💾 Archived View for clemat.is › saccophore › library › ezines › textfiles › ezines › OCPP › ocpp08.t… captured on 2021-12-04 at 18:04:22.

View Raw

More Information

-=-=-=-=-=-=-

                  Ocean County Phone Punx Presents 
                                 OCPP08	
      "A year of impressing highschool girls with a lame phreak zine"
	                      April 26, 1998
                      Last Updated  April 26, 1998
                                          
 

                               Contents 
                            Intro - Mohawk 
                    Phreak World News - Mohawk
                 Starting your own payphone business - Mohawk
              The dumbest posts on alt.phreaking - Phreak Ghost
              The Signal Circuit Protecter - Neptunium Overkill
                       Phreaking jobs - Mohawk
                  Paging systems extensions - Cybercow
                Yet Another Phield Phreaking Kit - Lineside
             International Dialing Codes - American Anarchist
                             Busted - Mohawk
                               Letters
                                News







Intro-Mohawk

	Damn has it been a year already?  I can't believe it.  Our

readership has spanned over 50 counrties and our webpage has had 

over 5000 hits.  I never thought this zine would get this big.  This 

issue was suppose to be bigger but finals and term papers have

gotten the best of me.  However, this is the last week of school, for 

me anyway, and I'll have plenty of time to work on the next issue.  

Like last year's June's issue the main focus will be on scams, so 

send in all your favorite scams and tips on how to avoid scams.  We 

will also have our usual array of phreaking articles and features.  

Also in our next issue we will feature our "Thanks list".  This will

thank all the people that have made this zine possible.  The OCPP

website will also be getting a much needed make over.  Also, older

issues of the OCPP will be getting updated, with help from Punkroq.

Until we get specific in the next issue, on behalf of the entire

staff of the OCPP, thank you to everyone that has helped with

this zine and to all our readers.














.....The Staff of the OCPP.....


Mohawk.................Editor in chief

Mr. Seuss .............Technical editor/Head technical writer

Checkmate..............Staff writer

Phear..................Staff writer/Graphics

American Anarchist.....Staff writer

Lineside...............Staff writer

Punkroq................Editor

X-Logik................News editor

The Assassin...........The official hitman of the OCPP

V-Rok..................He just looks slick all day





Distro Sites

JadeDragon's Phreaking Page
http://free.prohosting.com/~jadedrgn
Our first distro site, also contains text files and progz






We are still looking to round out our staff.  For information about 

positions, mail: ocpp@hotmail.com


If you would like to become a distro site, mail: ocpp@hotmail.com


To be notified of any URL changes and issue releases, get on the 

mailing list:  ocpp@hotmail.com


Disclaimer and Copyright info is located at the end of the issue.














Phreak World News-Mohawk

If you have something that you would like to appear in 

PWN mail it to ocpp@hotmail.com



Headlines


THTJ and TFP come to an end

The all new alt.phreaking FAQ

Issue 2 of Security Breach is released



THTJ and TFP come to an end


	We reported in the last issue about the problems of THTJ

and it's sister zine TFP.  Both have ended.  THTJ.com has been 

taken over by some company and tfp.nothing.org has been taken

off line.  You can get all the issues of both zines on the

OCPP's website.  Former staff members of the zine are setting up

a new website that is suppose to house all the back issues plus

some other H/P stuff.  The URL is forbidden.nothing.org So far

there isn't really anything there but it's worth checking out

every now and then.


The all new alt.phreaking FAQ

	
	The alt.phreaking FAQ has been getting to complicated

as of late.  Many of you want it to be better but many of you 

don't want to help.  We decided to split the FAQ into a

beginner version and an advanced version.  Mr. Seuss has become

co-editor of the FAQs and he's been working hard on getting things

together.  That's why there's no article from him this issue.

Both FAQ's should be released on May 1st.  When they first come out

they might need some work and revising.  That's where you 

come in.  Let us know what should be changed, added, or deleted.

After all this FAQ is for you.


Security Breach issue 2 is released

	The second issue of the new zine security breach has 

been released.  Maniac has been doing all the work himself

and is doing a pretty good job at it.  There isn't a website

yet but you can get both issues at the OCPP's website.





















Starting your own payphone business-Mohawk

	Starting a your own payphone business can be a very profitable

venture.  However, there are many things you need to know and many

hidden expenses that come along with it.  Many people think that

you can just hang a payphone on the wall and it will collect money

for you.  This is not the case.  This file is not a complete how-to

file but it will give you a good idea of what you will have to do.

However, there aren't many how-to books out there, at least none 

that are free. 


-Money

	The first thing you will need is money.  If you don't have

at least $30,000 free than you shouldn't even consider this.  That is

because it takes the same amount of effort to set up 15 phones that it 

does 1 phone and setting up 15 phones costs about $30,000.  In fact it

takes 100 payphones with a minimum of $5 per day coin revenue to be 

profitable.  



-Education
Once you have enough money, you have to educate yourself

to see if this is what you really want to do.  You have to learn the

ins and outs of the payphone business as well as the ins and outs

of your phone itself.  You will also need to learn how to program 

your phone.  This is important because one screw up can throw

off your whole business.  Like I said before there aren't to many

free documents that will help you.  


Here is a list of videos that will cost you:

Payphone Business Opportunity Video & Resource Guide
Running Time 50 min.
$49.95


Contracts & Locations
Running Time: 76 min.
$99.95


Marketing Payphones
Running Time: 95 mm.
$99.95


Series-5 Video Tool Box 
Running Time: 76 min.
$99.95 plus $5.50 s/h


Payphone Installation Video 
Running Time: 106 min.
$149.95 plus $5.50 s/h

These videos are available from:
http://www.payphones.com/HighTouchVideo/



If you really want to learn, you can go to payphone school.

US payphone school
http://www.payphones.com/USPayphoneSchool/
Telecommunications Course: Being a Public Provider
Three Days of "INTENSIVE" Training
Cost $1500

1252 Saratoga Road
Ballston Spa, NY 12020
1-800-552-8742

There are others out there.  I suggest you shop around.




-Your state payphone association

	One of the most important things you can do is to get

in touch with your state payphone association.  They will provide you

with most of the information you will need to get started.  Most

PA's require a registration fee.  Once you are a member, you will be 

able to attend member-only meetings, receive news letters, etc.  This

is a good way to meet others in your area that will help you out and

share their experiences with you.  Listen to what they have to say

and learn from their mistakes and successes.  If your state doesn't have

a payphone association, contact your state's board of public utilities.

Their number should be in the phone book.


Here is a list of most state payphone associations:



Arizona Payphone Association
Gary Joseph, President
4633 West Polk
Phoenix, AR 55043
Phone: (602)269-3201
 


Atlantic Payphone Association
Serving Maryland/DC/Virginia
Gordon Cruickshank, President
Phone: (703) 938-1899



California Payphone Association
Tracie Nutter, Director
2610 Crow Canyon Road, #150
San Ramon, CA 94583
Phone: (510) 855-3880
 


Colorado Payphone Association
Karen Wojdyla, Executive Director
9101 East Kenyon, Suite 3000
Denver, CO 80237
Phone: (303) 773-8020


                                               
Indiana Payphone Association
Bill Nelson, Executive Director
P.O. Box 906
Indianapolis, IN 46202
Phone: 800-888-4109
 


Iowa Payphone Association
Harold Waggoner, President
8450 Hickman Road #12
Des Moines, IA 50325
Phone: (515)270-1400
 


Kentucky Payphone Association
Tom Rose, Director
1846 Cargo Court
Louisville, KY 40299
Phone: (502) 499-5885



Michigan Pay Telephone Association
Barton A. Lewin, Executive Director
121 E. Allegan Street, #5
Lansing, MI 48933
Phone: (517) 374-6320



Minnesota Independent Payphone Association
Jim Winstead, President
15113 Williston Lane
Minnetonka, MN 55345
Phone: (612) 935-1912
 


Midwest Payphone Association
serving-Missouri/Kansas
Lynn Harvey, President
Phone: (800) 333-9920



New Jersey Payphone Association.  
108 main street 
Oceanport, NJ
Phone: (732) 542-9292 



New Jersey Payphone Group
Harvey Millman, President
dmailman@crusoe.net
11 Scarsdale Drive
Livingston, NJ 07039
Phone: (201) 992-1292



Independent Payphone Association of New  York
Les Shafran, Executive Director
417 Harwood Building
Scarsdale, NY 10583-4199
Phone: (914) 725-8500
 


North Carolina Payphone Association
Vince Townsend, President
P. O. Box 8179
Greensboro, NC 27419
Phone: (910) 852-7419



South Carolina Payphone Association
Gene Stewart, Executive Director
1132 South Center Road
Darlington, SC 29532-9714
Phone: (803) 791-8485



Tennessee Payphone Owners Association
Bob Wilson, President
P.O.Box 681772
Franklin, TN 37068
Phone: (615) 662-5425
 


Utah Payphone Association
Jerry Romney, President
221 N. Charles Lindbergh Drive
Salt Lake City, UT 84116-2872
Phone: (801) 535-2000






-State Public Service Commission

	Contact your State's Public Service Commission for details on 

requirements to operate payphones within the state.  Some states

require a certification process prior to becoming authorized to

operate phones.  It may take up to three months to complete the 

certification process.



-American Public Communications Council

	Contact the (APCC) for additional help.  Their number is

1-800-868-2722.  They also have a website:  www.apcc.net, however

there isn't much on it.



-Local Exchange Company

	Contact your Local Exchange Company (LEC), they will supply

you with vendor handbooks, sign-up forms and charges for service.



-Buying the phone

	When you buy a payphone, you must shop around.  Determine what 

your needs are going to be.  Then look at all the different companies

out there.  The best payphone you can buy is a Nortel Millenium.  

However, if you just want to run a regular payphone business, I 

recommend Elcotel. 


-Choosing a Company

	Like I said before, shop around.  Call up all the companies you 

can and ask them for as much documentation as they can send you.  After 

they mail them to you limit your choices.  Then call them up and ask them

questions.  Most importantly, how long have then been in business.  Some

payphone companies come and go.  If the company you buy your products from

goes out of business, you'll be screwed.  Another thing to look at is

the software.  You will need computer programs to run your payphone.

Find out how easy they are to use and how good they are. 


-Choosing a location

	The right location can make or break a payphone company.  Look

for high foot traffic area, preferably outside with 24 hour

accessibility.  Outside of convenience stores and gas stations

are good locations.  

	You can use a locating service to identify locations quickly.  

Make sure you visit these locations to ensure they fit the strategy you 

have developed for your company.  Locators usually charge between

$200 and $300 per location and some will offer a performance

clause to ensure the location meets the minimum revenue you have 

established.


-Vandalism
Every phone will be the victim of vandalism sooner or later.  The
 
only thing you can do is to be prepared.  You will have to buy a whole

extra phone to use for spare parts.  As something breaks, you take it

off the spare phone and put it on the other one.  The location

will also make a difference.  If your phone is in a rough neighborhood 

you can expect it to be vandalized often.  However, if your phone 

is in a good neighborhood inside of a store, vandalism won't happen

that much.  If you choose to put your phone in a store, make

sure they keep long ours.  Vandalism usually happens when customers

get pissed off so if you keep them happy, your payphone will

last longer.


-Route

	A route consists of a number of sites that have been grouped 

together.  A route is usually assigned to a technician, who services 

all the sites on a route.  Since the sites in a route are usually close 

together, the technician who is assigned a route can service more that 

one site quickly and efficiently.


-Collecting the money

	You can collect the money or you can have a technician do it.  

After you get it, what do you do with all that change.  Try to find a 

bank that will accept loose change for free.  Some banks charge a fee.  

You can always rap it yourself.  Automatic coin counters come in a 

variety of styles and prices.


-After all this

	What happens after this point is up to you.  You can stick with 

it and create a payphone empire.  You can sell your route and retire.  

You can lose everything and wind up writing articles for the OCPP.  






















The dumbest posts on alt.phreaking-Phreak Ghost



	Like the title says, these are some of the dumbest posts on 

alt.phreaking.  Some are really obvious and some are a little harder to 

figure out. Keep in mind that this newsgroups is for phreaking only.  The

names of the people that posted them we're taken out so we don't embarass

anyone.  Other than that, none of these posts were edited in anyway.  






-WTF! Where are the NYers posting?  We got guys posting for 2600 meetings 
in places like Oregon and somewhere on the fucking sunny side of hell 
but yet we cant get any 31337 representation from NY! We have to stop 
the phreak turf wars and stop all these damned bastard phreaks who rat.  
We need 2600 meeting organized by 31337 to settle differences.




-Can somebody please send me the plans to a Blue Box. I've looked all 
over and can't find them!


-Hey, this is WAAY off topic, but I need some help.  I got the Tomb
Raider 2 CD and cannot make it work on my computer.  the conclusion I
have come to is that my computer does not read lowercase files from the
CD, there are 2 UPPERCASE files that can be read.  What can i do?  Why
cant my system read the lowercase files??  It works on every other
computer that I have tried.




-WHTUP VERYEM A PHREKERIKE  NDIANT OET IN YUR ES ROUP SO WHATSUP



-I need a proggi to record telephone conversations via ISDN (teles
adapter) with my pc.

Im also looking for a proggi to play .wav files via ISDN





-Have you guys heard of the Blotto Box?  If you need the plans, I have
them, although I don't think ANYONE has the guts to do this sucker,
ANYONE.  This baby is bigger than the Rainbow Box.  Also, I need
everyone's opinion.  This guy last year always beat the crap outta me. 
But you have to understand that I'm not a skinny little nerd.  Anyways,
should I fuck his phone bill over?  Should it be payback time?  I don't
know I mean, tis guy was REALLY mean to me and I'm a nice guy to get
along with, should he pay?



-i was wondering if it was possiblr to create a 2600 hz tone using a 
computer and then sending it through the modem to do all that fun stuff 
a blue box does?  PLZ LMK I am new at this,

And yes i know it would be stupid to use it at home... la da la da.


-Jennifer Martino Just a question for you.....are you a girl? If you are
thats good because there arnt too many female phreakers around


-Hello!

 have tried to hack this page, but can't handle it... I was hoping you 
could do it for me, ot maybe explain how I do it... That would be great!

-Please, Please SEND me PHREAKING files



















The Signal Circuit Protecter-Neptunium Overkill
(The output device you never knew existed!)  


	This month I will tell about a neat little box called a Signal 

Circuit Protecter.  This is a type of bell's apparatus which most 

phreakers don't know much about. You can open them without any tools 

and YES, you can even beige box off of them.  Sounds great, huh?  

	Well, the only bad thing about SCPs is that they are not very 

common, but if you look around you will probably be able to locate a few.  

LOCATION: SCPs are hooked to phone poles and they are mounted about 5' 

off the ground.  They are about 4"x2" in my area (Wisconsin), but of 

course size may differ slightly depending on your location.  Now when 

looking for these I noticed that either your neighborhood has one on the 

pole nearest everyone's house, or they don't have them at all.  Go check 

your pole, and if you have one this means your neighbor will also be the 

proud owner of an SCP.  If you don't have one then you will have to check 

somewhere else.  You will probably need to look to far.


WHAT YOU WILL SEE: Once you find and open an SCP, you will see two 

terminals (a ring and a tip),  a circuit board, and some wires.  All 

you need to do is clip on like you would with any other

output device.  


WHAT IS WITH THIS STICKY ORANGE STUFF?:  It's an adhesive used for 

keeping the rubber TermGard over the terminals.  Just Rip off the 

TermGard and wipe off the orange crap.

Good Luck and Be Careful!




















Phreaking jobs-Mohawk

	For some of us, phreaking is more than just a hobby.  Some

of us can speak more telephonease than the average lineman.  Most

telephone company employees have no background education before they

start their training.  They make a choice to work for the telecom

industry, then they go to school, and then they get a job.  Because

phreakers have such a background on the telecom industry, they would

make valuable employees.  Most of you that are reading this are 

still in high school and you have a ton of people telling you

that you should think about your future.  Well they're right, you

should.  I suggest that some of you make your interest in the

telecom industry a long term thing.  Between what you know now and

what you will learn when you go for you're training, you could

go pretty far.  If any of you are interested, visit the URL's that

I have listed below.  Could you imagine what you could do if you

were a lineman????






Bell Atlantic-New Jersey
http://www.bell-atl.com/jobpost/
1-800-678-4796

Sprint
http://www.sprint.com/hr/index.html

AT&T
http://www.att.com/hr/

Bellcore
http://www.careermosaic.com/cm/bellcore/bellcore5.html

Bell Atlantic
http://www.bellatlantic.com/about/jobpost.htm

Lucent
http://www.lucent.com/work/work.html

MCI
http://www.mci.com/aboutus/company/career/index.shtml


GTE
http://www.gte.com/f/fhcar.html


Ameritech
http://data.ameritech.com/ame_emp/default.htf


Bellsouth
http://www.bellsouth.com/employment/


Pac Bell
http://www.sbc.com/Career-PB/


South western Bell
http://www.swbell.com/Career/Home.html


US West
http://www.uswest.com/share/employment/com/



also try carrer Mosaic
http://www.careermosaic.com/cm/cm1.html

























Paging systems extensions-Cybercow


	Have you ever been in a store or at you're school and 

wanted to talk over the intercom?  It is not impossible.  In fact 

it is easier then boxing.  

	First, lets talk a little bit about paging extensions.  A store 

and a school have different extensions to make life much easier on the 

workers, teachers, ect.  Every checkout stand has a phone, in 

some stores every isle, and one in most classrooms. The extensions 

start with 101 and go up.  There is one for every single phone.  They 

are not random but they are all grouped in some order.  At the 

bottom of this list is the paging extension. To get this, you only 

have to sneak a peak at the list they have posted everywhere. There 

are public copies too. They have all of the numbers but the last one, 

the one you want.  You are most likely to find those at schools. 

	Once you get the number, you don't want to call from the school 

or store because from a school they can track you easy as shit.  You were 

in the classroom without the teacher, it must be you and in the stores  

they have video cameras that are hidden everywhere.  Call from a pay-phone 

down the block and have a friend inside to listen. 

	Remember not to use your real voice because the teachers will 

turn you in, and it is funnier anyway. If you are calling a store ask for 

security. They will pick up and just tell them you are connected wrong, 

tell them the number to connect you to and they will do so.  The reason 

for this is they do nothing all day and don't know any of the ext. For 

a school call the office when school is in, you will probably get a 

student working.  If not call back every ten minutes until you do. 

When you get a kid, you will be surprised at how stupid your peers 

are. Wait until you hear an empty sound and you are on the air.




















Yet Another Phield Phreaking Kit-Lineside



	Another kit article? Well, actually I've only seen one other one, 

and it seemed kinda old, and I thought I would make a better and more 

comprehensive one.  Anyway, this is my "suggested" list of tools and 

equipment that should be brought along for a safe and enjoyable phield 

phreaking mission. Your mission may simply be a beige boxing expedition, 

or it may be a lineman impersonation mission. Which ever one you do, here 

is some stuff you may want to take along.



# = Lineman impersonation.

      
_________________________________________________________

Handset  :#* By now you really should know what this thing is, so I'm 

pretty sure you'll want to take it along. If you're gonna be a lineman, 

you really should have a REAL test-set. 


Can wrench  :#* Yep, I have forgotten to bring one of these before. The 

size you'll need is a 3/8" and a 7/16", although I have never needed the 

3/8" one before. It's usually for the smaller terminal boxes, and they're 

no fun. So go play with the big boys!


List o' numbers  :#* Before hand, right up a big list of numbers that 

you'll want to call. Include test numbers or anything else that may be 

useful. Even if you're unsure about taking one, do, because the call 

will be FREE after all.  Or you can just store them in your handset or 

tone dialer. While on this subject, bring along a clipboard for your 

list of numbers, if you're trying to be a lineman. It looks much more 

proffesional than a notebook. ** If you can afford one, get one of those 

digital recorders; they're perfect for remembering numbers that are 

written in the boxes. **


Beeper/ Cell fone  :# Even if it's not really hooked up, take it 

along and put it on your belt or somewhere where people will see it. If 

you're trying to look like a lineman, the more gadgets and stuff you have 

along, the more convincing you'll look. 


Hat/ Shirt :# Looking like a lineman means dressing like one. Wear a hat 

with some kind of company logo, and a denim or polo shirt. On some fone 

company sites, you can actually buy logo brand stuff. This is very 

useful, and sometimes not that expensive. And remember not to wear 

your big, baggy skater pants. Get some smaller ones from your brother 

or someone. 


<editors note:  Try to get shirts at a thrift shop.>


Scanner :#* Well, I've never really taken one along. It just seems too 

much to bother with. But I guess if you live in a small town, you can 

monitor the few police and Bell frequencies. Please send me some 

comments or stories you have, if you actually use a scanner while 

you're out.


Toner and Tracing Probe :# If you are confident in your lineman 

appearance, you can hook this up to someones line (not on the terminal 

end) and trace it back to the distribution box. This may be useful if 

you need to find the someones pair to monitor.


Modular adapter :#* You'll need this to hook up your butt-set to a 

regular fone plug, like those in the customer access interface boxes. 

But you shouldn't really use these cause it's pretty risky.


Flashlight :#* Take a guess why you'll need this.


Attaching cord :* Take a long piece of paired wires (available in 

telco boxes) and put some gator clips on the end, or the special 

hook-up clip. If you want to use a box, you can hook it up, and if 

you left the wire long enough, go sit in nearby bushes or another 

secluded spot.


Gloves :#* Well, if you're really scared about leaving fingerprints, 

go ahead and take them. And you really shouldn't be worried about 

getting shocked. Just don't stick your finger in any holes.


Tool Belt :# Actually, this one is really optional. They're kinda 

expensive, but are very convincing when used.


                                   
                              
                              _.x(Linenoise.Org)x._




















International Dialing Codes - American Anarchist

	To use these, first you would dial your International Access 

Code (011 in the US) and then the country code for the country you want.


	To find out the time difference between yourself and some other 

country subtract one time from the other. Note: Remember that daylight

saving times may affect the result.


<editor's note:  for those of you wondering what the point of this 
article is, if you do a lot of international beigeboxing or if you
deal with a lot of other countires, this is a handy list to print
out>


                                                  Hours difference from GMT 
  Country                  Int. Dialing Code      / Universal Standard Time
  -------------------------------------------------------------------------

  Afghanistan              93                     +4 1/2
  Albania                  355                    +1
  Algeria                  213                    +1
  Andorra                  376                    +1
  Angola                   244                    +1
  Anguilla                 1 809                  -4
  Antarctic Aus Territory  672                    +4 1/2 +10
  Antigua and Barbuda      1 809                  -4
  Antilles                 599                    -4
  Argentina                54                     -3
  Armenia                  374                    +4
  Aruba                    297                    -4
  Ascension Island         247                    0
  Australia                61                     +8 +10
  Austria                  43                     +1
  Azerbaijan               994                    +1
  Azores                   351                    -1
  Bahamas                  1809                   -5
  Bahrain                  973                    +3
  Bangladesh               890                    +6
  Barbados                 809                    -4
  Barundi                  257                    +2
  Belarus                  375                    +2
  Belgium                  32                     +1
  Belize                   501                    -6
  Belize                   229                    +1
  Bermuda                  1 809                  -4
  Bhutan                   975                    +6
  Bolivia                  591                    -4
  Bosnia Hercegovina       387                    +1
  Botswana                 267                    +2
  Brazil                   55                     -3
  Brunei Darussalam        673                    +8
  Bulgaria                 359                    +2
  Bukina Faso              226                    0
  Cambodia                 855                    +7
  Cameroon                 237                    +1
  Canada                   1                      -3 1/2 - 8
  Cape Verde Islands       238                    -1
  Cayman Islands           1 809                  -5
  Central African Republic 236                    +1
  Chad                     235                    1
  Chile                    56                     -4
  China                    86                     +8
  Christmas Island         672                    +7
  Cocos Island             672                    +6 1/2
  Columbia                 57                     -5
  Comoros                  269                    +3
  Congo                    242                    +1
  Cook Islands             682                    +10 1/2
  Costa Rica               506                    -6
  Cote d'Ivorie            225                    0
  Croatia                  385                    +1
  Cuba                     53                     -5
  Cyprus                   357                    +2
  Czech Republic           42                     +1
  Denmark                  45                     +1
  Djibouti                 253                    +3
  Dominica                 1 809                  -4
  Dominican Rebublic       1 809                  -4
  Ecuador                  593                    -5
  Egypt                    20                     +2
  El Salvador              503                    -6
  Equatorial Guinea        240                    +1
  Eritrea                  291                    +3
  Estonia                  372                    +2
  Ethiopia                 251                    +3
  Falkland Islands         500                    -4
  Faroe Islands            298                    0
  Fiji                     679                    +12
  Finland                  358                    +2
  France                   33                     +1
  French Guiana            594                    -3
  French Polynesia         689                    +10
  Gabon                    241                    +1
  Gambia                   220                    0
  Georgia                  7 & 995                +4
  Germany                  49                     +1
  Ghana                    233                    0
  Gibraltar                350                    +1
  Greece                   30                     +2
  Greenland                299                    -3
  Grenada                  1 809                  -4
  Guadeloupe               590                    -4
  Guam                     671                    -10
  Guatemala                502                    -6
  Guinea                   224                    0
  Guinea - Bissau          245                    0
  Guyana                   592                    -3
  Haiti                    509                    -5
  Honduras                 504                    -6
  Hong Kong                852                    +8
  Hungary                  36                     +1
  Iceland                  354                    0
  India                    91                     +5 1/2
  Indonesia                62                     +7 +8
  Iran                     98                     +3 1/2
  Iraq                     964                    +3
  Ireland Republic of      353                    0
  Israel                   972                    +2
  Italy                    39                     +1
  Ivory Coast              225                    0
  (see Cote d'Ivorie)
  Jamaica                  1 809                  -5
  Japan                    81                     +9
  Jordan                   962                    +2
  Kazakhstan               7                      +5 +6
  Kenya                    254                    +3
  Kirghizstan              7                      +3
  Kiribati                 686                    +12
  Korea (North)            850                    +9
  Korea (South)            82                     +9
  Kuwait                   965                    +3
  Laos                     856                    +7
  Latvia                   371                    +2
  Lebanon                  961                    +2
  Lesotho                  266                    +2
  Liberia                  231                    0
  Lybia                    218                    +1
  Lichtenstein             41 75                  +1
  Lithuania                370                    +2
  Luxembourg               352                    +1
  Macao                    853                    +8
  Macedonia                389                    +1
  Madagascar               261                    +3
  Malawi                   265                    +2
  Malaysia                 60                     +8
  Maldives                 960                    +5
  Mali                     223                    0
  Malta                    356                    +1
  Marshall Islands         692                    +12
  Martinique               596                    -4
  Mauritania               222                    0
  Mauritius                230                    +4
  Mayotte                  269                    +3
  Mexico                   52                     -6 - 8
  Micronesia               691                    +11
  Moldovia                 373                    +2
  Monaco                   33 93                  +1
  Mongolia                 976                    +8
  Montserrat               1 809                  -4
  Morocco                  212                    0
  Mozanbique               258                    +2
  Myanmar (Burma)          95                     +6 1/2
  Namibia                  264                    +2
  Nauru                    674                    -12
  Napal                    977                    +5 3/4
  Netherlands (Holland)    31                     +1
  Netherlands Antilles     599                    -4
  New Caledonia            687                    +11
  Nicaragua                505                    6
  Niger                    227                    +1
  Nigeria                  234                    +1
  Norway                   47                     +1
  Oman                     968                    +4
  Pakistan                 92                     +5
  Panama                   507                    -5
  Papua New Guinea         675                    +10
  Paraguay                 595                    -4
  Peru                     51                     -5
  Philippines              63                     +8
  Pitcain Island           649                    -8 1/2
  Poland                   48                     +1
  Portugal                 361                    +1
  Pueto Ricco              1 809                  -4
  Qatar                    974                    +3
  Romania                  40                     +2
  Russia                   7                      +2 1/2 +10
  Rwanda                   250                    +2
  St Helena                290                    0
  St Kitts and Nevis       1 809                  -4
  Samoa (USA)              685                    -11
  Samoa Western            685                    -11
  San Marino               378                    +1
  Saudi Arabia             966                    +3
  Senegal                  221                    0
  Seychelles               248                    +4
  Sierra Leone             232                    0
  Singapore                65                     +8
  Slovakia                 42                     +1
  Slovenia                 386                    +1
  Solom Islands            677                    -11
  Somalia                  252                    +3
  South Africa             27                     +2
  Spain                    34                     +1
  Sri Lanka                94                     +5 1/2
  Sudan                    249                    +2
  Surinam                  597                    +3
  Swaziland                268                    +2
  Sweden                   46                     +1
  Switzerland              41                     +1
  Syria                    963                    +2
  Taiwan                   886                    +8
  Tajikistan               7                      +5
  Tanzania                 255                    +3
  Thailand                 66                     +7
  Togo                     228                    0
  Tongo                    676                    -13
  Trinidad & Tobago        1 809                  -4
  Tunisia                  216                    +1
  Turkey                   90                     +2
  Turkmenistan             7                      +5
  Turks & Caicos           1 809                  -5
  Tuvalu                   688                    -12
  Uganda                   256                    +3
  Ukraine                  380                    +2
  United Arab Emirates     971                    +4
  United Kingdom           44                     0
  Uraguay                  598                    -3
  USA                      1                      -5 -11
  Uzbekistan               7                      +5 +6
  Vanuatu                  678                    -11
  Venezuela                58                     -4
  Vietnam                  84                     +7
  Virgin Islands (UK)      1 809 49               -4
  Virgin Islands (US)      1 809                  -4
  Yemen                    967                    +3
  Yugoslavia               381                    +1
  Zaire                    243                    +1
  Zambia                   260                    +2
  Zimbabwe                 263                    +2




















Busted-Mohawk





Two Calif. Teens Suspected of Breaking Into Government Computers
February 28 

     Law enforcement officials believe two teenage boys from a 

small town in Northern California were among a group of hackers 

who wormed their way into several U.S. government computer systems 

earlier this month, sources close to the investigation said yesterday.

	The high school sophomores, aged 16 and 17, and other members 

of the group are suspected of intruding into at least 11 sensitive 

computer systems at U.S. military installations and dozens of systems at 

other government facilities, including federal laboratories that perform

nuclear weapons research, the sources said.

	Although the computers contained only unclassified information, 

Deputy Defense Secretary John J. Hamre told reporters Wednesday the 

military intrusions constituted "the most organized and systematic 

attack" on U.S. networks discovered by American authorities and

thus aroused concern among officials worried about the possibility of 

electronic sabotage as a means of terrorism or warfare.

	Government officials said they are not yet sure of the 

group's motives, but fellow students speculated the two youths were 

in it for thrills.  Some law enforcement sources speculate that

the group may have been competing to enter different systems.

	Although the hackers are not believed to have seriously 

tampered with any of the systems they entered, they obtained powerful 

administrator privileges on some that could have let them

perform tasks including deleting files and reading passwords, 

sources said.


	FBI agents on Wednesday night raided the boys' homes, 

70 miles north of San Francisco at Cloverdale in the California wine 

country, catching one of them in the act of entering a Pentagon 

computer, the sources said. Agents confiscated the boys' computers 

but did not arrest them. The two were not identified.

	George Grotz, an FBI spokesman in San Francisco, confirmed 

that agents conducted searches at two residences in Sonoma County, which

encompasses Cloverdale, "based upon a computer intrusion case we are 

working on," but declined to elaborate. He said the agents seized "some

hardware, software and printers and other computer equipment."

	The timing of the intrusions, as the United States was 

stepping up deployments of troops and equipment to the Persian Gulf 

region, particularly concerned Pentagon officials.

	Four Navy and seven Air Force systems, at sites around the 

United States and Okinawa, are known to have been targeted. The systems 

perform largely logistical and administrative functions, but officials 

warned that tampering with even that data could potentially disrupt

military operations.

	The group also entered systems at several universities and 

federal research facilities, including the Oak Ridge National Laboratory, 

the Brookhaven National Laboratories, the University of California at 

Berkeley and the Massachusetts Institute of Technology's fusion labs, said

William G. Zane, owner of Netdex Internet Services Inc., a Santa Rosa, 

Calif.-based Internet service provider. Zane said his service was

intruded by the group and used as a launching pad for many of the attacks.

	The group's activities first were noticed by Zane in 

mid-January, when his staff discovered an intruder who had given 

himself administrator, or "root," privileges, he said. Zane said he

notified the FBI and the Computer Emergency Response Team at Carnegie 

Mellon University in Pittsburgh, which distributes computer security

alerts.

	Instead of kicking the hackers off his service, Zane said 

he consulted with the FBI and decided to install software that would 

monitor the group's activities, reports of which he said he provided 

to agents.

	"We decided to take a little risk," he said. "We let them 

play for a little while. We gave them enough rope and let them hang 

themselves."

	Zane said the hackers used another Internet service provider 

to connect to his computers. From his system, he said the group launched 

"hundreds of attacks."

	"We were seeing hundreds of [Internet] addresses that would 

go by that had been scanned and cracked," he said.

	One law enforcement source, however, said investigators have 

not yet been able to confirm the full scope of the group's intrusions. 

"We shouldn't jump to the conclusion that hundreds of computers were 

entered," the source said.

	Zane refused to say what tactics the hackers used to enter 

his system and others. "They had a very sophisticated set of [software] 

tools," he said.

	He said at least one of the hackers discovered last Saturday 

that the Netdex staff had been monitoring the group, resulting in a 

frantic scramble to copy the group's files for the FBI before the 

hacker deleted data on the computer in question.

	The two students are 10th graders at Cloverdale High School, 

a 450-student public school.  Gene Lile, the principal, said no federal 

or state authorities have yet notified the school of any wrongdoing, 

but the incident was the subject of almost every conversation throughout 

the school day yesterday.

	Students who know the two boys fiercely defended them, 

describing them as "just normal, everyday kids" who have a strong 

interest in computers. "They were just doing it for the thrill

of getting in. I know them well enough to know that they wouldn't do 

anything purposefully wrong," said Lissa Tryer, another 10th grader.

	"It makes me mad. They're not twisted. These are just two 

nice guys," said another girl, who declined to give her name.

	Joe Simao, a senior at Cloverdale, said he wasn't surprised to 

hear of the hacking incident.  Simao said he helped one of the teens 

set up a computer operating system called Linux, which is based on 

Unix, a widely used operating system on the Internet. "They started 

to get into hacking lately," Simao said. "I heard [one of the teens] 

say, 'Yeah, I've hacked into MIT and UC Berkeley.' "

	Simao said he believes the pair did not have the expertise 

to invent new techniques for breaking into systems, but said they 

had become frequent users of sites on the Internet where hackers

post descriptions of how to break into computer networks. "It's like 

some want to drive fast cars; others want to use drugs; and some want 

to hack," Simao said.

	John Hudspeth, who teaches technology at Cloverdale and 

oversees a lab with 40 desktop computers, said that both boys have 

a sincere interest in technology. "They're good kids who have 

helped me out quite a bit," he said. "They've put a lot of time into 

helping set up the systems in this lab."

	But Zane contended the attacks should not be minimized. 

"This was a massive set of intrusions," he said. "You don't need 

to crack 11 machines to brag that you've entered the Pentagon."






Suspected NASA Hacker Arrested

The suspected leader of a group of computer hackers who broke into the

network of a NASA laboratory has been arrested, agency officials said 

Wednesday. 


In addition to its own computer system, NASA investigators believe 

Calldan Levi Coffman, 20, of Carson, Wash., also infiltrated the networks 

of various corporations, universities and other government agencies. 

