Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #####################################################################
- #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~#
- #~<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>~#
- #~<>->>Jolly Roger's Cookbook Version 2.0! Dated 04/10/1990!!!<<-<>~#
- #~<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>-<>~#
- #~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~#
- #####################################################################
- Hello! Welcome to the Jolly Roger's Cookbook v2.0! I hope that
- this collection of text files has enough info to keep you hackers
- busy for awhile (at least until the next update!). As I gather
- information I will keep adding it and uploading it to my "home
- base" bbs's in different cities with additional numbered files,
- and an updated index that you can just replace the old one with.
- Thanks for taking the time to read this file, by the way. There are
- a few things that I want to say about the Cookbook.
- 1) If I ever find out that anyone has omitted my name from
- anywhere in these files withoutmy expressed permission, then I
- will immediately stop doing any updates and I will release your
- name to as many boards that I can find, urging them to put you on
- their Black List. I also, will FIND YOU! (I think you can see from
- the knowledge base contained in this collection that I DO possess
- the capability! You will wish it were the FEDS and not me!) In
- other words, be careful who you give this collection to. Of,
- course there are idiots (probably the same ones who write
- viruses!) that will misuse this information and kill some people
- or get themselves & you into a lot of trouble! So keep this
- treasure chest buried and only dig it up for those that you can
- TRUST! Also you would be screwing yourself, because I still have
- all kinds of things that I can put in here for updates, and you will
- NEVER see them if I quit updating because of some asshole. So
- think about it. If you WANT the updates (info you would probably
- have a helluva time finding elsewhere!), then STAY COOL with it.
- 2) I was going to encrypt these files and load/print them from
- within an encrypted program. However, I have decided against that
- for these reasons:
- a) It would then be machine-exclusive
- b) It would show that I don't trust you.
- c) Only Atari ST users would ever see it.
- So I decided on keeping it ASCII. ANY machine that can read ASCII
- files can now read these.
- 3) Please do not use my handle to gain access to boards. you never
- know where I might show up and I will have to find you and deal
- with you if I ever see it. Don't make me do this.
- 4) By releasing this database I am taking a real chance on you
- people. I sure as hell don't want MY house blown up with a paint or
- Solidox bomb! And I am sure that you don't want yours blown up
- either (or your credit cards used for tha matter). So I have to
- stress again: BE FUCKING CAREFUL WHO YOU GIVE THIS TO!!
- That is all for now. If I ever have to update this, it will just be
- in the update archive as file 000.doc. Just replace the old one.
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- -=-=-=-=-=-=-=-=-=-=-=Notes for Version 2.0=-=-=-=-=-=-=-=-=-=-=-=-
- =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
- Ok... here it is... long awaited v2.0.... what a bitch it was for me to
- put this shit together. Hell, over 6 months to put the update shit
- together. Anyway, response was cool, nobody fucked with the rulez above.
- I am glad. This allows me to continue the updates. You should find it
- worth the wait.
- God, there is so much more to do. As you can probably see, this database
- is getting quite huge. And I have not even begun to tap the resources I
- have available to me. I can easily over the next year or so make this
- thing grow to 1600k or more..... so as long as I DON'T find this on a
- p/d bbs, and I DO see it being spread around the proper channels, as
- LONG as you guys keep bugging me for an update, and finally, as long as
- the rulez above are kept,I shall continue.
- What you have in your disk drive right now is some of the most dangerous
- knowledge ever unleashed on the computer underground. Use it wisely.
- The really JUICY stuff will come in Cookbook v3.0, but let's see how
- this one goes across, shall we? The Blotto box should be enough to see
- how responsible you all are.....................
- Have fun!!!!!!!!!!!!!
- Enjoy this database! A lot more to come!!! -----------The Jolly Roger
- note to all warring pirates and the so-called "groups"
- (You know who you are...):
- FUCK YOU! You are all assholes. Acting like fucking babies like trading
- software was your fucking life or something. Like you have some big name
- or something. Do you realize that nobody gives a flying fuck about you
- in the real world? I have been a pirate for over 10 years, and have over
- 4000 ST programs, over 2000 IBM programs, over 2500 Macintosh programs,
- and over 500 Amiga programs (& I do not even own an Amiga!).... and you
- do not see me kissing ass on the bbs's, or making a deal out of someone
- not "liking" me..... boo-fucking-hoo!! I really do not care. You see,
- the difference between you and me is that I do this for fun. I see no
- other reason to pursue a "hobby" but FOR fun. I hate the fucking
- politics & shit. I give my stuff freely. It all comes back to me.
- It just makes me sick when I am on the bbs's and I see these little baby
- games about who did what, and who stole what loader, or re-crack, or
- whatever. I AM AN original pirate. 1st generation. Not anything like you
- baby-shit assholes. Excuse me but I had this boiling in me for a long
- time. The ST world is so small that what little we do have we destroy
- from within. And we blame Jack for it. Fuck, maybe that is the only
- thing we agree on. Anyway, where is the hacking spirit? The giving? The
- free will? Why all of the fucking ego's? It should be obvious by now
- that I have no interest whatsoever in ego-tripping. You can like me or
- hate me. But I will always be here. --------------Jolly Roger
- Counterfeiting Money by The Jolly Roger
- Before reading this article, it would be a very good idea to get a
- book on photo offset printing, for this is the method used in
- counterfeiting US currency. If you are familiar with this method
- of printing, counterfeiting should be a simple task for you.
- Genuine currency is made by a process called "gravure", which
- involves etching a metal block. Since etching a metal block is
- impossible to do by hand, photo offset printing comes into the
- process.
- Photo offset printing starts by making negatives of the currency
- with a camera, and putting the negatives on a piece of masking
- material (usually orange in color). The stripped negatives,
- commonly called "flats", are then exposed to a lithographic plate
- with an arc light plate maker. The burned plates are then
- developed with the proper developing chemical. One at a time,
- these plates are wrapped around the plate cylinder of the press.
- The press to use should be an 11 by 14 offset, such as the AB Dick
- 360. Make 2 negatives of the portrait side of the bill, and 1 of
- the back side. After developing them and letting them dry, take
- them to a light table. Using opaque on one of the portrait sides,
- touch out all the green, which is the seal and the serial numbers.
- The back side does not require any retouching, because it is all
- one color. Now, make sure all of the negatives are registered
- (lined up correctly) on the flats. By the way, every time you
- need another serial number, shoot 1 negative of the portrait side,
- cut out the serial number, and remove the old serial number from
- the flat replacing it with the new one.
- Now you have all 3 flats, and each represents a different color:
- black, and 2 shades of green (the two shades of green are created
- by mixing inks). Now you are ready to burn the plates. Take a
- lithographic plate and etch three marks on it. These marks must
- be 2 and 9/16 inches apart, starting on one of the short edges.
- Do the same thing to 2 more plates. Then, take 1 of the flats and
- place it on the plate, exactly lining the short edge up with the
- edge of the plate. Burn it, move it up to the next mark, and
- cover up the exposed area you have already burned. Burn that, and
- do the same thing 2 more times, moving the flat up one more mark.
- Do the same process with the other 2 flats (each on a separate
- plate). Develop all three plates. You should now have 4 images
- on each plate with an equal space between each bill.
- The paper you will need will not match exactly, but it will do for
- most situations. The paper to use should have a 25% rag content.
- By the way, Disaperf computer paper (invisible perforation) does
- the job well. Take the paper and load it into the press. Be sure
- to set the air, buckle, and paper thickness right. Start with the
- black plate (the plate without the serial numbers). Wrap it
- around the cylinder and load black ink in. Make sure you run more
- than you need because there will be a lot of rejects. Then, while
- that is printing, mix the inks for the serial numbers and the back
- side. You will need to add some white and maybe yellow to the
- serial number ink. You also need to add black to the back side.
- Experiment until you get it right. Now, clean the press and print
- the other side. You will now have a bill with no green seal or
- serial numbers. Print a few with one serial number, make another
- and repeat. Keep doing this until you have as many different
- numbers as you want. Then cut the bills to the exact size with a
- paper cutter. You should have printed a large amount of money by
- now, but there is still one problem; the paper is pure white. To
- dye it, mix the following in a pan: 2 cups of hot water, 4 tea
- bags, and about 16 to 20 drops of green food coloring (experiment
- with this). Dip one of the bills in and compare it to a genuine
- US bill. Make the necessary adjustments, and dye all the bills.
- Also, it is a good idea to make them look used. For example,
- wrinkle them, rub coffee grinds on them, etc.
- As before mentioned, unless you are familiar with photo offset
- printing, most of the information in this article will be fairly
- hard to understand. Along with getting a book on photo offset
- printing, try to see the movie "To Live and Die in LA". It is
- about a counterfeiter, and the producer does a pretty good job of
- showing how to counterfeit. A good book on the subject is "The
- Poor Man's James Bond".
- If all of this seems too complicated to you, there is one other
- method available for counterfeiting: The Canon color laser
- copier. The Canon can replicate ANYTHING in vibrant color,
- including US currency. But, once again, the main problem in
- counterfeiting is the paper used. So, experiment, and good luck!
- -Jolly Roger-
- Making Plastic Explosives from Bleach by The Jolly Roger
- Potassium chlorate is an extremely volatile explosive compound,
- and has been used in the past as the main explosive filler in
- grenades, land mines, and mortar rounds by such countries as
- France and Germany. Common household bleach contains a small
- amount of potassium chlorate, which can be extracted by the
- procedure that follows.
- First off, you must obtain:
- [1] A heat source (hot plate, stove, etc.)
- [2] A hydrometer, or battery hydrometer
- [3] A large Pyrex, or enameled steel container (to weigh
- chemicals)
- [4] Potassium chloride (sold as a salt substitute at health and
- nutrition stores)
- Take one gallon of bleach, place it in the container, and begin
- heating it. While this solution heats, weigh out 63 grams of
- potassium chloride and add this to the bleach being heated.
- Constantly check the solution being heated with the hydrometer,
- and boil until you get a reading of 1.3. If using a battery
- hydrometer, boil until you read a FULL charge.
- Take the solution and allow it to cool in a refrigerator until it
- is between room temperature and 0 degrees Celcius. Filter out the
- crystals that have formed and save them. Boil this solution again
- and cool as before. Filter and save the crystals.
- Take the crystals that have been saved, and mix them with
- distilled water in the following proportions: 56 grams per 100
- milliliters distilled water. Heat this solution until it boils
- and allow to cool. Filter the solution and save the crystals that
- form upon cooling. This process of purification is called
- "fractional crystalization". These crystals should be relatively
- pure potassium chlorate.
- Powder these to the consistency of face powder, and heat gently to
- drive off all moisture.
- Now, melt five parts Vaseline with five parts wax. Dissolve this
- in white gasoline (camp stove gasoline), and pour this liquid on
- 90 parts potassium chlorate (the powdered crystals from above)
- into a plastic bowl. Knead this liquid into the potassium
- chlorate until intimately mixed. Allow all gasoline to evaporate.
- Finally, place this explosive into a cool, dry place. Avoid
- friction, sulfur, sulfides, and phosphorous compounds. This
- explosive is best molded to the desired shape and density of 1.3
- grams in a cube and dipped in wax until water proof. These block
- type charges guarantee the highest detonation velocity. Also, a
- blasting cap of at least a 3 grade must be used.
- The presence of the afore mentioned compounds (sulfur, sulfides,
- etc.) results in mixtures that are or can become highly sensitive
- and will possibly decompose explosively while in storage. You
- should never store homemade explosives, and you must use EXTREME
- caution at all times while performing the processes in this
- article.
- You may obtain a catalog of other subject of this nature by
- writing:
- Information Publishing Co.
- Box 10042
- Odessa, Texas 79762
- Picking Master Locks by The Jolly Roger
- Have you ever tried to impress someone by picking one of those
- Master combination locks and failed?
- The Master lock company made their older combination locks with a
- protection scheme. If you pull the handle too hard, the knob will
- not turn. That was their biggest mistake.
- The first number:
- Get out any of the Master locks so you know what is going on.
- While pulling on the clasp (part that springs open when you get
- the combination right), turn the knob to the left until it will
- not move any more, and add five to the number you reach. You now
- have the first number of the combination.
- The second number:
- Spin the dial around a couple of times, then go to the first
- number you got. Turn the dial to the right, bypassing the first
- number once. When you have bypassed the first number, start
- pulling on the clasp and turning the knob. The knob will
- eventually fall into the groove and lock. While in the groove,
- pull the clasp and turn the knob. If the knob is loose, go to the
- next groove, if the knob is stiff, you have the second number of
- the combination.
- The third number:
- After getting the second number, spin the dial, then enter the two
- numbers. Slowly spin the dial to the right, and at each number,
- pull on the clasp. The lock will eventually open if you did the
- process right.
- This method of opening Master locks only works on older models.
- Someone informed Master of their mistake, and they employed a new
- mechanism that is foolproof (for now).
- The Arts of Lockpicking I courtesy of The Jolly Roger
- Lockpicking I: Cars and assorted other locks
- While the basic themes of lockpicking and uninvited entry have not
- changed much in the last few years, some modern devices and
- techniques have appeared on the scene.
- Automobiles:
- Many older automobiles can still be opened with a Slim Jim type of
- opener (these and other auto locksmithing techniques are covered
- fully in the book "In the Still of the Night", by John Russell
- III); however, many car manufacturers have built cases over the
- lock mechanism, or have moved the lock mechanism so the Slim Jim
- will not work. So:
- American Locksmith Service
- P.O. Box 26
- Culver City, CA 90230
- ALS offers a new and improved Slim Jim that is 30 inches long and
- 3/4 inches wide, so it will both reach and slip through the new
- car lock covers (inside the door). Price is $5.75 plus $2.00
- postage and handling.
- Cars manufactured by General Motors have always been a bane to
- people who needed to open them, because the sidebar locking unit
- they employ is very difficult to pick. To further complicate
- matters, the new GM cars employ metal shields to make the use of a
- Slim Jim type instrument very difficult. So:
- Lock Technology Corporation
- 685 Main St.
- New Rochelle, NY 10801
- LTC offers a cute little tool which will easily remove the lock
- cylinder without harm to the vehicle, and will allow you to enter
- and/or start the vehicle. The GMC-40 sells for $56.00 plus $2.00
- for postage and handling.
- The best general automobile opening kit is probably a set of
- lockout tools offered by:
- Steck MFG Corporation
- 1319 W. Stewart St.
- Dayton, OH 45408
- For $29.95 one can purchase a complete set of six carbon lockout
- tools that will open more than 95% of all the cars around.
- Kwickset locks have become quite popular as one step security
- locks for many types of buildings. They are a bit harder to pick
- and offer a higher degree of security than a normal builder
- installed door lock. So:
- A MFG
- 1151 Wallace St.
- Massilon, OH 44646
- Price is $11.95. Kwickset locks can handily be disassembled and
- the door opened without harm to either the lock or the door by
- using the above mentioned Kwick Out tool.
- If you are too lazy to pick auto locks:
- Veehof Supply
- Box 361
- Storm Lake, IO 50588
- VS sells tryout keys for most cars (tryout keys are used since
- there is no one master key for any one make of car, but there are
- group type masters (a.k.a. tryout keys). Prices average about
- $20.00 a set.
- Updated Lockpicking:
- For years, there have been a number of pick attack procedures for
- most pin and tumbler lock systems. In reverse order of ease they
- are as follows:
- Normal Picking: Using a pick set to align the pins, one by one,
- until the shear line is set and the lock opens.
- Racking: This method uses picks that are constructed with a
- series of bumps, or diamond shape notches. These picks
- are "raked" (i.e. run over all the pins at one time).
- With luck, the pins will raise in the open position and
- stay there. Raking, if successful, can be much less of
- an effort than standard picking.
- Lock Aid Gun: This gun shaped device was invented a number of
- years ago and has found application with many
- locksmiths and security personnel. Basically, a
- needle shaped pick is inserted in the snout of the
- "gun", and the "trigger" is pulled. This action
- snaps the pick up and down strongly. If the tip is
- slipped under the pins, they will also be snapped
- up and down strongly. With a bit of luck they will
- strike each other and separate at the shear line
- for a split second. When this happens the lock
- will open. The lock aid gun is not 100%
- successful, but when it does work, the results are
- very dramatic. You can sometimes open the lock
- with one snap of the trigger.
- Vibrator: Some crafty people have mounted a needle pick into an
- electric toothbrush power unit. This vibrating effect
- will sometimes open pin tumbler locks -- instantly.
- There is now another method to open pin and wafer locks in a very
- short time. Although it resembles a toothbrush pick in
- appearance, it is actually an electronic device. I am speaking of
- the Cobra pick that is designed and sold by:
- Fed Corporation
- P.O. Box 569
- Scottsdale, AR 85252
- The Cobra uses two nine volt batteries, teflon bearings (for less
- noise), and a cam roller. It comes with three picks (for
- different types of locks) and works both in America and overseas,
- on pin or wafer locks. The Cobra will open group one locks
- (common door locks) in three to seven seconds with no damage, in
- the hands of an experienced locksmith. It can take a few seconds
- more or up to a half a minute for someone with no experience at
- all. It will also open group two locks (including government,
- high security, and medecos), although this can take a short time
- longer. It will not open GM sidear locks, although a device is
- about to be introduced to fill that gap. How much for this toy
- that will open most locks in seven seconds?
- $235.00 plus $4.00 shipping and handling.
- For you hard core safe crackers, FC also sells the MI-6 that will
- open most safes at a cost of $10,000 for the three wheel attack
- model, and $10,500 for the four wheel model. It comes in a sturdy
- aluminum carrying case with monitor, disk drive and software.
- If none of these safe and sane ideas appeal to you, you can always
- fall back on the magic thermal lance...
- The thermal lance is a rather crude instrument constructed from
- 3/8 inch hollow magnesium rods. Each tube comes in a 10 foot
- length, but can be cut down if desired. Each one is threaded on
- one end. To use the lance, you screw the tube together with a
- matted regulator (like a welding outfit uses) and hook up an
- oxygen tank. Then oxygen is turned on and the rod is lit with a
- standard welding ignitor. The device produces an incredible
- amount of heat. It is used for cutting up concrete blocks or even
- rocks. An active lance will go through a foot of steel in a few
- seconds. The lance is also known as a burning bar, and is
- available from:
- C.O.L. MFG
- 7748 W. Addison
- Chicago, IL 60634
- The Arts of Lockpicking II courtesy of The Jolly Roger
- So you want to be a criminal. Well, if you want to be like James
- Bond and open a lock in fifteen seconds, then go to Hollywood,
- because that is the only place you are ever going to do it. Even
- experienced locksmiths can spend five to ten minutes on a lock if
- they are unlucky. If you are wanting extremely quick access, look
- elsewhere. The following instructions will pertain mostly to the
- "lock in knob" type lock, since it is the easiest to pick.
- First of all, you need a pick set. If you know a locksmith, get
- him to make you a set. This will be the best possible set for you
- to use. If you find a locksmith unwilling to supply a set, don't
- give up hope. It is possible to make your own, if you have access
- to a grinder (you can use a file, but it takes forever).
- The thing you need is an allen wrench set (very small). These
- should be small enough to fit into the keyhole slot. Now, bend
- the long end of the allen wrench at a slight angle (not 90
- degrees). Now, take your pick to a grinder or a file, and smooth
- the end until it is rounded so it won't hang inside the lock.
- Test your tool out on doorknobs at your house to see if it will
- slide in and out smoothly. Now, this is where the screwdriver
- comes in. It must be small enough for it and your pick to be used
- in the same lock at the same time, one above the other. In the
- coming instructions, please refer to this chart of the interior of
- a lock:
- ______________________________
- \ K
- | | | | | | / E
- | | | | \ Y [|] Upper tumbler pin
- ^ ^ / H [^] Lower tumbler pin
- ^ ^ ^ ^ ^ ^ \ O [-] Cylinder wall
- / L (This is a greatly simplified
- \ E drawing)
- ______________________________/
- The object is to press the pin up so that the space between the
- upper pin and the lower pin is level with the cylinder wall. Now,
- if you push a pin up, it's tendency is to fall back down, right?
- That is where the screwdriver comes in. Insert the screwdriver
- into the slot and turn. This tension will keep the "solved" pins
- from falling back down. Now, work from the back of the lock to
- the front, and when you are through, there will be a click, the
- screwdriver will turn freely, and the door will open.
- Do not get discouraged on your first try! It will probably take
- you about twenty to thirty minutes your first time. After that,
- you will quickly improve with practice.
- Solidox Bombs by The Jolly Roger
- Most people are not aware that a volatile, extremely explosive
- chemical can be bought over the counter: Solidox.
- Solidox comes in an aluminum can containing 6 grey sticks, and can
- be bought at Kmart, and various hardware supply shops for around
- $7.00. Solidox is used in welding applications as an oxidizing
- agent for the hot flame needed to melt metal. The most active
- ingredient in Solidox is potassium chlorate, a filler used in many
- military applications in the WWII era.
- Since Solidox is literally what the name says: SOLID OXygen, you
- must have an energy source for an explosion. The most common and
- readily available energy source is common household sugar, or
- sucrose. In theory, glucose would be the purest energy source,
- but it is hard to find a solid supply of glucose.
- Making the mixture:
- [1] Open the can of Solidox, and remove all 6 sticks. One by
- one, grind up each of the sticks (preferably with a mortar
- and pestle) into the finest powder possible.
- [2] The ratio for mixing the sugar with the Solidox is 1:1, so
- weigh the Solidox powder, and grind up the equivalent amount
- of sugar.
- [3] Mix equivalent amounts of Solidox powder, and sugar in a 1:1
- ratio.
- It is just that simple! You now have an extremely powerful
- substance that can be used in a variety of applications. A word
- of caution: be EXTREMELY careful in the entire process. Avoid
- friction, heat, and flame. A few years back, a teenager I knew
- blew 4 fingers off while trying to make a pipe bomb with Solidox.
- You have been warned!
- High Tech Revenge: The Beigebox rev.2 by The Jolly Roger
- -------------Introduction-------------
- Have you ever wanted a lineman's handset? Surely every phreak has at
- least once considered the phun that he could have with one. After searching
- unlocked phone company trucks for months, we had an idea. We could build
- one. We did, and named it the "Beige Box" simply because that is the color
- of ours.
- The beigebox is simply a consumer lineman's handset, which is a
- phone that can be attached to the outside of a person's house. To
- fabricate a beigebox, follow along.
- ---------Construction and Use---------
- The construction is very simple. First you must understand the concept of
- the device. In a modular jack, there are four wires. These are red, green,
- yellow, and black. For a single line telephone, however, only two matter:
- the red (ring) and green (tip). The yellow and the black are not neccessary
- for this project. A lineman's handset has two clips on it: the ring and
- the tip. Take a modular jack and look at the bottom of it's casing. There
- should be a grey jack with four wires (red, green, yellow & black)
- leading out of it. To the end of the red wire attach a red aligator clip.
- To the end of the green wire attatch a green aligator clip. The yellow
- and black wires can be removed, although I would only set them aside so
- that you can use the modular jack in future projects. Now insert your
- telephone's modular plug into the modular jack. That's it. This particular
- model is nice because it is can be easily made, is inexpensive, uses
- common parts that are readily available, is small, is lightweight,
- and does not require the destruction of a phone.
- ------------Beige Box Uses------------
- There are many uses for a Beige Box. However, before you can use it,
- you must know how to attach it to the output device. This device can be
- of any of Bell switching apparatus that include germinal sets (i.e.
- remote switching centers, bridgin heads, cans, etc.). To open most Bell
- Telephone switching apparatus, you must have a 7/16 inch hex driver
- (or a good pair of needle nose pliers work also).
- This piece of equipment can be picked up at your local hardware store.
- With your hex driver (or pliers), turn the security bolt(s) approximately
- 1/8 of an inch counter-clockwise and open. If your output device is locked,
- then you must have some knowledge of destroying and/or picking locks.
- However, we have never encountered a locked output device. Once you have
- opened your output device, you should see a mass of wires connected to
- terminals. On most output devices, the terminals should be labeled "T"
- (Tip -- if not labeled, it is usually on the left) and "R" (Ring -- if
- not labeled, usually on the right).
- Remember: Ring - red - right. The "Three R's" -- a simple way to
- remember which is which. Now you must attach all the red alligator clip
- (Ring) to the "R" (Ring) terminal.
- Attach the green alligator clip (Tip) to the "T" (Tip) terminal.
- Note: If instead of a dial tone you hear nothing, adjust the alligator
- clips so that they are not touching each other terminals. Also make sure
- they are firmly attached. By this time you should hear a dial tone.
- Dial ANI to find out the number you are using (you wouldn't want to use
- your own). Here are some practicle aplications:
- > Eavesdropping
- > Long distance, static free free fone calls to phriends
- > Dialing direct to Alliance Teleconferencing (also no static)
- > Phucking people over
- > Bothering the operator at little risk to yourself
- > Blue Boxing with greatly reduced chance of getting caught
- > Anything at all you want, since you are on an extension of that line.
- Eavesdropping
- -------------
- To be most effective, first attach the Beige Box then your phone. This
- eliminates the static caused by connecting the box, therefore
- reducing the potential suspicion of your victim. When eavesdropping,
- it is allways best to be neither seen nor heard. If you hear someone
- dialing out, do not panic; but rather hang up, wait, and pick up the
- receiver again. The person will either have hung up or tried to complete
- their call again. If the latter is true, then listen in, and perhaps you
- will find information worthy of blackmail! If you would like to know who
- you are listening to, after dialing ANI, pull a CN/A on the number.
- Dialing Long Distance
- ---------------------
- This section is self explanitory, but don't forget to dial a "1" before
- the NPA.
- Dialing Direct to Aliance Teleconferencing
- ------------------------------------------
- Simply dial 0-700-456-1000 and you will get instructions from there.
- I prefer this method over PBX's, since PBX's often have poor reception
- and are more dificult to come by.
- Phucking People Over
- --------------------
- This is a very large topic of discussion. Just by using the other topics
- described, you can create a large phone bill for the person (they will
- not have to pay for it, but it will be a big hassle for them). In addition,
- since you are an extension of the person's line, you can leave your
- phone off the hook, and they will not be able to make or receive calls.
- This can be extremely nasty because no one would expect the cause
- of the problem.
- Bothering the Operator
- ----------------------
- This is also self explanitary and can provide hours of entertainment.
- Simply ask her things that are offensive or you would not like traced
- to your line. This also corresponds to the previously described section,
- Phucking People Over. After all, guess who's line it gets traced to?
- He he he...
- Blue Boxing
- -----------
- See a file on Blue Boxing for more details. This is an especially nice
- feature if you live in an ESS-equiped prefix, since the calls are, once
- again, not traced to your line...
- ---POTENTIAL RISKS OF BEIGE BOXING----
- Overuse of the Beige Box may cause suspicians within the Gestapo,
- and result in legal problems. Therefor, I would recomend you:
- > Choose a secluded spot to do your Beige Boxing,
- > Use more than one output device
- > Keep a low profile (i.e., do not post under your real
- name on a public BBS concering your occomplishments)
- > In order to make sure the enemy has not been inside your output
- device, I recomend you place a piece of transparent tape over
- the opening of your output device. Therefor, if it is
- opened in your abscence, the tapqe will be displaced and
- you will be aware of the fact that someone has intruded
- on your teritory.
- Now, imagine the possibilities: a $2000 dollar phone bill for
- that special person, 976 numbers galore, even harassing the
- operator at no risk to you! Think of it as walking into an
- enemies house, and using their phone to your heart's content.
- ---------Jolly Roger
- How to make a CO2 bomb by the Jolly Roger
- You will have to use up the cartridge first by either shooting it
- or whatever. With a nail, force a hole bigger so as to allow the
- powder and wick to fit in easily. Fill the cartridge with black
- powder and pack it in there real good by tapping the bottom of the
- cartridge on a hard surface (I said TAP not SLAM!). Insert a fuse.
- I recommend a good water-proof cannon fuse, or an m-80 type fuse,
- but firecracker fuses work, if you can run like a black man runs
- from the cops after raping a white girl.) Now, light it and run
- like hell! It does wonders for a row of mailboxes (like the ones
- in apartment complexes), a car (place under the gas tank), a
- picture window (place on window sill), a phone booth (place right
- under the phone), or any other devious place. This thing throws
- shrapnel, and can make quit a mess!! -Jolly Roger-
- Thermite II... or A better way to make Thermite by Jolly Roger
- Thermite is nasty shit. Here is a good and easy way to make it.
- The first step is to get some iron-oxide (which is RUST!). Here is
- a good way to make large quantities in a short time:
- - Get a DC convertor like the one used on a train set. Cut the
- connector off, seperate the wires, and strip them both.
- - Now you need a jar of water with a tablespoon or so of sodium
- chloride (which is SALT!) added to it. This makes the water
- conductive.
- - Now insert both wires into the mixture (I am assuming you
- plugged the convertor in...) and let them sit for five minutes.
- One of them will start bubbling more than the other. This is the
- POSITIVE(+) wire. If you do not do this test right, the final
- product will be the opposite (chemically) of rust, which is RUST
- ACID. You have no use for this here (although it IS useful!).
- - Anyway, put the nail tied to the positive wire into the jar. Now
- put the negative wire in the other end. Now let it sit overnight
- and in the morning scrape the rust off of the nail & repeat until
- you got a bunch of rust on the bottom of the glass. Be generous
- with your rust collection. If you are going through the trouble of
- making thermite, you might as well make a lot, right?
- - Now remove the excess water and pour the crusty solution onto a
- cookie sheet. Dry it in the sun for a few hours, or inside
- overnight. It should be an orange-brown color (although I have
- seen it in many different colors! Sometimes the color gets fucked
- up, what can I say... but it is still iron oxide!)
- - Crush the rust into a fine powder and heat it in a cast-iron pot
- until it is red. Now mix the pure iron oxide with pure alluminum
- filinos which can be bought or filed down by hand from an aluminum
- tube or bar. The ratio or iron oxide to aluminum is 8 grams to 3
- grams.
- - Congrats! You have just made THERMITE! Now, to light it...
- - Thermite requires a LOT of heat (more than a blow torch!) to
- ignite. However, a magnesium ribbon (which is sorta hard to find..
- call around) will do the trick. It takes the heat from the
- burning magnesium to light the thermite.
- - Now when you see your victim's car, pour a fifty-cent sized pile
- onto his hood, stick the ribbon in it, and light the ribbon with
- the blow torch. Now chuckle as you watch it burn through the hood,
- the block, the axle, and the pavement. BE CAREFUL! The ideal
- mixtures can vaporize CARBON STEEL! Another idea is to use
- thermite to get into pay phone cash boxes. HAVE FUN!! -Jolly Roger-
- Touch Explosives by the Jolly Roger
- This is sort of a mild explosive, but it can be quite dangerous in
- large quantities. To make touch explosive (such as that found in a
- snap-n-pop, but more powerful), use this recipe:
- - Mix iodine crystals into ammonia until the iodine crystals will
- not dissolve into the ammonia anymore. Pour off the excess ammonia
- and dry out the crystals on a baking sheet the same way as you
- dried the thermite (in other words, just let it sit overnight!).
- - Be careful now because these crystals are now your touch
- explosive. Carefully wrap a bunch in paper (I mean carefully!
- Friction sets 'em off!) and throw them around.. pretty loud, huh?
- They are fun to put on someone's chair. Add a small fish sinker to
- them and they can be thrown a long distance (good for crowds,
- football games, concerts, etc.) Have fun! -Jolly Roger-
- Letter Bombs by The Jolly Roger
- - You will first have to make a mild version of thermite. Use my
- recipe, but substitute iron fillings for rust.
- - Mix the iron with aluminum fillings in a ratio of 75% aluminum
- to 25% iron. This mixture will burn violently in a closed space
- (such as an envelope). This bring us to our next ingredient...
- - Go to the post office and buy an insulated (padded) envelope.
- You know, the type that is double layered... Seperate the layers
- and place the mild thermite in the main section, where the letter
- would go. Then place magnesium powder in the outer layer. There is
- your bomb!!
- - Now to light it... this is the tricky part and hard to explain.
- Just keep experimenting until you get something that works. The
- fuse is just that touch explosive I have told you about in another
- one of my anarchy files. You might want to wrap it like a long
- cigarette and then place it at the top of the envelope in the
- outer layer (on top of the powdered magnesium). When the touch
- explosive is torn or even squeezed hard it will ignite the
- powdered magnesium (sort of a flash light) and then it will burn
- the mild thermite. If the thermite didn't blow up, it would at
- least burn the fuck out of your enemy (it does wonders on human
- flesh!).
- NOW that is REVENGE! -Jolly Roger-
- Paint Bombs by The Jolly Roger
- To make a pain bomb you simply need a metal pain can with a
- refastenable lid, a nice bright color paint (green, pink, purple,
- or some gross color is perfect!), and a quantity of dry ice. Place
- the paint in the can and then drop the dry ice in. Quicky place
- the top on and then run like hell! With some testing you can time
- this to a science. It depends on the ratio of dry ice to paint to
- the size of the can to how full it is. If you are really pissed
- off at someone, you could place it on their doorstep, knock on the
- door, and then run!! Paint will fly all over the place HAHAHA!!
- -Jolly Roger-
- Ways to send a car to Hell by The Jolly Roger
- There are 1001 ways to destroy a car but I am going to cover only
- the ones that are the most fun (for you), the most destructive
- (for them), and the hardest to trace (for the cops).
- - Place thermite on the hood, light it, and watch it burn all the
- way through the pavement!
- - Tape a CO2 bomb to the hood, axel, gas tank, wheel, muffler,
- etc.)
- - Put a tampon, dirt, sugar (this on is good!), a ping pong ball,
- or just about anything that will dissolve in the gas tank.
- - Put potatoes, rocks, banannas, or anything that will fit, into
- the tailpipe. Use a broom handle to stuff 'em up into the
- tailpipe.
- - Put a long rag into the gas tank and light it...
- - Steal a key, copy it, replace it, and then steal the stereo.
- - Break into the car. Cut a thin metal ruler into a shape like
- this:
- ----
- | |
- | |
- | |
- | <
- ----
- Slide it into the outside window and keep pulling it back up until
- you catch the lock cable which should unlock the door. This device
- is also called a SLIM JIM. Now get the stereo, equalizer, radar
- detector, etc. Now destroy the inside. (A sharp knife does wonders
- on the seats!)
- Have Fun! -Jolly Roger-
- Do ya hate school? by The Jolly Roger
- - One of my favorites for getting out of a class or two is to call
- in a bomb threat. Tell 'em that it is in a locker. Then they have
- to check them all, whilst you can slip away for an hour or two.
- You can even place a fake bomb (in any locker but YOURS!). They
- might cancel school for a week while they investigate (of course,
- you will probably have to make it up in the summer...).
- - Get some pure potassium or pure sodium, put it in a capsule, and
- flush it down the toilet (smells awful! Stinks up the whole school!).
- - Use a smoke grenade in the hallway.
- - Steal the computer passwords & keys. Or steal the 80 column cards
- inside if they are (gag) IBM.
- - Make friends with student assistants and have them change your
- grades when the teachers hand in their bubble sheets for the report
- cards.
- - Spit your gum out on the carpet in the library or whatever and
- grind it into the carpet. Watch the janitors cry!
- - Draw on lockers or spraypaint on the building that the principal
- is a fascist.
- - Stick a potato in the tailpipe of the principal's car.
- - USE YOUR IMAGINATION! -Jolly Roger-
- Phone related vandalism by the Jolly Roger
- If you live where there are underground lines then you will be
- able to ruin someone's phone life very easily. All you must do is
- go to their house and find the green junction box that interfaces
- their line (and possibly some others in the neighborhood) with the
- major lines. These can be found just about anywhere but they are
- usually underneath the nearest phone pole. Take a socket wrench
- and loosen the nut on the right. Then just take clippers or a
- sledge hammer or a bomb and destroy the insides and pull up their
- phone cable. Now cut it into segments so it can't be fixed but
- must be replaced (There is a week's worth of work for 'em!!)
- -Jolly Roger-
- Highway radar jamming by The Jolly Roger
- Most drivers wanting to make better time on the open road will
- invest in one of those expensive radar detectors. However, this
- device will not work against a gun type radar unit in which the
- radar signal is not present until the cop has your car in his
- sights and pulls the trigger. Then it is TOO LATE for you to slow
- down. A better method is to continuously jam any signal with a
- radar signal of your own. I have tested this idea with the
- cooperation of a local cop and found that his unit reads random
- numbers when my car approached him. It is suprisingly easy to make
- a low power radar transmitter. A nifty little semiconductor called
- a Gunn Diode will generate microwaves when supplied with the 5 to
- 10 volt DC and enclosed in the correct size cavity (resonater). An
- 8 to 3 terminal regulator can be used to get this voltage from a
- car's 12v system. However, the correct construction and tuning of
- the cavity is difficult without good microwave measurement
- equipment. Police radars commonly operate on the K band at 22 ghz.
- Or more often on the X band at 10.525 ghz. most microwave intruder
- alarms and motion detectors (mounted over automatic doors in
- supermarkets & banks, etc.) contain a Gunn type
- transmitter/receiver combination that transmits about 10 kilowatts
- at 10.525 ghz. These units work perfectly as jammers. If you
- cannot get one locally, write to Microwave Associates in
- Burlington, Massachusettes and ask them for info on 'Gunnplexers'
- for ham radio use. When you get the unit it may be mounted in a
- plastic box on the dash or in a weather-proff enclosure behind the
- PLASTIC grille. Switch on the power when on an open highway. The
- unit will not jam radar to the side or behind the car so don't go
- speeding past the radar trap. An interesting phenomena you will
- notice is that the drivers who are in front of you who are using
- detectors will hit their brakes as you approach large metal signs
- and bridges. Your signal is bouncing off of these objects and
- triggering their radar detectors! HAVE FUN!
- -Jolly Roger-
- P.S. If you are interested in this sort of thing, get a copy of
- POPULAR COMMUNICATIONS. The ads in there tell you where you can
- get all kinds of info on all kinds of neat equipment for all kinds
- of neat things!
- Smoke Bombs by the Jolly Roger
- Here is the recipe for one helluva smoke bomb!
- 4 parts sugar
- 6 parts potassium nitrate (Salt Peter)
- Heat this mixture over a LOW flame until it melts, stirring well.
- Pour it into a future container and, before it solidifies, imbed a
- few matches into the mixture to use as fuses. One pound of this
- stuff will fill up a whole block with thick, white smoke!
- Mail Box Bombs by the Jolly Roger
- (1) Two litre bottle of chlorine (must contain sodium hypochlorate)
- Small amount of sugar
- Small amount of water
- Mix all three of these in equal amounts to fill about 1/10 of the
- bottle. Screw on the lid and place in a mailbox. It's hard to
- believe that such a small explosion will literally rip the mailbox
- in half and send it 20 feet into the air! Be careful doing this,
- though, because if you are caught, it is not up to the person
- whose mailbox you blew up to press charges. It is up to the city.
- -Jolly Roger-
- The easiest way to hotwire cars by the Jolly Roger
- Get in the car. Look under the dash. If it enclosed, forget it
- unless you want to cut through it. If you do, do it near the
- ignition. Once you get behind or near the ignition look for two
- red wires. In older cars red was the standard color, if not, look
- for two matched pairs. When you find them, cross them and take
- off! -Jolly Roger-
- How to make Napalm by the Jolly Roger
- - Pour some gas into an old bowl, or some kind of container.
- - Get some styrofoam and put it in the gas, until the gas won't
- eat anymore. You should have a sticky syrup.
- - Put it on the end of something (don't touch it!!). The unused
- stuff lasts a long time!
- -Jolly Roger-
- How to make a fertilizer bomb by Jolly Roger
- Ingredients:
- - Newspaper
- - Fertilizer (the chemical kind, GREEN THUMB or ORCHO)
- - Cotton
- - Diesel fuel
- Make a pouch out of the newspaper and put some fertilizer in it.
- Then put cotton on top. Soak the cotton with fuel. Then light and
- run like you have never ran before! This blows up 500 square feet
- so don't do it in an alley!! -Jolly Roger-
- Tennis Ball Bombs by The Jolly Roger
- Ingredients:
- - Strike anywhere matches
- - A tennis ball
- - A nice sharp knife
- - Duct tape
- Break a ton of matchheads off. Then cut a SMALL hole in the tennis
- ball. Stuff all of the matchheads into the ball, until you can't
- fit any more in. Then tape over it with duct tape. Make sure it is
- real nice and tight! Then, when you see a geek walking down the
- street, give it a good throw. He will have a blast!!
- -Jolly Roger-
- Diskette Bombs by the Jolly Roger
- You need:
- - A disk
- - Scissors
- - White or blue kitchen matches (they MUST be these colors!)
- - Clear nail polish
- - Carefully open up the diskette (3.5" disks are best for this!)
- - Remove the cotton covering from the inside.
- - Scrape a lot of match powder into a bowl (use a wooden scraper,
- metal might spark the matchpowder!)
- - After you have a lot, spread it evenly on the disk.
- - Using the nail polish, spread it over the match mixture
- - Let it dry
- - Carefully put the diskette back together and use the nail polish
- to seal it shut on the inside (where it came apart).
- - When that disk is in a drive, the drive head attempts to read
- the disk, which causes a small fire (ENOUGH HEAT TO MELT THE DISK
- DRIVE AND FUCK THE HEAD UP!!). ahahahahaha! Let the fuckhead try
- and fix THAT!!! -Jolly Roger-
- Unlisted Phone Numbers by The Jolly Roger
- There are a couple of different ways of doing this. Let's see if
- this one will help: Every city has one or more offices dedicated
- to assigning numbers to the telephone wire pairs. These offices
- are called DPAC offices and are available to service reps who are
- installing or repairing phones. To get the DPAC number, a service
- rep would call the customer service number for billing information
- in the town that the number is located in that he is trying to get
- the unlisted number of. (Got that?) The conversation would go
- something like this: "Hi, Amarillo, this is Joe from Anytown
- business office, I need the DPAC number for the south side of
- town." This info is usually passed out with no problems, so... if
- the first person you call doesn't have it, try another. REMEMBER,
- no one has ANY IDEA who the hell you are when you are talking on
- the phone, so you can be anyone you damn well please! (heheheheh!)
- When you call the DPAC number, just tell them that you need a
- listing for either the address that you have, or the name. DPAC
- DOES NOT SHOW WHETHER THE NUMBER IS LISTED OR UNLISTED!! Also, if
- you're going to make a habit of chasing numbers down, you might
- want to check into geting a criss-cross directory, which lists
- phone numbers by their addresses. It costs a couple-a-hundred bux,
- but it is well worth it if you have to chase more than one or two
- numbers down! -Jolly Roger-
- Fuses brought to you by The Jolly Roger
- You would be surprised how many files are out there that use what
- falls under the category of a "fuse." They assume that you just
- have a few lying around, or know where to get them. Well, in some
- parts of the country, fuses are extremely hard to come by... so
- this file tells you how to make your own. Both fuses presented
- here are fairly simple to make, and are fairly reliable.
- SLOW BURNING FUSE
- ~~~~~~~~~~~~~~~~~ (approx. 2 inches per minute)
- Materials needed:
- - Cotton string or 3 shoelaces
- - Potassium Nitrate or Potassium Chlorate
- - Granulated sugar
- Procedure:
- - Wash the cotton string or showlaces in HOT soapy water, then
- rinse with fresh water
- - Mix the following together in a glass bowl:
- 1 part potassium nitrate or potassium chlorate
- 1 part granulated sugar
- 2 parts hot water
- - Soak strings or shoelaces in this solution
- - Twist/braid 3 strands together and allow them to dry
- - Check the burn rate to see how long it actually takes!!
- FAST BURNING FUSE
- ~~~~~~~~~~~~~~~~~ (40 inches per minute)
- Materials needed:
- -Soft cotton string
- -fine black powder (empty a few shotgun shells!)
- -shallow dish or pan
- Procedure:
- - moisten powder to form a paste
- - twist/braid 3 strands of cotton together
- - rub paste into string and allow to dry
- - Check the burn rate!!!
- How to make Potassium Nitrate by The Jolly Roger
- Potassium Nitrate is an ingredient in making fuses, among other
- things. Here is how you make it:
- Materials needed:
- -3.5 gallons of nitrate bearing earth or other material
- -1/2 cup of wood ashes
- -Bucket or other similar container about 4-5 gallons in volume
- -2 pieces of finely woven cloth, each a bit bigger than the
- bottom of the bucket
- -Shallow dish or pan at least as large in diameter as the bucket
- -Shallow, heat resistant container
- -2 gallons of water
- -Something to punch holes in the bottom of the bucket
- -1 gallon of any type of alcohol
- -A heat source
- -Paper & tape
- Procedure:
- - Punch holes on the inside bottom of the bucket, so that the
- metal is"puckered" outward from the bottom
- - Spread cloth over the holes from the bottom
- - Place wood ashes on the cloth. Spread it out so that it covers
- the entire cloth and has about the same thickness.
- - Place 2nd cloth on top of the wood ashes
- - Place the dirt or other material in the bucket
- - Place the bucket over the shallow container. NOTE: It may need
- support on the bottom so that the holes on the bottom are not
- blocked.
- - Boil water and pour it over the earth very slowly. Do NOT pour
- it all at once, as this will clog the filter on the bottom.
- - Allow water to run through holes into the shallow dish on the
- bottom.
- - Be sure that the water goes through ALL of the earth!
- - Allow water in dish to cool for an hour or so
- - Carefully drain the liquid in the dish away, and discard the
- sludge in the bottom
- - Boil this liquid over a fire for at least two hours. Small
- grains of salt will form - scoop these out with the paper as they
- form
- - When the liquid has boiled down to 1/2 its original volume let
- it sit
- - After 1/2 hour, add equal volume of the alcohol; when this
- mixture is poured through paper, small white crystals appear. This
- is the posassium nitrate.
- Purification:
- - Redissolve crystals in small amount of boiling water
- - Remove any crystals that appear
- - Pour through improvised filter then heat concentrated solution
- to dryness.
- - Spread out crystals and allow to dry
- Exploding lightbulbs by The Jolly Roger
- Materials needed:
- -lightbulb (100w)
- -socket (duh...)
- -1/4 cup soap chips
- -blackpowder! (open some shotgun shells!)
- -1/4 cup kerosene orgasoline
- -adhesive tape
- -lighter or small blowtorch
- -glue
- Procedure for a simple exploding lightbulb:
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- - Drill a small hole in the top of the bulb near the threads!
- - Carefully pour the blackpowder into the hole. Use enough so
- that it touches the filament!
- - Insert into socket as normal (make sure the light is off or
- else YOU will be the victim!!)
- - Get the hell out!!
- Procedure for a Napam Bulb:
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~
- - Heat kerosene/gasoline in a double boiler
- - Melt soap chips, stirring slowly.
- - Put somewhere and allow to cool
- - Heat the threads of the bulb VERY carefully to melt the glue.
- Remove threads, slowly drawing out the filament. Do NOT break the
- cheap electrical igniters and/or the filament or this won't work!!
- - Pour the liquid into the bulb, and slowly lower the filament
- back down into the bulb. Make sure the filament is dipped into the
- fluid.
- - Re-glue the threads back on. Insert it into a socket frequently
- used by the victim and get the hell out!!
- When the victim flips the switch, he will be in for a BIG surprise!
- Have fun! -Jolly Roger-
- Under water igniters by The Jolly Roger
- Materials needed:
- -Pack of 10 silicon diodes (available at Radio Shack. you will
- know you got the right ones if they are very, very small glass
- objects!)
- -Pack of matches
- -1 candle
- Procedure:
- - Light the candle and allow a pool of molten wax to form in the
- top.
- - Take a single match and hold the glass part of a single diode
- against the head. Bend the diode pins around the matchhead so that
- one wraps in an upward direction and thensticks out to the side.
- Do the same with the other wire, but in a downward direction. The
- diodes should now be hugging the matchhead, but its wires MUST NOT
- TOUCH EACH OTHER!
- - Dip the matchhead in wax to give it a water-proof coat. These
- work underwater
- - repeat to make as many as you want
- How to use them:
- When these little dudes are hooked across a 6v battery, the diode
- reaches what is called breakdown voltage. When most electrical
- components reach this voltage, they usually produce great amounts
- of heat and light, while quickly melting into a little blob. This
- heat is enough to ignite a matchhead. These are recommended for
- use underwater, where most other igniters refuse to work. ENJOY!
- -Jolly Roger-
- Home-brew blast cannon by The Jolly Roger
- Materials needed:
- -1 plastic drain pipe, 3 feet long, at least 3 1/2 inches in
- diameter
- -1 smaller plastic pipe, about 6 inches long, 2 inches in
- diameter
- -1 large lighter, with fluid refills (this gobbles it up!)
- -1 pipe cap to fit the large pipe, 1 pipe cap to fit the small
- pipe
- -5 feet of bellwire
- -1 SPST rocker switch
- -16v polaroid pot-a-pulse battery
- -15v relay (get this at Radio Shack)
- -Electrical Tape
- -One free afternoon
- Procedure:
- - Cut the bell wire into three equal pieces, and strip the ends
- - Cut a hole in the side of the large pipe, the same diameter as
- the small pipe. Thread the hole and one end of the small pipe.
- they should screw together easily.
- - Take a piece of scrap metal, and bend it into an "L" shape,
- then attach it to the level on the lighter:
- /------------------------gas switch is here
- V
- /------
- !lighter!!<---metal lever
- !!!
- !!
- Now, every time you pull the 'trigger' gas should flow freely from
- the lighter. You may need to enlarge the 'gas port' on your
- lighter, if you wish to be able to fire more rapidly.
- - Connect two wires to the two posts on the switch
- - Cut two holes in the side of the smaller tube, one for the
- switch on the bottom, and one for the metal piece on the top.
- Then, mount the switch in the bottom, running the wires up and out
- of the top.
- - Mount the lighter/trigger in the top. Now the switch should
- rock easily, and the trigger should cause the lighter to pour out
- gas. Re-screw the smaller tube into the larger one, hold down the
- trigger a bit, let it go, and throw a match in there. If all goes
- well, you should hear a nice big 'THUD!'
- - Get a hold of the relay, and take off the top.
- 1---------------
- v/
- 2--------------/<--- the center object is the metal finger inside
- 3 the relay
- cc-------------/
- oo----------------4
- ii
- ll----------------5
- Connect (1) to one of the wires coming from the switch. Connect
- (2) to (4), and connect (5) to one side of the battery. Connect
- the remaining wire from the switch to the other side of the
- battery. Now you should be able to get the relay to make a little
- 'buzzing' sound when you flip the switch and you should see some
- tiny little sparks.
- - Now, carefully mount the relay on the inside of the large pipe,
- towards the back. Screw on the smaller pipe, tape the battery to
- the side of the cannon barrel (yes, but looks aren't everything!)
- - You should now be able to let a little gas into the barrel and
- set it off by flipping the switch.
- - Put the cap on the back end of the large pipe VERY SECURELY.
- You are now ready for the first trial-run!
- To Test:
- Put something very, very large into the barrel, just so that it
- fits 'just right'. Now, find a strong guy (the recoil will
- probably knock you on your ass if you aren't careful!). Put on a
- shoulderpad, earmuffs, and possibly some other protective clothing
- (trust the Jolly Roger! You are going to need it!). Hold the
- trigger down for 30 seconds, hold on tight, and hit the switch.
- With luck and the proper adjustments, you should be able to put a
- frozed orange through 1/4 or plywood at 25 feet.
- Have fun! -Jolly Roger-
- Chemical Equivalency list by the Jolly Roger
- Acacia..................................................Gum Arabic
- Acetic Acid................................................Vinegar
- Aluminum Oxide..............................................Alumia
- Aluminum Potassium Sulphate...................................Alum
- Aluminum Sulfate..............................................Alum
- Ammonium Carbonate.......................................Hartshorn
- Ammonium Hydroxide.........................................Ammonia
- Ammonium Nitrate........................................Salt Peter
- Ammonium Oleate.......................................Ammonia Soap
- Amylacetate............................................Bananna Oil
- Barium Sulfide...........................................Black Ash
- Carbon Carbinate.............................................Chalk
- Carbontetrachloride.................................Cleaning Fluid
- Calcium Hypochloride..............................Bleaching Powder
- Calcium Oxide.................................................Lime
- Calcium Sulfate...................................Plaster of Paris
- Carbonic Acid..............................................Seltzer
- Cetyltrimethylammoniumbromide........................Ammonium Salt
- Ethylinedichloride.....................................Dutch Fluid
- Ferric Oxide.............................................Iron Rust
- Furfuraldehyde............................................Bran Oil
- Glucose.................................................Corn Syrup
- Graphite...............................................Pencil Lead
- Hydrochloric Acid....................................Muriatic Acid
- Hydrogen Peroxide.........................................Peroxide
- Lead Acetate.........................................Sugar of Lead
- Lead Tero-oxide...........................................Red Lead
- Magnesium Silicate............................................Talc
- Magnesium Sulfate.......................................Epsom Salt
- Methylsalicylate..................................Winter Green Oil
- Naphthalene..............................................Mothballs
- Phenol...............................................Carbolic Acid
- Potassium Bicarbonate..............................Cream of Tarter
- Potassium Chromium Sulfate..............................Chromealum
- Potassium Nitrate.......................................Salt Peter
- Sodium Oxide..................................................Sand
- Sodium Bicarbonate.....................................Baking Soda
- Sodium Borate................................................Borax
- Sodium Carbonate......................................Washing Soda
- Sodium Chloride...............................................Salt
- Sodium Hydroxide...............................................Lye
- Sodium Silicate..............................................Glass
- Sodium Sulfate......................................Glauber's Salt
- Sodium Thiosulfate.............................Photographer's Hypo
- Sulfuric Acid.........................................Battery Acid
- Sucrose.................................................Cane Sugar
- Zinc Chloride.......................................Tinner's Fluid
- Zinc Sulfate.........................................White Vitriol
- Phone Taps by The Jolly Roger
- Here is some info on phone taps. In this file is a schematic for a
- simple wiretap & instructions for hooking up a small tape recorder
- control relay to the phone line.
- First, I will discuss taps a little. There are many different
- types of taps. there are transmitters, wired taps, and induction
- taps to name a few. Wired and wireless transmitters must be
- physically connected to the line before they will do any good.
- Once a wireless tap is connected to the line,it can transmit all
- conversations over a limited reception range. The phones in the
- house can even be modifies to pick up conversations in the room
- and transmit them too! These taps are usually powered off of the
- phone line, but can have an external power source. You can get more
- information on these taps by getting an issue of Popular
- Communications and reading through the ads. Wired taps, on the
- other hand, need no power source, but a wire must be run from the
- line to the listener or to a transmitter. There are obvious
- advantages of wireless taps over wired ones. There is one type of
- wireless tap that looks like a normal telephone mike. All you have
- to do is replace the original mike with thisand itwill transmit
- all conversations! There is also an exotic type of wired tap known
- as the 'Infinity Transmitter' or 'Harmonica Bug'. In order to hook
- one of these, it must be installed inside the phone. When someone
- calls the tapped phone & *before* it rings,blows a whistle over
- the line, the transmitter picks up the phone via a relay. The mike
- on the phone is activated so that the caller can hear all of the
- conversations in the room. There is a sweep tone test at
- 415/BUG-1111 which can be used to detect one of these taps. If one
- of these is on your line & the test # sends the correct tone, you
- will hear a click. Induction taps have one big advantage over taps
- that must be physically wired to the phone. They do not have to be
- touching the phone in order to pick up the conversation. They work
- on the same principle as the little suction-cup tape recorder
- mikes that you can get at Radio Shack. Induction mikes can be
- hooked up to a transmitter or be wired.
- Here is an example of industrial espionage using the phone:
- A salesman walks into an office & makes a phone call. He fakes
- the conversation, but when he hangs up he slips some foam rubber
- cubes into the cradle. The called party can still hear all
- conversations in the room. When someone picks up the phone, the
- cubes fall away unnoticed.
- A tap can also be used on a phone to overhear what your modem is
- doing when you are wardialing, hacking, or just plain calling a
- bbs (like the White Ruins! Denver, Colorado! 55 megs online!
- Atari! Macintosh! Amiga! Ibm! CALL IT! 303-972-8566! By the way, i
- did this ad without the sysops consent or knowledge!).
- Here is the schematic:
- -------)!----)!(------------->
- )!(
- Cap ^ )!(
- )!(
- )!(
- )!(
- ^^^^^---)!(------------->
- ^ 100K
- !
- ! <Input
- The 100K pot is used for volume. It should be on its highest
- (least resistance) setting if you hook a speaker across the
- output. but it should be set on its highest resistance for a tape
- recorder or amplifier. You may find it necessary to add another
- 10 - 40K. The capacitor should be around .47 MFD. It's only
- purpose is to prevent the relay in the phone from tripping &
- thinking that you have the phone off of the hook. the audio output
- transformer is available at Radio Shack. (part # 273-138E for
- input). The red & the white wires go to the output device. You may
- want to experiment with the transformer for the best output.
- Hooking up a tape recorder relay is easy. Just hook one of the phone
- wires (usually red) to the the end of one of the relay & the ther
- end just loop around. This bypasses it. It should look like this:
- ------^^^^^^^^^------------
- ---------
- RELAY^^
- (part #275-004 from Radio Shack works fine)
- If you think that you line is tapped, the first thing to do is to
- physically inspect the line yourself ESPECIALLY the phones. You
- can get mike replacements with bug detectors built in. However, I
- would not trust them too much. It is too easy to get a wrong
- reading.
- For more info:
- BUGS AND ELECTRONIC SURVEILANCE from Desert Publications
- HOW TO AVOID ELECTRONIC EAVESDROPPING & PRIVACY INVASION. I do not
- remember who this one is from... you might want to try Paladin
- Press.
- -Jolly Roger-
- How to make a landmine by The Jolly Roger
- First, you need to get a pushbutton switch. Take the wires of it
- and connect one to a nine volt battery connector and the other to
- a solar igniter (used for launching model rockets). A very thin
- piece of stereo wire will usually do the trick if you are
- desperate, but I recommend the igniter. Connect the other wire of
- the nine-volt battery to one end of the switch. Connect a wire
- from the switch to the other lead on the solar igniter.
- switch-----------battery
- \ /
- \ /
- \ /
- \ /
- solar igniter
- |
- |
- |
- explosive
- Now connect the explosive (pipe bomb, m-80, CO2 bomb, etc.) to the
- igniter by attaching the fuse to the igniter (seal it with scotch
- tape). Now dig a hole; not too deep but enough to cover all of the
- materials. Think about what direction your enemy will be coming from
- and plant the switch, but leave the button visible (not TOO
- visible!). Plant the explosive about 3-5 feet away from the switch
- because there will be a delay in the explosion that depends on how
- short your wick is, and, if a homemade wick is being used, its
- burning speed. But if you get it right... and your enemy is close
- enough......... BBBBBBBOOOOOOOOOOOOOOOOOOOOOOOOMMMM! hahahaha
- -Jolly Roger-
- A different kind of Molitoff Cocktail by the Jolly Roger
- Here is how you do it:
- - Get a coke bottle & fill it with gasoline about half full
- - Cram a piece of cloth into the neck of it nice and tight
- - Get a chlorine tablet and stuff it in there. You are going to have
- to force it because the tablets are bigger than the opening of the
- bottle.
- - Now find a suitable victim and wing it in their direction. When it
- hits the pavement or any surface hard enough to break it, and the chlorine
- and gasoline mix..... BOOM!!!!!!
- Have fun! -Jolly Roger-
- Phone Systems Tutorial by The Jolly Roger
- To start off, we will discuss the dialing procedures for domestic
- as well as international dialing. We will also take a look at the
- telephone numbering plan.
- North American Numbering Plan
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
- In North America, the telephone numbering plan is as follows:
- A) a 3 digit Numbering Plan Area (NPA) code , ie, area code
- B) a 7 digit telephone # consisting of a 3 digit Central Office
- (CO) code plus a 4 digit station #
- These 10 digits are called the network address or destination
- code. It is in the format of:
- Area Code Telephone #
- --------- -----------
- N*X NXX-XXXX
- Where: N = a digit from 2 to 9
- * = the digit 0 or 1
- X = a digit from 0 to 9
- Area Codes
- ~~~~~~~~~~
- Check your telephone book or the seperate listing of area codes
- found on many bbs's. Here are the special area codes (SAC's):
- 510 - TWX (USA)
- 610 - TWX (Canada)
- 700 - New Service
- 710 - TWX (USA)
- 800 - WATS
- 810 - TWX (USA)
- 900 - DIAL-IT Services
- 910 - TWX (USA)
- The other area codes never cross state lines, therefore each state
- must have at least one exclusive NPA code. When a community is
- split by a state line, the CO #'s are often interchangeable (ie,
- you can dial the same number from two different area codes).
- TWX (Telex II) consists of 5 teletype-writer area codes. They are
- owned by Western Union. These SAC's may only be reached via other
- TWX machines. These run at 110 baud (last I checked! They are most
- likely faster now!). Besides the TWX #'s, these machines are
- routed to normal telephone #'s. TWX machines always respond with
- an answerback. For example, WU's FYI TWX # is (910) 279-5956. The
- answerback for this service is "WU FYI MAWA".
- If you don't want to but a TWX machine, you can still send TWX
- messages using Easylink [800/325-4112]. However you are gonna have
- to hack your way onto this one!
- 700:
- 700 is currently used by AT&T as a call forwarding service. It is
- targeted towards salesmen on the run. To understand how this
- works, I'll explain it with an example. Let's say Joe Q. Salespig
- works for AT&T security and he is on the run chasing a phreak
- around the country who royally screwed up an important COSMOS
- system. Let's say that Joe's 700 # is (700) 382-5968. Everytime
- Joe goes to a new hotel (or most likely SLEAZY MOTEL), he dials a
- special 700 #, enters a code, and the number where he is staying.
- Now, if his boss received some important info, all he would do is
- dial (700) 382-5968 and it would ring wherever Joe last progammed
- it to. Neat, huh?
- 800:
- This SAC is one of my favourites since it allows for toll free
- calls. INWARD WATS (INWATS), or Inward Wide Area
- Telecommunications Service is the 800 #'s that we are all familiar
- with. 800 #'s are set up in service areas or bands. There are 6 of
- these. Band 6 is the largest and you can call a band 6 # from
- anywhere in the US except the state where the call is terminated
- (that is why most companies have one 800 number for the countery
- and then another one for their state.) Band 5 includes the 48
- contiguous states. All the way down to band 1 which includes only
- the states contiguous to that one. Therefore, less people can
- reach a band 1 INWATS # than a band 6 #.
- Intrastate INWATS #'s (ie, you can call it from only 1 state)
- always have a 2 as the last digit in the exchange (ie, 800-NX2-
- XXXX). The NXX on 800 #'s represent the area where the business is
- located. For example, a # beginning with 800-431 would terminate
- at a NY CO.
- 800 #'s always end up in a hunt series in a CO. This means that it
- tries the first # allocated to the company for their 800 lines; if
- this is busy, it will try the next #, etc. You must have a minimum
- of 2 lines for each 800 #. For example, Travelnet uses a hunt
- series. If you dial (800) 521-8400, it will first try the #
- associated with 8400; if it is busy it will go to the next
- available port, etc. INWATS customers are billed by the number of
- hours of calls made to their #.
- OUTWATS (OUTWARD WATS): OUTWATS are for making outgoing calls
- only. Largecompanies use OUTWATS since they receive bulk-rate
- discounts. Since OUTWATS numbers cannot have incoming calls, they
- are in the format of:
- (800) *XXX-XXXX
- Where * is the digit 0 or 1 (or it may even be designated by a
- letter) which cannot be dialed unless you box the call. The *XX
- identifies the type of service and the areas that the company can
- call.
- Remember:
- INWATS + OUTWATS = WATS EXTENDER
- 900:
- This DIAL-IT SAC is a nationwide dial-it service. It is use for
- taking television polls and other stuff. The first minute
- currently costs an outrageous 50-85 cents and each additional
- minute costs 35-85 cents. Hell takes in a lot of revenue this way!
- Dial (900) 555-1212 to find out what is currently on this service.
- CO CODES
- ~~~~~~~~
- These identify the switching office where the call is to be
- routed. The following CO codes are reserved nationwide:
- 555 - directory assistance
- 844 - time. These are now in!
- 936 - weather the 976 exchange
- 950 - future services
- 958 - plant test
- 959 - plant test
- 970 - plant test (temporary)
- 976 - DIAL-IT services
- Also, the 3 digit ANI & ringback #'s are regarded as plant test
- and are thus reserved. These numbers vary from area to area.
- You cannot dial a 0 or 1 as the first digit of the exchange code
- (unless using a blue box!). This is due to the fact that these
- exchanges (000-199) contains all sorts of interesting shit such as
- conference #'s, operators, test #'s, etc.
- 950:
- Here are the services that are currently used by the 950 exchange:
- 1000 - SPC
- 1022 - MCI Execunet
- 1033 - US Telephone
- 1044 - Allnet
- 1066 - Lexitel
- 1088 - SBS Skyline
- These SCC's (Specialized Common Carriers) are free from fortress
- phones! Also, the 950 exchange will probably be phased out with
- the introduction of Equal Access
- Plant Tests:
- These include ANI, Ringback, and other various tests.
- 976:
- Dial 976-1000 to see what is currently on the service. Also, many
- bbs's have listings of these numbers.
- N11 codes:
- ----------
- Bell is trying to phase out some of these, but they still exist in
- most areas.
- 011 - international dialing prefix
- 211 - coin refund operator
- 411 - directory assistance
- 611 - repair service
- 811 - business office
- 911 - EMERGENCY
- International Dialing
- ~~~~~~~~~~~~~~~~~~~~~
- With International Dialing, the world has been divided into 9
- numbering zones. To make an international call, you must first
- dial: International Prefix + Country code + National #
- In North America, the international dialing prefix is 011 for
- station-to-station calls. If you can dial International #'s
- directly in your area then you have International Direct Distance
- Dialing (IDDD).
- The country code, which varies from 1 to 3 digits, always has the
- world numbering zone as the first digit. For example, the country
- code for the United Kingdom is 44, thus it is in world numbering
- zone 4. Some boards may contain a complete listing of other
- country codes, but here I give you a few:
- 1 - North America (US, Canada, etc.)
- 20 - Egypt
- 258 - Mozambique
- 34 - Spain
- 49 - Germany
- 52 - Mexico (southern portion)
- 7 - USSR
- 81 - Japan
- 98 - Iran (call & hassle those bastards!)
- If you call from an area other than North America, the format is
- generally the same. For example, let's say that you wanted to call
- the White House from Switzerland to tell the prez that his
- numbered bank account is overdrawn (it happens, you know! ha ha).
- First you would dial 00 (the SWISS international dialing refix),
- then 1 (the US country code), followed by 202-456-1414 (the
- national # for the White House. Just ask for Georgy and give him
- the bad news!)
- Also, country code 87 is reserved for Maritime mobile service, ie,
- calling ships:
- 871 - Marisat (Atlantic)
- 871 - Marisat (Pacific)
- 872 - Marisat (Indian)
- International Switching:
- ------------------------
- In North America there are currently 7 no. 4 ESS's that perform
- the duty of ISC (Inter-nation Switching Centers). All
- international calls dialed from numbering zone 1 will be routed
- through one of these "gateway cities". They are:
- 182 - White Plains, NY
- 183 - New York, NY
- 184 - Pittsburgh, PA
- 185 - Orlando, Fl
- 186 - Oakland, CA
- 187 - Denver, CO
- 188 - New York, NY
- The 18X series are operator routing codes for overseas access (to
- be furthur discussed with blue boxes). All international calls use
- a signaling service called CCITT.It is an international standard
- for signaling.
- Ok.. there you go for now! If you wanna read more about this, read
- part two which is the next file #36 in the Jolly Roger's cookbook!
- -Jolly Roger-
- Phone Systems Tutorial part II by The Jolly Roger
- Part II will deal with the various types of operators, office
- heirarchy, & switching equipment.
- Operators
- ~~~~~~~~~
- There are many types of operators in the network and the more
- common ones will be discussed.
- TSPS Operator:
- The TSPS [(Traffic Service Position System) ass opposed to This
- Shitty Phone Service] Operator is probably the bitch (or bastard,
- for the female libertationists out there) that most of us are used
- to having to deal with. Here are his/her responsibilities:
- 1) Obtaning billing information for calling card or third number
- calls
- 2) Identifying called customer on person-to-person calls.
- 3) Obtaining acceptance of charges on collect calls.
- 4) Identifying calling numbers. This only happens when the calling
- # is not automatically recorded by CAMA (Centralized Automatic
- Message Accounting) & forwarded from the local office. This could
- be caused by equipment failures (ANIF- Automatic Number
- Identification Failure) or if the office is not equipped for CAMA
- (ONI- Operator Number Identification).
- <I once has an equipment failure happen to me & the TSPS operator
- came on and said, "What # are you calling FROM?" Out of curiosity,
- I gave her the number to my CO, she thanked me & then I was
- connected to a conversation that appeared to be between a frameman
- & his wife. Then it started ringing the party I wanted to
- originally call & everyone phreaked out (excuse the pun). I
- immediately dropped this dual line conference!
- You should not mess with the TSPS operator since she KNOWS which
- number that you are calling from. Your number will show up on a
- 10-digit LED read-out (ANI board). She also knows whether or not
- you are at a fortress phone & she can trace calls quite readily!
- Out of all of the operators, she is one of the MOST DANGEROUS.
- INWARD operator:
- This operator assists your local TSPS ("0") operatorin connecting
- calls. She will never question a call as long as the call is
- withing HER SERVICE AREA. She can only be reached via other
- operators or by a blue box. From a blue box, you would dial
- KP+NPA+121+ST for the INWARD operator that will help you connect
- any calls within that NPA only. (Blue Boxing will be discussed in
- a future file).
- DIRECTORY ASSISTANCE Operator:
- This is the operator that you are connected to when you dial: 411
- or NPA-555-1212. She does not readily know where you are calling
- from. She does not have access to unlisted numbers, but she DOES
- know if an unlisted # exists for a certain listing.
- There is also a directory assistance operator for deaf people who
- use teletypewriters. If your modem can transfer BAUDOT [(45.5
- baud). One modem that I know of that will do this is the Apple Cat
- acoustic or the Atari 830 acoustic modem. Yea I know they are hard
- to find... but if you wanna do this.. look around!) then you can
- call him/her up and have an interesting conversation. The # is:
- 800-855-1155. They use the standard Telex abbreviations such as GA
- for go ahead. they tend to be nicer and will talk longer than your
- regular operators. Also, they are more vulnerable into being
- talked out of information through the process of "social
- engineering" as Chesire Catalyst would put it.
- <Unfortunately, they do not have access to much. I once
- bullshitted with one of these operators a while back and I found
- out that there are 2 such DA offices that handle TTY. One is in
- Philadelphia and the other is in California. They have approx. 7
- operators each. most of the TTY operators think that their job is
- boring (based on an official "BIOC poll"). They also feel that
- they are under-paid. They actually call up a regular DA # to
- process your request (sorry, no fancy computers!)
- Other operators have access to their own DA by dialing
- KP+NPA+131+ST (MF).
- CN/A operators:
- CN/A Operators are operators that do exactly the opposite of what
- directory assistance operators are for. In my experience, these
- operators know more than the DA op's do & they are more
- susceptable to "social engeneering." It is possible to bullshit a
- CN/A operator for the NON-PUB DA # (ie, you give them the name &
- they give you the unlisted number. See the article on unlisted
- numbers in this cookbook for more info about them.). This is due
- to the fact that they assume that you are a fellow company
- employee. Unfortunately, the AT&T breakup has resulted in the
- break-up of a few NON-PUB DA #'s and policy changes in CN/A
- INTERCEPT Operator:
- The intercept operator is the one that you are connected to when
- there are notenough recordings available to tell you that the #
- has been disconnected or changed. She usually says, "What # you
- callin'?" with a foreign accent. This is the lowest operator
- lifeform. Even though they don't know where you are calling from,
- it is a waste or your time to try to verbally abuse them since
- they usually understand very little English anyway.
- Incidentally, a few area DO have intelligent INTERCEPT Operators.
- OTHER Operators:
- And then there are the: MObile, Ship-to-Shore, Conference, Marine
- Verify, "Leave Word and Call Back," Rout & Rate
- (KP+800+141+1212+ST), & other special operators who have one
- purpose or another in the network.
- Problems with an Operator> Ask to speak to their supervisor... or
- better yet the Group Chief (who is the highest ranking official in
- any office) who is the equivalent of the Madame ina whorehouse.
- By the way, some CO's that willallow you to dial a 0 or 1 as the
- 4th digit, will also allow you to call special operators & other
- fun Tel. Co. #'s without a blue box. This is ver rare, though! For
- example,212-121-1111 will get you a NY Inward Operator.
- Office Hierarchy
- ~~~~~~~~~~~~~~~~
- Every switching office in North America (the NPA system), is
- assigned an office name and class. There are five classes of
- offices numbered 1 through 5. Your CO is most likely a class 5 or
- end office. All long-distance (Toll) calls are switched by a toll
- office which can be a class 4, 3, 2, or 1 office. There is also a
- class 4X office callen an intermediate point. The 4X office is a
- digital one that can have an unattended exchange attached to it
- (known as a Remote Switching Unit (RSU)).
- The following chart will list the Office #, name, & how many of
- those office exist (to the best of my knowledge) in North America:
- Class Name Abb # Existing
- ----- ----------------------- --- -----------------
- > 1 Regional Center RC 12
- > 2 Sectional Center SC 67
- > 3 Primary Center PC 230
- > 4 Toll Center TC 1,300
- > 4P Toll Point TP n/a
- > 4X Intermediate Point IP n/a
- > 5 End Office EO 19,000
- > 6 RSU RSU n/a
- When connecting a call from one party to another, the switching
- equipment usually tries to find the shortest route between the
- class 5 end office of the caller & the class 5 end officeof the
- called party. If no inter-office trunks exist between the two
- parties, it will then move upward to the next highest office for
- servicing calls (Class 4). If the Class 4 office cannot handle the
- call by sending it to another Class 4 or 5 office, it will then be
- sent to the next highest office in the hierarchy (3). The
- switching equipment first uses the high-usage interoffice trunk
- groups, if they are busy then it goes to the fina; trunk groups on
- the next highest level. If the call cannot be connected, you will
- probably get a re-order [120 IPM (interruptions per minute) busy
- signal] signal. At this time, the guys at Network Operations are
- probably shitting in their pants and trying to avoid the dreaded
- Network Dreadlock (as seen on TV!).
- It is also interesting to note that 9 connections in tandem is
- called ring-around-the-rosy and it has never occured in telephone
- history. This would cause an endless loop connection [a neat way
- to really screw up the network].
- The 10 regional centers in the US & the 2 in Canada are all
- interconnected. they form the foundation of the entire telephone
- network. Since there are only 12 of them, they are listed below:
- Class 1 Regional Office Location NPA
- -------------------------------- ---
- Dallas 4 ESS 214
- Wayne, PA 215
- Denver 4T 303
- Regina No. 2SP1-4W (Canada) 306
- St. Louis 4T 314
- Rockdale, GA 404
- Pittsburgh 4E 412
- Montreal No. 1 4AETS (Canada) 504
- That's it for now! More info to come Future update to the
- Cookbook! Have fun! -Jolly Roger-
- Basic Alliance Teleconferencing Courtesy of the Jolly Roger
- Introduction:
- ------------
- This phile will deal with accessing, understanding and using the Alliance
- Teleconferencing Systems.... it has many sections and for best use should
- be printed out...enjoy...
- Alliance:
- --------
- Alliance Teleconferencing is an independant company which allows the general
- public to access and use it's conferencing equipment. Many rumors have
- been floating apound that Alliance is a subsidary of AT&T.
- Well, they are wrong. As stated above, Alliance is an entirely independant
- company. They use sophisticated equipment to allow users to talk to many
- people at once.
- The Number:
- ---------
- Alliance is in the 700 exchange, thus it is not localized, well, not
- in a way. Alliance is only in certain states, and only
- residents of these certain states can access by dialing direct. This,
- however, will be discussed in a later chapter. The numbers for alliance are
- as follows:
- 0-700-456-1000 (chicago)
- -1001 (los angeles)
- -1002 (chicago)
- -1003 (houston)
- -2000 (?)
- -2001 (?)
- -2002 (?)
- -2003 (?)
- -3000 (?)
- -3001 (?)
- -3002 (?)
- -3003 (?)
- The locations of the first 4 numbers are known and i have stated them.
- However, the numbers in the 200x and 300x are not definately known.
- Rumor has it that the pattern repeats itself but this has not been proven.
- Dialing:
- -------
- As stated before, Alliance is only in certain stated and only these states
- can access them via dialing direct. However, dialing direct causes your
- residence to be charged for the conference and conference bills are not low!!!
- Therefore, many ways have been discovered to start a conference without
- having it billed to ones house. They are as follows:
- 1) Dialing through a PBX
- 2) Incorporating a Blue Box
- 3) Billing to a loop
- 4) Billing to a forwarded call
- I am sure there are many more but these are the four i will deal with.
- Dialing through a PBX:
- ------- ------- - ---
- Probably the easiest method of creating a free conference is through a PBX.
- Simply call one in a state that has Alliance, input the PBX's code,
- dial 9 for an outside line and then dial alliance.
- An example of this would be:
- PBX: 800-241-4911
- When it answers it will give you a tone. At this tone input your code.
- Code: 1234
- After this you will receive another tone, now dial 9 for an outside line.
- You will now hear a dial tone. Simply dial Alliance from this point and
- the conference will be billed to the PBX.
- Using a Blue Box:
- ----- - ---- ---
- Another rather simple way of starting a conference is with a Blue Box.
- The following procedure is how to box a conference:
- Dial a number to box off of. In this example we will use 609-609-6099
- When the party answers hit 2600hz. This will cause the fone company's
- equipment to think that you have hung up. You will hear a <beep><kerchunk>
- You have now 'seized' a trunk. After this, switch to multi-frequency
- and dial:
- KP-0-700-456-x00x-ST
- KP=KP tone on Blue Box
- x=variable between 1 and 3
- ST=ST tone on Blue Box
- The equipment now thinks that the operator has dialed Alliance from her
- switchboard and the conference shall be billed there. Since Blue Boxing
- is such a large topic, this is as far as I will go into it's uses.
- Billing to a loop:
- ------- -- - ----
- A third method of receiving a free conference is by billing out to a
- loop. A loop is 2 numbers that when two people call, they can talk
- to each other. You're saying woop-tee-do right? Wrong! Loops can be
- <very> usefull to phreaks. First, dial alliance direct. After going
- through the beginning procedure, which will be discussed later in this
- tutorial, dial 0 and wait for an Alliance operator. When she answers
- tell her you would like to bill the conference to such and such a
- number. (A loop where your phriend is on the other side) She will then
- call that number to receive voice verification.
- Of course your phriend will be waiting and will accept the charges.
- Thus, the conference is billed to the loop.
- Billing to call forwarding:
- ------- -- ---- ----------
- When you dial a number that is call forwarded, it is first answered by
- the original location, then forwarded. The original location will
- hang up if 2600hz is received from only ond end of the line.
- Therefore, if you were to wait after the forwarded residence answered,
- you would receive the original location's dial tone.
- Example:
- Dial 800-325-4067
- The original residence would answer, then forward the call, a second
- type of ringing would be heard. When this second residence answers
- simply wait until they hang up. After about twenty seconds you will
- then receive the original residence's dial tone since it heard 2600hz
- from one end of the line. Simply dial Alliance from this point and the
- conference will be billed to the original residence.
- These are the four main ways to receive a free conference. I am sure
- many more exist, but these four are quite handy themselves.
- Logon Procedure:
- ----- ---------
- Once Alliance answers you will hear a two-tone combination. This is their
- way of saying 'How many people do you want on the conference dude?'
- Simply type in a 2-digit combination, depending on what bridge of Alliance
- you are on, between 10 and 59. After this either hit '*' to cancel the
- conference size and inout another or hit '#' to continue.
- You are now in Alliance Teleconferencing and are only seconds away from
- having your own roaring conference going strong!!!
- Dialing in Conferees:
- ------- -- ---------
- To dial your first conferee, dial 1+npa+pre+suff and await his/her answer.
- npa=area code
- pre=prefix
- suff=suffix
- If the number is busy, or if no one answers simply hit '*' and your call
- will be aborted. But, if they do answer, hit the '#' key.
- This will add them to the conference.
- Now commence dialing other conferees.
- Joining Your Conference:
- ------- ---- ----------
- To join your conference from control mode simply hit the '#' key.
- Within a second or two you will be chatting with all your buddies.
- To go back into control mode, simply hit the '#' key again.
- Transferring Control:
- ------------ -------
- To transfer control to another conferee, go into control mode, hit the
- # 6+1+npa+pre+suff of the conferee you wish to give control to. If after,
- you wish to abort this transfer hit the '*' key.
- <note>:Transfer of control is often not available. When you
- receive a message stating this, you simply cannot transfer control.
- Muted Conferences:
- ----- -----------
- To request a muted conference simply hit the 9 key. I am not exactly
- sure what a muted conference is but it is probably a way to keep unwanted
- eavesdroppers from listening in.
- Dialing Alliance Operators:
- ------- -------- ---------
- Simply dial 0 as you would from any fone and wait for the operator to answer.
- Ending Your Conference:
- ------ ---- ----------
- To end your conference all together, that is kick everyone including
- yourself off, go into control mode and hit '*'...after a few seconds
- simply hang up. Your conference is over.
- Are Alliance Operators Dangerous?
- --- -------- --------- ---------
- No. Not in the least. The worst they can do to you while you are having
- a conference is drop all conferees including yourself. This is in no
- way harmful, just a little aggravating.
- Alliance and Tracing:
- -------- --- -------
- Alliance can trace, as all citizens of the United States can.
- But this has to all be pre-meditated and AT&T has to be called and it's
- really a large hastle, therefore, it is almost never done. Alliance simply
- does not want it known that teenagers are phucking them over.
- The only sort of safety equipment Alliance has on-line is a simple pen
- register. This little device simply records all the numbers of the
- conferees dialed. No big deal. All Alliance can do is call up that persons
- number, threaten and question. However, legally, they can do nothing because
- all you did was answer your fone.
- <note>:Almost all instructions are told to the person in command by Alliance
- recordings. A lot of this tutorial is just a listing of those
- commands plus information gathered by either myself or the phellow
- phreaks of the world!!!
- (written by the Trooper)
- Aqua Box Plans by Jolly Roger
- Every true phreaker lives in fear of the dreadded F.B.I. 'Lock In Trace.'
- For a long time, it was impossible to escape from the Lock In Trace.
- This box does offer an escape route with simple directions to it.
- This box is quite a simple concept, and almost any phreaker with basic
- electronics knowledge can construct and use it.
- The Lock In Trace
- ------------------
- A lock in trace is a device used by the F.B.I. to lock into the phone
- users location so that he can not hang up while a trace is in progress.
- For those of you who are not familiar with the conecpt of 'locking in',
- then here's a brief desciption. The F.B.I. can tap into a conversation,
- sort of like a three-way call connection. Then, when they get there,
- they can plug electricity into the phone line. All phone connections
- are held open by a certain voltage of electricity.
- That is why you sometimes get static and faint connections when you are
- calling far away, because the electricity has trouble keeping the line
- up. What the lock in trace does is cut into the line and generate that same
- voltage straight into the lines. That way, when you try and hang up, voltage
- is retained. Your phone will ring just like someone was calling you
- even after you hang up. (If you have call waiting, you should understand
- better about that, for call waiting intersepts the electricity and makes
- a tone that means someone is going through your line. Then, it is a matter
- of which voltage is higher. When you push down the receiver,then it see-saws
- the electricity to the other side. When you have a person on each line
- it is impossible to hang up unless one or both of them will hang up.
- If you try to hang up, voltage is retained, and your phone will ring.
- That should give you an understanding of how calling works. Also, when
- electricity passes through a certain point on your phone, the electricity
- causes a bell to ring, or on some newer phones an electronic ring to sound.)
- So, in order to eliminate the trace, you somehow must lower the
- voltage level on your phone line. You should know that every time
- someone else picks up the phone line, then the voltage does decrease
- a little. In the first steps of planning this out, Xerox suggested getting
- about a hundred phones all hooked into the same line that could all
- be taken off the hook at the same time. That would greatly decrease the
- voltage level. That is also why most three-way connections that are using
- the bell service three way calling (which is only $3 a month) become quite
- faint after a while. By now, you should understand the basic idea. You
- have to drain all of the power out of the line so the voltage can
- not be kept up. Rather sudden draining of power could quickly short out
- the F.B.I. voltage machine, because it was only built to sustain
- the exact voltage nessecary to keep the voltage out. For now, imagine
- this. One of the normal Radio Shack generators that you can go
- pick up that one end of the cord that hooks into the central box has a
- phone jack on it and the other has an electrical plug. This way, you
- can "flash" voltage through the line, but cannot drain it. So, some
- modifications have to be done.
- Materials
- ----------
- A BEOC (Basic Electrical Output Socket), like a small lamp-type
- connection, where you just have a simple plug and wire that would plug
- into a light bulb.
- One of cords mentioned above, if you can't find one then construct your
- own... Same voltage connection, but the restrainor must be built in (I.E.
- The central box)
- Two phone jacks (one for the modem, one for if you are being traced to
- plug the aqua box into)
- Some creativity and easy work.
- *Notice: No phones have to be destroyed/modified to make this box, so
- don't go out and buy a new phone for it!
- Procedure
- ---------
- All right, this is a very simple procedure. If you have the BEOC, it could
- drain into anything: a radio, or whatever. The purpose of having
- that is you are going to suck the voltage out from the phone line into
- the electrical appliance so there would be no voltage left to lock
- you in with.
- 1)Take the connection cord. Examine the plug at the end. It should have
- only two prongs. If it has three, still, do not fear. Make sure the
- electrical appliance is turned off unless you wanna become a crispy critter
- while making this thing. Most plugs will have a hard plastic design on the
- top of them to prevent you from getting in at the electrical wires inside.
- Well, remove it. If you want to keep the plug (I don't see why...)
- then just cut the top off. When you look inside, Lo and Behold,
- you will see that at the base of the prongs there are a few wires
- connecting in. Those wires conduct the power into the appliance.
- So, you carefully unwrap those from the sides and pull them out until
- they are about an inch ahead of the prongs. If you don't wanna keep the
- jack, then just rip the prongs out. If you are, cover the prongs with
- insultation tape so they will not connect with the wires when the power
- is being drained from the line.
- 2)Do the same thing with the prongs on the other plug, so you have the
- wires evenly connected. Now, wrap the end of the wires around each other.
- If you happen to have the other end of the voltage cord hooked into the
- phone, stop reading now, you're too fucking stupid to continue. After
- you've wrapped the wires around each other, then cover the whole thing with
- the plugs with insulating tape. Then, if you built your own control box
- or if you bought one, then cram all the wires into it and reclose it.
- That box is your ticket out of this.
- 3)Re-check everything to make sure it's all in place. This is a pretty
- flimsy connection, but on later models when you get more experienced at
- it then you can solder away at it and form the whole device into one
- big box, with some kind of cheap mattel hand-held game inside to be
- the power connector. In order to use it, just keep this box handy.
- Plug it into the jack if you want, but it will slightly lower the
- voltage so it isn't connected. When you plug it in, if you see sparks,
- unplug it and restart the whole thing. But if it just seems fine then leave it.
- Use
- ----
- Now, so you have the whole thing plugged in and all... Do not use this
- unless the situation is desperate! When the trace has gone on, don't
- panic, unplug your phone, and turn on the appliance that it was hooked
- to. It will need energy to turn itself on, and here's a great source...
- The voltage to keep a phone line open is pretty small and a simple light
- bulb should drain it all in and probably short the F.B.I. computer at
- the same time.
- Happy boxing and stay free! ------------Jolly Roger
- Hindenberg Bomb by the Jolly Roger
- Needed:1 Balloon
- 1 Bottle
- 1 Liquid Plumr
- 1 Piece Aluminum FoilL
- 1 Length Fuse
- Fill the bottle 3/4 full with Liquid Plumr and add a little piece of
- aluminum foil to it. Put the balloon over the neck of the bottle until
- the balloon is full of the resulting gas. This is highly flammable
- hydrogen.
- Now tie the baloon. Now light the fuse, and let it rise.
- When the fuse contacts the balloon, watch out!!!
- -------[=How to Kill Someone==]------------[=WITH YOUR BARE HANDS=]-----
- AN EXCERPT FROM THE ANARCHISTS COOKBOOK.....
- Courtesy of the Jolly Roger
- This file will explain the basics of hand-to-hand combat, and will tell
- of the best places to strike and kill an enemy...
- When engaged in hand-to-hand combat, your life is always at stake.
- There is only one purpose in combat, and that is to kill your enemy.
- Never face an enemy with the idea of knocking him out.
- The chances are extremely good that he will kill YOU instead.
- When a weapon is not available, one must resort to the full
- use of his natural weapons. The natural weapons are:
- 1. The knife edge of your hands.
- 2. Fingers folded at the second joint or knuckle.
- 3. The protruding knuckle of your second finger.
- 4. The heel of your hand.
- 5. Your boot
- 6. Elbows
- 7. Knees
- 8. and Teeth.
- Attacking is a primary factor. A fight was never
- won by defensive action. Attack with all of your strength.
- At any point or any situation, some vulnerable point on your enemies
- body will be open for attack. Do this while screaming as screaming has
- two purposes.
- 1. To frighten and confuse your enemy.
- 2. To allow you to take a deep breath which, in turn, will put
- more oxygen in your blood stream. Your balance and balance of your
- enemy are two inportant factors; since, if you succeed in making
- your enemy lose his balance, the chances are nine to
- one that you can kill him in your next move. The best over-all
- stance is where your feet are spread about shoulders width apart,
- with your right foot about a foot ahead of the left. Both arms
- should be bent at the elbows parallel to each other. Stand on the
- balls of your feet and bend your waist slightly. Kinda of like a
- boxer's crouch. Employing a sudden movement or a scream or yell can
- throw your enemy off-balance. There are many vulnerable points of
- the body. We will cover them now:
- Eyes:Use your fingers in a V-shape and attack in gouging motion.
- Nose:(Extremely vulnerable) Strike with the knife edge of the hand
- along the bridge, which will cause breakage, sharp pain, temporary
- blindness, and if the blow is hard enough, death. Also, deliver a blow
- with the heel of your hand in an upward motion, this›will shove the
- bone up into the brain causing death.
- Adam's Apple: This spot is usually pretty well protected, but if you
- get the chance, strike hard with the knife edge of your hand. This
- should sever the wind-pipe, and then it's all over in a matter of
- minutes.
- Temple: There is a large artery up here, and if you hit it hard
- enough, it will cause death. If you manage to knock your enemy down,
- kick him in the temple, and he'll never get up again.
- Back of the Neck: A rabbit punch, or blow delivered to the base of
- the neck can easily break it, but to be safe, it is better to
- use the butt of a gun or some other heavy blunt object.
- Upper lip: A large network of nerves are located. These nerves are
- extrememly close to the skin. A sharp upward blow will cause extreme
- pain, and unconciosness.
- Ears: Coming up from behind an enemy and cupping the hands in a clapping
- motion over the victims ears can kill him immediately. The vibrations
- caused from the clapping motion will burst his eardrums, and cause
- internal bleeding in the brain.
- Groin: A VERY vulnerable spot. If left open, get it with knee
- hard, and he'll buckle over very fast.
- Kidneys: A large nerve that branches off to the spinal cord comes very
- close to the skin at the kidneys. A direct blow with the knife edge
- of your hand can cause death.
- There are many more ways to kill and injure an enemy, but these should
- work best for the average person. This is meant only as information
- and I would not recommend that you use this for a simple High School Brawl.
- Use these methods only, in your opinion, if your life is in danger.
- Any one of these methods could very easily kill or cause permanent damage
- to someone. One more word of caution, you should practice these moves
- before using them on a dummy, or a mock battle with a friend.
- (You don't have to actually hit him to practice, just work on accuracy.)
- Phone Systems Tutorial III by The Jolly Roger
- PREFACE:
- THIS ARTICLE WILL FOCUS PRIMARILY ON THE STANDARD WESTERN ELECTRIC SINGLE-
- SLOT COIN TELEPHONE (AKA FORTRESS FONE) WHICH CAN BE DIVIDED INTO 3 TYPES:
- - DIAL-TONE FIRST (DTF)
- - COIN-FIRST (CF): (IE, IT WANTS YOUR $ BEFORE YOU RECEIVE A DIAL TONE)
- - DIAL POST-PAY SERVICE (PP): YOU PAYAFTER THE PARTY ANSWERS
- DEPOSITING COINS (SLUGS):
- -------------------------
- ONCE YOU HAVE DEPOSITED YOUR SLUG INTO A FORTRESS, IT IS SUBJECTED TO A
- GAMUT OF TESTS. THE FIRST OBSTACAL FOR A SLUG IS THE
- MAGNETIC TRAP. THIS WILL STOP ANY LIGHT-WEIGHT MAGNETIC SLUGS AND COINS.
- IF IT PASSES THIS, THE SLUG IS THEN CLASSIFIED AS A NICKEL, DIME, OR
- QUARTER. EACH SLUG IS THEN CHECKED FOR APPROPRIATE SIZE AND WEIGHT. IF THESE
- TESTS ARE PASSED, IT WILL THEN TRAVEL THROUGH A NICKEL, DIME, OR QUARTER
- MAGNET AS APPROPRIATE. THESE MAGNETS SET UP AN EDDY CURRENT EFFECT WHICH
- CAUSES COINS OF THE APPROPRIATE CHARACTERISTICS TO SLOW DOWN SO THEY
- WILL FOLLOW THE CORRECT TRAJECTORY. IF ALL GOES WELL, THE COIN WILL FOLLOW THE
- CORRECT PATH (SUCH AS BOUNCING OFF OF THE NICKEL ANVIL) WHERE IT WILL
- HOPEFULLY FALL INTO THE NARROW ACCEPTED COIN CHANNEL.
- THE RATHER ELABORATE TESTS THAT ARE PERFORMED AS THE COIN TRAVELS DOWN THE
- COIN CHUTE WILL STOP MOST SLUGS AND OTHER UNDESIRABLE COINS, SUCH AS
- PENNIES, WHICH MUST THEN BE RETRIEVED USING THE COIN RELEASE LEVER.
- IF THE SLUG MIRACULOUSLY SURVIVES THE GAMUT, IT WILL THEN STRIKE THE
- APPROPRIATE TOTALIZER ARM CAUSING A RATCHET WHEEL TO ROTATE ONCE FOR EVERY
- 5-CENT INCREMENT (EG, A QUARTER WILL CAUSE IT TO ROTATE 5 TIMES).
- THE TOTALIZER THEN CAUSES THE COIN SIGNAL OSCILLATOR TO READOUT A DUAL-
- FREQUENCY SIGNAL INDICATING THE VALUE DEPOSITED TO ACTS (A COMPUTER) OR THE
- TSPS OPERATOR. THESE ARE THE SAME TONES USED BY PHREAKS IN THE INFAMOUS RED
- BOXES. FOR A QUARTER, 5 BEEP TONES ARE
- OUTPULSED AT 12-17 PULSES PER SECOND (PPS). A DIME CAUSES 2 BEEP TONES AT
- 5 - 8.5 PPS WHILE A NICKEL CAUSES ONE BEEP TONE AT 5 - 8.5 PPS. A BEEP
- CONSISTS OF 2 TONES: 2200 + 1700 HZ. A RELAY IN THE FORTRESS CALLED THE "B
- RELAY" (YES, THERE IS ALSO AN 'A RELAY') PLACES A CAPACITOR ACROSS THE
- SPEECH CIRCUIT DURING TOTALIZER READOUT TO PREVENT THE "CUSTOMER" FROM
- HEARING THE RED BOX TONES. IN OLDER 3 SLOT PHONES: ONE BELL
- (1050-1100 HZ) FOR A NICKEL, TWO BELLS FOR A DIME, AND ONE GONG (800 HZ) FOR A
- QUARTER ARE USED INSTEAD OF THE MODERN DUAL-FREQUENCY TONES.
- =============
- =TSPS & ACTS=
- =============
- WHILE FORTRESSES ARE CONNECTED TO THE CO OF THE AREA, ALL TRANSACTIONS ARE
- HANDLED VIA THE TRAFFIC SERVICE POSITION SYSTEM (TSPS). IN AREAS THAT
- DO NOT HAVE ACTS, ALL CALLS THAT REQUIRE OPERATOR ASSISTANCE, SUCH AS
- CALLING CARD AND COLLECT, ARE AUTOMATICALLY ROUTED TO A TSPS OPERATOR
- POSITION. IN AN EFFORT TO AUTOMATE FORTRESS
- SERVICE, A COMPUTER SYSTEM KNOWN AS AUTOMATED COIN TOLL SERVICE (ACTS) HAS
- BEEN IMPLEMENTED IN MANY AREAS. ACTS LISTENS TO THE RED BOX SIGNALS FROM THE
- FONES AND TAKES APPROPRIATE ACTION. IT IS ACTS WHICH SAYS, "TWO DOLLARS PLEASE
- (PAUSE) PLEASE DEPOSIT TWO DOLLARS FOR THE NEXT TEN SECONDS" (AND OTHER
- VARIATIONS). ALSO, IF YOU TALK FOR MORE THAN THREE MINUTES AND THEN HANG-UP,
- ACTS WILL CALL BACK AND DEMAND YOUR MONEY. ACTS IS ALSO RESPONSIBLE FOR
- AUTOMATED CALLING CARD SERVICE. ACTS ALSO PROVIDE TROUBLE DIAGNOSIS FOR
- CRAFTSPEOPLE (REPAIRMEN SPECIALIZING IN FORTRESSES). FOR EXAMPLE, THERE IS A
- COIN TEST WHICH IS GREAT FOR TUNING UP RED BOXES. IN MANY AREAS THIS TEST CAN
- BE ACTIVATED BY DIALING 09591230 AT A FORTRESS (THANKS TO KARL MARX FOR THIS
- INFORMATION). ONCE ACTIVATED IT WILL REQUEST THAT YOU DEPOSIT VARIOUS COINS.
- IT WILL THEN IDENTIFY THE COIN AND OUTPULSE THE APPROPRIATE RED BOX
- SIGNAL. THE COINS ARE USUALLY RETURNED WHEN YOU HANG UP.
- TO MAKE SURE THAT THERE IS ACTUALLY MONEY IN THE FONE, THE CO INITIATES A
- "GROUND TEST" AT VARIOUS TIMES TO DETERMINE IF A COIN IS ACTUALLY IN THE
- FONE. THIS IS WHY YOU MUST DEPOSIT AT LEAST A NICKEL IN ORDER TO USE A RED
- BOX!
- GREEN BOXES:
- ------------
- PAYING THE INITIAL RATE IN ORDER TO USE A RED BOX (ON CERTAIN FORTRESSES)
- LEFT A SOUR TASTE IN MANY RED BOXER'S MOUTHS THUS THE GREEN BOX WAS INVENTED.
- THE GREEN BOX GENERATES USEFUL TONES SUCH AS COIN COLLECT, COIN RETURN, AND
- RINGBACK. THESE ARE THE TONES THAT ACTS OR THE TSPS OPERATOR WOULD SEND TO
- THE CO WHEN APPROPRIATE. UNFORTUNATELY, THE GREEN BOX CANNOT BE USED AT A
- FORTRESS STATION BUT IT MUST BE USED BY THE CALLED PARTY.
- HERE ARE THE TONES:
- COIN COLLECT 700 + 1100 HZ
- COIN RETURN 1100 + 1700 HZ
- RINGBACK 700 + 1700 HZ
- BEFORE THE CALLED PARTY SENDS ANY OF THESE TONES, AN OPERATOR RELEASED
- SIGNAL SHOULD BE SENT TO ALERT THE MF DETECTORS AT THE CO. THIS CAN BE
- ACCOMPLISHED BY SENDING 900 + 1500 HZ OR A SINGLE 2600 HZ WINK (90 MS)
- FOLLOWED BY A 60 MS GAP AND THEN THE APPROPRIATE SIGNAL FOR AT LEAST 900 MS.
- ALSO, DO NOT FORGET THAT THE INITIAL RATE IS COLLECTED SHORTLY BEFORE THE 3
- MINUTE PERIOD IS UP. INCIDENTALLY, ONCE THE ABOVE MF TONES
- FOR COLLECTING AND RETURNING COINS REACH THE CO, THEY ARE CONVERTED INTO
- AN APPROPRIATE DC PULSE (-130 VOLTS FOR RETURN & +130 VOLTS FOR COLLECT). THIS
- PULSE IS THEN SENT DOWN THE TIP TO THE FORTRESS. THIS CAUSES THE COIN RELAY
- TO EITHER RETURN OR COLLECT THE COINS. THE ALLEGED "T-NETWORK" TAKES ADVANTAGE
- OF THIS INFORMATION. WHEN A PULSE FOR COIN COLLECT (+130 VDC) IS SENT DOWN
- THE LINE, IT MUST BE GROUNDED SOMEWHERE. THIS IS USUALLY EITHER THE
- YELLOW OR BLACK WIRE. THUS, IF THE WIRES ARE EXPOSED, THESE WIRES CAN BE
- CUT TO PREVENT THE PULSE FROM BEING GROUNDED. WHEN THE THREE MINUTE
- INITIAL PERIOD IS ALMOST UP, MAKE SURE THAT THE BLACK & YELLOW WIRES ARE
- SEVERED; THEN HANG UP, WAIT ABOUT 15 SECONDS IN CASE OF A SECOND PULSE,
- RECONNECT THE WIRES, PICK UP THE FONE, HANG UP AGAIN, AND IF ALL GOES WELL IT
- SHOULD BE "JACKPOT" TIME.
- PHYSICAL ATTACK:
- ----------------
- A TYPICAL FORTRESS WEIGHS ROUGHLY 50 LBS. WITH AN EMPTY COIN BOX. MOST OF
- THIS IS ACCOUNTED FOR IN THE ARMOR PLATING. WHY ALL THE SECURITY? WELL,
- BELL CONTRIBUTES IT TO THE FOLLOWING: "SOCIAL CHANGES DURING THE 1960'S
- MADE THE MULTISLOT COIN STATION A PRIME TARGET FOR: VANDALISM, STRONG ARM
- ROBBERY, FRAUD, AND THEFT OF SERVICE. THIS BROUGHT ABOUT THE INTRODUCTION OF
- THE MORE RUGGED SINGLE SLOT COIN STATION AND A NEW ENVIRONMENT FOR COIN
- SERVICE." AS FOR PICKING THE LOCK, I WILL QUOTE MR. PHELPS:
- "WE OFTEN FANTASIZE ABOUT 'PICKING THE LOCK' OR 'GETTING A MASTER
- KEY.' WELL, YOU CAN FORGET ABOUT IT. I DON'T LIKE TO DISCOURAGE PEOPLE, BUT
- IT WILL SAVE YOU FROM WASTING ALOT OF OUR TIME--TIME WHICH CAN BE PUT TO
- BETTER USE (HEH, HEH)." AS FOR PHYSICAL ATTACK, THE COIN PLATE
- IS SECURED ON ALL FOUR SIDE BY HARDENED STEEL BOLTS WHICH PASS THROUGH TWO
- SLOTS EACH. THESE BOLTS ARE IN TURN INTERLOCKED BY THE MAIN LOCK.
- ONE PHREAK I KNOW DID MANAGE TO TAKE ONE OF THE 'MOTHERS' HOME (WHICH WAS
- ATTACHED TO A PIECE OF PLYWOOD AT A CONSTRUCTION SITE; OTHERWISE, THE
- PERMANENT ONES ARE A BITCH TO DETACH FROM THE WALL!). IT TOOK HIM ALMOST
- TEN HOURS TO OPEN THE COIN BOX USING A POWER DRILL, SLEDGE HAMMERS, AND CROW
- BARS (WHICH WAS EMPTY -- PERHAPS NEXT TIME, HE WILL DEPOSIT A COIN FIRST TO
- HEAR IF IT SLUSHES DOWN NICELY OR HITS THE EMPTY BOTTOM WITH A CLUNK.)
- TAKING THE FONE OFFERS A HIGHER MARGIN OF SUCCESS. ALTHOUGH THIS MAY BE
- DIFFICULT OFTEN REQUIRING BRUTE FORCE AND THERE HAS BEEN SEVERAL CASES OF
- BACK AXLES BEING LOST TRYING TO TAKE DOWN A FONE! A QUICK AND DIRTY WAY TO
- OPEN THE COIN BOX IS BY USING A SHOTGUN. IN DETROIT, AFTER ECOLOGISTS
- CLEANED OUT A MUNICIPAL POND, THEY FOUND 168 COIN PHONE RIFLED.
- IN COLDER AREAS, SUCH AS CANADA, SOME SHREWD PEOPLE TAPE UP THE FONES USING
- DUCT TAPE, POUR IN WATER, AND COME BACK THE NEXT DAY WHEN THE WATER WILL HAVE
- FROZE THUS EXPANDING AND CRACKING THE FONE OPEN.
- IN ONE CASE, "UNAUTHORIZED COIN COLLECTORS" WHERE CAUGHT WHEN THEY
- BROUGHT $6,000 IN CHANGE TO A BANK AND THE BANK BECAME SUSPICIOUS...
- AT ANY RATE, THE MAIN LOCK IS AN EIGHT LEVEL TUMBLER LOCATED ON THE RIGHT SIDE
- OF THE COIN BOX. THIS LOCK HAS 390,625 POSSIBLE POSITIONS (5 ^ 8, SINCE THERE
- ARE 8 TUMBLERS EACH WITH 5 POSSIBLE POSITIONS) THUS IT IS HIGHLY PICK
- RESISTANT! THE LOCK IS HELD IN PLACE BY 4 SCREWS. IF THERE IS SUFFICIENT
- CLEARANCE TO THE RIGHT OF THE FONE, IT IS CONCEIVABLE TO PUNCH OUT THE SCREWS
- USING THE DRILLING PATTERN BELOW (PROVIDED BY ALEXANDER MUNDY IN TAP #32):
- ====================================
- !! ^
- !! !
- ! 1- 3/16 " !! !
- !<--- --->!! 1-1/2"
- -------------------- !
- ! ! !! ! !
- ! (+) (+)-! -----------
- ---! !! ! ^
- ! ! !! ! !
- ! ! (Z) !! ! !
- ! ! !! ! 2-3/16"
- ---! !! ! !
- ! (+) (+) ! !
- ! !! ! !
- -------------------- -----------
- !!
- !!
- (Z) KEYHOLE (+) SCREWS
- !!
- ===================================
- AFTER THIS IS ACCOMPLISHED, THE LOCK CAN BE PUSHED BACKWARDS DISENGAGING
- THE LOCK FROM THE COVER PLATE. THE FOUR BOLTS OF THE COVER PLATE CAN THEN
- BE RETRACTED BY TURNING THE BOLTWORKS WITH A SIMPLE KEY IN THE SHAPE OF THE
- HOLE ON THE COIN PLATE (SEE DIAGRAM BELOW). OF COURSE, THERE ARE OTHER
- METHODS AND DRILLING PATTERNS.
- :-------------------------------------:
- _
- ! !
- ( )
- !_!
- [ROUGHLY]
- DIAGRAM OF COVER PLATE KEYHOLE
- :-------------------------------------:
- THE TOP COVER USES A SIMILAR (BUT NOT AS STRONG) LOCKING METHOD WITH THE
- KEYHOLE DEPICTED ABOVE ON THE TOP LEFT HIDE AND A REGULAR LOCK (PROBABLY
- TUMBLER ALSO) ON THE TOP RIGHT-HAND SIDE. IT IS INTERESTING TO EXPERIMENT
- WITH THE COIN SHUTE AND THE FORTRESSES OWN "RED BOX" (WHICH BELL DIDN'T HAVE
- THE 'BALLS' TO COLOR RED).
- MISCELLANEOUS:
- --------------
- IN A FEW AREAS (RURAL & CANADA), POST-PAY SERVICE EXISTS. WITH THIS TYPE OF
- SERVICE, THE MOUTHPIECE IS CUT OFF UNTIL THE CALLER DEPOSITS MONEY WHEN
- THE CALLED PARTY ANSWERS. THIS ALSO ALLOWS FOR FREE CALLS TO WEATHER AND
- OTHER DIAL-IT SERVICES! RECENTLY, 2600 MAGAZINE ANNOUNCED THE CLEAR BOX WHICH
- CONSISTS OF A TELEPHONE PICKUP COIL AND A SMALL AMP. IT IS BASED ON THE›
- RINCIPAL THAT THE RECEIVER IS ALSO A WEAK TRANSMITTER AND THAT BY AMPLIFYING
- YOUR SIGNAL YOU CAN TALK VIA THE TRANSMITTER THUS AVOIDING COSTLY
- TELEPHONE CHARGES! MOST FORTRESSES ARE FOUND IN THE 9XXX
- AREA. UNDER FORMER BELL AREAS, THEY USUALLY START AT 98XX (RIGHT BELOW THE
- 99XX OFFICIAL SERIES) AND MOVE DOWNWARD.
- SINCE THE LINE, NOT THE FONE, DETERMINES WHETHER OR NOT A DEPOSIT
- MUST BE MADE, DTF & CHARGE-A-CALL FONES MAKE GREAT EXTENSIONS!
- FINALLY, FORTRESS FONES ALLOW FOR A NEW HOBBY--INSTRUCTION PLATE COLLECTING.
- ALL THAT IS REQUIRED IS A FLAT-HEAD SCREWDRIVER AND A PAIR OF NEEDLE-NOSE
- PLIERS. SIMPLY USE THE SCREWDRIVER TO LIFT UNDERNEATH THE PLATE SO THAT YOU
- CAN GRAB IT WITH THE PLIERS AND YANK DOWNWARDS. I WOULD SUGGEST COVERING THE
- TIPS OF THE PLIERS WITH ELECTRICAL TAPE TO PREVENT SCRATCHING. TEN CENT PLATES
- ARE DEFINITELY BECOMING A "RARITY!"
- FORTRESS SECURITY:
- ------------------
- WHILE A LONELY FORTRESS MAY SEEM THE PERFECT TARGET, BEWARE! THE GESTAPO
- HAS BEEN KNOWN TO STAKE OUT FORTRESSES FOR AS LONG AS 6 YEARS ACCORDING TO THE
- GRASS ROOTS QUARTERLY. TO AVOID ANY PROBLEMS, DO NOT USE THE SAME FONES
- REPEATEDLY FOR BOXING, CALLING CARDS, & OTHER EXPERIMENTS. THE TELCO KNOWS HOW
- MUCH MONEY SHOULD BE IN THE COIN BOX AND WHEN ITS NOT THERE THEY TEND TO GET
- PERTURBED (READ: PISSED OFF).
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- --------Jolly Roger
- p.s. This was originally written back in my old Apple ][ days,
- hence the upper case. I just did not think I should waste the
- little time I have to work on this shit converting it to lower-
- case. Hell, I thought 80-columns was pretty nice of me.. heh heh.
- Well, enjoy this and the rest of this Cookbook! ---------JR
- Black Box Plans by The Jolly Roger
- Introduction:
- ------------
- At any given time, the voltage running through your phone is about 20
- Volts. When someone calls you, this voltage goes up to 48 Volts and rings
- the bell. When you answer, the voltage goes down to about 10 Volts.
- The phone company pays attention to this. When the voltage drops to 10,
- they start billing the person who called you.
- Function:
- --------
- The Black Box keeps the voltage going through your phone at 36 Volts,
- so that it never reaches 10 Volts. The phone company is thus fooled
- into thinking you never answered the phone and does not bill the caller.
- However, after about a half hour the phone company will get suspicious
- and disconnect your line for about 10 seconds.
- Materials:
- ---------
- 1 1.8K 1/2 Watt Resistor
- 1 1.5V LED
- 1 SPST Switch
- Procedure:
- ---------
- (1) Open your phone by loosening the two screws on the bottom and
- lifting the case off.
- (2) There should be three wires: Red, Green, and Yellow. We'll be working
- with the Red Wire.
- (3) Connect the following in parallel:
- A. The Resistor and LED.
- B. The SPST Switch.
- In other words, you should end up with this:
- (Red Wire)
- !---/\/\/\--O--!
- (Line)-----! !-----(Phone)
- !-----_/_------!
- /\/\/\ = Resistor
- O = LED
- _/_ = SPST
- Use:
- ---
- The SPST Switch is the On/Off Switch of the Black Box. When the box is off,
- your phone behaves normally. When the box is on and your phone rings,
- the LED flashes. When you answer, the LED stays on and the voltage
- is kept at 36V, so the calling party doesn't get charged. When the box
- is on, you will not get a dial tone and thus cannot make calls.
- Also remember that calls are limited to half an hour.
- ------------Jolly Roger
- p.s. Due to new Fone Company switching systems & the like, this
- may or may not work in your area. If you live in bumfuck Kentucky,
- then try this out. I make no guarantees! (I never do...) ----JR
- The Infamous Blotto Box!! by The Jolly Roger
- (I bet that NOONE has the balls to build this one!)
- Finally, it is here! What was first conceived as a joke to fool the innocent
- phreakers around America has finally been conceived!
- Well, for you people who are unenlightened about the Blotto Box,
- here is a brief summery of a legend.
- --*-=> The Blotto Box <=-*--
- For years now every pirate has dreamed of the Blotto Box. It was at first
- made as a joke to mock more ignorant people into thinking that
- the function of it actually was possible. Well, if you are The Voltage
- Master, it is possible. Originally conceived by King Blotto of much fame,
- the Blotto Box is finally available to the public.
- NOTE: Jolly Roger can not be responsible for the information disclosed
- in the file! This file is strictly for informational purposes and
- should not be actually built and used! Usage of this electronical impulse
- machine could have the severe results listed below and could result in
- high federal prosecution! Again, I TAKE NO RESPONSIBILITY!
- All right, now that that is cleared up, here is the basis of the box
- and it's function.
- The Blotto Box is every phreaks dream... you could hold AT&T down on its
- knee's with this device. Because, quite simply, it can turn off the phone
- lines everywhere. Nothing. Blotto. No calls will be allowed out of an area
- code, and no calls will be allowed in. No calls can be made inside it for
- that matter. As long as the switching system stays the same, this box will
- not stop at a mere area code. It will stop at nothing. The electrical
- impulses that emit from this box will open every line. Every line will
- ring and ring and ring... the voltage will never be cut off until the
- box/generator is stopped. This is no 200 volt job, here.
- We are talking GENERATOR. Every phone line will continue to ring, and people
- close to the box may be electricuted if they pick up the phone.
- But, the Blotto Box can be stopped by merely cutting of the line or generator.
- If they are cut off then nothing will emit any longer. It will take
- a while for the box to calm back down again, but that is merely a
- superficial aftereffect. Once again: Construction and use of this box is
- not advised! The Blotto Box will continue as long as there is
- electricity to continue with.
- OK, that is what it does, now, here are some interesting things for you
- to do with it...
- -*-=>Blotto Functions/Installin'<=-*-
- Once you have installed your Blotto, there is no turning back. The
- following are the instructions for construction and use of this box.
- Please read and heed all warnings in the above section before you attempt
- to construct this box.
- Materials:
- - A Honda portable generator or a main power outlet like in a
- stadium or some such place.
- - 400 volt rated coupler that splices a female plug into a
- phone line jack.
- - A meter of voltage to attach to the box itself.
- - A green base (i.e. one of the nice boxes about 3' by 4' that
- you see around in your neighborhood. They are the main switch
- boards and would be a more effective line to start with.
- or: A regular phone jack (not your own, and not in your area
- code!
- - A soldering iron and much solder.
- - A remote control or long wooden pole.
- Now. You must have guessed the construction from that. If not, here goes,
- I will explain in detail. Take the Honda Portable Generator and all of
- the other listed equiptment and go out and hunt for a green base. Make
- sure it is one on the ground or hanging at head level from a pole,
- not the huge ones at the top of telephone poles. Open it up with anything
- convienent, if you are two feeble that fuck don't try this.
- Take a look inside... you are hunting for color-coordinating lines of
- green and red. Now, take out your radio shack cord and rip the meter thing
- off. Replace it with the voltage meter about. A good level to set the
- voltage to is about 1000 volts. Now, attach the voltage meter to the cord
- and set the limit for one thousand. Plug the other end of the cord
- into the generator. Take the phone jack and splice the jack part off.
- Open it up and match the red and green wires with
- the other red and green wires. NOTE: If you just had the generator on
- and have done this in the correct order, you will be a crispy critter.
- Keep the generator off until you plan to start it up. Now, solder those
- lines together carefully. Wrap duck tape or insultation tape around all
- of the wires. Now, place the remote control right on to the startup
- of the generator. If you have the long pole, make sure it is very long
- and stand back as far away as you can get and reach the pole over.
- NOTICE: If you are going right along with this without reading the file
- first, you still realize now that your area code is about to become
- null! Then, getting back, twitch the pole/remote control and run for your
- damn life. Anywhere, just get away from it. It will be generating
- so much electricity that if you stand to close you will kill yourself.
- The generator will smoke, etc. but will not stop. You are now killing your
- area code, because all of that energy is spreading through all of the
- phone lines around you in every direction.
- Have a nice day!
- --*-=>The Blotto Box: Aftermath<=-*--
- Well, that is the plans for the most devastating and ultimately deadly
- box ever created. My hat goes off to: King Blotto (for the original idea).
- ---------Jolly Roger
- Blowgun by The Jolly Roger
- In this article I shall attempt to explain the use and manufacture
- of a powerfull blow-gun and making darts for the gun.The possesion of
- the blow gun described in this article IS a felony.
- So be carefull where you use it. I don't want to get you all busted.
- Needed:
- 1. Several strands of yarn (About 2 inches a-piece)
- 2. A regular pencil
- 3. A 2 1/4 inch long needle (hopefully with a beaded head. If not
- obtainable,wrap tape around end of needle.
- 4. 2-3 1/4 foot pipe. (PVC or Aluminum) Half a inch in diameter
- Constructing the dart:
- 1st- Carefully twist and pull the metal part (Along with eraser)
- of the pencil till it comes off.
- 2nd- Take Pin and start putting about 5-7 Strands of yarn on the pin. Then
- push them up to the top of the pin. But not over the head of the pin (orthe tape).
- 3rd- Push pin through the hollow part of the head where the pencil was before.
- 4th- That should for a nice looking dart. (see illustration)
- #####
- >>>>>-----/ # is the yarn
- > is the head of the pencil
- - is the pin it-self
- / is the head of the pin
- Using the Darts:
- 1st- Now take the finished dart and insert it in the tube
- (if it is too small put on more yarn.)
- 2nd- Aim the tube at a door, wall, sister, ect.
- 3rd- blow on the end of the pipe.
- 4th- Sometimes the end of the pipe may be sharp. When this happens I
- suggest you wrap it with some black electrician tape.It should feel
- a lot better.
- -------Jolly Roger
- Brown Box Plans by The Jolly Roger
- This is a fairly simple mod that can be made to any phone. All it does
- is allow you to take any two lines in your house and create a party
- line. So far I have not heard of anyone who has any problems
- with it. There is one thing that you will notice when you are
- one of the two people who is called by a person with a brown box. The other
- person will sound a little bit faint. I could overcome this with some
- amplifiers but then there wouldn't be very many of these made [Why not?].
- I think the convenience of having two people on the line at once will
- make up for any minor volume loss.
- Here is the diagram:
- ---------------------------------------
- KEY:___________________________________
- | PART | SYMBOL |
- |---------------------------------|
- | BLACK WIRE | * |
- | YELLOW WIRE | = |
- | RED WIRE | + |
- | GREEN WIRE | - |
- | SPDT SWITCH | _/_ |
- | _/_ |
- | VERTICAL WIRE | | |
- | HORIZONTAL WIRE | _ |
- -----------------------------------
- * = - +
- * = - +
- * = - +
- * = - +
- * = - +
- * ==_/_- +
- *******_/_++++++
- | |
- | |
- | |
- | |
- | |
- | |
- |_____PHONE____|
- ------------Jolly Roger
- Calcium Carbide Bomb by The Jolly Roger
- This is EXTREMELY DANGEROUS. Exercise extreme caution.... Obtain some
- calcium carbide. This is the stuff that is used in carbide lamps and
- can be found at nearly any hardware store. Take a few pieces of this
- stuff (it looks like gravel) and put it in a glass jar with some
- water. Put a lid on tightly. The carbide will react with the water to
- produce acetylene carbonate which is similar to the gas used in
- cutting torches. Eventually the glass with explode from internal
- pressure. If you leave a burning rag nearby, you will get a nice
- fireball!
- -----------Jolly Roger
- More Ways to Send a Car to Hell by The Jolly Roger
- Due to a lot of compliments, I have written an update to file #14.
- I have left the original intact. This expands upon the original
- idea, and could be well called a sequal. -----JR
- How to have phun with someone else's car. If you really detest
- someone, and I mean detest, here's a few tips on what to do in your
- spare time. Move the windshield wiper blades, and insert and glue
- tacks. The tacks make lovely designs. If your "friend" goes to
- school with you, Just before he comes out of school. Light a lighter
- and then put it directly underneath his car door handle.
- Wait...Leave...Listen. When you hear a loud "shit!", you know he
- made it to his car in time. Remove his muffler and pour approximately
- 1 Cup of gas in it. Put the muffler back, then wait till their car starts.
- Then you have a cigarette lighter. A 30 foot long cigarette lighter.
- This one is effective, and any fool can do it. Remove the top
- air filter. That's it! Or a oldie but goodie: sugar in the gas tank.
- Stuff rags soaked in gas up the exhaust pipe. Then you wonder why
- your "friend" has trouble with his/her lungs. Here's one that takes
- time and many friends. Take his/her car then break into their house
- and reassemble it, in their living or bedroom. Phun eh? If you're
- into engines, say eeni mine moe and point to something and remove it.
- They wonder why something doesn't work. There are so many others, but
- the real good juicy ones come by thinking hard.
- -----------Jolly Roger
- Ripping off Change Machines by the Jolly Roger
- Have you ever seen one of those really big changer machines in airports
- laundrymats or arcades that dispense change when you put in your 1 or 5
- dollar bill? Well then, here is an article for you.
- 1) Find the type of change machine that you slide in your bill length
- wise, not the type where you put the bill in a tray and then slide the
- tray in!!!
- 2) After finding the right machine, get a $1 or $5 bill. Start crumpling
- up into a ball. Then smooth out the bill, now it should have a very wrinkly
- surface.
- 3) Now the hard part. You must tear a notch in the bill on the
- left side about 1/2 inch below the little 1 dollar symbol (See Figure).
- 4) If you have done all of this right then take the bill and go out the
- machine. Put the bill in the machine and wait. What should happen is:
- when you put your bill in the machine it thinks everything is fine.
- When it gets to the part of the bill with the notch cut out, the
- machine will reject the bill and (if you have done it right)
- give you the change at the same time!!! So, you end up getting your bill
- back, plus the change!! It might take a little practice, but once
- you get the hang of it, you can get a lot of money!
- !--------------------------------!
- ! !
- ! (1) /-------\ (1) !
- ! ! ! !
- ! ! Pic. ! !
- ! (1) /\ \-------/ (1) !
- ! !! !
- !-----/ \-----------------------!
- \-------Make notch here. About 1/2 " down from (1)
- P.S. Sorry for the "text work" but you should be able to get the
- idea. Have fun!!! -----------------------Jolly Roger
- Clear Box Plans by The Jolly Roger
- The clear box is a new device which has just been invented that can be
- used throughout Canada and rural United States. The clear box works on
- "PostPay" payphones (fortress fones). Those are the payphones
- that don't require payment until after the connection is established.
- You pick up the fone, get a dial tone, dial your number, and then
- insert your money after the person answers.
- If you don't deposit the money then you can not speak to the person on
- the other end because your mouth piece is cut off but not the ear-piece.
- (obviously these phones are nice for free calls to weather or time or
- other such recordings). All you must do is to go to your nearby Radio
- Shack, or electronics store, and get a four-transistor amplifier and a
- telephone suction cup induction pick-up. The induction pick-up would be
- hooked up as it normally would to record a conversation, except
- that it would be plugged into the output of the amplifier and a
- microphone would be hooked to the input. So when the party
- that is being called answers, the caller could speak through the little
- microphone instead. His voice then goes through the amplifier and out
- the induction coil, and into the back of the receiver where
- it would then be broadcast through the phone lines and the other
- partywould be able to hear the caller. The Clear Box thus
- 'clears up' the problem of not being heard. Luckily, the line will
- not be cut-off after a certain amount of time because it will wait
- forever for the coins to be put in.
- The biggest advantage for all of us about this new clear box is the
- fact that this type of payphone will most likely become very common.
- Due to a few things: 1st, it is a cheap way of getting the DTF,
- dial-tone-first service, 2nd, it doesn't require any special equipment,
- (for the phone company) This payphone will work on any phone line.
- Usually a payphone line is different, but this is a regular phone line
- and it is set up so the phone does all the charging, not the company.
- ------------Jolly Roger
- CNA List Courtesy of The Jolly Roger
- NPA TEL NO NPA TEL NO
- --------------------------------------
- 201 201-676-7070 601 601-961-8139
- 202 304-343-7016 602 303-293-8777
- 203 203-789-6815 603 617-787-5300
- 204 204-949-0900 604 604-432-2996
- 205 205-988-7000 605 402-580-2255
- 206 206-382-5124 606 502-583-2861
- 207 617-787-5300 607 518-471-8111
- 208 303-293-8777 608 608-252-6932
- 209 415-543-2861 609 201-676-7070
- 212 518-471-8111 612 402-580-2255
- 213 415-781-5271 613 416-443-0542
- 214 214-464-7400 614 614-464-0123
- 215 412-633-5600 615 615-373-5791
- 216 614-464-0123 616 313-223-8690
- 217 217-525-5800 617 617-787-5300
- 218 402-580-2255 618 217-525-5800
- 219 317-265-4834 619 818-501-7251
- 301 304-343-1401 701 402-580-2255
- 302 412-633-5600 702 415-543-2861
- 303 303-293-8777 703 304-344-7935
- 304 304-344-8041 704 912-784-0440
- 305 912-784-0440 705 416-979-3469
- 306 306-347-2878 706 *** NONE ***
- 307 303-293-8777 707 415-543-6374
- 308 402-580-2255 709 *** NONE ***
- 309 217-525-5800 712 402-580-2255
- 312 312-796-9600 713 713-861-7194
- 313 313-223-8690 714 818-501-7251
- 314 314-721-6626 715 608-252-6932
- 315 518-471-8111 716 518-471-8111
- 316 816-275-2782 717 412-633-5600
- 317 317-265-4834 718 518-471-8111
- 318 504-245-5330 801 303-293-8777
- 319 402-580-2255 802 617-787-5300
- 401 617-787-5300 803 912-784-0440
- 402 402-580-2255 804 304-344-7935
- 403 403-425-2652 805 415-543-2861
- 404 912-784-0440 806 512-828-2501
- 405 405-236-6121 807 416-443-0542
- 406 303-293-8777 808 212-334-4336
- 408 415-543-6374 809 212-334-4336
- 409 713-861-7194 812 317-265-4834
- 412 413-633-5600 813 813-228-7871
- 413 617-787-5300 814 412-633-5600
- 414 608-252-6932 815 217-525-5800
- 415 415-543-6374 816 816-275-2782
- 416 416-443-0542 817 214-464-7400
- 417 314-721-6626 818 415-781-5271
- 418 514-725-2491 819 514-725-2491
- 419 614-464-0123 901 615-373-5791
- 501 405-236-6121 902 902-421-4110
- 502 502-583-2861 904 912-784-0440
- 503 206-382-5124 906 313-223-8690
- 504 504-245-5330 907 *** NONE ***
- 505 303-293-8777 912 912-784-0440
- 506 506-648-3041 913 816-275-2782
- 507 402-580-2255 914 518-471-8111
- 509 206-382-5124 915 512-828-2501
- 512 512-828-2501 916 415-543-2861
- 513 614-464-0123 918 405-236-6121
- 514 514-725-2491 919 912-784-0440
- 515 402-580-2255 516 518-471-8111
- 517 313-223-8690 518 518-471-8111
- 519 416-443-0542 900 201-676-7070
- Electronic Terrorism by The Jolly Roger
- It starts when a big, dumb lummox rudely insults you. Being of a
- rational, intelligent disposition, you wisely choose to avoid a
- (direct) confrontation. But as he laughs in your face, you smile
- inwardly---your revenge is already planned.
- Step 1: follow your victim to his locker, car, or house. Once you
- have chosen your target site, lay low for a week or more,
- letting your anger boil.
- Step 2: in the mean time, assemble your versatile terrorist
- kit(details below.)
- Step 3: plant your kit at the designated target site on a monday
- morning between the hours of 4:00 am and 6:00 am. Include a
- calm, suggestive note that quietly hints at the possibility
- of another attack. Do not write it by hand! An example of
- an effective note:
- "don't be such a jerk, or the next one will take off your
- hand. Have a nice day."
- Notice how the calm tone instills fear. As if written by a
- homicidal psychopath.
- Step 5: choose a strategic location overlooking the target site. Try
- to position yourself in such a way that you can see his facial contortions.
- Step 6: sit back and enjoy the fireworks! Assembly of the versatile,
- economic, and effective terrorist kit #1: the parts you'll need are:
- 1) 4 aa batteries
- 2) 1 9-volt battery
- 3) 1 spdt mini relay (radio shack)
- 4) 1 rocket engine(smoke bomb or m-80)
- 5) 1 solar ignitor (any hobby store)
- 6) 1 9-volt battery connector
- Step 1: take the 9-volt battery and wire it through the relay's coil.
- This circuit should also include a pair of contacts that when
- separated cut off this circuit. These contacts should be held together
- by trapping them between the locker,mailbox, or car door.
- Once the door is opened, the contacts fall apart and the 9-volt circuit
- is broken, allowing the relay to fall to the closed postion
- thus closing the ignition circuit. (If all this is confusing take a
- look at the schematic below.)
- Step 2: take the 4 aa batteries and wire them in succession.
- Wire the positive terminal of one to the negative terminal of another,
- until all four are connected except one positive terminal and one negative
- terminal. Even though the four aa batteries only combine to create 6
- volts, the increase in amperage is necessary to activate the solar
- ignitor quickly and effectively.
- Step 3: take the battery pack (made in step 2) and wire one end of it
- to the relay's single pole and the other end to one prong of the solar
- ignitor. Then wire the other prong of the solar ignitor back to the open
- position on the relay.
- Step 4: using double sided carpet tape mount the kit in his locker,
- mailbox, or car door. And last, insert the solar ignitor into the
- rocket engine (smoke bomb or m-80).
- Your kit is now complete!
- ---------><---------
- I (CONTACTS) I
- I I
- I - (BATTERY)
- I ---
- I I
- I (COIL) I
- ------///////-------
- /-----------
- / I
- / I
- / I
- (SWITCH) I I
- I I
- I --- (BATTERY)
- I - ( PACK )
- I ---
- I I
- I I
- ---- -----
- I I
- *
- (SOLAR IGNITOR)
- ---------Jolly Roger
- How to Start A Conference w/o 2600hz or M-F by The Jolly Roger
- (Originally an Apple ][ file, forgive the upper case!)
- THIS METHOD OF STARTING THE CONF. DEPENDS ON YOUR ABILITY TO BULLSHIT THE
- OPERATOR INTO DIALING A NUMBER WHICH CAN ONLY BE REACHED WITH AN OPERATOR'S
- M-F TONES. WHEN BULLSHITTING THE OPERATOR REMEMBER OPERATOR'S ARE NOT
- HIRED TO THINK BUT TO DO.
- HERE IS A STEP-BY-STEP WAY TO THE CONF.:
- 1. CALL THE OPERATOR THROUGH A PBX OR EXTENDER, YOU COULD JUST CALL ONE
- THROUGH YOUR LINE BUT I WOULDN'T RECOMMEND IT.
- 2. SAY TO THE OPERATOR:
- TSPS MAINTENENCE ENGINEER, RING-FORWARD TO 213+080+1100, POSITION RELEASE,
- THANKYOU.
- (SHE WILL PROBABLY ASK YOU FOR THE NUMBER AGAIN)
- DEFINITIONS: RING-FORWARD - INSTRUCTS HER TO DIAL THE NUMBER.
- POSITION RELEASE - INSTUCTS HER TO RELEASE THE TRUNK AFTER SHE HAS
- DIALED THE NUMBER.
- + - REMBER TO SAY 213PLUS080 PLUS1100.
- 3. WHEN YOU ARE CONNECTED WITH THE CONF. YOU WILL HERE A WHISTLE BLOW
- TWICE AND A RECORDING ASKING YOU FOR YOUR OPERATOR #. DIAL IN ANY FIVE
- DIGITS AND HIT THE POUNDS SIGN A COUPLE OF TIMES. SIMPLY DIAL IN THE #
- OF THE BILLING LINE ECT. WHEN THE RECORDING ASK FOR IT.
- 3. WHEN IN THE CONTROL MODE OF THE CONF. HIT '6' TO TRANSFER CONTROL.
- HIT '001' TO REENTER THE # OF CONFEREE'S AND TIME AMOUNT WHICH YOU
- GAVE WHEN YOU STARED THE CONF. REMEMBER THE SIZE CAN BE FROM
- 2-59 CONFEREE'S. I HAVE NOT FOUND OUT THE 'LENGTHS' LIMITS.
- How to Make Dynamite by The Jolly Roger
- Dynamite is nothing more than just nitroglycerin and a stablizing
- agent to make it much safer to use. For the sake of saving time, I
- will abbreviate nitroglycerin with a plain NG. The numbers
- are percentages, be sure to mix these carefully and be sure to use the
- exact amounts. These percentages are in weight ratio, not volume.
- no. ingredients amount
- ---------------------------------------
- #1 NG 32
- sodium nitrate 28
- woodmeal 10
- ammonium oxalate 29
- guncotten 1
- #2 NG 24
- potassium nitrate 9
- sodium nitate 56
- woodmeal 9
- ammonium oxalate 2
- #3 NG 35.5
- potassium nitrate 44.5
- woodmeal 6
- guncotton 2.5
- vaseline 5.5
- powdered charcoal 6
- #4 NG 25
- potassium nitrate 26
- woodmeal 34
- barium nitrate 5
- starch 10
- #5 NG 57
- potassium nitrate 19
- woodmeal 9
- ammonium oxalate 12
- guncotton 3
- #6 NG 18
- sodium nitrate 70
- woodmeal 5.5
- potassium chloride 4.5
- chalk 2
- #7 NG 26
- woodmeal 40
- barium nitrate 32
- sodium carbonate 2
- #8 NG 44
- woodmeal 12
- anhydrous sodium sulfate 44
- #9 NG 24
- potassium nitrate 32.5
- woodmeal 33.5
- ammonium oxalate 10
- #10 NG 26
- potassium nitrate 33
- woodmeal 41
- #11 NG 15
- sodium nitrate 62.9
- woodmeal 21.2
- sodium carbonate .9
- #12 NG 35
- sodium nitrate 27
- woodmeal 10
- ammonium oxalate 1
- #13 NG 32
- potassium nitrate 27
- woodmeal 10
- ammonium oxalate 30
- guncotton 1
- #14 NG 33
- woodmeal 10.3
- ammonium oxalate 29
- guncotton .7
- potassium perchloride 27
- #15 NG 40
- sodium nitrate 45
- woodmeal 15
- #16 NG 47
- starch 50
- guncotton 3
- #17 NG 30
- sodium nitrate 22.3
- woodmeal 40.5
- potassium chloride 7.2
- #18 NG 50
- sodium nitrate 32.6
- woodmeal 17
- ammonium oxalate .4
- #19 NG 23
- potassium nitrate 27.5
- woodmeal 37
- ammonium oxalate 8
- barium nitrate 4
- calcium carbonate .5
- Household equivalants for chemicles
- It has come to my attention that many of these chemicles are
- sold under brand names, or have household equivalants. here is a list
- that might help you out. Also, see elsewhere in this Cookbook for
- a more complete listing............
- acetic acid vinegar
- aluminum oxide alumia
- aluminum potassium sulfate alum
- aluminum sulfate alum
- ammonium hydroxide ammonia
- carbon carbonate chalk
- calcium hypochloride bleaching powder
- calcium oxide lime
- calcium sulfate plaster of paris
- carbonic acid seltzer
- carbon tetrachloride cleaning fluid
- ethylene dichloride Dutch fluid
- ferric oxide iron rust
- glucose corn syrup
- graphite pencil lead
- hydrochloric acid muriatic acid
- hydrogen peroxide peroxide
- lead acetate sugar of lead
- lead tetrooxide red lead
- magnesium silicate talc
- magnesium sulfate Epsom salts
- naphthalene mothballs
- phenol carbolic acid
- potassium bicarbonate cream of tartar
- potassium chromium sulf. chrome alum
- potassium nitrate saltpeter
- sodium dioxide sand
- sodium bicarbonate baking soda
- sodium borate borax
- sodium carbonate washing soda
- sodium chloride salt
- sodium hydroxide lye
- sodium silicate water glass
- sodium sulfate glauber's salt
- sodium thiosulfate photographer's hypo
- sulferic acid battery acid
- sucrose cane sugar
- zinc chloride tinner's fluid
- Keep this list handy at all times. If you can't seem to get one
- or more of the ingredients try another one. If you still can't, you
- can always buy small amounts from your school, or maybe from various
- chemical companies. When you do that, be sure to say as little as
- possible, if during the school year, and they ask, say it's for a
- experiment for school.
- -------------Jolly Roger
- Auto Exhaust Flame Thrower by The Jolly Roger
- For this one, all you need is a car, a sparkplug, ignition wire and a
- switch. Install the spark plug into the last four or five inches of
- the tailpipeby drilling a hole that the plug can screw into easily.
- Attach the wire (this is regular insulated wire) to one side of the
- switch and to the spark plug. The other side of the switch is attached
- to the positive terminal on the battery. With the car running, simply
- hit the switch and watch the flames fly!!! Again be careful that no
- one is behind you! I have seen some of these flames go 20 feet!!!
- -------------Jolly Roger
- Breaking into BBS Express Courtesy of the Jolly Roger
- If you have high enough access on any BBS Express BBS you can get the
- Sysop's password without any problems and be able to log on as him and do
- whatever you like. Download the Pass file, delete the whole BBS, anything.
- Its all a matter of uploading a text file and d/ling it from the BBS. You
- must have high enough access to see new uploads to do this. If you can see
- a file you just uploaded you have the ability to break into the BBS in a
- few easy steps.
- Why am I telling everyone this when I run BBS Express myself?
- Well there is one way to stop this from happening and I want other Sysops
- to be aware of it and not have it happen to them.
- Breaking in is all based on the MENU function of BBS Express. Express
- will let you create a menu to display different text files by putting the
- word MENU at the top of any text file and stating what files are to be
- displayed. But due to a major screw up by Mr. Ledbetter you can use this
- MENU option to display the USERLOG and the Sysop's Passwords or anything
- else you like. I will show you how to get the Sysop's pass and therefore
- log on as the Sysop. BBs Express Sysop's have 2 passwords. One like
- everyone else gets in the form of X1XXX, and a Secondary password
- to make it harder to hack out the Sysops pass.
- The Secondary pass is found in a file called SYSDATA.DAT.
- This file must be on drive 1 and is therefore easy to get. All you have to
- do is upload this simple Text file:
- MENU
- 1
- D1:SYSDATA.DAT
- Ripoff time!
- after you upload this file you d/l it non-Xmodem. Stupid Express thinks
- it is displaying a menu and you will see this:
- Ripoff time!
- Selection [0]:
- Just hit 1 and Express will display the SYSDATA.DAT file.OPPASS is where
- the Sysop's Secondary pass will be. D1:USERLOG.DAT is where you will find
- the name and Drive number of the USERLOG.DAT file. The Sysop might have
- renamed this file or put it in a Subdirectory or even on a different
- drive. I Will Assume he left it as D1:USERLOG.DAT. The other parts of this
- file tell you where the .HLP screens are and where the LOG is saved and
- all the Download path names.
- Now to get the Sysop's primary pass you upload a text file like this:
- MENU
- 1
- D1:USERLOG.DAT
- Breaking into Bedwetter's BBS
- Again you then d/l this file non-Xmodem and you will see:
- Breaking into Bedwetter's BBS
- Selection [0]:
- You then hit 1 and the long USERLOG.DAT file comes flying at you.
- The Sysop is the first entry in this very long file so it is easy. You will
- see:
- SYSOP'S NAME X1XXX
- You should now have his 2 passwords.
- There is only one easy way out of this that I can think of, and that is
- to make all new uploads go to SYSOP level (Level 9) access only. This way
- nobody can pull off what I just explained.
- I feel this is a major Bug on Mr. Ledbetter's part. I just don't know why
- no one had thought of it before. I would like to give credit to
- Redline for the message he left on Modem Hell telling about this problem,
- and also to Unka for his ideas and input about correcting it.
- This has been brought to you from [_The_Piper_] and the S.O.D. BBS
- Network!
- Firebombs by the Jolly Roger
- Most fire bombs are simply gasoline filled bottles with a fuel
- soaked rag in the mouth (the bottle's mouth, not yours). The original
- Molotov cocktail, and still about the best, was a mixture of one part
- gasoline and one part motor oil. The oil helps it to cling to what it
- splatters on.
- Some use one part roofing tar and one part gasoline. Fire bombs
- have been found which were made by pouring melted wax into gasoline.
- -------------Jolly Roger
- Fuse Ignition Bomb by The Jolly Roger
- A four strand homemade fuse is used for this. It burns like fury.
- It is held down and concealed by a strip of bent tin cut from a can.
- The exposed end of the fuse is dipped into the flare igniter. To use
- this one, you light the fuse and hold the fire bomb until the fuse has
- burned out of sight under the tin. Then throw it and when it breaks,
- the burning fuse will ignite the contents.
- -------------Jolly Roger
- Generic Bomb by the Jolly Roger
- 1) Aquire a glass container
- 2) Put in a few drops of gasoline
- 3) Cap the top
- 4) Now turn the container around to coat the inner surfaces and then
- evaporates
- 5) Add a few drops of potassium permanganate (<-Get this stuff from a
- snake bite kit)
- 6) The bomb is detonated by throwing aganist a solid object.
- *AFTER THROWING THIS THING RUN LIKE HELL THIS THING PACKS ABOUT 1/2
- STICK OF DYNAMITE*
- ---------------Jolly Roger
- Green Box Plans by the Jolly Roger
- Paying the initial rate in order to use a red box (on certain
- fortresses) left a sour taste in many red boxers mouths, thus the
- green box was invented. The green box generates useful tones such as
- COIN COLLECT, COIN RETURN, AND RINGBACK. These are the tones that
- ACTS or the TSPS operator would send to the CO when appropriate.
- Unfortunately, the green box cannot be used at the fortress station but
- must be used by the CALLED party.
- Here are the tones:
- COIN COLLECT 700+1100hz
- COIN RETURN 1100+1700hz
- RINGBACK 700+1700hz
- Before the called party sends any of these tones, an operator realease
- signal should be sent to alert the MF detectors at the CO.
- This can be done by sending 900hz + 1500hz or a single 2600 wink (90 ms.)
- Also do not forget that the initial rate is collected shortly before the
- 3 minute period is up. Incidentally, once the above MF
- tones for collecting and returning coins reach the CO, they are
- converted into an appropriate DC pulse (-130 volts for return and
- +130 for collect). This pulse is then sent down the tip to the
- fortress. This causes the coin relay to either return or collect the coins.
- The alledged "T-network" takes advantage of this information.
- When a pulse for coin collect (+130 VDC) is sent down the line,
- it must be grounded somewhere. This is usually the yellow or black wire.
- Thus, if the wires are exposed, these wires can be cut to prevent
- the pulse from being grounded. When the three minute initial
- period is almost up, make sure that the black and yellow wires are
- severed, then hang up, wait about 15 seconds in case of a second
- pulse, reconnect the wires, pick up the phone, and if all goes well,
- it should be "JACKPOT" time.
- ---------Jolly Roger
- Portable Grenade Launcher by the Jolly Roger
- If you have a bow, this one is for you. Remove the ferrule from an
- aluminum arrow, and fill the arrow with black powder (I use grade
- FFFF, it burns easy)and then glue a shotshell primer into the hole
- left where the ferrule went. Next, glue a BB on the primer, and you
- are ready to go! Make sure no one is nearby.... Little shreds of
- aluminum go all over the place!!
- ------------Jolly Roger
- Hacking Tutorial Courtesy of the Jolly Roger
- What is hacking?
- ----------------
- According to popular belief the term hacker and hacking was founded at mit
- it comes from the root of a hack writer,someone who keeps "hacking" at
- the typewriter until he finishes the story.a computer hacker would be
- hacking at the keyboard or password works.
- What you need:
- --------------
- To hack you need a computer equipped with a modem (a device that lets you
- transmit data over phone lines) which should cost you from $100 to $1200.
- How do you hack?
- ----------------
- Hacking recuires two things:
- 1. The phone number
- 2. Answer to identity elements
- How do you find the phone #?
- ----------------------------
- There are three basic ways to find a computers phone number.
- 1. Scanning,
- 2. Directory
- 3. Inside info.
- What is scanning?
- -----------------
- Scanning is the process of having a computer search for a carrier tone.
- For example,the computer would start at (800) 111-1111 and wait for carrier
- if there is none it will go on to 111-1112 etc.if there is a carrier it
- will record it for future use and continue looking for more.
- What is directory assictance?
- -----------------------------
- This way can only be used if you know where your target computer is. For this
- example say it is in menlo park, CA and the company name is sri.
- 1. Dial 411 (or 415-555-1212)
- 2. Say "Menlo park"
- 3. Say "Sri"
- 4. Write down number
- 5. Ask if there are any more numbers
- 6. If so write them down.
- 7. Hang up on operator
- 8. Dial all numbers you were given
- 9. Listen fir carrier tone
- 10. If you hear carrier tone write down number, call it on your modem and your
- set to hack!
- ---------------Jolly Roger
- The Basics of Hacking II Courtesy of the Jolly Roger
- Basics to know before doing anything, essential to your continuing
- career as one of the elite in the country... This article, "the
- introduction to the world of hacking" is meant to help you by telling you
- how not to get caught, what not to do on a computer system, what type of
- equipment should I know about now, and just a little on the history, past
- present future, of the hacker.
- Welcome to the world of hacking! We, the people who live outside of the
- normal rules, and have been scorned and even arrested by those from the
- 'civilized world', are becomming scarcer every day. This is due to the
- greater fear of what a good hacker (skill wise, no moral judgements
- here)|can do nowadays, thus causing anti- hacker sentiment in the masses.
- Also, few hackers seem to actually know about the computer systems they
- hack, or what equipment they will run into on the front end, or what they
- could do wrong on a system to alert the 'higher' authorities who monitor
- the system. This article is intended to tell you about some things not to
- do, even before you get on the system. I will tell you about the new wave
- of front end security devices that are beginning to be used on computers.
- I will attempt to instill in you a second identity, to be brought up at
- time of great need, to pull you out of trouble. And, by the way, I take no, repeat,
- no, responcibility for what we say in this and the forthcoming articles.
- Enough of the bullshit, on to the fun: after logging on your favorite bbs,
- you see on the high access board a phone number! It says it's a great
- system to "fuck around with!" This may be true, but how many other people
- are going to call the same number? So: try to avoid calling a number
- given to the public. This is because there are at least every other
- user calling, and how many other boards will that number spread to?
- If you call a number far, far away, and you plan on going thru an
- extender or a re-seller, don't keep calling the same access number
- (I.E. As you would if you had a hacker running), this looks very suspicious
- and can make life miserable when the phone bill comes in the mail.
- Most cities have a variety of access numbers and services,
- so use as many as you can. Never trust a change in the system...
- The 414's, the assholes, were caught for this reason: when one of them
- connected to the system, there was nothing good there. The next time,
- there was a trek game stuck right in their way! They proceded to play said
- game for two, say two and a half hours, while telenet was tracing them!
- Nice job, don't you think? If anything looks suspicious, drop the line
- immediately!! As in, yesterday!! The point we're trying to get accross is:
- if you use a little common sence, you won't get busted. Let the little
- kids who aren't smart enough to recognize a trap get busted, it will take
- the heat off of the real hackers. Now, let's say you get on a computer
- system... It looks great, checks out, everything seems fine.
- Ok, now is when it gets more dangerous. You have to know the computer
- system to know what not to do.
- Basically, keep away from any command something, copy a new file into the
- account, or whatever! Always leave the account in the same status you
- logged in with. Change *nothing*... If it isn't an account with priv's,
- then don't try any commands that require them! All, yes all, systems are
- going to be keeping log files of what users are doing, and that will
- show up. It is just like dropping a trouble-card in an ESS system,
- after sending that nice operator a pretty tone.
- Spend no excessive amounts of time on the account in one stretch.
- Keep your calling to the very late night ifpossible, or during
- business hours (believe it or not!). It so happens
- that there are more users on during business hours, and it is very
- difficult to read a log file with 60 users doing many commnds every minute.
- Try to avoid systems where everyone knows each other, don't try to bluff.
- And above all: never act like you own the system, or are the best there
- is. They always grab the people who's heads swell... There is some very
- interesting front end equipment around nowadays, but first let's
- define terms... By front end, we mean any device that you must
- pass thru to get at the real computer. There are devices that are made to
- defeat hacker programs, and just plain old multiplexers.
- To defeat hacker programs, there are now devices that pick up the phone
- and just sit there... This means that your device gets no carrier,
- thus you think there isn't a computer on the other end. The
- only way around it is to detect when it was picked up. If it pickes up
- after the same number ring, then you know it is a hacker-defeater.
- These devices take a multi-digit code to let you into the system.
- Some are, in fact, quite sophisticated to the point where it
- will also limit the user name's down, so only one name or set of names
- can be valid logins after they input the code... Other devices input a
- number code, and then they dial back a pre-programmed number for that code.
- These systems are best to leave alone,
- because they know someone is playing with their phone. You may think "but
- i'll just reprogram the dial-back." Think again, how stupid that is...
- Then they have your number, or a test loop if you were just a little
- smarter. If it's your number, they have your balls (if male...),
- If its a loop, then you are screwed again, since those loops
- are *monitored*. As for multiplexers... What a plexer is supposed
- to do is this:
- The system can accept multiple users. We have to time share, so we'll let
- the front-end processor do it... Well, this is what a multiplexer does.
- Usually they will ask for something like "enter class" or "line:". Usually
- it is programmed for a double digit number, or a four to five letter word.
- There are usually a few sets of numbers it accepts, but those numbers also
- set your 300/1200/2400 baud data type.
- These multiplexers are inconvenient at best, so not to worry. A little
- about the history of hacking: hacking, by my definition, means a great
- knowledge of some special area. Doctors and lawyers
- are hackers of a sort, by this definition. But most often, it is
- being used in the computer context, and thus we have a definition of
- "anyone who has a great amount of computer or telecommunications
- knowledge." You are not a hacker because you have a list of codes...
- Hacking, by my definition, has then been around only about 15 years.
- It started, where else but, mit and colleges where they had computer
- science or electrical engineering departments.
- Hackers have created some of the best computer languages, the
- most awesome operating systems, and even gone on to make millions.
- Hacking used to have a good name, when we could honestly say
- "we know what we are doing". Now it means (in the public eye):
- the 414's, ron austin, the nasa hackers, the arpanet hackers...
- All the people who have been caught,
- have done damage, and are now going to have to face fines and sentences.
- Thus we come past the moralistic crap, and to our purpose: educate the
- hacker community, return to the days when people actually knew something...
- --------------Jolly Roger
- Hacking DEC's by the Jolly Roger
- In this article you will learn how to log in to dec's, logging out, and all
- the fun stuff to do in-between. All of this information is based on a
- standard dec system.
- Since there are dec systems 10 and 20, and I favor, the dec 20,
- there will be more info on them in this article. It just so happens
- that the dec 20 is also the more common of the two, and is used by much
- more interesting people (if you know what I mean...) Ok, the first thing
- you want to do when you are receiving carrier from a dec system is to find
- out the format of login names. You can do this by looking at who is on the
- system.
- Dec=> ` (the 'exec' level prompt)
- you=> sy
- sy is short for sy(stat) and shows you the system status.
- You should see the format of login names...
- A systat usually comes up in this form:
- job line program user
- job: the job number (not important unless you want to log them off later)
- line: what line they are on (used to talk to them...)
- These are both two or three digit numbers.
- Program: what program are they running under? If it says 'exec'
- they aren't doing anything at all...
- User: ahhhahhhh! This is the user name they are logged in under...
- Copy the format, and hack yourself outa working code... Login format is as
- such:
- dec=> `
- you=> login username password
- username is the username in the format you saw above in the systat.
- After you hit the space after your username, it will stop echoing
- characters back to your screen. This is the password you are typing in...
- Remember, people usually use their name, their dog's name, the name of a
- favorite character in a book, or something like this. A few clever
- people have it set to a key cluster (qwerty or asdfg). Pw's can be from 1
- to 8 characters long, anything after that is ignored. You are finally in...
- It would be nice to have a little help, wouldn't it? Just type a ? Or the
- word help, and it will give you a whole list of topics...
- Some handy characters for you to know would be the control keys,
- wouldn't it? Backspace on a dec 20 is rub which is 255 on your ascii chart.
- On the dec 10 it is cntrl-h. To abort a long listing or a program,
- cntrl-c works fine. Use cntrl-o to stop long output to the terminal.
- This is handy when playing a game, but you don't want to cntrl-c out.
- Cntrl-t for the time. Cntrl-u will kill the whole line you are typing at
- the moment. You may accidently run a program where the only way out is
- a cntrl-x, so keep that in reserve. Cntrl-s to stop listing, cntrl-q to
- continue on both systems. Is your terminal having trouble??
- Like, it pauses for no reason, or it doesn't backspace right? This is
- because both systems support many terminals, and you haven't told it what
- yours is yet... You are using a vt05
- so you need to tell it you are one.
- Dec=> `
- you=> information terminal
- or...
- You=> info
- this shows you what your terminal is set up as...
- Dec=>all sorts of shit, then the `
- you=> set ter vt05 this sets your terminal
- type to vt05.
- Now let's see what is in the account (here after abbreviated acct.)
- that you have hacked onto... Say
- => dir
- short for directory, it shows
- you what the user of the code has save to the disk. There should be a format
- like this: xxxxx.Oooxxxxx is the file name, from 1 to 20 characters
- long. Ooo is the file type, one of: exe, txt, dat, bas, cmd and a few
- others that are system dependant.
- Exe is a compiled program that can be run (just by typing its name at the `).
- Txt is a text file, which you can see by
- typing=>
- type xxxxx.Txt
- Do not try to=>
- type xxxxx.Exe this is very bad for your terminal and will tell you
- absolutly nothing.
- Dat is data they have saved.
- Bas is a basic program, you can have it typed out for you.
- Cmd is a command type file, a little too
- complicated to go into here.
- Try =>
- take xxxxx.Cmd
- By the way, there are other users out there who may have files you can use
- (gee, why else am I here?).
- Type => dir <*.*> (Dec 20)
- => dir [*,*] (dec 10)
- * is a wildcard, and will allow you to access the files on other accounts
- if the user has it set for public access. If it isn't set for public access,
- then you won't see it. To run that program:
- dec=> `
- you=> username program-name
- username is the directory you saw the
- file listed under, and file name was
- what else but the file name?
- ** You are not alone **
- remember, you said (at the very start) sy short for systat,
- and how we said this showed the other users on the system? Well, you
- can talk to them, or at least send a message to anyone you see listed in a
- systat. You can do this by:
- dec=> the user list (from your systat)
- you=> talkusername (dec 20)
- send username (dec 10)
- talk allows you and them immediate transmission of whatever you/they type
- to be sent to the other. Send only allow you one message to be sent, and
- send, they will send back to you, with talk you can just keep going. By the
- way, you may be noticing with the talk command that what you type is still
- acted upon by the parser (control program). To avoid the constant error
- messages type either:
- you=> ;your message
- you=> rem your message
- the semi-colon tells the parser that what follows is just a comment. Rem
- is short for 'remark' and ignores you from then on until you type a cntrl-z
- or cntrl-c, at which point it puts you back in the exec mode. To break the
- connection from a talk command type:
- you=> break priv's:
- if you happen to have privs, you can do all sorts of things.
- First of all, you have to activate those privs.
- You=> enable
- this gives you a $ prompt, and allows you to do this:
- whatever you can do to your own directory you can now do to any
- other directory. To create a new acct. Using your privs, just type
- =>build username
- if username is old, you can edit it, if it is new, you can
- define it to be whatever you wish. Privacy means nothing to a user with
- privs. By the way, there are various levels of privs: operator, wheel,
- cia.
- wheel is the most powerful, being that he can log in from anywhere and
- have his powers.
- Operators have their power because they are at a special terminal
- allowing them the privs. Cia is short for 'confidential information
- access', which allows you a low level amount of privs.
- Not to worry though, since you can read the system log file, which also
- has the passwords to all the other accounts.
- To de-activate your privs, type
- you=> disable
- when you have played your greedy heart out, you can finally leave the
- system with the command=>
- logout
- this logs the job you are using off the system (there may be varients
- of this such as kjob, or killjob).
- ----------------Jolly Roger
- Harmless Bombs by the Jolly Roger
- To all those who do not wish to inflict bodily damage on their victims
- but only terror.
- These are weapons that should be used from high places.
- 1) The flour bomb.
- Take a wet paper towel and pour a given amount of baking flour in
- the center. Then wrap it up and put on a rubber band to keep it
- together. When thrown it will fly well but when it hits, it covers
- the victim with the flower or causes a big puff of flour which will
- put the victim in terror since as far as they are concerned, some
- strange white powder is all over them. This is a cheap method of
- terror and for only the cost of a roll of paper towels and a bag of
- flour you and your friends can have loads of fun watching people
- flee in panic.
- 2) Smoke bomb projectile.
- All you need is a bunch of those little round smoke bombs and a
- wrist rocket or any sling-shot. Shoot the smoke bombs and watch the
- terror since they think it will blow up!
- 3) Rotten eggs (good ones)
- Take some eggs and get a sharp needle
- and poke a small hole in the top of each one.
- Then let them sit in a warm place for about a week. Then you've got a
- bunch of rotten eggs that will only smell when they hit.
- 4) Glow in the dark terror.
- Take one of those tubes of glow in the dark stuff and pour the
- stuff on whatever you want to throw and when it gets on the victim,
- they think it's some deadly chemical or a radioactive substance so
- they run in total panic. This works especially well with flower
- bombs since a gummy, glowing substance gets all over the victim.
- 5) Fizzling panic.
- Take a baggie of a water-baking soda solution and seal it. (Make
- sure there is no air in it since the solution will form a gas and
- you don't want it to pop on you.) Then put it in a bigger plastic
- bag and fill it with vinegar and seal it. When thrown, the two
- substances will mix and cause a violently bubbling substance to go
- all over the victim.
- ---------------Jolly Roger
- Breaking Into Houses by the Jolly Roger
- Okay You Need:
- 1. Tear Gas or Mace
- 2. A BB/Pelet Gun
- 3. An Ice Pick
- 4. Thick Gloves
- What You Do Is:
- 1. Call the ###-#### of the house, or ring doorbell, To find out if
- they're home.
- 2. If they're not home then...
- 3. Jump over the fence or walk through gate (whatever).
- 4. If you see a dog give him the mace or tear gas.
- 5. Put the gloves on!!!!!!!
- 6. Shoot the BB gun slightly above the window locks.
- 7. Push the ice-pick through the hole (made by the BB gun).
- 8. Enter window.
- 9. FIRST...Find the LIVING ROOM. (they're neat things there!).
- 10. Then goto the Bed-room to get a pillow case. Put the goodies in
- the pillow case.
- 11. Get out <-* FAST! -*>
- Notes: You should have certian targets worked out (like computers,
- Radios, Ect.,Ect.). Also <-* NEVER *-> Steal from your own
- neigborhood. If you think they have an alarm...<-* FORGET IT! *->.
- ---------------Jolly Roger
- A Guide to Hypnotism Courtesy of the Jolly Roger
- (Originally an Apple ][ file, forgive the uppercase!)
- +-------------------+
- ! WHAT HYPNOTISM IS !
- +-------------------+
- HYPNOTISM, CONTRARY TO COMMON BELEIF, IS MERELY STATE WHEN YOUR MIND AND
- BODY ARE IN A STATE OF RELAXATION AND YOUR MIND IS OPEN TO POSITIVE, OR
- CLEVERLY WORDED NEGATIVE, INFLUENCES. IT IS NOT A TRANCE WHERE YOU:
- > ARE TOTALLY INFLUENCABLE.
- > CANNOT LIE.
- > A SLEEP WHICH YOU CANNOT WAKE UP FROM
- WITHOUT HELP.
- THIS MAY BRING DOWN YOUR HOPE SOMEWHAT, BUT, HYPNOTISM IS A POWERFUL FOR
- SELF HELP, AND/OR MISCHEIF.
- +-----------------------+
- ! YOUR SUBCONCIOUS MIND !
- +-----------------------+
- BEFORE GOING IN FURTHER, I'D LIKE TO STATE THAT HYPNOTISM NOT ONLY IS
- GREAT IN THE WAY THAT IT RELAXES YOU AND GETS YOU (IN THE LONG RUN) WHAT
- YOU WANT, BUT ALSO THAT IT TAPS A FORCE OF INCREDIBLE POWER, BELEIVE IT OR
- NOT, THIS POWER IS YOUR SUBCONCIOUS MIND.
- THE SUBCONCIOUS MIND ALWAYS KNOWS WHAT IS GOING ON WITH EVERY PART OF YOUR BODY,
- EVERY MOMENT OF THE DAY. IT PROTECTS YOU FROM NEGATIVE INFLUENCES,
- AND RETAINS THE POWER TO SLOW YOUR HEARTBEAT DOWN AND STUFF LIKE THAT.
- THE SUBCONCIOUS MIND HOLDS JUST ABOUT ALL THE INFO YOU WOULD LIKE TO KNOW
- ABOUT YOURSELF, OR, IN THIS CASE, THE PERSON YOU WILL BE HYPNOTISING.
- THERE ARE MANY WAYS TO TALK TO YOUR SUBCONCIOUS AND HAVE IT TALK BACK TO
- YOU. ONE WAY IS THE OUJA BOARD, NO ITS NOT A SPIRIT, MERELY THE
- MINDS OF THOSE WHO ARE USING IT. ANOTHER, WHICH I WILL DISCUSS HERE,
- IS THE PENDULUM METHOD. OK, HERE IS HOW IT GOES.
- FIRST, GET A RING OR A WASHER AND TIE IT TO A THREAD A LITTLE LONGER THAN
- HALF OF YOUR FOREARM. NOW, TAKE A SHEET OF PAPER AND DRAW A BIG CIRCLE IN
- IT. IN THE BIG CIRCLE YOU MUST NOW DRAW A CROSSHAIR (A BIG +). NOW, PUT
- THE SHEET OF PAPER ON A TABLE. NEXT, HOLD THE THREAD WITH THE RING OR
- WASHER ON IT AND PLACE IT (HOLDING THE THREAD SO THAT THE RING IS 1 INCH
- ABOVE THE PAPER SWINGING) IN THE MIDDLE OF THE CROSSHAIR. NOW, SWING
- THE THREAD SO THE WASHER GOES UP AND DOWN, SAY TO YOURSELF THE WORD "YES"
- NOW, DO IT SIDE TO SIDE AND SAY THE WORD "NO".
- DO IT COUNTER CLOCKWISE AND SAY "I DON'T KNOW".
- AND LASTLY, DO IT CLOCKWISE AND SAY "I DONT WANT TO SAY." NOW, WITH THE
- THREAD BACK IN THE MIDDLE OF THE CROSSHAIR, ASK YOURSELF QUESTIONS AND
- WAIT FOR THE PENDULUM TO SWING IN THE DIRECTION FOR THE ANSWER. (YES, NO,
- I DONT KNOW OR I DONT WANNA SAY...). SOON, TO YOUR AMAZEMENT, IT WILL BE
- ANSWERING QUESTIONS LIKE ANYTHING... LET THE PENDULUM ANSWER, DONT TRY..
- WHEN YOU TRY YOU WILL NEVER GET AN ANSWER. LET THE ANSWER COME TO YOU.
- +-------------------------+
- ! HOW TO INDUCE HYPNOTISM !
- +-------------------------+
- NOW THAT YOU KNOW HOW TO TALK TO YOUR SUBCONCIOUS MIND, I WILL NOW TELL YOU
- HOW TO GUIDE SOMEONE INTO HYPNOSIS. NOTE THAT I SAID GUIDE, YOU CAN NEVER,
- HYNOTISE SOMEONE, THEY MUST BE WILLING. OK, THE SUBJECT MUST BE LYING OR
- SITTING IN A COMFORTABLE POSITION, RELAXED, AND AT A TIME WHEN THINGS ARENT
- GOING TO BE INTERRUPTED.
- TELL THEM THE FOLLOWING OR SOMETHING CLOSE TO IT, IN A PEACEFUL, MONOTINOUS
- TONE (NOT A COMMANDING TONE OF VOICE)
- NOTE: LIGHT A CANDLE AND PLACE IT SOMEWHERE WHERE IT CAN BE EASILY SEEN.
- TAKE A DEEP BREATH THROUGH YOUR NOSE AND HOLD IT IN FOR A COUNT OF 8. NOW,
- THROUGH YOUR MOUTH, EXHALE COMPLETELY AND SLOWLY. CONTINUED BREATHING LONG,
- DEEP, BREATHS THROUGH YOUR NOSE AND EXHALING THROUGH YOUR MOUTH. TENSE UP
- ALL YOUR MUSCLES VERY TIGHT, NOW, COUNTING FROM TEN TO ONE, RELEASE THEM
- SLOWLY, YOU WILL FIND THEM VERY RELAXED. NOW, LOOK AT THE CANDLE, AS
- YOU LOOK AT IT, WITH EVERY BREATH AND PASSING MOMEMENT, YOU ARE FEELING
- INCREASINGLY MORE AND MORE PEACEFUL AND RELAXED. THE CANDLES FLAME IS
- PEACEFUL AND BRIGHT.
- AS YOU LOOK AT IT I WILL COUNT FROM 100 DOWN, AS A COUNT, YOUR EYES WILL
- BECOME MORE AND MORE RELAXED, GETTING MORE AND MORE TIRED WITH EACH
- PASSING MOMENT."
- NOW, COUNT DOWN FROM 100, ABOUT EVERY 10 NUMBERS SAY "WHEN I REACH XX YOUR
- EYES (OR YOU WILL FIND YOUR EYES) ARE BECOMING MORE AND MORE TIRED." TELL
- THEM THEY MAY CLOSE THEIR EYES WHENEVER THEY FEEL LIKE IT. IF THE PERSONS
- EYES ARE STILL OPEN WHEN YOU GET TO 50 THEN INSTEAD OF SAYING
- "YOUR EYES WILL.."
- SAY "YOUR EYES ARE...".
- WHEN THEIR EYES ARE SHUT SAY THE FOLLOWING. AS YOU LIE (OR SIT) HERE WITH
- YOUR EYES COMFORTABLY CLOSE YOU FIND YOURSELF RELAXING MORE AND
- MORE WITH EACH MOMENT AND BREATH.
- THE RELAXATION FEELS PLEASANT AND BLISSFUL SO, YOU HAPPILY GIVE WAY TO
- THIS WONDERFUL FEELING. IMAGINGE YOURSELF ON A CLOUD, RESTING PEACEFULLY,
- WITH A SLIGHT BREEZE CARESSING YOUR BODY. A TINGLING SENSASION BEGINS
- TO WORK ITS WAY, WITHIN AND WITHOUT YOUR TOES, IT SLOWLY MOVES UP YOUR
- FEET, MAKING THEM WARM, HEAVY AND RELAXED. THE CLOUD IS SOFT AND SUPPORTS
- YOUR BODY WITH ITS SOFT TEXTURE, THE SCENE IS PEACEFUL AND ABSORBING,
- THE PEACEFULNESS ABSORBS YOU COMPLETELY...
- THE TINGLING GENTLY AND SLOWLY MOVES UP YOUR LEGS, RELAXING THEM.
- MAKING THEM WARM AND HEAVY. THE RELAXATION FEELS VERY GOOD, IT FEELS SO
- GOOD TO RELAX AND LET GO. AS THE TINGLING CONTINUES ITS JOURNEY UP INTO
- YOUR SOLAR PLEXUS, YOU FEEL YOUR INNER STOMACH BECOME VERY RELAXED. NOW,
- IT MOVES SLOWLY INTO YOUR CHEST, MAKING YOUR BREATHING RELAXED AS WELL.
- THE FEELING BEGINS TO MOVE UP YOUR ARMS TO YOUR SHOULDERS, MAKING YOUR ARMS
- HEAVY AND RELAXED AS WELL. YOU ARE AWARE OF THE TOTAL RELAXATION YOU ARE
- NOW EXPERIENCING, AND YOU GIVE WAY TO IT. IT IS GOOD AND PEACEFUL, THE
- TINGLING NOW MOVEVES INTO YOUR FACE AND HEAD, RELAXING YOUR JAWS, NECK, AND
- FACIAL MUSCLES, MAKING YOUR CARES AND WORRIES FLOAT AWAY. AWAY INTO THE
- BLUE SKY AS YOU REST BLISFUlLY ON THE CLOUD....
- IF THEY ARE NOT RESPONSIVE OR YOU THINK THEY (HE OR SHE..) IS GOING TO
- SLEEP, THEN ADD IN A "...ALWAYS CONCENTRATING UPON MY VOICE, INGORING ALL
- OTHER SOUNDS. EVEN THOUGH OTHER SOUNDS EXSIST, THEY AID YOU IN YOUR
- RELAXATION..." THEY SHOULD SOON LET OUT A SIGH AS IF THEY WERE LETTING GO,
- AND THEIR FACE SHOULD HAVE A "WOODENESS" TO IT, BECOMING FEATURLESS... NOW,
- SAY THE FOLLOWING ".... YOU NOW FIND YOURSELF IN A HALLWAY, THE HALLWAY IS
- PEACEFUL AND NICE. AS I COUNT FROM 10 TO 1 YOU WILL IMAGINE YOURSELF
- WALKING FURTHER AND FURTHER DOWN THE HALL. WHEN I REACH ONE YOU WILL FIND
- YOURSELF WHERE YOU WANT TO BE, IN ANOTHER, HIGHER STATE OF CONCIOUS AND
- MIND. (COUNT FROM TEN TO ONE)....." DO THIS ABOUT THREE OR FOUR TIMES.
- THEN, TO TEST IF THE SUBJECT IS UNDER HYPNOSIS OR NOT, SAY....
- "...YOU FEEL A STRANGE SENSATION IN YOUR (ARM THEY WRITE WITH) ARM, THE
- FEELING BEGINS AT YOUR FINGERS AND SLOWLY MOVES UP YOUR ARM, AS IT MOVES
- THROUGH YOUR ARM YOUR ARM BECOMES LIGHTER AND LIGHTER, IT WILL SOON BE SO
- LIGHT IT WILL ..... BECOMING LIGHTER AND LIGHTER WHICH EACH BREATH AND
- MOMENT..."
- THEIR FINGERS SHOULD BEGIN TO TWITCH AND THEN MOVE UP, THE ARM FOLLOWING,
- NOW MY FRIEND, YOU HAVE HIM/HEP IN HYPNOSIS. THE FIRST TIME YOU DO THIS,
- WHILE HE/SHE IS UNDER SAY GOOD THINGS, LIKE: "YOUR GOING TO FEEL GREAT
- TOMORROW" OR "EVERY DAY IN EVERY WAY YOU WILL FIND YOURSELF BECOMING BETTER
- AND BETTER".. OR SOME CRAP LIKE THAT... THE MORE THEY GO UNDER, THE DEEPER
- IN HYPNOSIS THEY WILL GET EACH TIME YOU DO IT.
- +----------------------------+
- ! WHAT TO DO WHEN HYPNOTISED !
- +----------------------------+
- WHEN YOU HAVE THEM UNDER YOU MUST WORD THINGS VERY CAREFULLY TO GET YOUR
- WAY. YOU CANNOT SIMPLY SAY... TAKE OFF YOUR CLOTHES AND FUCK THE PILLOW.
- NO, THAT WOULD NOT REALLY DO THE TRICK. YOU MUST SAY SOMETHING LIKE....
- "YOU FIND YOUR SELF AT HOME, IN YOUR ROOM AND YOU HAVE TO TAKE A SHOWER
- (VIVIDLY DESCRIBE THEIR ROOM AND WHATS HAPPENING), YOU BEGIN TO TAKE OFF
- YOUR CLOTHES..." NOW, IT CANT BE THAT SIMPLE, YOU MUST KNOW THE PERSONS
- HOUSE, ROOM, AND SHOWER ROOM. THEN DESCRIBE THINGS VIVIDLY AND TELL THEM
- TO ACT IT OUT (THEY HAVE TO BE DEEPLY UNDER TO DO THIS...). I WOULD JUST
- SUGGEST THAT YOU EXPERIMENT A WHILE, AND GET TO KNOW HO; TO DO THINGS.
- +-----------+
- ! WAKING UP !
- +-----------+
- WAKING UP IS VERY EASY, JUST SAY.. "...AS I COUNT FROM 1 TO 5 YOU WILL
- FIND YOURSELF BECOMMING MORE AND MORE AWAKE, MORE AND MORE LIVELY. WHEN
- YOU WAKE UP YOU WILL FIND YOURSELF COMPLETELY ALIVE, AWAKE, AND REFRESHED.
- MENTALLY AND PHYSICALLY, REMEMBERING THE PLEASANT SENSATION THAT HYPNOSIS
- BRINGS... WAKING UP FEELING LIKE A NEW BORN BABY, REBORN WITH LIFE AND
- VIGOR, FEELING EXCELLENT. REMEMBERING THAT NEXT TIME YOU ENTER HYPNOSIS IT
- WILL BECOME AN EVER INCREASING DEEPER AND DEEPER STATE THAN BEFORE.
- 1- YOU FEEL ENERGY COURSE THROUGHOUT YOUR LIMBS.
- 2- YOU BEGIN TO BREATHE DEEPLY, STIRRING.
- 3- BEGINING TO MOVE MORE AND MORE YOUR EYES OPEN, BRINGING YOU UP TO
- FULL CONCIOUS.
- 4- YOU ARE UP,UP, UP AND AWAKENING MORE AND MORE.
- 5- YOU ARE AWAKE AND FEELING GREAT."
- AND THATS IT! YOU NOW KNOW HOW TO HYPNOTISE YOURSELF AND SOMEONE ELSE.
- YOU WILL LEARN MORE AND MORE AS YOU EXPERIMENT.
- ------------------Jolly Roger
- ##########################################################################
- # #
- # The Remote Informer #
- # #
- #------------------------------------------------------------------------#
- # Reader supported newsletter for the underworld #
- #------------------------------------------------------------------------#
- # #
- # Editors: Tracker and Norman Bates #
- # #
- #========================================================================#
- # September 1987 Issue: 01 #
- #========================================================================#
- # The Headlines #
- #------------------------------------------------------------------------#
- # 1) Introduction #
- # 2) Hacking Sprint: The Easy Way #
- # 3) Rumors: Why spread them? #
- # 4) The New Sprint FON Calling Cards #
- # 5) Automatic Number Identifier (ANI) #
- ##########################################################################
- Introduction
- --------------------------------------------------------------------------
- Welcome to the first issue of 'The Remote Informer'! This newsletter
- is reader supported. If the readers of this newsletter do not help
- support it, then it will end. We are putting this out to help out the
- ones that would like to read it. If you are one of those who thinks they
- know everything, then don't bother reading it. This newsletter is not
- anything like the future issues. The future issues will contain several
- sections, as long as reader input is obtained. Below is an outline
- overview of the sections in the future issues.
- I/O Board (Input/Output Board)
- The I/O Board is for questions you have, that we might be able to
- answer or atleast refer you to someone or something. We will be honest if
- we cannot help you. We will not make up something, or to the effect, just
- to make it look like we answered you. There will be a section in the I/O
- Board for questions we cannot answer, and then the readers will have the
- opportunity to answer it. We will print anything that is reasonable in
- the newsletter, even complaints if you feel like you are better than
- everyone.
- NewsCenter
- This section will be for news around the underworld. It will talk of
- busts of people in the underworld and anything else that would be
- considered news. If you find articles in the paper, or something happens
- in your local area, type it up, and upload it to one of the boards listed
- at the end of the newsletter. Your handle will be placed in the article.
- If you do enter a news article, please state the date and from where you
- got it.
- Feature Section
- The Feature Section will be the largest of the sections as it will be
- on the topic that is featured in that issue. This will be largely reader
- input which will be sent in between issues. At the end of the issue at
- hand, it will tell the topic of the next issue, therefore, if you have
- something to contribute, then you will have ample time to prepare your
- article.
- Hardware/Software Review
- In this section, we will review the good and bad points of hardware
- and software related to the underworld. It will be an extensive review,
- rather than just a small paragraph.
- The Tops
- This section will be the area where the top underworld BBS's, hacking
- programs, modem scanners, etc. will be shown. This will be reader
- selected and will not be altered in anyway. The topics are listed below.
- Underworld BBS's (Hack, Phreak, Card, Anarchy, etc.)
- Hacking programs for Hayes compatables
- Hacking programs for 1030/Xm301 modems
- Modem scanners for Hayes compatables
- Modem scanners for 1030/Xm301 modems
- Other type illegal programs
- You may add topics to the list if enough will support it.
- Tid Bits
- This will contain tips and helpful information sent in by the users.
- If you have any information you wish to contribute, then put it in a text
- file and upload it to one of the BBS's listed at the end of the
- newsletter.
- Please, no long distance codes, mainframe passwords, etc.
- We may add other sections as time goes by. This newsletter will not
- be put out on a regular basis. It will be put out when we have enough
- articles and information to put in it. There may be up to 5 a month, but
- there will always be at least one a month. We would like you, the readers,
- to send us anything you feel would be of interest to others, like hacking
- hints, methods of hacking long distance companies, companies to card from,
- etc. We will maintain the newsletter as long as the readers support it.
- That is the end of the introduction, but take a look at this newsletter,
- as it does contain information that may be of value to you.
- ==========================================================================
- Hacking Sprint: The Easy Way
- -------------------------------------------------------------------------
- By: Tracker
- If you hack US Sprint, 950-0777 (by the way it is no longer GTE
- Sprint), and you are fustrated at hacking several hours only to find one
- or two codes, then follow these tips, and it will increase your results
- tremendously. First, one thing that Mr. Mojo proved is that Sprint will
- not store more than one code in every hundred numbers. (ex: 98765400 to
- 98765499 may contain only one code). There may NOT be a code in that
- hundred, but there will never be more than one.
- Sprint's 9 digit codes are stored from 500000000 through 999999999.
- In the beginning of Sprint's 950 port, they only had 8 digit codes. Then
- they started converting to 9 digit codes, storing all 8 digit codes
- between 10000000 and 49999999 and all 9 digit codes between 500000000 and
- 999999999. Sprint has since cancelled most 8 digit codes, although there
- are a few left that have been denoted as test codes. Occaisionally, I
- hear of phreaks saying they have 8 digit codes, but when verifying them,
- the codes were invalid.
- Now, where do you start? You have already narrowed the low and high
- numbers in half, therefore already increasing your chances of good results
- by 50 percent. The next step is to find a good prefix to hack. By the
- way, a prefix, in hacking terms, is the first digits in a code that can be
- any length except the same number of digits the code is. (ex: 123456789
- is a code. That means 1, 12, 123, 1234, 12345, 123456, 1234567, and
- 12345678 are prefixes) The way you find a good prefix to hack is to
- manually enter a code prefix. If when you enter the code prefix and a
- valid destination number and you do not hear the ringing of the recording
- telling you that the code is invalid until near the end of the number,
- then you know the prefix is valid. Here is a chart to follow when doing
- this:
- Code - Destination Range good codes exist
- -------------------------------------------------
- 123456789 - 6192R 123400000 - 123499999
- 123456789 - 619267R 123450000 - 123459999
- 123456789 - 61926702R 123456000 - 123456999
- 123456789 - 6192670293R 123456700 - 123456799
- -------------------------------------------------
- ( R - Denotes when ring for recording starts)
- To prove
- this true, I ran a test using OmniHack 1.3p, written by
- Jolly Joe. In this test I found a prefix where the last 3 digits were all
- I had to hack. I tested each hundred of the 6 digit prefix finding that
- all but 4 had the ring start after the fourth digit was dialed in the
- destination number. The other four did not ring until I had finished the
- entire code. I set OmniHack to hack the prefix + 00 until prefix + 99.
- (ex: xxxxxxy00 to xxxxxxy99: where y is one of the four numbers that the
- ring did not start until the dialing was completed.) Using this method, I
- found four codes in a total of 241 attempts using ascending hacking (AKA:
- Sequential). Below you will see a record of my hack:
- Range of hack Codes found Tries
- ----------------------------------------------
- xxxxxx300 - xxxxxx399 xxxxxx350 50
- xxxxxx500 - xxxxxx599 xxxxxx568 68
- xxxxxx600 - xxxxxx699 xxxxxx646 46
- xxxxxx800 - xxxxxx899 xxxxxx877 77
- ----------------------------------------------
- Totals 4 codes 241
- As you see, these methods work. Follow these guidlines and tips and
- you should have an increase in production of codes in the future hacking
- Sprint. Also, if you have any hints/tips you think others could benefit
- from, then type them up and upload them to one of the boards at the end of
- the newsletter.
- ==========================================================================
- Rumors: Why Spread Them?
- --------------------------------------------------------------------------
- By: Tracker
- Do you ever get tired of hearing rumors? You know, someone gets an
- urge to impress others, so they create a rumor that some long distance
- company is now using tracing equipment. Why start rumors? It only scares
- others out of phreaking, and then makes you, the person who started the
- rumor, look like Mr. Big. This article is short, but it should make you
- aware of the rumors that people spread for personal gain. The best thing
- to do is to denote them as a rumor starter and then leave it at that. You
- should not rag on them constantly, since if the other users cannot
- determine if it is fact or rumor, then they should suffer the
- consequences.
- ==========================================================================
- The New Sprint FON Calling Cards
- --------------------------------------------------------------------------
- By: Tracker
- US Sprint has opened up a new long distance network called the Fiber
- Optic Network (FON), in which subscribers are given calling cards. These
- calling cards are 14 digits, and though, seem randomly generated, they are
- actually encrypted. The rumors floating around about people getting
- caught using the Sprint FON calling cards are fact, not rumors. The
- reason people are getting caught is that they confuse the FON calling
- cards with the local 950 port authorization codes. If you will remember,
- you never use AT&T calling cards from you home phone. It has ANI
- capability, which is not tracing, but rather the originating phone number
- is placed on the bill as soon as the call is completed. They know your
- phone number when you call the 800 access port, but they do not record it
- until your call is completed. Also, through several of my hacks, I came
- up with some interesting information surrounding the new Sprint network.
- They are listed below.
- 800-877-0000
- This number is for information on US Sprint's 800 calling card
- service. I have not played around with it, but I believe it is for
- trouble or help with the FON calling cards. I am not sure if it is for
- subscribing to the FON network.
- 800-877-0002 - You hear a short tone, then nothing.
- 800-877-0003 - US Sprint Alpha Test Channel #1
- 800-877-(0004-0999)
- When you call these numbers, you get a recording saying: "Welcome to
- US Sprint's 1 plus service." When the recording stops, if you hit the
- pound key (#) you will get the calling card dial tone.
- Other related Sprint numbers
- 800-521-4949 This is the number that you subscribe to US Sprint with.
- You may also subscribe to the FON network on this number. It will take 4
- to 5 weeks for your calling card to arrive.
- 10777
- This is US Sprint's equal access number. When you dial this number,
- you then dial the number you are calling, and it will be billed through US
- Sprint, and you will receive their long distance line for that call. Note
- that you will be billed for calls made through equal access. Do not
- mistake it to be a method of phreaking, unless used from a remote
- location.
- If you are in US Sprint's 1+ service then call 1+700-555-1414, which
- will tell you which long distance company you are using. When you hear:
- "Thank you for choosing US Sprint's 1 plus service," hit the pound key
- (#), and then you will get the US Sprint dial tone. This however is just
- the same as if you are calling from your home phone if you dial direct, so
- you would be billed for calls made through that, but there are ways to use
- this to your advantage as in using equal access through a PBX.
- ==========================================================================
- Automatic Number Identification (ANI)
- --------------------------------------------------------------------------
- By: Tracker
- The true definition for Automatic Number Identification has not been
- widely known to many. Automatic Number Identification, (AKA: ANI), is the
- process of the destination number knowing the originating number, which is
- where you are calling from. The method of achieving this is to send the
- phone number that you are calling from in coded form ahead of the
- destination number. Below is an example of this.
- ANI Method
- Dial: 267-0293
- Sent: ********2670293
- * - Denotes the originating number which is coded and sent before the
- number
- As you noticed there are 8 digits in the coded number. This is
- because, at least I believe, it is stored in a binary-like form.
- Automatic Number Identification means a limited future in phreaking. ANI
- does not threaten phreaking very much yet, but it will in the near future.
- A new switching system will soon be installed in most cities that are
- covered by ESS, Electronic Switching System, now.
- The system will have ANI capabilities which will be supplied to the
- owners of phone lines as an›added extra. The owner's phone will have
- an LED read-out that will show the phone number of the people that
- call you. You will be able to block some numbers, so that people
- cannot call you. This system is in the testing stages currently, but will
- soon be installed across most of the country. As you see, this will
- end a large part of phreaking, until we, the phreakers, can come up with
- an alternative. As I have been told by several, usually reliable,
- people, this system is called ISS, which I am not sure of the meaning of
- this, and is being tested currently in Rhode Island.
- 800 in-watts lines set up by AT&T support ANI. The equipment to
- decode an ANI coded origination number does not costs as much as you would
- expect. 950 ports do not offer ANI capability, no matter what you have
- been told. The 950 ports will only give the city in which they are based,
- this usually being the largest in the state, sometimes the capitol.
- One last thing that I should tell you is that ANI is not related to
- tracing. Tracing can be done on any number whether local, 950, etc. One
- way around this, especially when dialing Alliance TeleConferencing, is to
- dial through several extenders or ports. ANI will only cover the number
- that is calling it, and if you call through a number that does not support
- ANI, then your number will never be known.
- ==========================================================================
- The Disclaimer!
- --------------------------------------------------------------------------
- We, the editors, take no responsibility for your actions and use of
- the information in this newsletter. This newsletter is for informational
- purposes only. There will never be any long distance codes, passwords,
- etc. in this newsletter. If you are easily offended by telecommunication
- discussions, then we suggest that you not read this newsletter. But for
- those who are truely interested in the information in this newsletter,
- enjoy it.
- Brought to you in Cookbook, courtesy of the Jolly Roger!!!!!!!!!!
- Jackpotting ATM Machines courtesy of the Jolly Roger
- JACKPOTTING was done rather successfully a while back in (you guessed it)
- New York. What the culprits did was:
- Sever (actually cross over) the line between the ATM and the
- host. insert a microcomputer between the ATM and the host. insert
- a fradulent card into the ATM. (card=cash card, not hardware)
- What the ATM did was: send a signal to the host, saying "Hey! Can I
- give this guy money, or is he broke, or is his card invalid?"
- What the microcomputer did was: intercept the signal from the host,
- discard it, send "there's no one using the ATM" signal.
- What the host did was: get the "no one using" signal, send back "okay,
- then for God's sake don't spit out any money!" signal to ATM.
- What the microcomputer did was:
- intercept signal (again), throw it away (again), send "Wow! That
- guy is like TOO rich! Give him as much money as he wants. In
- fact, he's so loaded, give him ALL the cash we have! He is
- really a valued customer." signal.
- What the ATM did:
- what else? Obediently dispense cash till the cows came home (or
- very nearly so).
- What the crooks got:
- well in excess of $120,000 (for one weekend's work), and several
- years when they were caught.
- This story was used at a CRYPTOGRAPHY conference I attended a while
- ago to demonstrate the need for better information security. The
- lines between ATM's & their hosts are usually 'weak' in the sense that
- the information transmitted on them is generally not encrypted in any
- way. One of the ways that JACKPOTTING can be defeated is to encrypt
- the information passing between the ATM and the host. As long as the
- key cannot be determined from the ciphertext, the transmission (and
- hence the transaction) is secure.
- A more believable, technically accurate story might concern a person
- who uses a computer between the ATM and the host to determine the key
- before actually fooling the host. As everyone knows, people find
- cryptanalysis a very exciting and engrossing subject...don't they?
- (Hee-Hee)
- _____ ______
- | |-<<-| |-<<-| |
- |ATM| micro |Host|
- |___|->>-| |->>-|____|
- The B of A ATM's are connected through dedicated lines to a host
- computer as the Bishop said. However, for maintenance purposes, there
- is at least one separate dial-up line also going to that same host
- computer. This guy basically bs'ed his way over the phone till he
- found someone stupid enough to give him th number. After finding that,
- he had has Apple hack at the code. Simple.
- Step 2: He had a friend go to an ATM with any B of A ATM card. He
- stayed at home with the Apple connected to the host. When his friend
- inserted the card, the host displayed it. The guy with the Apple
- modified the status & number of the card directly in the host's
- memory. He turned the card into a security card, used for testing
- purposes. At that point, the ATM did whatever it's operator told it to
- do.
- The next day, he went into the bank with the $2000 he received,
- talked to the manager and told him every detail of what he'd done. The
- manager gave him his business card and told him that he had a job
- waiting for him when he got out of school.
- Now, B of A has been warned, they might have changed the system. On
- the other hand, it'd be awful expensive to do that over the whole
- country when only a handful of people have the resources and even less
- have the intelligence to duplicate the feat. Who knows?
- Jug Bomb by the Jolly Roger
- Take a glass jug, and put 3 to 4 drops of gasoline into it. Then put
- the cap on, and swish the gas around so the inner surface of the jug
- is coated. Then add a few drops of potassium permanganate solution
- into it and cap it. To blow it up, either throw it at something, or
- roll it at something.
- ------------Jolly Roger
- Fun at K-Mart by the Jolly Roger
- Well, first off, one must realise the importance of K-Marts in
- society today. First off, K-Marts provide things cheaper to those who
- can't afford to shop at higher quality stores. Although, all I ever
- see in there is minorities and Senior Citizens, and the poor people in
- our city. Personally, I wouldn't be caught dead in there. But, once,
- I did.
- You see, once, after The Moon Roach and Havoc Chaos(Dear friends of
- mine) and I were exploring such fun things as rooftops, we came along
- a K-Mart. Amused, and cold for that matter, we wandered in. The
- Tension mounts.
- As we walked up to the entrance, we were nearly attacked by Youth
- Groups selling cheap cookies, and wheelchair sticken people selling
- American Flags. After laughing at these people, we entered. This is
- where the real fun begins...
- First, we wandered around the store, and turned on all the blue
- lights we could find. That really distracts and confuses the
- attendents...Fun to do...
- The first neat thing, is to go to the section of the store where
- they sell computers. Darkness engulf the earth the day they find Apple
- Computers being sold there. Instead, lesser computers like the
- laughable C-64 can be found there...Turn it on, and make sure
- nobody's looking...Then, once in Basic, type...
- ]10 PRINT "Fuck the world! Anarchy Rules!" (or something to that
- effect.)
- ]20 GOTO 10 and walk away.
- Also, set the sample radios in the store to a santanic rock station,
- and turn the radio off. Then, set the alarm for two minutes ahead of
- the time displayed there. Turn the volume up all the way, and walk
- away. After about two minutes, you will see the clerk feebly attempt
- to turn the radio down or off. It's really neat to set ten or more
- radios to different stations, and walk away.
- One of my favorite things to do, is to get onto the intercom system
- of the store. Easier typed then done. First, check out the garden
- department. You say there's no attendent there? Good. Sneak
- carefully over to the phone behind the cheap counter there, and pick
- it up. Dial the number corrisponding to the item that says 'PAGE'...
- And talk. You will note that your voice will echo all over the bowels
- of K-Mart.
- I would suggest announcing something on the lines of: "Anarchy
- rules!!"
- ---------------Jolly Roger
- Mace Substitute by the Jolly Roger
- 3 PARTS: Alcohol
- 1/2 PARTS: Iodine
- 1/2 PARTS: Salt
- Or:
- 3 PARTS: Alcohol
- 1 PARTS: Iodized Salt (Mortons)
- It's not actual mace, but it does a damn good job on the eyes...
- --------------Jolly Roger
- How to grow Marijuana courtesy of the Jolly Roger
- MARIJUANA
- Marijuana is a deciduous plant which grows from seeds. The fibrous section
- of the plant was (has been replaced by synthetics) used to make rope.
- The flowering tops, leaves, seeds, and resin of the plant is
- used by just about everyone to get HIGH.
- Normally, the vegetable parts of the plant are smoked to produce this
- "high," but thay can also be eaten. The axtive ingredient in marijuana
- resin is THC (tetahydrocannabinol). Marijuana contains from 1 - 4 per
- cent THC (4 per cent must be considered GOOD dope).
- Marijuana grows wild in many parts of the world, and is cultivated in
- Mexice, Vietnam, Africa, Nepal, India, South America, etc.,etc. The
- marijuana sold in the United States comes primarily from, yes, the
- Uniited States.
- It is estimated that at least 50 per cent of the grass on the streets
- in America is homegrown. The next largest bunch comes actoss the
- borders from Mexico, with smaller amounts filtering in from Panama,
- occasionally South America, and occasinally, Africa.
- Hashish is the pure resin of the marijuana plant, which is scraped from
- the flowering tops of the plant and lumped together. Ganja is the
- ground-up tops of the finest plants. (It is also the name given to any
- sort of marijuana in Jamaica.)
- Marijuana will deteriorate in about two years if exposed to light,
- air or heat. It should always be stored in cool places.
- Grass prices in the United States are a direct reflection of the laws
- of supply and demand (and you thought that high school economics
- would never be useful). A series of large border busts, a short growing
- season, a bad crop, any number of things can drive the price of marijuana
- up. Demand still seems to be on the increase in the U.S., so prices seldom
- fall below last year's level.
- Each year a small seasonal drought occurs, as last year's supply runs
- low, and next year's crop is not up yet. Prices usually rase about
- 20 - 75 per cent during this time and then fall back to "normal."
- Unquestionably, a large shortage of grass causes a percentage of smokers
- to turn to harder drugs instead. For this reason, no grass control
- program can ever be beneficial or "successful."
- GROW IT!
- There is one surefire way of avoiding high prices and the grass DT's:
- Grow your own. This is not as difficult as some "authorities" on the
- subject would make you believe. Marijuana is a weed, and a fairly
- vivacious one at that, and it will grow almost in spite of you.
- OUTDOORS
- Contrary to propular belief, grass grows well in many place on the
- North American continent. It will flourish even if the temperature does
- not raise above 75 degrees.
- The plants do need a minimum of eight hours of sunlight per day and
- should be planted in late April/early May, BUT DEFINITELY, after the
- last frost of the year.
- Growing an outdoor, or "au naturel", crop has been the favored method
- over the years, because grass seems to grow better without as much
- attention when in its natural habitat.
- Of course, an outdoors setting requires special precautions not encoun-
- tered with an indoors crop; you must be able to avoid detection, both from
- law enforcement freaks and common freaks, both of whom will take your
- weed and probably use it. Of course, one will also arrest you. You must
- also have access to the area to prepare the soil and harvest the crop.
- There are two schools of thought about starting the seeds. One says you
- should start the seedlings for about ten days in an indoor starter box
- (see the indoor section) and then transplant. The other theory is that
- you should just start them in the correct location. Fewer plants will
- come up with this method, but there is no shock of transplant to
- kill some of the seedlings halfway through.
- The soil should be preprepared for the little devils by turning it
- over a couple of times and adding about one cup of hydrated lime per
- square yard of soil and a little bit (not too much, now) of good water
- soluble nitrogen fertilizer. The soil should now be watered several
- times and left to sit about one week.
- The plants should be planted at least three feet apart, getting too
- greedy and stacking them too close will result in stunted plants.
- The plants like some water during their growing season, BUT not too
- much. This is especially true around the roots, as too much water will
- rot the root system.
- Grass grows well in corn or hops, and these plants will help provide
- some camouflage. It does not grow well with rye, spinach, or pepperweed.
- It is probally a good idea to plant in many small, broken patches, as
- people tend to notice patterns.
- GENERAL GROWING INFO
- Both the male and he female plant produce THC resin, although the male
- is not as strong as the female. In a good crop, the male will still be
- plenty smokable and should not be thrown away under any circumstances.
- Marijuana can reach a hight of twenty feet (or would you rather wish on
- a star) and obtain a diameter of 4 1/2 inches. If normal, it has a sex
- ratio of about 1:1, but this can be altered in several ways.
- The male plant dies in the 12th week of growing, the female will live
- another 3 - 5 weeks to produce her younguns. Females can weigh twice as
- much as males when they are mature.
- Marijuana soil should compact when you squeeze it, but should also break
- apart with a small pressure and absorb water well. A nice test
- for either indoor or outdoor growing is to add a bunch of worms to the
- soil, if they live and hang aroung, it is good soil, but if they don't,
- well, change it. Worms also help keep the soil loose enough for the
- plants to grow well.
- SEEDS
- To get good grass, you should start with the right seeds. A nice starting
- point is to save the seeds form the best batch you have consumed. The
- seeds should be virile, that is, they should not be grey and shiriveled
- up, but green, meaty, and healthy appearing. A nice test is to drop the
- seeds on a hot frying pan. If they "CRACK," they are probably good for
- planting purposes.
- The seeds should be soaked in distilled water overnight before planting.
- BE SURE to plant in the ground with the pointy end UP. Plant about 1/2"
- deep. Healthy seeds will sprout in about five days.
- SPROUTING
- The best all around sprouting method is probably to make a sprouting box
- (as sold in nurseries) with a slated bottom or use paper cups with holes
- punched in the bottoms. The sprouting soil should be a mixture of humus,
- soil, and five sand with a bit of organic fertilizer and water mixed
- in about one week before planting.
- When ready to transplant, you must be sure and leave a ball of soil
- around the roots of each plant. This whole ball is dropped into a
- baseball-sized hold in the permanent soil.
- If you are growing/transplanting indoors, you should use a green
- safe light (purchased at nurseries) during the transplanting operation.
- If you are transplanting outdoors, you should time it about two
- hours befor sunset to avoid damage to the plant. Always wear cotton
- gloves when handling the young plants.
- After the plants are set in the hole, you should water them. It is also
- a good idea to use a commercial transplant chemical (also purchased at
- nurseries) to help then overcome the shock.
- INDOOR GROWING
- Indoor growing has many advantages, besides the apparent fact that it
- is much harder to have your crop "found," you can control the ambient
- conditions just exactly as you want them and get a guaranteed "good"
- plant.
- Plants grown indoors will not appear the same as their outdoor cousins.
- They will be scrawnier appearing with a weak stems and may even require
- you to tie them to a growing post to remain upright, BUT THEY WILL HAVE
- AS MUCH OR MORE RESIN!
- If growing in a room, you should put tar paper on the floors and then
- buy sterilized bags of soil form a nursery. You will need about one
- cubic foot of soil for eavh plant.
- The plants will need about 150 ml. of water per plant/per week. They
- will also need fresh air, so the room must be ventilated. (however,
- the fresh air should contain NO TOBACCO smoke.)
- At least eight hours of light a day must be provided. As you increase
- the light, the plants grow faster and show more females/less males.
- Sixteen hours of light per day seems to be the best combination, beyond
- this makes little or no appreciable difference in the plant quality.
- Another idea is to interrupt the night cycle with about one hour of
- light. This gives you more females.
- The walls of your growing room should be painted white or covered with
- aluminum foil to reflect the light.
- The lights themselves can be either bulbs of fluorescent. Figure about
- 75 watts per plant or one plant per two feet of flouresent tube.
- The fluorescents are the best, but do not use "cool white" types. The
- light sources should be an average of twenty inches from the
- plant and NEVER closer than 14 inches. They may be mounted on a rack
- and moved every few days as the plants grow.
- The very best light sources are those made by Sylvania and others
- especially for growing plants (such as the "gro lux" types).
- HARVESTING AND DRYING
- The male plants will be taller and have about five green or yellow sepals,
- which will split open to fertilize the female plant with pollen.
- The female plant is shorter and has a small pistillate flower, which
- really doesn't look like a flower at all but rather a small bunch of
- leaves in a cluster.
- If you don't want any seeds, just good dope, you should pick the males
- before they shed their pollen as the female will use some of her resin
- to make the seeds.
- After another three to five weeks, after the males are gone, the females
- will begin to wither and die (from loneliness?), this is the time to pick.
- In some nefarious Middle Eastren countries, farmers reportedly put their
- beehives next to fiels of marijuana. The little devils collect the grass
- pollen for their honey, which is supposed to contain a fair dosage
- of THC.
- The honey is then enjoyed by conventional methods or made into ambrosia.
- If you want seeds - let the males shed his pollen then pick him. Let
- the female go another month and pick her.
- To cure the plants, they must be dried. On large crops, this is
- accomplished by constructing a drying box or drying room.
- You must have a heat source (such as an electric heater) which will make
- the box/room each 130 degrees. The box/room must be ventilated
- to carry off the water-vapor-laden air and replace it with fresh.
- A good box can be constructed from an orange crate with fiberglass
- insulated walls, vents in the tops, and screen shelves to hold the leaves.
- There must be a baffle between the leaves and the heat source.
- A quick cure for smaller amounts is to: cut the plant at the soil level
- and wrap it in a cloth so as not to loose any leavs. Take out any seeds
- by hand and store. Place all the leaves on a cookie sheet or aluminum
- foil and put them in the middle sheld of the oven, which is set on "broil."
- In a few seconds, the leaves will smoke and curl up, stir them around and
- give another ten seconds before you take them out.
- TO INCREASE THE GOOD STUFF
- There are several tricks to increase the number of females, or the THC
- content of plants:
- You can make the plants mature in 36 days if you are in a hurry, by cutting
- back on the light to about 14 hours, but the plants will not be as big.
- You should gradually shorten the light cycle until you reach fourteen
- hours.
- You can stop any watering as the plants begin to bake the resin rise to
- the flowers. This will increse the resin a bit.
- You can use a sunlamp on the plants as they begin to develop flower stalks.
- You can snip off the flower, right at the spot where it joins the plant,
- and a new flower will form in a couple of weeks.
- This can be repeated two or three times to get several times more flowers
- than usual.
- If the plants are sprayed with Ethrel early in their growing stage, they
- will produce almost all female plants. This usually speeds up the flowering
- also, it may happen in as little as two weeks.
- You can employ a growth changer called colchicine. This is a bit hard to
- get and expensive. (Should be ordered through a lab of some sort and
- costs about $35 a gram.)
- To use the colchicine, you should prepare your presoaking solution of
- distilled water with about 0.10 per cent colchicine. This will cause
- many of the seeds to die and not germinate, but the ones that do come
- up will be polyploid plants. This is the accepted difference between
- such strains as "gold" and normal grass, and yours will DEFINITELY
- be superweed.
- The problem here is that colchicine is a posion in larger quanities and
- may be poisonous in the first generation of plants. Bill Frake, author
- of CONNOISSEUR'S HANDBOOK OF MARIJUANA runs a very complete colchicine
- treatment down and warns against smoking the first generation plants
- (all succeeding generations will also be polyploid) bacause of this
- poisonous quality.
- However, the Medical Index shows colchicine being given in very small
- quantities to people for treatment if various ailments. Although these
- quantities are small, they would appear to be larger than any you could
- recive form smoaking a seed-treated plant.
- It would be a good idea to buy a copy of CONNOISSEUR'S, if you are planning
- to attempt this, and read Mr. Drake's complete instructions.
- Another still-experimental process to increase the resin it to pinch off
- the leaf tips as soon as they appear from the time the plant is in the
- seedling stage on through its entire life-span. This produces a distorted,
- wrecked-looking plant which would be very difficuly to recognize as
- marijuana. Of course, there is less substance to this plant, but such
- wrecked creatures have been known to produve so much resin that it
- crystallizes a strong hash all over the surface of the plant - might
- be wise to try it on a plant or two and see what happens.
- PLANT PROBLEM CHART
- Always check the overall enviromental conditions prior to passing
- judgment - soil aroung 7 pH or slightly less - plenty of water, light,
- fresh air, loose soil, no water standing in pools.
- SYMPTOM PROBABLY PROBLEM/CURE
- Larger leaves turning yellow - Nitrogen dificiency - add
- smaller leaves still green. nitrate of soda or
- organic fertilizer.
- Older leaves will curl at edges, Phosphorsus dificiency -
- turn dark, possibaly with a purple add commercial phosphate.
- cast.
- Mature leaves develop a yellowish Magnesium dificiency -
- cast to least veinal areas. add commercial fertilizer
- with a magnesium content.
- Mature leaves turn yellow and then Potassium dificiency -
- become spotted with edge areas add muriate of potash.
- turning dark grey.
- Cracked stems, no healthy support Boron dificiency - add
- tissue. any plant food containing
- boron.
- Small wrinkled leaves with Zinc dificiency - add
- yelloish vein systems. commercial plant food
- containing zinc.
- Young leaves become deformed, Molybedum dificiency -
- possibaly yellowing. use any plant food with a
- bit of molydbenum in it.
- EXTRA SECTION:
- BAD WEED/GOOD WEED
- Can you turn bad weed into good weed? Surprisingly enough, the answer
- to this oft-asked inquiry is, yes!
- Like most other things in life, the amount of good you are going
- to do relates directly to how much effort you are going to put into it.
- There are no instant, supermarket products which you can spray on Kansas
- catnip and have wonderweed, but there are a number of simplified,
- inexpensive processes (Gee, Mr. Wizard!) thich will enhance mediocre
- grass somewhat, ant there are a couple of fairly involved processes
- which will do up even almost-parsley weed into something worth writing
- home about.
- EASES
- 1. Place the dope in a container which allows air to enter in a restricted
- fashion (such as a can with nail holes punched in its lid) and add a
- bunch of dry ice, and the place the whold shebang in the freezer for a
- few days. This process will add a certain amount of potency to the product,
- however, this only works with dry ice, if you use normal, everyday
- freezer ice, you will end up with a soggy mess...
- 2. Take a quantity of grass and dampen it, place in a baggie or another
- socially acceptable container, and store it in a dark, dampish place
- for a couple of weeks (burying it also seems to work). The grass will
- develop a mold which tastes a bit harsh, a and burns a tiny bit funny,
- but does increase the potency.
- 3. Expose the grass to the high intensity light of a sunlamp for a full
- day or so. Personally, I don't feel that this is worth the effort, but
- if you just spent $400 of your friend's money for this brick of
- super-Colombian, right-from-the-President's-personal-stash,
- and it turns out to be Missouri weed, and you're packing your bags to
- leave town before the people arrive for their shares, well, you might
- at least try it. Can't hurt.
- 4. Take the undisirable portions of our stash (stems, seeds, weak weed,
- worms, etc.) and place them in a covered pot, with enough rubbing
- alchol to cover everything.
- Now CAREFULLY boil the mixture on an ELECTRIC stove or lab burner. DO
- NOT USE GAS - the alchol is too flammable. After 45 minutes of heat,
- remove the pot and strain the solids out, SAVING THE ALCOHOL.
- Now, repeat the process with the same residuals, but fresh alchol.
- When the second boil is over, remove the solids again, combine the two
- quantities of alcohol and reboil until you have a syrupy mixture.
- Now, this syrupy mixture will contain much of the THC formerly hidden
- in the stems and such. One simply takes this syrup the throughly
- combines it with the grass that one wishes to improve upon.
- SPECIAL SECTION ON RELATED SUBJECT MARYGIN:
- Marygin is an anagram of the words marijuana and gin, as in Eli Whitney.
- It is a plastic tumbler which acts much like a commercial cottin gin.
- One takes about one ounce of an harb and breaks it up. This is then placed
- in the Marygin and the protuding knod is roatated. This action turns
- the internal wheel, which separates the grass from the debris (seeds,
- stems).
- It does not pulberize the grass as screens have a habit of doing and is
- easily washable.
- Marygin is available from:
- P.O. Box 5827
- Tuscon, Arizona 85703
- $5.00
- GRASS
- Edmund Scientific Company
- 555 Edscorp Building
- Barrington, New Jersy 08007
- Free Catalog is a wonder of good things for the potential grass
- grower. They have an electric thermostat greenhouse for starting
- plants for a mere $14.95.
- Soil test kits for PH - $2.40
- Al test - $9.95
- Soil thermometer - $2.75
- Lights which approzimate the true color balance of the sun and are
- probably the most beneficial types available: 40 watt, 48 inch - 4 for
- $15.75.
- Indoor sun bulb, 75 or 150 watt - $5.75.
- And, they have a natural growth regualtor for plants (Gibberellin) which
- can change height, speed growth, and maturity, promote blossoming,
- etc. Each plant reacts differently to treatment with Gibberellin...there's
- no fun like experimenting - $2.00
- SUGGESTED READING
- THE CONNOISSEUR'S HANDBOOK OF MARIJUANA, Bill Drake
- Straight Arrow Publishing - $3.50
- 625 Third Street
- San Francisco, California
- FLASH
- P.O.Box 16098
- San Fransicso, California 94116
- Stocks a series of pamphlets on grass, dope manufacture, cooking.
- Includes the Mary Jane Superweed series.
- Match Head Bomb by the Jolly Roger
- Simple safety match heads in a pipe, capped at both ends, make a
- devestating bomb. It is set off with a regular fuse.
- A plastic Baggie is put into the pipe before the heads go in to
- prevent detonation by contact with the metal.
- Cutting enough match heads to fill the pipe can be tedious work for
- one but an evening's fun for the family if you can drag them away from
- the TV.
- ----------------Jolly Roger
- How To Terrorize McDonalds by the Jolly Roger
- (Originally an Apple ][ file so excuse the upper case!!!)
- NOW, ALTHOUGH Mc DONALDS IS FAMOUS FOR IT'S ADVERTISING AND MAKING THE
- WHOLE WORLD THINK THAT THE BIG MAC IS THE BEST THING TO COME ALONG SINCE
- SLICED BREAD (BUNS?), EACH LITTLE RESTAURANT IS AS AMATEUR AND SIMPLE AS
- A NEW-FOUND BUSNESS. NOT ONLY ARE ALL THE EMPLOYEES RATHER INEXPERIENCED
- AT WHAT THEY'RE =SUPPOSED= TO DO, BUT THEY WILL JUST LOOSE ALL CONTROL WHEN
- AN EMERGENCY OCCURS....HERE WE GO!!! FIRST, GET A FEW FRIENDS (4 IS
- GOOD...I'LL GET TO THIS LATER) AND ENTER THE MCDONALDS RESTAURANT, TALKING
- LOUDLY AND REAKING OF SOME STRANGE SMELL THAT AUTOMATICALLY MAKES THE OLD
- COUPLE SITTING BY THE DOOR LEAVE. IF ONE OF THOSE PIMPLY-FACED GOONS IS
- WIPING THE FLOOR, THEN TRACK SOME CRAP ALL OVER IT (YOU COULD PRETEND TO
- SLIP AND BREAK YOUR HEAD, BUT YOU MIGHT ACTUALLY DO SO).
- NEXT, BEFORE YOU GET THE FOOD, FIND A TABLE. START YELLING AND RELEASING
- SOME STRANGE BODY ODOR SO =ANYBODY= WOULD LEAVE THEIR TABLE AND WALK OUT
- THE DOOR. SIT 2 FRIENDS THERE, AND GO UP TO THE COUNTER WITH ANOTHER.
- FIND A PLACE WHERE THE LINE IS SHORT, OR IF THE LINE IS LONG SAY "I ONLY
- WANNA BUY A COKE" AND YOU GET MOVED UP. NOW, YOU GET TO DO THE =ORDERING=
- ...HEH HEH HEH. SOMEBODY =ALWAYS= MUST WANT A PLAIN
- HAMBURGER WITH ABSOLUTELY NOTHING ON IT (THIS TAKES EXTRA TIME TO MAKE, AND
- DRIVES THE LITTLE HAMBURGER-MAKERS INSANE)..ORDER A 9-PACK OF CHICKEN
- MCNUGGETS...NO, A 20 PACK...NO, THREE 6 PACKS...WAIT...GO BACK TO THE TABLE
- AND ASK WHO WANTS WHAT. YOUR OTHER FRIEND WAITS BY THE COUNTER AND MAKES A
- PASS AT THE FEMALE CLERK. GET BACK TO THE THING AND ORDER THREE 6-PACKS OF
- CHICKEN ETC....NOW SHE SAYS "WHAT KIND OF SAUCE WOULD YOU LIKE?".OF COURSE,
- SAY THAT YOU ALL WANT BARBECUE SAUCE ONE OF YOUR FRIENDS WANTS 2 (ONLY IF
- THERE ARE ONLY 2 CONTAINERS OF BARBECUE SAUCE LEFT).THEN THEY HAFTA GO INTO
- THE STOREROOM AND OPEN UP ANOTHER BOX. FINALLY, THE DRINKS...SOMEBODY WANTS
- COKE, SOMEBODY ROOT BEER, AND SOMEBODY DIET COKE. AFTER THESE ARE DELIVERED,
- BRING THEM BACK AND SAY "I DIDN'T ORDER A DIET COKE! I ORDERED A SPRITE!"
- THIS GETS THEM MAD; BETTER YET, TURN DOWN SOMETHING TERRIBLE THAT NOBODY
- WANTS TO DRINK, SO THEY HAFTA THROW THE DRINK AWAY; THEY CAN'T SELL IT.
- AFTER ALL THE FOOD(?) IS HANDED TO YOU, YOU MUST =NEVER= HAVE ENOUGH MONEY
- TO PAY. THE CLERK WILL BE SO ANGRY AND CONFUSED THAT SHE'LL LET YA GET
- AWAY WITH IT (ANOTHER INFLUENCE ON HER IS YOUR FRIEND ASKING HER "IF YOU
- LET US GO I'LL GO OUT WITH YOU" AND GIVING HER A FAKE FONE NUMBER).
- NOW, BACK TO YOUR TABLE. BUT FIRST, SOMEBODY LIKES KETCHUP AND MUSTARD.
- AND PLENTY (TOO MUCH) OF NAPKINS. OH, AND SOMEBODY LIKES FORKS AND KNIVES,
- SO ALWAYS END UP BREAKING THE ONES YOU PICK OUTTA THE BOX. HAVE YOUR
- FRIENDS YELL OUT,"YAY!!!!! WE HAVE MUNCHIES!!" AS LOUD AS THEY CAN.
- THAT'LL WORRY THE ENTIRE RESTAURANT. PROCEED TO SIT DOWN. SO, YOU ARE
- SITTING IN THE SMOKING SECTION (BY ACCIDENT) EH? WELL, WHILE ONE OF THE
- TOBACCO-BREATHERS ISN'T LOOKING, PUT A SIGN FROM THE OTHER SIDE OF THE
- ROOM SAYING "DO NOT SMOKE HERE" AND HE'LL HAFTA MOVE...THEN HE GOES INTO
- THE REAL NON-SMOKING SECTION, AND GETS YELLED AT. HE THEN THINKS THAT
- NO SMOKING IS ALLOWED IN THE RESTAURANT, SO HE EATS OUTSIDE (IN THE POUR-
- ING RAIN) AFTER YOUR MEAL IS FINISHED (AND QUITE A FEW SPLATTERED-OPENED
- KETCHUP PACKETS ARE ALL OVER YER TABLE), TRY TO LEAVE. BUT OOPS! SOMEBODY
- HAS TO DO HIS DUTY IN THE MEN'S ROOM. AS HE GOES THERE, HE STICKS AN
- UNEATED HAMBURGGR (WOULD YOU DARE TO EAT ONE OF THEIR HAMBURGERS?)
- INSIDE THE TOILET, FLUSHES IT A WHILE,UNTIL IT RUNS ALL OVER THE BATHROOM.
- OOPS! SEND A PIMPLY-FACED TEENAGER TO CLEAN IT UP. (HE WON'T KNOW THAT
- BROWN THING IS A HAMBURGER, AND HE'LL GET SICK. WHEEE!)
- AS YOU LEAVE THE RESTCURANT, LOOKING BACK AT YOUR UNCLEANED TABLE, SOMEBODY
- MUST REMEMBER THAT THEY LEFT THEIR CHOCOLATE SHAKE THERE! THE ONE THAT'S
- ALMOST FULL!!!! HE TAKES IT THEN SAYS "THIS TASTES LIKE CRAP!", THEN HE
- TAKES OFF THE LID AND THROWS IT INTO THE GARBAGE CAN...OOPS! HE MISSED,
- AND NOW THE SAME POOR SOUL WHO'S CLEANING UP THE BATHROOM NOW HASTA CLEAN
- UP CHOCOLATE SHAKE. THEN LEAVE THE JOINT, REVERSING THE "YES, WE'RE OPEN"
- SIGN (AS A REMINDER OF YER VISIT THERE YOU HAVE IT! YOU HAVE JUST PUT
- ALL OF MCDONALDS INTO COMPLETE MAYHEM. AND SINCE THERE IS NO PENALTY FOR
- LITTERING IN A RESTAURANT, BUGGING PEOPLE IN A PUBLIC EATERY (OR
- THROW-UPERY, IN THIS CASE) YOU GET OFF SCOT-FREE. WASN'T THAT FUN?
- --------------Jolly Roger
- "Mentor's Last Words" courtesy of the Jolly Roger
- The following file is being reprinted in honor and sympathy for the many
- phreaks and hackers that have been busted recently by the Secret Service.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - \/\The Conscience of a Hacker/\
- -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
- Another one got caught today, it's all over the papers. "Teenager
- Arrested in Computer Crime Scandal", "Hacker Arrested after Bank
- Tampering"... Damn kids. They're all alike. But did you, in your three-
- piece psychology and 1950's technobrain, ever take a look behind the
- eyes of the hacker? Did you ever wonder what made him tick, what forces
- shaped him, what may have molded him? I am a hacker, enter my world...
- Mine is a world that begins with school... I'm smarter than most of the
- other kids, this crap they teach us bores me... Damn underachiever.
- They're all alike. I'm in junior high or high school. I've listened to
- teachers explain for the fifteenth time how to reduce a fraction.
- I understand it. "No, Ms. Smith, I didn't show my work. I did it in
- my head..." Damn kid. Probably copied it. They're all alike.
- I made a discovery today. I found a computer. Wait a second, this is
- cool. It does what I want it to. If it makes a mistake, it's because I
- screwed it up. Not because it doesn't like me... Or feels threatened by
- me.. Or thinks I'm a smart ass.. Or doesn't like teaching and shouldn't be
- here... Damn kid. All he does is play games. They're all alike. And then
- it happened... a door opened to a world... rushing through the phone line
- like heroin through an addict's veins, an electronic pulse is sent out,
- a refuge from the day-to-day incompetencies is sought... a board is found.
- "This is it... this is where I belong..." I know everyone here... even
- if I've never met them, never talked to them, may never hear from them
- again... I know you all... Damn kid. Tying up the phone line again.
- They're all alike... You bet your ass we're all alike... we've been
- spoon-fed baby food at school when we hungered for steak... the bits of
- meat that you did let slip through were pre-chewed and tasteless.
- We've been dominated by sadists, or ignored by the apathetic. The few
- that had something to teach found us willing pupils, but those few are
- like drops of water in the desert.
- This is our world now... the world of the electron and the switch, the
- beauty of the baud. We make use of a service already existing without
- paying for what could be dirt-cheap if it wasn't run by profiteering
- gluttons, and you call us criminals. We explore... and you call us
- criminals. We seek after knowledge... and you call us criminals. We
- exist without skin color, without nationality, without religious bias...
- and you call us criminals. You build atomic bombs, you wage wars, you
- murder, cheat, and lie to us and try to make us believe it's for our
- own good, yet we're the criminals.
- Yes, I am a criminal. My crime is that of curiosity. My crime is
- that of judging people by what they say and think, not what they look like.
- My crime is that of outsmarting you, something that you will never
- forgive me for. I am a hacker, and this is my manifesto. You may stop
- this individual,but you can't stop us all... after all, we're all alike.
- +++The Mentor+++
- [May the members of the phreak community never forget his words -JR]
- The Myth of the 2600hz Detector courtesy of the Jolly Roger
- (Imported from the Apple ][ so forgive the upper case!!)
- JUST ABOUT EVERYONE I TALK TO THESE DAYS ABOUT ESS SEEMS TO BE SCARED
- WITLESS ABOUT THE 2600HZ DETECTOR. I DON'T KNOW WHO THOUGHT THIS ONE UP,
- BUT IT SIMPLY DOES NOT EXIST. SO MANY OF YOU PEOPLE WHINE ABOUT THIS SO
- -CALLED PHREAK CATCHING DEVICE FOR NO REASON.
- SOMEONE WITH AT&T SAID THEY HAD IT TO CATCH PHREAKERS. THIS WAS JUST TO
- SCARE THE BLUE-BOXERS ENOUGH TO MAKE THEM QUIT BOXING FREE CALLS.
- I'M NOT SAYING ESS IS WITHOUT ITS HANG-UPS, EITHER. ONE THING THAT ESS CAN
- DETECT READILY IS THE KICK-BACK THAT THE TRUNK CIRCUITRY SENDS BACK TO THE
- ESS MACHINE WHEN YOUR LITTLE 2600HZ TONE RESETS THE TOLL TRUNK. AFTER AN
- ESS DETECTS A KICKBACK IT TURNS AN M-F DETECTOR ON AND RECORDES ANY M-F
- TONES X-MITTED.
- ---------------------------------------
- DEFEATING THE KICK-BACK DETECTOR
- ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
- AS MENTIONED IN MY PREVIOUS NOTE, KICK-BACK DETECTION CAN BE A SERIOUS
- NUISANCE TO ANYONE INTERESTED IN GAINING CONTROL OF A TRUNK LINE.
- THE EASIEST WAY TO BY-PASS THIS DETECTION CIRCUITRY IS NOT REALLY
- BY-PASSING IT AT ALL, IT IS JUST LETTING THE KICK-BACK GET DETECTED ON
- SOME OTHER LINE. THIS OTHER LINE IS YOUR LOCAL MCI, SPRINT, OR OTHER LONG
- DISTANCE CARRIER (EXCEPT AT&T). THE ONLY CATCH IS THAT THE SERVICE
- YOU USE MUST NOT DISCONNECT THE LINE WHEN YOU HIT THE 2600HZ TONE.
- THIS IS HOW YOU DO IT: CALL UP YOUR LOCAL EXTENDER, PUT IN THE CODE,
- AND DIAL A NUMBER IN THE 601 AREA CODE AND THE 644 EXCHANGE. LOTS OF OTHER
- EXCHANGES WORK ACROSS THE COUNTRY, I'M SURE, BUT THIS IS THE ONLY ONE
- THAT I HAVE FOUND SO FAR. ANYWAY, WHEN IT STARTS RINGING, SIMPLY HIT
- 2600HZ AND YOU'LL HEAR THE KICK-BACK, (KA-CHIRP, OR WHATEVER). THEN YOU ARE
- READY TO DIAL WHOEVER YOU WANT (CONFERENCES, INWARD, ROUTE AND RATE,
- OVERSEAS, ETC.) FROM THE TRUNK LINE IN OPERATOR TONES! SINCE BLOWING
- 2600HZ DOESN'T MAKE YOU YOU A PHREAKER UNTIL THE TOLL EQUIPMENT RESETS
- THE LINE, KICKBACK DETECTION IS THE METHOD AT&T CHOOSES (FOR NOW)
- THIS INFORMATION COMES AS A RESULT OF MY EXPERIMENTS & EXPERIENCE AND
- HAS BEEN VERIFIED BY LOCAL AT&T EMPLOYEES I HAVE AS ACQUAINTANCES.
- THEY COULD ONLY SAY THAT THIS IS TRUE FOR MY AREA, BUT WERE PRETTY SURE
- THAT THE SAME IDEA IS IMPLEMENTED ACROSS THE COUNTRY.
- =======================================
- NOW THAT YOU KNOW HOW TO ACCESS A TRUNK LINE OR AS OPERATORS SAY A LOOP, I
- WILL TELL YOU THE MANY THINGS YOU CAN DO WITH IT.
- HERE IS A LIST OF AT&T SERVICES ACCESSIBLE TO YOU BY USING A BLUE BOX.
- A/C+101 TOLL SWITCHING
- A/C+121 INWARD OPERATOR
- A/C+131 INFORMATION
- A/C+141 ROUTE & RATE OP.
- A/C+11501 MOBILE OPERATOR
- A/C+11521 MOBILE OPERATOR
- STARTING CONFERANCES:---------------------
- THIS IS ONE THE MOST USEFUL ATTRIBUTES OF BLUE BOXING. NOW THE CONFS.
- ARE UP 24 HOURS/DAY AND 7 DAYS/WEEK AND THE BILLING LINES ARE BEING
- BILLED.
- SINCE I BELEIVE THE ABOVE IS TRUE (ABOUT THE BILLING LINES BEING BILLED)
- I WOULD RECOMMEND THAT YOU NEVER LET YOUR # SHOW UP ON THE CONF. IF YOU
- STARTED IT, PUT IT ON A LOOP AND THEN CALL THE LOOP. ENOUGH
- BULLSHIT!!!!! TO START THE CONF. DIAL ONE OF THESE THREE NUMBERS IN
- M-F WHILE YOU ARE ON THE TRUNK.
- 213+080+XXXX
- XXXX=1050,3050
- SPECIAL XXXX=1000,1100,1200,1500,2200,2500.
- THESE #S ARE IN L.A. AND ARE THE MOST WATCHED, I DO NOT ADVISE USING THIS
- NPA.
- 312+001+1050 OR 3050
- 914+042+1050 OR 1100,1200 ECT..
- ***************************************
- UPDATE, I BELEIVE ONLY 914 WORKS AT THE MOMENT
- ***************************************
- ONCE CONNECTED WITH ONE OF THESE YOU WILL EITHER HEAR A RE-ORDER,
- BUSY, OR CHERP. WHEN YOU HEAR THE CHERP ENTER THE BILLING LINE IN M-F.
- I USE THE CONF. DIAL- UP.
- A BILLING LINE EXAMPLE: KP312+001+1050ST
- YOU WILL THEN HEAR TWO TUTES AND A RECORDING ASKING YOU FOR THE # OF
- CONFERREES INCLUDING YOURSELF. ENTER A # BETWEEN 20 AND 30.
- IF YOU EVER GET OVER 30 PEOPLE ON A CONFERANCE ALL YOU WILL HEAR IS
- JUMBLED VOICES. AFTER THE IT SAYS
- "YOUR CONFERANCE SIZE IS XX" THEN HIT # SIGN. ADD YOUR FAVORITE LOOP
- ON AND HIT 6 TO TRANSFER CONTROL TO IT. AFTER IT SAYS CONTROL WILL BE
- TRANSFERED HANG UP AND CALL THE OTHER SIDE OF THE LOOP,
- HIT # SIGN AND FOLLOW THE INSTRUCTIONS. A BONUS FOR CONF. IS TO ADD AN
- INTERNATIONAL # DIAL 1+011+CC+NUMBER PRETTY COOL EHHH.
- A FEW EXTRA NOTES.
- DO NOT ADD #S THAT YOU WILL WANT TO HANG UP, ADD THESE THROUGH MCI OR
- SPRINT. YOU CANNOT BLOW ANYONE OFF W/2600HZ UNLESS THEY ARE IN AN
- OLD X-BAR OR OLDER SYSTEM.
- MANY D.A. OPERATORS WILL STAY ON AFTER YOU ABUSE THEM; YOU MAY HAVE TO
- START ANOTHER OR AT LEAST DON'T SAY ANY NUMBERS.
- NEVER ADD THE TONE SIDE OF A LOOP ONTO A CONF.
- NEVER ADD MORE THAN ONE MCI NODE ON YOUR CONF.
- ROUTE & RATE:
- -------------
- NOTE ROUTE & RATE AND RQS PERFORM THE SAME SERVICE.
- R&R SIMPLY TELLS YOU ROUTE AND RATE INFO WHICH IS VERY VALUBLE, EX.
- SUCH AS THE INWARD ROUTING FOR AN EXCHANGE IN AN AREA CODE.
- AN INWARD ROUTING WILL LET YOU CALL HER AND SHE CAN DO AN EMERGENCY
- INTERUPT FOR YOU. SHE CAN TELL YOU HOW TO GET INTERNATIONAL OPERATORS,ECT.
- HERE ARE THE TERMS YOU ARE REQUIRED TO USE:
- INTERNATIONAL,
- -OPERATOR ROUTE FOR [COUNTRY, CITY]. *GIVES YOU INWARD OP.
- -DIRECTORY ROUTE FOR [COUNTRY, CITY]. *GIVES YOU DIRECTORY ASS.
- -CITY ROUTE FOR [COUNTRY, CITY]. *GIVES YOU COUNTRY AND CITY CODE.
- OPERATOR ROUTE FOR [A/C]+ [EXCHANGE] *GIVES YOU INWARD OP. ROUTE
- EX. [A/C]+ OR [A/C]+0XX+ WHEN SHE SAYS PLUS SHE MEANS PLUS 121.
- NUMBERS ROUTE FOR [STATE, CITY] *GIVES YOU A/C.
- PLACE NAME [A/C]+[EXCHANGE] *GIVES YOU CITY/STATE FOR THAT A/C AND
- EXCHANGE.
- INTERNATIONAL CALLS:
- --------------------
- TO CALL INTERNATIONAL OVER CABLE SIMPLY ACCESS A TRUNK AND DIAL
- KP011XXXST WAIT FOR SENDER TONE, KPXXXCC-NUMBERST
- XXX - A 3 DIGIT COUNTRY CODE, IT MAY NOT BE 3 DIGITS SO JUST PUT
- 1 OR 2 0'S IN FRONT OF IT. CC - IS THE CITY CODE
- TO GO BY SATELLITE:
- DIAL KP18XST X - NUMBERS 2-8 WAIT FOR SENDER TONE THEN
- KPXXXCCNUMBERST
- Blue Box courtesy of the Jolly Roger
- To quote Karl Marx, blue boxing has always been the most noble form of
- phreaking. As opposed to such things as using an MCI code to make a free
- fone call, which is merely mindless pseudo-phreaking, blue boxing
- is actual interaction with the Bell System toll network.
- It is likewise advisable to be more cautious when blue boxing, but the
- careful phreak will not be caught, regardless of what type of switching
- system he is under.
- In this part, I will explain how and why blue boxing works, as well as
- where. In later parts, I will give more practical information for blue
- boxing and routing information. To begin with, blue boxing is simply
- communicating with trunks. Trunks must not be confused with subscriber
- lines (or "customer loops") which are standard telefone lines. Trunks are
- those lines that connect central offices. Now, when trunks are not in
- use (i.e., idle or "on-hook" state) they have 2600Hz applied to them. If
- they are two-way trunks, there is 2600Hz in both directions. When a trunk
- IS in use (busy or "off-hook" state), the 2600Hz is removed from the side
- that is off-hook. The 2600Hz is therefore known as a supervisory
- signal, because it indicates the status of a trunk; on hook (tone) or
- off-hook (no tone). Note also that 2600Hz denoted SF (single frequency)
- signalling and is "in-band." This is very important. "In-band" means that
- is within the band of frequencies that may be transmitted over normal
- telefone lines. Other SF signals, such as 3700Hz are used also. However,
- they cannot be carried over the telefone network normally (they are
- "out-of-band" and are therefore not able to be taken advantage of as
- 2600Hz is. Back to trunks. Let's take a hypothetical phone call. You pick
- up your fone and dial 1+806-258-1234 (your good friend in Amarillo, Texas).
- For ease, we'll assume that you are on #5 Crossbar switching and not in the
- 806 area. Your central office (CO) would recognize that 806 is a foreign
- NPA, so it would route the call to the toll centre that serves you.
- [For the sake of accuracy here, and for the more experienced readers,
- note that the CO in question is a class 5 with LAMA that uses out-of-band
- SF supervisory signalling]. Depending on where you are in the country,
- the call would leave your toll centre (on more trunks) to another toll
- centre, or office of higher "rank". Then it would be routed to central
- office 806-258 eventually and the call would be completed.
- Illustration
- A---CO1-------TC1------TC2----CO2----B
- A.... you
- CO1=your central office
- TC1.. your toll office.
- TC2.. toll office in Amarillo.
- CO2.. 806-258 central office.
- B.... your friend (806-258-1234)
- In this situation it would be realistic to say that CO2 uses SF
- in-band (2600Hz) signalling, while all the others use out-of-band signal-
- ling (3700Hz). If you don't understand this, don't worry. I am pointing
- this out merely for the sake of accuracy. The point is that while you
- are connected to 806-258-1234, all those trunks from YOUR central office
- (CO1) to the 806-258 central office (CO2) do *NOT* have 2600Hz on them,
- indicating to the Bell equipment that a call is in progress and the trunks
- are in use.
- Now let's say you're tired of talking to your friend in Amarillo, so you
- send a 2600Hz down the line. This tone travels down the line to your
- friend's central office (CO2) where it is detected. However, that CO thinks
- that the 2600Hz is originating from Bell equipment, indicating to it
- that you've hung up, and thus the trunks are once again idle (with 2600Hz
- present on them). But actually, you have not hung up, you have fooled the
- equipment atyour friend's CO into thinking you have. Thus,it disconnects
- him and resets the equipment to prepare for the next call. All this happens
- very quickly (300-800ms for step-by-step equipment and 150-400ms for other
- equipment). When you stop sending 2600Hz (after about a second), the
- equipment thinks that another call is coming towards
- --> on hook, no tone -->off hook.
- Now that you've stopped sending 2600Hz, several things happen:
- 1) A trunk is seized.
- 2) A "wink" is sent to the CALLING end from the CALLED end indicating that
- the CALLED end (trunk) is not ready to receive digits yet.
- 3) A register is found and attached to the CALLED end of the trunk within
- about two seconds (max).
- 4) A start-dial signal is sent to the CALLING end from the CALLED end
- indicating that the CALLED end is ready to receive digits.
- Now, all of this is pretty much transparent to the blue boxer. All he
- really hears when these four things happen is a <beep><kerchunk>. So,
- seizure of a trunk would go something like this:
- 1> Send a 2600Hz
- 2> Terminate 2600Hz after 1-2 secs.
- 3> [beep][kerchunk]
- Once this happens, you are connected to a tandem that is ready to obey your
- every command. The next step is to send signalling information in order to
- place your call. For this you must simulate the signalling used by
- operators and automatic toll-dialing equipment for use on trunks. There are
- mainly two systems, DP and MF. However, DP went out with the dinosaurs, so
- I'll only discuss MF signalling. MF (multi-frequency) signalling is the
- signalling used by the majority of the inter- and intra-lata network. It is
- also used in international dialing known as the CCITT no.5 system.
- MF signals consist of 7 frequecies, beginning with 700Hz and separated by
- 200Hz. A different set of two of the 7 frequencies represent the digits 0
- thru 9, plus an additional 5 special keys. The frequencies and uses are as
- follows:
- Frequencies (Hz) Domestic Int'l
- -------------------------------------
- 700+900 1 1
- 700+1100 2 2
- 900+1100 3 3
- 700+1300 4 4
- 900+1300 5 5
- 1100+1300 6 6
- 700+1500 7 7
- 900+1500 8 8
- 1100+1500 9 9
- 1300+1500 0 0
- 700+1700 ST3p Code 1
- 900+1700 STp Code 1
- 1100+1700 KP KP1
- 1300+1700 ST2p KP2
- 1500+1700 ST ST
- The timing of all the MF signals is a nominal 60ms, except for KP, which
- should have a duration of 100ms. There should also be a 60ms silent period
- between digits. This is very flexible however, and most Bell equipment will
- accept outrageous timings. In addition to the standard uses
- listed above, MF pulsing also has expanded usages known as "expanded
- inband signalling" that include such things as coin collect, coin return,
- ringback, operator attached, and operator attached, and operator
- released. KP2, code 11, and code 12 and the ST_ps (STart "primes" all have
- special uses which will be mentioned only briefly here.
- To complete a call using a blue box once seizure of a trunk has been
- accomplished by sending 2600Hz and pausing for the <beep><kerchunk>, one
- must first send a KP. This readies the register for the digits that follow.
- For a standard domestic call, the KP would be followed by either 7 digits
- (if the call were in the same NPA as the seized trunk) or 10 digits (if the
- call were not in the same NPA as the seized trunk). [Exactly like dialing
- normal fone call]. Following either the KP and 7 or 10 digits, a STart is
- sent to signify that no more digits follow. Example of a complete call:
- 1> Dial 1-806-258-1234
- 2> wait for a call-progress indication (such as ring,busy,recording,etc.)
- 3> Send 2600Hz for about 1 second.
- 4> Wait for about ll-progress indication (such as ring,busy,recording,etc.)
- 5> Send KP+305+994+9966+ST
- The call will then connect if everything was done properly. Note that if a
- call to an 806 number were being placed in the same situation, the are code
- would be omitted and only KP + seven digits + ST would be sent.
- Code 11 and code 12 are used in international calling to request
- certain types of operators. KP2 is used in international calling to route a
- call other than by way of the normal route, whether for economic or
- equipment reasons. STp, ST2p, and ST3p (prime, two prime, and three prime)
- are used in TSPS signalling to indicate calling type of call (such as
- coin-direct dialing.
- Napalm (Another way to make it...) by the Jolly Roger
- (See file #021 of the Cookbook for an easy way to make it!!)
- About the best fire bomb is napalm. It has a thick consistancy,
- like jam and is best for use on vehilces or buildings.
- Napalms is simply one part gasoline and one part soap. The soap is
- either soap flakes or shredded bar soap. Detergents won't do.
- The gasoline must be heated in order for the soap to melt. The
- usual way is with a double boiler where the top part has at least a
- two-quart capicity. The water in the bottom part is brought to a boil
- and the double boiler is taken from the stove and carried to where
- there is no flame.
- Then one part, by volume, of gasoline is put in the top part and
- allowed to heat as much as it will and the soap is added and the mess
- is stirred until it thickens. A better way to heat gasoline is to fill
- a bathtub with water as hot as you can get it. It will hold its heat
- longer and permit a much larger container than will the double boiler.
- ---------------Jolly Roger
- Nitroglycerin Recipe by the Jolly Roger
- Like all chemists I must advise you all to take the greatest care
- and caution when you are doing this. Even if you have made this stuff
- before.
- This first article will give you information on making
- nitroglyerin, the basic ingredient in a lot of explosives such as
- straight dynamites, and geletin dynamites.
- Making nitroglycerin
- 1. Fill a 75-milliliter beaker to the 13 ml. Level with fuming
- red nitric acid, of 98% pure concentration.
- 2. Place the beaker in an ice bath and allow to cool below room
- temp.
- 3. After it has cooled, add to it three times the amount of
- fuming sulferic acid (99% h2so4). In other words, add to the
- now-cool fuming nitric acid 39 ml. Of fuming sulferic acid.
- When mixing any acids, always do it slowly and carefully to
- avoid splattering.
- 4. When the two are mixed, lower thier temp. By adding more ice
- to the bath, about 10-15 degrees centigrade. (Use a
- mercury-operated thermometer)
- 5. When the acid solution has cooled to the desired temperature,
- it is ready for the glycerin. The glycerin must be added in
- small amounts using a medicine dropper. (Read this step about
- 10 times!) Glycerin is added slowly and carefully (i mean
- careful!) Until the entire surface of the acid it covered with
- it.
- 6. This is a dangerous point since the nitration will take place
- as soon as the glycerin is added. The nitration will produce
- heat, so the solution must be kept below 30 degrees
- centigrade! If the solution should go above 30 degrees,
- immediately dump the solution into the ice bath! This will
- insure that it does not go off in your face!
- 7. For the first ten minutes of nitration, the mixture should be
- gently stirred. In a normal reaction the nitroglycerin will
- form as a layer on top of the acid solution, while the sulferic
- acid will absorb the excess water.
- 8. After the nitration has taken place, and the nitroglycerin has
- formed on the top of the solution, the entire beaker should be
- transferred slowly and carefully to another beaker of water.
- When this is done the nitroglycerin will settle at the bottem
- so the other acids can be drained away.
- 9. After removing as much acid as posible without disturbing the
- nitroglycerin, remove the nitroglycerin with an eyedropper and
- place it in a bicarbonate of soda (sodium bicarbonate in case
- you didn't know) solution. The sodium is an alkalai and will
- nuetralize much of the acid remaining. This process should be
- repeated as much as necesarry using blue litmus paper to check
- for the presence of acid. The remaining acid only makes the
- nitroglycerin more unstable than it already is.
- 10. Finally! The final step is to remove the nitroglycerin from
- the bicarbonate. His is done with and eye- dropper, slowly
- and carefully. The usual test to see if nitration has been
- successful is to place one drop of the nitroglycerin on metal
- and ignite it. If it is true nitroglycerin it will burn with
- a clear blue flame.
- ** Caution **
- Nitro is very sensative to decomposition, heating dropping, or
- jarring, and may explode if left undisturbed and cool.
- -------------Jolly Roger
- Operation: Fuckup by the Jolly Roger
- This is a guide for Anarchists and can be funny for non-believers and 12
- and 13 year old runts, and can be a lexicon of deadly knowledge for True
- Anarchists... Serious damage is intended to be dealt here. Do not try
- this stuff unless you want to do a lot of serious Anarchy.
- [Simulation]
- Asshole - 'Listen, you little teenager punk shit, shut the fuck up, or I'll
- knock you down!'
- Anarchist - 'O.K.....You can't say I didn't warn you. You don't know my
- rue power...' (soooo casually)
- Asshole - 'Well, er, what do you mean? Anarchist - '<demoniac grin>'
- As you can see, the Anarchist knows something that this asshole doesn't...
- [Operation Fuckup]
- Geta wheel barrel or two. Fill with gasoline. Get 16 rolls of toilet
- paper, unroll & drench in the gasoline. Rip to shreds in gasoline. Get
- asbestos gloves. Light a flare (to be punk), grab glob of
- saturated toilet paper (you can ignite the glob or not). Throw either
- flaming or dripping glob into:
- any window (picture is the best)
- front doors
- rough grain siding
- and best of all, brick walls.
- First of all, this bitch is near impossible to get off once dried, and
- is a terror to people inside when lit! After this... during the
- night, get a pickup truck, a few wheel-barrels, and a dozen friends with
- shovels. The pickup can be used only for transporting people
- and equipment, or doing that, and carting all the dirt. When it gets
- around 12:00 (after the loser goes beddie - bye), dig a gargantuan hole
- in his front yard until about 3:00. You can either assign three or four
- of your friends to cart the dirt ten miles away in the pickup-bed, or
- bury his front door in 15' of dirt! After that is done, get
- three or four buckets of tar, and coat his windows. You can make an
- added twist by igniting the tar when you are all done and ready to
- run! That is if the loser has a house. If he lives inside an apartment
- building, you must direct the attack more toward his car, and front door.
- I usually start out when he goes to work...I find out what his cheap car
- looks like, and memorize it for future abuse...It is always fun to paint
- his front door (apt.) hot pink with purple polka-dots, and off-neon
- colors in diagonal stripes. You can also pound a few hundred or so four
- inch nails into his front door (this looks like somebody really
- doesn't like you from the inside). Another great is to fill his keyhole
- with liquid steel so that after the bastard closes his door - the
- only way to get back in is to break it down. If you can spare it, leave
- him an axe - that is, implanted three inches into, and through the door!
- Now, this next one is difficult, but one of the best! Get a piece of wood
- siding that will more than cover his front door completely. Nail two by
- fours on the edges of the siding (all except the bottom) so you have
- a barge - like contraption. Make a hole at the top that will be large
- enough for a cement slide. Mix about six or seven LARGE bags of QUICK
- drying cement. Use the cement slide to fill the antichamber created by
- the 'barge' that is around his door. Use more two by fours to brace
- your little cement-filled barge, and let the little gem dry. When it is,
- remove the 'barge' so only a stone monolith remains that covers his door.
- Use any remaining cement to make a base around this so he can't just push
- it over. When I did this, he called the fire department, and they thought
- he meant wood, so they brought axes. I watched with a few dozen or so
- other tenants, and laughed my damn ass off! This is only his door! After
- he parks his car for the night, the fun really begins...I start out
- by opening up the car by jamming a very thin, but loack - inside and out!
- Then proceed to put orange-juice syrup all over the seats, so after he
- gets through all the other shit that you do, he will have the stickiest
- seats in the world. You can then get a few Sunday papers, and crack one of
- the windows about four inches. Lightly crumple the papers, and continue to
- completely fill the inside of his car with the newspapers. A copy of the
- Sunday New York Times will nicely fill a Volkeswagon! What is also quite
- amusing is to put his car on cinder blocks, slash his tires at the top, and
- fill them with cement! Leave the cinder blocks there so that, after he
- knocks the car off of them, he will get about 3 miles to the gallon with
- those tires, and do 0 to 60 in about two minutes! It is even more
- hilarious when he doesn't know why the hell why! Another is to open his
- hood, and then run a few wires from the sparkplugs to the METAL body.
- The sure is one HOT car when it is running! Now, I like to pour two pounds
- of sugar down his gas tank. If this doesn't blow every gasket in his
- engine it will do something called 'carmelizing his engine'. This is when
- the extreme heat turns the sugar to carmel, and you literally must
- completely take the engine out and apart, and clean each and every
- individual part!
- Well, if this asshole does not get the message, you had better start to
- get serious. If this guide was used properly & as it was intended (no,
- not as kindling for the fire), this asshole will either move far away,
- seek professional psychological help, commit suicide,
- or all of the above!
- --------------Jolly Roger
- *-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*
- * How to "steal" local calls from most Payphones *
- *-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*
- by the Jolly Roger
- Now to make free local calls, you need a finishing nail. I highly
- recommend "6D E.G. FINISH C/H, 2 INCH" nails. These are about 3/32 of
- an inch in diameter and 2 inches long (of course). You also need a large
- size paper clip. By large I mean they are about 2 inches long
- (FOLDED). Then you unfold the paper clip. Unfold it by taking each piece
- and moving it out 90 degrees. When it is done it should look somewhat
- like this:
- /----------\
- : :
- : :
- : :
- : :
- \-----
- Now, on to the neat stuff. What you do, instead of unscrewing the
- glued-on mouthpiece, is insert the nail into the center hole of
- the mouthpiece (where you talk) and push it in with
- pressure or just hammer it in by hitting the nail on something.
- Just DON'T KILL THE MOUTHPIECE! You could damage it
- if you insert the nail too far or at some weird angle. If this
- happens then the other party won't be able to hear what you say.
- You now have a hole in the mouthpiece in which you can easily insert the
- paper clip. So, take out the nail and put in the paper clip.
- Then take the other end of the paper clip and shove it under the rubber
- cord protector at the bottom of the handset (you know, the blue guy...).
- This should end up looking remotely like...like this:
- /----------\ Mouthpiece
- : :
- Paper clip --> : : /
- : /---:---\
- : : :
- :------------>
- ====================\---))):
- : To earpiece ->
- ^ ^
- \-------------------->
- : :
- : :
- Cord Blue guy
- (The paper clip is shoved under the blue guy to make a good connection
- between the inside of the mouthpiece and the metal cord.)
- Now, dial the number of a local number you wish to call, sayyyy,
- MCI. If everything goes okay, it should ring and not answer with the
- "The Call You Have Made Requires a 20 Cent Deposit" recording. After the
- other end answers the phone, remove the paper clip. It's all that
- simple, see?
- There are a couple problems, however. One is, as I mentioned
- earlier, the mouthpiece not working after you punch it. If this
- happens to you, simply move on to the next payphone. The one you are
- now on is lost. Another problem is that the touch tones won't work
- when the paper clip is in the mouthpiece. There are two ways around this..
- A> Dial the first 6 numbers. This should be done without the paper
- clip making the connection, i.e., one side should not be connected.
- Then connect the paper clip, hold down the last digit, and slowly
- pull the paper clip out at the mouthpiece's end.
- B> Don't use the paper clip at all. Keep the nail in after you punch
- it. Dial the first 6 digits. Before dialing the last digit, touch
- the nail head to the plate on the main body of the phone, the money
- safe thingy..then press the last number. The reason that this method
- is sometimes called clear boxing is because there is
- another type of phone which lets you actually make the call and listen
- to them say "Hello, hello?" but it cuts off the mouthpiece so they
- can't hear you. The Clear Box is used on that to amplify your voice
- signals and send it through the earpiece. If you see how this is
- even slightly similar to the method I have just described up there,
- kindly explain it to ME!! Cause I don't GET IT! Anyways, this DOES
- work on almost all single slot, Dial Tone First payphones (Pacific Bell
- for sure). I do it all the time. This is the least, I STRESS
- *LEAST*, risky form of Phreaking.
- ---------------Jolly Roger
- Pool Fun by the Jolly Roger
- First of all, you need know nothing about pools. The only thing
- you need know is what a pool filter looks like. If you don't know that.
- Second, dress casual. Preferably, in black. Visit your
- "friends" house, the one whose pool looks like fun!!) Then you
- reverse the polarity of his/her pool, by switching the wires around.
- They are located in the back of the pump. This will have quite an
- effect when the pump goes on. In other words. Boooooooooooommm!
- Thats right, when you mix + wires with - plugs, and vice- versa, the
- 4th of july happens again.
- Not into total destruction??? When the pump is off, switch the
- pump to "backwash". Turn the pump on and get the phuck out! When you
- look the next day, phunny. The pool is dry. If you want permanant
- damage, yet no great display like my first one mentioned, shut the
- valves of the pool off. (There are usually 2) One that goes to the
- main drain and one that goes to the filter in the pool. That should
- be enough to have one dead pump. The pump must take in water, so when
- there isn't any...
- Practical jokes: these next ones deal with true friends and
- there is *no* permanent damage done. If you have a pool, you must
- check the pool with chemicals. There is one labeled orthotolidine.
- The other is labeled alkaline (ph). You want orthotolidine. (It
- checks the chlorine).
- Go to your local pool store and tell them you're going into the pool
- business, and to sell you orthotolidine (a
- CL detector) Buy this in great quantities if possible. The solution
- is clear. You fill 2 baggies with this chemical. And sew the bags to
- the inside of your suit. Next, go swimming with your friend!
- Then open the bags and look like you're enjoying a piss. And anyone
- there will turn a deep red! They will be embarrased so much,
- Especially if they have guests there! Explain what it is, then add
- vinegar to the pool. Only a little. The "piss" disappears.
- HAHA!! --------------------Jolly Roger
- Free Postage by the Jolly Roger
- The increasing cost of postage to mail letters and packages is
- bringing down our standard of living. To remedy this deplorable
- situation, some counter control measures can be applied.
- For example, if the stamps on a letter are coated with Elmer's
- Glue by the sender, the cancellation mark will not destroy the stamp:
- the Elmer/s drives to form an almost invisible coating that protects
- the stamps from the cancellation ink. Later, the receiver of the
- letter can remove the cancellation mark with water and reuse the
- stamps. Furthermore, ecological saving will also result from recycling
- the stamps. Help save a tree.
- The glue is most efficently applied with a brush with stiff,
- short bristles. Just dip the brush directly into the glue and spread
- it on evenly, covering the entire surface of the stamp. It will dry
- in about 15 minutes.
- For mailing packages, just follow the same procedure as outlined
- above; however, the package should be weighed and checked to make sure
- that it has the correct amount of postage on it before it is taken to
- the Post Office.
- Removing the cancellation and the glue from the stamps can be
- easily accomplished by soaking the stamps in warm water until they
- float free from the paper. The stamps can then be put onto a paper
- towel to dry. Processing stamps in large batches saves time too.
- Also, it may be helpful to write the word 'Elmer' at the top of the
- letter (not on the envelope) to cue the receiving party in that the
- stamps have been protected with the glue.
- We all know that mailing packages can be expensive. And we also
- know that the handicapped are sometimes discriminated against in jobs.
- The Government, being the generous people they are, have given the
- blind free postal service.
- Simply address you envelope as usual, and make one modification.
- In the corner where the stamp would go, write in (or stamp) the words
- 'FREE MATTER FOR THE BLIND". Then drop you package or letter in one
- of the blue fedral mailboxes. DO NOT TAKE THE LETTER TO THE POST
- OFFICE, OR LEAVE IT IN YOUR MAILBOX.
- Sounds very nice of the government to do this, right? Well, they
- aren't that nice. The parcel is sent library rate, that is below
- third class. It may take four to five days to send a letter to just
- the next town.
- This too is quite simple, but less effective. Put the address
- that you are sending the letter to as the return address. If you were
- sending a $20 donation to the pirate's Chest, you would put our
- address (po box 644, lincoln ma. 01773) as the return address.
- Then you would have to be carless and forget to put the stamp on
- the envelope. A nice touch is to put a bullshit address in the center
- of the envelope.
- Again, you MUST drop the letter in a FEDRAL mailbox. If the post
- office doesn't send the letter to the return address for having no
- stamp, they will send it back for the reason of "No such address".
- Example--
- Pirates Chest Dept. 40DD
- P.O. Box 644865
- Lincol, Ma. 41773
- Tom Bullshit
- 20 Fake Road
- What Ever, XX 99851
- One last thing you might try doing is soaking a cancelled stamp
- off of an envelope, and gluing it onto one you are sending. Then burn
- the stamp, leaveing a little bit to show that there was one there.
- --------------Jolly Roger
- Unstable Explosives by the Jolly Roger
- Mix solid Nitric Iodine with househould ammonia. Wait overnight and
- then pour off the liquid. You will be left with a muddy substance. Let
- this dry till it hardens. Now throw it at something!!!!
- ----------------Jolly Roger
- Weird Drugs by the Jolly Roger
- Bananas:
- 1. Obtain 15 pounds of ripe yellow bananas
- 2. Peel all and eat the fruit. Save the peelings
- 3. Scrape all the insides of the peels with a sharp knife.
- 4. Put all the scraped material in a large pot and add water.
- 5. Boil 3 or 4 hours until it has attained a solid paste considtency.
- 6. Spread paste onto cookie sheets and dry in ofen for about 20
- minutes. This will result in fine black powder. Usually one will
- feel the effects after smoking three to four cigarettes.
- Cough syrup:
- mix robitussion a-c with an equal amount of ginger ale and drink. The
- effect are sedation and euphoria. Never underestimate the effects of
- any drug! You can od on cough syrup!
- Toads:
- 1. Collect five to ten toads, frogs will not work. The best kind are
- tree toads.
- 2. Kill them as painlessly as possible, and skin immediately.
- 3. Allow the skins to dry in a refrigerator four four to five days, or
- until the skins are brittle.
- 4. Now crush the skins into powder and smoke. Due to its bad taste you
- can mix it with a more fragrent smoking medium.
- Nutmeg:
- 1. Take several whole nutmegs and grind them up in an old grinder.
- 2. After the nutmegs are ground. Place in a mortar and pulverize with
- a pestle.
- 3. The usual dosage is about 10 or 15 grams. A larger dose may
- produce excessive thirst,anxiety,and rapid hart beat, but
- hallucinations are rare.
- Peanuts:
- 1. Take 1 pound of raw peanuts (not roasted)
- 2. Shell them, saving the skins and discarding the shells.
- 3. Eat the nuts.
- 4. Grind up the skins and smoke them.
- ------------------Jolly Roger
- The Art of Carding by the Jolly Roger
- Obtaining a credit card number: There are many ways to obtain the
- information needed to card something.
- The most important things needed are the card number and the expiration
- date. Having the card-holders name doesn't hurt, but it is not essential.
- The absolute best way to obtain all the information needed is by trashing.
- The way this is done is simple. You walk around your area or any other
- area and find a store, mall, supermarket, etc., that throws their
- garbage outside on the sidewalk or dumpster. Rip the bag open and see
- if you can find any carbons at all. If you find little shreds of
- credit card carbons, then it is most likely not worth your time to tape
- together. Find a store that does not rip their carbons at all or only in half.
- Another way is to bullshit the number out of someone. That is call them
- up and say "Hello, this is Visa security and we have a report that
- your card was stolen." They will deny it and you will try to get it out
- of them from that point on. You could say, "It wasn't stolen? Well what
- is the expiration date and maybe we can fix the problem....
- Ok and what is the number on your card?......Thank you very much and
- have a nice day." Or think of something to that degree.
- Another way to get card numbers is through systems such as TRW and CBI,
- this is the hard way, and probably not worth the trouble, unless you are
- an expert on the system. Using credit card numbers posted on BBS's is
- risky. The only advantage is that there is a good chance that other
- people will use it, thus decreasing the chances of being the
- sole-offender. The last method of getting numbers is very good also.
- In most video rental stores, they take down your credit card number
- when you join to back-up your rentals. So if you could manage to steal
- the list or make a copy of it, then you are set for a LONG time.
- Choosing a victim: Once you have the card number, it is time to make the
- order. The type of places that are easiest to victimize are small
- businesses that do mail order or even local stores that deliver.
- If you have an ad for a place with something you want and the order number
- is NOT a 1-800 number then chances are better that you will succeed.
- Ordering: When you call the place up to make the order, you must have
- several things readily at hand.
- These are the things you will need: A name, telephone number, business
- phone, card number (4 digit bank code if the card is MasterCard),
- expiration date, and a complete shipping and billing address.
- I will talk about all of these in detail. A personal tip: When I call
- to make an order, it usually goes much smoother if the person you are
- talking to is a woman. In many cases they are more gullible than men.
- The name: You could use the name on the card or the name of the person
- who you are going to send the merchandise to. Or you could use the name
- on the card and have it shipped to the person who lives at the drop
- (Say it is a gift or something).
- The name is really not that important because when the company verifies
- the card, the persons name is never mentioned, EXCEPT when you have a
- Preffered Visa card. Then the name is mentioned. You can tell if you
- have a Preffered Visa card by the PV to the right of the expiration
- date on the carbon. Nophone all day long waiting for the company to call
- (Which they will), then the phone number to give them as your home-phone
- could be one of the following: A number that is ALWAYS busy, a number
- that ALWAYS rings, a payphone number, low end of a loop (and you will wait
- on the other end), or a popular BBS.
- NEVER give them your home phone because they will find out as soon as
- the investigation starts who the phone belongs to. The best thing would
- be to have a payphone call forward your house
- (via Cosm The business number: When asked for, repeat the number you
- used for your home phone.
- Card number: The cards you will use will be Visa, Mastercard, and
- American Express. The best is by far Visa. It is the most
- straight-forward. Mastercard is pretty cool except for the bank code.
- When they ask for the bank code, they sometimes also ask for the bank
- that issued it. When they ask that just say the biggest bank you know of
- in your area. Try to avoid American Express. They tend to lead full
- scale investigations. Unfortunately, American Express is the most popular
- card out. When telling the person who is taking your call the card
- number, say it slow, clear, and with confidence.
- e.g. CC# is 5217-1234-5678-9012. Pause after each set of four so you
- don't have to repeat it.
- Expiration date: The date must be at LEAST in that month. It is best
- to with more than three months to go.
- The address: More commonly referred to as the 'drop'. Well the drop
- can range from an abandoned building to your next door neighbors
- apartment. If you plan to send it to an apartment building then be
- sure NOT to include an apartment number. This will confuse UPS or postage
- men a little and they will leave the package in the lobby.
- Here is a list of various drops: The house next door whose family is on
- vacation, the apartment that was just moved out of, the old church that
- will be knocked down in six months, your friends house who has absolutely
- nothing to do with the type of merchandise you will buy and who will
- also not crack under heat from feds, etc..
- There are also services that hold merchandise for you, but personally
- I would not trust them. And forget about P.O. Boxes because you need
- ID to get one and most places don't ship to them anyway.
- Other aspects of carding:Verifying cards, seeing if they were reported
- stolen.
- Verifying cards: Stores need to verify credit cards when someone purchases
- something with one. They call up a service that checks to see if the
- customer has the money in the bank.
- The merchant identifies himself with a merchant number. The service
- then holds the money that the merchant verified on reserve. When the
- merchant sends in the credit card form, the service sends the merchant
- the money. The service holds the money for three days and if no form
- appears then it is put back into the bank. The point is that if you
- want to verify something then you should verify it for a little amount
- and odds are that there will be more in the bank.
- The good thing about verification is that if the card doesn't exist or
- if it is stolen then the service will tell you. To verify MasterCard
- and Visa try this number. It is voice:1-800-327-1111 merchant code is
- 596719.
- Stolen cards: Mastercard and Visa come out with a small catalog every
- week where they publish EVERY stolen or fraudulantly used card.
- I get this every week by trashing the same place on the same day.
- If you ever find it trashing then try to get it every week.
- Identifying cards: Visa card numbers begin with a 4 and have either 13
- or 16 digits. MasterCard card numbers begin with a 5 and have 16 digits.
- American Express begins with a 3 and has 15 digits. They all have the
- formats of the following:
- 3xxx-xxxxxx-xxxxx American Express
- 4xxx-xxx-xxx-xxx Visa
- 4xxx-xxxx-xxxx-xxxx Visa
- 5xxx-xxxx-xxxx-xxxx MasterCard
- Gold cards: A gold card simply means that credit is good for $5000.
- Without a gold card, credit would be normally $2000.
- To recognize a gold card on a carbon there are several techniques:
- American Express-none.
- Visa-PV instead of CV.
- Note-When verifying a PV Visa, you have to have the real name of the
- cardholder.
- Mastercard-An asterix can signify a gold card, but this changes depending
- when the card was issued.
- I am going to type out a dialog between a carder and the phone operator
- to help you get the idea.
- Operator: "Over-priced Computer Goods, may I help you?"
- Carder: "Hi, I would like to place an order please."
- Operator: "Sure, what would you like to order?"
- Carder: "400 generic disks and a double density drive."
- Operator: "Ok, is there anything else?"
- Carder: "No thank you, that's all for today."
- Operator: "Ok, how would you like to pay for this? MasterCard or Visa?"
- Carder: "Visa."
- Operator: "And your name is?"
- Carder: "Lenny Lipshitz." (Name on card)
- Operator: "And your Visa card number is?"
- Carder: "4240-419-001-340" (Invalid card)
- Operator: "Expiration date?"
- Carder: "06-92."
- Operator: "And where would you like the package shipped to?"
- Carder: "6732 Goatsgate Port. Paris,texas,010166."
- Operator: "And what is your home telephone number?"
- Carder: "212-724-9970" (This number is actually always busy)
- Operator: "I will also need your business phone number in case we have
- to reach you."
- Carder: "You can reach me at the same number. 212-724-9970"
- Operator: "O.K. Thank you very much and have nice day."
- Carder: "Excuse me, when will the package arrive?"
- Operator: "In six to seven days UPS."
- Carder: "Thanks alot, and have a pleasant day."
- Now you wait 6-7 days when the package will arrive to the address which
- is really a house up for sale. There will be a note on the door
- saying, "Hello UPS, please leave all packages for Lenny Lipshitz in the
- lobby or porch. Thanks alot, Lenny Lipshitz" (Make the signature half-way
- convincing)
- ------------------Jolly Roger
- Recognizing credit cards by the Jolly Roger
- [Sample: American Express]
- XXXX XXXXXX XXXXX
- MM/Y1 THRU MM/Y2 Y1
- John Doe AX
- Explanation:
- The first date is the date the person got the card, the second
- date is the expriation date, after the expiration date is the same
- digits in the first year.The American Express Gold has many more
- numbers (I think 6 8 then 8). If you do find a Gold card keep it
- for it has a $5000.00 backup even when the guy has no money!
- [Sample: Master Card]
- 5XXX XXXX XXXX XXXX
- XXXX AAA DD-MM-YY MM/YY
- John Doe.
- Explanation:
- The format varies, I have never seen a card that did not start with
- a 5XXX there is another 4 digits on the next line that is sometimes
- asked for when ordering stuff, (and rarely a 3 digit letter combo
- (e. ANB). The first date is the date the person got the card
- and the second date is the expiration date.
- Master Card is almost always accepted at stores.
- [Sample: VISA]
- XXXX XXX(X) XXX(X) XXX(X)
- MM/YY MM/YY*VISA
- John Doe
- Explanation:
- Visa is the most straight forward
- of the cards,for it has the name right on the card itself, again the
- first date is the date he got the card and the second is the
- expiration date. (Sometimes the first date is left out). The
- numbers can eather be 4 3 3 3 or 4 4 4 4. Visa is also almost always
- accepted at stores, therefore, the best of cards to use.
- How To Create A New Indentity By The Walking Glitch
- Courtesy of the Jolly Roger!
- You might be saying, "Hey Glitch, what do I need a new identity for?"
- The answer is simple. You might want to go buy liquor somewhere, right?
- You might want to go give the cops the false name when you get busted
- so you keep your good name, eh? You might even want to use the new
- identity for getting a P.O. Box for carding. Sure! You might even
- want the stuff for renting yourself a VCR at some dickless loser of a
- convenience store. Here we go:
- Getting a new ID isn't always easy, no one said it would be. By following
- these steps, any bozo can become a new bozo in a coupla weeks.
- STEP 1
- The first step is to find out who exactly you'll become. The
- most secure way is to use someone's ID who doesn't use it themselves.
- The people who fit that bill the best are dead. As an added bonus they
- don't go complaining one bit. Go to the library and look
- through old death notices. You have to find someone who was born about
- the same time as you were, or better yet, a year or two older
- so you can buy booze, etc. You should go back as far as you can for the
- death because most states now cross index deaths to births so people
- can't do this in the future. The cutoff date in Wisconsin is 1979, folks
- in this grand state gotta look in 1978 or earlier. Anything earier there
- is cool. Now, this is the hardest part if you're younger. Brats that
- young happen to be quite resilient, takin' falls out of three story windows
- and eating rat poison like its Easter candy, and not a scratch or
- dent. There ain't many that die, so ya gotta look your ass off. Go
- down to the library and look up all the death notices you can,
- if it's on microfilm so much the better. You might have to go through
- months of death notices though, but the results are well worth it.
- You gotta get someone who died locally in most instances: the death
- certificate is filed only in the county of death. Now you go down to
- the county courthouse in the county where he died and get the
- death certificate, this will cost you around $3-$5 depending on the state
- you're in. Look at this hunk of paper, it could be your way to
- vanish in a clould of smoke when the right time comes, like right after
- that big scam. If You're lucky, the slobs parents signed him up with
- social security when he was a snot nosed brat. That'll be another piece
- of ID you can get. If not, thats ok too. It'll be listed on the death
- certificate if he has one. If you're lucky, the stiff was born
- locally and you can get his birth certificate right away.
- STEP 2
- Now check the place of birth on the death certificate, if it's in
- the same place you standing now you're all set. If not, you can mail
- away for one from that county but its a minor pain and it might
- take a while to get, the librarian at the desk has listings of where
- to write for this stuff and exactly how much it costs. Get the Birth
- cirtificate, its worth the extra money to get it certified
- because thats the only way some people will accept it for ID. When yur
- gettin this stuff the little forms ask for the reason you want it,
- instead of writing in "Fuck you", try putting in the word "Geneology".
- They get this all the time. If the Death certificate looks good for
- you, wait a day or so before getting the certified birth certificate
- in case they recognize someone wanting it for a dead guy.
- STEP 3
- Now your cookin! You got your start and the next part's easy.
- Crank out your old Dot matrix printer and run off some mailing labels
- addressed to you at some phony address. Take the time to check your
- phony address that there is such a place. Hotels that rent by the month
- or large apartment buildings are good, be sure to get the right zip
- code for the area. These are things that the cops might notice that
- will trip you up. Grab some old junk mail and paste your new lables
- on them. Now take them along with the birth certificate down to the library.
- Get a new library card. If they ask you if you had one before say that
- you really aren't sure because your family moved around alot when
- you were a kid. Most libraries will allow you to use letters as a form
- of ID when you get your card. If they want more give them a sob story
- about how you were mugged and got your wallet stolen with all your
- identification. Your card should be waiting for you in about two weeks.
- Most libraries ask for two forms of ID, one can be your trusty Birth
- Certificate, and they do allow letters addressed to you as a second
- form.
- STEP 4
- Now you got a start, it isn't perfect yet, so let's continue. You should
- have two forms of ID now. Throw away the old letters, or better yet
- stuff them inside the wallet you intend to use with this stuff.
- Go to the county courthouse and show them what nice ID you got and get
- a state ID card. Now you got a picture ID. This will take about two weeks
- and cost about $5, its well worth it.
- STEP 5
- If the death certificate had a social security number on it you can go
- out and buy one of those metal SS# cards that they sell.
- If it didn't, then you got all kinds of pretty ID that shows exactly
- who you are. If you don't yet have an SS#, Go down and apply for one,
- these are free but they could take five or six weeks to get,
- Bureaucrats you know... You can invent a SS# too if ya like, but the motto
- of 'THE WALKING GLITCH' has always been "Why not excellence?".
- STEP 6
- If you want to go whole hog you can now get a bank account in your new
- name. If you plan to do alot of traveling then you can put alot
- of money in the account and then say you lost the account book. After
- you get the new book you take out all the cash. They'll hit you
- with a slight charge and maybe tie-up your money some, but if you're
- ever broke in some small town that bank book will keep you from being
- thrown in jail as a vagrant.
- ALL DONE?
- So kiddies, you got ID for buying booze, but what else? In some towns
- (the larger the more likely) the cops if they catch you for something
- petty like shoplifting stuff under a certain dollar amount, will just
- give you a ticket, same thing for pissing in the street. Thats it!
- No fingerprints or nothing, just pay the fine (almost always over $100)
- or appear in court. Of course they run a radio check on your ID, you'll
- be clean and your alter-ego gets a blot on his record.
- Your free and clear. Thats worth the price of the trouble you've gone
- through right there. If your smart, you'll toss that ID away if this
- happens, or better yet, tear off your picture and give the ID to someone
- you don't like, maybe they'll get busted with it.
- If you're a working stiff, here's a way to stretch your dollar. Go to work
- for as long as it takes to get unemployment and then get yourself fired.
- Go to work under the other name while your getting the unemployment.
- With a couple of sets of ID, you can live like a king. These concepts
- for survival in the new age come to you compliments of THE WALKING GLITCH.
- First release of this phile 7/7/88.
- brought to you in the Cookbook courtesy of...
- ---------------The Jolly Roger
- ##########################################################################
- # #
- # The Remote Informer #
- # #
- #------------------------------------------------------------------------#
- # #
- # Editors: Tracker, Norman Bates, and Ye Cap'n #
- # #
- #========================================================================#
- # September 26, 1987 Issue: 02 #
- #========================================================================#
- ##########################################################################
- # #
- # Brought to you by the 'new' TUFF: The Underground Fone Federation #
- # #
- ##########################################################################
- ==========================================================================
- The News
- ==========================================================================
- Sprint Strikes Back | Celestial Elite/TUFF Come to an End
- ==============================|===========================================
- Sprint caught a guy dealing| Celestial Elite and TUFF, the famous
- codes on the street in LA|hack/phreak groups came to an end a couple
- this past week. Information|weeks ago. TUFF, however, is being reborn
- on this bust is limited at|and you can expect it to be back to full
- this time. |force within a month. Sources have it that
- A seventeen year old was|Magnus Adept, head of the now terminated
- busted in Arizona last week.|group, Celestial Elite, has started a new
- The name of the teenager will|group called Avalon Kingdom. We are unsure
- not be printed to protect him|what plans are in store for it.
- from harassment calls. | TUFF has several ideas and plans that
- |will be out to the public soon. Look for
- >This information was supplied|future issues of The Remote Informer (tm)
- by Phreaky Phone II |for new updates.
- ==========================================================================
- Beige Box Bust | TeleNet Hacker | Bate's Motel Moves
- ==============================|====================|======================
- One of our editors and a| Crusader released| Bate's Motel BBS,
- member of TUFF, Norman Bates|his TeleNet hacking|run by Norman Bates,
- was caught for Beige boxing|program on September|was forced to move. It
- that he had done over 3 months|20, 1987. Look for|is temporarily set up
- ago. The calls he had made|it on a good board|at (619)267-8619. It
- were inside his state and cost|you call. A review|will remain 1200 baud,
- a total of $12. He paid the|will be in the next|and a member of the
- bill and no charges were filed|issue of The Remote |TUFF Network. It is
- against him. |Informer. |open to the public.
- ==========================================================================
- Phreaky Phones Return: Amazing? | LDDS Buys Out TMC: Companies Merge
- =====================================|====================================
- The original Phreaky Phone numbers| LDDS bought out TMC last month.
- now support the new Phreaky Phones.|They merged into LDDS, since it was
- The guys running them had protested|bigger and more widespread. Any
- that the lines were being monitored.|companies that were subscribing to
- There is no way that could have been,|the TMC long distance service were
- and they contradicted themselves by|automatically coverted to LDDS. All
- restarting Phreaky Phones on the same|local TMC ports still work, but will
- numbers. They gave alot of credit|soon be disconnected. Refer to the
- to the people calling to suggest they|article on LDDS in this issue for
- believe a story like that. |more information on LDDS dial-ups.
- ==========================================================================
- US Sprint Calls Destinations | Pirate's Hollow Is Back With 10 Megs
- ==========================================================================
- US Sprint now calls all the| Pirate's Hollow is back on-line. It
- numbers called with unauthorized|now is run a 10 meg hard drive. Unlike
- codes. Their dis-advantage is|most boards that have #'s of megs, this
- that they are delayed by about|one will stress more attention on it's
- two months in calling because|database. The database is scheduled to
- they have to wait till people|be online by October 1st. This database
- report they did not make calls to|will contain 800+ text files on various
- the numbers they were billed for.|topics, with about 60% - 70% pertaining
- Best advice is to not call voice|to illegal activities. Unfortunately,
- with Sprint except to those who|Trax Xe is being redesigned, so until it
- have private lines other than|is finished, it will run on Carina. The
- their regular phone line. |number is (415)593-6784 (300/1200 baud).
- ==========================================================================
- Raggers and Braggers
- ==========================================================================
- This section is to make you aware of well-known raggers and braggers.
- Since this is the first time this section is being printed, we will tell
- you what classifies people as raggers and braggers. In the future issues
- the top raggers and braggers will be listed in this newsletter to let the
- SysOps know who not to let on their board, or to atleast keep an eye on.
- A ragger is someone who will put someone else down for something. The
- person might post a message asking a novice question about hacking and
- phreaking, or may say something that is completely wrong, and a ragger
- will put the other person down for he said, posted, etc. The ones that
- usually classify in this category are the ones that think they know it all
- and consider themselves right no matter what anyone says. Most of the
- users that use codes and consider themselves a master phreaker usually
- become raggers.
- A bragger is someone who either does or thinks he does know everything,
- and puts it upon himself to tell the whole world that he knows it all.
- This person is also one who thinks he is better than everyone else and
- he believes he is Elite, and no one else is. People who tend to do this
- are those who have, for some reason, become well-known in the underworld,
- and as a result become a bragger. Those usually not too well-known will
- not tend to brag as much as those who think everyone would love to be
- their friend and be like them.
- As a well-known ragger and bragger, The Toad, learned that it does not
- help to be one or both of those. He has since changed and is now easily
- accepted by most. Most people disliked him because others they knew had
- said something bad about him. This is called peer pressure and is a bad
- influence to those who are new to the underworld. I would suggest in the
- future, to not judge someone by what others say, but rather by how they
- act around/to you.
- The current most popular Atarian that classifies as a ragger and a
- bragger is Ace of Aces, and is well-hated by many users and SysOps, since
- he tends to put down anything anyone says and considers himself the best
- at writing hacking programs. He is commonly referred to as Ass of Asses
- and Ass of Assholes. Even holding an open mind about this guy, you would
- soon come to find that what others said coincides with what you see from
- him.
- ==========================================================================
- A New 950 has arrived!
- ==========================================================================
- LDDS, who as mentioned above bought out TMC, is installing a new 950
- port to most major cities. By the time you read this, it should be in
- almost every area that supports 950 ports. The number is 950-1450. This
- port will dial 976 numbers, but not 700, 800, or 900 numbers. The dialing
- method for LDDS is: 7 digit code, then even if the code is bad it will
- give you a dial tone. Then dial the area code plus the number. If you
- have a bad code it will simply say your call cannot be completed as it was
- dialed. There is a default code used on the system that currently works.
- The code is simply, 1234567. I have seen codes from 5 different companies
- and they all are in the format of 00xxxxx. I do not know what type of
- software they use, but I will know by the next issue exactly what they
- place on the bills. This could be the answer to alot of people's
- problems with fear of Sprint and ITT, especially AllNets. Just remember,
- Tracker is the one who found this, and all information about it. If
- someone is seen saying they found this, then they will be listed in the
- next issue which will contain an article on leeches.
- ==========================================================================
- Mailbox Systems
- ==========================================================================
- Mailbox systems are the link between information and the underworld. If
- you have ever called one, then you will know the advantages of having one,
- especially the ones that are open to whole underworld, rather than just a
- select few. There are two types of mailbox systems that are widely used.
- The first type we will talk about is the multiple mailbox systems, or
- commonly referred to as message systems. These systems have several
- mailboxes set up on one number. Usually, you can access other mailboxes
- from that number by pressing '*' or '#'. Sometimes you just enter the
- mailbox number and you are connected. These are the safest systems to use
- to protect information from US Sprint and other long distance companies.
- Since US Sprint and other companies call the destination numbers, it is
- safer to have 800 mailbox systems, and most of the time, the multiple
- mailbox systems are on 800 numbers. The passcode on these systems can
- vary in length and can be accessed by several different methods, so it is
- impossible to explain exactly how to hack these systems.
- The other type is the single mailbox system. These are usually set up
- in a reserved prefix in an area code. (Ex: 713-684-6xxx) These systems
- are usually controlled by the same type of hardware/software. To access
- the area where you enter the passcode, just hit '0' for a second or so.
- The passcodes are four (4) digits long. The only way to hack these is
- manually. The best thing you could do is to find one that does not have
- a recording from a person, but just the digitized voice. If you hack one
- that someone already owns, they will report it and it will not last as
- long.
- Here is a list mailboxes or prefixes to help you get started
- --------------------------------------------------------------------------
- Single Multiple Digits
- ------------ ------------ --------
- 213-281-8xxx 212-714-2770 3
- 213-285-8xxx 216-586-5000 4
- 213-515-2xxx 415-338-7000 Aspen Message System 3
- 214-733-5xxx 714-474-2033 Western Digital
- 214-855-6xxx 800-222-0651 Vincent and Elkins 4
- 214-978-2xxx 800-233-8488 3
- 215-949-2xxx 800-447-8477 Fairylink 7
- 312-450-8xxx 800-521-5344 3
- 313-768-1xxx 800-524-2133 RCA 4
- 405-557-8xxx 800-527-0027 TTE TeleMessager 6
- 602-230-4xxx 800-632-7777 Asynk 6
- 619-492-8xxx 800-645-7778 SoftCell Computers 4
- 713-684-6xxx 800-648-9675 Zoykon 4
- 800-847-0003 Communications World 3
- ==========================================================================
- The Disclaimer!
- ==========================================================================
- We, the editors, take no responsibility for your actions and use of
- the information in this newsletter. This newsletter is for informational
- purposes only. If you are easily offended by telecommunication
- discussions, then we suggest that you not read this newsletter. But for
- those who are truely interested in the information in this newsletter,
- enjoy it.
- ==========================================================================
- Coming in the next issue!
- ==========================================================================
- In the next issue, we will be open for suggestions from the readers
- of this issue. We will have some featured articles though, which include:
- 1) Study of bridges
- 2) Review of Crusader's new TeleNet Hacker
- 3) More information on the new LDDS 950 port
- 4) Review of Code Hackers for all modems
- 5) List of TeleNet addresses
- 6) Credit Card checkers
- 7) Ideas from the readers
- ==========================================================================
- Brought to you in the Cookbook by the Jolly Roger!!!!!!!!!!!!!!!
- ##############################################################################
- # _________________________________ #
- # /he Remote Informer Newsletter! #
- # #
- #----------------------------------------------------------------------------#
- # November TRI Issue: 03 #
- #----------------------------------------------------------------------------#
- # #
- # The Editors: Tracker, Ye Cap'n, Norman Bates, and The Reporter #
- # #
- ##############################################################################
- ==============================================================================
- = Introduction =
- ==============================================================================
- It's been a month now, and ALOT has happened. So much, in fact, that the
- information will be split into several issues. This should be no shock since
- I mentioned in the first issue that we may put several issues out sometimes.
- I want to congratulate the readers for finally contributing to the
- newsletter. This first two issues were all on information that I, myself,
- obtained. Several people gave me information for these issues, and their
- handle and information is included in the articles.
- ==============================================================================
- = In The News! =
- ==============================================================================
- ITT has 9 digits! | Phreaky Phones Go Down! |Information!
- ==============================================================================
- For those of you who did| The famed Phreaky Phones are down| We have
- not know this, ITT has nine|again. Modem Man, the original person|so much info
- digit codes. They are said|that started them, has said that they|to put out,
- to give better connections|will be down until further notice. In|that we are
- to some extent. This info.|the meantime, other independent boxes|putting out
- was originally given to us|are being started. A listing can be|many issues
- by Party Beast. |made of current ones on request. |at one time.
- =================================================================|If you want
- Magnus Adept Gets Busted | Sprint Codes Are Dying Fast! |all issues
- =================================================================|that are out
- Fellow Atarian and well-| Sprint codes are hard to get and|now, then
- known phreak Magnus Adept|when they are obtained, they tend to|call one of
- got caught by MCI. Details|die rather quickly. Phreakers have|the boards
- of the how, when, and where|been saying that the 950-0777 port|at the end
- are not known at this time.|is dead, but on the contrary, it is|of the issue
- He got caught with 150 codes|still available in states that are|or look for
- and may have to pay up to|not highly abused by phreaks. Here|an editor on
- 50 dollars for each code.|again, rumors are being spread. |a hack BBS.
- ==============================================================================
- = The Best BBS of the Month =
- ==============================================================================
- Starting from now on, we will have a BBS of the month. We will choose a
- BBS, ragardless of computer type, and look at the user participation in phreak
- related matters, as well as quality discussions on the various illegal topics.
- A BBS can remain the BBS of the month as long as they reside above the rest of
- the BBS systems. Even though we will sometimes bring out more than one issue
- in a month, the board will remain BBS of the month until the first issue inthe
- next month comes out.
- This month's BBS of the month is FBI PirateNet. We chose this board
- because of the large numbers of posts in the bases, and not only information,
- but discussions as well, with a minimum number of posts from raggers and
- braggers. The number for it is 516-661-7360. The SysOp of FBI PirateNet is
- The Phantom, not to be confused with an earlier narc.
- ==============================================================================
- = US Sprint Expected to Trim Staff, Consolidate Divisions =
- ==============================================================================
- New York -- US Sprint Communications Corp., the troubled long distance
- carrier, is expected to announce soon that it will cut its work force by
- several hundred people and reduce its seven regional divisions to 3 operating
- groups, sources familiar with the company said.
- The company's Pacific division is based in Burlingame, CA. The layoffs
- and reorganization are part of a plan by US Sprint's new president, Robert H.
- Snedaker, to reduce heavy operating losses, which analysts expect to reach
- more than $800 million this year.
- Snedaker replaced Charles M. Slibo, who was forced to resign in July
- because losses were running much higher than the parent companies had
- expected. Problems with the company's computerized billing system also
- contributed to Skibo's ouster. US Sprint is owned and operated by the GTE
- Corp. and United TeleCom.
- According to sources close to Snedaker, who was vice chairman and chief
- operating officer of United TeleCom, he is planning to consolidate the
- company's 7 divisions, which operate in the same geographical regions as the
- seven regional Bell operating companies, into 3 divisions.
- The rationale for the move, according to idustry analysts, is that the
- company will need a much smaller work force once it begins handling all it's
- phone traffic on it's new fiber optic network, which can carry a greater
- number of telephone calls at less cost. Company officials have said that
- they expect to have most of the traffic on the network by early next year.
- One source said that there would be more than one round of layoffs in the
- coming months and that the company ultimately plans to reduce its 14,000
- member work force by 15 percent.
- Several top managers are expected to resign as soon as US Sprint
- centralizes its marketing and support operations as its headquarters in Kansas
- City, MO., according to a report in the latest issue of Business Week
- magazine.
- A spokesman for US Sprint said on Friday that the company would not
- comment on the rumors. The company is the nation's third largest long
- distance company, after the American Telephone and Telegraph Co. (AT&T) and
- MCI Communications Co.
- Last year, Washington based MCI undertook a similar reorganization in
- which it posted a $502.5 million loss to write down old inventory and
- restructure operations.
- Analysts said that is US Sprint is to turn a profit, the company must
- increase its market share. "To do this, US Sprint must gain more large
- business customers, which account for about 80 percent of industry revenues,"
- said Robert B. Morris III, Securities in San Francisco.
- Morris said that by using a slick marketing campaign to differentiate its
- all-fiber telephone network from those of competitors, US Sprint more than
- doubled its customer base last year. But "most of these customers were
- residential and small business users that added little to Sprint's bottom
- line," he added. "If the company expects to be profitable, it will have to
- concentrate on providing the best service to volume users."
- ] This information was supplied by Ye Cap'n
- ==============================================================================
- = Secret Service Cracks Down on Teen Hackers =
- ==============================================================================
- Mount Lebanon, PA -- The US Secret Service and local police departments
- have put a scare into the hacker community with a nationwide crackdown on
- computer crime that has resulted in the arrests of teenage hackers in at least
- three cities.
- "People who monitor the bulletin boards say there are a lot of nervous
- hackers out there, wondering who will be arrested next," says Ronald E.
- Freedman, vice-president of Advanced Information Management, a Woodbridge, VA
- base computer security firm.
- Nine teenagers from Mount Lebanon Junior-Senior High School near
- Pittsburg, PA, were arrested recently and charged with computer fraud. The
- juveniles allegedly used home computers to gain illegal access to a credit
- card authorization center. They obtained valid credit card numbers and used
- them to purchase thousands of dollars worth of mail order merchandise, the
- police said.
- Freedman says it appears the hackers used some relatively sophisticated
- techniques in the scheme, including specially written software that enabled
- them to bypass security controls and navigate through credit records to obtain
- key information.
- Police officials say that the hackers also obtained access codes from
- pirate bulletin board systems to make free long distance calls and gain access
- to various business and government computers.
- The arrests were the result of a 6 week investigation by the Secret
- Service and the Mount Lebanon police. The police were tipped off by parents
- who were suspicious about how their son managed to obtain a skateboard valued
- at $140.
- The Secret Service was also involved in investigations that led to the
- arrests of several hackers in San Francisco and New York last July.
- Secret Service spokesman William Corbett says that although some reports
- have portrayed the hackers as part of a national crime ring, the cases are
- unrelated. "It's just that a few of these computers hacking cases came to a
- head at about the same time," he says.
- Federal Legislation enacted in 1984 gives the Secret Service, part of the
- Department of the Treasury, a major role in investigating computer crimes.
- Under the federal Computer Fraud and Abuse Act of 1986, computer fraud is a
- felony that carries a maximum penalty of 5 years for the first offense, and 10
- years for the second. Displaying unauthorized passwords on hacking bulletin
- boards carries a maximum penalty of 1 year in prison for the first offense,
- and 10 years for the second.
- ] This information was supplied by Ye Cap'n
- ==============================================================================
- = German Teens Crack NASA =
- ==============================================================================
- Washington, D.C. -- A group of West German teenagers from the Chaos
- Computer Club penetrated a NASA network recently, saying they were doing it to
- "test the security."
- What they got into was SPAN Net, a computer network with about 700 notes,
- which is actually based at the Goddard Space Center in Maryland. All that's
- in there is unclassified data, space science information, and post-flight data
- anaysis. "Anyone with NASA related research can apply for access to SPAN"
- says a spokesman, who adds that the network runs on DEC VAX hardware. "We
- picked up three attempts to gain access and put in security precautions so it
- would't happen." His personal opinion is, "We're happy that they couldn't get
- back in, and decided to go public." He also added that NASA has many other
- networks, many of the classified and "probably inpenetrable. But I do not
- want to challenge anybody."
- How'd they get in? Probably they got a West German NASA licensee, which
- gave them a visitor's pass, then they created new passwords with unlimited
- security for themselves, after which getting around the network was easy.
- ] Supplied by Ye Cap'n
- ==============================================================================
- We look for information in anyway related to the newsletter. If you have
- something of interests, or something that you saw on television, or in the
- newspaper, then upload it to one of the boards listed below. You will receive
- full credit.
- Pirate's Hollow..................................................(415)593-6784
- Bate's Motel.....................................................(619)267-0293
- ==============================================================================
- ##############################################################################
- # _________________________________ #
- # /he Remote Informer Newsletter! #
- # #
- #----------------------------------------------------------------------------#
- # November TRI Issue: 04 #
- #----------------------------------------------------------------------------#
- # #
- # The Editors: Tracker, Ye Cap'n, Norman Bates and The Reporter #
- # #
- ##############################################################################
- ==============================================================================
- = FCC Charges Much Ado About Not Much =
- ==============================================================================
- New Cannan, CT -- International Resource Develope of New Cannan, CT says
- that the market bubble for packet switch networks like TeleNet is going to
- burst by 1991, regardless of what the Federal Communications Commission does
- about access charges. Cheap fiber, which greatly increases the capacity, and
- ISDN services, which let you share a phone line with your computer, will do
- the business in, the report says. Over the next four years, however, the
- demand for packet switch services to will grow from $650 million to $1,612
- million (If the Baby Bells are allowed to add competition to the market, the
- $5/hour access charge cannot be passed though to the customers anyway).
- ] Supplied by Ye Cap'n
- ==============================================================================
- = Pirate's Hollow Update =
- ==============================================================================
- San Carlos, CA -- The Pirate's Hollow, one of the more popular BBS's in
- the Bay Area, is installing several new features that will even add to it's
- popularity. For one, users will be able to gamble against each other by
- betting on NFL games and participating in the Pirate's Hollow Lottery. Also,
- in order to support one of the best newsletters around, the Pirate's Hollow
- will soon be adding a seperate module that will act as an outpost for The
- Remote Informer. This module will feature the older issues of the newsletter,
- a section that will keep you abreast of updates of recently released
- information, and a section that will show what is upcoming in the next issues
- of The Remote Informer.
- The long-awaited database will soon be put online. Over 800 textfiles
- on a variety of subjects will be available to the users that pay the access
- fee that will be determined at a later date. Many more are on the way, and
- will be included at no charge. The charge will be a one time charge though,
- rather than a yearly payment.
- Another new option will be available by early December. PC Pursuit
- callback will be installed. This will allow people to call and then get
- called back if your area code is supported by PC Pursuit. This will also
- require a charge, to be set at a later date.
- The Pirate's Hollow has been doing well in its comeback to the
- telecommunications world, but we need more callers in order to formulate a
- more diverse user base. Please spread the BBS # around while also trying to
- make others aware of the newsletter.
- ==============================================================================
- = Switching Systems =
- ==============================================================================
- There are currently three different forms of switching systems that are
- present in the United States today. Step by Step (SxS), Crossbar, and the
- Electronic Switching System (ESS) make up the group. Phreaks have always been
- a little tenative when it comes to "doing their work" once they have heard
- about effects of switching systems on their hobby. After researching this
- topic, I have found that there really is not that much to be worried about.
- Read on, while I share with you information which I have compiled about all of
- these switching systems and their distinct features.
- The first switching system that was used in the country was called Step
- by Step. This was adopted in 1918 by Bell, and until 1978, they had over 53%
- of all their exchanges using Step by Step (SxS). This system is known for
- it's long, confusing train of switches that are used for its step by step
- switching.
- Step by Step has many disadvantages to phone users. The switch train
- becomes jammed fairly often, and it causes calls to be blocked. Also, SxS
- does not allow the use of DTMF dialing. This accounts for some of the areas in
- the United States that cannot have touch tone dialing abilities. A tremendous
- amount of electricity and maintenance needs to accompany the SxS switching
- system, which makes it even more impratical. All in all, this is probably the
- most archaic switching system around.
- There are a number of ways to see if you are on SxS. You will notice that
- there are no pulsing digits after dialing. Most sources say that the phone
- company will sound like many typewriters. SxS does not offer features such as
- speed calling, call forwarding, three-way calling, call waiting, and other
- such services. Pay phones on SxS also will want your money before you receive
- a dial tone. This adds to the list of disadvantages labelled to that of the
- Step by Step switching systems.
- Another type of switching system that is prevalent in the United States
- is Crossbar. Crossbar has been Bell's primary switcher after 1960, and three
- types of it exists. Number 1 Crossbar (1xB), Number 4 Crossbar (4xB), and the
- Number 5 Crossbar (5xB). In Crossbar, a switching matrix is used for all the
- phones in an area, and when someone calls, the route is determined and is met
- up with the other phone. This matrix is set-up in horizontal and vertical
- paths. Unlike other swichting systems, in my research, I could not come up
- with any true and definate distinguishing features of the Crossbar switching
- systems.
- The Electronic Switching System (ESS) is yet another switching system
- used in the United States and the most used of all three swicthing systems.
- ESS is an extremely advanced and multi-faced type of switching system, and is
- feared by marauders of the phone company everywhere. With ESS, your phone
- company is able to know every digit dialed (including mistakes), who you call,
- when you called, and how long you were connected. ESS is also programmed to
- print out the numbers of people who make excessive calls to WATS numbers (800
- services) or directory assistance. This feature of ESS is called 800
- Exceptional Calling Report, and has spelled the end of some forms of
- continuous code hacks to certain extenders. ESS can also be programmed to
- print logs of who called and abused certain numbers as well. Everything is
- kept track of in its records.
- The aforementioned facts show that ESS has made the jobs of organizations
- such as the FBI, NSA, and other phone company security forces easier. Tracing
- can be done in a matter of microseconds, and the result will be conveniently
- printed out on the monitor of a phone company officer. ESS is also programmed
- to pick up any "foreign tones" on the phone line such as the many varied tones
- emulated by boxes.
- ESS can be identified by a few features common in it. The 911 emergency
- service is covered in the later versions of ESS. Also, you are given the dial
- tone first when using a pay phone unlike that of SxS. Calling services like
- call forwarding, speed calling, and call waiting are also common to ESS. One
- other feature common to ESS is ANI (Automatic Number Identification) for long
- distance calls. As you can see, ESS is basically the zenith of all switching
- systems, and it will probably plague the entire country by the early 1990's.
- Soon after, we should be looking forward to a system called CLASS. This
- switching system will contain the feature of having the number of the person
- that is calling you printed out on your phone.
- What have I concluded about these switching systems? Well, they are not
- good enough. I know a few people employed by the phone company, and I know
- for a fact that they do not have enough time these days to worry about code
- users, especially in large, metropolitan areas. So, I will go out on a limb
- here, and say that a large portion of people will never have to worry about
- the horrors of ESS.
- ] Written by Ye Cap'n
- ==============================================================================
- = New Gizmo Can Change Voice Gender =
- ==============================================================================
- The most amazing device has turned up in the new Hammacher Schlemmer
- catalog: the telephone voice gender changer.
- What it does is change the pitch of your voice from, say, soprano to bass
- -- a most efficient way to dissuade an obscene phone caller just as he's
- getting warmed up.
- That is not the same as running a 45 r.p.m. record at 33. In digital
- conversion, the pitch can be changed without altering the speed.
- The device runs on a 9-volt batter and attaches to the telephone mouth
- piece with a rubber coupler that takes but a moment to slip on and off.
- With the changer switched on, says Lloyd Gray, a Hammacher Schlemmer
- technical expert, "the effect is similar to what you hear when they interview
- an anonymous woman on television and disguise her voice by deepening it."
- "It's better for changing a woman's voice to a man's than the other way
- around," Gray said. A man can use it to raise the pitch of his voice, but he
- still won't sound like a woman."
- A man could, however, use the changer to disguise his voice. But with the
- device set on high, Gray's voice still could be identified as his own. On low,
- his normal tenor became so gravel like that the words were unintelligible.
- ] Supplied by Tracker and The Reporter
- ==============================================================================
- We look for information in anyway related to the newsletter. If you have
- something of interests, or something that you saw on television, or in the
- newspaper, then upload it to one of the boards listed below. You will receive
- full credit.
- Pirate's Hollow..................................................(415)593-6784
- Bates Motel......................................................(619)267-0293
- ==============================================================================
- Brought to you by the Jolly Roger in the Cookbook!!!!!!!!!!!!!!!!!!
- ##############################################################################
- # _________________________________ #
- # /he Remote Informer Newsletter! #
- # #
- #----------------------------------------------------------------------------#
- # November TRI Issue: 05 #
- #----------------------------------------------------------------------------#
- # #
- # The Editors: Tracker, Ye Cap'n, Norman Bates, and The Reporter #
- # #
- ##############################################################################
- ==============================================================================
- = AT&T Rates =
- ==============================================================================
- WASHINGTON -- American Telephone & Telegraph Co. proposed Tuesday to
- lower its interstate long-distance rates by an average of 3.6 percent to
- reflect reduced costs in connecting to the local telephone network.
- The largest decrease -- 6.3 percent -- would be seen in day time prices
- "because of the need to make those rates more competitive," AT&T said.
- Rates for calls made during evening hours would drop 2.2 percent and
- calls made during the late night and weekends would be cut by 0.8 percent, the
- company said.
- The rate reductions would take effect Jan. 1, if they are approved by the
- Federal Communications Commission.
- Reacting to the proposed price cuts, MCI Communications Corp. and US
- Sprint Communications Co., the nation's second-largest and third-largest long
- distance companies respectively, said their response would depend on what the
- FCC finally approves but both said they intended to remain competitive with
- AT&T. AT&T, the nation's largest long-distance company, proposed to the FCC
- that its rates drop as much as $800 million, but AT&T said the exact amount
- will depend on the access charges the FCC allows the local telephone companies
- to collect from long distance carriers, which must pay the fees to hook into
- the phone local network.
- AT&T has challenged the new access rates filed by the regional Bell
- operating companies, contending they are more than $1 billion too high.
- In proposing its new rates, the long-distance leader told the FCC it
- expects local companies' access fees to fall by at least $200 million -- which
- would amount to an average rate reduction of less than 1 percent. But the
- company said it believes the FCC will order an additional $600 million in
- reductions based on AT&T's challenge.
- "We're confident the FCC will recognize that access charges filed by the
- local telephone companies need to be substantially reduced, which would mean
- more savings for our customers," said Larry Garfinkel, AT&T vice president for
- marketing.
- He said the company filed its proposed rates based on disputed charges
- because "we wanted to let the public react ... and further to let the FCC have
- full knowledge of where we were heading given our expectation that we had a
- valid basis for our dispute."
- AT&T's long-distance rates have fallen by about 34 percent since the
- company was stripped of its local operating companies by an antitrust decree
- nearly four years ago.
- Since then, phone rate payers have been paying a larger share of the costs
- of maintaining the local network through monthly subscriber line charges, now
- $2.60 for residential customers.
- That has reduced the long-distance companies' share of local network
- expenses, which they pay in the form of access charges.
- Jack Grubman, a telephone analyst with PaineWebber Inc., said AT&T's
- proposal targets business customers because "that's where the competition is
- and where the better (profit) margins are." In addition, it aims to keep the
- pressure on competition in international calling by extending discounts to
- more customers. Grubman added that, if the company's rate proposal is approved
- by the FCC, he would expect no further cuts in AT&T rates in 1988.
- Wendell Lind, AT&T administrator of rates and tariffs, said the cuts for
- business and residential customers are about the same because business cuts
- are offset by a proposed $128 million increase in AT&T's private line rates.
- AT&T is the only long-distance company whose rates are regulated by the
- FCC, but its prices set the pace for the industry. Though AT&T is far larger
- than any of its competitors, its market share has been declining since
- divestiture and the company now says it serves about 75 percent of the market.
- In addition to the reductions in basic long-distance rates, AT&T proposed
- cutting prices by 5 percent and 5.7 percent for its Pro-America calling plans.
- The company also proposed to reduce prices by 2.9 percent for its 800
- Service customers and 4.4 percent for WATS customers, although it would
- increase the monthly access line charges for those plans by $3.20 to reflect
- higher special access charges filed by the local phone companies.
- ] Supplied by Tracker and The Reporter
- ==============================================================================
- = US Sprint Operator Service Traffic Increases 40% =
- = New Center Added In Dallas =
- ==============================================================================
- ORLANDO, Fla. -- US Sprint Wednesday announced its long distance
- operators who began saying, "May I help you?" just five months ago, are now
- handling 3.5 million calls a month.
- The fiber-optic long-distance carrier, offering the only operator service
- alternative to AT&T has experienced a 40 percent growth in operator service
- calls since it announced its service July 1.
- Amanda Weathersby, US Sprint vice president of product marketing, said
- Tuesday, "More and more people are taking advantage of our call completion
- assistance and alternative billing arrangements.
- "Customer surcharges are the same as AT&T with the added benefit of US
- Sprint's fiber-optic quality and lower long-distance rates."
- US Sprint currently offers person-to-person, station-to-station, call
- completion and collect calling. US Sprint has announced an agreement with US
- WEST Service Link that will allow anyone to call on US Sprint and charge
- their calls to a Regional Bell Operating Co. calling card beginning in first
- quarter 1988.
- "Previously, our operator service was available only on pre-subscribed
- US Sprint phones and recently we added operator assistance for US Sprint FON
- CARD customers," Weathersby said.
- "With this new agreement, we'll be able to expand our operator service
- to markets such as pay phones, hospitals, and hotels/motels."
- The newest 24-hour operator service center in Dallas began operations on
- Oct. 5. US Sprint's other operator service centers are in: Cherry Hill,
- N.J.; Atlanta; Lombard, Ill. and Reno, Nev.
- US Sprint is a joint venture of United Telecommunications Inc. of Kansas
- City, Mo. and GTE Corp. of Stamford, Conn.
- ] Supplied by Tracker and The Reporter
- ==============================================================================
- = Pacific Bell Pursuing Calling Card Thief =
- ==============================================================================
- SAN FRANCISCO--(BW)--Pacific Bell is warning consumers to protect their
- telephone calling cards like any other credit card in the wake of a series of
- frauds by people posing as phone company employees.
- A Pacific Bell spokesman says customers in the 213, 805 and 916 area
- codes are being victimized by someone who says he is a telephone company
- employee investigating calling card fraud. The individual calls people at
- home at odd hours, asking for their calling card numbers. He then sells the
- numbers to people who use the numbers to make long distance phone calls.
- As recently as Monday of this week, 180 long distance calls were billed
- to a Sacramento area resident who had given his number to the thief just three
- hours earlier.
- According to Pacific Bell, this kind of scheme and other forms of calling
- card fraud cost telephone customers nationwide half a billion dollars a year.
- The company offered these tips to consumers to avoid becoming a victim of
- calling card fraud:
- Never give your calling card number or personal identification number to
- anyone. Any telephone company employee with a legitimate need to know the
- number has access to it.
- Treat your calling card like any other credit card. Report its loss
- immediately by calling the 800 number on the back of the card 800-621-0430.
- If you receive a suspicious call regarding your telephone calling card,
- report it by calling the 800 number on the back of the card.
- If you receive a call from someone claiming to be a telephone company
- employee and asking for your calling card number, ask for a name and number to
- call back. Then call the local Pacific Bell business office to report the
- incident.
- One suspect was arrested in Southern California last week by a quick
- thinking customer who did just that. Pacific Bell immediately contacted the
- local police department. A suspect holding seven stolen calling card numbers
- was arrested minutes later.
- Pacific Bell and long-distance telephone companies will credit customers
- for calling card charges determined to be fraudulent. Pacific Bell is a
- subsidiary of Pacific Telesis Group, a diversified telecommunications
- corporation based in San Francisco.
- ] Supplied by Tracker and The Reporter
- ==============================================================================
- We look for information in anyway related to the newsletter. If you have
- something of interests, or something that you saw on television, or in the
- newspaper, then upload it to one of the boards listed below. You will receive
- full credit.
- Pirate's Hollow..................................................(415)593-6784
- Bates Motel......................................................(619)267-0293
- ==============================================================================
- Brought to you in the Cookbook courtesy of the Jolly Roger!!!!!!!!!!!
- The Phreaker's Guide to Loop Lines courtesy of the Jolly Roger
- A loop is a wonderous device which the telephone company created as test
- numbers for telephone repairmen when testing equipment. By matching the
- tone of the equipment with the tone of the loop, repairmen can adjust and test
- the settings of their telephone equipment.
- A loop, basically, consists of two different telephone numbers. Let's
- use A and B as an example. Normally if you call A, you will hear a loud
- tone (this is a 1004 hz tone), and if you call B, the line will connect, and
- will be followed by silence.
- This is the format of a loop line. Now, if somebody calls A and someone
- else calls B--Viola!--A and B loop together, and one connection is made.
- Ma Bell did this so repairmen can communicate with each other without
- having to call their own repair office. They can also use them to exchange
- programs, like for ANA or Ringback. Also, many CO's have a "Loop Assignment
- Center". If anyone has any information on these centers please tell me.
- Anyway, that is how a loop is constructed. From this information,
- anyone can find an actual loop line. Going back to the A and B example,
- Note: the tone side and the silent side can be either A or B. Don't be fooled
- if the phone company decides to scramble them around to be cute.
- As you now know, loops come in pairs of numbers. Usually, right after each
- other.
- For example: 817-972-1890
- and
- 817-972-1891
- Or, to save space, one loop line can be written as 817-972-1890/1.
- This is not always true. Sometimes, the pattern is in the tens or hundreds,
- and, occaisionally, the numbers are random.
- In cities, usually the phone company has set aside a phone number suffix
- that loops will be used for. Many different prefixes will correspond
- with that one suffix.
- In Arlington, Texas, a popular suffix for loops is 1893 and 1894, and
- a lot of prefixes match with them to make the number.
- For Example: 817-460-1893/4
- 817-461-1893/4
- 817-465-1893/4
- 817-467-1893/4
- 817-469-1893/4
- ...are all loops...
- or a shorter way to write this is:
- 817-xxx-1893/4
- xxx= 460, 461, 465, 467, 469
- Note: You can mix-and-match a popular suffix with other prefixs in a
- city, and almost always find other loops or test numbers.
- Note: For Houston, the loop suffixes are 1499 and 1799. And for Detroit
- it's 9996 and 9997.
- When there are a large number of loops with the same prefix format,
- chances are that many loops will be inter-locked. Using the above example
- of Arlington loops again, (I will write the prefixes to save space) 460, 461,
- and 469 are interlocked loops. This means that only one side can be used at
- a given time. This is because they are all on the same circuit.
- To clarify, if 817-461-1893 is called, 817-460 and 469-1893 cannot be
- called because that circuit is being used. Essentialy, interlocked loops
- are all the same line, but there are a variety of telephone numbers to access
- the line.
- Also, if the operator is asked to break in on a busy loop line he/she
- will say that the circuit is overloaded, or something along those
- lines. This is because Ma Bell has taken the checking equipment off
- the line. However, there are still many rarely used loops which can
- be verfied and can have emergency calls taken on them.
- As you have found out, loops come in many types. Another type of loop is a
- filtered loop. These are loop lines that the tel co has put a filter on, so
- that normal human voices cannot be heard on either line. However, other
- frequencies may be heard. It all depends on what the tel co wants the
- loop to be used for. If a loop has gotten to be very popular with the
- local population or used frequently for conferences, etc. the tel co may filter
- the loop to stop the unwanted "traffic". Usually, the filter will be
- removed after a few months, though.
- ----------------Brought to you by the Jolly Roger
- How Ma Bell Works by the Jolly Roger
- In this article, I will first describe the termination,
- wiring, and terminal hardware most commonly used in the Bell
- system, and I will include section on methods of using them.
- -------------
- LOCAL NETWORK
- -------------
- The local telephone network between the central
- office/exchange and the telephone subscribers can be briefly
- described as follows:
- From the central office (or local exchange) of a certain
- prefix(es), underground area trunks go to each area that has that
- prefix (Usually more than one prefix per area.) At every few
- streets or tract areas, the underground cables surface. They then
- go to the telephone pole (or back underground, depending on the
- area) and then to the subsribers house (or in the case of an
- apartment building or mutliline business, to a splitter or dis-
- tribution box/panel).
- Now that we have the basics, I'll try and go in-depth on the
- subject.
- ------------------
- UNDERGROUND CABLES
- ------------------
- These are sometimes inter-office trunks, but usually in a
- residential area they are trunk lines that go to bridging heads
- or distribution cases. The cables are about 2-3 inches thick
- (varies), and are either in a metal or pvc-type pipe (or
- similiar). Rarely (maybe not in some remote rural areas) are the
- cables just 'alone' in the ground. Instead they are usually in
- an underground cement tunnel (resembles a small sewer or storm-
- drain.) The manholes are >heavy< and will say 'Bell system' on
- them. they can be opened with a 1/2 inch wide crowbar (Hookside)
- inserted in the top rectangular hole. There are ladder rungs to
- help you climb down. You will see the cable pipes on the wall,
- with the blue and white striped one being the inter-office trunk
- (at least in my area). The others are local lines, and are
- usually marked or color coded. There is almost always a posted
- color code chart on the wall, not to mention Telco manuals de-
- scribing the cables and terminals, so I need not get into detail.
- Also, there is usually some kind of test equipment, and often
- Bell test sets are left in there.
- --------------
- BRIDGING HEADS
- --------------
- The innocent-looking grayish-green boxes. These can be
- either trunk bridges or bridging for residences. The major trunk
- bridging heads are usually larger, and they have the 'Western
- Electric' logo at the bottom, whereas the normal bridging heads
- (which may be different in some areas-depending on the company
- you are served by. GTE B.H.'s look slightly different. Also, do
- not be fooled by sprinkler boxes!) They can be found in just
- about every city.
- To open a bridging head: if it is locked (and you're feeling
- destructive), put a hammer or crowbar (the same one you used on
- the manhole) in the slot above the top hinge of the right door.
- Pull hard, and the door will rip off. Very effective! If it isn't
- locked (as usual), take a 7/8 inch hex socket and with it, turn
- the bolt about 1/8 of a turn to the right (you should hear a
- spring release inside). Holding the bolt, turn the handle all the
- way to the left and pull out.
- To Check for a test-set (which are often left by Bell employees),
- go inside - First check for a test-set (which are often left
- by Bell employees). There should be a panel of terminals and
- wires. Push the panel back about an inch or so, and rotate the
- top latch (round with a flat section) downward. Release the
- panel and it will fall all the way forward. There is usually a
- large amount of wire and extra terminals. The test-sets are
- often hidden here, so don't overlook it (Manuals, as well, are
- sometimes placed in the head). On the right door is a metal box
- of alligator clips. Take a few (Compliments of Bell.). On each
- door is a useful little round metal device. (Says 'insert gently'
- or' clamp gently - do not overtighten' etc..) On the front of
- the disc, you should find two terminals. These are for your test
- set. (If you dont have one, dont despair -I'll show you ways to
- make basic test sets later in this article).
- Hook the ring (-) wire to the 'r' terminal; and the tip (+)
- wire to the other. (By the way, an easy way to determine the
- correct polarity is with a 1.5v LED. Tap it to the term. pair,
- if it doesnt light, switch the poles until it does. When it
- lights,find the longer of the two LED poles: This one will be on
- the tip wire (+). Behind the disc is a coiled up cord. This
- should have two alligator clips on it.. Its very useful, because
- you dont have to keep connecting and disconnecting the fone (test
- set) itself, and the clips work nicely.
- On the terminal board, there should be about 10 screw
- terminals per side. Follow the wires, and you can see which
- cable pairs are active. Hook the clips to the terminal pair, and
- you're set! Dial out if you want, or just listen (If someone's
- on theline). Later, I'll show you a way to set up a true 'tap'
- that will let the person dial out on his line and receive calls
- as normal, and you can listen in the whole time. More about this
- later...
- On major prefix-area bridging heads, you can see 'local
- loops' ,which are two cable pairs (cable pair = ring+tip, a fone
- line) that are directly connected to each other on the terminal
- board. These 'cheap loops' as they are called, do not work
- nearLy as well as the existing ones set up in the switching
- hardware at the exchange office. (Try scanning your prefixes'
- 00xx to 99xx #'s.) The tone sides will announce themselves with
- the 1008 hz loop tone, and the hang side will give no response.
- The first person should dial the 'hang' side, and the other
- person dial the tone side, and the tone should stop if you have
- got the right loop.)
- If you want to find the number of the line that you're on,
- you can either try to decipher the 'bridging log' (or whatever),
- which is on the left door. If that doesnt work, you can use the
- follwing:
- ---------------------------
- ANI # (Automatic Number ID)
- ---------------------------
- This is a Telco test number that reports to you the number
- that youre calling from (It's the same, choppy 'Bell bitch' voice
- that you get when you reach a disconnected #)
- For the 213 NPA - Dial 1223
- 408 NPA - Dial 760
- 914 NPA - Dial 990
- These are extremely useful when messing with any kind of line
- terminals, house boxes, etc.
- Now that we have bridging heads wired, we can go on... (don't
- forget to close and latch the box after all... Wouldnt want GE
- and Telco people mad, now, would we?)
- -------------------------------------
- "CANS" - Telephone Distribution Boxes
- -------------------------------------
- Basically, two types:
- 1> Large, rectangular silver box at the end of each street.
- 2> Black, round, or rectangular thing at every telephone pole.
- Type 1 - This is the case that takes the underground cable from
- the bridge and runs it to the telephone pole cable (The lowest,
- largest one on the telephone pole.) The box is always on the
- pole nearest the briging head, where the line comes up. Look for
- the 'Call before you Dig - Underground cable' stickers..
- The case box is hinged, so if you want to climb the pole,
- you can open it with no problems. These usually have 2 rows of
- terminal sets.
- You could try to impersonate a Telco technician and report
- the number as 'new active' (giving a fake name and fake report,
- etc.) I dont recommend this, and it probably won't (almost
- positively won't) work, but this is basically what Telco linemen
- do).
- Type 2 - This is the splitter box for the group of houses around
- the pole (Usually 4 or 5 houses). Use it like I mentioned
- before. The terminals (8 or so) will be in 2 horizontal rows of
- sets. The extra wires that are just 'hanging there' are
- provisions for extra lines to residences (1 extra line per house,
- thats why the insane charge for line #3!) If its the box for
- your house also, have fun and swap lines with your neighbor!
- 'Piggyback' them and wreak havoc on the neighborhood (It's
- eavesdropping time...) Again, I don't recommend this, and its
- difficult to do it correctly. Moving right along...
- ------------------------------
- APARTMENT / BUSINESS MULTILINE
- DISTRIBUTION BOXES
- ------------------------------
- Found outside the buliding (most often on the right side,
- but not always... Just follow the wire from the telephone pole)
- or in the basement. It has a terminal for all the lines in the
- building. Use it just like any other termination box as before.
- Usually says 'Bell system' or similar. Has up to 20 terminals on
- it (usually.) the middle ones are grounds (forget these). The
- wires come from the cable to one row (usually the left one), with
- the other row of terminals for the other row of terminals for the
- building fone wire pairs. The ring (-) wire is usually the top
- terminal if the set in the row (1 of 10 or more), and the tip is
- in the clamp/screw below it. This can be reversed, but the cable
- pair is always terminated one-on-top-of-each- other, not on the
- one next to it. (I'm not sure why the other one is there,
- probably as aprovision for extra lines) Don't use it though, it
- is usually to close to the other terminals, and in my experiences
- you get a noisy connection.
- Final note: Almost every apartment, business, hotel, or anywhere
- there is more than 2 lines this termination lines this
- termination method is used. If you can master this type, you can
- be in control of many things... Look around in your area for a
- building that uses this type, and practice hooking up to the
- line, etc.
- As an added help,here is the basic 'standard' color-code for
- multiline terminals/wiring/etc...
- Single line: Red = Ring
- Green = Tip
- Yellow = Ground *
- * (Connected to the ringer coil in individual and bridged
- ringer phones (Bell only) Usually connected to the green
- (Tip)
- Ring (-) = Red
- White/Red Stripe
- Brown
- White/Orange Stripe
- Black/Yellow Stripe
- Tip (+) = Green (Sometimes
- yellow, see above.)
- White/Green Stripe
- White/Blue Stripe
- Blue
- Black/White Stripe
- Ground = Black
- Yellow
- ----------------------
- RESIDENCE TERMINAL BOX
- ----------------------
- Small, gray (can be either a rubber (Pacific Telephone) or hard
- plastic (AT & T) housing deal that connects the cable pair from
- the splitter box (See type 2, above) on the pole to your house
- wiring. Only 2 (or 4, the 2 top terminals are hooked in parallel
- with the same line) terminals, and is very easy to use. This can
- be used to add more lines to your house or add an external line
- outside the house.
- ---------
- TEST SETS
- ---------
- Well, now you can consider yourself a minor expert on the
- terminals and wiring of the local telephone network. Now you can
- apply it to whatever you want to do.. Here's another helpful
- item:
- How to make a Basic Test-Set and how to use it to dial out,
- eavsdrop, or seriously tap and record line activity.
- These are the (usually) orange hand set fones used by Telco
- technicians to test lines. To make a very simple one, take any
- Bell (or other, but I recommend a good Bell fone like a princess
- or a trimline. gte flip fones work excllently, though..) fone and
- follow the instructions below.
- Note: A 'black box' type fone mod will let you tap into their
- line, and with the box o, it's as if you werent there. they can
- recieve calls and dial out, and you can be listening the whole
- time! very useful. With the box off, you have a normal fone test
- set.
- Instructions:
- A basic black box works well with good results. Take the cover
- off the fone to expose the network box (Bell type fones only).
- The <RR> terminal should have a green wire going to it (orange or
- different if touch tone - doesnt matter, its the same thing).
- Disconnect the wire and connect it to one pole of an SPST switch.
- Connect a piece of wire to the other pole of the switch and
- connect it to the <RR> terminal. Now take a 10k hm 1/2 watt 10%
- resistor and put it between the <RR> terminal ad the <F>
- terminal, which should have a blue and a white wire going to it
- (different for touch tone). It should look like this:
- -----Blue wire----------<F>
- !
- ----White wire-----!
- !
- 10k Resistor
- !
- !
- --Green wire-- !----<RR>
- ! !
- SPST
- What this does in effect is keep the hookswitch / dial pulse
- switch (F to RR loop) open while holding the line high with the
- resistor. This gives the same voltage effect as if the fone was
- 'on-hook', while the 10k ohms holds the voltage right above the
- 'off hook' threshold (around 22 volts or so, as compared to 15-17
- or normal off hook 48 volts for normal 'on-hook'), giving
- Test Set Version 2.
- Another design is similar to the 'type 1' test set (above),
- but has some added features:
- From >----------------Tip------<To Test
- Alligator set
- Clip >----------------Ring-----<phone
- ! !
- x !
- ! !
- o !
- ! x---RRRRR---!
- ! x !
- !---x !
- x----0------!
- x = Spst Switch
- o = Red LOD 0 = Green LED
- RRRRR= 1.8k 1/2 watt xxxx= Dpst switch
- resistor
- When the SPST switch in on, the LED will light, and the fone
- will become active. The green light should be on. If it isn't,
- switch the dpst. If it still isnt, check the polarity of the
- line and the LEDs. With both lights on, hang up the fone. They
- should all be off now. Now flip the dpst and pick up the fone.
- The red LED shold be on, but the green shouldnt. If it is,
- something is wrong with the circuit. You wont get a dial tone if
- all is correct.
- When you hook up to the line with the alligator clips
- (Assuming you have put this circuit inside our fona and have put
- alligator clips on the ring and tip wires (As we did before)) you
- should have the spst #1 in the off posistion. This will greatly
- reduce the static noise involved in hooking up to a line. The red
- LED can also be used to check if you have the correct polarity.
- With this fone you will have the ability to listen in on
- >all< audible line activity, and the people (the 'eavesdropees')
- can use their fone as normal.
- Note that test sets #1 and #2 have true 'black boxes', and can be
- used for free calls (see an article about black boxes).
- Test Set Version 3
- To do test set 3:
- Using a trimline (or similar) phone, remove the base and cut
- all of the wire leads off except for the red (ring -) and the
- green (tip +). Solder alligator clips to the lug. The wire
- itself is 'tinsel' wrapped in rayon, and doesnt solder well.
- Inside the one handset, remove the light socket (if it has one)
- and install a small slide or toggle switch (Radio Shack's micro-
- miniature spst works well). Locate the connection of the ring
- and the tip wires on the pc board near where the jack is located
- at the bottom of the handset. (The wires are sometimes black or
- brow instead of red and green, respectively). Cut the foil and
- run 2 pieces of wire to your switch. In parallel with the switch
- add a .25 uf 200 VDC capacitor (mylar, silvered mica, ceramic,
- not an electrolytic). When the switch is closed, the handset
- functions normally. With the switch in the other position, you
- can listen without being heard.
- Note: To reduce the noise involved in connecting the clips to a
- line, add a switch selectable 1000 ohm 1/2 watt resistor in
- series with the tip wire. Flip it in circuit when connecting, and
- once on the line, flip it off again. (or just use the 'line disc-
- onect' type switch as in the type 2 test set (above)). Also
- avoid touching the alligator clips to any metal parts or other
- terminals, for i causes static on the line and raises poeple's
- suspicions.
- ---------
- RECORDING
- ---------
- If you would like to record any activity, use test set 1 or
- 2 above (for unattended recording of >all< line activity), or
- just any test set if you are going to be there to monitor when
- they are dialing, talking, etc.
- Place a telephone pickup coil (I recommend the Becoton T-5 TP
- coil or equivalent) onto the test set, and put the TP plug into
- the mic. jack of any standard tape recorder. Hit play, rec, and
- pause. Alternate pause when you want to record (I dont think
- anyone should have any difficulty with this at all...)
- Well, if you still can't make a test set or you dont have the
- parts, there's still hope. Alternate methods:
- 1> Find a bell test set in a manhole or a bridging head and
- 'Borrow it indefinately...
- 2> Test sets can be purchased from:
- Techni-Tool
- 5 Apollo Road
- Box 368
- Plymouth Meeting PA., 19462
- Ask for catalog #28
- They are usually $300 - $600, and are supposed to have MF
- dialing capability as well as TT dialing. They are also of much
- higher quality than the standard bell test sets.
- If you would like to learn more about the subjects covered here,
- I suggest:
- 1> Follow Bell trucks and linemen or technicians and ask subtle
- questions. also try 611 (repair service) and ask questions..
- 2> Explore your area for any Bell hardware, and experiment with
- it. Don't try something if you are not sure what youre doing,
- because you wouldnt want to cause problems, would you?
- ------------------Jolly Roger
- Getting Money out of Pay Phones by the Jolly Roger
- I will now share with you my experiences with pay telephones. You will discover
- that it is possible to get money from a pay phone with a minimum of effort.
- Theory: Most pay phones use four wires for the transmission of data and
- codes to the central office. Two of them are used for voice (usually red and
- green), one is a ground, and the last is used with the others for the
- transmission of codes.
- It is with this last wire that you will be working with. On the pay phone that
- I usually did this to, it was colored purple, but most likely will be another
- color.
- What you will do is simply find a pay phone which has exposed wires, such that
- one of them can be disconnected and connected at ease without
- fear of discovery. You will discover that it is usually a good idea to
- have some electrical tape along with you and some tool for cutting this
- tape.
- Through trial and error, you will disconnect one wire at a time starting with
- the wires different than green and red. You do want a dial tone during
- this operation.
- What you want to disconnect is the wire supplying the codes to the telephone
- company so that the pay phone will not get the 'busy' or 'hang-up' command.
- Leave this wire disconnected when you discover it.
- What will happen: Anytime that someone puts any amount of money into the pay
- phone, the deposit will not register with the phone company and it
- will be held in the 'temporary' chamber of the pay phone.
- Then, (a day later or so) you just code back to the phone, reconnect the wire,
- and click the hook a few times and the phone will dump it all out the shute.
- (What is happening is that the 'hangup' code that the phone was not
- receiving due to the wire being disconnected suddenly gets the code and
- dumps its' 'temporary' storage spot.)
- You can make a nice amount of money this way, but remember
- that a repairman will stop by every few times it is reported broken and
- repair it, so check it at least once a day.
- Enjoy and have fun.. Many phones I have done this to, and it works
- well with each..
- --------------------Jolly Roger
- Computer Based PBX Courtesy of the Jolly Roger
- (Originally an Apple ][ file for forgive the upper case!)
- TO GET A BETTER UNDERSTANDING OF WHAT A PBX CAN DO, HERE ARE A FEW BASIC
- FUNDAMENTALS.THE MODERN PBX IS A COMBINED COMPUTER,MASS STORAGE DEVICE,
- AND OF COURSE A SWITCHING SYSTEM THAT CAN:
- [1] PRODUCE ITEMIZED,AUTOMATED BILLING PROCEDURES,TO ALLOW THE
- IDENTIFICATION AND MANAGEMENT OF TOLL CALLS. [HAHAHA]
- [2] COMBINE DAYTIME VOICE GRADE COMMUNICATION CIRCUITS INTO
- WIDEBAND DATA CHANNELS FOR NIGHT TIME HIGH SPEED DATA
- TRANSFERS.
- [3] HANDLES ELECTRONIC MAIL [ INCLUDING OFFICE MEMOS ].
- [4] COMBINE VOICE CHANNELS INTO A WIDEBAND AUDIO/VISUAL
- CONFERENCE CIRCUIT,WITH THE ABILITY TO XFER AND
- CAPTURE SLIDES,FLIPCHARTS,PICTURES OF ANY KIND.
- BOTH THE EXTERNAL AND INTERNAL CALLING CAPACITY OF THE PBX SYSTEM MUST BE
- CAREFULLY CONSIDERED BECAUSE MANY BUSINESS OPERATIONS RUN A VERY HIGH RATIO
- OF INTERNAL STATION TO STATION DIALING AND A LOW CAPACITY SYSTEM WILL NOT
- HANDLE THE REQUESTED TRAFFIC LOAD.
- A CRITICAL FACTOR IS THE NUMBER OF TRUNKS AND THE CENTRAL OFFICE FACILITIES
- THAT ARE USED FOR OUTSIDE CONNECTIONS.ANOTHER IS THE NUMBER OF JUNCTIONS OR
- [LINKS] THAT MAKE UP THE INTERNAL CALLING PATHS.
- TO UNDERSTAND THE SERVICES AVAILABLE ON A TYPICAL COMPUTER RUN PBX IT IS
- NECESSARY TO INTRODUCE THE SUBJECT OF TIME DIVISION SWITCHING.IN A TIME
- DIVISION SWITCHING NETWORK ALL CONNECTIONS ARE MADE VIA A SINGLE COMMON BUS
- CALLED (OF COURSE) A 'TIME-DIVISION BUS'.EVERY LINE TRUNK THAT REQUIRES A
- CONNECTION WITH ANOTHER IS PROVIDED WITH A PORT CIRCUIT.ALL PORT CIRCUITS
- HAVE ACCESS TO THE TIME DIVISION BUS THROUGH A TIME DIVISION SWITCH.
- [WHEN TWO PORTS REQUKRE CONNECTION,THEIR TIME DIVISION SWITCHES OPERATE AT
- A VERY HIGH FREQUENCY (16,000 TIMES PER SECOND).THIS TECHNIQUE,WHICH IS
- CALLED 'SPEECH SAMPLING',ALLOWS MANY SIMULTANEOUS CONNECTIONS OVER THE SAME
- TIME DIVKSION BUS.EACH CONNECTION IS ASSIGNED A TIME INTERVAL,THE 'TIME SLOT'
- ,AND THE NUMBER OF TIME SLOTS IDENTIFIES THE NUMBER OF SIMULTANEOUS CONNECT-
- IONS AMONG PORTS.]
- THE NEXT CRITICAL ITEM IS CIRCUIT PACKS.THE SYSTEM ELEMENTS THAT WE WILL BE
- DESCRIBING IN FUTURE TUTORIALS [LINES/TRUNKS/SWITCHES,MEMORY AND CONTROL] ARE
- CONTAINED ON PLUG IN CIRCUIT PACKS.EACH LINE CIRCUIT PACK CONTAINS A NUMBER
- OF LINES,IN EXAMPLE,FOUR.BUT THE ASSIGNMENT OF STATION NUMBERS TO ACTUAL
- PHONE LINE CIRCUITS IS FLEXIBLE.
- THE SYSTEM MEMORY IS CONTAINED IN CIRCUIT PACKS WHICH PROVIDE THE CALL
- PROCESSING FUNCTIONS.THE CIRCUIT PACKS ARE HELD IN SMALL FRAMES CALLED
- 'CARRIERS'.WITHIN EACH CARRIER,THE CIRCUIT PACKS ARE PLUGGED INTO POSITIONS:
- THE 'SLOTS'.EVERY CIRCUIT CAN BE ADDRESSED BY,SAY A FIVE DIGIT NUMBER WHICH
- TELLS ITS LOCATION BY CARRIER-SLOT-CIRCUIT.... [STARTING TO GET THE IDEA?]
- THERE CAN BE THREE TYPES OF CARRIERS IN A MODERN PBX SYSTEM:
- O LINE CARRIERS
- O TRUNK CARRIERS
- O CONTROL CARRIERS
- THE LINE CARRIERS CONTAIN STATION LINES.IN A.T.& T.'S "DIMENSION" MODEL,FOR
- EXAMPLE,A TOTAL OF 52 TO 64 LINES ARE PROVIDED.THE TRUNK CARRIERS CONTAIN
- SLOTS FOR 16 TRUNK CIRCUIT PACKS.THE CONTROL CARRIER INCLUDES PROCESSOR,
- MEMORY,CONTROL CIRCUITRY,DATA CHANNELS FOR ATTENDANT CONSOLE CONTROL AND
- TRAFFIC MEASUREMENT OUTPUTS.
- PBX SYSTEMS WILL DIRECTLY REFLECT THE TYPES OF SERVICES OFFERED AT THE C.O.
- O CCSA
- O CCIS
- O PICTUREPHONES [SOONER THAN YOU THINK MY PHRIENDS]
- COMMON CONTROL SWITCHING ARRANGEMENTS ( CCSA ) PERMIT ANY UNRESTRICTED TELE-
- PHONE STATION TO CALL ANY OTHET INTERNAL OR EXTERNAL SYSTEM STATION BY USING
- THE STANDARD SEVEN DIGIT NUMBER.ALTERNATE ROUTING IS A FEATURE OF CCSA SERVICE
- THE INTERFACILITY,ALTERNATE ROUTED CALLING PATHS ARE ACCOMPLISHED AT THE TELE-
- PHONE COMPANY CENTRAL OFFICE LEVEL,NOT AT THE PBX LEVEL.
- A SYSTEM OF INTEREST TO LARGE SCALE TELEPHONE USERS IS COMMON CHANNEL INTER-
- OFFICE SIGNALLING (CCIS).TYPICALLY,THIS TECHNIQUE EMPLOYS COMMON CHANNELS TO
- CARRY ALL INTERFACILITY SIGNALLING INSTRUCTIONS: DIAL PULSES,ON HOOK (IDLE),
- OFF HOOK (BUSY),AND SO ON,BETWEEN TWO SWITCHING CENTERS. [ GETTING WARM ].
- CCIS REPLACES OLDER METHODS OF INTEROFFICE SIGNALLING SUCH AS 'IN BAND' AND
- 'OUT OF BAND' TECHNIQUES. BY THE WAY,REAL PHREAKS ARE SELLING THEIR BOXES TO
- IDIOTS WHO STILL THINK THE'RE WORTH ALOT...THE FORMER (IN BAND) TRANSMITS
- SIGNALLING DATA WITHIN THE NORMAL CONVERSATION BANDWIDTH.IT'S SHORTCOMING IS
- THAT FALSE INFORMATION MAY BE TRANSMITTED DUE TO UNIQUE TONE OR NOISE
- COMBINATIONS SET UP IN THE TALKING PATH. [THIS IS THE OFFICIAL REASONING].
- OUT OF BAND SIGNALLING TECHNIQUES PLACED THE INTEROFFICE DATA IN SPECIAL
- CHANNELS,GENERALLY ADJACENT TO AND IMMEDIATELY ABOVE THE VOICE PATH.TO PRE-
- SERVE INTERCHANNEL INTEGRITY,OUT OF BAND SIGNALLING REQUIRES VERY EFFECIENT
- FILTERING OR GREATER 'BAND GUARD' SEPERATION BETWEEN CHANNELS.
- Brought to you in the Cookbook courtesy of the Jolly Roger!!!!!!!!!!!!
- Subject: PC-Pursuit Port Statistic's
- Date: 06/29/89
- Written by: PC-Pursuit Users
- ============================================================
- Introduction:
- =============
- The last 30 days of PC-Pursuit have been extremely
- controversial. Users and ex-users have demanded accurate
- statistics, and Telenet has provided us with very little.
- And the data that was provided is questionable. Well, here
- is some data that is guaranteed to be accurate and make
- Telenet scream. If you wish to update this data on your own,
- we will tell you how later in this text.
- The following chart consists of all the direct Telenet
- addresses of the PC-Pursuit city nodes and the total number
- of modems on each node. Here is what the data means:
- NJNEW/3 2011 .12 56
- ! ! ! ! \-- Total Number of Modems in NJNEW
- ! ! ! \- Last Working Suffix of Address sequence.
- ! ! \- Direct Telenet Address Prefix.
- ! \--- Baud Rate of This Port is 300.
- \--------- Mnemonic.
- Please note that there are several perfectly legal ways to
- connect to a PC-Pursuit port such as NJNEW/3:
- Ways To Connect to NJNEW/3:
- 1) C D/NJNEW/3,PCP10000,<password> [HUNT]
- 2) C 2011,PCP10000,<password> [HUNT]
- 3) C 2011.10,PCP10000,<password> [NON HUNT]
- The first, is self explanatory. The second does the same
- thing as the first, only that it is slightly faster and gives
- the user much greater flexibility. The third is an example
- the flexibility, because a request is made to connect to the
- tenth, and only the tenth, modem on the NJNEW/3 port.
- By simply attempting to connect to every single modem
- in the 2011 chain, we were able to count the number of modems
- on each port and come up with the following charts which were
- extracted on June the twenty ninth of the year 1989:
- Rotary Direct Max. City Rotary Direct Max. City
- Port Address Range Total Port Address Range Total
- -------- ------- --- ----- -------- ------- --- -----
- NJNEW/3 2011 .12 56 CAOAK/3 4155 . 4 16
- /12 201301 .40 /12 415216 . 8
- /24 20122 . 4 /24 41511 . 4
- DCWAS/3 202115 . 6 46 CAPAL/3 415106 . 4 12
- /12 202116 .24 /12 415224 . 8
- /24 202117 .16 /24 <NONE> <NONE>
- CTHAR/3 <NONE> <NONE> 8 CASFA/3 415215 . 6 20
- /12 203120 . 8 /12 415217 .10
- /24 <NONE> <NONE> /24 41523 . 4
- WASEA/3 20617 . 4 30 ORPOR/3 50320 . 2 8
- /12 20619 .22 /12 50321 . 6
- /24 20621 . 4 /24 <NONE> <NONE>
- NYNYO/3 212315 . 4 22 AZPHO/3 60222 . 4 20
- /12 212316 .14 /12 60223 .12
- /24 21228 . 4 /24 60226 . 4
- CALAN/3 213412 . 8 40 MNMIN/3 612120 . 4 22
- /12 213413 .28 /12 612121 .14
- /24 21323 . 4 /24 61222 . 4
- TXDAL/3 214117 . 6 30 MABOS/3 617311 . 4 32
- /12 214118 .22 /12 617313 .20
- /24 21422 . 4 /24 61726 . 8
- PAPHI/3 215112 . 6 36 TXHOU/3 713113 . 8 42
- /12 2155 .22 /12 713114 .24
- /24 21522 . 8 /24 71324 .10
- OHCLE/3 21620 . 4 26 CACOL/3 71423 . 4 18
- /12 21621 .18 /12 7144 .10
- /24 216120 . 4 /24 71424 . 4
- CODEN/3 303114 . 4 40 CASAN/3 714119 . 4 20
- /12 303115 .18 /12 714213 .12
- /24 30321 .22 /24 714124 . 4
- FLMIA/3 305120 . 6 28 CASDI/3 714102 . 4 22
- /12 305121 .18 (619)/12 714210 .14
- /24 305122 . 4 /24 714121 . 4
- ILCHI/3 312410 . 8 40 UTSLC/3 80120 . 4 22
- /12 312411 .28 /12 80121 .14
- /24 31224 . 4 /24 80112 . 4
- MIDET/3 313214 . 6 30 FLTAM/3 81320 . 4 18
- /12 313216 .18 /12 81321 .10
- /24 31324 . 6 /24 813124 . 4
- MOSLO/3 3145 . 4 16 MOKCI/3 816104 . 4 20
- /12 314421 . 8 /12 816221 .12
- /24 31420 . 4 /24 816113 . 4
- GAATL/3 404113 . 8 32 CAGLE/3 ??
- /12 404114 .20 /12 81821 .18
- /24 40422 . 4 /24
- CASJO/3 408111 . 4 34 CASAC/3 9167 . 4 16
- /12 40821 .26 /12 91611 . 8
- /24 408110 . 4 /24 91612 . 4
- WIMIL/3 41420 . 4 24 NCRTP/3 91920 . 4 20
- /12 41421 .16 /12 91921 .12
- /24 414120 . 4 /24 919124 . 4
- 01/29/89 PC-Pursuit Modems Statistics Chart
- Number of Modems City
- Mnemonic 300 1200 2400 Total
- ---------- -------- --------- --------- ---------
- NJNEW 12 40 4 56
- DCWAS 6 24 16 46
- CTHAR 0 8 0 8
- WASEA 4 22 4 30
- NYNYO 4 14 4 22
- CALAN 8 28 4 40
- TXDAL 6 22 4 32
- PAPHI 6 22 8 36
- OHCLE 4 18 4 26
- CODEN 4 18 22 44
- FLMIA 6 18 4 28
- ILCHI 8 28 4 40
- MIDET 6 18 6 30
- MOSLO 4 8 4 16
- GAATL 8 20 4 32
- CASJO 4 26 4 34
- WIMIL 4 16 4 24
- CAOAK 4 8 4 16
- CAPAL 4 8 0 12
- CASFA 6 10 4 20
- ORPOR 2 6 0 8
- AZPHO 4 12 4 20
- MNMIN 4 14 4 22
- MABOS 4 20 8 32
- TXHOU 8 24 10 42
- CACOL 4 10 4 18
- CASAN 4 12 4 20
- CASDI 4 14 4 22
- UTSLC 4 14 4 22
- FLTAM 4 10 4 18
- MOKCI 4 12 4 20
- CAGLE 4 18 4 26
- CASAC 4 8 4 16
- NCRTP 4 12 4 20
- -------- --------- --------- ---------
- Total 166 562 170 898
- ======== ========= ========= =========
- Average 4.8823529 16.529412 5 26.411765
- NOTE: CASAC/3, CASAC/24 were estimated.
- I think the statistics basically speak for themselves.
- I am sure there will no doubt be hundreds of people who will
- not smile at the number of specific kinds of ports supported,
- not to mention the number of 'dead' or 'down' modems you will
- find when you verify the totals. Usually, 2% to perhaps 10%
- of the modems are 'dead' with specific ones repeatedly
- failing week after week.
- History Of This Collection:
- ===========================
- Almost a year ago a small selected group of devoted
- individuals got together to discuss problems with the PC-
- Pursuit Network, in the middle of our discussions a question
- was asked as to how the network really processes our calls.
- This was intended to help us assess SET? commands and other
- such matters. When the address hypothesis was offered we
- quickly set out to prove it. It was proved in about 3
- minutes with the discovery of 2011 (First try was xxx1). The
- data has continually been collected and analyzed ever since,
- but until now, has never been mass released.
- A small group of teen age hackers discovered several
- interesting things that can be done with these addresses--
- many of which will not be discussed here short of mentioning
- that these ports connected to via these addresses are not
- limited to PC-Pursuiters. You can, however, fight "dead"
- dialout modems in cities via the address method. Dead modems
- can be located in about 10 seconds (faster than Telenet), and
- can either be reported or skipped past by the user connecting
- to the next modem in the sequence after the "dead" one.
- (Note: Say 2011.3 is dead, connect to 2011.4 and you will be
- past it. If 2011.4 is busy, go to 2011.5. The reader should
- notice 2011.3 is the same as 2011C.)
- The most interesting value of these addresses is that
- one can count the number of ports that Telenet keeps so
- secret (Grin). When there were only 28 cities in operation
- there were an average of 2.7 300 baud, 9.4 1200 baud, and 2.5
- 2400 baud modems in each city. Some cities had as little as
- 2 modems on a port and as many as 12. Only recently has the
- number of modems per city begun to jump.
- How To Update The Count Yourself:
- =================================
- An ID is not required to "request" one of these ports,
- thus the tallying can be done any time of day by simply
- typing the number at the @ prompt. Here is an example with
- four modems (NJNEW/24):
- @20122.1
- 201 22A REFUSED COLLECT CONNECTION 19 80
- @20122.2
- 201 22B REFUSED COLLECT CONNECTION 19 80
- @20122.3
- 201 22C REFUSED COLLECT CONNECTION 19 80
- @20122.4
- 201 22D REFUSED COLLECT CONNECTION 19 80
- @20122.5
- 201 22E ILLEGAL ADDRESS 19 80
- The reader should be aware that PC-Pursuit ports always
- respond with '19 80'. Do not confuse it with '19 00', which
- are not PC-Pursuit ports. In the above example we know there
- are four ports because the forth was the last existing port
- before we encountered the 'ILLEGAL ADDRESS.' There are
- several ways to signify that you have gone one beyond the end
- of the ports:
- 1) xxx xxx ILLEGAL ADDRESS 19 80
- 2) xxx xxx NOT OPERATING 19 80
- 3) The request freezes (Note: Issue a BREAK then D <C/R>
- to abort the attempt yielding 'ATTEMPT ABORTED'.)
- You should be aware that modems which are out of order in the
- middle of the sequence can respond with 'NOT OPERATING' or
- may freeze the request. You should also note that when
- updating the existing list, all you need to do is try to
- request the next modem beyond the end as of the last check.
- Finding Newly Added Ports:
- ==========================
- Many ports have not yet been installed; hence, we do not
- yet know the addresses. New ports may be found by entering
- the first three digits of the area code and appending (1-29,
- 101-129, 201-229, 301-329, etc.) until the 'REFUSED COLLECT
- CONNECTION 19 80' appears. Once this is found, simply log
- onto the port address with your ID and R/V dial some silly
- series of digits, disconnect the port, then connect to the
- PC-Pursuit mnemonic you think it might be and R/V redial the
- last number. If the numbers match, you found it.
- Pearl Box Plans by the Jolly Roger
- The Pearl Box:Definition - This is a box that may substitute for many boxes
- which produce tones in hertz. The Pearl Box when operated correctly can
- produce tones from 1-9999hz. As you can see, 2600, 1633, 1336 and other
- crucial tones are obviously in its sound spectrum.
- Materials you will need in order to build The Pearl Box:
- ========================================================
- C1, C2:.5mf or .5uf ceramic disk
- capacitors
- Q1.....NPN transistor (2N2222 works
- best)
- S1.....Normally open momentary SPST
- switch
- S2.....SPST toggle switch
- B1.....Standard 9-Volt battery
- R1.....Single turn, 50k potentiometer
- R2..... " " 100k potentiometer
- R3..... " " 500k potentiometer
- R4..... " " 1meg potentiometer
- SPKR...Standard 8-ohm speaker
- T1.....Mini transformer (8-ohm works
- best)
- Misc...Wire, solder, soldering iron, PC
- board or perfboard, box to
- contain the completed unit,
- battery clip
- Instructions for building Pearl Box:
- ======================================
- Since the instruction are EXTREMELY difficult to explain in words, you will
- be given a schematic instead. It will be quite difficult to follow but try
- it any way.
- (Schematic for The Pearl Box)
- +---+------------+---------+
- ! ! \
- C1 C2 \
- ! ! +
- + + -----+T1
- !\ +------------+-+
- ! b c-------! +
- ! Q1 ! +-S1-
- ! e-----S2---+ ! SPKR
- ! ! ! +----
- ! B1 !
- ! ! !
- ! +-------+
- !R1 R2 R3 R4!
- /\/\ /\/\ /\/\ /\/\
- +--+ +--+ +--+
- Now that you are probably thoroughly confused, let me explain a few
- minor details. The potentiometer area is rigged so that the left pole is
- connected to the center pole of the potentiometer next to it.
- The middle terminal of T1 is connected to the piece of wire that runs down
- to the end of the battery.
- Correct operation of The Pearl Box:
- ===================================
- You may want to get some dry-transfer decals at Radio Shack to make this
- job a lot easier. Also, some knobs for the tops of the potentiometers
- may be useful too. Use the decals to calibrate the knobs. R1 is the knob
- for the ones place, R2 is for the tens place, R3 if for the hundreds
- place and R4 is for the thousands place. S1 is for producing the all the
- tones and S2 is for power.
- Step 1: Turn on the power and adjust the knobs for the desired tone.
- (Example: For 2600 hz-
- R1=0:R2=0:R3=6:R4=2)
- Step 2: Hit the pushbutton switch and VIOLA! You have the tone. If
- you don't have a tone recheck all connections and schematic.
- --------------------Jolly Roger
- The Phreak file courtesy of the Jolly Roger
- 202 282 3010 UNIV. OF D.C.
- 202 553 0229 PENTAGON T.A.C.
- 202 635 5710 CATHOLIC UNIV. OF AMERICA
- 202 893 0330 DEFENSE DATA NETWORK
- 202 893 0331 DEFENSE DATA NETWORK
- 202 965 2900 WATERGATE
- 203 771 4930 TELEPHONE PIONEERS
- 206 641 2381 VOICE OF CHESTER
- 212 526 1111 NEW YORK FEED LINE
- 212 557 4455 SEX HOT LINE
- 212 799 5017 ABC NY FEED LINE
- 212 934 9090 DIAL-AN-IDIOT
- 212 976 2727 P.D.A.
- 212 986 1660 STOCK QUOTES
- 213 541 2462 STOCK MARKET REPORTS
- 213 547 6801 NAVY SHIPS INFO
- 213 576 6061 " "
- 213 664 3321 NEWS FOR THE BLIND
- 301 393 1000 " "
- 301 667 4280 LOTTERY INFO
- 312 939 1600 " "
- 404 221 5519 NUCLEAR COMMISSION
- 408 248 8818 1ST NAT'L BANK
- 415 642 2160 EARTHQUAKE REPCRT
- 505 883 6828 " "
- 512 472 2181 " "
- 512 472 4263 WIERD RECORDING
- 512 472 9833 " "
- 512 472 9941 INSERT 25 CENTS
- 512 472 9941 SPECIAL RECORDING
- 512 870 2345 " "
- 516 794 1707 " "
- 619 748 0002 LOOP LINE
- 619 748 0003 " "
- 703 331 0057 MCI (5 DIGITS)
- 703 334 6831 WASH. POST
- 703 354 8723 COMPEL INC.
- 703 737 2051 METROPHONE (6 DIGITS)
- 703 835 0500 VALNET (5 DIGITS)
- 703 861 7000 SPRINT (6/8 DIGITS)
- 703 861 9181 SPRINT (6/8 DIGITS)
- 714 974 4020 CA. MAINFRAME
- 716 475 1072 N.Y. DEC-SYSTEM
- 800 222 0555 RESEARCH INSTITUTE
- 800 223 3312 CITIBANK
- 800 227 5576 EASTERN AIRLINES
- 800 248 0151 WHITE HOUSE PRESS
- 800 321 1424 FLIGHT PLANES
- 800 323 3026 TEL-TEC (6 GIGITS)
- 800 323 4756 MOTOROLA DITELL
- 800 323 7751 M.C.I. MAINFRAME
- 800 325 4112 EAsYLINK
- 800 325 6397 F.Y.I.
- 800 344 4000 MSG SYSTEM
- 800 368 6900 SKYLINE ORDER LINE
- 800 424 9090 RONALD REAGAN'S PRESS
- 800 424 9096 WHITE HOUSE SWITCH
- 800 438 9428 ITT CITY CALL SWITCHING
- 800 521 2255 AUTONET
- 800 521 8400 TRAVELNET (8 DIGITS)
- 800 526 3714 RCA MAINFRAME
- 800 527 1800 TYMNET
- 800 621 3026 SPECIAL OPERATOR
- 800 621 3028 " "
- 800 621 3030 " "
- 800 621 3035 " "
- 800 631 1146 VOICE STAT
- 800 821 2121 BELL TELEMARKETING
- 800 828 6321 XEROX $
- 800 858 9313 RECORD-A-VOICE
- 800 882 1061 AT&T STOCK PRICES
- 914 997 1277 " "
- 916 445 2864 JERRY BROWN
- N/A 950 1000 SPRINT
- N/A 950 1022 MCI EXECUNET
- N/A 950 1033 US TELEPHONE
- N/A 950 1044 ALLNET (6 DIGITS)
- N/A 950 1066 LEXITEL
- N/A 950 1088 SKYLINE (6 DIGITS)
- -----------------------------------
- PHONE # | DESCRIPTION/CODE
- -----------------------------------
- 201-643-2227 | CODES:235199,235022
- | AND 121270
- |
- 800-325-4112 | WESTERN UNION
- |
- 800-547-1784 | CODES:101111,350009
- | AND 350008
- |
- 800-424-9098 | TOLL FREE WHITE HS.
- |
- 800-424-9099 | DEFENSE HOT LINE
- |
- 202-965-2900 | WATERGATE
- |
- 800-368-5693 | HOWARD BAKER HOTLN
- |
- 202-456-7639 | REAGANS SECRETARY
- |
- 202-545-6706 | PENTAGON
- |
- 202-694-0004 | PENTAGON MODEM
- |
- 201-932-3371 | RUTGERS
- |
- 800-325-2091 | PASSWORD: GAMES
- |
- 800-228-1111 | AMERICAN EXPRESS
- |
- 617-258-8313 | AFTER CONNECT
- | PRESS CTRL-C
- |
- 800-323-7751 | PASSWORD:REGISTER
- |
- 800-322-1415 | CODES:266891,411266
- | AND 836566
- | (USED BY SYSOP)
- -----------------------------------
- The following 800 #'s have been
- collected however no codes have
- been found yet! if you hack any
- please let me know...
- -----------------------------------
- phone # | codes:
- -----------------------------------
- 800-321-3344 | ???????????
- 800-323-3027 | ???????????
- 800-323-3208 | ???????????
- 800-323-3209 | ???????????
- 800-325-7222 | ???????????
- 800-327-9895 | ???????????
- 800-327-9136 | ???????????
- 800-343-1844 | ???????????
- 800-547-1784 | ???????????
- 800-547-6754 | ???????????
- 800-654-8494 | ???????????
- 800-682-4000 | ???????????
- 800-858-9000 | ???????????
- 800 #'s with carriers.
- 800-323-9007
- 800-323-9066
- 800-323-9073
- 800-321-4600
- 800-547-1784
- 1-800 numbers of the goverment.
- 800-321-1082:NAVY FINANCE CENTER.
- 800-424-5201:EXPORT IMPORT BANK.
- 800-523-0677:ALCOHOL TOBACCO AND.
- 800-532-1556:FED INFORMATION CNTR1-1082:NAVY FINANCE CENTER.
- 800-424-5201:EXPORT IMPORT BANK.
- 800-523-0677:ALCOHOL TOBACCO AND.
- 800-532-1556:FED INFORMATION CNTR.
- 800-325-4072:COMBAT & ARMS SERVICE.
- 800-325-4095:COMBAT SUPPORT BRANCH.
- 800-325-4890:ROPD USAR COMBAT ARMS.
- 800-432-3960:SOCIAL SECURITY.
- 800-426-5996:PUGET NAVAL SHIPYARD.
- Directory of toll free numbers.
- 800-432-3960:SOCIAL SECURITY.
- 800-426-5996:PUGET NAVAL SHIPYARD.
- Directory of toll free numbers.
- 301-234-0100:BALTIMORE ELECTRIC.
- 202-456-1414:WHITE HOUSE.
- 202-545-6706:PENTAGON.
- 202-343-1100:EPA.
- 714-891-1267:DIAL-A-GEEK.
- 714-897-5511:TIMELY.
- 213-571-6523:SATANIC MESSAGES.
- 213-664-7664:DIAL-A-SONG.
- 405-843-7396:SYNTHACER MUSIC.
- 213-765-1000:LIST OF MANY NUMBERS.
- 512-472-4263:WIERD.
- 512-472-9941:INSERT 25.
- 203-771-3930:PIONEERS.
- 213-254-4914:DIAL-A-ATHIEST.
- 212-586-0897:DIRTY.
- 213-840-3971:HOROWIERD
- 203-771-3930:PIONEERS
- 471-9420,345-9721,836-8962
- 836-3298,323-4139,836-5698
- 471-9440,471-9440,471-6952
- 476-6040,327-9772,471-9480
- 800-325-1693,800-325-4113
- 800-521-8400:VOICE ACTIVATED
- 213-992-8282:METROFONE ACCESS NUMBER
- 617-738-5051:PIRATE HARBOR
- 617-720-3600:TIMECOR #2
- 301-344-9156:N.A.S.A PASSWORD:GASET
- 318-233-6289:UNIVERSITY LOUISIANA
- 213-822-2112:213-822-3356
- 213-822-1924:213-822 3127
- 213-449-4040:TECH CENTER
- 213-937-3580:TELENET
- 1-800-842-8781
- 1-800-368-5676
- 1-800-345-3878
- 212-331-1433
- 213-892-7211
- 213-626-2400
- 713-237-1822
- 713-224-6098
- 713-225-1053
- 713-224-9417
- 818-992-8282
- 1-800-521-8400
- After entering the sprint code,and, C+Destination number.Then enter this:
- number:"205#977#22",And the main tracer for sprint will be disabled.
- 215-561-3199/SPRINT LONG DISTANCE
- 202-456-1414/WHITE HOUSE
- 011-441-930-4832/QUEEN ELIZABETH
- 916-445-2864/JERRY BROWN
- 800-424-9090/RONALD REAGAN'S PRESS
- 212-799-5017/ABC NEW YORK FEED LINE
- 800-882-1061/AT & T STOCK PRICES
- 212-986-1660/STOCK QUOTES
- 213-935-1111/WIERD EFFECTS!
- 512-472-4263/WIERD RECORDING
- 212-976-2727/P.D.A.
- 619-748-0002/FONE CO. TESTING LINES
- 900-410-6272/SPACE SHUTTLE COMM.
- 201-221-6397/AMERICAN TELEPHONE
- 215-466-6680/BELL OF PENNSYLVANIA
- 202-347-0999/CHESAPEAKE TELEPHONE
- 213-829-0111/GENERAL TELEPHONE
- 808-533-4426/HAWAIIAN TELEPHONE
- 312-368-8000/ILLINOIS BELL TELEPHONE
- 317-265-8611/INDIANA BELL
- 313-223-7233/MICHIGAN BELL
- 313-223-7223/NEVADA BELL
- 207-955-1111/NEW ENGLAND TELEPHONE
- 201-483-3800/NEW JERSEY BELL
- 212-395-2200/NEW YORK TELEPHONE
- 515-243-0890/NORTHWESTERN BELL
- 216-822-6980/OHIO BELL
- 206-345-2900/PACIFIC NORTHWEST BELL
- 213-621-4141/PACIFIC TELEPHONE
- 205-321-2222/SOUTH CENTRAL BELL
- 404-391-2490/SOUTHERN BELL
- 203-771-4920/SOUTHERN NEW ENGLAND
- 314-247-5511/SOUTHWESTERN BELL
- 414-678-3511/WISCONSIN TELEPHONE
- 800-327-6713/UNKNOWN ORIGIN
- 303-232-8555/HP3000
- 315-423-1313/DEC-10
- 313-577-0260/WAYNE STATE
- 512-474-5011/AUSTIN COMPUTERS
- 516-567-8013/LYRICS TIMESHARING
- 212-369-5114/RSTS/E
- 415-327-5220/NEC
- 713-795-1200/SHELL COMPUTERS
- 518-471-8111/CNA OF NY
- 800-327-6761/AUTONET
- 800-228-1111/VISA CREDIT CHECK
- 713-483-2700/NASUA
- 213-383-1115/COSMOS
- 408-280-1901/TRW
- 404-885-3460/SEARS CREDIT CHECK
- 414-289-9988/AARDVARK SOFTWARE
- 919-852-1482/ANDROMEDA INCORPORATED
- 213-985-2922/ARTSCI
- 714-627-9887/ASTAR INTERNATIONAL
- 415-964-8021/AUTOMATED SIMULATIONS
- 503-345-3043/AVANT GARDE CREATIONS
- 415-456-6424/BRODERBUND SOFTWARE
- 415-658-8141/BUDGE COMPANY
- 714-755-5392/CAVALIER COMPUTER
- 801-753-6990/COMPUTER DATA SYSTEMS
- 213-701-5161/DATASOFT INC.
- 213-366-7160/DATAMOST
- 716-442-8960/DYNACOMP
- 213-346-6783/EDU-WARE
- 800-631-0856/HAYDEN
- 919-983-1990/MED SYSTEMS SOFTWARE
- 312-433-7550/MICRO LAB
- 206-454-1315/MICROSOFT
- 301-659-7212/MUSE SOFTWARE
- 209-683-6858/ON-LINE SYSTEMS
- 203-661-8799/PROGRAM DESIGN (PDI)
- 213-344-6599/QUALITY SOFTWARE
- 303-925-9293/SENTIENT SOFTWARE
- 702-647-2673/SIERRA SOFTWARE
- 916-920-1939/SIRIUS SOFTWARE
- 215-393-2640/SIR-TECH
- 415-962-8911/SOFTWARE PUBLISHERS
- 415-964-1353/STRATEGIC SIMULATIONS
- 217-359-8482/SUBLOGIC COM.
- 206-226-3216/SYNERGISTIC SOFTWARE
- Here are a few tips on how not to get caught when using MCI or other
- such services:
- 1- Try not to use them for voice to voice personal calls. Try to use
- them for computer calls only. Here is why:
- MCI and those other services can't really trace the calls that
- come through the lines,they can just monitor them. They can
- listen in on your calls and from that,they can get your name and
- other information from the conversation. They can also call
- the number you called and ask your friend some questions. If
- you call terminals and BBS'S then it is much harder to get
- information. For one thing,most sysops won't give these dudes
- that call any info at all or they will act dumb because they
- PHREAK themselves!
- 2- Beware when using colored boxes! They are easy to find!!!!!
- 3- Try to find a sine-wave number. Then use an MCI or other service
- to call it. You will hear a tone that goes higher and lower. If
- the tone just stops,then that code is being monitored and you
- should beware when using it.
- ----------------------------------------
- If you do get caught,then if you think you can,try to weasel out of it.
- I have heard many stories about people that have pleaded with the MCI
- guys and have been let off. You will get a call from a guy that has been
- monitoring you. Act nice. Act like you know it is now wrong to do this
- kind of thing.....just sound like you are sorry for what you did. (If you
- get a call,you probably will be a little sorry!)
- Otherwise,it is very dangerous!!!!!!! (Very with a capital V!)
- -------------------Jolly Roger
- Red Box Plans by the Jolly Roger
- Red boxing is simulating the tones produced by public payphones when you
- drop your money in. The tones are beeps of 2200 Hz + 1700 Hz
- Nickle = 1 beep for 66 milliseconds.
- Dime = 2 beeps, each 66 milliseconds with a 66 millisecond pause between
- beeps.
- Quarter = 5 beeps, each 33 milliseconds with a 33 millisecond
- pause between beeps.
- There are two commonly used methods being used by Phreaks to make free calls.
- 1. An electronic hand-held device that is made from a pair of Wien-bridge
- oscillators with the timing controlled by 555 timing chips.
- 2. A tape recording of the tones produced by a home computer. One of
- the best computers to use would be an Atari ST. It is one of the easier
- computers to use because the red box tones can be produced in basic with only
- about 5 statments.
- --------------------Jolly Roger
- [__RemObS_________________________] by the Jolly Roger
- Some of you may have heard of devices called Remobs which stands
- for Remote Observation System. These Devices allow supposedly
- authorized telephone employees to dial into them from anywhere, and
- then using an ordinary touch tone fone, tap into a customer's line
- in a special receive only mode. [The mouthpiece circuit is
- deactivated, allowing totally silent observation from any
- fone in the world (Wire tapping without a court order is against
- the law)]
- [__How Remobs Work______________]
- Dial the number of a Remob unit. Bell is rumored to put them in the
- 555 information exchanges, oron special access trunks
- [Unreachable except via blue box]. A tone will then be heard
- for approximately 2 seconds and then silence. You must key in
- (In DTMF) a 2 to 5 digit access code while holding each digit down
- at least 1 second. If the code is not entered within 5 or 6 seconds,
- the Remob will release and must be dialed again. If the code is
- supposedly another tone will be heard. A seven digit subscriber
- fone number can then be entered [The Remob can only handle certain
- 'exchanges' which are prewired, so usually one machine cannot
- monitor an entire NPA]. The Remob will then connect to the
- subscribers line. The listener will hear the low level idle tone
- as long as the monitored party is on hook. As the monitored party
- dials [rotary or DTMF], the listener would hear [And Record]
- the number being dialed. Then the ENTIRE conversation, datalink,
- whatever is taking place, all without detection. There is no
- current box which can detect Remob observation, since it is being done
- with the telephone equipment that makes the connection. When the
- listener is finished monitoring of that particular customer, he keys
- the last digit of the access code to disconnects him from the
- monitored line and return to the tone so that he can key in another
- 7 digit fone #. When the listener is totally finished with the Remob,
- he keys a single 'disconnect digit' which disconnects him from the
- Remob so that the device can reset and be ready for another caller.
- [_History of Remobs_______________]
- Bell has kept the existance of Remobs very low key. Only in
- 1974, Bell acknowledged that Remobs existed. The device was
- first made public during hearings on "Telephone Monitoring Practices
- by Federal Agencies" before a subcommittee on government
- operations. House of Representatives, Ninety-Third Congress, June
- 1974.
- It has since been stated by Bell that the Remob devices
- are used exclusively for monitoring Bell employees such as operators,
- information operators, etc., to keep tabs on their performance.
- [Suuureee, were stupid]
- [__Possible Uses for Remobs__]
- The possible uses of Remobs are almost as endless as the uses
- of self created fone line. Imagine the ability to monitor bank lines
- etc, just off the top of my head I can think of these applications:
- Data Monitoring of:
- TRW
- National Credit Bureau
- AT&T Cosmos
- Bank Institutions
- Compuserve and other Networks.
- Voice Monitoring of:
- Bank Institutions
- Mail Order buisnesses.
- Bell Telephone themselves.
- Any place handling sensitive or important information.
- Anyone that you may not like.
- With just one Remob, someone could get hundreds of credit cards,
- find out who was on vacation, get compuserve passwords by the dozens,
- disconnect peoples fones, do credit checks, find out about anything
- that they may want to find out about. Im sure you brilliant
- can see the value of a telephone hobbiest and a telecommunications
- enthusist getting his hands on a few choice Remobs. <Grin>
- [_Caution________________________]
- If any reader should discover a Remob during his (or her) scanning
- excursions, please keep in mind the very strict federal laws
- regarding wiretapping and unauthorized use of private Bell property.
- ------------------Jolly Roger
- Scarlet Box Plans by the Jolly Roger
- The purpose of a Scarlet box is to create a very bad conection,
- it can be used to crash a BBS or just make life miserable for those you
- seek to avenge.
- Materials: 2 alligator clips, 3 inch wire, or a resister
- (plain wire will create greatest amount of static)
- (Resister will decrease the amount of static in porportion to
- the resister you are using)
- Step (1): Find the phone box at your victims house, and pop the cover off.
- Step (2): Find the two prongs that the phone line you wish to box are
- connected to.
- Step (3): Hook your alligator clips to your (wire/resister).
- Step (4): Find the lower middle prong and take off all wires connected to
- it, i think this disables the ground and call waiting and shit like that.
- Step (5): Now take one of the alligator clips and attach it to the upper
- most prong, and take the other and attach it to the lower middle prong.
- Step (6): Now put the cover back on the box and take off!!
- ** ######## **
- ** # #### # **
- ######## /
- # #### # /
- ######## /
- /
- /
- /
- /
- /
- /
- /
- **/
- **
- **
- **
- **
- **
- (**)= prongs
- **
- (/) = (wire/resister)
- (##)= some phone bullshit
- --------------------Jolly Roger
- Silver Box Plans by the Jolly Roger
- Introduction:
- ------------
- First a bit of Phone Trivia. A standard telephone keypad has 12 buttons.
- These buttons, when pushed, produce a combination of two tones. These tones
- represent the row and column of the button you are pushing.
- 1 1 1
- 2 3 4
- 0 3 7
- 9 6 7
- 697 (1) (2) (3)
- 770 (4) (5) (6)
- 851 (7) (8) (9)
- 941 (*) (0) (#)
- So (1) produces a tone of 697+1209, (2) produces a tone of 697+1336, etc.
- Function:
- --------
- What the Silver Box does is just creates another column of buttons,
- with the new tone of 1633. These buttons are called A, B, C, and D.
- Usefulness:
- ----------
- Anyone who knows anything about phreaking should know that in the
- old days of phreaking, phreaks used hardware to have fun instead of other
- people's Sprint and MCI codes. The most famous (and useful) was the good
- ol' Blue Box. However, Ma Bell decided to fight back and now most phone systems
- have protections against tone-emitting boxes. This makes boxing just
- about futile in most areas of the United States (ie those areas with Crossbar
- or Step-By-Step). If you live in or near a good-sized city, then your phone
- system is probably up-to-date (ESS) and this box (and most others)
- will be useless. However, if you live in the middle of nowhere (no offense
- intended), you may find a use for this and other boxes.
- Materials:
- ---------
- 1 Foot of Blue Wire
- 1 Foot of Grey Wire
- 1 Foot of Brown Wire
- 1 Small SPDT Switch (*)
- 1 Standard Ma Bell Phone
- (*) SPDT = Single Pole/Double Throw
- Tools:
- -----
- 1 Soldering Iron
- 1 Flat-Tip Screwdriver
- Procedure:
- ---------
- (1) Loosen the two screws on the bottom of the phone and take the casinf off.
- (2) Loosen the screws on the side of the keypad and remove the keypad from
- the mounting bracket.
- (3) Remove the plastic cover from the keypad.
- (4) Turn the keypad so that *0# is facing you. Turn the keypad over. You'll see
- a bunch of wires, contacts, two Black Coils, etc.
- (5) Look at the Coil on the left. It will have five (5) Solder Contacts
- facing you. Solder the Grey Wire to the fourth Contact Pole from the left.
- (6) Solder the other end of the Grey Wire to the Left Pole of the SPDT Switch.
- (7) Find the Three (3) Gold-Plated Contacts on the bottom edge of the keypad.
- On the Left Contact, gently seperate the two touching Connectors (they're
- soldered together) and spread them apart.
- (8) Solder the Brown Wire to the Contact farthest from you, and solder the
- other end to the Right Pole of the SPDT Switch.
- (9) Solder the Blue Wire to the Closest Contact, and the other end to the
- Center Pole of the SPDT Switch.››(10) Put the phone back together.
- Using The Silver Box:
- --------------------
- What you have just done was installed a switch that will change
- the 369# column into an ABCD column. For example, to dial a 'B', switch
- to Silver Box Tones and hit '6'.
- Noone is sure of the A, B, and C uses. However, in an area with an
- old phone system, the 'D' button has an interesting effect. Dial Directory
- Assistance and hold down 'D'. The phone will ring, and you
- should get a pulsing tone. If you get a pissed-off operator, you have a
- newer phone system with defenses against Silver Boxes.
- At the pulsing tone, dial a 6 or 7. These are loop ends.
- -----------------Jolly Roger
- Bell Trashing by the Jolly Roger
- The Phone Co. will go to extreams on occasions. In fact, unless
- you really know what to expect from them, they will suprise the heck
- out of you with their "unpublished tarriffs". Recently, a situation
- was brought to my attention that up till then I had been totaly
- unaware of, least to mention, had any concern about. It involved gar-
- bage! The phone co. will go as far as to prosecute anyone who rumages
- through their garbage and helps himself to some
- Of course, they have their reasons for this, and no doubt benefit
- from such action. But, why should they be so picky about garbage? The
- answer soon became clear to me: those huge metal bins are filled up
- with more than waste old food and refuse... Although it is Pacific
- Tele. policy to recycle paper waste products, sometimes employees do
- overlook this sacred operation when sorting the garbage. Thus
- top-secret confidential Phone Co. records go to the garbage bins
- instead of the paper shredders. Since it is constantly being updated
- with "company memorandums, and supplied with extensive reference
- material, the Phone co. must continualy dispose of the outdated
- materials. Some phone companies are supplied each year with the
- complete "System Practices" guide. This publication is an over 40
- foot long library of reference material about everything to do with
- telephones. As the new edition arrives each year, the old version of
- "System Practices" must also be thrown out.
- I very quickly figured out where some local phone phreaks were
- getting their material. They crawl into the garbage bins and remove
- selected items that are of particular interest to them and their
- fellow phreaks. One phone phreak in the Los Angeles area has salvaged
- the complete 1972 edition of "Bell System Practices". It is so large
- and was out of order (the binders had been removed) that it took him
- over a year to sort it out and create enough shelving for it in his
- garage.
- Much of this "Top Secret" information is so secret that most phone
- companies have no idea what is in their files. They have their hands
- full simply replacing everything each time a change in wording
- requires a new revision. It seems they waste more paper than they can
- read!
- It took quite a while for Hollywood Cal traffic manager to figure
- out how all of the local phone phreaks constantly discovered the
- switchroom test numbers
- Whenever someone wanted to use the testboard, they found the local
- phone phreaks on the lines talking to all points all over the world.
- It got to the point where the local garbage buffs knew more about the
- office operations than the employees themselves. One phreak went so
- far as to call in and tell a switchman what his next daily assignment
- would be. This, however, proved to be too much. The switchman
- traced the call and one phone phreak was denied the tool of his trade.
- In another rather humorous incident, a fellow phreak was rumaging
- through the trash bin when he heard somone apraoching. He pressed up
- against the side of the bin and silently waited for the goodies to
- come. You can imagine his surprise when the garbage from the lunchroom
- landed on his head. Most people find evenings best for checking out
- their local telco trash piles. The only thing necessary is a
- flashlight and, in the case mentioned above, possibly a rain coat. A
- word of warning though, before you rush out and dive into the trash
- heap. It is probably illegal, but no matter where you live, you
- certainly won't get the local policeman to hold your flashlight for
- you.
- --------------------Jolly Roger
- Canadian WATS Phonebook courtesy of the Jolly Roger
- 800-227-4004 ROLM Collagen Corp.
- 800-227-8933 ROLM Collagen Corp.
- 800-268-4500 Voice Mail
- 800-268-4501 ROLM Texaco
- 800-268-4505 Voice Mail
- 800-268-6364 National Data Credit
- 800-268-7800 Voice Mail
- 800-268-7808 Voice Mail
- 800-328-9632 Voice Mail
- 800-387-2097 Voice Mail
- 800-387-2098 Voice Mail
- 800-387-8803 ROLM Canadian Tire
- 800-387-8861 ROLM Canadian Tire
- 800-387-8862 ROLM Canadian Tire
- 800-387-8863 ROLM Canadian Tire
- 800-387-8864 ROLM Canadian Tire
- 800-387-8870 ROLM Halifax Life
- 800-387-8871 ROLM Halifax Life
- 800-387-9115 ASPEN Sunsweep
- 800-387-9116 ASPEN Sunsweep
- 800-387-9175 PBX [Hold Music=CHUM FM]
- 800-387-9218 Voice Messenger
- 800-387-9644 Carrier
- 800-426-2638 Carrier
- 800-524-2133 Aspen
- 800-663-5000 PBX/Voice Mail [Hold Music=CFMI FM]
- 800-663-5996 Voice Mail (5 rings)
- 800-847-6181 Voice Mail
- NOTES: Each and every one of these numbers is available to the 604
- (British Columbia) Area Code. Most are available Canada Wide and some
- are located in the United States. Numbers designated ROLM have been
- identified as being connected to a ROLM Phonemail system.
- Numbers designated ASPEN are connected to an ASPEN voice message system.
- Numbers designated VOICE MAIL have not been identified as to equipment
- in use on that line. Numbers designated carrier are answered by a modem
- or data set.
- Most Voice Message systems, and ALL Rolms, sound like an answering machine.
- Press 0 during the recording when in a rolm, * or # or other DTMF in other
- systems, and be propelled into another world...
- Brought to you in the Cookbook by the Jolly Roger!!!!!!!!!!!!!!!!
- Hacking TRW by the Jolly Roger
- When you call TRW, the dial up will identify itself with the message "TRW".
- It will then wait for you to type the appropiate answer back (such as CTRL-G)
- Once This has been done, the system will say "CIRCUIT BUILDING IN PROGRESS"
- Along with a few numbers. After this, it clears the screen
- (CTRL L) followed by a CTRL-Q. After the system sends the CTRL-Q, It is
- ready for the request. You first type the 4 character identifyer for the
- geographical area of the account..
- (For Example) TCA1 - for certain Calif. & Vicinity subscribers.
- TCA2 - A second CALF. TRW System.
- TNJ1 - Their NJ Database.
- TGA1 - Their Georgia Database.
- The user then types A <CR> and then on the next line, he must type
- his 3 char. Option. Most Requests use the RTS option.
- OPX, RTX, and a few others exist. (NOTE) TRW will accept an A, C,
- or S as the 'X' in the options above.) Then finally, the user types his 7
- digit subscriber code. He appends his 3-4 character password after it. It
- seems that if you manage to get hold of a TRW Printout (Trashing at Sears,
- Saks, ETC. or from getting your credit printout from them) Their subscriber
- code will be on it leaving only a 3-4 character p/w up to you.
- For Example,
- (Call the DialUp)
- TRW System Types, ST) CTRL-G
- (You type,YT) Circuit building in progress 1234
- (ST) CTRL-L CRTL-Q (TCA1 CYT) BTS 3000000AAA
- <CR><CRTL-S> (YT]
- Note: This sytem is in Half Duplex, Even Parity, 7 Bits per word and
- 2 Stop Bits.
- CAUTION: It is a very stressed rumor that after typing in the TRW
- password Three (3) times.. It sets an Automatic Number Identification on your
- ass, so be careful. And forget who told you how to do this..
- ------------------Jolly Roger
- Hacking Vax's & Unix by the Jolly Roger
- Unix is a trademark of At&t (and you know what that means)
- _______________________________________
- In this article, we discuss the unix system that runs on
- the various vax systems. If you are on another unix-type system, some
- commands may differ, but since it is licenced to bell, they can't make many
- changes.
- _______________________________________
- Hacking onto a unix system is very difficult, and in this case, we advise
- having an inside source, if possible. The reason it is difficult to hack a
- vax is this: Many vax, after you get a carrier from them, respond=>
- Login:
- They give you no chance to see what the login name format is. Most commonly
- used are single words, under 8 digits, usually the person's name. There is
- a way around this: Most vax have an acct. called 'suggest' for people to
- use to make a suggestion to the system root terminal. This is usually watched
- by the system operator, but at late he is probably at home sleeping or
- screwing someone's brains out. So we can write a program to send at the
- vax this type of a message:
- A screen freeze (Cntrl-s), screen clear (system dependant), about 255
- garbage characters, and then a command to create a login acct., after which
- you clear the screen again, then unfreeze the terminal. What this does:
- When the terminal is frozen, it keeps a buffer of what is sent. well, the
- buffer is about 127 characters long. so you overflow it with trash, and then
- you send a command line to create an acct. (System dependant). after this
- you clear the buffer and screen again, then unfreeze the terminal. This is
- a bad way to do it, and it is much nicer if you just send a command to
- the terminal to shut the system down, or whatever you are after...
- There is always, *Always* an acct. called root, the most powerful acct.
- to be on, since it has all of the system files on it. If you hack your
- way onto this one, then everything is easy from here on...
- On the unix system, the abort key is the Cntrl-d key. watch how many times
- you hit this, since it is also a way to log off the system!
- A little about unix architechture: The root directory, called root, is
- where the system resides. After this come a few 'sub' root directories,
- usually to group things (stats here, priv stuff here, the user log here...).
- Under this comes the superuser (the operator of the system), and then
- finally the normal users. In the unix 'Shell' everything is treated the same.
- By this we mean: You can access a program the same way you access a user
- directory, and so on. The way the unix system was written, everything,
- users included, are just programs belonging to the root directory. Those
- of you who hacked onto the root, smile, since you can screw everything...
- the main level (exec level) prompt on the unix system is the $, and if you
- are on the root, you have a # (superuser prompt).
- Ok, a few basics for the system... To see where you are, and what paths
- are active in regards to your user account, then type
- => pwd
- This shows your acct. seperated by a slash with another pathname (acct.),
- possibly many times. To connect through to another path,
- or many paths, you would type:
- You=> path1/path2/path3
- and then you are connected all the way from path1 to path3. You can
- run the programs on all the paths you are connected to. If it does
- not allow you to connect to a path, then you have insufficient privs, or
- the path is closed and archived onto tape. You can run programs this way
- also:
- you=> path1/path2/path3/program-name
- Unix treats everything as a program, and thus there a few commands to
- learn...
- To see what you have access to in the end path, type=>
- ls
- for list. this show the programs you can run. You can connect to
- the root directory and run it's programs with=>
- /root
- By the way, most unix systems have their log file on the root, so you
- can set up a watch on the file, waiting for people to log in and snatch their
- password as it passes thru the file. To connect to a directory, use the
- command:
- => cd pathname This allows you to do what you want
- with that directory. You may be asked for a password, but this is a good
- ay of finding other user names to hack onto.
- The wildcard character in unix, if you want to search down a path for
- a game or such, is the *.
- => ls /*
- Should show you what you can access. The file types are the same as they
- are on a dec, so refer to that section when examining file. To see what is
- in a file, use the
- => pr
- filename command, for print file.
- We advise playing with pathnames to get the hang of the concept. There
- is on-line help available on most systems with a 'help' or a '?'.
- We advise you look thru the help files and pay attention to anything
- they give you on pathnames, or the commands for the system.
- You can, as a user, create or destroy directories on the tree beneath you.
- This means that root can kill everything but root, and you can kill any
- that are below you. These are the
- => mkdir pathname
- => rmdir pathname
- commands.
- Once again, you are not alone on the system... type=>
- who
- to see what other users are logged in to the system at the time. If you
- want to talk to them=>
- write username
- Will allow you to chat at the same time, without having to worry
- about the parser. To send mail to a user, say
- => mail
- And enter the mail sub-system. To send a message to all the users
- on the system, say
- => wall
- Which stands for 'write all'. By the way, on a few systems,
- all you have to do is hit the <return> key to end the message,
- but on others you must hit the cntrl-d key.
- To send a single message to a user, say
- => write username
- this is very handy again! If you send the sequence of characters discussed
- at the very beginning of this article, you can have the super-user terminal do
- tricks for you again.
- Privs:
- If you want superuser privs, you can either log in as root, or edit your
- acct. so it can say
- => su
- this now gives you the # prompt, and allows you to completely by-pass the
- protection. The wonderful security conscious developers at bell made it
- very difficult to do much without privs, but once you have them, there
- is absolutely nothing stopping you from doing anything you want to.
- To bring down a unix system:
- => chdir /bin
- => rm *
- this wipes out the pathname bin, where all the system maintenance files are.
- Or try:
- => r -r
- This recursively removes everything from the system except the remove
- command itself.
- Or try:
- => kill -1,1
- => sync
- This wipes out the system devices from operation.
- When you are finally sick and tired from hacking on the vax systems, just
- hit your cntrl-d and repeat key, and you will eventually be logged out.
- _______________________________________
- The reason this file seems to be very sketchy is the fact that bell has 7
- licenced versions of unix out in the public domain, and these commands are
- those common to all of them. I recommend you hack onto the root or
- bin directory, since they have the highest levels of privs, and there
- is really not much you can do (except develop software) without them.
- _______________________________________
- Verification Circuits courtesy of the Jolly Roger
- (originally an Apple ][ file so forgive the upper case!)
- 1. ONE BUSY VERIFICATION CONFERENCE CIRCUIT IS ALWAYS PROVIDED.THE CIRCUIT IS A
- THREE-WAY CONFERENCE BRIDGE THAT ENABLES AN OPERERATOR TO VERIFY THE BUSY/IDLE
- CONDITION OF A SUBSCRIBER LINE.UPON REQUEST OF A PARTY ATTEMPTING TO REACH A
- SPECIFIED DIRECTORY NUMBER, THE OPERATOR DIALS THE CALLED LINE NUMBER TO
- DETERMINE IF THE LINE IS IN USE,IF THE RECEIVER IS OFF THE HOOK,OR IF THE LINE
- IS IN LOCKOUT DUE TO A FAULT CONDITKON.THE OPERATOR THEN RETURNS TO THE PARTY
- TRYING TO REACH THE DIRE CTORY NUMBER AND STATES THE CONDITION OF THE
- LINE.LINES WITH DATA SECURITY CAN NOT BE ACCESSED FOR BUSY VERIFICATION WHEN
- THE LINE IS IN USE.(REFER ALSO TO DATA SECURITY)
- 2. THREE PORTS ARE ASSIGNED TO EACH BUSY VERIFICATION CONFERENCE CIRCUIT.ONE
- PORT IS FOR OPERATOR ACCESS AND TWO PORTS ARE USED TO SPLIT AN EXISTING
- CONNECTION.TO VERKFY THE BUSY/IDLE CONDITION OF A LINE,THE OPERATOR
- ESTABLISHED A CONNECTION TO THE OPERATOR ACCESS PORT AND DIALS THE DIRECTORY
- NUMBER OF THE LINE TO BE VERIFIED.IF THE LINE IS IN USE,THE EXISTING
- CONNECTION IS BROKEN AND IMMEDIATLY RE-ESTABLISHED THROUGH THE
- OTHER TWO PORTS OF THE BUSY VERIFICATION CIRCUIT WITHOUT INTERRUPTION.
- BUSY VERIFICATION CIRCUIT IS CONTROLLED BY ACCESS CODE. A DEDICATED TRUNK CAN
- BE USED BUT IS NOT NECESSARY.
- 3. THE BUSY VREIFICATION CIRCUIT ALSO CAN BE USED FOR TEST VERIFY FROM THE WIRE
- CHIEFS TEST PANEL.
- B. ADDITIONAL BUSY VERIFICATION CONFERENCE CIRCUITS (002749)
- O.K. THERE IT IS-RIGHT OUT OF AN ESS MANUAL WORD FOR WORD! (AND IM GETTING 25
- LINEAR FEET OF ESS MANUALS!!! NOT COUNTING THE STACK RECEIVED SO FAR!
- Brought to you in the Cookbook by the Jolly Roger!!!!
- White Box Plans by the Jolly Roger
- Introduction:
- ------------
- The White Box is simply a portable Touch-Tone keypad. For more
- information on Touch-Tone, see my Silver Box Plans.
- Materials:
- ---------
- 1 Touch-Tone Keypad
- 1 Miniature 1000 to 8 Ohm Transformer
- (Radio Shack # 273-1380)
- 1 Standard 8 Ohm Speaker
- 2 9V Batteries
- 2 9V Battery Clips
- Procedure:
- ---------
- (1) Connect the Red Wire from the Transformer to either terminal on the
- Speaker.
- (2) Connect the White Wire from the Transformer to the other terminal on
- the Speaker.
- (3) Connect the Red Wire from one Battery Clip to the Black Wire from the other
- Battery Clip.
- (4) Connect the Red Wire from the second Battery Clip to the Green Wire
- from the Keypad.
- (5) Connect the Blue Wire from the Keypad to the Orange/Black Wire from
- the Keypad.
- (6) Connect the Black Wire from the first Battery Clip to the two above
- wires (Blue and Black/Orange).
- (7) Connect the Black Wire from the Keypad to the Blue Wire from the
- Transformer.
- (8) Connect the Red/Green Wire from the Keypad to the Green Wire from the
- Transformer.
- (9) Make sure the Black Wire from the Transformer and the remaining wires
- from the Keypad are free.
- (10) Hook up the Batteries.
- Optional:
- --------
- (1) Put it all in a case.
- (2) Add a Silver Box to it.
- Use:
- ---
- Just use it like a normal keypad, except put the speaker next to the
- receiver of the phone you're using.
- ---------------------Jolly Roger
- [Index to the Jolly Roger's Cookbook v 2.0]
- 000: Introduction by The Jolly Roger
- 001: Counterfeiting Money
- 002: Credit Card Fraud
- 003: Making Plastic Explosives from Bleach
- 004: Picking Master Locks
- 005: The Arts of Lockpicking I
- 006: The Arts of Lockpicking II
- 007: Solidox Bombs
- 008: High Tech Revenge: The Beigebox (NEW Revision 2.0)
- 009: CO2 Bombs
- 010: Thermite Bombs
- 011: Touch Explosives
- 012: Letter Bombs
- 013: Paint Bombs
- 014: Ways to send a car to HELL
- 015: Do ya hate school?
- 016: Phone related vandalism
- 017: Highway police radar jamming
- 018: Smoke Bombs
- 019: Mail Box Bombs
- 020: Hotwiring cars
- 021: Napalm
- 022: Fertilizer Bomb
- 023: Tennis Ball Bomb
- 024: Diskette Bombs
- 025: Unlisted Phone Numbers
- 026: Fuses
- 027: How to make Potassium Nitrate
- 028: Exploding Lightbulbs
- 029: Under water igniters
- 030: Home-brew blast cannon
- 031: Chemical Equivalency List
- 032: Phone Taps
- 033: Landmines
- 034: A different kind of Molitov Cocktail
- 035: Phone Systems Tutorial I
- 036: Phone Systems Tutorial II
- 037: Basic Alliance Teleconferencing
- 038: Aqua Box Plans
- 039: Hindenberg Bomb
- 040: How to Kill Someone with your Bare Hands
- 041: Phone Systems Tutorial III
- 042: Black Box Plans
- 043: The Blotto Box
- 044: Blowgun
- 045: Brown Box Plans
- 046: Calcium Carbide Bomb
- 047: More Ways to Send a Car to Hell
- 048: Ripping off Change Machines
- 049: Clear Box Plans
- 050: CNA Number Listing
- 051: Electronic Terrorism
- 052: How to Start a Conference w/o 2600hz or M-F
- 053: Dynamite
- 054: Auto Exhaust Flame Thower
- 055: How to Break into BBs Express
- 056: Firebomb
- 057: Fuse Bomb
- 058: Generic Bomb
- 059: Green Box Plans
- 060: Portable Grenade Launcher
- 061: Basic Hacking Tutorial I
- 062: Basic Hacking Tutorial II
- 063: Hacking DEC's
- 064: Harmless Bombs
- 065: Breaking into Houses
- 066: Hypnotism
- 067: Remote Informer Issue #1
- 068: Jackpotting ATM Machines
- 069: Jug Bomb
- 070: Fun at K-Mart
- 071: Mace Substitute
- 072: How to Grow Marijuana
- 073: Match Head Bomb
- 074: Terrorizing McDonalds
- 075: "Mentor's" Last Words
- 076: The Myth of the 2600hz Detector
- 077: Blue Box Plans
- 078: Napalm II
- 079: Nitroglycerin Recipe
- 080: Operation: Fuckup
- 081: Stealing Calls from Payphones
- 082: Pool Fun
- 083: Free Postage
- 084: Unstable Explosives
- 085: Weird Drugs
- 086: The Art of Carding
- 087: Recognizing Credit Cards
- 088: How to Get a New Identity
- 089: Remote Informer Issue #2
- 090: Remote Informer Issue #3
- 091: Remote Informer Issue #4
- 092: Remote Informer Issue #5
- 093: Phreaker's Guide to Loop Lines
- 094: Ma-Bell Tutorial
- 095: Getting Money out of Pay Phones
- 096: Computer-based PBX
- 097: PC-Pursuit Port Statistics
- 098: Pearl Box Plans
- 099: The Phreak File
- 100: Red Box Plans
- 101: RemObS
- 102: Scarlet Box Plans
- 103: Silver Box Plans
- 104: Bell Trashing
- 105: Canadian WATS Phonebook
- 106: Hacking TRW
- 107: Hacking VAX & UNIX
- 108: Verification Circuits
- 109: White Box Plans
- Call: ________ _
- / O / /\L RE/_/\LL <--- At (707)426-9512
- Sysop: The Bounty Hunter At 19.2 Dual Standard!
Add Comment
Please, Sign In to add comment