| ==Phrack Magazine== |
|
|
| Volume Four, Issue Forty-Three, File 26 of 27 |
|
|
| International Scenes |
|
|
| There was once a time when hackers were basically isolated. It was |
| almost unheard of to run into hackers from countries other than the |
| United States. Then in the mid 1980's thanks largely to the |
| existence of chat systems accessible through X.25 networks like |
| Altger, tchh and QSD, hackers world-wide began to run into each other. |
| They began to talk, trade information, and learn from each other. |
| Separate and diverse subcultures began to merge into one collective |
| scene and has brought us the hacking subculture we know today. A |
| subculture that knows no borders, one whose denizens share the common goal |
| of liberating information from its corporate shackles. |
|
|
| With the incredible proliferation of the Internet around the globe, this |
| group is growing by leaps and bounds. With this in mind, we want to help |
| further unite the communities in various countries by shedding light |
| onto the hacking scenes that exist there. We have been requesting files |
| from people to describe the hacking scene in their country, but |
| unfortunately, more people volunteered than followed through (you know |
| who you are.) By next issue we will have more, I'm sure, but for now, |
| we want to introduce you all to the scenes in Ireland and Canada. |
|
|
|
|
| ***************************************************************************** |
|
|
| COUNTRIES ON THE INTERNET |
|
|
| AD Andorra |
| AE United Arab Emirates |
| AF Afghanistan |
| AG Antigua and Barbuda |
| AI Anguilla |
| AL Albania |
| AM Armenia |
| AN Netherland Antilles |
| AO Angola |
| AQ Antarctica |
| AR Argentina |
| AS American Samoa |
| AT Austria |
| AU Australia |
| AW Aruba |
| AZ Azerbaidjan |
| BA Bosnia-Herzegovina |
| BB Barbados |
| BD Bangladesh |
| BE Belgium |
| BF Burkina Faso |
| BG Bulgaria |
| BH Bahrain |
| BI Burundi |
| BJ Benin |
| BM Bermuda |
| BN Brunei Darussalam |
| BO Bolivia |
| BR Brazil |
| BS Bahamas |
| BT Buthan |
| BV Bouvet Island |
| BW Botswana |
| BY Bielorussia |
| BZ Belize |
| CA Canada |
| CC Cocos Island |
| CF Central African Republic |
| CG Congo |
| CH Switzerland |
| CI Ivory Coast |
| CK Cook Islands |
| CL Chile |
| CM Cameroon |
| CN China |
| CO Colombia |
| CR Costa Rica |
| CS Czechoslovakia |
| CU Cuba |
| CV Cape Verde |
| CX Christmas Island |
| CY Cyprus |
| DE Germany |
| DJ Djibouti |
| DK Denmark |
| DM Dominica |
| DO Dominican Republic |
| DZ Algeria |
| EC Ecuador |
| EE Estonia |
| EG Egypt |
| EH Western Sahara |
| ES Spain |
| ET Ethiopia |
| FI Finland |
| FJ Fiji |
| FK Falkland Islands |
| FM Micronesia |
| FO Faroe Islands |
| FR France |
| FX France |
| GA Gabon |
| GB Great Britain (UK) |
| GD Grenada |
| GE Georgia |
| GH Ghana |
| GI Gibraltar |
| GL Greenland |
| GP Guadeloupe |
| GQ Equatorial Guinea |
| GF French Guyana |
| GM Gambia |
| GN Guinea |
| GR Greece |
| GT Guatemala |
| GU Guam |
| GW Guinea Bissau |
| GY Guyana |
| HK Hong Kong |
| HM Heard & McDonald Island |
| HN Honduras |
| HR Croatia |
| HT Haiti |
| HU Hungary |
| ID Indonesia |
| IE Ireland |
| IL Israel |
| IN India |
| IO British Indian Ocean Territories |
| IQ Iraq |
| IR Iran |
| IS Iceland |
| IT Italy |
| JM Jamaica |
| JO Jordan |
| JP Japan |
| KE Kenya |
| KG Kirgistan |
| KH Cambodia |
| KI Kiribati |
| KM Comoros |
| KN St.Kitts Nevis Anguilla |
| KP North Korea |
| KR South Korea |
| KW Kuwait |
| KY Cayman Islands |
| KZ Kazachstan |
| LA Laos |
| LB Lebanon |
| LC Saint Lucia |
| LI Liechtenstein |
| LK Sri Lanka |
| LR Liberia |
| LS Lesotho |
| LT Lithuania |
| LU Luxembourg |
| LV Latvia |
| LY Libya |
| MA Morocco |
| MC Monaco |
| MD Moldavia |
| MG Madagascar |
| MH Marshall Islands |
| ML Mali |
| MM Myanmar |
| MN Mongolia |
| MO Macau |
| MP Northern Mariana Island |
| MQ Martinique |
| MR Mauritania |
| MS Montserrat |
| MT Malta |
| MU Mauritius |
| MV Maldives |
| MW Malawi |
| MX Mexico |
| MY Malaysia |
| MZ Mozambique |
| NA Namibia |
| NC New Caledonia |
| NE Niger |
| NF Norfolk Island |
| NG Nigeria |
| NI Nicaragua |
| NL Netherlands |
| NO Norway |
| NP Nepal |
| NR Nauru |
| NT Neutral Zone |
| NU Niue |
| NZ New Zealand |
| OM Oman |
| PA Panama |
| PE Peru |
| PF Polynesia |
| PG Papua New Guinea |
| PH Philippines |
| PK Pakistan |
| PL Poland |
| PM St. Pierre & Miquelon |
| PN Pitcairn |
| PT Portugal |
| PR Puerto Rico |
| PW Palau |
| PY Paraguay |
| QA Qatar |
| RE Reunion |
| RO Romania |
| RU Russian Federation |
| RW Rwanda |
| SA Saudi Arabia |
| SB Solomon Islands |
| SC Seychelles |
| SD Sudan |
| SE Sweden |
| SG Singapore |
| SH St. Helena |
| SI Slovenia |
| SJ Svalbard & Jan Mayen Islands |
| SL Sierra Leone |
| SM San Marino |
| SN Senegal |
| SO Somalia |
| SR Suriname |
| ST St. Tome and Principe |
| SU Soviet Union |
| SV El Salvador |
| SY Syria |
| SZ Swaziland |
| TC Turks & Caicos Islands |
| TD Chad |
| TF French Southern Territories |
| TG Togo |
| TH Thailand |
| TJ Tadjikistan |
| TK Tokelau |
| TM Turkmenistan |
| TN Tunisia |
| TO Tonga |
| TP East Timor |
| TR Turkey |
| TT Trinidad & Tobago |
| TV Tuvalu |
| TW Taiwan |
| TZ Tanzania |
| UA Ukraine |
| UG Uganda |
| UK United Kingdom |
| UM US Minor Outlying Islands |
| US United States |
| UY Uruguay |
| UZ Uzbekistan |
| VA Vatican City State |
| VC St.Vincent & Grenadines |
| VE Venezuela |
| VG British Virgin Islands |
| VI U.S. Virgin Islands |
| VN Vietnam |
| VU Vanuatu |
| WF Wallis & Futuna Islands |
| WS Samoa |
| YE Yemen |
| YU Yugoslavia |
| ZA South Africa |
| ZM Zambia |
| ZR Zaire |
| ZW Zimbabwe |
|
|
| **************************************************************************** |
|
|
| HACKING IN IRELAND |
| BY |
| HAWKWIND |
|
|
| Greetings from the Emerald Isle! My name is Hawkwind, and I'm an |
| Irish hacker *evil cackle*. So, what's the hacking scene like in this |
| small green island called Ireland, perched on the edge of the Atlantic |
| Ocean? -an island which claims to have one of the most sophisticated |
| digital phone networks in Europe, home of Eirpac (the Irish equivalent to |
| Sprintnet/Telenet) and lots of other weird and wonderful things like |
| that. |
|
|
| Well, the hacking scene, like the country itself, is small |
| -there are no elite in Ireland. -or if there are they are so elite that |
| nobody has heard of them. So if you're only into elite stuff, then |
| don't bother reading on, skip onto the next country. |
|
|
| Also, sadly at the moment, there seems to be little interest in |
| hacking in Ireland -I can count the number of Irish hackers I know on |
| the fingers of one hand. Maybe I'm just hanging out in the wrong places, |
| or perhaps its the Iron Hand of Ireland's own Little Brother, friend and |
| follower of the U.S's Big Brother, enforcing his evil ways of censorship |
| and the like upon us all, denying us the right to free information. |
| Nationwide censorship of Usenet hurts like dry ice, but restricting ftp |
| and telnet out of the country to the privileged few, is the fatal |
| crunch. Now, I ask you, with grief like this, is it any wonder so few |
| Irish have made it into the Computer Underground -to those that have |
| beaten the odds, I wish them well. |
|
|
| OK, so what do Irish hackers like to hack? Like many hackers we |
| just have the curiosity and desire to explore any system or network we |
| come across -the everlasting search for that spine-tingling adrenaline |
| rush when you've beaten the system and got somewhere where perhaps no |
| commoner has gone before -don't ever ask us to choose between getting |
| well drunk, having sex, or hacking --it would be a rough choice. |
|
|
| Let me start by telling you of what I find an interesting moment |
| in Irish hacking history. -to you it may just seem like no big deal, but |
| we kinda like it. |
| There is a type manufacturing company in Dublin, Ireland and |
| they like to make tyres--in order not to ruin any reputations we won't |
| mention any names--just another tyre company. Now this company likes |
| nice modern systems--big colorful display panels with lots of flashing |
| lights, to keep their managers happy and amused for hours. A happy |
| company is lots of happy striving workers and so, a big flashy sign |
| which displayed the number of tyres being produced, and dutifully |
| counted upwards every time one come off the assembly line, was |
| constructed. So they had a big sign inside the plant so the workers |
| could see how hard they were working, and big bonuses and lots of |
| presents were promised if they got past a certain number in a day. |
| There was also a large juicy sign outside the plant showing this number |
| so that the general public could be suitably impressed with the busy-bee |
| workers and the number of tyres being produced. |
|
|
| And all these signs and computers controlling them were |
| connected to such mysteries as a network with a couple of black boxes |
| which management proudly called modems -enter stage left, Irish |
| hackers, *deep bow and evil wave* |
|
|
| So you can imagine, one warm sunny summer's evening, when there |
| was really nothing better to do in Dublin, strange things started to |
| happen at the tyre factory. Yes, strange things indeed. Suddenly the |
| workers got very lazy and started slowing down their production, |
| becoming slower and slower and slower. The numbers stopped counting up |
| on the glowing sign. Then the digits oddly started counting backwards. |
| Down they went, getting faster and faster -people began to picture |
| enraged workers destroying tyres in a crazed frenzy. Soon our sign |
| showed that there were no tyres left and it began to dive into negative |
| numbers of tyres. The passers-by scratched their heads in astonishment. |
|
|
| Ah, but enough fun -this really was a very good tyre company |
| with very hard-working workers. They deserve lots of bonuses -heck, |
| didn't someone say this was the most productive factory in Europe? Well |
| it was that day anyway! *evil cackle* So the signs stopped counting |
| backwards, and suddenly began to race forwards like there was no |
| tomorrow. The workers were scurrying back and forth at lightening speed |
| -one hundred, two hundred..a thousand...ten thousand...what, a hundred |
| thousand! Soon our good workers had produced more tyres in the space of |
| 20 minutes, than visitors Disneyland had in 25 years... |
|
|
| Ah yes, these are the things that Irish hackers like to do -we |
| still wonder if the management gave all those good workers their |
| bonuses?? |
|
|
| So really, we like to investigate or hack anything that we might |
| stumble across -anything from the local University library computer to |
| tyre companies to networks in lands far away. One of the things we |
| really like doing is just exploring, hopping from one network to the |
| next, using computers in such awed places as the U.S., Canada or Mexico, |
| this is probably because for us, even to reach such computers and |
| networks is an achievement, that our Little Brother would deny us had he |
| his evil ways. We think that the Internet is one of the greatest |
| creations in a long time, and we would never want to do any malicious |
| damage on such a free association -if only our Little Brother would let |
| us associate freely with it, instead of making life just that little bit |
| more difficult. We find Sprintnet and other connected goodies |
| interesting prowling grounds, although we are the first to admit that we |
| still have very much to learn here. To explore these systems is very |
| interesting for us, because they are so far away and in such interesting |
| lands that we may never see ourselves -what to you might be the old U.S., |
| to explore the nets there gives us a sense of excitement and a variety |
| of systems that cannot be found on such a small island as our own |
| Ireland. |
|
|
| And of course, there is the never-ending quest for U.S. outdials |
| in the hope that one day we might actually reach some of the fabled U.S. |
| h/p boards and actually meet a real Fed or two. *snicker* Turning from |
| the strictly hacking scene for the moment there are some Irish people |
| interested in the phones and other phun things -a while back two |
| college guys were busted for cracking an eleven digit code on some new |
| phone system chip or something, which had given them unlimited dialling |
| access and other phun privileges. -then there was the magic toll free |
| number which for a month or two gave the Irish population unlimited |
| access to the outside world (a big thank-you goes to whoever worked that |
| one out. *grin*) I'm told from reliable sources that we have a pretty |
| sophisticated phone system, a matter we soon hope to be investigating, |
| but this does not seem to have stopped phreakers from trying, and if we |
| manage to work anything out, we'll, as our 'Telecom Eireann' so aptly |
| put it 'Keep in touch across the world'. |
|
|
| Sadly, we are plagued by outrageous phone charges, even for |
| local calls and hence many Irish boards have failed to blossom -of |
| those that do, the sysops seem to be little interested in h/p talk and I |
| know of no dedicated h/p Irish board. |
|
|
| There also used to be a type of Underground meeting that occurred |
| every dark rainy Sunday afternoon, down in the Ormond, a hotel in Dublin |
| city centre. It passed unheeded under the guise of a computer club, but |
| the bloke who ran it was a renowned con-man, and dealer of everything |
| and anything from car radios to Rolex watches -in any event the club |
| must have been one of the biggest WareZ swapping centres, including all |
| the latest videos from the U.S. which would not be released in the |
| cinemas(movies) here until six months later. Generally people |
| interested in the same computer type things just got together to chat |
| and swap the latest news, disks and videos -an interesting place with |
| interesting folks, which sadly no longer seems to happen. Perhaps |
| someone will revive something similar in the near future. |
|
|
| Well, I'll end the tale there for the moment. Hopefully you've |
| gotten a little flavor of our little Underground, watched over by our |
| Little Brother, in our little country called Ireland. I'm not sure how |
| I ended up writing this article, but since nobody else stepped forward, I |
| thought Ireland should at least get some kind of mention, if nothing |
| else -so you can /dev/null any flames. |
|
|
| Before I sign off, I'd just like to thank Phrack not only for |
| giving me the chance to tell my tale, but for supplying us with a great |
| publication and guide to the Underground. Finally, if you are an Irish |
| hacker/phreaker, then get in touch now!!! -I really want to be able to say |
| that I can count the number of Irish hackers I know on two hands, and not |
| just one, before the end of the decade! Also, I am always interested in |
| talking to anyone interested in the hack/phreak world so get in touch if |
| you want to chat -just remember, we are no elite! |
| (I don't suppose anyone out there, knows anything about the Irish phone |
| system? *shrugs*) |
|
|
| Ok, I can be reached at the following, for the next little while: |
| (Yes, I do have Irish a/c's but not for thine eyes...) |
|
|
| al575@yfn.ysu.edu |
| hawkwind@m-net.ann-arbor.mi.us |
| hawkwin@santafe.edu (note: no 'd' at end userid) |
|
|
|
|
| I'm also sometimes on IRC, and may hopefully be on phantom soon. |
| Well, as we say in Ireland, good luck and may the road rise up before |
| you. |
|
|
| Slan Leat, |
| Hawkwind. |
|
|
| ***************************************************************************** |
|
|
|
|
| Canada |
| All is Quiet on the Northern Front |
|
|
| Written and compiled by Synapse |
|
|
| Welcome to the barren wastes or rather the undeveloped wastes if |
| you will. Welcome to Canada. A realm seldom traveled and less |
| often explored. Canada, or .ca if you will, is virgin country in |
| the net. There are places that have been sitting idle for years |
| on our nets that still have default accounts in use. There is an |
| unmeasurable amount of data out there waiting to be tapped. The |
| possibilities in this are endless, Canada is untouched for the |
| most part, and as developed networks go, I feel that Canada is as |
| close to The 'Undiscovered country' as you can get. |
|
|
| Most likely if you are reading this article you will be of a |
| nationality other than Canadian. If so, perhaps this will be an |
| educational experience for you. To explain our nets and our scene |
| here in the far far north, I must first explain our nation and |
| its greatest difficulty, it has NO identity, therefore it tends |
| to mirror those it is enamored with. Hence our scene resembles |
| an amalgamation of whatever seems popular in the nets at a given |
| time. Most often it attempts somewhat miserably to emulate the |
| scene south of our border, the great U S of A. And in short it |
| fails miserably. |
|
|
| This is not to say that Canada does not have a scene of its own |
| nor is it attempting to take away from those scenes that have |
| developed fully on their own within .ca. It is simply bringing to |
| light a problem that plagues our scene and dilutes it for those |
| who are serious about the computer underground, and whatever |
| ideals it may contain. |
|
|
| If you travel the nets in Canada you will find that dissent and |
| "ElYtEeGoStRoKInG" are staple with both the Hacking and Warez |
| scenes all throughout the nine provinces and 2 territories. As I |
| am sure you know this is not a problem unique to .ca. However in |
| a scene as minute and spread painfully thin as ours, arrogance |
| and mis-communication can be fatal in the way of cooperation |
| gaps. This has proved the case many times in the recent past, and |
| I am sure it will in the near future as well. |
|
|
| Canada seems to a have a communication barrier that separates |
| east from west. There is simply close to no communications |
| between the two. It is as if we are in separate hemispheres and |
| lost to the technology of fibber optics and damned to smoke |
| signals and drum beating. I have to wonder sometimes if both |
| sides are so involved in their own local power struggles, that |
| the rest of the world has melted away including their country men |
| on either side. |
|
|
| Alas it is time to dive into this the this of the article. To |
| detail the complete underground in Canada would be impossible for |
| me to do, to even give a non-biased view would be impossible. So |
| if you feel that this is simply an overextended opinion, thank |
| IBM for the PgDn key and spare yourself some opinionated text. |
|
|
| The Almost LODs of .ca |
|
|
| Just like the U.S., Canada is proliferated with umpteen amounts |
| of upstart groups who after reading some trashy second rate book |
| on LOD or Kevin Mitnick, have decided that they have found what |
| it is to be elyte. Most often these will be the prominent voices |
| on underground boards spitting flame and stroking immeasurably |
| unhealthy egos, and boasting how proficient they are with toneloc |
| and Killer Cracker. However as with most boasts put forth by |
| fourteen year olds, nothing comes of it. |
|
|
| However if you can manage passage through the quagmire of shit |
| that serves as the .ca scene, then you will most likely encounter |
| some of .ca's more serious minded types who while retaining |
| talent and a penchant for learning, do not sport an ego of |
| astronomical proportions, and wit that would bring condescension |
| from an ant. The following is a short list of several of .ca's |
| more prominent if not more talented groups. |
|
|
| RaBID The Virus People |
|
|
| If the Virus world is your environment, then most likely you |
| have stumbled across the work of RaBID, hopefully not on the |
| receiving end.. Rabid is based out of 416 or rather Toronto |
| Canada, at it's prime Rabid was running a mail net that spanned |
| Canada and were releasing enough material to employ the boys at |
| McAfee. Things have changed. While Rabid had at one point been a |
| productive group (if you can call a virus group productive) time |
| seems to have worn their edge, in fact Rabid as a group have |
| failed to release anything of value in a great long time. Perhaps |
| this will change. If nothing else Rabid did bring a much needed |
| ego boost to the Canadian scene, in doing so they opened the door |
| for other such groups to be seen on the international level with |
| out being laughed out of the nets. For this if nothing else they |
| deserve recognition. There is a great deal more to be said about |
| Rabid, however as I said all the information given here will be |
| cursory, if you require an information at all in the future on |
