==Phrack Magazine== Volume Four, Issue Forty-Four, File 4 of 27 // // /\ // ==== // // //\\ // ==== ==== // // \\/ ==== /\ // // \\ // /=== ==== //\\ // // // // \=\ ==== // \\/ \\ // // ===/ ==== PART II ****************************************************************************** SOUTHWESTERN BELL TELEPHONE Computer Security Guidelines Computer Security is YOUR Responsibility. These guidelines are designed to help you know and meet your corporate obligation. Prepared by: Information Systems Computer Security Administration One Bell Center 22-H-8 St. Louis, MO 63101 For Users --------- Keep your logon and password information private. Do not write down passwords, but if you must, keep them in a locked place. Do not store your password in the computer. Make sure no on sees you enter your passwords. Pick non-obvious, non-guessable passwords. Do not share your logons or passwords. Change passwords periodically, at least every thirty days. Open new computer logons for computer resources only when you have a real need. Close computer logons you no longer need. Make sure you have proper protection settings on sensitive computer files. Do not send confidential information through electronic mail or computer news systems. If you suspect security violations, tell management immediately. Be sure that use of computing resources is for company approved purposes only. Do not access any information that your management has not authorized you to have. When in doubt, ask! Logoff when you leave your terminal. If you dialed in, disconnect when you are finished working. For Managers of Computing Facilities ------------------------------------ Provide procedures to control access to computing resources. Provide facilities to let users protect proprietary information from disclosure to unauthorized persons. Be sure that connection of a computer to any network does not diminish the control a user has over programs and data. Provide appropriate security facilities and procedures to protect computing hardware against damage. Provide facilities to protect user's data and programs from undesired changes or destruction. Ensure that computing resource use has been authorized by a member of supervision. Make sure that computing resource use can be tracked to individuals. Report to managers regularly on the extent of computing resource use. Provide appropriate backup facilities for data and programs. Provide audit trails which identify violations and security breaches and examine them regularly. For assistance in coordinating computer security activities, contact the Computer Security Administrator. For Managers ------------ Make sure you authorize all use of computing resources and that you require separate logons for each individual. Make sure that the user of computer resources understands responsibilities with respect to proper use and security consciousness. Review computing resource usage reports and the security practices of the users for which you are responsible. When a user's employment or need for access ends or changes, make sure access to computer resources is promptly changed by notifying your System Administrator. Report security violations to the General Security Manager and to the Computer Security Administration Group. For Information --------------- The Information Systems Organization provides security and disaster recovery services to establish, monitor, and audit computer security standards. If you have any comments or questions regarding computer security, please contact the Computer Security Administration. ******************************************************************************* RBOC ORGANIZATIONAL ARCHITECTURE Compiled By Phrack Magazine In an effort to assist the hacking world in their understanding of the organizational mess created by our fabulous friends at the RBOCs, we have compiled a list of the various organizations, what their functions are, which centers they are made up of, and which computer systems they use. ----------------------------------------------------------------------------- Planning and Engineering Defines network resources available for assignment Functions: Long range and current planning for outside plant, wire centers, interoffice network, special services, interexchange access services, and message trunks Exchange network design Coordination of activities connected with installation and/or modification of exchange network components Centers: DSPC SCPC WCFPC CAC IFFPC IFCPC TEC MEC DSDC EEC CSEC Systems: LEIS NPS FEPS LSRP INPLANS INFORMS DFDS SSFS PICS LATIS CAMIS CUCRIT ----------------------------------------------------------------------------- Service Provisioning Allocates assignable existing network resources Functions: Circuit design and routing Verification and assignment of network elements Controlling and tracking orders during assignment process Centers: CPC - Circuit Provisioning Center LAC - Loop Assignment Center Systems: TIRKS SOAC SWITCH COSMOS WM LFACS LOMS ----------------------------------------------------------------------------- Network Operations Controls installation, maintenance and testing of circuits Functions: Coordination and performance of the activities required to provide service Surveillance and control of network equipment and facilities Analysis, sectionalization, and repair of switching and transmission facilities Status reporting on service order and/or service restoration activities Centers: CRSAB ICC MC NAC RCMAC SEAC SSC FMAC STC DNCC FCC SCC Systems: McTE GDS LMOS EADAS TAN RSA CRAS CIMAP NDS SEAS MAS MIZAR SARTS TCAS CAROT NMA NMPS SCCS ----------------------------------------------------------------------------- Customer Services Direct company contact with customers Functions: Service negotiation with customers Creating and routing associated service orders Creating and maintaining customer records Reporting the provisioning status to customers Initiating billing and collection processes Handling billing and general service inquiries Centers: RSC - Residence Service Center BSC - Business Service Center ICSC - Interexchange Carrier Service Center Systems: BOFADS - Business Office Force Administration Data System PREMIS - Premises Information System SOP - Service Order Processor CABS - Carrier Access Billing System BOSS - Billing and Order Support System CRIS - Customer Records Information System BRIS - Business Revenue Information System CLAIMS ----------------------------------------------------------------------------- Quick Breakdown Process Center System ----------------------------------------------------------------------------- Planning & Engineering IOF IFCPC IFFPC IOF/EDC FEPS NPS-F Switch SCPC WCPC EEC LSD&F LSRP NDS TNDS/EQ NPS-W Distribution DSPC DSDC LATIS LEIS NPS-D Service Provisioning IOF CAC TIRKS Switch LAC COSMOS Distribution LAC LFACS Network Operations IOF FMAC CAROT CIMAP TCAS TNDS/TK Switch NAC RCMAC SCC EADAS NDS MAS MIZAR TASC CIMAP NMA NMPS SCCS Distribution ICC MC GDS CRAS LMOS/MLT PREDICTOR TAN ******************************************************************************* -IS- Blue Boxing Dead? Australia Direct 800-682-2878 Austria Direct 800-624-0043 Belgium Direct 800-472-0032 Belize Direct 800-235-1154 Bermuda Direct 800-232-2067 Brazil Direct 800-344-1055 British VI Direct 800-248-6585 Cayman Direct 800-852-3653 Chile Direct 800-552-0056 China Direct 800-532-4462 Costa Rica Direct 800-252-5114 Denmark Direct 800-762-0045 El Salvador Direct 800-422-2425 Finland Direct 800-232-0358 France Direct 800-537-2623 Germany Direct 800-292-0049 Greece Direct 800-443-5527 Guam Direct 800-367-4826 HK Direct 800-992-2323 Hungary Direct 800-352-9469 Indonesia Direct 800-242-4757 Ireland Direct 800-562-6262 Italy Direct 800-543-7662 Japan Direct 800-543-0051 Korea Direct 800-822-8256 Macau Direct 800-622-2821 Malasia Direct 800-772-7369 Netherlands Direct 800-432-0031 Norway Direct 800-292-0047 New Zealand Direct 800-248-0064 Portugal Direct 800-822-2776 Panama Direct 800-872-6106 Philippines Direct 800-336-7445 Singapore Direct 800-822-6588 Spain Direct 800-247-7246 Sweden Direct 800-345-0046 Taiwan Direct 800-626-0979 Thailand Direct 800-342-0066 Turkey Direct 800-828-2646 UK Direct 800-445-5667 Uruguay Direct 800-245-8411 Yugoslavia Direct 800-367-9841 / 9842 This file brought to you by The Phone Company ******************************************************************************* ***************************************** * Step-by-step Programming Instructions * * For the EO Cellular Module * ***************************************** 1. Unbox and attach the EO Cellular Module to the EO Personal Communicator 440/880. 2. Once the EO Cellular Module is attached turn on the EO Personal Communicator 440/880. 3. Open EO Phone. 4. Tap "Options." 5. Tap "Authorized Dealer." 6. Write Dealer Code in space provided. Dealer code is *12345678#. To edit mistakes, draw a small circle around 2 or 3 of the numbers entered. This will bring up an edit box and allow easier entry of the number. Once you have made your corrections, tap "OK." 7. Tap "OK" on the "Authorized Dealer Code" pop-up. 8. Wait approx. 30 seconds and programming screen will appear (The "busy clock" will appear on screen). 9. If invalid code entry screen appears, the programming screen will be blank and the "Apply" and "Apply and Close" buttons at the bottom will be greyed out. Close the programming screen by tapping on the upper left blacked out corner of the screen. Re-do steps 4 through 7 (refer to the TIP below for a guaranteed method of accurate entry). A common problem is to enter an "l" instead of a "1" because they appear to be very similar. To make sure that you have entered a one, check to see that the character is the same height as the other numbers. The letter "l" will be slightly taller. TIP: To insure that you have entered the correct digits (one versus letter "l" problem above) you can use the accessories keyboard. To use the keyboard for the Dealer Code entry do the following (replaces steps 4, 5, and 6 above): a. Tap Accessories in the lower bookshelf. b. Tap Keyboard. This will bring up the pop-up keyboard. c. Tap Options at the top of the EO Phone window. d. Tap Authorized Dealer. This will bring up the Dealer Code pop-up. e. Tap on the line in the Dealer Code box. A dot (or character) will appear and now entry from the keyboard will appear in the Dealer Code box. f. Now use the keyboard to delete the dot (or character). The Delete key is the upper right most key on the keyboard. g. Now use the keyboard to enter the dealer code - *12345678# (the * and the # keys can be found by tapping the shift (up arrow) keys.) h. GO TO STEP 7 and continue. NOTE: When programming the following entries always use the circle gesture to change the entry. In other words, circle the existing entry to bring up the edit combs. Then correct each digit by writing over the existing digit. This will insure that the number of digits for each entry is correct. If an entry has an incorrect length then none of the programed entries will be accepted. 10. Enter the assigned telephone number in the first field. Use the circle gesture to bring up the edit combs to edit the existing telephone number. Change each digit by writing over it in the edit combs. When complete tap "OK." 11. Use the same procedure in step 10 to enter the appropriate SID in the second field. 12. Use the same procedure in step 10 to enter the corresponding IPCH (0333 for the non-Wireline or A side provider; 0334 for the Wireline or B side provider) in the third field. 13. Leave the remaining fields intact as already programed from the factory unless instructed to change them by the cellular service provider. Use the circle/edit method to change any necessary entries. The factory defaults are: Field Title Default Value ----------- ------------- ACCOLC 00 Group ID 15 Lock Code 1234 SCM 1010 Security Code 123456 Emergency Code 911 14. Tap the "Apply" button on the bottom of the screen. The programming information you have entered is now being saved in the EO Cellular Module. This will take approximately 20 seconds. 15. Close the programming screen by tapping the blackened area in the upper left hand corner of the programming screen. 16. Now set the approximate Roaming Option. 17. Tap Options. 18. Tap Roaming. 19. Enter Security Code. Default is 123456. 20. Tap "OK." 21. Tap next to appropriate roaming option. A check mark will appear. 22. Tap "Apply" button. 23. Close window. 24. Check status line in EO Phone for appropriate indications. 25. Tap "Keypad" tab on right side of EO Phone window. This will bring up a keypad display which can be used to place a voice call. 26. Make sure that the Cellular Icon is boxed (as opposed to the Phone Icon in the lower left hand of EO Phone.) 27. Tap the keypad buttons to enter the number to be dialed. The digits will appear in the dial box at the middle bottom of the EO Phone window. 28. Pick up the handset and tap "DIAL" button in the lower right hand corner of the screen. This button is just like hitting SEND button on a cellular phone. This will place a voice call using the number in the dial box. 29. When call is complete tap "Hang-up" (the DIAL button to "Hang-up" after the call is connected to the network.) This is just like pressing END on a cellular phone. 30. Close EO Phone. 31. Programming and testing is now complete. Helpful Information The EO Cellular Module contains an OKI 910 cellular phone housed in specially designed, plated plastics with custom connections into the proprietary port on the phone. All programming of this module is done via the EO Personal Communicator 440 or 880. All programming/configuration information for the phone is stored in the EO Cellular Module and not in the Personal Communicator. This means that once the EO Cellular Module is programed it can be removed from the EO Personal Communicator and reattached to any other EO Personal Communicator without re-programming. The ESN for the EO Cellular Module can be derived from the Serial number in the window on the bottom of the module. The cellular module ESN is 129 followed by the last eight digits of the serial number in the window. These eight digits will usually begin with 013. This eleven digit number should be provided to the people that will actually assign the telephone number and activate the EO Cellular Module on the cellular network. ******************************************************************************* THE HACKER CHRONICLES CD-ROM Well, he said he was going to do it, and he did. Scan Man put out a CD-ROM of info collected from the underground. I had kind of forgotten he was going to do it, but once I heard rumors of such a thing, I knew he had. At HoHo Con last year, Bootleg was very excited about compiling data from the community for the project he and Scan Man were working on. As things progressed however, Bootleg would soon find out that Scan Man had no intention of working with him, and cut him out of the project. This is how it was explained to me. I hope that it is not true, since Bootleg is back in jail and wouldn't have the ability to fly out to West Virginia and throttle Scan Man about the head and neck. [Description from the Jewel Box] WARNING! This material is controversial in nature and may be offensive to some viewers. Not that the information in and of itself is not illegal. Quite often the usage of certain information is illegal. The Hacker Chronicles is for informative and educational purposes only. All documents and programs in this compilation were legally available to the public prior to his publication. None of these criminal acts described on this disc are in any way condoned or should be attempted. Over 12 YEARS in the making - this software package contains stories of how they did it, actual break-ins, arrests, and prosecutions. Most of the articles were written by the actual people who committed these acts. Access articles and software with an easy-to-use menu system. Areas of information include: PHONE PHREAKING (so called hobbyists who are into telephone technology of all types, well known for their ability to bypass telephone billing system), COMPUTER HACKERS (sometimes referred to as cyberpunks, interested in access to any on line computer system they can find), SATELLITE COMMUNICATIONS (hobbyists who sometimes employed test software designed for dealers to defeat scrambling systems), "UNDERGROUND" GENERAL INFORMATION (many subjects all very technical in nature and explained in detail, such as ATM's, credit cards, voice mail, hypnotism, bugging, skip tracing, phone taps, cellular phones, lock picking, social engineering, virus's, chemical substances, explosives, editorials, legal issues, alarm systems, spies, hardware, signal interception, private investigations, security, computer ethics, underground BBS's, TV cable piracy, boxing and much more! ----- Uh, that kinda says it all, don't it? CYBERPUNKS, VIRII, WAREZ & STUFF! Uh, yeah. Seriously, the disk itself has a shitload of files. This is rather cool, since now EVERY bbs in the world can put OVER 650 MEGS OF G-FILES! Heh. The file on the disc that struck me the most was the intro written by Scan Man. He went talked about a lot of things he's done in the past with the scene, telephone companies, etc. I know Scan Man from WAY back. Pirate-80 was one of the first real Hacker BBSes I was ever on. (Remember when it was only up certain hours of the day?) Reading that file was pretty informing for me. It also made me smile to see that he's still pissed off at Craig for tearing him apart in a Phrack some years ago. Remember, this is by no means a complete collection. Thankfully, the CD does not have any issues of Phrack magazine past issue 41 (or else, I would be enjoying a piece of the revenue :) ). It also, oddly enough, does not have any LOD-TJ other than 4. It DOES however have a large collection of CUD, NIA & CDC. Go figure. The files do represent a neat history of our community and for the curious neophyte, the nostalgic old-timer, or anyone with 39 bucks, it might be something worth picking up just to say you have it. I mean, you never know when you will need to find issue 12 of LOL, or plans for a urine box. It will save you the trouble of downloading. The Hacker Chronicles - A Tour of the Computer Underground should be available from any outlet that carries CD-ROMS. Or hell, call P-80. I'm sure Scan Man will sell you a copy: 304-744-7322. ******************************************************************************* Packet Switched Data Networks An Introduction and Overview By: Cosmos The abundance of networks both private and public has given the hacker an almost infinite playground. A popular type of network is the packet switched network like SprintNet (TELENET) that allows local users to access non-local machines. These WAN's usually serve as the backbone for many large corporations. Understanding the way in which they operate can aid many aspects of the hacker's knowledge. Packet switching is a data networking technology in which user data is segmented into small units (packets) and transmitted from the sending user to the receiving user over shared communications channels. Each individual packet also holds additional information that allows the network to correctly route the packet to the correct destination. The size of the packet is limited to a maximum number of characters set by the individual sender. Packets are measured in octets, which are 8-bit bytes. User data that exceeds this amount is divided into multiple packets. The difference between packet switching and circuit switching (regular telephone lines) lies in the use of virtual circuits. These circuits are given the term "virtual" because: 1) they are made up of bandwidth allocated on demand from a pool of shared circuits 2) no direct physical connection is made on a packet network 3) the connection is a logical one Due to these facts, packet networks are commonly denoted as connectionless networks. There are three types of packet networks: public, private, and hybrid (a combo of the two previous ones). A packet switched data network (PSDN) has five major components: 1) local access components (LAC) 2) packet assemblers/disassemblers (PAD) 3) packet switching nodes (PN) 4) network links (NL) 5) a network managment system (NMS) LOCAL ACCESS COMPONENTS To transmit data through a PSDN, the data must first move from the end-user to a packet assembler/dissasembler (PAD) or to a packet switching node with a built-in PAD function. In order to achieve this, three local access components are required. First is the end-user data terminal, or more plainly, your computer. Secondly, an end-user transmission device such as a modem. Thirdly, a local access facility or physical line (Telephone Line). There are three types of physical lines: switched analog lines (dial up), leased analog channels (private lines), and leased digital channels (DDS circuits). PACKET ASSEMBLERS/DISASSEMBLERS All data travelling through the PSDN must be routed through a Packet Assembler/Disassembler (PAD). The PAD's primary function is to translate user data into network packet format and conversely to convert network packets into user data. Basically, a PAD serves as the network translator between the user and the PSDN. Other functions performed by the PAD include: physical line concentration, call setup and clearing functions, protocol conversion, code conversion, protocol emulation, local switching functions, and local call billing functions. PACKET SWITCHING NODES The primary component of a packet switching network is the packet switching node (PN). The packet switching node ensures that each packet is routed properly through the network. Commonly, PN configurations are installed in a redundant configuration. This provides for a convenient backup for network traffic. Other functions include: call billing, internal network diagnostics, support of direct host computer access., and inter-network gateway connections. NETWORK LINKS Network links are the physical components that connect packet switching nodes together. Several transmission technologies can be employed in network linking, including: analog circuits, digital circuits, microwave systems, and satellite systems. The most common network link technologies used are Digital Dataphone and other similar interexchange carrier services, and point to point analog private lines. Speeds on network links range from 9.6 Kbps to 56/64 Kbps. Network links are commonly denoted as the "backbone layer" or the backbone packet network. The local PAD's are termed the "access layer" or access network. NETWORK MANAGEMENT SYSTEM Basically, the network management system (NMS) controls and monitors the PSDN. It primarily stores and performs maintenance on the network database. This database is the master copy of all the software and configurations in each network node. If a node fails or is not functioning properly, the NMS can download backup information through the various network links to solve the problem. Thus, a unattended network is formed. This is all one needs to understand for a general knowledge of a packet switched data network. Additional topics can be pursued further for increased knowledge but are not essential. You might want to research some info on the standard X.25 protocol, and other OSI stuff. Anyways, I hope this brief intro article can be of use in the general knowledge of computer networking. Cosmos ******************************************************************************* Stacker Security. How to Hack a Stacker disk that is password protected! The 'Stacker' Software increases the space on your hard disk by using on the fly compression on the data on the disk. It does this by creating a file called Stacvol.dsk on the hard drive. All of the information that is put on the disk is compressed and stored in the stacvol.dsk file. When Stacker is installed on a hard drive, say C: all of the data on the disk is compressed and stored in the stacvol.dsk file, which is assigned as a virtual disk C:, the 'real' drive is then assigned D:. The swapping taking place a boot time. The Stacvol.dsk file is therefore stored on the D: drive and usually takes up most of the drive. (ie: a 40M C: drive contains the stacvol.dsk file of size around 5-39M the disks are swapped at boot time and the C: drive that the user 'sees' is really the contents of the stacvol.dsk file on the D drive assigned to C:, everything on the C drive (stacvol.dsk) is compressed, thus obtaining an increased disk space.) The point is this, at boot time the owner of the machine can set passwords to allow the user to have no access, read/write or read-only access to the C drive/stacvol.dsk file, if a wrong password is entered the stacvol file is not mounted as the C drive and all a DIR will get you is a directory of C:\ which will have a few files such as command.com etc, nothing of any real interest. So now for the interesting bit, how to get in without a password, or getting read/write privs when you've only got read-only. First, boot the computer and go through the password routine. Get it wrong (you may as well try something like password though just in case.) The Stacvol.dsk file is hidden so change its file attributes so you can edit it. (You'll need a floppy now with a utility such as Norton diskedit on it) Load in the diskeditor and get it so that you are editing the stackvol file in a HEX mode. The first bit of Hex just contains the usual sort of boot record type rubbish, not too interesting. The interesting bit is the bit which starts at offset 74 Now the information starting at 00040 is the interesting bit, on a disk with a password set it will look like this.... 00040 20 20 20 20 20 20 20 20 | 20 20 2D 2A 2D 0A 0A 1A 00050 72 AA 91 9C 0F 66 9A ED | AB 18 6E 6D E2 C3 2B 8B 00060 5E CD EF A9 37 1B 53 E2 | C6 F0 E8 9C A4 49 F6 9D 00070 4C F0 AB 32 21 47 FC 91 | 7E 8C 58 D8 D9 D7 DB D3 (All figures obviously in hex.) The data from 0004B to 0004E is a flag to the device driver to tell it that a password is required. From 0004f to 0005F are the encrypted passwords. (the rest just being data) NOW, for an unpassworded file this looks like 00040 20 20 20 20 20 20 20 20 | 20 20 20 20 20 0D 0A 1A 00050 49 F6 9D 4E EC B1 26 3D | 0F 6B B2 24 41 07 7B 92 00060 XX XX XX XX XX XX XX XX | XX XX XX XX XX XX XX XX 00070 XX XX XX XX XX XX XX XX | XX XX XX XX XX XX XX XX Now all you have to do is take a copy of the data in this section on the stacvol.dsk file you are hacking so that you can return it back to its original state! Patch the code above into the corresponding positions into the file you are hacking, leaving the code denoted by XX alone, this is version code and depends on the machine so leave it alone! Save the changes and reboot the machine, it will no longer ask for a password and you now have full access. Afterwards re-patch the original code that you noted and if you've used your common sense then the owner will never know you were there. (By common sense I mean don't forget to restore time/date stamps etc.) D2A [D ******************************************************************************* UNAUTHORIZED ACCESS ONLY Computers are becoming an integral part of our everyday existence. They are used to store a multitude of information, from credit reports and bank withdrawals to personal letters and highly sensitive military documents. So how secure are our computer systems? The computer hacker is an expert at infiltrating secured systems, such as those at AT&T, TRW, NASA and the DMV. Most computer systems that have a telephone connection have been under seige at one time or another, many without their owner's knowledge. The really good hackers can re-route the telephone system, obtain highly sensitive coporate and government documents, download individuals credit reports, make free phone calls globally, read private electronic mail and corporate bulletins and get away without ever leaving a trace. So who are these hackers? Just exactly WHAT do they DO, and WHY do they do it? Are they really a threat? What do they do with the information they obtain? Are hackers simply playing an intellectual game of chess or are hackers using technology to effectively take control of corporate and government systems that have previously appeared omnipotent? Our group is in the course of filming "Unauthorized Access", a documentary that will demistify the hype and propoganda surrounding the computer hacker. We will expose the truths of this sub-culture focusing on the hackers themselves. This will be a view from inside the global underground. We intend to shoot in the United States, Holland and Germany. This documentary will be of the highest broadcast quality and is intended for international television, festival and theatrical distribution. We are currently looking for additional financial backers interested in this project. For more information about "Unauthorized Access" or if you are intrested in providing any information or support, please contact annaliza@netcom.com. ******************************************************************************* Mitnick's Soliloquy Intruder, or not Intruder: that is the question: Whether 'tis more likely the system suffers The misuses and malfeasances of outrageous crackers Or that some user behaves anomalously And, by so doing, causes false alarms. To alert, to audit; No more; and by an audit to say we find the attack, And the thousand failed login attempts That are seen on the network, 'tis a consummation Devoutly to be decrypted. To alert, to audit. To audit, perchance to detect, ay, there's the rub. For in that detection of attack what false alarms may come; When we have dumped a million packets Must give us pause, the analysis That makes use of long CPU hours and many gigabytes For who would bear the whips and scorns of time The analysis by hand, the tired SSOs eyes sore, The pangs of innocent users, the law's delay, The insolence of phreaks, and the spurns That patient merit of unworthy takes When he himself might his quietus make By a disconnected ethernet? who would fardles bear To grunt and sweat under C2 standards But that the dread of worm after worm The undiscovered bug from whose bourn No Vandal turns, puzzles the testers, And makes us rather ebar those ills we have That crash the system and erase the hard drive? Thus intrusion detection makes abusers of us all, And thus the native hue of normal use Is sicklied over with the red light of intruder, and jobs of great size and duration With this regard their patterns out of normal parameters, and lose the name of legal system policy. After Hamlet's Soliloquy, By JJ *******************************************************************************