-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- = = - WELCOME TO THE TWENTY-SECOND ISSUE OF - = = - -=>PHANTASY<=- - = = - A PUBLICATION AND NEWSLETTER OF - = = - THE - = INTERNATIONAL = - INFORMATION - = RETRIEVAL = - GUILD - = = - Hacking,Phreaking,Anarchy,Survivalism,Commentary - = = -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Volume Number Six - Issue Number Twenty-Two - Dated 04/01/95 Editor is Mercenary : mercenary@iirg.com Phantasy Article Submissions: submit@iirg.com or VIA Snail-Mail to: The Mercenary/IIRG 862 Farmington Avenue Suite 306 Bristol,Ct 06010 Phantasy Subscriptions: Please send all subsription requests to: subscribe@iirg.com IIRG World Headquarters BBS: The Rune Stone (iirg.com) 14.4K HST Courier 9600 V.32 (2o3).832.8441 or 0.700.THE.IIRG NUP: cyberdeck Table of Discontents: [1] IIRG News Update By: Mercenary/IIRG mercenary@iirg.com [2] Blitzkrieg BBS Returns By: Predat0r predat0r@iirg.com [3] Check Games By: Dark Grif dark.grif@iirg.com [4] Cellular Interception Techniques By: Thomas Icom/IIRG thomas.icom@iirg.com [5] Department Store Scam By: Dark Grif dark.grif@iirg.com [6] The Rumor Mill (Unconfirmed Rumors From the Underground) Edited By: Mercenary 1. Touch Tone - Straight to Video Phreak Movie? 2. Warning! - Media Smear Attempt 3. Red Box Arrest of Bernie S. 4. Bernie S. Update 5. Ode to iXOM [7] Phantasy Book Reviews By: Thomas Icom/IIRG thomas.icom@iirg.com [8] PHANTASY TIDBITS: News and Views of Interest 1. Hong Kong Police Close Down 8 Internet Providers 2. Computer Hackers Sentenced to Federal Prison 3. Connix - The Connecticut Internet Exchange [9] Upcoming Conferences and Conventions 1. DEF CON III Convention Update 2. IIRG to Sponser CT 2600 Meetings 3. IIRG FREE-NET - Shameless Begging [10] Listing of IIRG Distribution Sites [11] Listing of PHANTASY Distribution Sites -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- OFFICIAL DISCLAIMER... All information in PHANTASY is from USER contributed material The Publishers and Editors of PHANTASY and THE IIRG disclaim any liability from any damages of any type that the reader or user of such information contained within this newsletter may encounter from the use of said information. All files are brought to you for entertainment purposes only! We also assume all information infringes no copyrights and hereby disclaim any liability. PHANTASY is (C) 1990 by The IIRG IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [1]: IIRG News Update By: Mercenary/IIRG mercenary@iirg.com ////// ////// /////// //////// // // // // // // // /////// // //// // // // // // // ////// * ////// * // // * ///////// * The International Information Retrieval Guild --------------------------------------------- Well as usual, were behind in our publishing schedule once again. I'll blame events that have been beyond our control for the reason, and anyone that knows us personally will understand why. The group has finally gotten down to business and you should be hearing much more out of us shortly. For now, We'd like to inform you about the IIRG archive sites and projects we've put together for this year. Please read our shameless begging near the end of the issue, especially if your a Connecticut resident. -*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*- Hatebreeder has been working on getting the IIRG Web Site together. It still isn't 100%, but he tells me it's getting there. Check it out at: http://necrox.nso.uchc.edu/iirgx\iirg.htm The IIRG also has a new anonymous FTP site at necrox.nso.uchc.edu The IIRG files are in pub/iirg/ This FTP site is also run by Hatebreeder for the IIRG and contains the following IIRG files at this time. 37706 IIRG#10.ZIP - The IIRG Hackers Acronym List Issue #10 32035 IIRGACR9.ZIP - The IIRG Hackers Acronym List Issue #09 71240 IIRGTJ01.ZIP - The IIRG Technical Journal Issue #1 231912 IIRGTJ02.ZIP - The IIRG Technical Journal Issue #2 9371 PHANTC01.ZIP - Phantasy Magazine Issue #01 11669 PHANTC02.ZIP - Phantasy Magazine Issue #02 11414 PHANTC03.ZIP - Phantasy Magazine Issue #03 13034 PHANTC04.ZIP - Phantasy Magazine Issue #04 12373 PHANTC05.ZIP - Phantasy Magazine Issue #05 22138 PHANTC06.ZIP - Phantasy Magazine Issue #06 22043 PHANTC07.ZIP - Phantasy Magazine Issue #07 19081 PHANTC08.ZIP - Phantasy Magazine Issue #08 11693 PHANTC09.ZIP - Phantasy Magazine Issue #09 22198 PHANTC10.ZIP - Phantasy Magazine Issue #10 18504 PHANTC11.ZIP - Phantasy Magazine Issue #11 21417 PHANTC12.ZIP - Phantasy Magazine Issue #12 26952 PHANTC13.ZIP - Phantasy Magazine Issue #13 14853 PHANTC14.ZIP - Phantasy Magazine Issue #14 23856 PHANTC15.ZIP - Phantasy Magazine Issue #15 18975 PHANTC16.ZIP - Phantasy Magazine Issue #16 22742 PHANTC17.ZIP - Phantasy Magazine Issue #17 33410 PHANTC18.ZIP - Phantasy Magazine Issue #18 289995 PHANTC19.ZIP - Phantasy Magazine Issue #19 164769 PHANTC20.ZIP - Phantasy Magazine Issue #20 17273 PHANTC21.ZIP - Phantasy Magazine Issue #21 -*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*- The IIRG also has a Phantasy Archive via anonymous FTP site at l0pht.com The Phantasy Issues are in pub/iirg/ 24971 Dec 28 00:03 phan01.01 - Phantasy Magazine Issue #01 27050 Dec 28 00:03 phan01.02 - Phantasy Magazine Issue #02 25251 Dec 28 00:03 phan01.03 - Phantasy Magazine Issue #03 37567 Dec 28 00:03 phan02.04 - Phantasy Magazine Issue #04 29898 Dec 28 00:03 phan02.05 - Phantasy Magazine Issue #05 53818 Dec 28 00:03 phan03.06 - Phantasy Magazine Issue #06 55005 Dec 28 00:03 phan03.07 - Phantasy Magazine Issue #07 52131 Dec 28 00:03 phan03.08 - Phantasy Magazine Issue #08 30583 Dec 28 00:03 phan03.09 - Phantasy Magazine Issue #09 57443 Dec 28 00:03 phan03.10 - Phantasy Magazine Issue #10 46618 Dec 28 00:03 phan03.11 - Phantasy Magazine Issue #11 55637 Dec 28 00:03 phan03.12 - Phantasy Magazine Issue #12 60305 Dec 28 00:03 phan03.13 - Phantasy Magazine Issue #13 38957 Dec 28 00:03 phan03.14 - Phantasy Magazine Issue #14 60575 Dec 28 00:03 phan03.15 - Phantasy Magazine Issue #15 47844 Dec 28 00:03 phan03.16 - Phantasy Magazine Issue #16 56248 Dec 28 00:03 phan03.17 - Phantasy Magazine Issue #17 83753 Dec 28 00:03 phan03.18 - Phantasy Magazine Issue #18 70226 Dec 28 00:03 phan04.19 - Phantasy Magazine Issue #19 120363 Dec 28 00:03 phan04.20 - Phantasy Magazine Issue #20 44483 Dec 28 00:03 phan05.21 - Phantasy Magazine Issue #21 -*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*- Probably one of the most important developments for the IIRG has been our ability to finally return the Rune Stone to it's status of being a FREE BBS. We've added our own net address (iirg.com), and offer Internet e-mail to our users. Please feel free to apply at : The Rune Stone BBS (2o3).832.8441 IIRG WHQ o.(7oo).THE.IIRG NUP: cyberdeck IIRGnet WHQ iirg.com HackerNet 666:2203/0 The Rune Stone is a Private BBS for Supporters and Members of the I.I.R.G. Everyone is welcome to apply, (except Reporters and Law-Enforcement). But please note - our users will decide if you achieve access or not as they shall vote on you. Users under the age of 16 will be limited in access if accepted onto the system. We have one of the largest collections of Hack/Phreak Texts and Utilities in the country archived for our users. Obtain the Latest Issues of Phantasy and other IIRG files We offer free Internet E-mail to our users and an automated FTPmail file retrieval system. We also offer online CNA mail, utilizing the Pro-Phone CD collection as well as encrypted Secure mail. NO K-RaD eLiTE WaRez - ALL H/P! - NO Membership Fees - -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [2]: Blitzkrieg BBS Returns Contact: Predat0r predat0r@iirg.com I know many of you will remember the former Blitzkrieg BBS run by Predat0r. Well the system has returned and he's asked us to invite our readers to once again joim his system. We've also already added his system back on as an official Phantasy/IIRG release site. So be sure to give him a ring. Blitzkrieg (5o2).493.8345 Supra 14400 SysOp - Predat0r WWIV 4.23 NUP - Initium -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [3]: Check Games By: Dark Grif dark.grif@iirg.com =========== CHECK GAMES =========== By: Dark Grif TO THE DUMB IDIOT'S: WHAT IS CHECK SYSTEMS AND TELECREDIT? ========================================================== CheckSystems is the U.S. wide computer that all F.D.I.C. insured banks use to check you out before allowing you to open an account. The way you get in Check Systems is by fucking up your account by oweing money and never paying it and forcing them to close, or by EXCESSIVE (usualy more than 25) check bouncing activity. If you havent done any of this, youre not in C.S. and you can open an account anywhere. HOW TO GET OUT OF CHECK SYSTEMS IS EASY: 1. You must PAY OFF the account you fucked up. A> By going into the same bank and dealing with the manager directly. After you pay off your old account, (and sing your sad song how you fucked up in your youth, and you gotta job now and your on the up and up whatever) It is with in the managers power to erase you from C.S. just like that, So flirting is a plus and having about a $1000 bucks or so right there to open a new account with him is a shoe in. B> Find out the collection agency that is handling your fucked up account and tell them your ready to settle at 50-60cents on the dollar, they'll usually go for it, pending on how much you owe, they're not shy to take 20 cents on the dollar. This way will not get you out of C.S. but it will show as satisfied. Go seek out another back with a friendly manager and explain your fucked up situation and tell him how your on the up and up these days and show him a grand or few hundred your going to open a new account up with, and your in. C> Always remember that even if you never pay off your accounts and your in CheckSystems, A bank manager always has the power to say Fuck Check Systems, and hook you up anyway. TELECREDIT / TELECHECK is a credit bureau for checkwriters that most major department stores, supermarkets, and businesses use. There are others, this is the biggest. They are not 100% accurate, for the majority of the time when a vendor takes your check he goes to the machine and punches it in, it just checks to see if the account is valid/open then it gives you an approval #. Many think the approval is for the amount of the check, bullshit.. its only cause the CHECK NUMBER has not been used before and the account is not closed. Telecredit is linked to your drivers license number, not your checking account. Example situations: You are in May Co. department store, you have bounced a check to them before and never paid it. Your license # goes thru May CO. computer first, before telecredit, then they catch it and fuck you. Now lets say you never bounced a check at May Co. and it comes up declined or call for authorization. This is Telecredit. Where ever it was that you bounced checks now you cant get shit at May CO. Yes, you can by smoothing talking before saying you dont have your id but you shop here all the time, and say yo3u know your license # by hart and recite a VALID one out loud, and dont give em a chance to say no, as long as the license number is valid it will go thru .. it doesnt have to match the checking account name, because they dont and cant check, so you will get your shit from May Co that way, but thats not the point here... Telecredit is such a fucked up system that if you are even in it big time and the check your writting is for a small amout like $20 bucks, it will go thru, Telecredit will allow it because the store you are in is paying extra for TeleCheck which is the same thing but it means that TeleCheck guarantees the check to the vendor which means if you bounce it, or even stop payment,TeleCheck buys it and now you owe TeleCheck. TeleCheck 99% always guarantees checks under $20.00, if over that usually a Call for Authorization will happen. (The are other companies that guarantee checks as well.) To get out of Telecredit is easy even if your in it for years if you start makeing a deal with them now to make payments like $25-50 bucks a month, They will go for it and as you are paying them off they will guarrantee your checks at places they wouldnt before, because in a way you are building credit with telecredit and they are so fucked up for reasons unknown you get away with anything... What it comes down to is a craps shoot sometimes it go's othertimes your fucked. THE GAMES ========= Now that you've met the players, (CheckSystems, & TeleCheck) now lets play a game. BULLOCKS - MASTER SCAM * This pacticular scam is one of my own best kept secrets, and is now yours. Dont spread this info around and have every jack ass doing it. Keep it to yourself and only do it at a time of need. Requirements: ============= A drivers license or state ID A checking account A creditcard No balls * To be done towards the end of the month, 10 days prior to make your monthly checking account statement. All Bullock department stores have vaults with up to $200,000 or more in them at times. This doesnt mean lets break in, what it means is when you buy something there with a check, (and it passes the Telechecks) that check is as good as cash to them. Go buy some peice of clothing for $400 by check. Now be SLY and grab another of the same peice of clothing and take it upstars or to any other register and buy it along with some other stuff from that department and pay with a creditcard. Return to the store in a few hours with one of the clothes and return it to the 1st clerk you paid by check to. Tell him whatever, it didnt work out, and ask if you can get your check back out of the register. He/her then will say "I'm sorry we cant do that, thats not our policy, we will have to give you cash. "You say ahh fuck shit motherfucker! oh ok, I guess thats ok. They'll have you sign a green return voucher and then they'll bring you the cash (or you might have to goto customer service, no big deal). OK GOTO another Bullocks on the other side of town and buy the SAME peice of clothing with a check from different checkbook of yours for the same exact amount PLUS $20, SO FIND SOMETHING THAT WILL COME OUT TO EXACTLY $20 AND BUY IT. NOW CASUALLY POST DATE THE CHECK A WEEK AHEAD, AND ADD A 'MEMO-FOR CREDIT.' (They wont catch either, if so say thats for your own personal track). Go have lunch and then return the clothes and get your money back the same way. Now Go home and stop payment on the 1st check you wrote. Go back to the 1st Bullocks right before closing time and return the clothes and other shit you bought on your creditcard , and have them recredit your account. You probably are going to get the same people that gave you the money the first time and theyre going to know you had already returned the same thing, so they are going to be suspicious.. So what, let them be.. tell em it didnt fit but he/she wanted it in another size, or tell em oh ya i bought the samething , im so stupid, whatever you say doesnt matter, you have done nothing wrong or illegal (They dont know about the stop payment, of course). Hang onto your orgrinal and new return credit reciepts. Your done, you just made $380. Whats going to happen. In a few days you will get a notice and/or call about your stop payment. you call back to the main credit office 800# not the local stores.You tell them you stopped payment on it because your check book got stolen (ya right) and you already took care of it, repeat, "its already taken care of, I went into another Bullocks and took care of it on my creditcard, sorry for the incovenice" At this point they will say Ok thank you, or they'll want to know exactly what store and when and/or the reciept number of your card, give them the return credit receipt number and tell them a different store location that you didnt goto, this will keep em happy and stall em until the time you get your monthly checking account statement and checks back. Your TeleCheck standing has not been touched they havent done shit they think they got paid. Now they call and say whats going on?? And you say , 'What, I took care of this already I told you.... oh I'm sorry, im looking here at my checking statement and I paid by check not credit card, I got the check right here', give em the amount& number if they ask, and tell them your gonna fax or mail it out right away.(Mention that $20 return check fee you included, hehe] You Win. When they get that check the check is post dated to the time you said you paid it and it has that check return fee and credit memo on it. At this point Bullocks will stop and say OK and destroy you stop payment check and its over. It will not make it on the desk of head security. Yes you did sign a voucher the second time you got your cash money back, and it can be traced back, but it wont... Unlike other department stores, Bullocks /Macys/Imagnim (and who knows whatelse) is not that kind of store, they gross about 1/2 a mil a day and dont worry much about being ripped off. REMEMBER you are dealing all this over the phone now and you are talking a good game. If the bullshit check did trace back to you, you still got that original credit card reciept (ACE IN THE ASS) to cause more confusion... "What the fuck are you guys talking about I got charged on my creditcard and check for the samething, bullshit!" {No one or no cons buy the same shit three times...} -A note from GRIF- Trust me Ive done this a few times already for different amounts even higher than $1000 (Armani suits) , and I have never has the pleaseure of being questioned or nothing... That second check showing up is the ticket! (Never mind the store registers# on the back, that doesnt mean shit and is not bothered with at Bullocks, wash them out if you like.) I just like to cover all the bases. The key to a con is that if you look like you have money and buy stuff that cost money your are to be less doubted than going for the petty cheep shit... A respectable rich customer is always right, especially in the L.A. area where they are always dealing with people with alot of money and alot of problems. The studio rap always works for returns, but they are sick of hearing that one. Just keep in mind the felony factor of over $450 and that they keep all your returns in their computer, and if you have more than seven they have to mail you a check.. sometimes this works out better... Ive got more BULLOCKS SCAMS TO TELL, and I will after I get paid a little mo off them. I will also share other store scams as well... Now here's another game: BEAT THE BANK - INSTANT LOANS ============= ============= A basic scam. Requirements to play: A checking account. Another checking account of yours from a different bank. A plus ====== A out of state checking account. Old closed account checks from someone or company other than yourself. Most banks ATM machines post the money you deposit thru them immedately rather than the next morning if you were to go in the bank and deposit. As long as you are in goodstanding with your account, you should be able to get all the money you deposit in, right back out in cash (up to $300 per day). Say you have a drug deal comming up and your short $500 bucks... Write a check for $600 from your (example) Citicorp account to you BofA account on Friday so BofA dont get it till monday. Deposit thru the ATM at BofA and get your 1st three hundred out, then wait until midnight and get you other 300. Now you have all night friday and all day saturday and sunday to turn your $600 over into whatever and put your $600 in Citibank early monday morning so your check clears. Need more time? Deposit a third bank check early monday morning to citibank, now you got another day... You need more time.. figure it out, a out of state check takes at least three working days before it gets there. There is nothing illegal about transfering funds from your own accounts, it just looks funny, but the ATMs dont have eyes. Shit.. the drug deal didnt go thru, the citibank check bounced, you owe BofA $600. You have upto a month to pay it all back before anything serious will happen (close account) even up to two months by pushing it talking sweet to THE RISK department of the bank, however they might terminate your ATM card just as the would if you deposited nothing to the machine, so dont fuck that up. What, you dont deal drugs? Goto Vegas for the weekend or your local poker casino's... VEGAS and GAMBLING SCAMS is comming up soon... BONUS TIP for the Forger ======================== You found some old personal/company checks from a family member or friend or whatever, the account is closed. Hopefully you will have some idea when the account was closed, so POST DATE the check back to when the account was open, and take it to your bank. When the check comes back to the bank ACCOUNT CLOSED, and the bank risk department gives you a call (if you didnt cover the check on time), tell them the truth, you founf an old check and thought it was good, this really screwed me up, I need time to pay it back... They'll understand.For a company check you dont even have to post date it, say What, I just worked for the guy! That bastered, Im sorry , ill pay it right back but I need a little time... Post dating a closed company check and giving the old check I never cashed routine always looks even better than the personal check. If you got a old out of state company check, your styling... Dont do this old check scam often nor to the same bank twice, because after a few times the banks will make photocopies of the old checks and onced re-payed,they will mail you back the copy and keep the orignal one you forged, and thats not good, though nothing will ever happen because you did pay it back. LASTWORDS ========= Dealing with banks is strickly a numbers game. There are many scams out there,and if you are good with math you can come up with some good ones of your own.If you cant add, maybe I'll share some more with you later. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [4]: Cellular Interception Techniques By: Thomas Icom/IIRG thomas.icom@iirg.com I. Before We Begin In order to understand the techniques detailed in this article, a basic knowledge of cellular telephony is required. Instead of rehashing what has already been written, those in need of the required education should refer to a good g-file on cellular telephony. The ones written by Brian Oblivion/RDT or Bootleg are recommended by the author; as well as Damien Thorn's articles from _Nut's and Volts_ magazine, and the numerous articles that have appeared in 2600. They should be considered required reading at this point. II. Introduction The Electronic Communications Privacy Act of 1986 (ECPA) prohibits the monitoring of cellular telephony communications; except for network testing, equipment troubleshooting, interference tracking, or warrant- sponsored surveillance. It also mandates that the Federal Communications Commission deny Part 15 certification (which is required to sell radio equipment in this country) to "scanning receivers" which are "readily modifiable" to receive cellular telephony communications and 800 Mhz. band frequency converters. This mandate does not apply to "test equipment"; as technicians working in cellular industry obviously need the equipment to troubleshoot problems. Nor does it apply to the phones themselves, for reasons which should be obvious. Kits are also exempt from this mandate, as Part 15 compliance is considered the responsibility of the builder. So far, the response of the courts have been mixed in regard to enforcement of the ECPA. In 1986, the U.S. Department of Justice stated that they would not enforce the law, as doing so would be impossible. This was back in 1986 with an administration that does not exist any more. The current administration might be a little less enlightened in regard to freedom of the airwaves. (They certainly are in regard to some other freedoms.) Some judges have held that since cellular telephony occurs over the airwaves, there is no "reasonable expectation of privacy". Others have maintained an opposite viewpoint. None of the judges with the former viewpoint have gone so far to declare the ECPA null and void. From a practical standpoint, despite whatever laws may be on the books, if it goes out over the airwaves one might as well shout it from a rooftop. Successful interception of unencrypted cellular telephone or any other form of radio communications is undetectable and requires only a basic level of technical expertise. III. A Realistic Appraisal of Cellular Phone Security It should go without saying that any unencrypted RF transmission is naturally unsecured, ECPA notwithstanding. With that in mind, even though your cellular phone conversation is being sent out for anyone to intercept and listen to, there are a few other factors. The design of the cellular phone system doesn't give it half the range of the old IMTS system. The old IMTS system had a maximum range of 50-75 miles; whereas a cell site might have a absolute maximum 20 mile range in a rural area where the cell sites aren't that close together. In an urban area, a cell site could have a range of LESS THAN ONE MILE. The decreased range means less potential listeners. The cell site is capable of adjusting it's power output and the power output of a phone in relation to it's proximity to the cell site. This can be as low as 30 milliwatts. What this means is that if one is close to a cell site, their signal's range will be decreased. Scanners capable of 800 Mhz. reception are still considered "high-end" pieces of equipment and therefore are generally purchased by serious monitoring enthusiasts. Among said enthusiasts, cellular is not considered a popular listening item, as they feel that 90% of the communications are "boring", and the continuous nature of cellular transmissions lock up the scanner and make it worthless for listening to anything else. With 832 channels and many different conversations to choose from, a quick, innocuous sounding call will probably go unnoticed among the drug dealers, stockbrokers, and Verafone systems that inhabit the cellular airwaves. All things considered, unless the phone's MIN is flagged for some reason or the cell site being used is flagged, the chances that a given cellular will be monitored is slim. If the user keeps their calls short and avoids having "interesting" conversations, potential listeners will either miss the conversation all together, or monitor it briefly and go on to find a "less boring" conversation. If the phone's MIN is flagged, or the cell site being used is flagged, then expect the conversation to be monitored. IV. Usage Analysis Cellular phones are used by anyone who feels they need instant phone communications despite their location, and can afford to have it. While this includes a lot of upper class housewifes, yuppies, and corporate executive wannabes, there are some more interesting users. Political organizations make use of cellular phone communications. The Democrats made extensive use of cellular phones during their last national convention. On the other hand, the Republicans were smart and banned the use of cellular phones in their national convention. Police agencies are another cellular user, using them on the assumption that communications are a little more private than over their radio system. The NYPD uses them for non-emergency communications in their Precinct- Activated Response Program, and for their highway callboxes. The various departments of transportation and public works departments also use cellular. Their highway radio advisory systems operating on 530 and 1610 Khz. are often equipped with cellular phones for remote programming. Flea Market vendors are mating Verafone systems with cellular phones in order to be able to validate credit card and check purchases while working a show. The Verafone systems are basically 300/1200 baud modems. Alarm system companies are mating alarm systems to cellular phones for use as a secondary (or even primary in a remote area) means of communication between the alarm system at the customer's site and the central station. Recently, the Metro-North commuter rail service in the New York City metropolitan area started offering public phone service on their trains. These phones use the cellular phone network. As one can see, the use of cellular phones has come a long way from some yuppie calling his wife to say he'll be staying at the office late, and then calling his mistress immediately afterwards to tell her what hotel to meet him at. Those who like to listen to real-life soap operas however will be relieved to know that such conversations still occur over the free and open airwaves despite all the other activity. IV. Equipment Availability In addition to outrageously expensive pieces of surveillance equipment sold to law enforcement agencies, (the Harris Corporation's "Triggerfish" being a prime example) there exist other types of equipment which can be used for interception of cellular telephony. Even if such a specialized function as tracking a specific MIN/ESN pair is required, the technical specifications of the cellular phone network are publicly available so any competent technician can design a piece of equipment to do the required job. An intercept station can be put together for about one-tenth the cost asked for by "law enforcement suppliers". Despite the ECPA, receivers capable of receiving cellular still abound. Readily modifiable scanning receivers made before the Part 15 revision are grandfathered, and the existing stock may still be sold. Since these units are "high-end" models and priced accordingly; they are still on the shelf waiting to be sold. The specific wording of the new FCC Part 15 Regulations denies certification to "readily modifiable scanning receivers". Some of the new scanners put on the market since the Part 15 revision have been modifiable via a hideously detailed and complicated procedure. Apparently, a modification involving the desoldering and re-soldering of multiple surface-mount devices isn't considered "readily modifiable". One manufacturer has taken a different approach on their new models. The cellular frequencies are locked out via the programming in the scanner's ROM, so no modification is available short of burning a new ROM for the scanner. There is however, a code sequence which can be entered into the keypad that loads test frequencies into the scanner's memory channels for diagnostic purposes. Some of these test frequencies are within the cellular phone band. From there one can then tune above or below the test frequencies and receive the entire cellular phone band. Obviously, cellular phones are exempt form this regulation. Cellular phones can usually be put into a diagnostic mode that turns them into a standard receiver/transmitter in order to be more easily tested during the troubleshooting/repairing process. The Oki 900 and Oki 1150 (also known as the AT&T 3730 and AT&T 4740 respectively), have software available for them from Network Wizards that will enable it to track a specific MIN. MIN tracking can also be done with the CCS DDI (Digital Data Interpreter). Current versions of the DDI are unable to read reverse control channel ESN data in an attempt to prevent cellular phone fraud. They will still however read the forward control channel data. When used with an older Icom R- 7000/7100 receiver, the DDI will automatically tune the Icom to follow the conversation. Scanner frequency converter kits that enable non-800 Mhz. capable scanners to receive the 800 Mhz. band (including cellular) are still being sold. One can also make an 800 Mhz. frequency converter out of old UHF TV tuner that covers TV channels 70-83; which are now the 800 Mhz. band. The Optoelectronics R10 near field receiver is a device which looks for nearby radio signals between 30 Mhz. and 2 Ghz. and automatically tunes them in. It will also display the received signal strength and frequency deviation. It is classified by the FCC as a piece of test equipment. If one were to get close enough to a cell site or a in use cellular phone, the R10 will lock in to the signals from the transmitter in question. If one is monitoring a mobile unit which is handed off to another cell site, the R10 is able to quickly reacquire the signal, as it is capable of searching through it's entire 25 Mhz. to 2 Ghz. coverage in 2 seconds. By adding the optional bandpass filter and/or attaching an antenna tuned to the cellular frequency range, the R10s effective range can be increased while also rejecting unwanted signals from outside the cellular telephone band. Frequency counters are also a useful piece of equipment. After having experimented with the Radio Shack unit, I have discovered that using the supplied telescoping whip antenna it will lock on a 3 watt phone running with a 5/8ths wave antenna from a range of 50 feet. I'm sure the range could be increased by using a bandpass filter, amplifier, and/or cellular antenna. The Rolls Royce of frequency counters is the Optoelectronics Scout; which was intended for SIGINT operations. Among other interesting features, it is equipped with an OS456 interface and will automatically "reaction-tune" an OS456-equipped receiver to the whatever frequency the Scout picks up, and can send data on frequency acquisitions to a PC. A laptop or plamtop PC will also be needed if one desires to use the DDI or Network Wizards Oki Kit. One should also have a copy of Video Vindicator's Cellular Manager software for reference purposes (converting frequencies to channels, finding what voice channels correspond to what control channel, and finding information about adjoining cell sites). V. Interception Techniques The most common intercept technique is to program the upper and lower limits of the cellular band into a scanner's search memories and use the search function to go through all 832 channels. With a scanner that searches at 25 channels per second, a complete search would technically take 33.28 seconds; not counting time spent initially listening to communications to determine if they contain relative content. This technique is adequate for highly-populated urban regions; where there are a large number of frequency groups used for a given area. In a lesser-urban, suburban, or rural area this technique wastes too much time, as only a small fraction of the channels are used. It is also difficult with this technique to reacquire a target when it is handed-off to another cell site. A better approach is to program the frequencies being used in the area of operations into a scanner. Each control channel only handles 20 voice channels. So, if one has 10 control channels in their area of operations (equal to 10 cell sites in most areas), that's only 200 channels that have to be monitored. This technique will cut down on the number of frequencies that have to checked, and allow for more efficient coverage. Those techniques are generally used for non-specific monitoring. Once an "interesting" conversation is noted, the target can then be identified and techniques designed to be aimed at a specific target can be employed. Typically, the control channel is determined by noting the channel being used by the target. Once the control channel is identified, the data stream can be monitored which enables easier tracking of the target during handoffs and easier acquisition of the target on the network. Target specific monitoring falls into two categories. The first is a target with a known MIN. The second is a target which has been visually acquired and noted to be using a cellular phone. Tracking a known specific MIN is generally a matter of having the right equipment and being in the same general area as the target. If the target travels over a wide area, one will have increased difficulty with monitoring. If such was the case then the surveillance technician would have to maintain multiple listening posts in the various areas the target is known to frequent, or in the case of court-approved activity monitor the target at the MTSO. The tool of choice would be an Oki phone with the appropriate software, or the DDI unit hooked up to an older Icom R-7000/7100. If one is on a budget and knows the target's voice, one can also manually scan through adjoining cell site frequencies until the conversation is reacquired. This will, however, result in losing part of the conversation. For a target that one has visual acquisition on, one can determine the reverse channel frequency being used by means of a frequency counter. Once that is accomplished, the rest is easy. The forward channel operates 45 Mhz. above the reverse channel. As the target moves from cell site to cell site, the frequency counter would indicate changes in operating frequency. The ultimate would be an Optoelectronics Scout sending frequency information to a PC which would then automatically tune two separate receivers to the forward and reverse voice channels. Under normal circumstances, the forward voice channel will also repeat the reverse voice channel audio (this is called talk-around or side-tone). If the target is using a hands-free unit however there will be no talk-around so as to avoid feedback. The result is that one will only hear half the conversation; the landline talking to the mobile; on the forward voice channel. This can be a problem if one's receiver has no reverse voice channel monitoring capability, or if one is too far away from the target. VI. Conclusion For the cost of a good VCR or TV, one can listen in on cellular phone conversations and be able to track the phone's user as he goes about his/her business. Yes, it is illegal. Then again so are certain types of sexual activity, but I don't see that stopping anyone. From a practical standpoint the identification of perpetrators violating the cellular provisions of the ECPA is virtually impossible. We all know that a law isn't going to stop people from listening to radio communications. Various totalitarian states have tried throughout modern history with no success. Nevertheless, the retailers of cellular telephone equipment continue to placate potential customers with the lie of "No one can listen in. It's illegal." As a result, users of cellular phones are misled into thinking their conversations are as secure as they would be over their home phone. They then say things which open them up to victimization by a very small minority of individuals who monitor cellular communications in order to find potential marks. I don't see this ending anytime soon. Some might argue that by providing this information I've clued in certain miscreants who might go out and do just that. This might be true, but I've also clued in people who use cellular phones to the fact that what they say over the air isn't private at all. If one wants to take the attitude that talking about something encourages it, then perhaps we should pass a law banning the media from talking about murders, drunk driving, and a whole other host of unpleasant things that we'd like to discourage everybody from doing...I didn't think so. Thanks go to Bernie S. for his assistance with this article. VII. References and Sources 1. Cellular Telephony" (g-file), By: Brian Oblivion/Restricted Data Transmissions (RDT) 2. "Cellular Secrets" (g-file), by Bootleg The above g-files should be available on any decent H/P system. 3. _Introducing Cellular Communications, The New Mobile Telephone System_, By: Stan Prentiss, TAB Books 4. Network Wizards, POB 343, Menlo Park, CA 94026 Sells Oki Experimenters Kit. 5. CCS, POB 11191, Milwaukee, WI 53211 Sells DDI (Digital Data Interpeter) "You know your cellular phone conversations aren't private when you can pick them up with any old TV." -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [5]: Department Store Scam By: Dark Grif dark.grif@iirg.com ======================================== Department Store Scam - CASH IN THE BOX By: DARK GRIF dark.grif@iirg.com ======================================== To a vetran like myself this one may fall as top oldie, but to most of you it will be a new idea to do this proven (by myself) method for quick cash, that will always be effeictive for as long as your alive. FOR: Wallmart's, Kmart's, Targets's, Price Clubs, stores of that callibur. Requirements: ============= One or two people (two or more reccomended) . Gluestick A little cash flow. Little or no balls. THE DIRTY PART ============== One of you (the one with little balls) Enter the store, look somewhat presentable, browse around the store and then head over to the electronics/games department. I use the Wallmart type stores because the have unattended uncased electronics such as cd players,phones, faxes, and sometimes nes/sega carts. You can obviously do this with any other undisplaycased valueables. Now by looking at the prices decide how much money you want/need and pick that item or ITEMS. Take off any light pen security bar code stripes of price tags, if any. Now goto home appliances a find a big tupperware box and carefully open it up. Obviously any big box with extra space in it will do, but im telling you thoose pots work best, the toy department has some good ones too. Now it is your choice to either bring the big box and the items to a neutral isle or onr to the other, then QUICKLY shove the item box (s) in the big box and use the gluestick to reseal if necessary. Next take your rigged big box back to its original section and stash it behind the sameothers, or stash it somewhere else in the store... The easy way to decide this is to go with the flow of the store; observe whats going on and go with it, blend in, become invisible. Leave the store, tell your partner(s) where the box is and send them in to buy it. *************************************************************************** TIP: Do not purchase the rigged box if you we're the one who rigged it, and dont be seen with the one who does purchase it. If you remember this tip you have won, no one can do shit to you they will not follow you if they see you put shit in the box, you havent done shit! No one can legally bust you for shoplifting unless you are outside the store with the merchandise! *************************************************************************** THE OBVIOUS ============ You make dam sure you are not being WATCHED! 99% of the stores aboved mentioned have no survallance cameras, because they're big cheap stores with no real exspensive items that need that kind of security, so dont sweat it. What you do need to look out for are: 1>Nosey customers. 2>Asshole employees. 3>Store detectives. One and two takes no brains to aviod, here is some info on the dicks. Every store has at least one, but no more than four. They are generally small ugly people who couldnt hack it as a real cop. They sometimes look down on you from top floor oneway mirrors which they really cant see shit if you use your body to keep your back on them, some newer stores dont even have thoose offices up there anymore. The safe thing about boxin' quickly is that if you keep in your mind the thought: 'Im just putting this stuff back, I dont want it' and make it look like that, thats what it'll look like to a store detective or anyone who might get a glimpse of it. But if your still sweating about these dicks: 1> Study the clothing department of the store, these queers get their clothes there free as their undercover uniforms. 2> They get on their hands and knees and look like their inspecting the items they are supposedly going to buy when theyre actually looking around peeking at suspicous people. 3>They have uncontrolable habits of constantly talking to their fellow store employees. 4>Did I mention they're ugly? You'll never see a good looking pig. 5>THEY 99% OF THE TIME ARE DRINKING A SODA OR EATING CRAP, they think they are blending in. THE SCAM: ========= 1 - Once you successfully purchased your rigged box go back to the store whenever and buy the same item(s) you stole and get your your first reciept. 2 - Return to the store in 5 minutes and return what you bought WITHOUT your reciept. Goto the same prick you bought it from, give em some bullshit like a family emergency came up I need my money back, I dont know what happend I lost the reciept, I never got a reciept, the wind blew it away, I need it to return stolen merchandise... It doesnt matter the prick will remember you and you WILL get you money back. Repeat 1 & 2 as many times as you need to to generate more reciepts. 3 - Return stolen merchandise with reciept. You win. HINTS ===== Return merchandise different days and times at different store locations. Buy other items with the rigged box so it looks better and when you return it you got a shot at grabbing the reciept before they mark it so you can use it again the next time you steal. A couple (girlfriend-boyfriend) always looks better at purchasing. Even a group of people works. Act stoned. Many people can tell when someone is stoned, they'll leave you alone. If your still stressing over the detecive dicks, go in one day act suspicious have one tail you so you can describe him to your partners. LEGAL ===== If your just a idiot and someone or store detective sees you box the shit up, they cant do SHIT to you, and they wont do shit, they'll either wait for you to try and purchase it then bust you, or if you leave they'll leave it alone and see if you or someone else comes back, they WILL NOT GO AFTER YOU ONCE YOU LEAVE THE STORE WITH NOTHING, THEY HAVE NOTHING ON YOU, YOU DID NOTHING WRONG EVEN ON CAMERA THEY CANT TOUCH YOU. They WILL wait for you or someone else. If /When someone else come in and the box is in the same department where it should be, and you dont look like a thief, you would straight out deny it and accuse them of whatever and get free shit, and you WILL GET AWAY WITH IT. YOU WIN! Thats why you should always have someone else go in and purchase it, but hey if your slick, you can do it yourself, I do, MANY TIMES. FINAL NOTE ========== In America, You are not guilty of any kind of shoplifting untill you are caught outside the store with the merchandise on you. They can see you stuff whatever up your balls and they cant do shit until you leave the store; seriously try it youll see. However if seen boxin' and purchasing, they will bust you on the spot. A friend of mine got busted, the charge was felony burglary (Over $450), he got it reduced to a misdemeanor ticket for twice the amount of the merchandise, and that was the end of it, big deal. The risk is minimal, if your desperate and you need quick cash, there you go. Enjoy it, send me 10% commission. MORE SCAMS TO COME - from DARK GRIF any questions e-mail me, or write to the mag. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [6]: The Rumor Mill (Unconfirmed Rumors From the Underground) Edited By: Mercenary mercenary@iirg.com ----------------------------------------------------------------------------- There is supposedly a straight-to-video movie that deals with phone phreaks coming out this year called "Touch Tone". Here's the info we were given on it: TOUCH TONE (R/1995/Straight to video) This movie, set in 1984 Los Angeles, is a fictitious story about a group of "phone phreaks" who use computers and telephones as tools for recreation and revenge. Kevin (Mike Vierland) is an angry 23-year-old who puts together a unique compilation of computer whizzes, social outcasts, and disgruntled average-Joes who use their talents to seek vengeance upon their enemies in everyday life. Mixed with true computer hacker stories and imagery of the true "phone phreak" boom of the mid-1980s, the film gives a touch of the past, while at the same time raises open questions about the vulnerability of the information age of today. A humorous, but nevertheless accurate tribute is given to the then-budding phone sex industry, as well. Brenda Malkin portrays Lisa, a young woman working phone sex lines who helps Kevin and his cybergang wreak havoc upon the infamous 976-numbers. While the picture gives an accurate portrayal of the scene surrounding 1980's "hacking/phreaking" groups, it falls short in portraying relevance to today's "information superhighway." The scene at the end, portraying all of the characters' lives a decade later in 1994, is somewhat disappointing. Most of the personalities we get to know in the movie are shown in the present as common folks, rid of the "phreaker" past they were associated with. It would have been much nicer to see a comparison between phreaking in the '80s and the '90s. It's not as if the problem has gone away. Rating: 3 out of 4 stars ----------------------------------------------------------------------------- From: THOMAS ICOM Date: 01-04-95 (23:01) WARNING MEDIA SMEAR ATTEMPT Earlier this evening, I was contacted by someone working with a Harry Martin of WABC TV (Ch. 7) in New York City. Apparently, Mr. Martin is working on a story about "Internet Stalking", and desires to intereview people who have done it. Keeping in mind the recent media smear attack against the community with The Discovery Channel's "Hack Attack" presentation, the IIRG and Cybertek strongly advise everyone to NOT COOPERATE with WABC or any other corporate/establishment media entity doing this or similar stories. The media has shown in the past that they will consistently smear the H/P community. The Discovery Channel is but the latest incident. Those of you who've been around for a while will probably remember recent smear jobs done by Bridget McMannimon (Forbes), Joshua Quitner (Newsday), Rodney Palmer (CBC/TBS), and others too numerous to mention. The media has also always been out in the open regarding their socialistic, totalitarian political leanings. You can be assured that the story on "Internet Stalking" will come out in favor of increased government control of the Internet. In light of all this, I see no reason as to why the community should make things any easier on them by cooperating with them. Those who feel that they might be able to help the community by talking to them should take a look at past attempts and think again. They have control of the editing process, and can take any quote, however harmless, and use it out of context. These people are not interested in the truth! They are only interested in sensationalism and in promoting their totalitarian political philosiphy. Watch the news sometime if you doubt this... Don't aggravate things by helping these scum. Please re-post this message elsewhere. -Thomas Icom/IIRG/Cybertek/U.S. Militia ----------------------------------------------------------------------------- RED BOX ARREST of BERNIE S. The Philadelphia Inqurier reports today (3/21/95) that an Edward Cummings was arrested by the Haverford police for having a modified speed dialer, and that he was allegedly cloning cell phones... He and someone else were supposedly pouring over a chapter in The Whole Spy Catalog, How to Locate and Tap Any Telephone, when he was first approached by the police. He is currently being held on $100,000 bail in the Delaware County Prison, and the U.S. Secret Service is now investigating. ------------------------------------------------------------------------------ BERNIE S. UPDATE Several friends of Ed 'Bernie S.' Cummings have prepared this press release due to the fact that a man is being held on $100,000.00 Bail for possessing the right electronic components to trick a pay phone into giving free telephone calls. His promotion of these devices is not against any law in the land, however the Governements of Deleware County, Pennsylavania and United States are acting as though their own laws do not matter to them. Delaware County Pennsylvania, USA Ed Cummings, also known to many in cyberspace as Bernie S. was arrested on March 13th, 1995 for 2 misdemeanors of possession, manufacture and sale of a device to commit Telecommunications fraud charges. He is being held in Delaware County Prison in lieu of $100,000.00 Bail. His story follows. On the evening of the 13th Bernie S. received a page from his mail drop. Some people he knew from Florida had stopped in at his mail drop thinking it was his address. They were looking to purchase several 6.5 Mhz Crystals. These crystals when used to replace the standard crystal in the RADIO SHACK Hand Telephone dialer, and with some programming, produce tones that trick pay phones into believing they have received coins. These are commonly referred to as 'red boxes' and got their name from an actual red box pulled from a pay phone in the late seventies by some curious person. Ed Cummings met these people at a local 7-11 where he was to sell the widely used electronic timing crystals for roughly $4 a piece. The purchaser only had two twenty dollar bills and Ed Cummings no change. Ed Cummings went into the 7-11 to get some change to make the transaction. A police officer noticed a van parked in the parking lot of the 7-11 with several African Americans inside. As Ed was leaving the 7-11 he noticed fifteen police cars pulling into the parking lot of the 7-11. Next thing he knew the police were asking him if they could rifle through his car. He said no. Moments later as he was talking to a Detective and noticed another police officer going through his car. He asked the officer to stop. They did not, in all the police confiscated a few hundred 6.5Mhz crystals (which he resells for roughly $4 a piece) and a large box of 100 dialers. The police told him they would get back to him, and he could have his electronics back if the contents of the bag were legal. In the contents of the seized items was one modified dialer, that a customer returned after modification explaining that it did not work, a broken red box. The next day Ed 'Bernie S.' Cummings was over at a friend's house working on their computer when eight to ten plain clothed armed men burst into the house and ordered him and his friends to freeze. They cuffed him and took him to a holding cell. There he was left without a blanket or jacket to sleep with in the cold cell. That evening the Secret Service had been called in when someone figured out what the dialers and crystals would do when put together. The United States Secret Service found his home and entered it, while they were questioning him. The next morning at his arraignment he was finally told of the charges he was being held upon. They were Two misdemeanor Charges of manufacture, Distribution and Sale of devices of Telecommunications Fraud. and Two Unlawful use of a computer charges. His bail was automatically set to $100,000.00 because Ed Cummings refused talk with the police without his attorney present. The Secret Service presented to the judge a 9 page inventory of what they had found in his home. On that inventory there 14 computers. 2 printers. Boxes of bios chips for the systems he worked with. Eprom burners which the Federal Agents had labeled 'Cellular telephone chip reprogramming adapters' Eproms are used in everything from Automobile computers to personal computers. They also confiscated his toolbox of screw drivers, wire clippers and other computer oriented tools he used for his consulting job. The Judge dropped the Two unlawful use of a computer charges due to the fact that the evidence was circumstantial and the county had no actual evidence that Ed had ever used the computers in question. As of 3/29/1995 Ed Cummings is still in Delaware County Prison awaiting his trial. His trial has not yet been scheduled and Ed will most likely not raise the One Hundred Thousand Dollars needed to be released on bail. ------------------------------------------------------------------------------- An Ode to iXOM -------------- Ed. Note: The following was provided to us by an anonymous user, we present it here for your enjoyment. Opposing viewpoints can be submitted to submit@iirg.com Minorly Edited. Ode to iXOM Former criminal on the path of right, out of mind and out of sight. Deceive everyone, don't speak of your plight. Concede to the FEDS, don't put up a fight. You work for the federal government today, but, oh, all the people you had to betray. Your old hacker ethic fell into decay, you plea-bargained all of your dignity away. You broke the law, and you paid the price. Arrested, convicted, and ruined for life. Cut a deal with the cops, now everything's nice, but Marigolds wither, come cold winter's ice. Why don't you tell your customers about your hacker past? Tell them how you stepped on those who helped you come up fast! Sold out to the boys in blue, you let them rape you in the ass! Good ol' R.P., a fucking NARC who should be gassed! Let the facts be known about R.P., Let the veil of deception be torn, Let the ugly truth bear its hideous face, so the seed of lies won't be born. You called my parents because others hacked into your line, but did you not do the same thing back in 1989? Now you play the role of those you used to hate so much, those vile anti-hacker cops, but now you act as such! With your false accusations you attempt to instill fear, but blaming me for someone else's actions? Fucking queer! Your back-stabbing and whining's not something I want to hear. The words that leave your shit-stained lips have fallen on deaf ears. And what about the DreamScriber, your former right hand man? Used him for his talents, you and Randy had him canned! Another fine example, how your business really works. Use people for what you need and then treat them like jerks! Deceiving all your patrons, and charging too much cash, you just rake the money in to buy your fucking hash. Supporting an addiction, like a craving, driving need. You must have your cannabis, so your clientele, you bleed. If only the general public knew about your darker side! The lying, cheating, stealing, drugs and ethical suicide! Selling out your former comrades, jumping o'er the fence! Your greed and self-indulgence led to moral decadence! I'm not afraid to tell the truth about you, R. P., At least I'm not a fucking NARC who sold out all his friends. -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [7]: Phantasy Book Reviews By: Thomas Icom/IIRG thomas.icom@iirg.com The Ultimate Potato-Bazooka Hair Spray Powered Vegetable Guns (The $20.00 Good Time) What are commonly known as "spud shooters" or "potato guns" are quickly climbing in popularity. These devices are made out of PVC pipe, use hair spray as the propellant, and will launch a 3 ounce potato 200 years. They are inexpensively made from materials at your local hardware store and are great fun. M&M Engineering's book goes into easy to understand detail on the construction of five different potato gun variations, and provides valuable information on theory, design, construction, propellant types, and safety measures. This book is geared towards the beginner/non-techie. Those of you who have already built one will probably find the information old-hat, but if you've never built one this book offers some valuable information. If you're looking for an inexpensive thrill, you could do worse. If you're a statist, you'll read this book, think that both the author and I should be institutionalized for suggesting such a thing, and also probably go off on a crusade to ban PVC pipe and hair spray. Du-ma-nhieu. 36pp, 5.5" x 8.5" $9.95 + $4 s/h. M&M Engineering RR1 Box 2630 Arlington, VT 05250 (802)-375-9484 1995 Police Call Radio Guide By the time you read this, all Radio Shacks should have this new edition on their shelves. At the time of this writing (December 1994) a few Radio Shacks across the country had already gotten copies in. This is a long cry from the mid 80's when Radio Shacks were continually out of this fine reference work, and the new editions were released six months behind schedule. I'm even more impressed with Radio Shack when one takes into consideration the problems the FCC was having with their new database system. Police Call is a beginners guide to the world of VHF/UHF radio monitoring, and a list of public safety license information for your region of the country; derived directly from the FCC database. It also contains "unofficial" lists of aeronautical, railroad, and "non-sensitive" U.S. Government frequencies, and an allocation list which tells you what service (both public safety and non-public safety) is assigned to each frequency. When it comes to information on who is licensed to what frequency, I've found Police Call to be extremely accurate. They have even started adding specific information about frequency use. They lack the in-depth information that frequency directories like Scanner Master provide, but it appears that they are trying to catch-up. Recent editions have been including 10-code information and precinct/troop coverage maps, and the 1995 edition has more auxiliary information than previous editions Police Call is solely public safety listings (environmental conservation, fire, local government, medical, police, highway maintenance, and special emergency). Although the allocation list will tell you what type of service is assigned to a non-public safety frequency. Police Call is great for doing a quick check on a frequency to see what locality and agency is licensed to it. It's also great for compiling quick lists of frequencies used by public safety agencies in your area. Police Call doesn't list unlicensed frequencies that are used for surveillance or other covert activities, but by knowing what frequencies are already taken one can then search through the "unused" ones to find more interesting activity. At $9.95, it costs a lot less than most other frequency directories. For VHF/UHF enthusiasts who are into public safety monitoring, it's an excellent value. Beginners will find the information in the first chapter particularly valuable. Hobbyist's Guide to COMINT Collection and Analysis by Tom Roach This book is an excellent how-to introduction to the world of communications intelligence (COMINT). This self-published work goes into detail on the equipment needed; where, when and how to listen; data analysis, and using a personal computer for COMINT analysis. COMINT is the practice of gathering information of interest to you by monitoring radio communications and analyzing their content so you can apply it to your situation. Depending on your requirements, the signals can range from international shortwave broadcasts to your local public safety agencies. The book's focus is more on strategic intelligence, rather than tactical intelligence. The book is heavy on HF ("shortwave") communications interception, particularly those originating from Russia and the former Soviet republics; although it does talk about COMINT activities focused towards local VHF/UHF public safety communications. This book is geared to the beginner and intermediate radio hobbyist, and is a very easy read; especially considering the complex nature of COMINT analysis. I strongly recommend this book for anyone whose shortwave radio or scanner usage goes beyond casual listening, and especially for those who are looking to take full advantage of alternative news gathering techniques. 94 pp, 8.5" x 11" $26 (includes Priority Mail Shipping) Tom Roach 1330 Copper Peak Lane San Jose, CA 95120-4271 -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [8] PHANTASY TIDBITS: News and Views of Interest ------------------------------------------------------------------------------- Hong Kong Police Close Down 8 Internet Providers ------------------------------------------------ 4-MAR-1995 HONG KONG (Reuter) - Hong Kong police searching for computer hackers closed down most of the colony's internet providers, cutting up to 10,000 people off from the computer superhighway, industry sources said Sunday. Only one dedicated commercial gateway to the internet was left operating, they said. A Hong Kong government spokesman confirmed the police commercial crime bureau had raided eight providers in an investigation into hacking and taken away equipment from at least two. The Hong Kong government's Office of Telecommunications Authority (OFTA) said in a statement it had provided technical assistance to the police and added it was conducting a separate investigation into whether some operators had been providing non-licensed telecommunications services. Many users responded with fury to being cut off, posting angry complaints to the plethora of computer bulletin boards operating in Hong Kong. Hong Kong's internet industry, considered the most advanced on-line market in Asia, has been rocked in recent months by a price war following the entry of the eight new operators onto the market. The colony has seen a surge in internet use because of aggressive marketing campaigns by new operators. Industry sources said the raids had cut off between 8,000 and 10,000 individuals from the internet. They said at the last count there were 12 providers in Hong Kong, nine or 10 of them commercial operators as opposed to university-operated gateways. An executive at Hong Kong SuperNet said he believed the company was the only commercial operator holding a license. He said the company held a market share of about 80 percent and could not see how the prices offered by the newcomers could be commercially viable. A technician at one of the new operators said the company had been awaiting word from OFTA on whether internet providers needed a license requiring the holder to pay a levy to Hong Kong Telecommunications Ltd, which holds the international telephone communications monopoly in Hong Kong. "The requirements were not totally clear and appeared to have been written before the internet came into being," he said. ------------------------------------------------------------------------------- Computer Hackers Sentenced to Federal Prison Winston-Salem,NC - Two Computer Hackers have been sentenced to federal prison for a sccheme that defrauded long-distance telephone carriers of more than $28 million. Ivey James Lay, 29, and Frank Ronald Stanton, 22, were part of a ring that stole credit card numbers from MCI, where Lay was an employee, the government said. They pleaded guilty in January to charges of fraud and trafficking in unauthorized access devices. Lay was sentenced Friday to 3 years and two months in prison. Stanton was sentenced to one year. The credit-card numbers were used to charge long-distance calls, some overseas, to computer bulletin-board systems and computer chat lines. ------------------------------------------------------------------------------- CONNIX: THE CONNECTICUT INTERNET EXCHANGE The IIRG would like to take this space to inform Connecticut residents that they are no longer held hostage by over-priced and unscrupulous Internet providers. There is an alternative until we establish our FREE-NET project. If you want to get on the net, and you don't want to pay an arm and a leg - Give Connix a try, thier service is great and you won't find a better provider in the State. ***************************************************** Connix provides a wide variety of Internet services for individuals, organizations, and businesses of any size. A full range of connectivity options and custom solutions are available from individual dialup accounts to fully installed, configured, and managed Internet connections. Membership Plans Connix has several membership plans and many additional services. Contact us if you have a special situation and we can develop a plan that is tailored to your needs. WITH EVERY ACCOUNT ... Every account includes shell and menu access to Connix, 5Mb of disk space, personal WWW, gopher, and ftp areas, a custom domain name, and full Internet access. All monthly fees are payable in advance. Connecticut residents please add 6% state sales tax. SLIP/PPP MEMBERSHIP $20/startup, $25/month minimum, $1/hour The SLIP/PPP membership adds direct IP access to the services included in the Plus account. The $25/month membership fee includes 20 hours of connect time per month with additional hours charged at $1/hour. You'll be assigned a single IP address from our pool of addresses. ADDITIONAL SERVICES The following services can be added to any Connix Membership plan: News/Mail via UUCP $10/month News via NNTP $10/month Additional Disk Space $1/month/Mb Domain Name Services call Group Discounts call Custom Services GROUP MEMBERSHIPS Connix provides affordable access to groups such as small businesses, non-profit organizations, and classrooms. Contact us for more information about discounts for multiple memberships. INFORMATION PROVIDER SERVICES Connix can help you publish information on the Internet. We can create newsgroups, mailing lists, file archives, gopher, and Web services that will help you market your products and services. Call us to discuss your specific needs and we'll design a custom solution. INTERNET CONNECTION SERVICES Connix can help you establish your own Internet connection through us or through other Internet providers. Complete turnkey solutions include the configuration, installation and administration of Internet servers at your site or ours. OTHER SERVICES Consulting services are also available including: * TCP/IP network design and administration * TCP/IP programming and training * UNIX system programming and training * UNIX system administration Call 203-349-7059 to discuss your project or send email to office@connix.com. Connix The Connecticut Internet Exchange Connix is owned and operated by: Caravela Software, Inc. 6 Way Rd., Suite 33 Middlefield, CT 06457-3001 203-349-7059 office@connix.com -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [9]: Upcoming Conferences and Conventions -----BEGIN PGP SIGNED MESSAGE----- DEF CON III Convention Update #1.20 (03.22.95) August 4-6th 1995 @ the Tropicana in Las Vegas XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON III Initial Convention Announcement XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON III Initial Convention Announcement XXXXXXxxxxxxXXXXXX X X DEF CON III Initial Convention Announcement XXXXXxxxxxxxxXXXXXXX X DEF CON III Initial Convention Announcement XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON III Initial Convention Announcement XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON III Initial Convention Announcement XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON III Initial Convention Announcement XXXxxxxxxxxxxxxXXXXXXXX DEF CON III Initial Convention Announcement XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON III Initial Convention Announcement XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON III Initial Convention Announcement XXXXXXxxxxxxXXXXXXXXX X DEF CON III Initial Convention Announcement XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON III Initial Convention Announcement XXXXXXXXXXXXXXXXXXXXXXXXXXXX X DEF CON III Initial Convention Announcement READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE This is _not_ the professional sounding announcement. Use that one to con your boss / employers out of the cost of the trip. The professional announcement will be available on the FTP site and other more serious mailing lists and news groups, etc. This is the k-RaD kriminal shout out to all u el1te hacker types that aren't in jail to attend 'da def con. werd. READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE What's this? This is an initial announcement and invitation to DEF CON III, a convention for the "underground" elements of the computer culture. We try to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies, Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties Groups, CypherPunks, Futurists, Artists, Criminally Insane, Hearing Impaired. WHO: You know who you are, you shady characters. WHAT: A convention for you to meet, party, and listen to some speeches that you would normally never get to hear from some k-rad people. WHEN: August 4, 5, 6 - 1995 (Speaking on the 5th and 6th) WHERE: Las Vegas, Nevada @ The Tropicana Hotel So you heard about DEF CON II, and want to hit part III? You heard about the parties, the info discussed, the bizarre atmosphere of Las Vegas and want to check it out in person? You want to do weird shit _away_ from the hotel where you can't get me in trouble? Then you're just the person to attend! Sure it's great to meet and party with fellow hackers, but besides that we try to provide information and speakers in a forum that can't be found at other conferences. While there is an initial concern that this is just another excuse for the evil hackers to party and wreak havoc, it's just not the case. People come to DEF CON for information and for making contacts. We strive to distinguish this convention from others in that respect. Plus this year we have official DEF CON GOONS(c) who will pummel you until you pass out should you cause problems for other con.friendly people! Big Brother loves you! What's been said (Only the good stuff will be quoted, of course) Stevyn - "What can eye say, it was intense! . . . the whole con just kicked ass! I totally recommend you check out the next one." Gail Thackeray, Prosecutor, "It's partly an entertaining party, it's partly a fashion statement. But it's mostly something about which the business world has no clue." Wendy Murdock, Boardwatch, "Def Con represents the tug-of-war that has always been present - people strive to get that which is just out of reach, aggravating governments and breaking rules in the process." ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: WHERE IT IS: The Tropicana has rooms reserved for the convention. Rooms are expensive. They are even more expensive if you don't book under the convention. If it is to expensive for you, please see the section below on Las Vegas WWW sites that can provide you with information on other nearby hotels that are cheaper. Check-in is 3 pm, check-out time is 12 noon. Remember there is an 8% sales tax in Vegas. 65$ Single or Double room, Midweek (Monday - Thursday) 90$ Single or Double room, Weekend (Friday - Sunday) 350$ One-Bedroom Suite (Call for Availability) The Tropicana, 3801 Las Vegas Blvd. So., Las Vegas, Nevada, 89109 (702) 739-2581 or (800) 468-9494 or (702) 739-2448 (Fax) Held in three conference rooms at the Tropicana hotel in Las Vegas, DEF CON promises to be interesting. The Tropicana has a huge pool (largest in the world? Anyway, lots of cool movies have been filmed with this pool in them) and in August Vegas should be about 100(f) degrees at one in the morning. What do you care? You'll be wired on caffeine and not sleeping anyway. There are numerous attractions in town from the strip bars to the local COs in case you seek distraction. The Tropicana is located right on the "Strip" with the other three corners of the street occupied by the MGM Grand (Largest hotel in the world), the Excalibur, and the Luxor (The big sense-net pyramid). If you can afford it I totally recommend spending some extra time in town.. there are too many cool things to do, especially if you have never visited. Heck, last time I got to rent and fire uzi's and MP-5 machine guns (OK, so you can do that for cRacK in Los Angeles) see some strippers, and drink 1$ bottles of imported beer. What a place! Now you know why I chose Vegas for a location. SPECIAL EVENTS This year there will be a number of special events going down, including: [> Hacker Jeopardy [> Spot the Fed Contest [> Voice bridge [> Giveaways [> A Red Box Creation Contest [> A Video Room [> Cool Video Shit [> Scavenger Contest [> Who knows? COSTS The price of admission will be 30$ in advance (See the end of this announcement the address to pre-register to) or 40$ at the door. This will include your goovie 24bit color name tag and a conference program. Don't forget to factor in Hotel costs, (The more people you crash with, the cheaper it is) gas, food, gambling, booze, strippers, bail, etc. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: SPEAKERS This is a partial list of speakers for this year. More are being invited or waiting to make plans. As this list changes further announcements will be made. This should give you a flavor or what to expect, though. [> Bruce Schneier, Author of "Applied Cryptography" and "" TOPIC: Will speak on issues surrounding cryptography, digital authentication, digital cash, and will answer questions from the audience. [> John Perry Barlow [> Winn Schwartau, Author of "Information Warfare" and "Terminal Compromise" is a consultant to government and the private sector regarding enterprise and national security concerns. TOPICS: "Information Warfare, the year in review" (Comedic) and "Tempest Attack Videos." [> Len Rose AKA Terminus After the legal fiasco Len faced years ago (as partially chronicled in "The Hacker Crackdown.") this will be his first chance to speak of his experiences without the threat of having his parole revoked. TOPIC: To be decided later. [> Chris Hall of Executive Protection will be demonstrating a fully equipped "A-Team" van, a fully loaded spy mobile with all types of cool interception and surveillance goodies. Last year his talk included an overview of surveillance techniques. TOPIC: To be decided later. [> Theora, a veteran of DEF CON II, will be presenting another speech this year. Topics to include security and anonymous activity on the net. Last year she organized a round table discussion with Phillip Zimmermann and the Presence and focused on security issues of encryption and privacy expectations. TOPIC: Not revealed to me yet. Doh! [> Curtis Karnow, former federal prosecutor and attorney focusing on intellectual property litigation and computer law. TOPIC: Agents in the telecommunications context, and "smart" software that we 'trust' to do the Right Thing. The specific issue is legal liability and responsibility for the actions of intelligent agents, and then spinning off to chat about the liability for artificial intelligence generally. [> Robert D. Steele, President of OPEN SOURCE SOLUTIONS, Inc. A former Spy, Experienced Bureaucrat, Radical Visionary. Tofflers call him the "rival store" to CIA. Keynote Speaker at HOPE, Workshop at Hac-Tic '93. [> The Electronic Frontier Foundation (EFF) will cover current legal threats privacy and computer information networks. Speakers will be talking Saturday and Sunday, and maybe Friday depending. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: SPECIAL EVENTS So you think you're so damn smart, eh? Think your shit doesn't stink? Right. Think you got one up on the Feds, huh? Well, now's your chance to prove it smarty-pants. Winn Schwartau will take command and moderate. ! A N N O U N C I N G ! H A C K E R J E O P A R D Y That's right. You can now prove how smart you really are. Get up on stage and question a few answers, pile up the points . . . and win big! You know the game. You know the rules. Now all you have to do is have the guts, get up on stage in front of your peers and the narks and show us all! When? After Dark Tangent's opening speech (which we're all really looking forward to . . . [yawn] HACKER JEOPARDY starts! MIDNIGHT - DAY 1 of DEF CON (Friday) If you wanna play . . . show up. If you don't wanna play, show up. There will be three rounds of three people. Just like real. The winners of each round will go into the Finals and the winner of that will win 25,000 units of some foreign currency! From Dark Tangent himself! Plus: - A T-shirt three sizes to small for the women. - No T-shirts for the men. - Silk jackets for everyone. - One Heineken per player per round at DT's expense. - Round trip directions to Hoover Dam. - Phiber Optik's home address. - Erik Bloodaxe's Blood Samples. - And more . . . Contestants will be picked at random from a pool of those who want to play. If you don't wanna play, don't enter the contest. Only the elite survive! FEDS: If you get picked to play, and we ask you what your job is, YOU HAVE TO TELL THE TRUTH! If you don't, our custom Fed-O-Meter will detect your lies and off to the casinos you go! Potential categories for questions include: - - Famous Busts - Famous Narks - UNIX Bugs - Telco Tech - "Hacking" and beware of the killer daily double. Bribing the judge is acceptable. EMail your suggested questions and answers to winn at winn@infowar.com So, in the inimitable words of Al Bundy . . . LET'S ROCK! 3rd ANNUAL SPOT THE FED CONTEST Spot the fed, win the shirt "Like a paranoid version of pin the tail on the donkey, the favorite sport at this gathering of computer hackers and phone phreaks seems to be hunting down real and imagined telephone security and Federal and local law enforcement authorities who the attendees are certain are tracking their every move.. .. Of course, they may be right." John Markhoff, NYT Basically the contest goes like this: If you see some shady MB (Men in Black) earphone penny loafer sunglass wearing Clint Eastwood to live and die in L.A. type lurking about, point him out. Just get my attention and claim out loud you think you have spotted a fed. The people around at the time will then (I bet) start to discuss the possibility of whether or not a real fed has been spotted. Once enough people have decided that a fed has been spotted, and the Identified Fed (I.F.) has had a say, and informal vote takes place, and if enough people think it's a true fed, or fed wanna-be, or other nefarious style character, you win a "I spotted the fed!" shirt, and the I.F. gets an "I am the fed!" shirt. Note to the feds: This is all in good fun, and if you survive unmolested and undetected, but would still secretly like an "I am the fed!" shirt to wear around the office or when booting in doors, please contact me when no one is looking and I will take your order(s). Just think of all the looks of awe you'll generate at work wearing this shirt while you file away all the paperwork you'll have to generate over this convention. I won't turn in any feds who contact me, they have to be spotted by others. TELEPHONE CONFERENCE BRIDGE (801-855-3326) For DEF CON III there will be a dial in conference set up. If you are overseas, or just too poor to make it to the convention this year, you can still get an idea of what is going on and participate. One part of the voice conference equipment will allow you to listen to the convention room microphone, another will allow you to ask questions during the Q&A sections of peoples speeches. A general conversation area will be up so you can chat with others at the convention, or just others dialed into the bridge. Navigate through the voice mail maze and get free phone sex! Impress others! The Voice bridge is up now at 801-855-3326. It has 5 analog ports, but in a few weeks will have eight digital ports for better sound, etc. SPOOAH DOOPAH RAFFLE GIVE AWAY!@# Throughout the convention, between speakers and events there will be a raffle giveaway in which if your number is drawn, you win the prize. Last year's giveaway included an ancient kaypro monochrome portable, a roll of Sprint "security" tape, "Computer Warriors" evil anti-virus cartoon, a 240 meg IDE HD, and other elite things. >> All the prizes given away are donated by other convention goers, so if << >> you have any stuff to give away, please save and donate it to the con! << RED BOX BUILDING CONTEST While we don't encourage or condone the use of toll fraud devices, we do encourage creativity and expression of thought. We combine these and come up with a red box creating contest. The final device doesn't have to produce the real red box tones (can't have people getting arrested) BUT it does have to produce some audible tones, any kind of tones. This contest is inspired by last year's give away of a red box "Big Red" that looked just like a big pack of Big Red gum, but really was a red box. Elite! There was also a little girl's doll that was a red box, but the switch for that one was hidden under the dress and, well, it just wasn't given away. Come up with unique ideas! With just a Hallmark card and some spare time you can create an elite 007 style tone generating device! What will you win if yours is chosen as the most k-rad besides the envy of fellow hackers? You'll get a tee shirt and the cost of admission to the convention refunded PLUS some as-of-yet undecided prize. I bet you just can't wait to burn your fingers with your soldering iron now! THE VIDEO ROOM In one of the rooms a LCD wall projector will be hooked up connected to a VCR, and people can bring flicks to play. Stuff like Max Headroom, War Games etc. You know, the cool cheesey stuff. Also some "hacker" videos will be shown. If you have something you wanna show, bring it along. When the projector is needed in the main conference room it will be swiped for the duration. COOL VIDEO SHIT At this time we are working to see if a T1 connection is possible. If it is there will be a cu-see me connection set up with multiple video cameras in various locations. Images will also be added automatically to a WWW page for people to snag. As all this works itself out there will be further announcements. No, there will be no "Hack our server" contests, and there will be "Security Professionals" with "Diagnostic Tools" to "Correct" any people who may cause the network problems. SCAVENGER CONTEST A scavenger contest is being planned. The person or group with the most number of items on the list wins the prize. (Prize undetermined as of yet) and there will be a few follow up prizes. Don't forget to carry massive amounts of water as you run about the concrete jungle, dehydration can happen just crossing the street. This is a contest for only the most k-rad. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: WHAT YOU CAN DO TO HELP DEF CON III will be planned right up until the last minute, with problems being fixed and new things being added all along.. a sort of work in progress that you get to witness in person when you show up. Hopefully it won't be too messed up when presented to the public. What can you do to help? => Please help generate questions for Hacker Jeopardy. Come up with some questions and answers, and Winn will decide which ones to use. Mail 'em to winn@infowar.com. - -> We are looking for people to speak on Personnel Information Gathering and selling. Hopefully a speaker (who could remain anonymous) in this area has experiences in gathering and selling such information. If you know of such a person, please invite them to contact me or let them know we are looking for such speakers. - -> We are looking for some people to submit artwork to be used in the convention someplace. It could be a poster, or in the program. Black and white art would be eligible for the program only. - -> Articles and interesting FTP sites, WWW pages, mini FAQs, etc. are all wanted for the program. Quality articles that are informative and apply to the theme of the convention. Scanner frequency lists, ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: MORE DEF CON INFORMATION The World Wide Web Page is located at: http://www.defcon.org/ FTP Site: ftp.fc.net /pub/defcon Mailing lists: mail majordomo@fc.net with the following statement in the body of your message: subscribe dc-announce This will set you up on the mailing list and you will receive updated information, information on the other mailing lists offered, etc. I suggest joining the dc-stuff list just so you can talk and plan with other people going to the con to coordinate rides, sharing of rooms, etc. Voice or Voice Mail: 0-700-826-4368 from a phone with AT&T LD. E-Mail: defcon@ibm.net (The Dark Tangent) Snail Mail: 2709 E. Madison #102, Seattle, WA, 98112 BBS System to call for info if you don't have net access: Alliance Communications - +1 612 251 2511 - USRobotics HST DS 16800 NUP: New World Order Voice Bridge Chat System: 801-855-3326 ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: INFORMATION ABOUT LAS VEGAS NEWS GROUPS Please note the following newsgroups may or may not be designated for local distribution (Distribution: Vegas and/or nv), and is intended for all systems in the Las Vegas area or those interested in same on the same level as the la, ca, ba, ny, nyc, and other similar local higherarchies: vegas.bi Talk for bisexually natured persons vegas.config Configuration discussions for the higherarchy vegas.food Anything about food in Las Vegas vegas.for-sale For Sale/Want ads (no commercials, please!) vegas.general General discussion vegas.jobs Jobs offered and wanted in Las Vegas vegas.motss MOTSS community talk vegas.personals Personal ads - any nature vegas.singles Talk for singles vegas.test Group to test post to WWW PAGES about Las Vegas, Hotels, Things to do, etc. HTTP://www.infi.net:80/vegas/online/ HTTP://www.ocf.berkeley.edu/~iew/index.html HTTP://www.best.com/~rdc/roger/vegas.html HTTP://www.intermind.net/las.vegas.on-line/homepage.html ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: STUFF TO BUY Stuff is for sale from DEF CON I and II in case you are interested. From the first year we have audio tapes (4 90 minute tapes) for $20 and the second year (10 90 minute tapes) for $30. Descriptions of these tapes are below. DEF CON I Tapes (4) include the following speakers: Ray Kaplan, Curtis Karnow, Gail Thackeray, Dead Addict, Dark Druid, Judi Clark Dan Farmer, and Dr. Mark Ludwig. DEF CON II Tapes (10) include the following speakers: Phillip Zimmermann : Keynote Speaker, PGP. Gail Thackeray : Response to Mr. Zimmermann and Privacy issues. Chris Hall : Electronic Surveillance. Curtis Karnow : Recombinant Culture, Crime in the Digital Network. Dr. Mark Ludwig : Virus Creation Awards and What to do when the Feds come. Judi Clark, Mara, Fen and Marianne in a Round Table Discussion. The Dark Knight : Hacking in the UK Sara Gordon, Mark Aldrich, Phil Zimmermann: Internet and PGP privacy concerns. Annaliza (Torquie) : The European Underground scene. Mark Lottor : Various cellular topics. Winn Schwartau : HERF guns, Van Eck, Information Warfare Peter Beruk : The role of the SPA, general Q&A. Padgett Peterson : Anti-Virus writing, Cleaning up other peoples messes. The Jackal : A basic radio overview with Q&A. Artimage : Underground spoof and give aways. Stephen Dunifer : Radio Free Berkeley and pirate media. Damien Thorn : Random Cell information from the late night tech talks. SHIRTS are still available to buy. The ones remaining are long sleeve white with the choice of two styles. Both styles have a three color logo on the front (Red, Gray, Black) with "DEF CON". The back is either a list of strange grep key words and "inside" keywords with "Why? Because I can." at the top. Back #2 is the same back as DEF CON I with the old and "new" 4 Amendment as stated by J.P. Barlow with "Protect your rights, Encrypt your data..." at the top. The back on this style is two colors.. black lettering framed in light gray for better definition. Shirts are $20. SHIPPING : If you buy anything, please include 2.90 for priority shipping. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: LAST AND LEAST OK! Your almost ready to go. Now here is an E-Z to follow checklist of things you should take care of before throwing caution to the wind and bailing out to the dangerous and sexy-wrong world of Las Vegas. In the words of one famous (and abused) phone system: "Sit up straight, PAY ATTENTION, Listen to what your being told. (Now try again)" (Whoever can identify that phone system first gets in free) StUPh 2 D0 b3fore the C0nvent1ion: _ Check out inpho about Vegas so you know what you wanna do. _ Get a hotel room or some crash pad. _ Bring $40 for admission or pay $30 in advance. _ Bring your PGP key on disk to key sign with others. _ Bring Laptop, laplink, serial, and bizarre gender changer cables. _ Bring things to donate for the give-away raffle. _ Leave massively incriminating evidence at home. _ Police scanners can provide hours of fun in Vegas. _ Bring interesting videos to play in the video room. _ Caffeine and snacks are fun to eat. _ Don't forget any drugs or medication you may need. _ You won't need saline for your contact lenses, you won't be sleeping. _ Anything you promised your friends you would bring for them. _ Join the mailing list and arrange rides or rooms with others in advance. ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: MY PGP KEY This is the unsigned version My signed version is available on the public key-servers - -----BEGIN PGP PUBLIC KEY BLOCK----- Version: 2.6.1 mQCNAy6v5H8AAAEEAJ7xUzvdRFMtJW3CLRs2yXL0BC9dBiB6+hAPgBVqSWbHWVIT /5A38LPA4zqeGnGpmZjGev6rPeFEGxDfoV68voLOonRPcea9d/ow0Aq2V5I0nUrl LKU7gi3TgEXvhUmk04hjr8Wpr92cTEx4cIlvAeyGkoirb+cihstEqldGqClNAAUR tCZUaGUgRGFyayBUYW5nZW50IDxkdGFuZ2VudEBkZWZjb24ub3JnPg== =ngNC - -----END PGP PUBLIC KEY BLOCK----- ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: WHY IS THE ANNOUNCEMENT SIGNED? Well, last year it came to my attention that some unknown person in California had modified an announcement and was having people mail their pre-registration money to them instead. It was actually pretty funny. Only one person was fooled and lost 10$. Not bad. I knew something was up when he said he had pre-registered for 10$ and had the receipt I had supposedly mailed back. I am never that organized! To avoid potential problems like this one please verify this announcement!@# My key is available for verification on public key servers, and my key-id is 46A8294D. The other key you will find on servers may be my older 1284bit key, which is still good, but just not used to sign this text. END ANNOUNCEMENT ------------------------------------------------------------ -----BEGIN PGP SIGNATURE----- Version: 2.6.2 iQCzAwUBL3Mj9LGddDV5azd9AQEK3QTvcz2rnvlyK6rPATzt8+Z7tz1LcdOcTvm2 T9LjS6f0bQ5c0/rad9wJM02GfiCkMndaTD443WEPLs7DFcx6JjGrcypIL7Al4ECa aS0y98GpKxiXWcZCCAFd/kLLV1havwlRyiqxmHD7gdpYbBta0EgZSLRQKX7lwykI 5NIvh/94vf+ILTwzxQtG+HO2FN61VgF2fNQbOgjMl275ZZGAbjM= =mWy2 -----END PGP SIGNATURE----- ----------------------------------------------------------------------------- Starting in June, the IIRG will be sponsoring a Hartford Area __________ ___ _______ _______ /\_______ \ /\ \ /\ _ \ /\ _ \ \/ _____/\ \ \ \ \____ \ \ \\ \ \ \ \\ \ /\ ______\ \ \ _ \ \ \ \\ \ \ \ \\ \ \ \ \_____/_ \ \ \\ \ \ \ \\ \ \ \ \\ \ \ \_________\ \ \______\ \ \______\ \ \______\ \/_________/ \/______/ \/______/ \/______/ MEETING Interested Connecticut individuals should contact 2600@iirg.com ----------------------------------------------------------------------------- ////// ////// /////// //////// // // // // // // // /////// // //// // // // // // // ////// * ////// * // // * ///////// * The IIRG needs your support to establish our full-time Internet hook-up. Connecticut needs a FREE-NET now!! We know many of you out there will have some of the older equipment we're looking for. Let us take that clutter off your hands so we can further our Internet project. Those providing equipment will be given special access to the system. Computers - 386 Motherboards, or 486 Motherboards or complete units (Working units only please...) Cases - AT Cases (Tower or Desktop) Modems - 9600 and aboves only Ethernet cards - NE1000,NE2000, and compatibles CD-Rom Drives - We know some of you got some old single speed gathering dust before you upgraded Peripherals - Keyboards,Hard drives, working cards, scanners,mice, old sound cards Monitors - Mono,CGA,EGA,VGA,SVGA (Whatever) ------------------------------------------------------------------------ Other Stuff We're always looking for... ------------------------------------------------------------------------ Test Equipment - Scopes,Meters,etc.. surprise us! Manuals - Unix,Linux,Telco,etc.... Software - Whatever Whatever electronic - Think we'd like to disassemble it and watch the sparks fly, let us know what you got. Please just leave me e-mail us at iirg@iirg.com stating what you have or are sending to us, Send All donations to: Mercenary/IIRG 862 Farmington Avenue Suite 306 Bristol,CT 06010 PS - Anubis told me anyone sending anything from Plessey Peripherals would be shot on site.... (inside joke) :> -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [10]: IIRG Distribution Sites (or Gateways to Oblivion) ////// ////// /////// //////// // // // // // // // /////// // //// // // // // // // ////// * ////// * // // * ///////// IIRG World HQ: The Rune Stone BBS 14.4k HST Phantasy's Home Board Complete IIRG Archives 14000+ Files (203)-832-8441 NUP: Cyberdeck IIRG Distribution Site 1: Deadcity Sysop: RoughNeck Australia Criminal Intent HQ +61-3-417-2060 IIRG Distribution Site 2: Alliance BBS (612)-251-8596 (Originally ASU Underground in Tempe AZ) 355+ mb H/P/A/UFO and others on CD-ROM IIRG Distro Site IIRG Distribution Site 3: Unauthorised Access Uk Online 10.00pm-7.00am GMT +44-(0)636-708063 3oo/12oo/24oo/96oo/14.4k HST Established 1990 British Underground Guild WHQ SysOp: Phantasm IIRG Distribution Site 4: The Black Lodge LodgeNet Member Site Sysop: The Brit (5o8)-PRI-VATE IIRG Distribution Site 5: Kaotic Attractor Sysop: Mr Wyzard (5o8)-PRI-VATE -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- Section [11]: Phantasy Distribution Sites Phantasy's Distribution Site's are continually changing,we apologize if you called a board and didn't find the Mag. Network Distribution Sites will have the Issues first, we suggest calling one of them if a problem does arise. 1. Lightning Systems (414) 363-4282 200 Million Bytes OnLine USRobotics Dual Standard HST/V.32bis 2400 thru 14.4k v.32bis/HST 2. The Works BBS Waffle Net v1.65 [617]/861-8976 3/12/24/96/14400b 7dy/24hr N,8,1 Lexington, MA 200 Megabytes of Storage 99.44% pure textfiles Remote cDc Node (Very remote) 3. oooo .oooo. oooo . `888 d8P'`Y8b `888 .o8 888 888 888 oo.ooooo. 888 .oo. .o888oo ftp://ftp.l0pht.com 888 888 888 888' `88b 888P"Y88b 888 or 888 888 888 888 888 888 888 888 www://www.l0pht.com 888 `88b d88' 888 888 888 888 888 . o888o `Y8bd8P' 888bod8P' o888o o888o "888" for 888 o888o Cult of the Dead Cow, International Information H e a v y I n d u s t r i e s Retrieval Guild, and Black Crawling Systems "Growing machines to feed your dreams." Archives Login as 'bbs' to access the LHI InfoXchange. -*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*- Phantasy is also available on these systems, Ripco II BBS The Hell Pit Cybernetic Violence (312)-528-5020 (708)-459-7267 (514)-PRI-VATE -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- PHANTASY(C) IIRG 1991,1992,1993,1994,1995 May Odin Guide Your Way! -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- May You Be Feasting and Drinking in Valhalla For a Full Night Before the Christian God Knows You're Dead -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-