Copy Link
Add to Bookmark
Report
The Empire Times Issue 7
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% T H E E M P I R E T I M E S %
% ------------------------------- %
% The True Hacker Magazine %
% %
% March 11, 1995 Issue 7 %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
This Issues Features:
# Selection Author Size
- ------------------------------------ ---------------- ----
X. Introduction armitage 4k
1. Dc Dirt roach 6k
2. GL3000 Paging/Voice Retrieval System armitage 26k
3. Nokia NAM Programming dr. freeze 4k
4. Digital DNA abstract thought 7k
5. Defcon III Update dark tangent 27k
6. Are you a Hacker? redragon 2k
7. Recent Large Name Phreaker Busts anonymous source 3k
8. Hacker Learns Intelligence Secrets unknown 3k
9. OSS '94 (Third Annual) firefly 5k
------------------------------------------------------------------------------
Founder: Albatross
Editor: Armitage
Contributors: Abstract Thought,
Dr. Freeze,
Firefly,
ReDragon,
Roach,
The Dark Tangent.
Special Thanks: The Anonymous Source,
Grayarea,
Invalid Media.
Noelle,
Panzer,
Sevenup,
===========================================================================
-=- The Empire Times -=-
Introduction
Well it's been a while since the last issue came out, which is good
and bad. The good news is that we have a real good issue, and the bad news
is that it took longer than we wanted it to take. There has been a large
response to Empire Times, I guess people want it. The mailing list has
grown to be bigger than we expected it to be. I supose we should stay
around. We will.
The last issue was somewhat 95% media of hackers. This issue we have
more technical articles like earlier issues. If anyone would like to join us
in producing empire times, please feel free to email me.
I've read alot in recent magazines and have seen alot on tv recently
about hackers, and it makes me sick. I don't think the perceptions are
accurate. Even though it bothers me, being the laid back individual I am
I don't let it get to me. Maybe that is my fault, maybe it is good though.
I want to send out a message to all the covert hackers and phreakers.
Not many people have such talents that some of us have. Use them wisely, and
think about what you are doing before you do it. I am not saying hacking is
bad (no no, why would anyone think that?). I am just saying that think
about what you are doing and how you can get caught. I don't want people to
get locked up like Mitnick and others. Watch yourselves.
I'm going to keep it short and sweet. This is definatly a period of
busts. Many many fellow hackers have gone 'down'. That is something that
most people consider the worst thing that could ever happen to a member of
the computer underground.
Till the next Empire Times,
armitage@dhp.com
==============================================================================
-=- The Empire Times -=-
Issue 7, File 1 of 9
DC Dirt #2
roach@tmok.res.wpi.edu
roach@cult.empire.org <--- try this one!
I ran the first article of DC Dirt. It looks like the coast is clear.
I better say what I want before that huge hacker gang beats me up...
----- Rumor #1 DC Posse?!?!?
Rumor has it there is a new 'Posse' in the DC area. They call
themselves (oh, take a guess!) 'DC Posse' or 'DC p0sse' or 'DC
p0ss3' or other inane k-rad statements. The grapevine has told me
these guys are bad. What the definition of bad is, I don't know.
Blah. Come on you guys, couldn't you have picked another name?
DC Dirt would-be names for DC Posse/DC p0sse/DC p0ss3:
1) LoD 2 --- The search for Lex Luthor (startrek joke)
2) iCE WaTeR --- We make better ansi's, and goddamn proud of it.
3) The Dream Team 2 --- We will crack 1 - 3 year warez.
Not to put down this 'DC Posse', but really guys, be more original.
----- Rumor #2 DiscoDan's box is clearing out.
DiscoDan has had enough trouble with stupid hackers. Almost being
rm -rf'd, and UMD on his case has not been a great experience for
him. He is cleaning out all of his users.
Shit. The same thing happened with Lgas' box a year ago.
When will people learn not to hack from friend's sites?
----- Rumor #3 Did y-windoze really get busted?
Last issue I said rumor had it that Y-windex was busted. Now I
hear from sources that no, he wasn't busted. He just wants you to
think he was busted.
Now Dc Dirt has heard that Y-windoze may have started the rumor
himself. DC Dirt is confused. But then, DC Dirt is for rumors,
not real fact.
I talked to Y-windex the other day. He seems alive and kicking.
He is running out of money, for he doesn't have a new job
yet. He Better get some if he's going to stay around the
washington area.
----- Rumor #4 Someone is busting unregistered WWiV boards.
Supposedly some ding-dong named Equalizer is turning these boards
in? Does anyone have specifics on this rumor? I imagine there are
unregistered WWiV bbs' all over the DC area. This is really
stupid.
----- Rumor #5 Kewp coming to DC?
Rumor has it, Kewp, who made ISS, or Internet Security
Scanner, is going to DC 2600 this February. I also hear the
almighty TK and KL will be there to greet him. Too bad they
only come around when someone from out-of-state is here.
----- Rumor #6 DC Kamakize is not a Narc.
Maybe since there are two Kamakize's on the IRC, this lead to the
confusion. But Kamakize told DC Dirt that he never was a fed,
Narc, or anything. "Just Homeysan and Tiphoid making this shit
up." he is quoted. DC Dirt has met Kamakize, and doesn't think he
is a Narc either.
----- Rumor #7 SummerCon in the Wind?
DC Dirt has heard that there might be a SummerCon in the DC area.
Everyone was planning for one last year. But one of the main
reasons it never came to be was because of HOPE. Other reasons
that did not help were trying to find an Airport, metro, and a
cheap hotels around the DC area.
Maybe someone has finally figured out a plan to put all three
together. SummerCon in DC would be just kewlin.
Other Names for SummerCon in DC:
BustCon '94 -- the only convention that is in a Federal Building!
FedCon '94 -- Which is the hacker? Which is the fed?
ParanoidCon '94 -- Not just your regular con...A "DC, FBI, CIA,
Police, and any other agency down the road"
Con.
They do all seem to have a same theme, don't they? :)
----- Rumor #8 Just what did BLAH say on the IRC?
DC Dirt was talking to BLAH on the #hack the other day:
*BLAH* yeah I understand, I like the sound of Candlebox though <Wed Nov 23
19:07>
*BLAH* great group to fuck to, you can quote me on that! <Wed
Nov 23>
Oh really, BLAH?
----- Rumor #9 Shadowdancer Busted?
Shadowdancer, a supposed member of the DC p0ss3, was busted.
No, not because he was hacking .mil's or .gov's...he got busted
for hacking UMD. Ironic, isn't it?
He was "+ +" the .rhosts file of a librarian he knew. How he
got the librarian to access her account, Shadow Dancer didn't
say. Librarians beware! We are going to hack your accounts!
Bwahahahahahahahaha...
----- Rumor #10 UMD annex is loggin phone numbers.
Thats right UMD hackers, it seems that now our beloved hacker
hangout is now loggin our phone numbers. Sigh.
atdt 301403XXXX
CONNECT 9600/ARQ/V32/LAPM/V42BIS
Annex Command Line Interpreter * Copyright 1991 Xylogics, Inc.
Checking authorization, Please wait...
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
This was never there before. Also, if you use CallerID, you
will get hung up by UMD. Looks like you need to try and
find another dialin, folks.
WELCOME TO THE UMCP/CSC DIAL-UP SERVICE
If you have any questions, please contact the CSC Consulting Lab at
(301) 405-1500 or consult@umail.umd.edu
Unauthorized access to a computer system is a violation of
Article 27, Section 146 of the Annotated Code of Maryland.
Computer Science Center terminal servers will only access
hosts owned by the campuses of the University of Maryland System.
403-4333 and 403-4444: 2 hour idle limit
campus extension 34333: 30 minute idle limit
Dialup sessions lasting longer than 12 hours will be terminated.
----- Rumor #10 Empire now has Waffle, with Internet access!
Albatross finally got off his lazy butt, and got Empire bbs a
UUCP feed. So now anyone who is on Empire can read the
Usenet, and have an internet email address at:
yourname@cult.empire.org
Yes, become part of Alabtross' Empire. Email me, Armitage, or
root (Albatross himself) for the Empire's number. DC hack
scene is becoming integrated with the net now.
==============================================================================
-=- The Empire Times -=-
Issue 7, File 2 of 9
The Glenayre GL3000 Paging and Voice Retrieval System
by armitage
(armitage@dhp.com)
Welcome
-------
I am glad you decided to read this article. This article will explain
the basis of what this system is, show many features, and guide you through
a few basic operations (pager reactivation, and meet-me setup). This system
is one of many different paging systems, but I have found many scattered
through the nation, so if you are wondering what you can do with all those
carriers found while scanning, compare them to the login screen shown later
in the article.
Summary
-------
The Glenayre GL3000 paging and voice retrieval system is a fully featured
digital radio paging terminal which also provides integrated voice mailbox
facilities.
I'm sure this is not important, but so you know, the gl3000 family comes
in 5 different respective sizes (es, s, m, l, and xl). All of the systems
have same features except the only thing that differs is their bandwith, and
their capibilities.
Analog and digital paging formats are supported, it provides for tone only,
voice, numeric, and alphanumeric paging.
Features
--------
Voice Mail Box Features
-----------------------
The voice mail box feature of the system complements the pager router
system very nicely. This voice mail system is just like any other, so I
won't go into detail over it.
Programming
Mailbox access code
Main menu : 1
Subscriber Information Menu : 1
Search for subscribers to edit/create
Meetme access code
Supervisors Main Menu : 5
System Setup Menu : 3
Trunk Setup Menu : 11
Meet-me parameters
Audio Billboard
Supervisors Main Menu : 5
System Setup Menu : 9
Voice Storage and Mailbox Setup Menu : 2
Voice Mailbox Setup parameters
Pager Alert
Supervisors Main Menu : 5
System Setup Menu : 3
Trunk Setup Menu : 10
Callere Notification Message Setup
Voice Main Menu Hierarchy
-------------------------
Supervisor's Main Menu
1 < Subscriber Information Menu
1 < Edit/Create Subscribers
2 < Delete A Subscriber
3 < Report Subscriber Information
4 < Report Extended Group Members
5 < Report Unused Customer Numbers
6 < Report Initialized Centirecords
7 < Stop Current Report in Progress
8 < Send Test Page
9 < Block Change Subscribers
10 < Delete Several Subscribers
11 < Clear Subscriber Call Statistics
12 < Report Pager Type Summary
13 < Block Create Subscribers
2 < User Number Information
3 < System Activity Monitoring and Logging Menu
1 < Trunk Status & Activity Monitor
2 < UOE Status & Activity Monitor
3 < Buffer Memory Status & Activity Monitor
4 < Transmit Queue Status Activity Monitor
5 < Voice Storage Usage Activity Montior
6 < Voice Storage Report Setup
7 < Voice Storage File Activity Monitor
8 < Activity Logging Setup
9 < Activity Logging Monitor
10 < Subscriber Database Information
11 < System CPU Activity Monitor
12 < Memory Pool Status Monitor
13 < RTC Status & Activity Monitor
14 < RTC Diagnostic Console
4 < System Maintenance Menu
1 < Save Database and System Setup Parameters to floppy
2 < Add Customer Numbers
3 < Remove Customer Numbers
4 < Change Customer Numbers
5 < System Setup Menu
1 < System Parameters
2 < Subscriber Setup Menu
1 < Subscriber Default Parameters
2 < Subscriber Reoprts Default Parameters
3 < Trunk Setup Menu
1 < Individual Trunk Parameters
2 < Trunk Group Parameters
3 < Trunk Card Parameters
4 < Common Trunk Parameters
5 < Common Trunk Statistics
6 < Common Trunk End of Call Parameters
7 < Roaming Caller Location Code Setup
8 < Digital Trunk Card Alarm Parameters
9 < Digital Trunk Address Signalling Protocal
10 < Caller Notification Message Setup
11 < Meet-me Parameters
4 < Buffer Memory Setup Menu
1 < Individual Buffer Memory Parameters
2 < Common Buffer Memory Parameters
5 < Universal Output Encoder (UOE) Setup Menu
1 < Individual UOE Parameters
2 < Common UOE Parameters
3 < UOE Test
6 < Transmitter Controller Setup Menu
1 < Individual Transmitter Controller Parameters
2 < Common Transmitter Controller Parameters
7 < Page Routing Setup Menu
1 < Logical Area Parameters
2 < Coverage Region Parameters
8 < Printer and Serial Port Setup Menu
1 < Serial Port Configuration Parameters
2 < Printer Message Parameters
9 < Voice Storage and Mailbox Setup Menu
1 < Voice Storage Setup Parameters
2 < Voice Mailbox Setup Parameters
3 < Voice Mailbox Retrieval Mode Key Translation Map
4 < Language Syntax Configuration
10 < Pager Parameter Setup Menu
1 < PUP/Repeat Page Options
2 < PUP/Repeat Page Function Code Setup
3 < Voice To Alpha Transcription Setup
4 < Numeric/Voice Function Code Setup
11 < RTC Port Configuration Parameters
6 < Remote Sign-on
7 < Network Menu
1 < Operator Services Menu
1 < Netmail Transmission
2 < Netmail Configuration
2 < Network Setup Menu
1 < Common Network Parameters
2 < Network Port Configuration Parameters
3 < Network Node Configuration Parameters
4 < Frequency Code to Coverage Region Map
3 < Network Activity Menu
1 < Port Status and Activity Monitor
2 < Node Status and Output Queue Activity Monitor
8 < Traffic Statistics Menu
1 < Statistics Parameters
2 < Report Statistics
9 < Superhex Patch Screen
Operations
----------
*** Quick Reference Key Usage***
<DEL> - Deletes character to the left
<CTRL-R> - Redraws Screen
UP - Moves pointer up
DOWN - Moves pointer down
System Menus and Options - Navigating the System
--------------------------------------------------
***Changing Subscriber Info***
Screen Shot Below
-----------------------------------------------------------------------------
GLENAYRE GL3000 PAGING TERMINAL Version 3.06
1. User Number:________
2. Password:
Optional Feature Status
Agency: ON
Networking: ON
RTC: ON
Meet-me: ON
Software Creation Date: MMM DD/YY HH:MM:SS
Command:
-----------------------------------------------------------------------------
Logging in is the first step, as you can see you are prompted for a user
number and password. The Default for every account is unpassworded, the
password does not echo on the screen.
Please Note that the menu options are configured by the access level of your
account, (for example, an administrators account will have more options than
a base operators account). The Menus displayed in this article account that
a supervisors account is being used.
Screen Shot Below
-----------------------------------------------------------------------------
GLENAYRE GL3000 PAGING TERMINAL Version 3.06
1. Subscriber Information Menu
2. User Number Information
3. System Activity Monitoring and Logging Menu
4. System Maintenance Menu
5. System Setup Menu
6. Remote Signon
7. Network Menu
8. Statistics Menu
9. SUPERHEX Patch Screen
Currently Signed On: User 1
System Supervisor
Command:_________
-----------------------------------------------------------------------------
This is the Main menu of the system. On a normal operators account, not all
of the options will be available.
*** To Add (Reactivate a pager) ***
You want to is Add or "Create" a subscriber. Go to menu 1 (Subscriber
Information Menu).
Screen Shot Below
-----------------------------------------------------------------------------
SUBSCRIBER INFORMATION MENU
1. Edit/Create Subscribers
2. Delete a Subscriber
3. Report Subscriber Information
4. Report Extended Group Members
5. Report Unused Customer Numbers
6. Report Initialized Centi records
7. Stop Current Report in Progress
8. Send Test Page
9. Block Change Subscribers
10. Delete Several Subscribers
11. Clear Subscriber Call Statistics
12. Report Pager Type Summary
13. Block Create Subscribers
Command:____________
-----------------------------------------------------------------------------
Now you need to go into option 1 again, to Create a new subscriber.
Screen Shot Below
-----------------------------------------------------------------------------
Record 1 of 900 SEARCH FOR SUBSCRIBER TO EDIT/CREATE Page 1 of 2
1. Customer Number: _____ 17. Language Choice:
2. Partition: 18. Answer Type:
3. Agency Number: 19. Custom Answer:
4. Encoding Format: 20. PUP/Repeat Option:
5. Service Type: 21. Group PUP Option:
6. Capcode: 22. Repeat Voice:
23. Mailbox Type:
24. Purge Time (Hrs):
7. A-Tone Length: 25. Maximum Messages:
8. B-Tone Length: 26. Voice Time:
9. Account Number: 27. Activate Caller Pwd:
10. Account Status: 28. Access/Caller Pwd:
11. Account Code: 29. Autoretrieval:
12. Valid: 30. Meet-me:
13. Customer Absent: 31. Secondary Number:
14. Coverage Region:
15. Priority:
34. Extended Group:
35. Sort Field #1: 37. Sort Field #2:
36. Sort Order #1: 38. Sort Order #2:
Command:
-----------------------------------------------------------------------------
It is important at this point, not to enter information into any field other
than field number 1, as after you enter the customer number, you enter the
other information later.
If you are entering a new subscriber, you want to enter a customer number
that is not being used. There will be a record number in the top left to
show you which records are being used. In this example we will use number 1.
So enter the new number and then <RETURN>. The type CREATE <RETURN> into
the command line.
Screen Shot Below
-----------------------------------------------------------------------------
Record 1 of 900 SEARCH FOR SUBSCRIBER TO EDIT/CREATE Page 1 of 2
1. Customer Number: 1____ 17. Language Choice: ENGLISH
2. Partition: A 18. Answer Type: SYS 216
3. Agency Number: 0 19. Custom Answer: YES
4. Encoding Format: TWOTONE 20. PUP/Repeat Option: NO
5. Service Type: VOICE 21. Group PUP Option: NONE
6. Capcode: 000001F1 22. Repeat Voice: 3
A=0 B=0 23. Mailbox Type: VOICE
24. Purge Time (Hrs): NO PURGE
7. A-Tone Length: 8 25. Maximum Messages: 10
8. B-Tone Length: 16 26. Voice Time: 8
9. Account Number: 4 27. Activate Caller Pwd: YES
10. Account Status: 3 28. Access/Caller Pwd: ####/####
11. Account Code: 7 29. Autoretrieval: NO
12. Valid: YES 30. Meet-me: NO
13. Customer Absent: NO 31. Secondary Number:
14. Coverage Region: 1
15. Priority: 5
34. Extended Group: NO
35. Sort Field #1: 37. Sort Field #2:
36. Sort Order #1: 38. Sort Order #2:
Command:
-----------------------------------------------------------------------------
The values that are filled into this screen are the defaults that were set
by the supervisor. Provided you have all the technical information on
the unactivated pager you have, you will transcribe the pagers technical
information into this record.
List of fields
Field 1 - Customer Number
Customer number, you may not use wild cards.
Field 2 - Partition
Any Partition Letter may be used. ['A'..'Z'] or a NOT sign followed
by a partition letter.
Field 3 - Agency Number
You may use any search conditions except wild cards.
Field 4 - Encoding Format
Any encoding format name, or a not sign followed by an encoding
format.
Field 5 - Service Type
You may use any service name, or a not sign w/service type name.
Service Names
VOICE
TONE-ONLY
NUMERIC
ALPHANUMERIC
NUMERIC/VOICE
MAILBOX ONLY
ROAMER
0 TONE ONLY
GREETING
ALPHAMAIL
TAS
MEET-ME
AUTORETRIEVAL
Field 6 - Capcode
You may use wild card characters to replace digits.
Field 7,8 - A,B-Tone Length
You can use any search but the wild card search.
Field 9 - Account Number
You can use any search but the wild card search.
Field 10 - Account Status
You can use any search but the wild card search.
Field 11 - Account Code
You can use any search but the wild card search.
Field 12 - Valid
YES or NO (valid/invalid account number)
Field 13 - Customer Absent
YES or NO (absent customer or not)
Field 14 - Coverage Region
You can use any search but the wild card search.
Field 15 - Priority
You can use any search but the wild card search.
Field 16 - Trace Calls
YES or NO
Field 17 - Language Choice
Simply enter a language of choice.
Field 18 - Answer Type
Use any search.
Field 19 - Customer Answer
YES, NO, INSERT, or APPEND
Field 20 - PUP/Repeat Option
Field 21 - Group PUP Option
Field 22 - Repeat Mailbox
You can use any search but the wild card search.
Field 23 - Mailbox Type
You can enter:
NO MAILBOX
VOICE
NUMERIC
BOTH
Field 24 - Purge Time (Hrs)
You can use any search.
Field 25 - Maximum Messages
You can use any search but the wild card search.
Field 26 - Voice Time
You can use any search but the wild card search.
Field 27 - Activate Caller Password
YES or NO
Field 28 - Access/Caller Password
Field 29 - Autoretrieval
YES or NO
Field 30 - Meet-me
YES or NO to have this subscriber given access to meet-me features.
Field 31 - Secondary Number
You can use any search but the wild card search.
Field 34 - Extended Group
YES or NO
Now we will move on to the second page of the Section
Screen Shot Below
-----------------------------------------------------------------------------
Record 1 of 900 SEARCH FOR SUBSCRIBER TO EDIT/CREATE Page 2 of 2
Extended Group Members
81. Customer Number: 41. System Recording:
82. Customer Number: 42. Empty Data Pages:
83. Customer Number: 43. Primary Numbers:
84. Customer Number:
85. Customer Number:
86. Customer Number:
87. Customer Number:
88. Customer Number:
89. Customer Number:
90. Customer Number: Statistical Fields:
91. Customer Number: 51. Number of Calls
92. Customer Number: 52. Mailbox Storage
93. Customer Number: 53. Character Count:
94. Customer Number: 54. Meet-me Time (mins):
95. Customer Number: 55. Date Created:
96. Customer Number: 56. Date Altered:
Command:
-----------------------------------------------------------------------------
This page has little signifigance besides if you are using extended group
members. The one thing that is important is field 56. Look out.
***Setting up a Meet-me and its settings***
Screen Shot Below
-----------------------------------------------------------------------------
GLENAYRE GL3000 PAGING TERMINAL Version 3.06
1. Subscriber Information Menu
2. User Number Information
3. System Activity Monitoring and Logging Menu
4. System Maintenance Menu
5. System Setup Menu
6. Remote Signon
7. Network Menu
8. Statistics Menu
9. SUPERHEX Patch Screen
Currently Signed On: User 1
System Supervisor
Command:_________
-----------------------------------------------------------------------------
First you want to go into choice "5", The System Setup Menu.
Screen Shot Below
-----------------------------------------------------------------------------
SYSTEM SETUP MENU
1. System Parameters
2. Subscriber Setup Menu
3. Trunk Setup Menu
4. Buffer Memory Setup Menu
5. Universal Output Encoder (UOE) Setup Menu
6. Transmitter Controller Setup Menu
7. Page Routing Setup Menu
8. Printer and Port Setup Menu
9. Voice Storage and Mailbox Setup Menu
10. Page Parameter Setup Menu
11. RTC Port Configuration Parameters
Command:_________
-----------------------------------------------------------------------------
>From this menu you want to go to the trunk setup menu which is choice "3".
Screen Shot Below
-----------------------------------------------------------------------------
TRUNK SETUP MENU
1. Individual Trunk Parameters
2. Trunk Group Parameters
3. Trunk Card Parameters
4. Common Trunk Parameters
5. Common Trunk Statistics
6. Common Trunk End Of Call Parameters
7. Roaming Caller Location Code Setup
8. Digital Trunk Card Alarm Parameters
9. Digital Trunk Address Signalling Protocol
10. Caller Notification Message Setup
11. Meet-me Parameters
Command:_________
-----------------------------------------------------------------------------
>From this menu you want to select "11. Meet-me Parameters".
Screen Shot Below
-----------------------------------------------------------------------------
MEET-ME PARAMETERS
1. Length of Time to Play Initial Ring(s):
2. Wait Time Before Sending Meet-Me Page(s):
3. Meet-Me Help Message Interval(s):
4. Maximum Number of Meet-Me Help Message(s):
5. Tone Played While Waiting for Meet-Me:
6. Disable Disconnect Digital During Connection:
7. Meet-Me Maximum Hold Time (min):
8. Maximum Simultaneous Meet-Me connections:
9. Prompt for Access Code Before Meet-Me:
Command:_________
-----------------------------------------------------------------------------
There is online help to guide you to conduct this meet-me. So go with the
system on this one.
Glossary of Terms
-----------------
I have listed some terms you might have trouble with while you are
playing around with this system, this is nowhere near as many as there are,
but the most vital are listed below.
Address - 1. The telephone number dialed by a calling party which identifies
the party called. 2. A location or destination in a computer
program.
Bell 103 - The North American standard for 300 bps modems.
Bell 212A - The North American standard for 1200 bps modems.
Blocking - The process of grouping data into transmission blocks. The
inability of a pabx to service connection requests, usually because
its switching matrix can only handle a limited number of connections
simultaneously. Blocking occurs if a call request from a user
cannot be handled due to an insufficient number of paths through the
switching matrix; blocking thus prevents free stations from
communicating.
Borscht - Acronym for the functions that must be performed in the Central
office at the subscriber's analog interface of a digital system.
(battery, overvoltage, ringing, supervision, coding, hybird, and
test)
Broadband - A communication system with a large bandwidth.
Channel - Electronic communications path, usually of 4,000 Hz (voice)
bandwidth.
Crossbar - A type of telephone switch.
Crossbar Switch - (In PABX technology) a switch that has multiple vertical
paths, multiple horizontal paths, and electromagnetically operated
mechanical means for connecting any vertical path with any
horizontal path. Modern PABXs often use an electronic version of
the crossbar switch.
Data - In phone systems: any information other than speech or tones.
Data Set - The telephone companies term for a modem.
Decoder - A device that converts information into another form of signals.
(A DTMF decoder converts dtmf tones to numerican dtmf values)
Dial Long Line - Special Service device which extends loop signalling
distance.
Digital - Variable as opposed to constant. Data characters are coded in
discrete, seperate pulses or signal levels. Contrast with Analog.
Duplex - Simultaneous two-way independant transmissions in both directions.
Echo - A faint return of transmitted data.
ESS - (Electronic Switching System): A telephone switching machine using
electronics, often combined with electro-mechanical crosspoints,
and usually with a stored program computer as the control element.
FCC - (Federal Communications Commision): A government agency that monitors
and regulates all use of the electromagnetic spectrum for
communications.
Handshake, Handshaking - A preliminary process that is part of a
communications protocal that establishes a data connection.
Interface - The connection between two seperate and distinct mechanical or
computerized systems.
Interoffice Trunks - Shared facilities connecting CO switches.
Link - A communications circuit.
Local CO - Central office (end office) capable of switching calls between
local subscriber circuits.
Local Loop - The voice-band channel connecting the subscriber to the central
office.
Logging - Recording data associated with a system.
Multiplexing - The division of a transmission facility into two or more
channels.
Network - An interconnection of copmuter systems, terminals, or data
communications facilities.
Parameters - Selectible variables designed for system uses.
Port - A computer interface capable of attaching a communication protocol.
PBX or PABX - (Private <Automatic> Branch Exchange) A system providing
switching in an office or building.
Voice PABX - Voice only PABX for voice circuits.
----------------
I hope you could use this information. If anyone has any questions
or comments, or is wondering if they can get manuals to this system somehow,
please feel free to email me, I will assist you as much as my schedule will
allow. I would like to thank erikb for telling me to write this, abstract
thought for pointing out all my spelling errors among other things, panzer
for everything he has done, and all the dc hackers.
Knowledge is the nemesis of all evil, Digital Anarchy!!!
Later, and remember to always cover your tracks in anything you do.
Armitage
armitage@dhp.com
finger/email for PGP key if desired.
==============================================================================
-=- The Empire Times -=-
Issue 7, File 3 of 9
Nokia Cellular NAM Programming
by Dr. Freeze
FOR AUTHORIZED DEALER USE ONLY
NOKIA 100 SERIES CELLULAR HANDPORTABLE TELEPHONE
NAM PROGRAMMING INSTRUCTIONS
The Nokia 100, 105 Series handportable CMT uses an EEPROM NAM that can be
programmed directly from the standard user keypad. In order to access the
NAM, you must enter the special access code currently programmed into the
phone. Once the programming mode is accessed, NAM parameters are loaded by
entering them into the display and "storing" them to selected memory
locations. Be sure to obtain all parameters before proceeding.
ACCESS NAM PROGRAMMING MODE:
1. Turn the phone on. (DUH!)
2. Enter the NAM access code. The factory default is: *3001#12345
3. Enter [STO] 00.
4. Verify that "STORE NOT DONE" appears in the display. If "NOT ALLOWED"
appears, check to see if you have entered the access code correctly.
Note: If "NOT ALLOWED" appears after a few programming attempts, the
access code has been changed or an error has occured and the phone
will have to be returned to Nokia for repair. (BUMMER!)
ENTER SPECIAL NAM PARAMETERS (Memory Location 01):
5. Press and hold the [CLR] key until the display clears.
6. In one long string, enter the special NAM parameters according to the
format of Example 1 below. Enter each emergency number (such as 911 or
*911) followed by the pound (#) key, the Language Code followed by the
asterisk (*) key, and the desired four digit lock code.
Language Codes: 0 = English, 1 = French, 2 = Spanish.
Note 1: Emergency numbers entered in memory location 01 can be used
while call restrictions are active and when the phone is locked.
Note 2: The first number entered in the list of emergency numbers is
used for the Speed Dial (9) key.
Example 1: Pound Key________________ _________Asterisk Key
\ \ /
9 1 1 # * 9 1 1 # 0 * 1 2 3 4
/ / \ \_______Lock Code
Emergency numbers__/_________/ \_________Language Code
7. Enter [STO] 01 [STO].
ENTER MOBILE PHONE NUMBER (Memory Location 02 or 04):
8. Press and hold the [CLR] key until the display clears.
9. Enter the correct 10-digit phone number.
10. For Primary NAM, enter [STO] 02 [STO].
For Optional NAM, enter [STO] 04 [STO].
ENTER SYSTEM PARAMETERS (Memory Location 03 or 05):
11. Press and hold the [CLR] key until the display clears.
12. In one long string, enter the system parameters according to the
format of Example 2 below. Be sure to separate each parameter with
an asterisk (*). Do not place an asterisk before or after the string.
Example 2: System ID_____ ____Group ID Mark
\ /
3 4 * 1 * 1 * 3 3 4 * 1 5 * 1 5
/ / \ \
Access Method____/ / \ \_Access Overload Class
Local Use Mark______/ \______Initial Paging Channel
13. For Primary NAM, enter [STO] 03 [STO].
For Optional NAM, enter [STO] 05 [STO].
VERIFY NAM INFORMATION:
14. Press and hold the [CLR] key until the display clears.
15. Use the up/down arrows to scroll through locations 01 through 05.
16. Verify that the information for each memory location is correct.
17. To exit the programming mode, power the phone off and then back on.
If "NAM ERROR" appears on the display, programming was done
incorrectly and must be repeated.
The above information was taken from the Nokia Programming Guide, and was
typed pretty much as it appears there. The author assumes no responsibility
for any damages caused by any errors in the above information. The above
information is for educational purposes only, and the author in no way
advocates the use of said information to defraud any cellular carrier.
HAVE PHUN!!!
Dr. Freeze
==============================================================================
-=- The Empire Times -=-
Issue 7, File 4 of 9
Digital DNA
by abstract thought
(abstract@thought.dgsys.com)
Life:=the state of an organism characterized by the capacity
for metabolism, growth, reaction to stimulus, and
reproduction.
You may be wondering, why the meaning of life. Well, I want
you to keep it in mind as you continue to read this article...
Viruses. Everyone is familiar with those little miscreant
programs infecting computers around the world. They sometimes
consume files, cpu cycles, and other things we value, and the
almost always hinder productivity. Rarely is a virus completely
eradicated as they are continually reproducing and inoculating
other files and computers.
There is a reason why computer viruses are called viruses. It
is because they are *exactly* like biological viruses. Both are
incredibly small. Where the biological viruses are at least half
as small as the cells they infect, digital viruses are similarly
smaller than the files they infect. While viruses inject string os
protein called DNA into their host cells, their computer
counterparts inject strings of code, a digital DNA. Later, those
host cells or programs spread their malevolent viruses to
neighboring targets.
Now that the fact that biological viruses and digital viruses
are identical has been established, on to the big question. Are
computer viruses, and other programs, alive?
Viruses are one example. The computer viruses meet the same
requirements for life that the biological ones do. They have a
metabolism by consuming cpu cycles. Growth is evident in their
infecting of programs, going from a small piece of code into a
healthy sized executable file. Reaction to stimuli is evident in
many viruses. For example, the diamond.105 virus infecting my
computer science disk. The stimulus is being in memory for about
5 minutes, at which point a diamond of little ascii diamonds appear
and dance around consuming whatever is on the screen. Reproduction
is hardly a question, there is no doubt that viruses reproduce. So
in conclusion, viruses are alive.
No, I'm not comparing computer viruses to humans. Clearly,
life does not mean intelligence. Computer viruses may be alive,
but they do lack intelligence, much like biological viruses. And
no, they are not natural life. They are as artificial as the
computers they inhabit. But still, they are alive.
Viruses are hardly the only life that programmers have
created. In a local high school science fair there were two major
computer exhibits. One was a simple program tracing genetic
material through a simulated colony. Not exactly fulfilling the
requirements for life. The other, however, was very interesting.
The project was a colony of competing creatures. Each had their
own individual DNA coding that governed the way the moved and
reacted to stimulus. They had a limited life span, based on
successful growth and metabolism. As for reaction to stimuli, they
would avoid simulated poisons and consume the other life forms.
This is another example of an artificial life form.
Another popular trend in computer science is cellular
automata. In one cellular automata, the life cycle began with a
clump of cells. These cells would only survive if they could move
to a position neighboring two other cells. Any more or any less
and the cell could possibly die. The cells would react to
neighboring cells and find the best position to move to. If they
lived long enough, they would be able to reproduce, thus sustaining
the colony. Again, the qualities of life are shown in a program.
Tom Ray, currently a scholar at the Advance Telecommunications
Research Institute International in Kyoto, Japan, is also convinced
that programs can live. His reasoning...he breeds digital
organisms. As a biologist, his initial intent was to study
evolution. Evolution, however, is a long process, so he resorted
to creating his specimens. After creating his own operating system
(so that if there are any escapee programs they won't work on other
computers), he introduced "the Ancestor". The Ancestor was an 80-
byte long worm. It was the first and last worm Ray ever created.
After being set free on Tierra, the digital ecosystem/operating
system Ray created, the Ancestor bred and spread. A 79-byte mutant
variation evolved and started to compete with it's predecessors.
Later came 45-byte worm, then a 51, and the smallest, a 22-byte
creature. Each worm had it's self-replicated brethren, each
competing for the necessary cpu cycles to live and reproduce.
However, something startling happened. Symbiotic relationships
formed. The 45 and 51-byte worms evolved into viruses lacking the
genetic code to reproduce. They would infect the larger species
and use their code to reproduce. In the process, the larger worms
would receive immunity from other parasites because they didn't
register in the memory. These evolutionary powerhouses, with
tighter codes than most human programmers can dream of, have not
only shown the possibility for digital life, but a digital
ecosphere like the earth. Tierra became a jungle of worms and
viruses competing, evolving, and living. There is no doubt that
there is artificial life.
Again, I'm not saying that programs are at the same level
humans or other organic life. Yet, it would be hard to say that
some programs are not artificial life. But that is my opinion, and
I would like to hear yours. If have any thoughts, comments, or
ideas about this, tell me. And if you agree or disagree, let me
know why, and if you have some examples, even better. You can e-
mail me at abstract@thought.dgsys.com. Maybe if the response is
great enough, I'll write a follow-up. Hopefully you'll be seeing
more from me, on this topic or others.
Lastly, I'd like to thank a few people.
-Armitage, thanks for the chance to write this and for
all the other things you've done for me.
-All my friends in my computer science class...Brad, Aaron,
Mark. We had some good discussions about this and other
fun things...
-Everybody in the D.C. scene. I learned a lot by watching
you all... You may not have seen much of me but I
learned a lot from you.
==============================================================================
-=- The Empire Times -=-
Issue 7, File 5 of 9
Official Defcon III Update
by The Dark Tangent
-----BEGIN PGP SIGNED MESSAGE-----
DEF CON III Convention Update #1 (1.xx.95)
August 4-6th 1995 @ the Tropicana in Las Vegas
XXXXXXXXXXXXXXXXXXXXXXXX XX DEF CON III Initial Convention Announcement
XXXXXXXxxxxXXXXXXXXXXXXXXX XX DEF CON III Initial Convention Announcement
XXXXXXxxxxxxXXXXXX X X DEF CON III Initial Convention Announcement
XXXXXxxxxxxxxXXXXXXX X DEF CON III Initial Convention Announcement
XXXXxxxxxxxxxxXXXX XXXXXXXXX DEF CON III Initial Convention Announcement
XXXxxxxxxxxxxxxXXXXXXXXXX X DEF CON III Initial Convention Announcement
XXxxxxxxxxxxxxxxXXXXXX XX X DEF CON III Initial Convention Announcement
XXXxxxxxxxxxxxxXXXXXXXX DEF CON III Initial Convention Announcement
XXXXxxxxxxxxxxXXXXXXXX X XX DEF CON III Initial Convention Announcement
XXXXXxxxxxxxxXXXXXXXXXX XX X DEF CON III Initial Convention Announcement
XXXXXXxxxxxxXXXXXXXXX X DEF CON III Initial Convention Announcement
XXXXXXXxxxxXXXXXXXXXXXXXXX DEF CON III Initial Convention Announcement
XXXXXXXXXXXXXXXXXXXXXXXXXXXX X DEF CON III Initial Convention Announcement
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE &
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE &
This is _not_ the professional sounding announcement. Use that one to con
your boss / employers out of the cost of the trip. The professional
announcement will be available on the ftp site and other more serious mailing
lists and news groups, etc. This is the k-RaD kriminal shout out to all u
el1te haquer types that aren't in jail to attend 'da def con. werd.
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE &
READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE & READ & DISTRIBUTE &
What's this? This is an initial announcement and invitation to DEF CON III,
a convention for the "underground" elements of the computer culture. We try
to target the (Fill in your favorite word here): Hackers, Phreaks, Hammies,
Virii Coders, Programmers, Crackers, Cyberpunk Wannabees, Civil Liberties
Groups, CypherPunks, Futurists, Artists, Criminally Insane, Hearing Impaired.
WHO: You know who you are, you shady characters.
WHAT: A convention for you to meet, party, and listen to some speeches
that you would normally never get to hear from some k-rad people.
WHEN: August 4, 5, 6 - 1995 (Speaking on the 5th and 6th)
WHERE: Las Vegas, Nevada @ The Tropicana Hotel
So you heard about DEF CON II, and want to hit part III? You heard about the
parties, the info discussed, the bizarre atmosphere of Las Vegas and want to
check it out in person? You want to do weird shit _away_ from the hotel
where you could get me in trouble? Then you're just the person to attend!
Sure it's great to meet and party with fellow hackers, but besides that we
try to provide information and speakers in a forum that can't be found at
other conferences. While there is an initial concern that this is just
another excuse for the evil hackers to party and wreak havoc, it's just
not the case. People come to DEF CON for information and for making
contacts. We strive to distinguish this convention from others in that
respect. Plus this year we have official DEF CON GOONS(c) who will pummel
you until you pass out should you cause problems for other con.friendly
people! Big Brother loves you!
What's been said (Only the good stuff will be quoted, of course)
Stevyn - "Why can eye say, it was intense! . . . the whole con just kicked
ass! I totally recommend you check out the next one."
Gail Thackeray, Prosecutor, "It's partly an entertaining party, it's
partly a fashion statement. But it's mostly something about which the
business world has no clue."
Wendy Murdock, Boardwatch, "Def Con represents the tug-of-war that has
always been present - people strive to get that which is just out of
reach, aggravating governments and breaking rules in the process."
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
WHERE IT IS:
The Tropicana has rooms reserved for the convention. Rooms are expensive.
They are even more expensive if you don't book under the convention. If it
is to expensive for you, please see the section below on Las Vegas www sites tha
t
can provide you with information on other nearby hotels that are cheaper.
Check-in is 3pm, check-out time is 12 noon. Remember there is an 8% sales
tax in Vegas.
65$ Single or Double room, Midweek (Mon-Thurs)
90$ Single or Double room, Weekend (Fri-Sun)
350$ One-Bedroom Suite (Call for Availability)
The Tropicana, 3801 Las Vegas Blvd. So., Las Vegas, Nevada, 89109
(702) 739-2581 or (800) 468-9494 or (702) 739-2448 (Fax)
Held in three conference rooms at the Tropicana hotel in Las Vegas, DEF CON
promises to be interesting. The Tropicana has a huge pool (largest in the
world? Anyway, lots of cool movies have been filmed with this pool in them)
and in August Vegas should be about 100(f) degrees at one in the morning.
What do you care? You'll be wired on caffeine and not sleeping anyway. There
are numerous attractions in town from the strip bars to the local COs in case
you seek distraction.
The Tropicana is located right on the "Strip" with the other three corners of
the street occupied by the MGM Grand (Largest hotel in the world), the
Excalibur, and the Luxor (The big sense-net pyramid). If you can afford it
I totally recommend spending some extra time in town.. there are too many
cool things to do, especially if you have never visited. Heck, last time I
got to rent and fire uzi's and MP-5 machine guns (OK, so you can do that for
free in Los Angeles) see some strippers, and drink 1$ bottles of imported
beer. What a place! Now you know why I chose Vegas for a location.
SPECIAL EVENTS
This year there will be a number of special events going down, including:
[> Haquer Jeopardy [> Spot the Fed Contest [> Voice bridge
[> Giveaways [> A Red Box Creation Contest [> A Video Room
[> Cool Video Shit [> Scavenger Contest [> Who knows?
COSTS
Because of the increased costs associated with the convention this year, the
price of admission will be 30$ in advance (See the end of this announcement
the address to pre-register to) or 40$ at the door. This will include
your goovie 24bit color name tag and a conference program.
Don't forget to factor in Hotel costs, (The more people you crash with, the
cheaper it is) gambling, food, gas, bail, etc.
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
SPEAKERS
This is a partial list of speakers for this year. More are being invited
or waiting to make plans. As this list changes further announcements will
be made. This should give you a flavor or what to expect, though.
[> Winn Schwartau, Author of "Information Warfare" and "Terminal Compromise,"
is a consultant to government and the private sector regarding enterprise
and national security concerns. TOPICS: "Information Warfare, the year
in review" (Comedic) and "Tempest Attack Videos."
[> Len Rose AKA Terminus is root at Bar Net, the largest internet provider in
the world. Sun Microsystems and HP are some of their customers.
After the legal fiasco Len faced years ago (as partially chronicled in
"The Hacker Crackdown." This will be his first chance to speak of his
experiences without the threat of having his parole revoked. TOPIC: To
be decided later.
[> Chris Hall of Executive Protection will be demonstrating a fully
equipped "A-Team" van, a fully loaded spy mobile with all types of cool
interception and surveillance goodies. Last year his talk included an
overview of surveillance techniques. TOPIC: To be decided later.
[> Sarah Gordon, AKA Theora, a veteran of DC II will be presenting another
speech this year. Last year she organized a round table discussion
with Phil Zimmermann and Presence, and revealed that the Anonymous
remailer anon.penet.fi was compromised. TOPIC: Not Announced Yet.
