Copy Link
Add to Bookmark
Report
Sphear_0001
sPHeAr
------
__ ___ __ ___
/ / / / / / /\ / /
\ /__/ /__/ /__ /__\ /__/
__/ / / / /__ / / / \
DigiZine
Phreaking
Hacking
Anarchy
(And AnyThing Else P/H/A/C/C/V)
Editor: Signal
Co-Editor: Mustang
File Contributions: John Deere
Signal
sPHeAr can be reached at system1x@axposf.pa.dec.com
Issue #1
[01.28.94]
Contents
--------
Articles
-+-+-+-+
RedBox Dangers
Operator Operations
Our Fuckin' Rights
Toll Fraud
Philes
+-+-+-
NewHack.Zip
Sneakers.Zip
RedBox Dangers
--------------
by Signal
All real phreakers know that a redbox is a great tool, if used
wisely. Redboxes can be used to make both local and LD calls.
However, as we know, to make a local call, one must first dial
'0' and then make up some excuse like 'excuse me operator, the
5 button on this payphone doesn't seem to be working.' The
TSPS operator would ask you to deposit 25 cents and dial then dial
the number for you. Normally you don't need an excuse to have
the operator dial a number for you. But in recent years the
operators have become 'smarter' and aware of the rat shack
tone-dialer conversion. Nowadays if you ask the operator to
dial a number for you, for no apparent reason, he/she will
become suspicious almost immediatly. Although they will place
the call whether or not you give them a reason, the will be
listening to you when you place the tones. Sometimes, I have
discovered, that using a redbox to make local calls doesn't
allways work, as I have had the operator inform me that the
quarter was not registering and that I was using an electronic
device. The operator then said that she was going to call
security and to please wait on the line. I think you can guess
what I did then. I have never had a problem dialing long
distance though. This is probably because it is automated when
it asks for your money. The main reason that the operator will
suspect that you are using a redbox is if the tones generated
are too loud, as this somehow impairs the TSPS's ability to
detect the quarter tones. The quarter tones generated by the
phone are usually much quieter than that of the red box. To
get around this problem, hold a credit card, or piece of thin
cardboard between the redbox and the mouthpiece. This should
significantly reduce the loudness. Another reason for the
operator knowing that you are using an 'electronic device' is
that the speed of the tones produced by the redbox, often times
do not match the speeds of the phone; the redbox tones are
slightly, but noticably slower. There is no real solution to
this type of problem, oh well, there are other phones out
there.
Operator Operations
-------------------
by Signal
'Hello C&P telephone, may I help you?'
We all know that TSPS operators are one of the most dangerous
around. But is life as an operator really that interesting.
When you come to think about it, you realize that although it
would be great to be an operator, think about all the
potential drawbacks. If you have ever taken a tour of either
an AT&T switching station, or a Bell station, you know that
operators don't have the best 'offices' around. Personally
operators must have the most routine, and probably one of
the most boring jobs around. Since the late 1980s almost all
switching tasks are performed by computer, there is really no
need to have a human operator. The operator's primary task is
to oversee the computer and to take anycalls regarding collect
calls, and billing. Even with collect calls, this is now
handled by computer, where you dial 0+NPA+Nxx+xxxx and a voice
recording will ask you for your name. Basically the TSPS
operators exist to make operator-assisted calls. TSPS
operators are so dangerous because they have an ANI readout
display and are known sometimes to monitor operator-assisted
calls. So is becoming an operator really a career choice?
Our Fuckin' Rights
------------------
by Signal
Ever realize that the government has so much control it isn't
even funny anymore? Just for an example, take the 2600
incident in November 1992 at Pentagon City. As described by
both the Washington Post and 2600 Magazine, the Secret Service
agents that raided the meeting took disks, computer equipment,
and other material without informing the people of what was
happening. They also took the IDs of the people there with out
any stated reasons. This act alone shows that the government
has so much control over our lives, and that the Constitution
doesn't offer as much protection as it seems it does. It is
not in this century alone that the Constitution did not
guarantee us our rights, as we can see. The government, since
it is also composed of the Judicial branch can restrict our
rights, and in some cases deny them to us and still get away
with it.
Toll Fraud
----------
Excerpt from the FCC Notice for Proposed Rulemaking, CC Docket
93-292
{Talks about how the FCC is fighting it.
Doesn't talk about redboxes.. just beige boxing, and blue
boxing, etc.}
Until the mid 1980s, carrier networks were the main targets of
telecommunications fraud. Fraud perpetrators might use electronic
devices or even a child's whistle to simulate carrier switching tones
that would allow them to place calls and avoid paying for them. As
carriers developed new methods to prevent these primitive forms of
toll fraud, however, perpetrators began to use computers to access the
carriers' networks.
Control over the use of telecommunications services has
increasingly shifted from carriers to individual consumers.
Technology is providing more flexible options for use of those
services. With this shift in control, however, has come a shift in
the toll fraud targets. Customers, as well as carriers, are now the
victims. Fraud involving customer-owned private branch exchanges
(PBXs) provides an example. Customers can now use a feature in their
on-premises PBX equipment to route incoming remote access calls to an
outgoing line. With this capability, a company's sales
representatives in the field can, for example, have the convenience of
placing calls that would be billed to the employer's outgoing PBX
line. Fraud perpetrators have discovered that they can call into a
PBX and then use computers or "finger hacking" to identify the
authorization code for the remote access feature connected to the
outgoing line. Once the authorization code is found or "hacked," the
perpetrator can obtain a dial tone and make outgoing calls that are
billed to the PBX owner. In some cases, the PBX owner may also be
billed for incoming 800 calls made by the perpetrator.
Both customers and carriers suffer the effects of fraud; industry
and Secret Service estimates of annual losses range from one to five
billion dollars, in an industry in which annual billings are
approximately $175 billion. Several different types of fraud are
creating these losses:
(1) the unauthorized remote access through PBXs already described;
(2) cellular "cloning," in which billing codes for legitimate
cellular subscribers are installed in a perpetrator's cellular phones;
(3) the billing of operator-assisted calls to line with billing
restrictions, such as payphone lines; and
(4) "clip-on" fraud, in which the perpetrator physically attaches a
calling device directly to a phone line.
Fraud perpetrators may watch customers using calling cards at
payphones and sell the calling card numbers to others, or directly
approach consumers and ask them to accept billing to their phones as
part of a spurious "official" investigation. Industry and law
enforcement sources expect that new types of fraud will develop even
as these existing types of fraud are being combatted.
Experience has shown that those new telecommunications
technologies offering the most convenience and flexibility for users,
are often also most likely to present new toll fraud opportunities.
The Commission's goal has been, and will continue to be, to work with
consumers and the industry to find solutions to each fraud problem
without hindering the development or use of these new technologies.
In devising these solutions, we must ensure that telecommunications
equipment and services remain accessible.
The Commission is not charged with enforcing criminal statutes
or prosecuting toll fraud perpetrators. The Department of
Justice, local law enforcement agencies, and the U. S. Secret Service
are among the agencies charged with the enforcement of criminal
statutes. Nevertheless, the Commission has taken several steps toward
developing solutions to toll fraud. First, the Commission issued a
series of "Consumer Alerts" describing the dangers posed by
telecommunications fraud and steps that can be taken to detect and
prevent it. Second, on October 9, 1992, we convened an _en banc_
hearing on Toll Fraud. Panelists representing telecommunications
consumers, carriers, equipment vendors, insurance providers, and law
enforcement agencies presented diverse perspectives and detailed
proposals for detection, prevention, and responsibility. (See
Appendix B) Following the hearing, the Commission encouraged further
comment by holding the record on toll fraud open until November 16,
1992. Third, the Commission has taken action in related
proceedings to address toll fraud concerns. In July 1992, in the
operator service rulemaking proceedings, the Commission required local
exchange carriers to offer services, to reduce payphone providers' and
other aggregators' exposure to toll fraud. Earlier, in 1990, the
Commission adopted standards for direct inward dial (DID) calls which
required answer supervision on DID calls routed back to the public
switched network by a PBX. This amendment of Part 68 of the
Commission's rules was initiated because carriers were losing tens of
millions of dollars of revenue in cases where PBXs failed to return an
answer supervision signal to the central office, notifying it of a
billable call. The Commission continues to resolve formal and
informal complaints that raise toll fraud issues.
