home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker's Secrets 4
/
Hacker's Secrets 4.iso
/
anarchy
/
freedom.txt
< prev
next >
Wrap
Text File
|
1995-11-30
|
142KB
|
2,733 lines
Freedom
~~~~~~~
Freedom Issue 1, December 24, 1992
File 1/7
Introduction
~~~~~~~~~~~~
Well after a bunch of delays, it's finally here... just in time for christmas.
Merry Christmas everyone..
Welcome to Freedom Issue 1. First let me begin by explaining what
Freedom is. Freedom is an electronic newsletter devoted to the freedom of
information, we, like many other electronic newsletters, believe that the
people have the right to know everything, and mostly things that they
shouldn't (all legal of course). Since we are just starting out, this issue
will be fairly small but hopefully in the future as our reader population
grows so will our issues. Freedom is basically a reader supported newsletter.
I will be writing articles as often as I can, whenever I find something
interesting, but I also ask that if you have an article or an idea which
would suit the magazine to please contact us. Anything of interest relating
to the computer underground, hacking, phreaking, anarchy, and other issues
would be welcomed. Material may be taken from this magazine as long as the
source, and author are mentioned, and the article remains unchanged.
Reaching Us
~~~~~~~~~~~
If you would like to submit an article, or just drop us a note, you can either
call up our support board (204.669.7983). There is a new user password, to get
on the system, login to the public USENet system first (waffle), and leave me
mail asking for it. I'm in the process of hooking up UUCP feeds to the system,
so in the next issue i'll include the address.
Thanks to ElZorro for proof reading and editing this entire issue.
till next time....
ICEMAN
Index
~~~~~
I. Introduction and Index by ICEMAN.
II. How to lock up TAG 2.6 boards by Thunder/ICEMAN.
III. IBM's Voice Mail System by ICEMAN.
IV. Air Frequency's For Manitoba by Thunder.
V. How to make crystalline methylamphetamine (ICE) by Vox Populii.
VI. How to make a miniature pipe bomb by Lazarus Long.
VII. Hackers in Winnipeg? by ICEMAN.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Freedom Issue 1, December 24, 1992
File 2/7
How to lock up TAG 2.6 boards
by Thunder/ICEMAN
This was discovered by a friend of mine (Thunder) so I don't take
credit for finding this but since he didn't want to write up the article I
decided to since it was an interesting bug.
This is extremely simple so if you don't understand this you will need
help. Basically, what you have to do is write a message containing the
required character sequence and then quote it. Now, if you want to write a
public message or a private message to yourself is completely up to you
but post a message. The first step is to write the message. What you have to
do is hold down the up/down/left/right key (pick one of them) enough times to
enter at least 85 or more escape sequences (considering of course your using
a terminal program that supports arrow key ANSI movements). Don't bother
counting them, if you hold your arrow key down for at least 15 seconds
thats more than enough. We haven't bothered to test this with any other
escape sequences but the arrow keys work nicely. This will fill the message
with the chosen ANSI sequence. Hit enter after doing this for about 15
seconds and save your message. Now all you have to do is read the message
you just wrote, reply to it, and when you attempt to quote it, it will lock
up the system instantly. Pretty simple actually..
We predict that the reason this locks up the system has something to
do with the 255 character string constant. Since each ANSI sequence (for the
arrow keys) is 3 characters, 3*85=255.
ICEMAN
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Freedom Issue 1, December 24, 1992
File 3/7
IBM's Voice Mail System
By ICEMAN
Disclaimer
~~~~~~~~~~
As the author of this article, I am not responsible for any actions that may
result from the information in this article. This file is for informational
and educational purposes only, detailing the features of this particular
VMB system. None of this information should not be used without the permission
of the authorized people in charge.
Introduction
~~~~~~~~~~~~
I haven't encountered a VMB system such as the one IBM is using in our area
yet, so i've decided to write an article on it. The specific system in this
case is only a local system, and I'm not at all sure if IBM is using it on
any 1-800's that they run. I have heard something about ROLM in the past while
but I haven't been able to get any info on it in time for this issue... maybe
there'll be a part ][ in the next one.
First steps
~~~~~~~~~~~
Once you have called up the IBM VMB system, a high quality voice will answer
and give you the following options:
o Press 1 if you are using a touchtone phone
o Hold the line if you are using a rotary dial phone
Note that you want to select 1. If you are using a rotary dial phone, get a
touch tone phone. If you hold the line you will be connected to a live
operator, and this defeats the purpose.
Next you will be presented with the following options:
o Press 1 if you know the name of the person you are trying to call
o Press 2 if you want to make a service call
o Press 3 if you would like information on IBM's products or services
o Press 4 if you want to leave a comment about the automated phone system
Now you want to pick option 1, since the whole purpose of your call is to get
into the actual Voice Mail section.
Finding Valid VMB's
~~~~~~~~~~~~~~~~~~~
After choosing 1, you are prompted to enter the persons name of who you want
to reach. You enter the name by using your touch-tone keypad corresponding to
the first 3 letters of the persons last name. If you want to reach someone
with a last name of Doe, you would enter 363 (DOE). Since the letters Q and Z
don't appear on standard keypads, use the 7 key for Q and the 9 key for Z.
It will probably be difficult to actually find a valid mail-box, so it may
help by actually calling up the local IBM service department and using some
social engineering skills to get some of the employee names out of the
operator. Or you could go as far as dumpster diving, but this is probably
far too much trouble to get a person's name.
After finding 1 valid Mailbox it is easier to scan for others as well. When
the voice asks you to enter the mailbox number, after 2 invalid attempts,
enter one the valid ones which you have found. This will prevent the system
from hanging up on you and you can keep on scanning from there.
Once you have entered a valid name, the system will say something like this:
'You dialed ', then an actual recording of the persons voice will be
played, saying his own name, so the result will be 'You have reached John
Doe'. It sounds a little silly mind you, but at least you've found a valid
Mailbox. It will then ask you if this is correct.
o Press # if it is the correct person.
o Press * if it is incorrect.
After You've Found One
~~~~~~~~~~~~~~~~~~~
Now the persons greeting will play, and you will be prompted to enter a
message for them. During the greeting, or during message entry if you press
the 0 key, you will be presented with the following options:
o Press # if you would like to talk to someone taking calls for John Doe
o Press 0 to talk to an operator
o Press * to enter another persons name (VMB)
o Or enter an extension number, to transfer to another extension.
You probably won't need to use any of these functions, so just continue
listening to the greeting. Now it's time to try and get into it by hacking
out the persons personal password. To do this you must first enter a message
to the person, enter a completely blank message, unless you want to harrass
an IBM employee or something (not suggested since you dont want to leave
traces of your visit and this would be very unethical). Once the time has
elapsed, you will be presented with the following options:
o Press 7 then 3 to replay the message
o Press 1 to re-record the message
o Press # to accept and save the message
o Press 6 to erase the message
o Press 7 to disconnect
You now want to delete the message since you don't want to leave any traces
whatsoever of your visit. When selecting 6 you'll be presented with:
o Press # to continue deletion
o Press 1 to re-record the message
Select # to delete the message and proceed. You will then be presented with
the following options:
o Press 0 to transfer to another extension
o Press # to access the phone mail features
Now we want to access the phone mail features so press #. You will now once
again be prompted to enter an extension or name, once again enter the same
name that you are currently hacking. You now have the following options:
o Press * if this is the incorrect person (Obviously not)
o Enter the password for this Mailbox, then press #
Ah-Hah. We have finally reached the password entry prompt. You now have your
chance to try to enter the correct password try every combination of the VMB
number that you can think of or any other information about the employee that
could be relevant.
These systems are incredibly secure (This is IBM we're dealing with here), and
after 3 invalid password entries, you will be unable to get to the password
entry prompt again. This is a major drawback and will deter all but the
patient, determined individual. You must wait for the person who owns the
mailbox to talk to the system administrator to 'unlock' the mailbox and then try
again the next day. The person will probably become extremely paranoid due to
people trying to hack into their mailbox every day, and change their password
often. I'm currently not sure of the length of the password since you are
able to enter as many digits as you like before pressing the pound key.
The fact that you are only allowed 3 attempts to enter the correct password
seems quite stupid in my opinion since even though you are locked out from
attempting to access the VMB so is the owner of the mailbox. This means that
the owner is unable to read their mail or do anything about it. This could
become very annoying to them if done repeatedly and would be one way to
really get on their nerves. There's no telling what IBM can or will do. This
is wasting their time, they could go as far as installing traces since
this is probably considered mischief. So it may be a good idea to do it from
a payphone, if you must.
Summary
~~~~~~~
Here is a simplified rundown of what to do:
o Call the VMB system
o Press 1 since you have a touch-tone phone
o Press 1 to enter a persons VMB number
o Press # if it's the correct person
o Wait for the greeting to finish, and enter the blank message
o Press 6 to erase the message
o Press # to verify deletion
o Press # to access phone mail features
o Enter the Mailbox number again
o Enter the password then # to complete
After this you are on your own. We have been unable to enter ANY boxes to
date due to the tight security involved.
If you are able to actually get into one of these mailboxes please let us
know or write up a text file explaining the options availible from within.
Considering the options availible on other similar systems, these could range
from Forwarding Messages, Mass Messages, Creating Guest Accounts, Placing
outgoing calls (an outdial), Listening to your Messages (obviously),
Programming Mailboxes to Call certain phone numbers, and play certain
messages at specified times, plus may other possible features.
ICEMAN
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Freedom Issue 1, December 24, 1992
File 4/7
DOC Frequencies for Manitoba
by Thunder
What follows are various frequencies for the province of Manitoba, most of
them can be received with a scanner, depending on the quality. Having these
frequencies is by no means illegal, but it is considered illegal to listen
to them.
Freq(khz) Name Area Service
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
46.610 MTS Cordless Phones Provincial Phones
46.970 MTS Cordless Phones Provincial Phones
118.000 Air Centre Provincial Aircraft
118.300 Tower Provincial Aircraft
119.000 Radar Provincial Aircraft
119.500 Arrival Provincial Aircraft
119.900 Departure Provincial Aircraft
121.000 VFR Advisory Provincial Aircraft
121.300 Clearance Provincial Aircraft
121.500 Emergency Provincial Aircraft
121.900 Ground Provincial Aircraft
122.400 Weather - Aircraft Provincial Aircraft
122.800 Unicom Provincial Aircraft
123.000 Unicom Provincial Aircraft
123.500 Unicom Provincial Aircraft
124.300 Pagers Provincial Aircraft
131.775 Air Canada Dispatch Winnipeg Aircraft
131.950 Perimeter Aviation Dispatch St. Andrews Aircraft
142.750 Mobile Phone YR Provincial Aircraft
143.415 Bison Electronics Repeater Provincial Business
148.685 Emergency Measures Org. Winnipeg Emergency
150.605 United Towing Winnipeg Towing
151.025 Unicity Taxi Winnipeg Taxi
151.145 Selkirk Works & Operations Selkirk Town
151.325 Selkirk Parks & Recreation Selkirk Town
151.350 Stoney Mountain Penitentiary Stoney Mtn Police
151.480 Mobile Phone JJ Provincial Phones
152.510 Mobile Phone JL Provincial Phones
152.540 Mobile Phone YL Provincial Phones
152.570 Mobile Phone JP Provincial Phones
152.600 Mobile Phone YP Provincial Phones
152.630 Mobile Phone YJ Provincial Phones
152.660 Mobile Phone YK Provincial Phones
152.690 Mobile Phone JS Provincial Phones
152.720 Mobile Phone YS Provincial Phones
152.780 Mobile Phone JK Provincial Phones
152.810 Mobile Phone JR Provincial Phones
152.840 Mobile Phone JW Provincial Phones
154.980 Winnipeg Transit Winnipeg Bus
155.220 Selkirk Mental Hospital Selkirk Crazy
155.310 R.C.M.P. Local Selkirk Police
155.550 R.C.M.P. Channel A Provincial Police
155.580 R.C.M.P. Channel B Provincial Police
155.640 R.C.M.P. Channel D Provincial Police
155.700 R.C.M.P. Channel C Provincial Police
155.760 R.C.M.P. Car to Car Provincial Police
157.530 Unicity Taxi Winnipeg Taxi
157.680 Unicity Taxi Winnipeg Taxi
157.740 Mobile Phone JJ Provincial Phones
157.770 Mobile Phone JL Provincial Phones
157.800 Mobile Phone YL Provincial Phones
157.830 Mobile Phone JP Provincial Phones
157.860 Mobile Phone YP Provincial Phones
157.890 Mobile Phone YL Provincial Phones
157.920 Mobile Phone YK Provincial Phones
157.950 Mobile Phone JS Provincial Phones
157.980 Mobile Phone YS Provincial Phones
158.070 Mobile Phone JR Provincial Phones
158.100 Mobile Phone JW Provincial Phones
158.340 MacArthurs Towing Winnipeg Towing
158.760 Selkirk Ambulance Selkirk Hospital
158.880 Selkirk Volunteer Fire Dept. Selkirk Fire
158.925 Provincial Fire Commissioner Provincial Fire
159.500 R.C.M.P. East St. Paul E. St. Paul Police
159.810 CNR - Symington Yard Winnipeg Railway
160.485 CNR - Symington Yard Winnipeg Railway
160.905 CNR - Symington Yard Winnipeg Railway
161.415 CNR - Police Winnipeg Police
161.870 Unicity Taxi Winnipeg Taxi
162.150 Selkirk Taxi Selkirk Taxi
162.400 USA National Weather Service Fargo ND Weather
162.550 Canadian Weather Service Provincial Weather
163.230 Unicity Taxi Winnipeg Taxi
164.460 South End Towing Winnipeg Towing
165.990 Manitoba Motor League Towing Provincial Towing
168.990 Brandon Jail Brandon Police
236.000 ATC Winnipeg Tower Winnipeg Aircraft
243.000 ATC Country Emergency Provincial Aircraft
275.800 ATC Winnipeg Ground Winnipeg Aircraft
282.700 ATC Winnipeg Radar Winnipeg Aircraft
283.500 ATC Winnipeg Clear/Delay Winnipeg Aircraft
291.400 ATC Winnipeg Winnipeg Aircraft
294.500 ATC Winnipeg Centre Winnipeg Aircraft
308.800 ATC Pilot to Metro Winnipeg Aircraft
325.900 Winnipeg Tower Radar Winnipeg Aircraft
341.300 VFR Advisory Service Winnipeg Aircraft
349.600 Winnipeg Centre Winnipeg Aircraft
356.600 Winnipeg Arrival Winnipeg Aircraft
363.800 Winnipeg Departure Winnipeg Aircraft
412.562 Winnipeg Transit Winnipeg Bus
412.637 Winnipeg Transit Winnipeg Bus
412.662 Winnipeg Transit Winnipeg Bus
413.012 Winnipeg Fire Department Winnipeg Fire
413.062 R.C.M.P. Airport Security Winnipeg Police
413.125 Winnipeg Police District 3,4,5 Winnipeg Police
413.162 Winnipeg Fire Dept. City Wide Winnipeg Fire
418.225 Winnipeg Police District 1,2,6 Winnipeg Police
418.362 Winnipeg Ambulance Ch 2 Winnipeg Ambulance
418.412 Winnipeg Fire Department Ch 3 Winnipeg Fire
418.575 Winnipeg Police - Vice Winnipeg Police
418.587 Winnipeg Ambulance Ch 4 Winnipeg Ambulance
418.625 Winnipeg Fire Department Ch 4 Winnipeg Fire
418.650 Winnipeg Police - Detective Uplink Winnipeg Police
418.737 Winnipeg Police - Mobile Cell Winnipeg Police
418.787 Winnipeg Police - Uplink Winnipeg Police
418.902 Winnipeg Ambulance - Dispatch Winnipeg Ambulance
418.975 Winnipeg Police - Uplink Winnipeg Police
420.012 Mobile Phone ACT Winnipeg Phones
420.037 Mobile Phone ACT Winnipeg Phones
451.237 Auto-Route Towing Winnipeg Towing
460.212 R.C.M.P. Winnipeg Airport Winnipeg Police
461.787 R.C.M.P. Winnipeg Airport Winnipeg Police
464.762 Buchanan Towing Winnipeg Towing
800.000+ MTS Cellular Phones Provincial Phones
Thunder
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Freedom Issue 1, December 24, 1992
File 5/7
How to make crystalline methylamphetamine (ICE)
by Vox Populii
Disclaimer
~~~~~~~~~~
I'm a firm believer in the concept of evolution and natural selection;
basically, the strong survive and the weak get shit upon. I also believe
that reality tends to punish those who are stupid. If you DON'T thoroughly
understand working with ALL of these concepts, please don't try this...well,
if you kill yourself, the IQ of the average human being will be that much
greater.
Forward We Go
~~~~~~~~~~~~~
Materials: 95-100% ethanol, Sodium Borohydride, 250 ml round bottom glass
flask, reflux condenser, rubber tubing, Sudafed nasal decongestant capsules
( VERY IMPORTANT ), glass extraction funnel, 1 molar Sodium Hydroxide,
anhydrous Sodium Sulfate, diethyl ether, Safety goggles(!!!!), Safety shield
( plexiglass...1-2" thick ), Safety apron and gloves. It's also advisable to
have a dry chemical fire extinguisher available at all times. Blue and red
litmus paper, and about a litre of saturated salt solution (1 gram per 23
mls).
Where do I get all this shit? Steal it from your high school, or buy it at a
laboratory supply house (none of these materials are prohibited or restricted
in any way!)
Why make this stuff?: Because it's an illegal drug. You can get really wacked
on the stuff if you're stupid enough to use it. It's probably quite fun if
you're into death and that kinda shit.
Theory: You will perform a catalytic dehydrogenolysis on pseudoephedrine,
converting it into methylamphetamine (speed, ice, or glass are common names).
C-----C
// \\
C CH2-CHCH3
\ _____ / |
C-----C NH2
Structure of synthesis: This procedure is broken up into two parts;
1) the production and purification of pseudoephedrine free base.
2) the production and purification of methylamphetamine free base.
The production and purification of pseudoepehdrine free base
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Buy sudafed capsules; the more the merrier!
Method: Take 10 sudafed capsules apart, and place the little round granules
into a clean dish. These granules contain the pseudoephedrine hydrochloride
and inorganic filler. Crush the granules until they are no more than a very
fine powder. I suggest using the 100 milligram capsules at this point.
Approximate end yield will be roughly 1 gram of product.
Place 100 mls of room temperature water into the extraction funnel,
and CAREFULLY add all of the powdder into the funnel. Place a cap on the
funnel, invert, and open the stopcock. MAKE SURE YOU ARE WEARING YOUR SAFETY
GOGGLES AT THIS POINT! Swirl the funnel around to dissolve the material.
There will be a significant amount of undissolved white powder; do not be
concerned, this is inorganic filler. After 10 mins of shaking, dip a glass
rod into the liquid and touch the drop on the tip of the stirring rod to a
piece of moist BLUE litmus paper. The litmus paper should turn red where it
has been touched. This means that the solution is acidic, and that a
significant proportion of the pseudoephedrine hydrochloride has in fact
dissolved in the water. If the litmus paper has turned red, you can go on to
the next step. If not, repeat he shaking 5 more minutes until the litmus
paper does turn red.
Add 50 mls of diethyl ether to the separation funnel. BE VERY CAREFUL AT THIS
STAGE. MAKE SURE YOU ARE WORKING IN A WELL VENTILATED AREA AND PLEASE DON'T
DO SOMETHING FUCKING STUPID LIKE SMOKE CIGARETTES OR YOU DESERVE WHAT WILL
HAPPEN! YOU DESERVE TO GET LUNG CANCER OR HAVE YOUR FUCKING FACE BLOWN OFF!
The diethyl ether is less dense than the water solution and will float on top.
Add 10 mls of the 1 molar sodium hydroxide, cap the funnel, invert and
IMMEDIATELY release the stopcock to vent off the gas that forms. Point the
end of the funnel AWAY from your eyes! Periodically swirl and vent the funnel
to release any gas. When no more gas is given off after venting, draw off a
little of the liquid from the lower layer into a thimble. Test it with a piece
of moist RED litmus paper. If it stays red, add 10 more mls of the sodium
hydroxide solution, invert funnel, swirl and vent until no more gas is given
off. Repeat this UNTIL the red litmus paper turns blue. At this stage, the
water solution is basic, the pseudoephedrine hydrochloride is in the free base
form, and is located entirely within the diethyl ether layer.
Draw off the lower water layer and discard it. Pour off the ether
layer into a beaker with 10 grams of anhydrous sodium sulfate. The sodium
sulfate is a drying agent and will remove most of the water that is in the
ether solution (very little really since ether is non polar and water is very
polar). Cap the beaker with a piece of saran wrap and let it sit in a well
ventilated COOL area overnite (not the fridge). Don't smoke within 2 miles of
this. Ether is FLAMMABLE and forms EXPLOSIVE peroxides which tend to
spontaneously detonate.
Decant off the ether into a dry round bottom flask. Heat this flask
over a pot of very hot water. This will take only a few minutes to evaporate.
You will be left with a clear syrupy liquid that looks like childrens tylenol
drops. This is the pure pseudoephedrine free base. If you have a death wish,
you can try some now (scoop it up with a spoon, a toothpick, etc). Swallow
it, or put it on a cigarette and smoke it. I don't care. You're stupid if you
do.
Production of methylamphetamine free base
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Add the 95% ethanol or everclear drop by drop until the sludge is
dissolved. It should go into solution very easily. I doubt it if many people
will be able to get 100% ethanol, but the purer the better, since trace
amounts of water inhibit the next step in the preparation.
Total volume should not exceed 50 mls at this point. You can make
the solution up to 50 mls if you wish. VERY carefully add 1 gram of sodium
borohydride to the solution, add the relux condensor to the top of the round
bottom flask, and start to boil the mixture (eg, on a hot plate...NOT on an
open flame. The cold water going thru the reflux condensor will keep the
ethanol from evaporating, yet the high temperature of the reaction vessel will
allow the reaction to go forward as desired. Let this go for about 4 hours.
Take away from the hot plate and let cool slowly to room temperature.
AFTER the solution has cooled to room temperature, add 50 mls of
saturated salt solution. At this point, you should see little oil drops
floating on the surface of the liquid. This is methylamphetamine. Add 50 mls
of diethyl ether to the COOLED flask( room temperature is ok ). Transfer the
contents to a separatory funnel, cap, invert, and IMMEDIATELY open the
stopcock. Some gas will escape. Close the stopcock, gently swirl, and open to
vent off and gas. Repeat until no more pressure developes after 5-10 seconds
of gentle agitation.
Draw off the lower layer and set aside for a moment. Drain the upper
ether layer into a beaker containing 10 grams of sodium sulfate. Add the layer
that you had set aside BACK to the separatory funnel, and add another 50 mls
of ether. Cap, invert, vent, etc until NO more pressure developes. Drain off
the lower water layer and discard. Drain the ether layer into the beaker with
the first portion of ether. Cover this with saran wrap and let sit over nite.
Decant the ether solution into a clean beaker and gently heat this
over very hot water. As the ether evaporates( please use good ventilation ),
you will be left with a beige sludge. This beige sludge is methylamphetamine.
You can do two things at this stage; i) Prepare 'glass' for smoking or
freebasing (very fucking stupid), or prepare crystal meth for shooting up
(very very fucking stupid).
i) if you want to prepare solid ice, stick the beaker in the freezer,
and hope that crystal formation starts. If it doesn't, take 5 or 6
chemistry course and you'll learn where you fucked up.
ii) if you want to prepare `crystal' for shooting up, dissolve the beige
ice in about 10 mls of anhydrous (very dry) diethyl ether. Add ethereal
HCL drop by drop. After each drop, you'll see a little white suspension
form. This is methylamphetamine hydrochloride. Add ethereal HCL until
no more white powder forms. You could then decant off any ether, and
let the powder dry on tinfoil or whatever. This should be 90% pure.
Reliabilty of this synthetic method: It works, and in a lab, you can go from
starting material to finished product in about 8 hours IF you know what
you're doing (and you probably don't). To the best of my knowledge, this has
never been published, but the general reaction scheme of catalyic
hydrogenolysis is well documented. At ALL stages, glassware should be kept
very dry.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Freedom Issue 1, December 24, 1992
File 6/7
How to make a Miniature Pipe Bomb
By Lazarus Long
This device is not a weapon of terrorism like a genuine pipe bomb.
It is essentially just a firecracker, a very loud firecracker, that can
mangle a finger or two if you aren't careful. First, I will advise you to go
out and buy a pound of Pyrodex. This is a smokeless powder sold at most
gun/hunting supply stores for roughly $15 (Canadian) per pound. It is an
exceptionally versatile explosive as it is less sensitive to friction and
impact, and it also does not absorb moisture as readily, as other similar
compounds like black powder. Pyrodex is also exceptionally easy to make into
simple fuses. A pound will last a long time depending on how you use it.
What you will need:
o A Papermate Flexgrip pen
o Pyrodex
o A couple cotton balls
o A fuse
Part 1 - Making Fuses
~~~~~~~~~~~~~~~~~~~~~
For those of you that don't know how to make fuses out of pyrodex I
will explain this first. Mix some pyrodex into a small amount of water until
you have a thin paste, it shouldn't be too thick or too watery. Take a cotton
ball and stretch it into a long string. Coat this string with the paste and
loosely pull it through your fingers to scrape off excess paste (do not
flatten the fuse). Place on a cookie pan (use wax paper, or place them on
the back of the pan), aluminum foil, or other similar surface. Keep making
these until you run out of paste, there is no need to let it go to waste.
Bake in your oven at 250 degrees until the fuse is stiff. When ready it will
be both stiff and dry, and have a steel grey appearance. Try not to bend this
fuse as areas that incur bends will sometimes fail.
This is the most expedient method I have found and, except for the
Pyrodex, requires items frequently already in the home. Using the same
principles you can also use cotton string, or even toilet paper (toilet paper
is not recommended). My last bit of advice: never bake a large amount of
fuses at once. Although powders like Pyrodex don't explode unless confined,
they do burn. I have never had any problems with the above method, but
caution should always be used.
Part ][ - The Bomb
~~~~~~~~~~~~~~~~~~
Now to the mini pipe bomb itself. The Papermate Flexgrip pen is the
perfect container for such an explosive. They are, unfortunately, fairly
expensive as pens go, so except for one or two experimental bombs you are
going to want to use them first (fortunately the Flexgrip is also one of the
best pens out there). The reason it is such a good container is that, like a
pipe bomb, both ends are screw on, one of which has a hole the perfect size
for a fuse. The rest of the container has no holes in it, unlike the cheap
Bic pens.
First take out the ink cartridge, you don't need it anymore. Second,
unscrew the metal end out of which the writing part formerly jutted. Insert
the fuse through the hole starting from the inside and pulling out, remember
to avoid bending the fuse too much. Leave enough fuse on the inside to just
barely reach above the threads on the metal cone. You should then screw this
metal end back onto the pen. Now fill the pen with Pyrodex nearly to the top.
Tap the pen with your finger to eliminate air pockets. Fill again if
necessary. Finally put some cotton in the top of the pen, and the hollow
part of the screw on top. Screw the top back into place. You now have a
miniature pipe bomb. When firing this off you don't want to be nearby, it
produces a fair amount of shrapnel, and a very loud bang. Use a long fuse.
When making this using Pyrodex is advised. If you choose to use black
powder or match heads (match heads are dumb!) be VERY careful when screwing on
the top piece that you don't have any powder in the threads. You should be
wary of this even when using Pyrodex but it isn't nearly as dangerous. I've
made over two dozen of these and had no problems whatsoever, except for the
occasional failed fuse. If the fuse fails don't approach the bomb for at
least five to ten minutes. When you recover it you will have to empty the
Pyrodex and start over with a new fuse.
This mini pipe bomb with the cap on looks just like a pen without
alterations and could be rigged into a booby trap if necessary (ie. placing
the pen cap back on in a way that would light a very short fuse when removed).
Pen booby traps such as these, although not made in the same fashion, were
used as antipersonal devices by Germans against the British. The idea behind
such a booby trap is not usually to kill, but to maim, thus taking the enemy
personnel out of action and forcing the enemy to expend resources on medical
care. To be used for recreational purposes though the fuse should be too
long to place the cap on properly and therefore doesn't look nearly as
innocent.
Hopefully this makes it in on time to be a part of the LANDMARK issue one of
Freedom, and furthermore I hope to be a regular contributor. See you soon...
Lazarus Long (LAZ).
December, 1992.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Freedom Issue 1, December 24, 1992
File 7/7
Hackers in Winnipeg?
by ICEMAN
After hearing about my friend having his computer confiscated for crashing
a board, I was astonished... even more astonishing was what came a few days
later. An article on the FRONT page of our local paper, on his story. A
little extreme in my opinion...
Following is the article which appeared on the front page of the Winnipeg
Free Press, on November 26, 1992.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
STAFF THREATENED, FILES RUINED AS TEEN COMPUTER WHIZ STRIKES
By George Nikides
Staff Reporter
A teen hacker uncovered a hole in a downtown software shop's computer
system and went on a rampage, destroying every file and threatening employees.
" It's an ego thing. 'Boy look what i've accomplished,' " said Sgt.
Dennis Loupin of the Winnipeg police fraud unit.
" He's very, very intelligent. He's got a tremendous future in the
computer world. "
An 18 year-old, who can't be named because he's charged under the Young
Offender's Act, faces fraud charges.
Police say a hacker discovered a "hole" - an opening that allows a user
to circumvent a computer system's passwords - in the bulletin board program
at Adventure Software Ltd., a Hargrave Street software shop.
The computer whiz unlocked the program several times, at one point
destroying every file.
Bulletin Board
The hacking is believed to have been carried out with an IBM-style
computer from a home.
Adventure Software offers a computer bulletin board where customers can
communicate, read about news products, or leave messages from their home
systems.
The system has about 400 users, police say.
An Adventure Software employee, who asked not to be identified, said
threatening messages were left in the system, some suggesting that selling
software was immoral. Some messages attacked a store employee.
The system was out of operation at one point for 3 1/2 weeks, he said.
But the employee said police are overstating the hacker's skills.
" It doesn't take a genius to hear about a 'hole' in the program," said
the man.
The system was infiltrated four to six times, he said.
" It's not crippling. It's just extremely annoying, " the employee said.
By breaking into the system the computer bandit found home phone numbers
and addresses, he said.
Police say they are also investigating the teen in connection with
break-ins at other systems across North America.
Mischief
" He's now going to have to face the consequences of something he
thought was just a challenge but it's more than that - it's a crime, " said
Loupin.
A Victor Street teenager was arrested Tuesday night and charged with
using a computer service to commit mischief, an offence that carries a
maximum 10-year sentence.
The teen is now 18, but police say he was 17 when the alleged crimes
occured.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
I decided to ask him a few questions about how he fellt about it, and that's
what follows. He didn't want any of his other aliases mentioned, so we
decided to use one which he uses on private boards.
FR=Freedom BL=Big Leacher
FR: Can you give us a brief rundown of the events that happened on November
24th 1992?
BL: Oh nothing really, just the police department came down and confiscated
my system, thats about the only thing that happened. I was also taken
down for questioning.
FR: Do you feel that the Free Press highly exploited your story?
BL: Yes, they seem to want to sell papers, more than tell the truth. The
Winnipeg Sun told a more realistic story.
FR: Can you justify Duncan Falconer's (Adventure Software employee) statement
that it took them 120 hours to setup their system again?
BL: No, and I don't think Duncan could either, he's bullshitting, and even
lamers know it couldn't take that long.
FR: What do you expect will come out of this? Do you expect to be charged?
(Just a note that no charges have yet been laid, only a computer was
confiscated)
BL: I expect to be charged, but it's no sweat, it was a stupid thing to do.
Better yet, an even stupider thing to get caught for.
FR: Did you learn anything from this experience?
BL: Not really.. just that the police are good at tracing, and that you should
allways have a failsafe for the data on your computer.
FR: Will you continue hacking after this is all over?
BL: Hack? Naaaaah.. would never get caught doing something as bad as that
again. :)
FR: What do you think was meant by the statement saying you were being
investigated in connection with other break-ins across North America?
BL: I had access to many boards through Internet and other LD places. Also
I was/am in a group which believes in the freedom of expression, so I
think they are trying to key me as the leader of this group. I didn't
hack other systems, just Adventure Software, because I had a score to
settle with an employee there.
FR: What do you mean when you said you 'had a score to settle'?
BL: The sysop of Adventure Software and I had dealings in the past which
cause alot of negativity in my family. I no longer hold a grudge.
FR: Do you feel any sympathy towards Adventure Software?
BL: No.. why? Selling software for the prices they do is wrong, since kids
use games, they'll get them any way they can. There should be a copying
fee, and that's all.
FR: What do you think of the fact that this is our city's first computer crime
investigation?
BL: It's cool, if I was still a youth, I would love the publicity of this,
but i've turned 18 after the crime, so I can't state how I 'really'
feel. :)
FR: Will you continue to BBS after this is over?
BL: Of course, this is nothing, and I'm both amused and suprised of the
publicity it has received (i.e. Free Press, Sun, Cud) and possibly
more as the case goes on.
FR: Is there anything else you want to say to ours readers?
BL: Yeah, hacking a bbs sucks, go for new things, and allways watch your ass.
Damn I need a modem, anyone wanna donate a C64 compatible one? Get in
touch with ICEMAN. Anyways i'll be back in a few months.
Well that's all...
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
End of Freedom Issue 1 - Freedom, Copyright 1992
Freedom
~~~~~~~
Freedom Issue 2, February 28, 1993
File 1/7
Introduction
~~~~~~~~~~~~
Welcome to issue 2 of Freedom, thanks to everyone who submitted to
the first issue, and this one. I'll keep this intro short, since I don't have
much to say.
There's been a new section added which i've called Tidbits, that
basically consists of small articles that weren't appropriate to put in
separately. If you have something that you feel isn't worth writing a full
fledged article on, it can be included in this section.
If you would like to submit an article, or get a hold of me, either
call one of the boards listed hereafter or send it via internet e-mail to
freedom@silicon.bison.mb.ca.
Freedom can be found on
Silicon Valley xxx.xxx.xxxx
as well as the following systems:
Unphamiliar Territory xxx.xxx.xxxx
The Phrozen Realm xxx.xxx.xxxx
ICEMAN
iceman@silicon.bison.mb.ca
Index
~~~~~
I. Introduction by ICEMAN.
II. Northern Telecom SL-1's by ICEMAN.
III. How to reduce taxes, eliminate welfare, and reduce organ donor shortages
at no cost to honest hardworking individuals by Vox Populii.
IV. Computers and Radios by Illusion.
V. The Invisible Answering Machine by Lazarus Long.
VI. Catalog Reviews by Lazarus Long.
VII. Tidbits.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Freedom Issue 2, February 28, 1993
File 2/7
Northern Telecom SL-1
by ICEMAN
This article is fairly lengthy, but I felt that it was worth including
all the information that I did, even though a great deal of it is useless to
someone attempting to take advantage of such a system. If you have any
interest in learning about PBX's, then in my opinion it's worth reading in
it's entirety. Just a note that you can't expect to learn this all in one
sitting, it takes time and experience. I would say that about 50% of this
material was taken from other sources, ranging from Northern Telecom manuals,
to classroom handouts used to educate those who work with them. Although most
of the technical information is straight out of the book, I did my best to
simplify it as much as I could, so that the reader can get a better grasp on
it.
Development of Northern Electric's SL-1 started in 1971. Their
objective was to design a superior communications system for business
subscribers in the range of 100 to 7600 stations. The system had to encompass
all the features of a PBX, Centrex and key systems and be economically
competitive with them. It had to have new custom services not previously
feasible with the older systems. It had to be easy to learn and to operate.
As well, it had to be easy to install and maintain.
What the designers came up with was a digital, stored program control
machine using an 8-bit PCM. They also came up with a new telephone instrument,
the SL-1 telephone, which is a multi-line instrument with many features, but
uses only 2 pairs of wires, instead of 25 pairs required by key telephones.
The SL-1 system has three main parts: The common equipment (CE), the
peripheral equipment (PE) and the power supplies.
The CE performs the central control and switching functions for all
the connecting lines and trunks. It has a central processing unit (CPU) and
read/write memory which stores all the operating programs and data unique
to the particular system, including switching sequences, feature and class
of service information, and numbers and types of terminals. It also has a
magnetic tape unit for high-speed loading of the operating programs and data
into the R/W memory, providing data restoral after a power failure. The tape
also contains the diagnostic routines. There is a Teletype to communicate to
the system with and to print error messages on. The network circuits perform
the switching duties for all lines and trunks. The digital service circuits
provide for such functions as dial and ringing tones and call conferencing.
The CE units communicate over a common central bus under control of
the CPU. Speech signals, converted to digital, follow a separate path on a
network switching bus.
The PE performs the interface between the line and trunk circuits and
the SL-1 system. It consists mainly of line and trunk cards which convert
analog speech to digital signals for digital switching and vice versa. Lines
connect to individual instruments and trunks to other PBX's. Peripheral
buffers act as interface between the PE and the CE providing power control,
timing and switching control signals for the line and trunk circuits. Digital
conversion into 8-bit PCM is done by a single encoder/decoder (codec) for each
line or trunk. This codec is a custom LSI circuit.
Between the PE and the CE, all signals travel in digital format on
time multiplexed loops. Each loops carriers 30 voice channels, one control
signalling channel and one unused channel. The channels operate at 64 kbps
to give a total data rate of 2.048 mbps. Each loops terminates on a different
circuit pack in the CE. There can be up to 16 multiplex loops.
When a call is set up, the CPU assigns each party a channel from among
the 30 on their own multiplex loops. These channels form a matched pair. For
instance, the calling party may use channel 2 of it's digital loop, and the
called party may use channel 3 of it's loop.
The SL-1 conducts audio digitally. The line and trunk cards contain
A/D and D/A converters. Received audio is changed to a digital signal and
put on a voice channel. At it's destination, the digital signal is converted
back to analog audio.
All programming is done from a keyboard with the output going to a
printer. To program, a specific diagnostic is selected, and is automatically
loaded from tape. Once this is done, the appropriate commands are entered to
change the options. All typing is echoed on the printer and the SL-1's
responses are printed out. If any system parameters or configurations are
changed, these changes will not survive a total power outage unless a new
tape is made.
In case of a power outage, upon restoral of power, the SL-1 activates
the tape unit and loads in the system operating data, and runs some
diagnostics. This takes from 5-15 minutes, and at the end of that time,
service is fully restored with all the options which were recorded on the tape
being implemented. Of course any user-selected options like speed call lists
and call waiting which had been selected before the outage will be lost.
Automatic diagnostics (called 'background' programs) are being run
constantly with the results of any problems being printed out. At midnight
a more thorough set of diagnostics are run. Any of the diagnostics may be
run on demand from the keyboard. Also available on demand from the keyboard
are a series of diagnostics to determine the status of lines and trunks, to
trace calls, and to print lists and traffic studies.
SL-1 Features
~~~~~~~~~~~~~
- Call Waiting - Digitone (DTMF) service
- Ring Again - Direct inward dialing
- Display services - Direct outward dialing
- Tandem switching - Private line service
- Special dial tone - Remote administration and
- Traffic measurement maintenance
- Common control switching - Multi-customer group operation
arrangement access - Line/trunk lockout
- Data transmission - Flexible numbering system
- Access to automatic recorded (2 to 4 digits)
answering equipment - Pulse to DTMF conversion
- Access to paging equipment - DTMF to pulse conversion
- Call forward - busy - Emergency transfer
- Call forward - don't answer - Hunting
- Call forward - follow me - Intercept
- Call pickup - Manual service
- Conference (3 or 6 party) - Night service
- Service restrictions
SL-1 Telephone Set Features
~~~~~~~~~~~~~~~~~~~~~~~~~~~
- Autodial - Automatic preselection
- Call status - Headset connection
- Call forwarding - Executive override
- Call transfer - Hold
- Speed calling - On-hook dialing
- Call waiting - LED indicators
- Tone ringing - Call pickup
- Common audible signalling - Loudspeaker/Amplifier
- Ring again - Voice calling
- Hands free operation - Manual signalling
- Multiple appearance directory - 3 or 6 party conference
number; multiple call - non-locking keys
arrangements - Single appearance directory
- Prime directory number number
- Station set expansion - Privacy
- Privacy release
Explanation of Some Features
~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Station to station calling - Any station can directly call any other station
without attendant assistance.
Direct Outward Dialing (DOD) - Allows a station to gain access to the exchange
network without attendant assistance and receives a second dialtone.
Hunting - Routes a call to an idle station directory number when the called
number is busy. The numbers in the hunt group do not have to be in sequence
nor do they have to appear on the same instrument. The sequence can be
consecutive (station directory numbers are hunted in ascending numerical
order) or non-consecutive.
Access to paging - Provides a connection to customer-owned paging equipment.
Access to Automatic Recorded Answering Equipment - SL-1 stations can have
incoming messages recorded on customer-provided answering equipment by
forwarding calls to the directory number (DN) assigned to the equipment.
Direct Inward Dialing (DID) - Allows an incoming call from the exchange
network to reach a station without attendant assistance. The DN for each
station will normally be the last 2,3 or 4 digits of the 7 digit exchange
network number.
Tandem Switching - The SL-1 can act as an intermediate switching point for
traffic between other PBX's.
Manual Service - Does not provide a dialtone when a station goes off-hook.
Instead the attendant is alerted and completes the call for the user.
Private Line Service - Permits the appearance of a private central office line
on an SL-1 Telephone set. Dialtone is received directly from the telco and
calls are not processed by the SL-1.
Multi-Customer Group Operation - Allows for the provision of services for more
than one business customer from the same switching machine. Each customer
is totally separate from the others, may have the same directory numbers as
the others, has his own attendant console, his own trunks, and cannot directly
call stations belonging to the other customers.
Service Restrictions - Allows the ability to restrict various functions.
Intercept - Disposes of calls which cannot be completed because of
restrictions or dialing errors. They are either routed to the attendant
or overflow tone.
Special Dial Tone - A Regular dialtone with three 128 ms interruptions at the
beginning to advise the user that his hookswitch flash has been successful.
Line Lockout - Disconnects stations which have been off-hook for too long to
prevent system problems.
Night Service - Allows the attendant to preconnect some or all of the incoming
telco trunks to selected DN's on the SL-1.
Emergency Transfer - Puts the system in the power fail transfer mode. This
transfers telco trunks to selected stations to provide some continuity of
service to the outside world during the time the SL-1 is inoperative.
Remote Administration and Maintenance - Permits operation of the diagnostics
from a remote location via a modem and telephone line. You may do anything
from the remote terminal that you can do from the local terminal.
Call Forward - Busy - Routes incoming calls to another number when the called
station is busy.
Call Forward - Don't answer - Routes incoming calls to another number when the
called station doesn't answer within a prescribed time.
Call Forward - Follow me - Routes incoming calls to another, programmable
number.
Call Waiting - Informs the user of a second incoming call while he is already
in conversation. He can then place the first caller on hold and answer the
second call. He can then return to the first call.
Conference - Allows a user to connect up to either 1 or 4 additional persons
into an existing call. Up to 2 of the users may be trunks.
Call Pickup - Allows a station to answer an incoming call to another station
in the same pickup group by dialing a special code.
Ring Again - Permits a calling station, on encountering a busy DN, to operate
a dedicated key or dial a special code to have the system monitor the called
station and alert him when it goes idle. He is then automatically connect to
that station when he goes off-hook or presses the key during the alert and the
system rings that station.
Data Transmission - The SL-1 is suitable for voiceband data transmissions
and is compatible with a conventional modem.
SL-1 Models
~~~~~~~~~~~
Model Lines Introduced Generic Features
~~~~~ ~~~~~ ~~~~~~~~~~ ~~~~~~~ ~~~~~~~~
SL1-L 300-700 1975 x01 - N/A
SL1-VL 700-2500 1976 x02 - Multi customer operation
- Automatic Identification of
outward dialing
- Do not disturb
CDR N/A 1977 x03,x04, - Call detail recording
x08 - Recorded Announcement
- Digit display console
SL1-LE 300-700 1978 x05 - Automatic Route Selection
SL1-VLE 700-2500 N/A N/A - Remote peripheral equipment
- Automatic Number Identification
- "E" system
- Autovon
SL1-A 60-400 1979 x06,x07, - Centralized attendant service
x14 - Automatic call distribution
- Digit display SL-1 Sets
- 2500 Set Features
- Direct inward system access
- Dial Intercom
- Message Center
- Hotel/Motel
- International Phase 1
SL1-XL 1000-5000 1980 x09,X17 - Advanced ACD packages
- Multiple message center
- Integrated voice and data
switching
- Hospital/Clinic
- International Phase 2
ESN N/A 1981 x9000 - Office data administration
system
- Automatic Wake-up
- Room status
- Auxiliary data system
- Electronic switched network
- International Phase 3
SL1-M 60-400 1982 x11 rls 1 - Attendant Administration
- Attendant overflow
- Automatic set relocation
- History file
- Call park
- Flexible code restriction
- System speed call
- International Phase 4&5
SL1-S 30-160 1983 x11 rls 4 - Distinctive ringing
- Stored number redial
- Async. interface module
- Sync. data transmission
- Multi-channel data system
- SL-1 displayphone
- Hotel/Motel
'Generic' refers to the software version. It is expressed as a 3 or 4 digit
number where the first part of the number indicates the machine it is for
and the second part indicates the purpose of the software and serves as a
version number and also indicates the type of machine it can be used with. The
'X' stands for a 1 or 2 digit number representing the model:
1 = SL1-L 2 = SL1-VL 3 = SL1-LE 4 = SL1-VLE 5 = SL1-A
6 = SL1-XL 7 = SL1-M/S 8 = SL1-N 9 = SL1-XN 10= SL1-ST
11= SL1-NT 12= SL1-XT
Maintenance Programs
~~~~~~~~~~~~~~~~~~~~
All troubleshooting procedures, configuration changes and circuit
disabling/enabling are carried out from the keyboard of a Teletype via
software programs. There is virtually no physical contact with the exchange
other than required to remove a defective board and replace it with a spare.
Even this does not require tools.
This material will give only a brief description of each program and
some examples of how to use them.
Before running a program you must first gain access to the computer.
The dialup will normally be a 1200 baud connection, with an even parity,
databits of 7, and stopbits of 1 (E71). Once connected press the 'return'
key to wake the system up. The system SHOULD respond with 'OVL111 BKGD' or
'OVL111 IDLE' and now you know it's alright to login. If the response is
'OVL000' and then a '>' prompt you are already logged in, and you can go
straight to loading an overlay.
Type 'LOGI' to initiate the login. Make sure when entering commands
that they are all input in uppercase. The system responds with 'PASS?'. Now
enter the password. The default password is '0000' but is obviously
configurable. If you have correctly logged in, the system will respond with
a '>' prompt. The system will display this prompt whenever waiting for
operator input and is not running a diagnostic program. Once a diagnostic
program is running the prompt becomes a '.' (period). If you are not logged
in, there is no prompt.
What follows is an example of what you will see during login.
{ Hit Carriage Return }
.
.
.
.LOGI { Initiate Login }
PASS? { Enter password, it will not echo }
OVL015 { Error code for incorrect password }
TTY 01 SCH MTC 16:40
OVL 45 BKGD
.LOGI { Try again }
PASS?
.
>
OVL000
>LD 22 { You are now logged in and ready to load an overlay program }
{ in this case we are loading overlay 22, a print routine. }
PT20000
REQ TID { The REQ prompt appears, now enter your selection, in this }
{ case we want to print the TID (Tape ID) }
TAPE ID:
LOADED XXXXXX
DISK/TAPE XXXXXX
REQ ISS { Enter ISS to view the Issue and Release number of the }
{ software/switch }
VERSION 1011
RELEASE 14
ISSUE 39
REQ END { Enter END to quit this overlay }
>LOGO
>
. { Logout and hangup }
Now after gaining this information, we can determine what type of
system we're dealing with. Notice that the version number is 1011. Now
refer back to the listing of SL-1 Models for the information we seek. We are
logged into an x11 system (last 2 digits of the version number). Unfortunately,
there are two system with x11 generics, and none of which have a release
number of 14, so we're either dealing with an SL1-M or an SL1-S, with either a
60-400 or 30-160 line capability respectively. Although this information isn't
extremely useful, it comes in handy when determining how large the system is.
Overlay Programs
~~~~~~~~~~~~~~~~
Upon first logging in, no program is loaded, and you must load a
program (overlay) into system memory. This is done by the command 'LD'
followed by a space and the overlay number. To load overlay 10 you would
simply do a 'LD 10'. It will take approximately 1 minute to load the overlay
into memory from tape, if the system uses a tape drive. If the system uses
other methods of storage (disks, ROM) then it will load quickly. Once the
program is loaded, a 'REQ' (request) prompt will appear. The system is now
waiting for input from the user.
There are many different overlays which can be used, all of which
are explained in the following section.