Coffman is the suspected leader of the group "ViRii." NASA officials

started looking into the group last June when security officials at its 

Jet Propulsion Laboratory in Pasadena, Calif., detected a problem with 

the computer system. 

An investigation determined the system was being controlled by intruders 

using the network to help break into other systems targeted by ViRii

targets, NASA said. 

The agency initially investigated suspects other than Coffman, including 

an Israeli teen known as "The Analyzer." The 18-year-old was placed

under house arrest Wednesday in Jerusalem after being accused of 

infiltrating the Pentagon's computer system. 






Israel Cops Arrest Computer Hacker

An Israeli teen-ager accused of infiltrating the Pentagon computer 

system and others in Israel was questioned Wednesday and placed under 

house arrest, Israeli police said. 

The suspect, who calls himself "The Analyzer," and two accomplices, 

all 18, told police they had not penetrated the systems for personal 

gain, police spokeswoman Linda Menuhin said. No charges have been

brought so far against any of the three, whose identities were not 

released by Israeli authorities. 

In Washington, the Justice Department identified the arrested hacker 

as Ehud Tenebaum. 

"This arrest should send a message to would-be computer hackers all 

over the world that the United States will treat computer intrusions 

as serious crimes," said Attorney General Janet Reno. 

The suspects were questioned for several hours at a police station in 

Bat Yam, a southern suburb of Tel Aviv, then put under house arrest, 

Menuhin said. Police confiscated their passports and forbade any contact 

between them. 

"They are all cooperating with the police," Menuhin said, adding that

their parents had also been brought to the station but were not questioned. 


She had no details on what Israeli systems were involved, but Channel

2 TV identified one as the computer system of Israel's parliament, the

Knesset. 

"The Analyzer" is suspected of being the mentor of two California

teen-agers who have been questioned by the FBI in connection with 

hacking into the Pentagon's computer system and university research

computers. 

The Pentagon has said the intrusions appeared to have been aimed at 

systems that contained unclassified personnel and payroll records. A 

spokesman described the Israeli hacker's work as the most organized 

and systematic attack the Pentagon has seen to date. 

"The Analyzer" and the two teens from Cloverdale, Calif., 

apparently penetrated computers in February using a weakness that 

already had been identified by computer security teams. 

In an interview with the Internet magazine AntiOnline before he was 

caught, "The Analyzer" said the penetrations were innocent and 

claimed that he even helped the targets by patching any weaknesses 

he found. 

The first report on "The Analyzer's" work came Feb. 3 from the 

Massachusetts Institute of Technology's plasma energy lab. Break-ins 

were then reported at a series of military locations, including the 

Naval Undersea Warfare Center, as well as at other universities and NASA. 

Menuhin said two police units dealing in fraud and computer protection 

would continue the investigation against the three








Teen Charged With Computer Hacking

Sending a warning to young computer hackers, federal prosecutors 

charged a teen-age boy with shutting down an airport communications system.
 
The U.S. Department of Justice said Wednesday the Massachusetts boy, 

whose name was not released, has agreed to plead guilty and faces two 

years probation, a fine and community service. 

The teen is the first juvenile charged in federal court with computer

hacking, officials said. 

The boy broke into a Bell Atlantic computer system on March 10, 1997, 

stalling communication between the control tower and aircraft at 

Worcester Airport for six hours, authorities said. No accidents occurred. 

"These are not pranks, this is not like throwing spitballs at your 

teacher," U.S. Attorney Donald Stern said. "Hackers should know that 

they will be caught and they will be prosecuted." 

The teen-ager was charged with juvenile delinquency, the umbrella charge 

that relates to all crimes committed by juveniles. In adult cases, the 

charge is called intentionally accessing protected computers. 

"We dodged a bullet that day," said Joseph Hogan, area manager for 

Robinson van Vuren, a company contracted by the Federal Aviation

Administration to operate air traffic control towers in New England. 

When the teen-ager used his computer to break into the phone company

computers, the system crashed, power was lost at the control tower 

and phone service was shut off to 600 houses in Rutland, a central 

Massachusetts community outside of Worcester. 

















Letters


From:  Fx

Hi, I have been reading OCPP since issue 1 and now I come to issue 7 

and I must say, good job lads.  I am sure people could debate this but 

I must say that this magazine is the best of it's kind.  Articles are 

well written and the knowledge of current events your mag displays are 

unparelled. Keep up the good work. 



<Thanks!  These are the letters that keep us going.  When I first

started this zine I never thought people would be telling us that

we are the best.>








From:  Justin

Hey..

   I just wanted to congratulate you on a job well done. I truly 

enjoyed reading the latest issue of your zine! Personally, I can't 

wait until the Project Angel goes mainstream all across the country... 

Just think of the phreak possibilites... Already phreaks are cloning 

cells phones... now we can clone houses! Or intercept all three lines 

being transmitted from a house... the 2 voice and the data line... The 

future is going to be a fun place for people like us. If there is 

anything that you need help with, and projects or whatever, just let 

me know. I am always willing to lend a helping hand.



<Yeah the future is going to be cool, only if we keep up with it that

is.  Alot of us still dwell on old stuff like boxes.  We need to 

keep up with new technology and follow it every step of the way.

If we don't, everything is going to change and we're going to

be left here with nothing to phreak.  But that's what we're here

for.  Like we did with project angel, we will keep you up to date

with all the latest technology.  Speaking of project angel, it seems

that it is still in it's testing phase.  I have sifted through the 

mounds of information on AT&T's website and I have found some

references to project angel.  They don't mention anything about it.

All they mention is that AT&T is working on a fixed wireless

local telephone system.  Like I said before, they will probably

keep this under wraps until the local telephone market fully opens

up.>





From:  Hyperbox


RedBox Problems & Some Solutions

Red boxing with tone dialers, digital recorders or what ever your 

preference, still works in many areas.  It doesn't work on the newer 

fones with muted mouth peices and phones where you can adjust the volume 

with that button thing.


To check if the phone is muted simply blow in the reciever if you hear it 

in the ear piece it's all good, box away... if not, move on.  And you 

know those "unboxable COCOTS"  well, they're not unboxable... instead of 

replacing the crystal in the tone dialer with a 6.5mhz (6.5900mhz) 

crystal, replace it with a 6.3mhz... (refer to redbox plans if you 

don't know what I'm talking about) This will also work with bell phones.
     
                                                         
<This was sent to me to be placed in the alt.phreaking FAQ.  Since the

FAQ is being rebuilt from the ground up this might not be included.

So I put this in the letter section.  If you would like a little 

mini-article type deal to be put here just send them in.>





From:  Some ignorant child

Look please do a little more research before you post innacurate

infomration pertaining to newsgroups. Most NG like these have enough

problmes with misinformed newbies without your help. See below.


> 
> 18.  I need 31337 warez d00dz
> 
> Wrong news group.  Try alt.2600, they are crawling with warez lists.
> 

Yes that is true, but that doesn't mean that's what 2600 is for. Just

because a NG gets spammed a lot doesn't mean that it is for spam. It is a

problem that many have been dealing with in their own ways and between us

the spam is getting slowly cleaned up.

> alt.2600                  - Filled with warez d00dz
> 
> alt.2600.phreakz          - Still more warez

Another instance of that same thing...

> alt.hackers               - Hacking 

That all depends on your definition of a hacker. alt.hackers is for

hackers, but it is for the other _kind_ of hacker. In this case it's for

people who use existing technology (most of the time basic things like

bowls, CDs, tape etc.) to solve problmes. It's kind of hard to explain,

read the NG for a couple of days, it's fairly low traffic so that won't be

hard. There are the occasional "teach me to hack" posts, but those are

generally from clueless newbies who did a search for the word hacker and

found that. What you may be thinking of is alt.hacker, the S makes a big

difference.


< (This is a letter that some stupid kid sent me after we released

the new version of the FAQ.)  It's a friggin newsgroup, it's not the 

end of the world.  Why don't you look.  If you read the FAQ you would 

see that the FAQ is written by many authors, not me.  I edit and 

maintain the FAQ.  Besides we are intitled to our opinion.  If

you don't like something in the FAQ, ask us to change it.  We 

are more than happy to get feedback on the FAQ.  If you have 

a serious problem with it, than don't come to the newsgroup then.>  
















News




Hacker crashes thousands of Windows computers
March 4

An unknown hacker caused thousands of Windows-based university and 
government computers to crash on the eve of Senate testimony by 
Microsoft Corp. Chairman Bill Gates, authorities said Wednesday. 

The Monday night attack affected nine of the National Aeronautics and 
Space Administration's 10 major field offices as well and major 
universities, including the Massachusetts Institute of Technology 
(MIT) and the University of California at Berkeley. 

"Basically, what happened is it locked the system," said Mike Mewhinney, 
a spokesman for the space agency's Ames Research Center near Mountain 
View, Calif. "Obviously, it was something we were concerned about, and 
we stepped in to address it as soon as we learned about it." 

While the attack did not cause any significant loss of data, users 
were confronted with the so-called "blue screen of death," which 
appears with an error message when Windows crashes. The only solution 
was to restart the computer. 

Jeffrey Schiller, network manager at MIT, said the malicious hacker 
exploited a bug in the Windows 95 and Windows NT operating systems 
known "Boink,"  "Teardrop II" or  "New Tear." 

At MIT, the attacker obtained a list of all computers connected to 
the Internet and then sent specific data packets calculated to 
overload the computers, causing a "denial of service." 

The only computers not affected were those that had installed 
Microsoft-supplied patches or were running other operating systems, 
such as Apple Computer Macintosh units. 

Microsoft issued a statement on the Internet saying the vulnerability 
was "not a new issue" and recommending customers install patches -- 
software fixes -- available on its Web site. 

While there were no clues as to the identity of the attacker, victims 
pointed out it came just hours before Gates' testimony before the Senate 
Judiciary Committee, where he defended the company against charges that 
it improperly exploits its vast market power. 

MIT's Schiller, an expert in Internet security, said the incident 
underscores the vulnerability of networked computers to hostile attacks. 

"What you're dealing with here is someone who is actively trying to 
find a way to make your program misbehave," Schiller said. "To me 
the Internet is a hostile place, and we have to build our programs 
to deal with that."






Pentagon Has Computers Hacked

They were computer clicks away from plunging the nation into darkness 
or interfering with the military's U.S. Pacific Command. Instead, they 
broke into Pentagon and civilian computers, declared cybervictory and 
signed off. 

Fortunately these hackers harbored no evil intentions: They were a 
U.S. national security team secretly testing the vulnerability of the 
nation's computer system using software found on the Internet. 

Code-named "Eligible Receiver," the cyberwar game proved what the 
Defense Department said it has long known - that its computers are 
susceptible targets, which became clear earlier this year when real 
hackers made a "systematic attack." 

"Eligible Receiver, I think, has succeeded beyond its planners' wildest 
dreams in elevating the awareness of threats to our computer systems," 
Pentagon spokesman Ken Bacon told reporters Thursday. 

In last June's cyberwar game aimed at the Pentagon's unclassified 
computers, more than 50 National Security Agency hackers gained access 
to systems across the country, including the U.S. Pacific Command in 
Hawaii, which oversees 100,000 troops in Asia. Classified computer 
systems were not tested, Bacon said. 

The hackers gained access to a U.S. electric power grid they could 
have sabotaged to plunge the nation into darkness as well - something 
Pentagon officials say would likely be a tactic of any real cyberwar 
aimed at shutting down public works. 

Some hackers posed as operatives for North Korea and only one unit was 
tracked by the FBI, which works with the Pentagon to catch computer 
criminals. 

"It found that we have a lot of work to do to provide better security," 
Bacon said of the cyberwar game. "We're not alone in this regard." 

The Pentagon plans to spend nearly $1 billion a year for the next 
several years to improve its classified and unclassified computer 
security, Bacon said. The department has 2.1 million computers. 

Deputy Defense Secretary John Hamre is leading a stepped-up 
anti-hacker program that includes a counterintelligence effort to 
stop intruders before they get through the electronic door, the 
Pentagon said. 

In the most recent case of real Pentagon hacking, a teen-ager in Israel, 
nicknamed, "The Analyzer" on the Internet, is being investigated by the 
Israeli police for his assault on Defense Department and other computer 
systems earlier this year. 

In February, Hamre said the Pentagon's unclassified computers were 
hit by the "most organized and systematic attack" to date, targeting 
mostly personnel records. 

He said intrusions had "all the appearances of a game'' and had 
"the quality of voyeurism or vandalism" committed by a small number of 
individuals. 

"There are hackers that enjoy breaking into people's computers, just 
to see what they can see,'' he said, adding the Pentagon holds some 
"mystique." 

Bacon joked that perhaps the military should look at home for answers. 

"We're trying to do a much better job of staying in touch with our 
teen-age children and others to learn the latest hacker techniques 
so we can be one step ahead of them rather than several steps behind," 
he said. 










Israeli Hacker Featured in Ad

The FBI may be furious with him, but in Israel he's a sales icon. 

Ehud Tenenbaum, the Israeli teenager who hacked into the Pentagon's 
computer system, was featured Tuesday in a full-page computer ad in 
the Yediot Ahronot newspaper. 

The clean-cut, dark-eyed 18-year-old gazes out at the reader, chin 
on hand, next to the slogan: "To go far, you need the best equipment." 

The ad is selling Newron computers, made by the Israeli company EIM. 

Tenenbaum, who used the name "The Analyzer" on the Internet, is being 
investigated by the Israeli police for his cyber-assault on the Pentagon 
and other computer systems. He has not been charged. 

The FBI has said he confessed to the intrusions. 

"At first we had our doubts about the ethics of using his image in 
the ad," said Yoram Klein, managing director of EIM. "But we found that 
he is a most positive young man. He made a mistake, but that could happen 
to any teenager." 

In return for appearing in the ad, Tenenbaum received EIM's latest 
model computer, the Newron Play Station, which sells for about $2,000. 
Tenenbaum's own computer was confiscated by Israeli police. 

Tenenbaum has said he broke into the Pentagon's computer to expose 
the weakness in its protective systems. He said he liked to search the 
Internet for neo-Nazi, pedophile or anti-Israel web sites and destroy them. 

Since he was exposed last month, he has been flooded with offers for 
books and movie deals. 

Tenenbaum was drafted into the Israeli army last week. When he 
finishes his army service, EIM intends to offer him a job, Klein told 
The Associated Press. 

"His knowledge of computers is staggering," he said. "He has 
enormous energy, and the important thing is to direct it into positive 
channels." 

 
<editor's note:  I hope they throw the book at this sellout>





Mounties nab suspect after hacker breaches NASA site
April 6 


A 22-year-old Canadian man suspected of breaking into a NASA Web site 
and causing tens of thousands of dollars in damage has been arrested by 
Canadian Mounties.  

The Royal Canadian Mounted Police in the northern Ontario city of 
Sudbury charged Jason Mewhiney with mischief, illegal entry, and 
willfully obstructing, interrupting and interfering with the lawful use 
of data, Corporal Alain Charbot told Reuters on Monday. 

Charbot said the unemployed former part-time computer science student 
was "very knowledgeable" when it came to computer systems. Mewhiney was 
arrested on April 1. 

Canadian police were tipped off 14 months ago by FBI agents in 
Washington, who were investigating security breaches into computer 
systems at NASA, the U.S. air and space center. 

More than $70,000 worth of damage was caused at the NASA web site and 
officials were forced to rebuild the site and change security, Charbot 
said. The FBI tracked the hacker by tracing telephone numbers to the 
Sudbury area. 

The Mounties raided the homes of Mewhiney's divorced parents and seized 
an ancient computer, a second basic computer, a high-speed modem, 
diskettes, and documents. 

Charbot said police were still investigating breaks at several Canadian 
college and university sites. 

The number of charges has not yet been released but for each count 
there is a maximum penalty of one year in jail and fines of thousands 
of dollars, Charbot said. 

Most hackers get a kick out of breaching sites, considering it a 
triumph worth boasting about to other hackers. 

And the probable fate of a hacker, once released from police custody? A 
cushy job at a corporation, doing the same type of work -- but only with 
the permission of web site builders, Charbot said. 







Computer Hackers on the Offensive After the Hacker Analyzer is 
arrested in Israel; Multiple Government and Corporate Web Sites 
Under Massive Retailiatory Cyber-Attack! International Cyber-Terrorism 
Raising Its Specter in This Full-Fledged Assault Upon the Internet

March 24 

Ian A. Murphy, Pres. of IAM/Secure Data Systems, Inc., today issued 
a terse warning to the Systems owners connected to the Internet:  

After the recent arrest of the "Pentagon Hackers" in the US and Israel, 
certain cyber-terroristic factions of the computer underground have taken 
an active offensive role in the defense of the arrested hackers.  The 
Underground Hacker group known as the Enforcers have undertaken a massive 
assault upon the Internet and Information Systems worldwide. 

Corporate and Govt. web sites have been attacked and defaced in 
such a manner, that no system should be left without full security 
procedures and policies firmly in place.  Internet sites that have 
been attacked can be found on a listing at the web site 
www.antionline.com.  This current example of cyber-terrorism will 
continue to excalate in the near future and is showing just how 
vulnerable we all are to these types of Cyber-Terroristic attacks. 

These Cyber-Terrorists, only armed with average desk-top computers 
and connections to the Internet, have shown that any system connected 
to the Internet may fall prey to these intrusions.  Call it the 
Cyber-version of a home intrusion and you get a better idea. 

These attacks offer a unique view of the power of the Internet to 
reach out and touch all lives in many manners yet unseen by the 
general population. In addition, such blatant attacks only serve to 
underscore the complete lack of overall Information Security provided 
to these systems that contain all of our Personal, Business, Medical, 
Insurance, Criminal & Educational Information. 

Without the complete and total assurance of such systems, we can never 
be safe from such assaults upon our lives, our incomes and our National 
Security. This glowing example should be a warning to all that use and 
depend upon the Internet for Commerce, Research and Entertainment. 



<editors note:  Threaten the government, yeah real cool.  It's stupid
bastards like this that give hackers/phreaks a bad name.  Get a 
friggin life.>






The Enforcers Hackers Group Enters Into Cyberspace Agreement
March 27 

Infowar.Com was notified today by the "Enforcers" Computer Hackers 
Group, that an agreement was reached with chief negotiator Ian A. Murphy, 
aka Capt. Zap, to cease and desist their cyber destruction witnessed in 
the recent attacks and intrusions that have rocked the Internet in past 
weeks.  The Enforcers began their massive assault on corporate and 
military websites after the arrest of "Pentagon Hackers" here in the 
US and Israel. 

Ian Murphy, CEO of IAM/Secure Data Systems, and the first US hacker 
arrested back in 1981, issued press releases during negotiations which 
are captioned below.  Murphy began the process to begin deliberations 
out of a sense of duty.  Murphy's dialogue with members of the Enforcer 
group pointed to the fact that the destruction was counter productive.  
He urged the group to consider halting this activity.  "The destruction 
of information systems for an alleged cause is not the way to go about 
such things in defense of Hackers and Crackers." 

Murphy has been pontificating for years that the government and 
corporate entities need to take the powers and strength of hackers 
seriously.  With the attacks and intrusions on the rise, and information 
losses at an all time high, Murphy added, "It is high time that the 
alleged powers that be in information security bow to the wonderment 
of the hackers and their alleged silent, awesome power.  It is time 
that we as a society realize that one individual is equal to an entire 
armed nuclear offensive force and is able to bring about global chaos 
if they choose to, from a simple computer keyboard. It strikes me as 
being so simplistic and yet so invasive of all society that such things 
may occur.  And we have become so dependent and enamored with -- and our 
society so rests upon -- our silicon lives and slaves.  We have become 
the servants of our own information society and still do not see the 
reality of the situation at hand." 

The Enforcers defended their activities with claims that they were 
calling attention to system administrators to wake up and 'fix' their 
system flaws. 

Statement Of The Enforcers   

"We, the Enforcers, have decided that it would be in the best interest 
of the hacking community and the security community at large to cease 
and desist all web site hacking of external businesses as advised 
by Mr. Ian Murphy (Captain Zap).  We agree that our actions are not 
productive and are doing more harm than good towards the security 
community.  Therefore, as an agent of the Enforcers, I hereby state 
that all web site hacks on external sites will be immediately halted.  
We feel that there will be other avenues opening to achieve our goal 
of a substantial reduction in child pornography and racist web sites 
and netizens.  We also support the larger goals of the hacker community 
and in the future we will work to augment the public's view rather than 
detract from it.  All members of Enforcers who hacked the web sites have 
agreed to this release and will stop hacking external web sites." 


"We thank you for your time and assistance in this matter." 

Paralyse, Immunity, and DooM   

Members of the EnforcerS   

http://www.zicada.co.nz/enforcers   

E-Mail:  enforcers.webmaster@zicada.co.nz  

Infowar.Com congratulates both Mr. Murphy and the Enforcers for 
their diligence in reaching this agreement that stands to make a 
statement on the Internet.  This is a model of an act of peace in 
our cyberworld. 

We hope other hacker groups will have the maturity to follow example. 

<editors note:  It's about goddamn time someone woke up.>
  










The OCPP is a free publication.  Copyright 1997, 1998.  All 
information in this issue is property of the Ocean County Phone Punx.
Nothing may be copied or reproduced.  Our staff and our ISPs are not 
responsible for your actions.  What you do with this information is
up to you.