GENWiki

Premier IT Outsourcing and Support Services within the UK

User Tools

Site Tools


archive:bbs:bob-2.man
Private Sector Bust: By - Shooting Shark : 
The following article appeared in the August, 1985
     On July 12, 1985, law enforcement officials seized the Private
Sector BBS, the official computer bulletin board of 2600 magazine,
for "complicity in computer theft," under the newly passed, and yet
untested, New Jersey Statute 2C:20-25.  Police had uncovered in	
April a credit carding ring operated around a Middlesex County
electronic bulletin board, and from  there investigated other North
Jersey bulletin boards.  Not understanding subject matter of the
Private Sector BBS, police assumed that the sysop was  involved in	
illegal activities.  Six other computers were also seized in this
investigation, including those of Store Manager [perhaps they mean
Swap Shop Manager? - Shark] who ran a BBS of his own, Beowolf, Red
Barchetta, the Vampire, NJ Hack Shack, sysop of the NJ Hack Shack
BBS, and that of the sysop of the Treasure Chest BBS. Immediately
after this action, members of 2600 contacted the media, who were
completely unaware of any of the raids.  They began to bombard the	
Middlesex County Prosecutor's Office with questions and a press
conference  was announced for July 16.  The system operator of the
Private Sector BBS attempted to attend along with reporters from
2600.  They were effectively  thrown off the premises.  Threats
were made to charge them with trespassing and other crimes.  An
officer who had at first received them civilly was  threatened with
the loss of his job if he didn't get them removed promptly.  Then
the car was chased out of the parking lot.  Perhaps prosecutor Alan
Rockoff was afraid that he presence of some technically literate
reporters would ruin the effect of his press release on the public.
As it happens, he didn't need our help. The next day the details of
the press conference were reported to the public by the press.  As
Rockoff intended, paranoia about hackers ran rampant. Headlines got
as ridiculous as hackers ordering tank parts by telephone from TRW 
and moving satellites with their home computers in order to make 
free phone calls.  These and even more exotic stories were reported 
by otherwise respectable media sources. The news conference  
understandably made the front page of most of the major newspapers 
in the US, and was a major news item as far away as Australia and in 
the United Kingdom due to the sensationalism of the claims.  We will 
try to explain why these claims may have been made in this issue. On 
July 18 the operator of The Private Sector was formally charged with
"computer conspiracy" under the above law, and released in the 
custody of his parents.  The next day the American Civil Liberties 
Union took over his defense.  The ACLU commented that it would be 
very hard for Rockoff to prove a conspiracy just "because the same 
information, construed by the prosecutor to be illegal, appears on 
two bulletin boards." especially as Rockoff admitted that "he did 
not believe any of the defendants knew each other."  The ACLU believes 
that the system operator's rights were violated, as he was assumed 
to be involved in an illegal activity just because of other people 
  1. 70 -
under investigation who happened to have posted messages on his
board. In another statement which seems to confirm Rockoff's belief
in guilt by association, he announced the  next day that "630
people were being investigated to determine if any used their
computer equipment fraudulently."  We believe this is only the user
list of the NJ Hack Shack, so the actual list of those to be
investigated may turn out to be almost 5 times that.  The sheer
overwhelming difficulty of this task may kill this investigation,
especially as they find that many hackers simply leave false
information.  Computer hobbyists all across the country have 
already been called by the Bound Brook, New Jersey 	office of the 
FBI.  They reported that the FBI agents used scare 	tactics in order 
to force confessions or to provoke them into turning in others.  We 
would like to remind those who get called that there is nothing 
inherently wrong or illegal in calling any ANY BBS, nor in talking 
about ANY activity.  The FBI would not comment on the case as it is 
an "ongoing investigation" and in the hands of the local prosecutor.  
They will soon find that many on the Private Sector BBS's user list 
are data processing managers, telecommunications security people, 
and others who are interested in the subject of the BBS, hardly the 
underground community of computer criminals depicted at the news 
conference.  The Private Sector BBS was a completely open BBS, and 
police and security people were even invited on in order to participate.
The BBS was far from  the "elite" type of underground telecom boards
that Rockoff attempted to portray. Within two days, Rockoff took
back almost all of the statements he had made at the news
conference, as AT&T and the DoD [Department of Defense - Shark]
discounted the claims he had made.  He was understandably unable to
find real proof of Private Sector's alleged illegal activity, and
was faced with having to return the computer equipment with nothing
to show for his effort. Rockoff panicked, and on July 31, the
system operator had a new charge against him, "wiring up his
computer as a blue box."  Apparently this was referring to his
Novation Applecat modem which is capable of generating any hertz
tone over the phone line.  By this stretch of imagination an
Applecat could produce a 2600 hertz tone as well as the MF which is
necessary for "blue boxing." However, each and every other owner of
an Applecat or any other modem that can generate its own tones
therefore has also "wired up his computer as a blue box" by merely
installing the modem. This charge is so ridiculous that Rockoff
probably will never bother to press it.  However, the wording of
WIRING UP THE COMPUTER gives rockoff an excuse to continue to hold
onto the computer longer in his futile search for illegal activity.
"We have requested that the prosecutors give us more specific
information," said Arthur Miller, the lawyer for The Private
Sector. "The charges are so vague that we can't really present a
case at this point." Miller will appear in court on August 16 to
obtain this information.  He is also issuing a demand for the
return of the equipment and, if the prosecutors don't cooperate,
will commence court proceedings against them.  "They haven't
been particularly cooperative," he said. 
  1. 71 -
	Rockoff probably will soon reconsider taking Private Sector's
case to court, as he will have to admit he just didn't know what he
was doing when he seized the BBS.  The arrest warrant listed only
"computer conspiracy" against Private Sector, which is much more
difficult to prosecute than the multitude of charges against some 
of the other defendants, which include credit card fraud, toll 
fraud, the unauthorized entry into computers, and numerous others. 
Both Rockoff and the ACLU mentioned the Supreme Court in their 
press releases, but he will assuredly take one of his stronger 
cases to test the new New Jersey computer crime law.  by seizing 
the BBS just because of supposed activities discussed on it, 
Rockoff raises constitutional questions.  Darrell Paster, a 
lawyer who centers much of his work on computer crime, says 
the New Jersey case is "just another example of local law 
enforcement getting on the bandwagon of crime that has come into 
vogue to prosecute, and they have proceeded with very little 
technical understanding, and in the process they have abused many 
people's constitutional rights.  What we have developing is a mini 
witch hunt which is analogous to some of the arrests at day care 
centers, where they sweep in and arrest everybody, ruin reputations, 
and then find that there is only one or two guilty parties."  We feel 
that law enforcement, not understanding the information on the BBS,
decided to strike first and ask  questions later. 2600 magazine and
the sysops of the Private Sector BBS stand fully behind the system
operator.  As soon as the equipment is returned, the BBS will go
back up.  We ask all our readers to do their utmost to support us
in our efforts, and to educate as many of the public as possible
that a hacker is not a computer criminal.  We are all
convinced of our sysop's innocence, and await Rockoff's dropping of
the charges. 
NOTE:  Readers will notice that our reporting of the events are
quite different than those presented in the media and by the
Middlesex County Prosecutor.  We can only remind you that we are
much closer to the events at hand than the media is, and that we
are much more technologically literate than the Middlesex County
Prosecutor's Office.  The Middlesex County Prosecutor has already
taken back many of his statements, after the contentions were
disproven by AT&T and the DoD.  One problem is that the media and
the police tend to treat the seven cases as one case, thus the
charges against and activities of some of the hackers has been 
  1. 72 -
Phreaking AT&T Cards: By - Net Runner
    My topic will deal with using an AT&T calling card for
automated calls. Ok to place a call with an AT&T card, lift the
handset (PAY PHONE) hit (0) and the desired area code and the 
number to call. Also when calling the same number that the card is
being billed to you enter the phone number and at  the tone only
enter the last four digits on the card. But we don't want  to do
that now, do we. If additional calls are wanted all you do is hit
the (#) and you will get a new dial tone! After you hit (#) you do
not have to  re-enter the calling card number  simply enter your
desired number and it will connect you. If the number you called is
busy just keep hitting (#) and the number to be called until you
connect! Ok to calL the U.S. of a from another country, you use the
exact same format as described above! Ok now I will describe the
procedure for placing calls to a foreign country, such as
CANADA,RUSSIA,SOUTH AMERICA, etc.. Ok first lift the handset then
enter (01) + the country code + the city code + the local telephone
number. Ok after you get the tone enter the AT&T calling card
number. Ok if you can not dial operator assisted calls from your
area don't worry just jingle the operator and she will handle your
call, don't worry she can't see you! The international number on
the AT&T calling card is used for calling the US of A from places
like RUSSIA, CHINA you never know when you might get stuck in a
country like those and you have no money to make a call! The
international operator will be able to tell you if they honor the
AT&T calling card. Well I hope that this has straightened out some
of your problems on the use of an AT&T calling card! All you have
to remember is that weather you are placing the call or the
operator, be careful and never use the calling card from your home
phone!! That is a BIG NO NO.. Also AT&T has came out with a new
thing called (NEW CARD CALLER SERVICE) they say that it was
designed to meet the public's needs! These phones will be popping
up in many place such as airport terminals, hotels, etc... What the
new card caller service is, is a new type of phone that has a 
(CRT) screen that will talk to you in a language of your choice.
The  service works something like this, when you find a (NEW CARD
CALLER PHONE), all you do is follow the instructions on the (CRT)
screen, then you insert the (NEW CARD CALLER CARD) and there is a
strip of magnetic tape on the card  which reads the number, thus no
one can hear you saying your number or if there were a bug in the
phone,no touch tones will be heard!! You can also bill the call to
a third party. that is  one that I am not totally clear on yet! The
phone is supposed to tell you how it can be done. That is after you 
have inserted your card and lifted the receiver!
  1. 73 -

BASIC TELECOMMUNICATIONS: By - < Net Runner >

CN/A:
  	CN/A, WHICH STANDS FOR CUSTOMER NAME AND ADDRESS, ARE BUREAUS
THAT EXIST SO THAT AUTHORIZED BELL EMPLOYEES CAN FIND OUT THE NAME
AND ADDRESS OF ANY CUSTOMER IN THE BELL SYSTEM.  ALL #'S ARE
MAINTAINED ON FILE INCLUDING UNLISTED #'S.
HERE'S HOW IT WORKS:
1) YOU HAVE A # AND YOU WANT TO FIND OUT WHO OWNS IT, E.G. (914)
555-1234.
2) YOU LOOK UP THE CN/A # FOR THAT NPA IN THE LIST BELOW.  IN THE
EXAMPLE, THE NPA IS 914 AND THE CN/A# IS 518-471-8111.
3) YOU THEN CALL UP THE CN/A # (DURING BUSINESS HOURS) AND SAY
SOMETHING LIKE, "HI, THIS IS JOHN JONES FROM THE RESIDENTIAL
SERVICE CENTER IN MIAMI. CAN I HAVE THE CUSTOMER'S NAME AT
914-555-1234.  THAT # IS 914-555-1234." MAKE UP YOUR OWN REAL
SOUNDING NAME, THOUGH.
4) IF YOU SOUND NATURAL & CHEERY, THE OPERATOR WILL ASK NO
QUESTIONS.
HERE'S THE LIST:
                    NPA     CN/A #       NPA     CN/A #
                  ---  ------------    ---  ------------
                  201  201-676-7070    517  313-232-8690
                  202  202-384-9620    518  518-471-8111
                  203  203-789-6800    519  416-487-3641
                  204  ****N/A*****    601  601-961-0877
                  205  205-988-7000    602  303-232-2300
                  206  206-382-8000    603  617-787-2750
                  207  617-787-2750    604  604-432-2996
                  208  303-232-2300    605  402-345-0600
                  209  415-546-1341    606  502-583-2861
                  212  518-471-8111    607  518-471-8111
                  213  213-501-4144    608  414-424-5690
                  214  214-948-5731    609  201-676-7070
                  215  412-633-5600    612  402-345-0600
                  216  614-464-2345    613  416-487-3641
                  217  217-525-7000    614  614-464-2345
                  218  402-345-0600    615  615-373-5791
                  219  317-265-7027    616  313-223-8690
                  301  301-534-11??    617  617-787-2750
                  302  412-633-5600    618  217-525-7000
                  303  303-232-2300    701  402-345-0600
  1. 74 -
                  304  304-344-8041    702  415-546-1341
                  305  912-784-9111    703  804-747-1411
                  306  ****N/A*****    704  912-784-9111
                  307  303-232-2300    705  416-487-3641
                  308  402-345-0600    707  415-546-1341
                  309  217-525-7000    709  ****N/A*****
                  312  312-769-9600    712  402-345-0600
                  313  313-223-8690    713  713-658-1793
                  314  314-436-3321    714  213-995-0221
                  315  518-471-8111    715  414-424-5690
                  316  816-275-2782    716  518-471-8111
                  317  317-265-7027    717  412-633-5600
                  318  318-227-1551    801  303-232-2300
                  319  402-345-0600    802  617-787-2750
                  401  617-787-2750    803  912-784-9111
                  402  402-345-0600    804  804-747-1411
                  403  403-425-2652    805  415-546-1341
                  404  912-784-9111    806  512-828-2502
                  405  405-236-6121    807  416-487-3641
                  406  303-232-2300    808  212-226-5487
                  408  415-546-1341         BERMUDA ONLY
                  412  412-633-5600    809  212-334-4336
                  413  617-787-2750    812  317-265-7027
                  414  414-424-5690    813  813-228-7871
                  415  415-546-1132    814  412-633-5600
                  416  416-487-3641    815  217-525-7000
                  417  314-436-3321    816  816-275-2782
                  418  514-861-6391    817  214-948-5731
                  419  614-464-2345    819  514-861-6391
                  501  405-236-6121    901  615-373-5791
                  502  502-583-2861    902  902-421-4110
                  503  503-241-3440    903  ****N/A*****
                  504  504-245-5330    904  912-784-9111
                  505  303-232-2300    906  313-223-8690
                  506  506-657-3855    907  ****N/A*****
                  507  402-345-0600    912  912-784-9111
                  509  206-382-8000    913  816-275-2782
                  512  512-828-2501    914  518-471-8111
                  513  614-464-2345    915  512-828-2501
                  514  514-861-6391    916  415-546-1341
                  515  402-345-0600    918  405-236-6121
                  516  518-471-8111    919  912-784-9111
  1. 75 -
A little something about Your phone company: By Col. Hogan        
  	 Ever get an operator who gave you a hard time, and you didn't
know what to do? Well if the operator hears you use a little Bell
jargon, she might wise up. Here is a little diagram (excuse the
artwork) of the structure of operators
/--------\     /------\     /-----\   /-------------\
!Operator!-- > ! S.A. ! --->! BOS !   ! Group Cheif !
\--------/     \------/     \-----/   \-------------/
    Now most of the operators are not bugged, so they can curse at
you, if they do ask INSTANTLY for the "S.A." or the Service
Assistant. The operator does not report to her (95% of them are
hers) but they will solve most of your problems. She MUST give you
her name as she connects & all of these calls are bugged. If the SA
gives you a rough time get her BOS (Business Office Supervisor) on
the line. S/He will almost always back her girls up, but sometimes
the SA will get tarred and feathered. The operator reports to the
Group Chief, and S/He will solve 100% of your problems, but the
chances of getting S/He on the line are nill. If a lineman (the guy
who works out on the poles) or an Installation man gives you the
works ask to speak to the Instal- lation Foreman, that works
wonders. Here is some other bell Jar- gon, that might come in handy
if you are having trouble with the line. Or they can be used to lie
your way out of situations. An Erling is a line busy for 1 hour,
used mostly in traffic studies A Permanent Signal is that terrible
howling you get if you disc- connect, but don't hang up. Everyone
knows what a busy signal is, but some idiots think that is the
*Actual* ringing of the phone, when it just is a tone "beeps" when
the phone is ringing, woul- ldn't bet on this though, it can (and
does) get out of sync. When you get a busy signal that is 2 times
as fast as the normal one, the person you are trying to reach isn't
really on the phone, (he might be), it is actually the signal that
a trunk line somewhere is busy and they haven't or can't reroute
your call. Sometimes you will get a Recording, or if you get
nothing at all (Left High & Dry in fone terms) all the recordings
are being used and the system is really overused, will probably go
down in a little while. This happened when Kennedy was shot, the
system just couldn't handle the calls. By the way this is called
the "reorder signal" and the trunk line is "blocked". One more
thing, if an overseas call isn't completed and doesn't generate any
money for AT&T, is is called an "Air & Water Call".
  1. 76 -
Files By Al.P.H.A
                      ÚÄ¿    Ú¿   ÚÂÄÄ¿  Ú¿   Ú¿     ÚÄ¿
                     Ú³ ³¿   ³³   ³³  À³¿ ³³   ³³    Ú³ ³¿
                    Ú³ÁÄÁ³¿  ³³   ³ÃÄÄÄÁÙ ³ÃÄÄÄ´³   Ú³ÁÄÁ³¿
                   Ú³Ù   À³¿ ³³Ú¿ ³³Ú¿    ³³   ³³Ú¿Ú³Ù   À³¿
                   ÀÙ     ÀÙ ÀÙÀÙ ÀÙÀÙ    ÀÙ   ÀÙÀÙÀÙ     ÀÙ
                   -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
                   -         Jesters Guide to....          -
                   -                                       -
                   - {- 950-0266's for the new Phreaker -} -
                   -                                       -
                   -            {- 11\6\89 -}              -
                   -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
     This is a file I just decided to write, right after a guy that
lives near me, who runs a bbs complained about his outrageously
high phone bill, and being that I use 0266's I decided that I would
TRY to write a text file on how to use the 0266's as a simple way
of phreaking. I am not an expert on the subject and I don't claim
to be, I am just writing this file to try to help out others that
are in the same experiance level as the guy that I was talking
about previouly in the file.
     There are many different types of 950's, but the type I use is
the 950-0266 and I use these because that is what I was taught with
and they seem like a fairly good, and easy way to phreak. 950-0266s
are known to have VERY clean lines, so they are perfect to use with
modems.
         The basic format for these codes are:
     (1)  Dial 950-0266
     (2)  Wait for tone then dial your 7 digit Code
     (3)  Right after dialing your Code dial your ACN (Area Code
          Number)
      I.E. if I were to call my friend Joe in Utah, I would do
      this... 950-0266 (tone) XXXXXXX8015551234 The X's stand for 
      the 7 digit code
     950's have known to be dangerouse, they are on ESS (electronic
switching service) which is a phreaks nightmare. Being that 950's
are on the ESS they can, and have been known to trace. The type of
tracing service on 950's can trace in a heart beat, so there is
somewhat a great risk in using these. Some precautions about using
950s - Do NOT use the same code for more then 3 days. Try to use
different codes if you have them i.e. call one board with a code
like 2314211 , and then call the next board with a totally
different code. Use these codes during prime time, to cut the risk
of getting caught down. And use these in moderation, do not get
crazy with them.
  1. 77 -
     I hope this file hasnt been to much of a waste of time, I hope
it has offered some help to you in using 950-0266's. I would like
to have suggestions and comments on what you think of my file.  If
you have valid Input, please let me know your opinion on
Al.P.H.A.'s home Board (801)!!!
  	                            Copyright (C) 1989 by -NecroiDaemon
  1. 78 -
Files By Al.P.H.A
  	                    ÚÄ¿   Ú¿  ÚÂÄÄ¿ Ú¿   Ú¿     ÚÄ¿
      	               Ú³ ³¿  ³³  ³³  À³¿³³   ³³    Ú³ ³¿
          	          Ú³ÁÄÁ³¿ ³³  ³ÃÄÄÄÁÙ³ÃÄÄÄ´³   Ú³ÁÄÁ³¿
              	     Ú³Ù   À³¿³³Ú¿³³Ú¿   ³³   ³³Ú¿Ú³Ù   À³¿
                  	 ÀÙ     ÀÙÀÙÀÙÀÙÀÙ   ÀÙ   ÀÙÀÙÀÙ     ÀÙ   
                   -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
  	               -=  Code Hacking - Done Right  7/17-90 =-
      	           -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Code Hacking falls into both the hacking and phreaking category.
Think about it. You have to HACK in order to get codez and then you
PHREAK when you get the codez. I'm not going to go into great
detail on code phreaking, this text file is going to deal mainly
with "CODE HACKING". I get asked all the time where and how to get
codez. I'm hoping this file will clear up this question for a lot
of people. This is not my first  text file, but I don't make a
habbit out of them yet!
   Code Hacking, What is it:
   -=-=-=-=-=-=-=-=-=-=-=-=-
     Simply enough it's where you get a dial up (IE. 1-800's or
950's) and set up a code hacking program and config it to the code
you're about to hack and let it run. Now there are hundrends of
dial ups for us pkreakers/hackers to play with (I will list a few
at the end of this phile), and the code lenght and formats also
very a great deal. Now you can get your hacker set up and let it
run all night and if Gh0d's willing you might get lucky
and get a code by the next day. 
     Ok the best way to go about Code hacking is to get a format or
template if you perfer to call it that. Now they look like this.
801XX, where you know the first 3 digits of the code is 801, but
the last 2 digits are unknown and you have to hack out the  last 2
digits. If you know all but 2 digits then you have a 1 in 100 shot
in getting a code each time your hacker trys to  hack a code, of
course the longer the code or the less digits you know the less
chance you have in hacking a code. But belive me
it's never a lost cause. You can have zero digits and still get
codez.
A Lesson in Formats #1:
-=-=-=-=-=-=-=-=-=-=-=-
     Ok say your going to hack 1-800-635-9135, Code lenght is 5
digits, and already have the following codez!
                                22199
                                22723
                                22857
                                22832
                                21099
  1. 79 -
Ok, think about it for a second, we have 5 codez all staring with
the # 2 and all but the last one has a 2 as the 2nd number, and the
3rd and 4th both have a 8 as the 3rd number and the 1st and 5th end
with a 99, so you could user some different formats for this code
and here the are: 
                                 22XXX
                                 2XX99
                                 228XX
     Ok now there are a few formats for a 5 digit code. I think you
can apply this same system to 6,7 or even 8 digit codez. 
      Well, I hope you can understand formats or templates a little
better. Code hacking can be a long drug out process, but the way I
look at it if you spend a night letting your hacker run and get a
code and spend 5 hours or so of FREE ld calling then it's worth it.
A lesson in Formats #2:
-=-=-=-=-=-=-=-=-=-=-=-
Another probelem with code hacking is figure out or know what comes 
first the CODE or ACN (Area Code Number). On 950-0488's it's ACN +
code, but on most 800's it's ACN + Code. There is really no way to
know for sure. Just make sure when you get your starter codez (The
ones you'll get your formats from) you know how to use them. If you
know this it'll save you a lot of time. The Codes I gave above are
CODE + ACN, but most 800's are ACN + Code. BTW as of the release
date of this file the 800 number listed above works, but the codez
are dead. Well thats the end of the FORMAT LESSONS.
What Code Hacker to Use:
-=-=-=-=-=-=-=-=-=-=-=-=
     Well there are several hackers on the market, but your best
bet is on one of two. Code Thief Deluxe by Phortune 500 and Brew
Associates or Fucking Hacker by 2AF and Hypnacosm. I myself have
played with both but Code Thief Deluxe v 4.0 is the best on the
market. It's very user friendly and even the beginner can figure it
out, but if you have a different hacker then fell free to use it.
The Hacker you use should be the one you fell the best about. I
like Theif 4.0 and I would recommend this to any and all hackers.
The way I look at it, you can't go wrong with Phortune 500.
   Dial up's and Code Lenths:
   -=-=-=-=-=-=-=-=-=-=-=-=-=
   1-800-222-4333    Code  6 Digits  (Code + ACN)
   1-800-657-9600    Code  7 Digits  (Code + ACN)
   1-800-327-9488    Code 13 Digits  (Code + ACN)
   1-800-476-4646    Code  6 Digits  (Code + ACN)
   1-800-234-5095    Code  6 Digits  (Code + ACN)
  1. 80 -
         950-0266    Code  7 Digits  (ACN + Code)
  	     950-0488    Code 13 Digits  (ACN + Code)
Closing Notes.
-=-=-=-=-=-=-=
     Well I hope the first text file from Al.P.H.A helps a few of
you out. I was sitting arond (at work of all places) when it dawned
on me I have never seen a file on code hacking, so I decided to do
one up. This file is for the beginner not the Expert, but I have
read a number of text  files for beginners and have learned
something from them. So enjoy.
Speical Thanks go out to:
-=-=-=-=-=-=-=-=-=-=-=-=-
Doc Silicon        - (My Partiner in Crime) for talking me into
				     starting this Awesome H&P group.
The Oxidizer       - If it wasn't for your board, I'd of had to
                     spent a lot more time Code Hacking.
__________________
|Brew Associates | - For the Awesome programming work that went
into Theif
|<<<< P500 >>>>> |   3.5 and 4.0.
|Professor Falken| - For the Awesome work you did on your Phreak Tools
------------------
A Little About Al.P.H.A!
-=-=-=-=-=-=-=-=-=-=-=-=
We are a small group that plans on Hacking/Passing and Using codez.
We started Al.P.H.A because we were tired of all the want-a-be
groups we  were a part of. I'm not going to state names of the
Groups, I don't want a fucking war with any of them.
  Al.P.H.A is:
  -=-=-=-=-=-=
 Captain Kidd - Doc Silicon - Techno Cyberdaeemon - Black Beard 
 Cristifer Columbus - Jester - Falcon
  1. 81 -
Files By Al.P.H.A
Surviving at Night: By Falcon
     I am writing this file with the knowledge that night survival
is a lot of common sense.  I do however feel I can share some added
information that can help make the anarchists favorite time of the
day (night) a little safer and easier to work with.  **note some of
the information I am writing I have taken from a article from
Combat Tactics magazine were as the rest is common sense and stuff
I've picked up though personal night missions.
     The first part of surviving at night is to dress accordingly. 
Common sense tell us a person in black clothing with a black mask
is harder to spot then a person in white clothing.  This of course
is true, but one must also consider the fact that black is a
stereotype for burglars, the devil and trouble its self.  Not to
mention a mask or painted face.  That is why for most situations I
recommend wearing modern, casual clothing that does not even need
to be black.  Dark blue or green etc. can accomplish the same over
all effect at night.  For summer try and have shorts, and dress
accordingly to the season. Were black or dark socks and shoes.  If
you are running white shoes REALLY stand out.  Also as I said
before try to get around wearing a mask or face paint until the
last minute possible.
   
     You then need your equipment.  I personally have a nice black
pouch and belt I got from army navy surplus stores.  I use the belt
and pouch to hold all of my equipment, so if I have to I can drop
the belt in a shadow, and look like a causal modern dressed dude
walking to a friends house.  We are talking innocent!!!  In my ouch
and belt I include: wire cutters, gloves black of, course to hide
my little white hands and their fingerprints.  A mask so I can hide
my identity, a flashlight for seeing  and destroying people's night
vision- be careful not to shine it around windows etc.  The same
goes for matches, lighters because at night it is very obvious.  A
few bombs (CO2 etc.) to act as diversions and blow up stuff like
mailboxes...  A scope off a rifle.  You would be surprise at how
well you can see using on of them in the night, especially if you
are looking toward light and your night vision is good.  I do not
recommend binoculars due to they take up both eyes and if you look
into light you loose both eyes night vision..... 
     Also I take what ever else The situation requires.  I try to
not over-do-it.  For example if you are only going on a scouting
mission why danger yourself with a full load up.  It is just more
trouble you can get in, if caught.  But also don't be under
equipped or you could miss out on some killer opportunities.  A
favorite saying of mine (a quote from my hero the legendary
assassin Jason Bourne: "opportunities will present themselves. 
When they do you better be ready to use them."
  1. 82 -
     Night vision is important.  To explain how it works one can
compare the eye to a camera.  The lens of an eye is like the lens
of a camera focusing light as it enters.  The iris of an eye is
like the diaphragm of a camera opening and closing to allow the
correct amount of light in for the situation. The retina is like
film, light image is recorded and sent to the brain as light images
thus producing pictures.  We use two kinds of cells in seeing: Cone
and Rod cells. (named due to their size).
   
     Day vision comes from the cone cells.  They enable you to see
color, sharp contrast, and shape.  The cone cells cannot function
in low light levels, thus why we cannot see color at night.
   
     The rod cells produce a substance called visual purple.  This
substance allows us to see at night.  If we stare at something to
long (a few seconds) all the visual purple in that spot of the eye
is used up. This cause blank outs in what we're are starting at. 
To get around this problem scanning is used.  Scanning is basically
moving ones eyes back and forth never focusing on one spot.  This
allows the visual purple to evenly resupply itself so no black outs 
occur.  When scanning never move your head back and forth (I will 
explain later) just your eyes.
     The reason you should not move your whole head while scanning
is because the human eye is very good at detecting movement.  If
you are being followed from a distance, or someone is looking for
you just freeze.  If you can lay prone, or get in a nice shadow,
but in most situations you can be lost by anyone trying to find
you.  However if they have already located you, or they are very
close you need to get away from them, then hide. If you are dressed 
correctly and freeze you can really be hard to spot.  Also keep 
scanning so you don't get surprised by someone.  If you must move do 
it slowly (including your head to scan behind you).
     A very important fact in night vision is letting your eyes
adjust to the dark.  30 minutes in the dark are required to
completely adjust and get the best night vision. (you can spend 20
of the 30 minutes in red light and get the same effect, this can
save time but who has a red lighted room?)  Be careful with your
night vision.  It can be lost by looking into lights, a fire, etc.  
If you must go into light or look into it using a scope only use one 
eye.  Cover the other eye so you at least have one good night eye at 
all times. 
     Practice these night sight tactics and become confident with
the night.  It is your friend!!
     At night, our sound and movement become more trustworthy. 
That is why it is important to stay silent and well hidden.  If you
must talk do it in whispers and try to have a sign language 
  1. 83 -
you can use to keep from having to talk.  Certain areas are very
dangerous at night.  Areas like fences, rivers, roads, yards with
dogs, open areas etc.  If you must cross them make sure to stake
the area out so you know it is secure, then cross the danger area
as fast as you can (don't become reckless but go fast.)  Certain
danger areas like dogs can be fixed.  For example you could kill
the dogs if give them meat to keep quiet.
     Weapons of the night should try and be silent so they don't
give away your position.  Darts, air-guns, knives, silenced weapons
etc. are best.  However noise can be a great diversion.  A timed
fuse on a bomb can be used to attract attention to the wrong place
allowing you to escape.  Also say you are in a house and the owners
come home and you are trapped in a room. Without killing them to
get away unidentified you could beat them up with a mask on, but 
what if they were bigger then you?  That's when a flashlight burst 
in a un-expecting face followed by a slam with your shoulders and 
your quick escape come in handy.  Also you could buy a tear gas gun.  
I got mine for like 10-15 bucks and they are handy!  You could pop 
some poor sucker in the face from a few feet away, slam him then run.
The poor dude would be wondering if he  had died and gone to hell as 
you ran for a safe place.
     An important thing at night is to know your territory.  Know
were you can run and hide or get away.  If you are in a new place
scout it out. Also be good about keeping plans and sticking to
them.  Work in the buddy system so you aren't responsible for
looking everyplace, and lugging all the supplies etc. 
    Well That is all I can think of at the time, I'm sure to
remember more later....    I hope this file helps.....
  1. 84 -
Files By Al.P.H.A
BASIC CARDING (BY Al.P.H.A)
---------------------------
                                                               
I would like to emphasize two facts:
Fact Number 1 ]  Carding is dangerous, by reading this file, you
are subjecting yourself to highly illegal information
Fact Number 2 ]  Due to the fact of the illegality, I take NO
responsibility for what actions might take place due to this file.
(Phew! now that that's over with...)
In this file we will discuss:
Chapter --> 1 Obtaining Cards
There are MANY ways to obtain cards, through Trashing (the art of
scrounging through Garbage cans, and dumpsters and any other places
that would be a good source of cut cards or carbons from receipts.) 
But that will be discussed in Trashing files available anywhere on
your Average Phreak/Hack/Anarchy BBS/AE.  You may also obtain them
off a bbs with a Carding section, but to ensure best validity, get
them yourself, as the motto goes,"If you want it done right the
first time, do it yourself." 
Chapter --> 2 Identifying/Checking the card
Checking the card is very simple, and even the novice carder can do
it the first time.  First, there are two ways (As far as i'm
concerned) to check the card.
1] Using Tymnet, call your local dialup, and enter "TSDCOMPSUPP"
for login.  Then for the password, "HARRYHINES" will get you in. 
After your in, hit "?" for help, most likely you'll be using the
option "B", remember using UPPERCASE.  Where "B" is Mastercard /
Visa transaction, but if you stumble across a Carta Blanche card,
call me (Just kidding), then enter the letter for the transaction
and you're off.  It'll ask you for your card number, w/o the
hyphens, then the experiation date, and amount you want to check
the card for, a reasonable amount is 500.00, but you can experiment
once you get more acquainted w/ it.
2] Using a computer voice driven checker, pevhaps a little faster,
but a little more tricky.  In order to use it, you must do the
following:
Dial up the 800 watts, which is 1-800-554-2265, after you dial 
  1. 85 -
it, it should ring and pick up, then a computer voice will say
"Enter type" and then you respond with either: 
10 for Mastercard
20 for Visa
Followed by a number sign will then ask for identification, hit
"1067" preceeded by a number sign (always follow an entry w/ a
number sign). It will say some bullshit and then ask you for your
Merchant number in which you type 24 or 52 (whatever makes you
happy) and then enter the card, after done it will ask for exp.
date , then amount.  Now, this is the tricky part, cuz if you fuck
up here, it's gonna Decline you and you have to start
ALL over.  If your code is infact Valid, it will be followed by a
Please Wait for 30-60 seconds and a Approved and a long number,
don't worry about writing it down, just make sure to keep what you
card to the limit the card can hold, or some calls might be made. 
Chapter --> 3 Using the card for purchasing
You might think everything is pretty much a snap from here, but
really this is where it gets difficult. Always order from a
Mail-Order warehouse (OF course) If you're going to order from a
Watts line, make sure you go through adleast Blue Boxing or
Diverters before connecting w/ the company, for protection on Watts
tracing.  
After that, you must select an address (preferrably empty or
abandoned) to ship the cargo to.  And A)  you also must make an
awesomely authentic note with the card bearer's name on it saying
you are out of town, and to leave it on the doorstep or B)  be bold
and face the UPS man and sign for it, but I suggest the note would
be safer in more than one way.  Then, order the merchandise, and if
you don't sound old enough, get a friend or whoever to do the
talking.  Another warning is that evidence has proved that
purchasing relatively small priced items takes alot of worry from
the company, thus, not resorting to do various checks on the card
and the bearer's address.  
Chapter --> 4 After the order, then what...
Well, after the package has arrived, casually pick it up
(preferrably at night) and brisk it to your house.  After that, I
recommend that you don't just "HAPPEN" to pass by the house and
stare it, that attracts attention, and believe me, that's the least
thing you want.  Try and stay far from the location, and NEVER use
the same house twice.
I hope this file has helped you understand the BASIC principles of
Carding, there is a lot more to learn, and there are a LOT more
files like this to learn from.  Stay cool... Take NOTE:  The Watts
dialups for the Credit Card verification # are in effect as 
  1. 86 -
of this date, disonnections or changes in numbers I will try to
handle. Same goes for the Tymnet verification ID & PASSWORD.
 Carding:
~~~~~~~~~~
	This is one that you can get in some major shit over.  Well,
although it is a  major  crime, it is really cool!!!!  This is the
process in which you find the  card number of someone and use it to
purchase things.  In order to card, there  are a few things that
you must have or it will not work.  You will need to
have........
     1. The Card Number
     2. The Experation date
     3. Card type (Master Card, Visa, etc...)
Those are main things tha you will need.  Having the name of the
owner is very helpfull but it is not a must.  You can get by
without it. You have to order everything you want by mail.  A
couple of "Beginner" carder that I talked to didn't understand how
you would do it, but thats when they had the misconception that you
actually go to the store and purchase things.  That is a complete
No, no.  You do everything from a phone ordering service. When you 
call make sure that you are at a pay phone.  Don't do it your house 
or anywhere where it can come back to you.  When you order the 
merchandice, once again do send it to anywhere that it can come 
back to you like your home, work, etc.  Find a vacant house or 
building or anywhere else that you can send it to.  Also, don't 
send it to a P.O. box that you have, just as dangerous.  When you 
do order it and you think its around the time that you will be 
reciving it, check the mailbox frequently.  But do it during  odd 
hours.  I mean, hows it going to look you taking a package from a 
vacant  house?
Most bills are sent at the end of the month or at the biginning, so
try to time it to where the bill won't come to the person untill a
couple of days after you have recived the package.  Ok heres how to
figure it.  I have found out that the bills are sent out up around
the 26-30th of the month, so they will actually recive the bill
around the 31-4th.  Have it sent right after you think the bill has
been sent.  Find what you want, but try to order it from the place
that guarentees the fastest delivery.  When you order the item,
make sure they have it in stock and don't have to get the item in
first.  Order the highest class of delivery but not COD or next day
service.  Thats cutting it too close.  It should take around 2-4
weeks before you get it and if you timed it right, then it sound
get there right before the person gets the bill.  You need to have
it in your possesion before the bill gets to the person because if 
they complain, they can keep it from being sent, or watch who 
actually gets it even while its going throught the mail process.  
Don't order more than a couple of things or overcharge the card,
  1. 87 -
if the people at the Credit card office, see irregular charging on 
the card, they will follow up on it.
To actually order the item you will call up the place that you will
be ordering from, and when the operator answers let her know what
you need to as far as what you are purchasing, etc.  When she ask
how you will be paying just tell her "Charge" and the the type of
card like Master Card, Visa, ect.  Then Tell them your name, if you
don't know the name of the actuall owner of the card, Make up a
false name that has NO relation to your name, not the same first,
last middle what ever, nothing relating to your real name. Then
continue answering all the operators questions, address (Not your 
own remember!) state, area code etc.  They will also ask for your 
phone number. Make one up, not your own.  If something happens to 
go wrong as far as delivery or if they are checking if you are who 
you say, then your screwed, unless of course, hehehe, the number is 
ALWAYS busy. Find the busiest number there is and leave them that.  
When they ask for the card number and experation, just tell them and 
do what all  else you need.  Wish them a good day, and hope you get 
it.
Ok heres how you check if the card is good, and how much money can
be  charged on the card.......  1. Dail 1-800-554-2265 2. it will
ask for the type of the card.  you must put in 10 for Master Card
and 20 for Visa, I am not sure about the others. 3. Next it will
ask for the Identification.  You will need to enter 1067 4. After
all that you will have to enter the Mecrchant number, which you 
will either need to put in 24 or 52.  One of them should work. 5.
You will then have to enter (When Prompted) the card number itself. 
6. Next, the experation date of the card. 7. Last but not least the 
amount you want to try to get on the card. The procedure for this is 
enter dollars, astricks, then cents.
     (Example:)
         100*30 = One hundred dollars and thirty cents.
	One thing I do need to mention, after you type in everything 
you must press  pound (#).  Like when it asks you for the type of 
card, if you had a Master Card you would put:  10#.  when it asked 
for identification you would enter 1067#.  If it says invalid, that
either means that the card is no good or you can't charge that
amount on the card.  Try it again, but try a lower amount.  If you
get down to $1 and it still doesn't work, hehehe,
you can probably guess that the card is no good.
     You might not be ordering just merchandice you might be
ordering  accounts and things like that and if you are, fine, but
you have to remember, the accounts do not stay good for very long,
the owner of the card gets the bill, complains and its no longer
any good.  And when you card and account, Nine out of ten times,
they won't kill the account, they will trace in and that is when
  1. 88 -
you butts really in a sling.  So carding accounts and
hins, isn't the safest way to go, of course. nothing we have
alked about it, right? 
                              Introduction

carding is, in layman's terms, the use of someone elses credit card
umber to obtain free merchandise. It can be used for things that
re valuable to the BBS world like a USRobotics HST modem, or a
rand new SCSI hard drive. The reason I am writing this article is
because I, and the other notorious members of P/HARM have a
multitude of wealth that some may deem useful. When I was a wee
little mite, there was nothing to help me on my way..... So here
goes....
                               Obtaining #s
There are many ways to obtain a credit card number. But the thing
to remember is that there are three essentials that you need in
order to use your number. 1) The name as it appears on the card, 2)
The Card number, and 3) The actual date of expiration. These three
things are not only essential, but if you get one of them wrong, it
could send the FEDS huntin'.  Okay, with that out of the way, now
comes places to find the numbers. My most favorite, but the most
time tested method is Trash bin hunting.... Nowadays with the
invention of carbonless receipts and carbons that tear in half, the
carder is less likely to find a good number in a trash can (you can 
bet on getting dirty). But some stores make the fatal mistake of 
not ripping up their fuck ups. A fuck up is when they run the card 
number thru with the wrong amount or the lady (it's always a lady) 
decides to pay cash. The clerk throws the credit voucher into the 
trash, and that makes its way out to the bin where we find a 
plethora of "fuck ups". The best way to get a number is off of 
an actual card. If you are at a store where they take credit cards, 
watch someone pay, and copy his/her number down on a business card 
you just happen to have. This may seem risky, but trust me, IT'S 
NOT!!  A third way that is not always as effective is to hunt 
mailboxes at night, Sometimes people forget to get their mail, and 
inside there will be a bill from Visa or Bank of America (don't 
forget that banks offer credit cards now). If you're real lucky, 
you'll get an actual card. Okay, now you've got your card:
                                CARDING!!!!
Find a little shit mail order company that has put out a small add
in crumby production like Nuts & Volts magazine. Call this number
up and say "I'd like some information on XXXXXXXXXX", where
XXXXXXXXXX is the item you wish to get for free. Continue to ask
questions and TRY TO BARGAIN. This is important because people who
are spending their own money try to get the best deal  POSSIBLE.
  1. 89 -
Finish the conversation by saying "Okay, let me look around and try 
to find the best price." The salesperson will give you their name 
and ask you to call back. Call back the next day, and continue to 
BS before ordering. Once you have ordered, they will ask you for: 
The card number, the name, the expiration, the mailing address 
(always use a drop site, and when they say "Is this the address as 
it appears on the card?" Say yes even if it isn't), and a phone 
number. The best phone number to give is one that is always busy or 
that of a hacked VMB. Ask for next day delivery on all packages. 
Now you need to send it somewhere.
                               DROP SITES
A drop site is the address you want your package sent to. The best
type of drop site is that of a vacant house, or where your neighbor
is outta town. Some say to leave a note on the doorstep asking the
UPS dude to leave the package, but some companies require a
signature. Here's my plan: Stay close to the house you pick for a
drop. When you see the van pull up, walk non-chalantly over to the
delivery man and say "My neighbor asked me to pick this up for
him". Sign a fake name and walk away. Now you have your package!!!!
P/HARM Conquests:
Dual Standard HST
661 megabyte hard drive (SCSI)
330 megabyte hard drive (SCSI)
Laptop computer (Pending)
330 megger SCSI (Pending)
  • DISCLAIMER!!!!!!!! *
This file is written as a means of information interchange only. If
you choose to try the methods described above, well that is by your
own choice, and I nor P/HARM will be held responsible for any
trouble you get yourself into. **REMEMBER carding is ILLEGAL!!! 
  • DISCLAIMER!!!!!!!! *
                       Information on how to card!
First of all, you need a good drop site. A drop site is a place
where you are going to have the package shipped to. The best 
  1. 90 -
places are usally private homes where people work during the day.
A easy to way to get one, walk out your house and look around. Find
any house,write down the street address. Open up a yellow
pages,look for the fone #. Then call up the house, usally during
morning time. If there is no answer,well you got a drop site.
Next,you need a card. Humm, usally the best way to get cards is
trough CBI or TRW. I used to use a program called checksum. Its a
program that makes CC's. Then I would call 800 # card checker. Put
a $150 ammount on the card,if it was aproved then you got a real
card. I am not going to tell ya how to get cards. Next, open up any
computer realated magazine. Look for small ads,  preferbly in the
west coast. Call 'em up, see if you sound like chinks, if they do
then you may have found a good place. Once you have the neccesery
items you are ready to CARD.
The following things are needed to get away with carding.
1. A good unused card.
2. Drop site.
3. Cheap copmany to order from.
4. A code to call them with.
5. A loop for reciving fone calls.
 Ok. you call up the fuckers. And you talk to some rep.
I am going to help ya all get 14.4's. When you talk to the rep. use
the following lines to why you need a 14.4
1. My modem was fried by lighting,and I am in need of very
importent docs. 2. I am looking to upgrade the modem at the
office,I only have a 1200 baud. 
3. Its a holiday,birthday whatever. You want to get a gift for you
son.
Ok. Next, make sure you ask for the price,any discounts on it,what
does it come with. Also make sure you tell them that you want to
know what you can do incase the modem doesnt work. Ok,Then say "Ok,
I will order this now". Then she starts asking questions. Usally
they ask for the name first. Now, I never ONCE had a real name for
all my cards. Thats why I told you to order from small companies.
Make up any name in the fuckin world. But write it down to remember
it later on. Then they will ask you for a shipping address. Give
them the address of the drop site. Say thats were you live and you
are sending it to your house. Next, they will ask for the card #.
Geeeeee, Give them the card #. Now, they will want an experation
date. People tell me that need a experation date. BULLSHIT!!. You
do not need an exp. date at all. Give them, any thing. But make
sure its with in a year or two. Not 1/96. use like 1/91 1/92 etc..
OH yeah. When they ask for the card #. I allwayes say "Hold on,
lemme get my wallet out". That makes it look like you are getting
the card out from your wallet, GEEE. Humm,Now they want a phone #
  1. 91 -
This is a bitch. Up untill a few months ago, I used to give them 
a BBS thats allwayes busy. That works sometimes , but the best is 
to use the following methood. Get a LOOP.
And say you are currently at a hotel in the loops area code. Then
say you want to go out and play raquetball or something at the
hotel. So you are not going to be around. Then ask them when are
they going to call back and shit. Sometimes if you are sure the
card is going to work, you can say if everything is ok, then ship
it. I sometimes use this; I say "My wife got a hold of my card and
went shopping, so I am not sure if the limit on the card can hold
it." then I say "Can you check to see if it gets approved
while I'll wait online". Most of the time they will "OK, hold on".
Sometimes they can say it takes a while. Who cares, just say "I am
stepping out to lunch now, can I give you a call back to check if
every-thing is ok". And they say thats fine. Make sure you dont
fuck up. And dont try to card if you have the voice of a 13 year
old. My friend has the voice of a kid and he got caught HIS FIRST
TIME CARDING BY THE FEDZ!!!!. So do not card if you are a little
kid. After you are done giving the bitch all the info. Ask to have
it shipped NEXT DAY SERVICE (RED LABEL). That way you dont have to 
wait a week or so. And then you have more time hidding and shit. 
Its a little bit more,but who gives a fuck. Make sure you ask how 
much is for everything!!!. And when you are about to hang up. Make 
sure you say thank you, Have a good day. it makes a good impresion 
of them. And remember try NOT to order from 800's. Allwayes CALL 
WITH A CODE. That way if you get fucked, they cant prove you called 
the place and shit. Well, I am done for now. I think, I dunno. 
Remember if you use this file and get shit, lemme know. I want to 
know if I helped people card shit. Hehehehehhe. Me personaly have 
carded more shit then your parents make in a year and shit. And 
still do. I dident get caught yet. But I am going to be 18 so,
and then I will be of probation (Not for carding). So , if you 
are under 16 card card card! they cant do shit to you.... 
Advanced Carding Techniques
CARBONS:
-------
Remember trash-picking the department store to find those little
black pieces of paper that "told all" for the CC number? Well, kiss
that old technique goodbye, the newest thing on the market that
will soon be widespread is SELF CARBONING RECIEPTS. Those do just
what they say.  The "carbon" is part of the paper itself.  You then
have the customer copy, and the store copy, and thats it, nothing
else.  The best way to get numbers anymore is to get them from the
place you work at.
  1. 92 -
DROPS:
-----
Drops are as easy as they ever were, but with a few changes. 
Remember how the place you call would ask you "What number can we
reach you at?" You would just give them the phone number of a
payphone that you were at, and maybe they would call you in a few
minutes to verify the order. Now they always ask this "What is your
home telephone number?" To have a successful shipment, you *MUST*
give them the correct phone number to the house that you are having 
the stuff sent to.  This *MUST* corrispond! What they do is this, 
lets say that you give them this info:
Jim R. Jnes
132 S. Alexander
Arlington Hts, IL  60002
Home: 312-962-3342
Work: 312-564-1233 (Don't worry about this, give 'em a carrier #)
Visa:  4432-432-223-032 6/86
Bank:  Second National Bank
They will then call the 312 Directory Assistance (312/555-1212) and
say something like this: "I would like the number for the JONES
residence on South Alexander-" and then the operator would either
say the number, or that she can't give it out. If the operator says
something to the effect of "I'm sorry, but I have no listing of a
JONES at this number, then your fucked, cause the store will figure
that its a fraud order, and sometimes will call VISA. Make sure
that the phone corrisponds with the drop!
CHECKING CC'S:
-------------
Go to about any store that uses credit cards, and look at the thing
that they run the credit cards through to make the carbons.  On
that thing there will be an 800 number and some special numbers.
Write all these down! Ever have it where you use a card number and
it doesn't work out, and you want to check to see if the card
number is still good? Well, this is how you use those beloved
numbers you have!
Call th 800 number, a lot use this numbers:
800-221-1122 and along with those numbers you sould have found a 4
digit number and one that is long as all hell, sometimes over 10
digits long. The first number (the short one) is the BANK number,
and the other long one is the MERCHANT NUMBER.  Call the 800 number
and they will usually answer with something like: 
"National Data"
Say:  "Bank number 1122" <==or whatever # it was
(pause, let the bitch type)
  1. 93 -
Say:  "erchant # 541837265355"  <==whatever #
(pause)
Say:  "Crd number 44312-223-433-221 exp 6/86"
(pause)
Say:  "Amount is $12.31"
Note: Always try to keep this number low, for
      credit sake!
If the card number is still good she will say something like: "ok,
that is authorization #4423B" (or something like that) Don't worry 
about this number, all you need to know is that the number is still 
valid.  Sometimes is the number is bad, you'll hear: "Let me repeat 
that number" (and she does) then she says: "That card is a pick up" 
This means that they know it is a stolen card number and if you can 
get ahold of the original card, a storeowner can get $50.  All this 
means to you is that you can cross that number off your list.
THINGS TO CARD-THINGS *NOT* TO CARD:
-----------------------------------
I have carded at great number of things on my life, and I have
found that computer equipment is one of the hardest things to card,
'cause think about it, almost everyone who cards, will card a new
Apple Cat, or something like that. Stay away from the computer
stuff as much as possible, these are checked *VERY* well! Jewrey is
also hard to get because its so easy to resell! I once orderd a
Rolex watch on my own American Express Gold Card, and it took a
WEEK for them just to preform the credit check to make sure it was
really my card! They laughed when I said that I wanted to pay for
it by credit card, they only had 1 CC order in the past 8 months!
This was a high volume store, too! Anyways, hold of on the
diamonds, Gucci or Saks stuff, they check too much!
Airlinetickets are the easiest to card by far, and stereo equipment
too! I not to long ago got a Nakamichi Dragon cassete deck, which
is one of the best cassete decks in the world, and cost in excess
of $1000! I ordered it on a Monday, and it came on Thursday! Try to
make friends with the guys your order from, say bullshit like:
"I'll cll you when I get it and tell you how it works out!!!"
I have been really successful with this, and these tips should help
you!
  1. 94 -
Airlines:
--------
Everybody travels, and flying is the only way to go, but lets face
it, nobody ever has enough money to fly quite as often as we would
like. This is where carding can save you money and let you do the
things that you really want to do!
Getting Tickets:
---------------
I am assuming that you already know how to get carbons, etc. OK,
you have this stack of carbons w/ good card numbers.  Next grab the
phone (and phone book). Look up AIRLINES.  Call your favopite
airline and schedual yourself (under a John Doe name, of course.)
You could do this actually long in advance, to "save" Visa some
money, and maybe make it look a little more ordinary. Fdw people
take off to Rio, Brazil without planning ahead! A few days (I'm
talking 2 or 3 days AT THE MOST) before your flight is going to
leave, call up a local travel agency, but CALL THEM THROUGH AN 800
EXTENDER! Find one with the WORST connections possible, a PBX might
work great. You want the agency to think that you are not calling
local, but from across the country. Tell the lady at the agency
that your son goes to college (or something) is flying down, and
that you have made reservations for him to fly back. ONLY BUY
ONE-WAY TI CKETS! Tell them that you already have reservations. The
agency will be cool about it all, and will take your card number
and all the usual info. Tell them that your son is supposed to call
you a little later, and that you will tell him to go down and pick
up his ticket.
The key to the whole deal is that 800 extender. This makes the
agency think that there really is a father in New Jersey that wants
his son to be flown from Bakersfield to Chicago to see his brother.
It really is that easy to do, but as I said, do not get round trip
tickets. Let's say that you do and fly to wherever, and while you
are there, the guy's Visa bill comes. The airport may have some
people waiting for you when you get on! The best bet is to take a
stack of carbons and extenders with you and do the same thing to
get back.
This is the way I have flown and I have never had any problems,
whatsoever. 
Basic Information About Credit Cards
There are at least three types of security devices on credit cards
that you aren't supposed to know about.  They are the account
number, the signature panel, and the magnetic strip.
  1. 95 -
  The Account Number
  ------------------
     A Social Security card has nine digits.  So do two-part Zip
codes. A domestic phone number, including area code, has ten
digits.  Yet a complete MasterCard number has twenty digits.  Why
so many? It is not mathematically necessary for any credit-card
account number to have more than eight digits.  Each cardholder
must, of course, have a unique number.  Visa and MasterCard are
estimated to have about sixty-five million cardholders each.  Thus
their numbering systems must have at least sixty-five million
available numbers.  There are one hundred million possible 
conbinations of eight digits-- 00000000, 00000001, 00000002, 
00000003, all the way up to 99999999. So eight digits would be 
enough.  To allow for future growth, an issuer the size of Visa 
of MaserCard could opt for nine digits---enough for a billion 
differnt numbers. In fact, a Visa card has thirteen digits and
sometimes more.  An American Express card has fifteen digits.  
Diners Club cards have fourteen. Carte Blanche has ten. Obviously, 
the card issuers are not projecting that they will have billions 
and billions of cardholders and need those digits to ensure a 
different number for each.  The extra digits are actually a 
security device. Say your Visa number is 4211 503 417 268.  Each
purchase must be entered into a computer from a sales slip.  The
account number tags the purchase to your account.  The persons who
enter account numbers into computers get bored and sometimes make
mistakes.  They might enter 4211 503 471 268 or 4211 703 417 268
instead. The advantage of the thirteen-digit numbering system is
that it is unlikely any Visa cardholder has 4211 503 471 268 or
4211 703 417 268 for an account number.  There are 10 trillion
possible thirteen-digit Visa numbers (0000 000 000 000;0000 000 000
0001;... 9999 999 999 999). Only about sixty-five million of those
numbers are numbers of actual active accounts.  The odds that an
incorrectly entered number would correspond to a real number are
something like sixty-five million in ten trillion, or about one in
one hundred and fifty thousand. Those are slim odds.  You could
fill up a book the size of this one {note, book is 228 pgs long}
with random thirteen-digit numbers such as these:
                   3901 160 943 791
                   1090 734 231 410
                   1783 205 995 561
                   9542 425 195 969
                   2358 862 307 845
                   9940 880 814 778
                   8421 456 150 662
                   9910 441 036 483
                   3167 186 869 267
                   6081 132 670 781
                   1228 190 300 350
                   4563 351 105 207
  1. 96 -
Still you would not duplicate a Visa account number.  Whenever an
account number is entered incorrectly, iw will almose certainly
fail to match up with any of the other account nubmers in the
computer's memory.  The computer can then request that the number
be entered again. Other card-numbering systems are even more
secure.  Of the quadrillion possible fifteen-digit American Express
card numbers, only about 11 million are assigned.  The chance of a
random number happening to correspond to an existing account number
is about one in ninety million.  Taking into account all twenty
digits on a MasterCard, there are one hundred quintillion 
(100,000,000,000,000,000,000) possible numvers for sixy-five 
million card-holders.  The chance of a random string of
digits matching a real MasterCard number is about one in one and a
half trillion. Among other things, this makes possible those
television ads inviting holders of credit cards to phone in to
order merchandise.  The operators who take the calls never see the
callers' cards nor their signatures. How can they be sure the
callers even have credit cards? They base their confidence on the
security of the credit-card numbering systems.  If someone calls in
and makes up a creditcard number--even being careful to get the
right number of digits--the number surely will not be an existing
real credit-card number.  The deception can be spotted instantly by
plugging into the credit-card company's computers.  For all
practical purposes, the only way to come up with a genuine
credit-card number is to read it off a credit card.  The
number, not the piece of plastic, is enough.
  Neiman-Marcus' Garbage Can
  --------------------------
The converse of this is the fact that anyone who knows someone
else's card number can charge to that person's account.  Police
sources say this is a major problem, but card issuers, by and
large, do their best to keep these crimes a secret.  The fear is
that publicizing the crimes may tempt more people to commit them. 
Worse yet, there is alomost nothing the average person can do to
prevent being victimized {muhaha} -- short of giving up credit
cards entirely. Lots of strangers know your credit-card numbers. 
Everyone you hand a card to--waiters, sales clerks, ticket agents,
hairdressers, gas station attendants, hotel cashiers--sees the
account number.  Every time a card is put in an imprinter, three
copies are made, and two are left with the clerk. If you charge
anything by phone or mail order, someone somewhere sees the number.
Crooks don't have to be in a job with normal access to creditcard 
numbers. Occasional operations have discovered that the garbage 
cans outside prestige department or specialty stores are sources
of high-credit-limit account numbers.  The crooks look for the 
discarded carbon paper from sales slips. The account number is 
usually legible--as are the expiration date, name, and signature.  
(A 1981 operation used carbons from Koontz Hardware, a West Hollywood,
California, store frequented by many celebrities.) Converting a number 
into cash is less risky than using a stolen credit card.  The crook 
  1. 97 -
need only call an airline, posing as the cardholder, and make a
reservation on a heavily traveled flight.  He usually requests that
tickets be issued in someone else's name for pickup at the airport
(airlines don't always ask for ID on ticket pickups, but the crook
has it if needed) and is set.  The tickets can be sold at a
discount on the hot-ticket market operating in every major 
airport. There are other methods as well.  Anyone with a Visa or
MasterCard merchant account can fill out invoices for nonexistent
sales and submit them to the bank.  As long as the account numbers
and names are genuine, the bank will pay the merchant immediately.
For an investment of about a thousand dollars, an organized
criminal operation can get the pressing machines needed to make
counterfeit credit cards.  Counterfeiting credit cards in
relatively simple.  There are no fancy scrolls and filigree work,
just blocky logos in primary colors. From the criminal's
standpoint, the main advantage of a counterfeit card is that it
allows him to get cash advances.  For maximum plundering of a line
of credit, the crook must know the credit limit as well as the
account number.  To learn both, he often calls an intended victim,
posing as the victim's bank:
      CROOK:  This is Bank of America.  We're calling to tell you 
              that the credit limit on your Visa card has been    
              raised to twelve hundred dollars.
      VICTIM: But my limit has always been ten thousand dollars.
      CROOK:  There must be some problem with the computers. Do   
              you have your card handy?  Could you read off the   
              embossed number?
     On a smaller scale, many struggling rock groups have
discovered the knack of using someone else's telephone company
credit card.  When a cardholder wants to make a long-distance call
from a hotel or pay phone, he or she reads the card number to the
operator.  The call is then billed to the cardholder's home phone. 
Musicians on tour sometimes wait by the special credit-card-and-
collect-calls-only booths at airports and jot down a few credit 
card numbers.  In this way, unsuspecting businesspeople finance 
a touring act's calls to friends at home.  If the musicians call 
from public phones, use a given card number only once, and don't 
stay in one city long, the phone company seems helpless to stop 
them. What makes all of these scams so hard to combat is the lead 
time afforded the criminal.  Theft of a credit card--a crime that 
card issuers will talk about--is generally reported immediately. 
Within twenty-four hours, a stolen card's number is on the issuer's 
"hot list" and can no longer be used.  But when only a card number 
is being used illicitly, the crime is not discovered until the 
cardholder recieves his first inflated bill.  That's at least two 
weeks later; it could be as much as six weeks later.  As long as 
the illicit user isn't too greedy, he has at least two weeks to
tap into a credit line with little risk.
  1. 98 -
  The Signature Panel
  -------------------
You're now supposed to erase the signature panel, of course.  Card
issuers fear that crooks might erase the signature on a stolen
credit card and replace it with their own.  To make alteration more
difficult, many card signature panels have a background design that
rubs off if anyone tries to erase.  There's the "fingerprint"
design on the American Express panel, repeated Visa or MasterCard
logos on some bank cards, and the "Safesig" desgn on others.  The
principle is the same as with the security paper used for checks.
If you try to earse a check on security paper, the wavy-line 
pattern erases, leaving a white area-- and it is obvious that 
the check has been altered. Rumors hint of a more elaborate 
gimmick in credit-card panels. It is said that if you erase the 
panel, a secret word--VOID--appears to prevent use of the card.  
To test this rumor, fifteen common credit cards were sacrificed. 
An ordinary pen eraser will erase credit-card signature panels, 
if slowly.  The panels are more easily removed with a cloth and a 
dry-cleaning fluid such as Energine.  This method dissolves the 
panels cleanly.  Of the fifteen cards tested, six had nothing under 
the panel(other than a continuation of the card back design,  where 
there was one).  Nine cards tested had the word "VOID" under the panel.
In all cases, the VOIDs were printeed small and repeated many times
under the panel. The breakdown:
                 Void Device           Nothing
             --------------------------------------
               Bloomingdale's         American Express Gold Card
               Bonwit Teller          Broadway
               Bullock's              MasterCard(Citibank)
               Chase Convenience B.C. Neiman-Marcus
               I. Magnin              Robinson's
               Joseph Magnin          Saks Fifth Avenue
               First Interstate B.C.
               Montgomery Ward
               Visa (Chase Manhattan)
When held to a strond light, the VOIDs were visible through the
Blooming-dales's card even without removing the panel. The VOID
device isn't foolproof.  Any crimianl who learns the secret will
simply refrain from trying to earse the signature.  Most
salesclerks don't bother to check signatures anyway. Moreover, it
is possible to paint the signature panel back in, over the
VOIDs--at least on those cards that do not have a design on the
panel. (Saks' panel is a greenish-tan khaki coler that would be
difficult to match with paint.)  The panel is first removed with
dry-cleaning fluid. The back of the card is covered with masking
tape, leaving a window where the replacement panel is to go.  A
thin coat of flat white spray paint simulates the original panel.
  1. 99 -
  The Magnetic Strip
  ------------------
The other security device on the back of the card, the brown
magnetic strip, is more difficult to analyze.  Some people think
there are sundry personal details about the cardholder stored in
the strip.  But the strip has no more information capacitythan a
similar snippet of recording  tape. For the most part banks are
reticent about the strip. The strip need not contain any
information other than the account number or similar
indentification.  Any futher information needed to complete an
automatic-teller transaction-- such as current account
balances--can be called up from bank computers and need not be
encoded in the strip.  Evidently, the card expiration date is in
the strip.  Expired cards are "eaten" by automatic-teller machines
even when the expired card has the same account number and name as
its valid replacement card.  Credit limit, address, phone number,
employer, etc, must not be indicated in this strip, for banks do 
not issue new cards just because this info changes. It is not clear 
if the personal identification number is in the strip or called up 
from the bank computer.  Many automatic-teller machines have a secret 
limit of three attempts for provideing the correct personal 
identification nubmer.  After three wround attempts, the "customer" 
is assumed to be a crook with a stolen card, going through all 
possible permutations--and the card is eaten. It is possible to 
scramble the information in the strip by rubbing a pocket magnet 
over it.  Workers in hspitals or research facilites with large 
electromagnets sometimes find that their cards no longer work in 
automatic-teller machines. (If you try to use a magnetically doctored 
card, you usually get a message to the effect, "Your card may be 
inserted incorrectly. Please remove and insert according to the 
diagram.")                           
  The Bloomingdale's Color Code
  -----------------------------
Only in a few cases does the color of a credit card mean anything.
There are, of course, the American Express, Visa, and MasterCard
gold cards for preferred customers.  The Air Travel Card comes in
red and green, of which green is better. (With red, you can charge
tickets for travel within North America only.)  The most elaborate
color scheme, and a source of some confusion to status-conscious
queues, is that of Bloomingdale's credit department, here is how 
it works: Low color in the pecking order is blue, issued to 
Bloomingdale employees as a perk in their compensation packages.  
The basic Bloomingdale card is yellow.  Like most department store 
cards, it can be used to spread payments over several months with 
the payment of a finance charge.  The red card gives holders three 
months' free interest and is issued to customers who regularly make
large purchases.  The silver card is good for unlimited spending, 
but as with a travel and entertainment card, all charges must be paid 
in thirty days.  The gold card offers the same payment options as the
yellow card but is reserved for the store's biggest spenders.
  1. 100 -
Card Formats and Bank Numbers
I. PREFACE
This is my first infofile as a N.A.R.C. member. For those of you
who have read "Getting Serious about Carding by Optical Illusion",
this is a somewhat a con-tinuation of things you need to know about
carding which Optical Illusion did not cover. In this file, we'll
try to cover the aspects of the use (or shall we say misuse) of a
credit card, strategies mail order companies keep us from getting
away with carding, and a list of bank id numbers with their banks.
II. CREDIT CARDS versus CHARGE CARDS
Many people have the misconception that all cards are credit cards.
This is of course not true. For example, American Express is a
charge card and not a credit card. American Express is a charge
card since the owner of the card must pay off the whole amount when
his bill comes. If the owner doesn't, he or she is in serious shit.
One thing good about the American Express is that it has no limit
on how much the person can spend as long as the person can pay off 
the bill when it comes. Basically, the card is based on the person's 
good judgement on how much money the person have. Why is there 
American Express Gold and regular American Express cards then? It 
still has a hidden limit which you 	cannot buy a Corvette ZR-1 with 
a regular American Express. You could however do it with a American 
Express Platinum (if you can find one to abuse). This means you can 
buy more expensive things at one time with a Gold or Platinum card. 
Credit cards have a set limit after you you apply for the card. 
Usually a Classic Visa has about $700 plus or minus $100. Mastercard 
on the other hand has about $1000 limit on it.
III. TYPES OF CARDS
        Credit Cards                          Charge Cards
        VISA                                  American Express
        Mastercard                            American Express    
        Optima
        Discover                                                 
Here's a couple type of cards I do not know what category they fall
into since they are never accepted by mail order companies. One of
them is Diner's Club International and the other is Carte Blanche.
  1. 101 -
      Bank name                                Bank name
                                                                
 _______________________________--------------------------------
|                     |        ||                      |       |
|  BANK of N A R C    | V I S A||BANK of N A R C     |  V I S A|| 
                      |________||                     |________|
|                      |        |        |                      | 
 
| 4000  123  456  789  |hologram|        | 4000 0123 4567 8910 
|hologram|
|                      |________|        |                     
|________|
|   00/00    00/00 CV  |   ___  |        | 00/00/00  00/00/00 PV| 
 ___  |
|                      |  //    |        |                      | 
//    |
|  John Doe            |  \\__  |        |  John Doe Jr.        | 
\\__  |
---------------------------------       --------------------------
  	                        |
VISAs are grouped either                         |
in 4XXX XXX XXX XXX or                           |
   4XXX XXXX XXXX XXXX.                   This is either a C or a P.
The  2 groupings used are different for       C for Classic
(regular) each bank. There are banks'                P for
Preferred (better, much better)
preferred cards that are group in 4 3 3 3.
_______________________________
|                               |
|                               |
|  B A N K   of   N.  A.  R.  C.|   All Mastercards are 12        
                                    digits grouped
|_______________________________|  in blocks of four digits each.
|                           ___ |
|  5000  1234  4567  8910  /   \|
|                          |M C||
|  1234  00/00    00/00 BN |   ||  Hologram
|                          |M C||
|   Joe Card Alot          \___/|
---------------------------------
                   BN is the Bank initials
    |
  1234 is the bank id number.
  The bank may have more than one id number for
  their 5000 XXXX XXXX XXXX series cards.
  1. 102 -
IV. MAIL ORDER COMPANIES
Most of the mail order companies will accept Visa or Mastercard.
Some will also accept American Express and Discover. These mail
order companies check the card by either calling into a TRW center
to check if the amount of the order will exceed the limit. In
either case of a approval or declining, the mail order companies
will call you back to check with you the order you have placed. 
Anyways, a way of finding a valid card is to call a credit approval 
system yourself. Here's some ways of checking:
     (1)  1-800-554-2265 for check Mastercard or Visa
                for Visa         20#1067#24#CARD#EXP#XX*XX#
               - 10 and 20 are for the type of cards
               - 1067 is the bank id number
               - 24 is the merchant number (52 will also work)
               - EXPiration must be in the form of 0291 for feb   
                 of 1991
               - XX*XX is the amount. Use a small number like
                 11*04 for $11.04.
Another way mail order companies verifying cards is to call the
bank of the card and verify the name of the person and the billing
address versus the name you gave the mail order companies and the
address (drop site). So the only way of getting pass this is to
have the stuff sent to the person's address or getting the waybill
number from the mail order houses and intercept the package at the
UPS or Federal Express office before the package arrive's at the
card owner's address.
V. VISA BANK Numbers
4428  Bank of Hoven
4128  Citibank           CV
4271  Citibank           PV
4929  Barclay Card       CV  (from England)
4040  Wells Fargo        CV
4019  Bank of America    CV
4024  Bank of America    PV
4019  Bank of America    Gold (This card looks like a CV but      
  	                     without a CV afterthe expiration date)
4678  Home Federal
4726  Wells Fargo        CV
4036 4561 4443 4833 4070 4735 4673 4044 4050 4226 4605 4923 4820
4048                     CV  4121
  1. 103 -
VI. Mastercard
    A. BANK NUMBERS
5419  Bank of Hoven
5410  Wells Fargo
5412  Wells Fargo
5273  Bank of America             Gold
5273  Bank of America
5254  Bank of America
5286  Home Federal
5031  Maryland of North America
5326 5424 5250 5417 5215 5204 5411 5421 5329 5308 5217 5415
     B. BANK ID NUMBERS
5410  Wells Fargo      -- 1037
5410  Wells Fargo      -- 6785
5419  Bank of Hoven    -- 1933
5410  Wells Fargo      -- 6037
5204                   -- 1006
5250                   -- 1260
5215                   -- 6207
5424                   -- 1065
5411                   -- 1169
5421                   -- 2143
5417                   -- 1786
5417                   -- 1711
5415                   -- 1530
VII. AMERICAN EXPRESS
3728      GOLD
3713      Regular
3732      Regular
3737 3782 3731 3724 3742 3727 3787 3726 3766 3734 3749 3763 3710
3718 3720 3739
Carding For Benfit And Profit
First off, there are many types of credit cards. But the main ones
we will be discussing are American Express, Discover, Mastercard,
and Visa. These four are the largest and most widely used types. My
personal favorite is the Discover card, since the company is a real
loser. It is best for the beginner to start out with Discover, then
move to American Express, then to Mastercard, and finally visa,
  1. 104 -
The first thing you have to do is to find a credit card number 
(we will be refering to them as CCNs). There are several different 
ways of going about this, which will be discussed later in this file.
The way you can tell the cards apart are the first digit of the CCN.
                 Digit               Type of Card
                -------              ------------
                   3               American Express
                   4                     Visa
                   5                   Mastercard
                   6                    Discover
Now that you know the first digit of the card you want you need the
different CCN formats. They are listed below.
American Express
3xxx-xxxxxx-xxxxx
Visa
4xxx-xxxx-xxxx-xxxx
or
4xxx-xxx-xxx-xxx
Citibank Visa, which is by far the most popular is
4128-xxx-xxx-xxx
Mastercard
5xxx-xxxx-xxxx-xxxx
The type of Mastercard I use is Citibank which is
5424-xxxx-xxxx-xxxx
Discover
6xxx-xxxx-xxxx-xxxx
There are a number of ways through which you can get CCNs. They are
listed below in order of easiest method to hardest method.
1) Go for a little swim. That is, in a big dumpster. This is called
trashing. Go in back of department store or anywhere that accepts
credit cards and jump in. But make sure it's not at a mall, or
  1. 105 -
someone might see you and contact the police. When you've
found the perfect dumpster, just dive right in. Just look around
for carbons. You know, the things that the salesperson throws away
after a credit card purchase. If anyone sees you, just pretend 
you're a bum. Or if that won't work, pretend you're looking for 
your baseball that flew in. Once you find these, (and making sure 
you don't rip them) put them in your cap, or somewhere where they 
won't fall out, and just calmly go home. Now comes the easy part. 
You just copy down everything important. The CCN, Expiration date, 
and Name. Then you rip it up into shreds and burn them. Now there is 
no way you can get caught unless  you're a REAL idiot. 2) If you have
a friend (it's better if it's a fellow pirate) that works in a store 
which performs credit card transactions, you might save yourself the 
trouble of trashing and ask him if he doesn't mind slipping some 
carbons into a bag after they ring up a sale. If he won't, bribe 
by saying you'll get him something too.
      Carbons
      ______________________________________
      |  (1)    (2)                        |
      |  (3)    (4)                        |
      |  (5)                               |
      |                                    |
      |____________________________________|
(1) The Account Number. This is the most important thing on a
Credit Card. (2) The Expiration date for Visa or Mastercard (3) The
Expiration date for Visa or Mastercard (4) The Expiration date for
American Express (5) The Card Holder's name. The name is not very
important but it is good to have. 3) If are really advanced, you
can use a credit card formula, several do exist. If you're good at
math and patterns, you should be able to figure out at least one 
formula. Once you have a newly formulated or newly found Credit 
Card, you have to first check to see if it is still valid before 
you try to use it. The easiest way I know of, is 1-800-554-2265. 
But after you enter something you must enter a pound. Just look at 
the example if you're confused. You must first, of course, dial 
1-800-554-2265. Then it should say "Enter type". 
                         Number            Card Type
                         ------            ---------
                          10#              Mastercard
                          20#              Visa
                          30#              American Express
Then it will ask you for "Bank identification". Just enter 1067#.
Now it will request a Merchant Number. Enter either 24# or 52#.
Either one should work. Now it will ask you for the card number.
Enter it in with a # sign following it. Then it will ask for the
expiration date. Enter it with a # sign following it. And last, 
  1. 106 -
but not least, it will ask for the amount. This is a little
rickier. Look at the examples. If you still don't understand it,
hen you're dumb, and you shouldn't be trying to card. For $100.25
ou enter 100*25#. For $1,532.67 you enter 1532*67#. Got it? Good.
ow the moment of truth comes. In the next few seconds the computer
will say Approved or Declined. Yes or No. Light or Dark. If it's
approved, pat yourself on the back. If not, too bad. Go look for
another one. 
  • SPECIAL NOTE *
In Canada dial 416-785-3222 for Visa credit checks or dial
1-800-268-2439 for Mastercard credit checks. For a Visa credit
check in Canada, you first dial the authorization center and a
operator will answer.  Then you will be ask for the card number,
amount of purchase, merchant # and expiry date. If the card is good
then she'll tell you the authorization number. If the card is
invalid then she'll say that the number was invalid. For a 
Mastercard credit check in Canada, you first dial the  authorization 
center and a automated computer will answer. It will ask you if you 
want it in French or English, so if you want English punch in 1, or 
if you want French punch in 2.  Next it will ask you for the "Credit 
Card Number".  Just punch in the Mastercard number and the press the 
# sign following the number. Next it will ask you for the "Amount In 
Dollars Only", so press in the amount and then the # sign following 
it.  Next it will ask for a "Merchant #", this can be skipped by 
just pressing the # sign.  After that  it will ask for a "Expiry 
Number". Punch the expiry number in and press a # sign following it, 
if you made a mistake punching in the amount, then from here you press 
2 and change the amount of the purachse. After all that it will come 
back and if it's valid, it will tell you an authorization number,
otherwise it will say that the number was invalid. If the amount is
too high, then it will tell you to hold on for an operator. And
then the operator will verify the card for you.

ONE NOTE: IF A CARD HAS $5000 AND YOU VERIFY IT FOR $3000 DOLLARS,

YOU CAN ONLY VERIFY IT FOR $2000 MORE. ANOTHER EXAMPLE IS IF THE
CARD HAS $3000 AND YOU VERIFY IT FOR $1250, THE CARD CAN BE
VERIFIED $1750 MORE BEFORE IT WILL SAY DECLINED.
*****************************************************************
Now for the hardest part of all, purchasing merchandise with your
newly verified CCN. You will probably want some computer equipment,
knowing that that's what most people want. And be sure to read this
entire file before attempting to card something. If you don't, you
might get caught and spend ten years in jail and never be able to
get another decent job again, just because you didn't listen to me
and read this entire file.  Now that I have your attention, we must 
lay down some rules for ordering merchandise to insure your safety. 
1) Always go to a pay phone. 
  1. 107 -
2) Never give out your real name. 3) Or your address and telephone
number. 4) Plan out the drop site and the fake number. I use the
busiest PD board there is. 5) Sound calm. Remember, they can't do
anything to you. 6) If they get suspicious, just keep sticking to 
the same story. A consistent lie is better than a inconsistent 
truth. Where should I ask them to ship it to? This is a common 
question. The best place to have the merchandise shipped to is an 
abandoned house. The sites where you want them shipped are called 
drop sites. Jot down this address. Now that we have set those rules, 
we now have to call a store. Make sure it is a small store, for they 
don't have the card checking techniques the bigger ones do. Now when 
they ask you your name and stuff like that, just give them the fake 
ones, without hesitation!! If you hesitate then they might get 
suspicious. Even spell it out for them. And try to be friendly. Don't 
sound nervous or anything. Now if they are online to credit bureaus 
suck as CBI or TRW then make up an excuse, like have your friend 
threaten you in the background (or something). If they are online
with CBI or TRW they can verify everything in just a couple of
minutes. Now if they aren't then you're in luck. Now when they ask
for a number, give them the number you have ready. Bullshit your
way through. If they aren't online, they can't verify really
anything but that the CCN is valid and there is enough credit to
pay for the merchandise. I wouldn't suggest making a business out
of this, either. Sure, if you want to get a few dollars for things
you order (and that you don't want anymore) sell it and keep the 
money. It wouldn't be all that great to go to jail for ten years 
and never get another decent job in your whole entire stinking life, 
just because someone you don't even know, wanted a bigger hard drive 
for $100? Yeah, you know I have a good point there. Well, the truth 
is that the only people that should really even make deals are the 
people with lots of experience.
    And now how to card Travelers Checks. These are alot easier
than what I just talked about. All you gotta do is call
1-800-777-7337 and use an American Express card and ship it to your
drop site. Now just go to another country and spend away. Have fun. 
Now for the most dangerous way of carding, by far. In person
carding. But you get the stuff really quick. Now you need a fake
name again. This time you need two. Your dad and a son. Lets say
your name is Robert Armstrong. Look at the example.
"Hello, Computers for less, how may I help you?"
"Yes, this is Robert Armstrong calling from California (or
somewhere across the country). My son, Mike, needs an Apple II. It
says here in your ad that you sell them for such and such. I would
like to place an order for one." 
"OK. And how will you be paying for this?"
"Visa."
  1. 108 -
"OK. Number?"
"4xxx-xxxx-xxxx-xxxx."
"OK, thank you. Now how do you want this shipped?"
"Well, since my son is going to college right next to you, I
thought I could send him to go pick it up."
"Oh, OK. Sure. Do you want us to call your son to notify him?"
"No, that's ok. He's supposed to call in a couple of minutes. He
always calls me at 5:00PM every Friday. I can't wait to hear what
he says when he hears what I got him. When can he go pick it up?"
"Anytime."
"Ok, thank you.
"Thank you for ordering from Computers for Less."
<CLICK>
    Now comes the most dangerous part. Go to the store, park your
car where none of the employees can see it. Now go in and state
your fake name and what you are there to pick up. In Mike's case...
"Hello. I'm here to pick up an Apple II my dad bought for me."
"OK, sure. Mike Armstrong?"
"Yes, that's me."
"Ok, wait. We'll bring it up right now."
"Thank you."
"Well, here you are."
<TAKE>
"OK, Thank you."
"No problem. Thank you for ordering from Computers for Less."
Now just walk over to your car and drive off. I wouldn't really
recommend this method, but if you're desperate, try it. Now if they
get suspisious, don't get nervous. Just start complaining. Say like
"My dad paid good money for this system and now you won't give it
to me?" If they still won't give it to you, then say, "Ok, I'll
come tommorrow. But if it isn't ready tommorow I'm going to tell
  1. 109 -
my dad to get a refund." Then walk out really pissed looking 
and never go back. They were probably setting up a trap for
you. Better safe than sorry.  Now I'll explain what happens to the
unlucky guy. The guy's CCN you used of course. Now let's pretend
this unfortunate soul's name is John Doe. At the end of the month,
John Doe gets his Visa bill from the bank's credit card department.
Among the things on his bill he notices a VGA card and monitor.
John Doe then calls his bank and starts cussing them out and 
asking where the fuck did they get the VGA card and monitor from. 
Then the bank should send him a xerox copy of the original reciept, 
showing when it was bought and where it was sent to, and the second 
is an affidiate. This is a formal document saying that you did not 
make the purchase, you do not know who did, and did not authorize 
this purchase. It must be signed by him and then brought to the bank 
and signed by a notary public and have the bank's stamp on it. From 
there the bank can either go to their insurance agent or Visa, 
depending on who they have a deal with, and be paid for the carded 
stuff. Then John Doe must cut his cards in half and send them to the 
bank. After he has done that, he is re-issued new cards with a new CCN. 
How to Find Credit Cards: carbons or other methods
II. Trash Digging
Although not the most fun method of getting CCs it is the safest by
far.  It does not take much intelligence to go through a dumpster
and look for credit card carbons... But I assure you even the most
experienced carders use this method. The way this is done is to
find a store that people always or almost always use credit cards. 
 It must also have a dumpster or trashcan where its garbage is
dumped that is out of plain sight.  Wait for the store to close or 
go when few people are around and search for ripped up carbons.  
Then piece them together and you should get full or partial 
information.
III.  Slight of Hand
Another method which I myself often use is this trick on
ususpecting customers...If you work as a cashier at a store that
accepts credit cards you have an excellent opportunity to get card
numbers and full info. What you need to do is when someone comes in
and buys something via credit card,  you wait for him/her to rip up
the carbon and throw it out,  if he/she throws it out in the stores
trashcan,  pick up the cardbon right away.  Or sometimes the person 
will not even ask for his/her carbon,  although this is somewhat rare.
But I have even had someone leave their actuall credit card behind,  
then I just copy the name and number down, and give it back.
  1. 110 -
IV.  Mailbox Searching
This is basically a very lame way to get credit cards due to the
danger and in order to get CCs this way you get the actuall card.
What you do is have a bunch of pointless flyers made up, and goto
a decent neighborhood away from your area of residence that has
homes with accesable mail boxes.  Wear sunglasses and a baseball
hat if possible,  although don't wear the shades on a cloudy day. 
Do this during school time if possible so you are not seen.  What
you do is go by each persons mail box and put a flyer in it (Which
in itself is illegal, but few people know this) and while you are
doing so search the mail for envelope from banks.   If you happen
to find one from a bank slip it into your pile of flyers and sneak
off to open it.  If it has a CC in it then you are in luck.  Go
home and prepare to card,  because you don't have much time until
the card will go bad probably. This method is not a very good one, 
use only if you are desperate.
V.  TRW
I will keep this short because this uses more hacking than
carding... But one method is to hack the local TRW system and you
can get full info on a card with name and number. What you do is
find a carbon with partial info some other way (Must be name and
number)  and check TRW for it,  then you will get full info.
Personnally,  I never hacked TRW on my own although it can be done.
Also, you may know some big time hacker through bbsing,
have him hack TRW for you and get the info in exchange for carding
him something. 
VI. Trading info
Another way to get credit card numbers is to just trade information
of some sort to someone who has a steady supply of credit cards. 
Maybe this would be phreaking codes,  or dialups,  or maybe some
bank numbers, or even money I suppose(This would make you a lamer
in my book) . There are many people out there who have connections
you don't, and some may even give you the numbers and such for free.
VII.  VMB's and Carding Subs
This is basically self explanitory.  There are many Voice Mail
Boxes or VMBs that have cards with full info on them, and they are
not that hard to get the number to,  just e-mail some people you
know,  maybe they know of one.  Just,  once in a while put in a
valid card and then all will go well. Also many elite systems have
their own carding sub, there will be valid cards on these subs for
the taking.  Don't be shy,  although if the card number is really
old don't bother, you are just asking to get caught.
  1. 111 -
VIII.  Connections
Maybe you know someone who can do one of the above methods.  Don't
be afraid to ask for his help.  Maybe this person is a cashier that
can get you a steady supply of credit card numbers with names. 
Then get those to someone who hacks TRW and then you will get the
full info on several cards and be able to take you pick and return
the favor to some VMBs you leeched card numbers off of...It all
works out very nicely...
  1. 112 -
THE BAUDY WORLD OF THE BYTE BANDIT: A POSTMODERNIST INTERPRETATION
OF THE COMPUTER UNDERGROUND
An earlier version  of this paper was presented  at the American
Society of Criminology annual meetings, Reno (November 9,  1989).
Authors are listed in alphabetical order.  Address correspondence
to Jim Thomas. We are indebted  to the numerous anonymous  computer
underground participants who provided  information.  Special
acknowledgement goes to Hatchet Molly, Jedi, The Mentor, 
Knight Lightning,  and tran King.
  	                       ABSTRACT
The criminalization  of "deviant  acts" transforms  social meanings
into legal ones.  Yet, legal meanings are not necessarily social
meanings. The legitimacy of statutory social control generally
requires that one accept  the realist textual readings of those
with the power to  interpret and stigmatize behaviors as
inappropriate.   "Moral  crusades" that lead to  definitions of
criminalized deviance tend  to reduce the meanings  of polysemic
acts to unidimensional ones that  limit understanding of both the
nature of the acts and their  broader relationship to the culture
in which they occur.   This has occured with the criminalization of
computer phreaking and hacking.  In this paper, we examine the
computer underground as a cultural, rather than a deviant, 
phenomenon.   Our data reveal the computer underground as an 
invisible community with a complex and interconnected culture, 
dependent for survival on information sharing,  norms of
reciprocity, sophisticated socialization rituals,  and an explicit
value system.   We suggest that the dominant image of the computer
underground as one of criminal deviance results in a failure to
appreciate cultural meaning.   We conclude  by arguing that there
are characteristics of underground activity that embrace a 
postmodernist rejection of conventional culture. Hackers are
"nothing more  than high-tech street gangs" (Federal Prosecutor,
Chicago). Transgression is not immoral. Quite to the contrary, it
reconciles the law with what it forbids; it is the dialectical game
of good and evil (Baudrillard, 1987: 81). There ain't no sin 
and there ain't no virtue.  There's just stuff people do.   It's
all part of the nice, but that's as far as any man got a right to
say (Steinbeck, 1939:31-32).
The criminalization of "deviant acts" transforms and reduces social
meanings to legal ones.  Legal meanings are not necessarily social
meanings.   Most deviancy  research tends to reproduce conventional
social ideology and operative definitions of normality within its
concepts and theories.   On occasion, these meanings represent a
form of "class  politics" that protect the power and privilege of
one group from the challenge of another: Divorcing moral crusades
from  status group competition while denying that cultures are
linked to social classes has undermined attempts  to link lifestyle
  1. 113 -
politics to group struggles (Beisel, 1990: 45). Once a category of 
behaviors  has become defined by statute  as sanctionably deviant, 
the behaviors so-defined assume a new set of meanings that may obscure
ones possessed by those who engage in such behaviors.   "Computer
deviants" provide one example of a criminalized type of "lifestyle 
politics."
The proliferation of computer  technology has been a accompanied by
the growth of a computer underground (CU),  often mistakenly
labeled "hackers," that is perceived as criminally deviant by the
media, law enforcement officials, and researchers. Drawing from
ethnographic data,  we offer  a cultural rather than a
criminological analysis of the underground  by suggesting that it
reflects an attempt to recast,  re-appropriate,  and reconstruct
the power-knowledge relationship that  increasingly dominates the
ideology and actions of modern society.  Our data reveal the
computer underground as an invisible community with  a complex and
interconnected cultural lifestyle, an inchoate anti-authoritarian
political consciousness, and dependent on norms of reciprocity,
sophisticated socialization  rituals,  networks of information
shaand an explicit value system.   We interpret the CU culture as
a challenge to and parody of conventional culture,  as a playful
attempt to reject the seriousness of technocracy,  and as an ironic 
substitution of rational  technological control of the present for 
an anarchic and playful future. Stigmatizing the Computer Underground 
The computer underground refers to persons engaged in one or more of 
several activities, including pirating, anarchy, hacking, and 
phreaking[1].    Because computer  underground participants freely 
share information and often are involved collectively in a single 
incident,  media definitions invoke the generalized metaphors of  
"conspiracies" and "criminal rings,"  (e.g.,  Camper, 1989;  Zablit,
1989),  "modem macho" evil-doers (Bloombecker, 1988), moral bankruptcy 
(Schwartz, 1988),  "electronic trespassers" (Parker:  1983), "crazy 
kids dedicated to making mischief" (Sandza, 1984:  17), "electronic 
vandals" (Bequai:  1987), a new "threat" (Van, 1989), saboteurs 
("Computer Sabateur," 1988),  secret societies of criminals (WMAQ,
1990), and "high-tech street gangs" ("Hacker,  18," 1989).   These 
images have prompted calls for community and  law enforcement vigilance
(Conly  and McEwen, 1990: 2) and for application of the Racketeer 
Influenced and Corrupt Organizations (RICO) Act to prosecute and 
control the "criminals" (Cooley, 1984).   These images fail to 
distinguish underground "hobbyists," who may infringe on  legal norms 
but have no intention of pillaging, from felonious predators,  who 
use technology to loot[2].   Such terminology provides a common stock 
ofknowledge that formats  interpretations of CU activity  in ways 
pre-patterned as requiring social control  to protect the common 
weal (e.g., Altheide, 1985). As Hollinger and Lanza-Kaduce (1988:
119), Kane (1989), and Pfuhl (1987) observed,  the stigmatization 
of hackers has emerged primarily through value-laden nedia
  1. 114 -
depictions. When in 1990 a Cornell University graduate student 
inadvertently infected an in ternational computer network by  
planting a self-reproducing "virus," or "rogue program," the news  
media followed the story with considerable detail about  the dangers 
of computer  abuse (e.g., Allman, 1990; Winter, 1988).  Five years
earlier, in May of 1983, a group of hackers known as  "The 414's"
received equal media attention when they  broke into the computer
system  of the Sloan Kettering Cancer research center.   Between
these dramatic and a typical events, the media have dramatized the
dangers of computer renegades,  and media anecdotes  presented
during Congressional legislative debates  to curtail "computer
abuse"  dramatized the "computer hacking problem" (Hollinger  
and Lanza-Kaduce,  1988: 107).   Although the accuracy and 
objectivity of the evidence has since been challenged (Hollinger 
and lnza-Kaduce 1988: 105), the media continue to format CU activity  
by suggesting that any computer-related felony can be attributed to 
hacking.  Additionally, media stories are taken from the accounts of 
police blotters, security personnel, and apprehended hackers, each of 
whom have different perspectives and definitions.   This creates a 
self-rein-forcing  imagery in  which  extreme  examples and  cursively 
circulated data are discretely adduced  to substantiate the claim of 
criminality by  those with a vested interest in creating and 
maintaining such definitions.   For  example,  Conly and McEwen (1990)
  list examples of law  enforcement jurisdictions in which special units 
to  fight "computer crime," very  broadly defined, have been created.
These broad  definitions serve to expand the scope of authority and 
resources of the units. Nonetheless, despite criminalization,  there 
is little  evidence to support the contention that computer hacking 
has been sufficiently abusive or pervasive to warrant prosecution 
(Michalowski and Pfuhl, forth-coming). As an antidote to the  
conventional meanings of CU activity  as simply one of deviance, 
we shift the social meaning of CU behavior from one of stigma to 
one of culture creation and meaning. Our work is tentative,  in 
part  because of the lack of previous substantive literature and in 
part  because of the complexity of the data, which indicate a 
multiplicity of subcultures within the CU.   This paper examines 
of two distinct CU subcultures, phreaks and hackers,  and
challenges the Manichean view that hackers can be understood simply
as profaners of  a sacred moral and economic order. The Computer 
Underground and Postmodernism: The computer underground  is a culture 
of  persons who call computer bulletin board systems (BBSs, or just 
"boards"),  and  share the interests fostered by the BBS. In 
conceptualizing the computer underground as a distinct culture, 
we draw from Geertz's (1973: 5) definition of culture as a system 
of meanings that give significance to shared  behaviors that must 
be  interpreted from the perspective of those engaged in them.  A 
culture provides not only the "systems of standards for perceiving, 
believing,  evaluating, and acting" (Goodenough,  1981:  110),  but 
includes the rules and symbols  of interpretation and discourse for
  1. 115 -
partici-pants: Incrude relief,  culture can be understood as a set 
of solutions devised by a group of people to meet specific problems
  posed by situations  they  face in  common. . . This notion of culture 
as a living, historical product of group problem solving  allows an
approach to cultural study that is applicable to any group, be it
a society, a neighborhood, a family, a dance band,  or an
organization and its segments  (Van Maanen and Barley, 1985: 33).
Creating and maintaining a culture requires continuous individual
or group processes of  sustaining an identity through the coherence
gained by a consistent aesthetic point of view, a moral conception
of self,  and a lifestyle that expresses those conceptions in one's
immediate existence and tastes (Bell, 1976:  36). These behavioral
expressions signify a variety of meanings,  and as signifiers they
reflect a type of code that can be interpreted semiotically,  or as
a sign system amenable to readings  independent of either
participants or of  those imposed by the super-or-dinate culture: 
All aspects of culture possess  a semiotic value, and the most 
taken-for-granted phenomena can  function as signs:   as elements
in communication systems governed by semantic rules  and codes
which are  not themselves directly apprehended in experience.  
These signs are, then,  as opaque as the social relations which 
produce them and which they re-present (Hebdige, 1982: 13). It is 
this symbolic cultural ethos, by which we mean the style, world 
view, and mood (Hebdige,  1979),  that reflects the postmodernist 
elements of the CU and separates it from modernism. Modernist 
culture is characterized especially  by rationality, technological 
enhancement, deference to centralized control,  and  mass 
communication. The emergence of computer technology has created 
dramatic changes in social communication, economic  transactions, 
and information processing and sharing, while simultaneously 
introducing new forms of surveillance, social control,  and 
intrusions on privacy (Marx, 1988a: 208-211;  Marx and 
Reichman, 1985).  This has contributed to a: richly confused 
and hugely verbal age, energized by a multitude of competing 
discourses,  the very proliferation and plasticity of  which 
increasingly deter mine what we defensively  refer  to as our 
reality (New- man, 1985: 15). By Postmodernism  we mean a reaction 
against "cultural moder- nity" and a destruction of the  constraints 
of the present "maximum security society" (Marx,  1988b)  that reflect 
an attempt to gain control  of an alternative future. In the CU world, 
this constitutes a conscious resistance to the  domination of but not 
the fact of technological encroachment into  all realms of our social
existence.  The CU represents a reaction against modernism by
offering an ironic response to the primacy of a master technocratic
language,  the incursion of computers into realms once considered
private, the politics of techno-society,  and the sanctity of
established civil and state authority.  Postmodernism is
characterized not so much by a single  definition as by a number of
interrelated characteristics, including, but not limited to: 
  1. 116 -
            1.  Dissent for dissent's sake (Lyotard, 1988).
            2.  The collapse of the  hierarchical distinction     
                between mass and popular culture (Featherstone,   
                1988: 203).
            3.  A stylistic promiscuity favoring  eclecticism and 
                the mixing of codes (Featherstone, 1988: 203).
            4.  Parody, pastiche, irony,  playfulness and the     
                celebration of the surface "depthlessness"  of    
                culture (Featherstone,  1988: 203).
            5.  The decline of the originality/genius of the      
                artistic producer and the assumption that  art    
                can only be repetitious (Featherstone 1988: 203).
            6.  The stripping  away of social and  perceptual     
                coordinates that let one "know where one is"      
                (Latimer, 1984: 121).
            7.  A search for new ways  to make the unpresentable  

presentable, and break down the barriers that

  	            keep the profane out of everyday life (Denzin,    
      	        1988: 471).
            8.  The introduction of new moves  into old games or  
  	            inventing new games  that are evaluated           
      	        pragmatically  rather than from some uniform      
          	    stand point  of "truth" or philosophical          
              	discourse (Callinicos, 1985: 86).
             9.  Emphasis on the  visual over the literary        
  	             (Lash,  1988: 314).
      	    10. Devaluation of formalism and  juxtaposition of    
          	    signifiers taken from the banalities of  everyday 
                life (Lash,  1988: 314).
  	        11. Contesting of rationalist and/or  didactive views 
      	        of culture (Lash, 1988: 314).
          	12. Asking not what a cultural text  means,  but what 
                it does    (Lash, 1988: 314).
  	        13. Operation through the spectator's immersion, the  
      	        relatively unmediated investment of his/her       
          	    desire in the cultural  object (Lash, 1988: 314).
            14. Acknowledgement of the decenteredness  of modern  
                life and "plays with the apparent emptiness  of   
                modern life as well as the lack of coherence  in  
                modern symbol systems" (Manning, 1989: 8).
"Post-Modernism" in its positive  form constitutes an intellectual
attack upon the atomized,   passive and indifferent mass culture
which,  through the saturation of electronic technology, has
reached its zenith in Post-War American (Newman,  1985:  5). It is
this style of playful rebellion, irreverent subversion, and 
juxtaposition of fantasy with high-tech reality that impels us to 
interpret the computer underground as a postmodernist culture.
Data and Method: Obtaining data from any  underground culture
requires tact. BBS operators protect  the privacy of users and 
access to elite boards, or at least to their relevant security 
  1. 117 -
levels,  virtually always requires  completion of a preliminary 
questionnaire,  a screening process, and occasional voice
verification. Researchers generally do not themselves violate laws
or dominant norms, so they depend on their  informants for
potentially "dirty information" (Thomas and Marquart, 1988).   Our
own data are no exception and derive from several sources. First, 
the bulk  of our data come  from computer bulletin board systems. 
BBSs are personal computers (PCs) that have been equipped with a 
telephone modem and special  software that connects users to other
PCs by  telephone.   After "logging in" by supplying a valid user
name and  password,  the user can receive and leave messages to
other users of the system.   These messages are rarely private and
anyone calling the BBS can freely read and respond to them.  There
is usually the capacity to receive (download) or send (upload) text
files ("G-philes")  or software programs between the caller and
host system. We logged the message section of CU BBSs to compile
documentary evidence of  the issues deemed important  for
discussion by participants.   Logs are "captured" (recorded using
the computer buffer)  messages left on the board by users.  
Calculating the quantity of logged data is  difficult because of
formatting variance,  but we estimate that our logs exceed 10,000
printed pages. The logs  cited here are verbatim  with the
exception  of minor editing changes in format and extreme
typographical errors. Identifying underground BBSs can be 
difficult,  and to the uninitiated they may appear to be licit 
chat or shareware boards. For callers with sufficient access,  
however,  there exist back-stage realms in  which "cracking" 
information is  exchanged and private text or software files 
made available. With current technology,  establishing a BBS  
requires little initial skill. Most boards  are short-lived and
serve only local  or regional callers. Because of the generally 
poor quality and amateur nature of these systems, we focused on 
national elite boards.   We considered a board "elite" if it met 
all of the following characteristics: At least one quarter of the 
users were registered out side the state of the board  called;  the 
phone line were exclusively for  BBS use and available 24 hours a 
day; and the information and files, warez were current "state of  
the field." Elite CU members argue that there are less than ten 
"truly elite"  p/hacker boards nationally.  We obtained the  names 
and numbers of BBSs  from the  first boards we called, and used a 
snowball technique to supplement the list.   We obtained additional 
numbers from CU periodicals,and,  as we became more familiar with t
he culture,  users also added to the list.   Our aggregate data 
include no less than 300 Bulletin board systems,  of which at least 
50 attract phreaks and hackers,  and voice or on-line interviews with
 no less than 45 sysops (operators of BBS systems) and other active 
CU participants. A second data source included  open-ended voice and 
on-line interviews with hackers, phreaks and pirates.   The data 
include no less than 25 face-to-face, 25 telephone, and 60 on-line 
interviews obtained as we became familiar with our informants. Third,
  data acquisition included as much participation as legally possible in
  1. 118 -
CU activities[3]. This served to justify our presence in the culture 
and  provided information about the mundane activity of the CU. 
Finally,  we obtained back and current issues of the primary  
underground computerized magazines,  which are distributed on national 
BBSs as text files.  These contain information relevant to the 
particular subculture,  and included PHRACK,  Activist Times 
Incorporated (ATI), P/Hun, 2600 Magazine, PIRATE, TAP, Al.P.H.A 
and Legion of Doom (LoD/H). We also draw  data from national and 
international electronic mail (e-mail) systems on which an active
information-sharing CU network has developed and spread. Assessing
the validity and reliability  of data obtained in this manner
creates special problems.   One is that of sampling. The number of
boards,  their often ephemeral existence,  and the problem of
obtaining access  makes conventional sampling impossible.   We
focused on national  boards and engaged in theoretical sampling
(Glaser and Strauss, 1967: 45-77).  We consider our  sample
representative, and accept Bordieu's observation that: If,
following the canon dictated by orthodox methodology, you take a
random sample, you mutilate the very object you have set out to
construct.  If, in a study of the field of lawyers, for instance,
you do not draw the  President of the Supreme Court, or if, in an
inquiry into the French intellectual field  of the 1950s,  you	
leave out Jean-Paul Sartre,  or Princeton University in a study of
American academics, your field is destroyed, insofar as these
personas or  institutions alone mark a crucial position--there are
positions  in a field which command the whole structure  (Bordieu, 
interviewed in Wacquant, 1989: 38). We judge our  sample of
participants adequate  for several reasons. First,  we presume
that the members with whom we have had contact comprise the elite
members of the culture,  as determined by the nature of the  boards
they were on, references to them on national  boards,  the level of 
expertise displayed in their messages, and their appearance in the
"user lists" of elite boards. We consider the BBSs to be "typical
exemplars" because  of their status in the
culture, because of the level of sophistication both of users and
of message content,  and because of references to these boards as
"elite" in CU periodicals. 
The computer underground is both a  life style and a social
network. As a lifestyle, it provides identity and roles, an
operational ideology,  and guides daily routine.  As a social
net-work,  it functions as a  communications channel between
persons engaged in one of three basic activities:   Hacking, 
phreaking, and pirating[4].   Each subgroup possesses an explicit
style that includes an ethic and "code  of honor," cohesive norms, 
career paths,  and other characteristics that  typify a culture
(Meyer, 1989a, 1989b;; Meyer and Thomas, 1989). Hebdige (1982:
113-117) used the concept of homology to describe the structural
unity that binds participants and provides the "symbolic fit
between the values  and life-styles of a group" and 
  1. 119 -
how it expresses or reinforces its focal concerns. Homology refers
to the affinity and similarities  members of a group share that
give it the particular cultural identity.   These shared
alternative values and actions connect CU members to each other 	
and their culture,  and create a celebration of "otherness" from 
the broader culture. Hackers (Tune: "Put Another Nickel in")  
Put another password in, Bomb it out, and try again, Try to get 
past logging in,  Were hacking, hacking, hacking. Try his first 
wife's maiden name, This is more than just a game, It's real fun, 
but just the same It's hacking, hacking, hacking. Sys-call, let's 
try sys-call. Remember, that great bug from Version 3, Of R S X, 
  It's here!  Whoopee! Put another sys-call in, Run those passwords 
out and then, Dial back up, we're logging on,  We're hacking, 
hacking, hacking. (The Hacker Anthem, by Chesire Catalyst) 
Hacking broadly refers to attempts to gain access to computers to
which one does not possess authorization.  The term "hackers" first
came into use in the  early 1960's when it was applied to a  group
of pioneering  computer aficionados at  MIT (Levy, 1984).   Through
the 1970s,  a hacker was viewed as someone obsessed with 
understanding and mastering computer  systems (Levy 1984). But, in
the early 1980's, stimulated by the release of the  movie
"War Games"  and the much publicized arrest  of a "hacker gang"
known as "The 414s",  hackers were seen as young whiz-kids capable
of breaking into corporate  and government computer systems
(Landreth 1985:34).   The imprecise media definition and the lack
of any clear understanding of what  it means to be a
hacker results in the mis-application of the  label to all forms of
computer malfeasance. Despite the inter-relationship between 
phreaks and hackers, the label of "hacker" is generally  reserved
for those engaged in computer system trespassing.   For CU
participants,  hacking can mean either attempting to gain access 
to a computer system,  or the more refined goals of exploring in, 
experimenting with,  or testing a computer system.  In the first
connotation, hacking re quires skills to obtain valid  user
accounts on computer systems that would otherwise be unavailable, 
and the term connotes the repetitive nature of break-in attempts. 
Once successful entry is made,  the illicit accounts are often
shared among associates and described as being "freshly (or
newly) hacked." The second  connotation refers  to someone 
possessing the knowledge, ability,  and desire to fully explore a
computer system. The elite hackers,  the mere act of gaining entry
is not enough to warrant the "hacker" label;  there must be a
desire to master and  skill to  use the system after access has 
been achieved: It's Sunday night,  and I'm in  my room,  deep into
a hack. My eyes are on the monitor, and my hands are on the
keyboard, but my mind  is really on the operating system of a
super-minicomputer a  thousand miles away -  a super-mini with an
operating systems that does a good job of tracking users, and that
will show my activities in its user logs,  unless I can outwit it
in the few  hours before  the Monday  morning staff  arrives for
work.....Eighteen hours ago,  I managed to hack a pass-word for the  
  1. 120 -
PDP 11/44. Now, I have only an hour or so left to alter the user 
logs.  If I don't the logs will lead the system operators to my 
secret account, and the hours of work it took me to get this  
account will be wasted (Landreth, 1985: 57-58). An elite hacker 
must experiment  with command structures and explore the many 
files available in  order to understand and effectively use the  
system.  This is sometimes  called "hacking  around" or simply 
"hacking a system".  This distinction is necessary because
not all trespassers are necessarily skilled at hacking out
passwords,  and not all hackers retain interest in a system once 
the challenge of  gaining entry has  been surmounted. Further,
passwords and accounts are often traded,  allowing even an
unskilled intruder to erroneously claim the title of "hacker."  Our
data indicate that, contrary to their media image, hackers avoid
deliberately destroying data  or otherwise damaging the
system. Doing so would conflict with their instrumental goal of
blending in with the average user  to conceal their presence and
prevent the deletion of the account.   After spending what may be
a substantial amount  of time obtaining a  high access  account,
the hacker places a high priority  on not being discovered using
it,  and hackers share considerable  contempt for media stories
that portray them  as "criminals."  The leading  CU periodicals
(e.g., PHRACK, PIRATE)  and several CU "home boards" reprint and
disseminate media stories, adding ironic commentary.  The
perception of media  distortion also provides grist  for message
sections: A1: I myself hate newspaper reporters who do stories on
hackers, piraters, phreaks,  etc...because they always make us
sound like these  incred.  %sic% smart people  (which isn't too
bad) who are the biggest threat to to-days community.  Shit...the 
BEST hackers/phreaks/etc will tell you that they only  do it to
gain information on those systems,  etc...(Freedom  - That's what
they call it...right?)  (grin) A2: Good point...never met a "real
p/h type yet who was into ripping off. To rip of a line from the
Steve Good-man song (loosely),  the game's the thing.  Even those
who allegedly fly the jolly rodger %pirates%, the true ones, don't
do it for the rip-off, but,  like monopoly, to see if they can get
Boardwalk and Park Place without losing any railroads.  Fun of the
latter is to start on a board with a single good game or util
%software utility% and see what it can be turned into,  so I'm
told. Fuck the press (DS message log, 1989). One elite hacker,  
a member of a loose-knit organization recently in the national 
news  when some participants were indicted for hacking, responded 
to media distortions of the group by issueing an underground press 
release: My name is %deleted%, but to the computer world,  I am 
%deleted%.   I have been a member of the group known as Legion of 
Doom since its  creation,  and admittedly I have not been the most 
legitimate computer user around, but when people start hinting at 
my supposed Communist-backed actions,  and say that I am involved 
in a world- wide conspiracy to destroy the nation's computer and/or 
911 network,  I have to speak  up and hope that people will take 
what I have to say seriously. . . .  People just can't seem to grasp  
  1. 121 -
the fact that a group of 20 year old kids just  might know a little
more than they do,  and rather than make  good use of us,  they
would rather  just lock us  away and keep  on letting things pass
by them.   I've said this before, you can't stop burglars
from robbing you when you leave the doors unlocked and merely bash
them in the head with baseball bats when they walk in.   You  need
to lock the door. But when you leave the doors open, but lock up
the people who can  close them for you  another burglar will just
walk right in ("EB," 1990). Although skirting the law, hackers
possess an explicit ethic and their primary goal is  knowledge
acquisition.   Levy (1984: 26-36) identifies six "planks" of the
original hacker ethic,  and these continue to guide modern hackers:
1.  First,  access to computers should be unlimited and total:

"Always yield to the Hands-On Imperative!" 2. Second, all

information should be free. 3.  Third, mistrust authority 
and promote decentralization. 4.  Fourth, hackers should be 
judged by their prowess as hackers rather than by formal 
organizational or other irrelevant criteria. 5.  Fifth, one can
create art and beauty on a computer. 6.  Finally, computers can
change lives for the better. PHRACK,  recognized as the  
"official" p/hacker newsletter, expanded on this creed with a
rationale that can be summarized in three principles ("Doctor
Crash," 1986).   First, hackers reject the notion that "businesses"
are the  only groups entitled to  access and use of modern
technology.   Second,  hacking is a major Weapon in the fight
against encroaching computer technology.  Finally,  the high cost
of equipment  is beyond the means of most hackers, which results in
the perception that hacking and phreaking are the only recourse to 
spreading computer literacy to the masses: Hacking.  It is a full 
time hobby,  taking countless hours per week to learn,  experiment, 
and execute the art of penetrating multi-user computers:   Why do 
hackers spend a good portion of their time hacking?   Some might 
say it is scientific curiosity, others that it is for mental 
stimulation.   But the true roots of hacker motives run much 
deeper than that.  In this file I will describe the underlying 
motives  of the aware hackers, make known the connections 
between Hacking,  Phreaking, Carding, & Anarchy,  and make known 
the "techno-revolution" which  is laying seeds  in the mind  of 
every hacker.  . .  .If you need a tutorial on how to perform any 
of the above stated  methods %of hacking%,  please read a %PHRACK% 
file on it. And whatever you do, continue the fight. Whether you 
know it or not, if you are a hacker, you are a revolutionary.  
Don't worry, you're on the right side ("Doctor Crash," 1986). 
Computer software,  such as auto-dialers popularized in the film 
War Games,  provides a  means for inexperienced hackers to search 
out other computers.   Auto-dialers randomly dial numbers and save 
the "hits" for manual testing later.  Some users self-i-dentify has 
hackers simply on  the basis of successfully collecting computer 
numbers or passwords, but these users are considered lamerz," 
because they do not possess sufficient knowledge to  obtain access 
or move about in  the system once access is obtained. Lamerz are
  1. 122 -
readily identified by their message content: Sub ->numbers From ->
(#538) To   ->all Date ->02/21/xx 06:10:00 PM: Does anyone know any
numbers for hotels, schools, businesses,  etc..and passwords if you 
do please leave a bulletin with the number and  the password and/or
logon id. Sub ->phun From -> (#138) To   ->all Date ->02/22/xx
12:21:00 AM Anyone out there  got some good 800 dial  up that are
fairly safe to hack?  If so could ya leave me em in e-mail or post
em with  the formats.....any help would%be apreciated......
                                 thanx
Although hackers  freely acknowledge that  their activities may be
occasionally illegal,  considerable emphasis is placed on limiting
violations only to those  required to obtain access and learn a
system,   and they display hostility  toward those who transgress
beyond beyond these limits.   Most experienced CU members are 
suspicious of young novices who are often entranced with what they 
perceive to be the "romance" of hacking.  Elite hackers complain 
continuously that  novices are at an  increased risk of apprehension 
and also can "trash" accounts on which experienced hackers have gained 
and hidden their access.  Nonetheless,  experienced hackers take pride 
in  their ethic of mentoring promising newcomers, both through their 
BBSs and newsletters: As %my% reputation grew,  answering such requests
[from novice hackers wanting help] became  a matter of pride. No
matter how difficult the question happened to be, I would sit at
the terminal for five, ten,  twenty hours at a time, until I had
the answer (Landreth, 1985: 16). The nation's top elite p/hacker 
board was particularly nurturing of promising novices before it
voluntarily closed in early 1990, and its sysop's handle means
"teacher."  PHRACK,  begun in 1985,  normally contained 10-12 
educational articles (or "philes"),  most of which  provided
explicit sophisticated technical information about computer
networks  and telecommunications systems[5].   Boundary 
socialization occurs in message  bases and newsletters that  either
discourage  such activity  or provide guidelines for concealing
access once obtained: Welcome to the world of hacking!  We,  the
people who live outside of the normal rules, and have been scorned
and even arrested by those  from the 'civilized world', are
becoming scarcer  every day.  This is  due to the greater fear of
what a good hacker (skill wise, no moral judgements here) can do
nowadays, thus causing anti-hacker sentiment in the masses.  Also,
few hackers seem to actually know about the  computer systems they
hack, or what equipment they will run  into on the front end, or
what they  could do wrong on a system  to alert the 'higher'
authorities who monitor the system. This article is intended  to
tell you about some  things not to do, even before you get on the
system. We will tell you about the new wave of  front end security 
devices that are beginning to be used on computers.  We will attempt 
to instill in you a second identity,  to be brought up  at time of  
great need, to pull you  out of trouble. (p/hacker newsletter, 1987). 
Elite hacking requires highly sophisticated technical skills to enter 
  1. 123 -
the maze of protective barriers,  recognize the computer type, and move	
about at the highest system levels.   As a consequence, information
sharing becomes the sine qua non of the hacker culture.   "Main
message" sections  are generally open to all users, but only
general information, gossip,  and casual commentary is posted.
Elite users, those with higher security privileges and access to
the "backstage" regions,  share technical information and problems,
of which the following is typical:                    
        89Mar11
        From ***** ** * ***>
        Help! Anyone familiar with a system that responds:
        A2:       SELECT     :       DISPLAY:
        1=TRUNK,2=SXS;INPUT:3=TRUNK,4=SXS,5=DELETE;7=MSG  <and
        then it gives you a prompt>  If you chose 1...  ENTER
        OLD#,(R=RETURN)
        At this point I know you can enter 7 digits,  the 8th
        ill give you an INVALID ENTRY type message.  Some num-
        bers don't work however.  (1,2,7,8 I know will) Anybody?
        89Mar10
        From *********>
        I was hacking around on telenet (415 area code) and got
        a few things that I am stuck-o on if ya can help,  I'd
        be greatly happy.   First of all,   I got  one that is
        called RCC PALO ALTO and I can't figure it out.  Second
        (and this looks pretty fun)  is the ESPRIT COMMAIL  and
        I know that a user name is  SYSTEM because it asked for
        a password on ONLY that account (pretty obvious eh?)  a
        few primnet and  geonet nodes and a  bunch of TELENET
        ASYYNC to 3270 SERVICE.   It asks for TERMINAL TYPE, my
        LU NUMBER and on numbers  higher  than 0 and lower that
        22 it asks for a password.  Is it an outdial?  What are
        some common passwords?  then I got a sushi-primnet        
        system.  And a dELUT system.   And at 206174 there is     
        JUST  a :  prompt.  help!  (P/h message log, 1988).
Rebelliousness also permeates the hacker  culture and is reflected
in actions, messages, and symbolic identities.  Like other CU
participants, hackers employ handles (aliases)  intended to display
an aspect of one's personality and interests,  and a handle can
often reveal whether its  owner is a "lamer" (an incompetent)  or 
sophisticated.   Hackers take  pride in their assumed names, and 
one of the greatest taboos is to use the handle of an other or to 
use multiple handles.  Handles are borrowed liberally from the 
anti-heros of science fiction,  adventure fantasy,  and  heavy metal 
rock lyrics, particularly among younger users,  and from word plays 
on technology, nihilism,  and violence.  The CU handle reflects a 
stylistic identity  heavily influenced by metaphors reflecting color 
(especially red and black),  supernatural power (e.g., "Ultimate 
  1. 124 -
Warrior, "Dragon Lord"), and chaos ("Death Stalker," "Black
Avenger"), or ironic twists on technology,  fantasy, or symbols of
mass culture (e.g., Epeios,  Phelix the Hack, Ellis Dea, Rambo
Pacifist, Hitch Hacker).
This anti-establishment ethos also  provides an ideological unity
for collective  action.   Hackers have been  known to use their
collective skills in retaliation  for acts against the culture that
the perceive as unfair by, for example, changing credit  data or
"revoking" driver's licenses (Sandza, 1984;  "Yes,  you Sound very
Sexy," 1989).   Following a bust of a national hacker group, the
message section of the "home board" contained a lively
debate on the desireability of  a retaliatory response,  and the
moderates prevailed.   Influenced especially by such science
fantasy as William Gibson's Neuromancer (1984),  John Brunner's The
Shockwave Rider (1975), and cyber-punk, which is a fusion of
elements of electronic communication technology  and the "punk"
subculture,  the hacker ethic promotes resistance to the very forms
that create it.   Suggestive of Frazer's (1922) The Golden Bough,
power is challenged and supplanted  by rituals combining both
destruction and rejuvenation.   From this emerges a shared ethos of
opposition against perceived Orwellian  domination by an
information-controlling elite:(Hackers will) always be necessary, 
especially in the technological oppression of the future.   Just
imagine an information system that  systematically filters out
certain obscene words.   Then it will move on to phrases,  and then
entire ideas will be replaced by computers!   Anyway, there will
always be people tripping out on paper and trying to keep it to
themselves,  and it's up to us to at least loosen their grasp (P.A. 
Message Log 1988).
Another hacker summarized the  near-anarchist ethic characterized
the CU style: Lookit, we're here as criminal hobbyists, peeping
toms, and looters.   I am in it for the fun.   Not providing  the
public what it has a right to know,  or keeping big brother in
check.  I couldn't care less.   I am sick of the old journalistic
hackers  nonsense about or (oops! OUR)  computerized ego...I make 
no attempt to justify what I am doing. Because it doesn't matter.
As long as we live in this goddamn welfare  state I might as well
have some fun taking what isn't mine,  and I am better off than 
those welfare-assholes  who justify  their stealing.   At least I
am smart enough to know that the free lunch  can't go on  forever
(U.U.   message log 1988).
In sum, the hacker style reflects well-defined goals, communication
networks, values, and an ethos of resistance to authority.  Because
hacking requires a  broader range of knowledge than does phreaking, 
and because such knowledge can be acquired only through experience, 
hackers tend to be both older and more knowledgeable than phreaks.   
In addition, despite some overlap,  the goals of the two are somewhat 
dissimilar.  As a consequence, each group constitutes a separate analytic 
  1. 125 -
category. Phreaks. Running numbers is not only fun;  it's a moral
imperative!  (Phreak credo). Phreaking broadly refers  to the
practice of using either technology or telephone credit card
numbers (called "codez")  to avoid long distance charges. 
Phreaking attained public visibilily with the  revelation of the
exploits of  John "Cap'n Crunch" Draper, the "father of phreaking"
(Rosenbaum,  1971).   Although phreaking and hacking each require
different skills,  phreaks and hackers tend to associate on same
boards. Unlike hackers,  who attempt to master a computer system 
and its command and security structure,  phreaks struggle to 
master telecom (tele-communications) technology: The phone system
is the most interesting, fascinating thing that I know of. There is
so much to know.   Even phreaks have their own areas of knowledge. 
There is so much to know that one phreak could know something 
fairly important and the next phreak not.  The next phreak might
know  10 things that  the first  phreak doesn't though.  It all 
depends upon where and how they get their info.  I myself would 
like to work for the telco, doing something interesting, like 
programming a switch. Something that isn't slave  labor bullshit.  
Something that you enjoy, but have to take risks in order to 
participate unless you are lucky  enough to work for Bell/AT&T/any 
telco.  To have legal access to telco things, manuals, etc. would be 
great (message log, 1988). Early phreaking methods  involved 
electro-mechanical devices that generated key tones or altered  phone 
line voltages to trick the mechanical  switches of the  phone company 
into connecting calls without charging, but the advent of computerized
telephone-switching systems largely made these devices obsolete.  
In order to continue their practice,  phreaks  have had to learn
hacking skills in order to obtain  access to telephone company
computers and software. 
Access to telecom information takes several forms,  and the
possesion of numbers for "loops" and  "bridges," while lying in a
grey area of law, further enhances the reputation and status of a
phreak.   P/hackers can utilize "loop lines" to limit the number of
eavesdroppers on their conversations.  Unlike bridges,  which
connect an unlimited number of callers simultaneously,  loops
are limited to just two people at a time[6].  A "bridge" is a
technical name for what is commonly known  as a "chat line" or
"conference system." Bridges are familiar to the  public as the
pay-per-minute  group conversation  systems advertised  on late 
night television.   Many bridge systems are owned by large
corporations that maintain them for business use  during the day. 
While the numbers to these systems are not public knowledge,  many
of them have been discovered by phreaks who  then utilize the
systems at night. Phreaks are skilled at  arranging for a
temporary, private bridge to  be created via ATT's conference
calling facilities. This provides a helpful information  sharing
technique among a self-selected group of phreak/hackers: Bridges
can be extremely  useful means of distributing information as long
as the %phone% number is not known, and you don't have a  

                                - 126 -
bunch of children online testing out their DTMF.   The last great
discussion I participated with over a bridge occurred about 2
months ago on an AT&T  Quorum where all  we did was  engineer
3/way %calls% and restrict ourselves  to purely technical
information. We could have convinced the Quorum operators that we
were  AT&T technicians had the  need occurred. Don't let the kids
ruin all  the fun and convenience of bridges. Lameness is one
thing,  practicality is an other (DC, message log, 1988). Phreaks
recognize their precarious legal position,  but see no other way to
"play the game:" Phreaking involves  having the  dedication to 
commit yourself to learning  as much about the  phone system/
network as possible.  Since most of this information is not made
public,   phreaks have to resort  to legally questionable means  to
obtain the knowledge  they want (TP2, message log, 1988). Little
sympathy exists among experienced phreaks for "teleco ripoff." 
"Carding," or the use  of fraudulent credit cards,  is anathema to
phreaks, and not only violates the phreaking ethic, but is simply
not the goal of phreaking: Credit card  fraud truly gives  hacking
a  bad name. Snooping around a VAX is just electronic voyeurism. 
carding a  new modem is  just flat  out blue-collar-crime.   It's 
just as bad as  breaking into a house or kicking a puppy!   %This 
phreak% does everything he can (even up to turning off a number)  
to get credit information taken off a BBS.   %This phreak% also tries 
to remove codes from BBSes.   He doesn't see code abuse in the same 
light as credit card fraud,  (although the law does),  but posted 
codes are  the quickest way to get your board busted, and your 
computer confiscated. People should just find a  local outdial to 
wherever they want to call  and use that. If you  only make local 
calls from an outdial, it will never die, you will keep out of 
trouble,  and everyone  will be happy (PHRACK, 3(28): Phile 2). 
Experienced phreaks  become easily angered at  novices and "lamerz" 
who engage in fraud or are interested only in "leeching" (obtaining 
something for nothing):
              Sub ->Carding
              From ->JB (#208)
              To   ->ALL
              Date ->02/10/xx 02:22:00 PM
what do you  people think about using  a parents card number for
carding?   For instance,  if I had a friend  order and receive via
next day  air on my parents card, and receive it at my parents
house while we were on vacation.  Do you think that would work?  
Cuz then, all that we have to do is to leave the note, and have 
the bud pick up the packages,  and  when the bill came for over 
$1500, then we just say... 'Fuck you!   We were on vacation!  Look 
at  our airline tickets!' I  hope it does... Its such a great plan!
              Sub ->Reply to: Carding
            From -> (xxx)
              To   -> X
              Date ->02/11xx 03: 16:00 AM
  1. 127 -
NO IT'S NOT A GREAT IDEA! WHERE'S YOUR SENSE OF RESPONSIBILITY TO 
YOUR FAMILY? ARE THEY ALL IN AGREEMENT WITH YOU? WOULD YOU WANT
ANYONE TO USE YOUR PRIVATE STUFF IN ILLEGAL (AND IMMORAL) 
ACTIVITIES WITHOUT YOUR KNOWLEDGE?  DIDJA EVER HEAR ABOUT TRUST
BETWEEN FAMILY MEMBERS? IF YOU'RE GOING TO BE A THIEF (AND THAT'S
NOT  NEAT LIKE JAMES BOND IN THE MOVIES), TAKE THE RISKS ONLY UPON
YOURSELF!
              Sub ->Carding
              From -> (#208)
              To   -> (#47)
              Date ->02/12/xx 11: 18:00 AM
Why not? We have a law that says that we have the right to refuse 
payment to credit cards  if there are fraudulent charges.   All we
do  and it is settled....  what is so bad about it?  I'm going for
it!
               Sub ->Reply to: Carding
              From -> (xxx)
              To   ->J.B.
              Date ->02/13/xx 02:08:00 AM
APPARENTLY YOU MISSED THE MAIN POINTS I TRIED TO MAKE TO YOU . .  
YOU'RE A THIEF AND A LIAR, AND ARE BETRAYING THE TRUST OF YOUR
FAMILY AS WELL AS INVOLVING THEM IN YOUR RISK WITHOUT THEIR
KNOWLEDGE.   THAT MEANS YOU ARE A FAIRLY SCUMMY INDIVIDUAL IF  YOU
GO THROUGH WITH IT!   NOW AS TO YOUR "DEFENCE" ABOUT $50 MAXIMUMS
AND ERRONEOUS BILLINGS..  LAW MAKES A CLEAR DISTINCTION
ABOUT THEFT BY  FRAUD (OF WHICH YOU  WOULD BE GUILTY). AND IN A
LARGER SENSE, YOUR  THEFT JUST MAKES IT MORE COSTLY FOR YOU  YOU
AND EVERYBODY ELSE  TO GET CREDIT, AND DO BUSINESS WITH CREDIT
CARDS.   YOU'RE GOING TO DO WHATEVER YOU DO ANYWAY.....DON'T  LOOK
FOR ANY APPROVAL IN THIS DIRECTION.
Ironically,  experienced phreaks are  not only offended by such
disregard of law,  but also feel that "rip-off artists" have no
information to share and only increase the risk for the
"tech-no-junkies."  Message boards reflect hostility toward
apprehended "lamerz" with such  comments as "I hope they burn 
him," or "the lamer probably narked  %turned informant% to the 
pheds %law enforcement agents%."  Experienced phreaks  also post
continual reminders that some actions, because of their illegality, 
are simply unacceptable: It should be pointed out  however,  that
should any of you crack any WATS EXTENDER access codes and attempt 
to use them,  you are guilty  of Theft of communications services 
from the company who owns it, and Bell is very willing and able to 
help nail you!  WATS EXTENDERS can get you  in every bit as  much 
trouble as a  Blue Box  should you be caught. Ex-phreaks,  
especially those who are  no longer defined by  law as juveniles,  
often attempt to caution younger phreaks from pursuing phreaking: 
ZA1: One thing to consider, also, is that the phone co. knows where 
the  junction box is for all  of the lines that you are messing with
  1. 128 -
and  if they get enough complaints about the bills, they may start to 
check things out (I hope your work is neat).  I would guess that the 
odds are probably against  this from happening though, because when  
each of the people call  to complain, they'll probably get a different
person from the others. This means that someone at Ma Bell has to 
notice that all of  the complaints are coming  from the same area...I
don't  think anybody there really  cares that much about their  job
to really start  noticing things like that. anyway, enjoy!!!   My
guess is that you're under-age.  Anyway, so if they catch you, they
won't do  anything to you anyway. ZB1:  Yeah I am a minor (17 years
old) I just hope that they don't cause I would like to not have a
criminal or juvenile record when I apply to college.  Also if they
do come as I said in the  other message if there are no wires they 
can't prove shit. Also as I said I only hook up after 6 p.m.  The 
phone company doesn't service people after 6 p.m.   Just recently 
(today) I hooked up to an empty line.    No wires were leading  from 
the two plugs to somebody  house but I got a  dial tone.  How great. 
Don't have to worry about billing somebody else. But I still  have to
disconnect cause  the phone bills should be  coming to the  other
people  pretty soon. HEHEHEHE ZX1: Be cool on that, especially if
you're calling other boards.   Easiest way for telecom security to
catch you is match the number called to the time called, call the
board,  look at users log or messages for hints of identity,
then work from there.  If you do it too much to a pirate board, 
they  can (and have successfully) pressured the sysop to reveal the
identity under threat of prosecution.  They may or may not be able
to always trace it back,  but remember:  Yesterday's phreaks are
today's telecom security folk.   AND: IT'S NOT COOL TO  PHREAK TO 
A PIRATE  BOARD...draws attention  to that board and
screws it up  for everybody.  So,  be cool phreaking....there's
safer ways. ZC2:  Be cool, Wormburger.  They can use all sorts of
stuff for evidence.  Here's what they'd do in Ill.  If they
suspected you, they'd flag the phone lines,  send somebody out
during the time you're on (or they suspect you're on) and nail you. 
Don't want to squelch a budding phreak,  but you're  really
taking an unnecessary chance.   Most of  us have been doing  stuff
for some time,  and just don't want to  see you get nailed for
something. There's some good boards with tips on how to phreak, and
if you want the numbers, let me know. We've survived to warn you
because  we know the dangers.  If you don't know what ESS is, best
do some quick research  (P/h message log, 1988).
In sum,  the attraction of phreaking and its attendant life-style
appear to center on three fundamental characteristics:  The quest
for knowledge,  the belief in a higher ideological purpose of
opposition to potentially dangerous technological control, and  the
enjoyment of risk-taking.   In a sense, CU participants consciously
create dissonance as a  means of creating social meaning in what is 
perceived as  an increasingly meaningless world (Milo-vanovic and 
Thomas, 1989).   Together,  phreaks and hackers have created an 
  1. 129 -
overlapping culture that,  whatever the legality,  is seen by 
participants as a legitimate enterprise in the new "tech-no-society." 
Conclusion: The transition to an  information-oriented society
dependent on computer technology brings with  it new symbolic
metaphors and behaviors. Baudrillard (1987:  15)  observed that our
private sphere now ceases to be the stage  where the drama of
subjects at odds with their objects and with their image is played
out,  and we no longer exist as playwrites or actors,  but as
terminals of multiple networks.   The public space of the social
arena is  reduced to the private space of  the computer desk, 
which in turn creates a new semi-public, but restricted,  public
realm to which dissonance seekers retreat.   To participate in the
computer underground is to engage in what Baudrillard (1987:  15) 
describes as private telematics, in which individuals,  to extend 
Baudrillard's fantasy metaphor,  are transported from their mundane 
computer system to the controls of a hypothetical machine,  isolated
in a position of perfect  sovereignty,  at an infinite distance from 
the original universe.  There, identity is created through symbolic 
strategies and collective  beliefs (Bordieu,  cited in  Wacquant, 
1989: 35). We have argued  that the symbolic identity  of the computer
underground creates a rich and  diverse culture comprised of
justifications, highly specialized skills, information-sharing
net-works, norms, status hierarchies, language, and unifying
symbolic meanings.   The stylistic elements of  CU identity and
activity serve what Denzin (1988:  471) sees as the primary
characteristic of postmodern behavior,  which is to  make fun of
the past while keeping it alive and the search for  new ways to
present the unpresentable in order  to break down the barriers 
that keep theprofane out of the everyday.
The risks entailed by acting on  the fringes of legality and	
substituting definitions of acceptable  behavior with their own,
the playful parodying of mass culture,  and the challenge to
authority constitute an exploration of the limits of techno-culture
hile resisting the  legal meanings that would  control such
actions. The celebration of anti-heros, re-enacted through forays
into the world of computer  programs and software,  reflects the
stylistic promiscuity,  eclecticism and code-mixing that typifies
the postmodern experience (Featherstone, 1988: 202).  Rather than
attempt to fit within modern culture and adapt to values and
definitions imposed on them,  CU  participants mediate it by mixing
art, science, and resistance to create a culture with an
alternative meaning both to the dominant one and to those that
observers would impose on them and on their enterprise. Pfuhl
(1987) cogently argued that criminalization of computer abuse tends
to polarize definitions of behavior. As a conseuence, To view the
CU as simply another form of deviance,  or as little more than 
"high-tech street gangs" obscures  the ironic, mythic, and
subversive element,  the Nieztschean "will to power," refleccted in
  1. 130 -
the attempt to  master technology while challenging those forces 
that control it.   The "new society" spawned by computer technology 
is in its infancy, and, as Sennet (1970:  xvii) observed, the passage 
of societies through adolescence to  maturity requires acceptance of 
disorder and painful dislocation. 
Instead of embracing the dominant culture, the CU has created an
irreducible cultural alternative, one that cannot be understood
without locating its place  within the dialectic of social change. 
Especially in counter-cultures, as Hebdige (1983: 3) observes,
"objects are made to mean and mean again," often
ending: in the construction of a style, in a gesture of defiance or
contempt, in a smile or a sneer.   It signals a Refusal.  I would
like to think that this Reusal is worth making,  that these 
gestures have a meaning, that the smiles  and the sneers have  some
subversive value. . .  (Hebdige, 1982: 3).
Footnotes
[1] Participants in the computer underground engage in considerable
    word play that includes juxtaposition of letters. For example,
  	commonly used words beginning with "f" are customarily spelled 
    with a  "ph."  The CU spelling  conventions are retained 
    throughout this paper. 
[2] Conly and McEwen (1990:  3) classify "software piracy" in the
    same category as theft of  computers and trade secrets,  and
	grossly confuse both the concept  and definition of computer 
	crime by conflating any  illicit activity involving computers
	under a definition  so broad that embezzlement  and bulletin 
	boards all fall within it.   However, the label of "computer 
	criminal" should be reserved for those who manipulate 
	computerized records in order to defraud or damage, a point 
	implied by Bequai (1978: 4) and Parker (1983: 106). 
[3] One author has been active  in the computer underground 
	since 1984 and participated in Summercon-88 in St. Louis, a 
	national conference of elite hackers.   The other began 
	researching p/hackers and pirates in 1988.   Both authors 
	have had sysop experience with national CU boards.   As do 
	virtually all CU participants, we used pseudonyms but, as we 
	became more fully immersed in the culture,  our true identities 
	were sometimes revealed. 
[4] Although we consider software pirates an integral part of the
	computer underground,  we have excluded them from this analysis
	both for parsimony and because their actions are sufficiently
	different  to warrant separate analysis  (Thomas and Meyer, 
	1990). We also have excluded anarchist boards, which tend to be 
	utilized by teenagers who use BBSs to exchange information 
	relating to social disruption, such as making homemade explosives, 
	sabotaging equipment, and other less dramatic pranks. 
  1. 131 -
	These boards are largely symbolic, and despite the name, are 
	devoid of political intent.  However, our data suggest that many 
	hackers began their careers because of the anarchist influence. 
[5] In January, 1990,  the co-editor of the magazine was indicted
	for allegedly "transporting" stolen property  across state lines. 
	 According to the Secret Service agent in charge of the case in
	Atlanta  (personal communication),  theoffender was apprehended 
	for receiving copies  of E911 ("enhanced" 911 emergency system) 
	documents by electronic mail,  but added that there was no 
	evidence that those involved were motivated by, or received, 
	material gain. 
[6] "Loop lines" are
	telephone company  test lines installed for two separate 
	telephone numbers that connect only to each other.  Each end 
	has a separate phone number, and when each person calls one end, 
	they are connected to each other automatically.  A loop consists 
	of "Dual Tone Multi-Frequency," which is the touch tone sounds 
	used  to dial phone numbers.  These test lines are discovered by
	phreaks and hackers by programming their home computer to dial  
	numbers at random and "listen" for the distinctive tone  that an 
	answering loop makes, by asking sympathetic telephone company 
	employees, or through inormation contained on internal company 
	computers.
  1. 132 -
Introduction to PBXs by < Grim Reaper >
his file is a personal continuation of the PBX entry in the MCI
telecommunications Glossary.  A telephone exchange serving an
individual organization and having connections to a public
telephone exchange is called a Private Branch Exchange (PBX).  The
PBX performs a switching function by connecting any extension in
the private organization to an outside line.  A PBX is actually a
private switch that connects a group of telephones within an
individual organization. Calls placed outside this individual group
are connected to a telephone company's central office switch
through trunks.  A PBX may be operated by an attendant from the
private organization or the switching system may be done
automatically.  Other terms that are commonly used
interchangeably with PBX are:  Private Automatic Branch Exchange
(PABX), Private Automatic Exchange (PAX), and Computerized Branch
Exchange (CBX). Although these terms were originally used to
identify specific switch structures, today they are often used as
synonyms.
  PBXs can use any of three basic switching methods:  step-by-step
(SxS), Cross-bar (X-bar), and computer controlled, to perform the
basic function of switching.  However, in addition to detecting
calls and establishing a transmission link between two telephones,
PBXs can do much more.
  The common control, often called a central processing unit (CPU),
controls the switching matrix that connects the stat ons and
trunks.  The switching matrix of a PBX performs the same job as
does an operator at a manual switchboard or a common control
central office switch.  The CPU, however, gets its instructions
from the "stored program", which contains directions for
activities, such as detecting calls, sending them over the best
available route, and recording billing information.  These
computerized electronic switches are used to perform routine, as
well as unique, functions that simply weren't practical or even
possible with electromechanical switches.
  Just as in the public switched network, PBX switches make
connection between instruments, or "key telephone sets".  We're all
familiar with key telephone sets, whether we know them by name or
not.  They're the business telephones that have six push-button
keys lined up below the dial--a red button marked "hold" and five 
buttons or lines with flashing lights.
  Systems with PBXs and key sets have a great deal of flexability
in planning for their needs because they can set up their codes to
accomplish the functions needed in their particular situations.  In
fact, the PBX can be programmed so that each individual extension
within a system can take advantage of features applicable to its
own business needs.
  1. 133 -
  Some of the features that are availiable with PBXs and key
systems are:  call transfer, which allows internal or external
calls to be transferred from one telephone to any other phone in
the system; automatic push-button signaling, which indicates the
status of all phones in the system with display lights and buttons;
one-way voice paging, which can be answered by dialing the operator
from the nearest telephone in the system; camp-on, in which a call
made to a busy phone automatically waits until the line is idle;
and internal and external conference capabilities, which enables
outside callers to conference with several inside users.
  Some features automatically handle incoming telephone calls. 
Automatic call waiting not only holds calls made to a busy
extension until the extension is free, but also signals the person
being called that a call is waiting and informs the caller that he
is on hold.  Automatic call forwarding will send calls to employees
who are temporarily in locations other than their offices, provided
they "inform" the PBX where they can be found.  Automatic call
distribution automatically send an incoming call to the first
extension that's not busy--a useful feature for situations in which
any one of a group of persons in the organization can adequately
respond to incoming calls.  Another example is automatic call back, 
which allows a caller who reaches a busy line to ask the PBX to return 
his or her call when the line is free.
  Still other features provide services such as night telelphone
answering, telephone traffic monitoring, and network or hot-line
connection.  These examples are but a sample from the features
possible with computerized PBXs. This is a very brief description
of how to use and what to expect on a PBX.
Basically, you call the PBX and you will have to enter a code that
can be anywhere from 4 to 6 digits (Note: some PBXs do not require
codes).  Then you will hear a dial tone.  From here you would under
normal circumstances dial: 9 + 1 (or 0) + NPA-PRE-SUFF, for long
distance dialing or dial 8 for local
dialing.
The most common use of the PBX is to call Alliance Teleconferencing, 
a teleconference service offered by AT&T.  To do this dial: 
0700-456-1000,1002,1003,2000,2001,2002.
Note: PBX codes are usually very simple and usually 4 digits.
EX: 0000, 1111, 1234, etc
  1. 134 -
Introduction To Phreaking by Cat-Trax
[ Definitions ]
Phreak ["free"k] Verb-1. The act of "Phreaking" 2. The act of     
       making telephone calls without paying money [Slang]
Phreaker  ["free"-k-er] Noun-1. One who engages in the act of     
          "Phreaking"
          2. One who makes telephone calls without paying money   
          [Slang]
  1. ————————————————————-

[ Introduction ]

     Phreaking is a method used by most intelligent people {most
often those who use a computer and a Modulator-Demodulator
(MoDem)}.  If you happen to resemble the major mass of people who
do not have the income to afford large phone bills then phreaking
is for you.  If you live in an area with an Electronic Switching
System [ESS] then phreaking is something which should be done in
moderate amounts.
  1. —————————————————————-

[Switching Systems ]

Three types of switching systems are present in the United States
today:
             [1] Step by Step
             [2] Crossbar
             [3] ESS  {Electronic Switching System}
                       <] Step by Step [>
First switching system used in America, adopted in 1918 and until
1978 Bell had over 53% of all exchanges using Step by Step [SxS]. 
A long, and confusing train of switches is used for SxS switching.
                       [> Disadvantages <]
   [A] The switch train may become jammed : Blocking call.
   [B] No DTMF [Dual-Tone Multi-Frequency]["Touch-tone"].
   [C] Much maintanance and much electricity.
   [D] Everything is hardwired
                      +> Identification <+
   [A] No pulsing digits ater dialing or DTMF.
   [B] Phone Company sounds like many typewriters.
   [C] No:  Speed calling, Call forwarding, and other services.
   [D] Pay-phone wants money first before dial-tone.
  1. 135 -
                         <] Crossbar [>
Crossbar has been Bell's primary switcher after 1960.  Three types
of Crossbar switching exist:  Number 1 Crossbar [1XB], Number 4
Crossbar [4XB], and Number 5 Crossbar [5XB].  A switching matrix is
used for all the phones in an area. When someone calls, the route is 
determined and is met up with the othr phone. The matrix is set-up 
in horizontal and vertical paths.  There are no definite 
distinguishing features of Crossbar switching.
                            <] ESS [>
   You probably were hoping I wouldn't talk about this nightmare,
if you did you will know why everyone doesn't want to be reminded
about Bell's holocaust  on America.  With ESS Bell knows:  every
digwho make excessive calls to WATS  numbers [Wide Area Telephone
Service][1-800 numbers] or directory assistance. This deadly trap
is called "800 Exceptional Calling Report."  ESS can be  programmed
to print logs of who called certain numbers. Electronic Switching 
System makes the job of the FBI, Bell Security {The Gestapo in
phreakin'  tongue}, NSA, and other organizations which like to
invade our privacy,  extremely easy!  Tracing is done in
microseconds, and the results are printed out on the monitor of a
Gestapo officer.  ESS can also pick up
foreign tones on the line, like 2600 Hz. {used in blue boxes,
discussed  later}. Bell claims that the entire country will be
plagued by ESS by the  1990's!

+> Identification <+

   [A] Dialing 911 for emergencies.
   [B] Dial-tone first for pay-phones.
   [C] Calling services, like:  Call forwarding, Speed dialing,   
       Call waiting.
   [D] ANI [Automatic Number Identification] for long-distance    
       calls.
[[[Note]]]  Of the above identifications of the three switching
systems, do not solely rely on these descriptions, the best way to
find out is to [no!] call your local telephone company.
  1. —————————————————————-

[Long-Distance Services ]

To attempt to help the community {and for private business}
companies developed ways to lessen the costs of long-distance
calling charges.  The companies own their own switching systems and
use extenders for callers to  call.  The way extenders operate:  
  1. 136 -
1] Customer calls service 
2] He/she hears a low tone which sounds like a dial-tone
3] She/He either dials the access code then the phone number, or  
   dials the phone number then the access code 
4] Is connected to whatever he/she calls.  
   Aside from Ma Bells collection, the customer recieves a bill for
calls made with his/her long-distance company {a supposedly cheaper
bill than Ma Bell's}.  Thought:  Hey, I could randomly pick access
codes and use them to call whatever area the company services! 
Righto, that's what basic phreaking is!  A wise idea, though, is to
have many access codes and many service numbers to rotate
throughout your average life as a phreaker.  To aid in your quest
to beat the system I have provided many 1-800 numbers which anyone
can call, aside from local numbers, such as Sprint, or MCI.  The
reason for providing you with WATS numbers is because all of us
aren't in a big city where Sprint or MCI even exist, this way
everyone can pheak!  A way to find more access codes is by using
your old modem.  Yes, your modem can imitate 
DTMF tones!
  {>Procedure:  1)  dial 1-800  +  service number
                2)  dial access code->area code->phone number, or
                3)  dial area code->phone number->access code
	:::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::\/ 
	         -=+>Cat-Trax' list of WATS [1-800] numbers:<+=-          
	::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 
Number---Code Length   :   Number---Code Length   :   Number---Code
  =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= 
  127-6754      6      245-4890      4            327-6713      4
  243-7650      6      328-7112      4            654-8494      6
  327-9895      7      327-9136      4            227-3414      4
  682-4000      6      343-1844      4            858-9000      3
  462-6471      5      322-1415      6            521-1674      4
  527-3511      8      321-0327      4            321-0845      6
  843-0698      9      221-8190      4            543-7168      8
  521-8400      8      327-2731      6            252-5879      8
  345-0008      7      245-7508      5            526-5305      8
  323-3027      6      242-1122      ?            621-1506      ?
  621-4611      ?      325-3075      ?            336-6000      ?
  221-1950      ?      323-8126      ?            325-7222      6
[[[Note]]]  remember to dial 1-800-above number, also remember to 
            rotate numbers and access codes.
  1. —————————————————————-
  1. 137 -
[ Colored Boxes ]
A more shrewd, technological, safer {without ESS} way to phreak is
with a  piece of hardware known as a ________ Box.  Boxes are many
different colors {I don't know ALL the colors because it seems like
every time I turn around there's some new color out!}.  Colors I
have heard of:  Blue, Black, Red, White, Silver, Clear, and MANY,
MANY more...  Plans for making these boxes can be obtained by
calling different boards [BBS's], AE lines, or whatever. But!, if
you have an Apple Cat modem then do I have good news for ->you<-!!
The Apple Cat modem can emulate the frequencies {usually 2600 Hz.}
made by ________ Boxes with the help of a handy little program
called "Cat's Meow!"
  1. —————————————————————-

::Warning!:: Phreak at your own risk! Stiff laws are starting to

pop-up now days.  But, if you're careful then don't worry!  I
haven't been busted yet! Heck [Hack!], what would life be without
risks?
-----------------------------------------------------------------
  1. 138 -
SOME NOTES ON LINE NOISE       by Captain KIdd
=================================================================
Well since that's my field let me elucidate abit.... Most of what
you refer to as line noise isn't really noise per-se on the line,
but uneven response to tones (and that's what we use in our
modems). This can be caused by any number of factors. If you call
up good old NONEX and tell them that you have "line noise" your
asking for a service bill and no remedy. You will find that the
average lineman they send out, has the IQ of his shoe size. Case in
point-the old number I used to run my bbs at. I had phantom rings
on the line, so did my neighbor across the street. When it was very
damp or had rained for a while (several days) the "line noise"
would appear, and cause me grief. Well,with the similar problem and
a moisture related one at that across the street, it seems like the
problem is out around the pole in front of my place. Well,after
three visits, and three phantom excuses for repairing it needless
to say I was pissed.(The CO will often blast the phone line with
what it calls cable test voltage. Its around 600 volts and will
vaporize the MOV surge protector in your modem or answering
machine) MOV= Metal Oxide Varistor for you non-techies. But it will
clear many of their "bad lines". Now one fine day, they finally send 
out a guy from the "Cable department" and I talk to him, I explain 
the past problems and suggest he check past my place and for some 
reason during wet times, we have inter-cable leakage. He found a 
spot down the street that had been zapped by lightning some time 
before, and all the wire ends were charred and black. He showed me 
a ball of burnt wire that could very well been the cause. Well it was,
as the problem is lessened about 95%. I say 95% because I still have 
a bit of the same problem, possibly due to another charred spot or a 
more recent lightning strike. But this problem seems to respond to 
my calling my number and letting it ring for say a half hour, this 
drys out the line enough that it stops acting screwy. Well on to the 
noises that can be heard over the line that really do have influence 
over transmission quality. The most prevalent is a crackling or a 
dial tone drawn intermittently. (Listen to the line with a hi-z butset)
Ringing voltage is usually about 90 volts and20-30 hz, so there's
usually no problem in ringing the phone, but when you pick up, the
phone voltage drops to 30-50 volts and the smallest problem will
surface. The phone company has this habit of checking the line to
ground (it should never be connected in a regular home phone line)
and they will clear off water, insects, and other crap with a 600
volt blast as mentioned earlier. This applied across the line to
ground sure does away with the water, but in caes where spike
protection or impulse protection from lightning is present, WATCH
OUT! the MOV's are typically manufactured to short at around 130-
150 volts, and are connected to the third pin (Ground) of a three
wire plug on your answering machine, your cordless phone, and some
modems. The MOV will explode as it shorts itself to ground to do
its job of surge protection, leaving a short on the line which is
readily detectable by the CO. IF THIS HAPPENS, inform 
  1. 139 -
them immediately that you have a problem, and they will make
restitution for repairs in CASH! I got $75 for repairing a $1.98
MOV (available at Radio Slack) 
Now more on the noises....
==========================
After the infamous popping, the next most bothersome to the modemer
is a low level whine, muchlike some of the shitty MCI ports,sounding 
like a jet engine varying in rpm, it is particularly evident behind 
dialtone, and if you drop the  dialtone, its still evident. This is 
digital whine caused by some circuit in the path not exactly in phase. 
This is particularly annoying because the digital equipment tries to 
compensate by stuffing or removing bits from the digital path to attempt 
phase lock, and thus, data is occasionally lost or garbled. I have two 
lines at home that are heavily used and have this problem, its not 
apparent to modem traffic until you hit 2400 baud, then the time 
frame of the modem kinda gets jitters from the digital whine. 
Lastly, of importance, is signal level. In analog, as the signal 
goes down, the signal tends to corrupt on the lowest levels while 
some will pass fine during peaks. If this is the problem, you see 
multiple errors on x-modem, then good blocks.. this problem can have 
numerous causes, fading of a microwave path, followed by a switching
  of diversity receivers, bringing the signal backup to par temporarily. 
Also in this category are bad amps at either the CO or in your own
equipment, that won't limit gain till noise actually takes the
place of the signal, This is a "slow attack" increase of noise
followed by a quick quieting as the redundant amp takes over (In
your CO). 

Crosstalk:
----------
If you have ever picked up the phone and swore you could hear
someone else talking or in some cases, actually been able to talk
to the other party, you have been exposed to crosstalk. This
obviously will knock the shit outa a modem conversation due to the
fact the voice is mixing non-linearly with the data or in some
cases, overpowering the data signal itself. This is a fairly common
problem, common to analog FDM multiplex equipment. This equipment
tries to keep the conversations apart using SSB channels arranged
throughout a radio's baseband (IF) frequency. Because the channels
are without carrier which would enable the equipment to check
signal level, frequencies called "pilots" are inserted into the 
clusters of channels allowing their levels to be monitored and 
controlled.If there is a "Hot" pilot or a "Hot" channel in the group, 
it will bleed over into the other channel's passband and crosstalk 
will be heard. In the cases of two-way communications via crosstalk,
the group pilot is usually so hot, everybody in both directions is 
splashing over and both directions are being heard. Basically the 
solution to line noise problems is to know about them, and being 
able to pinpoint the exact type of problem will make it easier for 
the Telco to service it quickly.
  1. 140 -
/data/webs/external/dokuwiki/data/pages/archive/bbs/bob-2.man.txt · Last modified: 1999/10/02 22:23 by 127.0.0.1

Donate Powered by PHP Valid HTML5 Valid CSS Driven by DokuWiki