Copy Link
Add to Bookmark
Report

Hackers Unlimited Magazine Volume 1 Issue 2

  


The Mickey Mouse Club Presents...

__ __ ____ __ __ __ ______ _____ ______
__ __ __ __ __ __ __ __ __ __ __ __
______ ________ __ ___ ____ _____ ______
__ __ __ __ __ __ __ __ __ __ __ __
__ __ __ __ __ __ __ ______ __ __ ______

Hackers
Unlimited
__ __ __ __ __ ______ __ __ ______ ______ ______ ____
__ __ ___ __ __ __ ___ ___ __ __ __ __ __
__ __ __ __ __ __ __ __ __ __ __ __ ____ __ __
__ __ __ ___ __ __ __ __ __ __ __ __ __
____ __ __ ______ ______ __ __ ______ __ ______ ____

Magazine

Volume 1
Issue 2

Released 12/22/89

Editors The Dark Lord
Cardiac Arrest



-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



Hackers Unlimited
Volume 1, Issue 2

Table Of Contents

# Title Author
------==========================================-------------------------------

1 Information about The Mickey Mouse Club Editors
2 Submission Policies Editors
3 Introduction Editors
4 Understanding The Blue Box The Dark Lord
5 Bugging Phone Line Cardiac Arrest
6 StarLink Fallen Angel
7 Piggy Backing Lines The Dark Lord
8 Hacking Prodigy The Dark Lord
9 Hackers Unlimited News TDL\Cristifer Columbus
10 Confrencing....... The Dark Lord
11 Using 0266's The Dark Lord
12 Top Ten Listing The Dark Lord
13 CBI's The Dark Lord
14 Rumors of '89 The Dark Lord
15 Opinion Poll Editors
16 Definitions Editors
17 Listings Compilations
18 Closing Notes Editors

------==========================================------------------------------

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-



What is The Mickey Mouse Club?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The Mickey Mouse Club was founded by Cardiac Arrest and The Dark Lord.
The name MMC came about because we couldn't think of a better one. We are
basically a cracking club. Aside from cracking, we write instructional text
files, and an electronic magazine called Hackers Unlimited Magazine, designed
to help beginning hackers and phreakers. We are also the authors of programs
such as Data Protect, a file that, as the name implies, provides features such
as data ecnryption/decryption, file hiding, file clearing, and several other
functions.

MMC Membership
~~~~~~~~~~~~~~
Since we are still a comparitively new group, we are looking for members
of the underground BBS community who can do one or more of the following :

* Crack games (or other programs)

* Draw crack screens

* Write instructional text files about phreaking, hacking, carding, etc

* Contribute to Hackers Unlimited Magazine in other ways than files

* Write programs beneficial to the hacking community (ie code hackers,
etc)


If you are interested in applying for the MMC, contact either Cardiac
Arrest or The Dark Lord. If you fit into the above specifications, we will
give you permission to fill out our application. After completion, upload
your application to the BBS you downloaded it from. Your membership will be
considered ONLY if you received the application with permission. It will be
based entirely on the application (ie, your truthfullness and knowledge).

Hackers Unlimited Magazine
~~~~~~~~~~~~~~~~~~~~~~~~~~
The Mickey Mouse Club puts out an electronic newsletter/magazine called
Hackers Unlimited Magazine. This magazine is devoted to informing the hacking
community about hacking, phreaking, carding, or anything else or interest. It
is geared towards beginners, but we hope some experienced hackers will benefit
>from it also. The editors of the magazine are the founders of the MMC, Cardiac
Arrest and The Dark Lord. ANYONE may write for HU magazine, and we would like
to encourage readers to submit any articles they have written to a HU Support
Board. We would also like to encourage comments, complaints or suggestions.

Where You Can Contact Us
~~~~~~~~~~~~~~~~~~~~~~~~
Cardiac Arrest and The Dark Lord can be contacted on most pirate boards in
Denver (303/CODEN), as well as various BBSes around the country.





-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
___________________________
___________________________
___ ___
___ Submission Policy ___
___________________________
___________________________

Hackers Unlimited Magazine is an ongoing newsletter, and we will release
issues as regularly as possible. To do this we will need readers to contribute
articles for the magazine as often as possible. We ask that if you feel you
have something good to write about that will fall within the guidelines for
Hackers Unlimited, please submit it. However, we do take pride in the magazine,
and we will only accept articles up to our standards. Do not be discouraged if
your article is turned down. Although this is not a thing that is expected to
happen, if we feel the article is not good, then we do reserve the right to
turn down your article. Please don't let that stop you from writing your
article. Ninty percent of the articles will NOT be turned down, and by having
this policy, we are not wanting to scare off the good writers. We ask that you
keep the topic within the guidelines, and make it to the best of your ability.
If your article IS turned down, the editors may make suggestions, or, if the
changes are minor, permission to edit the file.
One thing to keep in mind, we do not base our decisions on the
type of computer you own, reputation that you have, age or anything else
unrelated to the magazine. The decision whether the article stays or goes is
based STRICKLY on the quality of the article itself. To submit an article just
find some way of getting in touch with one of the writers of Hackers
Unlimited, or even better, one of the editors, The Dark Lord, or Cardiac
Arrest. If you do get in touch with one of the writers, you must make sure it
is relayed to one or both of the editors, because it will do little or no good
if we don't know you're out there. There will be ways listed through out this
magazine on how you can get in touch with us, either through support boards,
Colorado boards, Vmb's etc. Hope to see an article from you soon and
enjoy.........Hackers Unlimited!!!



-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-



Introduction : Yes, Hackers Unlimited is still alive. We are sorry for
the delay in the release but the makers of Hackers Unlimited, MMC, are
working on BBS software that will be released when this issue is. Incase
you wanted to know, the software is called Eclipse so look for it at the
selected sites. Please be sure to read all of the additional notes and
comments and help us with those requests, because there is a lot of things
that Hackers Unlimited is looking forward to in the future, and your help is
needed to accopmplish so of those things. Well time for the second issue of
Hackers Unlimted, enjoy, and as always, be await your suggestions.

Cardiac Arrest & The Dark Lord
Editors, Hackers Unlimited Magazine

VMB 1-800-444-7207
Box 9500

NOTE : This VMB is valid as of the release of this magazine, but may change
without notice.



-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
__________________
___ ___
___ Blue ___
___ Boxes ___ By: The Dark Lord
__________________



I realize that most of you are just about ready to skip over this
part of the magazine because Blue Boxes are old news. Well I have talked
to a couple of Phreakers who have been doing it for a couple of years (by
no means beginners) and they were not Really sure what the process behind
blue boxes was. Thats why I am writing this. Ok Enough of the Intro....
Ok first blue boxes are one of the oldest color boxes there are.
When the box was first discovered, it was, heheheh, far from a box. It was
a whistle. Good 'ole Cap'n Crunch was the one to discover this. He was
messing around with the phone (As usuall) and he found that by blowing in
his Captain Crunch wistle had got a free call. He figured out that the
whole Phone company runs off of tones. When you dial a number on your key-
pad, it does not register the number, it registers the tone. The Cap'n
was able to simulate one of these tones to get a free call. This Box that
created a tone was just great for making calls then, but now they have a
system called ESS (Electronic Switching System) which is the worst thing
that could ever happen to a Phreaker. The ESS can find EXACTLY were the
call came from, were it was made to, and from there they could get all the
information on the person(s) who made the call through other methods.
The Blue Box is an Electronic Box that simulates Tones. It simulates
2600hz and 120hz tones. These tones travel through things called trunks,
which are kinda like the phone lines. When you call a number, it will
reconize the tones that you made in dialing and will goto the destination
set by the dialing codes. Once it finds this trunk that it is suppose to
goto, it will send a 2600hz tone over the trunk (Unless its busy, which is
like not making the call). Once it makes this 2600hz tone, it will then
kill the tone and sends the call to its destination. If it the line is busy
it will send the dialer a 120hz tone, which is, you guessed it, a busy
signal.
What the Box does, is this exact thing, to where you are sending your
own tones and by passing haveing to go through though Phone company, where
you will be charged. Well, you went through the phone company, but you
kinda took control of the operators system. When the lines came through,
the operators would give it the tones needed to carry on. With the blue
box, you do that for her, only registering it as a free call. Once again
though, the ESS can find these and tell where they came from, which is the
exact reason why they aren't safe, because the will catch you in the act.
I know this is probably old news to some of you, but hopefull some
did not know what actually happened and know have that knowladge.



Remember: The Night Belongs to...........The Dark Lord!


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

The Mickey Mouse Club's Guide To.....


[ Electronic Surveillance ]

Part I :

Overview
Wireless Transmitters


By:
[ Cardiac Arrest ]

Special Thanks To :
[ The Mad Bomber ]



Introduction : This file is divided into two parts. In the first part of the
~~~~~~~~~~~~ file, I will try to present a general overview of bugging and
electronic surveillance. The second part of this file deals with one method
of bugging: Wireless transmitters. I will give a description of wireless
transmitters and will show several variations of this method. I have called
this file "Part I", but I'm not sure how many additional files (if any) will
be added to this series.

NOTE: I won't lie and say I'm an expert on bugging. I have NOT tried all of
the methods presented here. However, between myself and The Mad Bomber, most
of the bugs in this series have been tested. I am writing this to inform
people of these methods and provide some simple methods that SHOULD work. I
will also list all of my sources and also a list of mail-order companies that
sell bugs and the like.


[--------------------------------[ Overview ]---------------------------------]

The American Heritage Dictionary defines "bug" as "A small hidden
microphone or other device used for eavesdropping."
Bugs of the late
80's-early 90's can be nearly any size. The cover of Popular Science (August
1987) shows an electret microphone 3/16 inch across at it's widest point. They
can be placed so as to be nearly impossible to dectect. Bugs can be placed in
electronic devices (such as phones or radios), wired into existing electrical
wiring, or an empty pack of cigarettes. In this country, bugs are commonly
sold as "home security devices" or "hearing aids", and in Europe an Asia, bugs
are openly sold as bugs, although they're illegal there, as they are here.
Bugs can be broken down into three basic classes: bugs with a microphone
and a transmitter; bugs with only a microphone; and, bugs that sit inoperative
until a specific radio signal is received. The first type are by far more
common, being simple to make with components available at Radio Shack, or they
can be assembled as plans, kits, or assembled, from companies such as
Information Unlimited. With a few dollars and a little persistance, a person
with little or no knowledge or electronics can assemble a simple bug in less
than a day.
Electronic surveillance is legal in only one highly controlled situation:
when law-enforcement agencies receive a court order allowing surveillance of a
suspect. However, bugs are widely used to get a leading edge over a competing
corporation, for blackmailing purposes, or simply to find out a little more
about a person.


Hiding A Bug : There are several easy methods of hiding bugs, both from sight
~~~~~~~~~~~~ and detection. Sight is usually no problem. Simply drill a
hole in the wall, insert the bug, and patch it up again, or cover it with a
picture, etc. Or place it in the handset of a telephone. A matchbox is a
perfect hiding place for a den or family room with a fireplace. The
possiblities are as limitless as the bugger's imagination.
Hiding the bug from detection is the tricky part. You could set the
transmitter to a frequency very close to a local TV station, so that it is
overlooked during scanning. More complicated bugs are possilbe of changing
frequecies several times per second, but this is very expensive. One expert
says that during the construction of a building that is to be bugged, simply
mix thousands of diodes in with the concrete. That way, when scanned, the
entire walls would appear to be bugged, and it would be impossible to guess
where to start looking for real bugs. Passive bugs that turn on only when a
certain radio signal is received could simply be turned off when a person
enters the room. A more down-to-earth method would be to simply place the
bug inside an electronic device, say, a simple radio. When the radio is
scanned, the electronic devices inside the radio cover up the bug.

Aquiring A Bug : Anyone with a little money can aquire a bug. It just depends
~~~~~~~~~~~~~~ on how much you're willing to spend. This could range from a
few dollars to buy a Radio Shack wireless transmitter and removing the shell,
to a black market bug in the thousands of dollars. Bugs are also readily
available in kit form from mail-order companies for as cheap as $20. In
several foreign contries, bugs are sold openly on the streets. Or, if you want
to save a few bucks, you can go to Radio Shack, buy a few inexpensive
components, and build your own.

Some Interesting Bugs : From various sources I found some interesting
~~~~~~~~~~~~~~~~~~~~~ variations of bugs. These are some of my favorites.

Martini Olive Bug
-----------------
This now infamous bug was designed by a San Francisco security expert
named Hal Lipset. To make a "martini olive", hollow out opposite ends of a
piece. Throw all the components into these holes (there's only about 12). He
also figured out how to cut open a small (AAA) battery and use the parts to
make a tiny power supply. The olive is completed by making a mircophone out of
foil. The olive shaped case is made with fiberglass putty. You can then make
an antenna shaped like a toothpick. Just serve it to the person you wish to
bug.


Picture Hanger Bug
------------------
This one's looks like, of course, a picture hanger. It's about 1/4 inch
long with a picture hanger on the end. Just drill a hole, insert the "hanger",
and replace the picture. It could sit there forever without being discovered.


Electret Bug
------------
This is the bug shown on the cover of Popular Science. It is of the
second class of bugs, using only a microphone. You are required to run two
thin wires to the bug for operation. However, this could be as simple as two
thin stripes of metallic paint, covered up with normal house paint. An
electret bug is made by polarizing certain types of plastics or waxes with a
high voltage. A hole the size of a pinhead is where the sound enters. The bug
pictured on Popular Science measured only 3/16 inch at it's widest point!


Window/LASER Bug
----------------
When sound is generated, window panes vibrate slightly. Using inexpensive
equipement, such as a General Electric H1A1 Laser and an astronomical
reflecting telescope available from Edmund Scientific Company, these vibrations
can be translated to reproduce the original sounds. This is done by bouncing
the laser off of the window, and interpreting the modulations of the beam that
returns.


Computer Bug
------------
About three years ago, in Olympia, England, a British electronics engineer
entered a computer show, where the emphasis was on somputer security, wheeling
a cart. As he walked, he adjusted a few knobs and soon a display screen on his
cart duplicated the monitor of an Epson PC AX. The machine cost under $500,
and was designed by a Dutch researcher named Wim van Eck. A monitor works by a
beam sweeping across the back of the screen. Whereever the monitor is to be
dark, the beam is turned off. Where the monitor should be light, the beam is
turned on. This switching of the beam creates a digital signal. Eck's machine
translates this signal and transfers it to a receiving monitor. The only
problem is synchronizing the sweeping beam. However, Eck built a circuit to
discover the original sync and match the receiver to that signal.


Toilet Bowl Bug
---------------
Have you ever played that game in a swimming pool where one person talks
and the other tries to figure out which direction it came from, but it seems to
come from every direction? This is because water is an excellent conductor of
sound waves. Get the picture? Why not just stick a bug on the piping of a
toilet? That way, you could pick up all conversation (or any other noises)
>from that bathroom.


KGB Bug
-------
In February of 1982, the manager of a Soviet airline was arrested for
espionage. Authorities became suspicious of a scar on his chest, which he
claimed was from an operation. After a closer look, however, they discovered
that the KGB had surgically implanted a bug inside his chest to monitor all
conversations occuring around him.

What The Future Holds : As we enter the 90's, bugs will continue to become
~~~~~~~~~~~~~~~~~~~~~ smaller and less detectable. One possible solution to
bugs that transmit continuously, which is easy to detect, is to have a bug that
collects information, then sends it in short bursts. One speculation for such
a bug could collect information for 15 seconds and send it in a burst of 1
microsecond. Another idea that is already possible in an impractical form, is
a voice-activated bug that shuts off after a conversation is finished. There
will also be great advances in bug detection. Although advanced detectors are
available, they are very expensive. One such instrument, called the
SuperScout, costs approximately $25,000. And that's owned by a private
businessman. Makes you wonder what the government spends on bug detection....


