Copy Link
Add to Bookmark
Report

Ocean County Phone Punx 08

eZine's profile picture
Published in 
Ocean County Phone Punx
 · 5 years ago

  

Ocean County Phone Punx Presents
OCPP08
"A year of impressing highschool girls with a lame phreak zine"
April 26, 1998
Last Updated April 26, 1998



Contents
Intro - Mohawk
Phreak World News - Mohawk
Starting your own payphone business - Mohawk
The dumbest posts on alt.phreaking - Phreak Ghost
The Signal Circuit Protecter - Neptunium Overkill
Phreaking jobs - Mohawk
Paging systems extensions - Cybercow
Yet Another Phield Phreaking Kit - Lineside
International Dialing Codes - American Anarchist
Busted - Mohawk
Letters
News







Intro-Mohawk

Damn has it been a year already? I can't believe it. Our

readership has spanned over 50 counrties and our webpage has had

over 5000 hits. I never thought this zine would get this big. This

issue was suppose to be bigger but finals and term papers have

gotten the best of me. However, this is the last week of school, for

me anyway, and I'll have plenty of time to work on the next issue.

Like last year's June's issue the main focus will be on scams, so

send in all your favorite scams and tips on how to avoid scams. We

will also have our usual array of phreaking articles and features.

Also in our next issue we will feature our "Thanks list". This will

thank all the people that have made this zine possible. The OCPP

website will also be getting a much needed make over. Also, older

issues of the OCPP will be getting updated, with help from Punkroq.

Until we get specific in the next issue, on behalf of the entire

staff of the OCPP, thank you to everyone that has helped with

this zine and to all our readers.














.....The Staff of the OCPP.....


Mohawk.................Editor in chief

Mr. Seuss .............Technical editor/Head technical writer

Checkmate..............Staff writer

Phear..................Staff writer/Graphics

American Anarchist.....Staff writer

Lineside...............Staff writer

Punkroq................Editor

X-Logik................News editor

The Assassin...........The official hitman of the OCPP

V-Rok..................He just looks slick all day





Distro Sites

JadeDragon's Phreaking Page
http://free.prohosting.com/~jadedrgn
Our first distro site, also contains text files and progz






We are still looking to round out our staff. For information about

positions, mail: ocpp@hotmail.com


If you would like to become a distro site, mail: ocpp@hotmail.com


To be notified of any URL changes and issue releases, get on the

mailing list: ocpp@hotmail.com


Disclaimer and Copyright info is located at the end of the issue.














Phreak World News-Mohawk

If you have something that you would like to appear in

PWN mail it to ocpp@hotmail.com



Headlines


THTJ and TFP come to an end

The all new alt.phreaking FAQ

Issue 2 of Security Breach is released



THTJ and TFP come to an end


We reported in the last issue about the problems of THTJ

and it's sister zine TFP. Both have ended. THTJ.com has been

taken over by some company and tfp.nothing.org has been taken

off line. You can get all the issues of both zines on the

OCPP's website. Former staff members of the zine are setting up

a new website that is suppose to house all the back issues plus

some other H/P stuff. The URL is forbidden.nothing.org So far

there isn't really anything there but it's worth checking out

every now and then.


The all new alt.phreaking FAQ


The alt.phreaking FAQ has been getting to complicated

as of late. Many of you want it to be better but many of you

don't want to help. We decided to split the FAQ into a

beginner version and an advanced version. Mr. Seuss has become

co-editor of the FAQs and he's been working hard on getting things

together. That's why there's no article from him this issue.

Both FAQ's should be released on May 1st. When they first come out

they might need some work and revising. That's where you

come in. Let us know what should be changed, added, or deleted.

After all this FAQ is for you.


Security Breach issue 2 is released

The second issue of the new zine security breach has

been released. Maniac has been doing all the work himself

and is doing a pretty good job at it. There isn't a website

yet but you can get both issues at the OCPP's website.





















Starting your own payphone business-Mohawk

Starting a your own payphone business can be a very profitable

venture. However, there are many things you need to know and many

hidden expenses that come along with it. Many people think that

you can just hang a payphone on the wall and it will collect money

for you. This is not the case. This file is not a complete how-to

file but it will give you a good idea of what you will have to do.

However, there aren't many how-to books out there, at least none

that are free.


-Money

The first thing you will need is money. If you don't have

at least $30,000 free than you shouldn't even consider this. That is

because it takes the same amount of effort to set up 15 phones that it

does 1 phone and setting up 15 phones costs about $30,000. In fact it

takes 100 payphones with a minimum of $5 per day coin revenue to be

profitable.



-Education
Once you have enough money, you have to educate yourself

to see if this is what you really want to do. You have to learn the

ins and outs of the payphone business as well as the ins and outs

of your phone itself. You will also need to learn how to program

your phone. This is important because one screw up can throw

off your whole business. Like I said before there aren't to many

free documents that will help you.


Here is a list of videos that will cost you:

Payphone Business Opportunity Video & Resource Guide
Running Time 50 min.
$49.95


Contracts & Locations
Running Time: 76 min.
$99.95


Marketing Payphones
Running Time: 95 mm.
$99.95


Series-5 Video Tool Box
Running Time: 76 min.
$99.95 plus $5.50 s/h


Payphone Installation Video
Running Time: 106 min.
$149.95 plus $5.50 s/h

These videos are available from:
http://www.payphones.com/HighTouchVideo/



If you really want to learn, you can go to payphone school.

US payphone school
http://www.payphones.com/USPayphoneSchool/
Telecommunications Course: Being a Public Provider
Three Days of "INTENSIVE" Training
Cost $1500

1252 Saratoga Road
Ballston Spa, NY 12020
1-800-552-8742

There are others out there. I suggest you shop around.




-Your state payphone association

One of the most important things you can do is to get

in touch with your state payphone association. They will provide you

with most of the information you will need to get started. Most

PA's require a registration fee. Once you are a member, you will be

able to attend member-only meetings, receive news letters, etc. This

is a good way to meet others in your area that will help you out and

share their experiences with you. Listen to what they have to say

and learn from their mistakes and successes. If your state doesn't have

a payphone association, contact your state's board of public utilities.

Their number should be in the phone book.


