



                ===== Phrack Magazine presents Phrack 15 =====



                  ===== File 1 of 8 : Phrack 15 Intro =====







8/7/87





        So, did you miss us?  Yes, Phrack is back!  Phrack Magazine's beloved

founders, Taran King and Knight Lightning, have gone off to college, and the

recent busts (summarized completely in this month's Phrack World News) have

made it difficult to keep the magazine going.



        TK and KL have put the editorship of Phrack in the hands of Elric of

Imrryr and Sir Francis Drake.  SFD is primarily responsible for PWN.  As of

yet we have no 'Official Phrack BBS.'



        Due to various obstacles, the first issue under the new editorship is

rather small.  Fortunately, however, the overall quality of the files

presented is among the highest ever.  We've managed to keep references to

Oryan QUEST down to as little as possible and we've resisted the temptation to

include some second-rate files as "fillers."  Naturally, we're still looking

for excellent, unpublished phreak/hack/pyro/anarchy files to publish in Phrack

XVI and beyond.  If you have an article, we'd like to see it! Get in touch

with SFD or Elric when your file is ready for submission.



                                          -- Shooting Shark

                                             Contributing Editor

Note:  For now you can contact Phrack Inc. at:

Lunatic Labs: 415-278-7421 300/1200 (Sir Francis Drake or Elric of Imrryr)

Free World:   301-668-7657 300/1200/2400/9600 (Disk Jockey)





Phrack XV Table of Contents

===========================



15-1.   Phrack XV Intro by Shooting Shark                (2K)

15-2.   More Stupid Unix Tricks by Shooting Shark        (10K)

15-3.   Making Free Local Payfone Calls by Killer Smurf  (7K)

15-4.   Advanced Carding XIV by The Disk Jockey          (12K)

15-5.   Gelled Flame Fuels by Elric of Imrryr            (12K)

15-6.   PWN I:   The Scoop on Dan The Operator by KL     (19K)

15-7.   PWN II:  The July Busts by Knight Lightning      (21K)

15-8.   PWN III: The Affidavit by SFD                    (6K)



                ===== Phrack Magazine presents Phrack 15 =====



                           ===== File 2 of 8 =====



I thought I had written everything there is to write about the Unix operating

system until I was recently asked to put out yet another file... so I said

"I'll try, but don't publish my file along with an article by The Radical

Rocker this time!"  These demands having been met, I booted up the PC and

threw together...



                 --- ---- ---- ------ ------ -- -- ---- -----

               % Yet Even More Stupid Things to Do With Unix! $

                 --- ---- ---- ------ ------ -- -- ---- -----



                              By Shooting Shark.

                          Submitted August 26, 1987





These two topics are methods of annoying other users of the system and

generally being a pest.  But would you want to see a file on *constructive*

things to do with Unix?  Didn't think so...





--  ------- ----- --- --- ------

1.  Keeping Users Off The System

--  ------- ----- --- --- ------



Now, we all know by now how to log users off (one way is to redirect an 'stty

0' command to their tty) but unless you have root privs, this will not work

when a user has set 'mesg n' and prevented other users from writing to their

terminal.  But even users who have a 'mesg n' command in their .login (or

.profile or .cshrc) file still have a window of vulnerability, the time

between login and the locking of their terminal.  I designed the following

program, block.c, to take advantage of this fact.



To get this source running on your favorite Unix system, upload it, call it

'block.c', and type the following at the % or $ prompt:



cc -o block block.c



once you've compiled it successfully, it is invoked like so:



block username [&]



The & is optional and recommended - it runs the program in the background,

thus letting you do other things while it's at work.



If the user specified is logged in at present, it immediately logs them out

(if possible) and waits for them to log in.  If they aren't logged in, it

starts waiting for them.  If the user is presently logged in but has their

messages off, you'll have to wait until they've logged out to start the thing

going.



Block is essentially an endless loop : it keeps checking for the occurrence of

the username in /etc/utmp.  When it finds it, it immediately logs them out and

continues.  If for some reason the logout attempt fails, the program aborts.

Normally this won't happen - the program is very quick when run unmodified.

However, to get such performance, it runs in a very tight loop and will eat up

a lot of CPU time.  Notice that near the end of the program there is the line:



/*sleep(SLEEP)   */



the /* and */ are comment delimiters - right now the line is commented out.

If you remove the comments and re-compile the program, it will then 'go to

sleep' for the number of seconds defined in SLEEP (default is 5) at the end of

every loop.  This will save the system load but will slightly decrease the

odds of catching the user during their 'window of vulnerability.'



If you have a chance to run this program at a computer lab at a school or

somewhere similar, run this program on a friend (or an enemy) and watch the

reaction on their face when they repeatedly try to log in and are logged out

before they can do *anything*.  It is quite humorous.  This program is also

quite nasty and can make you a lot of enemies!



caveat #1:  note that if you run the program on yourself, you will be logged

out, the program will continue to run (depending on the shell you're under)

and you'll have locked yourself out of the system - so don't do this!



caveat #2:  I wrote this under OSx version 4.0, which is a licensed version of

Unix which implements 4.3bsd and AT&T sysV.  No guarantees that it will work

on your system.



caveat #3:  If you run this program in background, don't forget to kill it

when you're done with it!  (when you invoke it with '&', the shell will give

you a job number, such as '[2] 90125'.  If you want to kill it later in the

same login session, type 'kill %2'.  If you log in later and want to kill it,

type 'kill 90125'.  Just read the man page on the kill command if you need any

help...



----- cut here -----



/* block.c -- prevent a user from logging in

 * by Shooting Shark

 * usage : block username [&]

 * I suggest you run this in background.

 */



#include <stdio.h>

#include <utmp.h>

#include <ctype.h>

#include <termio.h>

#include <fcntl.h>



#define W_OK2

#define SLEEP5

#define UTMP"/etc/utmp"

#define TTY_PRE "/dev/"



main(ac,av)

int ac;

char *av[];

{

int target, fp, open();

struct utmpuser;

struct termio*opts;

char buf[30], buf2[50];



if (ac != 2) {

printf("usage : %s username\n",av[0]);

exit(-1);

}





for (;;) {



if ((fp = open(UTMP,0)) == -1) {

printf("fatal error!  cannot open %s.\n",UTMP);

exit(-1);

}





while (read(fp, &user, sizeof user) > 0) {

if (isprint(user.ut_name[0])) {

if (!(strcmp(user.ut_name,av[1]))) {



printf("%s is logging in...",user.ut_name);

sprintf(buf,"%s%s",TTY_PRE,user.ut_line);

printf("%s\n",buf);

if (access(buf,W_OK) == -1) {

printf("failed - program aborting.\n");

exit(-1);

}

else {

if ((target = open(buf,O_WRONLY)) != EOF) {

sprintf(buf2,"stty 0 > %s",buf);

system(buf2);

printf("killed.\n");

sleep(10);

}



} /* else */

} /* if strcmp */

} /* if isprint */

} /* while */

close(fp);



/*sleep(SLEEP);  */



} /* for */











}



----- cut here -----





--  ------------- ----- ----- ---- ------  --- ------

2.  Impersonating other users with 'write' and 'talk'

--  ------------- ----- ----- ---- ------  --- ------



This next trick wasn't exactly a work of stupefying genius, but is a little

trick (that anybody can do) that I sometimes use to amuse myself and, as with

the above, annoy the hell out of my friends and enemies.



Nearly every Unix system has the 'write' program, for conversing with other

logged-in users.  As a quick summary:



If you see that user 'clara' is logged in with the 'who' or 'w' command or

whatever, and you wish to talk to her for some reason or another, you'd type

'write clara'.  Clara then would see on her screen something like this (given

that you are username 'shark'):





[3 ^G's] Message from shark on ttyi13 at 23:14 ...



You then type away at her, and whatever you type is sent to her terminal

line-by-line.  If she wanted to make it a conversation rather than a

monologue, she'd type 'write shark,' you'd get a message similar to the above

on your terminal, and the two of you would type away at each other to your

little heart's content.  If either one of you wanted to end the conversation,

you would type a ^D.  They would then see the characters 'EOF' on their

screen, but they'd still be 'write'ing to you until they typed a ^D as well.



Now, if you're on a bigger installation you'll probably have some sort of

full-screen windowing chat program like 'talk'.  My version of talk sends the

following message:



Message from Talk_Daemon@tibsys at 23:14 ...

talk: connection requested by shark@tibsys.

talk: respond with:  talk shark@tibsys



Anyway, here's where the fun part begins:  It's quite easy to put a sample

'write' or 'talk' message into a file and then edit so that the 'from' is a

different person, and the tty is listed differently.  If you see that your

dorky friend roger is on ttyi10 and the root also happens to be logged on on

ttyi01, make the file look something like this:



[3 control-G's] Message from root on ttyi01 at [the current time]



wackawackawackawackawacka!!!



[or a similarly confusing or rude message...]



EOF



Then, send this file to roger's terminal with:



cat filename > /dev/ttyi10



He'll get the message on his terminal and wonder what the hell the superuser

is talking about.  He might even 'write' back to the superuser with the intent

of asking 'what the hell are you talking about?'.  For maximum effectiveness,

*simultaneously* send a message to root 'from' roger at the appropriate

terminal with an equally strange message - they'll then engage in a

conversation that will go something like "what did you mean by that?"  "what

do you mean, what do I mean?  What did *you* mean by that?" etc.  A splendid

time is guaranteed for all!  Note that you don't have to make 'root' the

perpetrator of the gag, any two currently logged-in users who have their

terminals open for messages can join in on the fun.



Similarly, you can fake a few 'talk' pages from/to two people...they will then

probably start talking...although the conversation will be along the lines of

"what do you want?"  "you tell me."  "you paged me, you tell *me." etcetera,

while you laugh yourself silly or something like that.



A variation on the theme:  As I said, when using 'write' you type a ^D to end

the conversation, and the person you're typing at sees an 'EOF' on their

screen.  But you could also just *type* 'EOF', and they'd think you've

quit...but you still have an open line to their terminal.  Even if they later

turn messages off, you still have the ability to write to their terminal.

Keeping this fact in mind, anybody who knows what they're doing can write a

program similar to my 'block' program above that doesn't log a user out when

they appear on the system, but opens their tty as a device and keeps the file

handle in memory so you can redirect to their terminal - to write rude

messages or to log them out or whatever - at any time, until they log out.



As I said, there was no great amount of genius in the above discourse, but

it's a pastime I enjoy occasionally...



-- Shooting Shark





"the first fact to face is that unix was not developed with security, in any

realistic sense, in mind..."



-- Dennis M. Ritchie



"Oryan QUEST couldn't hack his way out of a UNIX system, let alone into one."



-- Tharrys Ridenow



                ===== Phrack Magazine presents Phrack 15 =====



                         ===== File 3 of 8 =====



*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*

*                                                                       *

*            How to "Steal" Local Calls from Most Payphones             *

*                                                                       *

*                            August 25, 1987                            *

*                                                                       *

*                   By Killer Smurf and Pax Daronicus                   *

*                                                                       *

*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*-+-*



     Most of you have seen WarGames, right? Remember the part where David

was stranded in Colorado and needed to call his girlfriend in Seattle? We

knew you did.  If you didn't, what David done was unscrew the  mouthpiece

on  the payphone and make some connection between the mouthpiece and  the

phone.  Well... that was pretty close to reality except for two things...

1> Nowadays,  mouthpieces are un-unscrewable, and 2> You cannot make long

distance  or toll calls using that method.  Maybe that DID work on  older

phones, but you know Ma Bell.  She always has a damn cure for every thing

us Phreaks do.  She glued on the mouthpiece!



     Now to make free local calls, you need a  finishing nail.  We highly

recommend "6D E.G. FINISH C/H, 2 INCH" nails.  These are about 3/32 of an

inch  in diameter and 2 inches long (of course).  You also need  a  large

size  paper  clip.  By  large  we  mean they  are  about  2  inches  long

(FOLDED).  Then  you  unfold the paper clip.  Unfold it  by  taking  each

piece  and  moving  it out 90 degrees.  When it is done  it  should  look

somewhat like this:

                             /----------\

                             :          :

                             :          :

                             :          :

                             :          :

                             \-----



     Now,  on to the neat stuff.  What you do,  instead of unscrewing the

glued-on  mouthpiece,  is  insert the nail into the center  hole  of  the

mouthpiece  (where you talk) and push it in with pressure or just  hammer

it in by hitting the nail on something.  Just DON'T KILL THE  MOUTHPIECE!

You  could  damage  it if you insert the nail too far or  at  some  weird

angle.  If  this happens then the other party won't be able to hear  what

you say.

     You now have a hole in the mouthpiece in which you can easily insert

the  paper clip.  So, take out the nail and put in the paper  clip.  Then

take  the other end of the paper clip and shove it under the rubber  cord

protector at the bottom of the handset (you know, the blue guy...).  This

should end up looking remotely like...like this:



                             /----------\      Mouthpiece

                             :          :      /

             Paper clip -->  :          :     /

                             :      /---:---\

                             :      :   :   :------------>

         ====================\---))):       :  To earpiece ->

                   ^              ^ \-------------------->

                   :              :

                   :              :

                 Cord          Blue guy



(The  paper clip is shoved under the blue guy to make a  good  connection

between the inside of the mouthpiece and the metal cord.)



     Now,  dial  the number of a local number you wish to  call,  sayyyy,

MCI.  If  everything  goes okay, it should ring and not answer  with  the

"The Call You Have Made Requires a 20 Cent Deposit" recording.  After the

other  end  answers  the phone, remove the  paper  clip.  It's  all  that

simple, see?



     There  are  a couple problems,  however.  One  is,  as  we mentioned

earlier, the mouthpiece not working after you punch it.  If this  happens

to you,  simply move on to the next payphone.  The one you are now on  is

lost.  Another problem is that the touch tones won't work when the  paper

clip is in the mouthpiece. There are two ways around this..

     A> Dial the first 6 numbers.  This should be done without the  paper

clip making the connection, i.e., one side should not be connected.  Then

connect  the paper clip,  hold down the last digit,  and slowly pull  the

paper clip out at the mouthpiece's end.

     B> Don't  use  the paper clip at all.  Keep the nail  in  after  you

punch it.  Dial the first 6 digits.  Before dialing the last digit, touch

the nail head to the plate on the main body of the phone,  the money safe

thingy..then press the last number.



     The  reason  that this method is sometimes called  clear  boxing  is

because  there is another type of phone which lets you actually make  the

call  and  listen  to  them say "Hello,  hello?"  but  it  cuts  off  the

mouthpiece  so  they can't hear you.  The Clear Box is used  on  that  to

amplify your voice signals and send it through the earpiece.  If you  see

how  this  is even slightly similar to the method we  just  described  up

there, kindly explain it to US!! Cause WE don't GET IT!



     Anyways,  this DOES work on almost all single slot,  Dial Tone First

payphones (Pacific Bell for sure).  We do it all the time.  This  is  the

least,  WE STRESS *LEAST*, risky form of Phreaking.  And remember.  There

are other Phreaks like you out there who have read this article and punch

payphones, so look before you punch, and save time.



     If  you feel the insane desire to have to contact us to bitch at  us

for  some  really stupid mistake in this article,  you can  reach  us  at

Lunatic Labs Unltd...415/278-7421.  It should be up for quite a while..





     Also,  if you think of any new ideas that can be used in conjunction

with this method, such as calling a wrong number on purpose and demanding

your quarter back from the 0perator,  tell us!!  Post it on Looney!!  Oh,

and if this only works on Pac Bell phones, tell us also!  Thanks for your

time, upload this to every board you can find.  You may use this material

in any publication - electronic, written, or otherwise without consent of

the authors as long as it is reproduced in whole, with all credit to the

authors (us!) and Lunatic Labs.  And now, the Bullshit:



_________________________________________________________________________



DISCLAIMER: This  disclaimer disclaims that this article was written  for

            your information only.  Any injuries resulting from this file

            (punctured hands, sex organs, etc.) is NOT OUR FAULT! And  of

            course  if you get really stupidly busted in any way  because

            of this, it ain't our fault either.  You're the dumb ass with

            the  nail.  So, proceed with care, but...  HELL!  Have  fun.

            Later...

_________________________________________________________________________





                                                                DINC!



                ===== Phrack Magazine presents Phrack 15 =====



                           ===== File 4 of 8 =====















~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

~                             The Disk Jockey                                ~

~                                                                            ~

~                                presents:                                   ~

~                                                                            ~

~                          Advanced Carding XIV:                             ~

~              Clarification of Many Credit Card Misconceptions              ~

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

                             (A 2af Presentation)

Preface:

-------

     After reading files that have been put out by various groups and

individuals concerning carding, credit fraud, and the credit system in

general, I am finding more and more that people are basing these files on

ideas, rather than knowing how the system actually works.  In this article I

hope to enlighten you on some of the grey areas that I find most people either

do not clarify, or don't know what they are talking about.  I can safely say

that this will be the most accurate file available dealing with credit fraud.

I have worked for and against credit companies, and know how they work from

the insiders point of view, and I have yet to meet someone in the modem world

that knows it better.



This file is dedicated to all the phreaks/hacks that were busted for various

reasons in the summer of 1987.





Obtaining Cards:

---------------

     Despite popular belief, there IS a formula for Visa and Mastercard

numbers.  All credit card account numbers are issued by on issuing company, in

this case, Visa or Mastercard.  Although the banks are not aware of any type

of pattern to the account numbers, there IS one that can be found.  I plan to

publish programs in the near future that will use the various formulas for

Visa, Mastercard and American Express to create valid accounts.



Accounts:

--------

     All that is needed to successfully use a Visa/MC account is the account

number itself.  I don't know how many times I have gotten into arguments with

people over this, but this is the way it is.  I'll expand on this.



First of all, on all Visa/MC cards, the name means NOTHING.  NOTHING AT ALL.

You do not need this name and address of the cardholder to successfully use

the account, at no time during authorization is the name ever needed, and with

over 50,000 banks, credit unions, and various other financial institutions

issuing credit cards, and only 5 major credit verification services, it is

impossible to keep personal data on each cardholder.



Ordering something and having it sent with the real cardholder's name is only

going to make things more difficult, at best.  There is no way that you can

tell if the card is a normal card, or a premium (gold) card merely by looking

at the account number.  The only thing that can be told by the account number

is the bank that issued the card, but this again, is not needed.



The expiration date means nothing.  Don't believe me?  Call up an

authorization number and check a card and substitute 12/94, and if the account

number is good, the card will pass.  The expiration date is only a binary-type

check to see if the card is good, (Yes/No), it is NOT a checksum-type check

code that has to be matched up to the card account to be valid.



Carding Stupid Things:

---------------------

     Whenever anyone, ANYONE tries to card something for the first time, they

ALWAYS want to get something for their computer.  This is nice and all, but

just think that every person that has ever tried to card has tried to get a

hard drive and a new modem.  Everyone does it, thus every single computer

company out there is aware and watching for that.  If I could give every

single person who ever tries to card one piece of advice, it would be to NEVER

order computer equipment.  I know there are a hundred guys that will argue

with me about it, but common sense should tell you that the merchants are

going to go out of there way to check these cards.



Merchant Checking:

-----------------

     Since I brought up merchants checking the cards, I will review the two

basic ways that almost all mail-order merchants use.  Keep these in mind when

designing your name, address and phone number for your drop.



The Directory Assistance Cross-Reference:

----------------------------------------

     This method is most popular because it is cheap, yet effective.  You can

usually tell these types of checks because during the actual order, you are

asked questions such as "What is your HOME telephone number" and your billing

address.  Once they have this information, they can call directory assistance

for your area code, say 312, and ask "May I have the phone number for a Larry

Jerutis at 342 Stonegate Drive?"  Of course, the operator should give a number

that matches up with the one that you gave them as your home number.  If it

doesn't, the merchant knows that something is up.  Even if it is an unlisted

number, the operator will say that there is a Jerutis at that address, but the

telephone number is non-published, which is enough to satisfy the merchant.

If a problem is encountered, the order goes to a special pile that is actually

called and the merchant will talk to the customer directly.  Many merchants

have policy to not ship at all if the customer can not provide a home phone

number that corresponds with the address.



The Call Back:

-------------

     This deals with the merchant calling you back to verify the order.  This

does not imply, however, that you can stand by a payphone and wait for them to

call back.  Waiting by a payphone is one of the stupidest things I have ever

heard of, being that few, if any, places other than the pizza place will call

back immediately like that.  What most places will do is process your order,

etc, and then call you, sometimes it's the next day, sometimes that night.  It

is too difficult to predict when they will call back, but if they don't get a

hold of you, or only get a busy, or an answering machine, they won't send the

merchandise until they speak with you voice.  This method is difficult to

defeat, but fortunately, due to the high cost of phone bills, the directory

assistance method is preferred.



Billing Address:

---------------

     This should ALWAYS be the address that you are having the stuff sent to.

One of the most stupidest things that you could do to botch up a carding job

would be to say something like "Well, I don't want it sent to my house, I want

it sent to....", or "Well, this is my wife's card, and her name is....".

These methods may work, but for the most part, only rouse suspicion on you.

If the order sounds pretty straightforward, and there isn't any unusual

situations, it will better the chances of the order going through.



Drop Houses:

-----------

     These are getting harder and harder to come by for the reasons that

people are more careful then before, and that UPS is smarter, also.  Your best

bet is to hit somebody that just moved, and I mean JUST moved, being that UPS

will not know that there is nobody at the house anymore if it is within, say,

a week of their moving.  It's getting to the point where in some areas, UPS

won't even leave the stuff on the doorstep, due to liability on their part of

doing that. The old "Leave the stuff in the shrubs while I am at work" note

won't work, most people are smart enough to know that something is odd, and

will more than likely leave the packages with the neighbors before they shove

that hard drive in the bushes.  Many places, such as Cincinnati Microwave

(maker of the Escort and Passport radar detectors) require a signature when

the package is dropped off, making it that much harder.



Best Bet:

--------

     Here is the method that I use that seems to work well, despite it being a

little harder to match up names and phone numbers.  Go to an apartment

building and go to the top floor.  The trashier the place, the better.  Knock

on the door and ask if "Bill" is there.  Of course, or at least hopefully,

there will be no Bill at that address.  Look surprised, then say "Well, my

friend Bill gave me this address as being his."  The occupants will again say

"Sorry, but there is no Bill here...".  Then, say that "I just moved here to

go to school, and I had my parents sent me a bunch of stuff for school here,

thinking that this was Bill's place."  They almost always say "Oh Boy...".

Then respond with "Well, if something comes, could you hold on to it for me,

and I will come by in a week and see if anything came?"  They will always say

something to the effect of "Sure, I guess we could do that...".  Thank them a

million times for helping you out, then leave.  A few days after your stuff

comes, drop by and say, "Hi, I'm Jim, did anything come for me?".  If

everything was cool, it should have.  The best thing to do with this is only

order one or two small things, rather than an AT system with an extra monitor.

People feel more comfortable about signing for something small for someone,

rather than something big, being that most people naturally think that the

bigger it is, the more expensive it is.

     This is the best method that I know of, the apartment occupants will

usually sign for the stuff, and be more than happy to help you out.



Advice:

------

     The thing that I can never stress enough is to not become greedy.  Sure,

the first shipment may come in so easy, so risk-free that you feel as if you

can do it forever.  Well, you can't.  Eventually, if you do it frequently

enough, you will become the subject of a major investigation by the local

authorities if this becomes a real habit.  Despite anything that anyone ever

tells you about the police being "stupid and ignorant", you better reconsider.

The police force is a VERY efficient organization once they have an idea as to

who is committing these crimes.  They have the time and the money to catch

you.



Don't do it with friends.  Don't even TELL friends that you are doing it. This

is the most stupid, dangerous thing that you could do.  First of all, I don't

care how good of friends anyone may be, but if a time came that you hated each

other, this incident could be very bad for you.  What could be even worse is a

most common scenario:  You and a friend get a bunch of stuff, very

successfully.  You tell a few friends at school, either you or him have to

tell only one person and it gets all over.  Anyways, there is ALWAYS some type

of informant in every high-school.  Be it a teacher, son or daughter of a cop,

or whatever, there is always a leak in every high school.  The police decide

to investigate, and find that it is becoming common knowledge that you and/or

your friend have ways of getting stuff for "free" via the computer.  Upon

investigation, they call in your friend, and tell him that they have enough

evidence to put out a warrant for his arrest, and that they might be able to

make a deal with him.  If he gives a complete confession, and be willing to

testify against your in court, they will let him off with only paying the

restitution (paying for the stuff you got).  Of course, just about anyone is

going to think about themselves, which is understandable, and you will get the

raw end of the deal.  Don't let anyone ever tell you that as a minor, you

won't get in any trouble, because you can and will.  If you are really

uncooperative, they may have you tried as an adult, which would really put you

up the creek, and even as a juvenile, you are eligible to receive probation,

fines, court costs, and just about anything else the judge wants to do with

you.  All this boils down to is to not tell anyone anything, and try not to do

it with anyone.





Well, that should about wrap up this file.  I hope this clears up some

misconceptions about carding.  I am on many boards, and am always open to any

comments/suggestions/threats that anyone might have.  I can always be reached

on The Free World II (301-668-7657) or Lunatic Labs (415-278-7421).



Good luck.



                                                 -The Disk Jockey



                ===== Phrack Magazine presents Phrack 15 =====



                         ===== File 5 of 8 =====





















                        GELLED FLAME FUELS

                        ------------------



        A text phile typed by Elric of Imrryr from the book:

        Improvised Munitions Handbook (TM 31-210), published

        by the Dept of the Army, 1969.

        All information is provided only for information purposes

        only. Construction and/or use may violate local, state, and/or

        federal laws. (Unless your name is Ollie North)







        Gelled or paste type fuels are often preferable to raw gasoline for

use in incendiary devices such as fire bottles.  This type fuel adheres more

readily to the target and produces greater heat concentration.



        Several methods are shown for gelling gasoline using commonly

available materials.  The methods are divided into the following categories

based on the major ingredient:



                1. Lye Systems



                2. Lye-Alcohol Systems



                3. Soap-Alcohol Systems



                4. Egg White Systems



                6. Wax Systems























































                                   Lye Systems



    Lye (also know as caustic soda or Sodium Hydroxide) can be used in

combination with powdered rosin or castor oil to gel gasoline for use as a

flame fuel which will adhere to target surfaces.











MATERIALS REQUIRED:

------------------



Parts by Volume   Ingredient    How Used         Common Source

---------------   ----------    --------         -------------



60                Gasoline      Motor Fuel       Gas station or motor vehicle



2 (flake) or      Lye           Drain cleaner,   Food store or Drug store

1 (powder)                      making of soap



15                Rosin         Manufacturing    Paint store, chemical supply

                                Paint & Varnish  house



                  or



                  Castor Oil    Medicine         Food and Drug stores





PROCEDURE

---------



______________________________________________________________________________

|CAUTION:  Make sure that there are no open flames in the area when mixing   |

|the flame fuel.  NO SMOKING!                                                |

|----------------------------------------------------------------------------|



1. Pour gasoline into jar, bottle or other container. (DO NOT USE AN ALUMINUM

   CONTAINER.)



2. IF rosin is in cake form, crush into small pieces.



3. Add rosin or castor oil to the gasoline and stir for about five minutes to

   mix thoroughly.



4. In a second container (NOT ALUMINUM) add lye to an equal volume of water

   slowly with stirring.



______________________________________________________________________________

|CAUTION:  Lye solution can burn skin and destroy clothing.  If any is       |

|spilled, wash away immediately with large quantities of water.              |

|----------------------------------------------------------------------------|



5. Add lye solution to the gasoline mix and stir until mixture thickens (about

   one minute).



NOTE:  The sample will eventually thicken to a very firm paste.  This can be

       thinned, if desired, by stirring in additional gasoline.













                                   Lye-Alcohol Systems



    Lye (also know as caustic soda or Sodium Hydroxide) can be used in

combination with alcohol and any of several fats to gel gasoline for use as a

flame fuel.











MATERIALS REQUIRED:

------------------



Parts by Volume   Ingredient    How Used         Common Source

---------------   ----------    --------         -------------



60                Gasoline      Motor Fuel       Gas station or motor vehicle



2 (flake) or      Lye           Drain cleaner,   Food store or Drug store

1 (powder)                      making of soap



3                 Ethyl Alcohol Whiskey          Liquor store

                                Medicine         Drug store



NOTE:  Methyl (wood) alcohol or isopropyl (rubbing) alcohol can be substituted

       for ethyl alcohol, but their use produces softer gels.



14                Tallow        Food             Fats rendered by cooking the

                                Making of soap   meat or suet of animals.



NOTE: The following can be substituted for the tallow:



        (a) Wool grease (Lanolin) (very good) -- Fat extracted from sheep wool

        (b) Castor Oil (good)

        (c) Any vegetable oil (corn, cottonseed, peanut, linseed, etc.)

        (d) Any fish oil

        (e) Butter or oleo margarine



It is necessary when using substitutes (c) to (e) to double the given amount

of fat and of lye for satisfactory body.



PROCEDURE

---------



______________________________________________________________________________

|CAUTION:  Make sure that there are no open flames in the area when mixing   |

|the flame fuel.  NO SMOKING!                                                |

|----------------------------------------------------------------------------|



1. Pour gasoline into jar, bottle or other container. (DO NOT USE AN ALUMINUM

   CONTAINER.)



2. Add tallow (or substitute) to the gasoline and stir for about 1/2 minute to

   dissolve fat.



3. Add alcohol to the gasoline mixture.  Mix thoroughly.



4. In a separate container (NOT ALUMINUM) slowly add lye to an equal volume of

   water.  Mixture should be stirred constantly while adding lye.



______________________________________________________________________________

|CAUTION:  Lye solution can burn skin and destroy clothing.  If any is       |

|spilled, wash away immediately with large quantities of water.              |

|----------------------------------------------------------------------------|



5. Add lye solution to the gasoline mixture and stir occasionally until

thickened (about 1/2 hour)



NOTE:  The sample will eventually (1 to 2 days) thicken to a very firm paste.

       This can be thinned, if desired, by stirring in additional gasoline.











                                   Soap-Alcohol System



        Common household soap can be used in combination with alcohol to gel

gasoline for use as a flame fuel which will adhere to target surfaces.













MATERIALS REQUIRED:

------------------



Parts by Volume   Ingredient    How Used         Common Source

---------------   ----------    --------         -------------



36                Gasoline      Motor Fuel       Gas station or motor vehicle



1                 Ethyl Alcohol Whiskey          Liquor store

                                Medicine         Drug store



NOTE:  Methyl (wood) alcohol or isopropyl (rubbing) alcohol can be substituted

       for ethyl alcohol.



20 (powdered) or  Laundry soap  Washing clothes  Stores

28 (flake)



NOTE:  Unless the word "soap" actually appears somewhere on the container or

wrapper, a washing compound is probably a detergent. THESE CAN NOT BE USED.





PROCEDURE

---------



______________________________________________________________________________

|CAUTION:  Make sure that there are no open flames in the area when mixing   |

|the flame fuel.  NO SMOKING!                                                |

|----------------------------------------------------------------------------|



1. If bar soap is used, carve into thin flakes using a knife.



2. Pour Alcohol and gasoline into a jar, bottle or other container and mix

   thoroughly.



3. Add soap powder or flakes to gasoline-alcohol mix and stir occasionally

   until thickened (about 15 minutes).









                                   Egg System



The white of any bird egg can be used to gel gasoline for use as a flame fuel.











MATERIALS REQUIRED:

------------------



Parts by Volume   Ingredient    How Used         Common Source

---------------   ----------    --------         -------------



85                Gasoline      Motor Fuel       Gas station or motor vehicle



14                Egg Whites    Food             Food store, farms



Any one of the following



1                 Table Salt    Food, industrial Sea Water, Natural brine,

                                processes        Food stores



3                 Ground Coffee Food             Food store



3                 Dried Tea     Food             Food store

                  Leaves



3                 Cocoa         Food             Food store



2                 Sugar         Food             Food store



1                 Saltpeter     Pyrotechnics     Drug store

                  (Niter)       Explosives       chemical supply store

                  (Potassium    Matches

                  Nitrate)      Medicine



1                 Epsom salts   Medicine         Drug store, food store

                                industrial

                                processes



2                 Washing soda  Washing cleaner  Food store

                  (Sal soda)    Medicine         Drug store

                                Photography      Photo supply store



1 1/2             Baking soda   Baking           Food store

                                Manufacturing:   Drug store

                                Beverages,

                                Mineral waters,

                                and Medicine



1 1/2             Aspirin       Medicine         Drug store

                                                 Food store





PROCEDURE

---------



______________________________________________________________________________

|CAUTION:  Make sure that there are no open flames in the area when mixing   |

|the flame fuel.  NO SMOKING!                                                |

|----------------------------------------------------------------------------|



1. Separate egg white from yolk.  This can be done by breaking the egg into a

   dish and carefully removing the yolk with a spoon.





______________________________________________________________________________

|NOTE:  DO NOT GET THE YELLOW EGG YOLK MIXED INTO THE EGG WHITE.  If egg yolk|

|gets into the egg white, discard the egg.                                   |

|----------------------------------------------------------------------------|



2. Pour egg white into a jar, bottle, or other container and add gasoline.



3. Add the salt (or other additive) to the mixture and stir occasionally until

   gel forms (about 5 to 10 minutes).



NOTE:  A thicker flame fuel can be obtained by putting the capped jar in hot

       (65 C) water for about 1/2 hour and then letting them cool to room

       temperature.  (DO NOT HEAT THE GELLED FUEL CONTAINING COFFEE).











                                   Wax System



        Any of several common waxes can be used to gel gasoline for use as a

flame fuel.











MATERIALS REQUIRED:

------------------



Parts by Volume   Ingredient    How Used         Common Source

---------------   ----------    --------         -------------



80                Gasoline      Motor Fuel       Gas station or motor vehicle



20                Wax           Leather polish,  Food store, drug store,

                  (Ozocerite,   sealing wax,     department store

                  Mineral wax,  candles,

                  fossil wax,   waxed paper,

                  ceresin wax   furniture &

                  beeswax)      floor waxes,

                                lithographing.



PROCEDURE

---------



1. Melt the wax and pour into jar or bottle which has been placed in a hot

   water bath.



2. Add gasoline to the bottle.



3. When wax has completely dissolved in the gasoline, allow the water bath to

   cool slowly to room temperature.



NOTE:  If a gel does not form, add additional wax (up to 40% by volume) and

repeat the above steps.  If no gel forms with 40% wax, make a Lye solution by

dissolving a small amount of Lye (Sodium Hydroxide) in an equal amount of

water.  Add this solution (1/2% by volume) to the gasoline wax mix and shake

bottle until a gel forms.









Well, that's it, I omitted a few things because they where either redundant,

or more aimed toward battle field conditions. Be careful, don't get caught,

and have fun...



        Elric of Imrryr





          PWN ^*^ PWN ^*^ PWN {  Final Issue  } PWN ^*^ PWN ^*^ PWN

          ^*^                                                   ^*^

          PWN                Phrack World News                  PWN

          ^*^               Issue XV:  Part One                 ^*^

          PWN                                                   PWN

          ^*^          Created, Written, and Edited             ^*^

          PWN               by Knight Lightning                 PWN

          ^*^                                                   ^*^

          PWN ^*^ PWN ^*^ PWN {  Final Issue  } PWN ^*^ PWN ^*^ PWN



Welcome to my final issue of Phrack World News.  Many people are wondering why

I am giving it up.  There are several reasons, but the most important is that

I will be going to college and will have little (if any) time for the

phreak/hack world or PWN.  I doubt I will even be calling any bulletin boards,

but I may make an occasional call to a few of my friends in the community.



The Phrack Inc. VMS is no longer in service and messages will not be received

there by anyone.  Phrack Inc. is now in the hands of Sir Francis Drake, Elric

Of Imrryr, and Shooting Shark.



:Knight Lightning

______________________________________________________________________________



Dan The Operator; Informant                                      July 27, 1986

~~~~~~~~~~~~~~~~~~~~~~~~~~~

I'm going to assume that all of you have read PWN 14/2 and the details

surrounding SummerCon '87.



This article will feature information collected from our investigation and

quotes from the Noah Tape.



The tape actually has two parts.  The front side has part of an Alliance

Teleconference in which Noah attempted to gather information by engineering

hackers.  Side B contains 45 minutes of a conversation between Noah and John

Maxfield of BoardScan, in which Noah tried to engineer Maxfield into giving

him information on certain hackers by trading him information on other

hackers. All of this has been going on for a long time although we are unsure

as to how long and Noah was not exactly an informant for Maxfield, it was the

FBI.



-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Part One:  Noah Engineers his "friends"



The Alliance teleconference recording has about 7 people on it, but the only

people I recognized were Dan The Operator, Il Duce (Fiber Optic), Johnny

Rotten, and The Ninja.



The topics discussed (mostly by Noah) included;



   Bill From RNOC / Catch-22 / Doom Prophet / Force Hackers / John Maxfield

      Karl Marx / Legion of Doom / Lord Rebel / Neba / Phantom Phreaker

  Phucked Agent 04 / Silver Spy / SummerCon '87 / The Rebel / The Videosmith





Here is a look at some of the conversation;                     [Il Duce=Mark]



------------------------------------------------------------------------------

Noah:  SILVER SPY, you know him?

Mark:  Yeah, what about him?

Noah:  Yeah, Paul.



[This was done to make it look like Noah knew him and was his buddy.-KL]

------------------------------------------------------------------------------

Noah:  Anyway, is LORD REBEL part of LOD?

Mark:  He's not really.

Noah:  I didn't think so.

Mark:  Well, he is, he is sort of.

Noah:  Ah, well what does he know.

Mark:  Not much.

Noah:  Why do they care about him, he's just a pirate.



[Look at this dork!  First he tries to act like he knows everything and then

when he realizes he screwed up, he tries to insult LORD REBEL's abilities.-KL]

------------------------------------------------------------------------------

Noah:  Who else is part of LOD that I missed?

Mark:  I don't know who you would have heard of.

Noah:  I've pretty much heard of everyone, I just can't think of anyone else.



[Yeah Noah, you are a regular best friend with everyone in LOD.-KL]

------------------------------------------------------------------------------

Noah:  Want to give out LORD REBEL's number?

Mark:  Everybody knows it already.

Noah:  What is it?

Mark:  Which one?

Noah:  Both, all.

Mark:  Want do you want to know for, don't you have it?

Noah:  Never bothered getting them.  What do you got? Mark!

Mark:  Yeah.

Noah:  Do you have his number?

Mark:  Yeah.

Noah:  Well, what is it!?

Mark:  Why should I say?

Noah:  I dunno, you say everyone's got it.

Mark:  Yeah, so.

Noah:  So if everyone has it, you might as well give it to everybody.

Mark:  Not really, I wouldn't want to be the one to tell him that I gave out

       his number.

Noah:  Ok Mark, fine, it's no problem for me to get anyone's number.  I got

       VIDEOSMITH's and SILVER SPY's, no problem.  [Yeah right, see the other

       conversation with John Maxfield.-KL]

------------------------------------------------------------------------------

Noah:  CATCH-22 is supposed to be the most elite BBS in the United States.

       What do you think about that Mark?

Mark:  What?

Noah:  What do you think about that Mark?

Mark:  About what?

Noah:  About CATCH-22.

Mark:  What about it?

Noah:  (pause) Well.

Mark:  Its not the greatest board because it's not really that active.

Noah:  Right, but what do you think about it?  Alright, first off here, first

       off, first off, do you have KARL MARX's number?

Mark:  What?

Noah:  I doubt you have KARL MARX's phone number.

Mark:  Ask me if I really care.

Noah:  I'm just wondering if YOU DO.

Mark:  It's one thing to have all these people's numbers, it's another if you

       are welcome to call them.

Noah:  Yeah (pause), well are you?

Mark:  Why should I say?

Noah:  I dunno, I dunno.  I'm probably going to ask him anyways.



       [I don't think my ragging is even necessary in this excerpt.-KL]

------------------------------------------------------------------------------

Noah:  Here is what MAXFIELD says, "You got the hackers, and then you got the

       people who want to make money off the hackers."  Information shouldn't

       be free, you should find out things on your own.



    [Give me a break Noah, you are the BIGGEST leach I have ever seen -KL]

------------------------------------------------------------------------------

One final note to make about the Alliance conversations is that halfway

through, IL DUCE and DAN THE OPERATOR gave out BILL FROM RNOC's full name,

phone number, address, etc.

-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-

Part Two: Noah Engineers John Maxfield



 The list of topics discussed in this conversation is much longer;



      Arthur Dent / Ben Casey / Big Brother / Bill From RNOC / BoardScan

Captain Crunch / Celtic Phrost / Cheshire Catalyst / Doc Holiday / Easywriter

    Genghis Khan / Jenny Jaguar / Jester Sluggo / Karl Marx / Kerrang Khan

 Kloey Detect / Max Files / Noah Espert / Legion Of Doom / Legion of Hackers

   Lord Digital / Lord Rebel / Mark Tabas / Oryan QUEST / Phucked Agent 04

Phrack Inc. / Pirate's Hangout / Septic Tank / Sigmund Fraud / The Disk Jockey

       The Executioner / The Federation / The *414* Wizard / The Hobbit

  The Marauder The Safecracker / The Telecom Security Group / The Videosmith

       The Weasel / Tommy Hawk / Torture Chamber / Twilight Zone / Tuc

                          Violet Boregard / Zepplin





The following are the highlights of the conversation between DAN THE OPERATOR

and JOHN MAXFIELD.                                      [John Maxfield = John]

------------------------------------------------------------------------------

Noah:  Did you ever find VIDEOSMITH's number?

John:  No, matter of fact.  You know what it is, I've been on boards he's been

       on in the 215 NPA [possibly Atlantis], but well.

Noah:  But you don't have his number?

John:  Should I?

Noah:  He's fairly big, he knows his stuff.  I would think he'd be worth

       getting a number for.

John:  Doesn't do anything for me because you know, just having his number

       doesn't get him in trouble or anything.

Noah:  Oh, well I don't want him to get in trouble...he's a nice person.  So

       do you have LORD REBEL's phone number?

John:  What do you know about him?

Noah:  I think he's up in New York.

John:  914?

Noah:  Possibly 718, 212, possibly even 201. [Excuse me you dork.  The 201 NPA

       is in the state of New Jersey not New York.  What a loser Noah is. -KL]

John:  If you don't have a number on him I'll have to do an alphabetical

       search for him.  It takes a while.

Noah:  Well we could talk while it's going.  I think you're pretty

       interesting, you're not boring like I am.

John:  Well you're not boring to me as long as I keep getting people's phone

       numbers.  Bahahahahahahahahah Har har har.

Noah:  (Pause)(Pause)(Pause) Bahahahahahahaha.  Sheesh.

John:  Well let's see what it finds, there's a lot of Lords in there.

Noah:  He's part of LOD.

John:  Oh he's part of LOD!?

Noah:  Yeah.

John:  Well I might have him and I might not [What a profound statement -KL].

Noah:  He's not very active in LOD.



         [The search for LORD REBEL's information was a failure -KL]

------------------------------------------------------------------------------

Noah:  I got a question, I'm still trying to figure this out.  Are there

       people like me who just call you up like this?

John:  Yes there are.

Noah:  A lot?

John:  Enough.  You know it's funny, there's people that call up and there

       assholes and I'll just hang up on them.  There is other people that

       call up and well you know they try to feed me bullshit, but at least

       they aren't being jerks about it.

Noah:  You think I'm feeding you bullshit?

John:  I dunno, maybe you are or maybe you aren't.  What I'm saying is that

       there are people that behave like humans.  So there are a few that call

       in.



       You know when you're working with informants, you got different

       categories.  You got informants you can trust and you got informants

       that well hold on a second.  There are some informants, that they could

       tell me anything and I'd believe them.  Ok, because I know them.  Met

       them personally maybe or known the guy for 3 or 4 years, his

       information is always correct that sort of thing.



       Then there is somebody like you that umm is kinda maybe a "Class 2

       Informant."  Gives valid phone numbers and information out, but is not

       really a true informant.  Then there is a "Class 3 Informant" that's

       like, ahh somebody like ORYAN QUEST who calls up and turns in somebody

       he doesn't like, but that's all he ever does.  I don't know if you can

       call them Class 1, Class 2, Class 3 exactly but that's how I look at

       it.



   [Shortly after this, Maxfield gave out JESTER SLUGGO's information -KL]

------------------------------------------------------------------------------

Noah:  How about Phucked Agent 04?

John:  Oh him, his name is XXXXX and he's out in XXXXXXX.

Noah:  Something like that.

John:  He's one of the jerks that made death threats against me.  I kinda

       would like to get him.

Noah:  You want his number?

John:  Yeah.

Noah:  Lemme see if I can catch up with him, I know a few people in LOD.

------------------------------------------------------------------------------

[Noah tried to get information on KERRANG KHAN for a while and then started

asking about KARL MARX -KL]



Noah:  Ok, KARL MARX.

John:  Oh, he got busted along with MARK TABAS you know, I told you all about

       that.

Noah:  Yeah yeah.

John:  He lives out in NPA XXX, but he was going to college in XXXXXXXXXX and

       I don't have a number for him there.

Noah:  He's probably back home now.

John:  Yeah, but I probably shouldn't give out his number.  He did get popped.

Noah:  Aw come on.

John:  Nah.

Noah:  Come on.

John:  Nah.

Noah:  Please.

John:  Nah. I probably don't have a correct number anyway.

Noah:  Dude.  Well if you don't have a correct number then give me the old

       number.

John:  Nah.

Noah:  C'mon dude.

John:  Nah.

Noah:  Dude!

John:  Nah nah.  Besides I have a feeling that he wouldn't appreciate being

       called up by hackers anyway.

Noah:  He's still around though!

John:  Is he!?

Noah:  Yes.

John:  Oh really.

Noah:  Yes sir.  Because he was talking with THE MARAUDER, you know, Todd.

John:  Yeah?

Noah:  Yeah.

John:  That's interesting.



[They went on to discuss THE SAFECRAKER, THE SEPTIC TANK, THE TWILIGHT ZONE,

TORTURE CHAMBER, and THE FEDERATION.  Maxfield reveled that he had been on

TWILIGHT ZONE back when THE MARAUDER used to run it.  -KL]

------------------------------------------------------------------------------

Noah:  THE MARAUDER is still home, he didn't go to college.

John:  Yeah, MARAUDER, now he is heavy duty.

Noah:  Yeah, he knows his snit (not a typo).  However, he doesn't brag about

       it.

John:  Well the thing is, you know is what the hell is he trying to

       accomplish? I sometimes kinda wonder what motivates somebody like that.

Noah:  What do you mean?

John:  Well he wants to screw around with all this stuff, but what's the

       point?

------------------------------------------------------------------------------

SIGMUND FRAUD, MAX FILES, TOMMY HAWK, TUC, PHRACK INC., MARK TABAS, were next

to be discussed.  After which MAXFIELD went on to retell a story about a

district attorney in California that referred to him as a legend in his own

time.  Noah then started asking about CAPTAIN CRUNCH and Easywriter, and

Maxfield told him the story of CAPTAIN CRUNCH's latest bust.

------------------------------------------------------------------------------

THE DISK JOCKEY, DOC HOLIDAY, THE MARAUDER, BIG BROTHER, ARTHUR DENT, THE

WEASEL, BILL FROM RNOC, THE 414 WIZARD, THE EXECUTIONER, and LORD DIGITAL were

next.



Then it was Noah's turn to unload (although Noah had already given out

information on many of the previously mentioned people).



TUC, THE TELECOM SECURITY GROUP, CELTIC PHROST, ZEPPLIN, and GENGHIS KHAN had

their information handed out freely.



John:  I guess I'm going to have the goons come over and pay you a visit.

Noah:  Who me?

John:  Take your computer, clean your room for you.

Noah:  No, no, please... don't... you can't do that.  I'll be an informant

       dammit.  I'll give you all my files, I'll send them immediately...

       Federal Express.

John:  Sounds good.

Noah:  Has anyone ever really done that?

John:  Well not by Federal Express.

Noah:  I'll send you all my manuals, everything.  I'll even tell you my

       favorite Sprint code.

John:  Sprint would appreciate that.  You know, it's interesting that you know

       MARAUDER.

Noah:  Todd and I, yeah, well we're on a first name basis.  [Yeah you know his

       first name but that's as far as it goes, isn't it Noah. -KL]

------------------------------------------------------------------------------

Noah gave out more people's information and the conversation ran on for

another 20 minutes.  The problem is that this is when the tape ran out, but

the conversation was going strong.  Noah was giving out numbers alphabetically

and he was still in the C-G area when the tape ran out.  There is no telling

as to what was discussed next.



All of the people mentioned at the beginning were discussed in depth and the

excerpts shown here do not necessarily show the extent of the discussion.  I

didn't transcript the entire conversation because in doing so would publicly

release information that would be unproductive to our society.



So, many of you are probably still asking yourself, where did we get the FBI

connection from?  Well, some time ago, DAN THE OPERATOR used to hang out with

THE TRADER and they were into some kind of stock fraud using Bank Americard or

something along those lines.  Something went wrong and Noah was visited by the

FBI.  As it turns out, Noah became their informant and they dropped the

charges.



Sometime later, Noah tried to set up TERMINUS (see the current Phrack

Pro-Phile) to meet (unknowingly) with the FBI and give them a tour of his

board,  TERMINUS realized what was going on and Noah's plans were ruined.



I hope you learned from this story, don't let yourself be maneuvered by people

like Noah.  There are more informants out there than you think.



                         Written by Knight Lightning



For more information about DAN THE OPERATOR, you should read THE SYNDICATE

REPORTS Transmittal No. 13 by THE SENSEI.  Available on finer BBSes/AEs

everywhere.

______________________________________________________________________________



PartyCon '87                                                  July 24-26, 1987

~~~~~~~~~~~~

This article is not meant to be as in depth as the SummerCon issue, but I

think you'll enjoy it.



Before we begin, here is a list of the total phreak/hack attendees;



      Cheap Shades / Control C / Forest Ranger / Knight Lightning / Loki

     Lucifer 666 / Mad Hatter / Sir William / Synthetic Slug / Taran King

               The Cutthroat / The Disk Jockey / The Mad Hacker



Other people who attended that should be made a note of include; Dan and Jeff

(Two of Control C's roommates that were pretty cool), Dennis (The Menace); one

of Control C's neighbors, Connie; The Mad Hacker's girlfriend (at the time

anyway), and the United States Secret Service; they weren't actually at

PartyCon, but they kept a close watch from a distance.



For me, it started Friday morning when Cheap Shades and I met Forest Ranger

and Taran King at Taran's house.  Our trip took us through Illinois, and we

stopped off at a Burger King in Normal, Illinois (close to Illinois State

University). Would you believe that the majority of the population there had

no teeth?



Anyway, our next stop was to see Lucifer 666 in his small one-horse town.  He

would follow us later (with Synthetic Slug).  We arrived at Control C's

apartment around 4 PM and found Mad Hatter alone.  The first thing he made a

note of was some sheets of paper he discovered (while searching ^C's

apartment).  I won't go into what was on the paper.  Although we didn't know

it at the time, he copied the papers and hid them in his bag.  It is believed

that he intended to plant this and other information inside the apartment so

that ^C would get busted.



Basically, it was a major party with a few mishaps like Forest Ranger and

Cheap Shades driving into Grand Rapids, Michigan on Friday night and not

getting back till 4 AM Saturday.  We hit Lake Shore Drive, the beach, a few

shopping malls, Chicago's Hard Rock Cafe, and Rush Street.  It was a lot of

fun and we may do it again sometime soon.



If you missed PartyCon '87, you missed out.  For those who wanted to go, but

couldn't find us, we're sorry.  Hotel cancellations and loss of phone lists

due to current problems made it impossible for us to contact everyone.



                         Written by Knight Lightning

______________________________________________________________________________



                      #### PHRACK PRESENTS ISSUE 15 ####



                   ^*^*^*^Phrack World News, Part 1^*^*^*^



                            **** File 8 of 10 ****







SEARCH WARRANT ON WRITTEN AFFIDAVIT



DATE:  7/17/87



TO:  Special Agent Lewis F. Jackson II, U.S. Secret Service or any agent d use

     of access devices, and Title 18 USC 1030 - Computer related fraud.



WHEN:  On or before (10 days) at any time day or night



------------



AFFIDAVIT



   "I, Lewis F. Jackson II, first being duly sworn, do depose and state:..."



[Here he goes on and on about his position in the San Jose Secret Service,

classes he has taken (none of them having to do with computers)]



   "Other individuals involved in the investigation:



    Detective J. McMullen -  Stanford Public Safety/Specialist in computers

    Steve Daugherty       -  Pacific Bell Telephone (sic)/ Specialist in fraud

    Stephen Hansen        -  Stanford Electrical Eng./ Director

    Brian Bales           -  Sprint Telecom./ Security Investigator

    M. Locker             -  ITT Communications/ Security Investigator

    Jerry Slaughter       -  MCI Communications/Security Investigator



4.  On 11/14/86, I met with Detective Sgt. John McMullen, who related the

following:



      a.  Beginning on or about 9/1/86, an unknown suspect or group of

suspects using the code name Pink Floyd repeatedly accessed the Unix and

Portia computer systems at Stanford University without authorization.



      b.  The suspects initially managed to decode the password of a computer

user called "Laurent" and used the account without the permission or knowledge

of the account holder.  The true account holder was given a new account

and a program was set up to print out all activity on the "Laurent" account.



       c & d.  Mentions the systems that were accessed illegally, the most

'dangerous' being Arpanet (geeeee).



       e.  Damage was estimated at $10,000 by Director of Stanford Computers.



       g.  On 1/13/87, the suspect(s) resumed regular break-ins to the

"Laurent" account, however traps and traces were initially unsuccessful in

identifying the suspect(s) because the suspect(s) dialed into the Stanford

Computer System via Sprint or MCI lines, which did not have immediate trap and

trace capabilities.



6.  On 2/19/87 I forwarded the details of my investigation and a request for

collateral investigation to the New York Field Office of The U.S. Secret

Service.  (The USSS [I could say something dumb about USSR here]).  SA Walter

Burns was assigned the investigation.



7.  SA Burns reported telephonically that comparison of the times at which

Stanford suffered break ins [aahhh, poor Stanford] with that of DNR's on

suspects in New York, Pennsylvania, Massachusetts, Maryland and California

showed a correlation.



8.  [Some stuff about Oryan QUEST engineering Cosmos numbers].



9.  On 4/2/87, I was telephoned again by Mr. Daugherty who reported that on

4/1/87, while checking a trouble signal on the above DNR's [on Oryan's lines],

he overheard a call between the central figure in the New York investigation

and [Oryan Quest's real name.]  Mr. Daughtery was able to identify and

distinguish between the three suspects because they addressed each other by

there first name.  During the conversation,  [Oryan Quest] acknowledged being

a member of L.O.D. (Legion Of Doom), a very private and exclusive group of

computer hackers.  [Oryan QUEST never was a member.]



10.  [Mr. Daughtery continued to listen while QUEST tried to engineer some

stuff.  Gee what a coincidence that a security investigator was investigating

a technical problem at the same time a conversation with 2 of the suspects was

happening, and perhaps he just COULDN'T disconnect and so had to listen in for

20 minutes or so.  What luck.]



11.  SA Burns reported that the suspects in New York regularly called the

suspects in California.



14.  From 4/30/87 to 6/15/87 DNR's were on both California suspects and were

monitored by me.



[The data from the DNR's was 'analyzed' and sent to Sprint, MCI, and ITT to

check on codes.  Damages claimed by the various LDX's were:



SPRINT   :  Oryan QUEST   : 3 codes for losses totaling $4,694.72

            Mark Of CA    : 2 codes for losses totaling $1,912.57



ITT      :  Mark Of CA    : 4 codes for losses totaling $639



MCI      :  Mark Of CA    : 1 code for losses totaling $1,813.62



And the winner is....Oryan QUEST at $4,694.72 against Mark with $4,365.19.]



20.  Through my training and investigation I have learned that people who

break into computers ("hackers") and people who fraudulently obtain

telecommunications services ("freakers") are a highly sophisticated and close

knit group.  They routinely communicate with each other directly or through

electronic bulletin boards.



     [Note:  When a Phrack reporter called Lewis Jackson and asked why after

his no doubt extensive training he didn't spell "freakers" correctly with a

'ph' he reacted rather rudely.]



21.

22. [Jackson's in depth analysis of what hackers have ("Blue Boxes are

23.     normally made from pocket calculators...") and their behavior]

24.



26.  Through my training and investigations, I have learned that evidence

stored in computers, floppy disks, and speed dialers is very fragile and can

be destroyed in a matter of seconds by several methods including but not

limited to:  striking one or more keys on the computer keyboard to trigger a

preset computer program to delete information stored within, passing a strong

magnetic source in close proximity to a computer, throwing a light switch

designed to either trigger a preset program or cut power in order to delete

information stored in a computer or speed dialer or computer; or simply

delivering a sharp blow to the computer.  [Blunt blows don't cut it.]



27.  Because of the ease with which evidence stored in computers can be

destroyed or transferred, it is essential that search warrants be executed at

a time when the suspect is least likely to be physically operating the target

computer system and least likely to have access to methods of destroying or

transferring evidence stored within the system.  Because of the rapidity of

modern communications and the ability to destroy or transfer evidence remotely

by one computer to another, it is also essential that in cases involving

multiple suspects, all search warrants must be executed simultaneously.



.