Notes On Schematics : I'm sorry about the ASCII schematics, but there's not
~~~~~~~~~~~~~~~~~~~ really much I can do about it. I know it'd be better to
do them in extended IBM ASCII, but we're hoping there might be some Apple (or
otherwise) users reading this, too. Anyways, here's a "key" for some of the
hard to understand symbols.

II \
I< \
>I \
___ \ These are all capacitors.
/ \ /
___ /
___ /
/

\
--\ \
\ \ Anything vaguely resembling this blob of ASCII is a semiconductor.
I - / The lower case "V" represents the arrow normally present in
/ / schematics.
--v /

__ \
/// \
\
And \ Indicates Ground
/
----- /
--- /
- /

Hope this helps!!


[--------------------------[ Wireless Transmitter ]---------------------------]

Introduction : Wireless transmitters are by far the most common, the cheapest,
~~~~~~~~~~~~ and the easiest of all the bugs to build. I'll present two
different wireless transmitters. They are all similar in design and function,
but since availability of parts varies for each person, it can't hurt to have
plans for both. The Mad Bomber and I have both tested both of the methods
presented in this file.

Method #1 : This method was found in Radio Electronics March 1989. This
~~~~~~~~~ method transmits over a very short distance (only a couple hundred
feet). It transmits to any frequency in the normal FM band. The PC board in
the book is a little less than 4 inches square, but you can make it smaller
with a little patience. This is a good one to start with, since it's easy to
build and uses common components.

Required Components
-------------------
Resistors (1/4-watt, %5)
R1 - 100 ohms
R2,R4 - 10,000 ohms
R3 - 1000 ohms
R5,R7 - 47,000 ohms
R6 - 2.2 megohms
R8 - 4700 ohms
Capacitors
C1 - 1.5 pF, ceramic disc
C2 - 100 pF, NPO
C3,C4 - 330 pF, NPO
C5,C9 - 0.1 uF, NPO
C6 - 0.001 uF, NPO
C7 - 22 uF, electrolytic
C8 - 6.8 uF, electrolytic
C10 - 10-40 pF trimmer capacitor
Semiconductors
Q1 - BF199 or NTE229, or equivalent NPN transistor
Q2 - BC183C or NTE199, or equivalent NPN transistor
Other Components
L1 - Coil, approximately 1 uH (more on this later)
M1 - Electret microphone
S1 - SPST switch
Miscellaneous
9 volt battery
9 volt battery connector
Wire for connections
Case to put it in
Solder
Soldering Iron
PC Board or "BreadBoard"

NOTE : Complete kit available for $13.85 from Prospect Electronics, PO Box
9144, Allentown, PA 18105.


Construction Notes
------------------
For the coil (L1), you'll need to either coil a wire or set an adjustable coil
around 1 uH. Just make sure there's no bridged, or bad joints when you start
it.

Schematics
----------
____ |------+-----+-------+----------------------+--------+------|
\ / | | | | | | B |
\/ C10 ___ L1 | | | | a |
ANT | / \ | | | | | t -
| C1 | | | | R7 | t ---
|----I<-----+------| R4 C3 ___ | | e -
| | / \ | | r |
| | | +---+ | y |
+-----\ | | +--R6---+ | | | |
| \ | | C9 | | R8 | | |
| I ---+-------+--I<---+\ | |C7 | | C6 |
C2 ___ / | | \ | C5 | \ | + | / |
/ \ v Q1 | | I ---+--|<--+ ___ ___ |
| | | | / | / \ -/ \ |
+----| | | v Q2 | | | |
| | | +-------| | | | |
| | | | | | | | |
| | | | | + M1 | | |
R1 R2 C4 ___ R3 C8 ___ | | | |
| | / \ | / \ - | | | |
| | | | | | | | S1 |
|------------+-------+-------+-------+------+---+----+-+ +-|
| \
----- +
--- Ground
-

Operation
---------
After you've built the transmitter, you have to set the frequency. Set a
normal FM radio to an odd frequency. Radio Electronics recommends around
88MHz, but in my area up at the high end (108MHz) is a little better. Have a
friend or brother or someone constantly speak into the microphone while you
adjust the trimmer capacitor. At one setting or another, you should hear your
friend's voice. That's all there is to it.


Method #2 : I came across this design in a book called Build Your Own Laser,
~~~~~~~~~ Phaser, Ion Ray Gun & Other Working Space Age Products (I'll give a
little more info on it in the source list), which is a VERY interesting book,
with 3 different types of bugs, several LASERs, and some other goodies (like
shock-wands, etc). This is an excellent device, because it is small and can,
according to the book, transmit well over a mile (I've tested it to around a
1/2 mile) with a good antenna. It is very sensitive, and can transmit sounds
>from all over a house. The tuning range covers the standard FM band, such as
method #1, and also the lower end of the aircraft band, allowing a completely
interference-free transmission.

Required Components
-------------------

Resistors (1/4-watt, 5%)
R1 - 10k
R2,R7,
R7,R8 - 1k
R3 - 100k
R4 - 8.2k
R5,
R10 - 15k
R9 - 3.9k
R11 - 220 ohm
Capacitors
C1 - 100m/25 V small electrolytic
C2 - 470 pF/50 V disc
C3,C5 - 10 uF/50 V electrolytic
C4,C9,
C10 - .01/50 V disc
C6 - 1 uF/50 V electrolytic
C7 - 5 pF mica zero temp
C8 - 6 35 pF trimmer
Semiconductors
Q1,Q2 - PN2222 or equivilent NPN transistor
Miscellaneous
M1 - FET capacitance microphone
PB1 - Perfboard (BreadBoard) about 1 1/8" square
CL1 - 9-volt battery clip
WR1 - #24 wire
B1 - 9-volt battery
L1 - Coil (more on this)

NOTE : Kit available from Information Unlimited(P.O. Box 716, Amherst, NH
03031). Price ranges depending on package.

Construction Notes
------------------
The book recommends 1 5/8"
square for the breadboard. My smallest has
been a little less than that size, but I'm not that good at electronics. The
Mad Bomber made one about 1" by 1/2". To make L1 (the coil), get a #8 wood
screw (a pencil seems to work fine for me) and tightly wrap 5-10 turns of #16
buss wire around it.

Schematics
----------

|----+------+----+------+------|
|C1 | C2 | | | |
___ ___ | | | | ____
___ / \ | | | | --+---+------| \ / A
| | R1 R3 R4 | / | | | \/ n
+----| | | | | C6 / | ___ C8 |L1 | t
| | | +------|--I<--R8--+---+--+-I | / \ | | e
__ | | / | | | | \ | v | +---| n
/// WHITE | C4 | / | | | | v | | C9 | n
__---------+-II-+---I | | | | | | +--II--+ a
/M1\ RED | \ | | R9 R10 +--| | |
\__/-+------| | v | ___ | | | __ |
| ___ C3 | | +--| | C10 ___ | | | /// |
| / \ R2 R5 | |C5 | | | | | |
| | | | R6 ___ | | | | R11 |
+--+------| | | / \ | |---+ | | |
| +------+--| | | | | |
__ | | __ | __ |
/// __ | /// | /// |
/// | | |
|-----------------+-----------------+
B |
a ---
t-> -
t ---
e -
r |
y __
///

Operation
---------
Pretty much the same as method number one. Be sure to tune carefully, or
you'll overadjust and never find the frequency. Trust me on that one. The
book also suggests marking the capacitor, which isn't too bad an idea, in case
you accidentally move it. This bug is EXCELLENT for using in houses etc. You
can also use it as a "walkie-talkie" when you're out field phreaking or
something. Just get a walkman type headset radio, and havbe your friend do the
same, and you can talk through the transmitter and listen through the radio.


Sources of Information : This is a list of all the magazines I have or will
~~~~~~~~~~~~~~~~~~~~~~ use for this series of files.

Books
-----
"Build Your Own Laser, Phaser, Ion Ray Gun and Other Working Space-Age
Projects"
by Robert E. Iannini. Tab Books Inc., Blue Ridge Summit, PA 17214.
$15.95. 389 Pages.

"Electronic Telephone Projects" by Anthony J. Caristi. Howard W. Sams &
Co., Inc., 4300 West 62nd Street, Indianapolis, IN 46268. $8.95. 168 Pages.

Magazine Articles
-----------------
"Bugging", Popular Science - August 1987.

"Wireless FM Microphone", Radio Electronics - March 1989.

"Micro-Sized Amplifier", Radio Electronics - August 1988.

"Bug Detector", Radio Electronics - June 1989.

"Tracking Down Bugs Using A Spectrum Analyzer", Radio Electronics - June
1989.


Mail-Order Bugs : This is a list of some of the mail order companies that sell
~~~~~~~~~~~~~~~ bugs, and other items or interest. Some of them may not
still exist. I haven't tried them lately.


Information Unlimited, Inc. - P.O. Box 716, Amherst, NH 03031. 603-673-4730.

Dirijo/Bond Electronics - P.O. Box 212, Lowell, NC 28098.

Sierra Electronics - P.O. Box 709, Elfers, FL 34680-0709.

Xandi Electronics - P.O. Box 25647, 60P, Tempe, AZ 85285-5647.

Techtronics - 1715 Leaf Ave., Murfreesboro, TN 37130.

N.A.S. - 213-631-3552.

Spypro (045ER) - P.O. Box 45521, Seattle, WA 98145-0521.

Mentor-Z - 135-53 No. Blvd., Flushing, NY 11354.


Conclusion : That's about all I have on wireless voice transmitters for
~~~~~~~~~~ this issue. Part 2 will most likely be on telephone bugs. Well,
that's the plan anyways, but this could change by the time I get to writing it.
If you have any questions, comments, suggestions, complaints, or something
you'd like to see in future files in this series, let me know.






-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



. ... . . . . . ..
.. . . . . . . ___________________________ . .. . .
. ...\ . . . . .. . .. . . . . . . . . .
.. x . . . .. StarLink . . . .. .
.. . \ . . ___________________________ .. \ . .. .
. . . . .. . . .. . .. . . x . . .
.. .. . .. .. . .. . .. . \ . ..
By: .
The Dark Lord



StarLink is a really good system that is supposed to replace
Pc Persuit. It has many features and improvements that Pc Persuit does
not have. Starlink has other features Such as Up to date News Events,
Many things on current affairs that have been happening lately, Inter-
active Chat systems that many people can converse with each other through
the use of there modems. It has many "Extras" available. Starlink is run
by a company Called GTD or Galaxy Telecomunications Division. It is a large
and established Telecommunication Company that is in no way a beginner to
Telecommunications business. Most of the "Extras" are things that are
provided by the other companies that are working with GTD to make Starlink
the Best system of Long Distance calling Around. Companies such as Tymenet
have joined with GTC to make this system the way they want it. One of the
options available is, at the same time that you are using Starlink, be able
to use the Tymnet OutDial, to have a farther reach over the United States.

Not only does Starlink have the little options like the Chat Systems
and such, the quality of calling has improved. The Phone lines are said to
be Much clearer, so you don't have the the same amount of line noise that
you get with Pc Persuit. It also has a much faster transmitting system.
What I mean by that is there is not the horrible Delay that Pc Persuit has.
I don't want to imply that there is no delay, because that type of tech-
nology is not yet developed to the point were users will have no delays, but
the delays have been cut down. There is also a large increase in the amount
of areas available for making a call. Starlink has the capibility to call
Ninty-One (91) different Cities and twenty-Eight (28) different States. The
number of cities and states available for calling is increasing as the
company expands. One other thing that is a good thing for the users of
these systems but a bad thing for us hackers of the systems, is there is
supposed to be increased security of the system. I do not know for sure
if this is true, but it is something that has been said by a lot of people.

By reading the contents of this file up to this point, you probably
can't understand why a lot of Pc Persuit users have not switched over to
Starlink. There are a couple of reasons for this. Number one, the system
is new and people are still learning the things Starlink has to offer. Not
only that, but there is one MAJOR flaw. You have to pay for all the extras
that the system has, and for the people just looking for the Long Distance
calling, they have no need for the other things, and the would have to pay
extra to get what they would never have any use for. There is not just a
little difference either. There is a repsectable margin in the prices with
starlink not fairing to well. This probelm is said to lessen because Star-
Link says that thier prices WILL go down after they have restored the fees
that have been spent to start the system. Also, Pc Persuit is said to have
a rise in there cost, to make the gap in affordablility decrease in size.

Right now is the best time in the world for hackers. This is a new,
good system that will suplly all the needs of the hackers, but besides the
supposid "Increased Security" there is no other prepreation know to us made
for the hacking of there system. Some might say "It is Ripe for the
Picking"
. This system has not seen much action by the hacking community for
a lot of the same reasons that the paying users have. The system is new
and people are just now learning the system, and no one really knows what to
expect. Once the system grows, there will be more experimentation by the
hackers to see what the system is like.

I hope that this Text file will increase the amount of ativity by
the hackers. I hope that they will do more experimenting with the system
and soon get accounts on the system. I do not feel that StarLink is ready
for the hacking community, therefore it is a prime opportunity to explore
and learn the system. There is software out much like Icex made specifically
for Starlink and it is called "StarDial". The newest version that I have
seen of this software is 2.0.

Well, happy hacking and good luck. If you find out any additional
information on StarLink, Hackers Unlimited would be extreamly greatfull for
the information so we can update the file so others will have enough info to
be sucessfull in hacking this system. Please leave any Information at any
of our Distribution sites, Vmb's or any other ways you know of to get in
Contact with A member of Hackers Unlimited. Thanks and..........

Remember: The Night Belongs to...............The Dark Lord!




=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

__________________________________________________________________________
- -
- A Home-made Conferencing System for Those With Multiple Phone Lines -
- File Created by Fallen Angel -
- 10 / 26 / 1989 -
- -
=________________________________________________________________________=

There is a nifty little trick you can do if you have two or more phone
lines in your house but don't have a phone that handles multiple lines and
does conferencing. There is a very simple way to do it yourself with a
switch and some phone wire. The schematic at the end is pretty simple and
should be easy enough for the layman to decipher.

Problem
-------
I have three phone lines but no multi-line conferencing phone!!! Whaaaaaa!

Solution
--------
Two separate phone lines
Telephone type wire
Solder/soldering iron
Prototyping circuit board (Known as breadboard or socketboard. Get it
at Radio Shack if you are going to use it.)
One phone (preferably with an auto-dialer and
memory for a couple of numbers)

Procedure
---------

1) Strip a few mm. of insulation from all of the phone line wires.

2) Plug the wires into the socketboard so that one line will have wires on
different rows but on the same side. (*'s for phone wires, x's for switch
wires.

-------------
| *| x| x| *|
-------------
| | | | | (Please excuse the ASCII drawing)
-------------
| *| x| x| *|
-------------

Now you can get a switch and connect 2 wires to one side (so each terminal has
one wire) and 2 wires in the middle. This switch must be able to break the
connection between the two lines, or else you will always be dialing out on
two phone lines at the same time (it's cool to call a VMB this way)

By now, you should have a piece of bread board with 4 phone wires that aren't
connected to eachother and a switch with four wires hanging off it. (it
should have 2 positions (one links middle to front, one links middle to back)
you will want to hook up the line with the phone you will be using on it to
the middle and the other line to the front.

Take the two wires hanging out of the middle and plug them into the breadboard
where your main line is hooked into. Take the wires hanging out the back and
plug them into the lines on the breadboard with your other line.

If when you pickup the phone and hear a fucked up dialtone, try switching the
wires around like trading places with red/green on one side only. Technically,
you have to hook red to green and red to green with the separate lines.



Schematic Attempt
-----------------
-- or | is phone wire.
R1 470k resistors.
SW1 should be the middle terminals of a six-pole, 3 setting switch.
SW2 should be the end terminals of the same six-pole switch.
SW3 should be between the lower-left terminal and middle-left terminals
of a different six-pole switch.
SW4 should be between the lower-right terminal and middle-right
terminals of the six-pole switch that SW3 is connected to.

line 1 line 2
----------------o SW1 o--------------------\
| \ | \
| \ | \
R1 R1 \
| | Modular phone plug with an
o o auto-dialing phone on it.
\ \ /
SW3 \ SW4 \ /
o o /
| | /
----------------o SW2 o--------------------/
line 1 \ line 2
\

Miscelaneous
------------

With enough tweaking of this, you can have a simple system of a memory dialing
phone with the numbers of two favorite enemies set in. All you have to do is
call the first, flip the switch and call the second. Make sure your phone has
a mute button because you will be laughing so hard.

I prototyped this on breadboard and you should consider starting yours on
breadboard too. It is really helpful for debugging your circuit.




=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

8888888888888888888888888
7_ Hacking Prodigy _7
;;;;;;;;;;;;;;;;;;;;;;;;;
By: The Dark Lord


Hacking Prodigy is just like hacking any other type of system like
Compuserve, Genie and stuff like that. They all run off the same basic
format as the other. They have an account and the password which is the
password of WHATEVER choosen by the owner of the account. The best way to
hack Prodigy is to find some one that will be willing to help you, that
has a account on the system. If they have an account, they can list all
the users on that certain system, and when you list it it will tell you
the owner of the account and the account number they have. If you know
someone that is able and willing to do this for you then you have half of
the battle won. Just enter the account number and look at the name of the
owner of the account. I would estimate that about 10 percent of the users
will use some part of thier name in the the password.

Example:
Account: EJA0632
Owner: Jamie Wallis
Pass: J.W
or Jamie
Wallis
Jam

That is just an expamle. and with about 10 percent of the people using
being dumb enough to do that you would think that you would have a real
good chance, and in reality, you do but consider this, There are usually
about 300 + users of it. 10 percent of 300 is thirty. Thirty users out of
300, that is still going to be a fun little job just to find one of those
idoits, so don't just jump in thinking that you have it made.
If you are not lucky enough to know someone that has an account, I will
let you know some of the formats and lenghts of passwords and accounts.
The passwords can be anything from Four to Ten digits long. They can
consist of any type of charactors like numbers and letters. The Accounts
are 7 digits, and it can be either letters and or numbers.
dgit23j
I have never found any programs like Pcp Code Hacker. So, most of the
work that you have to do will have to be done manually, which will turn
most hackers off. You can just hack through your ordinary term programm,
but to use the system you have to have the software that they use. The
software is simply called, yes, you got it, "Prodigy". You can pick up
the software for about $30.00, but I see no reason for paying for it. MMC
should soon have it out availible for download. It does have a copywrite
on it, but thats what MMC is for right?
If you would happen to get caught hacking prodigy, the punishment would
be the same as it would for hacking any system, but the thing about it is
prodigy is not a system that you have to worry about being traced on. On
prodigy you get unlimited hours and up to 6 people can be on the same pass-
word at the same time, so the user really isn't loosing out.
You are probably wondering what good Prodigy would be for you? Well,
other that the hacking of the system, I am not real familiar with it. From
what I have heard from the people who use it though, you can do a lot of
your carding through prodigy. There is also an On-Line catalog to do your
carding from. They have catalogs that you can order computer equiptment
and things like that. There are a lot of other little things that you can
do, but other that, the rest are just the Prodigy B.S that pretty much
worthless. Prodigy has the News, Online Games and Up to the minute sports
and other usless stuff like that. You can also talk to others using the
system, kind like an online chat with multipul people. The only reason
that I hack Prodigy is for the Carding aspect of it. It is really nice.
Like I said, I have done a decent amount of hacking on the system, but
did much work internally, so I am not real sure about everything that is
has to offer. Oh well..... I guess its the sport of hacking that is so
attractive.

REMEMBER: The Night Belongs to........The Dark Lord!

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Hackers Unlimited's............

- NATIONAL NEWS UPDATE -


Raising Again?
__________________


Yes you got it. The Phone company is trying to rip us off once again.
Can you belive this crap? I heard a news report lately where the where
taking to a spokes person for AT&T and they said it was so they could by
new, more up to date Supplies. When asked what types, they replied some to
keep up with the higher technology of the phone systems, some to replace
old unsafe tools, and last but not least, better systems to control the
problem of Phreakers. Ooooohhhh, sounds like a great solution to me. So
they are saying to reduce and or stop the amount of phreakers is increase
calling costs? Doesn't make much sence to me, how about you? I think the
reason for phreaking is to avoid the tremendous costs of the phone company,
but when you raise it, I think you might even be making more, right? It is
still in the voting and setting up stages though, so it might not even go
through, and until then, we should just keep our fingers crossed, because
even though you wouldn't think an increase of costs would effect us, it
will because some of the money is going to fight Phreakers.


Hacking & Phreaking
Update

PBX

Well we all thought PBX was safe. Well they still are basicly, but
there is now a new thing that us hackers just found out. It seems that they
can call your phone company and get your number, which they can tell what
phone company you used by a type of user log that has all the information. On
this user log they have the phone number from were the call is being made.
>From this number they can bill ya. Well we use to beable just to use them but
it seems that they do not want to be ripped off no longer. PBX is such a big
system that they usually don't even want to bother. But now there are so many
people useing them that they don't know what to do, so instead of shutting
down the system they are going to bust. It isn't just us hackers that use
these codes but even DRUGGIES, Civilized Bussiness people, and many other
people. What is wierd is how they drugies got started, they don't use
war dialers or anything, but maybe one of our fellow hackers told them. It
don't really matter it is just that from thier stupid ways is how we got
reconized. I was watching Current Afair the other night and they were talking
about Phone Crimes, they caught a billion drugies in the act. Then they found
how we were useing Code Thief and other programs to do our work. They even
know how to get programs and how to use them. What bothers me is that now it
seems that not ONE code is working at the time. Other systems have been
busting people also just not PBX, I just am reporting on this because of the
number of people who use them.

On the TV show I was watching they said that about a third of the use
was from ilegal purposes. And the other 2 thirds was from PBX support
companies. They estimated that phone criminals have a bill of $80,000 over
the whole bill. The bill isn't very high but what they say it is still a lot.
We pay for these long distance calls, that PBX is transmitting, threw TAXES.
Can you believe it, and they expect us to be good an dnot use them like we do,
well that is a bunch of shit. Our taxes should not be used for this, but in
fact the comanies who use them. They are cracking down on the users that
should not be using these codes. So this is not telling to to stop but just a
little reminder to be careful on what you use.

Cable Piracy

Well I know almost half of us have used cable ilegaly, but now is
not the time to start. They now have strongly busted people who are hooked up
illegal. They say if you get caught then you will pay $10,000 fine and a 1
year sentence in jail. What is funny is that they say if you call them and
say you have it hooked up they will just forget the time you used it illegal
and just start sending you bills. Well I don't know if that is true but why
would you tell them anyway. I mean why bother, they will just bug the hell
out of ya anyway, well I don't really know if they will but they say they
wont, they call it the ask no questions plan. It has just been in the last
few weeks that this has been on the news and on comercials on TV. Anyway my
point is if you have it hooked up illeglly then think about what you are doing
and see how hard they are busting down in your area, and if you do not have it
hooked up but thinking about it well the choice is up to you. Just make sure
that you do not get caught. If you are under 18 it will be your parents that
get in deep shit.

VMB

VMB's (Voice Mail Boxes) are seeming to decline. There use to be over
30 boxes, in which half of them were codelines. Since they reconized that we
are taking boxes it seems that they are changing every day. I have never
hacked a VMB myself but there are a few guys who have for me. In which they
say is a "Bitch". I was given about 5 boxes on one system and lost all of
them in about a week. Some have there ways of telling others just get
complains from the real box owner. Boxes seem to get harder and harder to
hack even though they use to be easy (as I am told). The password format
changes everyday, the boxes are gone with in a couple, but with this pain do
you think we will stop? NO! Hackers seem to find boxes or hack them out some
how. They probably stay up all night just to get one box, and then it is gone
with in a day. I don't know about you but that is the TRUE hacker to me.
Hackers aren't suppose to give up, they are suppose to be on the move at least
an hour a day. The thing is, is that some hackers are kids (13-18) and have
to go to school. But why can't they just take some time after school and hack
a VMB or a CODE or some other system. VMB's have been around for a long time,
but it seems that we just relized them yesterday. One thing that worries me
is that will hackers stop hacking? Well I don't really think so, since man
lived in caves there was hacking. VMB's will come and go but there will
allways be one that is in control of a hacker.

Field Phreaking

I allways loved going out and doing a little field phreaking at night.
But the thing that bothers me is how many people have dogs! I think that
there should be a limit on how many dogs are in a neigborhood. But the more
dogs I guess the more fun, right? There are so many things that seems so fun
in the field, fences you have to climb, dogs you have to kick, people you have
to run from, and most of all scaring the shit out of some person who has seen
you. Field Phreaking is very fun and I encourge everyone to try it. If you
don't know what this is then try and find out from another hacker or just
download a text file from your local hacking board. Though I haven't really
got in to the REAL excitement of fielding, I did get in to it a little and
tried a lot, it still seems like a lot of fun. I mean you wont have to pay
for the call and wouldn't have to bother with codes. All you would need if
you wanted to modem it on the field job is get yourself a Laptop Computer.
Hell if you are in to carding just TRY carding you one, the chances on it is
very slim but still, what the hell. You get out in the field and start a
conference and you feel good to brag a little about how you are calling from
Neigbor BOBS house.


Cristifer Columbus


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



Jesters Guide to....

{- 950-0266's for the new Phreaker -}

{- 11\6\89 -}


This is a file I just decided to write, right after a guy
that lives near me, who runs a bbs complained about his
outrageously high phone bill, and being that I use 0266's I
decided that I would TRY to write a text file on how to use the
0266's as a simple way of phreaking. I am not an expert on the subject
and I don't claim to be, I am just writing this file to try to help
out others that are in the same experiance level as the guy that I
was talking about previouly in the file.
There are many different types of 950's, but the type I use is
the 950-0266 and I use these because that is what I was taught
with and they seem like a fairly good, and easy way to phreak.
950-0266s are known to have VERY clean lines, so they are
perfect to use with modems.
The basic format for these codes are:

(1) Dial 950-0266
(2) Wait for tone then dial your 7 digit Code
(3) Right after dialing your Code dial your ACN (Area Code
Number)
I.E. if I were to call my friend Joe in Utah, I would do
this...
950-0266 (tone) XXXXXXX8015551234
The X's stand for the 7 digit code


950's have known to be dangerouse, they are on ESS (electronic
switching service) which is a phreaks nightmare. Being that
950's are on the ESS they can, and have been known to trace.
The type of tracing service on 950's can trace in a heart
beat, so there is somewhat a great risk in using these.
* Some precautions about using 950s - Do NOT use the same code
for more then 3 days. Try to use different codes if you have
them i.e. call one board with a code like 2314211 , and then
call the next board with a totally different code. Use these
codes during prime time, to cut the risk of getting caught
down. And use these in moderation, do not get crazy with them.

I hope this file hasnt been to much of a waste of time, I
hope it has offered some help to you in using 950-0266's.

I would like to have suggestions and comments on what you think
of my file. If you have valid Input, please let me know your opinion
on one of my Vmb's. Obviously Vmb's don't last forever, but as for this
now it is valid.....


Editors Note: Jesters Box has just been cut before the release of the
magizine, so as of this time, he has no Vmb's available for comments.
Information will be updated as it is recived. Thanks



Copyright (C) 1989 by -NecroiDaemon


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=



The Dark Lords..............

}2
(NNNNNNNNN] Top 10 BBS's sNNNNNNNNN)
|6


[Message Bases:]

1. The Vulcan Way (303)979-9418
2. The Discordian Society (303)973-3472
3. Late Night Prowl (303)499-2928
4. Inter World (303)363-7960
5. Hack Shack II (303)782-0215
6. The Vulgar Unicorn (303)680-8622
7. ShockWave (303)469-3510
8. Insane Asylum (303)447-2691
9. Forbidden Planet (303)755-5934
10. Software Exchange (303)779-4451



[File Bases:]

1. Late Night Prowl
2. The Discordian Society
3. ShockWave
4. Inter World
5. Vulgar Unicorn
6. Vulcan Way
7. Forbidden Planet
8. Hack Shack II
9. Insane Asylum
10. Software Exchange

[Sysops:]

1. Late Night Prowl [The Fritz]
2. Hack Shack II [Kedma Oediv]
3. Vulcan Way [Spock]
4. Inter World [Tushka]
5. Vulgar Unicorn [Lore Master]
6. ShockWave [ShockWave Rider]
7. Insane Asylum [Live Wire]
8. Forbidden Planet [Dr. Morbius]
9. The Discordian Society [Hagbard Celine]
10. Teminal Entry [The Dream Master] (303)794-2083

[Hack\Phreak Oriented:]

1. Terminal Entry
2. Late Night Prowl
3. The Discordian Society
4. Hack Shack II
5. Insane Asylum
6. Software Exchange
7. N\A
8. N\A
9. N\A
10. N\A

[All Around:]

1. Late Night Prowl
2. The Discordian Society
3. Hack Shack II
4. The Vulcan Way
5. Inter World
6. The Vulgar Unicorn
7. ShockWave -- \ The Two Tied....
8. Insane Asylum -- /
9. Terminal Entry
10. Forbidden Planet


I would like to take this time to Explain to you how this was judged.
First, both me and Cardiac Judged the BBS's on there rating. Once all the
catagories were filled, we went on a 1-10 scale and the one with the most
points won. This listing is of only Colorado boards, and in no way are
they the best out, but I wanted to start somewhere. Heres what we am going
to do. Leave me your nominations for the best boards in any of the topics
besides overall best board. Once you send in your nomination we will look
at the board and judge it. I think the "Best Sysop" part will be taken out
though due to that fact that a couple of calls cannot distiguish the Sysops
at all.

Remember: The Night Belongs to..........The Dark Lord!


=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


E
\ \
\ [- CBI's -] \
\ \
.


First off, If you are wondering What a CBI is it is like a TRW but
has a different setup. You can call and with the right information on
the person you can get the credit cards that they now own, and there
credit history and all the cards that they ever had. These are as touchy
(Dangerous) to use as TRW's but just as much fun. This is a good thing
for carders. It is a way to find a person that is rich, and get the info
that you need on them, and the get there card and CHARGE, CHARGE, CHARGE!
CBI's will tell you the amount that you are allow to charge and the
whole 10 yards. This is also a very effective way of taking care of people
that you don't particuarly care for. All ya have to do it find there card
(Mom Or Dads) and work from there. Open your mind to it though. Don't
just charge with it, do much more, post it on boards and VMB's, Get the
needed accounts and close there account. In other words, make it to where
they can no longer charge on that card because it has been, how should we
say....."CUT". You could also order all the things possible with the card
and have it all sent to the front door of the person that you are getting
back at an have everything addressed to him. If he/She is living with the
folks, its Murder time, and if not, they have to explain why they are
returning all the stuff and why they went over there carge limit. They
Way CBI's are set up, this is the procedure you will need to take:

1. You will call and get a connection. Most CBIs will be 300 baud and
you will need the settings of 7-E-1.

2. You will need to carrage return Three times. Once you have done that,
hit CTRL-S followed by another return

3. Enter the Account. Then Enter another CTRL-S. After that input the
Lastname, First name, then the Middle Initial.
Ex. Wood Sam K

4. Hit a Return and wait for a couple of seconds (5-10)

5. Enter the Address, Apt Num. etc..., City then the State and last but not
least the ZipCode. The State MUST be an abreviation.

6. Once again hit the CTRL-S and you can work it from there, doing what
you need to with the card.

Now, all you need is an account and a Dial up. There should be one near
you, kinda like a 7-11. but I don't have the dial ups to any except for
the one in the 713 Area code, which is.....(713)591-8900. Since t

  
his is
a unsecure thing to use, I would suggest a diverter or something like that,
just makes it a little funner becuase you have better odds of fully
succeding.

Remember: The Night Belongs to............The Dark Lord!



=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


Hackers Unlimited wants....... YOU!!!!!

The Editors Of Hackers Unlimited would like your input on a couple
of issues. They all concernce the format and the workings of the magazine.
We need to know....

o Should H.U be One BIG file or all the individual files
o How often should an issue be put out
o How big should each issue be

These are all questions that we would like your input on. We have an
idea how we want it, but it is still up in the air and your opinions would
be appreciated. Let us know through any of the ways that we have listed
through out the magazine. Thanks

- The Editors

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

___________________________________
ENNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
W -- Rumors of '89 -- W
.NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN
By: The Dark Lord


There has been many rumors that have floated around in the year of
1989 and I imagine there will be a lot more seening that the year is not
over yet. The first on that I heard was the one involving FHP (Federation
of Hackers and Phreakers). They are a so called "ELITE" group and only the
"Proud Few" get in. Around July of this year, there was a rumor going
around about a spy, if you want to call it that, within the ranks of FHP.
Supposidly the spy was giving away the working codes to the Phone Companies
and giving away the dial-up that are used a lot because they are considered
to be safe. The spy also was said to be turning in a lot of the memebers
of FHP and some other in and out of the orginization. FHP took immediate
action in freezing all applications until the whole ordeal blows over. I
cannot tell you whether this rumor was or was not true, simply because
I was and outsider looking in. I was not in the group, and besides what
information I had gathered I did not know what was actually going on within
the group. I dunno if FHP actually found the person, if the person left,
but was never descovered, or that "Person" was just a rumor. Either way,
there was disorder within the group because as I recall I had sent in my
application and I was assured in by one of the Higher members, but they
never seemed to, Unfreeze, the application process. Nothing against FHP,
but from wht I see where it is going now, I am kind of glad.
Another rumor was one of a Pcp Code. It was a carded account and it
was caught before the person recived the information on the account (Pass,
account #, etc....). Instead of killing the account and not sending the
informtion to person, they went on with it but traced the account. I am
not sure how often they traced but I imagine that it was a decent amount.
I dunno if this rumor was actually true of just a coinsidence but a person
I know did get snagged on a Pcp. Hopefully you do learn for this little
expedition, that it is not one of the wiser things to do, Carding a Pcp
account that is.
Yet Another Rumor that was going around is a trap Pbx. The dial up for
this Pbx is still in service. It had the procedure of 9 + 1 + ACN and that
was said to be specifically designed as a trap. I have used Pbx's for a
long time now and to this day I have never heard of ANYONE getting in any
trouble over any Pbx's, that is the reason I had trouble beliving it.
Once I heard this rumor, I did a little research of my own on the Pbx's and
I found a couple of intresting this proving the rumor to be false. Let me
give you a list of them, then I will explain them more thouroghly.

d No one had been Busted for the Code
d The Part that was set up for the trap was the same procedure as most.
d That dial-up, to that point was supposidly "Virgin"
d Phone company workers said nothing was said about that particular one
d Difficulty of a Pbx trace
d The attitude taken by the Pbx owner

Those are the major pieces of information that I got. First, no one
was busted on the code. The whole rumor was total speculation. Second,
The thing that was supposidly the "Trap" part of the code (9+1+ACN) was the
procedure used by multiple Pbx systems. Third, the dial up for the Pbx was
supposidly Virgin which would mean that the owner of the Pbx system would
have to move extreamly fast. Fourth, I know many people that work for the
phone company. They hear a lot of the stuff that is going around, and some
even do the traces themselves and none that I talked to heard a thing about
it although there are many that they never hear about. Fifth, One on the
workers of the phone company that I know has installed a lot of Vmb and Pbx
systems. He said that it is REALLY hard to trace on a Pbx because of all
the switching the system does. And he even went on to say, if you get on
certain trunks in the system it is nearly IMPOSSIBLE to trace. Last, the
attitude of most of the companies owning the Pbx is in the favor of the
phreakers. They are so big, they never miss the money, and not only that,
they can take the damn thing as a tax write-Off. Before I go any further,
I would like to thank the people who supplied me this information. I will
only mention one, because he is the only one that has an alias. That
person is Kedma Oediv. Thanks Kedma!!
The Last one that I will talk about is really vauge. I have heard VERY
little about this one, but I figured that you might like to hear about it.
It is a very new one, and supposidly there is a FBI agent in the 804 area
code, logging on most of the pirate boards, gathering informtion on people
so they make make a bust. That is all I know about it, but it is kinda
a word of caution. If you call or live in this area, you want to be a
little cautious, but don't worry about it. Ninty percent of the rumors I
have heard I have gathered enough information to say that they were a bunch
of crap.
Well there was a couple others, and like I said, I imagine many more,
but those are some of the ones that I heard the most about. I will try to
keep you updated on the newest ones, so you can put them to rest once and
for all, cause I know I have wondered about some of those that are still
hanging around in the air somewhere.
One last thing that although is Kinda Dorky, but I just HAD to add this
for some reason. Well its really not a rumor, but I'll say it is for the
sake of argument. Teenage Warroir is a COMPLETE DICK, and has Millions of
alias's just so he can get access to boards.


REMEMBER: The Night Belongs to............The Dark Lord!


-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-





Hackers Unlimited...........

___________________________________________
/ \
- Phreak\Hack Definitions -
\___________________________________________/
\_________________________________/




ACD...............Automatic Call Distributer

ACN...............Area Code Number

AIS...............Automatic Intercept System

ANI...............Automatic Number Identification

BHC...............Busy Hour Calls

CAMA..............Centralized Automatic Message Accounting

CCIS..............Common Channel Interoffice Signaling

CCITT.............International Telegraph and Telephone Consultive Comm.

CDO...............Community Dial Office

CO................Central Office

DDD...............Direct Distance Dialing

EOTT..............End office Toll Trunking

ESB...............Emergency Service Bureau

ESS...............Electronic Switching System

ETS...............Electronic Translation System

MF................MultiFrequency

NPA...............Numbering Plan Area

ONI...............Operator Number Identification

PBX...............Private Branch Exchange

POTS..............Plain Old Telephone Service

ROTL..............Remote Office Test Line

RTA...............Remote Trunk Arrangment

SF................Single Frequency

SxS...............Step By Step

TSPS..............Traffic Service Position System


There will be other definitions added in the next addition, and most of
these were either from our own knowladge or from the BIG Phreakers manual,
I appoligize for that, and appoligize that there is no definitions but
there was and still is a BIG request for an overview of definitions, and
we just ran out of time, so just bear with us.
Thanks!!!!

- The Editors



=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=


Hackers Unlimited Listings

-=] VMB's [=-


Were Sorry, but The VMB's had a last minute
Problem with most all listed being killed, so instead of
a last minute revision, It will not be included. We will
have an updated on in the next issue.


-=] ----------------------------------------------------------------------- [=-


-=] BBS's [=-


Fone Number Name Baud Comment
----------------=============================--------==========================
(201)502-9115 Underground II 2400 Sysop : Rambone
(205)554-0480 FireBase Eagle 9600 Pirate Master Distribution
(205)979-2983 Byte Me 2400 Sysop : Omega Ohm
(206)255-1282 Ethereal Dimension 2400 Wasington's Finest
(206)352-4606 Alternate Reality 2400 Sysop : Mr. Classic
(206)462-7718 The Void 2400 Sysop : Zeke
(206)827-2029 The End 2400
(206)839-5865 Neutral Zone 2400 Home Of TWNC
(213)476-6490 Mystic Knight 2400 Sysop : The Sniper
(213)833-8309 Insomnia 2400
(217)332-4019 Golf City BBS 2400 Sysop : Egghead Dude
(217)359-2071 Realm Of Darkness 2400 Sysop : Dark Shadow
(303)363-7960 The Inter World 2400 Sysop : Tushka
(303)499-2928 The Late Night Prowl 2400 Phreak/Hack
(303)649-3510 Shockwave 14.8k Telegard Beta Site
(303)680-8622 The Vulgar Unicorn 2400 Games Only
(303)755-5934 The Forbidden Planet 2400 Utilities Only
(303)779-4451 The Software Exchange 2400 Sysop : The Gigilo
(303)794-2083 Dragon's Bane 1200 3pm-7pm Mountain Time
(303)933-3472 The Discordian Society 9600 Discordia Stuff
(303)979-9418 The Vulcan Way 2400 Star Trekkies
(312)297-5385 Gamer's Galaxy 2400 Sysop : Robocop
(408)446-0316 Lake Of Dreams 2400 Sysop : Grey Ghost
(408)268-6692 Billionaire Boys Club 9600 Home Sentinel BBS Prog.
(408)735-8685 Dragon's Heaven 2400 Wares Galore
(409)763-4032 Smash Palace South 2400 Phreak/Hack
(617)364-3304 Swift's Ridge 2400 Sysop : Sir Swift
(717)566-1129 The Frozen Desert 2400 Phreak/Hack
(801)298-1736 Port o' Tales 2400 Sysop : Black Beard
(801)486-5918 Crazy Nights 2400 Phreak/Hack
(817)545-5031 Satan's Hollow 1200 MMC Dist. Site #1

**NOTE : Don't complain about inaccuracies or missing numbers. I whipped this
up on the spur of the moment, and I didn't have time to gather information. So
PLEASE contact me with additions or corrections.


-=]-----------------------------------------------------------------------[=-

If you wish to submit any additions, deletions, or corrections, please contact C
ardiac Arrest.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

-==>>>> PLEASE READ THIS!!!!!!!! <<<<==--
^^^^^^^^^^^^^^^^^^^^^^^^



A lot of the listing and things like that might be WAY out of wack. It
is extreamly hard to keep up with the listing due to the way all the Vmb's
and stuff die so rapidly. The problem wasn't as bad as in the last issue,
but there has just been a massive killing on the boxes, and a lot more are
expected to go, so like I said, its hard to keep an accurate list right
now. Sorry for the inconvience, but we will try to keep it as up to date
as we can up to the release of this issue. Thanks....

- The Hackers Unlimited Staff



=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=




**Additional Note:

The information in this magazine is subject to change. We, the writers
have no control over the change of these thing, nor do we know when and what
they will be changed to. Things such as VMB's, dial-ups, etc. may die or
be changed and the information in this will no longer be valid. We will be
releasing other editions of this magazine in hope that the information will
all be up to date and of use to all that read the magazine. As you may know
we cannot keep up with some of the changes and things that happen to the
things we have mentioned. Due to that, we ask your support in letting us
know of these changes and such through or Mickey Mouse Club VMB, if of
course, it is still valid, or through distribution sites or any other ways
the you know of to get in touch with one or more members of MMC. Not only
will we accept information on changes, we welcome any new and/or better
information, tips etc. Let us know if you would like to write a section of
this magazine, and what you would like to write. We are rather picky about
what is put into our magazine, but that is because we want the utmost quality.
Please don't be intimidated by the standards we have set, we still would
appreciate the chance to see the things that you have written, as there is a
lot of valuable information that could help the effort in improving this
magazine.


Well, that is it for "Hackers Unlimited". We hope you enjoyed, and have
gotten a lot of information from, it. There was a lot of time, and a lot
of effort put into this from a lot of fine writers. The editors of Hackers
Unlimited would like to thank these people for contibuting to this fine piece
of writing, both in the writing of articles and the support of this project :


Jester Fallen Angel
Cristifer Columbus Doc Silicon

Plus the Editors:
The Dark Lord
Cardiac Arrest


And all the people that didn't laugh at the name The Mickey Mouse Club


We hope this magazine has provided you with more knowledge than when you
started reading it. If you have, we ask that you use this knowledge for not
only the benefit of you, but for the benefit of others. There are a lot of
beginners in the areas that we have talked about throughout this magazine,
and all they need is the know-how and a little experience to make them
into good phreakers, hackers, carders, you name it. Well, once again, thanks
to all who contributed to Hackers Unlimited and thank you for reading, (and
hopefully) enjoying and distributing Hackers Unlimited Magazine, a Mickey
Mouse Club production!



des

← previous
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT