Copy Link
Add to Bookmark
Report
k-1ine_20
k-20-(9)-01
OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
OoO=o=oOO=o=O=>
: -`- -`- OoO=o=oOO=o=O=>
; _|_--oOO--(_)--OOo--_|_ OoO=oOO==OoO=o=oOO=o=O=>
| ¡ K-1ine Zine ! | OoO=o=oOO=o=O=>
! issue 20, volume 9 ¡ OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
---------O^O---- OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
;. |__|__| OoO=o=oOK-1ine=o=OIsOoO=o=SooOO=o0LDSKOOL!oO=o=oOO=o=O=>
|| || OoO=o=oOO=o=O=OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
ooO Ooo OoO=o=oOO=o=O= OoO=o=oOO=o=O=OoO=o=oOO=o=O=>
OoO=o=oOO=o=O=OoO=o=oOO=o=O=O=o=ooO=o=>
;`-.> October 2001 <=o=O=o=O=o=O
'You Make Me [sic]'
A diplomat's life consists of three things:
protocol, Geritol, and alcohol.
-- Adlai Stevenson
_____________________________________________________________________________
» .- Words from the Editor -. « |
*: [-] Introduction .......................................... The Clone :*
*: (-) Contact Information ................................... The Clone :*
*: (-) Affiliate Web-Links ................................... Nettwerked :*
*: (-) Advertisment .......................................... HackerSalvage:*
*: (-) Advertisment .......................................... FlipperSmack :*
*: (-) Link of the Month ..................................... The Clone :*
*: (-) K-1ine Mirrors ........................................ The Clone :*
*: (-) Nettwerked Movie Mirrors .............................. Nettwerked :*
____________________________________________________________________________
» .- Documents -. « |
*: (x) (PROJECT) 'Hash' ...................................... Phlux :*
*: (x) 'An Insightful Look at the GOVnet Network' ............ m4chine :*
*: (x) 'The G.E.T.S. (Government Emergency Telephone System)' m4chine :*
*: (x) 'Hiding Messages No One Will Ever See on disc.server' . diabolik :*
*: (x) 'How to piss off Telus with your ADSL Modem' .......... sheppard :*
*: (x) 'Fun With Bash' ....................................... sheppard :*
*: (x) 'Straight From The Underground' ....................... The Clone :*
_____________________________________________________________________________
» .- Conclusion -. « |
*: [-] Credits ............................................... The Clone :*
*: [-] Shouts ................................................ The Clone :*
_____________________________________________________________________________
Introduction -
Wow, this is time to celebrate; K-1ine Issue #20 is out! It's hard to believe
I've compiled 20 issues since its beautiful birth in Mid 1999. I have to hand
it to myself for the dedication, and to all the contributors who have helped
to make K-1ine the largest and most insightful H/P e-zine in Canada!
I hope you enjoy this issue... see you next month!
-->
Contact Information;
=-=-=-=-=-=-==-=-=-=
Comments/Questions/Submissions: theclone@hackcanada.com
On IRC: irc.2600.net - #hackcanada, #cpu (key)
Check out my site: (Nettwerked) http://www.nettwerked.net
-->
=-=-=-=-=-=-==-=-=-=
Affiliate Web-Links:
=-=-=-=-=-=-==-=-=-=
CPU http://www.nettwerked.net/cpu *
Damage Incorporated http://www.freeyellow.com/members6/damage-inc/index.html
Grass Hopper Unit http://www.ghu.ca
Hack Canada http://www.hackcanada.com
H410G3N-dot-com http://www.h410g3n.com
Phreak BC http://www.phreakbc.com
PyroFreak http://www.multimania.com/pyrozine/index.html
* = featured sites of Nettwerked Incorporated
--
-- Advertisment --
+++ WWW.HACKERSALVAGE.COM +++
HackerSalvage.com is a non-profit website dedicated to
keeping old hardware in circulation. Many of us have
piles of it sitting around but can't just toss it out.
Here you can post computer items for sale or post a
want ad for items you are looking for. A perfect place
to get rid of perfectly good junk.... and get some new
stuff to rebuild the pile.
+++ +++
--
Flippersmack AD -
"Flippersmack is a culturemag for a penguin generation. What does this
mean? Articles and reviews from your favorite writers. The low-down on
what's fresh in tech, comics, movies, and music. Wrapped in a style all
its own."
"We will strive to release Flippersmack every week; a taste of insanity to
inspire, inform, and entertain. From the creators of System Failure and
Avalanche, there's a new zine out on the net: FLIPPERSMACK!"
You can read the first fourteen issues at:
http://www.nettwerked.net/flippersmack001.txt
http://www.nettwerked.net/flippersmack002.txt
http://www.nettwerked.net/flippersmack003.txt
http://www.nettwerked.net/flippersmack004.txt
http://www.nettwerked.net/flippersmack005.txt
http://www.nettwerked.net/flippersmack006.txt
http://www.nettwerked.net/flippersmack007.txt
http://www.nettwerked.net/flippersmack008.txt
http://www.nettwerked.net/flippersmack009.txt
http://www.nettwerked.net/flippersmack010.txt
http://www.nettwerked.net/flippersmack011.txt
http://www.nettwerked.net/flippersmack012.txt
http://www.nettwerked.net/flippersmack013.txt
http://www.nettwerked.net/flippersmack014.txt
http://www.nettwerked.net/flippersmack015.txt
http://www.nettwerked.net/flippersmack016.txt
http://www.nettwerked.net/flippersmack017.txt
http://www.nettwerked.net/flippersmack018.txt
http://www.nettwerked.net/flippersmack019.txt
http://www.nettwerked.net/flippersmack020.txt
--
--=[ LINK OF THE MONTH ]=--
Every month I post one really great "link of the month" on every issue
of K-1ine magazine. The link can be anything in the technology industry,
music scene, rave scene, punk scene, or even a good article you read on a
news site. I'll be taking submissions via e-mail or IRC right away;
so get your links in and maybe you'll see it in the next issue of K-1ine!
For the month of October, the link of the month is:
http://www.hypervivid.com
Great Information Technology and
Telecommunications Security Consulting Firm!
[submitted by: The Clone]
--
K-1ine Mirrors:
http://the.wiretapped.net/security/info/textfiles/k1ine/
"Wiretapped.net is an Australian site offering an archive of open
source software, informational and advisory textfiles and radio/conference
broadcasts covering the areas of network security, network operations,
host integrity, cryptography and privacy. We aim to become the largest
archive of this nature in the Asia/Pacific region through steady growth
of our archives and regular updates to them (most updated nightly).
We are proudly telehoused on a 10Mbit/sec connection by Connect.com.au using
OneGuard hardware donated by eSec Limited. The archive, along with its
sister site on the same machine, The AusMac Archive, generates between 10
and 60 gigabytes of outbound traffic daily. Wiretapped.net is hosted in
Sydney, Australia."
--
Def Con 9 coverage for 'Nettwerked: The Movie' is now online!
Please download from the following mirrors:
Disclaimer: If you're under 18, don't watch this video.
Contains scenes of nudity and drunkin' hackers 'n' phreakers acting silly.
* Mirror #1: http://lumo.eghetto.ca/~theclone/defcon9.wmv
(the_p0pe's server, Nova Scotia, Canada, 4Mbps)
* Mirror #2: http://www.pstis.com/defcon9.wmv (h410g3n's server,
Edmonton, Canada, 4Mbps)
* Mirror #3: http://www.h410g3n.com/defcon9.wmv (h410g3n's
server, Leduc, Canada, 4Mbps)
* Mirror #4: http://www.plappy.com/defcon.wmv (Plappy's server,
Edmonton, Canada, 2Mbps)
* Mirror #5: http://the.wiretapped.net/multimedia/defcon9.wmv
(Wiretapped.net server, Sydney, Australia, 10Mbps)
* Mirror #6: http://sniperwolf.powersurfr.com/~theclone/defcon9.wmv
(son4r's server, Edmonton, Canada, 2Mbps)
* Mirror #7: http://www.nurotek.net/linux/media/defcon9.wmv
(Nurotek Networks server, California, USA, via two 45Mbps pipes)
Help mirror my video!
32.1MB's, 103 kb's / sec, 43:36 minutes, Windows Media Format;
MPEG-4. Send all new mirror URLs to: theclone@hackcanada.com
--
############## #.txt - Introducing Hash ##############
########################################################
############################ #######################
########################## #### ######################
#################### ###### #################
### s################# #################
### H### #### ########## ####### ################
### #### #### ############ ##### #################
### #### #### # #### ### ##################
### #### #### a##### ### ## ###################
### ############ ######## ### ####################
### ############ #### #### ### #######################
### #### #### ### ### ### ########################
### #### #### ## ### ### #######################
### #### #### # ### #### ######################
### #### # #### ########### #### ###
## ### #### ########### #### ################# ###
## ### #### ###### #### ############## ####
### ## ## ####### ## #### #### ######### ####
### ### ####### #### #### ####### ######## #######
### ############ ###### ####### ###### ########
### ######## ###################### ####### #########
#### ######### ############# ###### #########
##### ############# ######## ######### ###########
##### ############## #### ########### ############
###### ######H######## ## ########### ##############
####### ############# ## ########## ###############
########## ############ ######### #################
############ ##################### ###################
############# ################### ####################
############## ################### #####################
############## ######### ######## #####################
############## ######## ## ####### #####################
############## ####### #### ###### #####################
############# ###### #### ##### ####################
############ ##### ######## #### ##################
########## ####### ########## ###### ################
######## ######### ########## ######## ##############
##### ########### ########## ########## #############
#### ############# ########## ########## #############
#### ############ ############ ######### #############
#### ########### ############# ######## #############
##### ############## ##############
########################################################
########################################################
#phlux phlux@fucktelus.com#
:OVERVIEW:
So what the fuck is hash?? Hash can refer to the # (pound) key pertaining to
telecommunications. It can be the slang term for hashish, which refers to the
purified resinous extract of marijuana. Hash is also a unix command and has
roots in C aswell. In this txt i will refer to hash as the phreaking related
database program i will be writing. Right now it is in planning stages
and hopefuly soon i can begin coding, first i need your comments, suggestions,
and ideas.
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
!Please, read the functions and consider wether such a program is worth your !
!time, as im sure it will be. For this to become reality all i need is input.!
!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
-:contact:-
/msg phlux on irc.2600.net irc.dal.net
ICQ 11192969, MSN m_s_n_sucksdank@hotmail.com
E-Mail fraud@verizonmail.com
-:intent:-
The aims of this program will be to provide multiple functions that otherwise
would otherwise be not easily accessible/available
Main objective: make Hash a simple program, easy to use, providing a wealth of
information and uses.
-:requirements:-
Because of the nature and simplicity of my my intents, the program will be
able to function on a 386, idealy, i plan on running Hash constantly, so use
of a dedicated low end computer is essential.
-:note:-
Because i am canadian, Hash will be written with a canadian prespective,
so alot of the functions will be canadian only, or more information will be
provided to canadians, and therefore more useable. However american users will
still find value for Hash
-:FUNCTIONS:-
If your wondering what the big fucking deal is then ill list off the functions
now;
to be incorporated into Hash:
**NPA lookup, NPA reverse lookup, including a graphical color coded Canadian
NPA map(color)
**Numbering Information --user puts in any telephone number in the format of:
NXX-XXX-XXXX (N is any digit other then a 1 or 0) this is the proper format
for a north american telephone number. Much MUCH information can be told
from a telephone number. For instance;
**If the telephone number spells any words (1-900-WET-CUNT) so assuming
that number isn't assigned, and you want to buy it, Hash would tell you
the 938 exchange in SAC 900 is operated by Federal Transtel, Inc.
and to contact Ms. Geri Capri at 800-933-6600 extension 6202.
\Also reversing of telephone number words should be implemented(tell hash the
words and it will tell you the possible phone number combinations)
In the meantime check phonespell.org to see exactly what i mean.
-900-NXX-XXXX -is a telephone number where an announced cost to call to
such a number is billed to the calling party. 900 again is an SAC, so
therefore it is non geographical. Other non geographical NPAs include:
456 - Inbound International
600 - Canadian Services
710 - US Government
**So if 900-273-XXXX were entered, Hash would know 273 is assigned to
Stentor Canadian Network Management, and additional information would be
given, (contact information) in this case you would call Laurie Storm
at 519-663-7485 .....
**If your wondering where 519-663-7485 is, Hash's database could further tell
you, 519 NPA is assigned to Ontario, CANADA, that it has been inservice
since Janruary, 1, 1953, if it is geographic or not(it is), while the 663
exchange serves London. Much more information can be incorporated, such as
Time Zone for that area, even conversion and comparison as per your
timezone.
\This would be useful if you don't want to be calling your distant phreaking
buddies for a conf and end up waking up their mom because its 5am there.
--depending on supply(coding)+demand issues, the relief planning stats for
the NPA could be displayed, for instance, in 403 (alberta canada) Hash
would've given the date of the area code split and the next time the NPA(s)
would be in jeopardy for relief planning.
** 8XX-NXX-XXXX a telephone number with this format where the first 2 X's MUST
represent like digits (so 800 888 877, 866 etc) are all tollfree numbers.
800 is not technicaly an area code but rather an SAC(service access code).
This is an example of an ECR, Easily Recognized Code.
\The INWATS(Inward Wide Area Telecommunications Service(8XX SACs)) has
six bands of service areas.
Band 6 -the best, anywhere in North America can reach a band 6 INWATS
Band 5 -includes the 48 contiguous states
Band 1 -includes only the state contiguous to that one
So therefore a band 6 can be most easily reached(bands are responsible for
your american friends being able to dial into that conf, yet if you are
canadian you will get an annoying intercept msg.)
!NOTE: This information pertaining to INWATS bands is courtesy of one
Mr. Jolly Roger and is outdated, and therefore will be subject to R&D.
\Intrastate INWATS (can only be called from one state) always has a
2 as the last digit in the exchange, so 800-NX2-XXXX. The NXX (exchange)
on 800 SACs respresents the area where the business is located.
So 800-431 would terminate at a New York CO.
(again this information courtey Jolly Roger, subject to further R&D
obvisouly, in the meantime does anyone know how he figures 800-431
terminates in NY? I sure as hell don't)
**Now lets say you do a search for 800-855-XXXX The exchange 855 is used
to access the PSTN via TTY (TRS/MRS) to and from speech or hearing
impaired users, among other things, 800-855 #s are designated for such
disabilitied users only. Because 800 is a ERC SAC, it is non geographic.
It was implemented on Jan, 1, 1966 Hash will instantly tell you all
this information pertaining to the phone number you enter, among whatever
other related information is available.
**Telco related searchable dictionary(still being considered as this
function would require words to be submitted from users(credit given))
Or im sure i could borrow one from somewhere...
**ANI II code lookup(+definitions)
**Calculator(calc.exe can lick my baunch)
**DTMF decoder is a possibility with an added circuit(using serial/parallel)
**Morse Code encoder/player(pc speaker --why not Mr Bell was an OK guy)
**Resistor Encoder/Decoder(i always forget what the colored bands represent)
**International&Caribbean Country Code Lookup(+reverse)
**Planned NPAs(all of north america) + Old NPA/Overlay Status, inservice
date and the status of the planned NPAs
**Vertical Service Codes lookup/definitions (your *67, *69, etc)
**CIC(carrier identification code) lookup(+company name, assignment date,
contact information(name, phone #, address)
\CICs purpose is to enable routing+billing from the local provider to the
specific inter-exchange and other providers in the NANP network.
Each CIC is in the format of XXXX, is a service providers identity that
has bought either FGB/FGD(feature group B or D) access from the local
access carrier.
FGB CAC 950-XXXX where the XXXX is the CIC that public can use to access
a chosen long distance provider.
FGD CAC local trunk side access to local carrier by another carrier.
Allows pre-subscription to a long distance carrier. FGD CAC is accessed
with 101XXXX(XXXX=CIC) the user can then place a long distance call using
a long distance carrier to which the phone is not pre-subscribed.
3D(igit) FGD represents 101XXXX 4D(igit) FGD represents 10XXX
**Personal Communications Services N00 NXX allows "some combination" of
personal mobility, terminal mobility+service profile management. May be
reffered to as "follow me" PCS. Relief planning will use ECR 533.
500-NXX-XXXX prefix indicates service provider, suffix denotes the
premium service.
**GOVnet Dial-In Prefixes, see http://www.hackcanada.com/canadian/other/govnet.txt
**More(tell me)
Beginner Phreakers to elite phreakers should find Hash a very useful program.
Alot of the information Hash will use is available at NANPA.com and
subsidaries involved with number planning, guidelines, and general
telecommunications.
For instance, cyb0rg/asm has on hackcanada.com/telco/edmontonexchanges.html
has posted a listing of exchanges in 780 Edmonton, Alberta that originally
appeared in the phonebook(1998 i believe). The information provided
is more extensive, whereas an exchange will say function+district. One
interesthing note is that 780-530 is reserved for Military use.
Hash could combine this list with an updated list of 780-NXX edmonton
exchanges, so an updated version would be accessible.
Another interesting thing to note if the government exchanges;
780-427-XXXX Provincial Government
780-496-XXXX Edmonton City Government
780-495-XXXX Edmonton Federal Government
Many telephone numbers using these government prefixes can be dialed with
310-0000 which must be an extender the government setup for us. yay.
Phone 310-4455 to give your thanks.(Alberta Connect Gov Comment Hotline :)
So yeah, more OCRing...(id like to know what district a prefix is instead of
just knowing it is in a big big city)
However the lists do include Plant Test Code NPAs (bust out the war dialer,
or perhaps i could incorporate one into Hash? that would be KING#@!)
Coding considerations for a war dialer are not out of my reach, as i plan to
code Hash in Turbo Pascal for DOS.(unix users should have no problems using
dosemu as the Hash is not a very complex program)
What would you guys want in Hash's scanner??
-Carrier Detection(obvisouly)
-SIT detection? should be fun..
-Fax detection.. " " "
-Dial tone (PBX) detection(etc etc,busy/reorder/ring counter all the obvisous)
-Direct modem AT access, scripting? The scanner should be able to work along
side such devices as the PowerKey/Toll restrictors (so a pin cracker)
-you tell me, a scanner would have to be made available after the standard
functions are implemented...
Should it be GUI or console based?? GUI would mean a little front end, so
extra code, larger program(im curious as to how large just the db files will
take up..though i do have plans to handle this.)
Console would be hardcore, nice and clean:
Hash# get 780. planttest
Parsing........
NPA 780 (Northern Alberta) Results for PLANT TEST CODE search:
+-------------------------------------------------------------------+
: NPA : NXX : Status : Rate Center : Remarks :
:-----+-----+------------+---------------+--------------------------:
: 780 : 297 : In Service : N/a for PTEST : Plant Test Code :
: 780 : 958 : In Service : N/a for PTEST : Plant Test Code :
: 780 : 959 : In Service : N/a for PTEST : Plant Test Code :
+-------------------------------------------------------------------+
Ring Back: (403/780 AB) 570-PRE-SUFF Flash hook
`-DTMF Tone Analyzer: key 1234567890 at dialtone, two 'busy'
signals will be heard on accurate DTMF. Ring Back ANI: 1234567890
Local ANI: (403/780 AB) 311
`-N11 Service Code
1000hz Test Tone: (403/780 AB) 310-4649 310-8381
`-403/780.310-XXXX: 7 digit service, Rate Center: Sherwood Park
Command'get 780. planttest' complete.
Hash# get 780. planttest > C:\780test.txt
....
Command'get 780. planttest > C:\780test.txt' complete.
</sample>
Console Hash would not be comprimised with excessive code, screen filler,
it would be more effecient. Anyone who has ever user DOS/Console unices/MUDs
should not feel uncomfortable with such a system, an extensive help system
would obvisouly be implemented, once commands learned, this would be much
faster then navigating menus with arrow keys.
However all suggestions welcomed.
Now that you have a taste how Hash may be able to help you i will address
other issues:
What liscense will the program be released under:
Seems as im ripping alot of information from nanpa.com, the program will be
free, i would only expect that if you use the program you tell me what you
think of it. I am ashamed of my coding, so source will not be releaed.
Why Turbo Pascal?:
I have not finished "Waite Groups New C Primer Plus" when i do, i will bust
out Borlands Turbo C, so DOS version will run much faster, and will benefit
the unix kiddies. Maybe i could write my own mini zip slack distribution
soley for hash, zip slack rules, Hash would run just find with 100mb parallel
(how many of you guys have zip drives? would be a good project to help me get
to know linux)
System requirements?:
Hopefully minimal, being 486 8mb ram max, maybe 386 4mb ram.. it would be
slow though... but i think it would be worth it, just keep the box on 24/7
i would use that shit so much... like the program would have a clock+date
forsure...
For tone generation, PC speaker needed, tone generation is to limited single
frequency tones unless.. sound card implementation?
WAV files would take up abit of space.. but then i could include any/all
tones, intercept recordings (good fun when your drunk and harassing telus
TSPS opers)....hmm.. i would have to get like Wolfenstein/DOOM MIDIs too!
Well fuck look at me get all riled up.. might as well go all the way?
If im boxing a call at a payphone(see my payphone/TTY txt :) with my lappie,
hax0ring AGNPAC with the acoustic coupler.. fucking rights i'd want to listen
to DOOM MIDIs... that shit is elite, would be scary as fuck at such a time..
HEHE looking in the phone book theres a nice Postal Code listing in really
small txt, i could OCR that shit, and have an update package cuz it would
be a few MB worth of text!
note from phone book: "This publication contains data under liscense from
Canada Post Corporation's publication entitled Canada's Postal Code Directory.
The postal code data may only be copied for the purposes of preparing mail to
be delivered by Canada Post Corporation or in accordance with a written
licence from Canada Post Corporation"
Translation: In the future when i OCR that shit the command will be;
Hash# preparemail
Preparing Mail to be delivered by Canada Post;
What PO Box/Route/Street Address? (enter postal code for reverse)
T4V 4S1
Address Mail To: ELECTRO TEL 48AVE. #3720 T4V 4S1
..
What else is there?:
Pr0n, yes ofcourse the pr0n...
Because lots of the databased information changes quite frequently(every month
sometimes..) i would have to make little update programs.. but for that
i could use pkzip'ed executables... so i do all the fucking work and you
get to just run a program.
Color coding would be essential, so you could quickly recognize numbers
Government Telephone=GREEN
Toll Free Services=TEAL? (what color is teal?)
Business Exchanges/Suffixes: BLUE
Residential Exchanges/Suffixes: RED (notice a trend?)
Test Numbers: blinking teal?
Important numbers (pertaining to canada(priority)) that are business (telus
business offices, all the important shit..) i should have in another database
(toll free too.. i dont want the list too big) but common numbers like
ResPorg, Telus TTY/dialaround, Telus NOC, RCMAC :P, just stuff phreaks
commonly use, or may be commonly heard would be added to the list...
Many a time have unknown numbers been said on a conf, pasted to irc, etc, so
I hope this program will clear some shit up so you dont have to look like a
fool.
uhm oh yeah fuck colors im going to bed
What are your resources for thsi project:
Public docs from various orginazations;
NANPA(North American Numer Planning Administration),
INC(Indutry Numbering Comittee),
CNA(Canadian Numbering Administrator),
CSCN(Canadian Steering Committee On Numbering)
so fucking e-mail phluxy and tell him what you want on your pie
fraud@verizonmail.com
--
==> 'An Insightful Look at the GOVnet Network' <==
==> By: m4chine
==> Date: 10/12/01
==> E-mail: m4chine@fucktelus.com
-
Description
indeX =>
-> Introduction
-> GOVnet's Purpose
-> GOVnet's Origin
-> Dial-In Prefixes
-> News Article Pertaining to GOVnet
-> Conclusion
<=>
Introduction -
GOVnet is the name given to the network infrastructure which serves government offices in
Montpelier and Waterbury as well as district offices in twelve cities and towns statewide. In
the near future the Whitehouse and the DOD will be adopting this network for nation-wide usage.
The physical backbone consists of fiber optic cable connecting state buildings on the Montpelier
and Waterbury campuses as well as high-bandwidth digital circuits connecting district offices
statewide. The wide-area backbone is divided into OSPF regions with at least one alternative
route for each link. From the backbone nodes, 56 Kbps backfeeds serve other government offices,
schools, and libraries statewide.
In addition there are dial-in sites located in every local calling area of the state facilitating
network access with a local phone call from any school or library in the state that elects to have
dial-in access. SLIP and PPP access, as well as VT100 access, are supported on a dial-in basis.
The network uses the "open" non-proprietary TCP/IP communications protocol which permits connectivity
throughout the state, the nation and the world.
Network services include Internet access, government-wide e-mail, and WWW access to government
information and services. See the State of Vermont home page (http://www.state.vt.us/).
--
GOVnet's Purpose -
GOVnet was implemented to meet the twofold network challenge of improved access with reduced costs.
The network provides for complete inter-agency and inter-departmental information access through a single
system serving all agencies on a cooperative basis. This eliminates the need for each agency or department
to provide redundant networks involving duplicate costs.
--
GOVnet's Origin -
The Vermont Information Strategy Plan (VISP) identified the requirement for information sharing and
networking in two of the critical success factors associated with its objectives. The Information Systems
Advisory Council (ISAC), which was created by VISP (now called IRMAC), was commissioned by the Telecommun-
ication Ten-Year Plan to form a network subcommittee to "develop a plan to integrate network services where
such sharing is valuable for information sharing among government agencies (and) where it is designed and
implemented with the participation and unanimous approval of ISAC."
For a detailed analysis of GOVnet, including a chronology, see the Legislative Joint Fiscal Office's GOVnet
System Evaluation and Network Study (http://www.leg.state.vt.us/reports/govnet/govnet.htm).
--
Dial-In Prefixes -
The list below shows the local dial-in site(s) serving each telephone exchange in the State.
For the telephone number of a specific GOVnet dial-in site, wardial the motherfuckin' prefix
or social engineer the technology coordinator of the department.
Dial-In Sites by Telephone Exchange Telephone Exchange Dial-In Site(s):
222 (Bradford) Bradford
223 (Montpelier) Montpelier, Morrisville
226 (Proctor) Springfield
228 (Ludlow) South Londonderry
229 (Montpelier) Montpelier, Morrisville
234 (Bethel) Randolph, Rutland, Woodstock
235 (Middle Town Springs) Rutland, Wells
241, 244 (Waterbury) Montpelier
247 (Brandon) Middlebury, Rutland
253 (Stowe) Montpelier, Morrisville
254, 257, 258 (Brattleboro) Brattleboro
259 (Mount Holly) Rutland, South Londonderry
263 (Perkinsville) Springfield
265 (Fair Haven) Rutland
266 (Canaan) Canaan
273 (Hubbardton) Rutland
276 (Brookfield) Montpelier, Randolph
277 (Lemington) Canaan
285 (Franklin) St. Albans
287 (Poultney) Rutland, Wells
291 (White River Junction) White River Junction, Woodstock
293 (Danby) Rutland, South Londonderry
295, 296 (White River Junction) White River Junction, Woodstock
325 (Pawlet) Rutland, Wells
326 (Montgomery) St. Albans
328 (Guildhall) Island Pond
333 (Fairlee) Bradford
334 (Newport) Newport
348 (Williamsville) Brattleboro
352 (Salisbury) Middlebury
362 (Manchester) Bennington, South Londonderry
365 (Newfane) Brattleboro
368 (Jacksonville) Brattleboro
371 (Montpelier) Montpelier, Morrisville
372 (Grand Isle) Burlington, St. Albans
375 (Arlington) Bennington, Londonderry
387 (Putney) Brattleboro
388 (Middlebury) Middlebury
394 (Rupert) Bennington, Wells
422 (Sherburne) Rutland, Woodstock
423 (Readsboro) Bennington
425 (Charlotte) Burlington
426 (Marshfield) Montpelier
429 (West Newbury) Bradford
433 (Williamstown) Montpelier, Randolph
434 (Richmond) Burlington
436 (Hartland) White River Junction, Woodstock
438 (West Rutland) Rutland
439 (East Corinth) Bradford
442 (Bennington) Bennington
446 (Wallingford) Rutland
447 (Bennington) Bennington
453 (Bristol) Middlebury
454 (Plainfield) Montpelier
456 (East Calais) Montpelier, Morrisville
457 (Woodstock) White River Junction, Woodstock
459 (Proctor) Rutland
462 (Cornwall) Middlebury
463 (Bellows Falls) Bellows Falls, Springfield
464 (Wilmington) Bennington, Brattleboro
467 (West Burke) Island Pond, St. Johnsbury
468 (Castleton) Rutland
472 (Hardwick) Montpelier, Morrisville, St. Johnsbury
475 (Panton) Middlebury
476, 479 (Barre) Montpelier
482 (Hinesburg) Burlington
483 (Pittsford) Rutland
484 (Reading) Woodstock
485 (Northfield) Montpelier, Randolph
492 (Cuttingsville) Rutland
496 (Waitsfield) Middlebury, Montpelier, Randolph
524 (St. Albans) St. Albans
525 (Barton) Island Pond, Newport
527 (St. Albans) St. Albans
533 (Greensboro) Morrisville, St. Johnsbury
537 (Benson) Rutland
545 (Weybridge) Middlebury
546 (Weathersfield) Springfield
563 (Cabot) Montpelier, St. Johnsbury
583 (Waitsfield) Middlebury, Montpelier, Randolph
584 (Groton) Bradford
586 (Craftsbury) Morrisville
586 (Greensboro) Morrisville, St. Johnsbury
592 (Peacham) St. Johnsbury
623 (Whiting) Middlebury
626 (Lyndonville) St. Johnsbury
633 (Barnet) St. Johnsbury
635 (Johnson) Morrisville
644 (Jeffersonville) Morrisville
645 (Wells) Wells
649 (Norwich) White River Junction, Woodstock
651, 654, 655, 656, 657, 658, 660 (Burlington) Burlington
672 (Bridgewater) Woodstock
674 (Windsor) Springfield, White River Junction, Woodstock
676 (Maidstone) Island Pond
684 (Danville) St. Johnsbury
685 (Chelsea) Randolph
694 (Stamford) Bennington
695 (Concord) St. Johnsbury
722 (Westminster) Bellows Falls
723 (Island Pond) Island Pond, Newport
728 (Randolph) Randolph
744 (Troy) Newport
746 (Pittsfield) Rutland
747 (Rutland) Rutland
748, 751 (St. Johnsbury) St. Johnsbury
754 (Orleans) Island Pond, Newport
755 (Albany) Morrisville, Newport
757 (Wells River) St. Johnsbury
758 (Bridport) Middlebury
759 (Addison) Middlebury
763 (South Royalton) Randolph, White River Junction, Woodstock
765 (South Strafford) White River Junction
766 (Derby) Newport
767 (Rochester) Middlebury, Randolph
769 (Essex Junction) Burlington
770, 772, 773, 775 (Rutland) Rutland
785 (Thetford) White River Junction
786 (Rutland) Rutland
796 (Alburg) St. Albans
822 (Island Pond) Island Pond
822 (Norton) Canaan, Island Pond
823 (Pownal) Bennington
824 (South Londonderry) South Londonderry
827 (East Fairfield) St. Albans
828 (Montpelier) Montpelier, Morrisville
843 (Grafton) Bellows Falls, South Londonderry
848 (Richford) St. Albans
849 (Fairfax) St. Albans
860, 862, 863, 864 (Burlington) Burlington
866 (Newbury) Bradford
867 (Dorset) Bennington
868 (Swanton) St. Albans
869 (Saxtons River) Bellows Falls, Springfield
871, 872 (Essex Junction) Burlington
873 (Derby Line) Newport
874 (Jamaica) Brattleboro, South Londonderry
875 (Chester) Bellows Falls, Springfield, South Londonderry
877 (Vergennes) Middlebury
878, 879 (Essex Junction) Burlington
883 (Barre) Montpelier
883 (Washington) Montpelier
885, 886 (Springfield) Bellows Falls, Springfield
888 (Morrisville) Montpelier, Morrisville
889 (Tunbridge) Randolph
899 (Underhill) Burlington
892 (Lunenburg) Guildhall
893 (Milton) Burlington, St. Albans
895 (Morgan) Island Pond, Newport
896 (Wardsboro) Bennington, Brattleboro, South Londonderry
897 (Shoreham) Middlebury
928 (Isle La Motte) St. Albans
933 (Enosburg Falls) St. Albans
948 (Orwell) Middlebury
962 (Bloomfield) Island Pond
988 (North Troy) Newport
--
News Article Pertaining to GOVnet -
[NOTE: This article talks like GOVNET doesn't exist, though it's obvious
its existance and development has been an ongoing process for quite some time]
U.S. Seeks to Build Secure Online Network;
Telecom Firms Asked for Help in Constructing Private 'Govnet' System
(http://www.washingtonpost.com/wp-dyn/articles/A40092-2001Oct10.html)
By Krissah Williams
Washington Post Staff Writer
The government's new cyber-security officials yesterday asked telecommunications
companies for help building a government computer network that would have "no risk
of outside penetration" -- a task some computer security consultants say is nearly impossible.
Plans for the private network, called Govnet, hinge on whether a reliable network infrastructure
can be built at an affordable price, officials said. Computer system consultants said they could
not estimate how much the network would cost because of the government's enormous size and security
needs.
Richard Clarke, who was appointed special adviser to the president for cyberspace security this week,
said he believes a more reliable system can be built. Ninety percent of available fiber-optic space is
unused and fairly inexpensive to obtain, he said.
Govnet is part of a plan Clarke announced earlier this week "to secure our cyberspace from a range of
possible threats, from hackers to criminals to terrorist groups, to foreign nations, which might use
cyber-war against us in the future." Govnet would be completely independent from the Internet to help
keep out hackers and viruses, according to the government's plan.
The request from the General Services Administration asks that telecommunications companies submit
proposals about how the network could be built, how much it would cost, and how long it would take
to construct.
"Based upon that we will make a decision. We're waiting to hear from industry right now," Clarke said.
This year, the current network has been breached by hackers, computer worms and viruses.
In April, government Web sites were manipulated by Chinese hackers angered by the death of a Chinese
pilot in a collision with an American spy plane. The system was also roughed up by the "Code Red"
computer worm and an attack program called "ILoveYou." The viruses affected thousands of government
computers.
Last year a report by the General Accounting Office, an internal government watchdog, found weaknesses
in the computer network that could allow terrorists or hackers to "severly damage or disrupt national
defense or vital public operations or steal sensitive data."
Clarke said the government's current virtual private network is vulnerable to viruses and denial of
service attacks that Govnet would make more difficult to execute.
George Kurtz, co-author of "Hacking Exposed" and chief executive of security consulting firm Foundstone
Inc., said such a network is feasible but would be costly and difficult to build. It is impossible to
stave off all attacks, he said.
"The gist of this entire effort is to try to segment critical government computer systems from the
rest of the Internet," Kurtz said. "You can't guarantee against these sort of attacks. There is always
going to be a flaw with software, a flaw with hardware or the human element."
Even on Govnet, viruses and attacks could still be spread by floppy disks or connections with trusted
systems, Kurtz said.
An internal network, such as the Govnet proposal, is worth investigating but will probably fall to
sophisticated hackers, said Amit Yoran, chief executive of security-services company Riptech Inc.
and a former information-security program director at the Defense Department.
"It is probably more feasible to implement and strongly enforce global security postures and practices
rather than go out and purchase new assets," Yoran said. "Once someone is able to get in, they will find
a weak link. When you have a network the size of the government's there will be weak links. Someone will
get in."
--
Conclusion -
This is what the US Government gets for publically releasing documentation on the Internet about
their so-called "secret" and "private" network... I know you'll have a few good laughs about that one
(I know I did). Love, Peace, And Afro Grease!
--
'The G.E.T.S. (Government Emergency Telephone System) Paper'
-
Written by: m4chine
Date: Tuesday October 02, 2001
-
E-mail: m4chine@fucktelus.com
Disclaimer: This paper has been written to educate the public.
This paper was not written to make terrorists more
creative or make life easier for wannabe phone phreaks.
Don't attempt any of the stuff written about in this paper.
God bless freedom of information...
=-
- Disclaimer -
- G.E.T.S. ACT -
- Social Engineering -
- Dial Up Numbers -
- Conclusion -
=-
Government Emergency Telephone System ACT --
Sec. 0.01. This Act shall be known and may be cited as the
"Emergency Telephone System Act".
(Source: P.A. 85-978.)
Sec. 1. The General Assembly finds and declares that it is in the
public interest to shorten the time required for a citizen to request
and receive emergency aid. There currently exist thousands of different
emergency phone numbers throughout the state, and present telephone
exchange boundaries and central office service areas do not necessarily
correspond to public safety and political boundaries. Provision of a
single, primary three-digit emergency number through which emergency
services can be quickly and efficiently obtained would provide a
significant contribution to law enforcement and other public service
efforts by making it less difficult to quickly notify public safety
personnel. Such a simplified means of procuring emergency services will
result in the saving of life, a reduction in the destruction of
property, quicker apprehension of criminals, and ultimately the saving
of money. The General Assembly further finds and declares that the
establishment of a uniform, statewide emergency number is a matter of
statewide concern and interest to all inhabitants and citizens of this
State. It is the purpose of this Act to establish the number "9-1-1" as
the primary emergency telephone number for use in this State and to
encourage units of local government and combinations of such units to
develop and improve emergency communication procedures and facilities in
such a manner as to be able to quickly respond to any person calling the
telephone number "9-1-1" seeking police, fire, medical, rescue, and
other emergency services.
(Source: P.A. 85-978.)
Sec. 2. As used in this Act, the terms defined in Sections
following this Section and preceding Section 3 have the meanings
ascribed to them in those Sections.
(Source: P.A. 88-497.)
Sec. 2.01. "Public agency" means the State, and any unit of local
government or special purpose district located in whole or in part
within this State which provides or has authority to provide
firefighting, police, ambulance, medical, or other emergency services.
(Source: P.A. 79-1092.)
Sec. 2.02. "Public safety agency" means a functional division of a
public agency which provides firefighting, police, medical, or other
emergency services.
(Source: P.A. 79-1092.)
Sec. 2.03. "Direct dispatch method" means a telephone service
providing for the dispatch of an appropriate emergency service unit upon
receipt of a telephone request for such services and a decision as to
the proper action to be taken.
(Source: P.A. 79-1092.)
Sec. 2.04. "Relay method" means a telephone service whereby
pertinent information is noted by the recipient of a telephone request
for emergency services, and is relayed to appropriate public safety
agencies or other providers of emergency services for dispatch of an
emergency service unit.
(Source: P.A. 79-1092.)
Sec. 2.05. "Transfer method" means a telephone service which
receives telephone requests for emergency services and directly
transfers such requests to an appropriate public safety agency or other
provider of emergency services.
(Source: P.A. 79-1092.)
Sec. 2.06. "Referral method" means a telephone service which, upon
the receipt of a telephone request for emergency services, provides the
requesting party with the telephone number of the appropriate public
safety agency or other provider of emergency services.
(Source: P.A. 79-1092.)
Sec. 2.06a. System. "System" means the communications equipment
required to produce a response by the appropriate emergency public
safety agency as a result of an emergency call being placed to 9-1-1.
(Source: P.A. 87-1244; 88-604, eff. 9-1-94.)
Sec. 2.07. "Basic system" means a telephone service which
automatically connects a person dialing the digits "911" to an
established public safety answering point through normal telephone
service facilities.
(Source: P.A. 79-1092.)
Sec. 2.08. "Sophisticated system" means a basic system with the
additional capability of automatic identification of the caller's
number, holding the incoming call, reconnection on the same telephone
line, clearing a telephone line, or automatic call routing or any other
capability or features then available or combinations of such
capabilities.
(Source: P.A. 85-978.)
Sec. 2.09. "Commission" means the Illinois Commerce Commission.
(Source: P.A. 79-1092.)
Sec. 2.10. "Implementation date" means the effective date of a
public act, other than this amendatory Act of 1987, providing all local
public agencies affected by this Act with a specific source or sources
of revenue for payment of the total costs of establishing or upgrading,
operating and maintaining the emergency telephone systems required by
this Act.
(Source: P.A. 85-978.)
Sec. 2.11. "Board" means an Emergency Telephone System Board or a
Joint Emergency Telephone System Board created pursuant to Section 15.4.
(Source: P.A. 85-978.)
Sec. 2.12. (a) For the purposes of this Act, "network connections"
means the number of voice grade communications channels directly between
a subscriber and a telecommunications carrier's public switched network
without the intervention of any other telecommunications carrier's
switched network which would be required to carry the subscriber's
inter-premises traffic, which connection either (1) is capable of
providing access through the public switched network to a 9-1-1
Emergency Telephone System if one exists, or, (2) if no system exists at
the time a surcharge is imposed under Section 15.3 which would be
capable of providing access through the public switched network to the
local 9-1-1 Emergency Telephone System if one existed.
(b) For the purposes of this Act, no telecommunications carrier
providing facilities-based local exchange telecommunications service
prior to January 1, 1986 shall be required to offer or provide
sophisticated 9-1-1 system features such as selective call routing in
any area where that carrier's local switching facility does not have the
capability to do so.
(c) For the purposes of this Act, "telecommunication carrier" does
not include a cellular or other mobile communication carrier.
(Source: P.A. 86-101; 87-167.)
Sec. 2.13. "Transmitting messages" shall have the meaning ascribed
to the term in Section 8-11-2 of the Illinois Municipal Code.
(Source: P.A. 85-978.)
Sec. 2.14. Automatic alarm; automatic alerting device. "Automatic
alarm" and "automatic alerting device" mean any device that will access
the 9-1-1 system for emergency services upon activation.
(Source: P.A. 88-497.)
Sec. 2.15. Mechanical dialer. "Mechanical dialer" means any device
that either manually or remotely triggers a dialing device to access the
9-1-1 system.
(Source: P.A. 88-497.)
Sec. 2.16. Private business switch service. "Private business
switch service" means a telecommunications service including centrex
type service and private branch exchange service (PBX), even though key
telephone systems or equivalent telephone systems registered with the
FCC under 47 C.F.R. Part 68 are directly connected to centrex type and
PBX systems providing 9-1-1 services equipped for switched local network
connections or 9-1-1 system access to business end users through a
private telephone switch. The term "private business switch service"
does not include key telephone systems or equivalent telephone systems
registered with the FCC under 47 C.F.R. Part 68 when not used in
conjunction with centrex type and PBX systems. "Private business switch
service" typically includes, but is not limited to, private businesses,
corporations, and industries where the telecommunications service is
primarily for conducting business.
(Source: P.A. 88-604, eff. 9-1-94; 89-497, eff. 6-27-96.)
Sec. 2.17. Private residential switch service. "Private
residential switch service" means a telecommunications service including
centrex type service and private branch exchange service (PBX), even
though key telephone systems or equivalent telephone systems registered
with the FCC under 47 C.F.R. Part 68 are directly connected to centrex
type and PBX systems providing 9-1-1 services equipped for switched
local network connections or 9-1-1 system access to residential end
users through a private telephone switch. The term "private residential
switch service" does not include key telephone systems or equivalent
telephone systems registered with the FCC under 47 C.F.R. Part 68 when
not used in conjunction with centrex type and PBX systems. "Private
residential switch service" typically includes, but is not limited to
apartment complexes, condominiums, and campus or university environments
where shared tenant service is provided and where the usage of the
telecommunications service is primarily residential.
(Source: P.A. 88-604, eff. 9-1-94; 89-497, eff. 6-27-96.)
Sec. 2.18. System provider. "System provider" means the contracted
entity providing 9-1-1 network and database services.
(Source: P.A. 88-604, eff. 9-1-94.)
Sec. 2.19. 9-1-1 system. "9-1-1 system" means the geographic area
that has been granted an order of authority by the Commission to use
"9-1-1" as the primary emergency telephone number.
(Source: P.A. 88-604, eff. 9-1-94.)
Sec. 3. Every local public agency in a county having 100,000 or more
inhabitants, within its respective jurisdiction, shall establish and
have in operation within 3 years after the implementation date or by
December 31, 1985, whichever is later, a basic or sophisticated system
as specified in this Act. Other public agencies may establish such a
system, and shall be entitled to participate in any program of grants or
other State funding of such systems.
The establishment of such systems shall be centralized to the extent
feasible. Nothing in this Act shall be construed to prohibit or
discourage in any way the formation of multijurisdictional or regional
systems, and any system established pursuant to this Act may include the
territory of more than one public agency or may include a segment of the
territory of a public agency.
(Source: P.A. 81-1509.)
Sec. 4. Every system shall include police, firefighting, and
emergency medical and ambulance services, and may include other
emergency services, in the discretion of the affected local public
agency, such as poison control services, suicide prevention services,
and civil defense services. The system may incorporate private
ambulance service. In those areas in which a public safety agency of
the state provides such emergency services, the system shall include
such public safety agencies.
(Source: P.A. 79-1092.)
Sec. 5. The digits "9-1-1" shall be the primary emergency telephone
number within the system, but a public agency or public safety agency
shall maintain a separate secondary seven digit emergency backup number
for at least six months after the "9-1-1" system is established and in
operation, and shall maintain a separate number for nonemergency
telephone calls.
(Source: P.A. 85-978.)
Sec. 6. Capabilities of system; pay telephones. All systems shall
be designed to meet the specific requirements of each community and
public agency served by the system. Every system, whether basic or
sophisticated, shall be designed to have the capability of utilizing at
least 1 of the methods specified in Sections 2.03 through 2.06, in
response to emergency calls. The General Assembly finds and declares
that the most critical aspect of the design of any system is the
procedure established for handling a telephone request for emergency
services.
In addition, to maximize efficiency and utilization of the system,
all pay telephones within each system shall, within 3 years after the
implementation date or by December 31, 1985, whichever is later, enable
a caller to dial "9-1-1" for emergency services without the necessity of
inserting a coin. This paragraph does not apply to pay telephones
located in penal institutions, as defined in Section 2-14 of the
Criminal Code of 1961, that have been designated for the exclusive use
of committed persons.
(Source: P.A. 91-518, eff. 8-13-99.)
Sec. 6.1. The Commission shall require that every 9-1-1 system be
readily accessible to hearing-impaired and voice-impaired individuals
through the use of telecommunications technology for hearing-impaired
and speech-impaired individuals.
As used in this Section:
"Hearing-impaired individual" means a person with a permanent
hearing loss who can regularly and routinely communicate by
telephone only through the aid of devices which can send and receive
written messages over the telephone network.
"Voice-impaired individual" means a person with a permanent
speech disability which precludes oral communication, who can
regularly and routinely communicate by telephone only through the
aid of devices which can send and receive written messages over the
telephone network.
"Telecommunications technology" means equipment that can send
and receive written messages over the telephone network.
(Source: P.A. 87-146.)
Sec. 7. The General Assembly finds that, because of overlapping
jurisdiction of public agencies, public safety agencies and telephone
service areas, the Commission shall establish a general overview or plan
to effectuate the purposes of this Act within the time frame provided in
this Act. In order to insure that proper preparation and implementation
of emergency telephone systems are accomplished by all public agencies
in a county having 100,000 or more inhabitants within 3 years after the
implementation date or by December 31, 1985, whichever is later, the
Commission, with the advice and assistance of the Attorney General,
shall secure compliance by public agencies as provided in this Act.
(Source: P.A. 81-1122.)
Sec. 8. The Commission, with the advice and assistance of the
Attorney General, shall coordinate the implementation of systems
established under this Act. The Commission, with the advice and
assistance of the Attorney General, shall assist local public agencies
and local public safety agencies in obtaining financial help to
establish emergency telephone service, and shall aid such agencies in
the formulation of concepts, methods, and procedures which will improve
the operation of systems required by this Act and which will increase
cooperation between public safety agencies.
(Source: P.A. 79-1092.)
Sec. 9. To accomplish the responsibilities specified in this Act,
the Commission is directed to consult at regular intervals with the
State Fire Marshal, the Department of Public Health, the Department of
Transportation, the public utilities in this State providing telephone
service, the Department of State Police, and the State Division of
Forestry. Such agencies shall provide all necessary assistance and
consultation to the Commission to enable it to perform its duties
specified in this Act.
(Source: P.A. 84-25.)
Sec. 10. Technical and operational standards for the development of
the local agency systems shall be established and reviewed by the
Commission on or before December 31, 1979, after consultation with all
agencies specified in Section 9.
(Source: P.A. 79-1092.)
Sec. 10.1. 9-1-1 information consisting of names, addresses and
telephone numbers of telephone customers whose listings are not
published in directories or listed in Directory Assistance Offices is
confidential. Information shall be provided on a call-by-call basis
only for the purpose of responding to emergency calls.
Divulging confidential information in violation of this Section is a
Class A misdemeanor.
(Source: P.A. 87-146.)
Sec. 10.2. The Emergency Telephone System Board in any county
passing a referendum under Section 15.3, and the Chairman of the County
Board in any county implementing a 9-1-1 system shall ensure that all
areas of the county are included in the system.
(Source: P.A. 87-146.)
Sec. 10.3. Notice of address change. The Emergency Telephone
System Board in any county implementing a 9-1-1 system that changes any
person's address (when the person whose address has changed has not
moved to a new residence) shall notify the person (i) of the person's
new address and (ii) that the person should contact the local election
authority to determine if the person should re-register to vote.
(Source: P.A. 90-664, eff. 7-30-98.)
Sec. 11. Within one year after the implementation date or by January
31, 1980, whichever is later, all public agencies in a county having
100,000 or more inhabitants shall submit tentative plans of the
establishment of a system required by this Act to the public utility or
utilities providing public telephone service within the respective
jurisdiction of each public agency. A copy of each such plan shall be
filed with the Commission.
Within 2 years after the implementation date or by January 31, 1982,
whichever is later, all public agencies in a county having 100,000 or
more inhabitants shall submit final plans for the establishment of the
system to such utilities, and shall make arrangements with such
utilities for the implementation of the planned emergency telephone
system no later than 3 years after the implementation date or by
December 31, 1985, whichever is later. A copy of the plan required by
this subdivision shall be filed with the Commission. In order to secure
compliance with the standards promulgated under Section 10, the
Commission shall have the power to approve or disapprove such plan,
unless such plan was announced before the effective date of this Act.
If any public agency has implemented or is a part of a system
required by this Act on a deadline specified in this Section, such
public agency shall submit in lieu of the tentative or final plan a
report describing the system and stating its operational date.
Plans filed under this Section shall conform to minimum standards
established pursuant to Section 10.
(Source: P.A. 81-1122.)
Sec. 12. The Attorney General may, in behalf of the Commission or
on his own initiative, commence judicial proceedings to enforce
compliance by any public agency or public utility providing telephone
service with this Act.
(Source: P.A. 79-1092.)
Sec. 13. On or before February 16, 1979, and again on or before
February 16, 1981, the Commission shall report to the General Assembly
the progress in the implementation of systems required by this Act.
Such reports shall contain his recommendations for additional
legislation.
In December of 1979 and in December of 1980 the Commission, with the
advice and assistance of the Attorney General, shall submit
recommendations to the Bureau of the Budget and to the Governor
specifying amounts necessary to further implement the organization of
telephone systems specified in this Act during the succeeding fiscal
year. The report specified in this paragraph shall contain, in
addition, an estimate of the fiscal impact to local public agencies
which will be caused by implementation of this Act.
By March 1 in 1979 and every even-numbered year thereafter, each
telephone company shall file a report with the Commission and the
General Assembly specifying, in such detail as the Commission has by
rule or regulation required, the extent to which it has implemented a
planned emergency telephone system and its projected further
implementation of such a system.
The requirement for reporting to the General Assembly shall be
satisfied by filing copies of the report with the Speaker, the Minority
Leader and the Clerk of the House of Representatives and the President,
the Minority Leader and the Secretary of the Senate and the Legislative
Research Unit, as required by Section 3.1 of "An Act to revise the law
in relation to the General Assembly", approved February 25, 1874, as
amended, and filing such additional copies with the State Government
Report Distribution Center for the General Assembly as is required under
paragraph (t) of Section 7 of the State Library Act.
(Source: P.A. 84-1438.)
Sec. 14. The General Assembly declares that a major purpose in
enacting this Act is to eliminate instances in which a responding
emergency service refuses to render aid to the requester because the
requester is outside of the jurisdictional boundaries of the emergency
service. Therefore, in implementing systems under this Act, all public
agencies in a single system shall enter into a joint powers agreement or
any other form of written cooperative agreement which is applicable when
need arises on a day-to-day basis. Certified notification of the
continuation of such agreements shall be made among the involved parties
on an annual basis. In addition, such agreements shall be entered into
between public agencies and public safety agencies which are part of
different systems but whose jurisdictional boundaries are contiguous.
The agreements shall provide that, once an emergency unit is dispatched
in response to a request through the system, such unit shall render its
services
to the requesting party without regard to whether the unit is
operating outside its normal jurisdictional boundaries.
(Source: P.A. 86-101.)
Sec. 15. Copies of the annual certified notification of continuing
agreement required by Section 14 shall be filed with the Attorney
General and the Commission. Commencing with the year 1987, all such
agreements shall be so filed prior to the 31st day of January. The
Attorney General shall commence judicial proceedings to enforce
compliance with this Section and Section 14, where a public agency or
public safety agency has failed to timely enter into such agreement or
file copies thereof.
(Source: P.A. 86-101.)
Sec. 15.1. Public body; exemption from civil liability for
developing or operating emergency telephone system. No public agency,
public safety agency, emergency telephone system board, or unit of local
government assuming the duties of an emergency telephone system board,
nor any officer, agent or employee of any public agency, public safety
agency, emergency telephone system board, or unit of local government
assuming the duties of an emergency telephone system board, shall be
liable for any civil damages as a result of any act or omission, except
willful or wanton misconduct, in connection with developing, adopting,
operating or implementing any plan or system required by this Act.
Exemption from civil liability for emergency instructions is as
provided in the Good Samaritan Act.
This Section may not be offered as a defense in any judicial
proceeding brought by the Attorney General under Section 12 to compel
compliance with this Act.
(Source: P.A. 89-403, eff. 1-1-96; 89-607, eff. 1-1-97.)
Sec. 15.2. Any person calling the number "911" for the purpose of
making a false alarm or complaint and reporting false information is
subject to the provisions of Section 26-1 of the Criminal Code of 1961.
(Source: P.A. 90-456, eff. 1-1-98.)
Sec. 15.2a. The installation of or connection to a telephone
company's network of any automatic alarm, automatic alerting device, or
mechanical dialer that causes the number 9-1-1 to be dialed in order to
directly access emergency services is prohibited in a 9-1-1 system.
Violation of this Section is a Class A misdemeanor. A second or
subsequent violation of this Section is a Class 4 felony.
(Source: P.A. 87-146; 88-497.)
Sec. 15.2b. Emergency telephone number; advertising. No person or
private entity may advertise or otherwise publicize the availability of
services provided by a specific provider and indicate that a consumer
should obtain access to services provided by a specific provider by use
of the emergency telephone number (9-1-1).
(Source: P.A. 88-497.)
Sec. 15.3. (a) The corporate authorities of any municipality or any
county may, subject to the limitations of subsections (c), (d), and (h),
and in addition to any tax levied pursuant to Section 8-11-2 of the
Illinois Municipal Code, impose a monthly surcharge on billed
subscribers of network connection provided by telecommunication carriers
engaged in the business of transmitting messages by means of electricity
originating within the corporate limits of the municipality or county
imposing the surcharge at a rate per network connection determined in
accordance with subsection (c). A municipality may enter into an
intergovernmental agreement with any county in which it is partially
located, when the county has adopted an ordinance to impose a surcharge
as provided in subsection (c), to include that portion of the
municipality lying outside the county in that county's surcharge
referendum. If the county's surcharge referendum is approved, the
portion of the municipality identified in the intergovernmental
agreement shall automatically be disconnected from the county in which
it lies and connected to the county which approved the referendum for
purposes of a surcharge on telecommunications carriers.
(b) For purposes of computing the surcharge imposed by subsection
(a), the network connections to which the surcharge shall apply shall be
those in-service network connections, other than those network
connections assigned to the municipality or county, where the service
address for each such network connection or connections is located
within the corporate limits of the municipality or county levying the
surcharge. The "service address" shall mean the location of the primary
use of the network connection or connections. With respect to network
connections provided for use with pay telephone services for which there
is no billed subscriber, the telecommunications carrier providing the
network connection shall be deemed to be its own billed subscriber for
purposes of applying the surcharge.
(c) Upon the passage of an ordinance to impose a surcharge under
this Section the clerk of the municipality or county shall certify the
question of whether the surcharge may be imposed to the proper election
authority who shall submit the public question to the electors of the
municipality or county in accordance with the general election law;
provided that such question shall not be submitted at a consolidated
primary election. The public question shall be in substantially the
following form:
------------------------------------------------------------------------
Shall the county (or city, village
or incorporated town) of.....impose YES
a surcharge of up to...¢ per month per
network connection, which surcharge will
be added to the monthly bill you receive -----------------------------
for telephone or telecommunications
charges, for the purpose of installing
(or improving) a 9-1-1 Emergency NO
Telephone System?
------------------------------------------------------------------------
If a majority of the votes cast upon the public question are in
favor thereof, the surcharge shall be imposed.
However, if a Joint Emergency Telephone System Board is to be
created pursuant to an intergovernmental agreement under Section 15.4,
the ordinance to impose the surcharge shall be subject to the approval
of a majority of the total number of votes cast upon the public question
by the electors of all of the municipalities or counties, or combination
thereof, that are parties to the intergovernmental agreement.
The referendum requirement of this subsection (c) shall not apply to
any municipality with a population over 500,000 or to any county in
which a proposition as to whether a sophisticated 9-1-1 Emergency
Telephone System should be installed in the county, at a cost not to
exceed a specified monthly amount per network connection, has previously
been approved by a majority of the electors of the county voting on the
proposition at an election conducted before the effective date of this
amendatory Act of 1987.
(d) A county may not impose a surcharge, unless requested by a
municipality, in any incorporated area which has previously approved a
surcharge as provided in subsection (c) or in any incorporated area
where the corporate authorities of the municipality have previously
entered into a binding contract or letter of intent with a
telecommunications carrier to provide sophisticated 9-1-1 service
through municipal funds.
(e) A municipality or county may at any time by ordinance change
the rate of the surcharge imposed under this Section if the new rate
does not exceed the rate specified in the referendum held pursuant to
subsection (c).
(f) The surcharge authorized by this Section shall be collected
from the subscriber by the telecommunications carrier providing the
subscriber the network connection as a separately stated item on the
subscriber's bill.
(g) The amount of surcharge collected by the telecommunications
carrier shall be paid to the particular municipality or county or Joint
Emergency Telephone System Board not later than 30 days after the
surcharge is collected, net of any network or other 9-1-1 or
sophisticated 9-1-1 system charges then due the particular
telecommunications carrier, as shown on an itemized bill. The
telecommunications carrier collecting the surcharge shall also be
entitled to deduct 3% of the gross amount of surcharge collected to
reimburse the telecommunications carrier for the expense of accounting
and collecting the surcharge.
(h) A municipality with a population over 500,000 may not impose a
monthly surcharge in excess of $1.25 per network connection.
(i) Any municipality or county or joint emergency telephone system
board that has imposed a surcharge pursuant to this Section prior to the
effective date of this amendatory Act of 1990 shall hereafter impose the
surcharge in accordance with subsection (b) of this Section.
(j) The corporate authorities of any municipality or county may
issue, in accordance with Illinois law, bonds, notes or other
obligations secured in whole or in part by the proceeds of the surcharge
described in this Section. Notwithstanding any change in law subsequent
to the issuance of any bonds, notes or other obligations secured by the
surcharge, every municipality or county issuing such bonds, notes or
other obligations shall be authorized to impose the surcharge as though
the laws relating to the imposition of the surcharge in effect at the
time of issuance of the bonds, notes or other obligations were in full
force and effect until the bonds, notes or other obligations are paid in
full. The State of Illinois pledges and agrees that it will not limit or
alter the rights and powers vested in municipalities and counties by
this Section to impose the surcharge so as to impair the terms of or
affect the security for bonds, notes or other obligations secured in
whole or in part with the proceeds of the surcharge described in this
Section.
(k) Any surcharge collected by or imposed on a telecommunications
carrier pursuant to this Section shall be held to be a special fund in
trust for the municipality, county or Joint Emergency Telephone Board
imposing the surcharge. Except for the 3% deduction provided in
subsection (g) above, the special fund shall not be subject to the
claims of creditors of the telecommunication carrier.
(Source: P.A. 86-101; 86-1344.)
Sec. 15.4. Emergency Telephone System Board; powers.
(a) The corporate authorities of any county or municipality that
imposes a surcharge under Section 15.3 shall establish an Emergency
Telephone System Board. The corporate authorities shall provide for the
manner of appointment and the number of members of the Board, provided
that the board shall consist of not fewer than 5 members, one of whom
may be a public member who is a resident of the local exchange service
territory included in the 9-1-1 coverage area, one of whom (in counties
with a population less than 100,000) may be a member of the county
board, and at least 3 of whom shall be representative of the 9-1-1
public safety agencies, including but not limited to police departments,
fire departments, emergency medical services providers, and emergency
services and disaster agencies, and appointed on the basis of their
ability or experience. Elected officials are also eligible to serve on
the board. Members of the board shall serve without compensation but
shall be reimbursed for their actual and necessary expenses. Any 2 or
more municipalities, counties, or combination thereof, that impose a
surcharge under Section 15.3 may, instead of establishing individual
boards, establish by intergovernmental agreement a Joint Emergency
Telephone System Board pursuant to this Section. The manner of
appointment of such a joint board shall be prescribed in the agreement.
(b) The powers and duties of the board shall be defined by
ordinance of the municipality or county, or by intergovernmental
agreement in the case of a joint board. The powers and duties shall
include, but need not be limited to the following:
(1) Planning a 9-1-1 system.
(2) Coordinating and supervising the implementation,
upgrading, or maintenance of the system, including the establishment
of equipment specifications and coding systems.
(3) Receiving monies from the surcharge imposed under Section
15.3, and from any other source, for deposit into the Emergency
Telephone System Fund.
(4) Authorizing all disbursements from the fund.
(5) Hiring any staff necessary for the implementation or
upgrade of the system.
(c) All monies received by a board pursuant to a surcharge imposed
under Section 15.3 shall be deposited into a separate interest-bearing
Emergency Telephone System Fund account. The treasurer of the
municipality or county that has established the board or, in the case of
a joint board, any municipal or county treasurer designated in the
intergovernmental agreement, shall be custodian of the fund. All
interest accruing on the fund shall remain in the fund. No expenditures
may be made from such fund except upon the direction of the board by
resolution passed by a majority of all members of the board.
Expenditures may be made only to pay for the costs associated with the
following:
(1) The design of the Emergency Telephone System.
(2) The coding of an initial Master Street Address Guide data
base, and update and maintenance thereof.
(3) The repayment of any monies advanced for the
implementation of the system.
(4) The charges for Automatic Number Identification and
Automatic Location Identification equipment, a computer aided
dispatch system that records, maintains, and integrates information,
mobile data transmitters equipped with automatic vehicle locators,
and maintenance, replacement and update thereof to increase
operational efficiency and improve the provision of emergency
services.
(5) The non-recurring charges related to installation of the
Emergency Telephone System and the ongoing network charges.
(6) The acquisition and installation, or the reimbursement of
costs therefor to other governmental bodies that have incurred those
costs, of road or street signs that are essential to the
implementation of the emergency telephone system and that are not
duplicative of signs that are the responsibility of the jurisdiction
charged with maintaining road and street signs.
(7) Other products and services necessary for the
implementation, upgrade, and maintenance of the system and any other
purpose related to the operation of the system, including costs
attributable directly to the construction, leasing, or maintenance
of any buildings or facilities or costs of personnel attributable
directly to the operation of the system. Costs attributable directly
to the operation of an emergency telephone system do not include the
costs of public safety agency personnel who are and equipment that
is dispatched in response to an emergency call.
(d) The board shall complete the data base before implementation of
the 9-1-1 system. The error ratio of the data base shall not at any
time exceed 1% of the total data base.
(Source: P.A. 89-568, eff. 1-1-97; 90-698, eff. 8-7-98.)
Sec. 15.5. Private residential switch service 9-1-1 service.
(a) After June 30, 1995, an entity that provides or operates
private residential switch service and provides telecommunications
facilities or services to residents shall provide to those residential
end users the same level of 9-1-1 service as the public agency and the
telecommunications carrier are providing to other residential end users
of the local 9-1-1 system. This service shall include, but not be
limited to, the capability to identify the telephone number, extension
number, and the physical location that is the source of the call to the
number designated as the emergency telephone number.
(b) The private residential switch operator is responsible for
forwarding end user automatic location identification record information
to the 9-1-1 system provider according to the format, frequency, and
procedures established by that system provider.
(c) This Act does not apply to any PBX telephone extension that
uses radio transmissions to convey electrical signals directly between
the telephone extension and the serving PBX.
(d) An entity that violates this Section is guilty of a business
offense and shall be fined not less than $1,000 and not more than
$5,000.
(e) Nothing in this Section shall be construed to preclude the
Attorney General on behalf of the Commission or on his or her own
initiative, or any other interested person, from seeking judicial
relief, by mandamus, injunction, or otherwise, to compel compliance with
this Section.
(Source: P.A. 88-604, eff. 9-1-94; 89-222, eff. 1-1-96; 89-497, eff.
6-27-96.)
(Text of Section from P.A. 90-819)
Sec. 15.6. Private business switch service 9-1-1 service.
(a) After June 30, 1996, an entity that installs or operates a new
private business switch service or replaces an existing private business
switch service and provides telecommunications facilities or services to
businesses shall provide to those business end users the same level of
9-1-1 service as the public agency and the telecommunications carrier
are providing to other business end users of the local 9-1-1 system.
This service shall include, but not be limited to, the capability to
identify the telephone number, extension number, and the physical
location that is the source of the call to the number designated as the
emergency telephone number. After June 30, 2000, all entities providing
or operating a private business switch service shall be in compliance
with this Section.
(b) The private business switch operator is responsible for
forwarding end user automatic location identification record information
to the 9-1-1 system provider according to the format, frequency, and
procedures established by that system provider.
(c) This Act does not apply to any PBX telephone extension that
uses radio transmissions to convey electrical signals directly between
the telephone extension and the serving PBX.
(d) An entity that violates this Section is guilty of a business
offense and shall be fined not less than $1,000 and not more than
$5,000.
(e) Nothing in this Section shall be construed to preclude the
Attorney General on behalf of the Commission or on his or her own
initiative, or any other interested person, from seeking judicial
relief, by mandamus, injunction, or otherwise, to compel compliance with
this Section.
(Source: P.A. 88-604, eff. 9-1-94; 89-222, eff. 1-1-96; 89-497, eff.
6-27-96; 90-819, eff. 3-23-99.)
(Text of Section from P.A. 91-518)
Sec. 15.6. Enhanced 9-1-1 service; business service.
(a) After June 30, 2000, or within 18 months after enhanced 9-1-1
service becomes available, any entity that installs or operates a
private business switch service and provides telecommunications
facilities or services to businesses shall assure that the system is
connected to the public switched network in a manner that calls to 9-1-1
result in automatic number and location identification. For buildings
having their own street address and containing workspace of 40,000
square feet or less, location identification shall include the
building's street address. For buildings having their own street
address and containing workspace of more than 40,000 square feet,
location identification shall include the building's street address and
one distinct location identification per 40,000 square feet of
workspace. Separate buildings containing workspace of 40,000 square feet
or less having a common public street address shall have a distinct
location identification for each building in addition to the street
address.
(b) Exemptions. Buildings containing workspace of more than 40,000
square feet are exempt from the multiple location identification
requirements of subsection (a) if the building maintains, at all times,
alternative and adequate means of signaling and responding to
emergencies. Those means shall include, but not be limited to, a
telephone system that provides the physical location of 9-1-1 calls
coming from within the building. Health care facilities are presumed to
meet the requirements of this paragraph if the facilities are staffed
with medical or nursing personnel 24 hours per day and if an alternative
means of providing information about the source of an emergency call
exists. Buildings under this exemption must provide 9-1-1 service that
provides the building's street address.
Buildings containing workspace of more than 40,000 square feet are
exempt from subsection (a) if the building maintains, at all times,
alternative and adequate means of signaling and responding to
emergencies, including a telephone system that provides the location of
a 9-1-1 call coming from within the building, and the building is
serviced by its own medical, fire and security personnel. Buildings
under this exemption are subject to emergency phone system certification
by the Illinois Commerce Commission.
Buildings in communities not serviced by enhanced 9-1-1 service are
exempt from subsection (a).
(c) This Act does not apply to any PBX telephone extension that
uses radio transmissions to convey electrical signals directly between
the telephone extension and the serving PBX.
(d) An entity that violates this Section is guilty of a business
offense and shall be fined not less than $1,000 and not more than
$5,000.
(e) Nothing in this Section shall be construed to preclude the
Attorney General on behalf of the Commission or on his or her own
initiative, or any other interested person, from seeking judicial
relief, by mandamus, injunction, or otherwise, to compel compliance with
this Section.
(f) The Commission shall promulgate rules for the administration of
this Section no later than January 1, 2000.
(Source: P.A. 88-604, eff. 9-1-94; 89-222, eff. 1-1-96; 89-497, eff.
6-27-96; 91-518, eff. 8-13-99.)
Sec. 16. This Act takes effect July 1, 1975.
(Source: P.A. 79-1092.)
--
Social Engineering:
Government Emergency Telephone Systems biggest flaw is not in its physical or
watts Band 6 network infrastructure, but the fact that all live operators who
administrate the GETS system more often than not allow themselves to be tricked
by unauthorized NON-government employees. Because all calls that route through
the GETS system are thought of as high-priority, operators who are called up won't
usually think twice about giving the person on the other end of the line a high-
priority account.
High-priority accounts allow anyone to call any number in most of Canada / USA for free.
Phone numbers that would normally give you a busy-signal, or an "all circuits busy" recording,
will allow you to do an Emergency Interrupt with a GETS account - thus allowing you to break
into the conversation between the called party and the third person on the line.
Scenario between unauthorized person and GETS operator;
Operator: "Operator services, how may I help you?"
John Bashcoff: "Yes, hello this is John Bashcoff with the Office of the Commissioner for
Federal Judicial Affairs. I'm in Edmonton right now, and I seem to have misplaced
my GETS pin number. This is an emergency, can you please supply me with a PIN?"
Operator: "Yes of course Mr.Bashcoff. The pin number is [12 digit number]."
John Bashcoff: "Thank You."
Operator: "You're welcome."
-- CALL ENDS --
Unauthorized caller proceeds to call back the GETS system, and immediately he
enters the 12 digit pin he was supplied with. Tada... outdial access anywhere
he wants for free. His caller identification information shows 'Long Distance,
710-627-4387'. FYI; The area code '710' is a private area code owned by the US
Government. When you dial up the phone number 710-627-4387, you will connect
to another GETS system.
--
Dial-Up Numbers -
I recommend you do not call the first phone number on this list,
and when calling any of these numbers do NOT use them from home or work -
use a payphone far away from your home if you can.
* 1-710-627-4387
* 1-800-257-8373
* 1-800-900-GETS
* 1-888-288-GETS
--
Conclusion;
Have fun and don't get caught. Big brother *IS* watching, and he will rip
your balls off and flush them down the toilet if he catches you using his
systems.
--
Hiding Messages No One Will Ever See on disc.server.com
The disc.server.com CGI webboard allows users to manually choose what
message they view by entering it into the URL. Every message is ordered by
its article # - starting at 1 when the message board first opened, moving
upwards. Now, when you send a message the html form sends the author, etc..
When you reply to a message, it also sends the "parent" variable, which is
the article number of the message you are replying to.
Now, go view some message on a a disc.server.com board, Edit the URL to
point to a higher article number. If it displays another message, then keep
increasing the article number until it displays "Wed Dec 31 18:00:00 1969."
Remember this number.
(note: an easier way to find this number is simply to send a message, lok at
its article number, and add 1)
Now, reply to a message.. it doesn't matter what. Edit the HTML so that the
"parent" variable is one more than the last valid article number. Now, when
you create this message, the article number will be equal to the parent
number. It doesn't get displayed in the index, but you can manually reach
it by entering its article number. Note: you can't reply to this message
either. Its just there.
Chances of anyone seeing that message? pretty much zero, unless they do what
I do. Instead of looking for updates to the board by searching through the
index, I just increment the article number by one until the messages do not
exist.
woah that was cool
diabolik
diabolik@nitric.net
--
How to piss off Telus with your ADSL Modem amongst other things. 09/26/01
Sitting here with nothing better to do, i thought i would write up a little article on what
information i've gathered on the Telus network in good ol' Edmonton. Also, let it be known
according to a tier 1 (yes, the godlike teir 1 guys) tech support guy, claiming he works
for telus (he answered at 310-inet) that telus does NOT, i repeat DOES NOT support the x86
arch (guess i'll just have to back to using my alpha)
Disclamer: This is for educational purposes only, if you happen to have the police knock
on your door at 7 AM to exersize a search warrant to obtain all computer related materials
in your residence because of what you did in this article, then thats too fkn bad, cause
your the dumb shit who let somone else tell him what to do. btw, only done this with a
3com home connect modem, but logic dictates that those damned cisco's should behave the
same too. Now, down to business.
1) Overview
The Telus Network is relatively secure, in so far as it doesnt usually spew packets
all over the network like lovely cable modems do. The only thing ive seen actually travel
across their dsl network is half life games (lord knows why, im too fucked up to figure it
out right now). Now for all you little script kiddiots out there that figure they can jack
their 1.5mbit DSL line up to a 4mbit down 640 kbit up line with windows registry tweaks or
patches are out of their fucking mind. your bandwidth is setup at your DSLAM at your
nearest friendly but nicely guarded telus CO.
2) How it works
K, when you turn your DSL modem on, you will notice the alert light flash a couple
times. that means its posting (ive since sold my DSL modem and cant remember what color
the flases are) it will pause for a few seconds, then start flashing again for about 30sec+
this is it loading the IOS (Intergrated Operating System (or sumphin)) after this, it will
attempt to handshake with the DSLAM at the telus CO. if your line is not configured for DSL
or the line is too noisy, it will turn red, but if fate smiles, it will go green. nuff said.
3) DHCP
DHCP is an absolutly beautiful thing. it stands for Dynamic Host Configuration
Protocol. Basically, what happens, is your OS (whatever it may be) sends a broadcast
message through your ethernet card, which gets routed to Sodium.bctel.net (Primary DHCP Server)
The server then checks the MAC (Media Access Control) Adress of your ethernet card (remember
registering your computers with telus when you first got DSL? ) now, telus has implemented
somwhat of a security feature here, if your MAC Addy is not registered with their server
you are assigned an ip address on their LAN (always a 10.*.*.* address) but, if you have
registered, you will automagically be assigned a fully routeable IP address (161.184 if your
old school DSL or 142.59.*.* for all us newbies) along with your IP address you are given
the information for your DNS Servers (sodium at it again) and your default Gateway.
This is all done while your computer is booting (or for us linux people, when dhcpcd kicks
in). Now for you windows people, somtimes you will notice that windows will just seem to hang
while its booting, but its just waiting for the DHCP server to respond (more often than not
its offline or bogged to hell *shakes head*). But the great thing with DHCP, is that it means
telus can change your IP and move you around all it pleases, because you have a dynamic IP.
Now if your going to be running a domain, and want to get a static IP (pretty much a pre req)
your going to have to pay telus an extra $59/mnth (or so) just to have the same ip all the time.
sounds pretty fucking silly now doesnt it?
4) Security?
I have a friend on Shaw Cable, in Millwoods (you know who you are) who would give
his left nut to be able to smurf (yes it still works) from his Cable modem. Shaw has gotten
somewhat smart, and from what ive seen, they have finally read the paper on smurf and how
to fix0r the routers so that you cannot send spoofed ICMP Echo Request packets anymore. This
is why Telus is my personal favourite for a broadband ISP (when its working). Telus doesnt
filter sweet fuck all. but, be careful dont let this fool you into thinking that they're
stupid, because the Telus internet security guy watching your packets go by, and red flagging
your account is far from stupid. Now lets say you happen to smurf somone, and they report the
logs from their firewall/sniffer/packet logging device to abuse@telus.net, and they check it
out they will notice that you've been up to somthing and send you a warning. you will get 3
of these (i got 2 for DDOS'in before i got smart) if you have 3 warning on your account it
will be terminated for a period of 30 days, and i belive they will also still expect you
to pay for the service for those 30 days.
5) Having Fun
A while ago somone named The Gonz (or somthing similar) wrote an article on
'hard encoding your ip'. Honestly I still laugh to this day when i think about that.
no twit at telus is going to send the police after you for taking an IP. Now my idea works
the same way (this is where linux really shines) After you boot your computer, get your
default Gateway, it will be 142.59.*.1 (i hope =/) now write this down, its important
and for DNS servers use 199.185.220.36 and 199.185.220.52 since their much faster and
alot more reliable. Ok, So you've done that, now what? well, now you can set your IP
to anything you want (well almost) My gateway used to be 142.59.212.1 if memory serves me.
now this doesnt mean i could set my IP addy to 142.59.0.0 or 142.59.245.69 in my experence
you have 2 full class B subnets above your routers IP for you to use ex. 142.59.213.5,
142.59.214.67 and 142.59.215.30) now, if you choose an IP address, and your net access
doesnt work period, that means that somone else is currently using that IP address
(2 machines on the internet cant share the same one) i find IP address's ending in .255
and .0 are fun to go on IRC from. when I first starting doing this, their were no
reverse DNS record set for the IP, so it wouldnt resolve. after using a certain IP for about
a couple weeks, telus would seem to put a reverse name on it (oh well, dont worry, their not
on to you) But, dont think just taking an IP and not using the one they gave you will let
you escape being caught. If they were to actually look at the packets your sending
they would find a nice little thing, that points them right to you. the MAC Address on
your ethernet card. there are supposed to be no numbers the same but its a lie. now
if you search on freshmeat.net for ethermac (i belive) you will find a beautiful little
utility for linux, what it does, is modify how packets are sent (you must be r00t)
and instead of your real MAC Address being there, its just a random one (put your next door
neighbours MAC Address in there for extra fun.)
6) Ok, when are we going to have fun?
With my somwhat limited knowledge of exactly how the telus network is setup and
what my packets look like on their end, as near as I can figure, unless they go through
a fuckload of trouble while your sending your packets, it is hard to trace you by just
looking at the dumped TCP/IP Packets their loggers would pick up. Now, what can you do now?
well as far as i know, telus has only 1 DHCP server for Alberta, and maybe BC too. and
also how all the hapless lusers depend on that DHCP server. (after windows reboots,
or your lease expires, you will always have to get a new IP address) Now, lets say
what would happen if that DHCP server wasnt there? if it mysteriously got knocked offline
by a DDOS (namely a smurf attack) because remember, they also do not filter your packets.
Now, besides making the telus networking techs scream like little babys, there are other
things you could be doing. Mass scanning, trying to exploit a box etc. now as long as you
dont say on the same IP too long, and switch your MAC address somtimes, and dont do REALLY
stupid shit, telus shouldnt notice, or catch you. If they do, well who knows what will
happen.
7) Other fun things todo (Under linux of course silly)
Depending on how you set your Broadcast address, and how your particular router
is setup, it is possible to put your Ethernet card into promiscuous mode and see whats going
on. (ifconfig eth0 promisc) now, as far as sniffers go, tcpdump is a nice one. it is an easy
way to find out whats going on in your network and how many subscribers there are and who is
using their DSL at the moment. their are other sniffing suits you can find kicking around on
various sites, i think there might be some on freshmeat.net, that will automagically sniff
passwords and whatnot for you, and convienently dump them into a text file for you to sort
through after a few hours of sniffing. I found in the ending days of my DSL line, a porn
site started up, and we shared the same router. now i got real lucky, since this poor SOB
had never discovered SSH, and loved to share his plain text passwords with me (sniffers are
beautiful arnt they). Anyway, somtime if your lucky, you might catch a telus tech logging
into your router to make changes and then youve got a new and very fast toy to play with.
Other things to piss off the poor people at tech support is alias your ethernet card
so that it occupies every single IP that your router services (during evening rush of course
=D, remember only 1 computer can use a IP address at the same time, or else they fight!)
you can do other things, like run a shitload of eggies off your box, all on diff IPs. Im
sure you'll find somthing fun todo, just dont make their lifes too difficult.
Anyways, I met The Clone at a party for last night, and we played crazy 8's for like 5
hours straight, and after we talked for a fkn long time, he told me i should write an
article. This is the first time i've ever written one, so if you dont like it, too bad.
Keep safe boys and Girls, and life is nothing but 1's and 0's.
sheppard
shep@tr4nce.com
www.amishrakefight.org/gfy
--
Disclamer: For educational purposes only. if you get in trouble for this, its your own damn
fault for doing what some wierdo from the internet wrote in a file. do people no longer
posess any common sense?
Be good Chillins. 09/26/01
w00t
Heres a little secret ive known for a while, and its fun to play this trick on
shell providers. now, all you need is bash (Bourne Again Shell) (my fav shell btw).
now, this little trick does not give you root, nor does it give you command over anything.
its just somthing todo to be a shit disturber. Now, what you need todo is either telnet in
to your shell provider (maybe go through a wingate first duh!) and make sure your running bash.
now, all you do is type a bunch of gibberish in, but not just any gibberish. you can only
put in alpha-numeric characters (trust me on this) and definatly NO '|'s. after about half
your screen is filled with just plain jibberish, press your enter key. you will see what you
just typed scroll past your screen again, ending with bash: command not found. now, what
you do is type in about 40 !'s. thats right, a whole bunch of !!'s. type in like 10, and use
your mouse to copy and paste them. after you have 40 (or more depending) press enter.
now if you get somthing like 'bash: event not found'. that means you have an odd number of
!'s. you must have an even amount. not 39, not 41, 40 exclamation marks. Now for those of you
who put 40 (or more =D) in will see alot of gibberish fly past your screen. what !! means in
bash is to repeat the last command. and with every additional !!, the amount of text grows
exponentally. now, the fun part, is that all this text has to be read by the computer. now
since youve got all those !! adding on to each other, you can see how a line of maybe 30
lines of just plain text, can turn into alot of text. now, if you do this correctly, you will
see text scroll by, but it will seem like it's locked. if you get returned to a normal bash
prompt, you need more !!'s. dont worry about putting in 3 pages of !!'s, remember, more is
better. now, what happens next, is bash loads ALL this text into memory. i like to fire up
another login, in a seperate window, and fire up top on the poor unsuspecting shell box
before i hit enter. ive seen bash take up all the ram on nether.net (768MB system, 1.5GB swap)
and quite easily lag any other box to hell. bash will keep taking more and more ram, while still
using 99% of the CPU (even better if theirs multiple cpu's and you do this multiple times).
now somtimes the box will die, and not even respond to pings, other times, it will just die
and sit there, and you will not be able to ssh/telnet to it. I suppose you could use this
on a box thats hosting a bunch of eggdrops, and maybe you could drop them offline since
bash is taking up all the available crunching power. now, next time you login, it may take
quite some time. bash has a wonderful file called .bash_history that remembers everything you
do to a certain point (thats why the up key works for recalling commands). now, for you
Admins reading this, and wanting to protect yourselfs, what you need todo is either recompile
bash from the source, and remove one of the options (RTFM), or enable user quotas which are
a good idea anyway. just set them up so that if any user is using massive amounts of ram/cpu
time for any length of time (1 minute is good), then the pid is killed, and your box is
saved. its as simple as that. Alot of machines Ive been on show no evidence of having the
user quota's enabled. but i suppose you could setup maybe a crontab or some evil fork bomb
using pipes to just stream random letters into multiple occurences of bash, then shove it a
bunch of !!'s, and you could have yourself a hayday. Anyways ive know about this for a long
time now, and havnt seen any mention of it anywhere else. Also make sure you log back in and
rm -rf .bash_history, because its got everything you typed in there. anyways, this is why
more people should have a basic understanding of bash, and how truly powerful it is.
I bet this might even work on shellyeah, and its not like your compiling any source, your
just using bash, your shell :].
/bin/bash 0wns me
and no more /usr/local dammit!
sheppard
shep@tr4nce.com
--
"Straight From The Underground"
FORMER MOD MEMBER,
JOHN LEE, IS BACK...
Date: Thurs Oct 4, 2001
By: The Clone
URL: www.nettwerked.net
John Lee was no ordinary gangster punk-ass kid back in the mid-1980's, livin' it up in the
Brooklyn area of New York. He was recognized mainly as the famous b-boy named 'Corrupt',
who had seen it all... or at least he thought so. Spending some time in the penal-system as
a youth who hadn't even seen his 16th birthday, John Lee decided to trade in his guns, knives,
and negative lifestyle for something more mentally profitable and thrilling - computer hacking.
Now the computer hacking John Lee involved himself in doesn't paint a picture in any sort of
typical hacker scenario - no, sir. By the late 1980's, John Lee joined up with what eventually
became the largest organized computer hacker group on the planet. Straight
outta 212, they were known as the Masters of Deception (M.O.D).
To give you an idea about how big the M.O.D were, high profile groups such as the
Legion of Doom considered the Masters of Deception their biggest online threat.
One night in 1990, five or six hackers in Texas, are hanging out on a telephone
conference bridge. Suddenly a new voice joins the conference in midsentence.
The unknown newcomer doesn't sound like a Texan. "Yo, dis is Dope Fiend from MOD,"
the stranger says in a non-white, non-cow tippin voice. One of the Texans responds:
"Get that nigger off the line!". Everyone falls silent. A moment later the stranger
responds to the hackers with a different accent. "Hi. This is Corrupt." Corrupt's
real name is John Lee. Corrupt lives in Bed-Stuy, New York. Corrupt is well known
and respected as a "hacker" extraordianaire. Corrupt is African-American. Cyber-War
has been declared.
Corrupt targets the slur slinger, a member of the rival Cyber Gang LOD (Legion
of Doom), who later claims he was not on during the incident. Corrupt harasses
his prey via phone...often. He switches his prey's long distance carrier.
His prey retaliates by translating a text file titled "The History of MOD"
(Masters of Deception) into street "jive" and places it back on the net. Corrupt's
prey claims to net observers that he isn't a bigot. He says "I have Black friends
at work". The on-line cyber war rages on.
"I started breaking into computer networks when I was 16. I did it because I liked
the thrill of it - you get all tingly. It was euphoric, like a runner's high.
We were MOD, we came out of nowhere. We were badasses who could crush anyone and
break into anything. There was a lot of stuff that, even now, I'm just like, Wow.
I've seen some stuff that could make you shit green.
"These days, most of the guys from MOD work in the tech field - security, mostly.
Yeah, I talk to them still. Why not? We had that life experience together. I'm sure
if some people crashed a plane in the Andes, then the people that survived would
still call each other from time to time. MOD was kind of like that - but we didn't
eat anybody. I think people know we got the raw end of the deal. I don't want to
minimize it, but there are people who stab people and get less time than I did."
MOD were like this creepy void that existed in cyberspace; in the BBS', packet
switching networks, private networks, and on the Internet. MOD were big and powerful
and people, specifically other hackers, knew it. Rumour has it the Masters of
Deception controlled everything - the New York City powergrid, the entire U.S
phone system, and DMV to name a few.
FBI steps in. You see, the members of MOD have been under investigation since 1989.
The indictment against the members of MOD is announced in July of 1992. The FBI
charges Corrupt with "illegal computer intrusion". Corrupt gets six months.
Today John Lee, the twenty-nine year old African-American who sort of resembles
"IceCube", is working on two Internet spinoffs: FellOff.com (coming this fall)
and MediaThreat.com (unknown release date). FellOff.com will be about celebrities
that have fallen off, put to rest with the nail in the coffin in regards to their
careers.
And finally, John Lee is in the process of writing a book, ironically called
"Why I Hate Computers".
John: "It delves into the psyche of a man whose life depends on computers, but
he's grown to despise them at the same time."
"At the end of that I'm not just a hacker. And you'll realize computers suck,
because beneath this veneer there's a deep dark side that no one knows."
Now you ask yourself: "What side of that?"
"Of course," John explains,
"you'll have to read the book to find out why."
John Lee currently lives in New York City,
where he plans to move to California to better his life and career...
Literature:
Masters of Deception: The Gang That Ruled Cyberspace by Michelle Slatta and Joshua Quittner.
HarperCollins, 10 East 53d Street, New York 10022-5299, 1995, 256 pages, $23.00.
--
-- Credits
Without the following contributions this zine issue would be fairly
delayed or not released, so thank you to the following people:
diabolik, m4chine, Phlux, The Clone (dats me!), and sheppard
-- Shouts:
Hack Canada (#HackCanada), Canadian Phreakers Union (#cpu), #PhreakBC,
Blackened @ Damage Inc., The Grasshopper Unit, Flippersmack, Pyrofreak,
plappy, soap, krys, Kybo_ren, Flopik, and lastly to everyone and anyone
who contributes to the Canadian H/P scene.
;. .;.. ; ;. ;..
;.. .;..; .;.; .;; ;..
.;..;. .;..; .;.;...; ;..;..
.;. A .;. .;.
;.. N E T T W E R K E D ;..
;..;.. P R O D U C T ;..;..
.;..; ;..;..
; .;..;.;.. .; . .;. ..;..
.;.. . .; ..;..;..;.. .;
;..;. .;.. . .;.. .;.;.
..;. ..;.. .;. ;.;..;;..;.;
;.;;..;.. ;.;.; .; .
;.;..;. .;. ;.;:.;.
,;....;.
.;.;. .;.;
.;.;.;
.;.;
;..;.
.;.;;.; .;. ..; ;. > > > > > > cowabunga dude!