[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]

..[ Phrack Magazine ]..
.:: Line Noise Part III ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #45 | Release date : 1994-03-30 | Editor : Erik Bloodaxe
IntroductionErik Bloodaxe
Phrack Loopback Part IPhrack Staff
Phrack Loopback Part II / EditorialPhrack Staff
Line Noise Part IPhrack Staff
Line Noise Part IIPhrack Staff
Line Noise Part IIIPhrack Staff
Phrack Prophile on Control CControl C
Running a BBS on X.25Seven Up
No Time for GoodbyesEmmanuel Goldstein
Security Guidelinesunknown
Ho Ho Con Miscellanyvarious
Quentin Strikes AgainWhite Knight & The Omega
10th Chaos Computer CongressManny E. Farber
Defcon II informationPhrack Staff
VMS Informationvarious
Hollywood-Style Bits & BytesRichard Goodwin
Fraudulent Applications of 900 ServicesCodec
Screwing Over Your Local McDonald'sCharlie X
The Senator Markey Hearing Transcriptsunknown
The Universal Data ConverterMaldoror
BOX.EXE - Box Program for Sound BlasterThe Fixer
Introduction To Octel's ASPENOptik Nerve
Radio Free Berkeley Informationunknown
The MCX7700 PABX SystemDr. Delam
Cellular Debug Mode Commandsvarious
International Scenesvarious
Phrack World NewsDatastream Cowboy
Title : Line Noise Part III
Author : Phrack Staff
                         ==Phrack Magazine==

              Volume Five, Issue Forty-Five, File 6 of 28

                           //   //  /\   //   ====
                          //   //  //\\ //   ====
                         ==== //  //  \\/   ====

                     /\   //  // \\    //  /===   ====
                    //\\ //  //   //  //   \=\   ====
                   //  \\/    \\ //  //   ===/  ====

                                PART III



Cable Television Descrambling
PBX Data Terminal Files
Van Eck Eavesdroping
Security & Anti-Security Measures (Computers, Networks, Physical Sites)
Satellite Transmissions (Audio, Video, DATA, Telecommunications)
Amateur Radio & Television
Radio Modification Instructions
Electronics Project Schematics
X.25 Networking / X.29 Pad Control
Digital Cellular (GSM/TDMA/CDMA)
Wireless Data Networking (LAN, WAN)

** REMEMBER:  Send your university dialups to phrack@well.com ASAP!  **


A Declaration of the Complaints and Grievances of the United States
Electronic Community --

        "They that can give up essential liberty for a little temporary
safety deserve neither liberty nor safety!" These are Benjamin Franklin's
words for one of the most important values defining American Government in
it's infancy. This idea, that people should be given as much freedom as
possible, and also responsibility for what problems abuse of that freedom
might bring, is one of the most important differences between our so called
"Democracy," and a totalitarian despotism. In fact, this value is so
essential that if it is lost there will be no freedom in the United States
of America, and no so called "Democracy!" Despite this fact, every day more
and more of our freedoms, as citizens and residents of the United States of
America, are being eroded away in the name of safety for us and for our
government. This erosion of rights and freedoms has touched all areas of
our lives, from health care and economics, to criminal justice and national
defense. However, the most profound and dangerous erosion has been in the
area of technology. We believe this is as good a place as any to begin a
fight to save our country from continuing to travel down the road to
despotism. Do not forget that this is only a beginning.
        We, the people of the Electronic Community in the United States of
America, have been openly repressed and attacked by all branches and
divisions of the United States Government, in direct violation of our
natural rights and rights granted to us via social contract! The Electronic
Community is one of the world's greatest examples of the power of freedom
and democracy. Most of Cyberspace was not created by businesses looking for
profit, or by governments looking for more efficient control, but mainly by
ordinary citizens looking for a medium through which they could communicate
with others, and express their thoughts and ideas. The computerized
telecommunications used by the electronic community is a medium unlike any
that has ever existed. It is a decentralized, mostly uncensored, and public
forum for open discussion on a world wide basis. It provides ordinary
citizens with the ability to express their ideas to anyone willing to
listen, with no economic or social barriers and no prejudgments. It gives
everyone in the world access to all the knowledge and information the
world has to offer. It has continually shattered deeply ingrained social
prejudices concerning characteristics such as age, race, wealth, and sex.
In fact, it is common to find 14 year olds arguing philosophy with 41 year
olds on America's computer networks!
        However, instead of embracing this great tool of freedom, the
United States Government has reacted to it with fear and ignorance. They
have completely ignored the positive effects the existence of this resource
is already having on society. In fact, they have done little, if anything,
to even gain an understanding of the electronic community and it's
citizens. They have thought only of the damage that could be wrought if
access to this kind of knowledge and information fell into the "wrong
hands." They have labeled everyone in the electronic community a potential
criminal, and have cracked down on any kind of activity which has not met
their standards. In doing so they have crushed the free flow of ideas,
trampled on the constitution, and blatantly encroached upon the civil rights
of the people living and working on American's computer networks. They have
chosen safety above freedom, and in doing so they have threatened the
existence of one of the most important social developments of the twentieth
They have ensued upon a Campaign of Terror, using fear to control and
        oppress the Electronic Community.
They have openly and blatantly violated local, state, and federal law, and
        internationally accepted standards for human rights.
They have used misinformation to set certain areas of the electronic
 community off against one another, or to label certain areas as
 criminal, while they have attacked the entire community without
 regard to action or position.
They have lied to the press, to themselves, and to the American people in
 order to keep their actions unquestioned.
They have imposed taxes and tariffs and have priced public utilities with
        the specific intent of effecting a chill upon the free flow of
        thoughts and ideas.
They have used technology to amass enormous amounts of information on
        innocent citizens in order to control and oppress them.
They have judged the interests of private industry to be more important than
 the interests of the general population.
They have attacked innocent citizens in order to increase the profits of
 certain industries.
They have declared themselves immune from the legal and moral standards
 they expect from the rest of society.
They have, on a regular basis, committed the very acts they have called
They have tried to criminalize personal privacy while belligerently
 defending the privacy of businesses and of government.
They have attempted to control the minds of the American people by
 criminalizing certain knowledge and information.
They have prevented the preparation of thoughts and ideas for public
They have threatened innocent citizens with loss of their right to life,
        liberty, property, and the pursuit of happiness in order to control
        their thoughts, opinions, and actions.
They have repeatedly made laws and taken legal action in areas and/or
 concerning subjects of which they have little or no understanding.
They have seized, damaged, and destroyed the property of innocent citizens.
They have wrongly imprisoned citizens based on questionable information for
        actions which are negligible and, at worst, legally gray.
They have directly attacked innocent citizens in order to keep them from
        publicly assembling.
They have spied on and attempted to interfere with the private
        communications of innocent citizens.
They have made unreasonable and excessive searches and seizures.
They have punished innocent citizens without trial.
They have attempted to effect a chill on the free flow of thoughts and
They have affected to render the government independent of and superior to
 the people.
        We cannot, we WILL not, allow this tyranny to continue! The United
States Government has ignored the voice of the Electronic Community long
enough! When we told the government that what they were doing was wrong,
they refused to listen! When we formed political action groups to bring our
cases to court and before Congress, we were told that we were using
loopholes in the law to get away with crime!!! We have, in a peaceful and
respectful manner, given our government more than reasonable petition for
redress of our grievances, but if anything the situation has gotten worse!
Government administrations use computer crime as a weapon in internal
battles over jurisdiction. Government officials, who have only the
slightest understanding of computer science, use computer crime as a tool
for career success. Elected Representatives, who have absolutely no
understanding of computers, use "information superhighways", computer
crime, and cryptography to gain constituent money and voter support! The
Electronic Community, the only group who fully understands the issues
involved here, and the only group who is effected by the decisions being
made, has been completely ignored! We have sat around and discussed these
loudly that we drown out everything else! We must save our small community
from destruction so that when the rest of society is ready, the world will
still have a forum for free speech and open communication. We must demand
freedom for America's Electronic Community!!!

Tom Cross AKA The White Ninja

NOTE: Redistribution and further publishing of this document is highly
encouraged as long as proper credit is given.

-------------------------    "Government is not a reason, not an eloquence;
-------------------------    it is a force. Like fire, it is a dangerous
--------------- * * * * *    servant and a fearful master."
--------------- * * * * *
--------------- * * * * *                        -- George Washington
--------------- * * * * *


  ISSN 1074-3111  Technology, Conspiracy, Editorials, Politics, Networking

      Editor-in-Chief:         Scott Davis
      NetSurfer:               John Logan
      It's A Conspiracy!:      Gordon Fagan

      E-Mail - editors@fennec.com
      ** ftp site: etext.archive.umich.edu    /pub/Zines/JAUC

      U.S. Mail:
      The Journal Of American Underground Computing
      10111 N. Lamar #25
      Austin, Texas 78753


  To Subscribe to "TJOAUC", send mail to:              sub@fennec.com
  All questions/comments about this publication to:    comments@fennec.com
  Send all articles/info that you want published to:   submit@fennec.com
  Commercial Registration for Profitable Media:        form1@fennec.com

 "The underground press serves as the only effective counter to a growing
 power, and more sophisticated techniques used by establishment mass media
 to falsify, misrepresent, misquote, rule out of consideration as a priori
 ridiculous, or simply ignore and blot out of existence: data, books,
 discoveries that they consider prejudicial to establishment interest..."

 (William S. Burroughs and Daniel Odier, "The Job", Viking, New York, 1989)


   New TimeWasters T-shirts !

Do you know the feeling ? You're behind your terminal for hours,
browsing the directories of your school's UNIX system. Instead of
holes, bugs and bad file permissions you find tripwire, TCPwrapper and
s/key. You run a file with a s-bit and immediately you get a mail from
the system admin asking what you are doing. In other words, no chance
to ever become a good hacker there.

Now you have the chance to at least pretend to be an eleet
hacker. The Dutch hacking fanatics The TimeWasters have released
the third version of their cool 'hacker' T-shirt. Because
the previous versions were too limited (20 and 25 shirts) we
printed no less than 200 shirts this time.

Of course you want to know, what does it look like ?
On the front, a TimeWasters logo in color. Below that a picture
of two hacking dudes, hanging behind their equipment, also
featuring a stack of phracks, pizza boxes, beer, kodez, and
various computer-related stuff with a 'No WsWietse' sticker.
On the back, the original TimeWasters logo with the broken
clock. Below it, four original and dead funny real quotes
featuring the art of Time Wasting.

Wearing this shirt can only provoke one reaction; WOW !
Imagine going up to the helpdesk wearing this shirt and
keeping a straight face while asking a security question !

And for just $2 more you'll get a pair of sunglasses with
the text 'TimeWasters' on them !

To order:
Send $20 or $22 to
 Postbus 402
 5611 AK Eindhoven
 The Netherlands, Europe
This includes shipping. Please allow some time for delivery. If you
are in Holland, don't send US$, email the address below for the
price in guilders and our 'postbank' number.

For more information: email to:
- timewasters-request@win.tue.nl with subject: T-SHIRT for a txtfile
  with more info.
- rob@hacktic.nl or gigawalt@win.tue.nl for questions.

Written by Rob J. Nauta, rob@hacktic.nl dd. 8 mar 1994


Caller ID Technical Details
by Hyperborean Menace

The way Caller ID works internally is through SS7 (Signalling System 7)
messages between telephone switches equipped to handle SS7.  These messages
pass all the call information (block/no block, calling number, etc.).
The calling number is sent as part of the SS7 call setup data on all SS7
routed calls (i.e. all calls carried between switches that are SS7

The calling number is sent between switches always, regardless of
whether or not *67 (Caller ID Block) is dialed.  It just sends along a
privacy indicator if you dial *67, and then the final switch in the path
will send a "P" instead of the calling number to the Caller ID box.
(But it will still store the actual number - *69 will work whether or
not the caller dialed *67).  What the final switch along the path does
with the calling number depends on how the switch is configured.  If you
are not paying for Caller ID service, the switch is configured so that
it will not transmit the Caller ID data.

This is entirely separate from Automatic Number Identification, which is sent
along SS7 where SS7 is available, but can also be sent using other methods,
so that ALL switches (for many years now) have been able to send ANI (which
is what Long Distance companies used to know who to bill).  Enhanced 911 is
NOT based on Caller ID, but on ANI, thus, it will work for anyone, not just
people connected to SS7 capable switches.  And, of course, *67 will have no
effect on Enhanced 911 either.

Also interesting is the effect call forwarding has on the various services.
Say I have my home telephone forwarded to Lunatic Labs, and it has
Caller ID.  If you call me, the call will forward to Lunatic Labs, and
its Caller ID box will show YOUR number, not mine (since your line is
the actual one making the call).

However, ANI is based on the Billing Number (who is paying for the call (or
would pay if it weren't free), not on who is actually making the call.
Thus, if I forward my telephone to an 800 Number that gets ANI (such as the
cable pay-per-view order number), and you call me, they will get MY number
(since I would be the one paying for that portion of the call, except that
800 Numbers are free), and you will end up ordering pay-per-view for

CNID (Caller ID) Technical Specifications

 The data signalling interface has the following characteristics:
        Link Type:           2-wire, simplex
        Transmission Scheme:    Analog, phase-coherent FSK
        Logical 1 (mark)        1200 +/- 12 Hz
        Logical 0 (space)       2200 +/- 22 Hz
        Transmission Rate:         1200 bps
        Transmission Level:        13.5 +/- dBm into 900 ohm load

 (I have copied this data as presented.  I believe the
 transmission level is meant to be -13.5 dBm.)

 [It is indeed -13.5 dBm]

 The protocol uses 8-bit data words (bytes), each bounded by a
 start bit and a stop bit.  The CND message uses the Single Data
 Message format shown below.

 [ I belive this is the same as standard asynchronous serial - I think the
 start bit is a "space", and the stop bit is a "mark" ]

 Channel  Carrier  Message  Message  Data     Checksum
 Seizure  Signal   Type     Length   Word(s)  Word
 Signal            Word     Word

 The channel seizure is 30 continuous bytes of 55h (01010101)
 providing a detectable alternating function to the CPE (i.e. the
 modem data pump).

 [CPE = Customer Premises Equipment --i.e. your Caller ID Box]

 The carrier signal consists of 130 +/- 25 mS of mark (1200 Hz) to
 condition the receiver for data.

 The message type word indicates the service and capability
 associated with the data message.  The message type word for CND
 is 04h (00000100).

 The message length word specifies the total number of data words
 to follow.

 The data words are encoded in ASCII and represent the following

 o  The first two words represent the month
 o  The next two words represent the day of the month
 o  The next two words represent the hour in local military time
 o  The next two words represent the minute after the hour
 o  The calling party's directory number is represented by the
        remaining  words in the data word field

 If the calling party's directory number is not available to the
 terminating central office, the data word field contains an ASCII
 "O".  If the calling party invokes the privacy capability, the
 data word field contains an ASCII "P".

 [ Note that 'O' will generally result in the Caller-ID box displaying
 "Out Of Area" indicating that somewhere along the path the call took from
 its source to its destination, there was a connection that did not pass
 the Caller ID data.  Generally, anything out of Southwestern Bell's area
 will certainly generate a 'O', and some areas in SWB territory might also
 not have the SS7 connections required for Caller ID]

 The Checksum Word contains the twos complement of the modulo 256
 sum of the other words in the data message (i.e., message type,
 message length, and data words).  The receiving equipment may
 calculate the modulo 256 sum of the received words and add this
 sum to the received checksum word.  A result of zero generally
 indicates that the message was correctly received.  Message
 retransmission is not supported.

 An example of a received CND message, beginning with the message
 type word, follows:

 04 12 30 39 33 30 31 32 32 34 36 30 39 35 35 35 31 32 31 32 51

 04h=  Calling number delivery information code (message type word)
 12h= 18 decimal; Number of data words (date, time, and directory
        number words)
 ASCII 30,39= 09; September
 ASCII 33,30= 30; 30th day
 ASCII 31,32= 12; 12:00 PM
 ASCII 32,34= 24; 24 minutes (i.e., 12:24 PM)
 ASCII 36,30,39,35,35,35,31,32,31,32= (609) 555-1212; calling
                          party's directory number
 51h=  Checksum Word

 [ There is also a Caller Name service that will transmit the number and the
 name of the caller.  The basic specs are the same as just numbers, but more
 data is transmitted.  I don't have the details of the data stream for that.]

 To receive CND information, the modem monitors the phone line
 between the first and second ring bursts without causing the DAA
 to go off hook in the conventional sense, which would inhibit the
 transmission of CND by the local central office.  A simple
 modification to an existing DAA circuit easily accomplishes the

 [i.e. The Caller-ID Device should present a high impedance to the line]

 Although the data signalling interface parameters match those of
 a Bell 202 modem, the receiving CPE need not be a Bell 202
 modem.  A V.23 1200 bps modem receiver may be used to demodulate
 the Bell 202 signal.  The ring indicate bit (RI) may be used on a
 modem to indicate when to monitor the phone line for CND
 information.  After the RI bit sets, indicating the first ring
 burst, the host waits for the RI bit to reset.  The host then
 configures the modem to monitor the phone line for CND

 According to Bellcore specifications, CND signalling starts as
 early as 300 mS after the first ring burst and ends at least 475
 mS before the second ring burst.


Country               Percentage of Piracy
Australia / New Zealand   45%
Benelux                   66
France                    73
Germany                   62
Italy                     86
Japan                     92
Korea                     82
Singapore                 41
Spain                     86
Sweden                    60
Taiwan ( 1990 )           93
Thailand                  99
United Kingdom            54
United States             35

     Source: Business Software Alliance, based on 1992 h/w & s/w
                    shipping figures


The Frog Farm Mailing List FAQ v1.1
January 20th, 1994

1. What is this I am reading?
2. What is the Frog Farm?
3. Okay, so what's the Frog Farm mailing list?
4. Are there any rules enforced on the mailing list?
5. I can see all the addresses of the subscribers!
6. You must be Nazis. After all, aren't people who hate Jews,
 blacks, etc., the only people who talk about this sort of thing?

1. What is this I am reading?

This is the FAQ for the Frog Farm mailing list. It is NOT the FAQ
for the Frog Farm. The FAQ for the Frog Farm is much larger (just
over 100 Kbytes in size).

2. What is the Frog Farm?

Read the FAQ. You can FTP it from etext.archive.umich.edu in the
/pub/Legal/FrogFarm directory (also accessible via Gopher). If
you do not have FTP access, you may request the FAQ via e-mail
from schirado@lab.cc.wmich.edu.

3. Okay, so what's the Frog Farm mailing list?

frog-farm@blizzard.lcs.mit.edu is an unmoderated e-mail forum
devoted to the discussion of claiming, exercising and defending
Rights in America, past, present and future. Topics include, but
are not limited to, conflicts which can arise between a free
people and their public servants when said servants exceed the
scope of their powers, and possible methods of dealing with such

To subscribe to the list, send a message containing the single

  ADD <your-preferred-email-addr>

to frog-farm-request@blizzard.lcs.mit.edu.

To remove your subscription from the forum, send a message
containing the single line:

  REMOVE <same-email-addr-as-above>

to frog-farm-request@blizzard.lcs.mit.edu.

Note that these commands must be in the BODY of the message; the
contents of the Subject line are ignored.

While you are subscribed, send mail to


to echo your message to all other list subscribers.

4. Are there any rules enforced on the mailing list?

Only two:

1) Do not reveal the e-mail addresses of any subscribers to any
   individuals who are not subscribers. You may freely
   redistribute any article posted to the Frog Farm, subject to
   whatever conditions the poster may have placed on it. For
   example, some people attach a notice to their message stating
   that they are NOT allowing the redistribution of their message
   under ANY circumstances, some people stipulate that it may be
   redistributed only if it is unaltered in any way, etc.

2) No flaming is permitted. The list maintainers are the sole
   judges of what constitutes flaming.

5. I can see all the addresses of the subscribers!

Under normal circumstances, you can't see the names. If you can,
you had to work at it; if so, you obviously know what you're
doing, and you should have known better. Try not to let your
curiosity overwhelm your respect for the privacy of others.

The security on this list is not as tight as it could be,
and it is a trivial process for a knowledgeable hacker or hackers
to circumvent it. If you know how to do this, please don't do it.

6. You must be Nazis. After all, aren't people who hate Jews,
 blacks, etc., the only people who talk about this sort of thing?

Not at all. The official position of the Frog Farm is that every
human being, of any sex or race, has "certain inalienable Rights"
which may not be violated for any cause or reason. Anyone may
claim and exercise Rights in America, providing they possess the
necessary courage and mental competence.

The Frog Farm provides a List of Interesting Organizations to its
subscribers, which may include organizations or persons who
believe in a god or gods, or promote the idea that certain races
are inferior or perhaps part of a conspiratorial plot to enslave
everyone else. The list maintainers make every effort to note
such idiotic beliefs, where they exist, and encourage people not
to throw out the baby with the bathwater, but to seek the truth
wherever it may be found.

Every individual is unique, and none may be judged by anything
other than their words and actions.


      The LOD Communications Underground H/P BBS Message Base Project:

                   Information/Order File: Brief Version

   This is a short version of the longer, 35K (12 page) Order/Info file. If
you want the full file, sample message file, detailed tables of contents file,
etc. you can request it from lodcom@mindvox.phantom.com or choose menu item
#5 on the Mindvox Gopher Server by using any gopher and opening a connection
with the hostname: mindvox.

The Project:

   Throughout history, physical objects have been preserved for posterity for
the benefit of the next generation of humans.  Cyberspace, however, isn't very
physical; data contained on floppy diskettes has a finite lifetime as does the
technology to retrieve that data.  The earliest underground hacker bulletin
board systems operated at a time when TRS-80s, Commodore 64s, and Apple ][s
were state-of-the-art.  Today, it is difficult to find anyone who has one of
these machines in operating condition, not to mention the brain cells left to
recall how to operate them. :-(

   LOD Communications has created a historical library of the "dark" portion
of Cyberspace.  The project's goal is to acquire as much information as
possible from underground Hack/Phreak (H/P) bulletin boards that were in
operation during a decade long period, dating from the beginnings (in 1980/81
with 8BBS and MOM:  Modem Over Manhattan) to the legendary OSUNY, Plover-NET,
Legion of Doom!, Metal Shop, etc. up through the Phoenix Project circa
1989/90. Currently, messages from over 75 different BBSes have been retrieved,
although very few message bases are 100% complete.  However, not having a
complete "set" does not diminish their value.

  DONATIONS: A portion of every order will be donated to the following causes:

             1) A donation will be made to help pay for Craig Neidorf's
                (Knight Lightning - Metal Shop Private Co-Sysop) Legal Defense
                bills (resulting from his successful campaign to protect First
                Amendment rights for electronic publishing, i.e. the
                PHRACK/E911 case).

             2) The SotMESC Scholarship Fund.  The SotMESC Scholarship is
                awarded to students writing exceptional papers of 20 to 30
                pages on a topic based on computer culture (ie, hacking
                culture, virus writing culture, Internet culture, etc.) For
                more details write: SotMESC  PO BOX 573  Long Beach, MS 39560
                or email: rejones@seabass.st.usm.edu

          BEEN MADE.

What Each "Message Base File" Contains:

     - A two page general message explaining H/P BBS terminology and format.

     - The BBS Pro-Phile:  A historical background and description of the BBS
       either written by the original system operator(s) or those who actually
       called the BBS when it was in operation (it took months to track the
       appropriate people down and get them to write these specifically for
       this project; lesser known BBSes may not contain a Pro-Phile);

     - Messages posted to the BBS (i.e. the Message Base);

     - Downloaded Userlists if available; and

     - Hacking tutorials a.k.a. "G-Philes" that were on-line if available.

   It is anticipated that most people who are interested in the message bases
have never heard of a lot of the BBS names shown in the listing.  If you have
seen one set of messages, you have NOT seen them ALL.  Each system had a
unique personality, set of users, and each has something different to offer.

Formats the Message Base Files are Available in:

   Due to the large size of the Message Base Files, they will be compressed
using the format of your choice.  Please note that Lodcom does NOT include the
compression/uncompression program (PKZIP, PAK, MAC Stuffit, etc.).  ASCII
(uncompressed) files will be provided for $5.00 extra to cover additional
diskette (files that are uncompressed require more than double the number of
diskettes) and shipping costs.  The files are available for:

     - IBM (5.25 or 3.5 inch)
     - APPLE MACINTOSH (3.5 inch)
     - ATARI ST (MS-DOS Compatible 3.5 inch)
     - AMIGA (3.5 inch)
     - PAPER versions can be ordered but cost triple (due to increased costs
       to ship, time to print, and messages being in 40 column format which
       wastes lots of paper...save those trees!).  Paper versions take twice
       the time to deliver but are laser printed.

Orders are expected to arrive at the requesters' physical mail box in 3-5
weeks upon receipt of the order.

The Collection:

   This is where we currently stand as far as what has been completed and the
estimated completion dates for the rest of the project:

                       Volume 1: 5700+ Messages, 20 H/P BBSes, COMPLETED.
                       Volume 2: 2100+ Messages, 25 H/P BBSes, COMPLETED.
                       Volume 3: 20-30 H/P BBSes, End of March 1994.
                       Volume 4: ????? H/P BBSes, Sometime after 3/94.
                       All in all there is expected to be 12000+ Messages.

       NOTE: Additional material has recently been received for Boards already
released in the first 2 volumes. Those who have already ordered will receive
the updated versions with the additional messages that have been recovered.

*** Blurbs and Excerpts: ***

    Blurbs from some of those who have received the first two Volumes:

   "I am stunned at the quality of this undertaking. It brought back that
    feeling of involvement and interest." --P.P.

   "I think of the release of the H/P Message Bases as an opening salvo in
    the battle for the truth about fraud in the Telecom Industry." --J.J.

   "Still sifting through Volume one. For now I've taken the approach of
    putting all the files into one subdirectory and searching it for topics
    of interest. Prime and Primos computers was my first topic of interest
    and Volume I yielded quite a bit of odd and useful information." --K.B.

   "...the professionalism of the Message Bases is of a superior quality.
    Somehow they bring back that age of innocence. Boy do I miss those
    times." --A.C.

   Excerpt from 2600 Magazine (The Hacker Quarterly) Autumn 1993 Issue,
review by Emmanuel Goldstein entitled NEVER ERASE THE PAST.

    "...is this the sort of thing that people really care about? Undoubtedly,
many will shrug it off as useless, boring teenagers that have absolutely no
relevance to anything in the real world. The fact remains, however, that this
is history. This is *our* history, or at least, a small part of it. The boards
included in this project - Sherwood Forest I & II, Metal Shop Private, OSUNY,
Phoenix Project, and a host of others - are among the more interesting hacker
boards, with some classic dialogue and a gang of hacker stars-to-be. Nearly
all of these boards were raided at one time or another, which makes it all
even more fascinating."

    "Had the LODCOM project not come along when it did, a great many of these
message bases probably would have been lost forever. Providing this service
to both the hacker community and those interested in it is a noble cause that
is well worth the price. If it succeeds, some valuable hacker data will be
preserved for future generations."

    The Lodcom project was also reviewed in Computer underground Digest Issue
#5.39 and will be reviewed by GRAY AREAS MAGAZINE in their summer issue. You
should be able to find the issue on most newsstands in about 3 months. You can
contact Gray Areas by phone: 215-353-8238 (A machine screens their calls), by
email: grayarea@well.sf.ca.us, and by regular mail: Gray Areas, Inc. , PO BOX
808, Broomall, PA 19008-0808. Subscriptions are $18.00 a year U.S. and we
highly recommend the magazine if you are interested in the gray areas of life.

*** {End of Blurbs and Excerpts} ***

Volume 1 & 2 Table of Contents:

     A detailed Table of Contents file can be found on the Mindvox Gopher
Server or requested via email.

Project Contributor List:

   The following is a list (order is random) of those who helped with this
effort that began in Jan. of 1993. Whether they donated material, uploaded
messages, typed messages from printouts, critiqued our various materials,
wrote BBS Pro-Philes, donated services or equipment, or merely 'looked in
their attic for some old disks', their help is appreciated:

Lord Digital and Dead Lord (Phantom Access Technologies/The MINDVOX System),
2600 Magazine/Emmanuel Goldstein, The Marauder, Knight Lightning, T.B.,
Computer underground Digest (CuD)/Jim Thomas/Gordon Meyer, Phrack Magazine,
Strat, Jester Sluggo, Erik Bloodaxe, Taran King, Professor Falken, TUC,
Lex Luthor, Mark Tabas, Phantom Phreaker, Quasi Moto, The Mechanic, Al Capone,
Compu-Phreak, Dr. Nibblemaster, King Blotto, Randy Hoops, Sir Francis Drake,
Digital Logic, The Ronz, Doctor Who, The Jinx, Boca Bandit, Crimson Death,
Doc Holiday, The Butler, Ninja Master, Silver Spy, Power Spike, Karl Marx,
Blue Archer, Dean Simmons, Control-C, Bad Subscript, Swamp Ratte, Randy Smith,
Terminal Man, SK Erickson, Slave Driver, R.E.Jones/CSP/SotMESC, Gray Areas
Magazine, and anonymous others.

The Order Form:

- - - - - - - - - - - - - - - C U T - H E R E - - - - - - - - - - - - - - - -

               LOD Communications H/P BBS Message Base ORDER FORM

   PERSONAL RATE:  Volumes 1, 2, 3, and possibly a fourth if created: $39.00
   This price is TOTAL & includes any updates to individual BBS Message Bases.

   COMMERCIAL RATE:  Corporations, Universities, Libraries, and Government
   Agencies: $99.00  As above, price is total and includes updates.

H/P BBS Message Bases (All Volumes): $________

"G-Phile" Collection (Optional): $____________ ($10.00 Personal)
                                               ($25.00 Commercial)

Disk Format/Type of Computer: _____________________________________
(Please be sure to specify diskette size [5.25" or 3.5"] and high/low density)

File Archive Method (.ZIP [preferred], .ARJ, .LHZ, .Z, .TAR) ____________
                    (ASCII [Non-Compressed] add $5.00 to order)

Texas Residents add 8% Sales Tax.
If outside North America please add $6.00 for Shipping & Handling.

Total Amount (In U.S. Dollars): $ ___________

Payment Method:  Check or Money Order please, made out to LOD Communications.
Absolutely NO Credit Cards, even if it's yours :-)

By purchasing these works, the Purchaser agrees to abide by all applicable U.S.
Copyright Laws to not distribute or reproduce, electronically or otherwise, in
part or in whole, any part of the Work(s) without express written permission
from LOD Communications.

Send To:
          Name: _____________________________________

  Organization: _____________________________________ (If applicable)

        Street: _____________________________________

City/State/Zip: _____________________________________

       Country: _____________________________________

E-mail address: _____________________________________ (If applicable)

PRIVACY NOTICE:  The information provided to LOD Communications is used for
sending orders and periodic updates to the H/P BBS Message Base Price List.
It will NOT be given or sold to any other party.  Period.

- - - - - - - - - - - - - - - C U T - H E R E - - - - - - - - - - - - - - - -

Remit To:   LOD Communications
            603 W. 13th
            Suite 1A-278
            Austin, Texas USA  78701

Lodcom can also be contacted via E-mail:  lodcom@mindvox.phantom.com
                             Voice Mail:  512-448-5098
 End Brief Version of Order/Info File (2/20/94)

Email: lodcom@mindvox.phantom.com
Voice Mail: 512-448-5098
Snail Mail: LOD Communications
            603 W. 13th  Suite 1A-278
            Austin, Texas USA 78701


                           BooX for Hackers

by Seven Up

Usually I am not reading too many books. But there are two rather new
ones everyone should read and have.

UNIX Power Tools

The first one is made for people who like to play with UNIX.
It is called 'UNIX Power Tools', published by Bantam and O'Reilly. It
contains over 1000 pages and weighs about 3 pounds, but contains a CD
ROM. It contains pretty useful information and examples on how to use
standard UNIX utilities and how to solve certain tasks. Some of the topics
it covers are:
Encryption of passwords, shell programming, config files for logging in
and out, setting shell prompts, vi tips & tricks, redirecting and piping,
sed & awk and much more. Like most O'Reilly books, it is written with
a lot of humor and easy to read. To me, this book is a reference for almost
any question. You might even feel that you don't need most of your old
UNIX books anymore, because this book almost covers it all. It is also a lot
of fun just to browse through the book randomly and read articles on
different subjects. There really is no need and no use to read it from A to Z.
A lot of their tricks is collected from Usenet Newsgroups. All of their use-
ful programs, scripts and general PD programs you will find on FTP sites
are on the CD. However, if you want a different medium they charge you $40.
And now we come to the only problem of the book: the price! I think compared
to the contents, charging $59.95 is justified; but it might scare off many
people anyway. Finally I would recommend this book to everyone who uses
UNIX a lot and likes to experiment and play with it (and has 60 bucks left).

Hacker Crackdown

Now reading Bruce's book won't cost you 60 bucks. In fact, it will even
be totally FREE! I won't say too much about the book, because there have
already been great reviews in Phrack and 2600 in Spring/Summer 1993. It
is probably the most interesting and entertaining book about Hackers and
Fedz from 1993. But now Bruce decided to release the book as online
freeware - you may just grab the 270k file from a site, read it and give
it to anyone you want.

But let's listen to Bruce now and what he has to say...

January 1, 1994 -- Austin, Texas

     Hi, I'm Bruce Sterling, the author of this
electronic book.

     Out in the traditional world of print, *The
Hacker Crackdown* is ISBN 0-553-08058-X, and is
formally catalogued by the Library of Congress as "1.
Computer crimes -- United States.  2. Telephone --
United States -- Corrupt practices.  3.  Programming
(Electronic computers) -- United States -- Corrupt
practices."  'Corrupt practices,' I always get a kick out
of that description.  Librarians are very ingenious

     The paperback is ISBN 0-553-56370-X.  If you go
and buy a print version of *The Hacker Crackdown,*
an action I encourage heartily, you may notice that
in the front of the book,  beneath the copyright
notice  -- "Copyright (C) 1992 by Bruce Sterling" -- it
has this little block of printed legal boilerplate from
the publisher.  It says, and I quote:

     "No part of this book may be reproduced or
transmitted in any form or by any means, electronic
or mechanical, including photocopying, recording,
or by any information storage and retrieval system,
without permission in writing from the publisher.
For information address:  Bantam Books."

     This is a pretty good disclaimer, as such
disclaimers go.  I collect intellectual-property
disclaimers, and I've seen dozens of them, and this
one is at least pretty straightforward.  In this narrow
and particular case, however, it isn't quite accurate.
Bantam Books puts that disclaimer on every book
they publish, but Bantam Books does not, in fact,
own the electronic rights to this book.  I do, because
of certain extensive contract maneuvering my
agent and I went through before this book was
written.  I want to give those electronic publishing
rights away through certain not-for-profit channels,
and I've convinced Bantam that this is a good idea.

     Since Bantam has seen fit to peaceably agree to
this scheme of mine, Bantam Books is not going to
fuss about this.  Provided you don't try to sell the
book, they are not going to bother you for what you
do with the electronic copy of this book. If you want
to check this out personally, you can ask them;
they're at 1540 Broadway NY NY 10036.  However, if
you were so foolish as to print this book and start
retailing it for money in violation of my copyright
and the commercial interests of Bantam Books,
then Bantam, a part of the gigantic Bertelsmann
multinational publishing combine, would roust
some of their heavy-duty attorneys out of
hibernation and crush you like a bug.  This is only to
be expected.  I didn't write this book so that you
could make money out of it.  If anybody is gonna
make money out of this book, it's gonna be me and
my publisher.

     My publisher deserves to make money out of
this book.  Not only did the folks at Bantam Books
commission me to write the book, and pay me a
hefty sum to do so, but they bravely printed, in text,
an electronic document the reproduction of which
was once alleged to be a federal felony.  Bantam
Books and their numerous attorneys were very
brave and forthright about this book.  Furthermore,
my former editor at Bantam Books, Betsy Mitchell,
genuinely cared about this project, and worked hard
on it, and had a lot of wise things to say about the
manuscript.  Betsy deserves genuine credit for this
book, credit that editors too rarely get.

     The critics were very kind to *The Hacker
Crackdown,* and commercially the book has done
well.  On the other hand, I didn't write this book in
order to squeeze every last nickel and dime out of
the mitts of impoverished sixteen-year-old
cyberpunk high-school-students.  Teenagers don't
have any money -- (no, not even enough for the  six-
dollar *Hacker Crackdown* paperback, with its
attractive bright-red cover and useful index).   That's
a major reason why teenagers sometimes succumb
to the temptation to do things they shouldn't, such
as swiping my books out of libraries.   Kids:  this one
is all yours, all right?  Go give the print version back.

     Well-meaning, public-spirited civil libertarians
don't have much money, either.   And it seems
almost criminal to snatch cash out of the hands of
America's direly underpaid electronic law
enforcement community.

     If you're a computer cop, a hacker, or an
electronic civil liberties activist, you are the target
audience for this book.  I wrote this book because I
wanted to help you, and help other people
understand you and your unique, uhm, problems.  I
wrote this book to aid your activities, and to
contribute to the public discussion of important
political issues.  In giving the text away in this
fashion, I am directly contributing to the book's
ultimate aim:  to help civilize cyberspace.

     Information *wants* to be free.  And  the
information inside this book longs for freedom with
a peculiar intensity.  I genuinely believe that the
natural habitat of this book is inside an electronic
network.  That may not be the easiest direct method
to generate revenue for the book's author, but that
doesn't matter; this is where this book belongs by its
nature.  I've written other books -- plenty of other
books -- and I'll write more and I am writing more,
but this one is special.  I am making *The Hacker
Crackdown* available electronically as widely as I
can conveniently manage, and if you like the book,
and think it is useful, then I urge you to do the same
with it.

     You can copy this electronic book.   Copy the
heck out of it, be my guest, and give those copies to
anybody who wants them.  The nascent world of
cyberspace is full of sysadmins, teachers, trainers,
cybrarians, netgurus, and various species of
cybernetic activist.  If you're one of those people,  I
know about you, and I know the hassle you go
through to try to help people learn about the
electronic frontier.  I hope that possessing this book
in electronic form will lessen your troubles.  Granted,
this treatment of our electronic social spectrum is
not the ultimate in academic rigor.  And politically, it
has something to offend and trouble almost
everyone.   But hey, I'm told it's readable, and at
least the price is right.

     You can upload the book onto bulletin board
systems, or Internet nodes, or electronic discussion
groups.  Go right ahead and do that, I am giving you
express permission right now.  Enjoy yourself.

     You can put the book on disks and give the disks
away, as long as you don't take any money for it.

     But this book is not public domain.  You can't
copyright it in your own name.   I own the copyright.
Attempts to pirate this book and make money from
selling it may involve you in a serious litigative snarl.
Believe me, for the pittance you might wring out of
such an action, it's really not worth it.  This book
don't "belong" to you.  In an odd but very genuine
way, I feel it doesn't "belong" to me, either.  It's a
book about the people of cyberspace, and
distributing it in this way is the best way I know to
actually make this information available, freely and
easily, to all the people of cyberspace -- including
people far outside the borders of the United States,
who otherwise may never have a chance to see any
edition of the book, and who may perhaps learn
something useful from this strange story of distant,
obscure, but portentous events in so-called
"American cyberspace."

      This electronic book is now literary freeware.  It
now belongs to the emergent realm of alternative
information economics.  You have no right to make
this electronic book part of the conventional flow of
commerce.  Let it be part of the flow of knowledge:
there's a difference.   I've divided the book into four
sections, so that it is less ungainly for upload and
download; if there's a section of particular relevance
to you and your colleagues, feel free to reproduce
that one and skip the rest.

     Just make more when you need them, and give
them to whoever might want them.

     Now have fun.

     Bruce Sterling -- bruces@well.sf.ca.us

  _   _
 [ x x ] cDc communications
  \   /  Global Domination Update #14
  (' ')  December 30th, 1993
Est. 1986

New gNu NEW gnU new GnU nEW gNu neW gnu nEw GNU releases for December, 1993:

 _________________________________/Text Files\_________________________________

241: "Cell-Hell" by Video Vindicator.  In-depth article on modifying the
Mitsubishi 800 cellular phone by Mr. Fraud himself.  Rad.

242: "The Darkroom" by Mark Vaxlov.  Very dark story about a high school rape
in the photography lab at school.  Disturbing.

243: "Fortune Smiles" by Obscure Images.  Story set in the future with
organized crime and identity-swapping.

244: "Radiocarbon Dating Service" by Markian Gooley.  Who would go out with
Gooley?  YOUR MOM!

245: "The U.S. Mercenary Army" by Phil Agee.  Forwarded by The Deth Vegetable,
this file contains a speech by former CIA agent Agee on the Gulf War.
Interesting stuff.

246: "The Monolith" by Daniel S. Reinker.  This is one of the most disgusting
files we've put out since the infamous "Bunny Lust."  I don't wanna describe
this, just read it.

247: "Post-Election '92 Cult Coverage" by Omega.  Afterthoughts on Tequila
Willy's bid for the U.S. Presidency.

248: "The Lunatic Crown" by Matthew Legare.  Wear the crown.  Buy a Slurpee.
Seek the adept.  Do not pass 'Go.'

249: "Yet Another Suicide" by The Mad Hatter.  Guy gets depressed over a girl
and kills himself.

250: "State of Seige" by Curtis Yarvin.  The soldiers hunt the dogs hunt the
soldiers.  Like, war, ya know.  Hell!

 __________________________________/cDc Gnuz\__________________________________

                           "cDc: We're Into Barbie!"

cDc mailing list: Get on the ever-dope and slamagnifiterrific cDc mailing list!
Send mail to cDc@cypher.com and include some wonderlessly elite message along
he lines of "ADD ME 2 DA MAILIN LIZT!!@&!"

NEW Official cDc Global Domination Factory Direct Outlets:
The Land of Rape and Honey     502/491-6562
Desperadoes                    +61-7-3683567
Underworld                     203/649-6103
Airstrip-One                   512/371-7971
Ministry of Death              516/878-1774
Future Shock                   +61-7-3660740
Murder, Inc                    404/416-6638
The Prodigal Sun               312/238-3585
Red Dawn-2 Enterprises         410/263-2258
Cyber Neurotic Reality Test    613/723-4743
Terminal Sabotage              314/878-7909
The Wall                       707/874-1316,2970

We're always taking t-file submissions, so if you've got a file and want to
really get it out there, there's no better way than with cDc.  Upload text to
The Polka AE, to sratte@phantom.com, or send disks or hardcopy to the cDc post
office box in Lubbock, TX.

cDc has been named SASSY magazine's "Sassiest Underground Computer Group."
Hell yeah!

Thanks to Drunkfux for setting up another fun HoHoCon this year, in Austin.  It
was cool as usual to hang out with everyone who showed up.

Music credits for stuff listened to while editing this batch of files: Zapp,
Carpenters, Deicide, and Swingset Disaster.

Only text editor worth a damn: ProTERM, on the Apple II.

So here's the new cDc release.  It's been a while since the last one.  It's out
because I fucking felt like it, and have to prove to myself that I can do this
crap without losing my mind and having to go stand in a cotton field and look
at some dirt at 3 in the morning.  cDc=cDc+1, yeah yeah.  Do you know what this
is about?  Any idea?  This is SICK and shouldn't be harped on or celebrated.
This whole cyberdweeb/telecom/'puter underground scene makes me wanna puke,
it's all sick and dysfunctional.  Eat my shit, G33/<W0r|_<|.  Virus yourself to
death.  Go blind staring at the screen waiting for more wares/inph0 to come
trickling down the wire.  The more of that shit comes in, the more life goes
out.  Ooh, and you hate it so much, don't you.  You hate it.

Hacking's mostly a big waste of time.  Fuck you.
Stupid Telephone Tricks will never be on David Letterman.  Fuck you.
Cryptography?  Who'd wanna read YOUR boring email?  Fuck you.
Interactive television is a couch potato trap.  Fuck you.
"Surf the net," sucker.  "Ride the edge," you maladjusted sack of shit.

S. Ratte'
cDc/Editor and P|-|Ear13zz |_3@DeRrr
"We're into t-files for the groupies and money."
Fuck you, fuck you... and most of all, fuck YOU.

Write to: cDc communications, P.O. Box 53011, Lubbock, TX  79453.
Internet: sratte@phantom.com.

  cDc Global Domination Update #14-by Swamp Ratte'-"Hyperbole is our business"



Introduction to BlackNet

Your name has come to our attention. We have reason to believe you may
be interested in the products and services our new organization,
BlackNet, has to offer.

BlackNet is in the business of buying, selling, trading, and otherwise
dealing with *information* in all its many forms.

We buy and sell information using public key cryptosystems with
essentially perfect security for our customers. Unless you tell us who
you are (please don't!) or inadvertently reveal information which
provides clues, we have no way of identifying you, nor you us.

Our location in physical space is unimportant. Our location in
cyberspace is all that matters. Our primary address is the PGP key
location: "BlackNet<nowhere@cyberspace.nil>" and we can be contacted
(preferably through a chain of anonymous remailers) by encrypting a
message to our public key (contained below) and depositing this
message in one of the several locations in cyberspace we monitor.
Currently, we monitor the following locations: alt.extropians,
alt.fan.david-sternlight, and the "Cypherpunks" mailing list.

BlackNet is nominally nondideological, but considers nation-states,
export laws, patent laws, national security considerations and the
like to be relics of the pre-cyberspace era. Export and patent laws
are often used to explicity project national power and imperialist,
colonialist state fascism. BlackNet believes it is solely the
responsibility of a secret holder to keep that secret--not the
responsibility of the State, or of us, or of anyone else who may come
into possession of that secret. If a secret's worth having, it's worth

BlackNet is currently building its information inventory. We are
interested in information in the following areas, though any other
juicy stuff is always welcome. "If you think it's valuable, offer it
to us first."

- - trade secrets, processes, production methods (esp. in
semiconductors) - nanotechnology and related techniques (esp. the
Merkle sleeve bearing) - chemical manufacturing and rational drug
design (esp. fullerines and protein folding) - new product plans, from
children's toys to cruise missiles (anything on "3DO"?)  - business
intelligence, mergers, buyouts, rumors

BlackNet can make anonymous deposits to the bank account of your
choice, where local banking laws permit, can mail cash directly (you
assume the risk of theft or seizure), or can credit you in
"CryptoCredits," the internal currency of BlackNet (which you then
might use to buy _other_ information and have it encrypted to your
special public key and posted in public place).

If you are interested, do NOT attempt to contact us directly (you'll
be wasting your time), and do NOT post anything that contains your
name, your e-mail address, etc. Rather, compose your message, encrypt
it with the public key of BlackNet (included below), and use an
anonymous remailer chain of one or more links to post this encrypted,
anonymized message in one of the locations listed (more will be added
later). Be sure to describe what you are selling, what value you think
it has, your payment terms, and, of course, a special public key (NOT
the one you use in your ordinary business, of course!) that we can use
to get back in touch with you. Then watch the same public spaces for a

(With these remailers, local PGP encryption within the remailers, the
use of special public keys, and the public postings of the encrypted
messages, a secure, two-way, untraceable, and fully anonymous channel
has been opened between the customer and BlackNet. This is the key to

A more complete tutorial on using BlackNet will soon appear, in
plaintext form, in certain locations in cyberspace.

Join us in this revolutionary--and profitable--venture.


-----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.3

[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.