home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 47.9 KB | 1,029 lines |
- Cybertek Electric: Issue #3 2/2/96
-
- óss es flestra ferdha för; en skálpr es sverdha
- / |\ /| /|\ |\ |\ /| |-\ \ /
- / | \ / | / | \ | \ | \ / | | \ \ /
- / | \ / | / | \ | \ | \ / | | > / \ /
- / | \/ | / | \ | / | \/ | | / / / /
- \ | | | | < | | | \ / / \
- \ | | | | \ | | | > \ / \
- \ | | | | \ | | | / \ \
- \ | | | | \ | | |-/ \ \
- I know a fifteenth, which Thiodhroerir the dwarf sang before Delling's door.
- He sang might to the Aesir, power to the elves, and understanding to Odin.
-
- Cybertek Electric: Issue Three
- February 1st., 1996
- edited by Thomas Icom/IIRG
- <ticom@l0pht.com> <thomas.icom@iirg.com>
-
- Complements of OCL/Magnitude's Project Blackthorn,
- and The International Information Retrieval Guild (IIRG)
-
-
- Table of Contents
- =================
- - Scanning Cell Phones With a TV Set, by Deprogram
- - Programming the Motorola Radius SP10, by R.F. Burns
- - Hackers Versus Politicians, by J. Orlin Grabbe
- - Capturing Redial, by oleBuzzard
- - Hacking on The Highway, by Joshua Tower and The Men From Mongo
- - Poetry from Spiral Chambers #9
- "Fleeting Love", by Alan C. Dougall
- "Beauty Sleep", by Leilani Wright
- "Touch of Light", by Michael Morain
- "Did They Wonder?", by Dominick Freda
-
- ---/////---
-
- *******************************************************
- The Real Truth About Scanning Cell Phones With a TV Set
- By Deprogram
- *******************************************************
-
- We've all heard the rigamarole about cellular capable radio scanners. We all
- know about the ridiculous steps the cellular industry has taken to try to
- prevent their use. But really, there's no need to go to that much trouble. You
- can do cellular monitoring pretty well with an ordinary and entirely legal TV
- set! Of course, it's still a federal offense to monitor cellular, so this
- information is only for your entertainment and is not to be used in any
- illegal way, duh.
-
- What you need first of all is anything that has a UHF TV tuner built into it.
- This includes VCRs as well as TV sets. See, TV channels 14 to 83 are the UHF
- TV band. Think about this: all of these channels could have been used by over
- the air TV stations! Actually, the top 12 or so channels in the UHF TV band
- aren't available for tv anymore as far as I know. The frequencies have been
- reassigned to Land Mobile use, or cellular telephones.
-
- On old TV sets there is a second knob for UHF. You put yer VHF knob on "U" and
- tweak your UHF knob up to the very end of the band. If you have a VCR or some
- other sort of tuner, just make sure that you're on "TV" and not "CATV",
- because the channel allocations are different. Once you get up to channel 14,
- broadcast (UHF) channels and cable channels are NOT the same. If you can see
- that you are tuning above channel 83, then you are on cable and you're not
- going to pick up anything.
-
- Look around on channels 80 through 83. When you don't hear people talking, you
- will hear an obnoxious buzzing sound. I think this is the tower holding the
- channel, but I'm not sure. In any case, conversations will come and go as they
- are handed off to another tower. If you use common sense about when and where
- more people are using their cellular phones, you should be able to determine
- the best times for listening.
-
- If you really, really have no luck pulling anything in, your tuner may be a
- newer one which simply won't do it. Many new TV tuners have been manufactured
- so as to not pick up this cellular "interference". Rumor has it that a
- restoration is possible.
-
- Anyway, if your TV is a new one, use an old junky one instead. In fact, the
- best TVs for monitoring purposes are old, cheap, black-and-white models which
- aren't good for much else. The picture tube could be entirely broken and the
- set could still be useful! (In fact, you might want to turn the brightness
- down on the screen while monitoring.) In order to fish around for phone calls,
- it's really best if you can fine tune. Even better, many old TV sets have a
- UHF knob that does not click at all.
-
- The next thing you need is an ANTENNA. (Novel idea, huh? An antenna to pick up
- radio signals? But seriously, some of this may be obvious to a hacker, but I
- am trying to cover all the bases here.)
-
- Take a look at the back of your TV set, and you'll probably find two posts
- marked UHF (to go along with the doohickey that says VHF). You'll want to plug
- your cell-capable antenna into UHF. The easiest thing to do at this point is
- go get a UHF tv loop. They cost about a dollar, many supermarkets have them,
- and they will work quite well. The BEST thing to do is ...get a 800mHz
- cellular antenna! These are also getting pretty darn cheap, and they are
- tuned to just the frequencies you are interested in. I think it's okay to just
- run a wire from the 800 MHz antenna to one of the UHF posts. I'm sure there
- are many other 819 to 890 MHz antenna setups you can think of if you are
- creative.
-
- You can even use a second TV set (or other tuner) to create an "RF well" and
- hear even more. Put the second TV set right next to the first. With the first
- TV, tune something in. Then with the second TV, fish around channels 72-76.
- Apparently you are tuning in the base frequency to go with the mobile, or
- something like that. I think you will find that many of the signals you have
- already been picking up will become more coherent. Single coverstions will
- emerge from what was previously a mess. Anyhow, just experiment and you'll get
- the idea.
-
- I can certainly envision a cellular monitoring device consisting of a couple
- of stripped down TV tuners built into a box. In fact I wonder if someone
- hasn't done this. Of course, this would just be a way to make it all look
- pretty and it isn't necessary at all. Well, cellular providers these days are
- going digital and taking other steps to provide something resembling security.
- So the time may come when all of this info is obsolete, if you believe some
- people. But I myself think there will always be cell companies who are too
- cheap or lazy to protect their signal.
-
- /////
-
- Programming the Motorola Radius SP10
- by R.F. Burns
-
- The SP10 is a 1 watt handheld radio transceiver designed to operate on one of
- 16 different frequencies assigned to low power/itinerant communications in the
- VHF-hi business band (150.775-174 Mhz.). While this is one of Motorola's "low
- end" radios, the quality is still up to Motorola's excellent standards. The
- SP10 is commonly available; even being sold by Radio Shack, and a preliminary
- inspection indicates that the unit should offer many opportunities to the RF
- hacker. A full review of the SP10 appears in the February 1996 issue of
- Popular Communications magazine.
-
- To program the radio, remove the battery compartment cover, battery, and
- plastic cover underneath the battery. On the bottom right hand side of the
- radio you will see four dip switches. The position of the dip switches is what
- determines the operating frequency. Use the table below to determine what dip
- switch settings pertain to what frequency; where 0=ON and 1=OFF.
-
- Frequency Switches Frequency Switches
- --------- -------- --------- --------
- 151.625 0011 151.655 1000
- 151.685 0101 151.715 1010
- 151.775 1001 151.805 0110
- 151.835 0010 151.895 1101
- 151.925 0001 151.955 1100
- 154.490 1011 154.515 0111
- 154.540 1110 154.570 1111
- 154.600 0000 158.400 0100
-
- If someone wanted an "on the fly" programmable radio, they could bring a four
- bit dip switch up to the case of the radio, and be able to switch between the
- 16 different frequencies without having to dismantle the radio every time they
- wanted to change frequencies. There's plenty of space inside the radio for an
- aspiring RF hacker to do a little experimentation, and Motorola's gear has a
- reputation of being very workable, hacker-wise.
-
- /////
-
- Hackers Versus Politicians
- by J. Orlin Grabbe
-
- The December 1995 Media Bypass magazine article, "The Still Before the Storm,"
- by James Norman, details how a group of "Fifth Column" hackers have initiated
- a campaign to clean up political corruption, resulting so far in the announced
- retirement of over thirty politicians (who have received packages of
- information detailing their financial shenanigans). Norman calls this group
- "CIA computer hackers", though in fact the group is * totally outside
- government.* (One member is ex-NSA, an agency that member now despises, and
- another member is ex-CIA.) But, anyway, as Norman notes:
-
- ". . . the Fifth Column has managed to penetrate Swiss and other foreign
- banks to quietly withdraw what is now an astounding $2.5 billion in illicit
- money from coded accounts they have identified as belonging to government
- figures.
-
- "Starting in 1991, this five-man Fifth Column team has been using its own Cray
- supercomputer to break into foreign bank computers, download vast libraries of
- data and trace this money to a wide range of illegal activities, from
- kickbacks on drug and arms deals to insider trading profits, software piracy
- and the sale of state secrets. Oh yes, don't forget tax evasion."
-
- What I like about the Fifth Column campaign is that it simply asks politicians
- to live by their own rules. If they want to launder money themselves, then
- they should get rid of the money-laundering statutes and let the rest of us
- have the same privileges. If they don't want to pay taxes, then let them
- get rid of the tax laws. If they want to continue the insane "war on drugs,"
- then they shouldn't be taking payoffs from drug lords. (It is amazing how
- non-authoritarian people become if forced to practice what they preach.)
-
- This article is an introduction to the political possibilities of hacking. It
- will present a brief how-to for the enterprising hacker to (legally) prepare
- his or her own background report on any given politician (sorry, Senator Exon
- has already received an envelope). Let's face it: journalists are too
- technically incompetent to do the job.
-
- Politicians are those annoying people who--drink in hand--can stare at a
- uuencoded file for hours, fall into a sexual reverie involving ASCII entities,
- and then weave their way to the nearest TV camera to pontificate about
- pornography on the Internet.
-
- But, you ask, if they are so dumb, why are they so rich? Sometimes the latter
- *is* a mystery, reminiscent of the miracle of the loaves and the fishes.
-
- Take the case of a man who can hardly pay his bills, but who gets elected to
- national political office and goes off to Washington for a few years. Then--
- lo and behold!--on his simple politician's salary, he suddenly manages to
- maintain two fine homes, one inside the beltway in Chevy Chase and another
- in his home town community of Rat's Ass, to purchase new cars for his wife and
- himself, to accumulate lakefront property in a neighboring county, and to
- stash away a nice sum of cash in a foreign bank account.
-
- If the "simple politician's salary" bit sounds improbable, it probably is.
- Let's face it: many politicians are on the take. They may have hidden
- sources of income involving illegal payoffs from corporations, lobbying
- groups, or individuals. Are you a student? Then you will be proud to know
- that educational commissions and associations are also a hot new conduit for
- political bribes.
-
- This article suggests a few basic procedures for finding out whether that
- special politician you have in mind is getting more on the side than ASCII
- sex. Honest politicians, of course, will have nothing to fear from any of the
- following.
-
- Is what I am about to do legal? you ask. Of course it is. To reassure
- yourself, pull out your world-wide web browser and take a peak at one of the
- many data service companies, say Insights, Inc. (located at
- <http://isis.iah.com/insights/ background/>). They promise, using only an
- individual or business name and/or address, to provide sufficient information
- for:
-
- *Preparing Due Diligence Reports
- *Locating People or Businesses
- *Exposing and Controlling Fraud
- *Uncovering & Verifying Background Information
- *Identifying and Verifying Assets
-
- How do they get away with this? Simple. They legally search public records.
- Much of this public-record information is computerized, although some of it is
- not. In any event, I do not advocate illegal or questionable access methods,
- or the breaking of any laws. Checking up on the (possibly criminal)
- politician of your choice doesn't have to be a crime.
-
- Still not convinced? Hop over to Infonet
- <http://www.infi.net/~dgs.assc/locator/bgrndnfo.html>,
- which for a fee will mine public records for nuggets like:
-
- *Felony and Misdemeanor Criminal Filings--"Search any court in the nation for
- a seven year history of criminal filings and possible convictions." (Many
- politicians wait until they reach office to work on this part of their resume,
- but some are early starters.)
-
- *Driving Histories--"Search a three to seven year history of an individuals
- driving performance, including tickets and accidents." (So you don't really
- care if your politician speeds a little now and then. But, on the other hand,
- did that official who helped him get out of a DWI expect a quid pro quo?)
-
- *Upper and Lower Court Civil Filings--"Obtain a civil litigation history of
- any individual in any court in the United States." (Is there some hidden
- reason this guy is getting sued all the time?)
-
- *Social Security Number Tracking--"Access all three credit bureaus to verify
- the user of a social security number and the addresses being used." (Having
- your politician's social security number is the next best thing to having his
- Swiss bank account number.)
-
- *Professional Licensing--"Verify the existence and status of an entity's
- license in a specific practice area, such as private investigation, medicine,
- real estate and more." (Was your politician really a world-renowned physicist
- before returning home to run for mayor of Rat's Ass?)
-
- *Consumer and Business Credit Reports--"Review account balances, credit terms
- and payment histories for an individual or business." ("So, before he went to
- Washington, he couldn't pay his bills . . .")
-
- Well, if they can do it, so can you.
-
- So where do you start? Well, first see what the politician him/herself has to
- say about the money flows. Federal law (5 USC app. 6, section 101 et seq.)
- requires members of Congress to file *Financial Disclosure Statements* yearly.
- The Financial Disclosure form has nine parts:
-
- Schedule I: Earned Income
- Schedule II: Payments in Lieu of Honoraria Made to
- Charity
- Schedule III: Assets and "Unearned Income"
- Schedule IV: Transactions.
- Schedule V: Liabilities
- Schedule VI: Gifts
- Schedule VII: Fact-Finding, Substantial Participation,
- and Other Travel
- Schedule VIII: Positions
- Schedule IX: Agreements
-
- Want to see Newt Gingrich's personal finances for the year 1993? Direct your
- web browser to <http://www.cais.com/ newtwatch/93sei.html>.
-
- Many state, county, and city elections have similar requirements, either on a
- personal or a campaign basis. Want to see a copy of the *Candidate Campaign
- Statement-Long Form-Form 490* for Joel Ventresca, candidate for Mayor of
- San Francisco? Visit Campaign Net at <http://tmx.com/sfvote>.
-
- These statements represent what a politician says he or she has or gets. But
- the really interesting items--like those kickbacks from the Cali cartel--not
- surprisingly go unreported. To get the good stuff, you will need your full
- hacker armor.
-
- The first thing to get is your politician's *social security number (SSN)*.
- It's not difficult. Your politician loves to be photographed doing his/her
- civic duty of voting. Which means he or she fills out a *voter's
- registration card* (public information) which will contain said politician's
- name, address, date of birth, party affiliation, and--usually--social security
- number. Voter files may be obtained at your politician's local county court
- house, as well as on many on-line data bases. A person's SSN is the common
- key that links together many commercial and government data bases.
-
- Can't find the SSN number on the voter's registration card? Then try *DMV*
- records. The insurance lobby has made sure that driver's records are easy to
- get, along with the details of any accidents, and critical driver information
- such as height, color of eyes, address--and social security number, if the
- latter was required information on the form. (California won't give out
- addresses, if a request has been filed not to do so--the "movie star"
- exemption.) In about 20 states the individual's social security number is the
- driver's license number.
-
- Still searching? Then go with the triple whammy of the major credit bureaus--
- TRW, TransUnion, and CBI/Equifax. The Fair Credit Reporting Act essentially
- implies you must be contemplating a business relationship--such as selling a
- car, renting an apartment, giving a loan, or attempting to collect on a
- judgment--with a party to request his credit report. But the *header*
- information in the file--such as social security number, date of birth,
- address, and spouse's name--is legally available to anyone, and your inquiry
- (unlike an actual credit report) will leave no footprints. The addresses and
- phone numbers are:
-
- TRW
- 660 N. Central Expressway, Exit 28
- Allen, TX 75002
- Automated phone: 800-392-1122
- Phone: 800-422-4879
-
- CBI/Equifax
- 5505 Peachtree Dunwoody, #600
- Atlanta, GA 30374-0241.
- Automated phone: 800-685-1111
- Phone: 800-685-5000
-
- Trans Union
- P.O.Box 7000
- North Olmsted OH 44070-7000
- Automated phone: 800-851-2674
- Phone: (714) 738-3800, ext. 6450
-
- Are you a hacker-journalist? Then take a peak at the National Institute for
- Computer-Assisted Reporting (NICAR; located at <http://www.nicar.org/>).
- Their bylaws prohibit them from selling data to nonjournalists (not that you
- want to *buy* data anyway--we're just exploring *possibilities*). But
- data is "sold at or below costs to journalism organizations or individuals for
- legitimate journalism uses only." (Doing your civic duty to keep tabs on your
- politician is, naturally, a legitimate journalistic use of the data.) Their
- data bases include these publicly-available information sets, among others:
-
- Organization: Government Services Agency
- Databases: Federal Procurement Contracts for 1992-1994.
-
- Organization: Federal Election Commission
- Databases: Campaign Contributions for the 1991-1994
- election cycle.
-
- Organization: Federal Reserve Board
- Databases: home mortgage loans covered by Home Mortgage
- Disclosure Act (for 1992-1994)
-
- Organization: Federal Aviation Administration
- Databases: Service Difficulty Reports, Airman Directory,
- Aircraft Registry
-
- Organization: Federal Bureau of Investigation
- Databases: Uniform Crime Reports
-
- Organization: Alcohol, Tobacco and Firearms
- Databases: Gun Dealer Licenses
-
- The existence of such data immediately brings to mind a barrage of possibly
- relevant questions:
-
- Is there an incestuous relationship between the donors to your politician's
- campaign and subsequent federal government contracts? (It always starts
- somewhere . . .) To find out, compare federal procurement data with campaign
- contributions. Campaign contribution data from the Federal Election
- Commission are supposed to include all contributions by individuals and
- political action groups (PACs) to a politician's federal election campaign.
- The Government Services Agency, meanwhile, keeps Individual Contract Action
- Reports (ICARs), which has information about the federal agency granting a
- government contract, the identity of the contractor, and the contract dollar
- amount.
-
- Has your politician recently purchased a new home? What is its value? What was
- the down payment? Is he or she living suspiciously beyond his or her means?
- What is your politician's race or gender (DNA sequence?)? To start to answer
- these questions, look at home mortgage data. The Federal Reserve Board
- started keeping data like this in order to check on "fair" lending practices.
- So the Fed began tracking home and home-improvement loans, as well as bank-
- purchased loans. (And just to help the enterprising hacker, when your
- politician is buying, or possibly refinancing, a house, most banks will now
- ask for his Social Security Number on the Deed of Trust, especially as the
- Federal National Mortgage Association now requires it.)
-
- Does your politician own an aircraft? What's its value? Did he purchase it
- with cash? Check the FAA's aircraft records.
-
- Does your politician own a gun even while advocating gun control? If he
- bought the gun from a dealer, ATF records can help out here.
-
- And so on.
-
- Now let's get to the nitty-gritty: *city, county, and state records*. The
- *City Clerk* in your politician's home town will have a list of business
- licenses (name, address, date) and building permits (name, address, cost of
- construction). The *County Clerk* or *County Recorder* should have liens on
- file (lien holder, payment agreements), a Probate Index (estate settlements),
- records of lawsuits and judgments, powers of attorney with respect to real
- estate, records of mortgages on personal property, and bankruptcy papers. Here
- you can find out not only the value of your politician's property, but also
- the names, addresses, and property values of everyone who lives on his street.
- *City and County Courts* will also maintain a Civil Index (civil actions,
- plaintiffs and defendants, as well as civil files: description of any disputed
- property or valuables), a Criminal Index (criminal cases in Superior Court,
- as well as criminal files), and voter's registration files.
-
- The *county tax collector* will have a description of any property owned, as
- well as taxes paid on real estate and personal property. The *county
- assessor* may also have maps and photos, or even blueprints showing the
- location of your politician's hot tub. The *Secretary of State* will have
- corporation files and possibly annual reports of your politician's company.
-
- Okay, let's go over it again, taking it slow. With your politician's social
- security number in hand, you can get header information from the major credit
- bureaus. This will give you a seven to ten year history of addresses, as
- well any spousal name or names. The latter is very important, since your
- average politician's instinct will be to keep questionable sums of money
- and suspect personal assets in the name of his or her spouse, sibling,
- business associate, or girlfriend.
-
- Next you go to the state Department of Motor Vehicles, to find out your
- politician's tastes in cars, trucks, motorcyles, boats, trailers, and
- recreational vehicles. Of course if your politician leases any of the above,
- he or she will not show up as the vehicle owner. So the next thing to do is
- to run the license plate number of that Caddy parked out front, since this
- will give you the name of both lessee and lessor.
-
- Next you talk to someone who does business with your politician, and who thus
- has a permissible reason under the Fair Credit Reporting Act to run a credit
- check. This will give you a listing of all your politician's credit accounts,
- current balances, payment history, and payment terms. Any bankruptcies in the
- last ten years, or liens or judgments in the last seven years, will be listed.
- Did your politician suddenly receive a huge campaign contribution from some
- source, soon after your politician found himself stuck with a quarter million
- dollar judgment against him? If so, he won't be the first person who has sold
- out his country to pay off a personal financial debt.
-
- What property does your politician own? The offices of County Recorder and
- County Tax Assessor will give you the land value, improvement value, and total
- assesssed values for any property. They will frequently have also the amounts
- received for any sales, the sale dates, as well as information on the
- mortgage-holder or other lender. Did your politician get a large loan from
- Washoe International State Bank just about the time Washoe International State
- Bank was having trouble with state banking regulators, who are overseen by a
- legislative committee on which your politician sits?
-
- Does your politician own a business of any consequential size? Then run a
- business credit check. Who are (were) your politician's business associates?
- Who are the company officers and principals? Or--if as is commonly the
- case--your plitician is a lawyer, who are the law partners? Look also for
- bankruptcies, tax liens, public records filings, judgments, and UCC (Uniform
- Commercial Code) financing statements. These documents may turn out to be
- filled with all sorts of unexpected names, dates, and activities.
-
- On what honorary commissions does your politician serve? Do the commission's
- audited financial statements show any payments for services not rendered?
- This was apparently what New York Attorney General Dennis Vacco was
- wondering, when he noted, on January 9, 1996, in a letter to the National
- Center on Education and the Economy: "Statement 11 on your 1990 Federal 990
- and Note 5 on your 1990 audited financial statements indicate that the Center
- had retained the services of Hillary Rodham Clinton, a member of the Rose Law
- firm, to direct your Workforce Skills Program while she also served as a
- member of the Center's Board of Trustees. Statement 11 of the 1990 filing
- indicates that Mrs. Clinton received $23,000 for unspecified services. The
- 1990 filing also refers to a second contract, which was reported to be in the
- amount of $150,000 covering the period February 1, 1991 through January 31,
- 1992, and a similar statement appears on Statement 11 attached to the 1991
- Federal 990."
-
- Moreover, did either Hillary Clinton or the Rose Law firm pay taxes on the
- sums received? (A little birdie tells me neither one did.)
-
- The office of the Secretary of State in any of the 50 states can be a source
- of UCC searches. UCC Indices will show whether your politician is listed as
- either a debtor or secured party. (Okay. So your politician is up to his
- neck in debt to Jackson Stephens. That doesn't mean he listens to a word of
- political advice Stephens gives him. No way.)
-
- Superior Courts, Federal Bankruptcy Courts, Small Claims Courts, and city,
- county, and state tax authorities keep records of tax liens, court judgments,
- and bankruptcy filings. These reveal not only outstanding financial
- obligations, but also personal and company affiliations, partners,
- subsidiaries, and dependents. (Is there a Don Lasater or Don Tyson in your
- politician's background?)
-
- Does your politician really have those degrees he claims? Call the college
- registrar. Despite what you think, many politicians don't believe in their
- own "self-made man" rhetoric, and will enhance their resumes with unearned
- degrees. This in itself may only be a venal sin, but someone who records
- falsehoods in this area will likely also lie in others.
-
- Has your politician been in the news? Check your library's newspaper file,
- along with reader's guides, and other news indexes. On the Internet, you can
- quickly search for your politician's name among the 8 billion words on 16
- million WWW pages, using the new Alta Vista search utility created by
- Digital Equipment Corporation. You can also do a name or keyword search
- through all 13,000 Usenet groups. Alta Vista is located at
- <http://altavista.digital.com/>.
-
- Be sure to read Lee Lapin's book The Whole Spy Catalog (Intelligence
- Incorporated, 2228 S. El Camino Real, San Mateo, CA 94403; ISBN 1-880231-10-7)
- for literally dozens of names, addresses, and phone numbers of data
- information providers, along with an evaluation of their services. You don't
- need to patronize these services in order to steal ideas from them.
-
- Basically none of these providers specializes in politicians, so after a
- little self-education and set-up, you may be in a position to start your own
- business in political investigations. Bill yourself as a 21st Century
- Sherlock Holmes. (*Somebody* has to stop the nefarious influence of
- DigiCrime, Inc., found at <http://www.digicrime.com/>.)
-
- Oh. About those foreign bank accounts. Well, I'll leave that to your
- imagination. But a little birdie told me if you call a military base computer,
- find an out-dial number, call another military base, and so on, going through
- a *minimum* of three military bases, any trace back will stop at the third
- military base.
-
- Whatever you do, don't do anything illegal.
-
- /////
-
- =============================
- CAPTURING REDIAL
- Quick & Dirty by oleBuzzard
- Written Today / 03-JAN-96
- (c) 1996 <k0p> Communications
- =============================
-
- INTRO
-
- Ok, here's the scenario: You're at someone's house. That someone pick's up the
- phone, dials, and...
-
- "Hey Billy, how's the Missus?....Great glad to hear it. And How's
- Chelsea?...Oh really, thats fabulous. And how's Roger doin'?...Great, glad
- to hear it. I was just calling to see how you all were doin. Is Al or
- Tipper around?"
-
- The phone call's over and you're sayin to yourself "man, I wish I had that
- number." Well you could ask your friend point blank for it, but we both know
- that as two-faced and shallow as your so-called friendship with this guy is,
- theirs NO WAY he'd give you the number to information let alone to the White
- House. But that's alright, cuz you're pretty good at...
-
- CAPTURING REDIAL
-
- The principle behind Redial Capturing is simple. You basically capture the
- last number that was dialed from a TouchTone(c) phone and keep it for later
- use. So now the question is, how do you do the capture. Well there's a number
- of way you can do it, but after some consideration, I think I've come up with
- a method thats both fairly inexpensive, VERY effective, and quite practical.
- Heres what you need:
-
- * Radio Shack Pocket Dialer w/Memory
- Catalog Number: 43-146
- Price: $24.99
-
- * Any Brand Pager.
-
- Alrght, here it is, plain, simple, and effective:
-
- 1. Take your Radio Shack Dialer and program it with the number to your
- pager.
-
- 2. Keep your dialer with you at all times. (Every good phreak should have
- one anyway.)
-
- 3. When you need to make a Capture, wait for the person who has made the
- call to get off the phone (obviously.)
-
- 4. Pick-up the same phone the person has made the call from.
-
- 5. Hold the Pocket Dialer up to the Mouth Piece of the phone, and press the
- Memory button (assuming you did like I said and programmed the Dialer
- with your pager number. If not dial you're a bonehead and you have to
- dial your Pager number manually with the Pocket Dialer.)
-
- 6. Once your Pager answers and requests you to "[E]nter the number you are
- dialing from at the tone," hit REDIAL on the phone. Once the phone has
- redialed, hang-up.
-
- 7. Beep-beep. Check your pager. You have just captured the last number
- dialed from that phone.
-
- Like I said, plain, simple, and cool enough to be in a James Cameron flick.
-
- WHAT DUMBASS?!?
-
- By the way, I've already been asked the Ingenious question: "how come you need
- a Pocket Dialer to do this? Why can't you just call your Pager and then hit
- Redial on the phone and Capture the Redial that way?" Well you can, but the
- only Number you'll be capturing is your own pager number you just dialed.
- (Duh!) If you wan't to Capture the redial you have to find away to dial a
- source which will decode the DTMF tones, and you have to be able to preserve
- the tones in the first place. The closest alternative to the method described
- in this file, is to call your Pager on one phone in the house, and once your
- page answers, pick-up the phone you want to Capture from and hit Redial.
- This'll work fine, but you might have a little trouble remaining inconspicuous
- about the whole thing--running back and forth and all.
-
- OUTRO
-
- Anyway, that's it. Thanx to Hades (IIRG-Net) for pointing out the obvious to
- me. Look for more oleBuzzard philez at kn0wledge phreak BBS or any UnionNET or
- IIRG-Net System
-
- ****************************************************************************
- *** oleBuzzard's kn0wledge phreak ** kn0wledge phreak World Wide Web Site **
- ** AC 719.578.8288 / 28.8oo-24oo ** http://www.uccs.edu/~abusby/k0p.html ***
- ****************************************************************************
-
- /////
-
- Hacking On the Highway: An Introduction
- by Joshua Tower and The Men From Mongo
-
- Caller ID, ANI, DNRs, AMA, data taps, and ignorantly conceived totalitarian
- legislation has made the art of hacking much more dangerous than it was only a
- few years ago. Back in the days of (the old YIPL originated) TAP magazine,
- Fred Steinbeck wrote "The Ten Commandments of Phone Phreaking"; the first of
- which was (paraphrased) "Do nothing over any phone traceable to you." This
- should be common sense to anyone who hasn't just crawled out from under a
- rock. Yet, we see so many dumb shits out there who continue to hack over their
- home phone lines. If you are one of these people, you are an idiot and
- probably deserve to get caught. While we call BBSes and occasionally get a
- conference call into our lines from some LLs out on the Left Coast, We pay our
- hefty phone bills on time every month and do nothing illegal on the line.
- They can DNR it all year long. All they'll find out is that Josh only calls
- his parents once a week and that we order a lot of Chinese take-out.
-
- The idea is to hack on the highway (the pavement kind for those of you who've
- read too much Wired). This isn't as difficult as you might think, and doesn't
- require you to spend $2000 on a new laptop. Yes, you're going to have to spend
- some money, but not that much. If you don't have a job we suggest you get off
- your ass and find something to bring in some cash. Besides, the authorities
- tend to look at you in a slightly better light if it looks like you're a
- responsible member of society, especially if you're a "good responsible kid
- who works after school." This we know from experience.
-
- The main items that are required are a laptop or similar portable system and a
- modem. A brand-new state-of-the-art laptop can cost upwards of $2000 depending
- on what you buy, but you don't need state-of-the-art for porta-hacking. All
- you really need is something that you can hook a modem to, run terminal
- software, and do a little data storage. One can find older laptops for under
- $100 in the classified ad sections of newspapers and in the Pennysaver,
- Bargain News, or whatever the ad paper is called in your locale. Hamfests and
- computer shows are also a good source. One of us saw an 8088 laptop at one for
- $15. Just make sure the unit either has an internal modem (even a 1200 will
- do for most hacking purposes) or has an RS-232 or PCMCIA port to add an
- external modem. If you're going the external RS-232 modem route, the modem
- will need to able to run off batteries. Make sure that the power supply that
- goes with the modem is a DC output supply. Many modems use AC output
- supplies, and the modem will be much more difficult to convert to battery
- operation. For a while there were these "pocket modems" being sold which were
- the size of a pack of cigarettes and ran off a 9 volt battery. We haven't seen
- them offered lately, but they still should be available on the used and
- surplus equipment market.
-
- For complete connectivity, acquire an acoustic coupler for your modem. This
- device attaches to the handset of any phone and plugs into your modem's RJ-11
- jack. It is essential for modeming from payphones; where in most instances you
- don't have access to a terminal block or phone jack. Two devices of interest
- are available from Konexx/Unlimited Systems Corp. (http://www.konexx.com/ for
- product information). The first is the Model 204 "Konexx Koupler" ($140). It
- plugs into the RJ-11 jack of a modem and provides acoustic coupling between
- the modem and a telephone handset. According to company literature it
- operates up to 14.4K baud on electronic phones, and up to 2400 baud on
- payphones and other phones that use a carbon microphone. The second is the
- Model 305 "Modem Koupler" ($300). This is a 2400 baud acoustically coupled RS-
- 232 modem. Both units are powered off a 9V battery. Our personal preference is
- towards the Model 204. It is less expensive overall when bought with a modem
- (14.4K PCMCIA modems are down to $130 new. RS-232 modems are even less.),
- enables one to communicate at higher speeds than does the Model 305, and
- offers greater overall versatility.
-
- There are also a few other things that you should also throw into your porta-
- hack kit:
-
- - Can wrench or 7/16" nutdriver - The tool that is needed to open up bridging
- heads, pedestals, demarc points, and other places where you can hook in to
- receive a dialtone
-
- - RJ-11 to alligator clip adaptor - a/k/a "Beige Box". Go the deluxe route and
- make one with piercer clips (what lineman test sets are equipped with) so
- you can also hook into a single pair drop wire if needed.
-
- - Phone cords - You will probably run into many instances where you will be
- able to use one; so keep 'em handy. We keep a 12 foot modular line cord in
- our kits for when a conventional hook-up presents itself. Those retractable
- 50 foot units is very handy for running a line from a phone can to a nearby
- place of concealment, and takes up little space.
-
- - Leatherman Tool, Gerber Multi-Plier, et. al. - The standard hacker tool.
- Don't leave home without it.
-
- - Lineman test set or one piece phone with "beige box" adaptor
-
- - Wireless phone jack system - This system appears to have great potential. It
- costs about $100 and consists of a base unit and an extension unit. The base
- unit is plugged into any AC outlet near an existing phone line and connected
- to the line. The extension unit is plugged into any other outlet and gives
- you a phone line without the need to run cable. As long as both outlets are
- on the same transformer feed from the electric company, you should be able
- to hook this system up to a phone line and AC outlet in a utility room, and
- then go to another room with an AC outlet and have a phone connection. This
- could even be extended from one building to another provided both buildings
- were on the same transformer feed. With the electric company bridging
- transformers for remote meter reading, the range could be longer.
-
- - Prepaid Calling Cards - Currently the safest and best way to make modem
- calls from a payphone. Since the calls are paid for, there's no toll fraud
- flag that can come up to trip you later. Most prepaid calling card services
- don't forward CID information as well; although you will still have to
- contend with the service's WATS line getting your ANI data if you call it
- direct.
-
- - Proper attire and demeanor - In many places and instances it's a big help to
- look and act like you belong there. One should also have a plausible story
- set straight in advance in case they are questioned.
-
- Some Notes on Payphone Usage
-
- The problems with payphones (whether Bell or COCOT) are that they are
- difficult to hook a modem up to and interrupt the connection every few minutes
- in order to tell you that you have to put more money in. The solution is to
- use your acoustic coupler and a calling card of some sort.
-
- COCOTs usually have a modular jack at the demarc point (standard telco
- arrangement since the COCOT's wiring is the responsibility of the customer,
- just like with a residential line), and since they require external power
- there is usually an AC outlet somewhere nearby as well. DTP a sticker that
- says "Property of Dingleberry Telecom" (or whatever the name of the COCOT
- company is) put it on the base unit of a wireless phone jack system, and hook
- up the base unit to the COCOT's phone line and AC outlet. Find a nice secure
- place somewhere nearby which has a handy AC outlet off of the same transformer
- feed. Plug in the extension unit and have fun. Anybody who might notice the
- little adjunct you've added to the COCOT line will see the official-looking
- sticker on it and think it was something the company installed.
-
- Things To NOT Do
- (Taken from actual stories we've heard over the years.)
-
- * Don't drive up to a phone can, park next to it, and run a phone cable into
- your car to porta-hack.
-
- * Don't porta-hack from a hotel room after renting it under your real name.
- This applies doubly when the hotel is either currently a host to, or has
- previously hosted a hacker con.
-
- * Don't porta-hack off your neighbor's phone line(s). In particular, don't
- run a length of twisted pair from the neighbor's demarc point through your
- bedroom window to your box.
-
- * Don't try to hook into any pedestal box that has the local electric
- company's logo on it.
-
- * Don't fuck with any of the equipment at the connection points you leech
- service off of.
-
- * Don't go visiting manholes in order to porta-hack.
-
- * Don't porta-hack in public places wearing a "2600" t-shirt or wearing the
- same outfit you go to Marilyn Manson shows in. Clown make-up, however, is
- acceptable.
-
- * Don't tell the whole fucking world (or even non-implicated friends) about
- last night's porta-hacking session.
-
- * Don't porta-hack at the phone can in the front of your local gun range.
-
- * Don't bring your entire gang of friends and a keg while porta-hacking. A
- girlfriend and a bottle of Wild Turkey is acceptable. However, indulge in
- both in moderation.
-
- * Don't go porta-hacking on roller-blades. This is not the movies. Don't use
- skateboards, mountain bikes, or lame four-cylinder compact cars either.
- Real Cyberpunks go porta-hacking in Ford Crown Victorias, Chevy Caprices,
- Dodge Diplomats, and other big cars that have V8 engines under the hood.
- This also applies to hackers who are under 16, as we consider drivers'
- licenses optional.
-
- * Do not carry a flare gun while porta-hacking. Refer again to THAT fucking
- movie if you don't understand what we're talking about. Carry a .357
- instead.
-
- How To Porta-Hack
-
- What the hell do you think this is? The alt.2600 FAQ? Get a fucking clue.
-
- Respectfully submitted,
- Joshua Tower and
- The Men From Mongo
- (Icky bo-bo to you too, asshole.)
-
-
- /////
-
- "Fleeting Love"
- --------
- by Alan C. Dougall
-
- Friendly concerning love
- pleases and delights, with
- responses intent on fun.
-
- Warm affectionate love
- comforts and listens, but
- secretly expressed burns.
-
- Selfish shameful love
- impresses and flatters, but
- considers only the moment.
-
- Impatient passionate love
- dreams and devours, yet
- boiled fast cools quickly.
-
- Shared longing love
- creates and destroys with
- the same words wheels turn.
-
- Realistic practical love
- challenges and defends; so
- conscience deprives its end.
-
- Final opportunistic love
- seeks and sows desires, yet
- knows time will steal it away.
-
- Restrained parting love
- lingers and grieves, yet
- pretends life goes on.
-
- Separated solitary love
- wallows or diverts, to
- feed or choke the past.
-
- Patient considerate love
- allows space and time, and
- hopes pause in anguish.
-
- Selfless undying love
- surrenders and frees, and
- dies to bring rebirth.
-
- Responsible decisive love
- cannot rest (forgive me)
- until you are safe and found (in Him).
-
- Deepest love (He knows)
- requests (if you permit) to
- hear from you and pray.
-
-
- "Beauty Sleep"
- --------
- by Leilani Wright
-
- I feel I ought to warn you about dreams.
- They do not always mean
- what you would like them to.
- Take my advice;
- lie on your right side,
- furthest from your heart
- and not on your back,
- where the vitals are always too exposed.
- If symbols reoccur,
- like a train, gun, or snake at a station,
- do not assume a sexual slant.
- Roll over quietly. Stop snoring.
- Do not identify with the murderer
- who descends to the platform.
- He is rarely you
- and will only disturb the warm
- body sleeping at your side.
- Let the danger pass; you can always
- use another form of transportation,
- like your own legs
- when you walk in your sleep
- and wake up naked
- in the neighbor's flowering plants.
- This means fresh air and plenty of exercise.
- And you will be fortunate
- to remember so little by morning.
-
-
- "Touch of Light"
- --------
- by Michael Morain
-
- The whiteness of the dawn
- Soft like a cloud against the dark
- Moving like an ocean
- Quietly, stealthily, carefully
- With fingers of light caressing
- Touching, holding, tasting
- Tracing our outlines against the sand
- Measuring our footprints
- Against the shadows
- Like a wind shining and sparkling
- Cleansing the dust motes of our atoms
- Warming us, holding us
- And in a moment
- Gone.
-
- "Did They Wonder?"
- --------
- by Dominick Freda
-
- What are we here for?
- The question has been asked
- Endless times,
- Contemplated over and over
- With never an answer.
- As long as I can remember,
- Reaching the height where
- I could see myself reflected
- In a mirror,
- I have stared at that antithetical being,
- Asking him, "Who are you?
- "Why are you here?"
- He doesn't know the answer.
-
- Religion tells us just to serve.
- Politicians tell us to lead or follow.
- Dichotomies ramble and force division.
- Economists say we should be rational.
- Societies say we should be normal.
- Why?
-
- Do we exist just to give life,
- Propagate, be fruitful and multiply?
- Or are we here to hate, and kill;
- Give off deadly fumes so that
- One day we will end our wonders,
- In search of that ideal, that eternal progression?
-
- Millions of years ago a spark
- Created all life
- From some thoughtless phenom,
- Some unfathomable chasm,
- Of nothing and everything;
- The Alpha and Omega,
- Nameless and unconscious.
- And Pop lost his tail.
- And Mom stood and walked.
- And they saw that IT WAS GOOD.
-
- But did they wonder?
- Did they dream of successes?
- Or fear demons in the night?
- Huddle in the cold,
- Loving to embrace?
-
- Did they wonder?
-
- Did they ever think of their
- Children's tomorrow?
- And could they imagine a
- Beautiful and terrible world
- Of Darwinian technology,
- Knowing that each step taken,
- Each triumph, each fall,
- Counted the dying
- Of mankind?
-
- Did they wonder?
-
-
- Reprinted from Spiral Chambers #9. Poems are Copyright (c) 1996 by their
- respective authors. Unedited and properly attributed reproduction is
- encouraged.
-
- Original poems may be included in Spiral Chambers by sending the work to:
-
- Spiral Chambers
- P.O. Box 772
- Mentor, Ohio 44061
-
- or
-
- RepsiSK@AOL.com
-
- ---/////---
-
- Unless otherwise noted Cybertek Electric is Copyright (C)1995,1996 by
- OCL/Magnitude, P.O. Box 64, Brewster, NY 10509. All Rights Reserved.
- Noncommercial reproduction is encouraged provided this electronic publication
- is redistributed in its entirety with credits intact. Cybertek Electric is
- published for educational purposes only; under The First Amendment of The
- United States Constitution. No illegal use is implied or suggested. If you
- have a problem with this, too fucking bad. SUBMISSIONS WANTED. If you can read
- and understand this e-zine then you should know what we're interested in.
- Please send any feedback, questions, and/or submissions to either of the email
- addresses in the signature below.
-
-
- |\ /| /\ / |\ | Thomas Icom/IIRG
- | >< | < > / | \ |\ <ticom@l0pht.com>
- |/ \| \/ < | | > <thomas.icom@iirg.com>
- | | /\ \ \ | |/ International Information Retrieval Guild
- | | / \ \ \| | "May Odin guide your way!"
- Madhr er manna gaman, ok moldar auki, ok skipa skreytir.
-
- <End of Text>