Copy Link
Add to Bookmark
Report
Phrack Inc. Volume 05 Issue 45 File 27
==Phrack Magazine==
Volume Five, Issue Forty-Five, File 27 of 28
****************************************************************************
International Scenes
There was once a time when hackers were basically isolated. It was
almost unheard of to run into hackers from countries other than the
United States. Then in the mid 1980's thanks largely to the
existence of chat systems accessible through X.25 networks like
Altger, tchh and QSD, hackers world-wide began to run into each other.
They began to talk, trade information, and learn from each other.
Separate and diverse subcultures began to merge into one collective
scene and has brought us the hacking subculture we know today. A
subculture that knows no borders, one whose denizens share the common goal
of liberating information from its corporate shackles.
With the incredible proliferation of the Internet around the globe, this
group is growing by leaps and bounds. With this in mind, we want to help
further unite the communities in various countries by shedding light
onto the hacking scenes that exist there. If you want to contribute a
file about the hacking scene in your country, please send it to us
at phrack@well.com.
This month we have files about the scenes in Argentina, Australia and Greece.
________________________________________________________________________________
Argentina: Hacking at the ass of the world
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
by: OPii.
Yeah, i know, it's something you just can't stop, whenever you try to sleep
that recurrent idea comes and recurses through your very brain, you are
blind, it happens to be worse than MTV, you just can't get to sleep, you stay
up for hours, you forget to feed yourself, you can't even remember your name,
you turn catatonic, you stand still stretching every nerve and mumbling
"hhmmpff..sc.eenn...arghh..teennn..ahhh..." and then you explode in a
terrifying scream...
"ARRRGHHHHHH, WHAT THE FUCK IS GOING ON IN ARGENTINA??????"
Right?
NO????
Well, I never really thought that could happened but I'm gonna answer
the question anyway, I know you probably don't give a fuck about Argentina
and it's scene but, hey, reading shitty text files is not new to you so
you wanna change your habits RIGHT NOW? Nahhhhhhhh
Introduction
~~~~~~~~~~~~
Ok, enough is enough, so let's get to the point.
Argentina is lagging. While other countries are flying toward the hyper
publicized "Data Highway", Argentina is still trying to fork it's path in
the telecommunication's jungle. And this has it's pros and cons.
Before 1990 the telecommunications in Argentina were in hands of Entel,
the government's monopolistic arm that ruled the area. But, and there's always
a BUT, the service provided by Entel was worse than bad. For too many
people it was normal to wait YEARS for a line, paying $1000+ when they
finally got it installed, and then a never-ending nightmare began,
if it rained, the line went dead, if it didn't die it went crazy, you
could pick up the phone and listen to your favorite radio station but
of course you could not call anyone. Or you could had bizarre conferences
with persons you'd never met...it was basically POTS but with features
that Entel never thought about... N-way calling, call forwarding to hell,
continuous call waiting in the form of line noise, speed dialing to always
busy DNs...
Ahh, you could get a line in less than a month if you paid the $1000
to some bogus vapor-companies whose workers would came pulling loops out
of their sleeves and installing them quietly (yeah, all completely illegal),
these companies were known as the phone mob.
Remember, Entel was the ONLY company entitled to give you not only a phone
line but the phone itself.
And the bills... the bills always had an encrypted message in them, you needed
a PhD in Black Magic in order to decipher what the fuck the telco was
charging you... but for most mortals the meaning was only one:
PAY, pay whatever we order you to pay, and don't ask why.
You made only local calls? PAY! (local calls are not free in Argentina)
You didn't make that call to Nairobi, Kenya? PAY!
Ohh, but you cant dial outside the country with your line? PAY ANYWAY!
You want to complain? PAY FIRST!
In 1990 the government decided to split Entel in two companies and sell them
to private investors, each company would service either the northern or
southern Argentina, the border being Buenos Aires' downtown (in case you
don't know Buenos Aires is the capital of Argentina).
This was nothing more than giving the monopolistic Entel to two new
monopolistic companies as we will see.
So the government sold Entel and two new companies appeared in Argentina's
communications scene:
- Telefonica de Argentina. Servicing the southern part of Argentina, this
company is formed by the Spanish Telefonica de Espaa (owned by Spanish gov.)
and several Argentinian and foreign investors.
- Telecom Argentina. Services the northern Argentina and it's major
stockholders are France Telecom and STET (Italy).
Also, another two companies where born:
- Telintar. Owned by Telefonica and Telecom. The ONE AND ONLY LD carrier
in Argentina.
- Startel. Guess who owns it? Yeah, Telefonica and Telecom, with some
philanthropic aides like Citicorp, J.P. Morgan and Techint and Perez
Companc ( Argentinian megacorps). Startel provides TELEX and data
transmission services as well as mobile and sea radio links. It runs
the most known Argentinian X.25 PSN (ARPAC).
The government however had to assure minimal control of the companies
and verify that their procedures and actions conform to the Argentinian
laws. That's the duty of the SNC (National Communications Secretary) and
the CNT ( National Telecommunications Commission), the last being some
sort of mirror image of the American FCC.
Did anything changed with the appearance of Telefonica and Telecom?
Did the customers noticed an improvement in the phone service?
Both companies began to "correct" Entel's mess rapidly but personally
I consider it was a little more than nothing for the customer.
They did change loops, trunks, switches, added features, installed
inter-office fiber links, private PSNs and more. But, it's 1994
now, and I still know zillions of persons that had their line dead
for 4-5 months, or have been visiting the telco offices everyday
during a month complaining about line_noise/no_dial_tone/
dial_tone_but_no_dialing/cant_receive_calls/cant_dial_certain_NPAs/
bills_are_way_out_of_scope/etc.
To conclude this section I will only say that:
1). There's still a telecom. monopoly in Argentina, now in the form
of two private companies.
2). Service got better but it's still a mess, dirty and expensive.
3). Both companies enjoyed an explosive economic grow since 1990, their
shares being one of the best things you could get a hold of in the
stock exchange.
The Phony Phone System
~~~~~~~~~~~~~~~~~~~~~~
Argentina uses pulse dialing, except for those lucky persons that
have the latest installed switches in their COs. If you don't have
DTMF you HAVE TO ask for it, you can do this dialing 112 (Telecom)
or visiting the office (Telefonica and/or Telecom). Someone will
eventually listen to you and answer:
1) "Uh???? What's DTMF?" - Forget it, ever considered teaching algebra
to a chimpanzee?
2) "I'm sorry you can't dial MF with that line" - No luck
3) "Not a problem, we'll set it for MF" - You bastard!
Switches are Step by Step or Crossbars but since 1990 the number of
electronic, and specially, digital switches has increased constantly.
Both, Telecom and Telefonica, use equipment from many different
vendors: Siemmens, Ericsson, Hitachi, Fujitsu, Northern Telecom, AT&T,
Alcatel, NEC, Spanish companies, Italians, Norwegians, and God only knows
what else. Most switches are either European or Japanesse.
As for PBXs, Siemmens, Ericsson and Fujitsu are the brands of choice for
most companies, with the recent grow of NT's Meridians among large
corporations.
DNs are 7 digits but still 6 digits in low line density locations,
this includes certain areas in Buenos Aires, the capital. Generally, 6
digit DNs can't complete an international call for themselves, they need
operator assistance ( DDI is the "feature" that allows a subscriber
to make international calls without operator's assistance, geez). Other
features offered are 3-way, conference, call forwarding, call waiting
(can't be fucking disabled temporarily!) and more. Telecom also offers a
service called "Factel" which is a detailed list of all the calls you made
in a billing period (2 months), this comes with your bills and they
charge you for EACH PAGE.
LOCAL CALLS ARE *NOT* FREE.
Toll free numbers (800) where introduced two years ago but so far there are
few 800s to call, one of the few is the CNT's 800 for reception of
complains about the telco's service.
Both Telefonica and Telecom use Frecuency Division Multiplexing (FDM) or
Time Division Multiplexing (TDM) for grouping channels with a bandwidth
of 4KHz into a multiplexed signal, called Base Band, of several channels.
Analog and digital multiplexing is used depending on the equipment
installed.
The hierarchy of groups is as follows:
- Primary Group or Basic Group: 12 4KHz channels for a total bandwidth of
48Khz, generally placed in the 60-108 KHz space.
There are three ways for forming a Basic Group: Direct Modulation,
Pre-group Modulation or Premodulation, I won't discuss 'em in this
article.
- Secondary Group (aka Super Group): 5 Primary Groups (PG) for a total of
12x5 = 60 channels and a 240KHz bandwidth., placed in 312-552KHz band
- Master Group (MG): 5 SGs, 60x5 = 300 channels, 1232 Khz. bandwidth
( 5x240Khz + 32Khz.) in the 812-2044Khz. band
- Super Master Group (SMG):
3MGs, 3x300 = 900 channels
3 x 1232Khz + 176 Khz = 3872 KHz bandwidth. (8516-12388 KHz)
For digital multiplexing, using TDM, things are like this:
Pulse amplitude modulation (PAM) is first used to sample the 4Khz
channel, then the PAM signal is quantified in 256 discrete values
( 8 bits) and this is finally multiplexed as follows:
- A basic 2048 Mbit/s for 30 channels (8Khz/channel for they're sampled...)
- 8 Mbit/s = 4x2Mbit/s ( 120 channels)
- 34 Mbit/s = 4x8Mbit/s ( 480 channels)
- 52 Mbit/s = 6x8Mbit/s ( 720 channels) <--this is not standard)
- 140 Mbit/s = 4x34Mbit/s ( 1920 channels)
- 565 Mbit/s = 4x140Mbit/s ( 7680 channels)
- 900 Mbit/s = 6x140Mbit/s (11.520 channels)
Both DC and AC is used for signalling depending on several characteristics
as trunk length, the switch's technology, etc.
Reverse polarity and E and M signalling is used with DC, while DP
and MF is used with AC. CCITT #3,CCITT #4 or CCITT #5 is used
on international circuits, otherwise R2 is used.
I won't go into the details of the different in band signalling methods as they
are probably well known by you... i'll only point that, as you guessed,
things are set for interesting boxing experiences.
Argentina is the place for the casual explorer in this topic, even "Joe
customer" could choose alternate routes for his local calls, all by
himself, some years ago, prefixing the destination DN with a 3 digit number.
There are other interesting things to ponder here, like the way calls
from one company's zone to the other company's zone are completed, etc.
Also, SxS and Xbar switches are fun to mess with, known their "hidden
features" like line freezing, forced ANIF and forced linkage of the
circuit to a given CO.
Payphones, known as TPAs in local telco. jargon, comes in different
flavors. First, the one that both companies inherited from their
predecessor, Entel, this one sports a rotary dial and needs tokens to
operate.
Then the obsoleted Telecom's "card puncher", needed a card with a mag
strip that the phone would punch each time you used it, these have been
replaced by the new Telecom's modular payphone. (Perhaps it was a piece of
shit and Telecom replaced them right away??? ). You wont find one of these
easily.
Telecom's modular payphone works with cards and wont accept tokens or
coins, these have a cute LCD and controls for volume, language selection
of the messages displayed as well as buttons for redialing and replacing
an exhausted card while a call is in progress. It's uses cards with an
8 contacts on-card chip.
Telefonica's payphones accept cards AND tokens, they also have a LCD
and buttons for volume, redial, etc. They also use cards with 8 contacts
on-card chip. They skipped the "brilliant" card punching stage so these are the
phones you'll find in Telefonica's area.
NO PAYPHONE WILL ACCEPT REGULAR CREDIT CARDS.
ONE COMPANY'S PHONE CARD IS INCOMPATIBLE WITH THE OTHER COMPANY'S PHONES.
( this is supposed the change this year? )
Phone cards cant be recharged when they're exhausted.
( eh, this is not quite true )
Telefonica is said to make their payphones accept regular coins any
time noooooooowwwwwwww bahahahahahahah .
The Networks
~~~~~~~~~~~~
Networks in Argentina are growing, and are growing fast, but they are
still poor and slow when compared to other countries nets.
LAN are usually based on PCs with Novell's Netware in its different
flavors or some lousy Lantastic.
As for WANs, the computers you'll ran into are IBM mainframes, DEC
VAXes running VMS, and Unixes (generally IBM's RS/6000 w/AIX or lower
end PC clones running SCO).
Still, open systems are being happily adopted and TCP/IP based LANs are
emerging everyday.
There aren't many systems online 24hrs/day but mostly online during work
hours. You'll find most systems unreliable, bad configured, and worse
used.
ARPAC, The Jester's Playground
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ARPAC (DNIC==7222) is the most known PSN in Argentina. It has dialup
access in more than 30 cities in the country, although the fastest
baud rate for them is an infamous 2400bds. Leased lines go
up to a maximum of 19.2Kbds.
The protocol used is the X.25 suite and ARPAC offers the following
optional facilities:
- Closed User Group. (CUG)
- Fast Select.
- Packet size negotiation.
- One-way logical channels. (outgoing/incoming).
- Non-standard window sizes.
- Reverse charge request and acceptance.
- Multipoint access
- Incoming/outgoing call blocking.
- Incoming/outgoing call blocking to and from CUGs.
Obviously these features, should you accept them, imply a little
extra bucks in your Arpac bill (which will self-destroy your wallet in
five secs.).
Startel, the company that runs ARPAC, uses a unit called PTD (it stands
for Data Transmission Packet in Spanish) for billing purposes.
Packets are 128 bytes and conform a PTD, transmission of 64 bytes or
less are considered as 1/2 PTD.
Startel vacuum cleans it's customers bank accounts this way:
1) A one time payment for the installation of the X.25 equipment.
2) A "basic monthly payment" that does not include data traffic.
3) A "variable monthly payment" that depends on the number of PTDs
handled by Arpac.
As for December 1993 this was calculated considering a fee of $0.007595/PTD
and 1 PTD/min for leased lines + 4 PTD/min for dialup access. Also
remember that those dialing from the PSTN are paying the local call
too.
There are discounts based on the day of week and hour of the
connection:
- Type "A" fee (normal fee) Mon-Fri 06:00-20:00
- Type "B" fee (40% discount) Mon-Fri 20:00-24:00
- Type "C" fee (60% discount) Mon-Fri 24:00-06:00
Sat. 20:00-06:00
Sun. and
Holidays 00:00-24:00
International connections are not considered in this figure and are
billed according to Telintar (LD carrier) fees.
A 8% or 18% tax is applicable to all payments. Customers can also
choose a fixed monthly payment instead of basic+traffic payments.
The software used is that of ITAPAC (DNIC 2222) and as far as i know
theres no support to mnemonics instead of the plain X.121 addressing.
Nuas are DNIC+10 digit composed this way:
[07222]XXXX YYYYY PP
^^^^\^^^^^\^^\__ port/subaddress
\ \
\ \_ host
\
\ __ corresponds to a "nodal area" in Startel's
jargon,usually associated with geographic
location.
Some valid entries here are:
2111,2141,2171,2511,2211,2911,2172,2912...
NUIs, IURs in Startel's babbling, are formed like this:
9XXXXXXXX/YYYYYY
^^^^^^^^\^^^^^^\_ this is the password, normally 5/6 alphanumerics,
\ all uppercase.
\
\__ da nui! X is in the [0-9] range and generally the whole
8 digits correspond to one of the subscriber's DNs.
So if you were to use ARPAC you'd make a call by typing
.. <enter> upon connection (7E1, <= 2.4kbds)
then
N9<XXXXXXXX>/<YYYYYY>-<nua> ; when using a NUI. or
<nua> ; w/o NUI needs Reverse Charge
; Acceptance of course.
You don't wanna call them NUIs when talking to Startel personnel
(i.e. social engineering) unless you want to become instantly suspected
to be an evil phraudster (aka haq3R).
"CIBA", The Infamous, or BT Tymnet's retarded child (DNIC==7220)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
If you cared enough to read the BT Tymnet's worldwide dialups listing
you probably noticed a few entries for Argentina. These were regularly
used by "net explorers" in the mid 80's and were known as "CIBA" among
them. CIBA dialups are 300bds (wow!) and use CCITT v.21 protocol (ATB0
for your modem). At that time the fastest ARPAC dialup was 1200bds.
All in all CIBA is nothing more than the door to BT Tymnet in
Argentina (node 7407, host 1212). There's no direct access to interesting
utilities such as "xray" and the likes.
NUIs here were stupidly choosen and easily scanned since they followed
two known patterns:
naargXXXXna , and
enargXXXnet X being in the [0-9] range.
Many of these were not passworded. Of course no one would even think to
scan NUIs at 300bds nowadays...
Internet
~~~~~~~~
The Internet is rarely know and even less used in the student,
professor, computer and communications professionals circles. It's a
depressive experience to explain the workings of "telnet","rlogin","ftp"
and such "eccentricities" to people who were supposed to know about them
from their TCP/IP books, courses and lectures. You, reader, could
allege that a networked unix system is enough to explain this, but
despite the technical explanations, the political, economic and social
implications of the Internet will remain unknown until a vast amount of
persons actually USE and EXPERIENCE it. And I'm not talking about
"Joe citizen" here, I'm talking about people that would actually NEED
the net if they were to improve their work.
It's like describing the taste of an apple to someone, he'll
surely understand what you say but don't expect him to understand what
it tastes like until he actually bites it.
The Internet top level authority in Argentina is the Foreign Relations
Ministry and its link to the rest of the world is sponsored by the
'United Nations Development Programme'. 'whois' output follows:
United Nations Development Programme (NET-ARNET)
Ministerio de Relaciones Exteriores y Culto
Reconquista 1088 ler. Piso - Informatica
Buenos Aires
ARGENTINA
Netname: ARNET-NET
Netnumber: 140.191.0.0
Coordinator:
Amodio, Jorge Marcelo (JMA49) PETE@ATINA.AR
+54 1313 8082
Domain System inverse mapping provided by:
ATINA.AR 140.191.2.2
ATHEA.AR 140.191.4.10
Record last updated on 06-May-91.
Argentina has only an UUCP link (well, once again this is just the publicly
known info...) to the Internet through UUNET, connecting several uucp
linked networks to it (RAN,RECYT,etc). Atina.ar is the most important
host in this scheme, seconded by the Science and Technology Secretary's
host (SECYT) and the University of Buenos Aires (UBA) host located at
the Exact and Natural Sciencies Faculty in a dependency known as the
"CCC".
There's also a company the offers Internet connectivity bypassing atina
and uunet. 'whois' output:
SatLink Uucp/Internet (SATLINK-DOM)
Casilla de Correo 3618
(1000) Correo Central
Buenos Aires
ARGENTINA
Domain Name: SATLINK.NET
Administrative Contact, Technical Contact, Zone Contact:
Stolovitzky, Horacio (HS3) postmaster@SATLINK.NET
+54-1-983-6740
Domain servers in listed order:
NKOSI.WELL.SF.CA.US 192.132.30.4
WELL.SF.CA.US 192.132.30.2
Record last updated on 24-Mar-93.
There are other links that bypass atina and uunet, all of them part of
corporate networks. (i.e. IBM's VNET, etc)
Although everyone says theres only a UUCP link to the Internet, word is
that there are a few hidden 9600bds leased lines shared among many hosts
at some sites, at any rate this is completely insufficient for servicing
researchers, students and other interested parties, thus the existence
of these links is kept as a sort of secret.
64kbds links are supposed to be installed for interactive sessions
this year at certain sites.
Other networks
~~~~~~~~~~~~~~
Many companies form their corporate networks as CUGs on Arpac, have
their own network, or both. Telcos, consulting firms, banks and
insurance companies fall in these categories and are quite interesting
research projects for the inquisitive hacker.
The "Scene"
~~~~~~~~~~~
There's not much to say about the Argentinian scene. Given the cost
and the time you have to wait to get a phone line installed there
aren't many BBSes up 24hrs. Most of them are up during nighttime, from
10:00/11:00 pm to 6:00/7:00am, of these, very, very few are dedicated to
hack/phreak topics.
Also, considering that theres no decent internet access at your local
university you would be forced to explore X.25 networks in order to
fulfill your natural interest and seek of knowledge.
But there aren't many hackers either. Most Argentinians you'll find on
the nets are mere abusers with one final goal: to get to QSD or the
likes. While this sounds rather amusing (eh) there's an explanation to
it.
In the mid 80's a few Argentinians used to exploit CIBA's clueless
procedures for choosing NUIs. At that time the fastest ARPAC dialup
was 1200bds so 300bds was not that bad after all, and not bad at all
as you were sure you could find a new NUI in a matter of hours.
Yes, many people wasted their diminishing lifes in QSD, but for some this
new x.25 thingie was more than a mean for meeting friends over the net
and having endless chats with them, some needed to learn and understand
the workings of the nets and the many different systems hooked to it.
For those the place was Altos, and AMP (although you couldn't connect to
PSS directly). And Altos proved to be of great help for Argentinians
that got introduced to the hack/phreak world not on a BBS but right on a
X.25 network. And so did the sequel of Korn-chat sites (tchh,lutzifer,
italian "artemus") or even Pegasus and LINA sometimes.
Around '89 or '90 an Efinet (Efinet == Fidonet wannabe) meeting was held,
and during it someone gave out a "strange bunch of numbers in the form
of some sort of code or something" (this being an ARPAC NUI followed by
QSD's NUA) and the attendees ran home and tested it, just to see them
connected to the France chat extrordinaire. Meanwhile, things were
getting hot elsewhere in the world, and those once famous X.25 hangouts
went virtually dead, so these newcomers wouldn't get in touch with
Argentinian hackers (as they wouldn't appear in QSD) or other countries'
hackers (as they were having a bad time or retiring or simply leaving
X.25 alone). So, even if they wanted to learn, these freshmen, for good or
for bad, were on their own and still are...
The vast majority of the argentine society never heard the words "hacker"
or "phreaker" or, if they did, they relate it to things happening in
other countries, far, far away.
It wasn't until '93, in accordance with the apparently boundless tendency to
use the word "cybersomething" when referring to anything remotely related to
new technologies, computers, or scifi novels or any other thing that
requires publicity, i.e. see cyberIdol's cybershitty cyberCD to understand
what I cybermean, uhg excuse me, back to the point...
It wasn't until '92 or '93 that the media discovered this brilliant trend
for selling more and more, apparently some genius said: "Hey, what if we
sell the future? What if we write about how will life be, how will
technology be, how will the planet be, how will your dog be? All this
with some vague journalistic odor of course. I bet we will sell more!".
So they did, and in this frame the hacker/phreak scene is more like the
salt to dress the salad, yet things didn't get to the extreme of
sensationalism and hacking is portrayed as an activity bound to some
new sort of romanticism, still things are very much confused, putting
hackers, phreakers, crackers, pirates, virii authors and mere fraudsters all
together in the same bag (yes, but what would you expect anyway?). Even some
interviews to an ex-hacker (who now runs a data security firm), and a
self proclaimed "expert" ( more a virus expert, IF anything) have
appeared.
On the other side, many "eleet poseurs" have appeared too, but as one
could expect, they are nothing more than mere poseurs and certainly not
worth more than a phrase here.
Final Words!
~~~~~~~~~~~~
This is the 'scene' AS I SEE IT, i don't consider myself an enlightened
entity, thus I acknowledge my description might not be objective nor
complete (in fact it might be complete bullshit but, do I care? do YOU
care?).
Argentina is a country where lots of things are still there, waiting to
be discovered, virgin beaches for you to explore and enjoy. Security is
generally lax, and people is generally not security-aware and even less
hacker-aware, trashing and social engineering are simple things that DO
give many benefits.
As far as I know theres no specific law dealing with computer related
crimes (whatever that mean...), and as long as you don't get yourself
involved in the traditional crime pictures you are pretty much safe.
On the other hand, the bad and expensive phone service, the lack of
internet connectivity and the limited number of BBSes dedicated to the
so called "underground" (yes, I did it, I used the damned word, argh)
make things tougher for newcomers.
Perhaps the most interesting thing is that there's not much knowledge of
what hacking/phreaking means and this gives us an unique opportunity to avoid
misunderstandings and errors that occurred in other countries. Perhaps
it is possible to influence people in a positive way, making them think
about secrecy, security, privacy and responsibility issues. We are
still free of Geraldos, we didn't suffer witch hunts ala Operation
Sundevil, the words "hacker" and "phreaker" have not been demonized yet,
although the Orwelian-way is common practice among the telcos, but
nobody seem to give a fuck about this, or maybe nobody notice?.
So, this is it, the file has come to an end and I think it's enough
for an introduction, I did not cover cellular telephony nor satellite
links and companies providing related services, I did not mention many
other things but my intention was to write a description of how things
are here, not a fucking encyclopedia.
If you think that many topics are deliberately vague and not covered
in deep, that some information might be not accurate or if you don't
agree with anything I've stated you can contact me at:
HBO +541-788-4850 24hrs.
Loser's joint +541-658-7983 23:00-6:00 (GMT -3)
Here's my PGP key. DO USE IT OR EXPECT NO REPLIES
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3a
mQCNAi1EBdUAAAEEAMdEmi+ajN/WIIvN3jjUQk/wb0CLsXe+K49fX8DuUXvUSpdJ
UCu8wFH82reJWttj3vaMQ/guKADC/VTIbfsRGWZhbvc+7Mb0W/3LPJSj5zpG9O+M
+XF6A7eB6IfncS+p9jU5Tb9lMc/H0BoW4VTpYO/eWK9DJGfAFOA/puxL3X5tAAUR
tB1PUGlpIDxvcGlpQGJpYXBiYS51YmEuZWR1LmFyPg==
=rKbG
-----END PGP PUBLIC KEY BLOCK-----
------------------------------------------------------------------------------
The
Australian
Underground
( or The lack thereof! )
by
Data King
ATTITUDE
For several years now the Australian underground scene has turned better yet
worse at the same time. The amount of companies and colleges using datacomm
has dramatically increased. In my opinion it is still not yet to the stage of
America in this respect though.
The number of 'hackers' has increased, but I use the term loosely as I do not
consider many of these so called 'hackers' to be hackers. Why do I say this?
I say this because most people who hang out in the underground scene in
Australia consider hacking to be getting an account at a university off of a
friend and then snarfing the password file and running crack over it. They are
only interested in things that will give them access to IRC, FTP & Newsgroups.
( No flames please I am talking in general here! )
Many of them have never heard of services like MIDAS, Minerva & AUSTPAC and
even if they were given a dialup to one of these services I doubt they would
have a clue about how to use it. We have a wealth of services out there just
waiting to be tried, but there is almost no one who is interested in doing so,
to give you an example. One night I was working away on my box at about 3am and
a 'hacker' mate had crashed on the couch. I went to dial into one of the local
universities and I misdialed the number. At first I didn't realize that I had
dialed the wrong number since I got a carrier. My modem connected and then just
sat there instead of the usual annex prompt. I bashed the old enter key a
few times and suddenly I was presented with a menu to an accounting system.
'Sheet,' I thought, and screaming to wake my mate up ( at this stage I thought I
had connected to the university and it hadn't reset the line after the last user
hung up ) I started to explore the system, it soon became evident that it wasn't
the university but something entirely different, by this time my 'hacker' mate
had woken up. 'Whaaaaaaaaat?' comes the response from the couch, I briefly
explained what had transpired and his only response was 'Ughhhhh' as he went
back to sleep. Needless to say I spent the next 3 hours playing with the
system, and by the time I had finished I could crash the accounting menu and
exit to the operating system.
The system turned out to be fairly boring and proved to be of no use to me,
BUT I had to assume that before I knew, it could have been something really
interesting and to spend time fully exploring it, where as my 'hacker' mate
couldn't give a stuff, 'coz it wasn't on internet'.
TECHNIQUES
Australian Hackers no longer seem to be using advanced techniques to penetrate
a system, very few would have any idea how to use TCP/IP to gain access to a
system. Most satisfy themselves with obtaining an id elsewhere and then
snarfing the password file and running crack over it. When it comes to things
such as VMS the attitude I usually encounter is "VMS urgh, what bloody good
is it!". There are some very good Hackers in Australia but most of them do
not hang around in the underground scene, rather they are usually university
students who learn how to make the best use of the system. Writing things like
ICMP bombs, and Sniffers is usually left to these people, in fact I can not
think of any active non university student hacker who lives in Australia and
uses these sort of techniques.
CONS
To the best of my knowledge there has only ever been one underground conference
in Australia, and that was from memory in 1984, it was called Hackfest and it
was nothing compared to HOHOCON or Hacking at the End of the Universe.
At the time we all thought it was great, and I must admit it did boost the
sharing and finding of new info for a while.
I, in association with one or two others, have been thinking of arranging
another Hackfest to be held in 1994, it will probably be held in Melbourne,
Australia. If you live in Australia and would like to attend then mail me
and I will keep you informed. ( Det. Sgt. Ken Day: Don't bother trying to
spy on Hackfest if it goes ahead, you're more than welcome to attend! )
NETWORKS
In Australia we have several national and international networks, here is a
list of some of them:
MIDAS International Packet switching network DNIC = 5053
Minerva Automated Office Network w/ International PSS
AUSTPAC Australian Packet Switching Network DNIC = 5052
SprintNET Need I explain this???
AARNET The Australian Network that covers Internet in Australia
TRAN$END Subset of Austpac ( used by Banks for ATM/EFTPOS transmissions )
Compuserve Need I explain this???
Discovery Australian Videotext system ( Not sure if still in Service )
????? The Australian Military Network ( Don't know its name )
TAXLAN The Australian Tax Office ( IRS ) Network
PHREAKING
For years people in Australia believed that phreaking was only really possible
by pitting, this included Telecom Investigations Department, but we know that
this is not true. Methods that have been used in Australia include:
Blue Boxing off of an American Operator Line
Pitting ( ie: Linemans handset connected to a telecom junction box )
Clicking ( Electric shock to a public phone )
Boxing off of a disconnected number ( almost impossible now )
Calling Cards ( both American and now Australian Calling Cards )
PBX's ( 0014-800's and local PBX's )
Mobile Telephones ( ie Cellular Phones and b4 that the old Radio mobiles )
There are probably other methods as well but I am not a phreaker so I am not
the best person to comment on this. Boxing in Australia is getting dangerous
now as we are getting more and more of the new digital exchanges which make it
a lot easier to trace, or at least so I am told.
There were some people in South Australia making/recharging Telephone cards,
( Like a disposable calling card, but you buy them in news agents and they
have a dollar value, once used up you throw them away ) but these people were
apparently caught and telecom have taken measures to ensure that this is no
longer possible.
VMB'S
We have a large range of VMBs in Australia, and with the proliferation of
VMBs has come the art of Hacking VMBs, we even have people here in Australia
that do virtually nothing else other than play with VMBs. These people tend
to go a lot further than just cracking the pin numbers, some of them have
learned enough about the signalling systems used by these systems to virtually
take control of the system and make it do what they want. Once again this is
an area that I do not know a lot about.
We also have a couple of individuals that run something called the Scene Inpho
line, Which essentially is a VMB with a long recorded message giving out tips,
rumors, and general rubbish. The number to the Scene Inpho Line unfortunately
constantly changes as the owners of the VMB notice what's going on and shut
that particular box down.
BULLETIN BOARDS
There are not a lot of good underground BBS's in Australia, a couple that I
know of that come to mind are Destiny Stone II, Empire of Darkness,
& Watchtower. I can not comment on Destiny Stone II as I have never called it.
However, when I used to called Empire of Darkness it was so lame it wasn't funny
and now he has gone 96+ only I can't call it ( I'm poor and can't afford a
new modem ;) ).
Watchtower showed potential but unfortunately the sysop of it is very slack and
needs to get off of his butt and do some work on it! The underground boards in
Australia tend to reflect the general state of the scene, ie: complete and total
apathy!
Most H/P boards in Australia are also warez sites and tend to be pretty lame and
insecure because of all the warez puppies on them, I can not think of a really
good board in Australia that is still operating.
BUSTS
In the last year the Australian Federal Police, Computer Crimes Unit has been
quite busy raiding people. As a result there have been 4 convictions that I
know of, and another 2 people waiting for charges to be laid.
The people convicted and there sentences are as follows:
Data King (me) Guilty but no record ( escaped conviction under section 19b of
the act ) $300.00 fine and $500 2 year Good Behavior bond.
( Pleaded Guilty to 2 Charges )
Electron 6 Months Jail ( suspended sentence ), $500 6 Month Good
Behavior bond, & 300 hours Community Service Work.
( Pleaded Guilty to 14 Charges )
Nom 6 Months Jail ( suspended sentence ), $500 6 Month Good
Behavior bond, & 200 hours Community Service Work.
( Pleaded Guilty to 2 Charges )
Phoenix 12 Months Jail ( suspended sentence ), $1000 12 Month Good
Behavior bond, & 500 hours Community Service Work.
( Pleaded guilty to 15 Charges )
In the most part people get busted in Australia due to either their stupidity
( Hi Phoenix! ), being lagged in by some low life, or by trusting someone they
should not of ( Hi Phoenix! ).
LEGALITIES
Both Hacking and Phreaking have been illegal in Australia for quite a few years
I will not go into details here as hopefully there will be an article in this
issue of Phrack covering the laws and possible penalties.
Computer Crime in Australia is the responsibility of the Australian Federal
Police Computer Crimes Unit. The people known to us in this unit are:
Det. Sgt. Ken Day
Det. Neil Campbell
Det. Steve Visic
( Sorry guys if I spelled your names wrong - NOT! ;) )
If you are able to add any names to the list, please mail them to me and any
other info you have on them. That way we can begin to build up a dossier on
our enemies!
PUBLIC
There seems to be a growing awareness in the general populace of Australia.
There has been quite a bit of media hype on hacking over the last year, and
slowly the public seems to be getting a great fear of hackers. To me it seems
ridiculous, as the only real hackers that the public should have feared lived
in the early 80's. Today's generation of Australian hackers are pretty HOPELESS
in my humble opinion. To give an example, when Electron, Nom, & Phoenix's court
cases were getting media attention I was sitting in my parent's lounge room one
night when the news was covering their sentencing. My father thought that
these people were very dangerous and should have gotten a bigger sentence than
they did. At this time he did not know about my bust. I have explained it to
him now but he still doesn't seem to understand...oh well that life I guess.
CONCLUSION
This is how I see the Australian scene, If you disagree, want to comment, send
me info for future articles, get on the hackfest mailing list, or just want to
have a chat you can mail me at:
dking@suburbia.apana.org.au
If you require privacy you can send me stuff that is encoded via pgp, my
pgp public key is as follows:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.0
mQCNAi0t3M4AAAEEAMPZMexyZ+Nxz8Ry1w9R7pTLFGM7xk0MwJ/izS687UIJLzc5
l38jFM0bEcuSukRrLkBYIDdiAgOdn50cJmKOPyvE4FvR2eh2dbdHyFKzaVWVe5zE
HZhNx2o0kb6SRIQHu8Vh/pkl+S29RKzDbIgMLLjOCwN0V1/RUal4ROOqDaCbAAUT
tCdEYXRhIEtpbmcgPGRraW5nQHN1YnVyYmlhLmFwYW5hLm9yZy5hdT4=
=ttmq
-----END PGP PUBLIC KEY BLOCK-----
I can also usually be found on IRC a couple of hours a night in these channels
under the nick of dking:
#apana #hack #phreak #linux
Thanks for assistance with this file go to:
SPiN-DoC Olorin
&
Connie Lingus
( Motivational Support - <SMILE> )
Have phun, and remember:
BE CAREFUL OUT THERE!
==============================================================================
()()()()()()()()()()()()()()()()()()()()()()()()()
() ()
() "Australian Hacking Laws" ()
() ()
() 21/01/93 ()
() ()
() (c) Data King ()
() ()
()()()()()()()()()()()()()()()()()()()()()()()()()
Crimes Act 1914 (Commonwealth)
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Part VIA - Offences Relating to Computers
Section 19B (1) Order & Recognizance
The Court can discharge you under this section, with a surety and/or
recognizance given by you.
If discharged under this section you may be put on a good behavior bond
of up to but not exceeding 2 years. Other conditions may be placed on you
by the court also, this conditions can be anything that the court considers
appropriate.
To have this section come into effect the following must apply:
The Court is satisfied that the charge(s) are proved, but is of the opinion,
having regard to:
The Character, Antecedents, Age, Health, & Mental Condition
that it is unexpedient to inflict any punishment or any punishment other
than a nominal one on you.
Basically what this means is that you can be found guilty and not have a
conviction recorded against your name, but you must realign that the
department of public prosecutions may object to this and then you will have
to try and convince the Judge to ignore what the DPP says, (not easy).
Also please realign that if you were to receive a section 19B and then were
caught doing naughty things again and you are still under your good behavior
bond, you will forfeit your bond and have to stand trial again for the
original offence(s).
Section 74A - Interpretation
(1) In this part, unless the contrary intention appears:
"carrier" means:
(a) a general carrier within the meaning of the Telecommunications
Act 1991; or
(b) a mobile carrier within the meaning of that Act; or
(c) a person who supplies eligible services within the meaning of
that Act under a class licence issued under section 209 of that Act;
"Commonwealth" includes a public authority under the Commonwealth;
"Commonwealth computer" means a computer, a computer system or a part of a
computer system owned, leased or operated by the Commonwealth;
"Data" includes information, a computer program or part of a computer program.
(2) In this Part;
(a) a reference to data stored in a computer includes a reference to
data entered or copied into the computer; and
(b) a reference to data stored on behalf of the Commonwealth in a
computer includes a reference to:
(i) data stored in the computer at the direction or request
of the Commonwealth; and
(ii) data supplied by the Commonwealth that is stored in the
computer under, or in the course of performing, a contract
with the Commonwealth.
Section 76B - Unlawful access to data in Commonwealth or other computers
(1) A person who intentionally and without authority obtains access to:
(a) data stored in a Commonwealth computer; or
(b) data stored on behalf of the Commonwealth in a computer that
is not a Commonwealth computer;
IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 6 months
(2) A person who
(a) with intent to defraud any person and without authority obtains
access to data stored in a Commonwealth computer, or to data stored on
behalf of the Commonwealth in a computer that is not a Commonwealth
computer; or
(b) intentionally and without authority obtains access to data stored
in a Commonwealth computer, or to data stored on behalf of the
Commonwealth in a computer that is not a Commonwealth computer, being
data that the person knows or ought reasonably to know relates to:
(i) the security, defense or international relations of
Australia;
(ii) the existence or identity of a confidential source of
information relating to the enforcement of a criminal law of
the Commonwealth or of a State or Territory;
(iii) the enforcement of a law of the Commonwealth or of a
State or Territory;
(iv) the protection of public safety;
(v) the personal affairs of any person;
(vi) trade secrets;
(vii) records of a financial institution; or
(viii) commercial information the disclosure of which could
cause advantage or disadvantage to any person;
IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 2 Years
(3) A person who:
(a) has intentionally and without authority obtained access to data
stored in a Commonwealth computer, or to data stored on behalf of the
Commonwealth in a computer that is not a Commonwealth computer;
(b) after examining part of that data, knows or ought reasonably
to know that the part of the data which the person examined relates
wholly or partly to any of the matters referred to in paragraph
(2)(b); and
(c) continues to examine that data;
IS GUILTY OF AN OFFENCE - PENALTY: for contravention of this subsection:
Imprisonment for 2 years
Section 76C - Damaging data in Commonwealth and other computers
A person who intentionally and without authority or lawful excuse:
(a) destroys, erases or alters data stored in, or inserts data into a
Commonwealth computer;
(b) interferes with, or interrupts or obstructs the lawful use of a
Commonwealth computer;
(c) destroys, erases, alters or adds to data stored on behalf of the
Commonwealth in a computer that is not a Commonwealth computer; or
(d) impedes or prevents access to, or impairs the usefulness or
effectiveness of, data stored in a Commonwealth computer or data stored
on behalf of the Commonwealth in a computer that is not a Commonwealth
computer;
IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 10 years
Section 76D - Unlawful access to data in Commonwealth and other computers by
means of certain facilities.
(1) A person who, by means of a facility operated or provided by the
Commonwealth or by a carrier, intentionally and without authority obtains
access to data stored in a computer.
IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 6 months
(2) A person who:
(a) by means of a facility operated or provided by the Commonwealth
or by a carrier, with intent to defraud any person and without
authority obtains access to data stored in a computer; or
(b) by means of such a facility, intentionally and without authority
obtains access to data stored in a computer, being data that the
person knows or ought reasonably to know relates to:
(i) the security, defense, or international relations of
Australia
(ii) the existence or identity of a confidential source of
information relating to the enforcement of a criminal law of
the Commonwealth or of a State or Territory;
(iii) the enforcement of a law of the Commonwealth or of a
State or Territory;
(iv) the protection of public safety;
(v) the personal affairs of any person;
(vi) trade secrets;
(vii) records of a financial institution; or
(viii) commercial information the disclosure of which could
cause advantage or disadvantage to any person;
IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 2 Years
(3) A person who:
(a) by means of a facility operated or provided by the Commonwealth
or by a carrier, has intentionally and without authority obtained
access to data stored in a computer;
(b) after examining part of that data, knows or ought reasonably to
know that the part of the data which the person examined relates wholly
or partly to any of the matters referred to in paragraph (2)(b); and
(c) continues to examine that data;
IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 2 Years.
Section 76E - Damaging data in Commonwealth and other computers by means of
certain facilities
A person who, by means of a facility operated or provided by the Commonwealth,
intentionally and without authority or lawful excuse:
(a) destroys, erases or alters data stored in, or inserts data into a
computer;
(b) interferes with, or interrupts or obstructs the lawful use of,
a computer; or
(c) impedes or prevents access to, or impairs the usefulness or
effectiveness of, data stored in a computer;
IS GUILTY OF AN OFFENCE - PENALTY: Imprisonment for 10 Years.
Section 76F - Saving of State and Territory Laws
Sections 76D and 76E are not intended to exclude or limit the concurrent
operation of any law of a State or Territory.
Conclusion:
~~~~~~~~~~~
You may have noticed that any hack of a Computer in Australia could result in
you staying in a prison for quite a long time, as almost any hack would be
and offence under just about all of the subsections listed above, combine this
with a consecutive sentence and you *COULD* be in jail for over 25 years.
"Be Careful Out There!!"
------------------------------------------------------------------------------
-- The HELLenic Digital Subculture Scene --
by Opticon the Disassembled
- "EL33t3 Hackers": "TH3rE R N0 UNKraKKable ZyZTEMZ.EV3ry1 HAS[S] It's H0L3z."
- I'm sure every "EL33t3#@$$^!!! HaKKER" has at least one hole by nature.
"The Gods could have chosen any place but they chose Greece"...Yes, they did.
By mistake probably.
Agricultural country, light industry, member of the European Community, ten
million residents, surrounded by sea (polluted in some areas) and forests
(burned in some areas). Four thousand years old culture, beautiful language
(due to it's ancientness) [...]
Digital subculture scene? Quite a few articles appear on newspapers and
magazines about CyberPunk. Quite a few people claim to be hackers (elite ones),
crackers (elite ones), phreakers (elite ones) and coders (elite ones).
University students get insane pleasure when talking about their last
achievements, how they cracked all the accounts of a shadowed password file,
and how they transferred 2000 true color, porno JPEG and phracking files.
Public bulletin board systems distribute blue boxing related articles (Hail
Mark Tabas!) and pirate boards distribute "oNE DaY WAREZ!@!#".
"Phone freaks, crackers, hackers, virus makers." At the end, an interview
with a young software cracker. He listens to TECHNO ("the only real music"),
he would like to buy an Apple Powerbook and he needs only five minutes to
"crack a disk".
No busts have taken place AS FAR AS I KNOW. Only innocent pirates and couriers
were prosecuted years ago, due to distribution of cracked programs for ZX
Spectrum, Commodore and Amstrad ("peeks, pokes, hints & tips").
An article about "Legion Of Doom! - ComSec" appeared on November 1991:
"X-Hackers offer their services to companies". Glamorous picture of the
group, opinions, history, comments from a phracking illiterate journalist.
An-archic 'zines (printed format) were publishing digital underground related
news, since mid '80s.
A family man in my city has been using a black box for 10 years. He accepts
calls from relatives living in Italy.
At the age of seventeen Nikos Nasoyfis wrote a book about 8088/8086 assembly
programming and cracking of protection methods. He is considered to be a
genius in those areas. Upon the request of a magazine he created "the first
Hellenic virus".
No Digital Underground / An-archy related systems exist, except DiES IRAE.
But of course " If [When] you are good, nobody knows that you are there ".
* Packet Switching Data Networks
SERVICE: HELLASPAC
DNIC: 2023
LOG-IN PROCEDURES
1. Dial access number:
1161 for both 300 and 1200 bps. Additionally, the
following access numbers are available within Athens:
8848481, 8849021, and 3477699.
2. Upon connection, the user types three dots and Enter or Return:
... (CR)
3. The network will respond
: HELLASPAC
If no response, repeat step 2.
4. Upon receipt of the network prompt, the user types (in capital letters):
NXXXX - 0 WWWW (CR)
where XXXX is the user's NUI and WWWW is the NUA.
5. HELLASPAC will answer
: COM
6. To log off, type
(CTRL)PCLR(CR)
The network will respond
CLR CONF
Until the end of the year a free experimental 2400bps ( 1200 baud + MNP 5 )
dial up public service will be operating at 0961-11111 (if you call this a
2400 baud NUI, shame on you! You know who you are :-) ). 0961-22222 will
lead to HellasTel ( Video Text ). Can't tell if foreigners can call these
numbers.
SERVICE: ARIADNET
Ariadnet is a Hellenic research/academic network sponsored by the European
Community. There are two main hosts: LEON and ISOSUN. The first one serves
the public; dial-ups, low cost (10.000 drg for three months), yet low disk
quota (starts from 1 MB) due to "the workstation's incapability to carry
a lot of hard disks". The second one serves users who call from other
sources (i.e. PSDNs). Thanks to Ariadnet most universities provide free
internet access (usually they reach 1 KiloByte per second) in conjunction to
restricted HellasPac access (a.k.a. high expenses).
The following captures will talk by themselves.
**
ISOSUN @ ARIADNE hellenic research/academic network
login: help
Last login: Wed Mar 18 19:37:13 from 38212026
SunOS Release 4.0.3_EXPORT (ARIADNE.FEB2) #1: Thu Feb 13 13:04:45 EET 1992
Please, do not leave your mail in mailing queue for a long time.
Clean them up often. Otherwise your mail may be lost....
thanks
postmaster
A R I A D N E T - X.121 server
Demokritos
isosun SUN:INTERNET,X400-R&D-MHS 10100101, leon 10100102
PRIME 9950 primos: EARN-BITNET 10100100, gatos 10100104
mVAX DECNET-CERN (cluster) 10100103, KE-lab 10100108
EIE mVAx 101002005
EKT Data Bases PERKIN-ELMER 10100200
Kapodistriako Pan.CYBER-NOS 10100401, mVAX 10100402
Aristotelion Pan. mVAX 13100104, unix 386 13100108,
Metsovion Polytechnion
vms-mvax 1010030107, sun 1010030106
High Energy Lab 10100351
Gen.Secr. Research UNIX V 1010050008, sequent 1010050007
ITY Pan. Patra, CTI unix server 16100101
ATE Pan. Crete , FORTH 18100100
ASSOE(Athens U. of Economics) VAX/VMS 10100600
NATIONAL OBSERVATORY VAX/VMS 10100700
Rethimno Pan Kritis/Economics-Philosophy 38312025
Chania Poly. Kritis 38212026
ZENON,INTRAKOM,ATKO, HITEC, PLANET via X25 and TCPIP/X25
ATDP6519905
ATDP6533172 V21/V22 MODEM hayes, no parity, 1 stop bit, 8 data
connect to ARIADNET pad service @ Demokritos
HELLASPAC Gateway, IXI Gateway, X400 Gateway, Internet Gateway
INFORMATION: +301 6513392 FAX: 6532175
TEAM: Y.Corovesis,A.Drigas,T.Telonis (+4 students)
ADMINISTRATION: A.Arvilias tel:+301 6515224
NEXT: TEI-Pirea, EMY, NTUA-physicslab, Thessaloniki VAX9000
**
* Phone Network
The last four years or so, the old analog switching centers (HDW, Rotary,
Crossbar) are being replaced with digital ones (Ericsson-Intracom AXE-10
and Siemens EWSD). Theoretically that should be completed by the end of 1994
(according to the Christian way of chronometry).
These provide the following for the masses:
PAGING (was operating anyway)
HOT LINE
"WAKE-UP" SERVICE
ABBREVIATED DIALLING
THREE PARTY SERVICE
CALL WAITING
"DOT NOT DISTURB" SERVICE
OUTGOING CALL BARRING
MALICIOUS CALL IDENTIFICATION
ABSENT SUBSCRIBER SERVICE
LINE HUNTING
TOLL TICKETING (sure they do!)
...and of course better control OF the masses FOR the state.
I got very interesting results exploring those new centers. If I ever finish
the project it will appear in Phrack or UPi (hopefully). Damn...Better to
think over that twice. Abusing raises eyebrows.
The country direct numbers use the 00-800-country code-11 format. Believe it
or not; I had to social engineer the directory assistance operator to start
moving. Not to mention the time and examples he needed to understand what I
was talking about. Bad luck?
FINLAND 00-800-358-11
CYPRUS 00-800-357-11
ICELAND 00-800-353-11
BRITAIN/NORTH IRELAND 00-800-44-11
SWEDEN 00-800-46-11
HOLLAND 00-800-31-11
NORWAY 00-800-47-11
DENMARK 00-800-45-11
FRANCE 00-800-33-11
GERMANY 00-800-49-11
M.C.I. 00-800-122155
00-800-1211
SPRINT 00-800-1411
AT&T 00-800-1311
As of now only U.S.A. direct numbers can be used for blue boxing. It was
possible to do so and it should be possible nowadays, although I cannot
confirm that. The last months I have spent A LOT of time scanning numbers
and frequencies but I didn't come to an end. To be continued...
* Cellular Phone Networks
The pen-European digital (shit!) mobile telephony system G.S.M. is being
implemented. Nothing is solid yet and of course no one claims (trumpet fanfare
added here) that phreaks out through that. In the first state PANAFON will
cover Athens and Argosaronic and afterwards all the big cities: Thessaloniki
(it should be functioning by now), Patra, Heraklio et cetera. They are planning
to cover more than 90% of the country's residents and 75% of the geographical
region. Problems appear thanks to the strange terrain. I don't know what is
going on with TELESTET.
The total registered subscribers are considered to be about ten thousand.
* Miscellaneous
An Integrated Service Digital Network is being established and local
universities are installing [optical] Fiber Distributed Data Interfaces.
PBXs are now becoming popular.
Most operators know little or nothing on computer security or managing in
general. That's why some of them accept offered help and provide afterwards
(non-privileged) accounts and old, yet valuable, duplicate manuals. If some
anti-hacking measurements are taken, that is thanks to the company employers
who maintain and prepare the systems.
Do not hang on this, but I think that there are no laws concerning H/P in
particular.
Needless to say that no conferences take place. Of course QSD & IRC...ohhh
fuck it.