Here is a list of most state payphone associations:



Arizona Payphone Association
Gary Joseph, President
4633 West Polk
Phoenix, AR 55043
Phone: (602)269-3201



Atlantic Payphone Association
Serving Maryland/DC/Virginia
Gordon Cruickshank, President
Phone: (703) 938-1899



California Payphone Association
Tracie Nutter, Director
2610 Crow Canyon Road, #150
San Ramon, CA 94583
Phone: (510) 855-3880



Colorado Payphone Association
Karen Wojdyla, Executive Director
9101 East Kenyon, Suite 3000
Denver, CO 80237
Phone: (303) 773-8020



Indiana Payphone Association
Bill Nelson, Executive Director
P.O. Box 906
Indianapolis, IN 46202
Phone: 800-888-4109



Iowa Payphone Association
Harold Waggoner, President
8450 Hickman Road #12
Des Moines, IA 50325
Phone: (515)270-1400



Kentucky Payphone Association
Tom Rose, Director
1846 Cargo Court
Louisville, KY 40299
Phone: (502) 499-5885



Michigan Pay Telephone Association
Barton A. Lewin, Executive Director
121 E. Allegan Street, #5
Lansing, MI 48933
Phone: (517) 374-6320



Minnesota Independent Payphone Association
Jim Winstead, President
15113 Williston Lane
Minnetonka, MN 55345
Phone: (612) 935-1912



Midwest Payphone Association
serving-Missouri/Kansas
Lynn Harvey, President
Phone: (800) 333-9920



New Jersey Payphone Association.
108 main street
Oceanport, NJ
Phone: (732) 542-9292



New Jersey Payphone Group
Harvey Millman, President
dmailman@crusoe.net
11 Scarsdale Drive
Livingston, NJ 07039
Phone: (201) 992-1292



Independent Payphone Association of New York
Les Shafran, Executive Director
417 Harwood Building
Scarsdale, NY 10583-4199
Phone: (914) 725-8500



North Carolina Payphone Association
Vince Townsend, President
P. O. Box 8179
Greensboro, NC 27419
Phone: (910) 852-7419



South Carolina Payphone Association
Gene Stewart, Executive Director
1132 South Center Road
Darlington, SC 29532-9714
Phone: (803) 791-8485



Tennessee Payphone Owners Association
Bob Wilson, President
P.O.Box 681772
Franklin, TN 37068
Phone: (615) 662-5425



Utah Payphone Association
Jerry Romney, President
221 N. Charles Lindbergh Drive
Salt Lake City, UT 84116-2872
Phone: (801) 535-2000






-State Public Service Commission

Contact your State's Public Service Commission for details on

requirements to operate payphones within the state. Some states

require a certification process prior to becoming authorized to

operate phones. It may take up to three months to complete the

certification process.



-American Public Communications Council

Contact the (APCC) for additional help. Their number is

1-800-868-2722. They also have a website: www.apcc.net, however

there isn't much on it.



-Local Exchange Company

Contact your Local Exchange Company (LEC), they will supply

you with vendor handbooks, sign-up forms and charges for service.



-Buying the phone

When you buy a payphone, you must shop around. Determine what

your needs are going to be. Then look at all the different companies

out there. The best payphone you can buy is a Nortel Millenium.

However, if you just want to run a regular payphone business, I

recommend Elcotel.


-Choosing a Company

Like I said before, shop around. Call up all the companies you

can and ask them for as much documentation as they can send you. After

they mail them to you limit your choices. Then call them up and ask them

questions. Most importantly, how long have then been in business. Some

payphone companies come and go. If the company you buy your products from

goes out of business, you'll be screwed. Another thing to look at is

the software. You will need computer programs to run your payphone.

Find out how easy they are to use and how good they are.


-Choosing a location

The right location can make or break a payphone company. Look

for high foot traffic area, preferably outside with 24 hour

accessibility. Outside of convenience stores and gas stations

are good locations.

You can use a locating service to identify locations quickly.

Make sure you visit these locations to ensure they fit the strategy you

have developed for your company. Locators usually charge between

$200 and $300 per location and some will offer a performance

clause to ensure the location meets the minimum revenue you have

established.


-Vandalism
Every phone will be the victim of vandalism sooner or later. The

only thing you can do is to be prepared. You will have to buy a whole

extra phone to use for spare parts. As something breaks, you take it

off the spare phone and put it on the other one. The location

will also make a difference. If your phone is in a rough neighborhood

you can expect it to be vandalized often. However, if your phone

is in a good neighborhood inside of a store, vandalism won't happen

that much. If you choose to put your phone in a store, make

sure they keep long ours. Vandalism usually happens when customers

get pissed off so if you keep them happy, your payphone will

last longer.


-Route

A route consists of a number of sites that have been grouped

together. A route is usually assigned to a technician, who services

all the sites on a route. Since the sites in a route are usually close

together, the technician who is assigned a route can service more that

one site quickly and efficiently.


-Collecting the money

You can collect the money or you can have a technician do it.

After you get it, what do you do with all that change. Try to find a

bank that will accept loose change for free. Some banks charge a fee.

You can always rap it yourself. Automatic coin counters come in a

variety of styles and prices.


-After all this

What happens after this point is up to you. You can stick with

it and create a payphone empire. You can sell your route and retire.

You can lose everything and wind up writing articles for the OCPP.






















The dumbest posts on alt.phreaking-Phreak Ghost



Like the title says, these are some of the dumbest posts on

alt.phreaking. Some are really obvious and some are a little harder to

figure out. Keep in mind that this newsgroups is for phreaking only. The

names of the people that posted them we're taken out so we don't embarass

anyone. Other than that, none of these posts were edited in anyway.






-WTF! Where are the NYers posting? We got guys posting for 2600 meetings
in places like Oregon and somewhere on the fucking sunny side of hell
but yet we cant get any 31337 representation from NY! We have to stop
the phreak turf wars and stop all these damned bastard phreaks who rat.
We need 2600 meeting organized by 31337 to settle differences.




-Can somebody please send me the plans to a Blue Box. I've looked all
over and can't find them!


-Hey, this is WAAY off topic, but I need some help. I got the Tomb
Raider 2 CD and cannot make it work on my computer. the conclusion I
have come to is that my computer does not read lowercase files from the
CD, there are 2 UPPERCASE files that can be read. What can i do? Why
cant my system read the lowercase files?? It works on every other
computer that I have tried.




-WHTUP VERYEM A PHREKERIKE NDIANT OET IN YUR ES ROUP SO WHATSUP



-I need a proggi to record telephone conversations via ISDN (teles
adapter) with my pc.

Im also looking for a proggi to play .wav files via ISDN





-Have you guys heard of the Blotto Box? If you need the plans, I have
them, although I don't think ANYONE has the guts to do this sucker,
ANYONE. This baby is bigger than the Rainbow Box. Also, I need
everyone's opinion. This guy last year always beat the crap outta me.
But you have to understand that I'm not a skinny little nerd. Anyways,
should I fuck his phone bill over? Should it be payback time? I don't
know I mean, tis guy was REALLY mean to me and I'm a nice guy to get
along with, should he pay?



-i was wondering if it was possiblr to create a 2600 hz tone using a
computer and then sending it through the modem to do all that fun stuff
a blue box does? PLZ LMK I am new at this,

And yes i know it would be stupid to use it at home... la da la da.


-Jennifer Martino Just a question for you.....are you a girl? If you are
thats good because there arnt too many female phreakers around


-Hello!

have tried to hack this page, but can't handle it... I was hoping you
could do it for me, ot maybe explain how I do it... That would be great!

