Copy Link
Add to Bookmark
Report

SHA: Annual Year Protocol #3

eZine's profile picture
Published in 
SHA Annual Year Protocol
 · 9 May 2021

  
>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>

SWEDISH HACKERS ASSOCIATION PRESENTS
1990 THE 3rd PROTOCOL 1990

EDITORS : LIXOM BAH
: MR BIG
: PHEARLESS
: THE CHIEF

ALL TEXTS IN THIS REPORT IS CONTRIBUTIONS
BY ORIGINAL MEMBERS!
THANX TO EVERYONE'S CO-OPERATION AND SUPPORT
THIS PUBLIC DOCUMENT IS NOW IN YOUR HAND.

<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<

INTERNATIONAL HACKERS ASSOCIATION'S HEADQUARTERS

##-###-##### TOUCHDOWN BBS (SW)
##- #-###### INTERPOL II (SW)
##- #-###### PROJECT ATHENA (SW)

(ED'S NOTE: No telephone numbers are included in the PUBLIC VOLUMES)

<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-INDEX-
EDITORS INTRODUCTIONS......... 01

Editor's Page #1........ 02
Editor's Page #2........ 03
Editor's Page #3........ 04
Editor's Page #4........ 05

Hacking Rules & Advice........ 06
Cray & IBM In Sweden.......... 07
S.H.A. Member Busted.......... 08
Unix Security................. 09
Are you a Homocidal Maniac?... 10
Brittish Hackers Blackmail.... 11
The New HQ.................... 12
University Hit By Hackers..... 13
New Hackergroup Busted........ 14
New NETwork Soon Here......... 15
Telco Traces Calls............ 16
Terrorists Handbook found..... 17
New Wave Of Computer Coups.... 18
Datema-Company Sold........... 19
S.H.A. Visited ESA Computer +. 20
How To Keep On Hacking........ 21
Storytime! 'The BIG system'... 22
Editor's Final Notes.......... 23

How to contact S.H.A.......... 24
Credits and THE END........... 25

<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-1-

()()()()()()()()()()()()()
()() INTODUCTION 1991 ()()
()()()()()()()()()()()()()

Welcome to another interesting and stunning protocol from S.H.A. - The
leaders of True Hacking in Sweden today! The Only True Organization that
keeps the old and genuine way of hacking. We have collected the finest and
best writers for this issue, and have some nice and special views, tips,
reports, stories and jokes for you, the reader. This is the Only Series
that is released to the general public, which means that nothing is signed
under real names or handles and that no direct phonenumbers are published,
though for those who consider themselves hackers, we have a modem 'mailbox'
where you can contact us (see the end of the file).

By keeping a steady contact with our friends in the United States in the
'scene' we have learned and experienced a lot, been there when the busts of
the FBI Operation SunDevil raged trough the underground world, watched BBSs
go down, and come up again (if lucky). We have seen a new and very special
bulletin board system where Feds and Hackers can discuss and change views,
as well as share their own thoughts about their hobby, classified 'illegal'
by the counterpart. We have seen the 'carding' scene vanish through tough
and sometimes cruel work by the feds, and as an effect of this, the hacker
scene suffer as well. If you called underground boards in The States a
couple of years ago, and went back today, you would be in a state of shock.
You won't find a genuine HACKER ONLY underground board anywhere! They have
Sports, Tv reviews, Music, Classifieds, Religion, Politics, Ads, Technique
and this goes on and on and on until at last, if you're lucky one or two
small and unused hacker subs. You start to scan through the sub, only to
find that the last message was written about two to five months ago,
regarding anything but hacking. This is truly a sad development 'over
there' because when we here in Europe are breaking new barriers and
stretching out to the 'big country in the west', we can't find people with
similar interests who are active, or seem to be active anymore.

I guess this is how it really is today, but we all know that Hackers
are reluctant to make 'new' friends, or admitting that they really Are
hackers, which is the correct way for a hacker, but in my last two years
in the underground scene in America, I thought I would finally see some
people 'lighten up' and talk to me about hacking and it's effects, but I
am now ready to give up, because I haven't seen nothing yet!

Well, that's my point of view from the American Underground today, let's
go on now with this issue of THE 3rd PROTOCOL. As I said, we have all kinds
of stories, tips and treats for you, so just relax, get a nice cold coke,
switch on MTV with Yo! MTV Raps & Fab Five Freddie and read this cooooold
chillin' issue. PEACE!


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-2-

PAST AND PRESENT

The year that have passed have been very critical in many ways. We have
tried to get more serious members by tough advertisments and by keeping a
low profile without any results. We are open to new members, but they have
to be serious, and have to follow some kind of rules, what you can, and what
you can't do I mean. Such persons are hard to find in Sweden today, let me
tell you. It seems like those who already are members are the only ones
left in this country. It is a sad statement, but until we find new members,
that is the truth. I would personally like to see a more qualified bunch of
people who enjoy and respect the world of hacking, who see the excitement
and the pleasure of bending that 'door' and look into the world of computers
and systems whithout having to break and trash them and going to a genuine
state of illegalities. I don't find Hacking a criminal act as long as I
don't trash, crash, take or alter files and programs on the systems I hack.
It is a sport in a way, and a search for knowledge in another and the only
competition I have is the people who have made the security on those systems.

I don't respect people who don't know what they're doing when hacking and
the same goes for people who crash systems and still call themselves
'hackers'.

I don't respect newspapers or journalists, who add the word 'hacker' to
every goddamn headline when talking about something else as long as it is
about computers and crooks, just to make the whole article more interesting.
Another sad statement here is that they jyst don't know what they're talking
about. They have no education in computers or areas close to computers. The
only education they have is a journalistic one, and that's not enough it
seems.

The other critical area, is the more illegal branch of the underground
computer world. You probably have heard the word 'carding' before, but not
in the way someone within the underground have or have experienced. One of
our members got caught this year because of carding. That person just broke
the limits and overdid it. If someone tries to make you 'card' something
or tries to teach you how to do it; Don't! I don't recommend carding to my
worst enemy even. It is too risky and too illegal to get involved into.
Although Sweden is far behind the Big Hacker Country in the west, both in
ordinary Hacking and Carding, we have the same laws when it comes to Carding.
The law is very strict here, and will never look the other way in these
matters. If you followed another case about a year ago, you read that they
got a very generous sentence; just small fines, and all of them didn't
make it that far even! One of them went out of there without any charges
at all. Just don't think that You will get away that easy these days. The
Police and the swedish FBI (SAPO) are tougher and the creditcard companies
are changing their security, allowing the companies who recieve orders
to check almost everything. The Customs are close to the Police and will
not accept a 2 by 2 meter large package go through with a 'worth 500 SEK'
stamp on it without checking the sender, the reciever and the package
closely. And the swedish VAT (MOMS) is now at 25% which makes the price
You pay on arrival very high (if you make it that far). Now those who
are into this kind of thing says 'That's easy! Just order it by FEDERAL
EXPRESS and everything goes on the creditcard!', that is true, I don't say
that it doesn't, but the companies that use FEDERAL EXPRESS seem to be
larger, have more money to check all creditcard orders, and have the
power and money to contact the Federal Bureau of Investigations who contact
their collegues in the country the order was placed, and follow the whole
thing trough. They have money, time and enough background to prosecute.
The final word here is just; Whatever you do, Don't! It's not worth it!


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-3-

DIFFICULTIES

It IS difficult to find experienced hackers! This is the truth. We have
tried to find these persons by 1) Letting them come to us, and 2) Go out
advertising on public boards (This could be discussed being a smart move
or not).

None of them have resulted in more members in the SHA, only that more
Novices (With a capital 'N') have contacted us. This may not sound as
serious as it is! Hackers Must go together with their experiences and
knowledge to hack the most heavily guarded and secure systems. This will
be the only way to even have a chance to beat future systems.

Also, a big group of hackers who 'Know What They Are Talking About'
manages to come up with more ideas, and of course, more contributors to
informative textfiles like this one.

Another thing is also that more hackers can collect more new happenings,
because it's (still) happening very much on the computer/modem scene,
and it takes a lot of people to keep up with the computer systems fast
developments.


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-4-

NEW AND CLASSIC NEWS
WATCH OUT!
==========

5 years in prison, that's what could happen to hackers in Great Britain
nowadays. A new law have been introduced that will make it much more
dangerous to hack computersystems, but since almost every other european
country already have this law, I think it will make no difference in ac-
tivity from our great friends.

The law says that if you enter a system in an illegal way, you could get
6 months in jail, or fines up to $4000 but if you enter the same system,
but only with DESTRUCTION in your mind, you could be punished with up to
5 years in jail.


UNIVERSITY HACKERS CHARGED
==========================
1990 February

Two youngsters have been arrested for illegal use of a computer at a
Swedish university. Last winter they made a successful hack and searched
for information about grades and tentamen-results. Both hackers risk
fines, and they have to pay the university $1500 in damage costs.

- I didn't think the school had so much to learn me, said one of the
students.

Instead he hacked his way into the administrative computer system. But
due to a mistake from his side, the school-staff was warned and they un-
derstood that a unauthorised user had been in their system. The same ev-
ening, one of the system operators started his hunt for the hacker.

After a while the hacker was traced to one of the computer rooms at the
university. The operator was quite sure he had found the right person,
but he had no evidence. When one of the hacker's friend called the univ-
ersity from the outside, the call was traced, and the game was over.


American Hackers are developing a chinese VIRUS!
================================================

Some months ago I read an a newspaper, and suddenly I saw an article
about communism, and above the text, there was a picture of some
youngsters sitting by their computers. Interested as I was, I started
reading.

I read that some American hackers had plans to construct a virus, that
should be spread on the nets in China. The virus was supposed to be a
destructive one, it was going to erase all data it came in contact with,
and write

LI PENG SUCKS! (That's the prime-minister in China)



SIX PERSONS SUSPECTED FOR FELONY COMPUTER CRIME
===============================================
Six hackers between 18 and 20 years old, are suspected for extensive
computer swindle at the Swedish University in Linkoping. They had hacked
the password to the universitys databank, and caused damage for at least
$13000. The persons at the university got suspicious when they got a
phonebill on $15000 HIGHER then the normal, and called the police.

Trial is waiting.


GERMAN HACKERS CONVICTED FOR ESPIONAGE

The first hackertrial in German history started in February-90. Three
hackers got conditional sentences, because they had had entered some
military systems and then sold the information to the KGB.

The court in Celle outside Hannover, found all three guilty to the
crime. The both hackers Markus Hess and Dirk Brzenzinski had hacked
their way in into both military and commercial nets in USA, Europe
and the Orient. The affair gave them $60000. The third man, Peter
Carl, who worked as a croupier at a casino, where supposed to act as
the contactman. He went to Berlin, where he passed the disks with
information to the KGB.

Earlier there was also a 4th prsecuted, but he took his life in 1989.
An American programmer reacted when a bill came to an account that
didn't exist. The programmer suspected hackers, and spent one year
on an investigation. And after that, he got them on the hook.
(The bill was on 80 cents.....)


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-5-

HACKERS...

One word that the media have made an ugly word. The media view of hackers
is that they only want to steal information and destroy information if
they can. More or less, they work for the KGB.

What could be more wrong? Hackers are people who are only interested in
penetrating secure systems. Of course there are always people that
might destroy information, but they are often people who are novices
when it comes to real hacking and don't know much about it. Why should
anyone want to destroy information just to be discovered and kicked out,
if they want to use the CPU?

Unless the media start to write about how it really is, I think that they
more or less will influense young novice hackers that they should behave
like that, and then we will have a dissaster when these people learn how
to get access to systems.

And because of this bad publicity the police are spending more money on
trying to trace down hackers who only want to learn more.

I think we few real hackers have a hard time before us. Our golden days
were a couple a years ago.


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-6-

HACKER RULES AND ADVICES
a fast guide to make LESS mistakes when IT happens.


* If you get to a system you don't recognize at all, store as much
text you can, WITHOUT LOGGING ON and ask someone who you think knows
more about it.
Note: Ofcourse, you don't give anyone who knows less than you the
number.

* A Hacker is always trying to get as much access as possible on the
systems s/he have hacked into.

* Remember, a number to a system that you've found on a public BBS
could be a trap just to bust someone like YOU.

* To create new accounts:
- Never do this when there's top 30 users.
- Let the new user's name be in the middle
or maybe in the end of the user list. (Mostly alphabetical)
- Avoid creating a new user by refreshing an old, dis-used
username, (like: Last login 21-JAN-1987)

* If you note a new command or a new instruction, store all text
available from help menues and similar, and ask someone who you
think knows more.

* If a system you use to call has been modified or maybe updated,
store text and ask somebody.

* If you are planning to do something on a system you NEVER have done
before, and you're not sure about Everything about it... Don't do
it. ASK someone more experienced to get further advices.

* Remember: The bigger company, the bigger the chance is that they

- trace calls with 'odd' behaviour
- have unique security-systems and routines
- have a lot of active users

* MOST systems stores ALL faults and errors you cause (typing fault,
access violations). So if you don't know what you're doing by
100%, don't do it.

* Never even START hack a system you don't know how to handle in some
way. The only exception is systems who doesn't introduce themselves.

* When you've hacked into a system, do the following IMMEDIATELY
1) Open your capture/buffert for incomming text
2) List the logged in users

ALWAYS LOG OFF IF...
a) ... any kind of System Operator is logged on.
Note: On some systems, the System Operator's console is
always logged on to the system.
b) ... there's any kind of Project Manager logged on.
c) ... another user with 'your' name is logged on.

GO ON IF...
a) ... you seem to be alone, or only normal users are logged on.

3) If you have system privilegies, try to shut off (Not DELETE!)
the (if any) system logs.

4) Capture EVERYTHING in the help menues or similar. IMPORTANT!

5) Try to list all available directories (or all directory names,
if nothing else is possible), no matter how many they seem to be.

6) Get as many other usernames as possible.

REMEMBER:
a) Never send letters or phone any other users through the system,
before you have EVERYTHING under control.
One exception though, when you are trying to 'fool' some users
to give them more usernames or/and passwords for projects etc.

* If you get in on a user and you of some reasons know that you WONT
get back in again ('forgot' the password, got 'thrown in'),
follow the whole "When you've hacked into a system..." EXCEPT the
ALWAYS LOG OFF IF... at 2).


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-7-

[SUPERCOMPUTERS]

[CRAY X-MP/48] [IBM 3090-600J/VF] [ETA10]

Sweden have these computers (which I guess you might recognise). Two of
them are in use, and the third (ETA10) is now taken out of service to be
shipped back to the United States, and as a hacker, you realise the power
and the pleasure of hacking one of them. Therefor I've written a little bit
of information for you to drool on.

-=* COSTS & PRICES *=-

Well, this is a matter of HUGE amounts of money we talk about here.
SE-Banken (a bank here in Sweden) and Wallenbergsstiftelsen financed the
Cray X-MP/48 with an amount of 59 Million Swedish Crowns (about US$
10.000.000 (US$ at 5.80 SEK) and the IBM 3090-600J/VF was paid with donated
money (no information from whom). The price? A small sum of 150 Million
Swedish Crowns (about US$ 26.000.000). Handelsbanken (another bank) finaces
the scientists 10.000 CPU-hours / year with 15 Million Swedish Crowns (US$
2.600.000). If you want to use the IBM, you'll have to pay between 15.000
and 20.000 Swedish Crowns per CPU-hour. The Cray is a bit cheaper to lend
at 7.000 Swedish Crowns per CPU-hour.

-=* OWNERS *=-

Who have got the money to run these machines? The IBM is owned by
Kommunen (the local government) and a company called NorrData and the Cray
is owned by SAAB, who gets 25% of the capacity in exchange for paying
running costs.

-=* USERS & USED TIME *=-

Users of these two sofisticated systems are mostly scientists, but also
two big universities, namely UMEA and LINKOPING. The local government in
Skelleftea use the IBM for salary payments on the side of all science
projects, and like stated above, SAAB have 25% of the capacity on the Cray.
These computers are not used to their full capacity today. If you make a
scale, you would find that the IBM is have 60% administration, 30% resurch
and the final 10% is sold to the industry. The Cray on the other side have
75% universities, and 25% SAAB. But these figures just show how much time
that is disposed, not how much is used. All scientists who wants to use
these computers are granted access today, perhaps not the amout of time
they want, but still access. There is a need for more users and companies
to make these computers worth the money, time and effort to have them
running.

-=* SECURITY *=-

The American export-control authorities have restricted Sweden for
export of these machines to the East (which is understandable). In Sweden,
the rules is decided by Forsvarets Materielverk (Military), and include
several restrictions about foreign users (certain nationalities) who are
not accepted and therefor can not use the computers. Accepted users are
supplied with a special authorization-card and an equipment that generate
passwords.

-=* THE FUTURE *=-

Today, the most reason companies and users give when asking why they
don't use these computers more or at all, is that they are not running
under UNIX or some kind of operating system that is portable from other
systems. Therefor, these computers will have unix-similar operating systems
very soon, to allow new and more use and portability of code and programs
from smaller computers and systems.


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
-8-

=================
SHA MEMBER BUSTED
=================

In October-90 a S.H.A. member was brutaly busted, and charged
for creditcard fraud and illegal attemps to enter some
computer-systems here in Sweden. The member spent 46 hrs in
an isolated cell at the central Police Headquarter in
Stockholm. While he was questioned, the police searched his
house twice.

- When I finally got home, I nearly got a heartstroke, some
of my computer equipment was taken, and the worst thing of
all, they had taken ALL my dumps, printouts and notes as
evidence, says the busted hacker.

<<More about this bust can be read in another S.H.A. release>>


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-9-
UNIX SECURITY

Unix is a very open OS and have many flaws in the security because of this.

The first security hole is the /etc/passwd file that any user can read and
that contains the encrypted passwords.

It is very easy to write a small program that use crypt(3), the internal
unix cryption routine, to scan all accounts for common passwords or to match
against a dictionary. The one that unix have, can be used.

Newer unix versions like AIX, the IBM version, don't have the passwords in
the /etc/passwd, since they are stored in a non-readable file since the US
Defence C2 doesn't allow users access to encrypted passwords.

It is even possible to re-create a password through the encrypted version,
or atleast get a limited number of passwords to try.

Impossible, you might say. The passwords are one-way encrypted!

Yes! They are... but you also have more then one password that gives the
same encrypted result since you lose information when you are encryting the
password. You can go the other way and get about 4096 possible passwords
and then only match these against /etc/passwd. This is a great advantage
over scanning all possible combinations of root passwords in the standard
way might take a year or so before you hit.

The hard part is to get your hands on crypt(3)-source and be able to rever-
se the encryption...

And that isn't a easy way since crypt(3) isn't written to be understood by
common people. But it is possible...


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-10-

-=*> ARE YOU A HOMOCIDAL MANIAC? <*=-


If you are one, you truly are a danger to your surrounding and should be
visiting your local shrink, very often...

Answer these questions honest to yourself, and then count together your
points.
Written by a [normal] SHA contributor.

-------------------------------------------------------------------------------

1) You are watching this movie (Texas Chainsaw Massacre I), and when the
hero (Leatherface) cuts deeeeep into some 'poor' human with his
roaring little motorised tool, what do you feel?

[a] Ohhhh, brother. Disgusting, Puke!
[b] Booo! Miserable special effects!!
[c] You start drivelling...


2) You're at a party with all your friends gathered. After a while you
(ofcourse) are fighting as hell with some stupid motherfucker that
doesn't see that you're ALWAYS right. Ok, you win and the beaten shit
runs to the door screaming "Hey, fuckface! You're lucky that I didn't
kill you!" and slams the door shut behind him.
What is your reaction?

[a] Say "The fight is over, go home now!"
[b] Scream back "Say that again and I'll kill YOU!"
[c] You take something sharp from the nearest table (knife, siccors,
vase) and run screaming after him.


3) You've just bought some bread and beer for the weekend and suddenly
you see a rifle with several boxes of ammo in an unlocked car.
What do you do?

[a] Goes home without thinking more about it.
[b] Steal it, to sell it off later.
[c] Drops everything you hold, open the car door, takes out ALL boxes
of ammo and load the rifle. And then you go around shooting
moving targets all the day (Cars, people, playing children, cats,
dogs).


4) You are driving down your street, and you see a woman and her two
daughters waiting to go across the street. How do you react?

[a] Stop your car to let them go across the street.
[b] Stop your car to let them go across the street, and roars the engine
just to frighten them as they pass your car's front.
[c] Stop your car to let them go across the street, but when they are
exactly infront of your car, you smash the pedal and run over them.


5) You pass a window on the 15th floor and see somebody standing outside
the building, just at the wide open window. Your plans?

[a] Quietly sneaks away to dial 911.
[b] Says "Boo!".
[c] Says "Hello" with a friendly voice and when he turns around, you
hit him real good in the stomach.


6) What do you think about the TV documentaries about war?

[a] Nah... I don't like to see people getting killed.
[b] Good to know that it isn't faked, anyway.
[c] What I think? I RECORD them, and then watch them until the tape
fucks up.


7) You are looking out the window on the 5th floor and see 8-10 people
waiting for the bus, just below your window. Your actions?

[a] Go back into the room and watch the games.
[b] Get a 5 gallon bucket of water and throws over them.
[c] Fill the same 5 gallon bucket with a gasoline/soapflake mixture
and lighten it just as you throw it out the window.


8) A friend owes you 5 bucks, and he haven't payed them back YET!

[a] Phone him and ask if I can get my money back.
[b] Phone him and DEMAND him to give the money back!
[c] Phone him and tell him to say his last prays.


9) You accidently hit a deer when you are driving to your work.
What do you do now?

[a] Go out and try to save the poor animal.
[b] Go out and hit it over the head with the jack.
[c] Go out and kick the bloody creature to death.


10) Your next door neighbour have a big (BIG) swimmingpool, and EVERY
weekend he have BIG parties with at least 100 people invited, and
it's a hell to get some sleep the whole Friday and Saturday.
What shall you do about it?

[a] Mail him a letter which says "If you don't stop having those
loud parties every weekend, I'm calling the police."
[b] Call the cops and tell them that you've seen somebody get
raped at your neighbours party.
[c] Go out to your car and drive it like a madman through your
neighbours hedges and hit everybody within reach.
[d] Join the party.
-------------------------------------------------------------------------------

Additional questions: 1 point for No and 2 for Yes.

Do you shout HOORAY! everytime somebody gets killed in a movie?
Do you watch every splatter-rated movies more that 20 times?
Do you admire the German Leader during World War II?
Are you a collector of real, automatic weapons?
Are you dreaming of 'Shooting your way out'?

-------------------------------------------------------------------------------
[a] is 1 points, [b] 3 points, [c] 5 points and [d] 0 points.
-------------------------------------------------------------------------------

Points Rating
------------------
10- Relax, you're quite normal. Perhaps a little bit too normal.
-20 Relax you too... You still have the chance to live a normal life.
-30 Hmm... You should consider wheteher to be out on the street or not.
-40 Never, NEVER go out without 5-10 pills of valium in your pocket!
-50 You ARE a Homocidal maniac, there are no doubts.
-60 To make the world a safer place to be, commit suicide, please!


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-11-

---------------------------------------------------
& BRITTISH HACKERS BLACKMAIL FIVE BANKS IN LONDON &
---------------------------------------------------

Atleast five banks in the London Financial world, City, have according
to the magazine Independent On Sunday been the target of blackmail attempts
since break-ins into their computersystems by so called 'hackers'.

The manipulations started in May this year. To penetrate these systems
have, from the look of it, not been any problems for the pirates. They have
reached so far into the systems that they are able to creat chaos.

None of the five banks have paid, at this date, says Indipendent On
Sunday, and states that the latest discovered manipulations could be The
most sofisticated ever in Great Britain.

The pirates seem to have certain connections between them, but operate
individually and probably have no connections with organized crime.

Within the banks, they are worried that the customers confidence may be
undermined. These crimes are investigated by the police and Hambros Banks
Network Security Managements specialist in computer crimes. The chief,
David Price, said he was confident the pirates would soon be arrested.

The risk of computer crimes increase as the computer-technique develops
faster and faster. The security-routines become more complicated and takes
longer time to implement.


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
-12-

======================
NEW S.H.A. HEADQUARTER
======================

In February-91 a S.H.A. member is going out of the country,
and because of that, the currently S.H.A. HQ is going down.
BUT, a new board will be opened called Project Athena, and
it will contain Swedens largest Tfile-area when it's about
Hacking/Carding/Phreaking/Terrorism/Thrashing and Anarchism.

Watch out for the new phonenumber..


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-13-

SWEDISH UNIVERSITY HIT BY HACKERS

A major Univeristy in Sweden have had their unix machines used buy non-
students for a long time. They didn't know anything about it until the
novice hacker got his hands on a password to the computers from a secure
bulletin board system.

A few weeks later the system managers at the university detected that
one user hacked their computers.

The novice hacker had used rlogin at many other targets. Used FTP at
prime time and downloaded many megs of files and stored it on the
computer. He also had big jobs running on the machine that tried to scan
passwd files that he had downloaded from other machines.

That was what got the system managers attention since they lacked disk-
space. They always checked that users didn't store many files that al-
ready was on the computer in public libraries. They checked the files
and discovered that he had stored many passwd files so they started to
watch the users account.

The system managers had programs running 24 hours a day trying to guess
passwords themselves to check out their own security and at the same
time control what the users were using on the machines when no operators
were present.

Later the University decided to throw out the student that originally
had the account that was used, since they thought that he had done the
hacking. They main reason they would kick the student out wasn't because
he tried to hack, which is pretty common at Universities, but for the
small damages the novcie hacker had done.

The only way to prevent the University from kicking out an innocent stu-
dent was to expose, to the system managers, that the computers were used
by other people. So the one who had originaly cracked the passwords from
the passwd file and posted them on a board, made contact with the system
managers and explained the situation, that some passwords had been drif-
ting around and that some people had used accounts on their computers.

This stopped the University from kicking out the student, but resulted
in that the University now have their security level raised.

Now your password must include one non alpha character and be at least 5
characters long. All passwords will be changed frequently and not as
before when a student could have his password for his whole studies at
the University.

Alas.. if the novice hacker hadn't have the password all this could have
been avoided.


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
-14-

NEWS NEWS NEWS NEWS NEWS NEWS
NEWS ----------- NEWS
NEWS HACKER NEWS NEWS
NEWS ----------- NEWS
NEWS NEWS NEWS NEWS NEWS NEWS

NEW HACKERGROUP BUSTED.
-Used false creditcards.

Yet another hackergroup have been caught. The group is suspected to have
bought computer equipment with others creditcards. Not all hackers keep
themselves within the law's border. Now and then, articles about teenagers
who have gone over the border, are published. This time it's two teenagers
in Stockholm who have been caught and interrogated. "But our suspicions
points above all at one of them", said prosecutor Wulf Zippis at the distr-
ict attourneys office in Stockholm.

This new case, have big similarities with a case we had about a year ago
said Zippis. Then, a big hackergroup, spread all over the country, was dis-
covered. With the help of selfmade computer-programs, they could produce
creditcard codes for the creditcards MasterCard and Visa. With the help of
these codes, they then could order merchandise from foreign countries for
hundred thousands of crowns. The merchandise was ordered in fake names to
P.O boxes and adresses.

But though it involved large amounts of money, the hackergroup managed
to get away with fines and conditional sentences - that time. How it will
go this time, prosecutor Wulf Zippis wouldn't guess. "The investigations
are still in full progress. We will have to see what the police discovers".
The hacker comes from a suburb of Stockholm, is in his teens but not
legally competent. Usually, young people like this, gets conditional
sentences and not a jail sentence, atleast if they haven't got any previous
records. The prosecutor wouldn't comment on how much the hacker have spent,
but he confirms that it is of a substantial sum. A guess would be round
300.000 crowns.


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-15-

=============================
======== SMALL NOTES ========
=============================

The Swedish Telecom and the State-Owned datacompany Dafa are going to
build a nation-wide teleNet called DafaNet. It will be possible for,
trough a central computer, companies to communicate directly with
different authorities. The thought is to offer the customers a wide
information-process with access to databases and electronic message-
systems. The Net is built with so called X 25-standard which makes it
possible to connect computers of a wide range of different fabricats
to it.


>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
-16-

==================
TELCO TRACES CALLS
==================

Some months ago I decided to find out how fast the Telco could
trace the calls and the answer is terrifying. It takes approx.
2-3 seconds (local trace). And this is how I did the test:

I went to a cafe' and borrowed the telephone. The phonenumber
was clearly printed at the bottom.. (let's say 123456)

I dialed an operator and told her that I wanted a collect call
to Hong Kong.After that I gave her the phonenumber I wanted to
call, she said:

- Ok I'll have to call you back in 5 minutes. What phonenumber
are you calling from?

- Uhh... I don't know, I'm call from a borrowed phone, I said.

- Ok..hold on.

After that she pushed some buttons, and said:

- Are you calling from phonenumber 123456 ?

That little test shows how fast they trace calls....
A good advice when hacking computers is to ALWAYS dial
through outdials ...


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-17-

NEWS NEWS NEWS NEWS NEWS NEWS
NEWS ----------- NEWS
NEWS TERROR NEWS NEWS
NEWS ----------- NEWS
NEWS NEWS NEWS NEWS NEWS NEWS

THIS IS HOW YOU MAKE A LIGHTBULB BOMB.
-They found book for terrorists.

Qualified advice to terrorists exists in ordinary Swedish Bulletin Board
Systems. How to make weapons and timebombs home in your kitchen are explained
and very easy to understand. In just a couple to minutes, the two school-KIDS
Petter Aasheim and Jorg Akerlund from Gothenburg, theoretically learned how
to make nitroglycerin.

Very alarming, those who want are able to get their hands on a dangerous
knowledge, said Torsten Bjorkhede, chief of SAPO (Swedish FBI) in Gothenburg.
The superintendent at the violence division, Hasse Carlsson is also worried.
I have never heard of anything like this, he said.

It was of a pure accident that they came across this information. On a
Bulletin Board System in Kungalv, "Halla Hogia", they saw the headline -
The Terrorists Handbook. We were curious and brought home the text, the kids
said. About 100 sides loaded with real blowstuff came from the printer.

THE CHEMISTRY TEACHER WENT PALE.

First I thought that the "handbook" was cool, said Petter Aasheim. But
when he read through the material more thouroughly he changed his mind. With
this material, everyone can be a terrorist, said his friend Jorg Akerlund.
The two kids took the text to their chemistry teacher and let him read it.
Pale he said - Go immediately to the police with this. We have seen some
terrorist handbooks earlier. But nothing as detailed like this one, said
Trosten Bjorkhede. The author, an unknown American, shows the terrorists ABC
and very detailed too.

THE CHEMIST'S HAVE MOST OF IT.

All necessary substances for making explosives are listed. Most of them
are available at the Chemist's and the rest can easily be found in listed
insecticides, fotoliquids and in usual stores. If the terrorist still can't
get his hands on the necessary ingrediences, the next step is to break into
a chemical lab/school room. To be sure that the burglar doesn't miss any
vital substance, the author have included a check-list. It says "if a lock
to the lab has to be forced, the best picklock is dynamite followed by the
sledgehammer. Unfortunately, these methods make too much noise. The third
best way is therefor a set of picklocks." Thereafter follows a very thouro-
ughly described way on how to make your own picklock set. When it comes to
the explosives, everything is very detailed, almost pedantic. EVERYTHING is
explained.

SIMPLE TO MAKE A LIGHTBULB BOMB.

The author recommends the highly explosive explosive R.D.X. According to
the "handbook", it can easily be made home in the kitchen. With drawings,
the author explains how to triggers and timesettings should be done. Then
it continues on how to make package-, book-, telephone- and lightbulbbombs.
It says "An authomatic reaction when you enter a dark room, is to light the
lamp. Though that can be very dangerous, if a lightbulb-bomb have been scr-
ewed into the socket. Such a thing is very easy to make. Start with heating
the bulb's socket with a gasflame..." One section tells about weapons.
There it is described how to re-build a shot-gun into a grenade-gun, how
ordinary new-year rockets becomes bomb-carriers. This must be investigated
right now. It can be a case of insugency, said the district attorney Sven-
Olof Hakansson in Gothenburg.

15-YEAR OLD RESPONSIBLE FOR THE BULLETIN BOARD SYSTEM.

Responsible for the System "Halla Hogia" is a 15-year old from Kungalv.
He doesn't know what information lies available on his own system: New
things arrive daily, he said. Do you know that you have "The Terrorists
handbook" on your system? "No." Is it possible to check who sent it to you?
"No. All such information is erased after one week." Everything in the Sys-
tem is free. To access it, all you need to know is the telephone-number.

NEWSPAPER: EXPRESSEN
DATE : 91/01/11
REPORTER : RIKARD BJORK
FOTO : TOMMY NAZELL

(photo: The two kids (looking stupid) infront of a computer with the text:
- We were curious. That is how Petter Aasheim and Jorg Akerlund explains
the discovery of "The Terrorists handbook". The dangerous information
was found at an open Swedish Bulletin Board System.)


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-18-

NEWS NEWS NEWS NEWS NEWS NEWS
NEWS ----------- NEWS
NEWS HACKER NEWS NEWS
NEWS ----------- NEWS
NEWS NEWS NEWS NEWS NEWS NEWS

NEW WAVE OF COMPUTER COUPS IN SWEDEN.
HACKERS IN KARLSTAD AND LINKOPING ARRESTED.

A wave of computer coups oozes over Sweden. Those worst affected are
Swedish universities that are used by young hackers. Their illegal
entries have cost hundreds of thousands crowns. At a large Swedish
company, a couple of employees are suspected for illegal entries at a
secret West-German database.

For the Swedish computer-police, the several coups wasn't unexpected.
During the last months of 1989, the chief of the Swedish computer-police
warned the public about what was about to come. Rolf Nilsson also said
that the next five years will be dangerous, and that they expected some
kind of big bang.

The real devestating bang in Data-Sweden haven't happened yet, but
these illegal entries are enough to make the police very nervous.
Several young hackers have, with the help of university-computers, made
electronic journeys round the world. On other locations, students have
made their way into university-computers and tried to change salary-
payments and grades. All togheter, there are about ten young hackers
that's been charged, and they have fines or max 2 years in jail ahead
of them.

The other investigation is conducted by SAPO (Swedish FBI) and riks-
kriminalen, and concerns five employees at a large Swedish company, who
have illegaly entered a super-secret, big database in West-Germany. At
this moment, the case is too sensitive, so the police can't give out any
information. Though a Swedish computer-magazine tells of an institute
for advanced mathematical processing and that the West-German secret
police (BND) have asked for help to trace the intruders. As usual they
think the KGB is involved, like in the Hess/NATO case, which resulted in
conditional jail-sentences.

Also when it comes to these Swedish hackers, the sentences will not
be of freedom-taking nature. They could face a two-year jail-sentence
but it will be very hard for the police to find evidence showing that
they had criminal intentions. "If you look at the bright side of this,
they really should get high grades in this area", said Stig Hakangard,
who is perfekt at the institution for ADB at the school in Karlstad.

These two hackers, aged 22 and 26, have illegally entered the schools
computer-terminal and among other things, destroyed a salary-register.
They are two students, who have one term of programming behind them.
"When I look at it, it seem to be a classic hacker-motive; they wanted
to get as far into the system as possible without getting caught." Their
fall came after they accidentaly deleted a salary-register, and the
system started to "ring the alarmbell". "We are very weak because of our
connections to SUNET, and there are over 200 node-computers in Sweden,
so if you crack the password to the Net, the road is open and limitless.

The police looks more strongly at the coups in Linkoping, where six
hackers have used the university-computer to call BBSs and databases in,
among other countries, USA and Australia. Four of them are charged and
could face fines or jail and pay for claimed damages. (ie. phonebills).
They have succeded in connecting with commercial databases through the
central computer and their own home-computers, and they used the univer-
sity identity which means they never had to use any passwords. The
phonebills came as a shock to the university. The first were at 60.000
US dollars, and the second at 20.000 US dollars. The hackers were lucky
that time, because the Swedish Telecoms counters didn't work at that
time.

Parallel investigations are made to trace the foreign hackers, who
have managed to enter Swedish computers through university-computers in
among other countries, Canada and Finland.

The final word here, is that the Swedish police is So nervous when it
comes to illegal entries, that they always notify the Swedish Millitary
forces and SAPO when they discover new hacker activities and entries.


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-19-

=============================
======== SMALL NOTES ========
=============================

Datema sold their daughter-company Datema Konsult AB to the Swedish
Computer-central. The company have 28 employees and is specialized in
servicebureau activities and economy-administrative consult activities.


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-20-

=================================================
S.H.A. VISITED AN EUROPEAN SPACE AGENCY COMPUTER.
=================================================

In August-90 a SHA member hacked his way into an ESA computer,
and got access to a lot of interesting stuff.

- It took me 3 minutes to hack that computer, so I can't call
that security, says the hacker.



NEWS NEWS NEWS NEWS NEWS NEWS
NEWS ----------- NEWS
NEWS HACKER NEWS NEWS
NEWS ----------- NEWS
NEWS NEWS NEWS NEWS NEWS NEWS


HACKERS BOUGHT COMPUTERS - ON OTHERS CREDITCARDS

Two teenagers have been exposed as hackers. They have bought computer-
equipment for 100.000's of crowns and paid with others creditcards. We think
that they got the numbers from computers, said the district attorney Wulf
Zippis.

The Police' computer-experts suspect that they are connected to a group
of hackers, who have made the numbers with own computer-programs. That group
was revealed eight months ago and consists of computer-knowledged teenagers
between 16 and 20 years.

Most of them are students on the Nature-scientific or Technic course, and
they live from Umea in the north to Lund in the south and have a common int-
erest; the possibility of the computer.

USED FAKE NAMES

The two, who are arrested, live in one of the suburbs of Stockholm. After
long hearings we are now working on how they made this possible, said Zippis.
We know that they ordered the merchandise in fake names with false adresses,
and paid with false creditcard numbers. How they got their hands on the
secret numbers will be investigated.

I can't tell you how large sums that are involved, but sure, it is large
amounts of money, said Zippis. One of the two teenagers is described as very
talanted, but lack of interest in school-work got him lousy grades. He cons-
entrated his talent in the technical world of computers. Looked for success
in hacker-circles and bought advanced computer-technique on others credit-
cards. The numbers were made by a computer-program which had been made by a
group of hackers. Rikskriminalens computer-experts have had long hearings
with the teenagers, and their story have had a similar pattern:

They have gotten a home computer and joined a club. In computer games,
they have found new ideas and improved the technique with help from modems.

VISA AND MASTERCARD

With help from modems, they have connected with databases and found inter
national lines. One of the members of the group, stole a list with blocked
creditcards. With the computer, they discovered how the 16 numbers were made.
That's the way they made numbers for VISA and Mastercard creditcards. After
that, it wasn't very hard to buy equipment from American mailorder companies.
To leave a number of a creditcard that is not blocked is enough. The mercha-
ndise were delivered to P.O. Box adresses in fake names. The bills were del-
ivered to the owners of the cards.


-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-
-21-

HOW TO KEEP ON HACKING


I. Password and number swapping
II. Single or Parallel hacking?
III. What a hacker can do and still be a hacker
IV. Hiding your stuff and safety precautions



I. Password and number swapping

This is a subject where almost everybody have their own opinion, whether to
swap hacked systems with total strangers or only within some kind of limited
circle.

The smartest thing to do is of course Not to swap with people you don't
know, like putting them up on Public Bulletin Boards and so on, this is VERY
stupid; Why? Well, imagine that you give out the userid's necessary to access
the system you've hacked and alot of people start to call it and do what they
can. Then... you notice the outidal that's been hidden in some strange direc-
tory. What do you do know? The system will maybe change their number because
of the XX calls they get per day all of a sudden, and when the same userid is
logged in 10 at a time, you'll have to wardial their new number...Clever? No.

And even worse, the computer will might not have it's number changed, it
maybe 'only' increase their system security, tracing suspicious calls etc.
It's the same thing about Numbers to systems you Haven't hacked (yet).

I think you agree with me that the smartest thing to do is to keep your
numbers and passwords to yourself, if you want to keep on having the system
'at your service'.

The way to keep numbers and passwords within some kind of circle or group
is also a way of Not letting numbers and passwords slip away. Decide and make
Your own rules on how these things should be handled, do it for a start, so
you have it written if something occurs (your favorite system crashes...).

In Sweden, I know this is a SERIOUS problem for hackers that have gone thr-
ough lots of trouble getting into a system, and after giving it to a friend
that couldn't SHUT UP about it, the result is that the system changes number
or increases the level of security. I know that MANY boards are letting their
amateur hackers go berserk on systems they just found! This is not good for
anyone, not the hackers and not the systems.

The (now) best way to solve this should be to validate the members that want
to join a certain (hacker) meeting, where they can tell eachothers what they
know / what they've found.


So hackers and other people, Share Experiences, Not Passwords.




II. Single or Parallel hacking?

Which way is the best? In some situations it's difficult to say.

In systems, where your hack cannot be hidden (Printer log etc) you might
have to take all the data possible from the system (under time stress...),
and this is when parallel hacking is best, two persons can Capture more
than one.

But ofcourse, you choose how many you are in at the time (downloading).
Two is though preferable, because it's easier (and Faster!) to speak to
eachother through the system and tell one another what to do, and that
you're not storing the same data. In all other situations, the single hack
is the best hack. You get more out of it for yourself.




III. What a hacker can do and still be a hacker

First of all, my definition of a Hacker;
---------------------------------------

-Describe short what a hacker is.

A hacker is someone who want to learn more about current systems and in
some cases, their security systems.


-What is a hacker's purpose when he's entered the system?

A Hacker NEVER destroy anything vital for the system, this is one of
the basic rules. Then he should take care of all interesting data he
can access and take it home, and after that, explore how This very sys-
tem works. Are there perhaps any changes compared to similar operating
systems?

  
-What happens to hackers that destroy systems then?

First, a 'hacker' that destroys systems frequently should NOT be called
a hacker at all. Crasher ([System-] Cracker) is the word for that kind
of people.




IV. Hiding your stuff and safety precautions

* Hacking:
-------
USE outdials! (dialouts). An 'outdial' is a modem that you are able to
use through a computer, it's connected to the telephone network, and
allows you to make ordinary calls.

You use outdials in two purposes; One, to make your hacks harder to
trace, and two, keeping your phonebills on an acceptable level. The
most preferable is to use outdials And diffrent gateways when you hack
systems that are highly protected against intruders. Gateways are com-
puter hosts who allow you to connect to further computers and/or net-
works.

Try to make this a rule, Always Use Outdials.

Also, you should know that Outdials are Very usual in a system, but
the chance that it's un- or lightly protected is very small. Another
thing to remember is that (almost) everyone Wants an outdial, but
nobody got one. If You find an Outdial, keep it to yourself.

The Swedish telecom can trace your call in one second (AXE within Sw)
when the conditions are the best. If you are calling through several
outdials and gateways, it could take the company (and the Telecom)
hours to trace you.

If the System Operator breaks in and starts to talk to you, don't piss
him off, try to (IF possible) make friends with him, point out weak-
nesses in the system etc, impress him, but it takes alot to do this,
so you know. If you're REALLY lucky, it Could be another hacker. But
don't bet on it! System Operators very seldom interrupts his users, no
matter how weird they are behaving, his orders are to report to
security.

* Magnetic Storages (Diskettes, Harddrives, Tapes):
------------------------------------------------
The very best way is to crypt the 'hot' data so you never have some-
thing to fear. If the cops ask you what that strange file is, you say
it's a game save or what ever you like.

The second best way is to have your data hidden in a safe place (This
is NOT under your bed, in the basement or in the garage). But where
should you keep it then? A way is to keep it at one of your friends,
preferable someone who doesn't know shit about computers, and have no
connections to the world of hacking.

The worst, but most effective way to keep data out of the hands of
some stupid investigator, is to destroy it. Erase (Equals NOT Format)
the Hard drive/s, smash your diskettes. But as you know, both these
ways take some time, and you can never revive it yourself.

Choose crypting.

* Dumps (Print-Outs, Hard Copies):
-------------------------------
REALLY avoid printing user and/or password lists, if you do, ALWAYS
keep them in a place only you know about. And if some old dumps are
out of date, burn them! Or put them through your document destroyer.
Keep ALL kind of 'delicate' dumps on One place, so that you have
them all put together (Easy to hide/destroy)

DO NOT put up 'hot' dumps on your wall or on your monitor, this is
only stupid, put them in boxes or in a cover. When the cops come
with their search warrant, you can walk to the police house with a
smile on your face. NEVER have headers like 'PASSWORDS FOR ABC SYS-
TEMS' on ANY list!

* Your friends:
------------
Never brag about systems you've hacked in public rooms or similar,
perhaps this is where some large-eared person reports to his com-
pany, and your next login could be expected. Bad. Also don't brag
about hacked systems in public meetings, and if you do, don't name
any names or any clues.

NEVER keep names OR handles of your hacker mates on notes or dumps.
This is one of the easiest ways for the cops to find out how many
hackers you know (and have connections with).

More, don't keep numbers to 'special' boards lying on your desk or
up on the walls, this could result in Very Bad Things.

* The Law:
-------
Don't give the cops a hard time when they come (i.e don't fight,
Stupid!) let them take your computer, diskettes and print-outs. You
are prepared, you know. If they are crossexamining you, hour after
hour, Don't tell them anything, the only 'evidence' they have is
perhaps a traced phonecall. They will probably tell you that they
know all about what you have been up to, and that you better speak
up. Don't care, they're lying.

If they name some names on systems and people (And you might
recognize some of them. Your best friend's name for example) and
ask you what you know about them, you don't know shit. They are
only shooting in the dark. Even if they say that your hacking mate
also is under arrest, and that he has confessed everything, don't
care, they're telling you lies again.

Rememeber, you're not under oath.

If you're well prepared, an arrest is nothing more than some days/
weeks without hacking. Ofcourse, the police is making a BIG mistake.

Never under-estimate the cops' knowledge about computers and comp-
uter communication! Yes, 99% of them are total idiots when it comes
to computers, but if you tell them some really strange shit (made
up), the 1% cop might be listening to you, and they will put 2 and
2 together. It's better to tell them 'I don't know' then telling a
bunch of lies, because a 'I don't know' can NOT be said is a lie.
Tell them that, EVEN if you have the system's telephone number tat-
ooed in your forehead.

And, if you're not 18 years old (in Sweden), they might ask you if
they should call your parents. Let them do that, so they can tell
the police that 'He's always been such a nice boy' etc etc.

If you REALLY are into deep shit (forgot that print-out on your
monitor, didn't crypt your Hot files...), don't give up anyway! You
COULD have downloaded that list from a public BBS (on which you
forgot the name, number, city and country...). And if the time and
date on some print-outs/files talks against you, tell them that it
is the wrong time/dates and show them how easily it is to set the
computer clock.

Precautions if you're busted. BEFORE you're busted, make up alarm-
call chains with your friends. That means, you decide who should
call who, and warn them about a bust. And if someone in the chain
isn't available, you just call the next person om your chain-list.
And as I mentioned before, do not write names or handles, just put
up their initials or words related to the persons.


- All these safety precautions and procedures may seem silly as you are
sitting there, comfortable in your chair. But if you are carried away
in hand cuffs, you really wish you SHOULD have hidden those dumps and
crypted those files.


-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-

As it's written in Phrack;
You SHOULD be paranoid, you ARE doing something illegal.

-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-/-

<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-22-

'THE BIG SYSTEM'

Author: The Chief
Written 1989-1990

For more stories and deep thoughts, contact me at the number
to the MAILBOX with some nice Fan-Mail.

As a young hacker, I left early for the BIG systems. The small ones
didn't last long enough. Soon I had nestled myself into some very big
systems and found that they were very much like the smaller ones.
I had to find a REALLY OUTRAGEOUS BIG system, to satisfy my needs...

IF YOU WANT TO GO FURTHER INTO THIS STORY, YOU'LL NEED
SOME ADVICE AND SOME OTHER VARIOUS THINGS MENTIONED BELOW.

If you are a one of my fans, skip this section, else goto the next line.
Return. (just kidding!)
Ok, so you have picked up this file at your local underground board, eh?
Nice. I like to see the GOOD files, on every GOOD UGD-Board! Back to earth.

You will need the following:

A Coke
A Flashlight
A Pack of chips
A Good sense of humour
A Rainy day or a Sunny day for reading
A Couple of days to finish this story!


The advise mentioned above: Don't let this story out of your hands!
There are Serpenin-spys looking for it everywhere!


-------------------------------------------------------------------------------
___________________________________CHAPTER ONE_________________________________

I was 15. The sun shined and the grass was green. The neighbours sexy
21-year-old daughter, Marielle, licked the sun in a sunchair next to their
swimmingpool and our dog "Phileas" chased butterflies. It was the first day
of summer in Charmington where I lived.

From my bedroom-window on the second floor, I had the best view in the
neighbourhood. Marielle had a tight body-bikini, and I could see her lying
there, sweating, the sun licking her body from her head to her toes. I just
waited for the moment when she would unwrap the bikini, because of the heat,
and reveal those unreal breasts like she always did. This time though, it
didn't seem to happen...she was not on time...Well..I'll stick around a
couple of minutes more, I thought, and waited.

The birds sang, the sun burned, almost no wind and the town slept.
My mom and dad were visiting the grandparents and my sister was out with her
friends so this time would be perfect for Marielle to show me her beautiful
body, but nothing had happend yet, and I wondered if she was sleeping...
-------------------------------------------------------------------------------
____________________________________CHAPTER TWO________________________________

"Special Computers Designed Here" said the sign by the mailbox. Steve
Spingleman talked on the phone with a Head Executive at GCEC, Government
Computer Engineers Center.

- That is not etical to do, said Spingleman with a broken voice.

- Mr. Spingleman...Steve...This isn't my field. You must understand that I
am but a mere messenger. If I do not follow orders, I will loose my job.
If you have any objections to this project, you'll just have to talk to
my superiors. Here...you can call this number if you have any
trouble or questions.

Spingleman heard the man, known to him as Mr. Jensen, messing around
in the room, searching for the phonenumber. Drawers were opened and closed
again, papers lifted and put down again. Finally he came back to the phone.

- Here it is! Ok, Steve...055-381-289662.

He said the numbers one and one once more to make sure Spingleman got
the number correct.

- This number goes directly to the GCE Experiment Center and there you'll
reach me and my superiors. Just DON'T show this number to anyone else, Ok?

Spingleman thought for a while, and then he decided what to say.

- Allright Mr. Jensen. I'll try, but I can't assure you that this will work.
This is a highly complicated computer you ask for and my experiences with
these sort of things are but none.

Spinglemans voice had become nothing but a whisper. It shivered when he
tried to make his way out of the project with a lie.

- Ah, come now, Mr. Spingleman. You know that we know all about you and that
these sorts of experiments are your speciality, or should I say, WERE your
speciality.

Steve Spingleman now realised that he had to go through with it, even
if it was unetical, unreal and very dangerous. If he hadn't..... No. That
was long ago, and he couldn't change the past. He hated GCEC and this Mr.
Jensen who leaved him with no alternative but to do this dirty work for him.

- Mr. Spingleman?

- Yes, I'm still here, said Spingleman. I understand your terms...

- Good. Let's hope that this project will float smoothly and that you'll
follow my advise. We don't want anything to happen, do we Mr. Spingleman?
No.. I didn't think so, Mr. Jensen said, answering his own question. We
will contact you if something comes up. Goodbye Mr. Spingleman.
-------------------------------------------------------------------------------
_________________________________CHAPTER THREE_________________________________

Daydreaming...that was something for a troubled mind, and right now
my mind WAS troubled. Marielle DIDN'T unwrap the bikini! As a 15-year-
old boy, your mind will undoubtely be on a constant lookout for girls and
sex, that is a fact, but the average teenager will never have such an oppor-
tunity as I had here with Marielle, so I was known as "The lucky one" among
my friends.

Suddenly something happend. Marielle started to move, and my eyes homed
in on the target. She sat up in the chair and looked around. Now
I recognise you, my mind said, and opened a memory-bank for storing what
was about to happen. She stood up....and went into the house!...
Memory Error, my mind said and closed itself. Damn! What was she doing?!
I was ready to give up, and go back to my computer, when she came out again.

She had a sun-lotion bottle in her right hand, walking to the chair
again, but changed her mind at the last moment and walked to a table, which
stood just behind a tree, out of the view from my window. I ran to my sisters
room. The view from that window was better than mine, and a lot closer too.

She was exercising! Bending over, lifted a leg, made sit-ups and so on.
Fantastic! This was great! When she appeared to be finished, she opened the
sun-lotion bottle and started to rub it on her sun-tanned skin. Then it
happened, and my mind opened about 20 Megabyte for storage at the same time.

The bikini fell on the ground and I was in heaven. She rubbed the lotion
all over, and took her time doing it. I had the time of my life (consider my
age will you!). Soon she went back to the sun-chair and I went back to my
room and the window. Now she was lying there...with only a pair of small
bikini-trousers covering her fantastic body. If I just had some courage, I
thought, I would go down and talk to her.

- Hello!

The sound made me jump. My parents stood in the doorway to my room.

- How has your day been, son, my father said with a big smile covering his
face.

- You should have been there with us! We found two new flower-spicies so now,
your grandfather has thirty-two different ones. Isn't that fantastic, mother
said in a state of extasy.

- Fantastic, I muttered in an attempt to sound excited.

- Well, dinner's ready, said mother on her way out of my room. We bought fried
chicken at the Drive-in so hurry before it gets cold.

To buy drive-in-food is like buying walked-in-shoes. You can wear both.
-------------------------------------------------------------------------------
__________________________________CHAPTER FOUR_________________________________

Steve Spingleman jumped by a noise too. The "click" in his ear
when Mr. Jensen hung up. Boy, was he in trouble now! GCEC had ordered
a very special computer from him, because he was the best computer builder
when it came to specialities. This demanded his full attention and skill.
The other customers just had to wait...but for how long? This computer would
take at least 2 years to build even though he already had started on a proto-
type which he had hooked up with one of his own inventions, an XX EXPRESS
digital and optical modem. To have it "on-line", as a service to the customers,
whom, ofcourse had very special wishes, were for test reasons only because of
the fact that nothing is ever perfect the first time. Every progress he made,
were added to the prototype for his customers to call-in, look at and try out.

His customers were not of the "normal" kind, if you can call people
normal these days. No, to mention some of his customers, there were the
State Department, ASA (American Space Agency), YMCA (Yugoslavian Micro
Computer Association), STATE (Soviet Tolerance Approval Tecnology Engineers)
and GCEC which I presume you have heard about. All of them had their special
wants and needs, which Spingleman worked on. Now they had to wait.

Spingleman went over to his laboratory to collect the package he had
recieved from GCEC earlier this friday. It contained the plans for the
computer and what they wanted it to do for them. The package was a 7 kilo
big box with the word "CONFIDENTIAL" scattered on all sides. He opened it.

4 Videocasettes on the HRTV-D (High Resolution TV - Digital) format
with digitally scanned maps of the computer. 2 DAT-C (Compact DAT) Cassettes
with information and the rest of the 7 kilos were encrypted filled laboratory-
tubes and paper-discs, a new invention by himself and a big success on the
market. When there were no trees left anywhere, the World Crisis Federation
had called to order a new kind of paper, and he made the paper-discs. How they
looked like? How you used one? It's too complicated to understand, but if you
are a true knowledge-eater you can look in the dictionary at the end of this
book.

He picked up all of it and put it on the big designer-table to study
the maps and read the discs when someone logged onto the his prototype
computer.
-------------------------------------------------------------------------------
_________________________________CHAPTER FIVE__________________________________

I saw the text on my monitor.

"ACCESS DENIED"
"YOUR DIGITAL NUMBERS DO NOT MATCH"

Damn. This was one of the new XX EXPRESS modems which could spot the
number and PBX-X you called from and had special numbers for access. Well,
the hacker-underground had discussed these modems for a while now so I decided
to call the DRAGONFIRE ugd board to see how far the discussion had come.

Letters and more letters. It took me twenty minutes to answer all of them
and if you are a knowledged modem-user you know how long that is, if you use
the automatic answerer! In the Hacker-conference there had finally been a
breakthrough and a new gear called METROSPECTIVE had been built for breaking
XX and XY EXPRESS modem security systems. I talked to Mr. Farmhouse (the "dad"
in our circle) and he promised to send one the same day. What are friends for?!

I had all of the "pre-desolation" gear from boxes to programs written in
a long gone and "dead" language called Pascal. My friends in the hacker
comunity called me "The Collector" for obvious reasons. I was called a lot of
things back then. New gear and inventions had become standard those days and I
liked to try them out. The Metro (short for METROSPECTIVE) was brand new. I had
a XX EXPRESS number, so to try the Metro on it was a must for me. I hadn't a
clue to where I was calling and the unbelevable things that would happen to me
because of my curiosity.
-------------------------------------------------------------------------------
__________________________________CHAPTER SIX__________________________________

Spingleman looked at the screen. Someone had called, but didn't have the
correct access to enter his system. He should have been worried about it, but
wasn't. Perhaps a "wrong-number" call. That was common these days with the
complex ISDNS telephone system.

When they introduced ISDN in the 1990's, it had been a step forward, but
the ISDNS (SONIC) had turned out to be a much too complex system for the
average user. No-one really knew the possabilities of the system becuse of
the inconvinient and strange deaths of the inventors. Actually, no-one knew
where they had gone! They just dissapeared one by one, all of them good
friends to Spingleman and this happened during his work on the prototype.

Spingleman went back to his studies with a troubled mind. Tormented by
what he had remembered and the pictures of his friends still in his mind.

The digital maps on the video-board showed a complete build-up of the
computer GCEC had ordered. Any ordinary person who studied these maps would
have given up after approximately thirty seconds. The complexity of the maps
were total but Spingleman just took a look at them and saw the errors at once.
This could not be what they wanted?, Spingleman thought for himself. These
errors were small but there were many of them. If he followed these maps, the
computer would explode within five minutes after startup.

If he used two-bolted merentors instead of one-bolted ones.....
Spindleman started to re-draw the maps with the videoscan-pen, correcting
the errors, working through the night.
-------------------------------------------------------------------------------
________________________________CHAPTER SEVEN__________________________________

I was roughly awakened by Phileas, licking my face. I looked at the alarm
clock, it said 11.45 am and I tried to go back to sleep. Suddenly I remembered
that I would recieve the Metro today, and that the Electronic Package Service
closed 12.00 Sharp on Saturdays! I got out of bed and was ready to leave for
the EPS office six seconds later.

I stumbled up the stairs to the office, pushed the door and the clock
showed 12.00. Just in time! The package, at the size of a micro-stereo, had
arrived. On my way home I met my sister, Angelica, and her friends who were
working on a beach-party, due that night next to our house.

- Hi bro', Angelica said, goin' to our party tonite? Megan wants to see you,
you know...

Angelica had gotten her accent from her surf-friends who lived on the beach
and whom she almost lived with. Megan was one of her friends who (if I may
say so) had had a crush on me for the last few weeks. Though she was one of
the most beautiful girls I had ever seen, I had never gotten the chance to
talk to her alone so this could be the perfect opportunity.

- I'll think about it, I said.

Angelica sat her elbow in my side and went back to her friends with a
smile on her face. Walking towards the house, I saw Angelica talking to
Megan, and I got nervous.

Later that day I connected the Metro to one of the expansion-slots of my
computer to try it out. Just when I was going to start it the phone rang.
I pressed the "off hook" button and heard....

- The Fourth world war has started.
-------------------------------------------------------------------------------
_________________________________CHAPTER EIGHT_________________________________

J.C. Harris was one of the two new-hired engineers at GCEC. His record had
been spotless and his skills on computer-design couldn't be measured. That is
to say that he was one of the best in the country. Right now though, he was
sitting in an office, waiting for a man known to him as Mr. Jensen, and an
assignment.

His thoughts wandered to the time when he was a young enthousiast and
didn't have any problems to handle. He had been the best in his class and had
finished all courses he attended with top marks without any attempts to study.
Nowadays the schools had made efforts in computer-security, and the hackers
efforts in breaking it, but he knew that they couldn't break it. A smile swept
over his face when he thought of his "unbreakable" system.

Thirty hours. He tasted the two words once more, just to make it under-
standable to himself. Thirty HOURS! That was too unbelievable even to himself.
The computer system then, had been quite simple he remembered, but THIRTY
hours?! He had boken the security-name in just two seconds by looking in the
principal secretary's big black book once when he was left alone in her room.
But the password had been a big barrier. No "usual" password had worked and
nothing you ordinary would try, like the name of their dog, children or mother-
in-Law either.

Noriegamodular5. When he entered that and it worked, he didn't believe his
eyes. The Sonic planet Noriegamodular5, named after a dictator in central-
America in the 20th century, had been the home-planet of the secretary's little
pet, the grywlow. What a password that was. Phew.. and it took him thirty hours
to figure that out. With the "live" programs of today, that password would have
been halfway to the 99th moon of Trolarian by now. Known to everyone.

Fiftyfive seconds later "Mr. Jensen" arrived in his black Mercedes 995 COEC
(Computer Oriented Electric Car). He carried the black suitcase in a steady
grip. His black suit and gloves were made by the JJJ company, the most ex-
pensive designer of clothes, known to be untapable and never torn. The security
system accepted his C-AXS card and opened the big, armed doors revealing a
man, standing, waiting for him. "Mr. Jensen" signaled to the man, who ofcourse
was Harris, to come with him into his office. When Harris had closed the door
behind him, seven guards grabbed him and carried him into a cirkular shield
and left him there.
-------------------------------------------------------------------------------
________________________________CHAPTER NINE___________________________________

"Hi Kev", the voice said.

"Christ, Matt, You scared the hell out of me, you know!"

"I know", Matt said in a just-ment-to-be-funny tone.

Since the computer at WCC went crazy because of our biggest and most
interesting 'hacks' ever, and tried to start the Third world war (which
happend anyways..), I hadn't been that active in the hacker-community, but
now, with a new invention, the Metro, and a new and interesting number, I
couldn't stay out.

"I saw you'd been on the Dragonfire yesterday, and that the 'Old Man'
ehrm... Farmhouse I mean, had sent you the latest and greatest equip
around these parts, The Metro I mean, and as usual, when you get your
hands on a piece of merchandise like that, you have a new place to
try it out on! Am I right or am I right buddy?"

It was no secret that I tried most of the new stuff for the rest of
the hackers, because of my knowledge (modest remark), and that I usually had
more places to try them on that any of the others, but I never gave a number
away, and all of them knew that, but that didn't keep them from trying until
I had to actually throw them out of the bathroom!

Matt had a great job by the way. He worked at the Intercom Packaging
Service who handled all of the Electronic Packages North of Lake Acid, and
therefor knew what every package contained, where it came from and for whom
it was. I had been waiting for him to call, but not this early. I guessed
that this equipment, The Metro, was something special. But I hadn't been
following the conversation in the InterInvention meeting for atleast two
weeks, and I now knew I should have.

"Yes I have a place to try it out on, but you know I can't let you
in on it as you probably already have guessed as usual, Matt."

"Ah, come on Kev", Matt said in his ordinary 'begging' voice, "You
know I never, and I mean NEVER spread things I get from you, or
don't you?"

"Yes, I know...", I said, and tried to continue.

"So what's the problem, Kev?... Buddy... Old pal of mine!"

"I haven't tried it yet! I just got the damn thing a..."

"Yes I know", Matt giggled, "Remember where I work?"

"Yes I know where you work Matt, but as I said, I just got it,
and was just about to try it out, and you interrupted me!", I said.

"Yeah? Matt said. "You'll let me in on it later then, right?"

"Sure, I said", trying to get him off the line. "I'll let you
in on it later, Okay?"

"Ok, fine! I knew you wouldn't forget me, old PAL! I call you in
an hour, and then we can talk, ok bye!"

"Try tomorrow, or next week!", I tried to say, but the 'click'
got there before me.

Jeez! Matt really was my best friend and pal, but he always wanted
to know and learn everything. Now you probably say, 'Hey! That's just what
Hackers are all about!', and I couldn't agree with you more, but you just
hear me out on this one first! He wanted to know, when we was about five
years old, how you 'get it on' with a woman (referring to Marielle Peterson)
and at six years of age, he wanted to know how a rocket scientist ate lunch.
At seven years, he wanted to know how to make succini with red sauce. I can
continue with this list, but I would then take up all the space in this story
and the story will be untold. I hope that's NOT what you want to read.
-----------------------------------------------------------------------------

For the complete story, or other stories, contact me at the MAILBOX.
(c) 1989, 1990, 1991 THE CHIEF STORY SERIES(r)


<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<
-23-

Sorry about all the spelling-errors, but hey, You read it!

See you all in the next year REPORT !!
Members: The Inside Int. Hackers Association
#1 1991 is sent to you in February
and will contain, among other nice things:

'The World of the Hacker'.... The first Swedish doctor's thesis about Hackers!
'The Chief's StoryLine'...... New Story from The Chief! Long awaited!
'The Verdict'................ S.H.A. Member trial news and his verdict.

See you all Members in February!
-ED-

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
-24-

NEWS REPORTERS:

The Swedish Hackers Association welcomes ALL NEWS
containing information from the hacking-world.
To report YOUR news: Call our boards in Sweden
and leave a message there containing Your news!

OTHERS:

This number is to an ordinary BBS in Sweden, so if you
consider yourself a REAL Hacker, you know what you're
doing, and want to contact us, maybe to join, or give
us a hand, or perhaps to thank us for this splendid
issue (haha); Call +46-(0)11-138259 and write a Letter
to MAILBOX. Use the command 'MAIL MAILBOX'. If you want
us to answer your letter, be a member of the BBS so we
can send our reply through the mailbox to you.

* IMPORTANT * Remember to write where you found this
issue (THE NAME & NUMBER of the BBS thank you).


Message to all connected to the Police, Law or likewise:
--------------------------------------------------------
Sorry guys! You can't get us! The Swedish Secure boards
are restricted and private. Still, to reach us, call;

+ 4 6 - 8 - 7 1 6 6 4 6 5
or
+ 4 6 - 7 5 3 - 7 6 0 0 0

These numbers are for POLICE ONLY, so all of you other
guys, DON'T call these numbers! It is on your own risk
if you do!

>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
-25-

The material in this document is NOT ment to encourage hacking, cracking
or illegal entering to computer systems. The Swedish Hackers
Association can NOT be blamed for any abuse caused by it.
The Swedish Hackers Association is formed only
to inform the public what hackers and hacking
really mean, and to report all hacking
news and events to the readers.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT