home *** CD-ROM | disk | FTP | other *** search
Text File | 2003-06-11 | 59.7 KB | 1,248 lines |
- ==Phrack Magazine==
-
- Volume Five, Issue Forty-Six, File 3 of 28
-
-
- // // /\ // ====
- // // //\\ // ====
- ==== // // \\/ ====
-
- /\ // // \\ // /=== ====
- //\\ // // // // \=\ ====
- // \\/ \\ // // ===/ ====
-
- PART I
-
- ------------------------------------------------------------------------------
-
- !! NEW PHRACK CONTEST !!
-
- Phrack Magazine is sponsoring a programming contest open to anyone
- who wishes to enter.
-
- Write the Next Internet Worm! Write the world's best X Windows wardialer!
- Code something that makes COPS & SATAN look like high school Introduction
- to Computing assignments. Make the OKI 1150 a scanning, tracking, vampire-
- phone. Write an NLM! Write a TSR! Write a stupid game! It doesn't
- matter what you write, or what computer it's for! It only matters that you
- enter!
-
- Win from the following prizes:
-
- Computer Hardware & Peripherals
- System Software
- Complete Compiler packages
- CD-ROMS
- T-Shirts
- Magazine Subscriptions
- and MANY MORE!
-
- STOP CRACKING PASSWORDS AND DO SOMETHING WITH YOUR LIFE!
-
- Enter the PHRACK PROGRAMMING CONTEST!
-
- The rules are very simple:
-
- 1) All programs must be original works. No submissions of
- previously copyrighted materials or works prepared by
- third parties will be judged.
-
- 2) All entries must be sent in as source code only. Any programming
- language is acceptable. Programs must compile and run without
- any modifications needed by the judges. If programs are specific
- to certain platforms, please designate that platform. If special
- hardware is needed, please specify what hardware is required.
- If include libraries are needed, they should be submitted in addition
- to the main program.
-
- 3) No virii accepted. An exception may be made for such programs that
- are developed for operating systems other than AMIGA/Dos, System 7,
- MS-DOS (or variants), or OS/2. Suitable exceptions could be, but are not
- limited to, UNIX (any variant), VMS or MVS.
-
- 4) Entries may be submitted via email or magnetic media. Email should be
- directed to phrack@well.com. Tapes, Diskettes or other storage
- media should be sent to
-
- Phrack Magazine
- 603 W. 13th #1A-278
- Austin, TX 78701
-
- 5) Programs will be judged by a panel of judges based on programming skill
- displayed, originality, usability, user interface, documentation,
- and creativity.
-
- 6) Phrack Magazine will make no claims to the works submitted, and the
- rights to the software are understood to be retained by the program
- author. However, by entering, the Author thereby grants Phrack Magazine
- permission to reprint the program source code in future issues.
-
- 7) All Entries must be received by 12-31-94. Prizes to be awarded by 3-1-95.
-
- -------------------------INCLUDE THIS FORM WITH ENTRY-------------------------
-
- Author:
-
- Email Address:
-
- Mailing Address:
-
-
-
- Program Name:
-
-
- Description:
-
-
-
-
- Hardware & Software Platform(s) Developed For:
-
-
-
- Special Equipment Needed (modem, ethernet cards, sound cards, etc):
-
-
-
- Other Comments:
-
-
- ------------------------------------------------------------------------------
- COMPUTER COP PROPHILE
- FOLLOW-UP REPORT
-
- LT. WILLIAM BAKER
- JEFFERSON COUNTY POLICE
-
- by
-
- The Grimmace
-
-
- In PHRACK 43, I wrote an article on the life and times
- of a computer cop operating out of the Jefferson County Police
- Department in Louisville, Kentucky. In the article, I included
- a transcript of a taped interview with him that I did after
- socially engineering my way through the cop-bureaucracy in his
- department. At the time I thought it was a hell of an idea and a
- lot of PHRACK readers probably got a good insight into how the
- "other side" thinks.
-
- However, I made the terminal mistake of underestimating
- the people I was dealing with by a LONG shot and felt that I
- should write a short follow-up on what has transpired since that
- article was published in PHRACK 43.
-
- A lot of the stuff in the article about Lt. Baker was
- obtained by an attorney I know who has no reason to be friendly
- to the cops. He helped me get copies of court transcripts which
- included tons of information on Baker's training and areas of
- expertise. Since the article, the attorney has refused to talk
- to me and, it appears, that he's been identified as the source
- of assistance in the article and all he will say to me is that
- "I don't want any more trouble from that guy...forget where you
- left my phone number." Interesting...no elaboration...hang up.
-
- As I recall, the PHRACK 43 issue came out around
- November 17th. On November 20th, I received a telephone call
- where I was living at the home of a friend of mine from Lt.
- Baker who laughingly asked me if I needed any more information
- for any "future articles". I tried the "I don't know what
- you're talking about" scam at which time he read to me my full
- name, date of birth, social security number, employer, license
- number of my car, and the serial number from a bicycle I just
- purchased the day before. I figured that he'd run a credit
- history on me, but when I checked, there had been no inquiries
- on my accounts for a year. He told me the last 3 jobs I'd held
- and where I bought my groceries and recited a list of BBSs I was
- on (two of which under aliases other than The Grimmace).
-
- This guy had a way about him that made a chill run up my
- spine and never once said the first threatening or abusive thing
- to me. I suppose I figured that the cops were all idiots and
- that I'd never hear anything more about the article and go on to
- write some more about other computer cops using the same method.
- I've now decided against it.
-
- I got the message...and the message was "You aren't the
- only one who can hack out information." I'd always expected to
- get the typical "cop treatment" if I ever got caught doing
- anything, but I think this was worse. Hell, I never know where
- the guy's gonna show up next. I've received cryptic messages on
- the IRC from a variety of accounts and servers all over the
- country and on various "private" BBSs and got one on my birthday
- on my Internet account...it traced back to an anonymous server
- somewhere in the bowels of UCLA. I don't know anyone at UCLA
- and the internet account I have is an anonymous account actually
- owned by another friend of mine.
-
- I think the point I'm trying to make is that all of us
- have to be aware of how the cops think in order to protect
- ourselves and the things we believe in. But...shaking the
- hornet's nest in order to see what comes out maybe isn't the
- coolest way to investigate.
-
- Like I wrote in my previous article, we've all gotten a
- big laugh from keystone cops like Foley and Golden, but things
- may be changing. Local and federal agencies are beginning to
- cooperate on a regular basis and international agencies are also
- beginning to join the party.
-
- The big push to eradicate child-pornography has led to a number of
- hackers being caught in the search for the "dirty old men" on the Internet.
- Baker was the Kentucky cop who was singularly responsible for the bust of the
- big kiddie-porn FSP site at the University of Birmingham in England back
- in April and got a lot of press coverage about it. But I had personally
- never considered that a cop could hack his way into a password-protected
- FSP site. And why would he care about something happening on the other
- side of the world? Hackers do it, but not cops...unless the cops are
- hackers. Hmmm...theories anyone?
-
- I don't live in Louisville anymore...not because of
- Baker, but because of some other problems, but I still look over
- my shoulder. It would be easier if the guy was a prick, but I'm
- more paranoid of the friendly good-ole boy than the raving
- lunatic breaking in our front doors with a sledge hammer. I
- always thought we were safe because we knew so much more than
- the people chasing us. I'm not so certain of that anymore.
-
- So that's it. I made the mistakes of 1) probably
- embarrassing a guy who I thought would never be able to touch me
- and 2), drawing attention to myself. A hacker's primary
- protection lies in his anonymity...those who live the high
- profiles are the ones who take the falls and, although I haven't
- fallen yet, I keep having the feeling that I'm standing on the
- edge and that I know the guy sneaking up behind me.
-
- From the shadows--
- The Grimmace
- [HsL - RAt - UQQ]
-
- ------------------------------------------------------------------------------
-
- !! PHRACK READS !!
-
- "Cyberia" by Douglas Rushkoff
- Review by Erik Bloodaxe
-
- Imagine a book about drugs written by someone who never inhaled.
- Imagine a book about raves written by someone saw a flyer once.
- Imagine a book about computers by someone who someone who thinks
- a macintosh is complex.
-
- Imagine an author trying to make a quick buck by writing about something
- his publisher said was hot and would sell.
-
- And there you have Cyberia, by Douglas Rushkoff.
-
- I have got to hand it to this amazing huckster Rushkoff, though. By
- publishing Cyberia, and simultaneously putting out "The Gen X Reader,"
- (which by the way is unequaled in its insipidness), he has covered all
- bases for the idiot masses to devour at the local bookseller.
-
- Rushkoff has taken it upon himself to coin new terms such as
- "Cyberia," the electronic world we live in; "Cyberians," the people
- who live and play online; etc...
-
- Like we needed more buzzwords to add to a world full of "Infobahns"
- "console cowboys," and "phrackers." Pardon me while I puke.
-
- The "interviews" with various denizens of Rushkoff's "Cyberia" come off
- as fake as if I were to attempt to publish an interview with Mao Tse Tung
- in the next issue of Phrack.
-
- We've got ravers talking on and on about "E" and having deep conversations
- about smart drugs and quantum physics. Let's see: in the dozens of raves
- I've been to in several states the deepest conversation that popped
- up was "uh, do you have any more of that acid?" and "this mix is cool."
- And these conversations were from the more eloquent of the nearly all under
- 21 crowd that the events attracted. Far from quantum physicians.
- And beyond that, its been "ecstasy" or "X" in every drug culture I've wandered
- through since I walked up the bar of Maggie Mae's on Austin, Texas' 6th Street
- in the early 80's with my fake id and bought a pouch of the magic elixir over
- the counter from the bartender (complete with printed instructions).
- NOT "E." But that's just nit-picking.
-
- Now we have the psychedelic crowd. Listening to the "Interviews" of these
- jokers reminds me of a Cheech and Chong routine involving Sergeant Stedanko.
- "Some individuals who have smoked Mary Jane, or Reefer oftimes turn to
- harder drugs such as LSD." That's not a quote from the book, but it may
- as well be. People constantly talk about "LSD-this" and "LSD-that."
- Hell, if someone walked into a room and went on about how he enjoyed his
- last "LSD experience" the way these people do, you'd think they were
- really really stupid, or just a cop. "Why no, we've never had any of
- that acid stuff. Is it like LSD?" Please.
-
- Then there are the DMT fruitcakes. Boys and girls, DMT isn't being sold
- on the street corner in Boise. In fact, I think it would be easier for most
- people to get a portable rocket launcher than DMT. Nevertheless, in every
- fucking piece of tripe published about the "new psychedlicia" DMT is
- splattered all over it. Just because Terrance Fucking McKenna
- saw little pod people, does not mean it serves any high position
- in the online community.
-
- And Hackers? Oh fuck me gently with a chainsaw, Douglas. From Craig Neidorf's
- hacker Epiphany while playing Adventure on his Atari VCS to Gail
- Thackeray's tearful midnight phonecall to Rushkoff when Phiber Optik
- was raided for the 3rd time. PLEASE! I'm sure Gail was up to her eyebrows
- in bourbon, wearing a party hat and prank calling hackers saying "You're next,
- my little pretty!" Not looking for 3rd-rate schlock journalists to whine to.
-
- The Smart Drink Girl? The Mondo House? Gee...how Cyber. Thanks, but
- no thanks.
-
- I honestly don't know if Rushkoff really experienced any of this nonsense,
- or if he actually stumbled on a few DMT crystals and smoked this
- reality. Let's just say, I think Mr. Rushkoff was absent the day
- his professor discussed "Creative License in Journalism" and just decided
- to wing it.
-
- Actually, maybe San Francisco really is like this. But NOWHERE else on
- the planet can relate. And shit, if I wanted to read a GOOD San
- Francisco book, I'd reread Armistead Maupin's "Tales of the City."
- This book should have been called "Everything I Needed to Know About
- Cyber-Culture I Learned in Mondo-2000."
-
- Seriously...anyone who reads this book and finds anything remotely
- close to the reality of the various scenes it weakly attempts to
- cover needs to email me immediately. I have wiped my ass with
- better pulp.
-
- ------------------------------------------------------------------------------
-
- BOOK REVIEW: INFORMATION WARFARE
- CHAOS ON THE ELECTRONIC SUPERHIGHWAY
- By Winn Schwartau
-
- INFORMATION WARFARE - CHAOS ON THE ELECTRONIC SUPERHIGHWAY
- By Winn Schwartau. (C)opyright 1994 by the author
- Thunder's Mouth Press, 632 Broadway / 7th floor / New York, NY 10012
- ISBN 1-56025-080-1 - Price $22.95
- Distributed by Publishers Group West, 4065 Hollis St. / Emeryville, CA 94608
- (800) 788-3123
-
- Review by Scott Davis (dfox@fennec.com)
- (from tjoauc1-4 ftp: freeside.com /pub/tjoauc)
-
- If you only buy one book this year, make sure it is INFORMATION WARFARE!
- In my 10+ years of existing in cyberspace and seeing people and organizations
- debate, argue and contemplate security issues, laws, personal privacy,
- and solutions to all of these issues...and more, never have I seen a more
- definitive publication. In INFORMATION WARFARE, Winn Schwartau simply
- draws the line on the debating. The information in this book is hard-core,
- factual documentation that leaves no doubt in this reader's mind that
- the world is in for a long, hard ride in regards to computer security.
- The United States is open to the world's electronic terrorists.
- When you finish reading this book, you will find out just how open we are.
-
- Mr. Schwartau talks about industrial espionage, hacking, viruses,
- eavesdroping, code-breaking, personal privacy, HERF guns, EMP/T bombs,
- magnetic weaponry, and the newest phrase of our generation...
- "Binary Schizophrenia". He exposes these topics from all angles. If you
- spend any amount of time in Cyberspace, this book is for you.
-
- How much do you depend on technology?
-
- ATM machines, credit cards, toasters, VCR's, televisions, computers,
- telephones, modems...the list goes on. You use technology and computers
- and don't even know it! But the point is...just how safe are you from
- invasion? How safe is our country's secrets? The fact is - they are NOT
- SAFE! How easy is it for someone you don't know to track your every move
- on a daily basis? VERY EASY! Are you a potential victim to fraud,
- breech of privacy, or general infractions against the way you carry
- on your daily activities? YES! ...and you'd never guess how vulnerable
- we all are!
-
- This book will take you deep into places the government refuses to
- acknowledge. You should know about INFORMATION WARFARE. Order your
- copy today, or pick it up at your favorite book store. You will not
- regret it.
-
- ------------------------------------------------------------------------------
-
- _Firewalls and Internet Security: Repelling the Wily Hacker_
-
- William R. Cheswick <ches@research.att.com>
- Steven M. Bellovin <smb@research.att.com>
-
- Addison-Wesley, ISBN 0-201-63357-4
- 306 + XIV = 320 pages
- (Printed on recycled paper)
-
- A-Somewhat-Less-Enthusiastic-Review
-
- Reviewed by Herd Beast
-
- The back of this book claims that, "_Firewalls and Internet Security_
- gives you invaluable advice and practical tools for protecting your
- organization's computers from the very real threat of hacker attacks."
- That is true. The authors also add something from their knowledge of
- these hacker attacks. The book can be roughly separated into two
- parts: Firewalls, and, you guessed it: Internet Security. That is
- how I see it. The book itself is divided into four parts (Getting
- Started, Building Your Own Firewall, A Look Back & Odds and Ends),
- three appendixes, a bibliography, a list of 42 bombs and an index.
-
- The book starts with overall explanations and an overview of the
- TCP/IP protocol. More than an overview of the actual TCP/IP protocol,
- it is a review of services often used with that protocol, and the
- security risks they pose. In that chapter the authors define
- "bombs" -- as particularly serious security risks. Despite that fact,
- and the tempting bomb list in the end, this book is not a guide for
- someone with passing knowledge of Internet security who wants to learn
- more explicit details about holes. It is, in the authors' words, "not
- a book on how to administer a system in a secure fashion."
-
-
- FIREWALLS (Including the TCP/IP overview: pages 19-131)
-
- What is a firewall and how is it built?(*) If you don't know that,
- then definitely get this book. The Firewalls chapter is excellent
- even for someone with a passing knowledge of firewalls or general
- knowledge of what they set out to accomplish. You might still
- learn more.
-
- In the Firewalls chapter, the authors explain the firewall philosophy
- and types of firewalls. Packet-filtering gateways rely on rule-based
- packet filtering to protect the gateway from various types of attacks.
- You can filter everything and achieve the same effect of disconnecting
- from the Internet, you can filter everything from misbehaving sites,
- you can allow only mail in, and so on. An application-level gateway
- relies on the applications set on the firewall. Rather then let a
- router filter traffic based on rules, one can strip a machine clean
- and only run desired services -- and even then, more secure versions
- of those services can be run. Circuit-level gateways relay data
- between the gateway and other networks. The relay programs copy
- data from inside the firewall to the outside, and log their activity.
- Most firewalls on the Internet are a combination of these gateways.
-
- Next, the authors explain how to build an application-level gateway
- based on the work they have done with the research.att.com gateways.
- As mentioned, this chapter is indeed very good. They go over setting
- up the firewall machines, router configuration for basic packet
- filtering (such as not allowing Internet packets that appear to come
- from inside your network). They show, using the software on the
- AT&T gateway as example, the general outline of proxies and give some
- useful advise. That chapter is very interesting; reading it with Bill
- Cheswick's (older) paper, "The Design of a Secure Internet Gateway" makes
- it even better. The examples given, like the NFS and X proxies run on the
- gateway, are also interesting by themselves.
-
-
- INTERNET SECURITY (pages 133-237)
-
- Internet security is a misleading name. This part might also be
- called "Everything else." Most of it is a review of hacker attacks
- logged by AT&T's gateway probes, and of their experience with a hacker.
- But there is also a chapter dedicated to computer crime and the law --
- computer crime statutes, log files as evidence, the legalities of
- monitoring intruders and letting them keep their access after finding
- them, and the ethics of many actions performed on the Internet; plus
- an introduction to cryptography under Secure Communication over Insecure
- Networks. The later sections are good. The explanation of several
- encryption methods and short reviews of applications putting them to use
- (PEM, PGP and RIPEM) are clear (as clear as cryptography can get) and the
- computer crime sections are also good -- although I'm not a lawyer and
- therefore cannot really comment on it, and notes that look like "5 USC
- 552a(b)(c)(10)" cause me to shudder. It's interesting to note that some
- administrative functions as presented in this book, what the authors call
- counter-intelligence (reverse fingers and rusers) and booby traps and fake
- password file are open for ethical debate. Perhaps they are not illegal,
- but counter-intelligence can surely ring the warning bells on the site being
- counter-fingered if that site itself is security aware.
-
- That said, let's move to hackers. I refer to these as "hacker studies",
- or whatever, for lack of a better name. This is Part III (A Look
- Back), which contains the methods of attacks (social engineering,
- stealing passwords, etc), the Berferd incident (more on that later),
- and an analysis (statistical and otherwise) of the Bell Labs gateway
- logs.
-
- Back to where we started, there is nothing new or innovative about
- these chapters. The Berferd hacker case is not new, it is mostly just
- uninteresting. The chapter is mostly a copy (they do state this) of
- Bill Cheswick's paper titled "A Night with Berferd, in Which a Cracker
- is Lured, Endured and Studied." The chapter concerning probes and
- door-knob twisting on the Internet (Traps, Lures, and Honey Pots)
- is mostly a copy (they do not state this) of Steven Bellovin's paper
- titled, "There Be Dragons". What do we learn from the hacker-related
- chapters? Let's take Berferd: The Sendmail DEBUG hole expert. After
- mailing himself a password file and receiving it with a space after
- the username, he tries to add accounts in a similar fashion. Cheswick
- calls him "flexible". I might have chosen another F-word. Next are
- the hacker logs. People finger. People tftp /etc/passwd. People try
- to rlogin as bin. There are no advanced attacks in these sections.
- Compared with the scary picture painted in the Firewalls chapter --
- that of the Bad Guy spoofing hostnames, flooding DNS caches, faking
- NFS packets and much more -- something must have gone wrong.(**)
-
- Still, I cannot say that this information is totally useless. It is,
- as mentioned, old. It is available and was available since 1992
- on ftp://research.att.com:{/dist/internet_security,/dist/smb}. (***)
-
- The bottom line is that this book is, in my opinion, foremost and upmost
- a Firewaller's book. The hacker section could have been condensed
- into Appendix D, a copy of the CERT advisory about computer attacks
- ("Don't use guest/guest. Don't leave root unpassworded.") It really
- takes ignorance to believe that inexperienced hackers can learn "hacker
- techniques" and become mean Internet break-in machines just by reading
- _Firewalls and Internet Security_. Yes, even the chapter dedicated
- to trying to attack your own machine to test your security (The Hacker's
- Workbench) is largely theoretical. That is to say, it doesn't go above
- comments like "attack NFS". The probes and source code supplied there are
- for programs like IP subnet scanners and so on, and not for "high-level"
- stuff like ICMP bombers or similar software; only the attacks are
- mentioned, not to implementation. This is, by the way, quite
- understandable and expected, but don't buy this book if you think it
- will make you into some TCP/IP attacker wiz.
-
- In summary:
-
- THE GOOD
-
- The Firewalls part is excellent. The other parts not related to
- hacker-tracking are good as well. The added bonuses -- in the form
- of a useful index, a full bibliography (with pointers to FTP sites),
- a TCP port list with interesting comments and a great (running out
- of positive descriptions here) online resources list -- are also
- grand (whew).
-
- THE BAD
-
- The hacker studies sections, based on old (circa 1992) papers, are
- not interesting for anyone with any knowledge of hacking and/or
- security who had some sort of encounters with hackers. People without
- this knowledge might either get the idea that: (a) all hackers are
- stupid and (b) all hackers are Berferd-style system formatters. Based on
- the fact that the authors do not make a clear-cut statement about
- hiring or not hiring hackers, they just say that you should think
- if you trust them, and that they generally appear not to have a total
- draconian attitude towards hackers in general, I don't think this was
- intentional.
-
- THE UGLY (For the nitpickers)
-
- There are some nasty little bugs in the book. They're not errors
- in that sense of the word; they're just kind of annoying -- if you're
- sensitive about things like being called a hacker or a cracker, they'll
- annoy you. Try this: although they explain why they would use the term
- "hacker" when referring to hackers (and not "eggsucker", or "cracker"),
- they often use terms like "Those With Evil Intention". Or, comparing
- _2600 Magazine_ to the Computer underground Digest.
-
- (*) From the Firewalls FAQ <fwalls-faq@tis.com>:
- ``A firewall is any one of several ways of protecting one
- network from another untrusted network. The actual mechanism
- whereby this is accomplished varies widely, but in
- principle, the firewall can be thought of as a pair of
- mechanisms: one which exists to block traffic, and the other
- which exists to permit traffic. Some firewalls place a
- greater emphasis on blocking traffic, while others emphasize
- permitting traffic.''
-
- (**) This would be a great place to start a long and boring discussion
- about different types of hackers and how security (including firewalls)
- affect them. But... I don't think so.
-
- (***) ftp://research.att.com:/dist/internet_security/firewall.book also
- contains, in text and PostScript, the list of parts, chapters and
- sections in the book, and the Preface section. For that reason,
- those sections weren't printed here.
- All the papers mentioned in this review can be found on that FTP
- site.
-
- ------------------------------------------------------------------------------
-
- Announcing Bellcore's Electronic Information Catalog for Industry
- Clients...
-
- To access the online catalog:
-
- telnet info.bellcore.com
- login: cat10
-
- or dial 201-829-2005
- annex: telnet info
- login: cat10
-
- [Order up some E911 Documents Online!]
-
- ------------------------------------------------------------------------------
-
- TTTTT H H EEEEE
- T H H E
- T HHHHH EEEEE
- T H H E
- T H H EEEEE
-
- CCC U U RRRR M M U U DDDD GGG EEEEE OOO N N
- C C U U R R MM MM U U D D G G E O O NN N
- C U U RRRR M M M U U D D G EEEEE O O N N N
- C C U U R R M M U U D D G GG E O O N NN
- CCC UUU R R M M UUU DDDD GGG EEEEE OOO N N
-
- Bill Clinton promised good health care coverage for everyone.
- Bill Clinton promised jobs programs for the unemployed.
- Bill Clinton promised that everyone who wanted could serve in the military.
- Bill Clinton promised a lot. So does the Curmudgeon.
- But unlike Bill Clinton, we'll deliver...
-
- For only $10 a year (12 issues) you'll get alternative music reviews and
- interviews, political reporting, anti-establishment features and
- commentary, short fiction, movie reviews, book reviews, and humor. Learn
- the truth about the Gulf War, Clipper, and the Selective Service System.
- Read everything you wanted to know about bands like the Offspring, R.E.M.,
- the Cure, Porno for Pyros, Pearl Jam, Dead Can Dance, Rhino Humpers, and
- Nine Inch Nails. Become indoctrinated by commentary that just might change
- the way you think about some things. Subscribe to the Curmudgeon on paper for
- $10 or electronically for free. Electronic subscribers don't get
- everything that paying subscribers do like photos, spoof ads, and some
- articles.
-
- Paper: send $10 check or money order to the Curmudgeon
- 4505 University Way N.E.
- Box 555
- Seattle, Washington
- 98105
- Electronic: send a request to rodneyl@u.washington.edu
-
- ------------------------------------------------------------------------------
-
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
- % The Journal Of American Underground Computing - ISSN 1074-3111 %
- %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
-
- Computing - Communications - Politics - Security - Technology - Humor
- -Underground - Editorials - Reviews - News - Other Really Cool Stuff-
-
- Published Quarterly/Semi-Quarterly By Fennec Information Systems
- This is one of the more popular new electronic publications. To
- get your free subscription, please see the addresses below.
- Don't miss out on this newsworthy publication. We are getting
- hundreds of new subscriptions a month. This quarterly was promoted
- in Phrack Magazine. If you don't subscribe, you're only cheating
- yourself. Have a great day...and a similar tomorrow
-
- * Coming soon * A Windows-based help file containing all of the issues
- of the magazine as well as extensive bio's of all of the
- editors.
-
- Subscription Requests: sub@fennec.com
- Comments to Editors : editors@fennec.com
- Back issues via Ftp : etext.archive.umich.edu /pub/Zines/JAUC
- fc.net /pub/tjoauc
-
- Submissions : submit@fennec.com
- Finger info : dfox@fc.net and kahuna@fc.net
-
- ------------------------------------------------------------------------------
-
- Make the best out of your European pay telephone
- by Onkel Dittmeyer, onkeld@ponton.hanse.de
-
- -----------------------------------------------------
-
- Okay guys and girls, let's come to a topic old like the creation
- but yet never revealed. European, or, to be more exact, German pay
- phone technology. Huh-huh.
-
- There are several models, round ones, rectangular ones, spiffy
- looking ones, dull looking ones, and they all have one thing in
- common: If they are something, they are not what the American reader
- might think of a public pay telephone, unlike it's U.S. brothers,
- the German payphones always operate off a regular customer-style
- telephone line, and therefore they're basically all COCOTS, which
- makes it a lot easier to screw around with them.
-
- Let's get on with the models here. You are dealing with two
- classes; coin-op ones and card-op ones. All of them are made by
- Siemens and TELEKOM. The coin-op ones are currently in the process
- of becoming extinct while being replaced by the new card-op's, and rather
- dull. Lacking all comfort, they just have a regular 3x4 keypad,
- and they emit a cuckoo tone if you receive a call. The only way to
- tamper with these is pure physical violence, which is still easier
- than in the U.S.; these babies are no fortresses at all. Well, while
- the coin-op models just offer you the opportunity of ripping off
- their money by physically forcing them open, there is a lot more
- fun involved if you're dealing with the card babies. They are really
- spiffy looking, and I mean extraordinary spiffy. Still nothing
- compared to the AT&T VideoFoNeZ, but still really spiffy. The 2-line
- pixel-oriented LCD readout displays the pure K-Radness of it's
- inventors. Therefore it is equipped with a 4x4 keypad that has a lot
- of (undocumented) features like switching the mother into touch-tone
- mode, redial, display block etc. Plus, you can toggle the readout
- between German, English, and French. There are rumors that you can
- put it into Mandarin as well, but that has not been confirmed yet.
-
- Let's get ahead. Since all payphones are operating on a regular
- line, you can call them up. Most of them have a sign reading their
- number, some don't. For those who don't, there is no way for you to
- figure out their number, since they did not invent ANI yet over here
- in the country famous for its good beer and yodel chants. Well, try
- it. I know you thought about it. Call it collect. Dialing 010 will
- drop you to a long-distance operator, just in case you didn't know.
- He will connect the call, since there is no database with all the
- payphone numbers, the payphone will ring, you pick up, the operator
- will hear the cuckoo tone, and tell you to fuck off. Bad luck, eh?
-
- This would not be Phrack if there would be no way to screw it.
- If you examine the hook switch on it closely, you will figure out
- that, if you press it down real slow and carefully, there are two
- levels at whom it provokes a function; the first will make the phone
- hang up the line, the second one to reset itself. Let me make this
- a little clearer in your mind.
-
- ----- <--- totally released
- |
- |
- | <--- hang up line
- press to this level --> |
- | <--- reset
- |
- ----- <--- totally hung up
-
- Involves a little practice, though. Just try it. Dial a number
- it will let you dial, like 0130, then it will just sit there and
- wait for you to dial the rest of the number. Start pressing down
- the hookswitch really slow till the line clicks away into suspense,
- if you release it again it will return you to the dial tone and
- you are now able to call numbers you aren't supposed to call, like
- 010 (if you don't have a card, don't have one, that's not graceful),
- or 001-212-456-1111. Problem is, the moment the other party picks
- up, the phone will receive a charge subtraction tone, which is a
- 16kHz buzz that will tell the payphone to rip the first charge unit,
- 30 pfennigs, off your card, and if you don't have one inserted and
- the phone fails to collect it, it will go on and reset itself
- disconnecting the line. Bad luck. Still good enough to harass your
- favorite fellas for free, but not exactly what we're looking for,
- right? Try this one. Push the hook lever to the suspension point,
- and let it sit there for a while, you will have to release it a
- bit every 5 seconds or so, or the phone will reset anyway. If you
- receive a call while doing this, a buzz will appear on the line.
-
- Upon that buzz, let the lever go and you'll be connected, and
- the cuckoo tone will be shut up! So if you want to receive a collect
- call, this is how you do it. Tell the operator you accept the charges,
- and talk away. You can use this method overseas, too: Just tell your
- buddy in the states to call Germany Direct (800-292-0049) and make
- a collect call to you waiting in the payphone, and you save a cool
- $1.17 a minute doing that. So much for the kids that just want to
- have some cheap fun, and on with the rest.
-
- Wasting so much time in that rotten payphone, you probably
- noticed the little black box beneath the phone. During my, erm,
- research I found out that this box contains some fuses, a standard
- Euro 220V power connector, and a TAE-F standard phone connector.
- Completing the fun is the fact that it's extremely easy to pry it
- open. The TAE-F plug is also bypassing the phone and the charge
- collection circuits, so you can just use it like your jack at home.
- Bring a crowbar and your laptop, or your Pentium tower, power it over
- the payphone and plug your Dual into the jack. This way you can even
- run a board from a payphone, and people can download the latest
- WaReZzzZzz right from the booth. It's preferable to obtain a key for
- the lock of the box, just do some malicious damage to it (yes, let
- the animal take control), and call Telekom Repairs at 1171 and they
- will come and fix it. Since they always leave their cars unlocked,
- or at least for the ones I ran across, you can either take the whole
- car or all their k-rad equipment, manuals, keys, and even their lunch
- box. But we're shooting off topic here. The keys are usually general
- keys, means they fit on all payphones in your area. There should also
- be a nationwide master key, but the German Minister of Tele-
- communications is probably keeping that one in his desk drawer.
-
- The chargecards for the card-op ones appear to have a little chip
- on them, where each charge unit is being deducted, and since no-one
- could figure out how it works, or how to refill the cards or make a
- fake one, but a lot of German phreaks are busy trying to figure that
- out.
-
- A good approach is also social-engineering Telekom so they turn
- off the charge deduction signal (which doesn't mean the call are free,
- but the buzz is just not transmitted any more) so the phone doesn't
- receive a signal to charge you any money no matter where you call.
- The problem with this method is that the world will spread in the
- neighborhood that there is a payphone where you can call for free,
- and therefore it will be so crowded that you can't use it, and
- the phone pals will catch up fast. It's fun though, I tried it, and
- I still get free drinks at the local pub for doing it.
-
- Another k-rad feature on them is the built-in modem that they use
- to get their software. On a fatal error condition they appear to dial
- a telecom number and download the latest software just how their ROM
- commands them to do. We will shortly take a phone, install it some-
- where else and figure out where it calls, what the protocol is and
- what else is being transmitted, but that will probably be in another
- Phrack.
-
- If you found out anything that might be of interest, you are
- welcome to mail it to onkeld@ponton.hanse.de using the public key
- beneath. Unencrypted mail will be killed since ponton.hanse.de is
- run by a paranoid bitch that reads all traffic just for the hell
- of it, and I don't want the phedzZz to come and beat me over the
- head with a frozen chunk o' meat or worse.
-
- Stay alert, watch out and have fun...
-
- -----BEGIN PGP PUBLIC KEY BLOCK-----
- Version: 2.3a
-
- mQCNAize9DEAAAEEAKOb5ebKYg6cAxaiVT/H5JhCqgNNDHpkBwFMNuQW2nGnLMvg
- Q0woIxrM5ltnnuCBJGrGNskt3IMXsav6+YFjG6IA8YRHgvWEwYrTeW2tniS7/dXY
- fqCCSzTxJ9TtLAiMDBgJFzOIUj3025zp7rVvKThqRghLx4cRDVBISel/bMSZAAUR
- tChPbmtlbCBEaXR0bWV5ZXIgPG9ua2VsZEBwb250b24uaGFuc2UuZGU+
- =b5ar
- -----END PGP PUBLIC KEY BLOCK-----
- ------------------------------------------------------------------------------
-
- _ _ _ _
- ((___)) INFORMATION IS JUNK MAIL ((___))
- [ x x ] [ x x ]
- \ / cDc communications \ /
- (' ') -cDc- CULT OF THE DEAD COW -cDc- (' ')
- (U) (U)
- deal with it, presents unto you 10 phat t-files, deal with it,
- S U C K E R fresh for July 1994: S U C K E R
-
- New gNu NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for July, 1994:
-
- _________________________________/Text Files\_________________________________
-
- 261: "Interview with Greta Shred" by Reid Fleming. Reid conducts an in-depth
- interview with the editor of the popular 'zine, _Mudflap_.
-
- 262: "_Beverly Hills 90210_ as Nostalgia Television" by Crystal Kile. Paper
- presented for the 1993 National Popular Culture Association meeting in New
- Orleans.
-
- 263: "What Color Is the Sky in Your World?" by Tequila Willy. Here's your
- homework, done right for you by T. "Super-Brain" Willy.
-
- 264: "Chicken Hawk" by Mark E. Dassad. Oh boy. Here's a new watermark low
- level of depravity and sickness. If you don't know what a "chicken hawk" is
- already, read the story and then you'll understand.
-
- 265: "Eye-r0N-EE" by Swamp Ratte'. This one's interesting 'cause only about
- half-a-dozen or so lines in it are original. The rest was entirely stuck
- together from misc. files on my hard drive at the time. Some art guy could say
- it's a buncha post-this&that, eh? Yep.
-
- 266: "Interview with Barbie" by Clench. Barbie's got her guard up. Clench
- goes after her with his rope-a-dope interview style. Rope-a-dope, rope-a-dope.
- This is a boxing reference to a technique mastered by The Greatest of All Time,
- Muhamed Ali.
-
- 267: "About a Boy" by Franken Gibe. Mr. Gibe ponders a stolen photograph.
- Tiny bunnies run about, unhindered, to find their own fate.
-
- 268: "Mall Death" by Snarfblat. Story about a Dumb Girl[TM]. Are you
- surprised?
-
- 269: "Prophile: Future History" by THE NIGHTSTALKER. It's the future, things
- are different, but the Master Hacker Dude lives on.
-
- 270: "Time out for Pop" by Malcolm D. Moore. Sad account of a hopless-pop.
-
- __________________________________/cDc Gnuz\__________________________________
-
- "And that no man might buy or sell, save he that had the mark, or the name
- of the Cow, or the number of his name. Here is wisdom. Let him that hath
- understanding count the number of the Cow: for it is the number of a man; and
- his number is eight billion threescore and seven million nine hundred fourty-
- four thousand three hundred threescore and two. So it is written." -Omega
-
-
- Yowsah, yowsah, yowsah. JULY once again, the super-hooray month which marks
- cDc's 8th year of existence. Outlasting everyone to completely rule and
- dominate all of cyberspace, blah blah blah. Yeah, think a special thought
- about cDc's significance in YOUR life the next time you go potty. Name your
- firstborn child after me, and we'll call it karmicly even, pal. My name is
- Leroy.
-
-
- We're always taking t-file submissions, so if you've got a file and want to
- really get it out there, there's no better way than with cDc. Upload text to
- The Polka AE, to sratte@phantom.com, or send disks or hardcopy to the cDc post
- office box in Lubbock, TX. No song lyrics and bad poetry please; we'll leave
- that to the no-class-havin', bottom-feeder e-shoveling orgs. out there.
-
-
- News item of the month, as found by Count Zero:
-
- "ROTTING PIG FOUND IN DITCH
-
- VERDEN, OKLAHOMA - Responding to a tip from an employee, Verden farmer Bill
- McVey found a rotting pig in a ditch two miles north of town. Farmer McVey
- reported the pig to the authorities, because you cannot, legally, just leave a
- dead pig in a ditch. You must dispose of your deceased livestock properly.
- There are companies that will take care of this for you. As for proper
- disposal of large dead animals, McVey contracts with Used Cow Dealer."
-
- "...and the rivers ran red with the bl00d
- of the Damned and the Deleted..."
- -Dem0nSeed
-
- S. Ratte'
- cDc/Editor and P|-|Ear13zz |_3@DeRrr
- "We're into t-files for the groupies and money."
- Middle finger for all.
-
- Write to: cDc communications, P.O. Box 53011, Lubbock, TX 79453.
- Internet: sratte@phantom.com.
- ALL cDc FILES LEECHABLE FROM FTP.EFF.ORG IN pub/Publications/CuD/CDC.
- _____________________________________________________________________________
-
- cDc Global Domination Update #16-by Swamp Ratte'-"Hyperbole is our business"
- Copyright (c) 1994 cDc communications. All Rights Reserved.
-
- ------------------------------------------------------------------------------
-
- ===[ Radio Modification Project ]===========================================>
-
- Tuning in to Lower Frequency Signals June 26, 1994
-
- ====================================================[ By: Grendel / 905 ]===>
-
- The lower frequency regions of the radio spectrum are often
- ignored by ham'ers, pirates, and DX'ers alike due to the
- relatively little known ways of tuning in. The following article
- will detail how to construct a simple-made antenna to tune in
- to the LF's and show how to adjust an amateur band type radio
- to receive the desired signals.
-
- ___________
- \ /
- \/: \/
- / . \
- \_______/he lower frequency spectrum has been made to include
- the very low frequency ("VLF" 2 kHz to 30 kHz) band and a
- small part of the medium frequency ("MF" 300 - 500 kHz) band.
- For our purposes, a suitable receiver must be able to cover
- the 2 kHz to 500 kHz range as well as being calibrated at 10
- kHz intervals (standard). The receiver must also be capable of
- covering AM and CW broadcasts. For best capabilities, the
- receiver should also be able to cover LSB ("lower side band")
- and USB ("upper side band").
-
- The Receiving System
- `'`'`'`'`'`'`'`'`'`'
- The receiver I use consists of a standard amateur HF ("High
- Frequency") band receiver adjusted between the 3,500 and 4,000
- kHz bands. This causes the receiver to act as a tuneable IF
- ("Intermediate Frequency") and also as demodulator. You will
- also require a wideband LF ("Low Frequency") converter which
- includes a 3,500 kHz crystal oscillator. See Fig. 1:
-
- .==[ Fig 1. Block Diagram ]============================.
- | _____ |
- | \ANT/ |
- | \./ crystal |
- | | ______|______ ____________ |
- | `-----| 2 - 500 kHz | | 3-4000 kHz | |
- | | Converter* |--~--| IF Receiver|---OUTPUT |
- | .-----|_____________| |____________| |
- | | |
- | GND |
- |______________________________________________________|
-
- *The converter is a circuit board type 80D/L-101/PCB
- available from L.F. Engineering Co, 17 Jeffry Road,
- East Haven CT, 06513 for $43 US including S & H.One
- may be constructed to work with your receiver (but
- at a higher price no doubt).
-
- Phono jack plugs and sockets are used for the interconnections
- throughout the receiving system and the converter and
- receiver (~) are connected with RG58 coax cable of no greater
- length than 4 ft.
- When tuning, the station frequency is measured by deducting
- 3,500 kHz from the scale on the main receiver (ie. 340 kHz =
- 3,840 kHz on the main receiver, 120 = 3,620 kHz, 95 = 3,595
- kHz, etc.)
-
- The Ferrite End-fed Antenna
- `'`'`'`'`'`'`'`'`'`'`'`'`'`
- This is a small antenna designed to tune between 95 kHz and
- 500 kHz. It consists of a coil wound around a ferrite rod, with
- a 4 ft. lead.
-
- Materials:
- o 7 7/8" x 3/8" ferrite rod
- o 5" 24 SWG double cotton covered copper wire
- o 2 PLASTIC coated terry clips
- o a wood or plastic base (8 1/2" x .8" x .5")
- o 2 standard, two-gang 500 pF tuning capacitors
- o a plastic plate (preferably 2" high)
-
- ------------------------------------------------------------------------------
-
- -- A Few Things on Van Eck's Method of Eavesdroping --
- Opticon the Disassembled - UPi
-
- Dr Wim Van Eck, was the one who developed the anonymous method for
- eavesdroping computers ( and, apparently, not only ) from distance,
- in the laboratories of Neher, Holland. This method is based on the
- fact that monitors do transmit electromagnetic radiations. As a device,
- it is not too complex and it can be constructed from an experienced
- electronics phreak. It uses a simple-direction antenna which grabs
- monitor signals from about 800 meters away. Simplified schematics are
- available from Consumertronics.
-
- TEMPEST stands for Transient ElectroMagnetic Pulse Emanation STandard.
- It concerns the quantity of electromagnetic radiations from monitors and
- televisions, although they can also be detected on keyboards, wires,
- printers and central units. There are some security levels in which such
- radiations are supposed to be untraceable by Van Eck systems. Those
- security levels or standards, are described thoroughly in a technical
- exposition called NACSIM 5100A, which has been characterized by NSA
- classified.
-
- Variations of the voltage of the electrical current, cause electromagnetic
- pulses in the form of radio waves. In cathode ray tube ( C.R.T. ) devices,
- such as televisions and monitors, a source of electrons scans the internal
- surface and activates phosphore. Whether or not the scanning is interlaced or
- non-interlaced, most monitors transmit frequencies varying from 50 to 75
- Mhz per second. They also transmit harmonic frequencies, multiplies of the
- basic frequencies; for example a transmitter with signal of 10 Mhz per second
- will also transmit waves of 20, 30, 40 etc. Mhz. Those signals are
- weaker because the transmiter itself effaces them. Such variations in the
- voltage is what the Van Eck system receives and analyzes.
-
- There are ways to prevent or make it harder for someone to monitor
- your monitor. Obviously you cannot place your computer system
- underground and cover it with a Faraday cage or a copper shield
- ( If your case is already that, then you know more about Van Eck
- than I do ). What else ?
-
- (1) Certain computers, such as Wang's, prevent such divulges;
- give preference to them.
-
- (2) Place your monitor into a grounded metal box, 1.5 cm thick.
-
- (3) Trace your tracer(s). They gonna panic.
-
- (4) Increase of the brightness and lowering of the contrast
- reduces TEMPEST's power. Metal objects, like bookshelves,
- around the room, will also help a little bit.
-
- (5) Make sure that two or more monitors are transmitting at the same
- frequency and let them operate simultaneously; this will confuse
- Van Eck systems.
-
- (6) Buy or make on your own, a device which will transmit noise
- at your monitor's frequency.
-
- (7) Act naturally. That is:
-
- (a) Call IRC, join #hack and never mumble a single word.
-
- (b) Read only best selling books.
-
- (c) Watch television at least 8 hours a day.
-
- (d) Forget altruism; there is only you, yourself
- and your dick/crack.
-
- (8) Turn the monitor off.
-
- ------------------------------------------------------------------------------
-
- -Almost Busted-
- By: Deathstar
-
- It all started one week in the last month of summer. Only my brother
- and I were at the house for the whole week, so I did whatever I wanted.
- Every night, I would phreak all night long. I would be either at a payphone
- using AT&Tz, or at home sitting on a conference. I would be on the phone
- till at least four or five in the morning. But one night, my luck was running
- thin, and I almost phreaked for the last time. I was at a payphone, using
- cards. I had been there since around twelve midnight.. The payphone was
- in a shopping center with a supermarket and a few other stores. Most every
- thing closed at eleven.. Except for the nearby gas station. Anyway, I was
- on the phone with only one person that night. I knew the card would be dead
- by the end of the night so I went ahead and called him on both of his lines
- with both of the payphones in the complex with the same card. I had talked
- for hours. It started to get misty and hard to see. Then, I noticed a car
- of some kind pulling into the parking lot. I couldn't tell what kind of
- car it was, because it was so dark. The car started pulling up to me, and
- when it was around twenty feet away I realized it was a police car. They
- got on the loudspeaker and yelled "Stay where you are!". I dropped the
- phone and ran like hell past the supermarket to the edge of the complex.
- I went down a bike path into a neighborhood of townhouses. Running across
- the grass, I slipped and fell about two or three times. I knew they were
- following me, so I had to hide. I ran to the area around the back of
- the supermarket into a forest. I smacked right into a fence and fell
- on the ground. I did not see the fence since it was so dark. Crawling a
- few feet, I laid down and tried to cover my body with some leaves and
- dirt to hide. I was wearing an orange shirt and white shorts. I laid
- as still as I could, covered in dirt and leaves. I could hear the police
- nearby. They had flashlights and were walking through the forest looking
- for me. I knew I would get busted. I tried as hard as I could to keep
- from shaking in fear. I lay there for around thirty minutes. Bugs were
- crawling around on my legs biting me. I was itching all over. I couldn't
- give up though, because if they caught me I knew that would be the end
- of my phreaking career. I was trying to check if they were still looking
- for me, because I could not hear them. Just as I was about to make a run
- for it, thinking they were gone I heard a police radio. I sat tight again.
- For another hour, I lay there until finally I was sure they were gone. I
- got up and started to run. I made my way through the neighborhood to my
- house. Finally I got home. It was around five thirty a.m. I was filthy.
- The first thing I did was call the person I was talking to on the payphone
- and tell him what happened. Then, I changed clothes and cleaned myself up.
- I checked my vmb to find that a conference was up. I called it, and told
- my story to everyone on.
-
- I thought that was the end of my confrontation with the police, but I
- was wrong. The next day I had some people over at my house. Two or Three
- good friends. One of them said that there was a fugitive loose in our
- town. We were bored so we went out in the neighborhood to walk around
- and waste time. Hardly anyone was outside, and police cars were going
- around everywhere. One guy did leave his house but he brought a baseball
- bat with him. We thought it was funny. Anyway, we soon got bored and
- went back home. Watching tv, we turned to the news. They had a Report
- about the Fugitive. We watched. It showed a picture of the shopping
- center I was at. They said "One suspect was spotted at this shopping
- center last night at around four thirty in the morning. The officer
- is around ninety five percent sure that the suspect was the fugitive.
- He was wearing a orange shirt and white shorts, and ran when approached."
- I then freaked out. They were searching my neighborhood for a fugitive
- that didn't exist! I called back the guy I was talking to the night
- before and told him, and then told everyone that was on the conference
- the night before. It ended up that the fugitives never even entered
- our state. They were caught a week later around thirty miles from
- the prison they escaped from. Now I am known by two nicknames. "NatureBoy"
- because everyone says I communed with nature for a hour and a half hiding
- from the police, and "The Fugitive" for obvious reasons. Anywayz, That's
- how I was almost busted..
-
- -DS
-
- ------------------------------------------------------------------------------
-
- The following is a *true* story. It amused the hell out of me while it
- was happening. I hope it isn't one of those "had to be there" things.
- Copyright 1994 Captain Sarcastic, all rights reserved.
-
- On my way home from the second job I've taken for the extra holiday ca$h I
- need, I stopped at Taco Bell for a quick bite to eat. In my billfold is
- a $50 bill and a $2 bill. That is all of the cash I have on my person.
- I figure that with a $2 bill, I can get something to eat and not have to
- worry about people getting pissed at me.
-
- ME: "Hi, I'd like one seven layer burrito please, to go."
- IT: "Is that it?"
- ME: "Yep."
- IT: "That'll be $1.04, eat here?"
- ME: "No, it's *to* *go*." [I hate effort duplication.]
-
- At his point I open my billfold and hand him the $2 bill. He looks at it
- kind of funny and
-
- IT: "Uh, hang on a sec, I'll be right back."
-
- He goes to talk to his manager, who is still within earshot. The
- following conversation occurs between the two of them.
-
- IT: "Hey, you ever see a $2 bill?"
- MG: "No. A what?"
- IT: "A $2 bill. This guy just gave it to me."
- MG: "Ask for something else, THERE'S NO SUCH THING AS A $2 BILL." [my emp]
- IT: "Yeah, thought so."
-
- He comes back to me and says
-
- IT: "We don't take these. Do you have anything else?"
- ME: "Just this fifty. You don't take $2 bills? Why?"
- IT: "I don't know."
- ME: "See here where it says legal tender?"
- IT: "Yeah."
- ME: "So, shouldn't you take it?"
- IT: "Well, hang on a sec."
-
- He goes back to his manager who is watching me like I'm going to
- shoplift, and
-
- IT: "He says I have to take it."
- MG: "Doesn't he have anything else?"
- IT: "Yeah, a fifty. I'll get it and you can open the safe and get change."
- MG: "I'M NOT OPENING THE SAFE WITH HIM IN HERE." [my emp]
- IT: "What should I do?"
- MG: "Tell him to come back later when he has REAL money."
- IT: "I can't tell him that, you tell him."
- MG: "Just tell him."
- IT: "No way, this is weird, I'm going in back."
-
- The manager approaches me and says
-
- MG: "Sorry, we don't take big bills this time of night." [it was 8pm and
- this particular Taco Bell is in a well lighted indoor mall with 100
- other stores.]
- ME: "Well, here's a two."
- MG: "We don't take *those* either."
- ME: "Why the hell not?"
- MG: "I think you *know* why."
- ME: "No really, tell me, why?"
- MG: "Please leave before I call mall security."
- ME: "Excuse me?"
- MG: "Please leave before I call mall security."
- ME: "What the hell for?"
- MG: "Please, sir."
- ME: "Uh, go ahead, call them."
- MG: "Would you please just leave?"
- ME: "No."
- MG: "Fine, have it your way then."
- ME: "No, that's Burger King, isn't it?"
-
- At this point he BACKS away from me and calls mall security on the phone
- around the corner. I have two people STARING at me from the dining area,
- and I begin laughing out loud, just for effect. A few minutes later this
- 45 year oldish guy comes in and says [at the other end of counter, in a
- whisper]
-
- SG: "Yeah, Mike, what's up?"
- MG: "This guy is trying to give me some [pause] funny money."
- SG: "Really? What?"
- MG: "Get this, a *two* dollar bill."
- SG: "Why would a guy fake a $2 bill?" [incredulous]
- MG: "I don't know? He's kinda weird. Says the only other thing he has is
- a fifty."
- SG: "So, the fifty's fake?"
- MG: "NO, the $2 is."
- SG: "Why would he fake a $2 bill?"
- MG: "I don't know. Can you talk to him, and get him out of here?"
- SG: "Yeah..."
-
- Security guard walks over to me and says
-
- SG: "Mike here tells me you have some fake bills you're trying to use."
- ME: "Uh, no."
- SG: "Lemme see 'em."
- ME: "Why?"
- SG: "Do you want me to get the cops in here?"
-
- At this point I was ready to say, "SURE, PLEASE," but I wanted to eat, so
- I said
-
- ME: "I'm just trying to buy a burrito and pay for it with this $2 bill."
-
- I put the bill up near his face, and he flinches like I was taking a
- swing at him. He takes the bill, turns it over a few times in his hands,
- and says
-
- SG: "Mike, what's wrong with this bill?"
- MG: "It's fake."
- SG: "It doesn't look fake to me."
- MG: "But it's a **$2** bill."
- SG: "Yeah?"
- MG: "Well, there's no such thing, is there?"
-
- The security guard and I both looked at him like he was an idiot, and it
- dawned on the guy that he had no clue.
-
- My burrito was free and he threw in a small drink and those cinnamon
- things, too. Makes me want to get a whole stack of $2 bills just to see
- what happens when I try to buy stuff. If I got the right group of
- people, I could probably end up in jail. At least you get free food.
-
- ------------------------------------------------------------------------------
-