[> Curtis Karnow, former federal prosecutor and attorney focusing on
intellectual property litigation and computer law. TOPIC: Agents in the
telecommunications context, and "smart" software that we 'trust' to do the
Right Thing. The specific issue is legal liability and responsibility for
the actions of intelligent agents, and then spinning off to chat about the
liability for artificial intelligence generally.
Speakers will be talking Saturday and Sunday, and maybe Friday depending.
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
SPECIAL EVENTS
So you think you're so damn smart, eh? Think your shit doesn't stink?
Right. Think you got one up on the Feds, huh? Well, now's your chance to
prove it smarty-pants. Winn Schwartau will take command and moderate.
! A N N O U N C I N G !
H A C K E R J E O P A R D Y
That's right. You can now prove how smart you really are. Get up on stage
and question a few answers, pile up the points . . . and win big!
You know the game. You know the rules. Now all you have to do is have the
guts, get up on stage in front of your peers and the narcs and show us all!
When? After Dark Tangent's opening speech (which we're all really looking
forward to . . . [yawn] HACKER JEOPARDY starts!
MIDNIGHT - DAY 1 of DEFCON.
If you wanna play . . . show up. If you don't wanna play, don't show up.
There will be three rounds of three people. Just like real. The winners of
each round will go into the Finals and the winner of that will win 25,000
units of some foreign currency! From Dark Tangent himself! Plus:
- A t-shirt three sizes to small for the women
- No t-shirts for the men.
- Silk jackets for everyone.
- One Heineken per player per round at DT's expense.
- Round trip directions to Hoover Dam
- Phiber Optik's home address
- Eric Bloodaxe's Blood Samples
- And more . . .
Contestants will be picked at random from a pool of those who want to play.
If you don't wanna play, don't enter the contest. Only the elite survive!
FEDS: If you get picked to play, and we ask you what your job is, YOU HAVE
TO TELL THE TRUTH! If you don't, our custom Fed-O-Meter will detect your
lies and off to the casinos you go!
Potential categories for questions include:
- - Famous Busts - Famous Narcs - UNIX Bugs - Telco Tech - "Hacking"
and beware of the killer daily double. Bribing the judge is acceptable.
So, in the inimitable words of Al Bundy . . . LET'S ROCK!
3rd ANNUAL SPOT THE FED CONTEST
Spot the fed, win the shirt
"Like a paranoid version of pin the tail on the donkey, the favorite sport
at this gathering of computer hackers and phone phreaks seems to be hunting
down real and imagined telephone security and Federal and local law
enforcement authorities who the attendees are certain are tracking their
every move.. .. Of course, they may be right." John Markhoff, NYT
Basically the contest goes like this: If you see some shady MB (Men in
Black) earphone penny loafer sunglass wearing Clint Eastwood to live and
die in L.A. type lurking about, point him out. Just get my attention and
claim out loud you think you have spotted a fed. The people around at the
time will then (I bet) start to discuss the possibility of whether or not a
real fed has been spotted. Once enough people have decided that a fed has
been spotted, and the Identified Fed (I.F.) has had a say, and informal vote
takes place, and if enough people think it's a true fed, or fed wanna-be,
or other nefarious style character, you win a "I spotted the fed!" shirt,
and the I.F. gets an "I am the fed!" shirt.
Note to the feds: This is all in good fun, and if you survive unmolested
and undetected, but would still secretly like an "I am the fed!" shirt to
wear around the office or when booting in doors, please contact me when no
one is looking and I will take your order(s). Just think of all the looks
of awe you'll generate at work wearing this shirt while you file away all
the paperwork you'll have to generate over this convention. I won't turn in
any feds who contact me, they have to be spotted by others.
TELEPHONE CONFERENCE BRIDGE
For DEF CON III there will be a dial in conference set up. If you are
overseas, or just too poor to make it to the convention this year, you can
still get an idea of what is going on and participate. One part of the voice
conference equipment will allow you to listen to the convention room
microphone, another will allow you to ask questions during the Q&A sections
of peoples speeches. A general conversation area will be up so you can chat
with others at the convention, or just others dialed into the bridge.
As more technical information and phone numbers become available for the
bridge I will post them in future convention updates.
Navigate through the voice mail maze and get free phone sex! Impress others!
SPOOAH DOOPAH RAFFLE GIVE AWAY!@#
Throughout the convention, between speakers and events there will be a raffle
giveaway in which if your number is drawn, you win the prize. Last year's
giveaway included an ancient kaypro monochrome portable, a roll of Sprint
"security" tape, "Computer Warriors" evil anti-virus cartoon, a 240 meg IDE
HD, and other elite things.
>> All the prizes given away are donated by other convention goers, so if <<
>> you have any stuff to give away, please save and donate it to the con! <<
RED BOX BUILDING CONTEST
While we don't encourage or condone the use of toll fraud devices, we do
encourage creativity and expression of thought. We combine these and come
up with a red box creating contest. The final device doesn't have to
produce the real red box tones (Can't have people getting arrested) BUT it
does have to produce some tones like with the stock crystal. This contest
is inspired by last year's give away of a red box "Big Red" that looked just
like a big pack of Big Red gum, but really was a red box. Elite! There was
also a little girl's doll that was a red box, but the switch for that one was
hidden under the dress and, well, it just wasn't given away.
Come up with unique ideas! With just a Hallmark card and some spare time you
can create an elite 007 style tone generating device! What will you win if
yours is chosen as the most k-rad beside the envy of fellow hackers? You'll
get a tee shirt and the cost of admission to the convention refunded PLUS
some as-of-yet undecided prize. I bet you just can't wait to burn your
fingers with your soldering iron now!
THE VIDEO ROOM
In one of the rooms a LCD wall projector will be hooked up connected to a
VCR, and people can bring flicts to play. Stuff like Max Headroom, War Games
etc. You know, the cool cheesy stuff. Also some "hacker" videos will be
shown. If you have something you wanna show, bring it along. When the
projector is needed in the main conference room it will be swiped for the
duration.
COOL VIDEO SHIT
At this time we are working to see if a T1 connection is possible. If it is
there will be a cu-see me connection set up with multiple video cameras in
various locations. Images will also be added automatically to a WWW page for
people to snag. As all this works itself out there will be further
announcements. No, there will be no "Hack our server" contests, and there
will be "Security Professionals" with "Diagnostic Tools" to "Correct" any
people who may case the network problems.
SCAVENGER CONTEST
A scavenger contest is being planned. The person or group with the most
number of items on the list wins the prize. (Prize undetermined as of yet)
and there will be a few follow up prizes. Don't forget to carry massive
amounts of water as you run about the concrete jungle, dehydration can
happen just crossing the street. This is a contest for only the most k-rad.
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
WHAT YOU CAN DO TO HELP
DEF CON III will be planned right up until the last minute, with problems
being fixed and new things being added all along.. a sort of work in progress
that you get to witness in person when you show up. Hopefully it won't be
too messed up when presented to the public. What can you do to help?
- -> We are looking for people to speak on Personnel Information Gathering and
selling. Hopefully a speaker (who could remain anonymous) in this area
has experiences in gathering and selling such information. If you know
of such a person, please invite them to contact me or let them know we
are looking for such speakers.
- -> We are looking for some people to submit artwork to be used in the
convention someplace. It could be a poster, or in the program. Black
and white art would be eligible for the program only.
- -> Articles and interesting ftp sites, www pages, mini FAQs, etc. are all
wanted for the program. Quality articles that are informative and apply
to the theme of the convention. Scanner frequency lists,
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
MORE DEF CON INFORMATION
The World Wide Web Page is located at: http://dfw.net/~aleph1/defcon
FTP Site: ftp.fc.net /pub/defcon
Mailing lists: mail majordomo@fc.net with the following statement in the body
of your message: subscribe dc-announce This will set you up on the mailing
list and you will receive updated information, information on the other
mailing lists offered, etc. I suggest joining the dc-stuff list just so you
can talk and plan with other people going to the con to coordinate rides,
sharing of rooms, etc.
Voice or Voice Mail: 0-700-826-4368 from a phone with AT&T LD.
E-Mail: dtangent@defcon.org (The Dark Tangent)
Snail Mail: 2709 E. Madison #102, Seattle, WA, 98112
BBS System to call for info if you don't have net access:
Alliance Communications - +1 612 251 2511 - USRobotics HST DS 16800
NUP: New World Order
Underground Information for Security Professionals and interested parties.
Formerly ASU Underground in Tempe, AZ (602) & Radio Waves in MN (612).
Associated Electronic News
Network from American Justice Federation
International Information Retrieval Guild Distro Site, Electronic Frontier
Foundation MEMBER, and Phantasy Magazine Distribution Site.
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
INFORMATION ABOUT LAS VEGAS
NEWS GROUPS
Please note the following newsgroups may or may not be designated for local
distribution (Distribution: Vegas and/or nv), and is intended for all
systems in the Las Vegas area or those interested in same on the same level
as the la, ca, ba, ny, nyc, and other similar local higherarchies:
vegas.bi Talk for bisexually natured persons
vegas.config Configuration discussions for the higherarchy
vegas.food Anything about food in Las Vegas
vegas.for-sale For Sale/Want ads (no commercials, please!)
vegas.general General discussion
vegas.jobs Jobs offered and wanted in Las Vegas
vegas.motss MOTSS community talk
vegas.personals Personal ads - any nature
vegas.singles Talk for singles
vegas.test Group to test post to
WWW PAGES about Las Vegas, Hotels, Things to do, etc.
HTTP://www.infi.net:80/vegas/online/
HTTP://www.ocf.berkeley.edu/~iew/index.html
HTTP://www.best.com/~rdc/roger/vegas.html
HTTP://www.intermind.net/las.vegas.on-line/homepage.html
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
STUFF TO BUY
Stuff is for sale from DEF CON I and II in case you are interested. From the
first year we have audio tapes (4 90 minute tapes) for $20 and the second
year (10 90 minute tapes) for $30. Descriptions of these tapes are below.
DEF CON I Tapes (4) include the following speakers:
Ray Kaplan, Curtis Karnow, Gail Thackary, Dead Addict, Dark Druid, Judi Clark
Dan Farmer, and Dr. Mark Ludwig.
DEF CON II Tapes (10) include the following speakers:
Phillip Zimmermann : Keynote Speaker, PGP.
Gail Thackary : Response to Mr. Zimmerman and Privacy issues.
Chris Hall : Electronic Surveilance.
Curtis Karnow : Recombinant Culture, Crime in the Digital Network.
Dr. Mark Ludwig : Virus Creation Awards and What to do when the Feds come.
Judi Clark, Mara, Fen and Marianne in a Round Table Discussion.
The Dark Knight : Hacking in the U.K.
Sara Gordon, Mark Aldrich, Phil Zimmerman: Internet and PGP privacy concerns.
Annaliza (Torquie) : The European Underground scene.
Mark Lottor : Various cellular topics.
Winn Schwartau : HERF guns, Van Eck, Information Warfare
Peter Beruk : The role of the SPA, general Q&A.
Padgett Peterson : Anti-Virus writing, Cleaning up other peoples messes.
The Jackal : A basic radio overview with Q&A.
Artimage : Underground spoof and give aways.
Stephen Dunifer : Radio Free Berkeley and pirate media.
Damien Thorn : Random Cell information from the late night tech talks.
SHIRTS are still available to buy. The ones remaining are long sleeve white
with the choice of two styles. Both styles have a three color logo on the
front (Red, Gray, Black) with "DEF CON". The back is either a list of
strange grep key words and "inside" keywords with "Why? Because I can." at
the top. Back #2 is the same back as DEF CON I with the old and "new" 4
Amendment as stated by J.P. Barlow with "Protect your rights, Encrypt your
data..." at the top. The back on this style is two colors.. black lettering
framed in light gray for better definition. Shirts are $20.
SHIPPING : If you buy anything, please include 2.90 for priority shipping.
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
LAST AND LEAST
OK! Your almost ready to go. Now here is an E-Z to follow checklist of
things you should take care of before throwing caution to the wind and
bailing out to the dangerous and sexy-wrong world of Las Vegas. In the
words of one famous (and abused) phone system: "Sit up straight, PAY
ATTENTION, Listen to what your being told. (Now try again)" (Whoever can
identify that phone system first gets in free)
StUPh 2 D0 b3fore the C0nvent1ion:
_ Check out inpho about Vegas so you know what you wanna do.
_ Get a hotel room or some crash pad.
_ Bring $40 for admission or pay $30 in advance.
_ Bring your PGP key on disk to key sign with others.
_ Bring Laptop, laplink, serial, and bizarre gender changer cables.
_ Bring things to donate for the give-away raffle.
_ Leave massively incriminating evidence at home.
_ Police scanners can provide hours of fun in Vegas.
_ Bring interesting videos to play in the video room.
_ Caffeine and snacks are fun to eat.
_ Don't forget any drugs or medication you may need.
_ You won't need saline for your contact lenses, you won't be sleeping.
_ Anything you promised your friends you would bring for them.
_ Join the mailing list and arrange rides or rooms with others in advance.
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
MY PGP KEY
This is the unsigned version
My signed version is available on the public key-servers
------BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.6.1
mQCNAy6v5H8AAAEEAJ7xUzvdRFMtJW3CLRs2yXL0BC9dBiB6+hAPgBVqSWbHWVIT
/5A38LPA4zqeGnGpmZjGev6rPeFEGxDfoV68voLOonRPcea9d/ow0Aq2V5I0nUrl
LKU7gi3TgEXvhUmk04hjr8Wpr92cTEx4cIlvAeyGkoirb+cihstEqldGqClNAAUR
tCZUaGUgRGFyayBUYW5nZW50IDxkdGFuZ2VudEBkZWZjb24ub3JnPg==
=ngNC
------END PGP PUBLIC KEY BLOCK-----
:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
WHY IS THE ANNOUNCEMENT SIGNED?
Well, last year it came to my attention that some unknown person in
California had modified an announcement and was having people mail their
pre-registration money to them instead. It was actually pretty funny. Only
one person was fooled and lost 10$. Not bad. I knew something was up when
he said he had pre-registered for 10$ and had the receipt I had supposedly
mailed back. I am never that organized! To avoid potential problems like
this one please verify this announcement!@# My key is available for
verification on public key servers, and my key-id is 46A8294D. The
other key you will find on servers may be my older 1284bit key, which is
still good, but just not used to sign this text.
END ANNOUNCEMENT ------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQCVAwUBLx9EqstEqldGqClNAQF+tQP/fVRMKLwHOjPFiizoFFVR0gjMnP/J/L24
1DhCJvw6ePaFAwuVHoRYenYulvoJVcRGnL+Do8ZXNqZ1Hz0oGQjcb7A0sW5BxJi6
VL6CCKIM8oCnsQQYlxvUn+omaVDXqfjcKNnehLTg0jrLAOjMUBaO9mt392MHN+Tb
Icw0yVEHU1g=
=Jq1x
-----END PGP SIGNATURE-----
==============================================================================
-=- The Empire Times -=-
Issue 7, File 6 of 9
Are You a Hacker?
by ReDragon
Take a little quiz for me today. Tell me if you fit this
description. You got your net account several months ago. You have been
surfing the net, and you laugh at those media reports of the information
superhighway. You have a red box, you don't have to pay for phone calls.
You have crackerjack, and you have run it on the password file at a unix
you got an account on. Everyone at your school is impressed by your computer
knowledge, you are the one the teachers ask for help. Does this sound
like you? You are not a hacker.
There are thousands of you out there. You buy 2600 and you
ask questions. You read phrack and you ask questions. You join
#hack and you ask questions. You ask all of these questions, and you
ask what is wrong with that? After all, to be a hacker is to question
things, is it not? But, you do not want knowledge. You want answers.
You do not want to learn how things work. You want answers. You do not
want to explore. All you want to know is the answer to your damn
questions. You are not a hacker.
Hacking is not about answers. Hacking is about the path you
take to find the answers. If you want help, don't ask for answers,
ask for a pointer to the path you need to take to find out those answers
for yourself. Because it is not the people with the answers that are
the hackers, it is the people that are travelling along the path.
-ReDragon
==============================================================================
-=- The Empire Times -=-
Issue 7, File 7 of 9
Recent Large Name Phreaker Busts
by anonymous
February 22, 1995
Did you wake up that Wednesday and decide it was a good day to get raided?
Well, at least nine people had the pleasure of that experience.
Rumors were slow to circulate. Even now, two weeks later, it's not clear to
anyone who exactly was raided, where, why, or if they had been arrested as
well.
One thing all the people have in common: Southwestern Bell - or at the very
least, the desire and ability to hack all the switches on the west coast.
We know about Dispater (TEX), KC, Gatsby (and his girlfriend), Mark
Tabas, Dr DeLam, Zibby, Phantom Phreaker, and Zero Page. While the
investigation seems to be based in Dallas, Texas, the people come from
different states: Illinois, Florida, Pennsylvania, Washington, California,
and maybe Canada. The primary suspect? Zibby. It's rumored the phreakers
had a good idea the raids were coming.
So what did the FBI do, and how long have they been monitoring these people?
Well, they have surveillance photos of some of the people involved. Apparently
the fact that certain individuals had been together at some point in time
is very interesting. Could they be fishing for a conspiracy charge, perhaps?
They seemed to be very interested in confiscating bank statements and so forth;
something to do with money laundering? Cellular fraud is a given. And of
course, consistency being something federal investigators are known for,
some cellular phones were taken, but _some_ were not. Certain people were
threatened with indictments within two weeks; some were told they would
probably never be disturbed again. One thing is for certain: their personal
possessions will be gone for a very long time, possibly forever.
A phone company employee was rumored to have stated, "it's not what
they did to the switches and such, it's HOW they did it". An amusing
anecdote has been told about Dispater, "Supposedly he tried three times
to sell the CC numbers he had, and got ripped off every time!" Apparently,
not everyone knew or approved of anyone making money off of their pursuits.
It's also rumored that phone calls were made overseas to military bases in
"hostile countries".
There's some question about what these raids have to do with other
recent events, such as the Kevin Mitnick arrest. While at least one
of the people raided had connections to Mitnick, it appears that had
nothing to do with what happened on February 22.
--------------------
Special thanks to Super Happy Fun Ball.
==============================================================================
-=- The Empire Times -=-
Issue 7, File 8 of 9
Hacker learns intelligence secrets
-----gotten from RISKS Forum------
Subject--Hacker learns intelligence secrets
The London "Independent" newspaper of 24-Nov-94 leads with a story
that a "hacker" gained access to a sensitive database of
telecommunications information at British Telecommunications (BT), the
UK's largest (and ex-state owned) carrier. The story was also carried
by all the major television and radio news programmes.
Tim Kelsey, author of the Independent story, reveals that details such
as telephone numbers and addresses for secret installations of the
Ministry of Defence, MI5 (the British intelligence agency responsible
for the UK) and MI6 (like MI5, but handles non-UK affairs).
"Thousands of pages of highly confidential BT records were sent across
the Internet to a young Scottish journalist, Steve Fleming, in July".
Mr Fleming received the information after making a news posting asking
for information on BT and hacking. The informant remained anonymous
--
details of how this was achieved are not given.
The hacker also gave details to Mr Fleming about how he too could
access the information. He applied through an employment agency for a
short-term contract at BT as a database designer, clearly stating on
his CV that he was a freelance journalist. He got the job, and was
able to gain access to the information because passwords were just
left lying around the office.
BT is still going through a major staff restructuring programme, and
as a result has a large number of temporary (contract) staff. These
staff need passwords to the system to legitimately carry out their
jobs, but because of the constant flow of people, the passwords are
often written down.
Mr. Fleming learned, among other things,
* The location of MI6's training centre ("spy school"), located in
a non-descript building next to a pub in south London
* Information about the bunker in Wiltshire where the Government
would go in the event of nuclear war
* Details of telephone installations at Buckingham Palace and 10
Downing Street [the Prime Minister's home], including
personal lines to John and Norma Major.
The system itself, the "Customer Services System", was designed and
implemented by an American company, Cincinnati Bell. It is supposed to
have internal mechanisms to prevent hacking (!)
So, what are the risks (briefly!)
1) Allowing temporary staff passwords that allow almost any
data to be retrieved. It sounds as if the security
levels of the database were either non-existent,
or compromised.
2) Keeping sensitive information in the same database
as non-sensitive information.
3) The age-old chestnut of the uses of passwords.
A BT spokesman, speaking on the "Today" programme on BBC Radio 4
confirmed that a "top level" investigation had been launched, but
refused to confirm or deny that the hack had taken place.
==============================================================================
-=- The Empire Times -=-
Issue 7, File 9 of 9
OSS '94
by firefly
OSS '94 -- Third Annual Symposium on National Security
And National Competitiveness -- Open Source Solutions
In its third year of existence, and my second year of
attendance, Open Source Solution's international 3-day
conference is a mix of government, commercial, private
citizens, and hackers joining together to discuss the
implications of a National Knowledge Strategy. For those
of you new to this series, OSINT (or OSCINT) is the
intelligence technique of using public and unclassified
data from any source to meet your intelligence needs. As
I wrote in the first few segments in this column, this
ranges from dumpster diving to CDROM databases to the
Library of Congress to social engineering. If you've
read my series, you know of Robert Steele. Hell, if you
went to HOPE, you know him, he gave the elite keynote
address with the flashing lights and all. Robert pulls
together the best and brightest to speak and hold panel
discussions at this conference.
The affair lasted three days at the Raddison Hotel in
Alexandria. It was an intense period, the first speaker
started at 8am and they went thru until almost 5. Then
came the daily networking reception where people could
mingle, have some drinks and talk shop, and (last year)
the few college seniors who were interning there could
pass out resumes' and hope for jobs. Hey, it worked for
me. OSS '94 boasted over 1000 attendees, 75 corporate
sponsors, and 30 volunteers.
I won't bore you with the details of the plenary sessions,
but will tell you that some notable members of our side of
the house were in attendance. Chris Goggans, Emmanuel, Bob
Stratton, Rop Gongrijpp (sp?), and a few others headed up
some of the panels on the pros/cons of hackers and the
influence hackers (and those who know how to REALLY use
computers in general) have on the ability of a company to
get OSINT. Funny, these panels were PACKED with people --
there was not even standing room. In the Goggans-Stratton
panel, there were 150 people in a room designed for 50!
On a side note, I think that the NASA Atlas of Mars is a
new hacker item, as the NASA reps gave a copy to Emmanuel,
me, and a few other hackers (more so to get rid of them,
I think, but funny nevertheless as ONLY hackers took 'em)
Some big speakers included: Ambassador Holmes, Assistant
Secretary of Defense for Special Operations and Low-
Intensity Conflict (speaking about waging wars in the
depths of cyberspace); Winn Schwartau, author of Terminal
Compromise and INFOWAR (speaking about Information Warfare);
Paul Fuchs, Director of the Red Cross (speaking about how
OSINT and computers aid humanitarian operations); Loch
Johnson, WELL-KNOWN author of intelligence books (speaking
on the dark future of the CIA); and Robert Steele, who
presented his Knowledge Strategy Thesis to the group.
For you paranoid freaks, there were about 20-40 NSA people
in the crowd, identified by the cryptic nametag that said
only "Department of Defense". Hmmm. They hung around by
themselves in their own little cliques. Very few spoke to
anyone else. Kind of makes you wonder what it would be to
work for the Big Bruiser of Fort Meade. I dunno. I like to
interact with people, not just PCs, codewheels, and Never
Say Anything.
OSS is an international event, and the premise behind it is
just as large. Robert Steele's basis for forming Open Source
Solutions is to not only provide cost-effective information
to whoever needs it (government or private sector), but to
illuminate the expanding global connections and essentially
publicize the Power of Information.
Steele professes the need to "Restructure and Reinvent
Intelligence". For those who don't know, intelligence is not
CIA stuff. It's simple information. Yes, CIA uses information
and puts a TOP SECRET classification on it. That's where
Steele goes nuts. He says that (and I agree with him) that by
using open sources, one can obtain better information/intelligence
than by only using Spooky Secret Spy Stuff, and at a VERY SMALL
FRACTION of the cost. It costs more to classify and manage this
classified information than it does to look for the same stuff
through open sources.
Overall, OSS '94 was a bounding success. If anyone is interested
in OSINT, feel free to contact me at firefly@cult.empire.org or
at other well-known non-government addresses.
-- Firefly
Resident OSINT Consultant
==============================================================================
-=- The Empire Times -=-
=============================================================================
The Empire Times Q & A Section.
Where can I get The Empire Times?
Via BBS
This is provided that you are on these systems, none accept many new
callers, so the #'s are not listed, that is not to be mean. It is just
that the System Operators are satisfied with their user lists at the
current time.
[NPA] [#] [System Name] [System Operator]
----- ------------- ---------------------- -----------------
(301) PRIVATE Empire Albatross
(703) PRIVATE Digital Anarchy Armitage
(602) PRIVATE Unphamiliar Territory Invalid Media
(+49) XXXXXXXXX Secret Techtonics Sevenup
Via Anonymous FTP
etext.archive.umich.edu (ftp.etext.org) /pub/Zines/Emptimes
fc.net /pub/defcon/EMPIRE
Via World Wide Web
I'm sure it's on a few of them..
Via The Empire Times Mailinglist
Mail armitage@dhp.com with "subscribe emptimes <your mail address>" in the
context of the message. To request old issues, just put
"request emptimes # <your mail address>" where # is the issue #.
Where can I get in touch with any of the writers, or contributers?
Erudite/Armitage armitage@dhp.com
The Dark Tangent dtangent@defcon.org
PuD C0ur13r roach@tmok.res.wpi.edu
Invalid Media upt@bud.indirect.com
Firefly firefly@cult.empire.org
Noe11e jbowyer@marge.hq.af.mil
Drunkfux drunkfux@usis.com
Okinawa okinawa@madhouse.com
Grayarea grayarea@netaxs.com
Dr. Freeze drfreeze@cult.empire.org
Can I write? Where can I send my Article Submissions?
You can mail Armitage or Albatross on either Digital Anarchy or
Empire. You can also mail them to me personally at armitage@dhp.com with
"Submission" as the title, or in a piece of mail before it.
==============================================================================
-=- The Empire Times -=-
=============================================================================