The Commission also coordinates with industry, consumers,
vendors, and law enforcement agencies. Commission staff attends
meeting with industry groups working to formulate prospective
solutions to toll fraud problems. Some fraud issues appear to
have been resolved by the industry, including, for example, dial tone
reorigination, which permits the calling party to receive a second
dial tone after the original call is terminated. The industry also
has implemented intercompany cooperation on live call tracing. Many
carriers have recently responded to the widespread concerns about toll
fraud by offering services designed to provide early detection and
prevention of the problems.
It does not appear, however, that private action can resolve all
toll fraud problems or that incentives to control fraud are structured
in the best possible way. For example, the recent "Chartways" formal
complaint proceeding presented the issue of liability for charges
associated with unauthorized calls. Chartways, the complainant, was a
private branch exchange (PBX) owner. It learned from AT&T that an
unusual volume of calls to Pakistan was originating at its PBX. A
subsequent investigation revealed that the calls were apparently being
routed through the remote access feature of the PBX. Although
Chartways informed AT&T that the calls were unauthorized, AT&T
maintained that Chartways was liable for the related charges under the
general payment obligation of AT&T's tariffs. Chartways responded by
filing a formal complaint against AT&T with the Commission. The
complaint alleged that AT&T's attempt to collect the charges was
unreasonable and discriminatory, thus violating sections 201(b) and
202(a) of the Communications Act. The Common Carrier Bureau
denied the complaint based on a largely stipulated record, and
following the same analysis we denied Chartways' application for
review of the Bureau decision. First, we found that the Bureau
was correct in determining that the tariff provisions at issue were
clear and definite in requiring payment for the calls, in that the
tariff provisions recognized no exception to the general payment
obligation for unauthorized usage. Next we affirmed the fining
that Chartways had control over the disputed calls. We noted
that Chartways had stipulated that it had "the capability to restrict
access to and egress from its PBX" at all times. Moreover, while the
record contained no evidence that AT&T was negligent in any way with
regard to the unauthorized calls, it also showed that Chartways had
taken no steps available to it to detect or prevent unauthorized
calling through its PBX. Finally, we agreed that AT&T's practices in
this case were not discriminatory when compared to its liability
limits on unauthorized calling card using because calling card
liability is controlled explicitly by a specific federal statute and
related regulations.
In _United Artists_, we examined the question of liability for
charges associated with unauthorized calls that were either originated
or accepted at the complainant's payphones. The threshold issue
in the case was whether United Artists was AT&T's "customer," because
only a "customer" who "orders" service could be held liable for
charges under the terms of AT&T's tariff. We determined that the
customer for the operator-assisted calls at issue was the caller or
billed party, not United Artists, the owner of the payphones. We
also found that United Artists did not presubscribe its payphone lines
to AT&T for direct-dialed service. We then looked at whether
United Artists had otherwise ordered service from AT&T, stating that
if United Artists "had failed to take steps to control unauthorized
operator-assisted and direct-dialed calling and had, instead,
installed its phones in such a way as to allow callers to charge such
calls to its payphone lines, [United Artists] could reasonably be
held to have constructively 'ordered' service from AT&T, thus
establishing an inadvertent carrier- customer relationship." The
record showed that United Artists had adopted a number of measures
designed to control potentially fraudulent calling. For example,
it told the local exchange carrier, New York Telephone (NYT), that its
lines were to have no primary interexchange carrier at all. It also
ordered originating line and billed number screening services from
NYT, which were intended to inform operator service providers such as
AT&T of any billing restrictions on those lines. In addition to
such preventative steps, United Artists also monitored calling from
its phones and regularly reported any apparently fraudulent calling to
NYT and AT&T. Based on the record, we concluded that United Artists
did not intentionally or constructively order service from AT&T and
therefore could not be held liable as a customer for the disputed
charges.
Philes
-+-+-+
NewHack.Zip
-----------
by John Deere
Discription:
compares old /etc/passwd file to a newer version of
/etc/passwd and filters out differences. Almost twice as fast
as Hacker's Password Accountant.
begin 400 NEWHACK.ZIP
M4$L#!!0 ( ,":E!N?% TWG , .4& + 3D572$%#2RY$3T-]56&/
MVD80_6[)_V&2+\=)E)!4D9)^24GA=#2] P%7FE3]L+8'O,7>1;OK<\BO[YNU
MN1"U#4C89F=FW[SW9DW_^5DJ[UOK"KK1%=/#L5"!79K0_W]^9^>U-?1R-/YN
MW/UL>SOYY<-H]L?L>W'9B7ZUI:$IL^,TD2_R-C3?T'0Q6\OS1]O0P=B6VI(-
MG?"TYT"*#+?TV*.Q.PHETU':*6@GS>R<K24:[>S4HW4Z,)4J/Y#'W9"R)L1:
MA357@5IE @5+F449%^.TV9.J*JF;)BK/;6."?T<D<'QIFZJ@OQL?*..G<($@
MJ)0I*"^5V7-!Y\QAFGAM<D:0]4S*<0RWICKAASU!AE">2XV(MAPWUUC1N"LL
MZ8!6K!/86'^OO,X!\#3$ N6V/J*F[XH"VR45@J?'EB87"T,P:=A!<]_S&<-;
M#2 16)_THF_F*P_#6%-5WGY3P@<5&M]5B>14VH<S,WUNFAA51Z JH-U'!H/0
MM=_BA: 8]%TZ<KQCQZ#M>G0VQT=Z6,]H.5FOMXO5E&[FO\WH83F=;&:K=S$"
MO$'>2W:N $GY -(V4)?QJ$PG-)COO>-%BT[L6KD#!QK<0@MVB'Z:DDG7@C+A
M![I=3JZCB[Z9H33IAX@@G*IJ"Q)"JZ&[ZD#(%:D12PP1"+V?,J0[5AY V-AF
M7R+JSSN-@,AT9>W!DT$Q1S]=TU\=(\O%>CU_#Q*6JP4N=W%F[M0!59O>9!>2
M^^B\O&)EN*#FB!VF<0*B$LJ<B#\'I](DX$J0(5?.:;5G2!$:9SSIR%)7#-DK
MKKG.@"CJR2HOOPK=MY5;XS4Z!]&+^QGYX,02@^8H$_?J]6O1WJD<I/EK5%Q;
MTCN1_^H1?%16%4 :W7#I:6V0O 7M2W8[SB-6;VL.I13GRG-$!#7UO@QTA%#_
M:@6 I94WXU "9-749HCBGV6>!M)ZTS7T9'NJ1 OL&X?CS;A/\F=S+@Y#:KNQ
M56(Z+9:[%R+/YU0<Y4BU;'PY+NB$G8Q8=NIG049AU)TWN3)4:"$N:P)WIP)@
M0"YK> C)<C[*(>;X2YH<=%%H_B*$Q'\HL\H5G@;/;_E$T_%X^ND98-F6YK&P
M9U-0?:*M6O$GY#=>&+S9+)\]%SGF40N E(&/%N9>"?%\T[E]2$'ZK@%FGB;G
MT]0S4XE]T.L)^(N.D!4?K0O1:UFSCXW43"*5O E&\4WP<Z7J3!5J9)'2F'S$
M11-)OGQ9O!KC+N_<]_+MVQ_3Y!]02P,$% @ BIJ4&\L!'1,H%P 8"X
M L !.15=(04-++D581=V:?5P4U[G'S\SLS"X+K"A*C"\PW.@FBAIE#5%
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M=3 ( R- %)@"XD "2 ;SP%-@&7@&9(-<4 V@;=!$,FBQH!'00*515&DGAI)
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MK2\NA&JARAR4"H,7R KU<@R.(TI!:XG?W!R_N<<"S-7 W!$TYO:]?7K0QA
M;G1W[(BYH3CK-QEJ3%T*HZ4P^O3R=/CO[#$K=^[3G.. O!+ZTF/6ZHL*1Q"!
MD=8K6X!*S%8A6 4,3N@P=T#(E= A!%5B&J,6&IPN1PO;HT^3@T92TBZE>V^9
MF*B8\ GXTK2^2C#X)8XR/!;KO2N'^D>'2[D;WG.GJ(4XTCEQ(2=:-.)2[6QI
MH4=LJ+-H8AKF[,QHY!3G!L&YX)T)'>>O7V0A[)+=4E0U>ILZ]A),B$NYF!8+
M:Y1R/*BXH!7S96,ITFZ/;$/9._%R#4YQU3PIM9PO:94NWQ1/X"KFA# H0BW]
MG3'1%[5R<_T4JPVQ!=NFILI$OF PBAZNM,LISH6$?,6/3OAQJ=</V!93Y/)*
M+02FUC!^ATY:U$^F2>=NKEPFUHA=*)+WR+LQCE13C#NTFJ+=FFJ*<C-8L/@;
M.%6-#EIPTU;CZY81PLA.?#%0H0F&=-;3Z"2^0 -G/H6@:ZY<>K=XKJ2])QY5
M[K0=B94_AK1#VY=37Z!%+B<OB2OC:_)I6\TM&2WIT0Z!G,:&P TY+OAHH>P1
M<RVFQA2>)&L&']U,&XXFU.1S8HT;#]5.\8AB0$/Z%*^WA<9^4:DG;)X&WS*\
MMIK.%N9?LVU'_ XI6]!\;;<<_B;86F([Y7 CJ\0TFD8]-KOR^F[S,+%!_*O8
M.+?C'4&'54J3F*]-<5\V.-VJ.3$I7%1&;XEP5W[:*_6VL2@@_A@J=DQ[5.!0
MLW?,='Q=CW-RW>W43GGSL!,3>8^[6AC@Y(C;4Q-EB&RY2N@B"T=M9AM2.(J4
M'B1>^=N5MN?;%3<'<VF3I\ZBDP,KXX6 QR_@Q;X6GR=T4J5')UWQ^-,T.FF#
MTN,A >:)Y2=%%@VQ+-UBT7A)X:(M%LZ+'Y6B2.^WB]3(1:9[ DI"&I/"&7VE
MS41I_^$KS9<0I!2GZ=E%&(X6ASK(#%],#[737A:7^]H$NBK1NGDR$8)*ETQ&
MG%Q>S#J"5?OK*7FUXA-^6!SM($\T1W?66AW/R%E8;[:;ARKJ>+)CB".A1T'9
MFV!;4KPDHGC!\.*,$0W)HZS8ZT0B6XG,AE;#49BC'V^.GFB5MU]Y*H,3$VDC
MGC*4@N32UZRDVDI\\T0>1ICA;,(9@;<B;83 S')?%T_%M%1[O7XKLCDY]+O$
M$P>U1&P//KMQ<-?9KC-%9PE6(8LP^"8^YC*T_E=7)_ZLM9.MW\2;&&NM>I%^
MZS"Q)?B4^6+,"9?L@J'S8@8^JL4(:OR?:&87SIXKS,?E&&$.-HY6=[S5I<T;
MVWGX*W/<XI/G3[:F&N7_,BL8UXKP4ROD!751*[8K+>*9X'9A4'#G1G57.SQI
M)X;K&RC7OURP^(ULZT8F7'#S/INF8*O[/JN+RSN*FS^I9(.F#STGS)U:U^P+
M)P.,?.TZE$HBU=5QF %.7C$XNSMVN?J^%NIS>+WD^QQA2?CY(*9_!W[52["\
MZG/\#U!+ 0(4 !0 ( ,":E!N?% TWG , .4& + $ (
M !.15=(04-++D1/0U!+ 0(4 !0 ( (J:E!O+ 1T3*!< & N +
M ( ,4# !.15=(04-++D5815!+!08 @ " '( 6
M&P
M
-
end
Sneakers.Zip
------------
by Signal
begin 400 sneakers.zip
M4$L#!!0 ( "FG/!P VVHXF18 * H , 4TY%04M%4E,N15A%W9H+
M6%-7ML?7.2<Y"0$BBJ76!\01TU;44J*H$"D^0&M]I% %WT6DZ%2Q#2<PSHR0
M#E-K<L"YG?DZ;?G:CDB_?KW*=&)+.U$[&@@*0JF*O:/%::]%:P\3IV.E U8A
MN?^3!$7%>=S'W/O=X"_GG+W77GOM=?9C[1T7K=A%]]!D9C'I%?HWU[&42O1(
M.-%H(@H!0\'WP 3P$$@$:: (/ _LX%7P 8ACB*: =/ 8,(%U(!]L B6@#.P
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M-9$ $3@ $D@U20!C) %E@'\H$9%(.?@!? S\'+P '>!P? Q^ 4. .^!'\$
M?P'7@ _<AXX<!^+!5) *TL#]&J2!!6 5R %/@6?!3X$-[ 1O@'? >Z 5_#NX
M #K!MX /15\"$6 4& \2P#3P.%@&<L!3X&GP/'@9O :J0 W8!YK!<? )^#.X
M"B@,/@,:<"\8#>X'$\$T8 3SP$*0!58!"_@A* 6_ *^ U\$>\!MP !P>!S
M<!G\!5R3Z\+8UX#98!YX'"P'.6 3V Y> :^#W>#7X#!H ,? QZ =? .^ U[
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MU\!OW)Z.JPFN/3$80/[%4"-'>5@B%;CRN(;ABN4R3=N_<*9IFC5T8-]IC_K
MNZ<]W('W3O>O^&GL3(0(PV:^>UH(G^DX+40THO5/D2<V@T<D/IY6R"J6LOUJ
M#D:0M) $7N^/1N35V$$>A#%!=8& 8X1\A4*UK"N?/"-,!X>3= ]EP_2P@Z-)
MTM#-\GP6GZ7WW8>NS*$3KE6Y RY2Z(\L#<,:CW5^3.TCK6/-$7+U,*91_KE2
MCEEPAQ\!/5\/D#<<T[^ J E4E%"%5<G<,Z\&X'1H$)L( #JCRG&E%U7%/&U
M*8$<9 3ZP53]<Z5HF66R7BQ6ZY.+-4)<-)^9H3^2!1O7:E1<.W>EUW<B[DIY
M_4I5C-Y6K YU6=1NN?T;$,1C->4S)0.S4H5U+[M?A^5#=T![JJS]W=.6&7K$
MGGJQ5!UW/.YDH8)K-K3Q^H;B,,[KT/5V[8GSJO2V4A0M55A",J"P@U:J5J!S
M-/DKVDA!=?.#ZF8-4%<'=4T&%XS>V:YO6!O&7>_M>C/NNM_8H,IP4\8R**V
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M6Q^?C_Z13T0JT2Z$;TXBEA >W_+Y#U!+ P04 " ".J#P<5U"(P[X #I
M !@ %)%041-10O)5P@M3E4(J2Q(50C.2TW,3BTJ5LC,4W#Q#^;E*D[-
M24TN47#-2RZJ+"C1=TD%T[Q<KGDEJ44*)1FI"B6I%25IF3E 1KY"*E19"JJR
M1(7LU$H=!0V7_#SU$H6T_*+TU!*0\O*BS))4L"% >864_/(\35ZN@*+4XF(%
MFU203CM>+EZND(S,8H6 HOSTHL1<!2 S,R4U$62(0G%J<FD1Q &Z8!= K<_,
MS^/ETO#++U$(< ]0",G(+TW/ !HL!0!02P$"% 4 " IISP< -MJ.)D6
M "@* # " 4TY%04M%4E,N15A%4$L! A0 %
M @ CJ@\'%=0B,.^ Z0 8 0 @ PQ8 %)%041-15!+
4!08 @ " &X "E%P
end
Coming Attractions
------------------
Credit Card Fraud - The ways, and hows
Boxes, Boxes, Boxes - Why 'hold buttons'
are not coloured boxes
A Dying Breed - Hackers & Phreakers
+------------------------+
|Till Next Time.. |
| |
| Fight The Power |
| --sPHeAr |
+------------------------+