[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]

..[ Phrack Magazine ]..
.:: Phrack Loopback ::.

Issues: [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ] [ 16 ] [ 17 ] [ 18 ] [ 19 ] [ 20 ] [ 21 ] [ 22 ] [ 23 ] [ 24 ] [ 25 ] [ 26 ] [ 27 ] [ 28 ] [ 29 ] [ 30 ] [ 31 ] [ 32 ] [ 33 ] [ 34 ] [ 35 ] [ 36 ] [ 37 ] [ 38 ] [ 39 ] [ 40 ] [ 41 ] [ 42 ] [ 43 ] [ 44 ] [ 45 ] [ 46 ] [ 47 ] [ 48 ] [ 49 ] [ 50 ] [ 51 ] [ 52 ] [ 53 ] [ 54 ] [ 55 ] [ 56 ] [ 57 ] [ 58 ] [ 59 ] [ 60 ] [ 61 ] [ 62 ] [ 63 ] [ 64 ] [ 65 ] [ 66 ] [ 67 ] [ 68 ] [ 69 ] [ 70 ]
Current issue : #47 | Release date : 1995-04-15 | Editor : Erik Bloodaxe
IntroductionErik Bloodaxe
Phrack LoopbackPhrack Staff
Line NoisePhrack Staff
Line NoisePhrack Staff
The #hack FAQ (Part 1)voyager
The #hack FAQ (Part 2)voyager
The #hack FAQ (Part 3)voyager
The #hack FAQ (Part 4)voyager
DEFCon InformationPhrack Staff
HoHoConNetta Gilboa
HoHoConCount Zero
HoHo Miscellanyvarious
An Overview of Prepaid Calling CardsTreason
The Glenayre GL3000 Paging and Voice Retrieval SystemArmitage
Complete Guide to Hacking Meridian Voice MailSubstance
DBS Primer from American Hacker Magazineunknown
Your New Windows Background (Part 1)The Man
Your New Windows Background (Part 2)Substance
A Guide To British Telecom's Caller ID ServiceDr. B0B
A Day in The Life of a Warez BrokerXxxx Xxxxxxxx
International Scenesvarious
Phrack World NewsDatastream Cowboy
Title : Phrack Loopback
Author : Phrack Staff
                              ==Phrack Magazine==

                 Volume Six, Issue Forty-Seven, File 2 of 22


                                Phrack Loopback



You dont know who i am, and i appreciated that but i hope your read my little
note here and take it into consideration.

Ive been into the Australian Hacking Scene (if there is such a thing :-)
for only about 2years, but recenlty opened a h/p bbs here in Australia.
What i am writing and asking is if it is possilbe to place kinda an add of
some description in the next issue of phrack, something to the lines of:-

   H/P bbs recently opened in Australia - JeSteRs BBS +61-7-ASK-AROUND

If your looking for some form of donation $$ just let me know, if your
wondering is his guy a fed or something, mail DATA KING and speak to him, he
was one of the bbs first users and as you know he has written in the Int
Scene for the last too issues, but wont be in Issue #47 or i would have asked
him to place the advertisment in this report.

Regards, Jesta

[Cool!  Nice to see there's BBSs still popping up overseas.  It would be
 nice if I had the number...hell, I'd even call... but oh well,
 I suppose I (and all the Phrack readers) will just have to "ASK-AROUND"]


   Hi Erikb,

    Last week you said you'd accept a bbs ad .. well here it is.
   If you'd publish it in phrack i'd be most grateful!

                                A Gnu BBS!
                           1000's h/p Related texts
     Phrack, CoTNo, B0W, cDc, NiA, CuD, Risks,Sphear,SCAM!,NeuroCactus
          Conferences covering Unix/VMS/System Security/Phreaking
   And absolutely no mention of "The Information Super Highway" anywhere!


[I said I'd print the ad...and now I have.]



Retired R.C.M.P officer formerly involved with priority levels of 
electronic surveillance has informed me that my residential telephone 
appears to have been compromised at a point other than inside or 
immediately outside my residence.

After an intensive evaluation of the premises his conclusion was that 
remote manipulation of the telephone company switch where my circuit 
could be victim was the problem.

The main focus of this exercise is to show how one can infiltrate a 
telephone company's network; remotely manipulate the company's switch; 
process long distance calling;make it appear that the calls originated 
from a particular site and then "fooling" the company's billing 
mechanisms to invoice that particular location.

Is this physically possible? Bell Canada categorically denies this 
possibility. I need proof! How is it done?
Please advise as soon as possible.

I'd sincerely appreciate any help, advise and/or information anyone out 
there can offer in this particular situation.

Please leave a way to get in touch! If you prefer to remain unknown, 
thanks a million, and rest assured that I WILL RESPECT and PROTECT you 


John P. Marinelli    jmarinel@freenet.niagara.com

[My take on this is that with relative ease, someone could establish
 call forwarding on a line, make it active to some remote location, and
 call the original number numerous times, causing the owner of the
 hacked line to be billed for all the calls to the forwarded location.

 If anyone knows how to do this, STEP BY STEP on a DMS-100, please,
 contact Mr. Marinelli to help him out with his court case.  I don't
 know a whole lot about NT equipment, so I don't know the
 specifics of how this may have happened, only the generalities.

 Wouldn't it be nice to have the Underground "HELP" someone out
 for a change?]


y0, Black Flag here... heres the info you told me to mail you about the 
GRaP/H (Gainesville Regional Association of Phreakers and Hackers) meetingz

Gainesville, FL
1st + 3rd Saturday of the month, 4pm - ???
meet in The Loop on 13th Street
Black Flag will be casually carrying a 2600
look around, you'll see him.

[Well, looks like the Florida Hackers have a new place to congregate.
 And so do the Florida FBI Field Offices.  :) ]


I was wondering where I could find any virus authoring tools for the PC,
Unix, or VMS.

[You can find Nowhere Man's Virus Creation ToolKit on BBSs around the
 globe.  Have you looked???  I've never heard of UNIX or VMS virus tools.
 Do you know something I don't?  Do you know how a virus works? ]


Chris, found something you might like.  Here's an ad from the latest


By April, 1995 all telephone companies must deliver callers name and
telephone number to the caller ID system.  The law prohibits any telephone
company from offering customers an option to permanently disable their line
from the ID system.

This means that even if you have an unlisted number, everyone you call will
now have your telephone number and name.  Big brother is now one watching,
now he has your name and number.  No more anonymous calls to the IRS, city
hall, real estate agents, car dealers, health department or anyone.  Many
business professionals use their home telephone to return calls.  Do you
want your patients and clients to have access to your home telephone number?

We are proud to bring you the unique ANONYMOUS 100.  It installs on any
telephone in seconds and completely KILLS THE EFFECTS OF "CALLER ID"!  Yes,
you can have your privacy back.  The ANONYMOUS 100 is FCC approved and
carries a one year guarantee.


Is it just me, or is this a load of bullshit?  Didn't CA and TX both pass
laws to make CLID illegal in those states?  I know that before MA would
allow it in the state, they told the telco that line blocking had to be
offered free (and it is, on per/call and permanent basis).  Did the feds
pass this new law while I was sleeping, or is this company just playing on
paranoia (not the first time) and trying to make a buck?


[Well Eric, it looks to me that this is a nifty little box that waits for
 voltage drop and immediately dials *67 before giving you a dialtone.
 Woo Woo!  $69.95!  It certainly is worth that to me to not have to dial
 3 digits before I make a call.  All that wear and tear ruins the
 fingers for typing.  PFFFT....

 About Caller-ID, well, it's legal just about every place I know of.
 I'm sure there are a feel hold-outs, but offering per-line blocking for
 individuals worried about privacy satisfied most Public Utility
 Commissions.  In fact, I think April 1 was the date that all Interconnects
 were supposed to be  upgraded to support the transfer of CLID information
 over long distance calls.  I don't think this has been turned on everywhere,
 but the software is supposed to be in place.

 *67.  Don't dial from home without it.]


This message serves a multifold purpose:

(these response/comments are in referance to Phrack Issue 46 - Sept 20 1994)


A question was brought up concerning a Moterola Flip Phone and the user 
inability to gain access to the programing documentation.  I happen to 
own (legally) a Motorola Flip Phone that I will assume to be the same and 
I was not given the documentation either, though I have not tried asking 
for it.  I will call Motorola and ask for *my* rightful copy and foreward 
my results (if I gain access) to phrack for proper distribution amoung 
appropriate channels.  If I do not gain access, I would appriciate to 
hear from anyone who has (this should not be limited to simply the M. 
Flip Phone, I have interests in all areas).


Later in that issue (Sept 20, 1994) a list of university and colege 
dialups were provided... I live in the 218/701 (right on the border) and 
have a collection of them for addition to the list if you (or anyone 
else) should so desire.  I would post them now, but I have limited time 
and have to dig to find them.  I also have some numbers that some readers 
may find of interest.


My living in the 218/701 is the main reason for my writting.  I used to 
live 612 and knew a lot of people in the area, but now I am stuck here in 
a little shit town (pop. 7000) where the cloest thing to a computer is 
made by John Deere.  I need to find someone in the 218 or 701 to work 
with or meet... if you know anyone...???  The closest BBS is long 
distance and even then it's crap... I would like to start my own, but who 
the fuck would call?  Who the fuck would I invite?  My old H/P friends in 
612 would, but I don't need the heat as they would all go through 950's 
or some other method... I think you understand.

any help would be greatly appreciated  By the way I could also use some 
218/701 ANAC or CN/A... any help here?


[In order:

 a) Good luck with Moto.  You'll need it.
 b) Yes, I really still need your university dialups.  Issue 48 will
    have a much more complete list (I hope!)
 c) If anyone knows any bbs'es in those area codes, please send
    them in so I can pass along the info.

 Other) For CNA information, just call your business office.  They ALWAYS
        help.  Especially if you mention that CNA didn't have a current
        record. :) ]


To whom it may concern at phrack, I would like to subscribe to Phrack. I
didn't use PGP because :-

i.     I never had any real need to
ii.    I came across the document below while dinking around with gopher. I
would pretty much guess phrack knows about it already. If you do know about
it, could you tell me another way to ensure my mail privacy?

Thank you.


---------------------BEGIN E-MAIL DOCUMENT---------------------

This section is from the document '/email-lists/Funny'.

 A lot of people think that PGP encryption is unbreakable and that the
NSA/FBI/CIA/MJ12 cannot read their mail. This is wrong, and it can be a
deadly mistake. In Idaho, a left-wing activist by the name of Craig Steingold
was arrested  _one day_ before he and others wee to stage a protest at
government buildings; the police had a copy of a message sent by Steingold
to another activist, a message which had been encrypted with PGP and sent
through E-mail.

 Since version 2.1, PGP ("Pretty Good Privacy") has been rigged to 
allow the NSA to easily break encoded messages. Early in 1992, the author, 
Paul Zimmerman, was arrested by Government agents. He was told that he 
would be set up for trafficking narcotics unless he complied. The Government 
agency's demands were simple: He was to put a virtually undetectable 
trapdoor, designed by the NSA, into all future releases of PGP, and to
tell no-one.

 After reading this, you may think of using an earlier version of 
PGP. However, any version found on an FTP site or bulletin board has been 
doctored. Only use copies acquired before 1992, and do NOT use a recent 
compiler to compile them. Virtually ALL popular compilers have been 
modified to insert the trapdoor (consisting of a few trivial changes) into 
any version of PGP prior to 2.1. Members of the boards of Novell, Microsoft, 
Borland, AT&T and other companies were persuaded into giving the order for
the modification (each ot these companies' boards contains at least one
Trilateral Commission member or Bilderberg Committee attendant).

 It took the agency more to modify GNU C, but eventually they did it.
The Free Software Foundation was threatened with "an IRS investigation",
in other words, with being forced out of business, unless they complied. The
result is that all versions of GCC on the FTP sites and all versions above 
2.2.3, contain code to modify PGP and insert the trapdoor. Recompiling GCC
with itself will not help; the code is inserted by the compiler into
itself. Recompiling with another compiler may help, as long as the compiler
is older than from 1992.

[Well, uh, gee, I think the fact that this document came from
 /email-lists/Funny speaks for itself.  I'm satisfied with PGP
 for security, but then again, I don't have a lot of information that
 I'm so petrified that I need to keep it encrypted, or that I send
 out in email that I don't care if anyone sees.

 To put aside some of your fears, I personally feel that PGP is ok.
 If the trilateral commission wants your info, they will beat it out
 of you with sticks, with the help of several multi-jurisdictional
 task-forces for Federal law enforcement, while you are under the influence
 of incredibly terrifying and long-lasting hallucinogenic drugs.

 Don't worry.]


Here is a BBS Ad for your next issue:

BBS Name: The King's Domain
Sysop:    Ex-Nihilo
Speeds:   1200-14,400
BBS Type: Remote Access 2.02+
Phone #:  208-466-1679

THe BBS has a good selction of "Hood" files... (hacking/phreaking/anarchy)
journals such as cDc, Phrack, ATI and more... also a good selection of
BBS files which include Doors and Utilities... primarily RA accessories,
but not exclusively... supports rip graphics and is online 24 hrs a day

[Yet another ad!  Is this the rebirth of BBS-dom?]


[Editor's Note:  I got a letter asking me about how to credit card
 merchandise.  I replied that I didn't agree with carding, and that
 if the reader really wanted something, he/she should get a job and buy it.
 This is the response I got.]

What the fuck?  All I wanted was a fucking decent reply.  Get a job, huh?
You know, I thought if you were to talk to one of these supposed
"computer hackers" you could get some usefull information.  Get a job, that
rich coming from someone like you.

When there's something you want...take it...without using your money.

Maybe sometime I'll be able to takl to a hacker not some fucking
hypocritical computer geek

[Editor's Note:  I replied to this letter by stating that carding had nothing
 to do with hacking, that it was out and out stealing, and although
 we had published articles about it in Phrack, I wasn't going to help anyone
 do it, and that he/she should try to contact the authors of various
 carding articles directly.  This is the response that got.]

Come on now "Chris", you can do better than that, can't you?
Stealing?  Who's the thief here, eh? See, when I wake up in the morning,
I don't have to worry about secret service, police, or any sort
of military shit being in my apartment.  I don't get busted for doing stupid
things like stealing phone calls off fucking 900 numbers.  I think I
know exactly why you don't card anything - because you're too fucking stupid
or don't even have the balls to do it. Fuck, you'd expect someone like
yourself to have different views about being a thief. Well, I guess it
takes a certain kind of person to hack into shit like you, but why this
person would start flame wars and otherwise just be a total fuckup, I don't
know. Or, maybe it's just the singular person I'm talking too, yeah, that's
probably i...there probably are other, BETTER, hackers who aren't as
fucking arrogant as you.

Well, have fun with your hands and PLAYGIRL's, you fucking little punk-ass

And tell your mother that I won't let this affect our relationship.



[This is the future of the computer underground??]



System is called CyberSphincter (playing off of the current word trend of
cyber). The number is 717-788-7435.  The NUP is 0-DAY-WAR3Z!!!
Modem speeds of 14.4 and lower, with no ANSI.  Sysop is Ha Ha Ha.

It's running renegade (we know it can be hacked and I've done it already),
but we seem to believe in honor among thieves, so try to control yourself on




Hey Erik B...

I'm the remote sysop at the Digital Fallou BBS in 516.  Just recently,
we've been getting a rash of ld callers.  A day or two ago, a guy with
the handle "Digi-Hacker" applied.  His application looked good, execpt that
he stated his alter handle was "Eric Bloodaxe" and that he was the editor
of Phrack.  Now, any lame ass could just "say" that, and we don't want any
liars on board.  :)  So we decided to go right to you thru email.  Did you
apply?  If so, cool.  If this isn't you, that guy is gonna most assuredly
be deleted..

[Well, I hate to say it, but I don't have time to do much of anything
 anymore.  I certainly don't call bbses with any regularity.  I
 do have accounts on SECTEC and UPT, but that's it.  I may call some
 in the future, but for the most part I don't have any time.  If someone
 calls up a bulletin board and applies as "Erik Bloodaxe"  it isn't me.
 (Anyone saying they are Eric Bloodaxe MOST CERTAINLY isn't me. :)  )

 Anyone running BBSes may want to take note of this, so they don't get
 swindled into giving "elite" access to some pretender.  You can
 always email phrack@well.com and ask me if I have applied to your
 bbs. ]



I know you don't know me, but I figured you of all people could help me,
and give me an answer quickly.

I just got my phone bill, and on the last page is a page from some
company calling themselves Long Distance Billing Co., Inc.  It has
one call "Billed on behalf of Northstar Communication"  It is a call from
somewhere in FL, for 13 minutes, costing 51.87.  I called LD Inc, and they
said the call was a collect call made from Northstar Comm, and that
my only recourse was to write a letter to Northstar. Needless to say, I
did not accept the collect call, I don't know anyone in 813.  I called
NYNEX, and they said I should write to Northstar and LD INC, but didn't
seem to know anything about either company.  They guy I talked to said it
was real strange that LD INC didn't give me a number to call at
Northstar, since most of this type of thing is handled by phone.  I'm
beginning to wonder exactly how relieable this LD INC company is, who
Northstar is, and most of all who called and how the hell the call was
supposedly accepted by my phone.  This is all the info I know:


1.  SEP 18 923PM COL CLEARWATER FL 813-524-5111 NC 13:00 51.87

--From my phone bill

Northstar Communication
3665 East Bay Drive
Suite 204-192
Largo, FL 34641

--From LD INC

Long Distance Billing Co., Inc.


--From NYNE phone bill.

If you can think of anything I can do, I;d be really greatful.  I don't
have $50 to throw away on a call I never got, and I don't have the
resources you do to try and figure out who the hell these people are.

[It looks to me like you got fucked by someone in Florida using a COCOT
 payphone.  It's kind of odd that NYNEX couldn't help you more...but anyway,
 I wouldn't pay it.

 What I suspect happened was that somsone used one of those handy COCOT
 services where the operators are incredibly stupid and allow calls
 to be accepted when the "calling party" says "YES" to allow a 3rd party or
 collect call, rather than the party being called.  This happened to me at
 my previous work extension by New Yorkers using the ENCORE service (even
 though all our lines were listed to refuse 3rd party and collect calls.)]


I've been having some trouble with the law, so all my notes are stashed at
a friend's casa at the moment.  Can you recommend a good lawyer to defend me
for allegedly hacking some government computers?  I've got a good crim def
guy working with me right now assisting me guring questioning from Special
Agents, but I will need someone that has experience if I get indicted.

[If you are facing computer crime charges, you are definately in
 a world of hurt.  There are very few computer crime-savvy lawyers
 practicing in the World.  The only thing I can suggest is that
 you call EFF, CPSR or EPIC and ask them if they know of any
 lawyers in your area that they can refer you to.  None of these
 groups will help you directly, except under EXTREME circumstances, and
 only if you have been falsely accused, or have had rights violated.
 If you are guilty, and the cops have any evidence, you are going to be

 Remember Baretta?  "If you can't do the time, then don't do the crime."]


Dear Chris,

You probably don't remember me, but we corresponded about 3 years
ago as part of my PhD research.  I was at Edinburgh University
at the time and am not at UMIST in Manchester (British equivalent of MIT).

The reson I'm writing is that I was awarded my PhD last March, and for one
reason and another I've been sidetracked into a completely different field
of research - the British National Health Service and the various ways
computers are being used in it.

I tried getting a publisher interested in the thesis, but with little luck.
I also sent it to Jim and Gordon at CuD on disk for them to stick it on
archive, but they had problems with the formatting of it and don't seem to
have got round to archiving i.

If you're interested I'd be quite happy to send a couple of disks to you
and you can spread it around as you want.  It just seems a shame for the people
on the net not to get a look at it.  It's dressed up in airy-fairy sociological
language - but there's still lots in it that I think would be of interest to
people on the net.  I saw your interview in CuD, and I agree with you about
most of the books written on the CU.  Mine has its faults but it's got less
biographical data and more issue-oriented stuff.

Anyway, get in touch and let me know if I can find a good home for my magnum

Take care and a belated thanks for all the time you spent in helping me with
the PhD.

Best Wishes,

Paul Taylor
School of Management


 Congrats on your PHD, and continued success at UMIST!
 I'm putting your thesis up on the Phrack WWW page so that more
 people can get a look at it!

 Thanks for sending it!]


I read your article on hacking the French among other foreign governments.
Sounds pretty fun, just for kicks the other night I did a search of all the
computers I could get at in China.  One of them was a national power grid
computer. Sounds like it could be fun to play with huh?  The "They Might Kill
Us" part will tend to turn some people off, but not me.

[WOW!  A National Power Grid Computer!  In China!  Gee.  How many times
 have you seen Sneakers?  Take the tape out of your VCR, slowly run
 a rare-earth magnet over it and set it on fire.

 On the other hand, if you were at least partally serious about the
 hacking for America, keep your eyes open.]



Regarding your article in Phrack 46, we here in Columbus would
just like to say that everything except for the Krack Baby's phone number,
which long since went down, and the Free Net template, is total and utter
bullshit.  The Columbus 2600 meetings were NOT started by Fungal Mutoid, he
is just responsible for a much larger turnout since about September (94), and
whoever wrote that has obviously not been to a Columbus meeting recently.
The Columbus 2600's have been here for quite a while, but bacause the H/P
scene consists of 15 people AT THE MOST, many of which haven't the time to
attend, the turnout is almost always low.  I believe the most that have ever
shown up to a meeting is 10, which dwindled to 8 or so before the
meeting was officially half-over.  Nobody knows who wrote the article which
you printed, although no one has been able to contact Fungal Mutoid to ask him.
Just thought we'd clear a few things up, and to those that don't give two
flying shits, we're sorry to have to bring this into a E-mag as great as


H.P. Hovercraft and
the Columbus H/P Gang

[Thanks for the letter.  Like I always say, I can only report and print what
 I'm told or what is sent to me.  I don't live anywhere but Austin, TX, so
 I don't know the intimacies of other areas.  Thanks for sending in your
 comments though!]



Operator hi
who is it that sets my phone
on redial and tone

gives me rest in times
great stress lays its head on my
leads me into joy

cosmos and mizar
give evidence and homage
to your greatness, why

on your very first try shall
succeed, as always

oh, A T and T
while great, holds non to the great
power that NYNEX

gives access to in
glee, awaitnig, cautiously,
for signs of entry

illicitly thus
strives to maintain control of
the ESS switch,

not comprehending
that control is simply gained
by a single call

to some stupid yet
revered operator who
believes you in charge

gives out system pass
with some small feat of trick'ry
PAD to PAD, too, works

sounding of the baud
with modem and coupler
connection is made

who is to question
the incidence of this fault
or acknowledge it

security's words
false threats followed by arrest
on illegal grounds

hackers, phreakers grieve
free the unjustly accused
give them freedom to

ROAM with cellular
phones place to place with no charge
test the system's worth

find holes, detect bugs
run systems by remote, yea,
to explore, to seek,

to find a network
of free bits and bytes unharmed--
innocently seen.

who doesn't know that
Bell or Sprint or MCI
would never approve--

believe in 'puter crime,
toll fraud, "access devices,"
free calls to Denmark

Information is
power is imperative

please, spare me the grief
accusations being thrown
of phone co. crashes

are fiction unleashed
to the ignorant public
eye to make blame, fear

all phr/ackers, but all
have had their days and faded
into the past, why

must ignorant block
the free flow of knowledge found
angry sysops abound

secret service rais
hoisting games, computers, phones
never to be re-

turned hackers, phreakers
working for government, spies,
lies, deception, all

to walk free while friends
spend years in jail for simply
battling for some change

knowledge is NOT free
equipment costing milliions,
simply cannot pay

the cost for systems
of signal switching; no on e
wants to harm, just try

to use our knowledge
in a constructive way and
look around for things

which further know-how
of packet switching, ANI,
proctor tests and tones

which make little sense
and why is it there, what are
all the test lines for?

central office trash
provides some clues, while phone calls
get angry response

to inquiries re:
loops and lack of barriers,
COCOT carriers

who overcharge cause
frustraton, must be helped
end overbilling

unfairness is only
people not understanding
nor comprehending

that what we do is
NOT always fraud, vengeance or
deceitful reasons

bu for love of the
systems, curiosity's
overwhealming need

to be met and to
feel accomplished, proud, to
do and know something

WELL crackers abound
pirates do multiply, spread
wavez of warez cross coasts

and foreign countries
virus creators seeking
escape, growth, freedom

not for destruction
but for change, to press limits
to find that which makes

us whole, complete, and
accomplished at crossing
the barriers that

bound conventional
people in dead-end jobs with
little self-esteem.

hacking, phreaking, it
is an art form, and a quest
for endless reaches

to seek, to explore, to
realize and accomplish, to
take chances and live

not for rules and laws
but for what things should be but
will not come to pass.


[Uh oh, we're getting pretty literary here.  I can see it now:

 Phrack Magazine.  For the Sensitive Hack/Phreak.

 Interesing poem tho...]


Dear Editor of Phrack Magazine;
Ok Erik (mr. editor), there is also a poem that I have written for Wei.

"Thinking of Ding Wei"
(C) 1994, 1995 Oliver Richman.

Come here, let me tell you something,
How I hide my love for Wei Ding:
By forgetting all my thinking!

When in my mind Wei's heart I see..
I want to tell her "wo ai ni",
So her and I will always be.

Her mind is pure, like pretty Jade..
She makes me want to give her aid.
I know that her love will not fade.

My patience tries to move the sea.
But can I deny you and me?
I want our hearts to set us free.

I really love you, dear Ding Wei,
I think about you every day.
Tell me, what more can I say?

[What's this?  Another Poem?  A tribute of Love for some chick named Wei?
 Holy Lord.  We need to get some codes or credit cards or something in here
 to offset this burst of "Heartfelt Emotive Print." ]


the other day upon the stair
i met a man who wasn't there
he wasn't there again today
i think he's from the CIA



As a former AOLite and definite wannabe, and having d/l the log of
the Rushkoff/Sirius hypechat, I could tell from the beginning that it
would be just as you reviewed _Cyberia_ as being.  Every other word
Rushkoff used was Cyberia or Cyberians.  As lueless and vulnerable to hype
as I was, I couldn't help but stand back and listen to all the shit with a
grin.  In the same not, I ran into David Brin on AOL as well, and managed
to get a correspondence goig with him.  He was on discussing all the
research he did on the "Net" and about the papers he was delivering, and,
most importantly (of course), his upcoming BOOK about the Internet and
privacy.  At the time, still under the glossy spell of Wired (which I still
find interesting) and the hype, I was eager to offer him an interview
proposal, which I would have published in Wired if at all possible.

Dr. Brin knew less than *I* did about the Internet.  I can sum up most of
these people's vocabularies in one word:  "BLAH."  They may as well
reiterate that syllable ad infinitum--it amounts to the same thing.


 Hey Cyber-guy, thanks for the super-cyber email.  As we cruise along this
 InfoBanh, exiting in Cyberia, it takes a diligent cyberian like you
 to keep things in check!

 Sorry bout that.  I was overcome with a minor brain malfunction that
 reduced my IQ to that of Douglas Rushkoff.  Doesn't it all make you want
 to puke?

 I heard that yesterday on the soap opera "Loving" some character was hacking
 into food companies to steal recipes.  A month or so back, on "All My
 Children"  (The only soap I watch...but I'm embarrassed to say I watch it
 religiously), Charlie & Cecily were dorking around on the Internet, and
 sent each other email after reading notes they each left on alt.personals.

 The world is coming to an end.]


Yo erikb:

yo dewd.  eye am so paranoid, my t33th are rattling.
what dewd eye dew?
yew are the god of the internet.
how dew eye stop the paranoia?
please print answer in next phrack.

[Your Acid will wear off in a few hours.  Don't worry.  Enjoy it.
 The CIA does.

 If it doesn't go away in a few days, there are some nice men in
 white lab coats who will be glad to help you out.

 How do you stop the paranoia?  Your answer:  Thorazine!]


This is Nemo Kowalski speaking (aka Paolo Bevilacqua).
I just discovered Phrack at the young age of 31. ;-)
Well, I like it a lot, at least like I enjoyed doing real
things here in Europe, alone and with DTE222, years ago.
I'm going to write something about the first anti-hacker operation
in Italy, "Hacker Hunter," in which, incidentally, I got busted.
Do you think your some of the old stories from altger and Itapac
can be of interest to your readers?

To Robert Clark:

I read "My Bust" and I liked it.  I'm not a native english speaker,
but I think it was well-written, plus principally, I felt a pleasant
"reader sharing writer's experiences" sensation that can separate a good
reading from pure BS.  This is expecially true since I've been busted here
in Italy, and I've learned that things are more similar around the
western world than I would have thought.

The only thing I can't share is your Seattle experience.   Maybe the dichotomy
good druge/bad drugs has a different meaning for you?




 Please write as much or as little as you like about the busts in
 Italy!  We have an article this issue about Italy, but any further
 insights into your experiences, esspecially regarding how busts
 are carried out in other countries would be greatly appreciated by
 our readers!

 I look forward to reading whatever you can put together!]



As a relative neophyte to hacking, one of the problems I come up with a
lot is identifying systems I locate scanning.  So, I was wondering if Phrack,
or any other zine, had ever published a concise guide to clues to
help identify unknown systems.  If so, could you please let me know what
mag, and what issue.

One last thing, are there any internet sites with info of interest to hackers?
I know about eff.org and freeside.com and a few others, but nothing really
intriguing...any suggestions?

[You will find a good start to identifying strange systems, and in
 locating sites of interest to hackers in the #Hack FAQ we've printed
 in this issue.  ]


For Phrack news, Darkman was busted in Winnipeg City, Canada, for various
reasons, but since I knew him personally I wanted to add my two cents.
For the record, he was busted for warez and porn as well as hacking into the
UoManitoba, and I heard his wife left him because he spent too much time
pirating on IRC.  He was about 38.  He could read fluently in Russign, and
I remember one night we discovered some secret KGB documents from the 50's,
real science fiction thriller stuff, and he read it to me.


[It's a drag that your friend was busted, and knowing the Canadian
 government, the porn part was probably pretty minor shit in a worldly

 I'm kinda intrugued by the "KGB Documents" you found.  Uh, were these on
 the net?  Did you have a cyrillic character set loaded?  How did you
 read these documents?  Were they on paper?



Top 10 Reasons Why I Should Get My Subscription FREE:

(1)  I'm a programmer/Analyst for an electric utility company in Texas
     (ahh, come on - I'm a fellow Texan!)

(2)  I've read Phrack for years (loyalty scores points - right?)

(3)  I've been involved with compuers since GOD created the PC
     (I began in late 70's-early 80's).

(4)  I'm *not* a narc (shh, don't tell anybody.)

(5)  I *may* have a record (but if I do, it's for minor kind of stuff -
     I'm basically a nice guy).

(6)  I don't like the telephone company (you have to admit they're amusing

(7)  I know how to get around on the 'net (can't you tell - I have an AOL
     account <g>.)

(8)  I'm a good source of info regarding all types of mainframe and PC

(9)  PLEASE....

(10) I'll quit writing dumb letters and trying to be funny.

[David Letterman is in the background throwing up as I'm typing

 Don't quit your day job...but I'll send you Phrack anyway. :) ]


Hey Chris,

I just read your thing in Phrack abou the US being attacked by our so
called "allies" and I agree with you 110%!  I do believe that we should start
some sort of CyberArmy to fight back.  I don't think that our government
would mind, unless we crashed an economy that they were involved with or
something, but hell, they fuck with us, let's fuck with them.  And you were
saying about phone costs, isn't it possible to just telnet or something over
there?  And why stop at fighting back against our information agressors, why
not fight back against other countries that our government is too chickenshit
to fight against?  Cuba comes to mind.  Well, I hope you reply or something, I
really like Phrack, I try to get it whenever I can manage, but I don't
have an internet address where I can get files.  Keep up the good work.

[Yet another volunteer for the US Cyber Corp!  By God, I'll have
 an army yet.  :)  ]


                              ==Phrack Magazine==

                 Volume Six, Issue Forty-Seven, File 2a of 23


                                Phrack Editorial

What you are about to read is pure speculation on my part.  Do not take
this to be 100% fact, since most of it is hypothesis.  But it sure will
make you think twice.  "Ever get the feeling you're being cheated?"


So...Mitnick was busted.

There certainly are some really odd things regarding the whole mess,
especially with regards to the "investigating" being done by
a certain heretofore unheralded "security" professional and
a certain reporter.

One of the first oddities was the way the Mitnick saga suddenly
reappeared in the popular media.  In February, and seemingly out of
nowhere, the ever diligent John Markoff entered the scene with the
a groundbreaking story.  (Of course this is meant to be sarcastic as
hell.)  Markoff's story dealt with a near miss by federal authorities
trying to apprehend Mr. Mitnick in Seattle about 5 months prior.

Now, if nothing else happened in the whole Mitnick saga, I never would
have given this a second thought, but in light of what followed,
it really does seem odd.  Why would someone write about a subject that
is extremely dated of no current newsworthiness?  "Our top story tonight:
Generalissimo Francisco Franco is still dead."

To be fair, I guess Markoff has had a hard on for Mitnick for ages.
Word always was that Mitnick didn't really like the treatment he got
in Markoff's book "Cyberpunk" and had been kinda screwing with him for
several years.  (Gee, self-proclaimed techie-journalist writes something
untrue about computer hackers and gets harassed...who would have thought.)
So it really isn't that odd that Markoff would be trying to stay abreast
of Mitnick-related info, but it certainly is odd that he would wait
months and months after the fact to write something up.

But wait, a scant month and a half later, Mitnick gets busted!  Not
just busted, but tracked down and caught through the efforts of a
computer security dude who had been hacked by Mitnick.  Breaking the
story was none other than our faithful cyber-newshawk, John Markoff.

"Tsutomo Shimomura, born to an American mother and a Japanese father,
thus becan life as he was destined to live it...going in several
directions at once.  A brilliant neurosurgeon, this restless young man
grew quickly dissatisfied with a life devoted solely to medicine.
He roamed the planet studying martial arts and particle physics,
colelcting around him a most eccentric group of friends, those
hard-rocking scientists The Hong Kong Cavaliers.

"And now, with his astounding jet car ready for a bold assault on the
dimension barrier, Tsutomo faces the greatest challenge of his turbulent

"...while high above Earth, an alien spacecraft keeps a nervous watch on
Team Shimomura's every move..."

Wait a minute...that's Buckaroo Banzai.  But the similarities are almost
eerie.  Security dude by day, hacker tracker by night, ski patrol
rescue guy, links to the NSA!  WOWOW!  What an incredible guy!  What an
amazing story!

But wait!  Let's take a closer look at all of this bullshit, before it
becomes so thick all we can see is tinted brown.

Shimomura was supposedly hacked on Christmas Eve by Kevin Mitnick, which
set him off on a tirade to track down the guy who hacked his system.
Supposedly numerous IP tools were taken as well as "millions of dollars
worth of cellular source code."

First off, Shimomura's TAP is available via ftp.  Modified versions of this
have been floating around for a while.  I suppose it's safe to assume that
perhaps Tsutomo had modified it himself with further modifications (perhaps
even some of the IP/localhost spoofs that the X-consortium guys were
playing with, or maybe other tricks like denial of service and source-routing
tricks...I don't really know, I don't have any such thing authored by

Secondly, what is all this cellular source code?  And why did Shimomura have
it?  Could it be that this is really just some kind of smokescreen to make
it seem like Mitnick did something bad?  For those of you who don't know,
Tsutomo is friends with Mark Lottor (yes, the OKI experimenter, and CTEK
manufacturer.).  They have been friends for some time, but I don't know
how long.  Lottor used to be roommates with, lo and behold, Kevin Poulsen!
Yes, that Kevin Poulsen...the guy who before Mitnick was the "computer
criminal de jour."  Poulsen and Mitnick were no strangers.

It wouldn't be too much of a stretch of the imagination to think that
those files were really ROM dumps from phones that Lottor had given
Shimomura.  It also wouldn't be too much of a stretch to imagine that
Mitnick knew Tsutomo, and decided to go poke around, pissing off
Tsutomo who knew that he'd been violated by SOMEONE HE ACTUALLY KNEW!
(It sure does piss me off much more to get fucked over by someone I know
rather than a complete stranger.)

Woah.  If any of that is true, what strange bedfellows we have.  But wait,
it gets better...

Enter John Markoff.  Markoff and Tsutomo have obviously known each other for
a while.  I don't know where they met...but I know they were together
at Defcon, maybe at Hope, and probably at the Tahoe Hacker's conference
a few years back.  (I'd have to go back and look over the group
photos to be certain.)

Markoff already has a stake in the Mitnick story, since it was his book,
"Cyberpunk" that really gave ol' Kevin some coverage.  Now, if Markoff knew
that Mitnick had hacked Tsutomo (from Tsutomo's own mouth), then certainly
any journalist worth his salt would see possibilities.  Gee, what a great
concept!  A colorful computer security guy tracks down one of the world's
most wanted hackers!  What a great story!  Remember that Stoll Guy?

But in order to get the book publishers really hot, it would take some more
press to rejuvinate interest in the Mitnick story.  So the first story,
months after the fact, is printed.

Meanwhile, Tsutomo is supposedly tracking down Mitnick.

How does one track down a hacker?  The legal (and really annoyingly hard way)
is to work with other system administrators and establish a trail via
tcp connects and eventually back to a dialup, then work with phone companies
to establish a trap and trace (which usually takes two or three calls) and
then working with local police to get a warrant.  Somehow Tsutomo seemingly
managed to avoid all this hassle and get a lot done by himself.  How?
Well, the Air Force OSI managed to track down the British Datastream Cowboy
by hacking into the systems he was hacking into the Air Force from.  This is
the easy way.  Hmmm.

I know with a good degree of certainty that Markoff's and Tsutomo's little
escapades pissed off a great many people within law enforcement, but I don't
know exactly why.  If they WERE bumbling around stepping on FBI toes
during the course of their litle hunt, certainly the FBI would have
threatened them with some kind of obstruction of justice sentence if they
didn't stop.  Did they?

Well before any of this had begun, Mitnick had been hacking other places
too. Guess what?  He happened to hack CSCNS, where a certain ex-hacker, Scott
Chasin, runs the security side of things. I remember well over a year ago
talking to Chasin about a hacker who had breeched CNS.  Discussing his
methods, we thought it must be Grok, back from the netherworld, since he
was so skilled.  The hacker also made claims of being wireless to avoid
being traced.  (This also fit into the Grok modus operandi...so we just
assumed it was indeed Grok and left it at that.)  Chasin told the hacker
to get off of CNS, and that he could have an account on crimelab.com, if
he would only use it for mail/irc/whatever, but with no hacking, and on
the agreement that he would leave CSCNS alone.

The agreement was made, but went sour after only a few weeks when the mystery
hacker began going after CSCNS again.  The Colorado Springs FBI was called
in to open an investigation.  This was ages ago, but of course, field agencies
rarely talk.

Back in the present, Tsutomo goes to help out at the Well, where
a certain admin (pei) was having problems with intruders.  This is the
same pei who a few months earlier told Winn Schwartau "The Well has no
security!" Which Winn reported in his newsletter.  (This of course came after
Winn's account on the Well was reactvated by an anonymous person who
posted several messages about Markoff and signed them "km."  DUH!)

So somehow, Tsutomo gets trace information leading back to a cell site in
North Carolina.  How does a private citizen get this kind of information?
Don't ask me!  My guess is that the feds said, give us what you know,
help us out a bit and don't get in our way.  In return, one can surmise
that Tsutomo (and Markoff) got to glean more info about the investigation
by talking with the feds.

So, Mitnick gets busted, and Tsutomo got to ride around in a car with
a Signal Strength Meter and help triangulate Mitnick's cellular activity
to his apartment.  Woo woo!

After all is said and done, Tsutomo has single handedly captured Mitnick,
John Markoff breaks the story on the FRONT PAGE of the New York Times, and
every other computer reporter in America continually quotes and
paraphrases Markoff's story and research as "God's Own Truth."

Mitnick, on the other hand, gets blamed for:

 1) hacking Tsutomo
 2) hacking the Well
 3) hacking Netcom to get credit cards
 4) hacking CSCNS
 5) hacking Janet Reno's Cell Phone
 6) hacking motorola
 7) conversing with foreign nationals

Let's look at some these charges:

1) Mitnick was not the first (or only) to hack Tsutomo.  The San Deigo
   Supercomputer Center is a target for a lot of people.  It's a major
   Internet center, and there are all kinds of goodies there, and the
   people who work there are smart guys with nice toys.  Sorry, but
   Mitnick is the scapegoat here.

2) Mitnick was not the first, last, or most recent to hack The Well.
   Like Pei said, "The Well Has No Security."  I know this first hand,
   since I have an account there.  I don't raise a stink about it,
   because I pay by check, and my email is boring.

3) Mitnick was not the person who got the Netcom credit card file.
   That file floated around for quite some time.  He might have had
   a copy of it, but so do countless others.  Sorry.  Wrong again.

4) Mitnick was in CNS.  He was not the only one.  Thanks for playing.

5) The thought that Mitnick could reprogram a MTSO to reboot upon
   recognizing a ESN/MIN pair belonging to one specific individual
   would require that he had hacked the manufacturer of the MTSO, and
   gotten source code, then hacked the cellular carrier and gotten
   a full database of ESN/MIN information.  Both of these things have
   been done by others, and Mitnick certainly could have done them too,
   but I doubt he would have gone to that much trouble to call attention
   to his actions.

6) Motorola, like EVERY other big-time computer industry giant has been
   hacked by countless people.

7) Mitnick reportedly had dealings with foreign nationals, especially
   one "Israeli" that set the CIA up in arms.  Well, sure, if you get on
   IRC and hang out, you are probably going to talk to people from other
   countries.  If you hang out on #hack and know your stuff, you will probably
   end up trading info with someone.  But, playing devil's advocate,
   perhaps the person you might be talking to really isn't a 22 year old
   Israeli student.  Maybe he really is a 40 year old Mossad Katsa working
   in their computer center.  Was Mitnick Jewish?  Would he do "whatever
   it takes to help the plight of Jews worldwide?"  Could he have been
   approached to become one of the scores of sayanim worldwide?  Sure.
   But probably not.  He'd be too hard to call on for the favors when they
   would be needed by Mossad agents.  So, I have some doubts about this.

Less than a month after the whole bust went down, Markoff and Tsutomo
signed with Miramax Films to produce a film and multimedia project
based on their hunt for Mitnick.  The deal reportedly went for
$750,000.  That is a fuckload of money.  Markoff also gets to do a book,
which in turn will become the screenplay for the movie.  (Tsutomo
commented that he went with Miramax "based on their track record."
Whatever the fuck that means.)

Less than a month and they are signed.

Looks to me like our duo planned for all this.

"Hey Tsutomo, you know, if you went after this joker, I could write a book
about your exploits!  We stand to make a pretty penny.  It would be
bigger than the Cuckoo's egg!"

"You know John, that's a damn good idea.  Let me see what I can find.
Call your agent now, and let's get the ball rolling."

"I'll call him right now, but first let me write this little story to
recapture the interest of the public in the whole Mitnick saga.  Once that
runs, they publishers are sure to bite."

Meanwhile Mitnick becomes the fall guy for the world's ills, and
two guys methodically formulate a plot to get rich.  It worked!

Way to go, guys.

[ News ] [ Paper Feed ] [ Issues ] [ Authors ] [ Archives ] [ Contact ]
© Copyleft 1985-2021, Phrack Magazine.