51. Electronic Terrorism by The Jolly Roger
1.It starts when a big, dumb lummox rudely insults you. Being of a rational, intelligent disposition, you wisely choose to avoid a (direct) confrontation. But as he laughs in your face, you smile inwardly---your revenge is already planned.
2.Follow your victim to his locker, car, or house. Once you have chosen your target site, lay low for a week or more, letting your anger boil.
3.In the mean time, assemble your versatile terrorist kit(details below.)
4.Plant your kit at the designated target site on a Monday morning between the hours of 4:00 am and 6:00 am. Include a calm, suggestive note that quietly hints at the possibility of another attack. Do not write it by hand! An example of an effective note: "don't be such a jerk, or the next one will take off your hand. Have a nice day." Notice how the calm tone instills fear. As if written by a homicidal psychopath.
5.Choose a strategic location overlooking the target site. Try to position yourself in such a way that you can see his facial contortions.
6.Sit back and enjoy the fireworks! Assembly of the versatile, economic, and effective terrorist kit #1: the parts you'll need are:
· 4 AA batteries
· 1 9-volt battery
· 1 SPDT mini relay (radio shack)
· 1 rocket engine(smoke bomb or m-80)
· 1 solar igniter (any hobby store)
· 1 9-volt battery connector
1.Take the 9-volt battery and wire it through the relay's coil. This circuit should also include a pair of contacts that when separated cut off this circuit. These contacts should be held together by trapping them between the locker, mailbox, or car door. Once the door is opened, the contacts fall apart and the 9-volt circuit is broken, allowing the relay to fall to the closed position thus closing the ignition circuit. (If all this is confusing take a look at the schematic below.)
2.Take the 4 AA batteries and wire them in succession. Wire the positive terminal of one to the negative terminal of another, until all four are connected except one positive terminal and one negative terminal. Even though the four AA batteries only combine to create 6 volts, the increase in amperage is necessary to activate the solar igniter quickly and effectively.
3.Take the battery pack (made in step 2) and wire one end of it to the relay's single pole and the other end to one prong of the solar igniter. Then wire the other prong of the solar igniter back to the open position on the relay.
4.Using double sided carpet tape mount the kit in his locker, mailbox, or car door. And last, insert the solar igniter into the rocket engine (smoke bomb or m-80).
Your kit is now complete!
I (CONTACTS) I
I - (BATTERY)
I (COIL) I
(SWITCH) I I
I --- (BATTERY)
I - ( PACK )
52. How to Start A Conference w/o 2600hz or M-F by The Jolly Roger
This method of starting the conf. Depends on your ability to bullshit the operator into dialing a number which can only be reached with an operator's M-F tones. When bullshitting the operator remember operator's are not hired to think but to do.
Here is a step-by-step way to the conf.:
Call the operator through a pbx or extender, you could just call one Through your line but I wouldn't recommend it.
Say to the operator: TSPS maintenance engineer, ring-forward to 213+080+1100, position release, thank you.(she will probably ask you for the number again) Definitions:
Ring-forward instructs her to dial the number.
Position release instructs her to release the trunk after she has dialed the number.
+ - remember to say 213plus080 plus1100.
3. When you are connected with the conf. You will here a whistle blow twice and a recording asking you for your operator number. Dial in any five digits and hit the pounds sign a couple of times. Simply dial in the number of the billing line ect. When the recording ask for it. When in the control mode of the conf. Hit '6' to transfer control. Hit '001' to reenter the number of conferee's and time amount which you gave when you stared the conf. Remember the size can be from 2-59 conferee's. I have not found out the 'lengths' limits.
53. How to Make Dynamite by The Jolly Roger
Dynamite is nothing more than just nitroglycerin and a stabilizing agent to make it much safer to use. The numbers are percentages, be sure to mix these carefully and be sure to use the exact amounts. These percentages are in weight ratio, not volume.
Number Ingredients Amount
1st Nitroglycerin 32%
Sodium Nitrate 28%
Ammonium Oxalate 29%
2nd Nitroglycerin 24%
Potassium Nitrate 9%
Sodium Nitrate 56%
Ammonium Oxalate 2%
3rd Nitroglycerin 35«%
Potassium Nitrate 44«%
Powdered Charcoal 6%
4th Nitroglycerin 25%
Potassium Nitrate 26%
Barium Nitrate 5%
5th Nitroglycerin 57%
Potassium Nitrate 19%
Ammonium Oxalate 12%
6th Nitroglycerin 18%
Sodium Nitrate 70%
Potassium Chloride 4«%
7th Nitroglycerin 26%
Barium Nitrate 32%
Sodium Carbonate 2%
8th Nitroglycerin 44%
Anhydrous Sodium Sulfate 44%
9th Nitroglycerin 24%
Potassium Nitrate 32«%
Ammonium Oxalate 10%
10th Nitroglycerin 26%
Potassium Nitrate 33%
11th Nitroglycerin 15%
Sodium Nitrate 62.9%
Sodium Carbonate .9%
12th Nitroglycerin 35%
Sodium Nitrate 27%
Ammonium Oxalate 1%
13th Nitroglycerin 32%
Potassium Nitrate 27%
Ammonium Oxalate 30%
14th Nitroglycerin 33%
Ammonium Oxalate 29%
Potassium Perchloride 27%
15th Nitroglycerin 40%
Sodium Nitrate 45%
16th Nitroglycerin 47%
17th Nitroglycerin 30%
Sodium Nitrate 22.3%
Potassium Chloride 7.2%
18th Nitroglycerin 50%
Sodium Nitrate 32.6%
Ammonium Oxalate .4%
19th Nitroglycerin 23%
Potassium Nitrate 27«%
Ammonium Oxalate 8%
Barium Nitrate 4%
Calcium Carbonate «%
If you can't seem to get one or more of the ingredients try another one. If you still can't, you can always buy small amounts from your school, or maybe from various chemical companies. When you do that, be sure to say as little as possible, if during the school year, and they ask, say it's for a experiment for school.
54. Auto Exhaust Flame Thrower by The Jolly Roger
For this one, all you need is a car, a spark plug, ignition wire and a switch. Install the spark plug into the last four or five inches of the tail pipe by drilling a hole that the plug can screw into easily. Attach the wire (this is regular insulated wire) to one side of the switch and to the spark plug. The other side of the switch is attached to the positive terminal on the battery. With the car running, simply hit the switch and watch the flames fly!!! Again be careful that no one is behind you! I have seen some of these flames go 20 feet!!!
55. Breaking into BBS Express by The Jolly Roger
If you have high enough access on any BBS Express BBS you can get the Sysop's password without any problems and be able to log on as him and do whatever you like. Download the Pass file, delete the whole BBS, anything. Its all a matter of uploading a text file and downloading it from the BBS. You must have high enough access to see new uploads to do this. If you can see a file you just uploaded you have the ability to break into the BBS in a few easy steps. Why am I telling everyone this when I run BBS Express myself? Well there is one way to stop this from happening and I want other Sysops to be aware of it and not have it happen to them. Breaking in is all based on the MENU function of BBS Express. Express will let you create a menu to display different text files by putting the word MENU at the top of any text file and stating what files are to be displayed. But due to a major screw up by Mr. Ledbetter you can use this MENU option to display the USERLOG and the Sysop's Passwords or anything else you like. I will show you how to get the Sysop's pass and therefore log on as the Sysop. BBs Express Sysop's have 2 passwords. One like everyone else gets in the form of X1XXX, and a Secondary password to make it harder to hack out the Sysops pass. The Secondary pass is found in a file called SYSDATA.DAT. This file must be on drive 1 and is therefore easy to get.
All you have to do is upload this simple Text file:
After you upload this file you download it non-Xmodem. Stupid Express thinks
it is displaying a menu and you will see this:
Just hit 1 and Express will display the SYSDATA.DAT file. OPPASS is where the Sysop's Secondary pass will be. D1:USERLOG.DAT is where you will find the name and Drive number of the USERLOG.DAT file. The Sysop might have renamed this file or put it in a Subdirectory or even on a different drive. I Will Assume he left it as D1:USERLOG.DAT. The other parts of this file tell you where the .HLP screens are and where the LOG is saved and all the Download path names.
Now to get the Sysop's primary pass you upload a text file like this:
Breaking into Bedwetter's BBS
Again you then download this file non-Xmodem and you will see:
Breaking into Bedwetter's BBS
You then hit 1 and the long USERLOG.DAT file comes flying at you. The Sysop is the first entry in this very long file so it is easy. You will see:
SYSOP'S NAME X1XXX
You should now have his 2 passwords.
There is only one easy way out of this that I can think of, and that is to make all new uploads go to SYSOP level (Level 9) access only. This way nobody can pull off what I just explained. I feel this is a major Bug on Mr. Ledbetter's part. I just don't know why no one had thought of it before. I would like to give credit to Redline for the message he left on Modem Hell telling about this problem, and also to Unka for his ideas and input about correcting it.
56. Firebombs by The Jolly Roger
Most fire bombs are simply gasoline filled bottles with a fuel soaked rag in the mouth (the bottle's mouth, not yours). The original Molotov cocktail, and still about the best, was a mixture of one part gasoline and one part motor oil. The oil helps it to cling to what it splatters on. Some use one part roofing tar and one part gasoline. Fire bombs have been found which were made by pouring melted wax into gasoline.
57. Fuse Ignition Bomb by The Jolly Roger
A four strand homemade fuse is used for this. It burns like fury. It is held down and concealed by a strip of bent tin cut from a can. The exposed end of the fuse is dipped into the flare igniter. To use this one, you light the fuse and hold the fire bomb until the fuse has burned out of sight under the tin. Then throw it and when it breaks, the burning fuse will ignite the contents.
58. Generic Bomb by The Jolly Roger
1.Acquire a glass container.
2.Put in a few drops of gasoline.
3.Cap the top.
4.Now turn the container around to coat the inner surfaces and then evaporates.
5.Add a few drops of potassium permanganate (Get this stuff from a snake bite kit)
6.The bomb is detonated by throwing against a solid object.
After throwing this thing, run like hell. This thing packs about « stick of dynamite.
59. Green Box Plans by the Jolly Roger
Paying the initial rate in order to use a red box (on certain fortresses) left a sour taste in many red boxers mouths, thus the green box was invented. The green box generates useful tones such as COIN COLLECT, COIN RETURN, AND RINGBACK. These are the tones that ACTS or the TSPS operator would send to the CO when appropriate. Unfortunately, the green box cannot be used at the fortress station but must be used by the CALLED party.
Here are the tones:
COIN COLLECT 700+1100hz
COIN RETURN 1100+1700hz
Before the called party sends any of these tones, an operator release signal should be sent to alert the MF detectors at the CO. This can be done by sending 900hz + 1500hz or a single 2600 wink (90 ms.) Also do not forget that the initial rate is collected shortly before the 3 minute period is up. Incidentally, once the above MF tones for collecting and returning coins reach the CO, they are converted into an appropriate DC pulse (-130 volts for return and +130 for collect). This pulse is then sent down the tip to the fortress. This causes the coin relay to either return or collect the coins. The alleged "T-network" takes advantage of this information. When a pulse for coin collect (+130 VDC) is sent down the line, it must be grounded somewhere. This is usually the yellow or black wire. Thus, if the wires are exposed, these wires can be cut to prevent the pulse from being grounded. When the three minute initial period is almost up, make sure that the black and yellow wires are severed, then hang up, wait about 15 seconds in case of a second pulse, reconnect the wires, pick up the phone, and if all goes well, it should be "JACKPOT" time.
60. Portable Grenade Launcher by The Jolly Roger
If you have a bow, this one is for you. Remove the ferrule from an aluminum arrow, and fill the arrow with black powder (I use grade FFFF, it burns easy)and then glue a shotshell primer into the hole left where the ferrule went. Next, glue a BB on the primer, and you are ready to go! Make sure no one is nearby.... Little shreds of aluminum go all over the place!!
61. Hacking Tutorial by The Jolly Roger
What is hacking?
According to popular belief the term hacker and hacking was founded at MIT it comes from the root of a hack writer, someone who keeps "hacking" at the typewriter until he finishes the story. A computer hacker would be hacking at the keyboard or password works.
What you need:
To hack you need a computer equipped with a modem (a device that lets you transmit data over phone lines) which should cost you from $100 to $1200.
How do you hack?
Hacking requires two things:
1.The phone number.
2.Answer to identity elements.
How do you find the phone number?
There are three basic ways to find a computers phone number:
What is scanning?
Scanning is the process of having a computer search for a carrier tone. For example, the computer would start at (800) 111-1111 and wait for carrier if there is none it will go on to 111-1112 etc. If there is a carrier it will record it for future use and continue looking for more.
What is directory assistance?
This way can only be used if you know where your target computer is. For this
example say it is in menlo park, CA and the company name is Sri.
1.Dial 411 (or 415-555-1212)
2.Say "Menlo park"
4.Write down number
5.Ask if there are any more numbers
6.If so write them down.
7.Hang up on operator
8.Dial all numbers you were given
9.Listen for carrier tone
10.If you hear carrier tone write down number, call it on your modem and your set to hack!
62. The Basics of Hacking II by The Jolly Roger
Basics to know before doing anything, essential to your continuing career as one of the elite in the country... This article, "The introduction to the world of hacking." is meant to help you by telling you how not to get caught, what not to do on a computer system, what type of equipment should I know about now, and just a little on the history, past present future, of the hacker.
Welcome to the world of hacking! We, the people who live outside of the normal rules, and have been scorned and even arrested by those from the 'civilized world', are becoming scarcer every day. This is due to the greater fear of what a good hacker (skill wise, no moral judgments here) can do nowadays, thus causing anti- hacker sentiment in the masses. Also, few hackers seem to actually know about the computer systems they hack, or what equipment they will run into on the front end, or what they could do wrong on a system to alert the 'higher' authorities who monitor the system. This article is intended to tell you about some things not to do, even before you get on the system. I will tell you about the new wave of front end security devices that are beginning to be used on computers. I will attempt to instill in you a second identity, to be brought up at time of great need, to pull you out of trouble. And, by the way, I take no, repeat, no, responsibility for what we say in this and the forthcoming articles.
Enough of the bullshit, on to the fun: after logging on your favorite bbs, you see on the high access board a phone number! It says it's a great system to "fuck around with!" This may be true, but how many other people are going to call the same number? So: try to avoid calling a number given to the public. This is because there are at least every other user calling, and how many other boards will that number spread to? If you call a number far, far away, and you plan on going through an extender or a re-seller, don't keep calling the same access number (I.E. As you would if you had a hacker running), this looks very suspicious and can make life miserable when the phone bill comes in the mail. Most cities have a variety of access numbers and services, so use as many as you can. Never trust a change in the system... The 414's, the assholes, were caught for this reason: when one of them connected to the system, there was nothing good there. The next time, there was a trek game stuck right in their way! They proceeded to play said game for two, say two and a half hours, while telenet was tracing them! Nice job, don't you think? If anything looks suspicious, drop the line immediately!! As in, yesterday!! The point we're trying to get across is: if you use a little common sense, you won't get busted. Let the little kids who aren't smart enough to recognize a trap get busted, it will take the heat off of the real hackers. Now, let's say you get on a computer
system... It looks great, checks out, everything seems fine. OK, now is when it gets more dangerous. You have to know the computer system to know what not to do. Basically, keep away from any command something, copy a new file into the account, or whatever! Always leave the account in the same status you logged in with. Change *nothing*... If it isn't an account with priv's, then don't try any commands that require them! All, yes all, systems are going to be keeping log files of what users are doing, and that will show up. It is just like dropping a trouble-card in an ESS system, after sending that nice operator a pretty tone. Spend no excessive amounts of time on the account in one stretch. Keep your calling to the very late night if possible, or during business hours (believe it or not!). It so happens that there are more users on during business hours, and it is very difficult to read a log file with 60 users doing many commands every minute. Try to avoid systems where everyone knows each other, don't try to bluff. And above all: never act like you own the system, or are the best there is. They always grab the people who's heads swell... There is some very interesting front end equipment around nowadays, but first let's define terms... By front end, we mean any device that you must pass through to get at the real computer. There are devices that are made to defeat hacker programs, and just plain old multiplexers. To defeat hacker programs, there are now devices that pick up the phone and just sit there... This means that your device gets no carrier, thus you think there isn't a computer on the other end. The only way around it is to detect when it was picked up. If it picks up after the same number ring, then you know it is a hacker-defeater. These devices take a multi-digit code to let you into the system. Some are, in fact, quite sophisticated to the point where it will also limit the user name's down, so only one name or set of names can be valid logins after they input the code... Other devices input a number code, and then they dial back a pre-programmed number for that code. These systems are best to leave alone, because they know someone is playing with their phone. You may think "but I'll just reprogram the dial-back." Think again, how stupid that is... Then they have your number, or a test loop if you were just a little smarter. If it's your number, they have your balls (if male...), if its a loop, then you are screwed again, since those loops
are *monitored*. As for multiplexers... What a plexer is supposed to do is this:
The system can accept multiple users. We have to time share, so we'll let the front-end processor do it... Well, this is what a multiplexer does. Usually they will ask for something like "enter class" or "line:". Usually it is programmed for a double digit number, or a four to five letter word. There are usually a few sets of numbers it accepts, but those numbers also set your 300/1200/2400 baud data type. These multiplexers are inconvenient at best, so not to worry. A little about the history of hacking: hacking, by my definition, means a great knowledge of some special area. Doctors and lawyers are hackers of a sort, by this definition. But most often, it is being used in the computer context, and thus we have a definition of "anyone who has a great amount of computer or telecommunications knowledge." You are not a hacker because you have a list of codes... Hacking, by my definition, has then been around only about 15 years. It started, where else but, MIT and colleges where they had computer science or electrical engineering departments. Hackers have created some of the best computer languages, the most awesome operating systems, and even gone on to make millions. Hacking used to have a good name, when we could honestly say "we know what we are doing". Now it means (in the public eye): the 414's, Ron Austin, the NASA hackers, the arpanet hackers... All the people who have been caught, have done damage, and are now going to have to face fines and sentences. Thus we come past the moralistic crap, and to our purpose: educate the hacker community, return to the days when people actually knew something...
63. Hacking DEC's by The Jolly Roger
In this article you will learn how to log in to dec's, logging out, and all the fun stuff to do in-between. All of this information is based on a standard dec system. Since there are dec systems 10 and 20, and I favor, the dec 20, there will be more info on them in this article. It just so happens that the dec 20 is also the more common of the two, and is used by much more interesting people (if you know what I mean...) OK, the first thing you want to do when you are receiving carrier from a dec system is to find out the format of login names. You can do this by looking at who is on the system.
Dec=> ` (the 'exec' level prompt)
sy: short for sy(stat) and shows you the system status.
You should see the format of login names. A systat usually comes up in this form:
Job Line Program User
Job: The job number (not important unless you want to log them off later)
Line: What line they are on (used to talk to them...) These are both two or three digit numbers.
Program: What program are they running under? If it says 'exec' they aren't doing anything at all...
User: ahhhahhhh! This is the user name they are logged in under... Copy the format, and hack yourself outa working code... Login format is as such:
you=> login username password
Username is the username in the format you saw above in the systat. After you hit the space after your username, it will stop echoing characters back to your screen. This is the password you are typing in... Remember, people usually use their name, their dog's name, the name of a favorite character in a book, or something like this. A few clever people have it set to a key cluster (qwerty or asdfg). Passwords can be from 1 to 8 characters long, anything after that is ignored. You are finally in... It would be nice to have a little help, wouldn't it? Just type a ? Or the word help, and it will give you a whole list of topics... Some handy characters for you to know would be the control keys, wouldn't it? Backspace on a dec 20 is rub which is 255 on your ASCII chart. On the dec 10 it is control-H. To abort a long listing or a program, control-C works fine. Use Control-O to stop long output to the terminal. This is handy when playing a game, but you don't want to control-C out. Control-T for the time. Control-u will kill the whole line you are typing at the moment. You may accidentally run a program where the only way out is a control-X, so keep that in reserve. Control-s to stop listing, control-Q to continue on both systems. Is your terminal having trouble?? Like, it pauses for no reason, or it doesn't backspace right? This is because both systems support many terminals, and you haven't told it what yours is yet... You are using a VT05 so you need to tell it you are one.
you=> information terminal
(This shows you what your terminal is set up as.)
Dec=>all sorts of shit, then the `
you=> set ter vt05
(This sets your terminal type to VT05.)
Now let's see what is in the account (here after abbreviated acct.) that you have hacked onto. Say:
(Short for directory.)
It shows you what the user of the code has save to the disk. There should be a format like this: xxxxx.Oooxxxxx is the file name, from 1 to 20 characters long. Ooo is the file type, one of: exe, txt, dat, bas, cmd and a few others that are system dependant. Exe is a compiled program that can be run (just by typing its name at the `)
Txt is a text file, which you can see by typing:
Do not try to:
(This is very bad for your terminal and will tell you absolutely nothing.)
Dat is data they have saved.
Bas is a basic program, you can have it typed out for you.
Cmd is a command type file, a little too complicated to go into here. Try:
By the way, there are other users out there who may have files you can use.
(Gee, why else am I here?)
=> dir <*.*> (Dec 20)
=> dir [*,*] (Dec 10)
* is a wildcard, and will allow you to access the files on other accounts if the user has it set for public access. If it isn't set for public access, then you won't see it. To run that program:
you=> username program-name
Username is the directory you saw the file listed under, and file name was what else but the file name? ** You are not alone ** remember, you said (at the very start) sy short for systat, and how we said this showed the other users on the system? Well, you can talk to them, or at least send a message to anyone you see listed in a systat. You can do this by:
dec=> the user list (from your systat)
you=> talkusername (Dec 20)
send username (Dec 10)
Talk allows you and them immediate transmission of whatever you/they type to be sent to the other. Send only allow you one message to be sent, and send, they will send back to you, with talk you can just keep going. By the way, you may be noticing with the talk command that what you type is still acted upon by the parser (control program). To avoid the constant error messages type either:
you=> ;your message
you=> rem your message
the semi-colon tells the parser that what follows is just a comment. Rem is short for 'remark' and ignores you from then on until you type a control-Z or control-C, at which point it puts you back in the exec mode. To break the connection from a talk command type:
you=> break priv's:
If you happen to have privs, you can do all sorts of things. First of all, you have to activate those privs.
This gives you a $ prompt, and allows you to do this: whatever you can do to your own directory you can now do to any other directory. To create a new acct. Using your privs, just type:
If username is old, you can edit it, if it is new, you can define it to be whatever you wish. Privacy means nothing to a user with privs. By the way, there are various levels of privs: operator, wheel, cia. Wheel is the most powerful, being that he can log in from anywhere and have his powers. Operators have their power because they are at a special terminal allowing them the privs. Cia is short for 'confidential information access', which allows you a low level amount of privs. Not to worry though, since you can read the system log file, which also has the passwords to all the other accounts.
To de-activate your privs, type:
when you have played your greedy heart out, you can finally leave the
system with the command:
This logs the job you are using off the system (there may be varients of this such as kjob, or killjob.)
64. Harmless Bombs by The Jolly Roger
To all those who do not wish to inflict bodily damage on their victims but only terror. These are weapons that should be used from high places.
1.The Flour Bomb
Take a wet paper towel and pour a given amount of baking flour in the center. Then wrap it up and put on a rubber band to keep it together. When thrown it will fly well but when it hits, it covers the victim with the flower or causes a big puff of flour which will put the victim in terror since as far as they are concerned, some strange white powder is all over them. This is a cheap method of terror and for only the cost of a roll of paper towels and a bag of flour you and your friends can have loads of fun watching people flee in panic.
2.Smoke Bomb Projectile
All you need is a bunch of those little round smoke bombs and a wrist rocket or any sling-shot. Shoot the smoke bombs and watch the terror since they think it will blow up!
3.Rotten Eggs (Good ones)
Take some eggs and get a sharp needle and poke a small hole in the top of each one. Then let them sit in a warm place for about a week. Then you've got a bunch of rotten eggs that will only smell when they hit.
4.Glow in the Dark Terror
Take one of those tubes of glow in the dark stuff and pour the stuff on whatever you want to throw and when it gets on the victim, they think it's some deadly chemical or a radioactive substance so they run in total panic. This works especially well with flower bombs since a gummy, glowing substance gets all over the victim.
Take a baggy of a water-baking soda solution and seal it. (Make sure there is no air in it since the solution will form a gas and you don't want it to pop on you.) Then put it in a bigger plastic bag and fill it with vinegar and seal it. When thrown, the two substances will mix and cause a violently bubbling substance to go all over the victim.
65. Breaking Into Houses by The Jolly Roger
Okay You Need:
1.Tear Gas or Mace
2.A BB/Pellet Gun
3.An Ice Pick
What You Do Is:
1.Call the house, or ring doorbell, to find out if they're home.
2.If they're not home then...
3.Jump over the fence or walk through gate (whatever).
4.If you see a dog give him the mace or tear gas.
5.Put the gloves on!!!!!!!
6.Shoot the BB gun slightly above the window locks.
7.Push the ice-pick through the hole (made by the BB gun).
9.FIRST...Find the LIVING ROOM. (there're neat things there!).
10.Goto the bedroom to get a pillow case. Put the goodies in the pillow case.
11.Get out <-* FAST! -*>
Notes: You should have certain targets worked out (like computers, Radios, Ect.) Also <-* NEVER *-> Steal from your own neighborhood. If you think they have an alarm...<-* FORGET IT! *->.
66. A Guide to Hypnotism by The Jolly Roger
What hypnotism is?
Hypnotism, contrary to common belief, is merely state when your mind and body are in a state of relaxation and your mind is open to positive, or cleverly worded negative, influences. It is not a trance where you:
· Are totally influenceable.
· Cannot lie.
· A sleep which you cannot wake up from without help.
This may bring down your hope somewhat, but, hypnotism is a powerful for self help, and/or mischief.
Your subconscious mind
Before going in further, I'd like to state that hypnotism not only is great in the way that it relaxes you and gets you (in the long run) what you want, but also that it taps a force of incredible power, believe it or not, this power is your subconscious mind. The subconscious mind always knows what is going on with every part of your body, every moment of the day. It protects you from negative influences, and retains the power to slow your heartbeat down and stuff like that. The subconscious mind holds just about all the info you would like to know
About yourself, or, in this case, the person you will be hypnotizing. There are many ways to talk to your subconscious and have it talk back to you. One way is the ouja board, no its not a spirit, merely the minds of those who are using it. Another, which I will discuss here, is the pendulum method. OK, here is how it goes. First, get a ring or a washer and tie it to a thread a little longer than half of your forearm. Now, take a sheet of paper and draw a big circle in it. In the big circle you must now draw a crosshair (a big +). Now, put the sheet of paper on a table. Next, hold the thread with the ring or washer on it and place it (holding the thread so that the ring is 1 inch above the paper swinging) in the middle of the crosshair. Now, swing the thread so the washer goes up and down, say to yourself the word "Yes" now, do it side to side and say the word "no". Do it counter clockwise and say "I don't know". And lastly, do it clockwise and say "I don't want to say." Now, with the thread back in the middle of the crosshair, ask yourself questions and wait for the pendulum to swing in the direction for the answer. (yes, no, I don't know or I don't want to say...). Soon, to your amazement, it will be answering questions like anything... Let the pendulum answer, don't try.. When you try you will never get an answer. Let the answer come to you.
How to induce hypnotism
Now that you know how to talk to your subconscious mind, I will now tell you how to guide someone into hypnosis. Note that I said guide, you can never, hypnotize someone, they must be willing. OK, the subject must be lying or sitting in a comfortable position, relaxed, and at a time when things aren't going to be interrupted. Tell them the following or something close to it, in a peaceful, monotonous tone (not a commanding tone of voice)
Note: Light a candle and place it somewhere where it can be easily seen.
"Take a deep breath through your nose and hold it in for a count of 8. Now, through your mouth, exhale completely and slowly. Continued breathing long, deep, breaths through your nose and exhaling through your mouth. Tense up all your muscles very tight, now, counting from ten to one, release them slowly, you will find them very relaxed. Now, look at the candle, as you look at it, with every breath and passing moment, you are feeling increasingly more and more peaceful and relaxed. The candles flame is peaceful and bright. As you look at it I will count from 100 down, as a count, your eyes will become more and more relaxed, getting more and more tired with each passing moment." Now, count down from 100, about every 10 numbers say "When I reach xx your eyes (or you will find your eyes) are becoming more and more tired." Tell them they may close their eyes whenever they feel like it. If the persons eyes are still open when you get to 50 then instead of saying "your eyes will.." Say "your eyes are...". When their eyes are shut say the following. As you lie (or sit) here with your eyes comfortably close you find yourself relaxing more and more with each moment and breath. The relaxation feels pleasant and blissful so, you happily give way to this wonderful feeling. Imagine yourself on a cloud, resting peacefully, with a slight breeze caressing your body. A tingling sensation begins to work its way, within and without your toes, it slowly moves up your feet, making them warm, heavy and relaxed. The cloud is soft and supports your body with its soft texture, the scene is peaceful and absorbing, the peacefulness absorbs you completely. The tingling gently and slowly moves up your legs, relaxing them. Making them warm and heavy. The relaxation feels very good, it feels so good to relax and let go. As the tingling continues its journey up into your solar plexus, you feel your inner stomach become very relaxed. Now, it moves slowly into your chest, making your breathing relaxed as well. The feeling begins to move up your arms to your shoulders, making your arms heavy and relaxed as well. You are aware of the total relaxation you are now experiencing, and you give way to it. It is good and peaceful, the tingling now moves into your face and head, relaxing your jaws, neck, and facial muscles, making your cares and worries float away. Away into the blue sky as you rest blissfully on the cloud. If they are not responsive or you think they (he or she) is going to sleep, then add in a "...always concentrating upon my voice, ignoring all other sounds. Even though other sounds exists, they aid you in your relaxation..." They should soon let out a sigh as if they were letting go, and their face should have a "woodiness" to it, becoming featureless... Now, say the following "... You now find yourself in a hallway, the hallway is peaceful and nice. As I count from 10 to 1 you will imagine yourself walking further and further down the hall. When I reach one you will find yourself where you want to be, in another, higher state of conscious and mind. (count from ten to one)..." Do this about three or four times. Then, to test if the subject is under hypnosis or not, say "... You feel a strange sensation in your (arm they write with) arm, the feeling begins at your fingers and slowly moves up your arm, as it moves through your arm your arm becomes lighter and lighter, it will soon be so light it will ... becoming lighter and lighter which each breath and moment..." Their fingers should begin to twitch and then move up, the arm following, now my friend, you have him/her in hypnosis. The first time you do this, while he/she is under say good things, like: "Your going to feel great tomorrow" or "Every day in every way you will find yourself becoming better and better".. Or some crap like that... The more they go under, the deeper in hypnosis they will get each time you do it.
What to do when hypnotized
When you have them under you must word things very carefully to get your way. You cannot simply say... Take off your clothes and fuck the pillow. No, that would not really do the trick. You must say something like.... "you find your self at home, in your room and you have to take a shower (vividly describe their room and what's happening), you begin to take off your clothes..." Now, it can't be that simple, you must know the persons house, room, and shower room. Then describe things vividly and tell them to act it out (they have to be deeply under to do this). I would just suggest that you experiment a while, and get to know how to do things.
Waking up is very easy, just say "...as I count from 1 to 5 you will find yourself becoming more and more awake, more and more lively. When you wake up you will find yourself completely alive, awake, and refreshed. Mentally and physically, remembering the pleasant sensation that hypnosis brings... Waking up feeling like a new born baby, reborn with life and vigor, feeling excellent. Remembering that next time you enter hypnosis it will become an ever increasing deeper and deeper state than before.
1.You feel energy course throughout your limbs.
2.You begin to breathe deeply, stirring.
3.Beginning to move more and more your eyes open, bringing you up to full conscious.
4.You are up, up, up and awakening more and more.
5.You are awake and feeling great.
And that's it! You now know how to hypnotize yourself and someone else.
You will learn more and more as you experiment.
67. The Remote Informer Issue #1 by Tracker and Noman Bates
Welcome to the first issue of 'The Remote Informer'! This newsletter is reader supported. If the readers of this newsletter do not help support it, then it will end. We are putting this out to help out the ones that would like to read it. If you are one of those who thinks they know everything, then don't bother reading it. This newsletter is not anything like the future issues. The future issues will contain several sections, as long as reader input is obtained. Below is an outline overview of the sections in the future issues.
I/O Board (Input/Output Board)
The I/O Board is for questions you have, that we might be able to answer or at least refer you to someone or something. We will be honest if we cannot help you. We will not make up something, or to the effect, just to make it look like we answered you. There will be a section in the I/O Board for questions we cannot answer, and then the readers will have the opportunity to answer it. We will print anything that is reasonable in the newsletter, even complaints if you feel like you are better than everyone.
This section will be for news around the underworld. It will talk of busts of people in the underworld and anything else that would be considered news. If you find articles in the paper, or something happens in your local area, type it up, and upload it to one of the boards listed at the end of the newsletter. Your handle will be placed in the article. If you do enter a news article, please state the date and from where you got it.
The Feature Section will be the largest of the sections as it will be on the topic that is featured in that issue. This will be largely reader input which will be sent in between issues. At the end of the issue at hand, it will tell the topic of the next issue, therefore, if you have something to contribute, then you will have ample time to prepare your article.
In this section, we will review the good and bad points of hardware and software related to the underworld. It will be an extensive review, rather than just a small paragraph.
This section will be the area where the top underworld BBS's, hacking programs, modem scanners, etc. will be shown. This will be reader selected and will not be altered in anyway. The topics are listed below.
· Underworld BBS's (Hack, Phreak, Card, Anarchy, etc.)
· Hacking programs for Hayes compatables
· Hacking programs for 1030/Xm301 modems
· Modem scanners for Hayes compatables
· Modem scanners for 1030/Xm301 modems
· Other type illegal programs
· You may add topics to the list if enough will support it.
This will contain tips and helpful information sent in by the users. If you have any information you wish to contribute, then put it in a text file and upload it to one of the BBS's listed at the end of the newsletter. Please, no long distance codes, mainframe passwords, etc. We may add other sections as time goes by. This newsletter will not be put out on a regular basis. It will be put out when we have enough articles and information to put in it. There may be up to 5 a month, but there will always be at least one a month. We would like you, the readers, to send us anything you feel would be of interest to others, like hacking hints, methods of hacking long distance companies, companies to card from, etc. We will maintain the newsletter as long as the readers support it. That is the end of the introduction, but take a look at this newsletter, as it does contain information that may be of value to you.
Hacking Sprint: The Easy Way
If you hack US Sprint, 950-0777 (by the way it is no longer GTE Sprint), and you are frustrated at hacking several hours only to find one or two codes, then follow these tips, and it will increase your results tremendously. First, one thing that Mr. Mojo proved is that Sprint will not store more than one code in every hundred numbers. (ex: 98765400 to 98765499 may contain only one code). There may NOT be a code in that hundred, but there will never be more than one. Sprint's 9 digit codes are stored from 500000000 through 999999999. In the beginning of Sprint's 950 port, they only had 8 digit codes. Then they started converting to 9 digit codes, storing all 8 digit codes between 10000000 and 49999999 and all 9 digit codes between 500000000 and 999999999. Sprint has since canceled most 8 digit codes, although there are a few left that have been denoted as test codes. Occasionally, I hear of phreaks saying they have 8 digit codes, but when verifying them, the codes were invalid. Now, where do you start? You have already narrowed the low and high numbers in half, therefore already increasing your chances of good results by 50 percent. The next step is to find a good prefix to hack. By the way, a prefix, in hacking terms, is the first digits in a code that can be any length except the same number of digits the code is. (ex: 123456789 is a code. That means 1, 12, 123, 1234, 12345, 123456, 1234567, and 12345678 are prefixes) The way you find a good prefix to hack is to manually enter a code prefix. If when you enter the code prefix and a valid destination number and you do not hear the ringing of the recording telling you that the code is invalid until near the end of the number, then you know the prefix is valid. Here is a chart to follow when doing this:
Code - Destination Range good codes exist
123456789 - 6192R 123400000 - 123499999
123456789 - 619267R 123450000 - 123459999
123456789 - 61926702R 123456000 - 123456999
123456789 - 6192670293R 123456700 - 123456799
( R - Denotes when ring for recording starts)
To prove this true, I ran a test using OmniHack 1.3p, written by Jolly Joe. In this test I found a prefix where the last 3 digits were all I had to hack. I tested each hundred of the 6 digit prefix finding that all but 4 had the ring start after the fourth digit was dialed in the destination number. The other four did not ring until I had finished the entire code. I set OmniHack to hack the prefix + 00 until prefix + 99. (ex: xxxxxxy00 to xxxxxxy99: where y is one of the four numbers that the ring did not start until the dialing was completed.) Using this method, I found four codes in a total of 241 attempts using ascending hacking (AKA: Sequential). Below you will see a record of my hack:
Range of hack Codes found Tries
xxxxxx300 - xxxxxx399 xxxxxx350 50
xxxxxx500 - xxxxxx599 xxxxxx568 68
xxxxxx600 - xxxxxx699 xxxxxx646 46
xxxxxx800 - xxxxxx899 xxxxxx877 77
Totals 4 codes 241
As you see, these methods work. Follow these guidelines and tips and you should have an increase in production of codes in the future hacking Sprint. Also, if you have any hints/tips you think others could benefit from, then type them up and upload them to one of the boards at the end of the newsletter.
Rumors: Why Spread Them?
Do you ever get tired of hearing rumors? You know, someone gets an urge to impress others, so they create a rumor that some long distance company is now using tracing equipment. Why start rumors? It only scares others out of phreaking, and then makes you, the person who started the rumor, look like Mr. Big. This article is short, but it should make you aware of the rumors that people spread for personal gain. The best thing to do is to denote them as a rumor starter and then leave it at that. You should not rag on them constantly, since if the other users cannot determine if it is fact or rumor, then they should suffer the consequences.
The New Sprint FON Calling Cards
US Sprint has opened up a new long distance network called the Fiber Optic Network (FON), in which subscribers are given calling cards. These calling cards are 14 digits, and though, seem randomly generated, they are actually encrypted. The rumors floating around about people getting caught using the Sprint FON calling cards are fact, not rumors. The reason people are getting caught is that they confuse the FON calling cards with the local 950 port authorization codes. If you will remember, you never use AT&T calling cards from you home phone. It has ANI capability, which is not tracing, but rather the originating phone number is placed on the bill as soon as the call is completed. They know your phone number when you call the 800 access port, but they do not record it until your call is completed. Also, through several of my hacks, I came up with some interesting information surrounding the new Sprint network. They are listed below.
800-877-0000 - This number is for information on US Sprint's 800 calling card service. I have not played around with it, but I believe it is for trouble or help with the FON calling cards. I am not sure if it is for subscribing to the FON network.
800-877-0002 - You hear a short tone, then nothing.
800-877-0003 - US Sprint Alpha Test Channel #1
800-877-(0004-0999) - When you call these numbers, you get a recording saying: "Welcome to US Sprint's 1 plus service." When the recording stops, if you hit the pound key (#) you will get the calling card dial tone.
Other related Sprint numbers
800-521-4949 - This is the number that you subscribe to US Sprint with. You may also subscribe to the FON network on this number. It will take 4 to 5 weeks for your calling card to arrive.
10777 - This is US Sprint's equal access number. When you dial this number, you then dial the number you are calling, and it will be billed through US Sprint, and you will receive their long distance line for that call. Note that you will be billed for calls made through equal access. Do not mistake it to be a method of phreaking, unless used from a remote location. If you are in US Sprint's 1+ service then call 1+700-555-1414, which will tell you which long distance company you are using. When you hear: "Thank you for choosing US Sprint's 1 plus service," hit the pound key (#), and then you will get the US Sprint dial tone. This however is just the same as if you are calling from your home phone if you dial direct, so you would be billed for calls made through that, but there are ways to use this to your advantage as in using equal access through a PBX.
Automatic Number Identification (ANI)
The true definition for Automatic Number Identification has not been widely known to many. Automatic Number Identification, (AKA: ANI), is the process of the destination number knowing the originating number, which is where you are calling from. The method of achieving this is to send the phone number that you are calling from in coded form ahead of the destination number. Below is an example of this.
* - Denotes the originating number which is coded and sent before the
As you noticed there are 8 digits in the coded number. This is because, at least I believe, it is stored in a binary-like form. Automatic Number Identification means a limited future in phreaking. ANI does not threaten phreaking very much yet, but it will in the near future. A new switching system will soon be installed in most cities that are covered by ESS, Electronic Switching System, now. The system will have ANI capabilities which will be supplied to the owners of phone lines as an added extra. The owner's phone will have an LED read-out that will show the phone number of the people that call you. You will be able to block some numbers, so that people cannot call you. This system is in the testing stages currently, but will soon be installed across most of the country. As you see, this will end a large part of phreaking, until we, the phreakers, can come up with an alternative. As I have been told by several, usually reliable, people, this system is called ISS, which I am not sure of the meaning of this, and is being tested currently in Rhode Island. 800 in-watts lines set up by AT&T support ANI. The equipment to decode an ANI coded origination number does not costs as much as you would expect. 950 ports do not offer ANI capability, no matter what you have been told. The 950 ports will only give the city in which they are based, this usually being the largest in the state, sometimes the capitol. One last thing that I should tell you is that ANI is not related to tracing. Tracing can be done on any number whether local, 950, etc. One way around this, especially when dialing Alliance TeleConferencing, is to dial through several extenders or ports. ANI will only cover the number that is calling it, and if you call through a number that does not support ANI, then your number will never be known.
68. Jackpotting ATM Machines by The Jolly Roger
JACKPOTTING was done rather successfully a while back in (you guessed it) New York. What the culprits did was sever (actually cross over) the line between the ATM and the host. Insert a microcomputer between the ATM and the host. Insert a fraudulent card into the ATM. (By card I mean cash card, not hardware.) What the ATM did was: send a signal to the host, saying "Hey! Can I give this guy money, or is he broke, or is his card invalid?" What the microcomputer did was: intercept the signal from the host, discard it, send "there's no one using the ATM" signal. What the host did was: get the "no one using" signal, send back "okay, then for God's sake don't spit out any money!" signal to ATM. What the microcomputer did was intercept the signal (again), throw it away (again), send "Wow! That guy is like TOO rich! Give him as much money as he wants. In fact, he's so loaded, give him ALL the cash we have! He is really a valued customer." signal. What the ATM did: what else? Obediently dispense cash till the cows came home (or very nearly so). What the crooks got was well in excess of $120,000 (for one weekend's work), and several years when they were caught. This story was used at a CRYPTOGRAPHY conference I attended a while ago to demonstrate the need for better information security. The lines between ATM's & their hosts are usually 'weak' in the sense that the information transmitted on them is generally not encrypted in any way. One of the ways that JACKPOTTING can be defeated is to encrypt the information passing between the ATM and the host. As long as the key cannot be determined from the ciphertext, the transmission (and hence the transaction) is secure. A more believable, technically accurate story might concern a person who uses a computer between the ATM and the host to determine the key before actually fooling the host. As everyone knows, people find cryptanalysis a very exciting and engrossing subject..don't they? (Hee-Hee)
| |-<<-| |-<<-| |
|ATM| micro |Host|
The B of A ATM's are connected through dedicated lines to a host computer as the Bishop said. However, for maintenance purposes, there is at least one separate dial-up line also going to that same host computer. This guy basically BS'ed his way over the phone till he found someone stupid enough to give him the number. After finding that, he had has Apple hack at the code. Simple.
Next, he had a friend go to an ATM with any B of A ATM card. He stayed at home with the Apple connected to the host. When his friend inserted the card, the host displayed it. The guy with the Apple modified the status & number of the card directly in the host's memory. He turned the card into a security card, used for testing purposes. At that point, the ATM did whatever it's operator told it to do.
The next day, he went into the bank with the $2000 he received, talked to the manager and told him every detail of what he'd done. The manager gave him his business card and told him that he had a job waiting for him when he got out of school.
Now, B of A has been warned, they might have changed the system. On the other hand, it'd be awful expensive to do that over the whole country when only a handful of people have the resources and even less have the intelligence to duplicate the feat. Who knows?
69. Jug Bomb by The Jolly Roger
Take a glass jug, and put 3 to 4 drops of gasoline into it. Then put the cap on, and swish the gas around so the inner surface of the jug is coated. Then add a few drops of potassium permanganate solution into it and cap it. To blow it up, either throw it at something, or roll it at something.
70. Fun at K-Mart by The Jolly Roger
Well, first off, one must realize the importance of K-Marts in society today. First off, K-Marts provide things cheaper to those who can't afford to shop at higher quality stores. Although, all I ever see in there is minorities and Senior Citizens, and the poor people in our city. Personally, I wouldn't be caught dead in there. But, once, I did. You see, once, after The Moon Roach and Havoc Chaos (Dear friends of mine) and I were exploring such fun things as rooftops, we came along a K-Mart. Amused, and cold for that matter, we wandered in. The Tension mounts. As we walked up to the entrance, we were nearly attacked by Youth Groups selling cheap cookies, and wheelchair sticken people selling American Flags. After laughing at these people, we entered. This is where the real fun begins... First, we wandered around the store, and turned on all the blue lights we could find. That really distracts and confuses the attendents...Fun to do... The first neat thing, is to go to the section of the store where they sell computers. Darkness engulfs the earth the day they find Apple Computers being sold there. Instead, lesser computers like the laughable C-64 can be found there...Turn it on, and make sure nobody's looking...Then, once in Basic, type...
]10 PRINT "Fuck the world! Anarchy Rules!" (or something to that effect.)
]20 GOTO 10 and walk away.
Also, set the sample radios in the store to a satanic rock station, and turn the radio off. Then, set the alarm for two minutes ahead of the time displayed there. Turn the volume up all the way, and walk away. After about two minutes, you will see the clerk feebly attempt to turn the radio down or off. It's really neat to set ten or more radios to different stations, and walk away. One of my favorite things to do, is to get onto the intercom system of the store. Easier typed then done. First, check out the garden department. You say there's no attendent there? Good. Sneak carefully over to the phone behind the cheap counter there, and pick it up. Dial the number corresponding to the item that says 'PAGE'... And talk. You will note that your voice will echo all over the bowels of K-Mart. I would suggest announcing something on the lines of: "Anarchy rules!!"
71. Mace Substitute by The Jolly Roger
· 3 parts Alcohol
· « part Iodine
· « part Salt
· 3 parts Alcohol
· 1 part Iodized Salt (Mortons)
It's not actual mace, but it does a damn good job on the eyes...
72. How to grow Marijuana by The Jolly Roger
Marijuana is a deciduous plant which grows from seeds. The fibrous section of the plant was (has been replaced by synthetics) used to make rope. The flowering tops, leaves, seeds, and resin of the plant is used by just about everyone to get HIGH. Normally, the vegetable parts of the plant are smoked to produce this "high," but they can also be eaten. The active ingredient in marijuana resin is THC (Tetahydrocannabinol). Marijuana contains from 1%-4% THC (4% must be considered GOOD dope). Marijuana grows wild in many parts of the world, and is cultivated in Mexico, Vietnam, Africa, Nepal, India, South America, etc. The marijuana sold in the United States comes primarily from, yes, the United States. It is estimated that at least 50% of the grass on the streets in America is homegrown. The next largest bunch comes across the borders from Mexico, with smaller amounts filtering in from Panama, occasionally South America, and occasionally, Africa. Hashish is the pure resin of the marijuana plant, which is scraped from the flowering tops of the plant and lumped together. Ganja is the ground-up tops of the finest plants. (It is also the name given to any sort of marijuana in Jamaica.) Marijuana will deteriorate in about two years if exposed to light, air or heat. It should always be stored in cool places. Grass prices in the United States are a direct reflection of the laws of supply and demand (and you thought that high school economics would never be useful). A series of large border busts, a short growing season, a bad crop, any number of things can drive the price of marijuana up. Demand still seems to be on the increase in the US, so prices seldom fall below last year's level. Each year a small seasonal drought occurs, as last year's supply runs low, and next year's crop is not up yet. Prices usually rise about 20%-75% during this time and then fall back to "normal." Unquestionably, a large shortage of grass causes a percentage of smokers to turn to harder drugs instead. For this reason, no grass control program can ever be beneficial or "successful."
There is one surefire way of avoiding high prices and the grass DT's: Grow your own. This is not as difficult as some "authorities" on the subject would make you believe. Marijuana is a weed, and a fairly vivacious one at that, and it will grow almost in spite of you.
Contrary to popular belief, grass grows well in many place on the North American continent. It will flourish even if the temperature does not raise above 75ø. The plants do need a minimum of eight hours of sunlight per day and should be planted in late April/early May, BUT DEFINITELY, after the last frost of the year. Growing an outdoor, or "au naturel", crop has been the favored method over the years, because grass seems to grow better without as much attention when in its natural habitat. Of course, an outdoors setting requires special precautions not encountered with an indoors crop; you must be able to avoid detection, both from law enforcement freaks and common freaks, both of whom will take your weed and probably use it. Of course, one will also arrest you. You must also have access to the area to prepare the soil and harvest the crop. There are two schools of thought about starting the seeds. One says you should start the seedlings for about ten days in an indoor starter box (see the indoor section) and then transplant. The other theory is that you should just start them in the correct location. Fewer plants will come up with this method, but there is no shock of transplant to kill some of the seedlings halfway through. The soil should be prepared for the little devils by turning it over a couple of times and adding about one cup of hydrated lime per square yard of soil and a little bit (not too much, now) of good water soluble nitrogen fertilizer. The soil should now be watered several times and left to sit about one week. The plants should be planted at least three feet apart, getting too greedy and stacking them too close will result in stunted plants. The plants like some water during their growing season, BUT not too much. This is especially true around the roots, as too much water will rot the root system. Grass grows well in corn or hops, and these plants will help provide some camouflage. It does not grow well with rye, spinach, or pepperweed. It is probably a good idea to plant in many small, broken patches, as people tend to notice patterns.
GENERAL GROWING INFO
Both the male and he female plant produce THC resin, although the male is not as strong as the female. In a good crop, the male will still be plenty smokable and should not be thrown away under any circumstances. Marijuana can reach a height of twenty feet (or would you rather wish on a star) and obtain a diameter of 4« inches. If normal, it has a sex ratio of about 1:1, but this can be altered in several ways. The male plant dies in the 12th week of growing, the female will live another 3-5 weeks to produce her younguns. Females can weigh twice as much as males when they are mature. Marijuana soil should compact when you squeeze it, but should also break apart with a small pressure and absorb water well. A nice test for either indoor or outdoor growing is to add a bunch of worms to the soil, if they live and hang around, it is good soil, but if they don't, well, change it. Worms also help keep the soil loose enough for the plants to grow well.
To get good grass, you should start with the right seeds. A nice starting point is to save the seeds form the best batch you have consumed. The seeds should be virile, that is, they should not be gray and shriveled up, but green, meaty, and healthy appearing. A nice test is to drop the seeds on a hot frying pan. If they "CRACK," they are probably good for planting purposes. The seeds should be soaked in distilled water overnight before planting. BE SURE to plant in the ground with the pointy end UP. Plant about «" deep. Healthy seeds will sprout in about five days.
The best all around sprouting method is probably to make a sprouting box (as sold in nurseries) with a slated bottom or use paper cups with holes punched in the bottoms. The sprouting soil should be a mixture of humus, soil, and five sand with a bit of organic fertilizer and water mixed in about one week before planting. When ready to transplant, you must be sure and leave a ball of soil around the roots of each plant. This whole ball is dropped into a baseball-sized hold in the permanent soil. If you are growing/transplanting indoors, you should use a green safe light (purchased at nurseries) during the transplanting operation. If you are transplanting outdoors, you should time it about two hours before sunset to avoid damage to the plant. Always wear cotton gloves when handling the young plants. After the plants are set in the hole, you should water them. It is also a good idea to use a commercial transplant chemical (also purchased at nurseries) to help then overcome the shock.
Indoor growing has many advantages, besides the apparent fact that it is much harder to have your crop "found," you can control the ambient conditions just exactly as you want them and get a guaranteed "good" plant. Plants grown indoors will not appear the same as their outdoor cousins. They will be scrawnier appearing with a weak stems and may even require you to tie them to a growing post to remain upright, BUT THEY WILL HAVE AS MUCH OR MORE RESIN! If growing in a room, you should put tar paper on the floors and then buy sterilized bags of soil form a nursery. You will need about one cubic foot of soil for each plant. The plants will need about 150 mL. of water per plant/per week. They will also need fresh air, so the room must be ventilated. (However, the fresh air should contain NO TOBACCO smoke.) At least eight hours of light a day must be provided. As you increase the light, the plants grow faster and show more females/less males. Sixteen hours of light per day seems to be the best combination, beyond this makes little or no appreciable difference in the plant quality. Another idea is to interrupt the night cycle with about one hour of light. This gives you more females. The walls of your growing room should be painted white or covered with aluminum foil to reflect the light. The lights themselves can be either bulbs of fluorescent. Figure about 75 watts per plant or one plant per two feet of fluorescent tube. The fluorescents are the best, but do not use "cool white" types. The light sources should be an average of twenty inches from the plant and NEVER closer than 14 inches. They may be mounted on a rack and moved every few days as the plants grow. The very best light sources are those made by Sylvania and others especially for growing plants (such as the "gro lux" types).
HARVESTING AND DRYING
The male plants will be taller and have about five green or yellow sepals, which will split open to fertilize the female plant with pollen. The female plant is shorter and has a small pistillate flower, which really doesn't look like a flower at all but rather a small bunch of leaves in a cluster. If you don't want any seeds, just good dope, you should pick the males before they shed their pollen as the female will use some of her resin to make the seeds. After another three to five weeks, after the males are gone, the females will begin to wither and die (from loneliness?), this is the time to pick. In some nefarious Middle Eastern countries, farmers reportedly put their beehives next to fields of marijuana. The little devils collect the grass pollen for their honey, which is supposed to contain a fair dosage of THC. The honey is then enjoyed by conventional methods or made into ambrosia. If you want seeds - let the males shed his pollen then pick him. Let the female go another month and pick her. To cure the plants, they must be dried. On large crops, this is accomplished by constructing a drying box or drying room. You must have a heat source (such as an electric heater) which will make the box/room each 130ø. The box/room must be ventilated to carry off the water-vapor-laden air and replace it with fresh. A good box can be constructed from an orange crate with fiberglass insulated walls, vents in the tops, and screen shelves to hold the leaves. There must be a baffle between the leaves and the heat source. A quick cure for smaller amounts is to: cut the plant at the soil level and wrap it in a cloth so as not to loose any leaves. Take out any seeds by hand and store. Place all the leaves on a cookie sheet or aluminum foil and put them in the middle shelf of the oven, which is set on "broil." In a few seconds, the leaves will smoke and curl up, stir them around and give another ten seconds before you take them out.
TO INCREASE THE GOOD STUFF
There are several tricks to increase the number of females, or the THC content of plants: You can make the plants mature in 36 days if you are in a hurry, by cutting back on the light to about 14 hours, but the plants will not be as big. You should gradually shorten the light cycle until you reach fourteen hours. You can stop any watering as the plants begin to bake the resin rise to the flowers. This will increase the resin a bit. You can use a sunlamp on the plants as they begin to develop flower stalks. You can snip off the flower, right at the spot where it joins the plant, and a new flower will form in a couple of weeks. This can be repeated two or three times to get several times more flowers than usual.
If the plants are sprayed with Ethrel early in their growing stage, they will produce almost all female plants. This usually speeds up the flowering also, it may happen in as little as two weeks. You can employ a growth changer called colchicine. This is a bit hard to get and expensive. (Should be ordered through a lab of some sort and costs about $35 a gram.) To use the colchicine, you should prepare your presoaking solution of distilled water with about 0.10 per cent colchicine. This will cause many of the seeds to die and not germinate, but the ones that do come up will be polyploid plants. This is the accepted difference between such strains as "gold" and normal grass, and yours will DEFINITELY be superweed. The problem here is that colchicine is a poison in larger quantities and may be poisonous in the first generation of plants. Bill Frake, author of CONNOISSEUR'S HANDBOOK OF MARIJUANA runs a very complete colchicine treatment down and warns against smoking the first generation plants (all succeeding generations will also be polyploid) because of this poisonous quality. However, the Medical Index shows colchicine being given in very small quantities to people for treatment if various ailments. Although these quantities are small, they would appear to be larger than any you could receive form smoking a seed-treated plant. It would be a good idea to buy a copy of CONNOISSEUR'S, if you are planning to attempt this, and read Mr. Drake's complete instructions. Another still-experimental process to increase the resin it to pinch off the leaf tips as soon as they appear from the time the plant is in the seedling stage on through its entire life-span. This produces a distorted, wrecked-looking plant which would be very difficult to recognize as marijuana. Of course, there is less substance to this plant, but such wrecked creatures have been known to produce so much resin that it crystallizes a strong hash all over the surface of the plant - might be wise to try it on a plant or two and see what happens.
PLANT PROBLEM CHART
Always check the overall environmental conditions prior to passing judgment - soil around 7 pH or slightly less - plenty of water, light, fresh air, loose soil, no water standing in pools.
SYMPTOM PROBABLY PROBLEM/CURE
Larger leaves turning yellow - smaller leaves still green. Nitrogen deficiency - add nitrate of soda or organic fertilizer.
Older leaves will curl at edges, turn dark, possibly with a purple cast. Phosphorous deficiency - add commercial phosphate.
Mature leaves develop a yellowish cast to least venial areas. Magnesium deficiency - add commercial fertilizer with a magnesium content.
Mature leaves turn yellow and then become spotted with edge areas turning dark gray. Potassium deficiency - add muriate of potash.
Cracked stems, no healthy support tissue. Boron deficiency - add any plant food containing boron.
Small wrinkled leaves with yellowish vein systems. Zinc deficiency - add commercial plant food containing zinc.
Young leaves become deformed, possibly yellowing. Molybdenum deficiency - use any plant food with a bit of molybdenum in it.
EXTRA SECTION: BAD WEED/GOOD WEED
Can you turn bad weed into good weed? Surprisingly enough, the answer to this often-asked inquiry is, yes! Like most other things in life, the amount of good you are going to do relates directly to how much effort you are going to put into it. There are no instant, supermarket products which you can spray on Kansas catnip and have wonderweed, but there are a number of simplified, inexpensive processes (Gee, Mr. Wizard!) which will enhance mediocre grass somewhat, and there are a couple of fairly involved processes which will do up even almost-parsley weed into something worth writing home about.
1.Place the dope in a container which allows air to enter in a restricted fashion (such as a can with nail holes punched in its lid) and add a bunch of dry ice, and the place the whole shebang in the freezer for a few days. This process will add a certain amount of potency to the product, however, this only works with dry ice, if you use normal, everyday freezer ice, you will end up with a soggy mess...
2.Take a quantity of grass and dampen it, place in a baggy or another socially acceptable container, and store it in a dark, dampish place for a couple of weeks (burying it also seems to work). The grass will develop a mold which tastes a bit harsh, a and burns a tiny bit funny, but does increase the potency.
3.Expose the grass to the high intensity light of a sunlamp for a full day or so. Personally, I don't feel that this is worth the effort, but if you just spent $400 of your friend's money for this brick of super-Colombian, right-from-the-President's-personal-stash, and it turns out to be Missouri weed, and you're packing your bags to leave town before the people arrive for their shares, well, you might at least try it. Can't hurt.
4.Take the undesirable portions of our stash (stems, seeds, weak weed, worms, etc.) and place them in a covered pot, with enough rubbing alcohol to cover everything. Now CAREFULLY boil the mixture on an ELECTRIC stove or lab burner. DO NOT USE GAS - the alcohol is too flammable. After 45 minutes of heat, remove the pot and strain the solids out, SAVING THE ALCOHOL. Now, repeat the process with the same residuals, but fresh alcohol. When the second boil is over, remove the solids again, combine the two quantities of alcohol and reboil until you have a syrupy mixture. Now, this syrupy mixture will contain much of the THC formerly hidden in the stems and such. One simply takes this syrup the thoroughly combines it with the grass that one wishes to improve upon.
SPECIAL SECTION ON RELATED SUBJECT MARYGIN
Marygin is an anagram of the words marijuana and gin, as in Eli Whitney. It is a plastic tumbler which acts much like a commercial cotton gin. One takes about one ounce of an herb and breaks it up. This is then placed in the Marygin and the protruding knob is rotated. This action turns the internal wheel, which separates the grass from the debris (seeds, stems). It does not pulverize the grass as screens have a habit of doing and is easily washable.
Marygin is available from:
P.O. Box 5827
Tuscon, Arizona 85703
Edmund Scientific Company
555 Edscorp Building
Barrington, New Jersy 08007
Free Catalog is a wonder of good things for the potential grass grower. They have an electric thermostat greenhouse for starting plants. Lights which approximate the true color balance of the sun and are probably the most beneficial types available: 40 watt, 48 inch Indoor sun bulb, 75 or 150 watt And, they have a natural growth regulator for plants (Gibberellin) which can change height, speed growth, and maturity, promote blossoming, etc. Each plant reacts differently to treatment with Gibberellin...there's no fun like experimenting.
THE CONNOISSEUR'S HANDBOOK OF MARIJUANA, Bill Drake
Straight Arrow Publishing - $3«0
625 Third Street
San Francisco, California
San Fransicso, California 94116
Stocks a series of pamphlets on grass, dope manufacture, cooking. Includes the Mary Jane Superweed series.
73. Match Head Bomb by The Jolly Roger
Simple safety match heads in a pipe, capped at both ends, make a devastating bomb. It is set off with a regular fuse. A plastic baggy is put into the pipe before the heads go in to prevent detonation by contact with the metal. Cutting enough match heads to fill the pipe can be tedious work for one but an evening's fun for the family if you can drag them away from the TV.
74. How To Terrorize McDonalds by The Jolly Roger
Now, although McDonalds is famous for it's advertising and making the whole world think that the BigMac is the best thing to come along since sliced bread (buns?), each little restaurant is as amateur and simple as a new-found business. Not only are all the employees rather inexperienced at what they're supposed to do, but they will just loose all control when an emergency occurs....here we go!!! First, get a few friends (4 is good...I'll get to this later) and enter the McDonalds restaurant, talking loudly and reeking of some strange smell that automatically makes the old couple sitting by the door leave. If one of those pimply-faced goons is wiping the floor, then track some crap all over it (you could pretend to slip and break your head, but you might actually do so). Next, before you get the food, find a table. Start yelling and releasing some strange body odor so anybody would leave their table and walk out the door. Sit two friends there, and go up to the counter with another. Find a place where the line is short, or if the line is long say "I only wanna buy a coke." and you get moved up. Now, you get to do the ordering ...heh heh heh. Somebody always must want a plain hamburger with absolutely nothing on it (this takes extra time to make, and drives the little hamburger-makers insane)..order a 9-pack of chicken McNuggets...no, a 20 pack...no, three 6 packs...wait...go back to the table and ask who wants what. Your other friend waits by the counter and makes a pass at the female clerk. Get back to the thing and order three 6-packs of chicken etc....now she says "What kind of sauce would you like?". Of course, say that you all want barbecue sauce one of your friends wants 2 (only if there are only 2 containers of barbecue sauce left). Then they hafta go into the storeroom and open up another box. Finally, the drinks...somebody wants coke, somebody root beer, and somebody diet coke. After these are delivered, bring them back and say "I didn't order a diet coke! I ordered a sprite!" This gets them mad; better yet, turn down something terrible that nobody wants to drink, so they hafta throw the drink away; they can't sell it. After all the food(?) is handed to you, you must never have enough money to pay. The clerk will be so angry and confused that she'll let you get away with it (another influence on her is your friend asking her "If you let us go, I'll go out with you." and giving her a fake fone number). Now, back to your table. But first, somebody likes ketchup and mustard. And plenty (too much) of napkins. Oh, and somebody likes forks and knives, so always end up breaking the ones you pick outta the box. Have your friends yell out, “Yay!!!!! We have munchies!!" As loud as they can. That'll worry the entire restaurant. Proceed to sit down. So, you are sitting in the smoking section (by accident) eh? Well, while one of the tobacco-breathers isn't looking, put a sign from the other side of the room saying "Do not smoke here" and he'll hafta move...then he goes into the real non-smoking section, and gets yelled at. He then thinks that no smoking is allowed in the restaurant, so he eats outside (in the pouring rain) after your meal is finished (and quite a few splattered-opened ketchup packets are all over your table), try to leave. But oops! Somebody has to do his duty in the men's room. As he goes there, he sticks an uneaten hamburger (would you dare to eat one of their hamburgers?) Inside the toilet, flushes it a while, until it runs all over the bathroom. Oops! Send a pimply-faced teenager to clean it up. (He won't know that brown thing is a hamburger, and he'll get sick. Wheee!) As you leave the restaurant, looking back at your uncleaned table, somebody must remember that they left their chocolate shake there! The one that's almost full!!!! He takes it then says "This tastes like crap!", Then he takes off the lid and throws it into the garbage can...oops! He missed, and now the same poor soul who's cleaning up the bathroom now hasta clean up chocolate shake. Then leave the joint, reversing the "Yes, we're open" sign (as a reminder of your visit) There you have it! You have just put all of McDonalds into complete mayhem. And since there is no penalty for littering in a restaurant, bugging people in a public eatery (or throw-upery, in this case) you get off scot-free. Wasn't that fun?
75. "Mentor's Last Words" by +++The Mentor+++
The following file is being reprinted in honor and sympathy for the many phreaks and hackers that have been busted recently by the Secret Service.
The Conscience of a Hacker
Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They're all alike. But did you, in your three-piece psychology and 1950's technobrain, ever take a look behind the eyes of the hacker? Did you ever wonder what made him tick, what forces shaped him, what may have molded him? I am a hacker, enter my world... Mine is a world that begins with school... I'm smarter than most of the other kids, this crap they teach us bores me... Damn underachiever. They're all alike. I'm in junior high or high school. I've listened to teachers explain for the fifteenth time how to reduce a fraction. I understand it. "No, Ms. Smith, I didn't show my work. I did it in my head..." Damn kid. Probably copied it. They're all alike. I made a discovery today. I found a computer. Wait a second, this is cool. It does what I want it to. If it makes a mistake, it's because I screwed it up. Not because it doesn't like me or feels threatened by me or thinks I'm a smart ass or doesn't like teaching and shouldn't be here...damn kid. All he does is play games. They're all alike. And then it happened. A door opened to a world. Rushing through the phone line like heroin through an addict's veins, an electronic pulse is sent out, a refuge from the day-to-day incompetencies is sought... a board is found. "This is it... this is where I belong..." I know everyone here... even if I've never met them, never talked to them, may never hear from them again... I know you all... Damn kid. Tying up the phone line again. They're all alike... You bet your ass we're all alike... we've been spoon-fed baby food at school when we hungered for steak... the bits of meat that you did let slip through were pre-chewed and tasteless. We've been dominated by sadists, or ignored by the apathetic. The few that had something to teach found us willing pupils, but those few are like drops of water in the desert.
This is our world now... the world of the electron and the switch, the beauty of the baud. We make use of a service already existing without paying for what could be dirt-cheap if it wasn't run by profiteering gluttons, and you call us criminals. We explore... and you call us criminals. We seek after knowledge... and you call us criminals. We exist without skin color, without nationality, without religious bias... and you call us criminals. You build atomic bombs, you wage wars, you murder, cheat, and lie to us and try to make us believe it's for our own good, yet we're the criminals.
Yes, I am a criminal. My crime is that of curiosity. My crime is that of judging people by what they say and think, not what they look like. My crime is that of outsmarting you, something that you will never forgive me for. I am a hacker, and this is my manifesto. You may stop this individual, but you can't stop us all... after all, we're all alike.
May the members of the phreak community never forget his words -JR
76. The Myth of the 2600hz Detector by The Jolly Roger
Just about everyone I talk to these days about ESS seems to be scared witless about the 2600hz detector. I don't know who thought this one up, but it simply does not exist. So many of you people whine about this so-called phreak catching device for no reason. Someone with AT&T said they had it to catch phreakers. This was just to scare the blue-boxers enough to make them quit boxing free calls. I'm not saying ESS is without its hang-ups, either. One thing that ESS can detect readily is the kick-back that the trunk circuitry sends back to the ESS machine when your little 2600hz tone resets the toll trunk. After an ESS detects a kickback it turns an M-F detector on and records any M-F tones transmitted.
Defeating the kick-back detector
As mentioned in my previous note, kick-back detection can be a serious nuisance to anyone interested in gaining control of a trunk line. The easiest way to by-pass this detection circuitry is not really by-passing it at all, it is just letting the kick-back get detected on some other line. This other line is your local MCI, sprint, or other long distance carrier (except AT&T). The only catch is that the service you use must not disconnect the line when you hit the 2600hz tone. This is how you do it: call up your local extender, put in the code, and dial a number in the 601 area code and the 644 exchange. Lots of other exchanges work across the country, I'm sure, but this is the only one that I have found so far. Anyway, when it starts ringing, simply hit 2600Hz and you'll hear the kick-back, (ka-chirp, or whatever). Then you are ready to dial whoever you want (conferences, inward, route and rate, overseas, etc.) From the trunk line in operator tones! Since blowing 2600Hz doesn't make you a phreaker until the toll equipment resets the line, kickback detection is the method AT&T chooses (for now) this information comes as a result of my experiments & experience and has been verified by local AT&T employees I have as acquaintances. They could only say that this is true for my area, but were pretty sure that the same idea is implemented across the country.
Now that you know how to access a trunk line or as operators say a loop, I will tell you the many things you can do with it. Here is a list of AT&T services accessible to you by using a blue box.
A/C+101 TOLL SWITCHING
A/C+121 INWARD OPERATOR
A/C+141 ROUTE & RATE OP.
A/C+11501 MOBILE OPERATOR
A/C+11521 MOBILE OPERATOR
This is one the most useful attributes of blue boxing. Now the confs. are up 24 hours/day and 7 days/week and the billing lines are being billed. Since I believe the above is true (about the billing lines being billed) I would recommend that you never let your number show up on the conf. If you started it, put it on a loop and then call the loop. Enough bullshit!!!!! To start the conf. Dial one of these three numbers in m-f while you are on the trunk.
These numbers are in LA and are the most watched, I do not advise using this
312+001+1050 OR 3050
914+042+1050 OR 1100,1200 ECT..
I believe only 914 works at the moment.
Once connected with one of these you will either hear a re-order, busy, or chirp. When you hear the chirp enter the billing line in M-F. I use the conf. dial- up. A billing line example: kp312+001+1050st you will then hear two tutes and a recording asking you for the number of conferees including yourself. Enter a number between 20 and 30. If you ever get over 30 people on a conference all you will hear is jumbled voices. After the it says "your conference size is xx" then hit the pound (#) sign. Add your favorite loop on and hit 6 to transfer control to it. After it says control will be transferred hang up and call the other side of the loop, hit the pound sign (#) and follow the instructions. A bonus for conf. is to add an international number dial 1+011+cc+number pretty cool ehhh. A few extra notes. Do not add numbers that you will want to hang up, add these through MCI or Sprint. You cannot blow anyone off with 2600hz unless they are in an old x-bar or older system. Many DA operators will stay on after you abuse them; you may have to start another or at least don't say any numbers. Never add the tone side of a loop onto a conf. never add more than one MCI node on your conf.
Route & rate:
Note route & rate and RQS perform the same service. R&R simply tells you route and rate info which is very valuable, ex. Such as the inward routing for an exchange in an area code. An inward routing will let you call her and she can do an emergency interrupt for you. She can tell you how to get international operators, ect. Here are the terms you are required to use:
-Operator route for [country, city]. -gives you inward op.
-Directory route for [country, city]. -gives you directory ass.
-City route for [country, city]. -gives you country and city code.
Operator route for [a/c]+ [exchange] -gives you inward op. Route
Ex. [a/c]+ or [a/c]+0xx+ when she says plus she means plus 121.
Numbers route for [state, city] -gives you a/c.
Place name [a/c]+[exchange] -gives you city/state for that a/c and
To call international over cable simply access a trunk and dial kp011xxxst wait for sender tone, kpxxxcc-numberst xxx - a 3 digit country code, it may not be 3 digits so just put 1 or 2 0's in front of it. Cc - is the city code to go by satellite:
Dial kp18xst x - numbers 2-8 wait for sender tone then Kpxxxccnumberst
77. Blue Box by The Jolly Roger
To quote Karl Marx, blue boxing has always been the most noble form of phreaking. As opposed to such things as using an MCI code to make a free fone call, which is merely mindless pseudo-phreaking, blue boxing is actual interaction with the Bell System toll network. It is likewise advisable to be more cautious when blue boxing, but the careful phreak will not be caught, regardless of what type of switching system he is under. In this part, I will explain how and why blue boxing works, as well as where. In later parts, I will give more practical information for blue boxing and routing information. To begin with, blue boxing is simply communicating with trunks. Trunks must not be confused with subscriber lines (or "customer loops") which are standard telefone lines. Trunks are those lines that connect central offices. Now, when trunks are not in use (i.e., idle or "on-hook" state) they have 2600Hz applied to them. If they are two-way trunks, there is 2600Hz in both directions. When a trunk IS in use (busy or "off-hook" state), the 2600Hz is removed from the side that is off-hook. The 2600Hz is therefore known as a supervisory signal, because it indicates the status of a trunk; on hook (tone) or off-hook (no tone). Note also that 2600Hz denoted SF (single frequency) signaling and is "in-band." This is very important. "In-band" means that is within the band of frequencies that may be transmitted over normal telefone lines. Other SF signals, such as 3700Hz are used also. However, they cannot be carried over the telefone network normally (they are "out-of-band" and are therefore not able to be taken advantage of as 2600Hz is. Back to trunks. Let's take a hypothetical phone call. You pick up your fone and dial 1+806-258-1234 (your good friend in Amarillo, Texas). For ease, we'll assume that you are on #5 Crossbar switching and not in the 806 area. Your central office (CO) would recognize that 806 is a foreign NPA, so it would route the call to the toll center that serves you. [For the sake of accuracy here, and for the more experienced readers, note that the CO in question is a class 5 with LAMA that uses out-of-band SF supervisory signaling]. Depending on where you are in the country, the call would leave your toll center (on more trunks) to another toll center, or office of higher "rank". Then it would be routed to central office 806-258 eventually and the call would be completed.
CO1.. your central office
TC1.. your toll office.
TC2.. toll office in Amarillo.
CO2.. 806-258 central office.
B.... your friend (806-258-1234)
In this situation it would be realistic to say that CO2 uses SF in-band (2600Hz) signaling, while all the others use out-of-band signaling (3700Hz). If you don't understand this, don't worry. I am pointing this out merely for the sake of accuracy. The point is that while you are connected to 806-258-1234, all those trunks from YOUR central office (CO1) to the 806-258 central office (CO2) do *NOT* have 2600Hz on them, indicating to the Bell equipment that a call is in progress and the trunks are in use. Now let's say you're tired of talking to your friend in Amarillo, so you send a 2600Hz down the line. This tone travels down the line to your friend's central office (CO2) where it is detected. However, that CO thinks that the 2600Hz is originating from Bell equipment, indicating to it that you've hung up, and thus the trunks are once again idle (with 2600Hz present on them). But actually, you have not hung up, you have fooled the equipment at your friend's CO into thinking you have. Thus, it disconnects him and resets the equipment to prepare for the next call. All this happens very quickly (300-800ms for step-by-step equipment and 150-400ms for other equipment). When you stop sending 2600Hz (after about a second), the equipment thinks that another call is coming towards --> on hook, no tone -->off hook. Now that you've stopped sending 2600Hz, several things happen:
1.A trunk is seized.
2.A "wink" is sent to the CALLING end from the CALLED end indicating that the CALLED end (trunk) is not ready to receive digits yet.
3.A register is found and attached to the CALLED end of the trunk within about two seconds (max).
4.A start-dial signal is sent to the CALLING end from the CALLED end indicating that the CALLED end is ready to receive digits. Now, all of this is pretty much transparent to the blue boxer. All he really hears when these four things happen is a . So, seizure of a trunk would go something like this:
1.Send a 2600Hz
2.Terminate 2600Hz after 1-2 secs.
Once this happens, you are connected to a tandem that is ready to obey your every command. The next step is to send signaling information in order to place your call. For this you must simulate the signaling used by operators and automatic toll-dialing equipment for use on trunks. There are mainly two systems, DP and MF. However, DP went out with the dinosaurs, so I'll only discuss MF signaling. MF (multi-frequency) signaling is the signaling used by the majority of the inter- and intra-lata network. It is also used in international dialing known as the CCITT No« system. MF signals consist of 7 frequencies, beginning with 700Hz and separated by 200Hz. A different set of two of the 7 frequencies represent the digits 0 thru 9, plus an additional 5 special keys. The frequencies and uses are as follows:
Frequencies(Hz) Domestic International
700+900 1 1
700+1100 2 2
900+1100 3 3
700+1300 4 4
900+1300 5 5
1100+1300 6 6
700+1500 7 7
900+1500 8 8
1100+1500 9 9
1300+1500 0 0
700+1700 ST3p Code 1
900+1700 Stp Code 1
1100+1700 KP KP1
1300+1700 ST2p KP2
1500+1700 ST ST
The timing of all the MF signals is a nominal 60ms, except for KP, which should have a duration of 100ms. There should also be a 60ms silent period between digits. This is very flexible however, and most Bell equipment will accept outrageous timings. In addition to the standard uses listed above, MF pulsing also has expanded usages known as "expanded inband signaling" that include such things as coin collect, coin return, ringback, operator attached, and operator attached, and operator released. KP2, code 11, and code 12 and the ST_ps (STart "primes" all have special uses which will be mentioned only briefly here. To complete a call using a blue box once seizure of a trunk has been accomplished by sending 2600Hz and pausing for the , one must first send a KP. This readies the register for the digits that follow. For a standard domestic call, the KP would be followed by either 7 digits (if the call were in the same NPA as the seized trunk) or 10 digits (if the call were not in the same NPA as the seized trunk). [Exactly like dialing normal fone call]. Following either the KP and 7 or 10 digits, a STart is sent to signify that no more digits follow. Example of a complete call:
2.Wait for a call-progress indication (such as ring,busy,recording,etc.)
3.Send 2600Hz for about 1 second.
4.Wait for about ll-progress indication (such as ring,busy,recording,etc.)
The call will then connect if everything was done properly. Note that if a call to an 806 number were being placed in the same situation, the are code would be omitted and only KP + seven digits + ST would be sent. Code 11 and code 12 are used in international calling to request certain types of operators. KP2 is used in international calling to route a call other than by way of the normal route, whether for economic or equipment reasons. STp, ST2p, and ST3p (prime, two prime, and three prime) are used in TSPS signaling to indicate calling type of call (such as coin-direct dialing.
78. Napalm II by The Jolly Roger
[See file #021 of the Cookbook for an easy way to make it!!]
About the best fire bomb is napalm. It has a thick consistency, like jam and is best for use on vehicles or buildings. Napalms is simply one part gasoline and one part soap. The soap is either soap flakes or shredded bar soap. Detergents won't do. The gasoline must be heated in order for the soap to melt. The usual way is with a double boiler where the top part has at least a two-quart capacity. The water in the bottom part is brought to a boil and the double boiler is taken from the stove and carried to where there is no flame. Then one part, by volume, of gasoline is put in the top part and allowed to heat as much as it will and the soap is added and the mess is stirred until it thickens. A better way to heat gasoline is to fill a bathtub with water as hot as you can get it. It will hold its heat longer and permit a much larger container than will the double boiler.
79. Nitroglycerin Recipe by The Jolly Roger
Like all chemists I must advise you all to take the greatest care and caution when you are doing this. Even if you have made this stuff before. This first article will give you information on making nitroglycerin, the basic ingredient in a lot of explosives such as straight dynamites, and gelatin dynamites.
1.Fill a 75-milliliter beaker to the 13 mL. Level with fuming red nitric acid, of 98% pure concentration.
2.Place the beaker in an ice bath and allow to cool below room temp.
3.After it has cooled, add to it three times the amount of fuming sulferic acid (99% h2so4). In other words, add to the now-cool fuming nitric acid 39 mL. Of fuming sulferic acid. When mixing any acids, always do it slowly and carefully to avoid splattering.
4.When the two are mixed, lower their temp. By adding more ice to the bath, about 10-15øC. (Use a mercury-operated thermometer)
5.When the acid solution has cooled to the desired temperature, it is ready for the glycerin. The glycerin must be added in small amounts using a medicine dropper. (Read this step about 10 times!) Glycerin is added slowly and carefully (I mean careful!) Until the entire surface of the acid it covered with it.
6.This is a dangerous point since the nitration will take place as soon as the glycerin is added. The nitration will produce heat, so the solution must be kept below 30øC! If the solution should go above 30øC, immediately dump the solution into the ice bath! This will insure that it does not go off in your face!
7.For the first ten minutes of nitration, the mixture should be gently stirred. In a normal reaction the nitroglycerin will form as a layer on top of the acid solution, while the sulferic acid will absorb the excess water.
8.After the nitration has taken place, and the nitroglycerin has formed on the top of the solution, the entire beaker should be transferred slowly and carefully to another beaker of water. When this is done the nitroglycerin will settle at the bottom so the other acids can be drained away.
9.After removing as much acid as possible without disturbing the nitroglycerin, remove the nitroglycerin with an eyedropper and place it in a bicarbonate of soda (sodium bicarbonate in case you didn't know) solution. The sodium is an alkali and will neutralize much of the acid remaining. This process should be repeated as much as necessary using blue litmus paper to check for the presence of acid. The remaining acid only makes the nitroglycerin more unstable than it already is.
10.Finally! The final step is to remove the nitroglycerin from the bicarbonate. His is done with and eye- dropper, slowly and carefully. The usual test to see if nitration has been successful is to place one drop of the nitroglycerin on metal and ignite it. If it is true nitroglycerin it will burn with a clear blue flame.
** Caution **
Nitro is very sensitive to decomposition, heating dropping, or jarring, and may explode if left undisturbed and cool.
80. Operation: Fuckup by The Jolly Roger
This is a guide for Anarchists and can be funny for non-believers and 12 and 13 year old runts, and can be a lexicon of deadly knowledge for True Anarchists... Serious damage is intended to be dealt here. Do not try this stuff unless you want to do a lot of serious Anarchy.
Asshole - 'Listen, you little teenager punk shit, shut the fuck up, or I'll knock you down!'
Anarchist - 'O.K. You can't say I didn't warn you. You don't know my rue power...' (soooo casually)
Asshole - 'Well, er, what do you mean?
Anarchist - '' As you can see, the Anarchist knows something that this asshole doesn't...
Get a wheel barrel or two. Fill with gasoline. Get 16 rolls of toilet paper, unroll & drench in the gasoline. Rip to shreds in gasoline. Get asbestos gloves. Light a flare (to be punk), grab glob of saturated toilet paper (you can ignite the glob or not). Throw either flaming or dripping glob into:
· Any window (picture is the best)
· Front doors
· Rough grain siding
· Best of all, brick walls
First of all, this bitch is near impossible to get off once dried, and is a terror to people inside when lit! After this... during the night, get a pickup truck, a few wheel-barrels, and a dozen friends with shovels. The pickup can be used only for transporting people and equipment, or doing that, and carting all the dirt. When it gets around 12:00 (after the loser goes beddie - bye), dig a gargantuan hole in his front yard until about 3:00. You can either assign three or four of your friends to cart the dirt ten miles away in the pickup-bed, or bury his front door in 15' of dirt! After that is done, get three or four buckets of tar, and coat his windows. You can make an added twist by igniting the tar when you are all done and ready to run! That is if the loser has a house. If he lives inside an apartment building, you must direct the attack more toward his car, and front door. I usually start out when he goes to work...I find out what his cheap car looks like, and memorize it for future abuse...It is always fun to paint his front door (apt.) hot pink with purple polka-dots, and off-neon colors in diagonal stripes. You can also pound a few hundred or so four
inch nails into his front door (this looks like somebody really doesn't like you from the inside). Another great is to fill his keyhole with liquid steel so that after the bastard closes his door - the only way to get back in is to break it down. If you can spare it, leave him an axe - that is, implanted three inches into, and through the door! Now, this next one is difficult, but one of the best! Get a piece of wood siding that will more than cover his front door completely. Nail two by fours on the edges of the siding (all except the bottom) so you have a barge - like contraption. Make a hole at the top that will be large enough for a cement slide. Mix about six or seven LARGE bags of QUICK drying cement. Use the cement slide to fill the antechamber created by the 'barge' that is around his door. Use more two by fours to brace your little cement-filled barge, and let the little gem dry. When it is, remove the 'barge' so only a stone monolith remains that covers his door. Use any remaining cement to make a base around this so he can't just push it over. When I did this, he called the fire department, and they thought he meant wood, so they brought axes. I watched with a few dozen or so other tenants, and laughed my damn ass off! This is only his door! After he parks his car for the night, the fun really begins...I start out by opening up the car by jamming a very thin, but loack - inside and out! Then proceed to put orange-juice syrup all over the seats, so after he gets through all the other shit that you do, he will have the stickiest
seats in the world. You can then get a few Sunday papers, and crack one of the windows about four inches. Lightly crumple the papers, and continue to completely fill the inside of his car with the newspapers. A copy of the Sunday New York Times will nicely fill a Volkswagen! What is also quite amusing is to put his car on cinder blocks, slash his tires at the top, and fill them with cement! Leave the cinder blocks there so that, after he knocks the car off of them, he will get about 3 miles to the gallon with those tires, and do 0 to 60 in about two minutes! It is even more hilarious when he doesn't know why the hell why! Another is to open his hood, and then run a few wires from the sparkplugs to the METAL body. The sure is one HOT car when it is running! Now, I like to pour two pounds of sugar down his gas tank. If this doesn't blow every gasket in his engine it will do something called 'caramelizing his engine'. This is when the extreme heat turns the sugar to caramel, and you literally must completely take the engine out and apart, and clean each and every individual part! Well, if this asshole does not get the message, you had better start to get serious. If this guide was used properly & as it was intended (no, not as kindling for the fire), this asshole will either move far away, seek professional psychological help, commit suicide, or all of the above!
81. Stealing calls from payphones by The Jolly Roger
Now to make free local calls, you need a finishing nail. I highly recommend "6D E.G. FINISH C/H, 2 INCH" nails. These are about 3/32 of an inch in diameter and 2 inches long (of course). You also need a large size paper clip. By large I mean they are about 2in long (FOLDED). Then you unfold the paper clip. Unfold it by taking each piece and moving it out 90ø. When it is done it should look somewhat like this:
Now, on to the neat stuff. What you do, instead of unscrewing the glued-on mouthpiece, is insert the nail into the center hole of the mouthpiece (where you talk) and push it in with pressure or just hammer it in by hitting the nail on something. Just DON'T KILL THE MOUTHPIECE! You could damage it if you insert the nail too far or at some weird angle. If this happens then the other party won't be able to hear what you say. You now have a hole in the mouthpiece in which you can easily insert the paper clip. So, take out the nail and put in the paper clip. Then take the other end of the paper clip and shove it under the rubber cord protector at the bottom of the handset (you know, the blue guy...). This should end up looking remotely like...like this:
Paper clip --> : : /
: : :
: To earpiece ->
Cord Blue guy
(The paper clip is shoved under the blue guy to make a good connection between the inside of the mouthpiece and the metal cord.) Now, dial the number of a local number you wish to call, sayyyy, MCI. If everything goes okay, it should ring and not answer with the "The Call You Have Made Requires a 20 Cent Deposit" recording. After the other end answers the phone, remove the paper clip. It's all that simple, see? There are a couple problems, however. One is, as I mentioned earlier, the mouthpiece not working after you punch it. If this happens to you, simply move on to the next payphone. The one you are now on is lost. Another problem is that the touch tones won't work when the paper clip is in the mouthpiece. There are two ways around this..
1.Dial the first 6 numbers. This should be done without the paper clip making the connection, i.e., one side should not be connected. Then connect the paper clip, hold down the last digit, and slowly pull the paper clip out at the mouthpiece's end.
2.Don't use the paper clip at all. Keep the nail in after you punch it. Dial the first 6 digits. Before dialing the last digit, touch the nail head to the plate on the main body of the phone, the money safe thingy..then press the last number. The reason that this method is sometimes called clear boxing is because there is another type of phone which lets you actually make the call and listen to them say "Hello, hello?" but it cuts off the mouthpiece so they can't hear you. The Clear Box is used on that to amplify your voice signals and send it through the earpiece. If you see how this is even slightly similar to the method I have just described up there, kindly explain it to ME!! Cause I don't GET IT! Anyways, this DOES work on almost all single slot, Dial Tone First payphones (Pacific Bell for sure). I do it all the time. This is the least, I STRESS *LEAST*, risky form of Phreaking.
82. Pool Fun by The Jolly Roger
First of all, you need know nothing about pools. The only thing you need know is what a pool filter looks like. If you don't know that. Second, dress casual. Preferably, in black. Visit your "friends" house, the one whose pool looks like fun!! Then you reverse the polarity of his/her pool, by switching the wires around. They are located in the back of the pump. This will have quite an effect when the pump goes on. In other words. Boooooooooooommm! That's right, when you mix + wires with - plugs, and vice- versa, the 4th of July happens again. Not into total destruction??? When the pump is off, switch the pump to "backwash". Turn the pump on and get the phuck out! When you look the next day, phunny. The pool is dry. If you want permanent damage, yet no great display like my first one mentioned, shut the valves of the pool off. (There are usually 2) One that goes to the main drain and one that goes to the filter in the pool. That should be enough to have one dead pump. The pump must take in water, so when there isn't any... Practical jokes: these next ones deal with true friends and
there is *no* permanent damage done. If you have a pool, you must check the pool with chemicals. There is one labeled orthotolidine. The other is labeled alkaline (pH). You want orthotolidine. (It checks the chlorine). Go to your local pool store and tell them you're going into the pool business, and to sell you orthotolidine (a CL detector) Buy this in great quantities if possible. The solution is clear. You fill 2 baggies with this chemical. And sew the bags to the inside of your suit. Next, go swimming with your friend! Then open the bags and look like you're enjoying a piss. And anyone there will turn a deep red! They will be embarrassed so much, Especially if they have guests there! Explain what it is, then add vinegar to the pool. Only a little. The "piss" disappears.
83. Free Postage by The Jolly Roger
The increasing cost of postage to mail letters and packages is bringing down our standard of living. To remedy this deplorable situation, some counter control measures can be applied. For example, if the stamps on a letter are coated with Elmer's Glue by the sender, the cancellation mark will not destroy the stamp: the Elmer's drives to form an almost invisible coating that protects the stamps from the cancellation ink. Later, the receiver of the letter can remove the cancellation mark with water and reuse the stamps. Furthermore, ecological saving will also result from recycling the stamps. Help save a tree. The glue is most efficiently applied with a brush with stiff, short bristles. Just dip the brush directly into the glue and spread it on evenly, covering the entire surface of the stamp. It will dry in about 15 minutes. For mailing packages, just follow the same procedure as outlined above; however, the package should be weighed and checked to make sure that it has the correct amount of postage on it before it is taken to the Post Office. Removing the cancellation and the glue from the stamps can be easily accomplished by soaking the stamps in warm water until they float free from the paper. The stamps can then be put onto a paper towel to dry. Processing stamps in large batches saves time too. Also, it may be helpful to write the word 'Elmer' at the top of the letter (not on the envelope) to cue the receiving party in that the stamps have been protected with the glue. We all know that mailing packages can be expensive. And we also know that the handicapped are sometimes discriminated against in jobs. The Government, being the generous people they are, have given the blind free postal service. Simply address you envelope as usual, and make one modification. In the corner where the stamp would go, write in (or stamp) the words 'FREE MATTER FOR THE BLIND". Then drop you package or letter in one of the blue federal mailboxes. DO NOT TAKE THE LETTER TO THE POST OFFICE, OR LEAVE IT IN YOUR MAILBOX. Sounds very nice of the government to do this, right? Well, they aren't that nice. The parcel is sent library rate, that is below third class. It may take four to five days to send a letter to just the next town. This too is quite simple, but less effective. Put the address that you are sending the letter to as the return address. If you were sending a $20 donation to the pirate's Chest, you would put our address (PO box 644, Lincoln MA 01773) as the return address. Then you would have to be careless and forget to put the stamp on the envelope. A nice touch is to put a bullshit address in the center of the envelope. Again, you MUST drop the letter in a FEDERAL mailbox. If the post office doesn't send the letter to the return address for having no stamp, they will send it back for the reason of "No such address".
Pirates Chest Dept. 40DD
P.O. Box 644865
Lincol, Ma. 41773
20 Fake Road
What Ever, XX 99851
One last thing you might try doing is soaking a canceled stamp off of an envelope, and gluing it onto one you are sending. Then burn the stamp, leaving a little bit to show that there was one there.
84. Unstable Explosives by The Jolly Roger
Mix solid Nitric Iodine with household ammonia. Wait overnight and then pour off the liquid. You will be left with a muddy substance. Let this dry till it hardens. Now throw it at something!!!!
85. Weird Drugs by The Jolly Roger
1.Obtain 15 pounds of ripe yellow bananas.
2.Peel all and eat the fruit. Save the peelings.
3.Scrape all the insides of the peels with a sharp knife.
4.Put all the scraped material in a large pot and add water.
5.Boil 3 or 4 hours until it has attained a solid paste consistency.
6.Spread paste onto cookie sheets and dry in oven for about 20 minutes. This will result in fine black powder. Usually one will feel the effects after smoking three to four cigarettes.
Mix Robitussion AC with an equal amount of ginger ale and drink. The effect are sedation and euphoria. Never underestimate the effects of any drug! You can OD on cough syrup!
1.Collect five to ten toads, frogs will not work. The best kind are tree toads.
2.Kill them as painlessly as possible, and skin immediately.
3.Allow the skins to dry in a refrigerator four to five days, or until the skins are brittle.
4.Now crush the skins into powder and smoke. Due to its bad taste you can mix it with a more fragrant smoking medium.
1.Take several whole nutmegs and grind them up in an old grinder.
2.After the nutmegs are ground. Place in a mortar and pulverize with a pestle.
3.The usual dosage is about 10 or 15 grams. A larger dose may produce excessive thirst, anxiety, and rapid heart beat, but hallucinations are rare.
1.Take 1 pound of raw peanuts (not roasted.)
2.Shell them, saving the skins and discarding the shells.
3.Eat the nuts.
4.Grind up the skins and smoke them.
86. The Art of Carding by The Jolly Roger
Obtaining a credit card number: There are many ways to obtain the information needed to card something. The most important things needed are the card number and the expiration date. Having the card-holders name doesn't hurt, but it is not essential. The absolute best way to obtain all the information needed is by trashing. The way this is done is simple. You walk around your area or any other area and find a store, mall, supermarket, etc., that throws their garbage outside on the sidewalk or dumpster. Rip the bag open and see if you can find any carbons at all. If you find little shreds of credit card carbons, then it is most likely not worth your time to tape together. Find a store that does not rip their carbons at all or only in half. Another way is to bullshit the number out of someone. That is call them up and say "Hello, this is Visa security and we have a report that your card was stolen." They will deny it and you will try to get it out of them from that point on. You could say, "It wasn't stolen? Well what is the expiration date and maybe we can fix the problem.... OK and what is the number on your card?......Thank you very much and have a nice day." Or think of something to that degree. Another way to get card numbers is through systems such as TRW and CBI, this is the hard way, and probably not worth the trouble, unless you are an expert on the system. Using credit card numbers posted on BBS's is risky. The only advantage is that there is a good chance that other people will use it, thus decreasing the chances of being the sole-offender. The last method of getting numbers is very good also. In most video rental stores, they take down your credit card number when you join to back-up your rentals. So if you could manage to steal the list or make a copy of it, then you are set for a LONG time. Choosing a victim: Once you have the card number, it is time to make the order. The type of places that are easiest to victimize are small businesses that do mail order or even local stores that deliver. If you have an ad for a place with something you want and the order number is NOT a 1-800 number then chances are better that you will succeed.
When you call the place up to make the order, you must have several things readily at hand. These are the things you will need: A name, telephone number, business phone, card number (4 digit bank code if the card is MasterCard), expiration date, and a complete shipping and billing address. I will talk about all of these in detail. A personal tip: When I call to make an order, it usually goes much smoother if the person you are talking to is a woman. In many cases they are more gullible than men. The name: You could use the name on the card or the name of the person who you are going to send the merchandise to. Or you could use the name on the card and have it shipped to the person who lives at the drop (Say it is a gift or something). The name is really not that important because when the company verifies the card, the persons name is never mentioned, EXCEPT when you have a Preferred Visa card. Then the name is mentioned. You can tell if you have a Preferred Visa card by the PV to the right of the expiration date on the carbon. No phone all day long waiting for the company to call (Which they will), then the phone number to give them as your home-phone could be one of the following: A number that is ALWAYS busy, a number that ALWAYS rings, a payphone number, low end of a loop (and you will wait on the other end), or a popular BBS. NEVER give them your home phone because they will find out as soon as the investigation starts who the phone belongs to. The best thing would be to have a payphone call forward your house (via Cosm The business number.) When asked for, repeat the number you used for your home phone. Card number: The cards you will use will be Visa, Mastercard, and American Express. The best is by far Visa. It is the most straight-forward. Mastercard is pretty cool except for the bank code. When they ask for the bank code, they sometimes also ask for the bank that issued it. When they ask that just say the biggest bank you know of in your area. Try to avoid American Express. They tend to lead full scale investigations. Unfortunately, American Express is the most popular card out. When telling the person who is taking your call the card number, say it slow, clear, and with confidence. e.g. CC# is 5217-1234-5678-9012. Pause after each set of four so you don't have to repeat it. Expiration date: The date must be at LEAST in that month. It is best to with more than three months to go. The address: More commonly referred to as the 'drop'. Well the drop can range from an abandoned building to your next door neighbors apartment. If you plan to send it to an apartment building then be sure NOT to include an apartment number. This will confuse UPS or postage men a little and they will leave the package in the lobby. Here is a list of various drops: The house next door whose family is on vacation, the apartment that was just moved out of, the old church that will be knocked down in six months, your friends house who has absolutely nothing to do with the type of merchandise you will buy and who will also not crack under heat from feds, etc.. There are also services that hold merchandise for you, but personally I would not trust them. And forget about P.O. Boxes because you need ID to get one and most places don't ship to them anyway. Other aspects of carding: Verifying cards, seeing if they were reported stolen. Verifying cards: Stores need to verify credit cards when someone purchases something with one. They call up a service that checks to see if the customer has the money in the bank. The merchant identifies himself with a merchant number. The service then holds the money that the merchant verified on reserve. When the merchant sends in the credit card form, the service sends the merchant the money. The service holds the money for three days and if no form appears then it is put back into the bank. The point is that if you want to verify something then you should verify it for a little amount and odds are that there will be more in the bank. The good thing about verification is that if the card doesn't exist or if it is stolen then the service will tell you. To verify MasterCard and Visa try this number. It is voice: 1-800-327-1111 merchant code is 596719. Stolen cards: Mastercard and Visa come out with a small catalog every
week where they publish EVERY stolen or fraudulently used card. I get this every week by trashing the same place on the same day. If you ever find it trashing then try to get it every week. Identifying cards: Visa card numbers begin with a 4 and have either 13 or 16 digits. MasterCard card numbers begin with a 5 and have 16 digits. American Express begins with a 3 and has 15 digits. They all have the formats of the following:
3xxx-xxxxxx-xxxxx American Express
Gold cards: A gold card simply means that credit is good for $5000. Without a gold card, credit would be normally $2000. To recognize a gold card on a carbon there are several techniques:
Visa-PV instead of CV.
Note-When verifying a PV Visa, you have to have the real name of the cardholder.
Mastercard-An asterisk can signify a gold card, but this changes depending when the card was issued. I am going to type out a dialog between a carder and the phone operator to help you get the idea.
Operator: "Over-priced Computer Goods, may I help you?"
Carder: "Hi, I would like to place an order please."
Operator: "Sure, what would you like to order?"
Carder: "400 generic disks and a double density drive."
Operator: "Ok, is there anything else?"
Carder: "No thank you, that's all for today."
Operator: "Ok, how would you like to pay for this? MasterCard or Visa?"
Operator: "And your name is?"
Carder: "Lenny Lipshitz." (Name on card)
Operator: "And your Visa card number is?"
Carder: "4240-419-001-340" (Invalid card)
Operator: "Expiration date?"
Operator: "And where would you like the package shipped to?"
Carder: "6732 Goatsgate Port. Paris, Texas, 010166."
Operator: "And what is your home telephone number?"
Carder: "212-724-9970" (This number is actually always busy)
Operator: "I will also need your business phone number in case we have to reach you."
Carder: "You can reach me at the same number. 212-724-9970"
Operator: "O.K. Thank you very much and have nice day."
Carder: "Excuse me, when will the package arrive?"
Operator: "In six to seven days UPS."
Carder: "Thanks a lot, and have a pleasant day."
Now you wait 6-7 days when the package will arrive to the address which is really a house up for sale. There will be a note on the door saying, "Hello UPS, please leave all packages for Lenny Lipshitz in the lobby or porch. Thanks a lot, Lenny Lipshitz" (Make the signature half-way convincing)
87. Recognizing credit cards by The Jolly Roger
[Sample: American Express]
XXXX XXXXXX XXXXX
MM/Y1 THRU MM/Y2 Y1
John Doe AX
The first date is the date the person got the card, the second date is the expiration date, after the expiration date is the same digits in the first year. The American Express Gold has many more numbers (I think 6 8 then 8). If you do find a Gold card keep it for it has a $5000.00 backup even when the guy has no money!
[Sample: Master Card]
5XXX XXXX XXXX XXXX
XXXX AAA DD-MM-YY MM/YY
The format varies, I have never seen a card that did not start with a 5XXX there is another 4 digits on the next line that is sometimes asked for when ordering stuff, (and rarely a 3 digit letter combo (e. ANB). The first date is the date the person got the card and the second date is the expiration date. Master Card is almost always accepted at stores.
XXXX XXX(X) XXX(X) XXX(X)
Visa is the most straight forward of the cards, for it has the name right on the card itself, again the first date is the date he got the card and the second is the expiration date. (Sometimes the first date is left out). The numbers can either be 4 3 3 3 or 4 4 4 4. Visa is also almost always accepted at stores, therefore, the best of cards to use.
88. How To Create A New Identity by The Walking Glitch
You might be saying, "Hey Glitch, what do I need a new identity for?" The answer is simple. You might want to go buy liquor somewhere, right? You might want to go give the cops the false name when you get busted so you keep your good name, eh? You might even want to use the new identity for getting a P.O. Box for carding. Sure! You might even want the stuff for renting yourself a VCR at some dickless loser of a convenience store. Here we go: Getting a new ID isn't always easy, no one said it would be. By following these steps, any bozo can become a new bozo in a couple of weeks.
The first step is to find out who exactly you'll become. The most secure way is to use someone's ID who doesn't use it themselves. The people who fit that bill the best are dead. As an added bonus they don't go complaining one bit. Go to the library and look through old death notices. You have to find someone who was born about the same time as you were, or better yet, a year or two older so you can buy booze, etc. You should go back as far as you can for the death because most states now cross index deaths to births so people can't do this in the future. The cutoff date in Wisconsin is 1979, folks in this grand state gotta look in 1978 or earlier. Anything earlier there is cool. Now, this is the hardest part if you're younger. Brats that young happen to be quite resilient, taking falls out of three story windows and eating rat poison like its Easter candy, and not a scratch or dent. There ain't many that die, so ya gotta look your ass off. Go down to the library and look up all the death notices you can, if it's on microfilm so much the better. You might have to go through months of death notices though, but the results are well worth it. You gotta get someone who died locally in most instances: the death certificate is filed only in the county of death. Now you go down to the county courthouse in the county where he died and get the death certificate, this will cost you around $3-$5 depending on the state you're in. Look at this hunk of paper, it could be your way to vanish in a cloud of smoke when the right time comes, like right after that big scam. If You're lucky, the slobs parents signed him up with social security when he was a snot nosed brat. That'll be another piece of ID you can get. If not, that's Ok too. It'll be listed on the death certificate if he has one. If you're lucky, the stiff was born locally and you can get his birth certificate right away.
Now check the place of birth on the death certificate, if it's in the same place you standing now you're all set. If not, you can mail away for one from that county but its a minor pain and it might take a while to get, the librarian at the desk has listings of where to write for this stuff and exactly how much it costs. Get the Birth certificate, its worth the extra money to get it certified because that's the only way some people will accept it for ID. When you're getting this stuff the little forms ask for the reason you want it, instead of writing in "Fuck you", try putting in the word "Genealogy". They get this all the time. If the Death certificate looks good for you, wait a day or so before getting the certified birth certificate in case they recognize someone wanting it for a dead guy.
Now your cooking! You got your start and the next part's easy. Crank out your old Dot matrix printer and run off some mailing labels addressed to you at some phony address. Take the time to check your phony address that there is such a place. Hotels that rent by the month or large apartment buildings are good, be sure to get the right zip code for the area. These are things that the cops might notice that will trip you up. Grab some old junk mail and paste your new labels on them. Now take them along with the birth certificate down to the library.
Get a new library card. If they ask you if you had one before say that you really aren't sure because your family moved around a lot when you were a kid. Most libraries will allow you to use letters as a form of ID when you get your card. If they want more give them a sob story about how you were mugged and got your wallet stolen with all your identification. Your card should be waiting for you in about two weeks. Most libraries ask for two forms of ID, one can be your trusty Birth Certificate, and they do allow letters addressed to you as a second
Now you got a start, it isn't perfect yet, so let's continue. You should have two forms of ID now. Throw away the old letters, or better yet stuff them inside the wallet you intend to use with this stuff. Go to the county courthouse and show them what nice ID you got and get a state ID card. Now you got a picture ID. This will take about two weeks and cost about $5, its well worth it.
If the death certificate had a social security number on it you can go out and buy one of those metal SS# cards that they sell. If it didn't, then you got all kinds of pretty ID that shows exactly who you are. If you don't yet have an SS#, Go down and apply for one, these are free but they could take five or six weeks to get, Bureaucrats you know... You can invent a SS# too if you like, but the motto of 'THE WALKING GLITCH' has always been "Why not excellence?".
If you want to go whole hog you can now get a bank account in your new name. If you plan to do a lot of traveling then you can put a lot of money in the account and then say you lost the account book. After you get the new book you take out all the cash. They'll hit you with a slight charge and maybe tie-up your money some, but if you're ever broke in some small town that bank book will keep you from being thrown in jail as a vagrant.
So kiddies, you got ID for buying booze, but what else? In some towns (the larger the more likely) the cops if they catch you for something petty like shoplifting stuff under a certain dollar amount, will just give you a ticket, same thing for pissing in the street. That's it! No fingerprints or nothing, just pay the fine (almost always over $100) or appear in court. Of course they run a radio check on your ID, you'll be clean and your alter-ego gets a blot on his record. Your free and clear. That's worth the price of the trouble you've gone through right there. If your smart, you'll toss that ID away if this happens, or better yet, tear off your picture and give the ID to someone you don't like, maybe they'll get busted with it. If you're a working stiff, here's a way to stretch your dollar. Go to work for as long as it takes to get unemployment and then get yourself fired. Go to work under the other name while your getting the unemployment. With a couple of sets of ID, you can live like a king. These concepts for survival in the new age come to you compliments of THE WALKING GLITCH.
89. Remote Informer Issue #2 by Tracker, Norman Bates, and Ye Cap'n
Raggers and Braggers
This section is to make you aware of well-known raggers and braggers. Since this is the first time this section is being printed, we will tell you what classifies people as raggers and braggers. In the future issues the top raggers and braggers will be listed in this newsletter to let the SysOps know who not to let on their board, or to atleast keep an eye on. A ragger is someone who will put someone else down for something. The person might post a message asking a novice question about hacking and phreaking, or may say something that is completely wrong, and a ragger will put the other person down for he said, posted, etc. The ones that usually classify in this category are the ones that think they know it all and consider themselves right no matter what anyone says. Most of the users that use codes and consider themselves a master phreaker usually become raggers.
A bragger is someone who either does or thinks he does know everything, and puts it upon himself to tell the whole world that he knows it all. This person is also one who thinks he is better than everyone else and he believes he is Elite, and no one else is. People who tend to do this are those who have, for some reason, become well-known in the underworld, and as a result become a bragger. Those usually not too well-known will not tend to brag as much as those who think everyone would love to be their friend and be like them.
As a well-known ragger and bragger, The Toad, learned that it does not help to be one or both of those. He has since changed and is now easily accepted by most. Most people disliked him because others they knew had said something bad about him. This is called peer pressure and is a bad influence to those who are new to the underworld. I would suggest in the future, to not judge someone by what others say, but rather by how they act around/to you. The current most popular Atarian that classifies as a ragger and a bragger is Ace of Aces, and is well-hated by many users and SysOps, since he tends to put down anything anyone says and considers himself the best at writing hacking programs. He is commonly referred to as Ass of Asses and Ass of Assholes. Even holding an open mind about this guy, you would soon come to find that what others said coincides with what you see from him.
A New 950 has arrived!
LDDS, who as mentioned above bought out TMC, is installing a new 950 port to most major cities. By the time you read this, it should be in almost every area that supports 950 ports. The number is 950-1450. This port will dial 976 numbers, but not 700, 800, or 900 numbers. The dialing method for LDDS is: 7 digit code, then even if the code is bad it will give you a dial tone. Then dial the area code plus the number. If you have a bad code it will simply say your call cannot be completed as it was dialed. There is a default code used on the system that currently works. The code is simply, 1234567. I have seen codes from 5 different companies and they all are in the format of 00xxxxx. I do not know what type of software they use, but I will know by the next issue exactly what they place on the bills. This could be the answer to a lot of people's problems with fear of Sprint and ITT, especially AllNets. Just remember, Tracker is the one who found this, and all information about it. If someone is seen saying they found this, then they will be listed in the next issue which will contain an article on leeches.
Mailbox systems are the link between information and the underworld. If you have ever called one, then you will know the advantages of having one, especially the ones that are open to whole underworld, rather than just a select few. There are two types of mailbox systems that are widely used. The first type we will talk about is the multiple mailbox systems, or commonly referred to as message systems. These systems have several mailboxes set up on one number. Usually, you can access other mailboxes from that number by pressing '*' or '#'. Sometimes you just enter the mailbox number and you are connected. These are the safest systems to use to protect information from US Sprint and other long distance companies. Since US Sprint and other companies call the destination numbers, it is safer to have 800 mailbox systems, and most of the time, the multiple mailbox systems are on 800 numbers. The passcode on these systems can vary in length and can be accessed by several different methods, so it is impossible to explain exactly how to hack these systems.
The other type is the single mailbox system. These are usually set up in a reserved prefix in an area code. (Ex: 713-684-6xxx) These systems are usually controlled by the same type of hardware/software. To access the area where you enter the passcode, just hit '0' for a second or so. The passcodes are four (4) digits long. The only way to hack these is manually. The best thing you could do is to find one that does not have a recording from a person, but just the digitized voice. If you hack one that someone already owns, they will report it and it will not last as long.
Here is a list mailboxes or prefixes to help you get started
Single Multiple Name Digits
213-281-8xxx 212-714-2770 3
213-285-8xxx 216-586-5000 4
213-515-2xxx 415-338-7000 Aspen Message System 3
214-733-5xxx 714-474-2033 Western Digital
214-855-6xxx 800-222-0651 Vincent and Elkins 4
214-978-2xxx 800-233-8488 3
215-949-2xxx 800-447-8477 Fairylink 7
312-450-8xxx 800-521-5344 3
313-768-1xxx 800-524-2133 RCA 4
405-557-8xxx 800-527-0027 TTE TeleMessager 6
602-230-4xxx 800-632-7777 Asynk 6
619-492-8xxx 800-645-7778 SoftCell Computers 4
713-684-6xxx 800-648-9675 Zoykon 4
800-847-0003 Communications World 3
90. Remote Informer Issue #3 by Tracker, Ye Cap'n, Norman Bates
It's been a month now, and A LOT has happened. So much, in fact, that the information will be split into several issues. This should be no shock since I mentioned in the first issue that we may put several issues out sometimes. I want to congratulate the readers for finally contributing to the newsletter. This first two issues were all on information that I, myself, obtained. Several people gave me information for these issues, and their handle and information is included in the articles.
ITT has 9 digits!
For those of you who did not know this, ITT has nine digit codes. They are said to give better connections to some extent. This info was originally given to us by Party Beast.
Phreaky Phones Go Down!
The famed Phreaky Phones are down again. Modem Man, the original person that started them, has said that they will be down until further notice. In the meantime, other independent boxes are being started. A listing can be made of current ones on request.
Magnus Adept Gets Busted
Fellow Atarian and well-known phreak Magnus Adept got caught by MCI. Details of the how, when, and where are not known at this time. He got caught with 150 codes and may have to pay up to 50 dollars for each code.
Sprint Codes Are Dying Fast!
Sprint codes are hard to get and when they are obtained, they tend to die rather quickly. Phreakers have been saying that the 950-0777 port is dead, but on the contrary, it is still available in states that are not highly abused by phreaks. Here again, rumors are being spread.
The Best BBS of the Month
Starting from now on, we will have a BBS of the month. We will choose a BBS, regardless of computer type, and look at the user participation in phreak related matters, as well as quality discussions on the various illegal topics. A BBS can remain the BBS of the month as long as they reside above the rest of the BBS systems. Even though we will sometimes bring out more than one issue in a month, the board will remain BBS of the month until the first issue in the next month comes out.
This month's BBS of the month is FBI PirateNet. We chose this board because of the large numbers of posts in the bases, and not only information, but discussions as well, with a minimum number of posts from raggers and braggers. The number for it is 516-661-7360. The Sysop of FBI PirateNet is The Phantom, not to be confused with an earlier NARC.
US Sprint Expected to Trim Staff, Consolidate Divisions
New York -- US Sprint Communications Corp., the troubled long distance carrier, is expected to announce soon that it will cut its work force by several hundred people and reduce its seven regional divisions to 3 operating groups, sources familiar with the company said.
The company's Pacific division is based in Burlingame, CA. The layoffs and reorganization are part of a plan by US Sprint's new president, Robert H. Snedaker, to reduce heavy operating losses, which analysts expect to reach more than $800 million this year.
Snedaker replaced Charles M. Slibo, who was forced to resign in July because losses were running much higher than the parent companies had expected. Problems with the company's computerized billing system also contributed to Skibo's ouster. US Sprint is owned and operated by the GTE Corp. and United TeleCom.
According to sources close to Snedaker, who was vice chairman and chief operating officer of United TeleCom, he is planning to consolidate the company's 7 divisions, which operate in the same geographical regions as the seven regional Bell operating companies, into 3 divisions.
The rationale for the move, according to industry analysts, is that the company will need a much smaller work force once it begins handling all it's phone traffic on it's new fiber optic network, which can carry a greater number of telephone calls at less cost. Company officials have said that they expect to have most of the traffic on the network by early next year. One source said that there would be more than one round of layoffs in the coming months and that the company ultimately plans to reduce its 14,000 member work force by 15 percent.
Several top managers are expected to resign as soon as US Sprint centralizes its marketing and support operations as its headquarters in Kansas City, MO., according to a report in the latest issue of Business Week magazine.
A spokesman for US Sprint said on Friday that the company would not comment on the rumors. The company is the nation's third largest long distance company, after the American Telephone and Telegraph Co. (AT&T) and MCI Communications Co.
Last year, Washington based MCI undertook a similar reorganization in which it posted a $502« million loss to write down old inventory and restructure operations.
Analysts said that is US Sprint is to turn a profit, the company must increase its market share. "To do this, US Sprint must gain more large business customers, which account for about 80 percent of industry revenues," said Robert B. Morris III, Securities in San Francisco.
Morris said that by using a slick marketing campaign to differentiate its all-fiber telephone network from those of competitors, US Sprint more than doubled its customer base last year. But "most of these customers were residential and small business users that added little to Sprint's bottom line," he added. "If the company expects to be profitable, it will have to concentrate on providing the best service to volume users."
Secret Service Cracks Down on Teen Hackers
Mount Lebanon, PA -- The US Secret Service and local police departments have put a scare into the hacker community with a nationwide crackdown on computer crime that has resulted in the arrests of teenage hackers in at least three cities.
"People who monitor the bulletin boards say there are a lot of nervous hackers out there, wondering who will be arrested next," says Ronald E. Freedman, vice-president of Advanced Information Management, a Woodbridge, VA base computer security firm.
Nine teenagers from Mount Lebanon Junior-Senior High School near Pittsburg, PA, were arrested recently and charged with computer fraud. The juveniles allegedly used home computers to gain illegal access to a credit card authorization center. They obtained valid credit card numbers and used them to purchase thousands of dollars worth of mail order merchandise, the police said.
Freedman says it appears the hackers used some relatively sophisticated techniques in the scheme, including specially written software that enabled them to bypass security controls and navigate through credit records to obtain key information.
Police officials say that the hackers also obtained access codes from pirate bulletin board systems to make free long distance calls and gain access to various business and government computers.
The arrests were the result of a 6 week investigation by the Secret Service and the Mount Lebanon police. The police were tipped off by parents who were suspicious about how their son managed to obtain a skateboard valued at $140.
The Secret Service was also involved in investigations that led to the arrests of several hackers in San Francisco and New York last July.
Secret Service spokesman William Corbett says that although some reports have portrayed the hackers as part of a national crime ring, the cases are unrelated. "It's just that a few of these computers hacking cases came to a head at about the same time," he says.
Federal Legislation enacted in 1984 gives the Secret Service, part of the Department of the Treasury, a major role in investigating computer crimes. Under the federal Computer Fraud and Abuse Act of 1986, computer fraud is a felony that carries a maximum penalty of 5 years for the first offense, and 10 years for the second. Displaying unauthorized passwords on hacking bulletin boards carries a maximum penalty of 1 year in prison for the first offense, and 10 years for the second.
German Teens Crack NASA
Washington, D.C. -- A group of West German teenagers from the Chaos Computer Club penetrated a NASA network recently, saying they were doing it to "test the security."
What they got into was SPAN Net, a computer network with about 700 notes, which is actually based at the Goddard Space Center in Maryland. All that's in there is unclassified data, space science information, and post-flight data analysis. "Anyone with NASA related research can apply for access to SPAN" says a spokesman, who adds that the network runs on DEC VAX hardware. "We picked up three attempts to gain access and put in security precautions so it wouldn't happen." His personal opinion is, "We're happy that they couldn't get back in, and decided to go public." He also added that NASA has many other networks, many of the classified and "probably impenetrable. But I do not want to challenge anybody."
How'd they get in? Probably they got a West German NASA licensee, which gave them a visitor's pass, then they created new passwords with unlimited security for themselves, after which getting around the network was easy.
91. Remote Informer Issue #4 by Tracker, Norman Bates, Ye Cap'n
There are currently three different forms of switching systems that are present in the United States today. Step by Step (SxS), Crossbar, and the Electronic Switching System (ESS) make up the group. Phreaks have always been a little tentative when it comes to "doing their work" once they have heard about effects of switching systems on their hobby. After researching this topic, I have found that there really is not that much to be worried about. Read on, while I share with you information which I have compiled about all of these switching systems and their distinct features.
The first switching system that was used in the country was called Step by Step. This was adopted in 1918 by Bell, and until 1978, they had over 53% of all their exchanges using Step by Step (SxS). This system is known for it's long, confusing train of switches that are used for its step by step switching.
Step by Step has many disadvantages to phone users. The switch train becomes jammed fairly often, and it causes calls to be blocked. Also, SxS does not allow the use of DTMF dialing. This accounts for some of the areas in the United States that cannot have touch tone dialing abilities. A tremendous amount of electricity and maintenance needs to accompany the SxS switching system, which makes it even more impratical. All in all, this is probably the most archaic switching system around.
There are a number of ways to see if you are on SxS. You will notice that there are no pulsing digits after dialing. Most sources say that the phone company will sound like many typewriters. SxS does not offer features such as speed calling, call forwarding, three-way calling, call waiting, and other such services. Pay phones on SxS also will want your money before you receive a dial tone. This adds to the list of disadvantages labeled to that of the Step by Step switching systems.
Another type of switching system that is prevalent in the United States is Crossbar. Crossbar has been Bell's primary switcher after 1960, and three types of it exists. Number 1 Crossbar (1xB), Number 4 Crossbar (4xB), and the Number 5 Crossbar (5xB). In Crossbar, a switching matrix is used for all the phones in an area, and when someone calls, the route is determined and is met up with the other phone. This matrix is set-up in horizontal and vertical paths. Unlike other switching systems, in my research, I could not come up with any true and definite distinguishing features of the Crossbar switching systems.
The Electronic Switching System (ESS) is yet another switching system used in the United States and the most used of all three switching systems. ESS is an extremely advanced and multi-faced type of switching system, and is feared by marauders of the phone company everywhere. With ESS, your phone company is able to know every digit dialed (including mistakes), who you call, when you called, and how long you were connected. ESS is also programmed to print out the numbers of people who make excessive calls to WATS numbers (800 services) or directory assistance. This feature of ESS is called 800 Exceptional Calling Report, and has spelled the end of some forms of continuous code hacks to certain extenders. ESS can also be programmed to print logs of who called and abused certain numbers as well. Everything is kept track of in its records.
The aforementioned facts show that ESS has made the jobs of organizations such as the FBI, NSA, and other phone company security forces easier. Tracing can be done in a matter of microseconds, and the result will be conveniently printed out on the monitor of a phone company officer. ESS is also programmed to pick up any "foreign tones" on the phone line such as the many varied tones emulated by boxes.
ESS can be identified by a few features common in it. The 911 emergency service is covered in the later versions of ESS. Also, you are given the dial tone first when using a pay phone unlike that of SxS. Calling services like call forwarding, speed calling, and call waiting are also common to ESS. One other feature common to ESS is ANI (Automatic Number Identification) for long distance calls. As you can see, ESS is basically the zenith of all switching systems, and it will probably plague the entire country by the early 1990's. Soon after, we should be looking forward to a system called CLASS. This switching system will contain the feature of having the number of the person that is calling you printed out on your phone.
What have I concluded about these switching systems? Well, they are not good enough. I know a few people employed by the phone company, and I know for a fact that they do not have enough time these days to worry about code users, especially in large, metropolitan areas. So, I will go out on a limb here, and say that a large portion of people will never have to worry about the horrors of ESS.
New Gizmo Can Change Voice Gender
The most amazing device has turned up in the new Hammacher Schlemmer catalog: the telephone voice gender changer. What it does is change the pitch of your voice from, say, soprano to bass -- a most efficient way to dissuade an obscene phone caller just as he's getting warmed up. That is not the same as running a 45 rpm. record at 33. In digital conversion, the pitch can be changed without altering the speed.
The device runs on a 9-volt batter and attaches to the telephone mouth piece with a rubber coupler that takes but a moment to slip on and off. With the changer switched on, says Lloyd Gray, a Hammacher Schlemmer technical expert, "the effect is similar to what you hear when they interview an anonymous woman on television and disguise her voice by deepening it." "It's better for changing a woman's voice to a man's than the other way around," Gray said. A man can use it to raise the pitch of his voice, but he still won't sound like a woman."
A man could, however, use the changer to disguise his voice. But with the device set on high, Gray's voice still could be identified as his own. On low, his normal tenor became so gravel like that the words were unintelligible.
92. Remote Informer Issue #5 by Tracker, Norman Bates, and Ye Cap'n
WASHINGTON -- American Telephone & Telegraph Co. proposed Tuesday to lower its interstate long-distance rates by an average of 3.6% to reflect reduced costs in connecting to the local telephone network. The largest decrease -- 6.3% -- would be seen in day time prices "Because of the need to make those rates more competitive," AT&T said.
Rates for calls made during evening hours would drop 2.2% and calls made during the late night and weekends would be cut by 0.8%, the company said. The rate reductions would take effect Jan. 1, if they are approved by the Federal Communications Commission. Reacting to the proposed price cuts, MCI Communications Corp. and US Sprint Communications Co., the nation's second-largest and third-largest long distance companies respectively, said their response would depend on what the FCC finally approves but both said they intended to remain competitive with AT&T. AT&T, the nation's largest long-distance company, proposed to the FCC that its rates drop as much as $800 million, but AT&T said the exact amount will depend on the access charges the FCC allows the local telephone companies to collect from long distance carriers, which must pay the fees to hook into the phone local network.
AT&T has challenged the new access rates filed by the regional Bell operating companies, contending they are more than $1 billion too high. In proposing its new rates, the long-distance leader told the FCC it expects local companies' access fees to fall by at least $200 million -- which would amount to an average rate reduction of less than 1%. But the company said it believes the FCC will order an additional $600 million in reductions based on AT&T's challenge.
"We're confident the FCC will recognize that access charges filed by the local telephone companies need to be substantially reduced, which would mean more savings for our customers," said Larry Garfinkel, AT&T vice president for marketing. He said the company filed its proposed rates based on disputed charges because "we wanted to let the public react ... and further to let the FCC have full knowledge of where we were heading given our expectation that we had a valid basis for our dispute."
AT&T's long-distance rates have fallen by about 34% since the company was stripped of its local operating companies by an antitrust decree nearly four years ago. Since then, phone rate payers have been paying a larger share of the
costs of maintaining the local network through monthly subscriber line charges,
now $2.60 for residential customers. That has reduced the long-distance companies' share of local network expenses, which they pay in the form of access charges. Jack Grubman, a telephone analyst with PaineWebber Inc., said AT&T's proposal targets business customers because "that's where the competition is and where the better (profit) margins are." In addition, it aims to keep the pressure on competition in international calling by extending discounts to more customers. Grubman added that, if the company's rate proposal is approved by the FCC, he would expect no further cuts in AT&T rates in 1988. Wendell Lind, AT&T administrator of rates and tariffs, said the cuts for business and residential customers are about the same because business cuts are offset by a proposed $128 million increase in AT&T's private line rates.
AT&T is the only long-distance company whose rates are regulated by the FCC, but its prices set the pace for the industry. Though AT&T is far larger than any of its competitors, its market share has been declining since divestiture and the company now says it serves about 75 percent of the market. In addition to the reductions in basic long-distance rates, AT&T proposed cutting prices by 5% and 5.7% for its Pro-America calling plans. The company also proposed to reduce prices by 2.9 percent for its 800 Service customers and 4.4 percent for WATS customers, although it would increase the monthly access line charges for those plans by $3.20 to reflect higher special access charges filed by the local phone companies.
US Sprint Operator Service Traffic Increases 40%
ORLANDO, Fla. -- US Sprint Wednesday announced its long distance operators who began saying, "May I help you?" just five months ago, are now handling 3« million calls a month.
The fiber-optic long-distance carrier, offering the only operator service alternative to AT&T has experienced a 40 percent growth in operator service calls since it announced its service July 1. Amanda Weathersby, US Sprint vice president of product marketing, said Tuesday, "More and more people are taking advantage of our call completion assistance and alternative billing arrangements. "Customer surcharges are the same as AT&T with the added benefit of US Sprint's fiber-optic quality and lower long-distance rates." US Sprint currently offers person-to-person, station-to-station, call completion and collect calling. US Sprint has announced an agreement with US WEST Service Link that will allow anyone to call on US Sprint and charge their calls to a Regional Bell Operating Co. calling card beginning in first quarter 1988.
"Previously, our operator service was available only on pre-subscribed US Sprint phones and recently we added operator assistance for US Sprint FON CARD customers," Weathersby said. "With this new agreement, we'll be able to expand our operator service to markets such as pay phones, hospitals, and hotels/motels." The newest 24-hour operator service center in Dallas began operations on Oct. 5. US Sprint's other operator service centers are in: Cherry Hill, NJ; Atlanta; Lombard, IL and Reno, NV. US Sprint is a joint venture of United Telecommunications Inc. of Kansas City, MO and GTE Corp. of Stamford, Conn.
Pacific Bell Pursuing Calling Card Thief
SAN FRANCISCO--(BW)--Pacific Bell is warning consumers to protect their telephone calling cards like any other credit card in the wake of a series of frauds by people posing as phone company employees. A Pacific Bell spokesman says customers in the 213, 805 and 916 area codes are being victimized by someone who says he is a telephone company employee investigating calling card fraud. The individual calls people at home at odd hours, asking for their calling card numbers. He then sells the numbers to people who use the numbers to make long distance phone calls.
As recently as Monday of this week, 180 long distance calls were billed to a Sacramento area resident who had given his number to the thief just three hours earlier. According to Pacific Bell, this kind of scheme and other forms of calling card fraud cost telephone customers nationwide half a billion dollars a year. The company offered these tips to consumers to avoid becoming a victim
of calling card fraud:
Never give your calling card number or personal identification number to anyone. Any telephone company employee with a legitimate need to know the number has access to it. Treat your calling card like any other credit card. Report its loss immediately by calling the 800 number on the back of the card 800-621-0430. If you receive a suspicious call regarding your telephone calling card, report it by calling the 800 number on the back of the card. If you receive a call from someone claiming to be a telephone company employee and asking for your calling card number, ask for a name and number to call back. Then call the local Pacific Bell business office to report the incident.
One suspect was arrested in Southern California last week by a quick thinking customer who did just that. Pacific Bell immediately contacted the local police department. A suspect holding seven stolen calling card numbers was arrested minutes later. Pacific Bell and long-distance telephone companies will credit customers for calling card charges determined to be fraudulent. Pacific Bell is a subsidiary of Pacific Telesis Group, a diversified telecommunications corporation based in San Francisco.
93. The Phreaker's Guide to Loop Lines by The Jolly Roger
A loop is a wondrous device which the telephone company created as test numbers for telephone repairmen when testing equipment. By matching the tone of the equipment with the tone of the loop, repairmen can adjust and test the settings of their telephone equipment. A loop, basically, consists of two different telephone numbers. Let's use A and B as an example. Normally if you call A, you will hear a loud tone (this is a 1004 hz tone), and if you call B, the line will connect, and will be followed by silence.
This is the format of a loop line. Now, if somebody calls A and someone else calls B--Viola!--A and B loop together, and one connection is made. Ma Bell did this so repairmen can communicate with each other without having to call their own repair office. They can also use them to exchange programs, like for ANA or Ringback. Also, many CO's have a "Loop Assignment Center". If anyone has any information on these centers please tell me. Anyway, that is how a loop is constructed. From this information, anyone can find an actual loop line. Going back to the A and B example, Note: the tone side and the silent side can be either A or B. Don't be fooled if the phone company decides to scramble them around to be cute. As you now know, loops come in pairs of numbers. Usually, right after each other.
For example: 817-972-1890
Or, to save space, one loop line can be written as 817-972-1890/1. This is not always true. Sometimes, the pattern is in the tens or hundreds, and, occasionally, the numbers are random. In cities, usually the phone company has set aside a phone number suffix that loops will be used for. Many different prefixes will correspond with that one suffix. In Arlington, Texas, a popular suffix for loops is 1893 and 1894, and a lot of prefixes match with them to make the number.
For Example: 817-460-1893/4
...are all loops...
or a shorter way to write this is:
xxx= 460, 461, 465, 467, 469
Note: You can mix-and-match a popular suffix with other prefixes in a city, and almost always find other loops or test numbers.
Note: For Houston, the loop suffixes are 1499 and 1799. And for Detroit it's 9996 and 9997. When there are a large number of loops with the same prefix format, chances are that many loops will be inter-locked. Using the above example of Arlington loops again, (I will write the prefixes to save space) 460,
461, and 469 are interlocked loops. This means that only one side can be used at
a given time. This is because they are all on the same circuit. To clarify, if 817-461-1893 is called, 817-460 and 469-1893 cannot be called because that circuit is being used. Essentially, interlocked loops are all the same line, but there are a variety of telephone numbers to access the line.
Also, if the operator is asked to break in on a busy loop line he/she will say that the circuit is overloaded, or something along those lines. This is because Ma Bell has taken the checking equipment off the line. However, there are still many rarely used loops which can be verified and can have emergency calls taken on them. As you have found out, loops come in many types. Another type of loop is a filtered loop. These are loop lines that the tel co has put a filter on, so that normal human voices cannot be heard on either line. However, other frequencies may be heard. It all depends on what the tel co wants the loop to be used for. If a loop has gotten to be very popular with the local population or used frequently for conferences, etc. the tel co may filter the loop to stop the unwanted "traffic". Usually, the filter will be removed after a few months, though.
94. How Ma Bell Works by The Jolly Roger
In this article, I will first describe the termination, wiring, and terminal hardware most commonly used in the Bell system, and I will include section on methods of using them.
The local telephone network between the central office/exchange and the telephone subscribers can be briefly described as follows:
From the central office (or local exchange) of a certain prefix(es), underground area trunks go to each area that has that prefix (Usually more than one prefix per area.) At every few streets or tract areas, the underground cables surface. They then go to the telephone pole (or back underground, depending on the area) and then to the subscribers house (or in the case of an apartment building or mutli-line business, to a splitter or distribution box/panel). Now that we have the basics, I'll try and go in-depth on the subject.
These are sometimes inter-office trunks, but usually in a residential area they are trunk lines that go to bridging heads or distribution cases. The cables are about 2-3 inches thick (varies), and are either in a metal or pvc-type pipe (or
similar). Rarely (maybe not in some remote rural areas) are the cables just 'alone' in the ground. Instead they are usually in an underground cement tunnel (resembles a small sewer or storm drain.) The manholes are heavy and will say 'Bell system' on them. They can be opened with a « inch wide crowbar (Hookside) inserted in the top rectangular hole. There are ladder rungs to help you climb down. You will see the cable pipes on the wall, with the blue and white striped one being the inter-office trunk (at least in my area). The others are local lines, and are usually marked or color coded. There is almost always a posted color code chart on the wall, not to mention Telco manuals describing the cables and terminals, so I need not get into detail. Also, there is usually some kind of test equipment, and often Bell test sets are left in there.
The innocent-looking grayish-green boxes. These can be either trunk bridges or bridging for residences. The major trunk bridging heads are usually larger, and they have the 'Western Electric' logo at the bottom, whereas the normal bridging heads (which may be different in some areas-depending on the company you are served by. GTE B.H.'s look slightly different. Also, do not be fooled by sprinkler boxes!) They can be found in just about every city. To open a bridging head: if it is locked (and you're feeling destructive), put a hammer or crowbar (the same one you used on the manhole) in the slot above the top hinge of the right door. Pull hard, and the door will rip off. Very effective! If it isn't locked (as usual), take a 7/8 inch hex socket and with it, turn the bolt about 1/8 of a turn to the right (you should hear a spring release inside). Holding the bolt, turn the handle all the way to the left and pull out. To Check for a test-set (which are often left by Bell employees), go inside - First check for a test-set (which are often left by Bell employees). There should be a panel of terminals and wires. Push the panel back about an inch or so, and rotate the top latch (round with a flat section) downward. Release the panel and it will fall all the way forward. There is usually a large amount of wire and extra terminals. The test-sets are often hidden here, so don't overlook it (Manuals, as well, are sometimes placed in the head). On the right door is a metal box of alligator clips. Take a few (Compliments of Bell.). On each door is a useful little round metal device. (Says 'insert gently' or 'clamp gently - do not overtighten' etc..) On the front of the disc, you should find two terminals. These are for your test set. (If you don't have one, dont despair - I'll show you ways to make basic test sets later in this article). Hook the ring (-) wire to the 'r' terminal; and the tip (+) wire to the other. (By the way, an easy way to determine the correct polarity is with a 1«v LED. Tap it to the term. pair, if it doesn't light, switch the poles until it does. When it lights, find the longer of the two LED poles: This one will be on the tip wire (+). Behind the disc is a coiled up cord. This should have two alligator clips on it.. Its very useful, because you don't have to keep connecting and disconnecting the fone (test set) itself, and the clips work nicely. On the terminal board, there should be about 10 screw terminals per side. Follow the wires, and you can see which cable pairs are active. Hook the clips to the terminal pair, and you're set! Dial out if you want, or just listen (If someone's on the line). Later, I'll show you a way to set up a true 'tap' that will let the person dial out on his line and receive calls as normal, and you can listen in the whole time. More about this later... On major prefix-area bridging heads, you can see 'local loops', which are two cable pairs (cable pair = ring+tip, a fone line) that are directly connected to each other on the terminal board. These 'cheap loops' as they are called, do not work nearly as well as the existing ones set up in the switching hardware at the exchange office. (Try scanning your prefixes ‘00xx to 99xx #'s.) The tone sides will announce themselves with the 1008 hz loop tone, and the hang side will give no response. The first person should dial the 'hang' side, and the other person dial the tone side, and the tone should stop if you have got the right loop.) If you want to find the number of the line that you're on, you can either try to decipher the 'bridging log' (or whatever), which is on the left door. If that doesn't work, you can use the following:
ANI # (Automatic Number ID)
This is a Telco test number that reports to you the number that you're calling from (It's the same, choppy 'Bell bitch' voice that you get when you reach a disconnected number)
213 NPA - Dial 1223
408 NPA - Dial 760
914 NPA - Dial 990
These are extremely useful when messing with any kind of line terminals, house boxes, etc. Now that we have bridging heads wired, we can go on... (don't forget to close and latch the box after all... Wouldn't want GE and Telco people mad, now, would we?)
"CANS" - Telephone Distribution Boxes
Basically, two types:
1.Large, rectangular silver box at the end of each street.
2.Black, round, or rectangular thing at every telephone pole.
Type 1 - This is the case that takes the underground cable from the bridge and runs it to the telephone pole cable (The lowest, largest one on the telephone pole.) The box is always on the pole nearest the bridging head, where the line comes up. Look for the 'Call before you Dig - Underground cable' stickers.. The case box is hinged, so if you want to climb the pole, you can open it with no problems. These usually have 2 rows of terminal sets. You could try to impersonate a Telco technician and report the number as 'new active' (giving a fake name and fake report, etc.) I don't recommend this, and it probably won't (almost positively won't) work, but this is basically what Telco linemen do.)
Type 2 - This is the splitter box for the group of houses around the pole (Usually 4 or 5 houses). Use it like I mentioned before. The terminals (8 or so) will be in 2 horizontal rows of sets. The extra wires that are just 'hanging there' are provisions for extra lines to residences (1 extra line per house, that's why the insane charge for line #3!) If its the box for your house also, have fun and swap lines with your neighbor! 'Piggyback' them and wreak havoc on the neighborhood (It's eavesdropping time...) Again, I don't recommend this, and its difficult to do it correctly. Moving right along...
APARTMENT / BUSINESS MULTI-LINE DISTRIBUTION BOXES
Found outside the building (most often on the right side, but not always... Just follow the wire from the telephone pole) or in the basement. It has a terminal for all the lines in the building. Use it just like any other termination box as before. Usually says 'Bell system' or similar. Has up to 20 terminals on it (usually.) the middle ones are grounds (forget these). The wires come from the cable to one row (usually the left one), with the other row of terminals for the other row of terminals for the building fone wire pairs. The ring (-) wire is usually the top terminal if the set in the row (1 of 10 or more), and the tip is
in the clamp/screw below it. This can be reversed, but the cable pair is always terminated one-on-top-of-each- other, not on the one next to it. (I'm not sure why the other one is there, probably as a provision for extra lines) Don't use it though, it is usually to close to the other terminals, and in my experiences you get a noisy connection.
Final note: Almost every apartment, business, hotel, or anywhere there is more than 2 lines this termination lines this termination method is used. If you can master this type, you can be in control of many things... Look around in your area for a building that uses this type, and practice hooking up to the line, etc. As an added help, here is the basic 'standard' color-code for multi-line terminals/wiring/etc...
Single line: Red = Ring
Green = Tip
Yellow = Ground *
*Connected to the ringer coil in individual and bridged ringer phones (Bell only) Usually connected to the green (Tip)
Ring (-) = Red
Tip (+) = Green (Sometimes yellow, see above.)
Ground = Black
RESIDENCE TERMINAL BOX
Small, gray (can be either a rubber (Pacific Telephone) or hard plastic (AT&T) housing deal that connects the cable pair from the splitter box (See type 2, above) on the pole to your house wiring. Only 2 (or 4, the 2 top terminals are hooked in parallel with the same line) terminals, and is very easy to use. This can be used to add more lines to your house or add an external line outside the house.
Well, now you can consider yourself a minor expert on the terminals and wiring of the local telephone network. Now you can apply it to whatever you want to do.. Here's another helpful item:
How to make a Basic Test-Set and how to use it to dial out, eavesdrop, or seriously tap and record line activity. These are the (usually) orange hand set fones used by Telco technicians to test lines. To make a very simple one, take any Bell (or other, but I recommend a good Bell fone like a princess or a trimline. GTE flip fones work excellently, though..) fone and follow the instructions below.
Note: A 'black box' type fone mod will let you tap into their line, and with the box o, it's as if you weren't there. They can receive calls and dial out, and you can be listening the whole time! Very useful. With the box off, you have a normal fone test set.
A basic black box works well with good results. Take the cover off the fone to expose the network box (Bell type fones only). The terminal should have a green wire going to it (orange or different if touch tone - doesn't matter, its the same thing). Disconnect the wire and connect it to one pole of an SPST switch. Connect a piece of wire to the other pole of the switch and connect it to the terminal. Now take a 10kohm « watt 10% resistor and put it between the terminal ad the terminal, which should have a blue and a white wire going to it (different for touch tone). It should look like this:
--Green wire-- !----
What this does in effect is keep the hookswitch / dial pulse switch (F to RR loop) open while holding the line high with the resistor. This gives the same voltage effect as if the fone was 'on-hook', while the 10k ohms holds the voltage right above the 'off hook' threshold (around 22 volts or so, as compared to 15-17 or normal off hook 48 volts for normal 'on-hook'), giving Test Set Version 2.
Another design is similar to the 'Type 1' test set (above), but has some added features:
From >----------------Tip----------------------Ring----- [HUNT]
2.C 2011,PCP10000, [HUNT]
3.C 2011.10,PCP10000, [NON HUNT]
The first, is self explanatory. The second does the same thing as the first, only that it is slightly faster and gives the user much greater flexibility. The third is an example the flexibility, because a request is made to connect to the tenth, and only the tenth, modem on the NJNEW/3 port. By simply attempting to connect to every single modem in the 2011 chain, we were able to count the number of modems on each port and come up with the following charts which were extracted on June the twenty ninth of the year 1989:
Rotary Port Direct Address Max. Range City Total Rotary Port Direct Address Max. Range City Total
NJNEW/3 2011 .12 56 CAOAK/3 4155 .4 16
/12 201301 .4 /12 415216 .8
/24 20122 .4 /24 41511 .4
DCWAS/3 202115 .6 46 CAPAL/3 415106 .4 12
/12 202116 .24 /12 415224 .8
/24 202117 .16 /24 NONE NONE
CTHAR/3 NONE NONE 8 CASFA/3 415215 .6 20
/12 203120 .8 /12 415217 .10
/24 NONE NONE /24 41523 .4
WASEA/3 20617 .4 30 ORPOR/3 50320 .2 8
/12 20619 .22 /12 50321 .6
/24 20621 .4 /24 NONE NONE
NYNYO/3 212315 .4 22 AZPHO/3 60222 .4 20
/12 212316 .14 /12 60223 .12
/24 21228 .4 /24 60226 .4
CALAN/3 213412 .8 40 MNMIN/3 612120 .4 22
/12 213413 .28 /12 612121 .14
/24 21323 .4 /24 61222 .4
TXDAL/3 214117 .6 30 MABOS/3 617311 .4 32
/12 214118 .22 /12 617313 .20
/24 21422 .4 /24 61726 .8
PAPHI/3 215112 .6 36 TXHOU/3 713113 .8 42
/12 2155 .22 /12 713114 .24
/24 21522 .8 /24 71324 .1
OHCLE/3 21620 .4 26 CACOL/3 71423 .4 18
/12 21621 .18 /12 7144 .1
/24 216120 .4 /24 71424 .4
CODEN/3 303114 .4 40 CASAN/3 714119 .4 20
/12 303115 .18 /12 714213 .12
/24 30321 .22 /24 714124 .4
FLMIA/3 305120 .6 28 CASDI/3 714102 .4 22
/12 305121 .18 (619)/12 714210 .14
/24 305122 .4 /24 714121 .4
ILCHI/3 312410 .8 40 UTSLC/3 80120 .4 22
/12 312411 .28 /12 80121 .14
/24 31224 .4 /24 80112 .4
MIDET/3 313214 .6 30 FLTAM/3 81320 .4 18
/12 313216 .18 /12 81321 .1
/24 31324 .6 /24 813124 .4
MOSLO/3 3145 .4 16 MOKCI/3 816104 .4 20
/12 314421 .8 /12 816221 .12
/24 31420 .4 /24 816113 .4
GAATL/3 404113 .8 32 CAGLE/3 NONE NONE ??
/12 404114 .20 /12 81821 .18
/24 40422 .4 /24 NONE NONE
CASJO/3 408111 .4 34 CASAC/3 9167 .4 16
/12 40821 .26 /12 91611 .8
/24 408110 .4 /24 91612 .4
WIMIL/3 41420 .4 24 NCRTP/3 91920 .4 20
/12 41421 .16 /12 91921 .12
/24 414120 .4 /24 919124 .4
NOTE: CASAC/3, CASAC/24 were estimated.
PC-Pursuit Modems Statistics Chart
Number of Modems - 01/29/89
Mnemonic 300 1200 2400 Total
NJNEW 12 40 4 56
DCWAS 6 24 16 46
CTHAR 0 8 0 8
WASEA 4 22 4 30
NYNYO 4 14 4 22
CALAN 8 28 4 40
TXDAL 6 22 4 32
PAPHI 6 22 8 36
OHCLE 4 18 4 26
CODEN 4 18 22 44
FLMIA 6 18 4 28
ILCHI 8 28 4 40
MIDET 6 18 6 30
MOSLO 4 8 4 16
GAATL 8 20 4 32
CASJO 4 26 4 34
WIMIL 4 16 4 24
CAOAK 4 8 4 16
APAL 4 8 0 12
CASFA 6 10 4 20
ORPOR 2 6 0 8
AZPHO 4 12 4 20
MNMIN 4 14 4 22
MABOS 4 20 8 32
TXHOU 8 24 10 42
CACOL 4 10 4 18
CASAN 4 12 4 20
CASDI 4 14 4 22
UTSLC 4 14 4 22
FLTAM 4 10 4 18
MOKCI 4 12 4 20
CAGLE 4 18 4 26
CASAC 4 8 4 16
NCRTP 4 12 4 20
Total 166 562 170 898
Average 4.8823529 16«29412 5 26.411765
I think the statistics basically speak for themselves. I am sure there will no doubt be hundreds of people who will not smile at the number of specific kinds of ports supported, not to mention the number of 'dead' or 'down' modems you will find when you verify the totals. Usually, 2% to perhaps 10% of the modems are 'dead' with specific ones repeatedly failing week after week.
History Of This Collection:
Almost a year ago a small selected group of devoted individuals got together to discuss problems with the PC-Pursuit Network, in the middle of our discussions a question was asked as to how the network really processes our calls. This was intended to help us assess SET commands and other such matters. When the address hypothesis was offered we quickly set out to prove it. It was proved in about 3 minutes with the discovery of 2011 (First try was xxx1). The data has continually been collected and analyzed ever since, but until now, has never been mass released.
A small group of teen age hackers discovered several interesting things that can be done with these addresses -- many of which will not be discussed here short of mentioning that these ports connected to via these addresses are not limited to PC-Pursuiters. You can, however, fight "dead" dialout modems in cities via the address method. Dead modems can be located in about 10 seconds (faster than Telenet), and can either be reported or skipped past by the user connecting to the next modem in the sequence after the "dead" one. (Note: Say 2011.3 is dead, connect to 2011.4 and you will be past it. If 2011.4 is busy, go to 2011«. The reader should notice 2011.3 is the same as 2011C.)
The most interesting value of these addresses is that one can count the number of ports that Telenet keeps so secret (Grin). When there were only 28 cities in operation there were an average of 2.7 300 baud, 9.4 1200 baud, and 2« 2400 baud modems in each city. Some cities had as little as 2 modems on a port and as many as 12. Only recently has the number of modems per city begun to jump.
How To Update The Count Yourself:
An ID is not required to "request" one of these ports, thus the tallying can be done any time of day by simply typing the number at the @ prompt. Here is an example with four modems (NJNEW/24):
201 22A REFUSED COLLECT CONNECTION 19 80
201 22B REFUSED COLLECT CONNECTION 19 80
201 22C REFUSED COLLECT CONNECTION 19 80
201 22D REFUSED COLLECT CONNECTION 19 80
201 22E ILLEGAL ADDRESS 19 80
The reader should be aware that PC-Pursuit ports always respond with '19 80'. Do not confuse it with '19 00', which are not PC-Pursuit ports. In the above example we know there are four ports because the forth was the last existing port before we encountered the 'ILLEGAL ADDRESS.' There are several ways to signify that you have gone one beyond the end of the ports:
1.xxx xxx ILLEGAL ADDRESS 19 80
2.xxx xxx NOT OPERATING 19 80
3.The request freezes (Note: Issue a BREAK then D to abort the attempt yielding 'ATTEMPT ABORTED'.)
You should be aware that modems which are out of order in the middle of the sequence can respond with 'NOT OPERATING' or may freeze the request. You should also note that when updating the existing list, all you need to do is try to request the next modem beyond the end as of the last check.
Finding Newly Added Ports:
Many ports have not yet been installed; hence, we do not yet know the addresses. New ports may be found by entering the first three digits of the area code and appending (1-29, 101-129, 201-229, 301-329, etc.) until the 'REFUSED COLLECT CONNECTION 19 80' appears. Once this is found, simply log onto the port address with your ID and R/V dial some silly series of digits, disconnect the port, then connect to the PC-Pursuit mnemonic you think it might be and R/V redial the last number. If the numbers match, you found it.
98. Pearl Box Plans by The Jolly Roger
The Pearl Box: Definition - This is a box that may substitute for many boxes which produce tones in hertz. The Pearl Box when operated correctly can produce tones from 1-9999hz. As you can see, 2600, 1633, 1336 and other crucial tones are obviously in its sound spectrum.
Materials you will need:
1.C1, C2:«mf or «uf ceramic disk capacitors
2.Q1.....NPN transistor (2N2222 works best)
3.S1.....Normally open momentary SPST switch
4.S2.....SPST toggle switch
5.B1.....Standard 9-Volt battery
6.R1.....Single turn, 50k potentiometer
7.R2.....Single turn, 100k potentiometer
8.R3.....Single turn, 500k potentiometer
9.R4.....Single turn, 1Meg potentiometer
10.SPKR...Standard 8-ohm speaker
11.T1.....Mini transformer (8-ohm works best)
12.Misc...Wire, solder, soldering iron, PC board or perfboard, box to contain the completed unit, battery clip
Instructions for building Pearl Box:
Since the instruction are EXTREMELY difficult to explain in words, you will be given a schematic instead. It will be quite difficult to follow but try it any way.
(Schematic for The Pearl Box)
! ! \
C1 C2 \
! ! +
+ + -----+T1
! b c-------! +
! Q1 ! +-S1-
! e-----S2---+ ! SPKR
! ! ! +----
! B1 !
! ! !
!R1 R2 R3 R4!
/\/\ /\/\ /\/\ /\/\
+--+ +--+ +--+
Now that you are probably thoroughly confused, let me explain a few minor details. The potentiometer area is rigged so that the left pole is connected to the center pole of the potentiometer next to it. The middle terminal of T1 is connected to the piece of wire that runs down to the end of the battery.
Correct operation of The Pearl Box:
You may want to get some dry-transfer decals at Radio Shack to make this job a lot easier. Also, some knobs for the tops of the potentiometers may be useful too. Use the decals to calibrate the knobs. R1 is the knob for the ones place, R2 is for the tens place, R3 if for the hundreds place and R4 is for the thousands place. S1 is for producing the all the tones and S2 is for power.
1.Turn on the power and adjust the knobs for the desired tone.
(Example: For 2600 hz-R1=0:R2=0:R3=6:R4=2)
2.Hit the push-button switch and VIOLA! You have the tone. If you don't have a tone recheck all connections and schematic.
99. The Phreak file by The Jolly Roger
202 282 3010 UNIV. OF D.C.
202 553 0229 PENTAGON T.A.C.
202 635 5710 CATHOLIC UNIV. OF AMERICA
202 893 0330 DEFENSE DATA NETWORK
202 893 0331 DEFENSE DATA NETWORK
202 965 2900 WATERGATE
203 771 4930 TELEPHONE PIONEERS
206 641 2381 VOICE OF CHESTER
212 526 1111 NEW YORK FEED LINE
212 557 4455 SEX HOT LINE
212 799 5017 ABC NY FEED LINE
212 934 9090 DIAL-AN-IDIOT
212 976 2727 P.D.A.
212 986 1660 STOCK QUOTES
213 541 2462 STOCK MARKET REPORTS
213 547 6801 NAVY SHIPS INFO
213 576 6061 " "
213 664 3321 NEWS FOR THE BLIND
301 393 1000 " "
301 667 4280 LOTTERY INFO
312 939 1600 " "
404 221 5519 NUCLEAR COMMISSION
408 248 8818 1ST NATIONAL BANK
415 642 2160 EARTHQUAKE REPORT
505 883 6828 " "
512 472 2181 " "
512 472 4263 WEIRD RECORDING
512 472 9833 " "
512 472 9941 INSERT 25 CENTS
512 472 9941 SPECIAL RECORDING
512 870 2345 " "
516 794 1707 " "
619 748 0002 LOOP LINE
619 748 0003 " "
703 331 0057 MCI (5 DIGITS)
703 334 6831 WASH. POST
703 354 8723 COMPEL INC.
703 737 2051 METROPHONE (6 DIGITS)
703 835 0500 VALNET (5 DIGITS)
703 861 7000 SPRINT (6/8 DIGITS)
703 861 9181 SPRINT (6/8 DIGITS)
714 974 4020 CA. MAINFRAME
716 475 1072 N.Y. DEC-SYSTEM
800 222 0555 RESEARCH INSTITUTE
800 223 3312 CITIBANK
800 227 5576 EASTERN AIRLINES
800 248 0151 WHITE HOUSE PRESS
800 321 1424 FLIGHT PLANES
800 323 3026 TEL-TEC (6 GIGITS)
800 323 4756 MOTOROLA DITELL
800 323 7751 MCI MAINFRAME
800 325 4112 EAsYLINK
800 325 6397 FYI
800 344 4000 MSG SYSTEM
800 368 6900 SKYLINE ORDER LINE
800 424 9090 RONALD REAGAN'S PRESS
800 424 9096 WHITE HOUSE SWITCH
800 438 9428 ITT CITY CALL SWITCHING
800 521 2255 AUTONET
800 521 8400 TRAVELNET (8 DIGITS)
800 526 3714 RCA MAINFRAME
800 527 1800 TYMNET
800 621 3026 SPECIAL OPERATOR
800 621 3028 " "
800 621 3030 " "
800 621 3035 " "
800 631 1146 VOICE STAT
800 821 2121 BELL TELEMARKETING
800 828 6321 XEROX $
800 858 9313 RECORD-A-VOICE
800 882 1061 AT&T STOCK PRICES
914 997 1277 " "
916 445 2864 JERRY BROWN
N/A 950 1000 SPRINT
N/A 950 1022 MCI EXECUNET
N/A 950 1033 US TELEPHONE
N/A 950 1044 ALLNET (6 DIGITS)
N/A 950 1066 LEXITEL
N/A 950 1088 SKYLINE (6 DIGITS)
PHONE # | DESCRIPTION/CODE
201-643-2227 | CODES:235199, 235022 AND 121270
800-325-4112 | WESTERN UNION
800-547-1784 | CODES:101111, 350009 AND 350008
800-424-9098 | TOLL FREE WHITE HS.
800-424-9099 | DEFENSE HOT LINE
202-965-2900 | WATERGATE
800-368-5693 | HOWARD BAKER HOTLINE
202-456-7639 | REAGANS SECRETARY
202-545-6706 | PENTAGON
202-694-0004 | PENTAGON MODEM
201-932-3371 | REUTERS
800-325-2091 | PASSWORD: GAMES
800-228-1111 | AMERICAN EXPRESS
617-258-8313 | AFTER CONNECT PRESS CTRL-C
800-323-7751 | PASSWORD:REGISTER
800-322-1415 | CODES:266891, 411266 AND 836566 (USED BY SYSOP)
The following 800 #'s have been collected however no codes have been found yet! if you hack any please let me know...
phone # | codes:
800-321-3344 | ???????????
800-323-3027 | ???????????
800-323-3208 | ???????????
800-323-3209 | ???????????
800-325-7222 | ???????????
800-327-9895 | ???????????
800-327-9136 | ???????????
800-343-1844 | ???????????
800-547-1784 | ???????????
800-547-6754 | ???????????
800-654-8494 | ???????????
800-682-4000 | ???????????
800-858-9000 | ???????????
800 numbers with carriers.
1-800 numbers of the government.
800-321-1082:NAVY FINANCE CENTER.
800-424-5201:EXPORT IMPORT BANK.
800-523-0677:ALCOHOL TOBACCO AND.
CNTR1-1082:NAVY FINANCE CENTER.
800-424-5201:EXPORT IMPORT BANK.
800-523-0677:ALCOHOL TOBACCO AND.
800-532-1556:FED INFORMATION CNTR.
800-325-4072:COMBAT & ARMS SERVICE.
800-325-4095:COMBAT SUPPORT BRANCH.
800-325-4890:ROPD USAR COMBAT ARMS.
800-426-5996:PUGET NAVAL SHIPYARD.
Directory of toll free numbers.
800-426-5996:PUGET NAVAL SHIPYARD.
Directory of toll free numbers.
213-765-1000:LIST OF MANY NUMBERS.
213-992-8282:METROFONE ACCESS NUMBER
After entering the sprint code, and, C+Destination number. Then enter this
number: “205#977#22", And the main tracer for sprint will be disabled.
215-561-3199/SPRINT LONG DISTANCE
800-424-9090/RONALD REAGAN'S PRESS
212-799-5017/ABC NEW YORK FEED LINE
800-882-1061/AT & T STOCK PRICES
619-748-0002/FONE CO. TESTING LINES
900-410-6272/SPACE SHUTTLE COMM.
215-466-6680/BELL OF PENNSYLVANIA
312-368-8000/ILLINOIS BELL TELEPHONE
207-955-1111/NEW ENGLAND TELEPHONE
201-483-3800/NEW JERSEY BELL
212-395-2200/NEW YORK TELEPHONE
206-345-2900/PACIFIC NORTHWEST BELL
205-321-2222/SOUTH CENTRAL BELL
203-771-4920/SOUTHERN NEW ENGLAND
518-471-8111/CNA OF NY
800-228-1111/VISA CREDIT CHECK
404-885-3460/SEARS CREDIT CHECK
503-345-3043/AVANT GARDE CREATIONS
801-753-6990/COMPUTER DATA SYSTEMS
919-983-1990/MED SYSTEMS SOFTWARE
203-661-8799/PROGRAM DESIGN (PDI)
Here are a few tips on how not to get caught when using MCI or other such services:
1.Try not to use them for voice to voice personal calls. Try to use them for computer calls only. Here is why:
MCI and those other services can't really trace the calls that come through the lines, they can just monitor them. They can listen in on your calls and from that, they can get your name and other information from the conversation. They can also call the number you called and ask your friend some questions. If you call terminals and BBS'S then it is much harder to get information. For one thing, most sysops won't give these dudes that call any info at all or they will act dumb because they PHREAK themselves!
2.Beware when using colored boxes! They are easy to find!!!!!
3.Try to find a sine-wave number. Then use an MCI or other service to call it. You will hear a tone that goes higher and lower. If the tone just stops, then that code is being monitored and you should beware when using it.
If you do get caught, then if you think you can, try to weasel out of it. I have heard many stories about people that have pleaded with the MCI guys and have been let off. You will get a call from a guy that has been monitoring you. Act nice. Act like you know it is now wrong to do this kind of thing.....just sound like you are sorry for what you did. (If you get a call, you probably will be a little sorry!) Otherwise, it is very dangerous!!!!!!! (Very with a capital V!)
100.Red Box Plans by The Jolly Roger
Red boxing is simulating the tones produced by public payphones when you drop your money in. The tones are beeps of 2200Hz + 1700Hz a nickle is 1 beep for 66 milliseconds. A dime is 2 beeps, each 66 milliseconds with a 66 millisecond pause between beeps. A quarter is 5 beeps, each 33 milliseconds with a 33 millisecond pause between beeps.
There are two commonly used methods being used by Phreaks to make free calls.
1.An electronic hand-held device that is made from a pair of Wien-bridge oscillators with the timing controlled by 555 timing chips.
2.A tape recording of the tones produced by a home computer. One of the best computers to use would be an Atari ST. It is one of the easier computers to use because the red box tones can be produced in basic with only about 5 statements.
Back To List
Back To Home Page