Number Name Purpose
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
10 500/2500 Type Allows new 500/2500 telephone data blocks to be
Telephone generated, existing office data modified, moved
to a new TN location on the same loop, or removed
from the system.
11 SL-1 Type Allows new SL-1 telephone data blocks to be
Telephone generated, existing office data to be modified,
moved to a new TN location on the same loop, or
removed from the system.
12 Attendant Allows new SL-1 attendant console data blocks to be
Console generated, existing office data to be modified,
moved to a new TN location on the same loop, or
removed from the system.
13 DIGITONE Allows new DIGITONE and SL-1 tone detectors blocks
Receiver and to be generated, moved to a new TN location on the
SL-1 Tone same loop, or removed from the system.
Detectors
14 Trunks Allows new trunk data blocks to be generated,
existing office data modified, moved to a new TN
location on the same loop, or removed from the
system.
15 Customer Allows new customer data blocks to be generated,
existing office data modified, or removed from the
system.
16 Trunk Route/ Allows new trunk/ATM route and ATM schedule hours
Automatic Trunk data blocks to be generated, existing office data
Maintenance modified, or removed from the system.
17 Configuration Allows the configuration record to be modified to
Record reflect changes in the system parameters.
18 Speed Call Allows speed call/system speed call and group call
Group Call Data data to be generated, modified, or removed from the
system.
19 Code Restriction Allows code restriction data block to be generated,
modified, or removed from the system.
20 Print Routine 1 Allows the printing of:
- SL-1 TN data blocks
- 500 TN data blocks
- attendant TN data blocks
- trunk TN data blocks
- DIG data blocks
- group call data
- templates
- speed call lists
- hunting patterns of stations
- unused units
- unused card positions
- terminal numbers
21 Print Routine 2 Allows the printing of:
- customer data blocks
- code restriction data blocks
- route data blocks
- a list of trunks in a route
- ATM data
- ATM schedules
- TN associated with CAS keys
22 Print Routine 3 Allows the printing of:
- the configuration record
- directory number to TN matrix
- equipped packages
- history
- password numbers
- ROM QPC number
- station category indication
- version and issue of generic
23 ACD/Message Allows ACD data, ACD management report schedules,
Center and Message Center data to be generated, modified,
or removed.
24 DISA Allows data for direct inward system access to be
generated, modified or printed.
25 Move Data Allows movement or interchanges of data between
Blocks loops, shelves and packs in the same customer
group.
26 Do Not Disturb Allows DND groups to be formed, changed, merged,
removed or printed.
28 ANI Route Allows ANI route selection data block to be
Selection generated, modified, removed, or printed.
29 Memory/ Used to determine the amount of unused memory, and
Management to determine if enough memory is available to add
new data. Also used to respond to error messages
SCH601 and 603 on Meridian SL-1 XN systems.
49 NFCR Allows code restriction data blocks to be defined,
modified, removed, or printed.
50 Call Park Allows call park data to be generated, modified,
removed, or printed.
73 Digital Trunk Allows Digital Trunk Interface data to be generated
Interface or modified.
81 Features/ Allows stations to be listed or counted according
Stations Print to their features.
82 Hunt Chain/ Allows printing of hunting patterns and multiple
Multiple appearance groups.
Appearance Print
83 TN Sort Print Allows printing of stations according to station DES.
84 DES Entry Allows the assignment of station DES to 500/2500
sets.
85 DES Entry Allows the assignment of station DES to SL-1 sets.
86 ESN 1 Allows electronic switched network data defining
BARS/NARS/CDP features to be generated, modified,
or printed.
87 ESN 2 Allows electronic switched network data defining
BARS/NARS/CDP features to be generated, modified,
or printed.
88 Authorization Allows data for Basic Authorization Code (BAUT) and
Code Network Authorization Code (NAUT) to be generated,
modified, or printed.
90 ESN 3 Allows data for ESN network translation tables to be
generated, modified, or printed.
93 Mult-Tenant Used to enable and administer multi-tenant service.
Service
Programming
~~~~~~~~~~~
The following few sections will summarize the possible commands and
responses for various overlays. Since there are various models of SL-1's as
well as various software versions running on them, there are bound to be
differences in the commands, to accommodate this, notice the 'generic' heading.
If 'all' appears under this heading, then the following command/prompt is
found in all models/versions, otherwise it only appears in the models/versions
that are specified under this column. Once an overlay is loaded, the first
prompt will appear. For example when overlay 10 is loaded, the 'REQ' prompt
will appear, and you will choose the appropriate response, in this case the
choices are 'NEW','CHG','MOV','OUT', and 'END', then the next prompt will
appear and so on. Note that not all prompts will appear for all versions,
but i've done my best to include possible prompts that you can come across.
When entering input, if you make a mistake and would like the system to
disregard the current line, end the line with a '*' then a carriage return.
If you make a mistake, and would like to return to the beginning of the
input routine, enter '**' at the end of the line, followed by a carriage
return, and you will return to the 'REQ' (request) prompt.
Overlay 10: 500/2500-Type Telephone Set
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
GENERIC PROMPTS RESPONSES COMMENTS
~~~~~~~ ~~~~~~~ ~~~~~~~~~ ~~~~~~~~
all REQ NEW,CHG,MOV,OUT,END NEW - Add a new set
CHG - Change a current set
MOV - Move a set
OUT - Remove a set
END - Quit this overlay
all TYPE 500 500/2500 Telephone set data
block (500 is a normal
telephone set)
X11 CARD 500/2500 Card Block
all TN LL S CC U LL (Loop), S (Shelf),
CC (Card), U (Unit)
X11.4 CDEN (dd),sd Card Density (double) single
Normally double
all TOTN LL S CC U New loop, shelf, card, unit,
LL (Loop), S (Shelf),
CC (Card), U (Unit)
X04+ DES XXXXXX 1-6 digit alphanumeric station
designator for ODAS
all CUST 0-31 Customer Number
X05,X09+ DIG 0-253 0-99 Group Number and Member Number
all DN XXXX Directory Number (Extension)
all HUNT XXXX Hunt Directory Number
all X To remove Hunt Directory
Number (Character 'X')
all TGAR 0-15 Trunk Group Access Restriction
X05,X09 ARSQ 0-3 Automatic Route Selection
Queue code (normally 0)
X11 NCOS 0-15 0-3 Network Class of service group
X11.2+ 0-15 0-3 0-7 0-15 if NARS Active
0-3 if BARS/CDP Active
0-7 if NCFCR Active
all RNPG 0-127 Ringing Number pick-up group
X04+ 0-255 Ringing Number pick-up group
X11 SCI 0-7 Station Category number
priority level (Normally 0)
X11 XLST 0-7 Pretranslation group
(Normally 0)
all CLS (UNR) Unrestricted
all TLD Toll denied
all SRE Semirestricted
all FRE Fully restricted
X04+ CUN Conditionally unrestricted
X04+ CTD Conditionally toll denied
X04+ FR1 Fully restricted 1
X04+ FR2 Fully restricted 2
all (DIP) Dial pulse
all DTN Digitone dial
all MNL Manual service
all (XRD) Ring again denied
all XRA Ring again allowed
all (XFD) Call transfer denied
all XFA Call transfer allowed
all (CWD) Call waiting denied
all CWA Call waiting allowed
all (PUA) Call pick-up allowed
all PUD Call pick-up denied
all (WTA) Warning tone allowed
all WTD Warning tone denied
all (LPR) Low priority station
all HPR High priority station
X04+ (FND) Call forward no-answer denied
X04+ FNA Call forward no-answer allowed
X04+ (FBD) Call forward busy denied
X04+ FBA Call forward busy allowed
X04+ (ONP) On-premise extension
X04+ OPX Off-premise extension
X04+ (HTD) Hunting denied
X04+ HTA Hunting allowed
X05,X09+ (MWD) Message waiting denied
X05,X09+ MWA Message waiting allowed
X05+ MCI Message center included
X05+ (MCX) Message center excluded
X05,X09+ (LPD) Message waiting lamp denied
X05,X09+ LPA Message waiting lamp allowed
X11.4+ (XHD) Exclusive hold denied
X11.4+ XHA Exclusive hold allowed
X09+ FCAR YES Set restricted from using
forced charged account
(NO) Set can use FCA
X05,X09+ FTR CFW 4-23 Call forward to directory
number length (normally 4)
X05,X09+ SCC 0-253 Speed call controller list
number
X05,X09+ SCU 0-253 Speed call user list number
X05,X09+ PHD Permanent hold
X09+ MCD XXXX Message center directory
number
X11.2+ FDN XXXX Flexible call forward no
answer directory number
X11.2+ SSU 0-253 System speed call list number
X11.3+ RDL 1-31 Stored number redial, maximum
number of digits allowed
(usually 16)
X11.4+ HOT 1-31 X...X Flexible hot line, hot line
directory number length, hot
line directory number
all Xaaa Remove feature (aaa=feature
mnemonic)
Overlay 20: Print Routine 1
~~~~~~~~~~~~~~~~~~~~~~~~~~~
GENERIC PROMPTS RESPONSES COMMENTS
~~~~~~~ ~~~~~~~ ~~~~~~~~~ ~~~~~~~~
all REQ LTN,LUC,LUU,PRT,END LUC - List unused cards
LUU - List unused units
PRT - Print data
END - Quit this overlay
all TYPE aaa Prompted when request is PRT,
which services to print
ADM - Attendant Administration
AID - Automatic Identification
if outgoing dialing
ATT - Attendant
ATVN- Autovon
CAA - Controlled class of
service allowed
CAM - Central Admin and
Maintenance Trunk
COT - Central Office Trunk
CSA - Common control switching
arrangement
DIC - Dictation
DID - Direct Inward Dial
DIG - Dial Intercom Group
DTR - Digitone Receiver
FEX - Foreign Exchange
GRP - Group Call
HNT - Hunting
MDM - Modem
MUS - Music
PAG - Paging
PWR - Power-only TN card
RAN - Recorded Announcement
RCD - Emergency Recorder
RLM - Release Link Main
RLR - Release Link Remote
SCL - Speed Call Lists
SL1 - SL-1 Set
TEM - Template
TDET- Tone Detector
TIE - Tie Trunk
TNB - TN Block
TRK - Trunk
WAT - WATS
500 - 500/2500 sets
2000- Meridian 2000 sets
3000- M3000 Touch sets
4020- M4020 Terminal
all TN <CR> Terminal Number to print data
for. <CR> for all.
lll Print data for this loop
lll s for this loop,shelf
lll s cc for this loop,shelf,card
lll s cc uu for this loop,shelf,card,unit
Multiple TN's can be entered,
just end your entry with a
space and the prompt will
reappear
X11 CDEN DD,SD,<CR> Card density, Double, Single,
<CR> for all.
all CUST XX Customer Number (0-31)
X11 TEN 0 Shared customer resource
stations
1-511 Tenant Service stations
XX Print data for this customer
X04+ DATE 1-31 JAN-DEC Date, month and year from
19xx the date data is to be printed
<CR> Print all Data
X04+ PAGE (NO),YES Print data on per-page basis
X04+ DES X...X 1-6 digit designator
X+ All sets starting with DES x
+ Sets with no DES assigned
<CR> Print All Data
X04+ ADJUST <CR> Prompted when PAGE is YES
PAPER, Just tells you to adjust the
CR Paper in the printer, hit <CR>
X04+ NACT (NO),YES Update the activity date? Best
To choose no.
X11.1- SCNO XXXX Speed call list number,
<CR> prompted when type is SCL,
<CR> Prints all.
X11.2+ LSNO XXX List number (0-253).
<CR> Print all lists
X11.2+ RNGE XXX YYY First and last member numbers
in range to be printed.
<CR> Print all members of the SCL.
all HNTO XXXX Prompted when type is HNT,
Hunt number.
X05,X09+ DGRP XXX Prompted when type is DIG
DIG numbers per customer
<CR> All DIG numbers per customer
X05,X09+ DMEN XX Dial intercom member number
<CR> All DIG numbers
X05,X09+ GRNO XX Prompted when type is GRP
Group call number
<CR> Print all call group call
groups
X09+ FOR Prompted when type is TEM
500 Print data for 500/2500 sets
SL1 Print data for SL1 sets
X11+ KEY NO Print data for 500/2500 sets
YES Print data for SL1 sets,
Digital and touch sets.
X09+ INFO Prompted when type is TEM
FRM Print key/feature assignment
template
USE Print number of users of
template
USS Print TN using template
DEF Print number of templates
defined and number allowed
X09+ TEM XXXX Template Number
<CR> Print all templates
X11+ CPND Feature for CPND name display
X11+ EHT XXXX External Hunt DN
Overlay 21: Print Routine 2
~~~~~~~~~~~~~~~~~~~~~~~~~~~
GENERIC PROMPTS RESPONSES COMMENTS
~~~~~~~ ~~~~~~~ ~~~~~~~~~ ~~~~~~~~
all REQ PRT,LTM,END PRT - Print Data
LTM - List Trunk Members
END - Quit this overlay
all TYPE CDB,CRB,RDB,CASK,SRDT Prompted when REQ is PRT
CDB - Customer Data Blocks
CRB - Code restriction Blocks
RDB - Route data block
CASK- Centralize Attendant
Service data
SRDT- Set relocation data
all CUST 0-31 Customer Number
<CR> Print data for all customers
all ROUT 0-31 Route number
0-127
<CR> Print data for all routes
all ACOD XX Route access code
<CR> Print data for all route
access codes
Overlay 22: Print Routine 3
~~~~~~~~~~~~~~~~~~~~~~~~~~~
GENERIC PROMPTS RESPONSES COMMENTS
~~~~~~~ ~~~~~~~ ~~~~~~~~~ ~~~~~~~~
all REQ ISS,PRT,PWD,ROM, ISS - Issue and Release Number
SLL,TID,END PRT - Print Data
PWD - Password
ROM - QPC Number of the ROM
daughter board
TID - Tape ID
END - Quit this overlay
all TYPE AHST,CFN,DNB,DSDN, Prompted when request is PRT
PHST,PKG,SCI,REF, AHST- All of history file
TST,IMA,APL CFN - Configuration Record
DNB - DN Block
PHST- Part of history file
PKG - Software Packages
SCI - Station Category
Indication Block
REF - Loop reference trunk
Data
TST - Loop test trunk data
IMA - Integrated messaging
system
APL - Auxiliary Processor
Link
X11+ PWD2 XXXX Administrative password
all CUST XX Customer Number (0-31)
<CR> All Customers
all DN XXXX Print for Directory # XXXX
<CR> Print ALL Directory Numbers
XXXX<SPACE> Will allow printing of
multiple directories. The DN
prompt will reappear.
X04+ DATE 1-31 JAN-DEC Date, month and year from
19xx the date data is to be printed
<CR> Print all Data
X04+ DES X...X 1-6 digit designator
X+ All sets starting with DES x
+ Sets with no DES assigned
<CR> Print All Data
X04+ PAGE (NO),YES Print data on per-page basis
X04+ ADJUST <CR> Prompted when PAGE is YES
PAPER, Just tells you to adjust the
CR Paper in the printer, hit <CR>
When ready.
X04+ NACT (NO),YES Update the activity date? Best
To choose no.
Those are the main overlays used to modify setups and print the system
configuration information. Now you may be asking, where do I find an SL-1?
SL-1's are mainly used in buildings, ranging from department stores to
large office complexes. The dialups are commonly found off of an extension
of the PBX, I've come across several while scanning for VMB's, which are
becoming more common in stores every day. I've never however come across
one while exchange scanning, and I really don't think you would find many
this way.
Anyways have fun, and remember, knowing is half the battle.
ICEMAN
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Freedom Issue 2, February 28, 1993
File 3/7
How to reduce taxes, eliminate welfare,
and reduce organ donor shortages at no
cost to honest hardworking individuals
by
Vox Populii
Has it ever bugged you that as a tax paying citizen in this fine
nation of ours that *YOU* have to pay for non productive fucking leeches who
sit at home all day, swilling beer, playing nintendo and generally whacking
off? I know I'm pissed off! 1/3 of my income goes to pay for social programs,
and it makes me as mad as hell that I'm forced to subsidize loozers( yeah
that's right, and if you find this antagonistic, I guess you know what I
think of you so piss off, format your hard drive, do the world a favor and
go crawl in a corner and fucking die already ).
To the extent that the following issues represent serious problems,
I offer solutions. These *are* workable, if our society had the balls to
implement em. Typically however, thoughts like these are known to cause
severe angst in yuppies. We can only wish that this paradise would come
about!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
1. Jails are overcrowded( why should we pay for luxury
accommodations for these freaks? ).
2. We have a shortage of organ donors
3. Our society is not strong enough( think of imperial
Rome, where it was not unusual for the average citizen
to see bloodshed each and every day ). Eventually, our
way of life will degenerate or rot.
4. We don't have enough entertainment( or the
entertainment is not intense enough...take your pick ).
5. People who aren't productive can get by just by
sucking on the public tit.
6. We pay way too much FUCKING TAXES!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Did any of that get you mad? Did it make your blood boil? If it did,
then I've got respect for you. If it didn't, well...fuck off and die. I've
got more respect for someone working at McDonalds then for someone collecting
welfare. At least the person working at McDick's is contributing something
to society by virtue of participating in the social order.
The first plan will virtually eliminate welfare overnite AND provide
fresh supplies of organs and bodies for medical experimentation. It operates
under the principle that while people are lazy( and none more so than the
people on welfare )there is only so high a price that people will pay for
'free' stuff. To this end, I have segregated people on welfare into three
categories;
i) People who can work, but don't want to.
ii) People who can work, but have been unable to
find jobs.
iii) People who are unable to work for
whatever reason( physical or mental
disability )
Class i)
~~~~~~~~
Fuck em. Let them rot, or kick them out of Canada. You might even want
to send em up to Baffin Island. We *all* know someone like this. It's your
typical person who goes and buys booze with his/her welfare cheque, goes on
a week long drunk, and then ends up robbing someone to buy more booze. I'd be
tempted to say let the law of the jingle take care of em if it weren't for
the fact that these type of people would probably wait outside your door to
mug you. Shooting's too good for them, but lest I be accused of inhumaity, I
say ship the bums off to er Somolia? Yeah, and then see how long they survive
( note: banishment was used in Ancient Greece ). If someone can't work, that's
neither my concern nor yours. So what if these people start hanging around on
the streets; we can ship them away. In the event they *don't* want to go away,
they go into the arena's( see below please ).
Class ii)
~~~~~~~~~
Unfortunately, the government has fucked us all over to the point
where the economy is a shambles, and there are those of us who *would* work,
but are unable to find jobs. Still, pathetic forms of mercy are no reason to
shell out *YOUR* hard earned dollars. Class ii individuals could easily slip
to class one individuals. Therefore, I propose that in exchange for a
subsistence level of food and shelter, these people be forced to work on
public projects( e.g. highway repairs, street repairs, cleanup, snow removal,
etc ). For as long as work is available in the public sector, and as long as
these people are willing to accept a demeaning level of existence, I see no
reason why we should not exploit them as a cheap source of labor. However,
lest these individuals come to see 'Big brother' as a provider, they should be
made to attempt job location at least once a month. In any event, when there
is no public work available, I'd kick these people off. Still, these people
are more respectable than class i people.
Class iii)
~~~~~~~~~~
This is the most problematic group of people to be dealt with; it
includes physically handicapped people, and individuals who are mentally
retarded. They may or may not wish to work( not that anyone would necessarily
wish to hire them ), nor may they even have an idea of what is constituted by
the concept of work. How do you deal with someone who is labelled as a
perpetual loser in society? How do you do this without appearing to be
inhumane? I'm not a nazi, nor would I wish to see people suffer unnecessarily
( those who deserve to suffer...well... ) If you accept that the jobs are
neither available for this group of people, nor could they fill such jobs if
they were in fact available, what is the incentive for society to sustain
their lives. I.e. what is the motivation for *YOU* Mr. taxpayer to shell out
some of his/her hard earned dollars to keep a non productive person alive?
There is none.....UNLESS they participate in my schemata of voluntary
organ donations. In my extreme generosity, I am willing to allow these
individuals to receive subsistence assistance from the state( fuck is that an
annoying term )in exchange for being placed on an organ donor bank.
What I propose is that each month, 8.25% of welfare recipients have
their names chosen at random. Those who are chosen are killed, and their
blood, tissue, skin, etc( i.e. all biologically useful substances )are placed
in storage or immediately given for transplant. The 8.25% represents a
theoretical breakpoint such that any recipient of welfare( if he or she is
truly so lazy or desperate )has only a 50% chance of still 'being in the
program' after a six month period. Work out what 91.75% raised to the sixth
power is...
Quite obviously we would not expect people to meekly march to their
deaths after having 'their number' come up, so what I propose is that
hospitals become welfare distribution centers. On any given day of the month,
approximately 3.33% of total welfare recipients would go to the hospital, be
strapped in a chair, and play the lottery of life (grin), at which point they
would have a 91.75% chance of receiving social assistance, and an 8.25% chance
of being taken for science. If they have the misfortune to draw a ticket, they
would be mercifully put unconscious and then cut up for immediate use or
storage.
The interesting thing about this plan is that it assures us of a
constant supply of fresh organs each and every day. No more blood bank
shortages. And my fellow taxpayer, LESS sucking at the public tit. YOUR taxes
go down. It's purely voluntary, with no one forced to participate. The only
point of no return is after someone has drawn a random number. Additionally,
this would tend to strengthen our society, for our weakest members tend to be
the ones receiving social assistance.
______________________________________________________________________________
The second problem that I wish to deal with is overcrowding in our
jail systems. They're overflowing with people, the courts are backlogged with
the most trivial of offenses, the parole system lets hardened criminals out
far too early, and some mass murderer who has raped and killed a dozen kids
gets luxury accommodations for years( while we have to spend OUR money to buy
a turkey for Christmas, these low life scum get to eat for free ).
This plan operates under the principal that humans are greedy( and
particularly the unintelligent amongst us are greedy; not quite understanding
that you have to work for what you get in life ).
I propose that for each individual who has committed a felony offense,
they have the offense of working off a portion of their sentence in the
following fashion; if a person has a 10 year sentence, he( or she ) may elect
to enter into the arena for a fight to the death with another convict( who
has also voluntarily elected to enter into the arena ). On each Friday of the
week, a set of such fights is held at the biggest public arena in each state
capital. Contestants are allowed to choose from a variety of weapons with
which to attempt to kill their opponents; ranging from knives to flails, etc.
The victor of said match would receive a one year reduction from his jail
term, while the loser is snuffed out. The person who( for example )had a ten
year sentence would now only have a nine year sentence. To have the jail term
reduced to zero, this person would have to win ten such matches. At any stage
in the process, he/she may drop out( an interesting modification might be to
have one criminal fight two; if the single man won, he would receive a 2 year
reduction, if the pair won, they would receive a 1/2 year reduction ).
Some curious points to be noted about this proposal are;
-the shorter a period of time a person is to be incarcerated,
the less likely they would risk the 'games'.
-It doesn't really matter if a mass murderer has been let
free( e.g. Jeffery Dahmer has a 125 year sentence ), because
in order to become free, he must kill 125 other scum. I would
say this person has done a great service to society then.
The only stipulation I would like to add is that the Gladiator fights
will have a no tie rule imposed upon them. The contestants are to understand
in advance that ties are not acceptable. A contestant may however opt to pull
out of a fight with the following penalty; one year will be added to his
sentence for cowardice. The opposing contestant is not penalized, but is
neither rewarded. In the event of such an act of cowardice though, the
remaining contestant has first right of rematch with this person. Should the
'withdrawing' gladiator refuse to refight within a one year period, 10 years
shall be added to his sentence.
Upon being victorious for the 20th time( e.g. if the criminal had a
20 year sentence ), a criminal shall be judged to have paid fully and
completely for his crimes against society. On that instant , he shall be
declared a free man with a complete pardon( as opposed to parole ). In order
to expedite his return to society, he shall be awarded a one time sum of
10,000$ paid by admission tickets to the fights.
-=-=-=-=-=-=-=-=-=-=-=-=-
Public executions:
All executions of criminals shall take place in public, with the right
of execution decided upon by voluntary participation in a lottery. The person
whose name/number is drawn gets to decide the method of execution of the
convicted criminal. Methods are to include hanging, shooting , electrocution
and beheading. Public executions are to be televised by all stations that
wish to do so. Imperial Rome had it's 'bread and circuses', and it was
considered to be quite civilized. At one time, it was the zenith of
civilization on this planet.
Of course, we could expect all sorts of civil libertarians to snivel
and whine at these proposals( they're probably recipients of welfare handouts
themselves ), but so what? We're not concerned with people like this.
Sparta( an ancient Greek culture in rough proximity to Athens )was a
warrior society with a quite rigid code of ethics. What would be wrong with
'thinking' with our blood a little bit? Our culture has become too soft.
-=-=-=-=-=-
Vox Populii
-=-=-=-=-=-
-These opinions are not necessarily held, nor supported by the
editor of this magazine.
-Feel free to quote from this article, with no compensation nor
form of reference given.
-if any of these ideas strike you as interesting, try reading
"The Republic' by Plato.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Freedom Issue 2, February 28, 1993
File 4/7
COMPUTERS AND RADIOS
By Illusion
PREFACE
~~~~~~~
Well, first of all, I am by no means an authority on this subject. I am
just interested in it, and have decided to share with others what I have
learned so far. I am not going to list any sources because I simply can't
remember any. I did not originally intend to write anything about this, but
I figured that maybe someone else might find it interesting as well. The
information used in this article was not deliberately or specifically obtained
from any particular sources. It is a compilation my personal knowledge and
experience on the subject. A long time ago, I heard that it was possible to
transmit data through the so called "airwaves". This seemed very interesting
to me, so over time, I've learned about it.
-------------------------------------------------------------------------------
A huge amount of data is available throughout the radio frequency spectrum.
To access it, you need a radio receiver and a computer. Just like we have
protocols, there are special protocols used on the airwaves. Equipment,
software, and instructions are all available from several sources including
ham radio groups. However, there are other ways to go about setting up a
"station". I would recommend buying all of your needed equipment used.
I have not intended this article for use by the absolute beginner in
radio data communications. If you are interested in the equipment, the basic
instructions/techniques, or a general overview, then contact a local amateur
radio club. They will be able to provide you with all of the information that
you require -- usually at no cost.
First you will need a receiver. It must at least cover 100kHz to
30 MHz and have AM, USB, and LSB. (USB=Upper Side Band, LSB=Lower Side Band)
The better the radio, the easier it will be to find and receive the data.
Now, you need an antenna. Don't expect to use your old cheap CB whip.
I would recommend what is known as the "active dipole". It is usually small
and has 2 lengths of wire that are tied parallel to the ground. Of course
you want this as high as possible and far away from the computer to ensure
good reception and little interference.
Next comes a computer. Just about anything will do. Even an old VIC-20
would do the job, but more software is available for PC's. Now you need an
interface or a radio modem. There is a huge variety of these, but you need
one that fits the industry standards...the best idea here would be to contact
a dealer. You can probably find a good model for a relatively inexpensive
price.
OK, I'm not going to go into the special protocols here. You can find
this information very easily in instruction manuals and books. What you want
are some frequencies! Before you try listening in, don't be surprised if you
see silly messages or meaningless characters. They are used just to sort of
reserve a frequency. An example would be: RYRYRYRYRYRYRYRYR... on and on
until the station was sending something for real.
Here are a few where you are likely to find others talking (RTTY (Radio
TeleTYpe)):
3950, 14090, 21090, 28090 ...or
at VHF/UHF frequencies: 144.6, 145.3, 432.6, 433.3
These are some where you may be able to find news agency transmissions (kHz):
3155-3400 3500-3900 3950-4063 4438-4650 4750-4995
5005-5480 5730-5950 6765-7000 7300-8195 9040-9500
9900-9995 10100-11175 11400-11650 12050-12330 13360-13600
13800-14000 14350-14990 15600-16360 17410-17550 18030-18068
18168-18780 18900-19680 19800-19990 20010-21000 21850-21870
22855-23200 23350-24890 25010-25070 25210-25550 26175-28000
29700-30005
Now you can know the news before it is broadcast, or sometimes, as it is
happening. These are fun to listen to, but even more fun to broadcast to.
Use your imagination...
Well, one more thing that I wanted to cover (because it is so interesting), is
satellites. I don't know very much about this, but I do know that you will
need a scanner type of radio or a crystal controlled one. Some scanners have
certain frequencies that are blocked out or don't work. These frequencies
usually carry things like military information. With a little electronics
knowledge, you will be able to easily fix these spaces as these are the really
interesting freqs. You need a different antenna too. One of the ones
that is sort of like a big horizontal "X" will work fine.
The general layout of the radio spectrum for satellites is as follows:
Amateur & Educational satellites:
144-146 MHz
430-440 MHz
Weather satellites:
136-138 MHz
Navigation satellites:
159-151 MHz
I heard that there are some that operate in the 1500+ MHz range, but I can't
seem to figure out how to scan this high a frequency. The VHF/UHF scanner
I was using couldn't go this high. I suspect that this may be where the
"spy" and military satellites operate. However, I also would assume that any
important data would be heavily encrypted.
A word of warning:
I am not sure about any laws regarding this subject, but I would be
careful. It's easy enough to alter other peoples data and re-broadcast it
with changes, but I would assume that this is illegal. It is extremely easy
to receive a satellite weather image, and it is also very simple to change it
and then send it out again. It might be fun to make there appear to be a
hurricane approaching on the 6pm news, but they must have ways of tracking
you down. So, once again, be careful. There are vast amounts of data riding
the airwaves, and it is available for all to view, with the right equipment.
-----
The author takes no responsibility for the actions taken by any of the readers
of this article.
-----
Illusion
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Freedom Issue 2, February 28, 1993
File 5/7
The Invisible Answering Machine User Guide
by Lazarus Long
[EDITORS NOTE: The Invisible Answering machine is essentially a VMB service]
[ offered by MTS (Manitoba Telephone System). If it is ]
[ implemented on your line, after approximately 3 rings, the ]
[ caller is transferred to the VMB. ]
Call answer is a service that acts like an invisible answering machine.
It will answer your calls when you are away from home or too busy to answer a
call. By following this guide and listening to the system's friendly and
simple prompts, Call Answer is easy to use.
The system will ask you to use symbols on your touch tone phone such as:
STAR *, and POUND #. You'll find a quick reference card on the inside back
cover. Remove this card and keep it near your phone to help you use the
system.
Initial start up: Dial the Call Answer access number for Residential
customers - 783-CALL (2255). Voice prompts will then ask you to complete the
following steps:
1. Enter your temporary password - your telephone number will act as the
temporary password until you create a new one.
2. The system will prompt you to change your temporary password to your own
personal password. Your personal password must be between 6 and 15 digits
and cannot begin with 0 (zero). For security reasons, CHANGE YOUR PASSWORD
TO ONE THAT'S EASY FOR YOU TO REMEMBER BUT HARD FOR SOMEONE ELSE TO GUESS.
The system will prompt you to record your name and select a greeting:
press 1 for standard greeting, or 2 for personal greeting. Then press 1 1,
to review them.
Listening to your messages from your telephone: From a touch tone phone,
dial the Call Answer access number 783-CALL. Enter your password (if calling
from another phone you will have to enter your phone number first) and press:
1 1 to listen to new messages
1 to listen to all messages
After you have listened to your messages you can press:
4 to replay message
7 to erase the message
9 to save the message
Listening to messages from another mailbox: dial the Call Answer access
number, press *, then enter your mailbox number. Enter your password.
NOTE: Long Distance charges will apply if you are calling from
outside your local calling area.
Personal options: (press 4 from main menu) A number of Call Answer
options can be personalized. From the Personal Options you may press:
1 Message waiting - this is the inter-
mittent dial tone you hear when there
is a message waiting. It can be
turned on, or off.
2 Administrative options - allows you
to change your password.
3 Greetings - allows you to change your
greeting or recorded name as often as
you like.
Enhanced Call Answer Features: (available for and additional low monthly
rate). Message Notification (Outcall), can be programmed to call out to a
pager, cellular telephone or alternative telephone to inform you that a
message has been received in your mail box. Press:
4 for Personal Options
4 for notification schedule
1 for first schedule (use this schedule
for display pagers)
2 for second schedule
3 for temporary schedule
You will now be guided through a series of prompts which will assist
you in creating or modifying your message notification schedule. After you
have completed your schedules and are back in Personal Options, Press * to
exit.
Family/Extension mail boxes: Call Answer Family/Extension mail box
allows members of your family to receive messages separately with their own
personal password. This service allows for one host and three extensions
mail boxes. Each represents one individual within your household. Extensions
can be added or deleted as required by the host. To set up a Family/Extension
mail box press:
4 for Personal Options
9 for Extension mail box
Enter the number for the extension you want to add or delete. Call Answer
will automatically assign a password. If you wish, you may change the
password. Remember, it must consist of 6 to 15 digits, and must not start
with 0 (zero). Then record your name. To find out who a message is for press
0. Call Answer will tell you the number of new and saved messages in each mail
box. To send a message to another extension: listen to the entire message
then press:
6 for forward message, and record your
comments.
# then enter the extension number of
the person to whom you wish to send
the messages.
# your message will be sent.
* to exit.
For more information please call: 941-7061 in Winnipeg or visit your local
MTS Phone Center.
MAIN PLAYBACK CONTROLS SPECIAL KEYS
1 1 2 3 * *
Listen Rewind Pause Forward Cancel Cancel/Exit
4 4 5 6 0 0
Pers. Opt. Slower Env.Info Faster Help Help
5 7 8 9 # #
Restart Volume Louder Skip Skip/Complete
*
Exit
Comments: For those of you wondering, you don't have to call the owners number
to get at the VMB. You can call the service and do whatever you have planned.
However, this doesn't look very useful to be hacking into, but I really know
very little about the actual hacking. Perhaps the weakness is in finding a box
before someone has changed their password. Still, they will eventually get
MTS to do something about it OR cancel the service. The other weakness might
be in finding someone with the extension service and creating a new box, BUT
I am pretty sure that the owner knows about the extensions even if he can't
get to them (because of your password), so again he will get MTS to do
something about it. Even though the hacking potential is slim you might want
to fuck around with the system, change messages etc., but that of course is
just mischievous. If you found one with Outcall I wonder if you could somehow
use that to your advantage. If not you could surely cause havoc with someone's
beeper/cellular (ie. schedule it to call him/her at 2:00 am and whatnot), but
again that is just mischief. Also, when calling you only have two tries at
getting a number with the service. On the third try it says "sorry you are
having problems, an operator will be with you in a moment". At this point
pressing * to exit has no effect. Hang up. I don't know how many tries you
get at guessing passwords. I have entered two and then used my proper one.
One more thing, if you do somehow get an extension box you will want to
disable the intermittent dial tone function on the main box. This will just
delay them from discovering you though. The thing about this system is that
people pay a monthly rate for it so you aren't likely to find any "unused"
boxes.
I'd be interested to hear from anyone about any "experiments" with this
system.
LAZ.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Freedom Issue 2, February 28, 1993
File 6/7
Catalog Reviews
by Lazarus Long
If you are interested in "unique and unusual books" you will want to
read this. In the last month I've been looking around for catalogs from
"underground" publishers and sent away a dozen or so catalog requests.
Unfortunately the responses have been slimmer than I hoped. The following is
a review of those publishers who have sent me catalogs.
Paladin Press is one of the better known publishers of "taboo titles".
In the note I received with my catalog they claim to have been in operation
for 22 years, so they aren't likely to be closing up shop anytime soon. The
catalog is free to anyone that requests it, and is sent every two months to
customers who have made orders in the past year. The most recent issue is
52 pages long.
Being a student of espionage, intelligence, and terrorism, this is my
personal favorite of the catalogs I've received. The variety of books they
offer in the 52 pages is quite extensive and survival oriented. Ordering is
very easy via a 24 hour, 7 days a week, 1-800 number, or through the mail.
Paladin Press sub headings include: Revenge & Humor, Locksmithing,
Weapons, New ID & Personal Freedom, Knives & Knife Fighting, Survival,
Sniping, Special Forces, Espionage & Investigation, Self-Defense, Explosives
& Demolitions, Military Science, Action Careers, Police Science, Terrorism,
Martial Arts, and Silencers.
Service is pretty decent. It took less than three weeks from the day
I mailed my request to the day I received the catalog. Ordering by phone is
however a pain. It is so low tech that the operator has to write down your
order by hand (while looking the books up in a stock catalog). Shipping is
only supposed to take 7 to 10 days and they charge %6.00 or 5% of your order
(whichever is greater) for S&H. If you want, other shipping arrangements can
be made. They also accept Visa and Mastercard.
The address is: Paladin Press, PO Box 1307,
Boulder, Colorado, 80306
Their two 24 hour, 7 days/week 1-800#s are:
1-800-392-2400 (USA only)
1-800-872-4993 (USA and Canada)
The Loompanics Unlimited catalog is clearly the largest and most
diverse catalog I've received to date. The drawback is that it costs $5.00
US before you even get to see it. They do, however, claim to be "the best
book catalog in the World". It is indeed for anyone interested in "the
strange, the useful, the arcane, the oddball, the unusual, the unique, and
the diabolical".
The 1993 main catalog is over 280 pages long and its sub headings
are: The Underground Economy, Tax Evasion, Money Making Opportunities, Privacy
& Hiding things, Fake ID, Big Brother is Watching You, Conducting
Investigations, Crime and Police Science, Locks and Locksmithing, Self
Defense, Revenge, Guns, Weapons, Torture, Survival, Self-Sufficiency, Head
for the Hills, Gimme Shelter, Health and Life Extension, Paralegal Skills,
Sex, Drugs, Rock 'N Roll, Intelligence Increase, Science and Technology,
Heresy/Weird Ideas, Anarchism and Egoism, Work, Mass Media, Censorship, Reality
Creation, and Self Publishing.
I've only had this for a short time and haven't been able to get
through it all, but it seems quite cool. It also contains six articles which
consist of essays, short fiction, and a three page comic. Some of the books
offered are the same as those in the Paladin Press catalog, but I have noticed
no price differences.
Service is not as good as Paladin Press from what I can see. The
catalog took about a week longer to arrive and the orders can only be made by
mail. Outside US orders have a whopping 12% of order PLUS $6.00 charged for
shipping and handling. US orders are $7.50 plus regular shipping prices.
The address is: Loompanics Unlimited, PO Box 1197,
Port Townsend, WA, 98368
Their orders are shipped within 24 hours of receipt of payment.
Books-by-phone is another cool publisher of controversial and
underground books. It says it costs two bucks but they'll send it free if
you give their 1-800# a call. They basically bring together books from many
different publishers and make them conveniently available. Prices seem to be
the same but I noticed one book that was actually $2.00 cheaper than that of
the original publisher.
The Fall 1992 catalog is 32 pages long, and the subheadings are: 60s
and Beats, Black Markets, Comics, Criminology, Cyberpunk, Drug - Legal &
Social, Drug Literature, Ecology, Gardening and Herbs, Health, identification,
Timothy Leary, John Lilly, LSD, Marijuana, Money, Mushrooms, Occult,
Pharmaceuticals, Privacy, Psychoactives, Recovery, Rock & Roll, Sex &
Sensuality, Shamanism, Survival, Underground Labs, Weird & Exotic, Colin
Wilson, and Robert Anton Wilson.
As for service, well, call the 1-800# and you get the catalog quite
quickly. You can mail in orders or phone them in but there is a $3.00 charge
for a credit check on all credit card orders. American orders get a 10%
discount when made with money orders. Shipping and handling is $1.00 per book
in the US, and $3.00 per book in Canada.
The address is: Books by Phone, PO Box 522,
Berkeley CA, 94701
Their 1-800 is: 1-800-858-2665
The Eden Press book catalog is aimed mainly at the subjects of
privacy and money. Their goal is to "present ideas which can increase
opportunities for personal freedom". There are some interesting books,
many of which I haven't seen in any of the other catalogs. One thing that
endeared them to me was a notice on the cover, "Freedom is not dangerous to
your health". So I guess you should read this magazine in large doses.
The most recent catalog has the sub headings: Jobs, Credit, Privacy,
Protection, Business Ideas, Offshore Finance, and Personal Independence.
Service looks very good. It was roughly a week from the time I sent
the request to when I received the catalog. You can order by mail, a 1-800
number, or by FAX. They accept both Visa and Mastercard. S & H in the US
seems reasonable (you can select the type of mail service you prefer), but
it is rather expensive in Canada at 20% of your order.
The address is: Eden Press, 11623 Slater "E"
PO Box 8410, Fountain Valley
CA, 92728
Their 24 hour, 7 days/week 1-800# is:
1-800-338-8484 (might be US only)
Their FAX # is: 714-556-0721
The last catalog I received was the Spring 1993 Butokukai (what a
name!) book catalog. It is only 23 pages long but has some stuff not
available in the other catalogs, but most of it is available elsewhere. One
drawback is that they have changed their name sometime in the last two years
which I consider a sign of instability (they were formerly known as Desert
Publications). They are weapon oriented (and do sell some weapons, but they
cannot be shipped to Canada).
The sub headings include: Under Cover Operations, Full Auto,
Suppressors, Improvised Munitions, Weapons + Firearms, Guerilla Warfare, Army
Technical Manuals, SWAT Magazine back issues (sole suppliers), Self-Defense,
Home Study Courses (Ninja), Ninja, Firepower Magazine back issues, and
Locksmithing.
Service is, all things considered, average. It took a long time for
me to get the catalog (about 5 weeks) but that might have had something to do
with their name/address change. You can order by mail, 1-800#, or FAX, and
they accept Visa and Mastercard. An added bonus is that any order greater
than $50.00 gets you a free book of your choice (from a list of 13 books).
Shipping and Handling is $4.00 per order in the US and $6.00 in Canada.
Their address is: Butokukai, PO Box 430,
Cornville AZ, 86325
Their 24 hour, 7 days/week 1-800# is:
1-800-747-6280
Their FAX # is : 602-634-1203
I also just read the address for Barricade Books on a net. I can
neither verify it or judge its quality but I'll include it for your
convenience.
Their address is: Barricade Books, PO Box 1401-J
Secaucus NJ, 07096
Amendment: Butokukai may not have used the name Desert Publications, I may
have been given some wrong information. The real address for the REAL Desert
Publications is: Desert Publications, PO Box 1751, El Dorado, AR 71731 USA.
You can also call: 1-501-862-2077. Their catalog is $2.00 or free with an
order.
LAZ's quote for the month:
"Whether it is good or bad, smashing something is also very pleasant on
occasion" Fyodor Dostoevsky, Notes from Underground.
Lazarus Long.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Freedom Issue 2, February 28, 1993
File 7/7
Tidbits
This is a new section consisting mainly of smaller articles that in
my opinion weren't feasible to split into separate articles.
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Mild Anarchy
Fed up with impersonal corporations? Want to get even without
breaking the law? There are several methods of mild anarchy that will cost
the corporations money and in some cases benefit you.
1) Get a credit card and use it responsibly. How is that anarchy some people
will ask. Well some credit cards have no service fees or monthly fees
but charge a preposterous amount of interest on an outstanding balance.
The anarchist though will never have an outstanding balance, and thus
defers payment for a month and can collect interest from the money that
instead remains in the bank. You also build up a healthy credit rating
for your future. Bank of Montreal Mastercards work well with this.
2) Are you in a book or music club like Columbia House? Frustrated or pissed
off at having to send back things saying you don't want the "selection
of the month"? The anarchistic solution is simple: don't send them back.
Then when they send you the tape, CD, book, or whatever, you can listen
to it (tape it if you want), read it, or whatever you do with the object.
Then put it back in its original package, seal it up, and write REFUSED on
the front of the package. This way you get to sample and or copy the
product for free, and the corporation pays the postage. I'm in a book club
and a CD club and this works fine all the time. It is also handy if you
don't want to keep receiving garbage from them all the time. If you haven't
sent something back to them they figure you own them money and don't send
anything until you have paid up. Keep the "gift" for several months, have
a good laugh at the form letters they keep sending (You are such a good
customer, please pay up or we will be forced to sick Guido the collection
agent on you), then send it back.
3) Free stuff! This is a good idea even if you don't want to annoy the
company. Most businesses really want to maintain good public relations,
and a wily letter writer can frequently take advantage of this. The result
is often free stuff, delivered to your door. An example: write a letter
to a computer disk manufacturer and tell them you bought a box of disks
but it didn't come with any labels. They will probably send you a bunch
of labels and an apology. Labels are no big deal but this one has worked
several times in the past. Tips: 1) be creative with your complaint, but
never be belligerent, 2) never write the same place twice with the same
address, 3) don't expect too much...major complaints are dealt with by
service centers, not through the mail.
4) Not quite shoplifting is also good for laughs, especially in stores where
the "undercover" guys are obvious. Wear a baggy coat or whatever into
the store, find the "undercover" guy and start acting suspicious, put
stuff into your pockets, use your shifty eyes to maximum effect. The
idea now is to walk around the store a lot, maybe do some real shopping.
It's very important that you don't start laughing whenever you see the
"undercover" guy slinking around behind you. Once you are ready to leave
and feel you've tied up the store's crime fighting resources long enough
you go to a counter near the check out. Here you leave everything you
don't wish to purchase and then go through the check out or leave. This
also serves as a vital service to keeping students employed as the store
must now pay a stock boy to put everything back in place. Ha, a double
whammy. This works because store security cannot stop anyone until they
have left the store with unpaid for goods. If you wish to cause more
havoc this can be done with a partner. One person fake shoplifts and
gets the security to follow him while the other partner REALLY lifts
whatever he can. This of course is breaking the law and is a "no-no".
In Winnipeg, a while back, a group of people were suspected of doing
this but were never caught. Apparently a dozen or so fake lifters would
work with on or two real lifters. It is rumored that they made off with
a LOT of loot. Remember though, the cost of shoplifting is most likely
passed on to other consumers.
Next issue I hope to bring you something more technical in the realm of
destruction. I hope the above was entertaining, if not informative.
Lazarus Long (LAZ)
February 1993
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
How to Steal a Library Book
~~~~~~~~~~~~~~~~~~~~~~~~~~~
1. Flip open only the cover of the book you want and make a clean cut along
the inside spine. If you do this properly then you'll be able to see the
security strip. It will be located inside the cover on the inner spine
of the book. It is best to use a really sharp knife like an surgical knife.
2. When you locate it then remove the security strip.
3. Now the book is yours.
Excuses
~~~~~~~
Here is a hint. If you want to steal a book it is advisable that you
have also some signed out books with you. So if by any chance you get caught
by the alarm due to you're own human errors you will have an excuse.
"Ahh... I guess the lady forgot to undecenticize this one, I was
carrying alot of books as you can see..."
"Oppss... Sorry, boy is this embarrassing. I guess I forgot to sign
this one out...I was in a real big rush...sorry about the inconvenience.."
Well you get the idea. Just BS your way through.
Having fun at the library
~~~~~~~~~~~~~~~~~~~~~~~~~
Get yourself some security strips off some lame shitty books. Put
them in peoples purses, bags, jackets etc. Or if you're really brave put
one in the library's security guard or in your teachers coffee. The ideas are
almost countless. The best part of it all is that no matter how hard they
try they will almost never find it.
I Hope you enjoyed this file. Remember that the phun never ends, it
just finds a new victim...
PRIMUS
~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~ ~
Defeating Knogos
~~~~~~~~~~~~~~~~
Have you ever been caught shoplifting? Did you feel embarrassed
about the ordeal? Well come get your chance to gain your rep back. There is
a minor flaw in the system that virtually lets you walk straight out the
door without setting off the alarm.
Well first of all I have only experimented with what some retail
stores call KNOGOS or simply security tags. They are either a disk or a
rectangular security tag. If the store is using the new technological
security strips(like ones in music stores) then just peel of the strip and
it's yours.
The method to surpass the KNOGOS alarm system
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This is a pretty simple technique but takes a bit of good hand and
eye coordination.
1. First of all you should be in a normal standing position. Next place
the KNOGO facing upward in the palm of your hand. The procedure must
be performed out of the detection area. The detection area is the area
between the two detection devices standing at each end of the entrance.
2. Adjust the angle of your palm until the KNOGO is parallel to the ground.
VERY IMPORTANT! It means that the widest area of KNOGO must be parallel
to ground. If the position of the KNOGO is bent at an angle at more
than an about an inch in the detection area the alarm will go off.
3. After you are sure it is almost parallel to the ground. Just walk out
the store. Passing the detection devices. Another CAUTION the knogo
must not ever come with in 1 foot and a half to the detection devices.
As this will trigger off the alarm.
4. Cover your ass if anything goes wrong with your hand and eye
coordination (being drunk). Always be ready to make a fast exit out the
door if the alarm goes off.
Well that's all there is to it, pretty simple. Hope you enjoyed
this article. See y'all later! and remember "That knowing is half the
battle".
PRIMUS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
End of Freedom Issue 2 - Freedom, Copyright 1993