-Please, Please SEND me PHREAKING files



















The Signal Circuit Protecter-Neptunium Overkill
(The output device you never knew existed!)


This month I will tell about a neat little box called a Signal

Circuit Protecter. This is a type of bell's apparatus which most

phreakers don't know much about. You can open them without any tools

and YES, you can even beige box off of them. Sounds great, huh?

Well, the only bad thing about SCPs is that they are not very

common, but if you look around you will probably be able to locate a few.

LOCATION: SCPs are hooked to phone poles and they are mounted about 5'

off the ground. They are about 4"x2" in my area (Wisconsin), but of

course size may differ slightly depending on your location. Now when

looking for these I noticed that either your neighborhood has one on the

pole nearest everyone's house, or they don't have them at all. Go check

your pole, and if you have one this means your neighbor will also be the

proud owner of an SCP. If you don't have one then you will have to check

somewhere else. You will probably need to look to far.


WHAT YOU WILL SEE: Once you find and open an SCP, you will see two

terminals (a ring and a tip), a circuit board, and some wires. All

you need to do is clip on like you would with any other

output device.


WHAT IS WITH THIS STICKY ORANGE STUFF?: It's an adhesive used for

keeping the rubber TermGard over the terminals. Just Rip off the

TermGard and wipe off the orange crap.

Good Luck and Be Careful!




















Phreaking jobs-Mohawk

For some of us, phreaking is more than just a hobby. Some

of us can speak more telephonease than the average lineman. Most

telephone company employees have no background education before they

start their training. They make a choice to work for the telecom

industry, then they go to school, and then they get a job. Because

phreakers have such a background on the telecom industry, they would

make valuable employees. Most of you that are reading this are

still in high school and you have a ton of people telling you

that you should think about your future. Well they're right, you

should. I suggest that some of you make your interest in the

telecom industry a long term thing. Between what you know now and

what you will learn when you go for you're training, you could

go pretty far. If any of you are interested, visit the URL's that

I have listed below. Could you imagine what you could do if you

were a lineman????






Bell Atlantic-New Jersey
http://www.bell-atl.com/jobpost/
1-800-678-4796

Sprint
http://www.sprint.com/hr/index.html

AT&T
http://www.att.com/hr/

Bellcore
http://www.careermosaic.com/cm/bellcore/bellcore5.html

Bell Atlantic
http://www.bellatlantic.com/about/jobpost.htm

Lucent
http://www.lucent.com/work/work.html

MCI
http://www.mci.com/aboutus/company/career/index.shtml


GTE
http://www.gte.com/f/fhcar.html


Ameritech
http://data.ameritech.com/ame_emp/default.htf


Bellsouth
http://www.bellsouth.com/employment/


Pac Bell
http://www.sbc.com/Career-PB/


South western Bell
http://www.swbell.com/Career/Home.html


US West
http://www.uswest.com/share/employment/com/



also try carrer Mosaic
http://www.careermosaic.com/cm/cm1.html

























Paging systems extensions-Cybercow


Have you ever been in a store or at you're school and

wanted to talk over the intercom? It is not impossible. In fact

it is easier then boxing.

First, lets talk a little bit about paging extensions. A store

and a school have different extensions to make life much easier on the

workers, teachers, ect. Every checkout stand has a phone, in

some stores every isle, and one in most classrooms. The extensions

start with 101 and go up. There is one for every single phone. They

are not random but they are all grouped in some order. At the

bottom of this list is the paging extension. To get this, you only

have to sneak a peak at the list they have posted everywhere. There

are public copies too. They have all of the numbers but the last one,

the one you want. You are most likely to find those at schools.

Once you get the number, you don't want to call from the school

or store because from a school they can track you easy as shit. You were

in the classroom without the teacher, it must be you and in the stores

they have video cameras that are hidden everywhere. Call from a pay-phone

down the block and have a friend inside to listen.

Remember not to use your real voice because the teachers will

turn you in, and it is funnier anyway. If you are calling a store ask for

security. They will pick up and just tell them you are connected wrong,

tell them the number to connect you to and they will do so. The reason

for this is they do nothing all day and don't know any of the ext. For

a school call the office when school is in, you will probably get a

student working. If not call back every ten minutes until you do.

When you get a kid, you will be surprised at how stupid your peers

are. Wait until you hear an empty sound and you are on the air.




















Yet Another Phield Phreaking Kit-Lineside



Another kit article? Well, actually I've only seen one other one,

and it seemed kinda old, and I thought I would make a better and more

comprehensive one. Anyway, this is my "suggested" list of tools and

equipment that should be brought along for a safe and enjoyable phield

phreaking mission. Your mission may simply be a beige boxing expedition,

or it may be a lineman impersonation mission. Which ever one you do, here

is some stuff you may want to take along.



# = Lineman impersonation.
* = Beige boxing.

_________________________________________________________

Handset :#* By now you really should know what this thing is, so I'm

pretty sure you'll want to take it along. If you're gonna be a lineman,

you really should have a REAL test-set.


Can wrench :#* Yep, I have forgotten to bring one of these before. The

size you'll need is a 3/8" and a 7/16", although I have never needed the

3/8" one before. It's usually for the smaller terminal boxes, and they're

no fun. So go play with the big boys!


List o' numbers :#* Before hand, right up a big list of numbers that

you'll want to call. Include test numbers or anything else that may be

useful. Even if you're unsure about taking one, do, because the call

will be FREE after all. Or you can just store them in your handset or

tone dialer. While on this subject, bring along a clipboard for your

list of numbers, if you're trying to be a lineman. It looks much more

proffesional than a notebook. ** If you can afford one, get one of those

digital recorders; they're perfect for remembering numbers that are

written in the boxes. **


Beeper/ Cell fone :# Even if it's not really hooked up, take it

along and put it on your belt or somewhere where people will see it. If

you're trying to look like a lineman, the more gadgets and stuff you have

along, the more convincing you'll look.


Hat/ Shirt :# Looking like a lineman means dressing like one. Wear a hat

with some kind of company logo, and a denim or polo shirt. On some fone

company sites, you can actually buy logo brand stuff. This is very

useful, and sometimes not that expensive. And remember not to wear

your big, baggy skater pants. Get some smaller ones from your brother

or someone.


<editors note: Try to get shirts at a thrift shop.>


Scanner :#* Well, I've never really taken one along. It just seems too

much to bother with. But I guess if you live in a small town, you can

monitor the few police and Bell frequencies. Please send me some

comments or stories you have, if you actually use a scanner while

you're out.


Toner and Tracing Probe :# If you are confident in your lineman

appearance, you can hook this up to someones line (not on the terminal

end) and trace it back to the distribution box. This may be useful if

you need to find the someones pair to monitor.


Modular adapter :#* You'll need this to hook up your butt-set to a

regular fone plug, like those in the customer access interface boxes.

But you shouldn't really use these cause it's pretty risky.


Flashlight :#* Take a guess why you'll need this.


Attaching cord :* Take a long piece of paired wires (available in

telco boxes) and put some gator clips on the end, or the special

hook-up clip. If you want to use a box, you can hook it up, and if

you left the wire long enough, go sit in nearby bushes or another

secluded spot.


Gloves :#* Well, if you're really scared about leaving fingerprints,

go ahead and take them. And you really shouldn't be worried about

getting shocked. Just don't stick your finger in any holes.


Tool Belt :# Actually, this one is really optional. They're kinda

expensive, but are very convincing when used.




_.x(Linenoise.Org)x._




















International Dialing Codes - American Anarchist

To use these, first you would dial your International Access

Code (011 in the US) and then the country code for the country you want.


To find out the time difference between yourself and some other

country subtract one time from the other. Note: Remember that daylight

saving times may affect the result.


<editor's note: for those of you wondering what the point of this
article is, if you do a lot of international beigeboxing or if you
deal with a lot of other countires, this is a handy list to print
out>


Hours difference from GMT
Country Int. Dialing Code / Universal Standard Time
-------------------------------------------------------------------------

Afghanistan 93 +4 1/2
Albania 355 +1
Algeria 213 +1
Andorra 376 +1
Angola 244 +1
Anguilla 1 809 -4
Antarctic Aus Territory 672 +4 1/2 +10
Antigua and Barbuda 1 809 -4
Antilles 599 -4
Argentina 54 -3
Armenia 374 +4
Aruba 297 -4
Ascension Island 247 0
Australia 61 +8 +10
Austria 43 +1
Azerbaijan 994 +1
Azores 351 -1
Bahamas 1809 -5
Bahrain 973 +3
Bangladesh 890 +6
Barbados 809 -4
Barundi 257 +2
Belarus 375 +2
Belgium 32 +1
Belize 501 -6
Belize 229 +1
Bermuda 1 809 -4
Bhutan 975 +6
Bolivia 591 -4
Bosnia Hercegovina 387 +1
Botswana 267 +2
Brazil 55 -3
Brunei Darussalam 673 +8
Bulgaria 359 +2
Bukina Faso 226 0
Cambodia 855 +7
Cameroon 237 +1
Canada 1 -3 1/2 - 8
Cape Verde Islands 238 -1
Cayman Islands 1 809 -5
Central African Republic 236 +1
Chad 235 1
Chile 56 -4
China 86 +8
Christmas Island 672 +7
Cocos Island 672 +6 1/2
Columbia 57 -5
Comoros 269 +3
Congo 242 +1
Cook Islands 682 +10 1/2
Costa Rica 506 -6
Cote d'Ivorie 225 0
Croatia 385 +1
Cuba 53 -5
Cyprus 357 +2
Czech Republic 42 +1
Denmark 45 +1
Djibouti 253 +3
Dominica 1 809 -4
Dominican Rebublic 1 809 -4
Ecuador 593 -5
Egypt 20 +2
El Salvador 503 -6
Equatorial Guinea 240 +1
Eritrea 291 +3
Estonia 372 +2
Ethiopia 251 +3
Falkland Islands 500 -4
Faroe Islands 298 0
Fiji 679 +12
Finland 358 +2
France 33 +1
French Guiana 594 -3
French Polynesia 689 +10
Gabon 241 +1
Gambia 220 0
Georgia 7 & 995 +4
Germany 49 +1
Ghana 233 0
Gibraltar 350 +1
Greece 30 +2
Greenland 299 -3
Grenada 1 809 -4
Guadeloupe 590 -4
Guam 671 -10
Guatemala 502 -6
Guinea 224 0
Guinea - Bissau 245 0
Guyana 592 -3
Haiti 509 -5
Honduras 504 -6
Hong Kong 852 +8
Hungary 36 +1
Iceland 354 0
India 91 +5 1/2
Indonesia 62 +7 +8
Iran 98 +3 1/2
Iraq 964 +3
Ireland Republic of 353 0
Israel 972 +2
Italy 39 +1
Ivory Coast 225 0
(see Cote d'Ivorie)
Jamaica 1 809 -5
Japan 81 +9
Jordan 962 +2
Kazakhstan 7 +5 +6
Kenya 254 +3
Kirghizstan 7 +3
Kiribati 686 +12
Korea (North) 850 +9
Korea (South) 82 +9
Kuwait 965 +3
Laos 856 +7
Latvia 371 +2
Lebanon 961 +2
Lesotho 266 +2
Liberia 231 0
Lybia 218 +1
Lichtenstein 41 75 +1
Lithuania 370 +2
Luxembourg 352 +1
Macao 853 +8
Macedonia 389 +1
Madagascar 261 +3
Malawi 265 +2
Malaysia 60 +8
Maldives 960 +5
Mali 223 0
Malta 356 +1
Marshall Islands 692 +12
Martinique 596 -4
Mauritania 222 0
Mauritius 230 +4
Mayotte 269 +3
Mexico 52 -6 - 8
Micronesia 691 +11
Moldovia 373 +2
Monaco 33 93 +1
Mongolia 976 +8
Montserrat 1 809 -4
Morocco 212 0
Mozanbique 258 +2
Myanmar (Burma) 95 +6 1/2
Namibia 264 +2
Nauru 674 -12
Napal 977 +5 3/4
Netherlands (Holland) 31 +1
Netherlands Antilles 599 -4
New Caledonia 687 +11
Nicaragua 505 6
Niger 227 +1
Nigeria 234 +1
Norway 47 +1
Oman 968 +4
Pakistan 92 +5
Panama 507 -5
Papua New Guinea 675 +10
Paraguay 595 -4
Peru 51 -5
Philippines 63 +8
Pitcain Island 649 -8 1/2
Poland 48 +1
Portugal 361 +1
Pueto Ricco 1 809 -4
Qatar 974 +3
Romania 40 +2
Russia 7 +2 1/2 +10
Rwanda 250 +2
St Helena 290 0
St Kitts and Nevis 1 809 -4
Samoa (USA) 685 -11
Samoa Western 685 -11
San Marino 378 +1
Saudi Arabia 966 +3
Senegal 221 0
Seychelles 248 +4
Sierra Leone 232 0
Singapore 65 +8
Slovakia 42 +1
Slovenia 386 +1
Solom Islands 677 -11
Somalia 252 +3
South Africa 27 +2
Spain 34 +1
Sri Lanka 94 +5 1/2
Sudan 249 +2
Surinam 597 +3
Swaziland 268 +2
Sweden 46 +1
Switzerland 41 +1
Syria 963 +2
Taiwan 886 +8
Tajikistan 7 +5
Tanzania 255 +3
Thailand 66 +7
Togo 228 0
Tongo 676 -13
Trinidad & Tobago 1 809 -4
Tunisia 216 +1
Turkey 90 +2
Turkmenistan 7 +5
Turks & Caicos 1 809 -5
Tuvalu 688 -12
Uganda 256 +3
Ukraine 380 +2
United Arab Emirates 971 +4
United Kingdom 44 0
Uraguay 598 -3
USA 1 -5 -11
Uzbekistan 7 +5 +6
Vanuatu 678 -11
Venezuela 58 -4
Vietnam 84 +7
Virgin Islands (UK) 1 809 49 -4
Virgin Islands (US) 1 809 -4
Yemen 967 +3
Yugoslavia 381 +1
Zaire 243 +1
Zambia 260 +2
Zimbabwe 263 +2




















Busted-Mohawk





Two Calif. Teens Suspected of Breaking Into Government Computers
February 28

Law enforcement officials believe two teenage boys from a

small town in Northern California were among a group of hackers

who wormed their way into several U.S. government computer systems

earlier this month, sources close to the investigation said yesterday.

The high school sophomores, aged 16 and 17, and other members

of the group are suspected of intruding into at least 11 sensitive

computer systems at U.S. military installations and dozens of systems at

other government facilities, including federal laboratories that perform

nuclear weapons research, the sources said.

Although the computers contained only unclassified information,

Deputy Defense Secretary John J. Hamre told reporters Wednesday the

military intrusions constituted "the most organized and systematic

attack" on U.S. networks discovered by American authorities and

thus aroused concern among officials worried about the possibility of

electronic sabotage as a means of terrorism or warfare.

Government officials said they are not yet sure of the

group's motives, but fellow students speculated the two youths were

in it for thrills. Some law enforcement sources speculate that

the group may have been competing to enter different systems.

Although the hackers are not believed to have seriously

tampered with any of the systems they entered, they obtained powerful

administrator privileges on some that could have let them

perform tasks including deleting files and reading passwords,

sources said.


FBI agents on Wednesday night raided the boys' homes,

70 miles north of San Francisco at Cloverdale in the California wine

country, catching one of them in the act of entering a Pentagon

computer, the sources said. Agents confiscated the boys' computers

but did not arrest them. The two were not identified.

George Grotz, an FBI spokesman in San Francisco, confirmed

that agents conducted searches at two residences in Sonoma County, which

encompasses Cloverdale, "based upon a computer intrusion case we are

working on," but declined to elaborate. He said the agents seized "some

hardware, software and printers and other computer equipment."

The timing of the intrusions, as the United States was

stepping up deployments of troops and equipment to the Persian Gulf

region, particularly concerned Pentagon officials.

Four Navy and seven Air Force systems, at sites around the

United States and Okinawa, are known to have been targeted. The systems

perform largely logistical and administrative functions, but officials

warned that tampering with even that data could potentially disrupt

military operations.

The group also entered systems at several universities and

federal research facilities, including the Oak Ridge National Laboratory,

the Brookhaven National Laboratories, the University of California at

Berkeley and the Massachusetts Institute of Technology's fusion labs, said

William G. Zane, owner of Netdex Internet Services Inc., a Santa Rosa,

Calif.-based Internet service provider. Zane said his service was

intruded by the group and used as a launching pad for many of the attacks.

The group's activities first were noticed by Zane in

mid-January, when his staff discovered an intruder who had given

himself administrator, or "root," privileges, he said. Zane said he

notified the FBI and the Computer Emergency Response Team at Carnegie

Mellon University in Pittsburgh, which distributes computer security

alerts.

Instead of kicking the hackers off his service, Zane said

he consulted with the FBI and decided to install software that would

monitor the group's activities, reports of which he said he provided

to agents.

"We decided to take a little risk," he said. "We let them

play for a little while. We gave them enough rope and let them hang

themselves."

Zane said the hackers used another Internet service provider

to connect to his computers. From his system, he said the group launched

"hundreds of attacks."

"We were seeing hundreds of [Internet] addresses that would

go by that had been scanned and cracked," he said.

One law enforcement source, however, said investigators have

not yet been able to confirm the full scope of the group's intrusions.

"We shouldn't jump to the conclusion that hundreds of computers were

entered," the source said.

Zane refused to say what tactics the hackers used to enter

his system and others. "They had a very sophisticated set of [software]

tools," he said.

He said at least one of the hackers discovered last Saturday

that the Netdex staff had been monitoring the group, resulting in a

frantic scramble to copy the group's files for the FBI before the

hacker deleted data on the computer in question.

The two students are 10th graders at Cloverdale High School,

a 450-student public school. Gene Lile, the principal, said no federal

or state authorities have yet notified the school of any wrongdoing,

but the incident was the subject of almost every conversation throughout

the school day yesterday.

Students who know the two boys fiercely defended them,

describing them as "just normal, everyday kids" who have a strong

interest in computers. "They were just doing it for the thrill

of getting in. I know them well enough to know that they wouldn't do

anything purposefully wrong," said Lissa Tryer, another 10th grader.

"It makes me mad. They're not twisted. These are just two

nice guys," said another girl, who declined to give her name.

Joe Simao, a senior at Cloverdale, said he wasn't surprised to

hear of the hacking incident. Simao said he helped one of the teens

set up a computer operating system called Linux, which is based on

Unix, a widely used operating system on the Internet. "They started

to get into hacking lately," Simao said. "I heard [one of the teens]

say, 'Yeah, I've hacked into MIT and UC Berkeley.' "

Simao said he believes the pair did not have the expertise

to invent new techniques for breaking into systems, but said they

had become frequent users of sites on the Internet where hackers

post descriptions of how to break into computer networks. "It's like

some want to drive fast cars; others want to use drugs; and some want

to hack," Simao said.

John Hudspeth, who teaches technology at Cloverdale and

oversees a lab with 40 desktop computers, said that both boys have

a sincere interest in technology. "They're good kids who have

helped me out quite a bit," he said. "They've put a lot of time into

helping set up the systems in this lab."

But Zane contended the attacks should not be minimized.

"This was a massive set of intrusions," he said. "You don't need

to crack 11 machines to brag that you've entered the Pentagon."






Suspected NASA Hacker Arrested

The suspected leader of a group of computer hackers who broke into the

network of a NASA laboratory has been arrested, agency officials said

Wednesday.


In addition to its own computer system, NASA investigators believe

Calldan Levi Coffman, 20, of Carson, Wash., also infiltrated the networks

of various corporations, universities and other government agencies.

Coffman is the suspected leader of the group "ViRii." NASA officials

started looking into the group last June when security officials at its

Jet Propulsion Laboratory in Pasadena, Calif., detected a problem with

the computer system.

An investigation determined the system was being controlled by intruders

using the network to help break into other systems targeted by ViRii

targets, NASA said.

The agency initially investigated suspects other than Coffman, including

an Israeli teen known as "The Analyzer." The 18-year-old was placed

under house arrest Wednesday in Jerusalem after being accused of

infiltrating the Pentagon's computer system.






Israel Cops Arrest Computer Hacker

An Israeli teen-ager accused of infiltrating the Pentagon computer

system and others in Israel was questioned Wednesday and placed under

house arrest, Israeli police said.

The suspect, who calls himself "The Analyzer," and two accomplices,

all 18, told police they had not penetrated the systems for personal

gain, police spokeswoman Linda Menuhin said. No charges have been

brought so far against any of the three, whose identities were not

released by Israeli authorities.

In Washington, the Justice Department identified the arrested hacker

as Ehud Tenebaum.

"This arrest should send a message to would-be computer hackers all

over the world that the United States will treat computer intrusions

as serious crimes," said Attorney General Janet Reno.

The suspects were questioned for several hours at a police station in

Bat Yam, a southern suburb of Tel Aviv, then put under house arrest,

Menuhin said. Police confiscated their passports and forbade any contact

between them.

"They are all cooperating with the police," Menuhin said, adding that

their parents had also been brought to the station but were not questioned.


She had no details on what Israeli systems were involved, but Channel

2 TV identified one as the computer system of Israel's parliament, the

Knesset.

"The Analyzer" is suspected of being the mentor of two California

teen-agers who have been questioned by the FBI in connection with

hacking into the Pentagon's computer system and university research

computers.

The Pentagon has said the intrusions appeared to have been aimed at

systems that contained unclassified personnel and payroll records. A

spokesman described the Israeli hacker's work as the most organized

and systematic attack the Pentagon has seen to date.

"The Analyzer" and the two teens from Cloverdale, Calif.,

apparently penetrated computers in February using a weakness that

already had been identified by computer security teams.

In an interview with the Internet magazine AntiOnline before he was

caught, "The Analyzer" said the penetrations were innocent and

claimed that he even helped the targets by patching any weaknesses

he found.

The first report on "The Analyzer's" work came Feb. 3 from the

Massachusetts Institute of Technology's plasma energy lab. Break-ins

were then reported at a series of military locations, including the

Naval Undersea Warfare Center, as well as at other universities and NASA.

Menuhin said two police units dealing in fraud and computer protection

would continue the investigation against the three








Teen Charged With Computer Hacking

Sending a warning to young computer hackers, federal prosecutors

charged a teen-age boy with shutting down an airport communications system.

The U.S. Department of Justice said Wednesday the Massachusetts boy,

whose name was not released, has agreed to plead guilty and faces two

years probation, a fine and community service.

The teen is the first juvenile charged in federal court with computer

hacking, officials said.

The boy broke into a Bell Atlantic computer system on March 10, 1997,

stalling communication between the control tower and aircraft at

Worcester Airport for six hours, authorities said. No accidents occurred.

"These are not pranks, this is not like throwing spitballs at your

teacher," U.S. Attorney Donald Stern said. "Hackers should know that

they will be caught and they will be prosecuted."

The teen-ager was charged with juvenile delinquency, the umbrella charge

that relates to all crimes committed by juveniles. In adult cases, the

charge is called intentionally accessing protected computers.

"We dodged a bullet that day," said Joseph Hogan, area manager for

Robinson van Vuren, a company contracted by the Federal Aviation

Administration to operate air traffic control towers in New England.

When the teen-ager used his computer to break into the phone company

computers, the system crashed, power was lost at the control tower

and phone service was shut off to 600 houses in Rutland, a central

Massachusetts community outside of Worcester.

















Letters


From: Fx

Hi, I have been reading OCPP since issue 1 and now I come to issue 7

and I must say, good job lads. I am sure people could debate this but

I must say that this magazine is the best of it's kind. Articles are

well written and the knowledge of current events your mag displays are

unparelled. Keep up the good work.



<Thanks! These are the letters that keep us going. When I first

started this zine I never thought people would be telling us that

we are the best.>








From: Justin

Hey..

I just wanted to congratulate you on a job well done. I truly

enjoyed reading the latest issue of your zine! Personally, I can't

wait until the Project Angel goes mainstream all across the country...

Just think of the phreak possibilites... Already phreaks are cloning

cells phones... now we can clone houses! Or intercept all three lines

being transmitted from a house... the 2 voice and the data line... The

future is going to be a fun place for people like us. If there is

anything that you need help with, and projects or whatever, just let

me know. I am always willing to lend a helping hand.



<Yeah the future is going to be cool, only if we keep up with it that

is. Alot of us still dwell on old stuff like boxes. We need to

keep up with new technology and follow it every step of the way.

If we don't, everything is going to change and we're going to

be left here with nothing to phreak. But that's what we're here

for. Like we did with project angel, we will keep you up to date

with all the latest technology. Speaking of project angel, it seems

that it is still in it's testing phase. I have sifted through the

mounds of information on AT&T's website and I have found some

references to project angel. They don't mention anything about it.

All they mention is that AT&T is working on a fixed wireless

local telephone system. Like I said before, they will probably

keep this under wraps until the local telephone market fully opens

up.>





From: Hyperbox


RedBox Problems & Some Solutions

Red boxing with tone dialers, digital recorders or what ever your

preference, still works in many areas. It doesn't work on the newer

fones with muted mouth peices and phones where you can adjust the volume

with that button thing.


To check if the phone is muted simply blow in the reciever if you hear it

in the ear piece it's all good, box away... if not, move on. And you

know those "unboxable COCOTS" well, they're not unboxable... instead of

replacing the crystal in the tone dialer with a 6.5mhz (6.5900mhz)

crystal, replace it with a 6.3mhz... (refer to redbox plans if you

don't know what I'm talking about) This will also work with bell phones.


<This was sent to me to be placed in the alt.phreaking FAQ. Since the

FAQ is being rebuilt from the ground up this might not be included.

So I put this in the letter section. If you would like a little

mini-article type deal to be put here just send them in.>





From: Some ignorant child

Look please do a little more research before you post innacurate

infomration pertaining to newsgroups. Most NG like these have enough

problmes with misinformed newbies without your help. See below.


>
> 18. I need 31337 warez d00dz
>
> Wrong news group. Try alt.2600, they are crawling with warez lists.
>

Yes that is true, but that doesn't mean that's what 2600 is for. Just

because a NG gets spammed a lot doesn't mean that it is for spam. It is a

problem that many have been dealing with in their own ways and between us

the spam is getting slowly cleaned up.

> alt.2600 - Filled with warez d00dz
>
> alt.2600.phreakz - Still more warez

Another instance of that same thing...

> alt.hackers - Hacking

That all depends on your definition of a hacker. alt.hackers is for

hackers, but it is for the other _kind_ of hacker. In this case it's for

people who use existing technology (most of the time basic things like

bowls, CDs, tape etc.) to solve problmes. It's kind of hard to explain,

read the NG for a couple of days, it's fairly low traffic so that won't be

hard. There are the occasional "teach me to hack" posts, but those are

generally from clueless newbies who did a search for the word hacker and

found that. What you may be thinking of is alt.hacker, the S makes a big

difference.


< (This is a letter that some stupid kid sent me after we released

the new version of the FAQ.) It's a friggin newsgroup, it's not the

end of the world. Why don't you look. If you read the FAQ you would

see that the FAQ is written by many authors, not me. I edit and

maintain the FAQ. Besides we are intitled to our opinion. If

you don't like something in the FAQ, ask us to change it. We

are more than happy to get feedback on the FAQ. If you have

a serious problem with it, than don't come to the newsgroup then.>
















News




Hacker crashes thousands of Windows computers
March 4

An unknown hacker caused thousands of Windows-based university and
government computers to crash on the eve of Senate testimony by
Microsoft Corp. Chairman Bill Gates, authorities said Wednesday.

The Monday night attack affected nine of the National Aeronautics and
Space Administration's 10 major field offices as well and major
universities, including the Massachusetts Institute of Technology
(MIT) and the University of California at Berkeley.

"Basically, what happened is it locked the system," said Mike Mewhinney,
a spokesman for the space agency's Ames Research Center near Mountain
View, Calif. "Obviously, it was something we were concerned about, and
we stepped in to address it as soon as we learned about it."

While the attack did not cause any significant loss of data, users
were confronted with the so-called "blue screen of death," which
appears with an error message when Windows crashes. The only solution
was to restart the computer.

Jeffrey Schiller, network manager at MIT, said the malicious hacker
exploited a bug in the Windows 95 and Windows NT operating systems
known "Boink," "Teardrop II" or "New Tear."

At MIT, the attacker obtained a list of all computers connected to
the Internet and then sent specific data packets calculated to
overload the computers, causing a "denial of service."

The only computers not affected were those that had installed
Microsoft-supplied patches or were running other operating systems,
such as Apple Computer Macintosh units.

Microsoft issued a statement on the Internet saying the vulnerability
was "not a new issue" and recommending customers install patches --
software fixes -- available on its Web site.

While there were no clues as to the identity of the attacker, victims
pointed out it came just hours before Gates' testimony before the Senate
Judiciary Committee, where he defended the company against charges that
it improperly exploits its vast market power.

MIT's Schiller, an expert in Internet security, said the incident
underscores the vulnerability of networked computers to hostile attacks.

"What you're dealing with here is someone who is actively trying to
find a way to make your program misbehave," Schiller said. "To me
the Internet is a hostile place, and we have to build our programs
to deal with that."






Pentagon Has Computers Hacked

They were computer clicks away from plunging the nation into darkness
or interfering with the military's U.S. Pacific Command. Instead, they
broke into Pentagon and civilian computers, declared cybervictory and
signed off.

Fortunately these hackers harbored no evil intentions: They were a
U.S. national security team secretly testing the vulnerability of the
nation's computer system using software found on the Internet.

Code-named "Eligible Receiver," the cyberwar game proved what the
Defense Department said it has long known - that its computers are
susceptible targets, which became clear earlier this year when real
hackers made a "systematic attack."

"Eligible Receiver, I think, has succeeded beyond its planners' wildest
dreams in elevating the awareness of threats to our computer systems,"
Pentagon spokesman Ken Bacon told reporters Thursday.

In last June's cyberwar game aimed at the Pentagon's unclassified
computers, more than 50 National Security Agency hackers gained access
to systems across the country, including the U.S. Pacific Command in
Hawaii, which oversees 100,000 troops in Asia. Classified computer
systems were not tested, Bacon said.

The hackers gained access to a U.S. electric power grid they could
have sabotaged to plunge the nation into darkness as well - something
Pentagon officials say would likely be a tactic of any real cyberwar
aimed at shutting down public works.

Some hackers posed as operatives for North Korea and only one unit was
tracked by the FBI, which works with the Pentagon to catch computer
criminals.

"It found that we have a lot of work to do to provide better security,"
Bacon said of the cyberwar game. "We're not alone in this regard."

The Pentagon plans to spend nearly $1 billion a year for the next
several years to improve its classified and unclassified computer
security, Bacon said. The department has 2.1 million computers.

Deputy Defense Secretary John Hamre is leading a stepped-up
anti-hacker program that includes a counterintelligence effort to
stop intruders before they get through the electronic door, the
Pentagon said.

In the most recent case of real Pentagon hacking, a teen-ager in Israel,
nicknamed, "The Analyzer" on the Internet, is being investigated by the
Israeli police for his assault on Defense Department and other computer
systems earlier this year.

In February, Hamre said the Pentagon's unclassified computers were
hit by the "most organized and systematic attack" to date, targeting
mostly personnel records.

He said intrusions had "all the appearances of a game'' and had
"the quality of voyeurism or vandalism" committed by a small number of
individuals.

"There are hackers that enjoy breaking into people's computers, just
to see what they can see,'' he said, adding the Pentagon holds some
"mystique."

Bacon joked that perhaps the military should look at home for answers.

"We're trying to do a much better job of staying in touch with our
teen-age children and others to learn the latest hacker techniques
so we can be one step ahead of them rather than several steps behind,"
he said.










Israeli Hacker Featured in Ad

The FBI may be furious with him, but in Israel he's a sales icon.

Ehud Tenenbaum, the Israeli teenager who hacked into the Pentagon's
computer system, was featured Tuesday in a full-page computer ad in
the Yediot Ahronot newspaper.

The clean-cut, dark-eyed 18-year-old gazes out at the reader, chin
on hand, next to the slogan: "To go far, you need the best equipment."

The ad is selling Newron computers, made by the Israeli company EIM.

Tenenbaum, who used the name "The Analyzer" on the Internet, is being
investigated by the Israeli police for his cyber-assault on the Pentagon
and other computer

  
systems. He has not been charged.

The FBI has said he confessed to the intrusions.

"At first we had our doubts about the ethics of using his image in
the ad," said Yoram Klein, managing director of EIM. "But we found that
he is a most positive young man. He made a mistake, but that could happen
to any teenager."

In return for appearing in the ad, Tenenbaum received EIM's latest
model computer, the Newron Play Station, which sells for about $2,000.
Tenenbaum's own computer was confiscated by Israeli police.

Tenenbaum has said he broke into the Pentagon's computer to expose
the weakness in its protective systems. He said he liked to search the
Internet for neo-Nazi, pedophile or anti-Israel web sites and destroy them.

Since he was exposed last month, he has been flooded with offers for
books and movie deals.

Tenenbaum was drafted into the Israeli army last week. When he
finishes his army service, EIM intends to offer him a job, Klein told
The Associated Press.

"His knowledge of computers is staggering," he said. "He has
enormous energy, and the important thing is to direct it into positive
channels."


<editor's note: I hope they throw the book at this sellout>





Mounties nab suspect after hacker breaches NASA site
April 6


A 22-year-old Canadian man suspected of breaking into a NASA Web site
and causing tens of thousands of dollars in damage has been arrested by
Canadian Mounties.

The Royal Canadian Mounted Police in the northern Ontario city of
Sudbury charged Jason Mewhiney with mischief, illegal entry, and
willfully obstructing, interrupting and interfering with the lawful use
of data, Corporal Alain Charbot told Reuters on Monday.

Charbot said the unemployed former part-time computer science student
was "very knowledgeable" when it came to computer systems. Mewhiney was
arrested on April 1.

Canadian police were tipped off 14 months ago by FBI agents in
Washington, who were investigating security breaches into computer
systems at NASA, the U.S. air and space center.

More than $70,000 worth of damage was caused at the NASA web site and
officials were forced to rebuild the site and change security, Charbot
said. The FBI tracked the hacker by tracing telephone numbers to the
Sudbury area.

The Mounties raided the homes of Mewhiney's divorced parents and seized
an ancient computer, a second basic computer, a high-speed modem,
diskettes, and documents.

Charbot said police were still investigating breaks at several Canadian
college and university sites.

The number of charges has not yet been released but for each count
there is a maximum penalty of one year in jail and fines of thousands
of dollars, Charbot said.

Most hackers get a kick out of breaching sites, considering it a
triumph worth boasting about to other hackers.

And the probable fate of a hacker, once released from police custody? A
cushy job at a corporation, doing the same type of work -- but only with
the permission of web site builders, Charbot said.







Computer Hackers on the Offensive After the Hacker Analyzer is
arrested in Israel; Multiple Government and Corporate Web Sites
Under Massive Retailiatory Cyber-Attack! International Cyber-Terrorism
Raising Its Specter in This Full-Fledged Assault Upon the Internet

March 24

Ian A. Murphy, Pres. of IAM/Secure Data Systems, Inc., today issued
a terse warning to the Systems owners connected to the Internet:

After the recent arrest of the "Pentagon Hackers" in the US and Israel,
certain cyber-terroristic factions of the computer underground have taken
an active offensive role in the defense of the arrested hackers. The
Underground Hacker group known as the Enforcers have undertaken a massive
assault upon the Internet and Information Systems worldwide.

Corporate and Govt. web sites have been attacked and defaced in
such a manner, that no system should be left without full security
procedures and policies firmly in place. Internet sites that have
been attacked can be found on a listing at the web site
www.antionline.com. This current example of cyber-terrorism will
continue to excalate in the near future and is showing just how
vulnerable we all are to these types of Cyber-Terroristic attacks.

These Cyber-Terrorists, only armed with average desk-top computers
and connections to the Internet, have shown that any system connected
to the Internet may fall prey to these intrusions. Call it the
Cyber-version of a home intrusion and you get a better idea.

These attacks offer a unique view of the power of the Internet to
reach out and touch all lives in many manners yet unseen by the
general population. In addition, such blatant attacks only serve to
underscore the complete lack of overall Information Security provided
to these systems that contain all of our Personal, Business, Medical,
Insurance, Criminal & Educational Information.

Without the complete and total assurance of such systems, we can never
be safe from such assaults upon our lives, our incomes and our National
Security. This glowing example should be a warning to all that use and
depend upon the Internet for Commerce, Research and Entertainment.



<editors note: Threaten the government, yeah real cool. It's stupid
bastards like this that give hackers/phreaks a bad name. Get a
friggin life.>






The Enforcers Hackers Group Enters Into Cyberspace Agreement
March 27

Infowar.Com was notified today by the "Enforcers" Computer Hackers
Group, that an agreement was reached with chief negotiator Ian A. Murphy,
aka Capt. Zap, to cease and desist their cyber destruction witnessed in
the recent attacks and intrusions that have rocked the Internet in past
weeks. The Enforcers began their massive assault on corporate and
military websites after the arrest of "Pentagon Hackers" here in the
US and Israel.

Ian Murphy, CEO of IAM/Secure Data Systems, and the first US hacker
arrested back in 1981, issued press releases during negotiations which
are captioned below. Murphy began the process to begin deliberations
out of a sense of duty. Murphy's dialogue with members of the Enforcer
group pointed to the fact that the destruction was counter productive.
He urged the group to consider halting this activity. "The destruction
of information systems for an alleged cause is not the way to go about
such things in defense of Hackers and Crackers."

Murphy has been pontificating for years that the government and
corporate entities need to take the powers and strength of hackers
seriously. With the attacks and intrusions on the rise, and information
losses at an all time high, Murphy added, "It is high time that the
alleged powers that be in information security bow to the wonderment
of the hackers and their alleged silent, awesome power. It is time
that we as a society realize that one individual is equal to an entire
armed nuclear offensive force and is able to bring about global chaos
if they choose to, from a simple computer keyboard. It strikes me as
being so simplistic and yet so invasive of all society that such things
may occur. And we have become so dependent and enamored with -- and our
society so rests upon -- our silicon lives and slaves. We have become
the servants of our own information society and still do not see the
reality of the situation at hand."

The Enforcers defended their activities with claims that they were
calling attention to system administrators to wake up and 'fix' their
system flaws.

Statement Of The Enforcers

"We, the Enforcers, have decided that it would be in the best interest
of the hacking community and the security community at large to cease
and desist all web site hacking of external businesses as advised
by Mr. Ian Murphy (Captain Zap). We agree that our actions are not
productive and are doing more harm than good towards the security
community. Therefore, as an agent of the Enforcers, I hereby state
that all web site hacks on external sites will be immediately halted.
We feel that there will be other avenues opening to achieve our goal
of a substantial reduction in child pornography and racist web sites
and netizens. We also support the larger goals of the hacker community
and in the future we will work to augment the public's view rather than
detract from it. All members of Enforcers who hacked the web sites have
agreed to this release and will stop hacking external web sites."


"We thank you for your time and assistance in this matter."

Paralyse, Immunity, and DooM

Members of the EnforcerS

http://www.zicada.co.nz/enforcers

E-Mail: enforcers.webmaster@zicada.co.nz

Infowar.Com congratulates both Mr. Murphy and the Enforcers for
their diligence in reaching this agreement that stands to make a
statement on the Internet. This is a model of an act of peace in
our cyberworld.

We hope other hacker groups will have the maturity to follow example.

<editors note: It's about goddamn time someone woke up.>











The OCPP is a free publication. Copyright 1997, 1998. All
information in this issue is property of the Ocean County Phone Punx.
Nothing may be copied or reproduced. Our staff and our ISPs are not
responsible for your actions. What you do with this information is
up to you.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT