The Mickey Mouse Club Presents... __ __ ____ __ __ __ ______ _____ ______ __ __ __ __ __ __ __ __ __ __ __ __ ______ ________ __ ___ ____ _____ ______ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ ______ __ __ ______ Hackers Unlimited __ __ __ __ __ ______ __ __ ______ ______ ______ ____ __ __ ___ __ __ __ ___ ___ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ __ ____ __ __ __ __ __ ___ __ __ __ __ __ __ __ __ __ ____ __ __ ______ ______ __ __ ______ __ ______ ____ Magazine Volume 1 Issue 2 Released 12/22/89 Editors The Dark Lord Cardiac Arrest -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Hackers Unlimited Volume 1, Issue 2 Table Of Contents # Title Author ------==========================================------------------------------- 1 Information about The Mickey Mouse Club Editors 2 Submission Policies Editors 3 Introduction Editors 4 Understanding The Blue Box The Dark Lord 5 Bugging Phone Line Cardiac Arrest 6 StarLink Fallen Angel 7 Piggy Backing Lines The Dark Lord 8 Hacking Prodigy The Dark Lord 9 Hackers Unlimited News TDL\Cristifer Columbus 10 Confrencing....... The Dark Lord 11 Using 0266's The Dark Lord 12 Top Ten Listing The Dark Lord 13 CBI's The Dark Lord 14 Rumors of '89 The Dark Lord 15 Opinion Poll Editors 16 Definitions Editors 17 Listings Compilations 18 Closing Notes Editors ------==========================================------------------------------ -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- What is The Mickey Mouse Club? ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The Mickey Mouse Club was founded by Cardiac Arrest and The Dark Lord. The name MMC came about because we couldn't think of a better one. We are basically a cracking club. Aside from cracking, we write instructional text files, and an electronic magazine called Hackers Unlimited Magazine, designed to help beginning hackers and phreakers. We are also the authors of programs such as Data Protect, a file that, as the name implies, provides features such as data ecnryption/decryption, file hiding, file clearing, and several other functions. MMC Membership ~~~~~~~~~~~~~~ Since we are still a comparitively new group, we are looking for members of the underground BBS community who can do one or more of the following : * Crack games (or other programs) * Draw crack screens * Write instructional text files about phreaking, hacking, carding, etc * Contribute to Hackers Unlimited Magazine in other ways than files * Write programs beneficial to the hacking community (ie code hackers, etc) If you are interested in applying for the MMC, contact either Cardiac Arrest or The Dark Lord. If you fit into the above specifications, we will give you permission to fill out our application. After completion, upload your application to the BBS you downloaded it from. Your membership will be considered ONLY if you received the application with permission. It will be based entirely on the application (ie, your truthfullness and knowledge). Hackers Unlimited Magazine ~~~~~~~~~~~~~~~~~~~~~~~~~~ The Mickey Mouse Club puts out an electronic newsletter/magazine called Hackers Unlimited Magazine. This magazine is devoted to informing the hacking community about hacking, phreaking, carding, or anything else or interest. It is geared towards beginners, but we hope some experienced hackers will benefit >from it also. The editors of the magazine are the founders of the MMC, Cardiac Arrest and The Dark Lord. ANYONE may write for HU magazine, and we would like to encourage readers to submit any articles they have written to a HU Support Board. We would also like to encourage comments, complaints or suggestions. Where You Can Contact Us ~~~~~~~~~~~~~~~~~~~~~~~~ Cardiac Arrest and The Dark Lord can be contacted on most pirate boards in Denver (303/CODEN), as well as various BBSes around the country. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- ___________________________ ___________________________ ___ ___ ___ Submission Policy ___ ___________________________ ___________________________ Hackers Unlimited Magazine is an ongoing newsletter, and we will release issues as regularly as possible. To do this we will need readers to contribute articles for the magazine as often as possible. We ask that if you feel you have something good to write about that will fall within the guidelines for Hackers Unlimited, please submit it. However, we do take pride in the magazine, and we will only accept articles up to our standards. Do not be discouraged if your article is turned down. Although this is not a thing that is expected to happen, if we feel the article is not good, then we do reserve the right to turn down your article. Please don't let that stop you from writing your article. Ninty percent of the articles will NOT be turned down, and by having this policy, we are not wanting to scare off the good writers. We ask that you keep the topic within the guidelines, and make it to the best of your ability. If your article IS turned down, the editors may make suggestions, or, if the changes are minor, permission to edit the file. One thing to keep in mind, we do not base our decisions on the type of computer you own, reputation that you have, age or anything else unrelated to the magazine. The decision whether the article stays or goes is based STRICKLY on the quality of the article itself. To submit an article just find some way of getting in touch with one of the writers of Hackers Unlimited, or even better, one of the editors, The Dark Lord, or Cardiac Arrest. If you do get in touch with one of the writers, you must make sure it is relayed to one or both of the editors, because it will do little or no good if we don't know you're out there. There will be ways listed through out this magazine on how you can get in touch with us, either through support boards, Colorado boards, Vmb's etc. Hope to see an article from you soon and enjoy.........Hackers Unlimited!!! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Introduction : Yes, Hackers Unlimited is still alive. We are sorry for the delay in the release but the makers of Hackers Unlimited, MMC, are working on BBS software that will be released when this issue is. Incase you wanted to know, the software is called Eclipse so look for it at the selected sites. Please be sure to read all of the additional notes and comments and help us with those requests, because there is a lot of things that Hackers Unlimited is looking forward to in the future, and your help is needed to accopmplish so of those things. Well time for the second issue of Hackers Unlimted, enjoy, and as always, be await your suggestions. Cardiac Arrest & The Dark Lord Editors, Hackers Unlimited Magazine VMB 1-800-444-7207 Box 9500 NOTE : This VMB is valid as of the release of this magazine, but may change without notice. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= __________________ ___ ___ ___ Blue ___ ___ Boxes ___ By: The Dark Lord __________________ I realize that most of you are just about ready to skip over this part of the magazine because Blue Boxes are old news. Well I have talked to a couple of Phreakers who have been doing it for a couple of years (by no means beginners) and they were not Really sure what the process behind blue boxes was. Thats why I am writing this. Ok Enough of the Intro.... Ok first blue boxes are one of the oldest color boxes there are. When the box was first discovered, it was, heheheh, far from a box. It was a whistle. Good 'ole Cap'n Crunch was the one to discover this. He was messing around with the phone (As usuall) and he found that by blowing in his Captain Crunch wistle had got a free call. He figured out that the whole Phone company runs off of tones. When you dial a number on your key- pad, it does not register the number, it registers the tone. The Cap'n was able to simulate one of these tones to get a free call. This Box that created a tone was just great for making calls then, but now they have a system called ESS (Electronic Switching System) which is the worst thing that could ever happen to a Phreaker. The ESS can find EXACTLY were the call came from, were it was made to, and from there they could get all the information on the person(s) who made the call through other methods. The Blue Box is an Electronic Box that simulates Tones. It simulates 2600hz and 120hz tones. These tones travel through things called trunks, which are kinda like the phone lines. When you call a number, it will reconize the tones that you made in dialing and will goto the destination set by the dialing codes. Once it finds this trunk that it is suppose to goto, it will send a 2600hz tone over the trunk (Unless its busy, which is like not making the call). Once it makes this 2600hz tone, it will then kill the tone and sends the call to its destination. If it the line is busy it will send the dialer a 120hz tone, which is, you guessed it, a busy signal. What the Box does, is this exact thing, to where you are sending your own tones and by passing haveing to go through though Phone company, where you will be charged. Well, you went through the phone company, but you kinda took control of the operators system. When the lines came through, the operators would give it the tones needed to carry on. With the blue box, you do that for her, only registering it as a free call. Once again though, the ESS can find these and tell where they came from, which is the exact reason why they aren't safe, because the will catch you in the act. I know this is probably old news to some of you, but hopefull some did not know what actually happened and know have that knowladge. Remember: The Night Belongs to...........The Dark Lord! =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= The Mickey Mouse Club's Guide To..... [ Electronic Surveillance ] Part I : Overview Wireless Transmitters By: [ Cardiac Arrest ] Special Thanks To : [ The Mad Bomber ] Introduction : This file is divided into two parts. In the first part of the ~~~~~~~~~~~~ file, I will try to present a general overview of bugging and electronic surveillance. The second part of this file deals with one method of bugging: Wireless transmitters. I will give a description of wireless transmitters and will show several variations of this method. I have called this file "Part I", but I'm not sure how many additional files (if any) will be added to this series. NOTE: I won't lie and say I'm an expert on bugging. I have NOT tried all of the methods presented here. However, between myself and The Mad Bomber, most of the bugs in this series have been tested. I am writing this to inform people of these methods and provide some simple methods that SHOULD work. I will also list all of my sources and also a list of mail-order companies that sell bugs and the like. [--------------------------------[ Overview ]---------------------------------] The American Heritage Dictionary defines "bug" as "A small hidden microphone or other device used for eavesdropping." Bugs of the late 80's-early 90's can be nearly any size. The cover of Popular Science (August 1987) shows an electret microphone 3/16 inch across at it's widest point. They can be placed so as to be nearly impossible to dectect. Bugs can be placed in electronic devices (such as phones or radios), wired into existing electrical wiring, or an empty pack of cigarettes. In this country, bugs are commonly sold as "home security devices" or "hearing aids", and in Europe an Asia, bugs are openly sold as bugs, although they're illegal there, as they are here. Bugs can be broken down into three basic classes: bugs with a microphone and a transmitter; bugs with only a microphone; and, bugs that sit inoperative until a specific radio signal is received. The first type are by far more common, being simple to make with components available at Radio Shack, or they can be assembled as plans, kits, or assembled, from companies such as Information Unlimited. With a few dollars and a little persistance, a person with little or no knowledge or electronics can assemble a simple bug in less than a day. Electronic surveillance is legal in only one highly controlled situation: when law-enforcement agencies receive a court order allowing surveillance of a suspect. However, bugs are widely used to get a leading edge over a competing corporation, for blackmailing purposes, or simply to find out a little more about a person. Hiding A Bug : There are several easy methods of hiding bugs, both from sight ~~~~~~~~~~~~ and detection. Sight is usually no problem. Simply drill a hole in the wall, insert the bug, and patch it up again, or cover it with a picture, etc. Or place it in the handset of a telephone. A matchbox is a perfect hiding place for a den or family room with a fireplace. The possiblities are as limitless as the bugger's imagination. Hiding the bug from detection is the tricky part. You could set the transmitter to a frequency very close to a local TV station, so that it is overlooked during scanning. More complicated bugs are possilbe of changing frequecies several times per second, but this is very expensive. One expert says that during the construction of a building that is to be bugged, simply mix thousands of diodes in with the concrete. That way, when scanned, the entire walls would appear to be bugged, and it would be impossible to guess where to start looking for real bugs. Passive bugs that turn on only when a certain radio signal is received could simply be turned off when a person enters the room. A more down-to-earth method would be to simply place the bug inside an electronic device, say, a simple radio. When the radio is scanned, the electronic devices inside the radio cover up the bug. Aquiring A Bug : Anyone with a little money can aquire a bug. It just depends ~~~~~~~~~~~~~~ on how much you're willing to spend. This could range from a few dollars to buy a Radio Shack wireless transmitter and removing the shell, to a black market bug in the thousands of dollars. Bugs are also readily available in kit form from mail-order companies for as cheap as $20. In several foreign contries, bugs are sold openly on the streets. Or, if you want to save a few bucks, you can go to Radio Shack, buy a few inexpensive components, and build your own. Some Interesting Bugs : From various sources I found some interesting ~~~~~~~~~~~~~~~~~~~~~ variations of bugs. These are some of my favorites. Martini Olive Bug ----------------- This now infamous bug was designed by a San Francisco security expert named Hal Lipset. To make a "martini olive", hollow out opposite ends of a piece. Throw all the components into these holes (there's only about 12). He also figured out how to cut open a small (AAA) battery and use the parts to make a tiny power supply. The olive is completed by making a mircophone out of foil. The olive shaped case is made with fiberglass putty. You can then make an antenna shaped like a toothpick. Just serve it to the person you wish to bug. Picture Hanger Bug ------------------ This one's looks like, of course, a picture hanger. It's about 1/4 inch long with a picture hanger on the end. Just drill a hole, insert the "hanger", and replace the picture. It could sit there forever without being discovered. Electret Bug ------------ This is the bug shown on the cover of Popular Science. It is of the second class of bugs, using only a microphone. You are required to run two thin wires to the bug for operation. However, this could be as simple as two thin stripes of metallic paint, covered up with normal house paint. An electret bug is made by polarizing certain types of plastics or waxes with a high voltage. A hole the size of a pinhead is where the sound enters. The bug pictured on Popular Science measured only 3/16 inch at it's widest point! Window/LASER Bug ---------------- When sound is generated, window panes vibrate slightly. Using inexpensive equipement, such as a General Electric H1A1 Laser and an astronomical reflecting telescope available from Edmund Scientific Company, these vibrations can be translated to reproduce the original sounds. This is done by bouncing the laser off of the window, and interpreting the modulations of the beam that returns. Computer Bug ------------ About three years ago, in Olympia, England, a British electronics engineer entered a computer show, where the emphasis was on somputer security, wheeling a cart. As he walked, he adjusted a few knobs and soon a display screen on his cart duplicated the monitor of an Epson PC AX. The machine cost under $500, and was designed by a Dutch researcher named Wim van Eck. A monitor works by a beam sweeping across the back of the screen. Whereever the monitor is to be dark, the beam is turned off. Where the monitor should be light, the beam is turned on. This switching of the beam creates a digital signal. Eck's machine translates this signal and transfers it to a receiving monitor. The only problem is synchronizing the sweeping beam. However, Eck built a circuit to discover the original sync and match the receiver to that signal. Toilet Bowl Bug --------------- Have you ever played that game in a swimming pool where one person talks and the other tries to figure out which direction it came from, but it seems to come from every direction? This is because water is an excellent conductor of sound waves. Get the picture? Why not just stick a bug on the piping of a toilet? That way, you could pick up all conversation (or any other noises) >from that bathroom. KGB Bug ------- In February of 1982, the manager of a Soviet airline was arrested for espionage. Authorities became suspicious of a scar on his chest, which he claimed was from an operation. After a closer look, however, they discovered that the KGB had surgically implanted a bug inside his chest to monitor all conversations occuring around him. What The Future Holds : As we enter the 90's, bugs will continue to become ~~~~~~~~~~~~~~~~~~~~~ smaller and less detectable. One possible solution to bugs that transmit continuously, which is easy to detect, is to have a bug that collects information, then sends it in short bursts. One speculation for such a bug could collect information for 15 seconds and send it in a burst of 1 microsecond. Another idea that is already possible in an impractical form, is a voice-activated bug that shuts off after a conversation is finished. There will also be great advances in bug detection. Although advanced detectors are available, they are very expensive. One such instrument, called the SuperScout, costs approximately $25,000. And that's owned by a private businessman. Makes you wonder what the government spends on bug detection.... Notes On Schematics : I'm sorry about the ASCII schematics, but there's not ~~~~~~~~~~~~~~~~~~~ really much I can do about it. I know it'd be better to do them in extended IBM ASCII, but we're hoping there might be some Apple (or otherwise) users reading this, too. Anyways, here's a "key" for some of the hard to understand symbols. II \ I< \ >I \ ___ \ These are all capacitors. / \ / ___ / ___ / / \ --\ \ \ \ Anything vaguely resembling this blob of ASCII is a semiconductor. I - / The lower case "V" represents the arrow normally present in / / schematics. --v / __ \ /// \ \ And \ Indicates Ground / ----- / --- / - / Hope this helps!! [--------------------------[ Wireless Transmitter ]---------------------------] Introduction : Wireless transmitters are by far the most common, the cheapest, ~~~~~~~~~~~~ and the easiest of all the bugs to build. I'll present two different wireless transmitters. They are all similar in design and function, but since availability of parts varies for each person, it can't hurt to have plans for both. The Mad Bomber and I have both tested both of the methods presented in this file. Method #1 : This method was found in Radio Electronics March 1989. This ~~~~~~~~~ method transmits over a very short distance (only a couple hundred feet). It transmits to any frequency in the normal FM band. The PC board in the book is a little less than 4 inches square, but you can make it smaller with a little patience. This is a good one to start with, since it's easy to build and uses common components. Required Components ------------------- Resistors (1/4-watt, %5) R1 - 100 ohms R2,R4 - 10,000 ohms R3 - 1000 ohms R5,R7 - 47,000 ohms R6 - 2.2 megohms R8 - 4700 ohms Capacitors C1 - 1.5 pF, ceramic disc C2 - 100 pF, NPO C3,C4 - 330 pF, NPO C5,C9 - 0.1 uF, NPO C6 - 0.001 uF, NPO C7 - 22 uF, electrolytic C8 - 6.8 uF, electrolytic C10 - 10-40 pF trimmer capacitor Semiconductors Q1 - BF199 or NTE229, or equivalent NPN transistor Q2 - BC183C or NTE199, or equivalent NPN transistor Other Components L1 - Coil, approximately 1 uH (more on this later) M1 - Electret microphone S1 - SPST switch Miscellaneous 9 volt battery 9 volt battery connector Wire for connections Case to put it in Solder Soldering Iron PC Board or "BreadBoard" NOTE : Complete kit available for $13.85 from Prospect Electronics, PO Box 9144, Allentown, PA 18105. Construction Notes ------------------ For the coil (L1), you'll need to either coil a wire or set an adjustable coil around 1 uH. Just make sure there's no bridged, or bad joints when you start it. Schematics ---------- ____ |------+-----+-------+----------------------+--------+------| \ / | | | | | | B | \/ C10 ___ L1 | | | | a | ANT | / \ | | | | | t - | C1 | | | | R7 | t --- |----I<-----+------| R4 C3 ___ | | e - | | / \ | | r | | | | +---+ | y | +-----\ | | +--R6---+ | | | | | \ | | C9 | | R8 | | | | I ---+-------+--I<---+\ | |C7 | | C6 | C2 ___ / | | \ | C5 | \ | + | / | / \ v Q1 | | I ---+--|<--+ ___ ___ | | | | | / | / \ -/ \ | +----| | | v Q2 | | | | | | | +-------| | | | | | | | | | | | | | | | | | | + M1 | | | R1 R2 C4 ___ R3 C8 ___ | | | | | | / \ | / \ - | | | | | | | | | | | | S1 | |------------+-------+-------+-------+------+---+----+-+ +-| | \ ----- + --- Ground - Operation --------- After you've built the transmitter, you have to set the frequency. Set a normal FM radio to an odd frequency. Radio Electronics recommends around 88MHz, but in my area up at the high end (108MHz) is a little better. Have a friend or brother or someone constantly speak into the microphone while you adjust the trimmer capacitor. At one setting or another, you should hear your friend's voice. That's all there is to it. Method #2 : I came across this design in a book called Build Your Own Laser, ~~~~~~~~~ Phaser, Ion Ray Gun & Other Working Space Age Products (I'll give a little more info on it in the source list), which is a VERY interesting book, with 3 different types of bugs, several LASERs, and some other goodies (like shock-wands, etc). This is an excellent device, because it is small and can, according to the book, transmit well over a mile (I've tested it to around a 1/2 mile) with a good antenna. It is very sensitive, and can transmit sounds >from all over a house. The tuning range covers the standard FM band, such as method #1, and also the lower end of the aircraft band, allowing a completely interference-free transmission. Required Components ------------------- Resistors (1/4-watt, 5%) R1 - 10k R2,R7, R7,R8 - 1k R3 - 100k R4 - 8.2k R5, R10 - 15k R9 - 3.9k R11 - 220 ohm Capacitors C1 - 100m/25 V small electrolytic C2 - 470 pF/50 V disc C3,C5 - 10 uF/50 V electrolytic C4,C9, C10 - .01/50 V disc C6 - 1 uF/50 V electrolytic C7 - 5 pF mica zero temp C8 - 6 35 pF trimmer Semiconductors Q1,Q2 - PN2222 or equivilent NPN transistor Miscellaneous M1 - FET capacitance microphone PB1 - Perfboard (BreadBoard) about 1 1/8" square CL1 - 9-volt battery clip WR1 - #24 wire B1 - 9-volt battery L1 - Coil (more on this) NOTE : Kit available from Information Unlimited(P.O. Box 716, Amherst, NH 03031). Price ranges depending on package. Construction Notes ------------------ The book recommends 1 5/8" square for the breadboard. My smallest has been a little less than that size, but I'm not that good at electronics. The Mad Bomber made one about 1" by 1/2". To make L1 (the coil), get a #8 wood screw (a pencil seems to work fine for me) and tightly wrap 5-10 turns of #16 buss wire around it. Schematics ---------- |----+------+----+------+------| |C1 | C2 | | | | ___ ___ | | | | ____ ___ / \ | | | | --+---+------| \ / A | | R1 R3 R4 | / | | | \/ n +----| | | | | C6 / | ___ C8 |L1 | t | | | +------|--I<--R8--+---+--+-I | / \ | | e __ | | / | | | | \ | v | +---| n /// WHITE | C4 | / | | | | v | | C9 | n __---------+-II-+---I | | | | | | +--II--+ a /M1\ RED | \ | | R9 R10 +--| | | \__/-+------| | v | ___ | | | __ | | ___ C3 | | +--| | C10 ___ | | | /// | | / \ R2 R5 | |C5 | | | | | | | | | | R6 ___ | | | | R11 | +--+------| | | / \ | |---+ | | | | +------+--| | | | | | __ | | __ | __ | /// __ | /// | /// | /// | | | |-----------------+-----------------+ B | a --- t-> - t --- e - r | y __ /// Operation --------- Pretty much the same as method number one. Be sure to tune carefully, or you'll overadjust and never find the frequency. Trust me on that one. The book also suggests marking the capacitor, which isn't too bad an idea, in case you accidentally move it. This bug is EXCELLENT for using in houses etc. You can also use it as a "walkie-talkie" when you're out field phreaking or something. Just get a walkman type headset radio, and havbe your friend do the same, and you can talk through the transmitter and listen through the radio. Sources of Information : This is a list of all the magazines I have or will ~~~~~~~~~~~~~~~~~~~~~~ use for this series of files. Books ----- "Build Your Own Laser, Phaser, Ion Ray Gun and Other Working Space-Age Projects" by Robert E. Iannini. Tab Books Inc., Blue Ridge Summit, PA 17214. $15.95. 389 Pages. "Electronic Telephone Projects" by Anthony J. Caristi. Howard W. Sams & Co., Inc., 4300 West 62nd Street, Indianapolis, IN 46268. $8.95. 168 Pages. Magazine Articles ----------------- "Bugging", Popular Science - August 1987. "Wireless FM Microphone", Radio Electronics - March 1989. "Micro-Sized Amplifier", Radio Electronics - August 1988. "Bug Detector", Radio Electronics - June 1989. "Tracking Down Bugs Using A Spectrum Analyzer", Radio Electronics - June 1989. Mail-Order Bugs : This is a list of some of the mail order companies that sell ~~~~~~~~~~~~~~~ bugs, and other items or interest. Some of them may not still exist. I haven't tried them lately. Information Unlimited, Inc. - P.O. Box 716, Amherst, NH 03031. 603-673-4730. Dirijo/Bond Electronics - P.O. Box 212, Lowell, NC 28098. Sierra Electronics - P.O. Box 709, Elfers, FL 34680-0709. Xandi Electronics - P.O. Box 25647, 60P, Tempe, AZ 85285-5647. Techtronics - 1715 Leaf Ave., Murfreesboro, TN 37130. N.A.S. - 213-631-3552. Spypro (045ER) - P.O. Box 45521, Seattle, WA 98145-0521. Mentor-Z - 135-53 No. Blvd., Flushing, NY 11354. Conclusion : That's about all I have on wireless voice transmitters for ~~~~~~~~~~ this issue. Part 2 will most likely be on telephone bugs. Well, that's the plan anyways, but this could change by the time I get to writing it. If you have any questions, comments, suggestions, complaints, or something you'd like to see in future files in this series, let me know. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= . ... . . . . . .. .. . . . . . . ___________________________ . .. . . . ...\ . . . . .. . .. . . . . . . . . . .. x . . . .. StarLink . . . .. . .. . \ . . ___________________________ .. \ . .. . . . . . .. . . .. . .. . . x . . . .. .. . .. .. . .. . .. . \ . .. By: . The Dark Lord StarLink is a really good system that is supposed to replace Pc Persuit. It has many features and improvements that Pc Persuit does not have. Starlink has other features Such as Up to date News Events, Many things on current affairs that have been happening lately, Inter- active Chat systems that many people can converse with each other through the use of there modems. It has many "Extras" available. Starlink is run by a company Called GTD or Galaxy Telecomunications Division. It is a large and established Telecommunication Company that is in no way a beginner to Telecommunications business. Most of the "Extras" are things that are provided by the other companies that are working with GTD to make Starlink the Best system of Long Distance calling Around. Companies such as Tymenet have joined with GTC to make this system the way they want it. One of the options available is, at the same time that you are using Starlink, be able to use the Tymnet OutDial, to have a farther reach over the United States. Not only does Starlink have the little options like the Chat Systems and such, the quality of calling has improved. The Phone lines are said to be Much clearer, so you don't have the the same amount of line noise that you get with Pc Persuit. It also has a much faster transmitting system. What I mean by that is there is not the horrible Delay that Pc Persuit has. I don't want to imply that there is no delay, because that type of tech- nology is not yet developed to the point were users will have no delays, but the delays have been cut down. There is also a large increase in the amount of areas available for making a call. Starlink has the capibility to call Ninty-One (91) different Cities and twenty-Eight (28) different States. The number of cities and states available for calling is increasing as the company expands. One other thing that is a good thing for the users of these systems but a bad thing for us hackers of the systems, is there is supposed to be increased security of the system. I do not know for sure if this is true, but it is something that has been said by a lot of people. By reading the contents of this file up to this point, you probably can't understand why a lot of Pc Persuit users have not switched over to Starlink. There are a couple of reasons for this. Number one, the system is new and people are still learning the things Starlink has to offer. Not only that, but there is one MAJOR flaw. You have to pay for all the extras that the system has, and for the people just looking for the Long Distance calling, they have no need for the other things, and the would have to pay extra to get what they would never have any use for. There is not just a little difference either. There is a repsectable margin in the prices with starlink not fairing to well. This probelm is said to lessen because Star- Link says that thier prices WILL go down after they have restored the fees that have been spent to start the system. Also, Pc Persuit is said to have a rise in there cost, to make the gap in affordablility decrease in size. Right now is the best time in the world for hackers. This is a new, good system that will suplly all the needs of the hackers, but besides the supposid "Increased Security" there is no other prepreation know to us made for the hacking of there system. Some might say "It is Ripe for the Picking". This system has not seen much action by the hacking community for a lot of the same reasons that the paying users have. The system is new and people are just now learning the system, and no one really knows what to expect. Once the system grows, there will be more experimentation by the hackers to see what the system is like. I hope that this Text file will increase the amount of ativity by the hackers. I hope that they will do more experimenting with the system and soon get accounts on the system. I do not feel that StarLink is ready for the hacking community, therefore it is a prime opportunity to explore and learn the system. There is software out much like Icex made specifically for Starlink and it is called "StarDial". The newest version that I have seen of this software is 2.0. Well, happy hacking and good luck. If you find out any additional information on StarLink, Hackers Unlimited would be extreamly greatfull for the information so we can update the file so others will have enough info to be sucessfull in hacking this system. Please leave any Information at any of our Distribution sites, Vmb's or any other ways you know of to get in Contact with A member of Hackers Unlimited. Thanks and.......... Remember: The Night Belongs to...............The Dark Lord! =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= __________________________________________________________________________ - - - A Home-made Conferencing System for Those With Multiple Phone Lines - - File Created by Fallen Angel - - 10 / 26 / 1989 - - - =________________________________________________________________________= There is a nifty little trick you can do if you have two or more phone lines in your house but don't have a phone that handles multiple lines and does conferencing. There is a very simple way to do it yourself with a switch and some phone wire. The schematic at the end is pretty simple and should be easy enough for the layman to decipher. Problem ------- I have three phone lines but no multi-line conferencing phone!!! Whaaaaaa! Solution -------- Two separate phone lines Telephone type wire Solder/soldering iron Prototyping circuit board (Known as breadboard or socketboard. Get it at Radio Shack if you are going to use it.) One phone (preferably with an auto-dialer and memory for a couple of numbers) Procedure --------- 1) Strip a few mm. of insulation from all of the phone line wires. 2) Plug the wires into the socketboard so that one line will have wires on different rows but on the same side. (*'s for phone wires, x's for switch wires. ------------- | *| x| x| *| ------------- | | | | | (Please excuse the ASCII drawing) ------------- | *| x| x| *| ------------- Now you can get a switch and connect 2 wires to one side (so each terminal has one wire) and 2 wires in the middle. This switch must be able to break the connection between the two lines, or else you will always be dialing out on two phone lines at the same time (it's cool to call a VMB this way) By now, you should have a piece of bread board with 4 phone wires that aren't connected to eachother and a switch with four wires hanging off it. (it should have 2 positions (one links middle to front, one links middle to back) you will want to hook up the line with the phone you will be using on it to the middle and the other line to the front. Take the two wires hanging out of the middle and plug them into the breadboard where your main line is hooked into. Take the wires hanging out the back and plug them into the lines on the breadboard with your other line. If when you pickup the phone and hear a fucked up dialtone, try switching the wires around like trading places with red/green on one side only. Technically, you have to hook red to green and red to green with the separate lines. Schematic Attempt ----------------- -- or | is phone wire. R1 470k resistors. SW1 should be the middle terminals of a six-pole, 3 setting switch. SW2 should be the end terminals of the same six-pole switch. SW3 should be between the lower-left terminal and middle-left terminals of a different six-pole switch. SW4 should be between the lower-right terminal and middle-right terminals of the six-pole switch that SW3 is connected to. line 1 line 2 ----------------o SW1 o--------------------\ | \ | \ | \ | \ R1 R1 \ | | Modular phone plug with an o o auto-dialing phone on it. \ \ / SW3 \ SW4 \ / o o / | | / ----------------o SW2 o--------------------/ line 1 \ line 2 \ Miscelaneous ------------ With enough tweaking of this, you can have a simple system of a memory dialing phone with the numbers of two favorite enemies set in. All you have to do is call the first, flip the switch and call the second. Make sure your phone has a mute button because you will be laughing so hard. I prototyped this on breadboard and you should consider starting yours on breadboard too. It is really helpful for debugging your circuit. =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 8888888888888888888888888 7_ Hacking Prodigy _7 ;;;;;;;;;;;;;;;;;;;;;;;;; By: The Dark Lord Hacking Prodigy is just like hacking any other type of system like Compuserve, Genie and stuff like that. They all run off the same basic format as the other. They have an account and the password which is the password of WHATEVER choosen by the owner of the account. The best way to hack Prodigy is to find some one that will be willing to help you, that has a account on the system. If they have an account, they can list all the users on that certain system, and when you list it it will tell you the owner of the account and the account number they have. If you know someone that is able and willing to do this for you then you have half of the battle won. Just enter the account number and look at the name of the owner of the account. I would estimate that about 10 percent of the users will use some part of thier name in the the password. Example: Account: EJA0632 Owner: Jamie Wallis Pass: J.W or Jamie Wallis Jam That is just an expamle. and with about 10 percent of the people using being dumb enough to do that you would think that you would have a real good chance, and in reality, you do but consider this, There are usually about 300 + users of it. 10 percent of 300 is thirty. Thirty users out of 300, that is still going to be a fun little job just to find one of those idoits, so don't just jump in thinking that you have it made. If you are not lucky enough to know someone that has an account, I will let you know some of the formats and lenghts of passwords and accounts. The passwords can be anything from Four to Ten digits long. They can consist of any type of charactors like numbers and letters. The Accounts are 7 digits, and it can be either letters and or numbers. dgit23j I have never found any programs like Pcp Code Hacker. So, most of the work that you have to do will have to be done manually, which will turn most hackers off. You can just hack through your ordinary term programm, but to use the system you have to have the software that they use. The software is simply called, yes, you got it, "Prodigy". You can pick up the software for about $30.00, but I see no reason for paying for it. MMC should soon have it out availible for download. It does have a copywrite on it, but thats what MMC is for right? If you would happen to get caught hacking prodigy, the punishment would be the same as it would for hacking any system, but the thing about it is prodigy is not a system that you have to worry about being traced on. On prodigy you get unlimited hours and up to 6 people can be on the same pass- word at the same time, so the user really isn't loosing out. You are probably wondering what good Prodigy would be for you? Well, other that the hacking of the system, I am not real familiar with it. From what I have heard from the people who use it though, you can do a lot of your carding through prodigy. There is also an On-Line catalog to do your carding from. They have catalogs that you can order computer equiptment and things like that. There are a lot of other little things that you can do, but other that, the rest are just the Prodigy B.S that pretty much worthless. Prodigy has the News, Online Games and Up to the minute sports and other usless stuff like that. You can also talk to others using the system, kind like an online chat with multipul people. The only reason that I hack Prodigy is for the Carding aspect of it. It is really nice. Like I said, I have done a decent amount of hacking on the system, but did much work internally, so I am not real sure about everything that is has to offer. Oh well..... I guess its the sport of hacking that is so attractive. REMEMBER: The Night Belongs to........The Dark Lord! =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Hackers Unlimited's............ - NATIONAL NEWS UPDATE - Raising Again? __________________ Yes you got it. The Phone company is trying to rip us off once again. Can you belive this crap? I heard a news report lately where the where taking to a spokes person for AT&T and they said it was so they could by new, more up to date Supplies. When asked what types, they replied some to keep up with the higher technology of the phone systems, some to replace old unsafe tools, and last but not least, better systems to control the problem of Phreakers. Ooooohhhh, sounds like a great solution to me. So they are saying to reduce and or stop the amount of phreakers is increase calling costs? Doesn't make much sence to me, how about you? I think the reason for phreaking is to avoid the tremendous costs of the phone company, but when you raise it, I think you might even be making more, right? It is still in the voting and setting up stages though, so it might not even go through, and until then, we should just keep our fingers crossed, because even though you wouldn't think an increase of costs would effect us, it will because some of the money is going to fight Phreakers. Hacking & Phreaking Update PBX Well we all thought PBX was safe. Well they still are basicly, but there is now a new thing that us hackers just found out. It seems that they can call your phone company and get your number, which they can tell what phone company you used by a type of user log that has all the information. On this user log they have the phone number from were the call is being made. >From this number they can bill ya. Well we use to beable just to use them but it seems that they do not want to be ripped off no longer. PBX is such a big system that they usually don't even want to bother. But now there are so many people useing them that they don't know what to do, so instead of shutting down the system they are going to bust. It isn't just us hackers that use these codes but even DRUGGIES, Civilized Bussiness people, and many other people. What is wierd is how they drugies got started, they don't use war dialers or anything, but maybe one of our fellow hackers told them. It don't really matter it is just that from thier stupid ways is how we got reconized. I was watching Current Afair the other night and they were talking about Phone Crimes, they caught a billion drugies in the act. Then they found how we were useing Code Thief and other programs to do our work. They even know how to get programs and how to use them. What bothers me is that now it seems that not ONE code is working at the time. Other systems have been busting people also just not PBX, I just am reporting on this because of the number of people who use them. On the TV show I was watching they said that about a third of the use was from ilegal purposes. And the other 2 thirds was from PBX support companies. They estimated that phone criminals have a bill of $80,000 over the whole bill. The bill isn't very high but what they say it is still a lot. We pay for these long distance calls, that PBX is transmitting, threw TAXES. Can you believe it, and they expect us to be good an dnot use them like we do, well that is a bunch of shit. Our taxes should not be used for this, but in fact the comanies who use them. They are cracking down on the users that should not be using these codes. So this is not telling to to stop but just a little reminder to be careful on what you use. Cable Piracy Well I know almost half of us have used cable ilegaly, but now is not the time to start. They now have strongly busted people who are hooked up illegal. They say if you get caught then you will pay $10,000 fine and a 1 year sentence in jail. What is funny is that they say if you call them and say you have it hooked up they will just forget the time you used it illegal and just start sending you bills. Well I don't know if that is true but why would you tell them anyway. I mean why bother, they will just bug the hell out of ya anyway, well I don't really know if they will but they say they wont, they call it the ask no questions plan. It has just been in the last few weeks that this has been on the news and on comercials on TV. Anyway my point is if you have it hooked up illeglly then think about what you are doing and see how hard they are busting down in your area, and if you do not have it hooked up but thinking about it well the choice is up to you. Just make sure that you do not get caught. If you are under 18 it will be your parents that get in deep shit. VMB VMB's (Voice Mail Boxes) are seeming to decline. There use to be over 30 boxes, in which half of them were codelines. Since they reconized that we are taking boxes it seems that they are changing every day. I have never hacked a VMB myself but there are a few guys who have for me. In which they say is a "Bitch". I was given about 5 boxes on one system and lost all of them in about a week. Some have there ways of telling others just get complains from the real box owner. Boxes seem to get harder and harder to hack even though they use to be easy (as I am told). The password format changes everyday, the boxes are gone with in a couple, but with this pain do you think we will stop? NO! Hackers seem to find boxes or hack them out some how. They probably stay up all night just to get one box, and then it is gone with in a day. I don't know about you but that is the TRUE hacker to me. Hackers aren't suppose to give up, they are suppose to be on the move at least an hour a day. The thing is, is that some hackers are kids (13-18) and have to go to school. But why can't they just take some time after school and hack a VMB or a CODE or some other system. VMB's have been around for a long time, but it seems that we just relized them yesterday. One thing that worries me is that will hackers stop hacking? Well I don't really think so, since man lived in caves there was hacking. VMB's will come and go but there will allways be one that is in control of a hacker. Field Phreaking I allways loved going out and doing a little field phreaking at night. But the thing that bothers me is how many people have dogs! I think that there should be a limit on how many dogs are in a neigborhood. But the more dogs I guess the more fun, right? There are so many things that seems so fun in the field, fences you have to climb, dogs you have to kick, people you have to run from, and most of all scaring the shit out of some person who has seen you. Field Phreaking is very fun and I encourge everyone to try it. If you don't know what this is then try and find out from another hacker or just download a text file from your local hacking board. Though I haven't really got in to the REAL excitement of fielding, I did get in to it a little and tried a lot, it still seems like a lot of fun. I mean you wont have to pay for the call and wouldn't have to bother with codes. All you would need if you wanted to modem it on the field job is get yourself a Laptop Computer. Hell if you are in to carding just TRY carding you one, the chances on it is very slim but still, what the hell. You get out in the field and start a conference and you feel good to brag a little about how you are calling from Neigbor BOBS house. Cristifer Columbus =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Jesters Guide to.... {- 950-0266's for the new Phreaker -} {- 11\6\89 -} This is a file I just decided to write, right after a guy that lives near me, who runs a bbs complained about his outrageously high phone bill, and being that I use 0266's I decided that I would TRY to write a text file on how to use the 0266's as a simple way of phreaking. I am not an expert on the subject and I don't claim to be, I am just writing this file to try to help out others that are in the same experiance level as the guy that I was talking about previouly in the file. There are many different types of 950's, but the type I use is the 950-0266 and I use these because that is what I was taught with and they seem like a fairly good, and easy way to phreak. 950-0266s are known to have VERY clean lines, so they are perfect to use with modems. The basic format for these codes are: (1) Dial 950-0266 (2) Wait for tone then dial your 7 digit Code (3) Right after dialing your Code dial your ACN (Area Code Number) I.E. if I were to call my friend Joe in Utah, I would do this... 950-0266 (tone) XXXXXXX8015551234 The X's stand for the 7 digit code 950's have known to be dangerouse, they are on ESS (electronic switching service) which is a phreaks nightmare. Being that 950's are on the ESS they can, and have been known to trace. The type of tracing service on 950's can trace in a heart beat, so there is somewhat a great risk in using these. * Some precautions about using 950s - Do NOT use the same code for more then 3 days. Try to use different codes if you have them i.e. call one board with a code like 2314211 , and then call the next board with a totally different code. Use these codes during prime time, to cut the risk of getting caught down. And use these in moderation, do not get crazy with them. I hope this file hasnt been to much of a waste of time, I hope it has offered some help to you in using 950-0266's. I would like to have suggestions and comments on what you think of my file. If you have valid Input, please let me know your opinion on one of my Vmb's. Obviously Vmb's don't last forever, but as for this now it is valid..... Editors Note: Jesters Box has just been cut before the release of the magizine, so as of this time, he has no Vmb's available for comments. Information will be updated as it is recived. Thanks Copyright (C) 1989 by -NecroiDaemon =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= The Dark Lords.............. }2 (NNNNNNNNN] Top 10 BBS's sNNNNNNNNN) |6 [Message Bases:] 1. The Vulcan Way (303)979-9418 2. The Discordian Society (303)973-3472 3. Late Night Prowl (303)499-2928 4. Inter World (303)363-7960 5. Hack Shack II (303)782-0215 6. The Vulgar Unicorn (303)680-8622 7. ShockWave (303)469-3510 8. Insane Asylum (303)447-2691 9. Forbidden Planet (303)755-5934 10. Software Exchange (303)779-4451 [File Bases:] 1. Late Night Prowl 2. The Discordian Society 3. ShockWave 4. Inter World 5. Vulgar Unicorn 6. Vulcan Way 7. Forbidden Planet 8. Hack Shack II 9. Insane Asylum 10. Software Exchange [Sysops:] 1. Late Night Prowl [The Fritz] 2. Hack Shack II [Kedma Oediv] 3. Vulcan Way [Spock] 4. Inter World [Tushka] 5. Vulgar Unicorn [Lore Master] 6. ShockWave [ShockWave Rider] 7. Insane Asylum [Live Wire] 8. Forbidden Planet [Dr. Morbius] 9. The Discordian Society [Hagbard Celine] 10. Teminal Entry [The Dream Master] (303)794-2083 [Hack\Phreak Oriented:] 1. Terminal Entry 2. Late Night Prowl 3. The Discordian Society 4. Hack Shack II 5. Insane Asylum 6. Software Exchange 7. N\A 8. N\A 9. N\A 10. N\A [All Around:] 1. Late Night Prowl 2. The Discordian Society 3. Hack Shack II 4. The Vulcan Way 5. Inter World 6. The Vulgar Unicorn 7. ShockWave -- \ The Two Tied.... 8. Insane Asylum -- / 9. Terminal Entry 10. Forbidden Planet I would like to take this time to Explain to you how this was judged. First, both me and Cardiac Judged the BBS's on there rating. Once all the catagories were filled, we went on a 1-10 scale and the one with the most points won. This listing is of only Colorado boards, and in no way are they the best out, but I wanted to start somewhere. Heres what we am going to do. Leave me your nominations for the best boards in any of the topics besides overall best board. Once you send in your nomination we will look at the board and judge it. I think the "Best Sysop" part will be taken out though due to that fact that a couple of calls cannot distiguish the Sysops at all. Remember: The Night Belongs to..........The Dark Lord! =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= E \ \ \ [- CBI's -] \ \ \ . First off, If you are wondering What a CBI is it is like a TRW but has a different setup. You can call and with the right information on the person you can get the credit cards that they now own, and there credit history and all the cards that they ever had. These are as touchy (Dangerous) to use as TRW's but just as much fun. This is a good thing for carders. It is a way to find a person that is rich, and get the info that you need on them, and the get there card and CHARGE, CHARGE, CHARGE! CBI's will tell you the amount that you are allow to charge and the whole 10 yards. This is also a very effective way of taking care of people that you don't particuarly care for. All ya have to do it find there card (Mom Or Dads) and work from there. Open your mind to it though. Don't just charge with it, do much more, post it on boards and VMB's, Get the needed accounts and close there account. In other words, make it to where they can no longer charge on that card because it has been, how should we say....."CUT". You could also order all the things possible with the card and have it all sent to the front door of the person that you are getting back at an have everything addressed to him. If he/She is living with the folks, its Murder time, and if not, they have to explain why they are returning all the stuff and why they went over there carge limit. They Way CBI's are set up, this is the procedure you will need to take: 1. You will call and get a connection. Most CBIs will be 300 baud and you will need the settings of 7-E-1. 2. You will need to carrage return Three times. Once you have done that, hit CTRL-S followed by another return 3. Enter the Account. Then Enter another CTRL-S. After that input the Lastname, First name, then the Middle Initial. Ex. Wood Sam K 4. Hit a Return and wait for a couple of seconds (5-10) 5. Enter the Address, Apt Num. etc..., City then the State and last but not least the ZipCode. The State MUST be an abreviation. 6. Once again hit the CTRL-S and you can work it from there, doing what you need to with the card. Now, all you need is an account and a Dial up. There should be one near you, kinda like a 7-11. but I don't have the dial ups to any except for the one in the 713 Area code, which is.....(713)591-8900. Since this is a unsecure thing to use, I would suggest a diverter or something like that, just makes it a little funner becuase you have better odds of fully succeding. Remember: The Night Belongs to............The Dark Lord! =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Hackers Unlimited wants....... YOU!!!!! The Editors Of Hackers Unlimited would like your input on a couple of issues. They all concernce the format and the workings of the magazine. We need to know.... o Should H.U be One BIG file or all the individual files o How often should an issue be put out o How big should each issue be These are all questions that we would like your input on. We have an idea how we want it, but it is still up in the air and your opinions would be appreciated. Let us know through any of the ways that we have listed through out the magazine. Thanks - The Editors =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= ___________________________________ ENNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN W -- Rumors of '89 -- W .NNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNNN By: The Dark Lord There has been many rumors that have floated around in the year of 1989 and I imagine there will be a lot more seening that the year is not over yet. The first on that I heard was the one involving FHP (Federation of Hackers and Phreakers). They are a so called "ELITE" group and only the "Proud Few" get in. Around July of this year, there was a rumor going around about a spy, if you want to call it that, within the ranks of FHP. Supposidly the spy was giving away the working codes to the Phone Companies and giving away the dial-up that are used a lot because they are considered to be safe. The spy also was said to be turning in a lot of the memebers of FHP and some other in and out of the orginization. FHP took immediate action in freezing all applications until the whole ordeal blows over. I cannot tell you whether this rumor was or was not true, simply because I was and outsider looking in. I was not in the group, and besides what information I had gathered I did not know what was actually going on within the group. I dunno if FHP actually found the person, if the person left, but was never descovered, or that "Person" was just a rumor. Either way, there was disorder within the group because as I recall I had sent in my application and I was assured in by one of the Higher members, but they never seemed to, Unfreeze, the application process. Nothing against FHP, but from wht I see where it is going now, I am kind of glad. Another rumor was one of a Pcp Code. It was a carded account and it was caught before the person recived the information on the account (Pass, account #, etc....). Instead of killing the account and not sending the informtion to person, they went on with it but traced the account. I am not sure how often they traced but I imagine that it was a decent amount. I dunno if this rumor was actually true of just a coinsidence but a person I know did get snagged on a Pcp. Hopefully you do learn for this little expedition, that it is not one of the wiser things to do, Carding a Pcp account that is. Yet Another Rumor that was going around is a trap Pbx. The dial up for this Pbx is still in service. It had the procedure of 9 + 1 + ACN and that was said to be specifically designed as a trap. I have used Pbx's for a long time now and to this day I have never heard of ANYONE getting in any trouble over any Pbx's, that is the reason I had trouble beliving it. Once I heard this rumor, I did a little research of my own on the Pbx's and I found a couple of intresting this proving the rumor to be false. Let me give you a list of them, then I will explain them more thouroghly. d No one had been Busted for the Code d The Part that was set up for the trap was the same procedure as most. d That dial-up, to that point was supposidly "Virgin" d Phone company workers said nothing was said about that particular one d Difficulty of a Pbx trace d The attitude taken by the Pbx owner Those are the major pieces of information that I got. First, no one was busted on the code. The whole rumor was total speculation. Second, The thing that was supposidly the "Trap" part of the code (9+1+ACN) was the procedure used by multiple Pbx systems. Third, the dial up for the Pbx was supposidly Virgin which would mean that the owner of the Pbx system would have to move extreamly fast. Fourth, I know many people that work for the phone company. They hear a lot of the stuff that is going around, and some even do the traces themselves and none that I talked to heard a thing about it although there are many that they never hear about. Fifth, One on the workers of the phone company that I know has installed a lot of Vmb and Pbx systems. He said that it is REALLY hard to trace on a Pbx because of all the switching the system does. And he even went on to say, if you get on certain trunks in the system it is nearly IMPOSSIBLE to trace. Last, the attitude of most of the companies owning the Pbx is in the favor of the phreakers. They are so big, they never miss the money, and not only that, they can take the damn thing as a tax write-Off. Before I go any further, I would like to thank the people who supplied me this information. I will only mention one, because he is the only one that has an alias. That person is Kedma Oediv. Thanks Kedma!! The Last one that I will talk about is really vauge. I have heard VERY little about this one, but I figured that you might like to hear about it. It is a very new one, and supposidly there is a FBI agent in the 804 area code, logging on most of the pirate boards, gathering informtion on people so they make make a bust. That is all I know about it, but it is kinda a word of caution. If you call or live in this area, you want to be a little cautious, but don't worry about it. Ninty percent of the rumors I have heard I have gathered enough information to say that they were a bunch of crap. Well there was a couple others, and like I said, I imagine many more, but those are some of the ones that I heard the most about. I will try to keep you updated on the newest ones, so you can put them to rest once and for all, cause I know I have wondered about some of those that are still hanging around in the air somewhere. One last thing that although is Kinda Dorky, but I just HAD to add this for some reason. Well its really not a rumor, but I'll say it is for the sake of argument. Teenage Warroir is a COMPLETE DICK, and has Millions of alias's just so he can get access to boards. REMEMBER: The Night Belongs to............The Dark Lord! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Hackers Unlimited........... ___________________________________________ / \ - Phreak\Hack Definitions - \___________________________________________/ \_________________________________/ ACD...............Automatic Call Distributer ACN...............Area Code Number AIS...............Automatic Intercept System ANI...............Automatic Number Identification BHC...............Busy Hour Calls CAMA..............Centralized Automatic Message Accounting CCIS..............Common Channel Interoffice Signaling CCITT.............International Telegraph and Telephone Consultive Comm. CDO...............Community Dial Office CO................Central Office DDD...............Direct Distance Dialing EOTT..............End office Toll Trunking ESB...............Emergency Service Bureau ESS...............Electronic Switching System ETS...............Electronic Translation System MF................MultiFrequency NPA...............Numbering Plan Area ONI...............Operator Number Identification PBX...............Private Branch Exchange POTS..............Plain Old Telephone Service ROTL..............Remote Office Test Line RTA...............Remote Trunk Arrangment SF................Single Frequency SxS...............Step By Step TSPS..............Traffic Service Position System There will be other definitions added in the next addition, and most of these were either from our own knowladge or from the BIG Phreakers manual, I appoligize for that, and appoligize that there is no definitions but there was and still is a BIG request for an overview of definitions, and we just ran out of time, so just bear with us. Thanks!!!! - The Editors =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Hackers Unlimited Listings -=] VMB's [=- Were Sorry, but The VMB's had a last minute Problem with most all listed being killed, so instead of a last minute revision, It will not be included. We will have an updated on in the next issue. -=] ----------------------------------------------------------------------- [=- -=] BBS's [=- Fone Number Name Baud Comment ----------------=============================--------========================== (201)502-9115 Underground II 2400 Sysop : Rambone (205)554-0480 FireBase Eagle 9600 Pirate Master Distribution (205)979-2983 Byte Me 2400 Sysop : Omega Ohm (206)255-1282 Ethereal Dimension 2400 Wasington's Finest (206)352-4606 Alternate Reality 2400 Sysop : Mr. Classic (206)462-7718 The Void 2400 Sysop : Zeke (206)827-2029 The End 2400 (206)839-5865 Neutral Zone 2400 Home Of TWNC (213)476-6490 Mystic Knight 2400 Sysop : The Sniper (213)833-8309 Insomnia 2400 (217)332-4019 Golf City BBS 2400 Sysop : Egghead Dude (217)359-2071 Realm Of Darkness 2400 Sysop : Dark Shadow (303)363-7960 The Inter World 2400 Sysop : Tushka (303)499-2928 The Late Night Prowl 2400 Phreak/Hack (303)649-3510 Shockwave 14.8k Telegard Beta Site (303)680-8622 The Vulgar Unicorn 2400 Games Only (303)755-5934 The Forbidden Planet 2400 Utilities Only (303)779-4451 The Software Exchange 2400 Sysop : The Gigilo (303)794-2083 Dragon's Bane 1200 3pm-7pm Mountain Time (303)933-3472 The Discordian Society 9600 Discordia Stuff (303)979-9418 The Vulcan Way 2400 Star Trekkies (312)297-5385 Gamer's Galaxy 2400 Sysop : Robocop (408)446-0316 Lake Of Dreams 2400 Sysop : Grey Ghost (408)268-6692 Billionaire Boys Club 9600 Home Sentinel BBS Prog. (408)735-8685 Dragon's Heaven 2400 Wares Galore (409)763-4032 Smash Palace South 2400 Phreak/Hack (617)364-3304 Swift's Ridge 2400 Sysop : Sir Swift (717)566-1129 The Frozen Desert 2400 Phreak/Hack (801)298-1736 Port o' Tales 2400 Sysop : Black Beard (801)486-5918 Crazy Nights 2400 Phreak/Hack (817)545-5031 Satan's Hollow 1200 MMC Dist. Site #1 **NOTE : Don't complain about inaccuracies or missing numbers. I whipped this up on the spur of the moment, and I didn't have time to gather information. So PLEASE contact me with additions or corrections. -=]-----------------------------------------------------------------------[=- If you wish to submit any additions, deletions, or corrections, please contact C ardiac Arrest. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= -==>>>> PLEASE READ THIS!!!!!!!! <<<<==-- ^^^^^^^^^^^^^^^^^^^^^^^^ A lot of the listing and things like that might be WAY out of wack. It is extreamly hard to keep up with the listing due to the way all the Vmb's and stuff die so rapidly. The problem wasn't as bad as in the last issue, but there has just been a massive killing on the boxes, and a lot more are expected to go, so like I said, its hard to keep an accurate list right now. Sorry for the inconvience, but we will try to keep it as up to date as we can up to the release of this issue. Thanks.... - The Hackers Unlimited Staff =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= **Additional Note: The information in this magazine is subject to change. We, the writers have no control over the change of these thing, nor do we know when and what they will be changed to. Things such as VMB's, dial-ups, etc. may die or be changed and the information in this will no longer be valid. We will be releasing other editions of this magazine in hope that the information will all be up to date and of use to all that read the magazine. As you may know we cannot keep up with some of the changes and things that happen to the things we have mentioned. Due to that, we ask your support in letting us know of these changes and such through or Mickey Mouse Club VMB, if of course, it is still valid, or through distribution sites or any other ways the you know of to get in touch with one or more members of MMC. Not only will we accept information on changes, we welcome any new and/or better information, tips etc. Let us know if you would like to write a section of this magazine, and what you would like to write. We are rather picky about what is put into our magazine, but that is because we want the utmost quality. Please don't be intimidated by the standards we have set, we still would appreciate the chance to see the things that you have written, as there is a lot of valuable information that could help the effort in improving this magazine. Well, that is it for "Hackers Unlimited". We hope you enjoyed, and have gotten a lot of information from, it. There was a lot of time, and a lot of effort put into this from a lot of fine writers. The editors of Hackers Unlimited would like to thank these people for contibuting to this fine piece of writing, both in the writing of articles and the support of this project : Jester Fallen Angel Cristifer Columbus Doc Silicon Plus the Editors: The Dark Lord Cardiac Arrest And all the people that didn't laugh at the name The Mickey Mouse Club We hope this magazine has provided you with more knowledge than when you started reading it. If you have, we ask that you use this knowledge for not only the benefit of you, but for the benefit of others. There are a lot of beginners in the areas that we have talked about throughout this magazine, and all they need is the know-how and a little experience to make them into good phreakers, hackers, carders, you name it. Well, once again, thanks to all who contributed to Hackers Unlimited and thank you for reading, (and hopefully) enjoying and distributing Hackers Unlimited Magazine, a Mickey Mouse Club production! des