enter. It will then present you with a
'Local>' prompt. From here, you type 'c <systemname>' to connect to
a system. To get a list of system names, type 'sh services' or 'sh
nodes'. If you have any problems, online help is available with the
'help' command. Be sure and look for services named 'MODEM' or
'DIAL' or something similar, these are often outdial modems and can
be useful!
GS/1 - Another type of network server. Unlike a Decserver, you can't
predict what prompt a GS/1 gateway is going to give you. The
default prompt it 'GS/1>', but this is redifinable by the system
administrator. To test for a GS/1, do a 'sh d'. If that prints out
a large list of defaults (terminal speed, prompt, parity, etc...),
you are on a GS/1. You connect in the same manner as a Decserver,
typing 'c <systemname>'. To find out what systems are available, do
a 'sh n' or a 'sh c'. Another trick is to do a 'sh m', which will
sometimes show you a list of macros for logging onto a system. If
there is a macro named VAX, for instance, type 'do VAX'.

The above are the main system types in use today. There are
hundreds of minor variants on the above, but this should be enough
to get you started.

Unresponsive Systems
%%%%%%%%%%%%%%%%%%%%
Occasionally you will connect to a system that will do nothing, but sit there.
This is a frustrating feeling, but a methodical approach to the system will
yield a response if you take your time. The following list will usually make
*something* happen.

1) Change your parity, data length, and stop bits. A system that won't
respond at 8N1 may react at 7E1 or 8E2 or 7S2. If you don't have a term
program that will let you set parity to EVEN, ODD, SPACE, MARK, and NONE,
with data length of 7 or 8, and 1 or 2 stop bits, go out and buy one.
While having a good term program isn't absolutely necessary, it sure is
helpful.
2) Change baud rates. Again, if your term program will let you choose odd
baud rates such as 600 or 1100, you will occasionally be able to penetrate
some very interesting systems, as most systems that depend on a strange
baud rate seem to think that this is all the security they need...
3) Send a series of <cr>'s.
4) Send a hard break followed by a <cr>.
5) Type a series of .'s (periods). The Canadian network Datapac responds to
this.
6) If you're getting garbage, hit an 'i'. Tymnet responds to this, as does a
MultiLink II.
7) Begin sending control characters, starting with ^A --> ^Z.
8) Change terminal emulations. What your vt100 emulation thinks is garbage
may all of a sudden become crystal clear using ADM-5 emulation. This also
relates to how good your term program is.
9) Type LOGIN, HELLO, LOG, ATTACH, CONNECT, START, RUN, BEGIN, LOGON, GO,
JOIN, HELP, and anything else you can think of.
10) If it's a dialin, call the numbers around it and see if a company answers.
If they do, try some social engineering.

Brute Force Hacking
%%%%%%%%%%%%%%%%%%%
There will also be many occasions when the default passwords will not work on
an account. At this point, you can either go onto the next system on your
list, or you can try to 'brute-force' your way in by trying a large database of
passwords on that one account. Be careful, though! This works fine on systems
that don't keep track of invalid logins, but on a system like a VMS, someone is
going to have a heart attack if they come back and see '600 Bad Login Attempts
Since Last Session' on their account. There are also some operating systems
that disconnect after 'x' number of invalid login attempts and refuse to allow
any more attempts for one hour, or ten minutes, or sometimes until the next
day.

The following list is taken from my own password database plus the database of
passwords that was used in the Internet UNIX Worm that was running around in
November of 1988. For a shorter group, try first names, computer terms, and
obvious things like 'secret', 'password', 'open', and the name of the account.
Also try the name of the company that owns the computer system (if known), the
company initials, and things relating to the products the company makes or
deals with.
Password List
=============

aaa creation innocuous really
ada create jester rebecca
academia daniel johnny remote
adrian danny joseph rick
aerobics dave joshua reagan
airplane deb judith robot
albany debbie juggle robotics
albatross deborah julia rolex
albert december kathleen ronald
alex desperate kermit rosebud
alexander develop kernel rosemary
algebra diet knight roses
alias digital lambda ruben
alpha discovery larry rules
alphabet disney lazarus ruth
ama dog lee sal
amy drought leroy saxon
analog duncan lewis scheme
anchor easy light sex
andy eatme lisa shark
arrow edges maggot sharon
arthur erenity magic shit
asshole elizabeth malcolm shiva
athena ellen mark shuttle
atmosphere emerald markus simon
bacchus engine marty simple
badass engineer marvin singer
bailey enterprise master single
banana enzyme maurice smile
bandit euclid merlin smiles
banks evelyn mets smooch
bass extension michael smother
batman fairway michelle snatch
beauty felicia mike snoopy
beaver fender minimum soap
beethoven fermat minsky socrates
beloved finite mogul spit
benz flower moose spring
beowulf foolproof mozart subway
berkeley football nancy success
berlin format napoleon summer
beta forsythe network tape
beverly fourier newton target
angerine fred osiris taylor
bumbling friend outlaw telephone
cardinal george oxford temptation
carmen gertrude pacific tiger
carolina gibson painless toggle
caroline ginger pam tomato
castle gnu paper toyota
cat golf password trivial
celtics golfer pat unhappy
change gorgeous patricia unicorn
charles graham penguin unknown
charming gryphon pete urchin
charon guest peter utility
chester guitar philip vicky
cigar hacker phoenix virginia
classic harmony pierre warren
coffee harold pizza water
coke harvey plover weenie
collins heinlein polynomial whatnot
comrade hello praise whitney
computer help prelude will
condo herbert prince william
condom honey protect
cookie horse pumpkin
cooper imperial willie
include puppet winston
ingres rabbit rascal




I hope this file has been of some help in getting started. If you're asking
yourself the question 'Why hack?', then you've probably wasted a lot of time
reading this, as you'll never understand. For those of you who have read this
and found it useful, please send a tax-deductible donation
of $5.00 (or more!) in the name of the Legion of Doom to:

The American Cancer Society
90 Park Avenue
New York, NY 10016


*******************************************************************************

References:

1) Introduction to ItaPAC by Blade Runner
Telecom Security Bulletin 1

2) The IBM VM/CMS Operating System by Lex Luthor
The LOD/H Technical Journal 2

3) Hacking the IRIS Operating System by The Leftist
The LOD/H Technical Journal 3

4) Hacking CDC's Cyber by Phrozen Ghost
Phrack Inc. Newsletter 18

5) USENET comp.risks digest (various authors, various issues)

6) USENET unix.wizards forum (various authors)

7) USENET info-vax forum (various authors)

Recommended Reading:

1) Hackers by Steven Levy
2) Out of the Inner Circle by Bill Landreth
3) Turing's Man by J. David Bolter
4) Soul of a New Machine by Tracy Kidder
5) Neuromancer, Count Zero, Mona Lisa Overdrive, and Burning Chrome, all by
William Gibson
6) Reality Hackers Magazine c/o High Frontiers, P.O. Box 40271, Berkeley,
California, 94704, 415-995-2606
7) Any of the Phrack Inc. Newsletters & LOD/H Technical Journals you can
find.

Acknowledgements:
Thanks to my wife for putting up with me.
Thanks to Lone Wolf for the RSTS & TOPS assistance.
Thanks to Android Pope for proofreading, suggestions, and beer.
Thanks to The Urvile/Necron 99 for proofreading & Cyber info.
Thanks to Eric Bloodaxe for wading through all the trash.
Thanks to the users of Phoenix Project for their contributions.
Thanks to Altos Computer Systems, Munich, for the chat system.
Thanks to the various security personel who were willing to talk to me about
how they operate.

Boards:

I can be reached on the following systems with some regularity;

The Phoenix Project: 512/441-3088 300-2400 baud
Hacker's Den-80: 718/358-9209 300-1200 baud
Smash Palace South: 512/478-6747 300-2400 baud
Smash Palace North: 612/633-0509 300-2400 baud

************************************* EOF *************************************
=========================================================================


ASKi Phile #5

BUSTED!!!!!
You've been arrested!

Life sure sucks now, don't it? Nope. This is where you get to
have more phun while learning a lot about the reason that your
government is NOT your friend.

"Live in fame or die in flame" -- Mack

First off, remember: no hero stuff here. They are probably
wearing bullet proof vests, arrive in bunches of 20, and carrying
heavy artillery. Even if it's only one redneck, they all still
suffer from having a severe trigger finger. There is no reason to
get roughed up, bruised, or shot.

The Attitude

You need to have the attitude. Use your head, control your
emotions, and keep your mouth shut at all times. Remember that they
will give rewards to stoolies, so don't even discuss anything
outside of chitchat like local politics, news, or weather.

Okay, second. You are not a young punk pain in the ass. You're
not a hero; you're not anything. You are a farm boy from Kentucky
and you're downright DUMB. You're kind and work with everybody as
much as possible, but stubborn. You apologize and call everyone sir
and generally kiss ass whenever possible. Why? Because you look
stupid and easy to take advantage of. Remember keeping your mouth
shut? This is the easiest way to do just that.

Don't ever ask them for anything. Don't grovel. You are in
control of yourself; they are only in control of the situation.
Your complaints will go on report and give them satisfaction.
Remember "Miranda"? Well, those rights apply at ALL times. There is
no requirement to read them to you in a whole bunch of special
exceptions, so just assume that they've been read to you anyways.
They WILL appear compassionate and sympathetic, but they are really
robotized. They are totally impervious to all reason, logic and
common sense.

Once you got the basic rules down, the rest of the procedure
is just one big game, except that the stakes are kind of high.
Don't sweat it if you can, but chances are that you're going to be
sweating a lot just because the first time you ever play in a
quarter million dollar poker game, the numbers get to you. Quarter
million? If you're going to be in the dungeon for say 10 years, you
could probably make about $25,000 a year easily. And that's after
the government takes out their share of something close to half. So
you're actually going to be playing for a quarter million dollars
even if it's only five years. Not only that, but once you've been
to jail once, all of your subsequent employers will be harder to
get and possibly pay less. But this is not a game you would
normally show up for. Usually, someone else volunteers you in.
Still not convinced? Well, let's take some numbers (old numbers but
proportions are right). From the official 1977 IRS figures, 8,391
persons qualified for priority treatment (were investigated). 3,408
were recommended for prosecution. Of those lucky winners, only
1,636 were indicted by grand juries. 247 of those were convicted
after trial and less than half ever served time in jail. At that
time, there were also approximately 90 million income tax filers
(out of a total population of 210 million). And we're not talking
about one of the roughest, nastiest teams in the American Legal
League, in most cases.

The Rules of the Game

Okay, the point of the game is to get over the goal line. It's
just like football (and if you try to tempt them, they really will
sack the quarterback just because they are sadistic people).
Here's what they score points for. Getting you to admit anything.
Getting you to incriminate yourself. Intimidating you. Getting you
to skip procedural details. There's only one problem with these
simple details: they are all professional players and you're just
an amateur team. That's why the game is rigged in your favor
intentionally. But unless you're a professional gambler, you
wouldn't even know it.

Here's what you score points for. Getting them to admit
anything.
Getting them to perjure themselves. Getting them to foul (not
follow the rules). Giving them as much frustration and anxiety as
possible. Making them lose in front of their friends (they all
have bad sportsmanship problems). Making them lose in front of the
press.

I can't possibly go over all the rules. There are entire
libraries full of rules. And you thought pro-football was bad! But,
there are certain basics of the game. If you understand those,
you're way ahead.

Getting a Basic Rule Book

If you want to actually buy a rule book, I know of one good
one that costs about $20. It is mostly for civil (law suits)
procedure, but he covers the differences between civil and criminal
pretty well and how to adapt.

Brown's Lawsuit Cookbook
The Brown Carburetor Co., Inc.
P.O. Box 89
Draper, Utah 84020

Don't get the "sequel" that he advertises. It's just a book of
forms and not much use except for the two page excerpt at the end
that talks about RICO, if you don't know anything at all about
RICO. Mike Brown's specialty is getting people out of prison, so he
might be useful later on, too. The place he has vast expertise in
is Terre Haute in Indiana, which is not a pretty place to spend an
all expenses paid government vacation at. For one thing, the other
tourists and the tour guides are absolutely lousy.

Levels of Play

There are a bunch of levels of play. You will probably be like
most people and perhaps never even get to the higher levels, like
the appeals process. But unless you do something really stupid and
get shot, you are pretty much guaranteed to make it through the
first few levels. Remember the ways to score points. The more
points you score, the better your chances of winning. There are
some bonus points built in, too, like getting a judge get kicked
off the field for a personal foul (easier than you think, but most
lawyers are scared silly to even try to do anything like that).

1. Arrest.
2. Initial Questioning.
3. Booking.
Bonus Rounds: more questioning and pretrial services.
4. More Questioning.
5. Arraignment.
Bonus Round: Evidentiary Hearing.
Bonus Round: Administrative Hearing (automatic in a traffic case;
otherwise rare).
Bonus Round: Grand Jury Indictment.
6. Trial.
7. Sentencing.
8. Appeals (pretrial services, trials, and sentencing).

Hopefully, you can make it to at least some bonus rounds.
Getting an evidentiary hearing is relatively easy, for instance.
And at that round, there are some points that you can pick up, but
you can also get some point multipliers that will make scoring in
the actual trial worth more points. There are also no absolutes.
This is just a thumbnail sketch. Some levels can be skipped or
added in. Some levels can be skipped because of mistakes you make.
It is possible, for instance, to petition for a writ of prohibition
(an order from a more powerful judge telling his underling to stop
doing something to you) and go through a pseudo-appeals stage. Some
levels can happen completely by mail instead of in person (this is
very common at the appeals level). But, this basic list of levels
is usually good enough. As you get better, you should have no
problems finding some of the bonus levels, like the writs (a writ
is an order from a judge which carries a lot of weight) levels.

Questioning

Okay, for now, let's go over the basic format to answering
questions.

Officer: Generic Question.
You: "Sir, can you please tell me if my answer to that question is
mandatory or voluntary?"

1. Officer: "Voluntary."
You: "Then I choose not to volunteer."

2. Officer: "Mandatory."
You: "Sir, what will you do to me if I don't answer?"

2a. Officer: "We'll kick the shit out of you."
You: "My answer is XXX under threat of bodily harm, coercion, etc."
or perhaps "I refuse to answer on the grounds that I may
incriminate myself." or perhaps "Show me the law, statute, case, or
whatever it is that makes it mandatory and then I'll answer." This
is a matter of personal taste; if you can take the punishment, go
for it. It depends on the situation.

2b. Officer: "You won't get out of here until you answer."

They know it. You know it. So what? You'll eventually go to
trial and the judge will either have to force your answers to be a
condition of your release (this is appealable usually) or order you
to do so (which is a violation of the 5th amendment and which gives
you the power to recuse the judge so fast he won't know what
happened since he's now a party to the case by getting evidence on
the record). It really depends on whether or not you want to give
in to them.

Remember, the whole point here is to attempt to act
cooperative while refusing to say anything if you can help it. This
is true at every stage of the game. There are lots of different
times where they will try to question you. Even other prisoners may
be sent in to try to get you to talk if you're important to them
and you're being a tough nut to crack. So keep acting stupid. Ask
for meaningful assistance of counsel to help you understand the
question. Volunteer for nothing. After all, don't all the lawyers
tell you that only THEY

  
can understand legal procedure?

Okay, there is a special case for judges. Remember, judges
have to be impartial. With a judge, when he asks you for
information, such as what your name is, you say:

"Sir, are you attempting to enter evidence on the record because
you are a party to the case?"

This question REALLY pisses them off. If they say no, then don't
volunteer information. If they say yes, then they can't judge the
case anymore. Another appropriate question is, "Your honor, are YOU
the accusing party? Then who is the accusing party? I want to face
my accusers as required by the constitution."

Here's an example of what happened once: "No, Sir. I just need
to know who you are so I can proceed with this case. And since when
I asked for the accused party, you answered, then if you are not
the accused party then you are interfering with this court and I
will find you in contempt." The right response to this sort of
nastiness is just to say something like, "Sir, It is the job of the
accusing party to identify the accused party; however, if you wish,
you can call me Peter Pan for purposes of identification until the
accusing party clears this matter up." A better way is not to get
into this situation. When you are called, stand and ask if the
accusing party is present. And the judge better not respond!
Otherwise, you just stand there and when the bailiff orders you to
walk forward or whatever, you just say, "I'm sorry if I'm in the
wrong place, Sir. Your bailiff here ordered me to come forward."
This is part of jurisdiction. Jurisdiction is necessary for a court
to have control over a case. There are lots of ways they can get
it; when you plead guilty or not guilty, or when they get all 7
elements. Number 1 is positive identification of the accused party.
Accused must be properly identified; identified in such a fashion
there is no room for mistaken identity. The individual must be
singled out from all others; otherwise, anyone could be subject to
arrest and trial without benefit of "wrong party" defense. Almost
always the means of identification is a person's proper name, BUT,
any means of identification is equally valid if said means
differentiates the accused without doubt. (There is no
constitutionally valid requirement you must identify yourself) For
stop and identify (4th Amendment) see Brown v. Texas, 443 US 47 and
Kolender v Lawson, 461 US 352.

Arrest

Remember all the things you read about Mirandizing you first?
Forget it. As long as they can get you to admit anything, they can
use it against you, regardless of whether or not you've been
mirandized.

They will probably put the cuffs on too tight. And they will
handcuff you. Don't complain. Don't ask your kidnappers for
anything. You're the one in control here, not a wimp. Act like it.
Be respectful, though. Don't act better than them or they'll take
it out on you (all cops have deep fears of being inferior to
anybody). Your complaints will go in their report. Don't give them
any satisfaction!

Do not answer any questions at all. Demand to get meaningful
assistance of counsel and counsel of choice, since it is your right
to have these at EVERY important stage, including the arrest
itself.

Just try to be as cooperative as possible physically (there is
no reason to get the shit kicked out of you here) because it's not
going to be worth your effort to resist. Besides, that will give
them a reason to kick the shit out of you that they can use in
court.

As far as the actual mirandizing, when they ask if you
understand, just say the truth. Say "No. I need counsel to help me
understand, Sir."

You may get lucky. They might give you waist chains or leg
irons. If this happens, wear them with pride! Hardly anybody gets
that kind of treatment anymore and it means you're really special.
Show them off to the other prisoners, to any police you meet, the
public, everybody!

Booking

They will ask for your name? Are you waiving rights if you
answer? Yep! Aside from that, you could be waiving jurisdiction.
Remember how to answer these questions.."Sir, is the answer to that
question voluntary or mandatory?"

What about mug shots and fingerprints. They will give those
back if you're not guilty, right? Yes, they'll give you the
originals, but you can be sure they've made copies. In Davis v.
Mississippi, they stated that fingerprints and other personal
identification essentially work like property. They need a search
warrant to get them.

Arraignment

Before you are arraigned, they will probably keep you in a
holding cell until you're talkative. They will send a pre-trial
services
representative to try to get you to tell them your life history.
This is the same routine as booking. Don't answer anything.
At arraignment, the magistrate or judge will read the complaint,
information, or indictment against you and ask if you understand
it. He is supposed to inform you of your right to assistance of
counsel, that you are not required to make any statements, and that
any statement may be used against you. The whole point of this
procedure is only to tell you what you have been charged with and
to make sure you don't understand it. So answer truthfully and say
"No" if you still don't have counsel. He may also ask you how you
plead. In this case, you may wish to say that "The accused stands
mute." If you make a plea of any sort, you could be giving them
jurisdiction. You could also say that "Since the defendant cannot
understand the charges, the defendant stands mute." The judge will
say "I will enter a not guilty plea for you." Say loud and clear,
"I object! Let the record show that the accused stands mute."

Then the judge will start asking you personal questions. Shut
up. Keep the voluntary/mandatory routine up.

Now, the prosecutor or judge or cop is going to absolutely
have a conniption and throw a tantrum because you won't answer
their questions. Let them carry on. In Federal courts, 18 USC 1342
sets release with the least amount of restrictions unless there is
some legitimate reason on which the court can justify the
imposition of restrictions greater than what would reasonably
assure your appearance. In state courts, the situation is similar.
Okay, now after the government demands something more than your own
recognizance or an unsecured cash bond, then say loud and clear
something like, "Please put on record the fact that the government
has demanded that I be placed under the unreasonable bond
restrictions of XYZ merely because I choose to exercise my right to
remain silent."

Some of the bond restrictions they may want (which are listed
in 18 USC 1342..find out the equivalent for the state) are distance
of travel, curfew, psychiatric testing, or even weekly reporting.
These are all considered unreasonable except with extra
circumstances (like you jumped bond before).

Object and state "Please put on record that the no reason was given
for the bond restriction of XYZ and the accused objects."

The judge will most likely make submission of your prints and
pictures a condition of your release. If you don't give in, you'll
sit in jail. Some of the booking questions will be about your
physical description. The rest will be personal or about your
family; these are out of line.

This much should get you at least through the first 3-4 days
of the standard arrest procedure and have heaps of procedural
errors lined up for "arguing technicalities" or appeals.




ASKi Phile #6

Sup!!! This is an ASKI Special Release.... My research paper... You
might find this interesting, you might think it's complete BS, I really
couldn't care less. A few people were interested in reading this so I thought
I'd put it out. The first section is a little flat, but it's good info. I think
there are some real parallels here, anyway it makes you think... Have Phun....

Tom Cross AKA The White Ninja

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Campaign of Terror
By Tom Cross


"Cyberpunk, an unholy alliance of the technical world with the
underground of pop culture and street level anarchy (Elmer-Dewitt 59)."
Bruce Sterling's graphic definition of America's newest counter-culture
conjures up images of street gangs attacking each other with the high-
tech weaponry of the 21st century. Oddly enough, this is quite close to
the way many people view today's teenage computer hackers. Evil
criminals out to destroy man kind... This romantic view of the computer
hackers has caused the entire electronic community to be attacked by
government, law enforcement, religious institutions, corporations, and
concerned citizens groups. Driven by a false view of hackers as an evil
scourge of society, they have driven the electronic community into a
corner. In the past there has been another group of "criminals and
outcasts" in America who had been attacked by society. These were the
colonists living in the British American Colonies, and when they fought
back, thousands died and a new nation was forged. This new nation would
grow to become the most powerful nation in the world. Events occurring
now on the electronic frontier pose frighting similarities to the events
surrounding the American revolution.
Before describing the world of computer hackers, and the parallels
that can be drawn to historical events, it is best to begin with a
history of the American Revolution. Many of the people who came to
America were out casts from British society. Many followed alternative
religions and wanted to escape the established Church of England. Others
were criminals who had been sent to America as punishment. There were
also adventurers and speculators, who wanted to find fortune and success
on the American frontier. Whatever their reason, many British citizens
ended up living in America, and these citizens saw themselves as British
people (Klose 20 - 21).
The American Colonies were mercantile colonies. They were
established to profit Britain, to provide raw materials for Britain, and
to provide a market for British goods. The British government set up
laws that would protect this mercantile policy, and that would ensure
profit for the mother country. However, the colonists were selective
about which laws they followed. If a law wasn't beneficiary to them,
they ignored it. The British government accepted this, and because of
political graft, competition with other nations, and the want for good
relations between the colonies and the mother country, violations of
English trade laws were often ignored. Britain was following a policy a
salutary neglect. However, generation after generation, American
colonists began feeling less and less like British citizens. When
Britain established itself as the dominate world power, and no longer
needed salutary neglect, the colonists were not happy (Midgley 43).
Between the years of 1724 and 1741, a new generation of kids was
born. Historian David Fischer describes these kids as a generation that
grew up in a time when age was a person's most respected value, and grew
old in a time when it was best to young. They were "heavy drinkers,
daring pioneers, and angry orators attracted to high risk and decisive
action." They alarmed the older colonists with their rebellious actions
and their lack of education. As John Adams put it, "We have not men fit
for the times. We are deficient in genius, in education, in travel, in
fortune - in everything. I feel unutterable anxiety." Many were
disappointed with the new generation, as they were poor and uneducated
in comparison to their elders, but they were adventurous, brave, an
hateful towards control. They also felt little connection to Britain,
and had gained military experience and a sense of freedom when they
fought the French and Indian War without British assistance. These
traits made them a perfect generation to rebel against the British
government, especially at a time when the British government was trying
to step up it's control (Howe 212 - 214).
In 1763 the first conflicts between the British government and the
colonists began to erupt. The British government was thousands of miles
away from America, and thus was unresponsive to American needs. This
resulted in a series of laws which greatly angered the Americans. The
first of these was the declaration of the proclamation line. This was a
line between the American colonies and the Indian territories, and it
was intended to protect both the colonists and the Indians from
conflict. However, thousands of colonists had already planned to move
into the territory west of the proclamation line, and many were already
there. The colonists had already invested time and money into moving
across the line, and the proclamation angered them. Next, the Sugar Act
was passed, this act placed a duty on molasses and sugar. The British
also ended their policy of salutary neglect with a series of actions
that clamped down on laws the colonists had been violating for
generations; a vice admiralty court was established to try tax evaders
who had previously been treated sympathetically by colonial courts, bond
for shippers was raised, tax collectors for the colonies could not live
in England, and tax officials were given writs of assistance (blanket
search warrants). Another final action by the British government which
brought protest was the passing of the Stamp Act. The Stamp Act required
that stamps be bought and placed on about 50 paper documents from legal
documents to newspapers. This law was not only a direct tax without
representation, but it was an attack on freedom of speech. The colonists
would react quickly and in some cases, violently (Midgley 46).
James Otis called for a protest meeting to be held in New York
City (Midgley 47). Letters were sent out to all of the colonies, and in
October the Stamp Act Congress met (Midgley 47). Massachusetts, South
Carolina, Rhode Island, Connecticut, New Jersey, Delaware, New York,
Pennsylvania, and Maryland were represented (Midgley 47). The Congress
protested taxation without representation, and stated that only their
legislatures could levy taxes (Midgley 47). Some of the protests were
more violent. A few days after the Congress let out, a boycott on
British goods was established (Midgley 47). This boycott was enforced by
drunken mobs of liberty generation youths, twenty, and thritysomethings
who called themselves the "Sons of Liberty." The "Sons of Liberty"
forced merchants and printers to work without using stamps, burned court
houses and tax collection offices, tarred and feathered tax collectors,
and generally caused as much physical damage to those buying or selling
stamps as possible (Tyne 163 - 172). Three weeks before the stamp act
was passed, riots began in Boston (Tyne 166).

"An effigy of Andrew Oliver, the nominated stamp
distributor, later forced to resign that office, was
swung all day on the 'Great Tree,' and after dark an
'amazing' multitude shouting 'liberty, property, and
no stamps,' bore the image an a beir, through the
State House and under the very chamber where sat the
Governor and Council. With the debris of the
demolished stamp office they made a funeral pyre for
the execrated effigy. Twelve days later the mob sacked
the home of the customs officer, burned the vice-
admiralty records, gutted the mansion of Lieutenant
Governor Hutchinson, beating down the very partition
walls, wrecking the furniture, and defacing family
plate and portraits (Tyne 166)."

Despite these highly rebellious actions, the British government
was sympathetic. Only one, the Major of Artillery, wanted to "cram the
stamps down the throats of the people." The government, instead, tried
to keep the peace without being overly oppressive. Many people disagreed
with this stance, and thought that the government should have "nipped
the spirit of sedition in the bud," however, the British listened to the
American requests and the Stamp Act Congress. In the end, the law was
repealed (Tyne 163 - 172).
The Americans had won their first victory, but soon events would
have them fighting again. With the repeal of the Stamp Act, Parliament
issued a second order, the Declaratory Act. The Declaratory Act stated
that Parliament could make any law that would hold the colonies and
Britain together. It effectively refuted all arguments the Americans had
made concerning taxation. The colonists ignored it, but the opinions of
the colonists and the opinions of the British government were beginning
to split. Parliament then passed the Quartering act. This act was an
attempt to deal with the over-crowding of troops in New York City by
requiring that the colony provide housing. This often meant shacking
soldiers up with private citizens at the citizen's expense. The
Americans resented this greatly, and many raised "liberty poles" in
protest. A third act which brought American and British relations to a
boil again was the Townshend Acts. These were a set of import taxes on
glass, tea, lead, paint, and paper. These taxes would spur a resistance
movement against the British that would eventually lead to war!
A few Americans started a communication campaign. Two sets of
letters were spread across the colonies, building opposition towards the
laws and anger towards the British. The first was John Dickinson's,
"Letters from a Farmer." These papers stated that Parliament could only
levy an import duty for the purpose of trade control, not for revenue.
These papers were widely read and widely accepted. The second set was
Samuel Adam's Circular Letters. These were a series of statements
renouncing taxation without representation. The Massachusetts House
adopted them and sent them across the colonies. They proposed that the
colonies form a unified effort to fight British oppression. The British
declared the letters seditious, but they were officially adopted by four
other colonies. These letters communicated the angers against the
British to the people of the colonies. They agreed with what was being
said, and growing opposition to Britain began to build in America.
Tea time was a custom in both Britain and America (Bailey 97). In
fact, Approximately 1 million people drank tea twice a day (Bailey 97).
Tea was almost as essential to Americans a bread and water, and a tax on
it was inexcusable. The Americans were in a rebellious mood, and in 1768
a boycott began in Boston and spread all across the colonies in only a
few months (Midgley 48). Colonial merchants were not to buy items taxed
under the Townshend Act (Midgley 48). Although the boycott did not bring
much harm to British merchants, the government decided to listen to the
American demands (Midgley 48). A new Prime Minister came into power and
repealed the Townshend Acts (accept for the tax on tea) (Midgley 48).
The Quartering Act also expired and was not renewed (Midgley 48).
Because of these actions many Americans dropped the boycotts, and
there was period of quiet for three years. However, there was a train of
incidents that kept the revolutionary ball rolling (Midgley 48). The
first was the Boston Massacre, which occurred a few months before the
Townshend Acts were repealed (Midgley 48). Bostonians and British
soldiers were not on friendly terms, and when a heated argument broke
out between a British sentry and an American civilian, a crowd of people
gathered and joined in (Midgley 48). When the crowd pressed toward the
soldiers and started throwing rocks and snow balls, the soldiers became
confused and frightened, and they opened fire (Midgley 48). Five were
killed (Midgley 48). This incident raised a great deal of anger against
the British in America. Sensationalistic rumors and news reports led
people to believe that the Americans had done nothing wrong and that the
British had just murdered them (Bailey 98). Massacre Day was observed in
Boston until 1776 (Bailey 98). The second event was the Gaspee incident
(Midgley 48). Americans attacked the British revenue ship Gaspee, chased
it's crew to shore, and burned it (Midgley 49). The third was the
establishment of the Committees of Correspondence (Midgley 49). This was
an intercolonial propaganda campaign (Midgley 49). These Committees sent
protests of British oppression all over the colonies for everyone to
read (Midgley 49). This intercolonial communication network further
forwarded the cause of revolution by making people aware of the
colonist's claims, and encouraging people to join the cause (Midgley
49).
The events that lead up to the American revolution reached their
climax when the British offered an exemption from the tea tax, and thus
a monopoly on tea, to the British East India Tea Company. Colonial
merchants feared for their lively-hood and reacted very violently.
People boycotted tea and tea ships were burned all over the colonies. In
Boston a group of colonists disguised themselves as Indians and raided
three tea ships. They dumped 342 cases of tea valued at $70,000 out into
the harbor. In response to these actions Britain clamped down hard. A
set of laws were passed that became know in America as the Intolerable
Acts. These acts shut down the Boston harbor, moved all trials of
British officers to England, removed the Massachusetts House's right to
elect the upper council members, banned town meetings, blocked colonial
expansion with Quebec, reinstated the quartering act, and removed the
governor of Massachusetts. In protest the Americans began the First
Continental Congress. A year later the first shot would be fired,
America was at war with Britain (Midgley 49-50).
The cyberpunk counter-culture consists of a group of young people
who are obsessed with technology. They dress in black clothing, and
surround themselves with video games and computers, techno music and
raves, smart drugs and virtual realities, fringe science and science
fiction, and, of course, computer hackers (Elmer-Dewitt 58 - 65). These
cyberpunks have a lot in common with the liberty generation on the
1700's (Howe 212). A combination of neglect and resentment from self-
interested Baby Boomers and declining school systems resulted in today's
"Generation X" turning out a lot like the liberty generation (Howe 55 -
81). Todays kids are rebellious, adventuresome, and brave, sometimes to
the point were they fall off the edge. Suicide rates are at the highest
level ever recorded (Howe 83), and in the drug filled city war zones of
America, a Generation Xer's life expectancy is lower than that in
Bangladesh (Howe 120). America's school system has declined, and many
Generation Xers have learned a lot more on their own than in the
classroom (Howe 69 - 81). Their parents are quick to place ridicule and
blame on them for the fact that they do not have all of the academic
knowledge of their elders (Howe 17 - 27). However, they have learned
what is needed to solve practical problems, and their business and
information management skills are often far better than that of their
parents (Howe 80). It is important to note that these are things they
taught themselves, not things they were shown in a classroom. One group
of Generation Xers who spend their time trying to teach themselves in
areas their school has failed with are computer hackers.
Computer hackers, skilled computer geniuses who would spend days
awake at the screen, typing out a new program, existed as early as the
1960's at MIT. However, today's computer hackers, who are similar in
their behavior, find their roots from another group of Baby Boomer
engineering students, the Phone Phreaks. Phone Phreaks experimented with
the phone network, using electronics to avoid being charged for
telephone calls (Claugh 12). The most powerful electronics device used
for this purpose was the blue box (Clough 15). The telephone company
based their entire network on a set of tones called multi-frequencies
(Clough 13). They published these tones in a technical journal in 1954,
and before long engineering students all over the country were using
them to explore the phone network (Clough 13). The Blue Box gave a user
control of all of these tones, and thus control over the entire world
wide network (Clough 16).

"They found a labyrinth of electronic passages
and hidden sections within the Bell network, and they
started charting this unknown territory. Then they
realized they were looking at the inside of an
enormous electronic system, that Ma Bell was really
just a giant computer linking terminals - or
telephones - with switches and wires and loops all
across the country. It was an actual place, though it
only existed at the end of a phone receiver. It was a
nearly limitless electronic universe accessible by
dialing numbers on a phone (Clough 12)."

It was 1961 before Bell even knew what was going on (Clough 12).
They tried to stop it, but phreaks could just go out to a pay phone
leaving Bell with no way of tracking them down (Clough 16). A series of
laws were passed locally and federally in the 60's and 70's in order to
stop phone theft, but most were unenforceable, and some, such as a law
making it illegal for people to posses information relating to phone
systems, were so restrictive that they were ruled unconstitutional.
Although there were occasional arrests, generally of well known and
popular phreaks, the phone phreak world under went it's own period of
salutary neglect. Bell didn't become extremely active in stopping
phreaking until the mid 80's, when it became plausible again.
The Phone Phreak world had it's hey day in the early 70's (Hafner
19). After that time the phreaks had a new interest, building personal
computers (Clough 27). In 1976 two phone phreaks who had been building
and selling Blue Boxes for cash out of their parents garage, built a
personal computer (Clough 29). When they showed it to their local
computer club, the members loved it and a few placed orders (Clough 30).
The two phone phreaks were Steve Jobs and Steve Wozniak, and they had
just founded Apple Computer Corp. (Clough 29). The PC revolution that
these two phone phreaks started would revolutionize business, education,
and entertainment (Clough 33). By 1993 there would be over 130 million
PCs in use world wide, and PCs would have reached about 35% of all homes
in industrialized nations (Clough 33). The PC revolution would also come
full circle and revolutionize the world of computer hackers and phone
phreaks. In 1978 Ward Christensen and Randy Suess hooked a computer up
to a telephone line in order to provide a sort of messaging service for
the members of their computer club. They had created the first computer
bulletin board system or BBS. These computer BBSs would explode in the
coming years. By 1993 there would be over 12 million people using
computer BBSs (Telebits 20). As Phone Phreaks turned their interests to
PCs and eventually into computer hacking, they found they could use
these BBSs to communicate. In the eighty's a new generation of computer
hackers and phone phreaks, kids who had gotten a computer for Christmas
and had found it more interesting than school and an escape from their
parents, would be using BBSs to talk to friends all over the country.
Computer hackers have a need for forbidden knowledge, and when one
called a BBS, he found thousands of other kids who had the same
interest. They wanted to learn things that noone else knew, they wanted
to be able to do things that were beyond the understanding of ordinary
people. On BBSs they found knowledge about phone systems and computer
networks that noone else in the world knew. They were experimenting with
things that even their parents didn't understand. Growing up in the 70's
and 80's they saw all the corruption and problems in government,
business, and all other aspects of adult life. They were liberating
technology from this corrupt world and using it to learn. There had
always been people who wanted to learn things noone else understood, but
never before had thousands of these people been networked across a
nation, and never before had these people been so intense in their need
for forbidden knowledge that they were willing to completely cut
themselves off from society inorder to obtain it. The BBSs were a
hacker's fantasy world, a place were, for once, information was free,
money wasn't everything, and adults didn't have all the answers
(Sterling 43 - 85).
Hackers weren't violating many laws with the knowledge they had
obtained. Sure they knew a few things they weren't supposed to know and
they accessed a few computers they weren't supposed to be on, but they
were learning and they weren't causing much harm (Sterling 62 - 63).
However, much like the colonists in the late 1700's, hackers ignored any
law which did not serve their mission of free information (Howe 201).
They also delved into other kinds of forbidden information, such as lock
picking, bomb construction, drug mixing, military tactics, and murder
(Sterling 79 - 80). This fact may seem alarming, but few of the hackers
were actually using this information (Sterling 80 - 81). They were just
interested in it because it was rare and fun knowledge (Sterling 80 -
81). "Stuffing gunpowder into a booby trapped flashlight, so as to blow
the arm off your high school vice principal, can be a thing of dark
beauty to contemplate. Actually committing assault by explosives will
earn you the sustained attention of the federal Bureau of Alcohol,
Tobacco, and Firearms (Sterling 81)." However, this information did
attract the attention of parents, and eventually, law enforcement.
Pressure was building on law enforcement to act, and they did.
However, few law enforcement officers would be willing to raid a bunch
of kids because they wanted to know things they weren't supposed to
(Sterling 63). Thus a large number of rumors started spreading across
law enforcement agencies and news media that a Bulletin Board System was
a "tool of Satan (Rosenberger 57)," "a dark switchboard where sneaky
misfits can hatch all manner of secret and illicit schemes (Rose 27)."
These rumors became more popular as "Computer Terrorists" appeared in
the news more and more often, and they eventually escalated to
ridiculous and dangerous levels. Eventually it got to the point where
law enforcement agents were out chasing ghosts, and reporters were
telling parents how their kids could be tapping in to vile things such
as pornography, computer viruses, cults, snuff software, the president's
e-mail, and phone numbers for evil organizations like the NRA
(Rosenberger 57). Some law enforcement agents actually thought deterring
pedophilia was a major objective of any police program concerning BBSs
(Rose 27). There was even a concerned parent's group that formed to
lobby for a law banning children under the age of 18 from using BBSs
(Hults). Things had gotten completely out of hand.

"Police want to believe that all hackers are
thieves. It is a tortuous and almost unbearable act
for the American justice system to put someone in jail
because they want to learn things which are forbidden
for them to know. In an American context, almost any
pretext for punishment is better than jailing people
to protect certain restricted kinds of information.
Nevertheless, policing information is part and parcel
of the struggle against hackers (Sterling 63)."

"...computer bulletin boards are hangouts of a
new generation of vandals. These precocious teenagers
use their electronic skills to play hide-and-seek with
computer and telephone security forces (Colossus)."

"There are very serious negative consequences
surrounding the use of modems and computers in our
society. Because of this, all children under the age
of 18 should be prohibited from using a computer in
connection with a modem or that is connected to any
computer service (Hults)."

"According to Fresno Police Detective Frank
Clark, 'your child can be in real danger from
pedophiles, rapists, satanic cultists and other
criminals known to be actively engaged in computer
conversation. Unwittingly, naive children with a
natural curiosity can be victimized; emerging healthy
sexual feelings of a child can be subverted into a
twisted, unnatural fetish affecting youth during a
vulnerable time in their lives (Hults).'"


Much like the colonists in the late 1700's, the computer
underground's salutary neglect ended with a tough crackdown on freedom
and rights. The law enforcement agents were told to seize everything and
they did. Standard procedure was to seize every possibly related piece
of electronics equipment or printed document, partly because many law
enforcement agents were computer illiterate and didn't know what they
were looking for, and partly because many law enforcement agents believe
that hackers are sinister and quite capable of hiding evidence anywhere
(Sterling 213 - 216). The first such raid was a raid on the "414 gang"
who attracted media attention for nine days in 1982 (Sterling 87). Since
that time the raids would become more and more common until 1990 when
they would reach their climax. During just three days in 1990 about 42
computers and 23,000 floppy disks were seized (Sterling 156 - 159). The
warrants that were issued have been compared to the writs of assistance
in colonial times, not to mention the Salem witch hunts. The government
went in, took everything it could find, walked out, and came back in
about 2 years. Every raid became another horror story.


"Three years ago in 1990, January 19 was a
Friday. It was 4 days after AT&T shut down for 9
hours during Martin Luther King's birthday, it was the
day the USSS served a Federal search warrant at the
Zeta Beta Tau fraternity house at the University of
Missouri-Columbia. I was the intended and actual
victim as Special Agents Tim Foley and Barbara Golden,
accompanied by Reed Newlin (Southwestern Bell
security), and officers from the University police and
the University's administrative office tore through my
room with a legal license written so broad that they
could have walked off with TV, VCR, and refrigerator.

Desperately searching for traces of the public
911 information and copies of Phrack Magazine, the SS
came up empty, but not before they had completely
harassed and intimidated me.

As the raid began, the University police
physically restrained me even though I made no attempt
to stop them nor did they have any reason to believe I
would respond violently. I asked to see their warrant
and they went inside.

Unlike other USSS raids in 1990 there were no
guns were drawn... but I suppose that the presence of
some 30+ witnesses cramming the halls watching them,
probably helped the agents keep it holstered as well.

Eventually, I was allowed to seat myself on the
floor outside my room where I could partially see and
hear what the agents were doing and saying.

They went right to work, starting with jotting
down the serial numbers of every electrical device in
the room to check and see if it was stolen property.
I wasn't worried about that.

All of my school books and notebooks for class
were checked for illegal information.

After noticing a book about law schools on my
shelf, the agents had themselves a good laugh about
how I would never have that option when they were
through with me.

Agent Foley was prepared to remove my entire
audio compact disc collection as evidence (of what I
have no idea), until Agent Golden informed him that I
could not use them in my Apple IIc 5 1/4 inch floppy
drive (instead she told him I could have used them in
a 3 1/2 inch drive). (They were both wrong...)

Copies of the Phrack subscriber list were taken
along with a notebook containing newspaper clippings
about Robert Morris and other noteworthy people and
incidents relating to computers. The SS decided that
reading the Wall Street Journal and saving some
articles was at the least suspicious, if not a felony.
(Among hundreds of other names and Internet addresses,
the subscriber list contained an entry for an
individual who was an employee for Steve Jackson
Games.)

And then the telephone rang...

I began to get up when the police forced me back
down. Agent Foley noticed the commotion and remarked
'They'll call back!' And that is when the answering
machine clicked on. The agents chuckled since they
knew they were about to hear a private message being
delivered to me. It was like they were wiretapping
without a warrant. The caller didn't identify himself.
He didn't need to. It was my co-editor, desperately
trying to find out what was happening and letting me
know his intention to drive to Columbia that evening.

After the ceiling tiles had been lifted, the
furniture moved away from the walls, the mattress
flipped, and the carpet pulled up, the agents decided
to leave (believe it or not they completely ignored
the bottle of Barcardi that was sitting in there).

As I plead with them not to take my Apple
computer, Agent Foley declined to speak with me unless
I was Mirandized again. I decided a Q&A session would
be inappropriate at this time so I declined. But
before he left, Foley informed me that I was not under
arrest, but I was going to jail for violating the
Computer Fraud & Abuse Act of 1986, for the illegal
Interstate Transportation of Stolen Property, and for
Wire Fraud.

On February 6, 1990 (18 days later) I was
indicted (Neidorf)."

"The crusaders got creative, and contacted some
government agency concerned with family and heath
matters. They obtained some kind of order from this
agency directing the BBS sysops, a married couple, to
shut down their BBS or face being judged unfit parents
and having their children taken away (Rose 27)!"

"On January 30th, the FBI served a search
warrant on Rusty & Eddies BBS, and essentially trucked
it away - an estimated $200,000 worth of computing
equipment (Files from the FBI - Bulletin Boards and
Badges 31)."

"...the FBI alluded to the fact that if the
system came back up, they could, under law, seize
Jay's father's house. His father asked Jay to move out
of the premises (Files from the FBI - Bulletin Boards
and Badges 33)."

"On the morning of March 1 - a Thursday -
twenty-one-year-old University of Texas student (Chris
Goggins)... was wakened by a police revolver leveled
at his head (Sterling 138)."

"Standard computer-crime search warrants lay
great emphasis on seizing written documents as well as
computers - specifically including photocopies,
computer printouts, telephone bills, address books,
logs, notes, memoranda, and correspondence. In
practice this has meant that diaries, gaming
magazines, software documentation, nonfiction books on
hacking and computer security, sometimes even science-
fiction novels have all vanished out the door in
police custody. A wide variety of electronic items
have been known to vanish as well, including
telephones, televisions, answering machines, Sony
Walkmans, desktop printers, compact disks, and
audiotapes (Sterling 159)."

The computer community, much like the colonists, also received
financial attacks. The first of these was an attempt by Southwestern
Bell to charge business telephone rates to all owners of BBSs in Texas.
The passage of this law by the Public Service Commission in Texas, and
the resulting war to get the rate change repealed, shut down almost all
the BBS activity in Texas for three years. Southwestern Bell and other
local telephone companies across the country tried similar stunts, and
one telephone company even went so far as to design a device which could
detect if a customer was using his phone with a computer, automatically
raise his rates, and tack a $100 service charge onto his bill. In New
York the state legislature tried to pass a tax on the distribution of
shareware, a common BBS function which is generally done free of charge.
The FCC also got into the act, considering many "modem taxes" but never
passing any of them. These attacks added greatly to the growing
frustration and anger that was brewing.
Not all the hackers were innocent, and not all the BBSs were
clean, but the law enforcement agents made a number major constitutional
and civil rights violations which raised tensions further still. Beside
the constitutional questions that were raised concerning the items that
were seized in the raids, the government made a number of First
Amendment violations. A bulletin board system is a medium of
communication, much like a magazine, and seizing a BBS brings up
questions concerning the system operator's free speech rights. Generally
raids on publishers have special controls placed on them, but these
controls were not followed during raids on BBSs. Furthermore, the
government raided a magazine publisher and a role playing game publisher
because they believed that these two businesses were going to publish
information on how to hack into the 911 emergency telephone system. The
notion the hackers might be hacking into emergency phone services and
the fact that the telephone company claimed that the information they
were going to publish was worth $80,000, set the press on fire with
sensationalistic stories. In the end the document turned out to be worth
only $13, but the damage to the First Amendment rights, finances, and
privacy of the raided individuals was done (Sterling 99 - 153). In
November, 1992, a meeting of hackers in Washington was broken up by
security forces who claimed to be working for the United States Secret
Service. This raid brought many questions as to the hackers' right to
freedom of assembly, especially when the United States Secret Service
denied the incident and was later proven to be lying (2600 43). In the
end the government only got a handful of convictions, but destroyed many
lives in the process.
By 1990 BBSing had become a world wide industry with millions of
participants (Telebits 20). These people were greatly insulted and angry
at the way their hobby was being defamed by the press and the
government. They were not criminals! They were not stealing property or
selling drugs! They were just communicating with their computers!
"Liberty poles" went up all over the BBS community, messages telling
police and government employees to keep out, that they were not wanted
there. Some BBSs held rallies to defend sysops who's systems had been
seized (Files from the FBI - Bulletin Boards and Badges 33). The hackers
were a little more determined in their struggle. Some wrote angry
manifestos, defending hacking and freedom of information (Sterling 85).
Others directly attacked anyone they perceived as an enemy,
disconnecting their phone service or damaging their credit ratings
(Colossus). A legal organization called the Electronic Frontier
Foundation formed to fight for realistic interpretation of the
Constitution as it applies to computer communication (Sterling 249).
This organization would fight and win legal battles in the name of
computer users who had wrongly been attacked by the government.
"Committees of Correspondence" became the main form of computerized
protest, as dozens, possibly hundreds of electronic magazines, white
papers, and editorials filled the electronic frontier. These documents,
like the press reports, were often sensationalistic, but they often
contained more truth than the press and the government were willing to
offer. Communication became the main form of protest for a world built
on communication.


"Another one got caught today, it's all over the
papers. 'Teenager Arrested in Computer Crime
Scandal', 'Hacker Arrested after Bank Tampering'...

Damn kids. They're all alike.

But did you, in your three-piece psychology and
1950's technobrain, ever take a look behind the eyes
of the hacker? Did you ever wonder what made him
tick, what forces shaped him, what may have molded
him?

I am a hacker, enter my world...

Mine is a world that begins with school... I'm
smarter than most of the other kids, this crap they
teach us bores me...

Damn underachiever. They're all alike.

I'm in junior high or high school. I've
listened to teachers explain for the fifteenth time
how to reduce a fraction. I understand it. 'No, Ms.
Smith, I didn't show my work. I did it in my head...'

Damn kid. Probably copied it. They're all
alike.

I made a discovery today. I found a computer.
Wait a second, this is cool. It does what I want it
to. If it makes a mistake, it's because I screwed it
up. Not because it doesn't like me...
Or feels threatened by me...
Or thinks I'm a smart ass...
Or doesn't like teaching and shouldn't
be here...

Damn kid. All he does is play games. They're
all alike.

And then it happened... a door opened to a
world... rushing through the phone line like heroin
through an addict's veins, an electronic pulse is sent
out, a refuge from the day-to-day incompetencies is
sought... a board is found.

'This is it... this is where I belong...'

I know everyone here... even if I've never met
them, never talked to them, may never hear from them
again... I know you all...

Damn kid. Tying up the phone line again.
They're all alike...

You bet your ass we're all alike... we've been
spoon-fed baby food at school when we hungered for
steak... the bits of meat that you did let slip
through were pre-chewed and tasteless. We've been
dominated by sadists, or ignored by the apathetic.
The few that had something to teach found us willing
pupils, but those few are like drops of water in the
desert.

This is our world now... the world of the
electron and the switch, the beauty of the baud. We
make use of a service already existing without paying
for what could be dirt-cheap if it wasn't run by
profiteering gluttons, and you call us criminals. We
explore... and you call us criminals. We seek after
knowledge... and you call us criminals. We exist
without skin color, without nationality, without
religious bias... and you call us criminals. You build
atomic bombs, you wage wars, you murder, cheat, and
lie to us and try to make us believe it's for our own
good, yet we're the criminals.

Yes, I am a criminal. My crime is that of
curiosity. My crime is that of judging people by what
they say and think, not what they look like. My crime
is that of outsmarting you, something that you will
never forgive me for.

I am a hacker, and this is my manifesto. You
may stop this individual, but you can't stop us all...
after all, we're all alike ("Mentor")."

"'Conference!' someone yelled as I put the phone
to my ear. Then came a mind-piercing 'beep,' and
suddenly my kitchen seemed full of hyperactive 15-
year-olds. "You the guy who wrote the article in
NEWSWEEK?" someone shouted from the depths of static,
and giggles. "We're going disconnect your phone," one
shrieked. "We're going to blow up your house," called
another. I hung up.
Some irate readers write letters to the editor.
A few call their lawyers. Hackers, however, use the
computer and the telephone, and for more than simple
comment. Within days, computer "bulletin boards"
around the country were lit up with attacks on
NEWSWEEK's "Montana Wildhack" (a name I took from a
Kurt Vonnegut character), questioning everything
from my manhood to my prose style. "Until we get real
good revenge," said one message from Unknown Warrior,
"I would like to suggest that everyone with an auto-
dial modem call Montana Butthack then hang up when he
answers."
Since then the hackers of America have called
my home at least 2000 times. My harshest critics
communicate on Dragonfire, a Gainesville, Texas,
bulletin board where I am on teletrial, a video-
lynching in which a computer user with grievance
dials the board and presses charges against the
offending party. Other hackers -- including the
defendant -- post concurrences or rebuttals. Despite
the mealtime interruptions, all this was at most a
minor nuisance; some was amusing, even fun.
FRAUD: The fun stopped with a call from a man
who identified himself only as Joe. "I'm calling to
warn you," he said. When I barked back, he said,
"Wait, I'm on your side. Someone has broken into TRW
and obtained a list of all your credit-card numbers,
your home address, social-security number and wife's
name and is posting it on bulletin boards around the
country." He named the charge cards in my wallet
(Colossus)."

Although there are many small similarities between the American
Revolution and Electronic Frontier, the most important parallel is the
central theme of both conflicts. We have two groups who fear each other
and lack a realistic understanding of what the other side feels. In the
late 1700's a huge ocean separated America from Great Britain. The ocean
meant that any news that arrived from the other side was always 3 months
old, and it meant that each side had no way of relating to or
understanding the needs of the other side. In 1993 the barrier is not
one of distance and speed, but of technology. The Electronic Frontier is
a futuristic world beyond the grasp and understanding of the majority of
the population. The law makers are not part of this world, and it is
quite difficult for them to become a part of it and to understand it.
The same goes for the computer community. They live in their technical
world every day and they cannot understand why most Americans are so
confused when faced with this technology. They don't see themselves as a
threat and they don't know why they are being oppressed. Each side will
have to come to understand the other, and they will have to work with
each other in order to find a solution. In the 1770's, had Great Britain
tried to listened to colonists demands instead of cracking down on their
law breaking, there probably wouldn't have been a revolution. America
would have become it's own nation, as did the other British colonies
over time, but it would have happened peacefully. Tensions continue to
rise in the computer community. One of the most respected and possibly
one of the most conservative members of the electronic community, Jack
Rickard, editor of Boardwatch Magazine, called the government's
crackdown on BBSs a treasonable "Campaign of Terror (Rickard 8 - 10)!"
Hopefully the members of the electronic community and law enforcement
will be able to see beyond their own sides of this conflict. If not,
fears will escalate, tempers will rise, and there might just be a second
American Revolution.



Works Cited


Bailey, Thomas A. & Kennedy, David M.. The American
Pageant. 8th ed. Lexington, Massachusetts: D.C.
Heath and Company, 1983.

Clough, Bryan & Mungo, Paul. Approaching Zero.
London: Faber and Faber, 1992.

"Colossus." Published Electronically.

Elmer-Dewitt, Philip. "Cyberpunk." Time. 8 February
1993: 58 - 65.

"Files from the FBI - Bulletin Boards and Badges."
Boardwatch. April 1993: 30 - 33.

Hafner, Katie & Markoff, John. Cyberpunk. New York:
Simon and Schuster, 1991.

Howe, Neil and Strauss, Bill. 13thGEN Abort, Retry,
Ignore, Fail. New York: Vintage Books, 1993.

Hults, Ron. "Pedophilia, Computers, and Children."
Phrack. Published Electronically.

Jack the Ripper. The Official Phreaker's Manual.
Published Electronically.

"Lawsuit Filed Against Secret Service." 2600.
Spring 1993, 43.

Mentor, The. "The Conscience of a Hacker." Phrack.
8 January 1986: File 3, Published Electronically.

Midgley, David A. & Lefton, Phillip. CBAT. 8th ed.
New York: Barrons, 1990.

Neidorf, Craig. "More Background on Steve Jackson
Games Trial." Computer Underground Digest. 3
February 1993: File 2, Published Electronically.

Rickard, Jack. "Editor's Notes." Boardwatch. April
1993: 8 - 10.

Rose, Lance. "Legally Online." Boardwatch. November
1992: 26 - 32.

Rosenberger, Rob. "Modems, Bulletin Boards and
other tools of Satan." Computerworld. 3 May 1993:
57.

Sterling, Bruce. The Hacker Crackdown. New York:
Bantam Books, 1992.

"Telebits." Boardwatch. April 1993: 19 - 20.

Tyne, Van. The Causes og the War of Independence.
New York: Peter Smith, 1951.





ASKi Phile #7
A FLAME!!!!

The following is a reprint from Phrack Loopback. I couldn't believe
that Phrack didn't flame this fucker so I thought I'd do it myself. You'll see
what I mean when you read the letter!!!! This asshole may have good intentions,
but he, like so many before him, completely denies that fact that most people
under 18 are HUMAN BEINGS, OF SOUND MIND AND BODY, CAPABLE OF MAKING LOGICAL
DECISIONS!!!!


Dear Phrack Staff,

There are very serious negative consequences surrounding the use of modems
and computers in our society. Because of this, all children under the age
of 18 should be prohibited from using a computer in connection with a modem
or that is connected to any computer service.

Please read my attached news release and join me in spreading this message.

-- Ron Hults

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

NEWS RELEASE March 18, 1992


PEDOPHILIA, COMPUTERS, AND CHILDREN

If you have children in your home and a home computer complete with a telephone
modem, your child is in potential danger of coming in contact with deviant and
dangerous criminals.

Using the computer modem, these unsavory individuals can communicate directly
with your child without your knowledge. Just as importantly, you should be
concerned if your child has a friendship with other youth who has access to
this equipment in an unsupervised environment.

Using a computer and a modem, your child can readily access community "bulletin
boards" and receive sexually explicit and graphic material from total strangers
who can converse with your children, individuals you quite probably wouldn't
even talk with.

The concern becomes more poignant when stated otherwise; would you let a child
molester, murderer, or convicted criminal into your home to meet alone with
your child?

According to Fresno Police Detective Frank Clark, "your child can be in real
danger from pedophiles, rapists, satanic cultists and other criminals known to
be actively engaged in computer conversation. Unwittingly, naive children with
a natural curiosity can be victimized; emerging healthy sexual feelings of a
child can be subverted into a twisted, unnatural fetish affecting youth during
a vulnerable time in their lives."

It is anticipated that parents, when armed with the knowledge that this
activity exists and awareness that encounters with such deviant individuals
can result in emotional and psychological damage to their child, will take
appropriate measures to eliminate the possibility of strangers interacting with
their children via a computer.

For Further Information, contact Ron Hults (209)498-4568
_______________________________________________________________________________
I could write a file as long as this 'zine thrashing this asshole but instead
I'll just make a few simple points...
1. Lets see... What was it? 10 to 14 MILLION people using BBSs?
Lets see... What was it? 2 to 4 cases of phedophelia on BBSs ever reported??
Gee, that's 1 in every 4 million!!!!! So, we should ban anything
that is used by at least one phedopheliac per 4 million... I'd
have a problem finding something that isn't used by one sicko per
4 million!!! Jesus!!
2. Does this guy use BBSs??? No, he doesn't!!! If he did he wouldn't hold such
a fucked opinion of them... This guy has never used a BBS in his life!!!
He has never seen a phedopheliac on a BBS!!! He DOESN'T KNOW WHAT HE'S
TALKING ABOUT!!! And I'll bet if you trace that Cop's sources you come up
with nothing, as everything the guy said was complete BS from start to
finish! People who actually USE computer networks will tell you that it
isn't even close to being that bad!!!
3. People under 18 are not that fucking ignorant!!!! Your kinderfiendlichkeit
still hanging around from the 70's might tell you that we're all a bunch
of stupid bothersome assholes but that is no way to write nation policy!
Jesus, after growing up in a world filled with uncensored TV and radio
where everything has to be war or sex, a world filled with drugs and drug
wars, stupid hippies, rapists, kidnappers, thieves, street level anarchy,
uncaring and careless adults, stupid, ignorant people, and high suicide
rates, etc... you think we could avoid the 4 sickos roaming the matrix!!!
JESUS!
4. Negative consequences from use of computers and modems in our society!?
Yeah, compared to amazing positive consequences, the 4 sickos running around
hardly constitute something to worry about...
5. If parents are really worried about it, why don't they pull the plug on
their own kid instead of pulling the plug on EVERY kid! The rest of us
should be allowed grow up learning and experiencing the information age
without them. Let the ignorant fucks pay the price for their paranoia!
FUCK YOU!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!



ASKi Phile #8
Beating DTMF recorders and dial locks...

This is a neat little trick that every phone phreak should know. Pulse
dialing is done by repeatedly breaking and reconnecting of the connection
between your phone and the switch. Thus, you can pulse dial by hitting the
hang-up key. However, the pulses must be quick (less than one second each), and
you can't stop pulsing a number until you have finished (a pause tells
the switch that your current number is finished you are about to send another
number). Make one pulse for 1, two pulses for 2, and so on, with ten pulses
meaning 0. Example, say I was dialing 911, I'd hit the hang-up key 9 times
quickly, pause, hit it one time, pause, and then hit it again. Practice dialing
your own telephone number from your house, it you get a busy signal you've got
it! Besides being a great party trick ("Hey, I'll bet you $20 I can dial ANY
telephone number without touching the key pad!!"), this has a few practical
uses. We've all seen dial locks on phones. Many airports use them, often there
are a few fones with area hotels on speed dial and the real dial locked, these
make great victims 'cause you have an instant alibi for using the phone! Also,
this will beat many cheep DTMF recorders (ie, this won't fool the DTR in ESS).
They are used in hotels for billing and they record EVERY number you dial,
including codes (This is why so many phreaks work in hotels!). You can use this
method to dial numbers that will not show up on hotel records (They'll still
know you made the call.). However, you could always try "If your records show
no numbers be dialed, HOW COULD I HAVE MADE $

  
102.57 IN PHONE CALLS!?!?"


ASKi Phile #9


ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸
³ ³
³ The Beige/Bud/Razz/etc... Box and The Brown Box ³
³ By The White Ninja with thanks to Switchblade ³
³ ³
³ "A true patriot must always be ready to defend ³
³ his people against his government!" ³
³ ³
³ Call The Ninja's Domicile at +1.615.370.8805 ³
³ ³
ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ;

The Beige Box is a very useful device that has gone by many different
names in the past. Basically it is a line-man's handset. It allows you to,
among other things, gain access to anyone's phone line and phreak all you
want!!! The Phone Company ACTUALLY uses this technique to make calls when on
the road... There are two main ways to build one of these and I will discuss
them both.

Note: Some of this will not work under ISDN. One cannot listen to an ISDN
telephone call after the signals have left the NT-1 without a specially
designed device which picks up the conversation without sending switching
signals. I do not have the slightest fucking idea how one would go about
building one of these, maybe you could rip shit out of an NT-1, but I don't
have $500 to waste trying this!!!!

NOTE: The situations described in this file are hypothetical, and the main
intent of this file is to provide information on telecommunications. This file
will teach you about phone line voltages, conferencing of conversations, and
how the phone company's test sets can and are used. I do not recommend that you
try anything in this file on anyone's line other than your own; it could
shorten your life in the free world...

1 -- The Quick Way.
Get a standard phone cord and rip one plug off. Then strip the ripped
end (Radio Shack sells a nice device for doing this.) and hook up 2 alligator
clips, one to the green wire (called the tip wire) and one to the red wire
(called the ring wire). Then plug a phone into the other end (This may require
a male to male coupler.) and your ready to go!!

2 -- The Best Way
Go to Radio Shack and pick up a bag full of Red, Green, Black, and
Yellow alligator clips (comes with 8, you only need 4), a Telephone Network
Interface Box (A little beige (haha) box with 8 screws and a telephone wire
coming out of it.), and some wire. Pop out the 4 tabs on the sides of the box
and put one end of each alligator clip through the holes (use one of each
color). The clips don't fit perfectly so you'll have to squeeze them in. Wire
the red clip to one of the screws on the red terminal, the green clip to one of
the screws on the green terminal, and so on for the other 2 colors. Plug your
phone in and that's it!

-- Note --
You can also plug a modem into these!

-=How to use=-

-- Attacking a Neighbor's Line --

Well, go out to your neighbor's house and find the little gray Bell box
on the side or back wall near the power box. This is the real network interface
box, it should have a bell logo on it. Open this up and you will see 1 of 2
things depending on how old their house is.

1 -- Older houses
You'll see 5 screws, like this:

* *

*

* *

Plug your clips into the screws on the right (or on the left if the
guy has 2 lines). If you don't get a dial tone try switching the clips.

2 -- Newer houses
You'll seen 8 screws, 4 for line one and 4 for line 2 (line 2 screws
will have no wires connected to them if the guy doesn't have a second line).
You will also see 2 phone plugs. You can plug your phone directly into a phone
plug or hook up the clips to the corresponding screws.

-- Attacking a Junction Box --

This box can also be hooked up to a telephone junction box or can (the
gray boxes that stick out of the ground and hang from telephone poles)(DON'T
HOOK YOUR CLIPS UP TO A POWER CAN!!!). Get a 7/16ths hex driver and open one of
these up. You will see a mass of cables all hooked up to some white terminals
or screw sets. Hook your clips up and experiment until you get a dial tone.

-- What to do --
Well, you can make all the LDs, 700, 900, Blue Box, and hack calls you
want!! They will all be traced/charged to the line you are hooked up to. You
can also listen in on all calls made to/from the line, or disable the line by
hooking the screw for the red clip and the screw for the green clip together.
(This is the same as putting the call on hold...) At a neighbors house you can
set up all sorts of features including remote call forwarding (Lots of
phun!!!!). Also, if you made the box the 2nd way, and the guy has 2 lines or
you are at a junction box, you can get 3-way by Brown Boxing!!
You also may want to hook this box up to your own phone line...
Take the phone plug and plug it into one of your wall jacks. By hooking the
green and red clips together, you can put the calling party on hold; rubbing
the clips together produces fake line noise or a "bad connection." Hooking up
a multi-meter or a vol meter will give you more info, use the following chart:

On hook = 50 VDC, if less than this, your line could be bugged...
Ring = Jumps between 1 and 50 VDC...
Off hook = 1-13 VDC, depends on the type and number of phones off the hook,
this is useful if you want to know if someone is eavesdropping on
your conversation...

When you pulse dial you break the connection and reconnect quickly. If
you press the hook switch the voltage will go up until you let go. If you let
the voltage reach 50 volts you will be disconnected. You can pulse dial by
hand. All you have to do is repeatedly press the hook switch. However, it does
take some practice to be able to dial well. This method can be used to defeat
dial locks sometimes seen on phones in airports and the like...

-=The Brown Box=-

The Brown Box is a simple device that connects 2 lines to allow 3-way
calling. First I will describe how to do this at your own home and then how to
do it with the better Beige Box!!!!!! Go out and get a line splicer, the little
box you plug into you wall jack to allow 2 phones to be hooked up to one plug.
We will be using it in reverse, to allow 2 lines to be hooked up to one phone.
Plug the male end (the one that is supposed to go to your wall jack) into the
back of your phone. Then plug line 1 in and make a call. When the person
answers, plug in line 2. You will hear a dial tone and either of you can
dial!!!!! With the better Beige Box you need to wire the black terminal to the
red terminal and the yellow terminal to the green terminal, making sure nothing
shorts. Then, hook your clips up to line one and make a call. When the person
picks up, hook your black clip to line 2 where you would normally put your red
clip, and hook up the yellow where you would normally put the green. You'll get
a dial tone. You can hook the terminals of more than one better Beige Box
together to add more people to your call, but you will have to amplify the
speech so that everyone can hear.


ANARCHY IN '93!!!!!


-----------------------------------------------------------------------
Anarchist's quickie --
Throw a coke in someone's freezer!
-----------------------------------------------------------------------

ASKi Phile #10
The Theory of Self-Reproductive Software

Many people still think the subject of viruses is taboo. Fueled by the
media and led by self-righteous assholes who think they know something of
computer science, everyone seems to think viruses are always evil!! There are
now groups of IS dickheads who using threats and harassment to intimidate
SysOps who spread viruses!!! Even PHRACK made a statement against the spread
of virus info, calling it boring and dangerous. Well, I find viruses (and
worms, etc...) very interesting and possibly very helpful. This section will
be a chronicle of my own exploration into this subject. I will include source
code examples, sometimes in B.A.S.I.C., but mostly in C, when I can. This issue
I will be discussing helpful viruses and worms.
When discussing the usefulness of reproductive code it is important
first to define exactly what viruses, worms, and trojans are. Trojans are not
self reproductive, they are standard programs that have a hidden function that
is unknown to the user. They are often used to plant a virus or a worm in a
unsuspecting host. A virus is a program that spreads through systems and
networks by taking control of other programs and waiting for the user to
execute them. This can often mean destroying the host program, but, in more
powerful viruses, the host is left unharmed. A worm is a program that spreads
on it's own accord, without the use of host programs. The worm creates child
worms, and executes them before leaving them to spread farther. Although
viruses and trojans can occur in almost any environment, worms normally only
occur in multitasking systems where more than one worm can be running at one
time.
The idea of a reproductive program originated in the seventies in a
book called "The Shockwave Rider" in which a hacker used an Internet style worm
to crash the government's systems and thus, overthrow it. The first actual
worms where helpful! Developed for LANs, one spread through the LAN looking for
problems, another searched for open system room and worked on problems, letting
the power go when something else wanted it. Worms such as these could be used
in WANs and LANs for system maintenance and software upgrades. Imagine how
quickly and easily a nodelist could be updated if a worm was sent out to deploy
the new version, destroying itself once it's mission was accomplished!
Another possibility is the anti-virus virus (or worm). This virus would
spread through a system, infecting disks and connected systems whenever it can.
Once on a disk, it would make sure it wasn't already infected, and if not, it
would infect the most frequently run program on the disk, and then do a virus
scan, killing any that it finds. This program could also do other maintenance
on disks and would automatically add itself to any new disk added to the
system. A program such as this could run through a LAN or WAN, doing
maintenance and quickly getting onto other systems that are added in.
John C. Dvorak proposed a info searching virus. This virus would go
through the net looking for info on a specific topic and bring it back to the
originating system, killing itself once it is finished. This virus would be of
great help in today's internet, where there are literally thousands of gigs of
data. With this program a search would take hours instead of weeks.
The fourth possibility I am going to discuss is the possibility of
soft-ICE (Incursion Counter-Electronics). Soft-ICE would not be able to kill a
hacker, but it would be able to defend against him. ICE could monitor every
account and look for suspicious activity. It could shut down accounts that are
being attacked and, if on a net, it could shut down accounts on systems the
hacker has gone through. It could even be deployed on a black balling mission.
If someone's account has been hacked, the ICEworm could go through the net and
tell other systems to shut down that account until the user has been notified.
Finally, it is important to note the computer virus's power as an
artificial life form. Everyone knows that computer viruses and worms are
capable of self-reproduction, self-preservation, and in many cases, consumption
and waste disposal. But did you know that they are capable of evolution and
natural selection?! Imagine if a computer virus was designed to modify it's
self randomly every 20th time it copied??? The virus would evolve after a
few hundred generations and the new, better virus would eventually spread
far beyond its ancestor, possibly even causing it's ancestor to become extinct!
This virus would not be limited in the extent to which it could spread, and
years after it's creation it might start forming intelligence!!! Thousands of
years from now, if the virus kept up with technology, it might form emotions
and even self awareness!! Artificial life is a very important and interesting
science. The things it teaches us about the natural world are astounding, not to
mention the excitement of creating our own LIVING organisms and species on a
computer and seeing how the survive in their environment!!! Computer Viruses
are a very important part of artificial life research. Despite what the
anti-virus "experts" may have told you (while covering their own political
asses), they are the first artificial life programs ever released out into the
"wild" to inter-relate on their own. The potential for future use they have is
almost unlimited. If their authors had added evolutionary processes to their
code, many would have lost their damaging functions by now and would be gaining
intelligence and defence mechanisms! Viruses in private experiments have
evolved to amazing levels. Computer viruses as an artificial life form may
eventually change how scientists look at the universe! Control the use and
study of computer viruses, and you might prevent a revolutionary scientific
discovery!
Next edition I will be discussing overwriting viruses with some C
source...I will be consulting Phalcom/Skism on some virii. They are the
leading authorities in virus creation.




ASKi Phile #11
The Lighter Side

THE VAXORCIST
-------------

(SCENE: Inside of a VAX computer room. CREDITS ROLL as the SYSMGR is
sitting in front of the console terminal, typing. He pauses, picks up a
small magnetic tape, walks over to a tape drive, mounts it, and returns to
the console where he continues typing.)

(There is a knock at the door. SYSMGR walks to the door and opens it,
revealing USER.)

USER: Any idea when the system will be up?

SYSMGR: Well, I just installed version 5.0 of VMS, so I'm going to run
some diagnostics on it overnight to make sure it works alright. Assuming
everything goes alright, the system should be up first thing tomorrow
morning.

USER: Great. Thanks. (Exits)

(SYSMGR closes the door and returns to the console.)

ROD SERLING-LIKE VOICE: This is John Smith, Lawrence Technological University
System Manager. In an effort to make his system the best it can be, he has just
installed VMS Version 5.0 onto his VAX. But little does he know that the
Version 5 documentation kit from Digital includes a one-way ticket to ...
the VMS TWILIGHT ZONE!

(ominous music - fade out)

(Fade in. The SYSMGR scans the console for a moment, then turns, picks up
his coat and walks to the door. He stops at the door for a moment, looking
back at the big machine. Finally, he turns out the light and exits,
closing the door behind him.)

(Cut to the Console Terminal. We read the following as it is printed on
the console terminal:)

VMS V5.0 DIAGNOSTICS --

DIAGNOSTICS - PHASE 1 STARTING...

DIAGNOSTICS - PHASE 1 FINISHED SUCCESSFULLY.

DIAGNOSTICS - PHASE 2 STARTING...

TESTING MICROCODE ... SUCCESSFUL

TESTING DECNET ... SUCCESSFUL

TESTING LICENSE MANAGEMENT UTILITY ... SUCCESSFUL

TESTING SYSTEM SERVICES ... SUCCESSFUL

TESTING HIGHLY EXPERIMENTAL AND COMPLETELY UNDOCUMENTED AI ROUTINE ...

(Cut to view of the Tape in the Tape drive. The tape spins for a moment,
and suddenly stops.)

(Cut to view of the Machine Room. A fog has begun drifting across the
floor, and the hardware is slowly being backlit by a pulsing red light.
A peal of weird laughter cuts through the silence. A variety of bizarre
things occur: A VT100 monitor sitting on a table slowly rotates 360
degrees; the tape drive opens and tape begins spewing out of it; slime
begins pouring out of a disk drive; the line printer begins form-feeding
like mad. These continue for several minutes, or for as long as we can
keep them up. FADE OUT)

(SCENE: Hallway outside of the computer room. SYSMGR walks up to the door
and is met by USER.)

USER: System going to be up soon?

SYSMGR: (as he speaks, he tries to open the Machine room door, but the
door is apparently stuck.) The diagnostics should be done by now, so we
should be up in about 15 minutes... (he succeeds in opening the door, but
is confronted by floor to ceiling magnetic tape. Tangled at about eye
level is an empty tape reel. SYSMGR takes the reel and looks at it. CLOSE
UP of the reel so we can read the label, which reads: VAX/VMS V5.0
DIAGNOSTIC KIT.) (to USER) ...give or take a few days....

(SCENE: View of TSR (Telephone Support Rep) from behind as she is sitting
in a cubicle, a terminal in front of her. Beside her on the wall is a
poster which reads "Digital Has It Now - But You Can't Have It". We can
see the terminal, but we should not be able to read what is on it. She is
wearing a headset.)

TSR: Colorado Customer Support. What is your access number, please?

SYSMGR VOICE: 31576

TSR: And your name?

SYSMGR VOICE: John Smith.

(Cut to SYSMGR standing beside his console. He his holding a phone to his
head with his right hand, and holding a printout in his left which he is
perusing while he talks on the phone.)

TSR VOICE: And what operating system are you using?

SYSMGR: VMS version 5.

TSR VOICE: And is this a problem with the operating system or a layered
product?

(As the SYSMGR looks up from the printout, his eyes suddenly widen and
he drops the printout and ducks. At that second, a disk platter flies
through the air where his head just was. Slowly, SYSMGR stands up and
looks to where the disk went. PAN BACK to reveal a stack of boxes with a
disk embedded in one of them at neck height.)

SYSMGR: (into the phone) Operating System. Definitely the Operating System.

(Cut back to TSR sitting at her desk.)

TSR: Can you describe the problem, please?

(SYSMGR voice can now only be heard as mumbling)

TSR: Yes... Tape drive spewing tape into the air... yes... Line printers
printing backwards... yes... miscellaneous hardware flying through the
air... uh huh... disk drives melting... yeah... strange voices coming from
the CPU board... I see... yes. Is that all? (pause as she finishes typing
at the terminal) Well, I'm afraid that that team is busy at the moment,
can I have them get back to you?

(CUT TO SCENE: MANAGER sitting behind a large desk in a plush office.
DEVELOPER is pacing in front of him, hands behind his back.)

(SUBTITLE: Meanwhile at Maynard...)

MANAGER: So tell me! What the hell happened?!

DEVELOPER: (turning to face MANAGER) It's a glitch, a fluke. A one in a
billion chance. And it's not Development's fault. Not really.

MANAGER: Then who's fault is it?

DEVELOPER: We traced it back to the Software Distribution Center. It
seems that there was a mixup and some of the code for the experimental AI
routine was copied onto the distribution from the wrong optical disk. (He
removes a CD from his jacket) This one, to be precise.

MANAGER: And what's that?

DEVELOPER: (reading the label) "Ozzy Osbourne's Greatest Hits".
Normally, it wouldn't have made any difference, as the AI routine isn't
used yet. But when they began running diagnostics, it hit the routine and
the computer just sort of became a thing possessed.

MANAGER: Wonderful. Were any other distributions affected?

DEVELOPER: No, just Lawrence Tech's.

MANAGER: Well, that's a relief. We've got to get them taken care of
before anyone finds out. Can you imagine what Digital Review would do
if they heard about this?

DEVELOPER: We could always blame it on the Chaos Computer Group.

MANAGER: No, we've already used that one. This calls for drastic action.
(MANAGER picks up the phone and begins flipping through the rolodex)

DEVELOPER: Who are you going to send?

(CUT to the Rolodex so that we can read the cards. The first card reads:

SYSTEM PROBLEMS - Ron Jankowski, x474

he flips to the next card:

BAD SYSTEM PROBLEMS - Bob Candless, x937

he flips to the next card:

REALLY BAD SYSTEM PROBLEMS - Michelle French, x365

he flips to the next card

OUTRAGEOUSLY BAD SYSTEM PROBLEMS - Mike West, x887

he flips to the next card and taps the card with forefinger:

SYSTEM FUCKED UP BEYOND ALL RECOGNITION - The VAXorcist, x666


(CUT to Machine Room. SYSMGR is standing by the console holding
an RA60 disk cover and using it as a shield to defend himself from various
pieces of hardware which are flying at him from off-camera. There is
a knock at the door. Slowly, SYSMGR makes his way to the door and opens
it. Standing there, backlit amidst outrageous amounts of fog is the
VAXORCIST, wearing a trench coat and fedora, and carrying a briefcase.)

VAXORCIST: (in a hushed voice) DEC sent me. I hear you're having some
problems.

(CUT to SYSMGR OFFICE, a small but pleasant office with posters on the
walls and clutter on the desk. As the VAXORCIST enters, he removes his
coat and hat, revealing a very techie outfit beneath. He is wearing a DEC
badge.)

SYSMGR: (Frantic) Problems? Problems?!? You could say I'm having some
problems. 4.6 was fine. 4.7 was fine. I install 5.0 and all Hell breaks
loose. The damn thing ate two of my operators this morning!

VAXORCIST: Calm down, everything will be alright. I've dealt with
situations like this before.

SYSMGR: You have?

VAXORCIST: Four years ago at an installation in Oregon, a programmer
renamed his Star Trek program to VMB.EXE and copied it into the system
directory. When the system was rebooted the next day it phasored the
entire accounting department claiming that they were Klingon spies. There
was a similar problem in Texas three years ago, and then, of course, there
was the IRS fiasco that we're not allowed to talk about. But don't worry.
These things can be fixed. Before I can help you, though, I have to ask
you a few questions. (The VAXorcist opens his briefcase and removes a
clipboard) Now, according to the report, the strange occurences began after
you installed VMS Version 5, is that correct?

SYSMGR: Yes, that's correct.

VAXORCIST: Now, did you carefully read the Installation Guide for VMS
Version 5?

SYSMGR: (confused) Installation Guide?

VAXORCIST: Yes, it should have come with the Release Notes.

SYSMGR: (still confused) Release Notes? (SYSMGR begins rooting about on
his disk, shifting papers around as if he might find them underneath)

VAXORCIST: (annoyed) Yes, Release Notes. They should have come with your
documentation upgrade.

SYSMGR: (completely confused - looks up from his rooting through the
papers on his desk) Documentation upgrade?

VAXORCIST: (angry) YES! The Documentation upgrade for your VMS
Documentation Set!

SYSMGR: Documentation S...? Oh, you mean the grey binders? They're over
there. (he points to the wall behind the VAXORCIST. The VAXORCIST turns
and we see a closed glass-front bookcase packed with grey binders. A small
red sign on the front of the bookcase reads: "IN CASE OF EMERGENCY, BREAK
GLASS").

VAXORCIST: Right. This is going to be tougher than I thought. Let's go
take a look at your system and see just how bad everything is.

(CUT to the Machine Room. The room is neat and tidy and there is no sign
that anything is wrong. The VAXORCIST enters the room with the SYSMGR
behind him.)

VAXORCIST: Everything looks okay to me.

SYSMGR: Maybe it's hibernating.

VAXORCIST: Unlikely. It's probably trying to lure us into a false sense
of security.

SYSMGR: Sounds like VMS alright. (VAXORCIST gives him a dirty look)

VAXORCIST: I'm going to have to test it's power. This could get ugly, you
may want to leave. (The SYSMGR shakes his head no. The VAXORCIST brings
hiself up to full height in front of the VAX and points a finger at it)
By the power of DEC, I expel thee from this system! (Clap of thunder)

(CUT to door to the machine room. The SYSMGR is pulling a cart on which
sits the VAXORCIST wrapped from head to toe in magnetic tape)

SYSMGR: Any other bright ideas?

VAXORCIST: Just shut up and get this damn stuff off of me.

(CUT to SYSMGRs office)

VAXORCIST: (Writing on the clipboard) Things look pretty bad. I think
we're going to need a full-scale VAXorcism here.

SYSMGR: Is there anything I can do to help?

VAXORCIST: As a matter of fact, there is. We've got to incapacitate the
VAX to keep it from causing any more damage until I'm ready to deal with
it. Now, I've got some software here that will do that, but it's got to be
installed. (VAXORCIST hands SYSMGR a tape) With that running, the CPU
will be so bogged down, the VAX won't be able to harm anybody.

SYSMGR: (Examining the tape) What is it? A program to calculate pi to the
last digit?

VAXORCIST: Better than that. It starts up All-in-1 with a 10 user load.

(CUT to Hall outside of Computer Room. The VAXORCIST approaches the door.
As the SYSMGR approaches the door, the VAXORCIST holds him back.

VAXORCIST: I appreciate your help, but it won't be safe for you in there.

SYSMGR: What? You're going in there to face that thing alone? You're
nuts!

VAXORCIST: Hey, it's my job. (VAXORCIST turns to the door)

SYSMGR: Wait a minute. (VAXORCIST stops and turns around) You better
take this with you. (SYSMGR removes a very large and very nasty looking
gun from the inside of his jacket)

VAXORCIST: (Smiling) No, I won't need that. I've got something more
powerful. (VAXORCIST holds up a small guide-sized orange binder, opens it,
and shows it to SYSMGR. CUT to closeup of the book which reads: "GUIDE TO
VAX/VMS SYSTEM EXORCISM")

(CUT to view of Machine room door as seen by the VAX. The VAXORCIST enters
the room and stands in front of the VAX. CUT to view of the Machine Room
showing the SYSMGR confronting the VAX)

VAXORCIST: By the power of DEC, I command thee, Evil Spirit, to show
thyself.

VAX: Bugger off.

VAXORCIST: (Shaken) What?

VAX: I said Bugger off! Now get out of here before I core-dump all over
you!

VAXORCIST: (Recovered) Threaten me not, oh Evil one! For I speak with
the power of DEC, and I command thee to show thyself!

(A rumble is heard and again the VAX becomes backlit by red lights and a
fog begins to roll across the floor. The VAX cabinet doors slowly creak
open to reveal two small red lights in the dark cabinet which appear to be
the creature's eyes)

VAX: There. Happy? Now get out of here before I drop a tape drive on
your private parts.

VAXORCIST: (Opening the orange binder, he begins intoning SHUTDOWN.COM in
gregorian chant. The VAX screams.)

VAX: Stop that! Stop that! You, you DOS LOVER! Your mother manages RSX
systems in Hell!

(The VAXORCIST continues and the VAX screams again.)

VAX: Stop it! (a large wad of computer tape is thrown at the VAXORCIST,
apparently from the VAX). Eat oxide, bit-bucket breath!

(The VAXORCIST continues and the VAX screams once more.)

VAX: Mount me! Mount me!

VAXORCIST: (finishing the intonation) And now, by the power of DEC, I
banish thee back to the null-space from which you came! (The VAX screams
and the scream fades to silence.)

(CUT to the doorway of the Machine room, which now stands open. The
VAXORCIST is once again wearing his trench coat and fedora.)

SYSMGR: So it's over?

VAXORCIST: (Putting his hat on) Yes, it's over.

SYSMGR: (Shaking the VAXORCISTs hand) Thank God. Listen, thanks a lot. I
don't know what we would have done without you.

VAXORCIST: Hey, it's the least we could do. The Software Distribution
Center should be sending you a patch tape in a week or two to patch out
that AI routine and prevent this from happening again. Sign here. (he
hands SYSMGR the clipboard, SYSMGR signs at the bottom and hands it back)
Have a good one. (VAXORCIST leaves).

(SYSMGR enters the machine room. Camera follows him in.)

SYSMGR: (Calling to someone off-camera) Okay, you guys, let's get
rolling. Get those backup tapes out. We've got a clean system again!
(cheers are heard from off-camera. The SYSMGR leaves the picture, leaving
only the VAX with it's cabinet doors still open in the picture. Slow zoom
in to the LSI unit. Slowly, the LSI unit begins to emit a pulsing red
glow)

Submit your humorist column to The White Ninja on TND or WHITENINJA@AOL.COM


ASKi Phile #12

ÉÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ»
ºNews from Cyberspaceº
ÈÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍͼ
By:
The White Ninja
and
Wild Child


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Northern Telecom:

Northern Telecom has announced a new software enhancement to its S/DMS
SuperNode digital multiplexing system. This system will make it easier for
people to access and use large bandwidth services such as video-
conferencing, data communications and image processing over the public
payphone network.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
ISDN:

The Public Service Commission has been giving Bell serious pressure in order to
get ISDN rolling here in TN!!! It will be affordable, fully featured, and widely
available here thanks to the PSC... The Ninja's Domicile (615) 370-8805, ASKi
Headquarters, will be going ISDN and Multi-node soon! Possibly the first
hack/phreak/phree speech BBS in the world with ISDN!!!! Notable names
reviewing the PSC's ISDN legislation?

Jerry Dunlap: Local Fidonet and Ournet hub and leader of the private ISDN for
TN group!

The EFF: 'Nuff said...

The AARP: FUCK! They have just about nothing to do with ISDN, damnit! The guy
who sweeps the floors at SCB's computer center on Franklin Road should
review the damn laws before THEY do!!! Yes, these are the selfish assholes
who's political clout keeps laws like the social security act alive!! Yes,
Social security, that neat little law which has been engineered over the
years by now elderly politicians so that the entire economy is rigged to pay
for their caddies and condos!! Yes, this is the law that provides for a system
which:
A. Is the single largest expense in the USA's economy! Even bigger than the
military!!!!
B. Takes money from the country's largest generation (NOT the Baby Boom!
Those born AFTER 1961, the 13th gen., are more numerous!) and gives it to
it's smallest... Not to mention the fact that the country's largest
generation is the poorest generation to live this century (before taxes!),
and elderly, who, to put it bluntly, will be dead in 20 years, are one of
the richest (before SS!!!) Jesus!
C. Has enough money RIGHT NOW to PAY OFF the NATION DEFICIT, with enough LEFT
OVER to help those few who really DO need their SS checks!
D. Will be completely broke in 30 years, after the ones responsible for that
are dead.
These people's involvement is the only thing wrong with ISDN!!! We better
hope that they don't decide to back a 10% tax on ISDN to (sob) give a little
extra help (sob) to our (sob) senior citizens (sob). JESUS! Can't wait till
'98!!!! Down with the AARP!!!!

One point we think the PSC should be sure not to ignore is ease of use...
Right now ISDN is a major PAIN to install!!! You have to be a phone phreak
or a telco employee to understand the damn multi-page registration form! The
hardware installation isn't for beginners either!! We are more than happy
about the efforts to support ISDN in TN, but most people can't even wire
in phone jacks and they would have a hell of a time trying to get this stuff
done!! This definitely needs to be looked at soon, as five years from now
BROADBAND with fiber will start to move and if we can't get ISDN going we can
forget about it! We'll end up getting digital service from someone who has
no idea what their doing (like the damn Cable company hahaha)...

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
27th Amendment

Thanks to Death Angel the 27th Amendment now has its own demo proclaiming
phreedom of information in cyberspace! Supports VGA and Soundblaster!
The demo should be found on all ASKi/AQUANET BBS.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
615

Apparently a few more people are moving into 615 than expected and SCB needs
some exchanges, so... they are requiring that everyone dial 1-615 even when
calling between class five switches in 615... (This doesn't apply to local
calls)... I'm not quite sure how this is going to provide them with more
numbers, but with ISDN coming soon (I.E. each line can have like 100 numbers
attached to it...) methinks we can expect a new area code around here next
year. Possibly 9 or 10 digit phone numbers will show up if this area becomes
the national example for ISDN that everyone is pushing for...

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
ASKi

We now have an ASKi member attending Def Con 1 out in Las Vegas!
ASKiNews will give you the low-down on what goes on. Party on!!
ASKiNews also has a member attending the Con in Europe in Aug.
Be sure you will hear about it from us first!
Here's the info for both cons!

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
D E F C O N I C O N V E N T I O N
D E F C O N I C O N V E N T I O N
DEF CON I CONVENTION
D E F C O N I C O N V E N T I O N

>> READ AND DISTRIBUTE AND READ AND DISTRIBUTE AND READ AND DISTRIBUTE <<


Finalized Announcement: 6/12/1993

We are proud to announce the 1st annual Def Con.

If you are at all familiar with any of the previous Con's, then you
will have a good idea of what DEF CON I will be like. If you don't have any
experience with Con's, they are an event on the order of a pilgrimage to
Mecca for the underground. They are a mind-blowing orgy of information
exchange, viewpoints, speeches, education, enlightenment... And most of all
sheer, unchecked PARTYING. It is an event that you must experience at least
once in your lifetime.

The partying aside, it is a wonderful opportunity to met some of the
celebrities of the underground computer scene. And those that shape its
destiny - the lawyers, libertarians, and most of all the other There will
be plenty of open-ended discussion on security, telephones and other
topics. As well as what TIME magazine calls the "Cyberpunk Movement".

Las Vegas, is as you might have guessed a great choice for the Con.
Gambling, loads of hotels and facilities, cheap air fare and room rates.
It's also in the West Coast making it more available to a different crowd
than the former Cons have been.

Your foray into the scene and your life will be forever incomplete
if by some chance you miss out on DEF CON I. Plan to be there!


WHO: You know who you are.
WHAT: Super Blowout Party Fest, with Speakers and Activities.
WHERE: Las Vegas, Nevada
WHEN: July 9th, 10th and 11th (Fri, Sat, Sun) 1993
WHY: To meet all the other people out there you've been talking to for
months and months, and get some solid information instead of rumors.


DESCRIPTION:

So your bored, and have never gone to a convention? You want to meet
all the other members of the so called 'computer underground'? You've been
calling BBS systems for a long time now, and you definitely have been
interacting on the national networks. You've bullshitted with the best,
and now it's time to meet them in Vegas! For me I've been networking for
years, and now I'll get a chance to meet everyone in the flesh. Get
together with a group of your friends and make the journey.

We cordially invite all hackers/phreaks, techno-rats, programmers,
writers, activists, lawyers, philosophers, politicians, security officials,
cyberpunks and all network sysops and users to attend.

DEF CON I will be over the weekend in the middle of down town Las
Vegas at the Sands Hotel. Why Las Vegas? Well the West Coast hasn't had
a good Convention that I can remember, and Las Vegas is the place to do it.
Cheap food, alcohol, lots of entertainment and, like us, it never sleeps.
We will have a convention room open 24 hours so everyone can meet and plan
and scheme till they pass out. Events and speakers will be there to provide
distraction and some actual information and experiences from this loosely
knit community.

This is an initial announcement. It is meant only to alert you to
the time, dates and location of the convention. Future announcements will
inform you about specific speakers and events.

An information pack is FTPable off of the internet at nwnexus.wa.com,
in the cd/pub/dtangent directory. The IP# is 192.135.191.1 Information
updates will be posted there in the future as well as scanned map images and
updated speaker lists.

FINAL NOTES:

COST: How you get there is up to you, but United Airlines will be
the official carrier (meaning if you fly you get a 5% to 10% price reduction
off the cheapest available fare at the time of ticket purchase) When buying
airline tickets, call 1-800-521-4041 and reference meeting ID# 540ii. Hotel
Rooms will cost $62 per night for a double occupancy room. Get your friends
together and split the cost to $31. Food is inexpensive. The entertainment
is free inside the hotel. Reference the DEF CON I convention when
registering, as we have a block of rooms locked out, but once they go it will
be first come, fist serve. Call 1-800-634-6901 for the reservations desk.

The convention itself will cost $30 at the door, or $15 in advance.
It pays to register in advance! Also it helps us plan and cover expenses!
Mail checks/money orders/cashiers checks to: DEF CON I, 2709 East Madison
Street, #102, Seattle, WA, 98112. Make them payable to: "DEF CON" we're not
tring to make money, we will be tring to cover costs of the confrence room and
hotel plus air fair for the speakers who require it. Don't bother mailing it
a week in andvance, that just won't happen. Advanced registration gets you a
groovy 24 bit color pre-generated name tag. Include with your payment the
name you want listed, your association/group affiliation/bbs/whatever, email
address, and/or bbs number for syops. Last day for the registrations to reach
me will be July 1st.

SPEAKERS: We have solicited speakers from all aspects of the
computer underground and associated culture (Law, Media, Software Companies,
Cracking Groups, Hacking Groups, Magazine Editors, Etc.) If you know of
someone interested in speaking on a self selected topic, please contact The
Dark Tangent to discuss it.

FOR MORE INFORMATION:

For initial comments, requests for more information, information
about speaking at the event, or maps to the section where prostitution is
legal outside Las Vegas (Just Kidding) Contact The Dark Tangent by leaving
me mail at: dtangent@dtangent.wa.com on the InterNet.

Or call: 0-700-TANGENT for conference information/updates and to leave
questions or comments.
Or Snail Mail (U.S. Postal Service) it to DEF CON, 2709 East Madison Street,
#102, Seattle, WA, 98112.

Future information updates will pertain to the speaking agenda.

------------------------------------------------------------------------------
Updates since the last announcement:

>> The Secret Service is too busy to attend.
>> New Media Magazine, Unix World and Robert X. Cringly have stated they will
attend.
>> We got a voice mail system working for comments and questions.
>> We don't have enough $$$ to fly out the EFF or Phillip Zimmerman (Author
of PGP) or Loyd Blankenship.
>> Judi Clark will be representing the CPSR and a few other organizations

++ National Public Radio will cover the event
++ Mark Ludwig (Autor of the little black book of computer viruses and
virus developements quartly will attend and hand out an award
++ Dan Farmer will be speaking on unix security developements

Don't forget to bring a poster / banner representing any of the groups you
belong to. I want to cover the conferece room walls with a display of all
the various groups / people attending. (Break out the crayons and markers)

------------------------------------------------------------------------------



DEF CON I CONVENTION [PROPOSED SPEAKING SCHEDULE UPDATED 5.31.1993]

Saturday the 10th of July 10am, Sands Hotel, Las Vegas



INTRODUCTION Welcome to the convention
*The Dark Tangent (CON Organizer)

Keynote speaker Cyberspace, Society, crime and the future.

To hack or not to hack, that is not the question
*Ray Kaplan

Civil Libertarians
-CPSR Computer Privacy/1st Ammendment/Encryption
Gender Rolls and Discrimination
*Judi Clark

-USC Comp. Law Legalities of BBS Operation, message content
laws and network concerns.
*Allen Grogan, Editor of Computer Lawyer

'The Underworld'
-Networking Concerns of National Networking
of CCi (Cyber Crime International) Network.
*Midnight Sorrow.

Corporations
-Packet Switching
SPRINT Concerns/security and the future
MCI of packet switching.
(*Jim Black, MCI Systems Integrity)

Misc Common misbeliefs and rumors of the underground
*Scott Simpson

-Virtual Reality The law, and it's intersection with VR
*Karnow

-Virus Related Virus developements and concerns
*Mark Ludwig (The little Black Book of Viruses)

-Unix Security Future developements in unix security software,
Qeneral Q&A on unix security
*Dan Farmer

-System Administrator Security Concerns of an Administrator
*Terminus

The 'Underworld'
-Internet The security problems with Internet/Networks
Overview of hacking
*Dark Druid

-Getting Busted The process of getting "busted"
*Count Zero

-How to be a nobody Hiding your identity in the high-tech future, or
The payphone is your friend.
*TBA-nonymous

-The Prosecutors Their concerns/problems and
Hacker Hunters suggestions for the 'underworld'/Q&A

-The Media The effect of the media on public perceptions
*Erik Bloodaxe / Phrack Magazine

CONCLUSION General Q&A


This itenerary is proposed, and topics and speakers will be marked as
permanant once a confirmation is recieved. This is by no means the exact
format of DEF CON I. Any Questions / Comments Contact:

ftp nwnexus.wa.com /pub/dtangent for more info.

dtangent@dtangent.wa.com
Voice Mail 0-700-TANGENT (Must use AT&T, so use the equal access code if
necessary)
------------------------------------------------------------------------------
[> DEF CON I and United Airlines Travel Arrangements <]


United Airlines has been chosen as the official carrier for DEF CON I
and is pleased to offer a 10% discount off the unrestricted BUA coach fare or
a 5% discount off the lowest applicable fares, including first class. This
special offer is available only to attendees of this meeting, and applies to
travel on domestic segments of all United Airlines and United Express flights.
A 5% discount off any fare is alsoavailable for attendees traveling to or from
Canada in conjunction with your meeting. These fares are avaliable through
United's Meeting Desk with all fare rules and restrictions applying.

Help support the DEF CON I Confrence by securing your reservations
with United Airlines. To obtain the best fares or schedule information,
please call United's Specialized Meeting Reservations Center at 1-800-521-4041.
Dedicated reservationists are on duty 7 days a week from 7:00 a.m. to 1:00 a.m.
ET. Please be sure to reference ID number 540II. You or your travel agent
should call today as seats may be limited.

As a United Meeting attendee you qualify for special discount rates
on Hertz rental cars. Milage Plus members recieve full credit for all miles
flown to this meeting.

Tickets will be mailed by United or you can pick them up at your
local travel agency or United Airlines ticket office.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Hack-Tic presents:

-------------------------------------------------------------------
H A C K I N G A T T H E E N D O F T H E U N I V E R S E
-------------------------------------------------------------------

An 'in-tents' summer congress



H U H?
+-------

Remember the Galactic Hacker Party back in 1989? Ever wondered what
happened to the people behind it? We sold out to big business, you
think. Think again, we're back!

That's right. On august 4th, 5th and 6th 1993, we're organising a
three-day summer congress for hackers, phone phreaks, programmers,
computer haters, data travellers, electro-wizards, networkers, hardware
freaks, techno-anarchists, communications junkies, cyberpunks, system
managers, stupid users, paranoid androids, Unix gurus, whizz kids, warez
dudes, law enforcement officers (appropriate undercover dress required),
guerilla heating engineers and other assorted bald, long-haired and/or
unshaven scum. And all this in the middle of nowhere (well, the middle
of Holland, actually, but that's the same thing) at the Larserbos
campground four metres below sea level.

The three days will be filled with lectures, discussions and workshops
on hacking, phreaking, people's networks, Unix security risks, virtual
reality, semafun, social engineering, magstrips, lockpicking,
viruses, paranoia, legal sanctions against hacking in Holland and
elsewhere and much, much more. English will be the lingua franca for
this event, although some workshops may take place in Dutch. There
will be an Internet connection, an intertent ethernet and social
interaction (both electronic and live). Included in the price are four
nights in your own tent. Also included are inspiration, transpiration,
a shortage of showers (but a lake to swim in), good weather
(guaranteed by god), campfires and plenty of wide open space and fresh
air. All of this for only 100 dutch guilders (currently around US$70).

We will also arrange for the availability of food, drink and smokes of
assorted types, but this is not included in the price. Our bar will be
open 24 hours a day, as well as a guarded depository for valuables
(like laptops, cameras etc.). You may even get your stuff back! For
people with no tent or air mattress: you can buy a tent through us for
100 guilders, a mattress costs 10 guilders. You can arrive from 17:00
(that's five p.m. for analogue types) on August 3rd. We don't have to
vacate the premises until 12:00 noon on Saturday, August 7 so you can
even try to sleep through the devastating Party at the End of Time
(PET) on the closing night (live music provided). We will arrange for
shuttle buses to and from train stations in the vicinity.


H O W ?
+-------

Payment: In advance only. Even poor techno-freaks like us would like
to get to the Bahamas at least once, and if enough cash comes in we
may just decide to go. So pay today, or tomorrow, or yesterday, or in
any case before Friday, June 25th 1993. Since the banks still haven't
figured out why the Any key doesn't work for private international
money transfers, you should call, fax or e-mail us for the best way to
launder your currency into our account. We accept American Express,
even if they do not accept us. But we are more understanding than they
are. Foreign cheques go directly into the toilet paper recycling bin
for the summer camp, which is about all they're good for here.


H A !
+-----

Very Important: Bring many guitars and laptops.


M E ?
+-----

Yes, you! Busloads of alternative techno-freaks from all over the
planet will descend on this event. You wouldn't want to miss that,
now, would you?

Maybe you are part of that select group that has something special to
offer! Participating in 'Hacking at the End of the Universe' is
exciting, but organising your very own part of it is even more fun. We
already have a load of interesting workshops and lectures scheduled,
but we're always on the lookout for more. We're also still in the
market for people who want to help us organize this during the
congress.

In whatever way you wish to participate, call, write, e-mail or fax us
soon, and make sure your money gets here on time. Space is limited.


S O :
+-----

> 4th, 5th and 6th of August

> Hacking at the End of the Universe
(a hacker summer congress)

> ANWB groepsterrein Larserbos
(Flevopolder, Netherlands)

> Cost: fl. 100,- (+/- 70 US$) per person
(including 4 nights in your own tent)


M O R E I N F O :
+-------------------

Hack-Tic
Postbus 22953
1100 DL Amsterdam
The Netherlands

tel : +31 20 6001480
fax : +31 20 6900968
E-mail : heu@hacktic.nl

V I R U S :
+-----------

If you know a forum or network that you feel this message belongs on,
by all means slip it in. Echo-areas, your favorite bbs, /etc/motd, IRC,
WP.BAT, you name it. Spread the worm, uh, word.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Billy Idol

What's the story on Idol's new album, CYBERPUNK? Well, apparently he
always thought computers were for "nerds" until he read Neuromancer. This
book turned his opinions completely around! He talked to Gibson and got online
on the Well, he became interested in freedom of knowledge and information, and
he is releasing this album as an expression of this new found counter-culture.
However, as usual, whenever anyone in the main stream media tries to do
anything relating the Cyberpunk subculture there are always a bunch of people
who are pissed off about it. On usenet in the alt.cyberpunk newsgroup a bunch
of people started flaming Idol 'cause they didn't think he was on the network
or involved with computer science, they just saw him as someone trying to leech
a few bucks off of the culture... Well, they were proven wrong when Idol did
show up on the network and posted the following...

> From: idol@well.sf.ca.us (William Broad) Newsgroups: alt.cyberpunk
> Organization: The Whole Earth 'Lectronic Link, Sausalito, CA
>
> I've been cruising through alt.cyberpunk and feel compelled to respond
> to the number of inaccuracies about me and my new album CYBERPUNK.
> First of all, I would like someone to come forward and tell me exactly
> when I called MYSELF a cyberpunk. I have never positioned myself as an
> expert in this technology. Listen. I called it CYBERPUNK because I was
> revved up by the DIY energy of the Gibson novels and the high-tech
> underground. When I started making music in the '70s, the punk ethic
> was to be able to play and sing--regardless of knowledge and talent.
> And, obviously, I didn't have much of either. When I discovered that
> cyberpunk was carrying on the philosophy of putting information back
> into the hands of the people, I got excited. That's what I'm about.
> You're elitism is total bullshit. Anyone with a modem and a computer
> can get into cyberspace. That's why I got in here in the first place
> to share ideas instead of shutting each other out. I ain't no rock
> star. I am an eager student. This way I can maneuver through the net,
> learning, talking, arguing, and all of that. Basically, fuck all of
> you who question my motives and/or integrity. You just don't get it.
> billy idol

After proving he was connected and involved with the network, much of the
flaming continued, people flamed him, his music, the magazines which
advertised his music, so on and so forth... Most of them hadn't even heard
the CD!!!! Personally I think its a bunch of bull shit... It seems to me like
Idol is genuinely interested in the Cyberpunk "movement." There are a lot of
people who think that they are K-rad Cyberpunks and that noone from the
outside world could ever reach their level of understanding! They don't want
everyone and his brother on the network because then they wouldn't be
"special." Jesus... I believe that EVERYONE should be on the network... My
self-esteem isn't based on the fact that I'm a K-rad computer hacker! I believe
Idol's CD will make the net a lot more "mainstream" and will bring a large
number of new people online. We owe him a debt of gratitude for showing the
world what we believe and getting people interested in the net. We have always
said that if the network was made accessible to the public that people would
join and they would be interested in it for the same reasons that we are!
The whole world would be a part of the internet and information and knowledge
would flood everywhere like the Mississippi! Well, its happening, so stop
being a bunch of assholes and enjoy the revolution we have founded! The future
is here!

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Execution

(Associated Press, April 26)-- A man accused of invading a computer
and embezzling some $192,000 has been executed in China. The French
Agency France-Press International News Service says Shi Biao, an
accountant at the Agricultural Bank of China's Jilin branch, was
accused of forging deposit slips from Aug. 1 to Nov. 18, 1991. AFP,
reporting from Beijing, quoted the Xinhua news agency as saying the
crime was "the first case of bank embezzlement via computer" in China,
adding it came to light when Shi and his alleged accomplice, Yu Lixin,
tried to wire part of the money to Shenzhen in southern China.
--Charles Bowen

(ED- Hopefully the SS isn't taking this as a suggestion!!)

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Nashville in the CU news!

Date: Fri, 30 Apr 1993 11:23:41 EDT
From: Paul Hyland <phyland@ESSENTIAL.ORG>
Subject: File 5--Clinton Administration Freedom of Information Policy

>Originally From--rich@pencil.cs.missouri.edu (Rich Winkel)

/* Written 2:09 am Apr 14, 1993 by nigel.allen@canrem.com in
igc:alt.news-media */
/* ---------- "White House Official Outlines Freed" ---------- */

White House Official Outlines Freedom of Information Strategy
at 'Information Summit'
To: National Desk, Media Writer
Contact: Ellen Nelson of The Freedom Forum First Amendment Center,
615-321-9588

NASHVILLE, Tenn., April 13 -- A White House official today outlined
a broad open government strategy for the Clinton administration,
throwing support behind legislation to apply the Freedom of
Information Act to electronic records.

"At the Clinton White House, most of the debate over the E-mail
system is about how we can interconnect it to public services rather
than how we can destroy the records or tear out the hard drives before
the subpoenas come to reach us," said John Podesta, assistant to the
president and staff secretary.

Podesta made his comments in front of 70 participants in the
nation's first Freedom of Information Summit, sponsored by The Freedom
Forum First Amendment Center at Vanderbilt University.

Though the economy dominates the headlines, Podesta said the new
administration was quietly working across a broad front to open
government. His "predictions for the first year," included:

-- Working with Sen. Patrick Leahy (D-Vermont) to win approval
this session for a bill allowing access to dozens of electronic
databases in the federal government.

-- Developing an electronic mail system within the federal
government to improve citizen participation in government.

-- Making the government's archives available on the nation's
"information highway," and appointing a national archivist "who cares
more about preserving history than about preserving his job."

--Creating a "mood of declassification" with new executive orders
from the president outlining what government may keep secret.

-- "Reinventing government" under initiatives developed by the fall
by Vice President Gore to require more openness on the part of civil
servants throughout the bureaucracy.

Podesta also pledged lobbying reform and political reform to "get
rid of the soft money in campaigns." The Freedom of Information Act
may need strengthening in addition to electronic access, he said.

Pinched by a dozen years of tight information policy, news
organizations have sent President Clinton a freedom of information
policy paper calling for wholesale personnel changes in FOIA-related
jobs, junking the secrecy classifications of President Reagan's
Executive Order 12356, overhauling the Freedom of Information Act and
ending military censorship of war reporting.

"People working on behalf of the public on more openness in
government at all levels are heartened by the prospect of the White
House taking the lead in this area," said Paul McMasters, executive
director of The Freedom Forum First Amendment Center at Vanderbilt
University.

The conference, sponsored by The Freedom Forum First Amendment
Center at Vanderbilt University, is focusing on issues ranging from
the Clinton administration's policies on open government to
restrictions on public access to crime, accident and disaster scenes.
The conference, open to the public, is at the Stouffer Hotel in
downtown Nashville.

Speakers on the Clinton FOI Agenda included Richard Schmidt Jr.,
general counsel to the American Society of Newspaper Editors and
partner in the law firm of Cohn & Marks in Washington, D.C.; Theresa
Amato, the director of the FOI Clearinghouse in Washington, D.C. and
staff counsel for Public Citizens Litigation Group in Washington,
D.C.; and Quinlan Shea, former Carter administration official who
discussed problems of access to government. Former American hostage
Terry Anderson will give the keynote address at the dinner tonight.

The Freedom Forum First Amendment Center at Vanderbilt University is
an independent operating program of The Freedom Forum. The Center's
mission is to foster a better public understanding of and appreciation
for First Amendment rights and values, including freedom of religion,
free speech and press, the right to petition government and peaceful
assembly.

The Freedom Forum is a nonpartisan, international organization
dedicated to free press, free speech and free spirit for all people.
It is supported entirely by an endowment established by Frank E.
Gannett in 1935 that has grown to more than $700 million in
diversified managed assets. Its headquarters is The Freedom Forum
World Center in Arlington, Va.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
ASKi and the EFF

I HAD several articles submitted from about the legality of boxing in
the state of Tennessee. He found a statue passed in 1986 making illegal to have
plans for, possess, use, or sell "toll fraud devices." We though this was
somewhat odd so we E-mailed the EFF. They said that the law had been passed
all-over the US, and almost every case the "plans for" statute had been ruled
unconstitutional! Just thought you might want to know if you every get
harassed concerning Box-files...

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
AT&T

There are 321,00 employees worldwide. Its '92 revenues are $64.9 billion
dollars and with a net income of 3.8 billion. And they bitch about the
$500K more they would make if their network was 100% secure!!! Jesus

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
2600 talks to Congress...

We found this very interesting and worthy of a repost...

Date: Thu, 10 Jun 1993 16:53:48 -0700
From: Emmanuel Goldstein <emmanuel@WELL.SF.CA.US>
Subject: File 1--Hacker testimony to House subcommittee largely unheard

What follows is a copy of my written testimony before the House
Subcommittee on Telecommunications and Finance. The June 9th hearing
was supposed to have been on the topic of network security, toll
fraud, and the social implications of the rapidly emerging
technologies. I was asked to speak for those who had no voice, which
translates to hackers and consumers. Instead I found myself barraged
with accusations from the two representatives in attendance (Rep. Ed
Markey D-MA and Rep. Jack Fields R-TX) who considered 2600 Magazine
(of which I'm the editor) nothing more than a manual for computer
crime. One article in particular that Markey latched upon was one in
our Spring issue that explained how a cable descrambler worked.
According to Markey, there was no use for this information outside of
a criminal context. Fields claimed we were printing cellular "codes"
that allowed people to listen in on cellular calls. In actuality, we
printed frequencies. The difference didn't seem to matter - after
explaining it to him, he still said he was very disturbed by the fact
that I was allowed to keep publishing. It soon became apparent to me
that neither one had read my testimony as there seemed to be no
inclination to discuss any of the issues I had brought up. In a way,
it was v

  
ery much like being on the Geraldo show. Somehow I thought
elected representatives would be less sensationalist and more
interested in learning but this was not the case here. We got
absolutely nowhere. Markey in particular was rude, patronizing, and
not at all interested in entertaining any thought outside his narrow
perception. It's too bad this opportunity was lost. There is a real
danger in elected officials who don't listen to all relevant opinions
and who persist in sticking to old-fashioned, outdated notions that
just don't apply to high technology. You can look forward to more
restrictive regulations and higher penalties for violating them if
this mentality continues to dominate.

(ED- John Gilmore was on the panel and noted that Don Delaney proposed a law
that would make it illegal to sell security related information to juveniles.
Jesus Christ!!! I run a fucking system! How am I going to keep my system
secure from attacks if it is illegal for me purchase security related
information!? Hell, I also write security related software, will it be illegal
for me to make advances in security technology until I'm 18??? In a country
were most people under 18 can't find South Africa on a map, and the life
expectancy in our cities is lower than that for a soldier serving a full tour
in Vietnam, I'm going to be arrested because I know too much about Computer
Security??? How ignorant can these people POSSIBLY be?!?!)
+++++++++++++++++++
WRITTEN TESTIMONY FOLLOWS:

Mr. Chairman, members of the Committee, thank you for the
opportunity to speak on the issue of the rapid growth and changes in
the telecommunications industry.

My name is Emmanuel Goldstein and I am the publisher of 2600
Magazine, which is a journal for computer hackers as well as anyone
else who happens to be interested in the direction that technology is
taking us. We tend to be brutally honest in our assessments and, as a
result, we do get some corporations quite angry at us. But we've also
managed to educate a large number of people as to how their telephone
system works, what kinds of computers may be watching them, and how
they can shape technology to meet their needs, rather than be forced
to tailor their existence to meet technology's needs.

I am also the host of a weekly radio program called Off The Hook
which airs over WBAI in New York. Through that forum we have
discovered the eagerness and curiosity that many "ordinary people on
the street" possess for technology. At the same time we have seen
fears and suspicions expressed that would be unwise to ignore.

HOW TO HANDLE RAPIDLY CHANGING TECHNOLOGY

The next few years will almost certainly go down in history as
those in which the most change took place in the least amount of time.
The computer and telecommunications revolution that we are now in the
midst of is moving full speed ahead into unknown territory. The
potential for amazing advances in individual thought and creativity is
very real. But so is the potential for oppression and mistrust the
likes of which we have never before seen. One way or the other, we
will be making history.

I think we can imagine it best if we think of ourselves speeding
down a potentially dangerous highway. Perhaps the road will become
slick with ice or fraught with sharp curves. It's a road that nobody
has gone down before. And the question we have to ask ourselves is
what kind of a vehicle would we prefer to be in if things should start
getting out of control: our own automobile where we would have at
least some chance of controlling the vehicle and bringing it down to a
safe speed or a bus where we, along with many others, must put all of
our trust behind a total stranger to prevent a disaster. The answer is
obviously different depending on the circumstances. There are those of
us who do not want the responsibility of driving and others who have
proven themselves unworthy of it. What's important is that we all have
the opportunity at some point to choose which way we want to go.

Rapidly changing technology can also be very dangerous if we
don't look where we're going or if too many of us close our eyes and
let someone else do the driving. This is a ride we all must stay awake
for.

I am not saying we should be overly suspicious of every form of
technology. I believe we are on the verge of something very positive.
But the members of this committee should be aware of the dangers of an
uninformed populace. These dangers will manifest themselves in the
form of suspicion towards authority, overall fear of technology, and
an unhealthy feeling of helplessness.

HOW NEW TECHNOLOGY CAN HURT US

The recent FBI proposal to have wiretap capabilities built into
digital telephone systems got most of its publicity because American
taxpayers were expected to foot the bill. But to many of the
non-technical people I talked to, it was just another example of Big
Brother edging one step closer. It is commonly believed that the
National Security Agency monitors all traffic on the Internet, not to
mention all international telephone calls. Between Caller ID, TRW
credit reports, video cameras, room monitors, and computer
categorizations of our personalities, the average American feels as if
life no longer has many private moments. Our Social Security numbers,
which once were for Social Security, are now used for everything from
video rentals to driver's licenses. These numbers can easily be used
to track a person's location, expenses, and habits - all without any
consent. If you know a person's name, you can get their telephone
number. If you have their phone number, you can get their address.
Getting their Social Security number is not even a challenge anymore.
With this information, you can not only get every bit of information
about this person that exists on any computer from Blockbuster Video
to the local library to the phone company to the FBI, but you can
begin to do things in this poor person's name. It's possible we may
want a society like this, where we will be accountable for our every
movement and where only criminals will pursue privacy. The American
public needs to be asked. But first, they need to understand.

In Germany, there is a fairly new computerized system of identity
cards. Every citizen must carry one of these cards. The information
includes their name, address, date of birth, and nationality - in
other words, the country they were originally born in. Such a system
of national identity can be quite useful, but in the wrong hands it
can be extremely scary. For example, if a neo-Nazi group were to
somehow get their hands on the database, they could instantly find out
where everyone of Turkish nationality lived. A malevolent government
could do the same and, since not carrying the card would be a crime,
it would be very hard to avoid its wrath.

Before introducing a new technology that is all-encompassing, all
of its potential side-effects and disadvantages should be discussed
and addressed. Opportunities must exist for everyone to ask questions.
In our own country, nobody was ever asked if they wanted a credit file
opened on them, if they wanted to have their phone numbers given to
the people and companies they called through the use of Caller ID and
ANI, or if they wanted to be categorized in any manner on numerous
lists and databases. Yet all of this has now become standard practice.

This implementation of new rules has resulted in a degree of
cynicism in many of us, as well as a sense of foreboding and dread. We
all know that these new inventions will be abused and used to
somebody's advantage at some point. There are those who would have us
believe that the only people capable of such misdeeds are computer
hackers and their ilk. But it just isn't that simple.

UNDERSTANDING COMPUTER HACKERS

To understand computer hackers, it helps to think of an alien
culture. We have such cultures constantly around us - those with
teenage children ought to know what this means. There are alien
cultures of unlimited varieties throughout the globe, sometimes in the
most unexpected places. I'm convinced that this is a good thing.
Unfortunately, all too often our default setting on whatever it is we
don't understand is "bad". Suspicion and hostility follow and are soon
met with similar feelings from the other side. This has been going on
between and within our cultures for as long as we've existed. While we
can't stop it entirely, we can learn to recognize the danger signs.
The best way that I've found to deal with an alien culture, whether
it's in a foreign country or right here at home, is to try and
appreciate it while giving it a little leeway. There is not a single
alien culture I've encountered that has not been decidedly friendly.
That includes deadheads, skateboarders, Rastafarians, and hackers.

When we talk about computer hackers, different images spring to
mind. Most of these images have come about because of perceptions
voiced by the media. Too often, as I'm sure the members of this
committee already suspect, the media just doesn't get it. This is not
necessarily due to malice on their part but rather a general lack of
understanding and an overwhelming pressure to produce a good story.
Hence we get an abundance of sensationalism and, when the dust clears,
hackers are being compared with bank robbers, mobsters, terrorists,
and the like. It's gotten to the point that the word hacker is almost
analogous to the word criminal.

Fortunately, the media is learning. Reporters now approach
hackers with a degree of technological savvy. For the most part, they
have stopped asking us to commit crimes so they can write a story
about it. As the technology envelops us, journalists are developing
the same appreciation and curiosity for it that hackers have always
had. Any good reporter is at least part hacker because what a hacker
does primarily is relentlessly pursue an answer. Computers naturally
lend themselves to this sort of pursuit, since they tend to be very
patient when asked a lot of questions.

WHAT CONSTITUTES A HI-TECH CRIME?

So where is the boundary between the hacker world and the
criminal world? To me, it has always been in the same place. We know
that it's wrong to steal tangible objects. We know that it's wrong to
vandalize. We know that it's wrong to invade somebody's privacy. Not
one of these elements is part of the hacker world.

A hacker can certainly turn into a criminal and take advantage of
the weaknesses in our telephone and computer systems. But this is
rare. What is more likely is that a hacker will share knowledge with
people, one of whom will decide to use that knowledge for criminal
purposes. This does not make the hacker a criminal for figuring it
out. And it certainly doesn't make the criminal into a hacker.

It is easy to see this when we are talking about crimes that we
understand as crimes. But then there are the more nebulous crimes; the
ones where we have to ask ourselves: "Is this really a crime?" Copying
software is one example. We all know that copying a computer program
and then selling it is a crime. It's stealing, plain and simple. But
copying a program from a friend to try it out on your home computer --
is this the same kind of crime? It seems obvious to me that it is not,
the reason being that you must make a leap of logic to turn such an
action into a crime. Imagine if we were to charge a licensing fee
every time somebody browsed through a magazine at the local bookshop,
every time material was borrowed from a library, or every time a phone
number was jotted down from the yellow pages. Yet, organizations like
the Software Publishers Association have gone on record as saying that
it is illegal to use the same computer program on more than one
computer in your house. They claim that you must purchase it again or
face the threat of federal marshalls kicking in your door. That is a
leap of logic.

It is a leap of logic to assume that because a word processor
costs $500, a college student will not try to make a free copy in
order to write and become a little more computer literate. Do we
punish this student for breaking a rule? Do we charge him with
stealing $500? To the hacker culture on whose behalf I am speaking
today, the only sensible answer is to make it as easy as possible for
that college student to use the software he needs. And while we're at
it, we should be happy that he's interested in the first place.

Of course, this represents a fundamental change in our society's
outlook. Technology as a way of life, not just another way to make
money. After all, we encourage people to read books even if they can't
pay for them because to our society literacy is a very important goal.
I believe technological literacy is becoming increasingly important.
But you cannot have literacy of any kind without having access.

If we continue to make access to technology difficult,
bureaucratic, and illogical, then there will also be more computer
crime. The reason being that if you treat someone like a criminal,
they will begin to act like one. If we succeed in convincing people
that copying a file is the same as physically stealing something, we
can hardly be surprised when the broad-based definition results in
more overall crime. Blurring the distinction between a virtual
infraction and a real-life crime is a mistake.

LEGISLATION FOR COMPUTER AGE CRIME

New laws are not needed because there is not a single crime that
can be committed with a computer that is not already defined as a
crime without a computer. But let us not be loose with that
definition. Is mere unauthorized access to a computer worthy of
federal indictments, lengthy court battles, confiscation of equipment,
huge fines, and years of prison time? Or is it closer to a case of
trespassing, which in the real world is usually punished by a simple
warning? "Of course not," some will say, "since accessing a computer
is far more sensitive than walking into an unlocked office building."
If that is the case, why is it still so easy to do? If it's possible
for somebody to easily gain unauthorized access to a computer that has
information about me, I would like to know about it. But somehow I
don't think the company or agency running the system would tell me
that they have gaping security holes. Hackers, on the other hand, are
very open about what they discover which is why large corporations
hate them so much. Through legislation, we can turn what the hackers
do into a crime and there just might be a slim chance that we can stop
them. But that won't fix poorly designed systems whose very existence
is a violation of our privacy.

THE DANGERS OF UNINFORMED CONSUMERS

The concept of privacy is something that is very important to a
hacker. This is so because hackers know how fragile privacy is in
today's world. Wherever possible we encourage people to protect their
directories, encrypt their electronic mail, not use cellular phones,
and whatever else it takes to keep their lives to themselves. In 1984
hackers were instrumental in showing the world how TRW kept credit
files on millions of Americans. Most people had never even heard of a
credit file until this happened. Passwords were very poorly guarded -
in fact, credit reports had the password printed on the credit report
itself. More recently, hackers found that MCI's Friends and Family
program allowed anybody to call an 800 number and find out the numbers
of everyone in a customer's "calling circle". As a bonus, you could
also find out how these numbers were related to the customer: friend,
brother, daughter-in-law, business partner, etc. Many times these
numbers were unlisted yet all that was needed to "verify" the
customer's identity was the correct zip code. In both the TRW and MCI
cases, hackers were ironically accused of being the ones to invade
privacy. What they really did was help to educate the American
consumer.

Nowhere is this more apparent than in the telephone industry.
Throughout the country, telephone companies take advantage of
consumers. They do this primarily because the consumer does not
understand the technology. When we don't understand something
complicated, we tend to believe those who do understand. The same is
true for auto mechanics, plumbers, doctors, and lawyers. They all
speak some strange language that the majority of us will never
understand. So we tend to believe them. The difference with the phone
companies, and here I am referring to the local companies, is that you
cannot deal with somebody else if you happen to disagree with them or
find them untrustworthy. The phone companies have us in a situation
where we must believe what they say. If we don't believe them, we
cannot go elsewhere.

This is the frustration that the hacker community constantly
faces. We face it especially because we are able to understand when
the local phone companies take advantage of consumers. Here are a few
examples:

Charging a fee for touch tone service. This is a misnomer. It
actually takes extra effort to tell the computer to ignore the tones
that you produce. Everybody already has touch tone capability but we
are forced to pay the phone company not to block it. While $1.50 a
month may not seem like much, when added together the local companies
that still engage in this practice are making millions of dollars a
year for absolutely nothing. Why do they get away with it? Because too
many of us don't understand how the phone system works. I try to draw
an analogy in this particular case - imagine if the phone company
decided that a fee would be charged to those customers who wanted to
use the number five when dialing. They could argue that the five takes
more energy than the four but most of us would see through this flimsy
logic. We must seek out other such dubious practices and not blindly
accept what we are told.

Other examples abound: being charged extra not to have your name
listed in the telephone directory, a monthly maintenance charge if you
select your own telephone number, the fact that calling information to
get a number now costs more than calling the number itself.

More recently, we have become acquainted with a new standard
called Signalling System Seven or SS7. Through this system it is
possible for telephones to have all kinds of new features: Caller ID,
Return Call, Repeat Calling to get through a busy signal, and more.
But again, we are having the wool pulled over our eyes. For instance,
if you take advantage of Call Return in New York (which will call the
last person who dialed your number), you are charged 75 cents on top
of the cost of the call itself. Obviously, there is a cost involved
when new technologies are introduced. But there is no additional
equipment, manpower, or time consumed when you dial *69 to return a
call. It's a permanent part of the system. As a comparison, we could
say that it also costs money to install a hold button. Imagine how we
would feel if we were charged a fee every time we used it.

The local companies are not the only offenders but it is
particularly bad in their case because, for the vast majority of
Americans, there is no competition on this level. The same complaints
are being voiced concerning cable television companies.

Long distance telephone companies are also guilty. AT&T, MCI, and
Sprint all encourage the use of calling cards. Yet each imposes a
formidable surcharge each and every time they're used. AT&T, for
example, charges 13 cents for the first minute of a nighttime call
from Washington DC to New York plus an 80 cent surcharge. Since a
calling card can only be used to make telephone calls, why are
consumers expected to pay an extra fee as if they were doing something
above and beyond the normal capability of the card? Again, there is no
extra work necessary to complete a calling card call - at least not on
the phone company's part. The consumer, on the other hand, must enter
up to 25 additional digits. But billing is accomplished merely by
computers sending data to each other. Gone are the days of tickets
being written up by hand and verified by human beings. Everything is
accomplished quickly, efficiently, and cheaply by computer. Therefore,
these extra charges are outdated.

SOCIAL INJUSTICES OF TECHNOLOGY

The way in which we have allowed public telephones to be operated
is particularly unfair to those who are economically disadvantaged. A
one minute call to Washington DC can cost as little as 12 cents from
the comfort of your own home. However, if you don't happen to have a
phone, or if you don't happen to have a home, that same one minute
call will cost you $2.20. That figure is the cheapest rate there is
from a Bell operated payphone. With whatever kind of logic was used to
set these prices, the results are clear. We have made it harder and
more expensive for the poor among us to gain access to the telephone
network. Surely this is not something we can be proud of.

A direct result of this inequity is the prevalence of red boxes.
Red boxes are nothing more than tone generators that transmit a quick
burst of five tones which convince the central office that a quarter
has been deposited. It's very easy and almost totally undetectable.
It's also been going on for decades. Neither the local nor long
distance companies have expended much effort towards stopping red
boxes, which gives the impression that the payphone profits are still
lucrative, even with this abuse. But even more troubling is the
message this is sending. Think of it. For a poor and homeless person
to gain access to something that would cost the rest of us 12 cents,
they must commit a crime and steal $2.20. This is not equal access.

CORPORATE RULES

Hackers and phone phreaks, as some of us are called, are very
aware of these facts. We learn by asking lots of questions. We learn
by going to libraries and doing research. We learn by diving into
phone company trash dumpsters, reading discarded material, and doing
more research. But who will listen to people like us who have been
frequently characterized as criminals? I am particularly grateful that
this committee has chosen to hear us. What is very important to us is
open communications. Freedom of information. An educated public.

This puts us at direct odds with many organizations, who believe
that everything they do is "proprietary" and that the public has no
right to know how the public networks work. In July of 1992 we were
threatened with legal action by Bellcore (the research arm of the
Regional Bell Operating Companies) for revealing security weaknesses
inherent in Busy Line Verification (BLV) trunks. The information had
been leaked to us and we did not feel compelled to join Bellcore's
conspiracy of silence. In April of this year, we were threatened with
legal action by AT&T for printing proprietary information of theirs.
The information in question was a partial list of the addresses of
AT&T offices. It's very hard for us to imagine how such information
could be considered secret. But these actions are not surprising. They
only serve to illustrate the wide disparities between the corporate
mindset and that of the individual. It is essential that the hundreds
of millions of Americans who will be affected by today's
all-encompassing inventions not be forced to play by corporate rules.

In 1990 a magazine similar to 2600 was closed down by the United
States government because Bell South said they printed proprietary
information. Most people never found out about this because Phrack
Magazine was electronic, i.e., only available on computer bulletin
boards and networks. This in itself is wrong; a publication must have
the same First Amendment rights regardless of whether it is printed
electronically or on paper. As more online journals appear, this basic
tenet will become increasingly critical to our nation's future as a
democracy. Apart from this matter, we must look at what Bell South
claimed - that a document discussing the Enhanced 911 system which was
worth $79,449 had been "stolen" and printed by Phrack. (Some newspaper
accounts even managed to change it into an E911 program which gave the
appearance that hackers were actually interfering with the operation
of an E911 system and putting lives at risk. In reality there has
never been a report of a hacker gaining access to such a system.) It
was not until after the publisher of Phrack was forced to go to trial
that the real value of the document was revealed. Anyone could get a
copy for around $14. The government promptly dropped its case against
the publisher who, to this day, is still paying back $100,000 in legal
fees. As further evidence of the inquity between individual justice
and corporate justice, Bell South was never charged with fraud for its
claim that a $14 document was worth nearly $80,000. Their logic, as
explained in a memo to then Assistant U.S. Attorney Bill Cook, was
that the full salaries of everyone who helped write the document, as
well as the full cost of all hardware and software used in the
endeavor ($31,000 for a Vaxstation II, $6,000 for a printer), was
perfectly acceptable. It is very disturbing that the United States
government agreed with this assessment and moved to put a pre-law
student behind bars for violating corporate rules.

MISGUIDED AUTHORITY

I wish I could stand before this committee and say that we have
been successful in stopping all such miscarriages of justice. While
the Phrack case may have been the most bizarre, there are many more
instances of individuals being victimized in similar manners. A
teenager in Chicago was jailed for a year for copying a file that was
worth millions, according to AT&T, but was utterly worthless and
unusable to a kid. A bulletin board operator in California, along with
his entire family, was held at gunpoint for hours while authorities
seized his equipment in an unsuccessful attempt to find child
pornography. Three hackers in Atlanta, after being imprisoned up to a
year for dialing into a Bell South computer system that had no
password, were forced to pay $233,000 in restitution so the company
could install a password system. More recently, a student at the
University of Texas at Houston was suspended from school for a year
because he accessed a file that merely listed the users of the system
(a file which the system allows all users to access). In increasing
numbers, young people are being sent to jail, not necessarily for
something they did, but rather for something they could have done in a
worst-case scenario. Again this indicates fear and misunderstanding of
technology and its applications. But this time those feelings emanate
from those in authority.

Locally, an ominous happening occurred at a 2600 monthly meeting
last November. (These meetings occur in public areas in cities
throughout the nation on the first Friday of every month.) Shortly
after it began, the Washington meeting was broken up by Pentagon City
Mall security guards. Without any provocation, people were forced to
submit to searches and everybody's name was taken down. One of the
attendees who was writing down an officer's name had the paper ripped
from his hand, another had his film taken from his camera as he tried
to document what was going on. Upon questioning by a reporter from
Communications Daily, the mall security chief claimed that he was
acting under orders from the United States Secret Service. Subsequent
Freedom of Information Act requests by Computer Professionals for
Social Responsibility have yielded more evidence implicating the
Secret Service in this illegal and unwarranted action. Nothing of a
criminal nature was ever found in any of the bags that were searched.
But a full list of the attendees wound up in the possession of the
Secret Service. It seems ironic that while hackers are conducting an
open gathering in the middle of a shopping mall in order to share
knowledge and welcome new people, agents of the Secret Service are
lurking in the shadows trying to figure out ways to stop them.

How can we move forward and talk about exciting new applications
of technology when we're off to such a bad start? The people that are
being arrested, harassed, and intimidated are the people who will be
designing and running these new systems. They are the ones who will
appreciate their capabilities and understand their weaknesses. Through
our short-sightedness and eagerness to listen to the loudest voices,
we are alienating the promises of the future. How many here, who grew
up in decades past, remember hearing teenagers talk of how the
government is after them, watching their every move, listening to
their phone calls, doing everything one might expect in a totalitarian
regime. Such feelings are the sure sign of an ailing society. It does
not matter if these things are not actually occurring - their mere
perception is enough to cause lasting harm and mistrust.

PROMISE OF THE INTERNET

The future holds such enormous potential. It is vital that we not
succumb to our fears and allow our democratic ideals and privacy
values to be shattered. In many ways, the world of cyberspace is more
real than the real world itself. I say this because it is only within
the virtual world that people are really free to be themselves - to
speak without fear of reprisal, to be anonymous if they so choose, to
participate in a dialogue where one is judged by the merits of their
words, not the color of their skin or the timbre of their voice.
Contrast this to our existing "real" world where we often have people
sized up before they even utter a word. The Internet has evolved, on
its own volition, to become a true bastion of worldwide democracy. It
is the obligation of this committee, and of governments throughout the
world, not to stand in its way.

This does not mean we should stand back and do nothing. Quite
the contrary, there is much we have to do if accessibility and
equality are our goals. Over-regulation and commercialization are two
ways to quickly kill these goals. A way to realize them is to have a
network access point in every house. Currently, network access is
restricted to students or professors at participating schools,
scientists, commercial establishments, and those who have access to,
and can afford, local services that link into the Internet. Yes, a lot
of people have access today. But a far greater number do not and it
is to these people that we must speak. The bigger the Internet gets,
the better it gets. As it exists today, cultures from around the globe
are represented; information of all kinds is exchanged. People are
writing, reading, thinking. It's potentially the greatest educational
tool we have. Therefore, it is essential that we not allow it to
become a commodity that only certain people in society will be able to
afford. With today's technology, we face the danger of widening the
gap between the haves and the have-nots to a monumental level. Or we
can open the door and discover that people really do have a lot to
learn from each other, given the opportunity.

It is my hope that this committee will recognize the importance
of dialogue with the American public, in order to answer the questions
so many are asking and to address the concerns that have been
overlooked. I thank you for this opportunity to express those issues
that I feel relevant to this hearing.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
2600

The following press release is brought to you by the Association for the
Spread of Knowledge and Information (ASKI)...

--------------------------------------------------------------------------------
ZP, TND, and 2600 Magazine are proud to present...

Nashville!Nashville!Nashville!Nashville!Nashville!Nashville!Nashville!Nashville!


22222 666666 00000000 00000000 !!
2 2 6 6 0 0 0 0 !!
2 2 6 0 0 0 0 !!
2 6 0 0 0 0 !!
2 66666666 0 0 0 0 !!
2 6 6 0 0 0 0 !!
2 6 6 0 0 0 0 !!
2 6 6 0 0 0 0 !!
2 6 6 0 0 0 0
22222222 6666666 00000000 00000000 !!

-=The Hacker Quarterly=-


Meetings!!Meetings!!Meetings!!Meetings!!Meetings!!Meetings!!Meetings!!Meetings!!

Yes, folks!!! 2600 meetings have come to NASHVILLE!!!!! We will be
holding a meeting on the first Friday of every month at Bellevue Mall in the
sitting area near Dillards on the first floor... The first meeting will be on
Friday, July the 2nd!! All of Nashville's REAL Cyberpunks will be there!!!!
The meeting starts around 5pm and will last until 8. Very informal, just
show up and chat, bring some interesting info and have PHUN!!! You may want
to eat first unless we all decide to move to the Food Court... Tell everyone
you know to be there and tell area SysOps to ADVERTISE these meetings!!!!

See you there,
The White Ninja */^\*

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


ASKi Phile #13
Coming Soon

AKSi03 will include articles on Encryption and an article on switching under
ISDN (interesting stuff!). ASKi04 will have more phone stuff. ASKI05 will
contain vast amounts of information on scanners, ham radio and radio
frequencies. Well we hope you will be looking for our future issues and we
will be glad to accept any illuminating info you can provide! Though it did
take a while to put out this issue, we will be speedier on the next few. L8TR!

ASKi Phile #14
Disclaimer

ASKi, Inc. does not advocate, participate in, or conspire in the
violation of any law--no matter how oppressive, unconstitutional or simply
stupid such law may be. ASKi, Inc. and the writers and editors of ASKiNews do
not take ANY responsibility for the use of the information provided. Though we
do give credit where credit is due! ASKi, Inc. does engage in description
of technological processes (for educational and informational purposes only),
and some of these processes may well require appropriate licensing to perform
legally. Fortunately, no license is needed for the distribution or receipt of
information itself! This information is compiled from various sources and
persons as well as personal experiences of the authors and in NO WAY implicates
ANY person in ANY crime. And remember, although we have appropriated
information for this magazine, if you take it from us its STEALING... :-)




ÕÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ͸
³ Have a happy phreaking day! ³
ÔÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ;


P.D. says -- "May you die on the 23rd."

WiLD CHiLD says -- "Beauty is truth, truth beauty"

← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT