Skeptic Tank Text Archive File

---
Master Index Current Directory Index Go to SkepticTank Go to Human Rights activist Keith Henson Go to Scientology cult

Skeptic Tank!

Private Sector Bust: By - Shooting Shark : The following article appeared in the August, 1985 On July 12, 1985, law enforcement officials seized the Private Sector BBS, the official computer bulletin board of 2600 magazine, for "complicity in computer theft," under the newly passed, and yet untested, New Jersey Statute 2C:20-25. Police had uncovered in April a credit carding ring operated around a Middlesex County electronic bulletin board, and from there investigated other North Jersey bulletin boards. Not understanding subject matter of the Private Sector BBS, police assumed that the sysop was involved in illegal activities. Six other computers were also seized in this investigation, including those of Store Manager [perhaps they mean Swap Shop Manager? - Shark] who ran a BBS of his own, Beowolf, Red Barchetta, the Vampire, NJ Hack Shack, sysop of the NJ Hack Shack BBS, and that of the sysop of the Treasure Chest BBS. Immediately after this action, members of 2600 contacted the media, who were completely unaware of any of the raids. They began to bombard the Middlesex County Prosecutor's Office with questions and a press conference was announced for July 16. The system operator of the Private Sector BBS attempted to attend along with reporters from 2600. They were effectively thrown off the premises. Threats were made to charge them with trespassing and other crimes. An officer who had at first received them civilly was threatened with the loss of his job if he didn't get them removed promptly. Then the car was chased out of the parking lot. Perhaps prosecutor Alan Rockoff was afraid that he presence of some technically literate reporters would ruin the effect of his press release on the public. As it happens, he didn't need our help. The next day the details of the press conference were reported to the public by the press. As Rockoff intended, paranoia about hackers ran rampant. Headlines got as ridiculous as hackers ordering tank parts by telephone from TRW and moving satellites with their home computers in order to make free phone calls. These and even more exotic stories were reported by otherwise respectable media sources. The news conference understandably made the front page of most of the major newspapers in the US, and was a major news item as far away as Australia and in the United Kingdom due to the sensationalism of the claims. We will try to explain why these claims may have been made in this issue. On July 18 the operator of The Private Sector was formally charged with "computer conspiracy" under the above law, and released in the custody of his parents. The next day the American Civil Liberties Union took over his defense. The ACLU commented that it would be very hard for Rockoff to prove a conspiracy just "because the same information, construed by the prosecutor to be illegal, appears on two bulletin boards." especially as Rockoff admitted that "he did not believe any of the defendants knew each other." The ACLU believes that the system operator's rights were violated, as he was assumed to be involved in an illegal activity just because of other people - 70 - under investigation who happened to have posted messages on his board. In another statement which seems to confirm Rockoff's belief in guilt by association, he announced the next day that "630 people were being investigated to determine if any used their computer equipment fraudulently." We believe this is only the user list of the NJ Hack Shack, so the actual list of those to be investigated may turn out to be almost 5 times that. The sheer overwhelming difficulty of this task may kill this investigation, especially as they find that many hackers simply leave false information. Computer hobbyists all across the country have already been called by the Bound Brook, New Jersey office of the FBI. They reported that the FBI agents used scare tactics in order to force confessions or to provoke them into turning in others. We would like to remind those who get called that there is nothing inherently wrong or illegal in calling any ANY BBS, nor in talking about ANY activity. The FBI would not comment on the case as it is an "ongoing investigation" and in the hands of the local prosecutor. They will soon find that many on the Private Sector BBS's user list are data processing managers, telecommunications security people, and others who are interested in the subject of the BBS, hardly the underground community of computer criminals depicted at the news conference. The Private Sector BBS was a completely open BBS, and police and security people were even invited on in order to participate. The BBS was far from the "elite" type of underground telecom boards that Rockoff attempted to portray. Within two days, Rockoff took back almost all of the statements he had made at the news conference, as AT&T and the DoD [Department of Defense - Shark] discounted the claims he had made. He was understandably unable to find real proof of Private Sector's alleged illegal activity, and was faced with having to return the computer equipment with nothing to show for his effort. Rockoff panicked, and on July 31, the system operator had a new charge against him, "wiring up his computer as a blue box." Apparently this was referring to his Novation Applecat modem which is capable of generating any hertz tone over the phone line. By this stretch of imagination an Applecat could produce a 2600 hertz tone as well as the MF which is necessary for "blue boxing." However, each and every other owner of an Applecat or any other modem that can generate its own tones therefore has also "wired up his computer as a blue box" by merely installing the modem. This charge is so ridiculous that Rockoff probably will never bother to press it. However, the wording of WIRING UP THE COMPUTER gives rockoff an excuse to continue to hold onto the computer longer in his futile search for illegal activity. "We have requested that the prosecutors give us more specific information," said Arthur Miller, the lawyer for The Private Sector. "The charges are so vague that we can't really present a case at this point." Miller will appear in court on August 16 to obtain this information. He is also issuing a demand for the return of the equipment and, if the prosecutors don't cooperate, will commence court proceedings against them. "They haven't been particularly cooperative," he said. - 71 - Rockoff probably will soon reconsider taking Private Sector's case to court, as he will have to admit he just didn't know what he was doing when he seized the BBS. The arrest warrant listed only "computer conspiracy" against Private Sector, which is much more difficult to prosecute than the multitude of charges against some of the other defendants, which include credit card fraud, toll fraud, the unauthorized entry into computers, and numerous others. Both Rockoff and the ACLU mentioned the Supreme Court in their press releases, but he will assuredly take one of his stronger cases to test the new New Jersey computer crime law. by seizing the BBS just because of supposed activities discussed on it, Rockoff raises constitutional questions. Darrell Paster, a lawyer who centers much of his work on computer crime, says the New Jersey case is "just another example of local law enforcement getting on the bandwagon of crime that has come into vogue to prosecute, and they have proceeded with very little technical understanding, and in the process they have abused many people's constitutional rights. What we have developing is a mini witch hunt which is analogous to some of the arrests at day care centers, where they sweep in and arrest everybody, ruin reputations, and then find that there is only one or two guilty parties." We feel that law enforcement, not understanding the information on the BBS, decided to strike first and ask questions later. 2600 magazine and the sysops of the Private Sector BBS stand fully behind the system operator. As soon as the equipment is returned, the BBS will go back up. We ask all our readers to do their utmost to support us in our efforts, and to educate as many of the public as possible that a hacker is not a computer criminal. We are all convinced of our sysop's innocence, and await Rockoff's dropping of the charges. NOTE: Readers will notice that our reporting of the events are quite different than those presented in the media and by the Middlesex County Prosecutor. We can only remind you that we are much closer to the events at hand than the media is, and that we are much more technologically literate than the Middlesex County Prosecutor's Office. The Middlesex County Prosecutor has already taken back many of his statements, after the contentions were disproven by AT&T and the DoD. One problem is that the media and the police tend to treat the seven cases as one case, thus the charges against and activities of some of the hackers has been - 72 - Phreaking AT&T Cards: By - Net Runner My topic will deal with using an AT&T calling card for automated calls. Ok to place a call with an AT&T card, lift the handset (PAY PHONE) hit (0) and the desired area code and the number to call. Also when calling the same number that the card is being billed to you enter the phone number and at the tone only enter the last four digits on the card. But we don't want to do that now, do we. If additional calls are wanted all you do is hit the (#) and you will get a new dial tone! After you hit (#) you do not have to re-enter the calling card number simply enter your desired number and it will connect you. If the number you called is busy just keep hitting (#) and the number to be called until you connect! Ok to calL the U.S. of a from another country, you use the exact same format as described above! Ok now I will describe the procedure for placing calls to a foreign country, such as CANADA,RUSSIA,SOUTH AMERICA, etc.. Ok first lift the handset then enter (01) + the country code + the city code + the local telephone number. Ok after you get the tone enter the AT&T calling card number. Ok if you can not dial operator assisted calls from your area don't worry just jingle the operator and she will handle your call, don't worry she can't see you! The international number on the AT&T calling card is used for calling the US of A from places like RUSSIA, CHINA you never know when you might get stuck in a country like those and you have no money to make a call! The international operator will be able to tell you if they honor the AT&T calling card. Well I hope that this has straightened out some of your problems on the use of an AT&T calling card! All you have to remember is that weather you are placing the call or the operator, be careful and never use the calling card from your home phone!! That is a BIG NO NO.. Also AT&T has came out with a new thing called (NEW CARD CALLER SERVICE) they say that it was designed to meet the public's needs! These phones will be popping up in many place such as airport terminals, hotels, etc... What the new card caller service is, is a new type of phone that has a (CRT) screen that will talk to you in a language of your choice. The service works something like this, when you find a (NEW CARD CALLER PHONE), all you do is follow the instructions on the (CRT) screen, then you insert the (NEW CARD CALLER CARD) and there is a strip of magnetic tape on the card which reads the number, thus no one can hear you saying your number or if there were a bug in the phone,no touch tones will be heard!! You can also bill the call to a third party. that is one that I am not totally clear on yet! The phone is supposed to tell you how it can be done. That is after you have inserted your card and lifted the receiver! - 73 - BASIC TELECOMMUNICATIONS: By - < Net Runner > CN/A: CN/A, WHICH STANDS FOR CUSTOMER NAME AND ADDRESS, ARE BUREAUS THAT EXIST SO THAT AUTHORIZED BELL EMPLOYEES CAN FIND OUT THE NAME AND ADDRESS OF ANY CUSTOMER IN THE BELL SYSTEM. ALL #'S ARE MAINTAINED ON FILE INCLUDING UNLISTED #'S. HERE'S HOW IT WORKS: 1) YOU HAVE A # AND YOU WANT TO FIND OUT WHO OWNS IT, E.G. (914) 555-1234. 2) YOU LOOK UP THE CN/A # FOR THAT NPA IN THE LIST BELOW. IN THE EXAMPLE, THE NPA IS 914 AND THE CN/A# IS 518-471-8111. 3) YOU THEN CALL UP THE CN/A # (DURING BUSINESS HOURS) AND SAY SOMETHING LIKE, "HI, THIS IS JOHN JONES FROM THE RESIDENTIAL SERVICE CENTER IN MIAMI. CAN I HAVE THE CUSTOMER'S NAME AT 914-555-1234. THAT # IS 914-555-1234." MAKE UP YOUR OWN REAL SOUNDING NAME, THOUGH. 4) IF YOU SOUND NATURAL & CHEERY, THE OPERATOR WILL ASK NO QUESTIONS. HERE'S THE LIST: NPA CN/A # NPA CN/A # --- ------------ --- ------------ 201 201-676-7070 517 313-232-8690 202 202-384-9620 518 518-471-8111 203 203-789-6800 519 416-487-3641 204 ****N/A***** 601 601-961-0877 205 205-988-7000 602 303-232-2300 206 206-382-8000 603 617-787-2750 207 617-787-2750 604 604-432-2996 208 303-232-2300 605 402-345-0600 209 415-546-1341 606 502-583-2861 212 518-471-8111 607 518-471-8111 213 213-501-4144 608 414-424-5690 214 214-948-5731 609 201-676-7070 215 412-633-5600 612 402-345-0600 216 614-464-2345 613 416-487-3641 217 217-525-7000 614 614-464-2345 218 402-345-0600 615 615-373-5791 219 317-265-7027 616 313-223-8690 301 301-534-11?? 617 617-787-2750 302 412-633-5600 618 217-525-7000 303 303-232-2300 701 402-345-0600 - 74 - 304 304-344-8041 702 415-546-1341 305 912-784-9111 703 804-747-1411 306 ****N/A***** 704 912-784-9111 307 303-232-2300 705 416-487-3641 308 402-345-0600 707 415-546-1341 309 217-525-7000 709 ****N/A***** 312 312-769-9600 712 402-345-0600 313 313-223-8690 713 713-658-1793 314 314-436-3321 714 213-995-0221 315 518-471-8111 715 414-424-5690 316 816-275-2782 716 518-471-8111 317 317-265-7027 717 412-633-5600 318 318-227-1551 801 303-232-2300 319 402-345-0600 802 617-787-2750 401 617-787-2750 803 912-784-9111 402 402-345-0600 804 804-747-1411 403 403-425-2652 805 415-546-1341 404 912-784-9111 806 512-828-2502 405 405-236-6121 807 416-487-3641 406 303-232-2300 808 212-226-5487 408 415-546-1341 BERMUDA ONLY 412 412-633-5600 809 212-334-4336 413 617-787-2750 812 317-265-7027 414 414-424-5690 813 813-228-7871 415 415-546-1132 814 412-633-5600 416 416-487-3641 815 217-525-7000 417 314-436-3321 816 816-275-2782 418 514-861-6391 817 214-948-5731 419 614-464-2345 819 514-861-6391 501 405-236-6121 901 615-373-5791 502 502-583-2861 902 902-421-4110 503 503-241-3440 903 ****N/A***** 504 504-245-5330 904 912-784-9111 505 303-232-2300 906 313-223-8690 506 506-657-3855 907 ****N/A***** 507 402-345-0600 912 912-784-9111 509 206-382-8000 913 816-275-2782 512 512-828-2501 914 518-471-8111 513 614-464-2345 915 512-828-2501 514 514-861-6391 916 415-546-1341 515 402-345-0600 918 405-236-6121 516 518-471-8111 919 912-784-9111 - 75 - A little something about Your phone company: By Col. Hogan Ever get an operator who gave you a hard time, and you didn't know what to do? Well if the operator hears you use a little Bell jargon, she might wise up. Here is a little diagram (excuse the artwork) of the structure of operators /--------\ /------\ /-----\ /-------------\ !Operator!-- > ! S.A. ! --->! BOS ! ! Group Cheif ! \--------/ \------/ \-----/ \-------------/ Now most of the operators are not bugged, so they can curse at you, if they do ask INSTANTLY for the "S.A." or the Service Assistant. The operator does not report to her (95% of them are hers) but they will solve most of your problems. She MUST give you her name as she connects & all of these calls are bugged. If the SA gives you a rough time get her BOS (Business Office Supervisor) on the line. S/He will almost always back her girls up, but sometimes the SA will get tarred and feathered. The operator reports to the Group Chief, and S/He will solve 100% of your problems, but the chances of getting S/He on the line are nill. If a lineman (the guy who works out on the poles) or an Installation man gives you the works ask to speak to the Instal- lation Foreman, that works wonders. Here is some other bell Jar- gon, that might come in handy if you are having trouble with the line. Or they can be used to lie your way out of situations. An Erling is a line busy for 1 hour, used mostly in traffic studies A Permanent Signal is that terrible howling you get if you disc- connect, but don't hang up. Everyone knows what a busy signal is, but some idiots think that is the *Actual* ringing of the phone, when it just is a tone "beeps" when the phone is ringing, woul- ldn't bet on this though, it can (and does) get out of sync. When you get a busy signal that is 2 times as fast as the normal one, the person you are trying to reach isn't really on the phone, (he might be), it is actually the signal that a trunk line somewhere is busy and they haven't or can't reroute your call. Sometimes you will get a Recording, or if you get nothing at all (Left High & Dry in fone terms) all the recordings are being used and the system is really overused, will probably go down in a little while. This happened when Kennedy was shot, the system just couldn't handle the calls. By the way this is called the "reorder signal" and the trunk line is "blocked". One more thing, if an overseas call isn't completed and doesn't generate any money for AT&T, is is called an "Air & Water Call". - 76 - Files By Al.P.H.A Ŀ ڿ ¿ ڿ ڿ Ŀ ڳ ڳ ڳ Ĵ ڳ ڳ ڿ ڿ ڿڳ -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- - Jesters Guide to.... - - - - {- 950-0266's for the new Phreaker -} - - - - {- 11\6\89 -} - -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- This is a file I just decided to write, right after a guy that lives near me, who runs a bbs complained about his outrageously high phone bill, and being that I use 0266's I decided that I would TRY to write a text file on how to use the 0266's as a simple way of phreaking. I am not an expert on the subject and I don't claim to be, I am just writing this file to try to help out others that are in the same experiance level as the guy that I was talking about previouly in the file. There are many different types of 950's, but the type I use is the 950-0266 and I use these because that is what I was taught with and they seem like a fairly good, and easy way to phreak. 950-0266s are known to have VERY clean lines, so they are perfect to use with modems. The basic format for these codes are: (1) Dial 950-0266 (2) Wait for tone then dial your 7 digit Code (3) Right after dialing your Code dial your ACN (Area Code Number) I.E. if I were to call my friend Joe in Utah, I would do this... 950-0266 (tone) XXXXXXX8015551234 The X's stand for the 7 digit code 950's have known to be dangerouse, they are on ESS (electronic switching service) which is a phreaks nightmare. Being that 950's are on the ESS they can, and have been known to trace. The type of tracing service on 950's can trace in a heart beat, so there is somewhat a great risk in using these. Some precautions about using 950s - Do NOT use the same code for more then 3 days. Try to use different codes if you have them i.e. call one board with a code like 2314211 , and then call the next board with a totally different code. Use these codes during prime time, to cut the risk of getting caught down. And use these in moderation, do not get crazy with them. - 77 - I hope this file hasnt been to much of a waste of time, I hope it has offered some help to you in using 950-0266's. I would like to have suggestions and comments on what you think of my file. If you have valid Input, please let me know your opinion on Al.P.H.A.'s home Board (801)!!! Copyright (C) 1989 by -NecroiDaemon - 78 - Files By Al.P.H.A Ŀ ڿ ¿ ڿ ڿ Ŀ ڳ ڳ ڳ ٳĴ ڳ ڳ ڿڿ ڿڳ -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- -= Code Hacking - Done Right 7/17-90 =- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Code Hacking falls into both the hacking and phreaking category. Think about it. You have to HACK in order to get codez and then you PHREAK when you get the codez. I'm not going to go into great detail on code phreaking, this text file is going to deal mainly with "CODE HACKING". I get asked all the time where and how to get codez. I'm hoping this file will clear up this question for a lot of people. This is not my first text file, but I don't make a habbit out of them yet! Code Hacking, What is it: -=-=-=-=-=-=-=-=-=-=-=-=- Simply enough it's where you get a dial up (IE. 1-800's or 950's) and set up a code hacking program and config it to the code you're about to hack and let it run. Now there are hundrends of dial ups for us pkreakers/hackers to play with (I will list a few at the end of this phile), and the code lenght and formats also very a great deal. Now you can get your hacker set up and let it run all night and if Gh0d's willing you might get lucky and get a code by the next day. Ok the best way to go about Code hacking is to get a format or template if you perfer to call it that. Now they look like this. 801XX, where you know the first 3 digits of the code is 801, but the last 2 digits are unknown and you have to hack out the last 2 digits. If you know all but 2 digits then you have a 1 in 100 shot in getting a code each time your hacker trys to hack a code, of course the longer the code or the less digits you know the less chance you have in hacking a code. But belive me it's never a lost cause. You can have zero digits and still get codez. A Lesson in Formats #1: -=-=-=-=-=-=-=-=-=-=-=- Ok say your going to hack 1-800-635-9135, Code lenght is 5 digits, and already have the following codez! 22199 22723 22857 22832 21099 - 79 - Ok, think about it for a second, we have 5 codez all staring with the # 2 and all but the last one has a 2 as the 2nd number, and the 3rd and 4th both have a 8 as the 3rd number and the 1st and 5th end with a 99, so you could user some different formats for this code and here the are: 22XXX 2XX99 228XX Ok now there are a few formats for a 5 digit code. I think you can apply this same system to 6,7 or even 8 digit codez. Well, I hope you can understand formats or templates a little better. Code hacking can be a long drug out process, but the way I look at it if you spend a night letting your hacker run and get a code and spend 5 hours or so of FREE ld calling then it's worth it. A lesson in Formats #2: -=-=-=-=-=-=-=-=-=-=-=- Another probelem with code hacking is figure out or know what comes first the CODE or ACN (Area Code Number). On 950-0488's it's ACN + code, but on most 800's it's ACN + Code. There is really no way to know for sure. Just make sure when you get your starter codez (The ones you'll get your formats from) you know how to use them. If you know this it'll save you a lot of time. The Codes I gave above are CODE + ACN, but most 800's are ACN + Code. BTW as of the release date of this file the 800 number listed above works, but the codez are dead. Well thats the end of the FORMAT LESSONS. What Code Hacker to Use: -=-=-=-=-=-=-=-=-=-=-=-= Well there are several hackers on the market, but your best bet is on one of two. Code Thief Deluxe by Phortune 500 and Brew Associates or Fucking Hacker by 2AF and Hypnacosm. I myself have played with both but Code Thief Deluxe v 4.0 is the best on the market. It's very user friendly and even the beginner can figure it out, but if you have a different hacker then fell free to use it. The Hacker you use should be the one you fell the best about. I like Theif 4.0 and I would recommend this to any and all hackers. The way I look at it, you can't go wrong with Phortune 500. Dial up's and Code Lenths: -=-=-=-=-=-=-=-=-=-=-=-=-= 1-800-222-4333 Code 6 Digits (Code + ACN) 1-800-657-9600 Code 7 Digits (Code + ACN) 1-800-327-9488 Code 13 Digits (Code + ACN) 1-800-476-4646 Code 6 Digits (Code + ACN) 1-800-234-5095 Code 6 Digits (Code + ACN) - 80 - 950-0266 Code 7 Digits (ACN + Code) 950-0488 Code 13 Digits (ACN + Code) Closing Notes. -=-=-=-=-=-=-= Well I hope the first text file from Al.P.H.A helps a few of you out. I was sitting arond (at work of all places) when it dawned on me I have never seen a file on code hacking, so I decided to do one up. This file is for the beginner not the Expert, but I have read a number of text files for beginners and have learned something from them. So enjoy. Speical Thanks go out to: -=-=-=-=-=-=-=-=-=-=-=-=- Doc Silicon - (My Partiner in Crime) for talking me into starting this Awesome H&P group. The Oxidizer - If it wasn't for your board, I'd of had to spent a lot more time Code Hacking. __________________ |Brew Associates | - For the Awesome programming work that went into Theif |<<<< P500 >>>>> | 3.5 and 4.0. |Professor Falken| - For the Awesome work you did on your Phreak Tools ------------------ A Little About Al.P.H.A! -=-=-=-=-=-=-=-=-=-=-=-= We are a small group that plans on Hacking/Passing and Using codez. We started Al.P.H.A because we were tired of all the want-a-be groups we were a part of. I'm not going to state names of the Groups, I don't want a fucking war with any of them. Al.P.H.A is: -=-=-=-=-=-= Captain Kidd - Doc Silicon - Techno Cyberdaeemon - Black Beard Cristifer Columbus - Jester - Falcon - 81 - Files By Al.P.H.A Surviving at Night: By Falcon I am writing this file with the knowledge that night survival is a lot of common sense. I do however feel I can share some added information that can help make the anarchists favorite time of the day (night) a little safer and easier to work with. **note some of the information I am writing I have taken from a article from Combat Tactics magazine were as the rest is common sense and stuff I've picked up though personal night missions. The first part of surviving at night is to dress accordingly. Common sense tell us a person in black clothing with a black mask is harder to spot then a person in white clothing. This of course is true, but one must also consider the fact that black is a stereotype for burglars, the devil and trouble its self. Not to mention a mask or painted face. That is why for most situations I recommend wearing modern, casual clothing that does not even need to be black. Dark blue or green etc. can accomplish the same over all effect at night. For summer try and have shorts, and dress accordingly to the season. Were black or dark socks and shoes. If you are running white shoes REALLY stand out. Also as I said before try to get around wearing a mask or face paint until the last minute possible. You then need your equipment. I personally have a nice black pouch and belt I got from army navy surplus stores. I use the belt and pouch to hold all of my equipment, so if I have to I can drop the belt in a shadow, and look like a causal modern dressed dude walking to a friends house. We are talking innocent!!! In my ouch and belt I include: wire cutters, gloves black of, course to hide my little white hands and their fingerprints. A mask so I can hide my identity, a flashlight for seeing and destroying people's night vision- be careful not to shine it around windows etc. The same goes for matches, lighters because at night it is very obvious. A few bombs (CO2 etc.) to act as diversions and blow up stuff like mailboxes... A scope off a rifle. You would be surprise at how well you can see using on of them in the night, especially if you are looking toward light and your night vision is good. I do not recommend binoculars due to they take up both eyes and if you look into light you loose both eyes night vision..... Also I take what ever else The situation requires. I try to not over-do-it. For example if you are only going on a scouting mission why danger yourself with a full load up. It is just more trouble you can get in, if caught. But also don't be under equipped or you could miss out on some killer opportunities. A favorite saying of mine (a quote from my hero the legendary assassin Jason Bourne: "opportunities will present themselves. When they do you better be ready to use them." - 82 - Night vision is important. To explain how it works one can compare the eye to a camera. The lens of an eye is like the lens of a camera focusing light as it enters. The iris of an eye is like the diaphragm of a camera opening and closing to allow the correct amount of light in for the situation. The retina is like film, light image is recorded and sent to the brain as light images thus producing pictures. We use two kinds of cells in seeing: Cone and Rod cells. (named due to their size). Day vision comes from the cone cells. They enable you to see color, sharp contrast, and shape. The cone cells cannot function in low light levels, thus why we cannot see color at night. The rod cells produce a substance called visual purple. This substance allows us to see at night. If we stare at something to long (a few seconds) all the visual purple in that spot of the eye is used up. This cause blank outs in what we're are starting at. To get around this problem scanning is used. Scanning is basically moving ones eyes back and forth never focusing on one spot. This allows the visual purple to evenly resupply itself so no black outs occur. When scanning never move your head back and forth (I will explain later) just your eyes. The reason you should not move your whole head while scanning is because the human eye is very good at detecting movement. If you are being followed from a distance, or someone is looking for you just freeze. If you can lay prone, or get in a nice shadow, but in most situations you can be lost by anyone trying to find you. However if they have already located you, or they are very close you need to get away from them, then hide. If you are dressed correctly and freeze you can really be hard to spot. Also keep scanning so you don't get surprised by someone. If you must move do it slowly (including your head to scan behind you). A very important fact in night vision is letting your eyes adjust to the dark. 30 minutes in the dark are required to completely adjust and get the best night vision. (you can spend 20 of the 30 minutes in red light and get the same effect, this can save time but who has a red lighted room?) Be careful with your night vision. It can be lost by looking into lights, a fire, etc. If you must go into light or look into it using a scope only use one eye. Cover the other eye so you at least have one good night eye at all times. Practice these night sight tactics and become confident with the night. It is your friend!! At night, our sound and movement become more trustworthy. That is why it is important to stay silent and well hidden. If you must talk do it in whispers and try to have a sign language - 83 - you can use to keep from having to talk. Certain areas are very dangerous at night. Areas like fences, rivers, roads, yards with dogs, open areas etc. If you must cross them make sure to stake the area out so you know it is secure, then cross the danger area as fast as you can (don't become reckless but go fast.) Certain danger areas like dogs can be fixed. For example you could kill the dogs if give them meat to keep quiet. Weapons of the night should try and be silent so they don't give away your position. Darts, air-guns, knives, silenced weapons etc. are best. However noise can be a great diversion. A timed fuse on a bomb can be used to attract attention to the wrong place allowing you to escape. Also say you are in a house and the owners come home and you are trapped in a room. Without killing them to get away unidentified you could beat them up with a mask on, but what if they were bigger then you? That's when a flashlight burst in a un-expecting face followed by a slam with your shoulders and your quick escape come in handy. Also you could buy a tear gas gun. I got mine for like 10-15 bucks and they are handy! You could pop some poor sucker in the face from a few feet away, slam him then run. The poor dude would be wondering if he had died and gone to hell as you ran for a safe place. An important thing at night is to know your territory. Know were you can run and hide or get away. If you are in a new place scout it out. Also be good about keeping plans and sticking to them. Work in the buddy system so you aren't responsible for looking everyplace, and lugging all the supplies etc. Well That is all I can think of at the time, I'm sure to remember more later.... I hope this file helps..... - 84 - Files By Al.P.H.A BASIC CARDING (BY Al.P.H.A) --------------------------- I would like to emphasize two facts: Fact Number 1 ] Carding is dangerous, by reading this file, you are subjecting yourself to highly illegal information Fact Number 2 ] Due to the fact of the illegality, I take NO responsibility for what actions might take place due to this file. (Phew! now that that's over with...) In this file we will discuss: Chapter --> 1 Obtaining Cards There are MANY ways to obtain cards, through Trashing (the art of scrounging through Garbage cans, and dumpsters and any other places that would be a good source of cut cards or carbons from receipts.) But that will be discussed in Trashing files available anywhere on your Average Phreak/Hack/Anarchy BBS/AE. You may also obtain them off a bbs with a Carding section, but to ensure best validity, get them yourself, as the motto goes,"If you want it done right the first time, do it yourself." Chapter --> 2 Identifying/Checking the card Checking the card is very simple, and even the novice carder can do it the first time. First, there are two ways (As far as i'm concerned) to check the card. 1] Using Tymnet, call your local dialup, and enter "TSDCOMPSUPP" for login. Then for the password, "HARRYHINES" will get you in. After your in, hit "?" for help, most likely you'll be using the option "B", remember using UPPERCASE. Where "B" is Mastercard / Visa transaction, but if you stumble across a Carta Blanche card, call me (Just kidding), then enter the letter for the transaction and you're off. It'll ask you for your card number, w/o the hyphens, then the experiation date, and amount you want to check the card for, a reasonable amount is 500.00, but you can experiment once you get more acquainted w/ it. 2] Using a computer voice driven checker, pevhaps a little faster, but a little more tricky. In order to use it, you must do the following: Dial up the 800 watts, which is 1-800-554-2265, after you dial - 85 - it, it should ring and pick up, then a computer voice will say "Enter type" and then you respond with either: 10 for Mastercard 20 for Visa Followed by a number sign will then ask for identification, hit "1067" preceeded by a number sign (always follow an entry w/ a number sign). It will say some bullshit and then ask you for your Merchant number in which you type 24 or 52 (whatever makes you happy) and then enter the card, after done it will ask for exp. date , then amount. Now, this is the tricky part, cuz if you fuck up here, it's gonna Decline you and you have to start ALL over. If your code is infact Valid, it will be followed by a Please Wait for 30-60 seconds and a Approved and a long number, don't worry about writing it down, just make sure to keep what you card to the limit the card can hold, or some calls might be made. Chapter --> 3 Using the card for purchasing You might think everything is pretty much a snap from here, but really this is where it gets difficult. Always order from a Mail-Order warehouse (OF course) If you're going to order from a Watts line, make sure you go through adleast Blue Boxing or Diverters before connecting w/ the company, for protection on Watts tracing. After that, you must select an address (preferrably empty or abandoned) to ship the cargo to. And A) you also must make an awesomely authentic note with the card bearer's name on it saying you are out of town, and to leave it on the doorstep or B) be bold and face the UPS man and sign for it, but I suggest the note would be safer in more than one way. Then, order the merchandise, and if you don't sound old enough, get a friend or whoever to do the talking. Another warning is that evidence has proved that purchasing relatively small priced items takes alot of worry from the company, thus, not resorting to do various checks on the card and the bearer's address. Chapter --> 4 After the order, then what... Well, after the package has arrived, casually pick it up (preferrably at night) and brisk it to your house. After that, I recommend that you don't just "HAPPEN" to pass by the house and stare it, that attracts attention, and believe me, that's the least thing you want. Try and stay far from the location, and NEVER use the same house twice. I hope this file has helped you understand the BASIC principles of Carding, there is a lot more to learn, and there are a LOT more files like this to learn from. Stay cool... Take NOTE: The Watts dialups for the Credit Card verification # are in effect as - 86 - of this date, disonnections or changes in numbers I will try to handle. Same goes for the Tymnet verification ID & PASSWORD. Carding: ~~~~~~~~~~ This is one that you can get in some major shit over. Well, although it is a major crime, it is really cool!!!! This is the process in which you find the card number of someone and use it to purchase things. In order to card, there are a few things that you must have or it will not work. You will need to have........ 1. The Card Number 2. The Experation date 3. Card type (Master Card, Visa, etc...) Those are main things tha you will need. Having the name of the owner is very helpfull but it is not a must. You can get by without it. You have to order everything you want by mail. A couple of "Beginner" carder that I talked to didn't understand how you would do it, but thats when they had the misconception that you actually go to the store and purchase things. That is a complete No, no. You do everything from a phone ordering service. When you call make sure that you are at a pay phone. Don't do it your house or anywhere where it can come back to you. When you order the merchandice, once again do send it to anywhere that it can come back to you like your home, work, etc. Find a vacant house or building or anywhere else that you can send it to. Also, don't send it to a P.O. box that you have, just as dangerous. When you do order it and you think its around the time that you will be reciving it, check the mailbox frequently. But do it during odd hours. I mean, hows it going to look you taking a package from a vacant house? Most bills are sent at the end of the month or at the biginning, so try to time it to where the bill won't come to the person untill a couple of days after you have recived the package. Ok heres how to figure it. I have found out that the bills are sent out up around the 26-30th of the month, so they will actually recive the bill around the 31-4th. Have it sent right after you think the bill has been sent. Find what you want, but try to order it from the place that guarentees the fastest delivery. When you order the item, make sure they have it in stock and don't have to get the item in first. Order the highest class of delivery but not COD or next day service. Thats cutting it too close. It should take around 2-4 weeks before you get it and if you timed it right, then it sound get there right before the person gets the bill. You need to have it in your possesion before the bill gets to the person because if they complain, they can keep it from being sent, or watch who actually gets it even while its going throught the mail process. Don't order more than a couple of things or overcharge the card, - 87 - if the people at the Credit card office, see irregular charging on the card, they will follow up on it. To actually order the item you will call up the place that you will be ordering from, and when the operator answers let her know what you need to as far as what you are purchasing, etc. When she ask how you will be paying just tell her "Charge" and the the type of card like Master Card, Visa, ect. Then Tell them your name, if you don't know the name of the actuall owner of the card, Make up a false name that has NO relation to your name, not the same first, last middle what ever, nothing relating to your real name. Then continue answering all the operators questions, address (Not your own remember!) state, area code etc. They will also ask for your phone number. Make one up, not your own. If something happens to go wrong as far as delivery or if they are checking if you are who you say, then your screwed, unless of course, hehehe, the number is ALWAYS busy. Find the busiest number there is and leave them that. When they ask for the card number and experation, just tell them and do what all else you need. Wish them a good day, and hope you get it. Ok heres how you check if the card is good, and how much money can be charged on the card....... 1. Dail 1-800-554-2265 2. it will ask for the type of the card. you must put in 10 for Master Card and 20 for Visa, I am not sure about the others. 3. Next it will ask for the Identification. You will need to enter 1067 4. After all that you will have to enter the Mecrchant number, which you will either need to put in 24 or 52. One of them should work. 5. You will then have to enter (When Prompted) the card number itself. 6. Next, the experation date of the card. 7. Last but not least the amount you want to try to get on the card. The procedure for this is enter dollars, astricks, then cents. (Example:) 100*30 = One hundred dollars and thirty cents. One thing I do need to mention, after you type in everything you must press pound (#). Like when it asks you for the type of card, if you had a Master Card you would put: 10#. when it asked for identification you would enter 1067#. If it says invalid, that either means that the card is no good or you can't charge that amount on the card. Try it again, but try a lower amount. If you get down to $1 and it still doesn't work, hehehe, you can probably guess that the card is no good. You might not be ordering just merchandice you might be ordering accounts and things like that and if you are, fine, but you have to remember, the accounts do not stay good for very long, the owner of the card gets the bill, complains and its no longer any good. And when you card and account, Nine out of ten times, they won't kill the account, they will trace in and that is when - 88 - you butts really in a sling. So carding accounts and hins, isn't the safest way to go, of course. nothing we have alked about it, right? Introduction carding is, in layman's terms, the use of someone elses credit card umber to obtain free merchandise. It can be used for things that re valuable to the BBS world like a USRobotics HST modem, or a rand new SCSI hard drive. The reason I am writing this article is because I, and the other notorious members of P/HARM have a multitude of wealth that some may deem useful. When I was a wee little mite, there was nothing to help me on my way..... So here goes.... Obtaining #s There are many ways to obtain a credit card number. But the thing to remember is that there are three essentials that you need in order to use your number. 1) The name as it appears on the card, 2) The Card number, and 3) The actual date of expiration. These three things are not only essential, but if you get one of them wrong, it could send the FEDS huntin'. Okay, with that out of the way, now comes places to find the numbers. My most favorite, but the most time tested method is Trash bin hunting.... Nowadays with the invention of carbonless receipts and carbons that tear in half, the carder is less likely to find a good number in a trash can (you can bet on getting dirty). But some stores make the fatal mistake of not ripping up their fuck ups. A fuck up is when they run the card number thru with the wrong amount or the lady (it's always a lady) decides to pay cash. The clerk throws the credit voucher into the trash, and that makes its way out to the bin where we find a plethora of "fuck ups". The best way to get a number is off of an actual card. If you are at a store where they take credit cards, watch someone pay, and copy his/her number down on a business card you just happen to have. This may seem risky, but trust me, IT'S NOT!! A third way that is not always as effective is to hunt mailboxes at night, Sometimes people forget to get their mail, and inside there will be a bill from Visa or Bank of America (don't forget that banks offer credit cards now). If you're real lucky, you'll get an actual card. Okay, now you've got your card: CARDING!!!! Find a little shit mail order company that has put out a small add in crumby production like Nuts & Volts magazine. Call this number up and say "I'd like some information on XXXXXXXXXX", where XXXXXXXXXX is the item you wish to get for free. Continue to ask questions and TRY TO BARGAIN. This is important because people who are spending their own money try to get the best deal POSSIBLE. - 89 - Finish the conversation by saying "Okay, let me look around and try to find the best price." The salesperson will give you their name and ask you to call back. Call back the next day, and continue to BS before ordering. Once you have ordered, they will ask you for: The card number, the name, the expiration, the mailing address (always use a drop site, and when they say "Is this the address as it appears on the card?" Say yes even if it isn't), and a phone number. The best phone number to give is one that is always busy or that of a hacked VMB. Ask for next day delivery on all packages. Now you need to send it somewhere. DROP SITES A drop site is the address you want your package sent to. The best type of drop site is that of a vacant house, or where your neighbor is outta town. Some say to leave a note on the doorstep asking the UPS dude to leave the package, but some companies require a signature. Here's my plan: Stay close to the house you pick for a drop. When you see the van pull up, walk non-chalantly over to the delivery man and say "My neighbor asked me to pick this up for him". Sign a fake name and walk away. Now you have your package!!!! P/HARM Conquests: Dual Standard HST 661 megabyte hard drive (SCSI) 330 megabyte hard drive (SCSI) Laptop computer (Pending) 330 megger SCSI (Pending) ********************************* * DISCLAIMER!!!!!!!! * ********************************* This file is written as a means of information interchange only. If you choose to try the methods described above, well that is by your own choice, and I nor P/HARM will be held responsible for any trouble you get yourself into. **REMEMBER carding is ILLEGAL!!! ********************************* * DISCLAIMER!!!!!!!! * ********************************* Information on how to card! First of all, you need a good drop site. A drop site is a place where you are going to have the package shipped to. The best - 90 - places are usally private homes where people work during the day. A easy to way to get one, walk out your house and look around. Find any house,write down the street address. Open up a yellow pages,look for the fone #. Then call up the house, usally during morning time. If there is no answer,well you got a drop site. Next,you need a card. Humm, usally the best way to get cards is trough CBI or TRW. I used to use a program called checksum. Its a program that makes CC's. Then I would call 800 # card checker. Put a $150 ammount on the card,if it was aproved then you got a real card. I am not going to tell ya how to get cards. Next, open up any computer realated magazine. Look for small ads, preferbly in the west coast. Call 'em up, see if you sound like chinks, if they do then you may have found a good place. Once you have the neccesery items you are ready to CARD. The following things are needed to get away with carding. 1. A good unused card. 2. Drop site. 3. Cheap copmany to order from. 4. A code to call them with. 5. A loop for reciving fone calls. Ok. you call up the fuckers. And you talk to some rep. I am going to help ya all get 14.4's. When you talk to the rep. use the following lines to why you need a 14.4 1. My modem was fried by lighting,and I am in need of very importent docs. 2. I am looking to upgrade the modem at the office,I only have a 1200 baud. 3. Its a holiday,birthday whatever. You want to get a gift for you son. Ok. Next, make sure you ask for the price,any discounts on it,what does it come with. Also make sure you tell them that you want to know what you can do incase the modem doesnt work. Ok,Then say "Ok, I will order this now". Then she starts asking questions. Usally they ask for the name first. Now, I never ONCE had a real name for all my cards. Thats why I told you to order from small companies. Make up any name in the fuckin world. But write it down to remember it later on. Then they will ask you for a shipping address. Give them the address of the drop site. Say thats were you live and you are sending it to your house. Next, they will ask for the card #. Geeeeee, Give them the card #. Now, they will want an experation date. People tell me that need a experation date. BULLSHIT!!. You do not need an exp. date at all. Give them, any thing. But make sure its with in a year or two. Not 1/96. use like 1/91 1/92 etc.. OH yeah. When they ask for the card #. I allwayes say "Hold on, lemme get my wallet out". That makes it look like you are getting the card out from your wallet, GEEE. Humm,Now they want a phone # - 91 - This is a bitch. Up untill a few months ago, I used to give them a BBS thats allwayes busy. That works sometimes , but the best is to use the following methood. Get a LOOP. And say you are currently at a hotel in the loops area code. Then say you want to go out and play raquetball or something at the hotel. So you are not going to be around. Then ask them when are they going to call back and shit. Sometimes if you are sure the card is going to work, you can say if everything is ok, then ship it. I sometimes use this; I say "My wife got a hold of my card and went shopping, so I am not sure if the limit on the card can hold it." then I say "Can you check to see if it gets approved while I'll wait online". Most of the time they will "OK, hold on". Sometimes they can say it takes a while. Who cares, just say "I am stepping out to lunch now, can I give you a call back to check if every-thing is ok". And they say thats fine. Make sure you dont fuck up. And dont try to card if you have the voice of a 13 year old. My friend has the voice of a kid and he got caught HIS FIRST TIME CARDING BY THE FEDZ!!!!. So do not card if you are a little kid. After you are done giving the bitch all the info. Ask to have it shipped NEXT DAY SERVICE (RED LABEL). That way you dont have to wait a week or so. And then you have more time hidding and shit. Its a little bit more,but who gives a fuck. Make sure you ask how much is for everything!!!. And when you are about to hang up. Make sure you say thank you, Have a good day. it makes a good impresion of them. And remember try NOT to order from 800's. Allwayes CALL WITH A CODE. That way if you get fucked, they cant prove you called the place and shit. Well, I am done for now. I think, I dunno. Remember if you use this file and get shit, lemme know. I want to know if I helped people card shit. Hehehehehhe. Me personaly have carded more shit then your parents make in a year and shit. And still do. I dident get caught yet. But I am going to be 18 so, and then I will be of probation (Not for carding). So , if you are under 16 card card card! they cant do shit to you.... Advanced Carding Techniques CARBONS: ------- Remember trash-picking the department store to find those little black pieces of paper that "told all" for the CC number? Well, kiss that old technique goodbye, the newest thing on the market that will soon be widespread is SELF CARBONING RECIEPTS. Those do just what they say. The "carbon" is part of the paper itself. You then have the customer copy, and the store copy, and thats it, nothing else. The best way to get numbers anymore is to get them from the place you work at. - 92 - DROPS: ----- Drops are as easy as they ever were, but with a few changes. Remember how the place you call would ask you "What number can we reach you at?" You would just give them the phone number of a payphone that you were at, and maybe they would call you in a few minutes to verify the order. Now they always ask this "What is your home telephone number?" To have a successful shipment, you *MUST* give them the correct phone number to the house that you are having the stuff sent to. This *MUST* corrispond! What they do is this, lets say that you give them this info: Jim R. Jnes 132 S. Alexander Arlington Hts, IL 60002 Home: 312-962-3342 Work: 312-564-1233 (Don't worry about this, give 'em a carrier #) Visa: 4432-432-223-032 6/86 Bank: Second National Bank They will then call the 312 Directory Assistance (312/555-1212) and say something like this: "I would like the number for the JONES residence on South Alexander-" and then the operator would either say the number, or that she can't give it out. If the operator says something to the effect of "I'm sorry, but I have no listing of a JONES at this number, then your fucked, cause the store will figure that its a fraud order, and sometimes will call VISA. Make sure that the phone corrisponds with the drop! CHECKING CC'S: ------------- Go to about any store that uses credit cards, and look at the thing that they run the credit cards through to make the carbons. On that thing there will be an 800 number and some special numbers. Write all these down! Ever have it where you use a card number and it doesn't work out, and you want to check to see if the card number is still good? Well, this is how you use those beloved numbers you have! Call th 800 number, a lot use this numbers: 800-221-1122 and along with those numbers you sould have found a 4 digit number and one that is long as all hell, sometimes over 10 digits long. The first number (the short one) is the BANK number, and the other long one is the MERCHANT NUMBER. Call the 800 number and they will usually answer with something like: "National Data" Say: "Bank number 1122" <==or whatever # it was (pause, let the bitch type) - 93 - Say: "erchant # 541837265355" <==whatever # (pause) Say: "Crd number 44312-223-433-221 exp 6/86" (pause) Say: "Amount is $12.31" Note: Always try to keep this number low, for credit sake! If the card number is still good she will say something like: "ok, that is authorization #4423B" (or something like that) Don't worry about this number, all you need to know is that the number is still valid. Sometimes is the number is bad, you'll hear: "Let me repeat that number" (and she does) then she says: "That card is a pick up" This means that they know it is a stolen card number and if you can get ahold of the original card, a storeowner can get $50. All this means to you is that you can cross that number off your list. THINGS TO CARD-THINGS *NOT* TO CARD: ----------------------------------- I have carded at great number of things on my life, and I have found that computer equipment is one of the hardest things to card, 'cause think about it, almost everyone who cards, will card a new Apple Cat, or something like that. Stay away from the computer stuff as much as possible, these are checked *VERY* well! Jewrey is also hard to get because its so easy to resell! I once orderd a Rolex watch on my own American Express Gold Card, and it took a WEEK for them just to preform the credit check to make sure it was really my card! They laughed when I said that I wanted to pay for it by credit card, they only had 1 CC order in the past 8 months! This was a high volume store, too! Anyways, hold of on the diamonds, Gucci or Saks stuff, they check too much! Airlinetickets are the easiest to card by far, and stereo equipment too! I not to long ago got a Nakamichi Dragon cassete deck, which is one of the best cassete decks in the world, and cost in excess of $1000! I ordered it on a Monday, and it came on Thursday! Try to make friends with the guys your order from, say bullshit like: "I'll cll you when I get it and tell you how it works out!!!" I have been really successful with this, and these tips should help you! - 94 - Airlines: -------- Everybody travels, and flying is the only way to go, but lets face it, nobody ever has enough money to fly quite as often as we would like. This is where carding can save you money and let you do the things that you really want to do! Getting Tickets: --------------- I am assuming that you already know how to get carbons, etc. OK, you have this stack of carbons w/ good card numbers. Next grab the phone (and phone book). Look up AIRLINES. Call your favopite airline and schedual yourself (under a John Doe name, of course.) You could do this actually long in advance, to "save" Visa some money, and maybe make it look a little more ordinary. Fdw people take off to Rio, Brazil without planning ahead! A few days (I'm talking 2 or 3 days AT THE MOST) before your flight is going to leave, call up a local travel agency, but CALL THEM THROUGH AN 800 EXTENDER! Find one with the WORST connections possible, a PBX might work great. You want the agency to think that you are not calling local, but from across the country. Tell the lady at the agency that your son goes to college (or something) is flying down, and that you have made reservations for him to fly back. ONLY BUY ONE-WAY TI CKETS! Tell them that you already have reservations. The agency will be cool about it all, and will take your card number and all the usual info. Tell them that your son is supposed to call you a little later, and that you will tell him to go down and pick up his ticket. The key to the whole deal is that 800 extender. This makes the agency think that there really is a father in New Jersey that wants his son to be flown from Bakersfield to Chicago to see his brother. It really is that easy to do, but as I said, do not get round trip tickets. Let's say that you do and fly to wherever, and while you are there, the guy's Visa bill comes. The airport may have some people waiting for you when you get on! The best bet is to take a stack of carbons and extenders with you and do the same thing to get back. This is the way I have flown and I have never had any problems, whatsoever. Basic Information About Credit Cards There are at least three types of security devices on credit cards that you aren't supposed to know about. They are the account number, the signature panel, and the magnetic strip. - 95 - The Account Number ------------------ A Social Security card has nine digits. So do two-part Zip codes. A domestic phone number, including area code, has ten digits. Yet a complete MasterCard number has twenty digits. Why so many? It is not mathematically necessary for any credit-card account number to have more than eight digits. Each cardholder must, of course, have a unique number. Visa and MasterCard are estimated to have about sixty-five million cardholders each. Thus their numbering systems must have at least sixty-five million available numbers. There are one hundred million possible conbinations of eight digits-- 00000000, 00000001, 00000002, 00000003, all the way up to 99999999. So eight digits would be enough. To allow for future growth, an issuer the size of Visa of MaserCard could opt for nine digits---enough for a billion differnt numbers. In fact, a Visa card has thirteen digits and sometimes more. An American Express card has fifteen digits. Diners Club cards have fourteen. Carte Blanche has ten. Obviously, the card issuers are not projecting that they will have billions and billions of cardholders and need those digits to ensure a different number for each. The extra digits are actually a security device. Say your Visa number is 4211 503 417 268. Each purchase must be entered into a computer from a sales slip. The account number tags the purchase to your account. The persons who enter account numbers into computers get bored and sometimes make mistakes. They might enter 4211 503 471 268 or 4211 703 417 268 instead. The advantage of the thirteen-digit numbering system is that it is unlikely any Visa cardholder has 4211 503 471 268 or 4211 703 417 268 for an account number. There are 10 trillion possible thirteen-digit Visa numbers (0000 000 000 000;0000 000 000 0001;... 9999 999 999 999). Only about sixty-five million of those numbers are numbers of actual active accounts. The odds that an incorrectly entered number would correspond to a real number are something like sixty-five million in ten trillion, or about one in one hundred and fifty thousand. Those are slim odds. You could fill up a book the size of this one {note, book is 228 pgs long} with random thirteen-digit numbers such as these: 3901 160 943 791 1090 734 231 410 1783 205 995 561 9542 425 195 969 2358 862 307 845 9940 880 814 778 8421 456 150 662 9910 441 036 483 3167 186 869 267 6081 132 670 781 1228 190 300 350 4563 351 105 207 - 96 - Still you would not duplicate a Visa account number. Whenever an account number is entered incorrectly, iw will almose certainly fail to match up with any of the other account nubmers in the computer's memory. The computer can then request that the number be entered again. Other card-numbering systems are even more secure. Of the quadrillion possible fifteen-digit American Express card numbers, only about 11 million are assigned. The chance of a random number happening to correspond to an existing account number is about one in ninety million. Taking into account all twenty digits on a MasterCard, there are one hundred quintillion (100,000,000,000,000,000,000) possible numvers for sixy-five million card-holders. The chance of a random string of digits matching a real MasterCard number is about one in one and a half trillion. Among other things, this makes possible those television ads inviting holders of credit cards to phone in to order merchandise. The operators who take the calls never see the callers' cards nor their signatures. How can they be sure the callers even have credit cards? They base their confidence on the security of the credit-card numbering systems. If someone calls in and makes up a creditcard number--even being careful to get the right number of digits--the number surely will not be an existing real credit-card number. The deception can be spotted instantly by plugging into the credit-card company's computers. For all practical purposes, the only way to come up with a genuine credit-card number is to read it off a credit card. The number, not the piece of plastic, is enough. Neiman-Marcus' Garbage Can -------------------------- The converse of this is the fact that anyone who knows someone else's card number can charge to that person's account. Police sources say this is a major problem, but card issuers, by and large, do their best to keep these crimes a secret. The fear is that publicizing the crimes may tempt more people to commit them. Worse yet, there is alomost nothing the average person can do to prevent being victimized {muhaha} -- short of giving up credit cards entirely. Lots of strangers know your credit-card numbers. Everyone you hand a card to--waiters, sales clerks, ticket agents, hairdressers, gas station attendants, hotel cashiers--sees the account number. Every time a card is put in an imprinter, three copies are made, and two are left with the clerk. If you charge anything by phone or mail order, someone somewhere sees the number. Crooks don't have to be in a job with normal access to creditcard numbers. Occasional operations have discovered that the garbage cans outside prestige department or specialty stores are sources of high-credit-limit account numbers. The crooks look for the discarded carbon paper from sales slips. The account number is usually legible--as are the expiration date, name, and signature. (A 1981 operation used carbons from Koontz Hardware, a West Hollywood, California, store frequented by many celebrities.) Converting a number into cash is less risky than using a stolen credit card. The crook - 97 - need only call an airline, posing as the cardholder, and make a reservation on a heavily traveled flight. He usually requests that tickets be issued in someone else's name for pickup at the airport (airlines don't always ask for ID on ticket pickups, but the crook has it if needed) and is set. The tickets can be sold at a discount on the hot-ticket market operating in every major airport. There are other methods as well. Anyone with a Visa or MasterCard merchant account can fill out invoices for nonexistent sales and submit them to the bank. As long as the account numbers and names are genuine, the bank will pay the merchant immediately. For an investment of about a thousand dollars, an organized criminal operation can get the pressing machines needed to make counterfeit credit cards. Counterfeiting credit cards in relatively simple. There are no fancy scrolls and filigree work, just blocky logos in primary colors. From the criminal's standpoint, the main advantage of a counterfeit card is that it allows him to get cash advances. For maximum plundering of a line of credit, the crook must know the credit limit as well as the account number. To learn both, he often calls an intended victim, posing as the victim's bank: CROOK: This is Bank of America. We're calling to tell you that the credit limit on your Visa card has been raised to twelve hundred dollars. VICTIM: But my limit has always been ten thousand dollars. CROOK: There must be some problem with the computers. Do you have your card handy? Could you read off the embossed number? On a smaller scale, many struggling rock groups have discovered the knack of using someone else's telephone company credit card. When a cardholder wants to make a long-distance call from a hotel or pay phone, he or she reads the card number to the operator. The call is then billed to the cardholder's home phone. Musicians on tour sometimes wait by the special credit-card-and- collect-calls-only booths at airports and jot down a few credit card numbers. In this way, unsuspecting businesspeople finance a touring act's calls to friends at home. If the musicians call from public phones, use a given card number only once, and don't stay in one city long, the phone company seems helpless to stop them. What makes all of these scams so hard to combat is the lead time afforded the criminal. Theft of a credit card--a crime that card issuers will talk about--is generally reported immediately. Within twenty-four hours, a stolen card's number is on the issuer's "hot list" and can no longer be used. But when only a card number is being used illicitly, the crime is not discovered until the cardholder recieves his first inflated bill. That's at least two weeks later; it could be as much as six weeks later. As long as the illicit user isn't too greedy, he has at least two weeks to tap into a credit line with little risk. - 98 - The Signature Panel ------------------- You're now supposed to erase the signature panel, of course. Card issuers fear that crooks might erase the signature on a stolen credit card and replace it with their own. To make alteration more difficult, many card signature panels have a background design that rubs off if anyone tries to erase. There's the "fingerprint" design on the American Express panel, repeated Visa or MasterCard logos on some bank cards, and the "Safesig" desgn on others. The principle is the same as with the security paper used for checks. If you try to earse a check on security paper, the wavy-line pattern erases, leaving a white area-- and it is obvious that the check has been altered. Rumors hint of a more elaborate gimmick in credit-card panels. It is said that if you erase the panel, a secret word--VOID--appears to prevent use of the card. To test this rumor, fifteen common credit cards were sacrificed. An ordinary pen eraser will erase credit-card signature panels, if slowly. The panels are more easily removed with a cloth and a dry-cleaning fluid such as Energine. This method dissolves the panels cleanly. Of the fifteen cards tested, six had nothing under the panel(other than a continuation of the card back design, where there was one). Nine cards tested had the word "VOID" under the panel. In all cases, the VOIDs were printeed small and repeated many times under the panel. The breakdown: Void Device Nothing -------------------------------------- Bloomingdale's American Express Gold Card Bonwit Teller Broadway Bullock's MasterCard(Citibank) Chase Convenience B.C. Neiman-Marcus I. Magnin Robinson's Joseph Magnin Saks Fifth Avenue First Interstate B.C. Montgomery Ward Visa (Chase Manhattan) When held to a strond light, the VOIDs were visible through the Blooming-dales's card even without removing the panel. The VOID device isn't foolproof. Any crimianl who learns the secret will simply refrain from trying to earse the signature. Most salesclerks don't bother to check signatures anyway. Moreover, it is possible to paint the signature panel back in, over the VOIDs--at least on those cards that do not have a design on the panel. (Saks' panel is a greenish-tan khaki coler that would be difficult to match with paint.) The panel is first removed with dry-cleaning fluid. The back of the card is covered with masking tape, leaving a window where the replacement panel is to go. A thin coat of flat white spray paint simulates the original panel. - 99 - The Magnetic Strip ------------------ The other security device on the back of the card, the brown magnetic strip, is more difficult to analyze. Some people think there are sundry personal details about the cardholder stored in the strip. But the strip has no more information capacitythan a similar snippet of recording tape. For the most part banks are reticent about the strip. The strip need not contain any information other than the account number or similar indentification. Any futher information needed to complete an automatic-teller transaction-- such as current account balances--can be called up from bank computers and need not be encoded in the strip. Evidently, the card expiration date is in the strip. Expired cards are "eaten" by automatic-teller machines even when the expired card has the same account number and name as its valid replacement card. Credit limit, address, phone number, employer, etc, must not be indicated in this strip, for banks do not issue new cards just because this info changes. It is not clear if the personal identification number is in the strip or called up from the bank computer. Many automatic-teller machines have a secret limit of three attempts for provideing the correct personal identification nubmer. After three wround attempts, the "customer" is assumed to be a crook with a stolen card, going through all possible permutations--and the card is eaten. It is possible to scramble the information in the strip by rubbing a pocket magnet over it. Workers in hspitals or research facilites with large electromagnets sometimes find that their cards no longer work in automatic-teller machines. (If you try to use a magnetically doctored card, you usually get a message to the effect, "Your card may be inserted incorrectly. Please remove and insert according to the diagram.") The Bloomingdale's Color Code ----------------------------- Only in a few cases does the color of a credit card mean anything. There are, of course, the American Express, Visa, and MasterCard gold cards for preferred customers. The Air Travel Card comes in red and green, of which green is better. (With red, you can charge tickets for travel within North America only.) The most elaborate color scheme, and a source of some confusion to status-conscious queues, is that of Bloomingdale's credit department, here is how it works: Low color in the pecking order is blue, issued to Bloomingdale employees as a perk in their compensation packages. The basic Bloomingdale card is yellow. Like most department store cards, it can be used to spread payments over several months with the payment of a finance charge. The red card gives holders three months' free interest and is issued to customers who regularly make large purchases. The silver card is good for unlimited spending, but as with a travel and entertainment card, all charges must be paid in thirty days. The gold card offers the same payment options as the yellow card but is reserved for the store's biggest spenders. - 100 - Card Formats and Bank Numbers I. PREFACE This is my first infofile as a N.A.R.C. member. For those of you who have read "Getting Serious about Carding by Optical Illusion", this is a somewhat a con-tinuation of things you need to know about carding which Optical Illusion did not cover. In this file, we'll try to cover the aspects of the use (or shall we say misuse) of a credit card, strategies mail order companies keep us from getting away with carding, and a list of bank id numbers with their banks. II. CREDIT CARDS versus CHARGE CARDS Many people have the misconception that all cards are credit cards. This is of course not true. For example, American Express is a charge card and not a credit card. American Express is a charge card since the owner of the card must pay off the whole amount when his bill comes. If the owner doesn't, he or she is in serious shit. One thing good about the American Express is that it has no limit on how much the person can spend as long as the person can pay off the bill when it comes. Basically, the card is based on the person's good judgement on how much money the person have. Why is there American Express Gold and regular American Express cards then? It still has a hidden limit which you cannot buy a Corvette ZR-1 with a regular American Express. You could however do it with a American Express Platinum (if you can find one to abuse). This means you can buy more expensive things at one time with a Gold or Platinum card. Credit cards have a set limit after you you apply for the card. Usually a Classic Visa has about $700 plus or minus $100. Mastercard on the other hand has about $1000 limit on it. III. TYPES OF CARDS Credit Cards Charge Cards VISA American Express Mastercard American Express Optima Discover Here's a couple type of cards I do not know what category they fall into since they are never accepted by mail order companies. One of them is Diner's Club International and the other is Carte Blanche. - 101 - Bank name Bank name _______________________________-------------------------------- | | || | | | BANK of N A R C | V I S A||BANK of N A R C | V I S A|| |________|| |________| | | | | | | 4000 123 456 789 |hologram| | 4000 0123 4567 8910 |hologram| | |________| | |________| | 00/00 00/00 CV | ___ | | 00/00/00 00/00/00 PV| ___ | | | // | | | // | | John Doe | \\__ | | John Doe Jr. | \\__ | --------------------------------- -------------------------- | VISAs are grouped either | in 4XXX XXX XXX XXX or | 4XXX XXXX XXXX XXXX. This is either a C or a P. The 2 groupings used are different for C for Classic (regular) each bank. There are banks' P for Preferred (better, much better) preferred cards that are group in 4 3 3 3. _______________________________ | | | | | B A N K of N. A. R. C.| All Mastercards are 12 digits grouped |_______________________________| in blocks of four digits each. | ___ | | 5000 1234 4567 8910 / \| | |M C|| | 1234 00/00 00/00 BN | ||  Hologram | |M C|| | Joe Card Alot \___/| --------------------------------- BN is the Bank initials | 1234 is the bank id number. The bank may have more than one id number for their 5000 XXXX XXXX XXXX series cards. - 102 - IV. MAIL ORDER COMPANIES Most of the mail order companies will accept Visa or Mastercard. Some will also accept American Express and Discover. These mail order companies check the card by either calling into a TRW center to check if the amount of the order will exceed the limit. In either case of a approval or declining, the mail order companies will call you back to check with you the order you have placed. Anyways, a way of finding a valid card is to call a credit approval system yourself. Here's some ways of checking: (1) 1-800-554-2265 for check Mastercard or Visa for Visa 20#1067#24#CARD#EXP#XX*XX# - 10 and 20 are for the type of cards - 1067 is the bank id number - 24 is the merchant number (52 will also work) - EXPiration must be in the form of 0291 for feb of 1991 - XX*XX is the amount. Use a small number like 11*04 for $11.04. Another way mail order companies verifying cards is to call the bank of the card and verify the name of the person and the billing address versus the name you gave the mail order companies and the address (drop site). So the only way of getting pass this is to have the stuff sent to the person's address or getting the waybill number from the mail order houses and intercept the package at the UPS or Federal Express office before the package arrive's at the card owner's address. V. VISA BANK Numbers 4428 Bank of Hoven 4128 Citibank CV 4271 Citibank PV 4929 Barclay Card CV (from England) 4040 Wells Fargo CV 4019 Bank of America CV 4024 Bank of America PV 4019 Bank of America Gold (This card looks like a CV but without a CV afterthe expiration date) 4678 Home Federal 4726 Wells Fargo CV 4036 4561 4443 4833 4070 4735 4673 4044 4050 4226 4605 4923 4820 4048 CV 4121 - 103 - VI. Mastercard A. BANK NUMBERS 5419 Bank of Hoven 5410 Wells Fargo 5412 Wells Fargo 5273 Bank of America Gold 5273 Bank of America 5254 Bank of America 5286 Home Federal 5031 Maryland of North America 5326 5424 5250 5417 5215 5204 5411 5421 5329 5308 5217 5415 B. BANK ID NUMBERS 5410 Wells Fargo -- 1037 5410 Wells Fargo -- 6785 5419 Bank of Hoven -- 1933 5410 Wells Fargo -- 6037 5204 -- 1006 5250 -- 1260 5215 -- 6207 5424 -- 1065 5411 -- 1169 5421 -- 2143 5417 -- 1786 5417 -- 1711 5415 -- 1530 VII. AMERICAN EXPRESS 3728 GOLD 3713 Regular 3732 Regular 3737 3782 3731 3724 3742 3727 3787 3726 3766 3734 3749 3763 3710 3718 3720 3739 Carding For Benfit And Profit First off, there are many types of credit cards. But the main ones we will be discussing are American Express, Discover, Mastercard, and Visa. These four are the largest and most widely used types. My personal favorite is the Discover card, since the company is a real loser. It is best for the beginner to start out with Discover, then move to American Express, then to Mastercard, and finally visa, - 104 - The first thing you have to do is to find a credit card number (we will be refering to them as CCNs). There are several different ways of going about this, which will be discussed later in this file. The way you can tell the cards apart are the first digit of the CCN. Digit Type of Card ------- ------------ 3 American Express 4 Visa 5 Mastercard 6 Discover Now that you know the first digit of the card you want you need the different CCN formats. They are listed below. American Express 3xxx-xxxxxx-xxxxx Visa 4xxx-xxxx-xxxx-xxxx or 4xxx-xxx-xxx-xxx Citibank Visa, which is by far the most popular is 4128-xxx-xxx-xxx Mastercard 5xxx-xxxx-xxxx-xxxx The type of Mastercard I use is Citibank which is 5424-xxxx-xxxx-xxxx Discover 6xxx-xxxx-xxxx-xxxx There are a number of ways through which you can get CCNs. They are listed below in order of easiest method to hardest method. 1) Go for a little swim. That is, in a big dumpster. This is called trashing. Go in back of department store or anywhere that accepts credit cards and jump in. But make sure it's not at a mall, or - 105 - someone might see you and contact the police. When you've found the perfect dumpster, just dive right in. Just look around for carbons. You know, the things that the salesperson throws away after a credit card purchase. If anyone sees you, just pretend you're a bum. Or if that won't work, pretend you're looking for your baseball that flew in. Once you find these, (and making sure you don't rip them) put them in your cap, or somewhere where they won't fall out, and just calmly go home. Now comes the easy part. You just copy down everything important. The CCN, Expiration date, and Name. Then you rip it up into shreds and burn them. Now there is no way you can get caught unless you're a REAL idiot. 2) If you have a friend (it's better if it's a fellow pirate) that works in a store which performs credit card transactions, you might save yourself the trouble of trashing and ask him if he doesn't mind slipping some carbons into a bag after they ring up a sale. If he won't, bribe by saying you'll get him something too. Carbons ______________________________________ | (1) (2) | | (3) (4) | | (5) | | | |____________________________________| (1) The Account Number. This is the most important thing on a Credit Card. (2) The Expiration date for Visa or Mastercard (3) The Expiration date for Visa or Mastercard (4) The Expiration date for American Express (5) The Card Holder's name. The name is not very important but it is good to have. 3) If are really advanced, you can use a credit card formula, several do exist. If you're good at math and patterns, you should be able to figure out at least one formula. Once you have a newly formulated or newly found Credit Card, you have to first check to see if it is still valid before you try to use it. The easiest way I know of, is 1-800-554-2265. But after you enter something you must enter a pound. Just look at the example if you're confused. You must first, of course, dial 1-800-554-2265. Then it should say "Enter type". Number Card Type ------ --------- 10# Mastercard 20# Visa 30# American Express Then it will ask you for "Bank identification". Just enter 1067#. Now it will request a Merchant Number. Enter either 24# or 52#. Either one should work. Now it will ask you for the card number. Enter it in with a # sign following it. Then it will ask for the expiration date. Enter it with a # sign following it. And last, - 106 - but not least, it will ask for the amount. This is a little rickier. Look at the examples. If you still don't understand it, hen you're dumb, and you shouldn't be trying to card. For $100.25 ou enter 100*25#. For $1,532.67 you enter 1532*67#. Got it? Good. ow the moment of truth comes. In the next few seconds the computer will say Approved or Declined. Yes or No. Light or Dark. If it's approved, pat yourself on the back. If not, too bad. Go look for another one. * SPECIAL NOTE * In Canada dial 416-785-3222 for Visa credit checks or dial 1-800-268-2439 for Mastercard credit checks. For a Visa credit check in Canada, you first dial the authorization center and a operator will answer. Then you will be ask for the card number, amount of purchase, merchant # and expiry date. If the card is good then she'll tell you the authorization number. If the card is invalid then she'll say that the number was invalid. For a Mastercard credit check in Canada, you first dial the authorization center and a automated computer will answer. It will ask you if you want it in French or English, so if you want English punch in 1, or if you want French punch in 2. Next it will ask you for the "Credit Card Number". Just punch in the Mastercard number and the press the # sign following the number. Next it will ask you for the "Amount In Dollars Only", so press in the amount and then the # sign following it. Next it will ask for a "Merchant #", this can be skipped by just pressing the # sign. After that it will ask for a "Expiry Number". Punch the expiry number in and press a # sign following it, if you made a mistake punching in the amount, then from here you press 2 and change the amount of the purachse. After all that it will come back and if it's valid, it will tell you an authorization number, otherwise it will say that the number was invalid. If the amount is too high, then it will tell you to hold on for an operator. And then the operator will verify the card for you. ***************************************************************** ONE NOTE: IF A CARD HAS $5000 AND YOU VERIFY IT FOR $3000 DOLLARS, YOU CAN ONLY VERIFY IT FOR $2000 MORE. ANOTHER EXAMPLE IS IF THE CARD HAS $3000 AND YOU VERIFY IT FOR $1250, THE CARD CAN BE VERIFIED $1750 MORE BEFORE IT WILL SAY DECLINED. ***************************************************************** Now for the hardest part of all, purchasing merchandise with your newly verified CCN. You will probably want some computer equipment, knowing that that's what most people want. And be sure to read this entire file before attempting to card something. If you don't, you might get caught and spend ten years in jail and never be able to get another decent job again, just because you didn't listen to me and read this entire file. Now that I have your attention, we must lay down some rules for ordering merchandise to insure your safety. 1) Always go to a pay phone. - 107 - 2) Never give out your real name. 3) Or your address and telephone number. 4) Plan out the drop site and the fake number. I use the busiest PD board there is. 5) Sound calm. Remember, they can't do anything to you. 6) If they get suspicious, just keep sticking to the same story. A consistent lie is better than a inconsistent truth. Where should I ask them to ship it to? This is a common question. The best place to have the merchandise shipped to is an abandoned house. The sites where you want them shipped are called drop sites. Jot down this address. Now that we have set those rules, we now have to call a store. Make sure it is a small store, for they don't have the card checking techniques the bigger ones do. Now when they ask you your name and stuff like that, just give them the fake ones, without hesitation!! If you hesitate then they might get suspicious. Even spell it out for them. And try to be friendly. Don't sound nervous or anything. Now if they are online to credit bureaus suck as CBI or TRW then make up an excuse, like have your friend threaten you in the background (or something). If they are online with CBI or TRW they can verify everything in just a couple of minutes. Now if they aren't then you're in luck. Now when they ask for a number, give them the number you have ready. Bullshit your way through. If they aren't online, they can't verify really anything but that the CCN is valid and there is enough credit to pay for the merchandise. I wouldn't suggest making a business out of this, either. Sure, if you want to get a few dollars for things you order (and that you don't want anymore) sell it and keep the money. It wouldn't be all that great to go to jail for ten years and never get another decent job in your whole entire stinking life, just because someone you don't even know, wanted a bigger hard drive for $100? Yeah, you know I have a good point there. Well, the truth is that the only people that should really even make deals are the people with lots of experience. And now how to card Travelers Checks. These are alot easier than what I just talked about. All you gotta do is call 1-800-777-7337 and use an American Express card and ship it to your drop site. Now just go to another country and spend away. Have fun. Now for the most dangerous way of carding, by far. In person carding. But you get the stuff really quick. Now you need a fake name again. This time you need two. Your dad and a son. Lets say your name is Robert Armstrong. Look at the example. "Hello, Computers for less, how may I help you?" "Yes, this is Robert Armstrong calling from California (or somewhere across the country). My son, Mike, needs an Apple II. It says here in your ad that you sell them for such and such. I would like to place an order for one." "OK. And how will you be paying for this?" "Visa." - 108 - "OK. Number?" "4xxx-xxxx-xxxx-xxxx." "OK, thank you. Now how do you want this shipped?" "Well, since my son is going to college right next to you, I thought I could send him to go pick it up." "Oh, OK. Sure. Do you want us to call your son to notify him?" "No, that's ok. He's supposed to call in a couple of minutes. He always calls me at 5:00PM every Friday. I can't wait to hear what he says when he hears what I got him. When can he go pick it up?" "Anytime." "Ok, thank you. "Thank you for ordering from Computers for Less." Now comes the most dangerous part. Go to the store, park your car where none of the employees can see it. Now go in and state your fake name and what you are there to pick up. In Mike's case... "Hello. I'm here to pick up an Apple II my dad bought for me." "OK, sure. Mike Armstrong?" "Yes, that's me." "Ok, wait. We'll bring it up right now." "Thank you." "Well, here you are." "OK, Thank you." "No problem. Thank you for ordering from Computers for Less." Now just walk over to your car and drive off. I wouldn't really recommend this method, but if you're desperate, try it. Now if they get suspisious, don't get nervous. Just start complaining. Say like "My dad paid good money for this system and now you won't give it to me?" If they still won't give it to you, then say, "Ok, I'll come tommorrow. But if it isn't ready tommorow I'm going to tell - 109 - my dad to get a refund." Then walk out really pissed looking and never go back. They were probably setting up a trap for you. Better safe than sorry. Now I'll explain what happens to the unlucky guy. The guy's CCN you used of course. Now let's pretend this unfortunate soul's name is John Doe. At the end of the month, John Doe gets his Visa bill from the bank's credit card department. Among the things on his bill he notices a VGA card and monitor. John Doe then calls his bank and starts cussing them out and asking where the fuck did they get the VGA card and monitor from. Then the bank should send him a xerox copy of the original reciept, showing when it was bought and where it was sent to, and the second is an affidiate. This is a formal document saying that you did not make the purchase, you do not know who did, and did not authorize this purchase. It must be signed by him and then brought to the bank and signed by a notary public and have the bank's stamp on it. From there the bank can either go to their insurance agent or Visa, depending on who they have a deal with, and be paid for the carded stuff. Then John Doe must cut his cards in half and send them to the bank. After he has done that, he is re-issued new cards with a new CCN. How to Find Credit Cards: carbons or other methods II. Trash Digging Although not the most fun method of getting CCs it is the safest by far. It does not take much intelligence to go through a dumpster and look for credit card carbons... But I assure you even the most experienced carders use this method. The way this is done is to find a store that people always or almost always use credit cards. It must also have a dumpster or trashcan where its garbage is dumped that is out of plain sight. Wait for the store to close or go when few people are around and search for ripped up carbons. Then piece them together and you should get full or partial information. III. Slight of Hand Another method which I myself often use is this trick on ususpecting customers...If you work as a cashier at a store that accepts credit cards you have an excellent opportunity to get card numbers and full info. What you need to do is when someone comes in and buys something via credit card, you wait for him/her to rip up the carbon and throw it out, if he/she throws it out in the stores trashcan, pick up the cardbon right away. Or sometimes the person will not even ask for his/her carbon, although this is somewhat rare. But I have even had someone leave their actuall credit card behind, then I just copy the name and number down, and give it back. - 110 - IV. Mailbox Searching This is basically a very lame way to get credit cards due to the danger and in order to get CCs this way you get the actuall card. What you do is have a bunch of pointless flyers made up, and goto a decent neighborhood away from your area of residence that has homes with accesable mail boxes. Wear sunglasses and a baseball hat if possible, although don't wear the shades on a cloudy day. Do this during school time if possible so you are not seen. What you do is go by each persons mail box and put a flyer in it (Which in itself is illegal, but few people know this) and while you are doing so search the mail for envelope from banks. If you happen to find one from a bank slip it into your pile of flyers and sneak off to open it. If it has a CC in it then you are in luck. Go home and prepare to card, because you don't have much time until the card will go bad probably. This method is not a very good one, use only if you are desperate. V. TRW I will keep this short because this uses more hacking than carding... But one method is to hack the local TRW system and you can get full info on a card with name and number. What you do is find a carbon with partial info some other way (Must be name and number) and check TRW for it, then you will get full info. Personnally, I never hacked TRW on my own although it can be done. Also, you may know some big time hacker through bbsing, have him hack TRW for you and get the info in exchange for carding him something. VI. Trading info Another way to get credit card numbers is to just trade information of some sort to someone who has a steady supply of credit cards. Maybe this would be phreaking codes, or dialups, or maybe some bank numbers, or even money I suppose(This would make you a lamer in my book) . There are many people out there who have connections you don't, and some may even give you the numbers and such for free. VII. VMB's and Carding Subs This is basically self explanitory. There are many Voice Mail Boxes or VMBs that have cards with full info on them, and they are not that hard to get the number to, just e-mail some people you know, maybe they know of one. Just, once in a while put in a valid card and then all will go well. Also many elite systems have their own carding sub, there will be valid cards on these subs for the taking. Don't be shy, although if the card number is really old don't bother, you are just asking to get caught. - 111 - VIII. Connections Maybe you know someone who can do one of the above methods. Don't be afraid to ask for his help. Maybe this person is a cashier that can get you a steady supply of credit card numbers with names. Then get those to someone who hacks TRW and then you will get the full info on several cards and be able to take you pick and return the favor to some VMBs you leeched card numbers off of...It all works out very nicely... - 112 - THE BAUDY WORLD OF THE BYTE BANDIT: A POSTMODERNIST INTERPRETATION OF THE COMPUTER UNDERGROUND An earlier version of this paper was presented at the American Society of Criminology annual meetings, Reno (November 9, 1989). Authors are listed in alphabetical order. Address correspondence to Jim Thomas. We are indebted to the numerous anonymous computer underground participants who provided information. Special acknowledgement goes to Hatchet Molly, Jedi, The Mentor, Knight Lightning, and tran King. ABSTRACT The criminalization of "deviant acts" transforms social meanings into legal ones. Yet, legal meanings are not necessarily social meanings. The legitimacy of statutory social control generally requires that one accept the realist textual readings of those with the power to interpret and stigmatize behaviors as inappropriate. "Moral crusades" that lead to definitions of criminalized deviance tend to reduce the meanings of polysemic acts to unidimensional ones that limit understanding of both the nature of the acts and their broader relationship to the culture in which they occur. This has occured with the criminalization of computer phreaking and hacking. In this paper, we examine the computer underground as a cultural, rather than a deviant, phenomenon. Our data reveal the computer underground as an invisible community with a complex and interconnected culture, dependent for survival on information sharing, norms of reciprocity, sophisticated socialization rituals, and an explicit value system. We suggest that the dominant image of the computer underground as one of criminal deviance results in a failure to appreciate cultural meaning. We conclude by arguing that there are characteristics of underground activity that embrace a postmodernist rejection of conventional culture. Hackers are "nothing more than high-tech street gangs" (Federal Prosecutor, Chicago). Transgression is not immoral. Quite to the contrary, it reconciles the law with what it forbids; it is the dialectical game of good and evil (Baudrillard, 1987: 81). There ain't no sin and there ain't no virtue. There's just stuff people do. It's all part of the nice, but that's as far as any man got a right to say (Steinbeck, 1939:31-32). The criminalization of "deviant acts" transforms and reduces social meanings to legal ones. Legal meanings are not necessarily social meanings. Most deviancy research tends to reproduce conventional social ideology and operative definitions of normality within its concepts and theories. On occasion, these meanings represent a form of "class politics" that protect the power and privilege of one group from the challenge of another: Divorcing moral crusades from status group competition while denying that cultures are linked to social classes has undermined attempts to link lifestyle - 113 - politics to group struggles (Beisel, 1990: 45). Once a category of behaviors has become defined by statute as sanctionably deviant, the behaviors so-defined assume a new set of meanings that may obscure ones possessed by those who engage in such behaviors. "Computer deviants" provide one example of a criminalized type of "lifestyle politics." The proliferation of computer technology has been a accompanied by the growth of a computer underground (CU), often mistakenly labeled "hackers," that is perceived as criminally deviant by the media, law enforcement officials, and researchers. Drawing from ethnographic data, we offer a cultural rather than a criminological analysis of the underground by suggesting that it reflects an attempt to recast, re-appropriate, and reconstruct the power-knowledge relationship that increasingly dominates the ideology and actions of modern society. Our data reveal the computer underground as an invisible community with a complex and interconnected cultural lifestyle, an inchoate anti-authoritarian political consciousness, and dependent on norms of reciprocity, sophisticated socialization rituals, networks of information shaand an explicit value system. We interpret the CU culture as a challenge to and parody of conventional culture, as a playful attempt to reject the seriousness of technocracy, and as an ironic substitution of rational technological control of the present for an anarchic and playful future. Stigmatizing the Computer Underground The computer underground refers to persons engaged in one or more of several activities, including pirating, anarchy, hacking, and phreaking[1]. Because computer underground participants freely share information and often are involved collectively in a single incident, media definitions invoke the generalized metaphors of "conspiracies" and "criminal rings," (e.g., Camper, 1989; Zablit, 1989), "modem macho" evil-doers (Bloombecker, 1988), moral bankruptcy (Schwartz, 1988), "electronic trespassers" (Parker: 1983), "crazy kids dedicated to making mischief" (Sandza, 1984: 17), "electronic vandals" (Bequai: 1987), a new "threat" (Van, 1989), saboteurs ("Computer Sabateur," 1988), secret societies of criminals (WMAQ, 1990), and "high-tech street gangs" ("Hacker, 18," 1989). These images have prompted calls for community and law enforcement vigilance (Conly and McEwen, 1990: 2) and for application of the Racketeer Influenced and Corrupt Organizations (RICO) Act to prosecute and control the "criminals" (Cooley, 1984). These images fail to distinguish underground "hobbyists," who may infringe on legal norms but have no intention of pillaging, from felonious predators, who use technology to loot[2]. Such terminology provides a common stock ofknowledge that formats interpretations of CU activity in ways pre-patterned as requiring social control to protect the common weal (e.g., Altheide, 1985). As Hollinger and Lanza-Kaduce (1988: 119), Kane (1989), and Pfuhl (1987) observed, the stigmatization of hackers has emerged primarily through value-laden nedia - 114 - depictions. When in 1990 a Cornell University graduate student inadvertently infected an in ternational computer network by planting a self-reproducing "virus," or "rogue program," the news media followed the story with considerable detail about the dangers of computer abuse (e.g., Allman, 1990; Winter, 1988). Five years earlier, in May of 1983, a group of hackers known as "The 414's" received equal media attention when they broke into the computer system of the Sloan Kettering Cancer research center. Between these dramatic and a typical events, the media have dramatized the dangers of computer renegades, and media anecdotes presented during Congressional legislative debates to curtail "computer abuse" dramatized the "computer hacking problem" (Hollinger and Lanza-Kaduce, 1988: 107). Although the accuracy and objectivity of the evidence has since been challenged (Hollinger and lnza-Kaduce 1988: 105), the media continue to format CU activity by suggesting that any computer-related felony can be attributed to hacking. Additionally, media stories are taken from the accounts of police blotters, security personnel, and apprehended hackers, each of whom have different perspectives and definitions. This creates a self-rein-forcing imagery in which extreme examples and cursively circulated data are discretely adduced to substantiate the claim of criminality by those with a vested interest in creating and maintaining such definitions. For example, Conly and McEwen (1990) list examples of law enforcement jurisdictions in which special units to fight "computer crime," very broadly defined, have been created. These broad definitions serve to expand the scope of authority and resources of the units. Nonetheless, despite criminalization, there is little evidence to support the contention that computer hacking has been sufficiently abusive or pervasive to warrant prosecution (Michalowski and Pfuhl, forth-coming). As an antidote to the conventional meanings of CU activity as simply one of deviance, we shift the social meaning of CU behavior from one of stigma to one of culture creation and meaning. Our work is tentative, in part because of the lack of previous substantive literature and in part because of the complexity of the data, which indicate a multiplicity of subcultures within the CU. This paper examines of two distinct CU subcultures, phreaks and hackers, and challenges the Manichean view that hackers can be understood simply as profaners of a sacred moral and economic order. The Computer Underground and Postmodernism: The computer underground is a culture of persons who call computer bulletin board systems (BBSs, or just "boards"), and share the interests fostered by the BBS. In conceptualizing the computer underground as a distinct culture, we draw from Geertz's (1973: 5) definition of culture as a system of meanings that give significance to shared behaviors that must be interpreted from the perspective of those engaged in them. A culture provides not only the "systems of standards for perceiving, believing, evaluating, and acting" (Goodenough, 1981: 110), but includes the rules and symbols of interpretation and discourse for - 115 - partici-pants: Incrude relief, culture can be understood as a set of solutions devised by a group of people to meet specific problems posed by situations they face in common. . . This notion of culture as a living, historical product of group problem solving allows an approach to cultural study that is applicable to any group, be it a society, a neighborhood, a family, a dance band, or an organization and its segments (Van Maanen and Barley, 1985: 33). Creating and maintaining a culture requires continuous individual or group processes of sustaining an identity through the coherence gained by a consistent aesthetic point of view, a moral conception of self, and a lifestyle that expresses those conceptions in one's immediate existence and tastes (Bell, 1976: 36). These behavioral expressions signify a variety of meanings, and as signifiers they reflect a type of code that can be interpreted semiotically, or as a sign system amenable to readings independent of either participants or of those imposed by the super-or-dinate culture: All aspects of culture possess a semiotic value, and the most taken-for-granted phenomena can function as signs: as elements in communication systems governed by semantic rules and codes which are not themselves directly apprehended in experience. These signs are, then, as opaque as the social relations which produce them and which they re-present (Hebdige, 1982: 13). It is this symbolic cultural ethos, by which we mean the style, world view, and mood (Hebdige, 1979), that reflects the postmodernist elements of the CU and separates it from modernism. Modernist culture is characterized especially by rationality, technological enhancement, deference to centralized control, and mass communication. The emergence of computer technology has created dramatic changes in social communication, economic transactions, and information processing and sharing, while simultaneously introducing new forms of surveillance, social control, and intrusions on privacy (Marx, 1988a: 208-211; Marx and Reichman, 1985). This has contributed to a: richly confused and hugely verbal age, energized by a multitude of competing discourses, the very proliferation and plasticity of which increasingly deter mine what we defensively refer to as our reality (New- man, 1985: 15). By Postmodernism we mean a reaction against "cultural moder- nity" and a destruction of the constraints of the present "maximum security society" (Marx, 1988b) that reflect an attempt to gain control of an alternative future. In the CU world, this constitutes a conscious resistance to the domination of but not the fact of technological encroachment into all realms of our social existence. The CU represents a reaction against modernism by offering an ironic response to the primacy of a master technocratic language, the incursion of computers into realms once considered private, the politics of techno-society, and the sanctity of established civil and state authority. Postmodernism is characterized not so much by a single definition as by a number of interrelated characteristics, including, but not limited to: - 116 - 1. Dissent for dissent's sake (Lyotard, 1988). 2. The collapse of the hierarchical distinction between mass and popular culture (Featherstone, 1988: 203). 3. A stylistic promiscuity favoring eclecticism and the mixing of codes (Featherstone, 1988: 203). 4. Parody, pastiche, irony, playfulness and the celebration of the surface "depthlessness" of culture (Featherstone, 1988: 203). 5. The decline of the originality/genius of the artistic producer and the assumption that art can only be repetitious (Featherstone 1988: 203). 6. The stripping away of social and perceptual coordinates that let one "know where one is" (Latimer, 1984: 121). 7. A search for new ways to make the unpresentable presentable, and break down the barriers that keep the profane out of everyday life (Denzin, 1988: 471). 8. The introduction of new moves into old games or inventing new games that are evaluated pragmatically rather than from some uniform stand point of "truth" or philosophical discourse (Callinicos, 1985: 86). 9. Emphasis on the visual over the literary (Lash, 1988: 314). 10. Devaluation of formalism and juxtaposition of signifiers taken from the banalities of everyday life (Lash, 1988: 314). 11. Contesting of rationalist and/or didactive views of culture (Lash, 1988: 314). 12. Asking not what a cultural text means, but what it does (Lash, 1988: 314). 13. Operation through the spectator's immersion, the relatively unmediated investment of his/her desire in the cultural object (Lash, 1988: 314). 14. Acknowledgement of the decenteredness of modern life and "plays with the apparent emptiness of modern life as well as the lack of coherence in modern symbol systems" (Manning, 1989: 8). "Post-Modernism" in its positive form constitutes an intellectual attack upon the atomized, passive and indifferent mass culture which, through the saturation of electronic technology, has reached its zenith in Post-War American (Newman, 1985: 5). It is this style of playful rebellion, irreverent subversion, and juxtaposition of fantasy with high-tech reality that impels us to interpret the computer underground as a postmodernist culture. Data and Method: Obtaining data from any underground culture requires tact. BBS operators protect the privacy of users and access to elite boards, or at least to their relevant security - 117 - levels, virtually always requires completion of a preliminary questionnaire, a screening process, and occasional voice verification. Researchers generally do not themselves violate laws or dominant norms, so they depend on their informants for potentially "dirty information" (Thomas and Marquart, 1988). Our own data are no exception and derive from several sources. First, the bulk of our data come from computer bulletin board systems. BBSs are personal computers (PCs) that have been equipped with a telephone modem and special software that connects users to other PCs by telephone. After "logging in" by supplying a valid user name and password, the user can receive and leave messages to other users of the system. These messages are rarely private and anyone calling the BBS can freely read and respond to them. There is usually the capacity to receive (download) or send (upload) text files ("G-philes") or software programs between the caller and host system. We logged the message section of CU BBSs to compile documentary evidence of the issues deemed important for discussion by participants. Logs are "captured" (recorded using the computer buffer) messages left on the board by users. Calculating the quantity of logged data is difficult because of formatting variance, but we estimate that our logs exceed 10,000 printed pages. The logs cited here are verbatim with the exception of minor editing changes in format and extreme typographical errors. Identifying underground BBSs can be difficult, and to the uninitiated they may appear to be licit chat or shareware boards. For callers with sufficient access, however, there exist back-stage realms in which "cracking" information is exchanged and private text or software files made available. With current technology, establishing a BBS requires little initial skill. Most boards are short-lived and serve only local or regional callers. Because of the generally poor quality and amateur nature of these systems, we focused on national elite boards. We considered a board "elite" if it met all of the following characteristics: At least one quarter of the users were registered out side the state of the board called; the phone line were exclusively for BBS use and available 24 hours a day; and the information and files, warez were current "state of the field." Elite CU members argue that there are less than ten "truly elite" p/hacker boards nationally. We obtained the names and numbers of BBSs from the first boards we called, and used a snowball technique to supplement the list. We obtained additional numbers from CU periodicals,and, as we became more familiar with t he culture, users also added to the list. Our aggregate data include no less than 300 Bulletin board systems, of which at least 50 attract phreaks and hackers, and voice or on-line interviews with no less than 45 sysops (operators of BBS systems) and other active CU participants. A second data source included open-ended voice and on-line interviews with hackers, phreaks and pirates. The data include no less than 25 face-to-face, 25 telephone, and 60 on-line interviews obtained as we became familiar with our informants. Third, data acquisition included as much participation as legally possible in - 118 - CU activities[3]. This served to justify our presence in the culture and provided information about the mundane activity of the CU. Finally, we obtained back and current issues of the primary underground computerized magazines, which are distributed on national BBSs as text files. These contain information relevant to the particular subculture, and included PHRACK, Activist Times Incorporated (ATI), P/Hun, 2600 Magazine, PIRATE, TAP, Al.P.H.A and Legion of Doom (LoD/H). We also draw data from national and international electronic mail (e-mail) systems on which an active information-sharing CU network has developed and spread. Assessing the validity and reliability of data obtained in this manner creates special problems. One is that of sampling. The number of boards, their often ephemeral existence, and the problem of obtaining access makes conventional sampling impossible. We focused on national boards and engaged in theoretical sampling (Glaser and Strauss, 1967: 45-77). We consider our sample representative, and accept Bordieu's observation that: If, following the canon dictated by orthodox methodology, you take a random sample, you mutilate the very object you have set out to construct. If, in a study of the field of lawyers, for instance, you do not draw the President of the Supreme Court, or if, in an inquiry into the French intellectual field of the 1950s, you leave out Jean-Paul Sartre, or Princeton University in a study of American academics, your field is destroyed, insofar as these personas or institutions alone mark a crucial position--there are positions in a field which command the whole structure (Bordieu, interviewed in Wacquant, 1989: 38). We judge our sample of participants adequate for several reasons. First, we presume that the members with whom we have had contact comprise the elite members of the culture, as determined by the nature of the boards they were on, references to them on national boards, the level of expertise displayed in their messages, and their appearance in the "user lists" of elite boards. We consider the BBSs to be "typical exemplars" because of their status in the culture, because of the level of sophistication both of users and of message content, and because of references to these boards as "elite" in CU periodicals. The computer underground is both a life style and a social network. As a lifestyle, it provides identity and roles, an operational ideology, and guides daily routine. As a social net-work, it functions as a communications channel between persons engaged in one of three basic activities: Hacking, phreaking, and pirating[4]. Each subgroup possesses an explicit style that includes an ethic and "code of honor," cohesive norms, career paths, and other characteristics that typify a culture (Meyer, 1989a, 1989b;; Meyer and Thomas, 1989). Hebdige (1982: 113-117) used the concept of homology to describe the structural unity that binds participants and provides the "symbolic fit between the values and life-styles of a group" and - 119 - how it expresses or reinforces its focal concerns. Homology refers to the affinity and similarities members of a group share that give it the particular cultural identity. These shared alternative values and actions connect CU members to each other and their culture, and create a celebration of "otherness" from the broader culture. Hackers (Tune: "Put Another Nickel in") Put another password in, Bomb it out, and try again, Try to get past logging in, Were hacking, hacking, hacking. Try his first wife's maiden name, This is more than just a game, It's real fun, but just the same It's hacking, hacking, hacking. Sys-call, let's try sys-call. Remember, that great bug from Version 3, Of R S X, It's here! Whoopee! Put another sys-call in, Run those passwords out and then, Dial back up, we're logging on, We're hacking, hacking, hacking. (The Hacker Anthem, by Chesire Catalyst) Hacking broadly refers to attempts to gain access to computers to which one does not possess authorization. The term "hackers" first came into use in the early 1960's when it was applied to a group of pioneering computer aficionados at MIT (Levy, 1984). Through the 1970s, a hacker was viewed as someone obsessed with understanding and mastering computer systems (Levy 1984). But, in the early 1980's, stimulated by the release of the movie "War Games" and the much publicized arrest of a "hacker gang" known as "The 414s", hackers were seen as young whiz-kids capable of breaking into corporate and government computer systems (Landreth 1985:34). The imprecise media definition and the lack of any clear understanding of what it means to be a hacker results in the mis-application of the label to all forms of computer malfeasance. Despite the inter-relationship between phreaks and hackers, the label of "hacker" is generally reserved for those engaged in computer system trespassing. For CU participants, hacking can mean either attempting to gain access to a computer system, or the more refined goals of exploring in, experimenting with, or testing a computer system. In the first connotation, hacking re quires skills to obtain valid user accounts on computer systems that would otherwise be unavailable, and the term connotes the repetitive nature of break-in attempts. Once successful entry is made, the illicit accounts are often shared among associates and described as being "freshly (or newly) hacked." The second connotation refers to someone possessing the knowledge, ability, and desire to fully explore a computer system. The elite hackers, the mere act of gaining entry is not enough to warrant the "hacker" label; there must be a desire to master and skill to use the system after access has been achieved: It's Sunday night, and I'm in my room, deep into a hack. My eyes are on the monitor, and my hands are on the keyboard, but my mind is really on the operating system of a super-minicomputer a thousand miles away - a super-mini with an operating systems that does a good job of tracking users, and that will show my activities in its user logs, unless I can outwit it in the few hours before the Monday morning staff arrives for work.....Eighteen hours ago, I managed to hack a pass-word for the - 120 - PDP 11/44. Now, I have only an hour or so left to alter the user logs. If I don't the logs will lead the system operators to my secret account, and the hours of work it took me to get this account will be wasted (Landreth, 1985: 57-58). An elite hacker must experiment with command structures and explore the many files available in order to understand and effectively use the system. This is sometimes called "hacking around" or simply "hacking a system". This distinction is necessary because not all trespassers are necessarily skilled at hacking out passwords, and not all hackers retain interest in a system once the challenge of gaining entry has been surmounted. Further, passwords and accounts are often traded, allowing even an unskilled intruder to erroneously claim the title of "hacker." Our data indicate that, contrary to their media image, hackers avoid deliberately destroying data or otherwise damaging the system. Doing so would conflict with their instrumental goal of blending in with the average user to conceal their presence and prevent the deletion of the account. After spending what may be a substantial amount of time obtaining a high access account, the hacker places a high priority on not being discovered using it, and hackers share considerable contempt for media stories that portray them as "criminals." The leading CU periodicals (e.g., PHRACK, PIRATE) and several CU "home boards" reprint and disseminate media stories, adding ironic commentary. The perception of media distortion also provides grist for message sections: A1: I myself hate newspaper reporters who do stories on hackers, piraters, phreaks, etc...because they always make us sound like these incred. %sic% smart people (which isn't too bad) who are the biggest threat to to-days community. Shit...the BEST hackers/phreaks/etc will tell you that they only do it to gain information on those systems, etc...(Freedom - That's what they call it...right?) (grin) A2: Good point...never met a "real p/h type yet who was into ripping off. To rip of a line from the Steve Good-man song (loosely), the game's the thing. Even those who allegedly fly the jolly rodger %pirates%, the true ones, don't do it for the rip-off, but, like monopoly, to see if they can get Boardwalk and Park Place without losing any railroads. Fun of the latter is to start on a board with a single good game or util %software utility% and see what it can be turned into, so I'm told. Fuck the press (DS message log, 1989). One elite hacker, a member of a loose-knit organization recently in the national news when some participants were indicted for hacking, responded to media distortions of the group by issueing an underground press release: My name is %deleted%, but to the computer world, I am %deleted%. I have been a member of the group known as Legion of Doom since its creation, and admittedly I have not been the most legitimate computer user around, but when people start hinting at my supposed Communist-backed actions, and say that I am involved in a world- wide conspiracy to destroy the nation's computer and/or 911 network, I have to speak up and hope that people will take what I have to say seriously. . . . People just can't seem to grasp - 121 - the fact that a group of 20 year old kids just might know a little more than they do, and rather than make good use of us, they would rather just lock us away and keep on letting things pass by them. I've said this before, you can't stop burglars from robbing you when you leave the doors unlocked and merely bash them in the head with baseball bats when they walk in. You need to lock the door. But when you leave the doors open, but lock up the people who can close them for you another burglar will just walk right in ("EB," 1990). Although skirting the law, hackers possess an explicit ethic and their primary goal is knowledge acquisition. Levy (1984: 26-36) identifies six "planks" of the original hacker ethic, and these continue to guide modern hackers: 1. First, access to computers should be unlimited and total: "Always yield to the Hands-On Imperative!" 2. Second, all information should be free. 3. Third, mistrust authority and promote decentralization. 4. Fourth, hackers should be judged by their prowess as hackers rather than by formal organizational or other irrelevant criteria. 5. Fifth, one can create art and beauty on a computer. 6. Finally, computers can change lives for the better. PHRACK, recognized as the "official" p/hacker newsletter, expanded on this creed with a rationale that can be summarized in three principles ("Doctor Crash," 1986). First, hackers reject the notion that "businesses" are the only groups entitled to access and use of modern technology. Second, hacking is a major Weapon in the fight against encroaching computer technology. Finally, the high cost of equipment is beyond the means of most hackers, which results in the perception that hacking and phreaking are the only recourse to spreading computer literacy to the masses: Hacking. It is a full time hobby, taking countless hours per week to learn, experiment, and execute the art of penetrating multi-user computers: Why do hackers spend a good portion of their time hacking? Some might say it is scientific curiosity, others that it is for mental stimulation. But the true roots of hacker motives run much deeper than that. In this file I will describe the underlying motives of the aware hackers, make known the connections between Hacking, Phreaking, Carding, & Anarchy, and make known the "techno-revolution" which is laying seeds in the mind of every hacker. . . .If you need a tutorial on how to perform any of the above stated methods %of hacking%, please read a %PHRACK% file on it. And whatever you do, continue the fight. Whether you know it or not, if you are a hacker, you are a revolutionary. Don't worry, you're on the right side ("Doctor Crash," 1986). Computer software, such as auto-dialers popularized in the film War Games, provides a means for inexperienced hackers to search out other computers. Auto-dialers randomly dial numbers and save the "hits" for manual testing later. Some users self-i-dentify has hackers simply on the basis of successfully collecting computer numbers or passwords, but these users are considered lamerz," because they do not possess sufficient knowledge to obtain access or move about in the system once access is obtained. Lamerz are - 122 - readily identified by their message content: Sub ->numbers From -> (#538) To ->all Date ->02/21/xx 06:10:00 PM: Does anyone know any numbers for hotels, schools, businesses, etc..and passwords if you do please leave a bulletin with the number and the password and/or logon id. Sub ->phun From -> (#138) To ->all Date ->02/22/xx 12:21:00 AM Anyone out there got some good 800 dial up that are fairly safe to hack? If so could ya leave me em in e-mail or post em with the formats.....any help would%be apreciated...... thanx Although hackers freely acknowledge that their activities may be occasionally illegal, considerable emphasis is placed on limiting violations only to those required to obtain access and learn a system, and they display hostility toward those who transgress beyond beyond these limits. Most experienced CU members are suspicious of young novices who are often entranced with what they perceive to be the "romance" of hacking. Elite hackers complain continuously that novices are at an increased risk of apprehension and also can "trash" accounts on which experienced hackers have gained and hidden their access. Nonetheless, experienced hackers take pride in their ethic of mentoring promising newcomers, both through their BBSs and newsletters: As %my% reputation grew, answering such requests [from novice hackers wanting help] became a matter of pride. No matter how difficult the question happened to be, I would sit at the terminal for five, ten, twenty hours at a time, until I had the answer (Landreth, 1985: 16). The nation's top elite p/hacker board was particularly nurturing of promising novices before it voluntarily closed in early 1990, and its sysop's handle means "teacher." PHRACK, begun in 1985, normally contained 10-12 educational articles (or "philes"), most of which provided explicit sophisticated technical information about computer networks and telecommunications systems[5]. Boundary socialization occurs in message bases and newsletters that either discourage such activity or provide guidelines for concealing access once obtained: Welcome to the world of hacking! We, the people who live outside of the normal rules, and have been scorned and even arrested by those from the 'civilized world', are becoming scarcer every day. This is due to the greater fear of what a good hacker (skill wise, no moral judgements here) can do nowadays, thus causing anti-hacker sentiment in the masses. Also, few hackers seem to actually know about the computer systems they hack, or what equipment they will run into on the front end, or what they could do wrong on a system to alert the 'higher' authorities who monitor the system. This article is intended to tell you about some things not to do, even before you get on the system. We will tell you about the new wave of front end security devices that are beginning to be used on computers. We will attempt to instill in you a second identity, to be brought up at time of great need, to pull you out of trouble. (p/hacker newsletter, 1987). Elite hacking requires highly sophisticated technical skills to enter - 123 - the maze of protective barriers, recognize the computer type, and move about at the highest system levels. As a consequence, information sharing becomes the sine qua non of the hacker culture. "Main message" sections are generally open to all users, but only general information, gossip, and casual commentary is posted. Elite users, those with higher security privileges and access to the "backstage" regions, share technical information and problems, of which the following is typical: 89Mar11 From ***** ** * ***> Help! Anyone familiar with a system that responds: A2: SELECT : DISPLAY: 1=TRUNK,2=SXS;INPUT:3=TRUNK,4=SXS,5=DELETE;7=MSG If you chose 1... ENTER OLD#,(R=RETURN) At this point I know you can enter 7 digits, the 8th ill give you an INVALID ENTRY type message. Some num- bers don't work however. (1,2,7,8 I know will) Anybody? 89Mar10 From *********> I was hacking around on telenet (415 area code) and got a few things that I am stuck-o on if ya can help, I'd be greatly happy. First of all, I got one that is called RCC PALO ALTO and I can't figure it out. Second (and this looks pretty fun) is the ESPRIT COMMAIL and I know that a user name is SYSTEM because it asked for a password on ONLY that account (pretty obvious eh?) a few primnet and geonet nodes and a bunch of TELENET ASYYNC to 3270 SERVICE. It asks for TERMINAL TYPE, my LU NUMBER and on numbers higher than 0 and lower that 22 it asks for a password. Is it an outdial? What are some common passwords? then I got a sushi-primnet system. And a dELUT system. And at 206174 there is JUST a : prompt. help! (P/h message log, 1988). Rebelliousness also permeates the hacker culture and is reflected in actions, messages, and symbolic identities. Like other CU participants, hackers employ handles (aliases) intended to display an aspect of one's personality and interests, and a handle can often reveal whether its owner is a "lamer" (an incompetent) or sophisticated. Hackers take pride in their assumed names, and one of the greatest taboos is to use the handle of an other or to use multiple handles. Handles are borrowed liberally from the anti-heros of science fiction, adventure fantasy, and heavy metal rock lyrics, particularly among younger users, and from word plays on technology, nihilism, and violence. The CU handle reflects a stylistic identity heavily influenced by metaphors reflecting color (especially red and black), supernatural power (e.g., "Ultimate - 124 - Warrior, "Dragon Lord"), and chaos ("Death Stalker," "Black Avenger"), or ironic twists on technology, fantasy, or symbols of mass culture (e.g., Epeios, Phelix the Hack, Ellis Dea, Rambo Pacifist, Hitch Hacker). This anti-establishment ethos also provides an ideological unity for collective action. Hackers have been known to use their collective skills in retaliation for acts against the culture that the perceive as unfair by, for example, changing credit data or "revoking" driver's licenses (Sandza, 1984; "Yes, you Sound very Sexy," 1989). Following a bust of a national hacker group, the message section of the "home board" contained a lively debate on the desireability of a retaliatory response, and the moderates prevailed. Influenced especially by such science fantasy as William Gibson's Neuromancer (1984), John Brunner's The Shockwave Rider (1975), and cyber-punk, which is a fusion of elements of electronic communication technology and the "punk" subculture, the hacker ethic promotes resistance to the very forms that create it. Suggestive of Frazer's (1922) The Golden Bough, power is challenged and supplanted by rituals combining both destruction and rejuvenation. From this emerges a shared ethos of opposition against perceived Orwellian domination by an information-controlling elite:(Hackers will) always be necessary, especially in the technological oppression of the future. Just imagine an information system that systematically filters out certain obscene words. Then it will move on to phrases, and then entire ideas will be replaced by computers! Anyway, there will always be people tripping out on paper and trying to keep it to themselves, and it's up to us to at least loosen their grasp (P.A. Message Log 1988). Another hacker summarized the near-anarchist ethic characterized the CU style: Lookit, we're here as criminal hobbyists, peeping toms, and looters. I am in it for the fun. Not providing the public what it has a right to know, or keeping big brother in check. I couldn't care less. I am sick of the old journalistic hackers nonsense about or (oops! OUR) computerized ego...I make no attempt to justify what I am doing. Because it doesn't matter. As long as we live in this goddamn welfare state I might as well have some fun taking what isn't mine, and I am better off than those welfare-assholes who justify their stealing. At least I am smart enough to know that the free lunch can't go on forever (U.U. message log 1988). In sum, the hacker style reflects well-defined goals, communication networks, values, and an ethos of resistance to authority. Because hacking requires a broader range of knowledge than does phreaking, and because such knowledge can be acquired only through experience, hackers tend to be both older and more knowledgeable than phreaks. In addition, despite some overlap, the goals of the two are somewhat dissimilar. As a consequence, each group constitutes a separate analytic - 125 - category. Phreaks. Running numbers is not only fun; it's a moral imperative! (Phreak credo). Phreaking broadly refers to the practice of using either technology or telephone credit card numbers (called "codez") to avoid long distance charges. Phreaking attained public visibilily with the revelation of the exploits of John "Cap'n Crunch" Draper, the "father of phreaking" (Rosenbaum, 1971). Although phreaking and hacking each require different skills, phreaks and hackers tend to associate on same boards. Unlike hackers, who attempt to master a computer system and its command and security structure, phreaks struggle to master telecom (tele-communications) technology: The phone system is the most interesting, fascinating thing that I know of. There is so much to know. Even phreaks have their own areas of knowledge. There is so much to know that one phreak could know something fairly important and the next phreak not. The next phreak might know 10 things that the first phreak doesn't though. It all depends upon where and how they get their info. I myself would like to work for the telco, doing something interesting, like programming a switch. Something that isn't slave labor bullshit. Something that you enjoy, but have to take risks in order to participate unless you are lucky enough to work for Bell/AT&T/any telco. To have legal access to telco things, manuals, etc. would be great (message log, 1988). Early phreaking methods involved electro-mechanical devices that generated key tones or altered phone line voltages to trick the mechanical switches of the phone company into connecting calls without charging, but the advent of computerized telephone-switching systems largely made these devices obsolete. In order to continue their practice, phreaks have had to learn hacking skills in order to obtain access to telephone company computers and software. Access to telecom information takes several forms, and the possesion of numbers for "loops" and "bridges," while lying in a grey area of law, further enhances the reputation and status of a phreak. P/hackers can utilize "loop lines" to limit the number of eavesdroppers on their conversations. Unlike bridges, which connect an unlimited number of callers simultaneously, loops are limited to just two people at a time[6]. A "bridge" is a technical name for what is commonly known as a "chat line" or "conference system." Bridges are familiar to the public as the pay-per-minute group conversation systems advertised on late night television. Many bridge systems are owned by large corporations that maintain them for business use during the day. While the numbers to these systems are not public knowledge, many of them have been discovered by phreaks who then utilize the systems at night. Phreaks are skilled at arranging for a temporary, private bridge to be created via ATT's conference calling facilities. This provides a helpful information sharing technique among a self-selected group of phreak/hackers: Bridges can be extremely useful means of distributing information as long as the %phone% number is not known, and you don't have a - 126 - bunch of children online testing out their DTMF. The last great discussion I participated with over a bridge occurred about 2 months ago on an AT&T Quorum where all we did was engineer 3/way %calls% and restrict ourselves to purely technical information. We could have convinced the Quorum operators that we were AT&T technicians had the need occurred. Don't let the kids ruin all the fun and convenience of bridges. Lameness is one thing, practicality is an other (DC, message log, 1988). Phreaks recognize their precarious legal position, but see no other way to "play the game:" Phreaking involves having the dedication to commit yourself to learning as much about the phone system/ network as possible. Since most of this information is not made public, phreaks have to resort to legally questionable means to obtain the knowledge they want (TP2, message log, 1988). Little sympathy exists among experienced phreaks for "teleco ripoff." "Carding," or the use of fraudulent credit cards, is anathema to phreaks, and not only violates the phreaking ethic, but is simply not the goal of phreaking: Credit card fraud truly gives hacking a bad name. Snooping around a VAX is just electronic voyeurism. carding a new modem is just flat out blue-collar-crime. It's just as bad as breaking into a house or kicking a puppy! %This phreak% does everything he can (even up to turning off a number) to get credit information taken off a BBS. %This phreak% also tries to remove codes from BBSes. He doesn't see code abuse in the same light as credit card fraud, (although the law does), but posted codes are the quickest way to get your board busted, and your computer confiscated. People should just find a local outdial to wherever they want to call and use that. If you only make local calls from an outdial, it will never die, you will keep out of trouble, and everyone will be happy (PHRACK, 3(28): Phile 2). Experienced phreaks become easily angered at novices and "lamerz" who engage in fraud or are interested only in "leeching" (obtaining something for nothing): Sub ->Carding From ->JB (#208) To ->ALL Date ->02/10/xx 02:22:00 PM what do you people think about using a parents card number for carding? For instance, if I had a friend order and receive via next day air on my parents card, and receive it at my parents house while we were on vacation. Do you think that would work? Cuz then, all that we have to do is to leave the note, and have the bud pick up the packages, and when the bill came for over $1500, then we just say... 'Fuck you! We were on vacation! Look at our airline tickets!' I hope it does... Its such a great plan! Sub ->Reply to: Carding From -> (xxx) To -> X Date ->02/11xx 03: 16:00 AM - 127 - NO IT'S NOT A GREAT IDEA! WHERE'S YOUR SENSE OF RESPONSIBILITY TO YOUR FAMILY? ARE THEY ALL IN AGREEMENT WITH YOU? WOULD YOU WANT ANYONE TO USE YOUR PRIVATE STUFF IN ILLEGAL (AND IMMORAL) ACTIVITIES WITHOUT YOUR KNOWLEDGE? DIDJA EVER HEAR ABOUT TRUST BETWEEN FAMILY MEMBERS? IF YOU'RE GOING TO BE A THIEF (AND THAT'S NOT NEAT LIKE JAMES BOND IN THE MOVIES), TAKE THE RISKS ONLY UPON YOURSELF! Sub ->Carding From -> (#208) To -> (#47) Date ->02/12/xx 11: 18:00 AM Why not? We have a law that says that we have the right to refuse payment to credit cards if there are fraudulent charges. All we do and it is settled.... what is so bad about it? I'm going for it! Sub ->Reply to: Carding From -> (xxx) To ->J.B. Date ->02/13/xx 02:08:00 AM APPARENTLY YOU MISSED THE MAIN POINTS I TRIED TO MAKE TO YOU . . YOU'RE A THIEF AND A LIAR, AND ARE BETRAYING THE TRUST OF YOUR FAMILY AS WELL AS INVOLVING THEM IN YOUR RISK WITHOUT THEIR KNOWLEDGE. THAT MEANS YOU ARE A FAIRLY SCUMMY INDIVIDUAL IF YOU GO THROUGH WITH IT! NOW AS TO YOUR "DEFENCE" ABOUT $50 MAXIMUMS AND ERRONEOUS BILLINGS.. LAW MAKES A CLEAR DISTINCTION ABOUT THEFT BY FRAUD (OF WHICH YOU WOULD BE GUILTY). AND IN A LARGER SENSE, YOUR THEFT JUST MAKES IT MORE COSTLY FOR YOU YOU AND EVERYBODY ELSE TO GET CREDIT, AND DO BUSINESS WITH CREDIT CARDS. YOU'RE GOING TO DO WHATEVER YOU DO ANYWAY.....DON'T LOOK FOR ANY APPROVAL IN THIS DIRECTION. Ironically, experienced phreaks are not only offended by such disregard of law, but also feel that "rip-off artists" have no information to share and only increase the risk for the "tech-no-junkies." Message boards reflect hostility toward apprehended "lamerz" with such comments as "I hope they burn him," or "the lamer probably narked %turned informant% to the pheds %law enforcement agents%." Experienced phreaks also post continual reminders that some actions, because of their illegality, are simply unacceptable: It should be pointed out however, that should any of you crack any WATS EXTENDER access codes and attempt to use them, you are guilty of Theft of communications services from the company who owns it, and Bell is very willing and able to help nail you! WATS EXTENDERS can get you in every bit as much trouble as a Blue Box should you be caught. Ex-phreaks, especially those who are no longer defined by law as juveniles, often attempt to caution younger phreaks from pursuing phreaking: ZA1: One thing to consider, also, is that the phone co. knows where the junction box is for all of the lines that you are messing with - 128 - and if they get enough complaints about the bills, they may start to check things out (I hope your work is neat). I would guess that the odds are probably against this from happening though, because when each of the people call to complain, they'll probably get a different person from the others. This means that someone at Ma Bell has to notice that all of the complaints are coming from the same area...I don't think anybody there really cares that much about their job to really start noticing things like that. anyway, enjoy!!! My guess is that you're under-age. Anyway, so if they catch you, they won't do anything to you anyway. ZB1: Yeah I am a minor (17 years old) I just hope that they don't cause I would like to not have a criminal or juvenile record when I apply to college. Also if they do come as I said in the other message if there are no wires they can't prove shit. Also as I said I only hook up after 6 p.m. The phone company doesn't service people after 6 p.m. Just recently (today) I hooked up to an empty line. No wires were leading from the two plugs to somebody house but I got a dial tone. How great. Don't have to worry about billing somebody else. But I still have to disconnect cause the phone bills should be coming to the other people pretty soon. HEHEHEHE ZX1: Be cool on that, especially if you're calling other boards. Easiest way for telecom security to catch you is match the number called to the time called, call the board, look at users log or messages for hints of identity, then work from there. If you do it too much to a pirate board, they can (and have successfully) pressured the sysop to reveal the identity under threat of prosecution. They may or may not be able to always trace it back, but remember: Yesterday's phreaks are today's telecom security folk. AND: IT'S NOT COOL TO PHREAK TO A PIRATE BOARD...draws attention to that board and screws it up for everybody. So, be cool phreaking....there's safer ways. ZC2: Be cool, Wormburger. They can use all sorts of stuff for evidence. Here's what they'd do in Ill. If they suspected you, they'd flag the phone lines, send somebody out during the time you're on (or they suspect you're on) and nail you. Don't want to squelch a budding phreak, but you're really taking an unnecessary chance. Most of us have been doing stuff for some time, and just don't want to see you get nailed for something. There's some good boards with tips on how to phreak, and if you want the numbers, let me know. We've survived to warn you because we know the dangers. If you don't know what ESS is, best do some quick research (P/h message log, 1988). In sum, the attraction of phreaking and its attendant life-style appear to center on three fundamental characteristics: The quest for knowledge, the belief in a higher ideological purpose of opposition to potentially dangerous technological control, and the enjoyment of risk-taking. In a sense, CU participants consciously create dissonance as a means of creating social meaning in what is perceived as an increasingly meaningless world (Milo-vanovic and Thomas, 1989). Together, phreaks and hackers have created an - 129 - overlapping culture that, whatever the legality, is seen by participants as a legitimate enterprise in the new "tech-no-society." Conclusion: The transition to an information-oriented society dependent on computer technology brings with it new symbolic metaphors and behaviors. Baudrillard (1987: 15) observed that our private sphere now ceases to be the stage where the drama of subjects at odds with their objects and with their image is played out, and we no longer exist as playwrites or actors, but as terminals of multiple networks. The public space of the social arena is reduced to the private space of the computer desk, which in turn creates a new semi-public, but restricted, public realm to which dissonance seekers retreat. To participate in the computer underground is to engage in what Baudrillard (1987: 15) describes as private telematics, in which individuals, to extend Baudrillard's fantasy metaphor, are transported from their mundane computer system to the controls of a hypothetical machine, isolated in a position of perfect sovereignty, at an infinite distance from the original universe. There, identity is created through symbolic strategies and collective beliefs (Bordieu, cited in Wacquant, 1989: 35). We have argued that the symbolic identity of the computer underground creates a rich and diverse culture comprised of justifications, highly specialized skills, information-sharing net-works, norms, status hierarchies, language, and unifying symbolic meanings. The stylistic elements of CU identity and activity serve what Denzin (1988: 471) sees as the primary characteristic of postmodern behavior, which is to make fun of the past while keeping it alive and the search for new ways to present the unpresentable in order to break down the barriers that keep theprofane out of the everyday. The risks entailed by acting on the fringes of legality and substituting definitions of acceptable behavior with their own, the playful parodying of mass culture, and the challenge to authority constitute an exploration of the limits of techno-culture hile resisting the legal meanings that would control such actions. The celebration of anti-heros, re-enacted through forays into the world of computer programs and software, reflects the stylistic promiscuity, eclecticism and code-mixing that typifies the postmodern experience (Featherstone, 1988: 202). Rather than attempt to fit within modern culture and adapt to values and definitions imposed on them, CU participants mediate it by mixing art, science, and resistance to create a culture with an alternative meaning both to the dominant one and to those that observers would impose on them and on their enterprise. Pfuhl (1987) cogently argued that criminalization of computer abuse tends to polarize definitions of behavior. As a conseuence, To view the CU as simply another form of deviance, or as little more than "high-tech street gangs" obscures the ironic, mythic, and subversive element, the Nieztschean "will to power," refleccted in - 130 - the attempt to master technology while challenging those forces that control it. The "new society" spawned by computer technology is in its infancy, and, as Sennet (1970: xvii) observed, the passage of societies through adolescence to maturity requires acceptance of disorder and painful dislocation. Instead of embracing the dominant culture, the CU has created an irreducible cultural alternative, one that cannot be understood without locating its place within the dialectic of social change. Especially in counter-cultures, as Hebdige (1983: 3) observes, "objects are made to mean and mean again," often ending: in the construction of a style, in a gesture of defiance or contempt, in a smile or a sneer. It signals a Refusal. I would like to think that this Reusal is worth making, that these gestures have a meaning, that the smiles and the sneers have some subversive value. . . (Hebdige, 1982: 3). Footnotes [1] Participants in the computer underground engage in considerable word play that includes juxtaposition of letters. For example, commonly used words beginning with "f" are customarily spelled with a "ph." The CU spelling conventions are retained throughout this paper. [2] Conly and McEwen (1990: 3) classify "software piracy" in the same category as theft of computers and trade secrets, and grossly confuse both the concept and definition of computer crime by conflating any illicit activity involving computers under a definition so broad that embezzlement and bulletin boards all fall within it. However, the label of "computer criminal" should be reserved for those who manipulate computerized records in order to defraud or damage, a point implied by Bequai (1978: 4) and Parker (1983: 106). [3] One author has been active in the computer underground since 1984 and participated in Summercon-88 in St. Louis, a national conference of elite hackers. The other began researching p/hackers and pirates in 1988. Both authors have had sysop experience with national CU boards. As do virtually all CU participants, we used pseudonyms but, as we became more fully immersed in the culture, our true identities were sometimes revealed. [4] Although we consider software pirates an integral part of the computer underground, we have excluded them from this analysis both for parsimony and because their actions are sufficiently different to warrant separate analysis (Thomas and Meyer, 1990). We also have excluded anarchist boards, which tend to be utilized by teenagers who use BBSs to exchange information relating to social disruption, such as making homemade explosives, sabotaging equipment, and other less dramatic pranks. - 131 - These boards are largely symbolic, and despite the name, are devoid of political intent. However, our data suggest that many hackers began their careers because of the anarchist influence. [5] In January, 1990, the co-editor of the magazine was indicted for allegedly "transporting" stolen property across state lines. According to the Secret Service agent in charge of the case in Atlanta (personal communication), theoffender was apprehended for receiving copies of E911 ("enhanced" 911 emergency system) documents by electronic mail, but added that there was no evidence that those involved were motivated by, or received, material gain. [6] "Loop lines" are telephone company test lines installed for two separate telephone numbers that connect only to each other. Each end has a separate phone number, and when each person calls one end, they are connected to each other automatically. A loop consists of "Dual Tone Multi-Frequency," which is the touch tone sounds used to dial phone numbers. These test lines are discovered by phreaks and hackers by programming their home computer to dial numbers at random and "listen" for the distinctive tone that an answering loop makes, by asking sympathetic telephone company employees, or through inormation contained on internal company computers. - 132 - Introduction to PBXs by < Grim Reaper > his file is a personal continuation of the PBX entry in the MCI telecommunications Glossary. A telephone exchange serving an individual organization and having connections to a public telephone exchange is called a Private Branch Exchange (PBX). The PBX performs a switching function by connecting any extension in the private organization to an outside line. A PBX is actually a private switch that connects a group of telephones within an individual organization. Calls placed outside this individual group are connected to a telephone company's central office switch through trunks. A PBX may be operated by an attendant from the private organization or the switching system may be done automatically. Other terms that are commonly used interchangeably with PBX are: Private Automatic Branch Exchange (PABX), Private Automatic Exchange (PAX), and Computerized Branch Exchange (CBX). Although these terms were originally used to identify specific switch structures, today they are often used as synonyms. PBXs can use any of three basic switching methods: step-by-step (SxS), Cross-bar (X-bar), and computer controlled, to perform the basic function of switching. However, in addition to detecting calls and establishing a transmission link between two telephones, PBXs can do much more. The common control, often called a central processing unit (CPU), controls the switching matrix that connects the stat ons and trunks. The switching matrix of a PBX performs the same job as does an operator at a manual switchboard or a common control central office switch. The CPU, however, gets its instructions from the "stored program", which contains directions for activities, such as detecting calls, sending them over the best available route, and recording billing information. These computerized electronic switches are used to perform routine, as well as unique, functions that simply weren't practical or even possible with electromechanical switches. Just as in the public switched network, PBX switches make connection between instruments, or "key telephone sets". We're all familiar with key telephone sets, whether we know them by name or not. They're the business telephones that have six push-button keys lined up below the dial--a red button marked "hold" and five buttons or lines with flashing lights. Systems with PBXs and key sets have a great deal of flexability in planning for their needs because they can set up their codes to accomplish the functions needed in their particular situations. In fact, the PBX can be programmed so that each individual extension within a system can take advantage of features applicable to its own business needs. - 133 - Some of the features that are availiable with PBXs and key systems are: call transfer, which allows internal or external calls to be transferred from one telephone to any other phone in the system; automatic push-button signaling, which indicates the status of all phones in the system with display lights and buttons; one-way voice paging, which can be answered by dialing the operator from the nearest telephone in the system; camp-on, in which a call made to a busy phone automatically waits until the line is idle; and internal and external conference capabilities, which enables outside callers to conference with several inside users. Some features automatically handle incoming telephone calls. Automatic call waiting not only holds calls made to a busy extension until the extension is free, but also signals the person being called that a call is waiting and informs the caller that he is on hold. Automatic call forwarding will send calls to employees who are temporarily in locations other than their offices, provided they "inform" the PBX where they can be found. Automatic call distribution automatically send an incoming call to the first extension that's not busy--a useful feature for situations in which any one of a group of persons in the organization can adequately respond to incoming calls. Another example is automatic call back, which allows a caller who reaches a busy line to ask the PBX to return his or her call when the line is free. Still other features provide services such as night telelphone answering, telephone traffic monitoring, and network or hot-line connection. These examples are but a sample from the features possible with computerized PBXs. This is a very brief description of how to use and what to expect on a PBX. Basically, you call the PBX and you will have to enter a code that can be anywhere from 4 to 6 digits (Note: some PBXs do not require codes). Then you will hear a dial tone. From here you would under normal circumstances dial: 9 + 1 (or 0) + NPA-PRE-SUFF, for long distance dialing or dial 8 for local dialing. The most common use of the PBX is to call Alliance Teleconferencing, a teleconference service offered by AT&T. To do this dial: 0700-456-1000,1002,1003,2000,2001,2002. Note: PBX codes are usually very simple and usually 4 digits. EX: 0000, 1111, 1234, etc - 134 - Introduction To Phreaking by Cat-Trax [ Definitions ] Phreak ["free"k] Verb-1. The act of "Phreaking" 2. The act of making telephone calls without paying money [Slang] Phreaker ["free"-k-er] Noun-1. One who engages in the act of "Phreaking" 2. One who makes telephone calls without paying money [Slang] -------------------------------------------------------------- [ Introduction ] Phreaking is a method used by most intelligent people {most often those who use a computer and a Modulator-Demodulator (MoDem)}. If you happen to resemble the major mass of people who do not have the income to afford large phone bills then phreaking is for you. If you live in an area with an Electronic Switching System [ESS] then phreaking is something which should be done in moderate amounts. ----------------------------------------------------------------- [Switching Systems ] Three types of switching systems are present in the United States today: [1] Step by Step [2] Crossbar [3] ESS {Electronic Switching System} <] Step by Step [> First switching system used in America, adopted in 1918 and until 1978 Bell had over 53% of all exchanges using Step by Step [SxS]. A long, and confusing train of switches is used for SxS switching. [> Disadvantages <] [A] The switch train may become jammed : Blocking call. [B] No DTMF [Dual-Tone Multi-Frequency]["Touch-tone"]. [C] Much maintanance and much electricity. [D] Everything is hardwired +> Identification <+ [A] No pulsing digits ater dialing or DTMF. [B] Phone Company sounds like many typewriters. [C] No: Speed calling, Call forwarding, and other services. [D] Pay-phone wants money first before dial-tone. - 135 - <] Crossbar [> Crossbar has been Bell's primary switcher after 1960. Three types of Crossbar switching exist: Number 1 Crossbar [1XB], Number 4 Crossbar [4XB], and Number 5 Crossbar [5XB]. A switching matrix is used for all the phones in an area. When someone calls, the route is determined and is met up with the othr phone. The matrix is set-up in horizontal and vertical paths. There are no definite distinguishing features of Crossbar switching. <] ESS [> You probably were hoping I wouldn't talk about this nightmare, if you did you will know why everyone doesn't want to be reminded about Bell's holocaust on America. With ESS Bell knows: every digwho make excessive calls to WATS numbers [Wide Area Telephone Service][1-800 numbers] or directory assistance. This deadly trap is called "800 Exceptional Calling Report." ESS can be programmed to print logs of who called certain numbers. Electronic Switching System makes the job of the FBI, Bell Security {The Gestapo in phreakin' tongue}, NSA, and other organizations which like to invade our privacy, extremely easy! Tracing is done in microseconds, and the results are printed out on the monitor of a Gestapo officer. ESS can also pick up foreign tones on the line, like 2600 Hz. {used in blue boxes, discussed later}. Bell claims that the entire country will be plagued by ESS by the 1990's! +> Identification <+ [A] Dialing 911 for emergencies. [B] Dial-tone first for pay-phones. [C] Calling services, like: Call forwarding, Speed dialing, Call waiting. [D] ANI [Automatic Number Identification] for long-distance calls. [[[Note]]] Of the above identifications of the three switching systems, do not solely rely on these descriptions, the best way to find out is to [no!] call your local telephone company. ----------------------------------------------------------------- [Long-Distance Services ] To attempt to help the community {and for private business} companies developed ways to lessen the costs of long-distance calling charges. The companies own their own switching systems and use extenders for callers to call. The way extenders operate: - 136 - 1] Customer calls service 2] He/she hears a low tone which sounds like a dial-tone 3] She/He either dials the access code then the phone number, or dials the phone number then the access code 4] Is connected to whatever he/she calls. Aside from Ma Bells collection, the customer recieves a bill for calls made with his/her long-distance company {a supposedly cheaper bill than Ma Bell's}. Thought: Hey, I could randomly pick access codes and use them to call whatever area the company services! Righto, that's what basic phreaking is! A wise idea, though, is to have many access codes and many service numbers to rotate throughout your average life as a phreaker. To aid in your quest to beat the system I have provided many 1-800 numbers which anyone can call, aside from local numbers, such as Sprint, or MCI. The reason for providing you with WATS numbers is because all of us aren't in a big city where Sprint or MCI even exist, this way everyone can pheak! A way to find more access codes is by using your old modem. Yes, your modem can imitate DTMF tones! {>Procedure: 1) dial 1-800 + service number 2) dial access code->area code->phone number, or 3) dial area code->phone number->access code :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::\/ -=+>Cat-Trax' list of WATS [1-800] numbers:<+=- ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Number---Code Length : Number---Code Length : Number---Code =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 127-6754 6 245-4890 4 327-6713 4 243-7650 6 328-7112 4 654-8494 6 327-9895 7 327-9136 4 227-3414 4 682-4000 6 343-1844 4 858-9000 3 462-6471 5 322-1415 6 521-1674 4 527-3511 8 321-0327 4 321-0845 6 843-0698 9 221-8190 4 543-7168 8 521-8400 8 327-2731 6 252-5879 8 345-0008 7 245-7508 5 526-5305 8 323-3027 6 242-1122 ? 621-1506 ? 621-4611 ? 325-3075 ? 336-6000 ? 221-1950 ? 323-8126 ? 325-7222 6 [[[Note]]] remember to dial 1-800-above number, also remember to rotate numbers and access codes. ----------------------------------------------------------------- - 137 - [ Colored Boxes ] A more shrewd, technological, safer {without ESS} way to phreak is with a piece of hardware known as a ________ Box. Boxes are many different colors {I don't know ALL the colors because it seems like every time I turn around there's some new color out!}. Colors I have heard of: Blue, Black, Red, White, Silver, Clear, and MANY, MANY more... Plans for making these boxes can be obtained by calling different boards [BBS's], AE lines, or whatever. But!, if you have an Apple Cat modem then do I have good news for ->you<-!! The Apple Cat modem can emulate the frequencies {usually 2600 Hz.} made by ________ Boxes with the help of a handy little program called "Cat's Meow!" ----------------------------------------------------------------- ::Warning!:: Phreak at your own risk! Stiff laws are starting to pop-up now days. But, if you're careful then don't worry! I haven't been busted yet! Heck [Hack!], what would life be without risks? ----------------------------------------------------------------- - 138 - SOME NOTES ON LINE NOISE by Captain KIdd ================================================================= Well since that's my field let me elucidate abit.... Most of what you refer to as line noise isn't really noise per-se on the line, but uneven response to tones (and that's what we use in our modems). This can be caused by any number of factors. If you call up good old NONEX and tell them that you have "line noise" your asking for a service bill and no remedy. You will find that the average lineman they send out, has the IQ of his shoe size. Case in point-the old number I used to run my bbs at. I had phantom rings on the line, so did my neighbor across the street. When it was very damp or had rained for a while (several days) the "line noise" would appear, and cause me grief. Well,with the similar problem and a moisture related one at that across the street, it seems like the problem is out around the pole in front of my place. Well,after three visits, and three phantom excuses for repairing it needless to say I was pissed.(The CO will often blast the phone line with what it calls cable test voltage. Its around 600 volts and will vaporize the MOV surge protector in your modem or answering machine) MOV= Metal Oxide Varistor for you non-techies. But it will clear many of their "bad lines". Now one fine day, they finally send out a guy from the "Cable department" and I talk to him, I explain the past problems and suggest he check past my place and for some reason during wet times, we have inter-cable leakage. He found a spot down the street that had been zapped by lightning some time before, and all the wire ends were charred and black. He showed me a ball of burnt wire that could very well been the cause. Well it was, as the problem is lessened about 95%. I say 95% because I still have a bit of the same problem, possibly due to another charred spot or a more recent lightning strike. But this problem seems to respond to my calling my number and letting it ring for say a half hour, this drys out the line enough that it stops acting screwy. Well on to the noises that can be heard over the line that really do have influence over transmission quality. The most prevalent is a crackling or a dial tone drawn intermittently. (Listen to the line with a hi-z butset) Ringing voltage is usually about 90 volts and20-30 hz, so there's usually no problem in ringing the phone, but when you pick up, the phone voltage drops to 30-50 volts and the smallest problem will surface. The phone company has this habit of checking the line to ground (it should never be connected in a regular home phone line) and they will clear off water, insects, and other crap with a 600 volt blast as mentioned earlier. This applied across the line to ground sure does away with the water, but in caes where spike protection or impulse protection from lightning is present, WATCH OUT! the MOV's are typically manufactured to short at around 130- 150 volts, and are connected to the third pin (Ground) of a three wire plug on your answering machine, your cordless phone, and some modems. The MOV will explode as it shorts itself to ground to do its job of surge protection, leaving a short on the line which is readily detectable by the CO. IF THIS HAPPENS, inform - 139 - them immediately that you have a problem, and they will make restitution for repairs in CASH! I got $75 for repairing a $1.98 MOV (available at Radio Slack) Now more on the noises.... ========================== After the infamous popping, the next most bothersome to the modemer is a low level whine, muchlike some of the shitty MCI ports,sounding like a jet engine varying in rpm, it is particularly evident behind dialtone, and if you drop the dialtone, its still evident. This is digital whine caused by some circuit in the path not exactly in phase. This is particularly annoying because the digital equipment tries to compensate by stuffing or removing bits from the digital path to attempt phase lock, and thus, data is occasionally lost or garbled. I have two lines at home that are heavily used and have this problem, its not apparent to modem traffic until you hit 2400 baud, then the time frame of the modem kinda gets jitters from the digital whine. Lastly, of importance, is signal level. In analog, as the signal goes down, the signal tends to corrupt on the lowest levels while some will pass fine during peaks. If this is the problem, you see multiple errors on x-modem, then good blocks.. this problem can have numerous causes, fading of a microwave path, followed by a switching of diversity receivers, bringing the signal backup to par temporarily. Also in this category are bad amps at either the CO or in your own equipment, that won't limit gain till noise actually takes the place of the signal, This is a "slow attack" increase of noise followed by a quick quieting as the redundant amp takes over (In your CO). Crosstalk: ---------- If you have ever picked up the phone and swore you could hear someone else talking or in some cases, actually been able to talk to the other party, you have been exposed to crosstalk. This obviously will knock the shit outa a modem conversation due to the fact the voice is mixing non-linearly with the data or in some cases, overpowering the data signal itself. This is a fairly common problem, common to analog FDM multiplex equipment. This equipment tries to keep the conversations apart using SSB channels arranged throughout a radio's baseband (IF) frequency. Because the channels are without carrier which would enable the equipment to check signal level, frequencies called "pilots" are inserted into the clusters of channels allowing their levels to be monitored and controlled.If there is a "Hot" pilot or a "Hot" channel in the group, it will bleed over into the other channel's passband and crosstalk will be heard. In the cases of two-way communications via crosstalk, the group pilot is usually so hot, everybody in both directions is splashing over and both directions are being heard. Basically the solution to line noise problems is to know about them, and being able to pinpoint the exact type of problem will make it easier for the Telco to service it quickly.

---

E-Mail Fredric L. Rice / The Skeptic Tank