Top Banner

of 10

TAP Magazine - Issue #101

Apr 06, 2018

Download

Documents

GBPPR
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 8/3/2019 TAP Magazine - Issue #101

    1/10

    : 'II!!

    Iii\,

    IIII!IIIIIIIIIIIIPublished since 1971.

    $2.00

    ISSUE ONE HUNDRED AND ONE, VOLUME 15DECEMBER FIRST NINETEEN NINETY

    TRP MagazineP.O. BO H 20264louisui l le , Ky 40250-0264

    1----------------1SealndAlnmdmenl 1'bundaDcJn; I2500Nl: lhnh ' ' L M T. l i r l ' I ' ~ ' ' U l '. W A ~I

    I 0 Pk '_ 111"00 " ' 0 " ' " ' n ~un lhr Wm- AU\ .WJWUl r & n " ' ~-.ur Io fIr- _ run lhLt..d III oc.ht-r IJUbI.. Ul .. ! } Ulht"r.r. Il"l.... .~ on!he .. 1 I t r , .: 0 : ' 0 . , . 0 " " 01100 0""," I

    NAMl. -_ ._ . - - - - . .. - - - - - .___ __ _ _ II ~ - -.----.- - .- . ".-. -.----. .-- - - II C1n' - _- - _.. . _.. sTAn : . -- lU' - - - II \ , " i n " " ' ~ I f 'I . , ~ "loa" dr

  • 8/3/2019 TAP Magazine - Issue #101

    2/10

    Welcome;o i s sue 101 of T.A.P. Magazine. I know i t ha s beena long time s in ce t he l a s t i s sue : We h av e b ee n through afew changes. Aris to t le ha s r es ig ne d a s e d i t o r a nd h an de d th emagazine over t o me. Since i was th e pUblisher he f e l t iwould bes t be able t o pickup where he l e f t o f f . I plan onmaking some m aj or c ha ng es to th e magazine over th e nextyear. The f i r s t a nd m os t noticable i s each i s sue w i l l nowcos t money. Instead of j u s t paying fo r postage l ike in th epas t . I w i l l decide a cover pr ice fo r each i s sue dependingon th e s ize and conten t . Most a l l i s sues w i l l cos t $1.00 fo rUS c i t i z e n s and $2.00 fo r overseas. Terms a re CASH, pos ta lmoney o rd er , o r r eg ula r money order with th e payee l e f tblank. We w i l l not be ab le to t ake checks! They are j u s t tomuch t ime an d t rouble . The reason fo r a pr ice i s becausei s sues 99 & 100 took money from o ur p oc ke ts an d depleted th esupply of stamps we had. Also some of th e stamps were l o s tbecause someone put elmers glue on th e ones they sen t in andit made about t h i r t y dol la rs worth of stamps use less whensome water go t in to th e stamp supply. Someone l e f t t h e i rwindow down an d th e dew d id th e r e s t .

    Issues wil l be on a r eg ul ar b a si s of on e every 4 to 5 weeks.I f i get some a r t i c l e s mailed in th e i ss ue s w il l be outsooner. I f i have to obta in information fo r each i s suemyself it w i l l take longer. J u s t because you know something

    does not mean everyone e lse d oe s. S ha re you r knowledge andi n r et ur n you might j u s t g e t something back. To put it poin tblank i need everyone to wri te an a r t i c l e and MAIL it to me.I f you c a n ' t wri te an a r t i c l e send a newspaper c l ipp ing , abook, something to cont r ibu te . I f t h i s happens th e magazinew i l l e xp an d a nd be b e t t e r then it ever ha s in 15 y ears o fex is tence .

    TAP a lso ha s a BBS where th e s t a f f and other readers ca n bereached. So i f you want t o exchange information a l i t t l ef a s t e r then th e USPS c a l l 502/499-8933.

    How to modify a Uniden Bearcat 760xlt fo r 800 Mhz.By Anonymous/M.E.

    Note: This was taken o f f th e Arpanet.

    Netlanders:

    Concerning th e Uniden Bearcat 760xlt , th e mod fo r th e 950xlt doeswork to res to re l o s t freq. Disconnect p in 20 of the microprocessorfrom th e c i r c u i t board an d connect it to pi n 19 . I bent th e p ins l i g h t l y an d cu t i t with th e sc i s sors of a swiss army knife thensoldered an 1/ 8 lead c u t from a ca p across t he p in s near the top ofth e chip. I ' v e ye t to f ind a ny p ro bl em with t h i s mod. But as alwaysdo so a t your own r i s k . 73 (Packet Radio Address Deleted)

    o

    t1 h ~ hiSlIs - By: The CyClone

    Nowadays the truth is hard t o c om e by. Politicians are lyingl neighborsan d friends do it to o an d even the government an d the President do theirshare of lying. Itis very difficult to determine what the 'truth isin our deceptivesociety. Be a Hacker I do what you wont. wh o really cares anyhow? Readon my hacker friend. The truth lies near.

    Exactly what is an elite person 00 0 ho w do they ge t to be that way? I

    know It I s no t alWays a good idea to present a rhetoric quest ion in an essovbu t I figured It would be a quick an d urmlstakable thesis to oecipber. so letus proceed with w h at w e have.

    I've known three people personally before an d after they became elitean d bo y Istherea difference. The firstelite hacker I ever knew was The Whiza rd. He dropped o ut o f FSU his first year -actually he go t kicked out, bu t thatis another story. In 1986 1111mi d 1987 The Whlzard was a decent person. Hewould trade and talk to average hackers, which was helpful to people likeme. The Whlzord In mi d 1987 pu t L4> a Commodore 64 BBS an d started coning It aUte. The Deth Dungeon (sp?) was the BBS's name which shortty became known country w id e t o other elites. Atter The Whizard became eUte hestarted bragging a nd o f course ctid ettte things like carding an d h ac ki ng . Intnis process I sow a generous fT1end become a money/power hungry bastard. Onlyat ter he go t busted for carding (seUing cradlt card numbers that is)did he come down from tis ' totem poe.'

    Case #2 is a person by the name ot Badd Boy. We traded a few waresan d went to a copy party before elite fever broke ( li te ra ll y) out. He was a-simpleton until he started phreaklng to make a name tor himsel f. He was ina group called The Survivorsdefinitely a to p five group in 1988. Badd Boyfeltme powerand succumbed to the greed. Bragging set In an d weU.there wasa peek. Lucidly Badd Boy d id n ot totally succumb t o t he greed like otherhackers -h e didcare a lIt11e. In May 1988 tw o days before the great southerncopy party (which was canceled) Badd Boy go t busted for some majorphreaking. I twas a bi g bust (SSO,(DJ worth of caDs made) an d hurt Badd Boypretty ba d aUhough he is ddng ok- nowadays.

    Case #3 was another typical lamer gone e li te . A 'boy' (around lS asmoststarting hackers are) by th e name of Flyboy used to cal l loca l boards an dpost tots of ~ a s-arade with anyone. I traded with him for awhile untilhe did no t return some of my disks . He was a typical nice person until he discovered p hf ea ki ng . He phreaked, became elite an d shunned away fromeiamers. Flyboy seemed all powerful, sometimes b ra g ge d a n d took to thehigh roads. He pu t up a BBS called Fabulous Disaster I an Exodus board (h esomehow go t into th e group). He would'nt consider t al ki ng to a lamer uniessthey ha d somefhjng he needed -h e was to good tor t ha t. I' m not SLre whatever happened to Flyboy bu t I'm pretty sure his board Is no w obsolete.

    In these three case I a m n ot whining because I couldn't ge t anything offtnese people (although It ma y seem this w ay t o a p er so n who cots himselfelite) I I am sjmpty presenting my point of view. It is sort of like schizophrenial Imean these peop le were qu it e n ice an d generous when they ha d Uttiel bu twhen encompassed with wealth an d power things changed.

    People ar e people an d they all seem to be th e s am e. Look around younow. an d then look around when you ar e a mil lion or tw o dollars richer. Didanything change? Wonder why?

    M.E. Note: I f an y member o f the Outlaw Telecommandos sees t h i s mag o r i fanyone knows how to reach these people, p le a se c o nt ac t TAP Magazine.

    - ~ - - -_ . ._ - - - - - - - - " _ ." .. ~ _ " ' .. ._ _ A l . - . . ~

  • 8/3/2019 TAP Magazine - Issue #101

    3/10

    BREAK THE SYSTEMWIN-$25,000 BEARCAT 200XLT CELLULAR FREQUENCY RESTORATIONBy Anonymous/M.E.

    The TymCard25,000 CHALLENGE

    NOTES

    IQ, Inc . , i s about to re lease an an t i - f r aud "smartcard" cal led TymCard, t o be used by long distance telephonecompanies to help el iminate cal l ing c ar d f ra ud . We bel ive ou rproduct t o be unbeatable . To detect an y possible flaws i n ou rsystem. IQ , Inc . , i s offer ing a prize of $25,000 to th e f i r s t personwho ca n demonstrate t h a t he or sh e h as been able to access th esystem, a t any t ime, by being able to generate a va l id code a tw i l l . Accessing th e system DOES NOT mean "breaking" on e or moreex i s t ing TymCards as t h a t o nl y a ll ow s temporary and i n s ign i f i can taccess t o th e system.

    I t i s unlawful t o monitor c e l l u l a r t e lephone conversa t ions .I t i s ~ o s s i b l et o monitor s igna ls from t he d el et ed rangeseven W1thout conversion. Simply ad d 21.7 MHZ to t h e d e le t edfrequency an d e n t e r th e higher (image) f re qu en cy. R ec ep ti oni s v i r t u a l l y ident ica l i n s tr en g th t o th at which would beheard on th e de le ted frequency.

    The frequencies dele ted a t th e factory may be res tored , bu tth e p r oc e du r e s h ou l d no t be attempted by anyone unfamiliarwith e lec t ron ic c i r c u i t r y. No on e a n ~ h e r e ,anytime, ina n y w a ~ ,e tc . . . a ss um es a ny r e sp o n si b 1l i ty f o r damage causedby th1s procedure.

    EXAMPLE: I f yo u knew th e numbers of on e or more TELECO ca l l ingcards , you would be able to make long distance c a l l s t h a t w ou ld becharged to t h a t card- u n t i l you were discovered- and t ha t numberwas deacivated. I f ,however, you had a I'Blue box", you woul d be ableto make c a l l s a t any t ime. You were able t o "break th e system"without need fo r any ca l l ing numbers. The only permanent so lu t ion ,as fa r as TELECO was concerned, was to change th e system which, ineffec t , "deact ivated" th e B lu e b ox .

    THIS MODIFICATION WILL VOID YOUR WARRANTY!

    TOOLS

    Small Phi l ips ScrewdriverSmall Wire Cutters

    MODIFICATION

    DISASSEMBLYA c on di ti on o f t h i s chal lenge i s t h a t you supply t o I Q, In c. , t he

    d e t a i l s on how you were able to "crack th e system" and a s s i s tIQ.Inc. , to cor rec t th e flaw.

    Each respondant to t h i s chal lenge wi l l be invi ted t o a meetingwith members of ou r s t a f f . At t h i s meeting you wi l l b e given muchmore technical information about TymCard as w ell as a d e cr ip ti on o ft he s e rv i ce .

    P le as e n ot e tha t there i s absolute ly an d pos i t iv ly no charge t oyou to accept t h i s chal lenge. I f you des i r e t o "borrow" an act iveTymCard t h a t wi l l allow you to t e s t th e system a t an y time, we as kfo r 50.00 cash deposi t . This deposi t wi l l be re turned to you, infUll , upon th e TymCard being re turned to IQ. , Inc, as agreed.

    1 .

    2.

    3 .

    4 .

    Sl ide of f th e ba t te ry pack a nd r em ov e your antenna.

    Remove th e two screws from th e back of th e s ca nn er , t h e two screwswhich hold t he b a tt er r e ta i ni ng spring a t th e base, and th eb a t t e r y re ta in ing spr1ng i t s e l f .

    Carefully pr y th e bottom of th e rear cover from th e radio andremove th e cover.

    Locate th e two small screws a t th e base of the c i r c u i t board andremove them. Gently p u l l th e f ron t panel from th e mainframe a tth e base and separa te them.

    On th e face of th e c i r c u i t board t h a t faces the f ro nt of the

    scanner when i n s t a l l e d , l oc at e t he microprocessor IC labeled"UNIDEN UC-1147". Locate th e 10K ohm r e s i s t o r (brown, black,orange), which i s posit ioned approx imate ly a long t h e l o ng i tu d in a lcen te r l ine of th e board, and next to th e microprocessor. Ther e s i s t o r i s of t he l ea d le s s type and should be posit ioned di rec t lynext to th e microprocessor and above th e "DEN" on th e IC label .

    Using th e s ma ll w ir e cut te rs , c ut th e r e s i s t o r body in two withoutdis turb ing a n yt hi ng n e xt t o i t . I f th e l e f t so lder pa d comesloose, i t may b e peeled from th e board. Brush o r blow away an ydebr i s . This completes th e res tora t ion .

    6.

    5.

    ===============================================================

    Typed by TECHNO-COWBOY

    ===============================================================I f you ar e interested, please c a l l (818) 592-0423

    fo r more informat ion as to th e t ime an d locat ion of th e next meeting.

    NOTE: I f you a re n ot l oc a te d in the Los Angeles a re a p le as e c a l lth e number t o arrang fo r complete informat ion to be sen t to you bymail .

    Oc t 1990 REASSEMBLY

    Continued Next Page

    c _J

  • 8/3/2019 TAP Magazine - Issue #101

    4/10

    ~ - - - - - - - -CHECK OUT

    AKNOWLEDGEMENTS-----------------

    DON - The D ef e ns e D at a Network

    Beyond MILNET the re were a l so been es tab l i sh t hr ee o th er military nets underth e a us p ic es o f th e Defense Secure NETwork (DSNET). The th ree were DSNETlf or S ec re t d at a, DSNET2 fo r Top S e cr et d a ta , and DSNET3 f or s pe ci al Top

    Secret data (probably weapons systems and plans, an d ELINT/SIGINT systems -bu t t h a t is only a guess ) . These th ree each had a separa te communicationshub including loca l an d widearea ne t s . The 3 DSNETS h av e b ee n combined (arebeing combined) in a uni f i ed DISNET (Defense I n t e g ra t e d S e c ur i ty NETwork).

    The Defense Communication Agency (DCA) was pu t in charge of maintaining th ebackbones of th e defense networks (except ARPANET which is primarily used byth e R&D community an d is maintained by DARPA an d is no t rea l ly associatedwith DDN) as par t of th e Defense Communication System (DCS). Al l DON Netsar e no t par t ( o f f i c i a l l y ) of InterNET because of th e s e cu r it y r is k sinvolved.

    The DoD (Dept of D ef en se ) h as been maintaining i t s own separate networksever s ince ARPANET became a success an d was "gobbled up" by th e growingInterNET s t ruc ture . The 00 0 wanted to be able to secure i t s important workand research an d to do so i t needed to be i so la ted from th e ex i s t ingin f ras t ruc ture . They decided t h a t a s om ew ha t free flow o f i n fo r m at i on wouldbe necessary between consti tuents and t h a t some kind o f framework s imi la r toIn te rne t w ou ld be benef ic ia l bu t t h a t access to t h e i r systems would have tobe l imi ted by m ea ns m or e secure than anything available on th e pUblicIn te rne t system. They developed MILNET fo r t h i s spec i f i c purpose (t o car ryunclassified data t r a f f i c between defense con t rac to r s an d resea rchers ) .

    The Department of Defense s t a r t e d th e majo r ne tworking scene in th e US inth e l a t e '70s an d early 80s. Their f i r s t baby was ARPANET (AdvancedResearch Pro jec t s Agency NETwork). I t was j u s t a development system to se ehow feasible a na t iona l compu te r ne twork would be an d to help f a c i l l i t a t einformation t r a n s f e r between defense resea rchers (and some univers i typro jec t s ) . The world of InterNET ha s g ro wn up around t h a t existingfoundation to become one of th e most (THE most?) used network in the worldas researchers in o t he r n at i on s found they also needed access tocoun te rpa r t s around th e nation to exchange knOWledge and ideas . Well to en dt h i s simple his to ry I wil l ge t back to th e DON an d i t s workings (what l i t t l eI do r e a l l y know of t he m) a nd i t s t ruc ture .

    [a member of Hysterion Grp]\11

    Star -* - Fi re11 \

    By

    - - - - - - - - - - - - - - - - - - -- - - - - - - - - - - - - - - - - - -- - - - - - - - - - - - - - - - - - -- - - - - - - - - - - - - - - - - - -- - - - - - - -nser t t he t op of t he f ro nt panel in to th e s l o t under th evolume/squelch control panel and, noting carefUlly th e alignmentof th e dual - in l ine connector a t th e bottom of th e board, p re ss t hef ron t panel firmly in to place. Be sure tha t th e holes a t th ebottom of th e c i r c u i t board l ine up with t he h ol es in th e p l a s t i cstandoffs be low them. Inser t th e two screws and gently t igh tenhem.

    Replace th e back Cover by i n se r ti n g t h e to p of th e cover in to th es l o t under th e volume/squelch c on tr ol p an el : p re ss t he cover intoplace, inser t and t igh ten th e screws.

    Reposition th e ba t te ry re ta in ing spring ( s lo t ted s ide towardnotched hole) , inser t th e two r em ai ni n g s cr ew s a nd gently bu tsecurely t igh ten them.

    Slide th e bat te ry pack in to place: switch th e scanner on to make

    s ur e t he d is p la y comes on . I f n ot , t he bat te ry i s discharged orth e dual - in l ine connector was misaligned during aSsembly (see s tep).

    Assuming t he d is p la y comes on , press: MANuAL, 845.0, E; within twoseconds th e f r equency 845.000 shou ld appear on t he d is p la y.

    7.

    8.

    9.

    10 .

    Diagram of DDN:

    11 .

    MONITORING TIMES140 Dog Branch RoadBrass town, North Carolina 28902

    The Monitoring Times s e l l s bet ter ins t ruc t ions on how to dot h i s , i f you wish to obtain them, send a check fo r $2.00 anda stamped self-addressed envelope to th e above address.

    - - . -- - . - - .. - - - - - - - -_ . _ ~DDN - The Defense Data Network -. . . ______

    Continued Next Page

    DATA INTEGRITY - pro tec t s aga ins t (OR ATLEAST TRYS TO DETECT) unauthorized

    The restructuring o f DON in to DISNET i s a con t inua l ly evolving project( es pe ci al ly i n t he a re a of Defense Messaging Syst em - which I know l i t t l eabout a t t h is t ime an d WOULD LIKE TO SEE MORE INFO about i f anyone knowsabout it ), bu t I w i l l explain i t s s t ruc ture as presen t ly l a id ou t . . .

    " (1 ) Security arch i tec tu re should include a well-defined s e t of network

    secur i ty s e rv i ce s o f fe r ed to subsc r ibe r s"Services:CONFIDENTIALITY:

    1.Mandatory Confidentiali ty - pro tec t s c l a s s i f i e d data using DDN. ru le based secur i ty

    2.Discretionary Confid. - iden t i ty based (Need-to-Know) security3.Traffic Flow Confid. - protects aga ins t d i sc losure by observing

    \ c h a r a c t e r i s t i c s of data flow' Se e th e encrypthion and commun i ti e s desc r ip t ions below fo r

    more on t h i s .

    MILNETMCsite

    Bridge/HOST - - I '- - I

    - I - \I ARPANET I

    \ - - - - I

    *

    **

    *

    Terminal

    MC

    HOST

    Communi ty MC- ~ - - - - - - - - - - - - -

    - - - - \ - - , - - -/subSCr iber j I\ / \ IHOST/Gate - - - - - - E3>----1 DISNET 1---IE3way - I \ /- / I ~

    I

    TAC with / I \ ITACACS -- E3>----+

    -/ I 1 ' \I _ / E3 \

    S&R DISNET I _I I 1'\----1 __MC MCsite I _I I I E3 \ _ *

    HOST - - - - - - - I -I /' \ - - - / - - - IE31-- --- / I \ ! - I ~ _ : 3 1 - - ~ - 1E3j_KD_C :I E3 \ ACC

    _ _ _ _ _ -_-1_--_-_j i ~ ~ ~ ~ S/-- *IName Server HOST I _HOST_ ..

    l

    .'1I i

  • 8/3/2019 TAP Magazine - Issue #101

    5/10

    c ha ng es o f data

    IDENTIFICATION, AUTHENTICATION, AND ACCESS CONTROL: *1 . I d e n t i f i c a t i o n - s t anda rd name fo r e a ch s y st e m e n t i t y ( j u s t l ike

    every ne t .2 .Authen t i ca t ion - ensures t h a t a s t a t e d iden t i ty i s cor rec t (HOW???)3.Access Cont ro l - l imi t s system resources to a cor rec t ly i d e n t i f i e d

    system

    " (2 ) S ub sc ri be rs s ho ul d n ot pay fo r o r be hampered by unneedded secur i ty"~ ' - - - - - -In te res t ing . who does pa y fo r un-needed secur i ty t hen? !?

    PROV/ PE P DY ITHE. DMOCR u1\TIC .FREEP O P L ~~ R T / ~ T 1AND WAITERSGOLLCCTIVC 0' $ ~ T U I C I M YTN I f , ~

    INc. el'S'. ~ L LG"ME PR.CSAVCD

    QUE5110Jts"X71\1f)4 N 5 W ~ R S~ ~ O U T T I ! \ ~

    Host t o Host Encryption:DISNET uses a end-to-end encryption system (E3) ca l l ed BLACKER. These ar ei n s t a l l e d on each hos t - to - swi t ch path of a l l hos t s i nc lud ing TACs. TheseBLACKER f ron t en d devices (BFEs) encrypt a l l data p ac ke ts b ut l ea ve th e X.25header unencrypted fo r th e backbone to use. The BLACKER system i nc ludes aKey Dis t r ibu t - ion Center (KDC) and Access C o n tr o l C e nt e r (ACC) hos t s .BLACKER is a Class Al System (under th e Trusted Computer System Evaluat ionC r i t e r i a / " Or an ge B oo k" ) , a nd it w i l l be able to prevent a community Mef rom communicating with o the r Mes in o the r communities: t h i s wil l no t happenfo r a while and th e MC s i t e s wil l s t i l l have a t e rmina l through a TACd i r e c t l y to a s w i tc h w i th o ut going through BFE.

    TAC Access Control Systems (TACACS) - prompt use r to l og in a t a TAC

    Terminal Access Cont ro l l e r s (TACs) - more l imi t ed DDN se rv ice . Insteadof a d i r e c t Host-to-switch connect ion you ca n connect to aTAC (v i a d ia l -up ) and be a dd re ss ed a s a t e rmina l by DDNthrough TAC. TAC uses TELNET pro toco l so t e rmina l ca ncommunicate with a second DDN Host as i f d i r e c t l y connected.

    P r i o r i t y Access:Al l DON switches c an h a nd le da ta p a c k et s a c co r di n g to 4 l eve l hierarchysystem. precedence l ave l s ar e as s igned t o hos t s and terminals by th e J o i n tChiefs of S t a f f . To my knOWledge t h i s h a s n ' t been implemented ye t .

    Spec ia l Hosts:M o nt i to r C e nt e rs (MC) : they manage th e swi t ches , t runks , and o the r

    s p ec i al h o s ts .Name Server hos t s - they t r a n s l a t ~th e addresses of th e o th er h os ts

    STRUCTURE OF THE DDN :The primary elements ar e computers ca l l ed switches which communicatev ia in te r- swi tch t runks . (DCA owns th e swi t ches and l ea ses most t runks)

    Each subsc r ibe r connects to DDN as a HOST or a TERMINAL. DDN s er v es h o st sa t th e 051 (Open Systems Interconnect) network l eve l ; th e Host - Switchi n t e r f a c e i s th e s t anda rd X.25 (CCITT). Many of t he h os ts ar e gateways toother nets (mainly LANs) and th e number of gateways is i nc reas ing .

    " " (4 ) S u bs c ri b er s should share r e s p o n s i b i l i t y fo r secur i ty where appropr ia te" < - - - - COULD THIS BE A MAJOR DOWNFALL?? Hmm . . .

    * - As fo r I ,A, and AC(above) These s e rv i ce s a r e s u b sc r ib e r responsi b i l i t y except fo r m ajor c om mu n it i e s and subcommunities.

    Bridges between Nets:The plan c a l l s fo r l imited ga t ewa ys be tw een MILNET and DISNET to al lowunc lass i f i ed da ta t r a f f i c ( in th e form of s to re -and - fo rward e lec t ron ic mailin both d i r e c t i o n s ) . Data en te r ing DISNET from MILNET wil l be i d e n t i f i e d as

    ..... - " '-';;'~ ~ ~ . " ' '''''' -

  • 8/3/2019 TAP Magazine - Issue #101

    6/10

    )

    JI M R A L I Z f ~~ N E E D ~+ f L ~BUT DOESN'T KNOW

    WHERE TO TURN

    W h a t i s a n E R P ?

    The EmployeeAesistanceProgramis a suppal1-network- of disgruntled employeeslike yourseH. The EAP providesan ouuet forthe 'rusIralions of everyday workinglife which, it allowed10 build up, can breakone's spiritor eventriggera psychotic episode.

    W h y does mycompany have an ER P?

    Becauseit doesn't knowit hasone. EAPs quiettyspringup in thetertilesoil ofbadworkingconditions. Random drugtesting,constanttoadying,

    and Orwellian methodsof surveillancecontributeto a shiny workenvironment.An estimated 950/.0'aU jobs include some or aU of these elements.Yourcompany almosl certainlyhasan ERP.

    How does the ERP work1It begins spontaneously,when one employeehashad hiSorher till ofthe everyday -buUshitheor shemust submItto just to stay alive. firstcome peny acts of sabotageand theft otcompany resourcesand time(for example.thisbrochurewas created at the workplace,on company time).and 'rom there it escalates.Workersare encouraged to add personaltouchesto theERP. Creativityis key. Manyworkers. evenwithout coordinating activities. can wreak maiorhavoc.from whichthe company mayneverrecover . Methods vary fromone employeeto thenext.so no discernible pattern emergesto tip ot1corporatetroubleshooters. Thissystemisvinually foolproof.

    Is th e ERP really confidential1Itmustbe; we'vestillgot ourjobs. Sincetheemployeeworksalone. theonly risk 0'discoverycomesthroughcarelessness. A workersuccessfulin usingthe ERP may be temptedto brag to hisor herfellows, who might becorporate stooges. Ego massaging SUCh asthis throws confidentiality out the windowandthe employee out thedoor. ee carefullAsWilliam Casey.the late CIAchief, said.-rwocan keep a secret if oneof them isdead.-

    W h y isa program likethis needed1

    TheERPis neededto help vidimizedemployeespass back to theemployerthe high psychiccosts of enduringdailytheorganiZeddegradation thai is work.Corporationsthat fail to recognizethissuiter'rom terminal rotand aredestroyedbythe ERP.out of mercy.Thus,the ERPbenefits employeeandemployeralike .

    W h a t kinds of problems does th eEAP assist individuals with 1

    Thereare a wide range ofproblems. allstemmingfroman employe(s neuroticneedfor controtover everyaspect 0'anemployee's ~ f eonthe job or 0"it. Thisconstantpryingcausesdrug and alcoholabuse. 'amlly discord, depression. trauma.financial strain,and emotionaldisorders.

    W h a t about family members?

    Family membersshould apply theERPtotheir own lives. They shouldoUeradvice.encouragement, and, most ot al" an oasis01 sanityto which theemployeecanescape at day'send.

    H o w do I enter the ER P program 7

    You enterby takingthattirststep, howeversmall. towards fighttngback.One evening,youand your friends aresiltingon theporch. -shoaling the shit.- Havingexhaustedthe usualtopics of women,sports, and

    the GreenhouseEffect. youbegin swapping storiesabout the job.As you drink,your pent-up rage al your jobrisestowardthe suriace. Someone relatesa classictateof -really fucking ove'- theboss. Nowon your tenlh beer, youhearmost otitbetore passingout. Badly hungoverthenext morning, your headin thetoilet,youremember ~ n l e .Butyoureaize thai youriob is anendless stringat such mornings.And another ~ n kis 'orged.

    A m I responsible for paymentfor these services 1

    No way. Thisstrictly a public service.

    provided by people likeyourself, whowant 10 seean obsoletecorporateordersquashed ike a turd undera tennisshoe.In anycase. what couldwe charge.or?Thisis largelya doityourseltprogram,asortof PopUlar Mechanax projectyou cookup in thebasementot your mind. It youpayanyone,pay yourself:you'veearned it.

  • 8/3/2019 TAP Magazine - Issue #101

    7/10

    1'1-1

    1]j:

    Ii,jI,I

    III)

    !I

    American Telephone & Telegraph SECURITY DIVISION

    what you want todisconnect isthe wire supplying the codes to the telephone company sothat the payphone will not get the 'busy' or 'hang-up' command.leave this wire disconnected when you discover it.

    DDN p lans to seg rega te subsc r ibe rs according to whether or n ot t he y meet th eTCSEC C2 requirement . Conforming sys tems com pr i se a Trusted Subcommunity

    within each secur i ty l e v e l . Within t h i s subcommunity hos t s ca n freelycommunicate. NonConforming systems with waivers wil l form Closedcommunities within each l eve l . Direc t ne t communicat ions betweensubcommunities wil l be prevented by switching l og ic in MILNET and by BLACKERin DISNET except over t rus ted bridges.

    such by th e bridge.The DON plans forbid a subscriber from connect ing to both MILNET and DISNETand a l so fo rb ids 00 0 system to c on n ec t b ot h to a DDN segment and to asegment t h a t does no t conform to DON secur i ty s t r u c t u r e .

    This information brought to you by Myster ion Group

    Other s t u f f :To i n su re t h a t every subscriber system can e x e rc i s e d i s c re t i on a r y accesscon t ro l over i t s r e sou rces through DON, and of DON r e so u rc e s v i a th esubscriber system, DON requires t h a t a l l subscribers be TCSEC Class C2secu re . By september '9 2 any non-complying system wil l need OSD and JCSwaivers or DCA ca n remove them from th e Net.

    what will happen: anytime that someone puts any amount of money into the pay phone, the deposit willnat register with the phone company and it will be held in the 'temporary' chamber of the pay phone.

    then, (aday later or so) you just code back to the phone, reconnect the wire,and dick the hook a few timesand thc phone will dump itall out the shute.

    (what is happening i s that the 'hangup' code thatthe phone was not receiving due to the wire beingdisconnected suddenly getsthe codeand dumps its' 'temporary' storagespot.

    you can make a nice amount ofmoneythis way, but remember tha t a repairman will stop by every fewt imes i t i s reportedbrokenand repair i t, socheck i ta t least once a day .

    free pay telephone calling!i will now sharewith you my experiences with pay telephones. you will discover thatit ispossible toget

    money [rom a pay phone with a minimum of effort.

    theory: most pay phones usc four wires for the transmission of data and codes to the central office. two ofthem are used for voice(usuallyred and green), one is a ground, and the las t i susedwi th the others for thetransmission of codes.

    i t i s with this las t wire that you wil l be workingwi th . on the pay phode that i usually did this to, it wascolored purple, but most likely will be another color.

    what you wil ldo is simply f ind a pay phone which has exposed wires, such that one of them can be discon-nectedand connectedat ease without fear ofdiscovery.you will discover that it i susual lya good idea tohave some electrical tape along with you and some tool for

    cutting this tape.through trial and error,you will disconnect one wire at a time starting with the wiresdifferent thangreen andred. you do want a dial tone during this operation.

    - - @ ~. ~ - - _................

    GEE,SOUNDS

    .LIK T+fEI:RP REALL. Y

    \

    CA N . IHELP.

    Who do I talk to when I havea problem 1Your friends, mostly (exceplthose at yourjob, unlessyou're,eallysure).Anyonewhohas someintegrityandan ideaofhow I;'ereallywolks. Do some reading. Try RaoulVaneighem's -The Revolution ofEvetydayUfe,- BobBlack's-Abolish WOIk,-thePranksissueof ReSearch Magazine, or TheSituationist International Anthology, ed. by BenKnabb.Oonl passup "TheBookof theSub.genius ($12 ppdto World SUbgeniusFoundation, P.O Box 140306, Dallas,TX75214). Youare not aone. We',e a,ound he,esomewhere.

    W h a t can I expecton my initial visit1

    Visit? What are you talking about? Perhaps youare concernedthat Ihe ERPpromotesviolence.Not so. TheERPcalls torthe employeeto put alittlepressureon a toneringsystem,then jumpoutof thewayasit collapses. Andsellthr) piecestor scrap.We do get ourshareof nerds(ERPieswecalilhem) . II's unavoidable. Ignoremem,

    When can I ccntacttne ERP network?Theoretically, anytime of theday or night isacceptable. Manyin ourprogram,byvirtueofthejobs Ihal drovethemto us in thefirstplace,keep odd hours.When it comes 10 planningsomeERP tactics, a midnightmeelingcan bevery conducive 10 the flowof creativeideas.

    ,II,

    enjoy and have fun.. many phones i have done this to, and it workswell with each.. ifthereis interest,i dohave informationon hard wiringto other phone lines...

  • 8/3/2019 TAP Magazine - Issue #101

    8/10

    TAP Magazine Issue 1101 November 1990

    I have heard t ha t nintendo games us e a means of copyprotect ion. They have d i f f e r en t eproms on a bo ut e ve ry 1,000ca r t r i dges made. Thus making each l o t d i f f e r en t from a l l th eothers . I f you ha d a way to copy th e eproms an d burn them

    D ea r D ay to n,

    I would l i ke to know i f i t ' s possible to copy o r p i r a t enintendo games?TAP Reply,

    Dayton, OH

    I was wondering i f i t ' s poss ib le t o make a universa l garagedoor opener. Like th e TV remotes t ha t a re u ni ve rs a l an d workon any TV. This would allow you t o open someones garagewi thout having a cer ta in opener.

    Aust in , TX

    I don ' t know th e exact f requencies t h a t garage door openersru n on , b ut i woul d as sume tha t o nc e f ou nd you could make anadjus table one with a knob of some kind to increase o rdecrease th e range. I f any reader ca n h el p p le a se send th erange th e frequencies ru n in , o r help on how t h i s could bedone.

    Dear TAP,

    Dear TAP,

    Issue 97 was ou r f i r s t attempt a t t he d ig es t s i ze i ssue andwe l iked it a l o t be t t e r also . To answer your ques t ions abouta commodore . The modem t ha t ha s th e most hacking andphreaking sof tware wri t ten fo r i t i s th e c1670 modem. I t i smade by commodore. They range i n p ri ce f rom 50-SO do l l a r s . I tdepends on i f you bUy it l o ca l l y o r mail order. You wouldalso want t o g et a 1541 disk dr ive , many programs won't workwith a cas se t t e tape . T ha t s ho ul d get you headed in th e r i gh tdirect ion. I a ls o t hi nk you wi l l f ind "Phoneman" a very goodte rminal program. I t ha s many d i f f e r en t t o ne e m ul at or s fo rcolored boxes.

    Dear Aust in ,

    Dear TAP,

    I go t TAP 19 7 l a s t week and GREATLY enjoyed reading i t .Highly informative. I wouldn ' t consider myself a hacker, bu tyour a r t i c l e "A beginners guide to hacking" makes it verya l lu r ing (however, my hardware c ons i s t s of a commodore 64with a VI C- 20 modem and casset te t a pe s o ft w a re ) . I s t h e r e anyhope? Should i change modems? The other a r t i c l e s were alsoinformative; I ' ve al ready succeeded with th e "Redneck Penny."

    In t h i s i ssue we wi l l t r y and answer some ques t ions an d th eones we c a n ' t we hope t ha t ou r readers can . So enjoy.

    The SolutionAJ security modems aloneor with the AJ Data*Safe.Affordable and sophisticatedHacker Zappers fromAnderson Jacobson.

    1::::Dncryption-EvenElectronic MailIf you need encryption, th eAJ Data*Safe provides DES

    No Data SecurityProblem is Too ToughWith powerful weapons likeCallback, Answerback, andEncryption, AJ Hacker Zappers will tackle your toughestdata communications security

    __ cker Zappers~ unever know when hackers will strike.

    Sometimes they just nibble, ' problems-from PC security (Government approved) en-away;other times they to remote call-in diagnostics. cryption for file transfers andattack full force, WlSbfu} PC files. Even electronic

    thinking won'tstop them, and AJ Hacker Zapper mail.Use the AJ Data*Safe tomost dial-up modems openyour Security Modems encrypt your electronic mailsystem to anyone dialing the Th e AJ 2412.AD3H an d AJ messages an d your mail willright telephone number. 2441.1. 2400 bps, "Kf"com- be unintelligible t o m ailboxWhat you need is the AJ Hacker patible, HackerZapper mod- snoops.zappers-security modems and ems with Callback,Answer-encryption devices ready and back, and Passwords. With upable to protect your data files to 200 Callback numbers plusfrom intruders. optional MNP 4 or 5, th e rack

    mountable AJ 2441-1 is un- .heatable for central sitesecurity.

    1

    I",

    ~Continued next page

    I have writ ten many a r t i c l e s now do -i gera i em put>l1.sne

  • 8/3/2019 TAP Magazine - Issue #101

    9/10

    I

    into a blank one i guess it would work. But i f they have copyprotect ion b u i l t in you wou ld have to f ind a way to bypassi t .

    Dear TAP,

    Why don ' t you a l l p ut o ut an onl ine type magazine l i ke Phrackor ATI does?

    TAP R ~ p l y ,

    We have been th inking a bo u t d oi ng t h i s fo r a few months now.As soon as a l l th e s t a f f ha s a c om p ut e r a nd a modem we mightat tempt something. I t would have to be d i ffe ren t from a l l th er e s t though.

    Dear TAP,

    Was t h a t r ea l ly a picture of you guys on th e cover of i ssue99 ?

    TAP Reply,

    No pe , we found t h a t picture on a te lephone po l l , bu t thoughtwhat th e h e l l , it would make a fancy cover.

    Dear TAP,

    How come 2600 never mentions you as being another hackerpubl icat ion in t h e i ~mag?

    TAP Reply,

    Ask Eric Corley i don ' t know .

    Dear TAP,

    How ca n you pUblish t h i s s tu ff without th e PHeds a r re s t ingyou fo r doing i t ?

    TAP Reply,

    We gave them some donuts f i l l e d with brainwashing grape j e l l y

    an d they don ' t know we e x i s t .

    Dear TAP,

    How ca n you g uy s p U bl is h f or f re e? I l i k e th e mag and enjoyreading it bu t wonder how you guys do i t ?

    Arizona

    Dear Arizona,

    TAP used t o be free when i t was j u s t a news le t t e r, bu t s ince weh av e g on e to th e diges t /magazine s i ze it costs to much to giveaway f r ee .

    Dear TAP,

    Continued Next Page

    y gTAP magazine?

    Milwaukee, WI

    Dear Milwaukee,

    We would l ik e to get many a r t i c l e from ou r readers . We c a n ' tp r i n t them a l l , some might no t f i t ou r format or be up t o pa rwith what we would use , bu t f ee l f re e t o s en d u s anything youthink we might l i ke reading. Newspaper cl ippings ca n also beuseful t o l e t us know whats going on in your a rea .

    Dear TAP,

    with a l l th e s t u f f a b ou t O p er at io n S u nd e vi l why d i d n ' t youh av e a ny info on i t ?

    Dallas , TX

    Dear Dallas ,

    We thought s ince it was in and on most everything e l se wewould save you from t he e f f o r t o f r ea di ng it a l l o v e r again .We cannot take a s ta nd u nl es s we know both s ides of t he s to ryan d with th e federal cover up s and changing s t o r i e s everyweek we j u s t se e it as another massive scare t a c t i c . I f fo rsome reason you h av e b ee n on an is land or in a cave you ca nfind info on Sundevil in CUD, 2600, Phrack, newspapers an dj u s t a bo u t e ve ry onl ine service ou t t he re .

    Contrary t o popular b e l i e f , th e American hackers have no t l o s tth e crav ing fo r knowledge t h a t ha s made us hackers. Althoughmost people seem to think t h a t th e europeans and japanese havesurpassed th e u.s. in the ques t fo r knOWledge and l ea rn ings p i r i t . Hacking i s a l ive and well in the good 01' u.s. of A.We m ig ht b e a b i t cautious because of the recen t deter iora t ionof ou r r i g h t s an d th e o ve r z ea lo us a c t i v i t i e s of th e nazi - l ikeS.S. (U.S. Secre t S er vi ce ) b ut t h a t i s j u s t th e Americani n s t i n c t f or s u rv iv al . I f th e u.s. hackers were as open abouthacking as in th e ol d days, th e 5.5 . an d every other la wenforcement o f f i c i a l looking fo r a promotion would sure lyt a rg e t th e "EVIL" hackers fo r another " l e t s take away t h e i r

    r ig h ts " s es si on . I t i s only log ica l t h a t we, th e hackers,should t ake cer ta in precau t ions t o p ro te ct ou r privacy andfreedom. While the l esser of ou r community ha$ to r e t r e a tin to th e " I t ' s j u s t not l ike th e 70 ' s anymore" syndrome, th eREAL hackers ha ve be en b us y probing an d pondering th ea sp ec ts o f a l l th e newest technology.

    The fu ture i s now! And we in th e future have a l l th e bes ttoys . Of ou r favor i te a re th e w ir ele ss t e l ephones .Among th e wire less phones, th er e a re th ree major types .Cordless, Radio, and Cel lu la r. In upcoming i s sues , Iwil l be pr in t ing some of the b e t t e r a r t i c l e s on wire lessphones. Some a re w r it te n by myself while others h av e b ee nreprinted from t e x t f i l e s . In any case th e informationwil l be presen ted in t he b es t p os si bl e format fo r yourmaximum cerebra l s t imula t ion . This f i r s t s e t of a r t i c l e swil l d ea l w ith th e c e l l u l a r p ho ne s a nd rad io scannerswhich can be used t o monitor phone t r ansmiss ions .P le as e n ot e t h a t as always, A l l i nf o rm a ti on in TAPMagazine i s fo r informational p u rp os e s o n ly !

    THE DNA B OXH ki C ll l Ph

  • 8/3/2019 TAP Magazine - Issue #101

    10/10

    Hacking Cel lu la r PhonesBy

    The Outlaw Telecommandos

    Here ar e a few of th e online investment serv ices (business o f f i c e s , ca.1987)

    DATAQUICK 1-800-762-DATA (voice) sou the rn CA Real Property DataLotus Signal/QuoTrek 1-800-272-2855 (voice) stock M ar ke t D at a

    1-800-433-6955 (voice)FutureSource 1-800-621-2628 ext.34 (voice) Futures Trading Data

    (Or check recent ad s in Wall s t r e e t Journal e t c . )

    At any ra te , I propose t h a t we s t a r t pooling info about c e l l u l a r phonestoward th e goal o f b u il di ng a ' r o s e t t a s tone ' of c e l l u l a r dia l ing protocols,f requenc ies , t echnica l info and hardware / so ftware hacks. (Send a l l info toTAP)

    High on th e h i t l i s t i s a serv ice / repa i r manual fo r a c e l l u l a r p ho ne , a ndjournal or t echnica l a r t i c l e s about th e inner workings of th e c e l l u l a rphone system.

    I t tu rns ou t t h a t there a re s ev e ra l J a ~ a n e s ehandheld t ransce ivers (HT's)available in th e US fo r us e by ham radlo hobbyists t h a t h av e h i dd e nfeatures allowing them to operate in th e 800KHz band used by c e l l u l a rtelephones. Using an FSK decoder chip and a personal computer running anassembly language program to record an d decipher th e ID beeps a t th e b e ~ i n n i n gof c e l l u l a r c a l l s , a "phone book" of c e l l u l a r ID ' s c an b e c om pi le d. A slmpleFSK o s c i l l a t o r cont ro l led by th e PC can then be used to d ia l ou t using th eHandheld T ~ a n s c e i v e rand th e captured ID codes.

    A low tech ana lys i s could be done by t ap in g t he beeps and play ing them backat slow speed in to an oscil loscope. An e d it e d t ap e may even be adequate fo rretransmission; no deciphering required.

    Several radio s to re s i n Los Angeles s e l l th e HT's and have g i ve n a d vi c e inth e pas t about how to access th e hidden o u t- o f -b a n d t u n in g fea tures in theROMS of th e Japanese HT's(See other a r t i c l e s . ) I t ' s poss ib le now to l i s t e nin to c e l l u l a r phone conversations without building any spec ia l h ar dw ar e. I nfact i f you have a good antenna, or l ive near a c e l l u l a r repea te r tower, ~ o ucan pick up c e l l u l a r c a l l s using a UHF TV with a s l id ing tuner by tuning 1n"channels" between 72 and 83 on th e UHF d i a l (See f ut ur e i ss ue o f TAP.)

    Beside th e obvious benef i t s o f u n li m it e d, u n tr a ce a bl e , nat iona l mobilevoice communication, there a re o th er uses fo r c e l l u l a r hacking.For instance: most p eo pl e u si n g c e l l u l a r phones ar e pre t ty upscale.I t may be poss ib le to scan fo r 10 codes of the telephones of majorcorporations and t h e i r executives and g e t i n si d er stock t rad ing information.Simply by logging th e ca l led and ca l l ing par t ies you w i l l be able to compilea database mapping ou t th e execu t ive l eve l command' communication s t ruc ture .I f t h i s i s l inked to a remote controlled tape deck you w i l l know prec ise lywhat is going on and be able to note any unusual a c t i v i t y, such as c a l l sbetween th e e x ec u ti v es o f c o rp o ra t io n s t h a t ar e in a takeover or leveragedb u y o ut r e la t io n s h ip . I t is even l ike ly t h a t you w i l l occasionall in te rcep tc a l l s between inves to rs and t h e i r s t oc k b r ok e rs , or c a l l s discuss1ng plansfo r new cont rac t s .This data i s most safe l used fo r i n s i d e r t rad ing of your own; there w i l l beno way t h a t th e s e c u r i t ~ e sand Exchange Commission ca n es tab l i sh a l ink~ e t w e e ~you and th e i n s l d e r s . A more r i sky proposit ion would be t o o ffe r any1ntell lgence gathered to competi tors fo r a pr ice as indus t r ia l espionage.

    T h e ~t he re a re th e anarchy , disruption angles fo r cybernetic g u e r r i l l aact10n at t ~ e corporate economic ' f inanc ia l l eve l . Leaking info to th epress ca n ~ l l l a deal or m ~ v estock pr ices prematurely. In te l l igencegathered v1a .ce l lu lar h a c k 1 n ~9an a lso b e u sed t o p l an o p er a ti o ns aga ins t~ o r p o r a t ~ma1nframes by provldlng names and keywords , or indicating v i t a ll n f o r m a ~ 1 0 nto be searched for. Listening to th e phone c a l l s of candidatesand t h e l r campaign s t a f f i s a lso a f i e l d r ich in p o s s i b i l i t i e s .

    A re la ted t e c h n o ~ ~w ~ i t i n gto be h ~ c k e di s th e nationwide ne t of pocketp a g e r ~ .The poss1b1l i t l es fo r executlve harassment u s i ng b e ep e r t e ch n ol o gy ar er e l a t ~ v e l yunexplored.

    There ar e a lso s e ve ra l o n -l in e ins tan t stock & commodity quotation systemst h a t us e SCA s u b c a r r i e r ~to transmit investment data . By watchin9 a c t i v i t yon these n e t w o r k ~you w1ll be able to l oo k o ve r th e shoulder of lnves to rsas they plan t h e l r s t ra tegy - what kind of i n q u i r i e s ar e they making and whatth e r e s u l t s are .

    1

    SEAlES I - ~

    1-