| Rabid or any of the groups mentioned below I will leave an e-mail |
| address below where you can write me, I will help you if I can. |
|
|
| FOG out of 403 Calgary, Alberta |
|
|
| No scene is complete without talented juveniles given to temper |
| tantrums virus spreading and general malicious behavior..Enter |
| FOG. FOG stands for the Fist Of God, it is for the most part a |
| group of individuals who go through unnatural amounts of effort |
| to get under the skin of others. Yet beyond juvenile behavior |
| that tends to underscore most endeavors they undertake. FOG does |
| for the most part work very diligently for a united .ca scene. |
| They have in the past run a nation wide net using encrypted mail |
| procedures so that dialogue could be opened between the east and |
| western scenes. This event was stopped when the Hubs house was |
| raided by the Royal Canadian Mounted Police for suspected telco |
| abuse, they were no charges laid however yet the organizers felt |
| that the information passing through the net was much too |
| valuable to be compromised by a bust. The net was killed. |
|
|
| After the net disappeared several members of FoG began writing |
| bbs software to be spread across the country to make networking |
| easier or rather standardized. The bbs also includes encryption |
| options for the mail, and will soon be HAM radio as well as |
| cellular modem capable. This program is available to any who wish |
| to take it, as I said earlier, just mail me. |
|
|
| NuKE Making Art out of Arrogance |
|
|
| NuKE hails from 516 Montreal, Canada. It as far as I can see |
| primarily now a virus group. Producing and modifying strains, for |
| the most part NuKE has been the most active underground .ca group |
| that has seen movement on an international level, with this past |
| year. |
|
|
| It's membership has changed quite severely since I last had |
| contact with them. Therefore I fear that to publish anything else |
| on them would be inaccurate and therefore an injustice. However |
| if you are interested in pursuing this topic........Mail me. |
|
|
|
|
| As you can see these are cursory overviews of Canada's groups it |
| is of course largely incomplete, I provided it only to serve as a |
| guide for the feeling of Canada's groups. There are of course |
| many worth mentioning that I failed to show, and moreover there |
| is a great deal more to the groups that I did mention. To those |
| who are in the above groups are unhappy with the opinion put |
| forth please by all means FUCKOFF. I e-mailed all of you, and in |
| your infallible wisdom you failed to reply. So suffer with it :> |
|
|
| .ca and the law |
|
|
| While Canada has been for the most part largely un-abused by the |
| 'Computer Criminal'. It's laws are none the less fairly advanced. |
| Our legislators to their credit have kept a close eye on our |
| neighbors in the south, and have introduced laws accordingly. |
|
|
| The following is the Canadian criminal code as pertaining to |
| Computer Crime. |
|
|
| 342.1 |
| (1) Every one who, fraudulently and without color of right, |
| (a) obtains, directly or indirectly, any computer service, |
| (b) by means of an electro-magnetic, acoustic, mechanical |
| or other device, intercepts or causes to be intercepted, |
| directly or indirectly, any function of a computer system, or, |
| (c) uses or causes to be used, directly or indirectly, a |
| computer system with intent to commit an offense under |
| paragraph (a) or (b) or an offense under section 430 in |
| relation to data or a computer system |
| is guilty of an indictable offence and liable to |
| imprisonment for a term not exceeding ten years, or is |
| guilty of an offence punishable on summary conviction. |
| (2) In this section, "computer program" means data representing |
| instructions or statements that, when executed in a computer |
| system, causes the computer to perform a function; |
| "computer service" includes data processing and the |
| storage or retrieval of data; "computer system" means |
| a device that, or a group of interconnected or related |
| devices one or more of which, |
| (a) contains computer programs or other data, and |
| (b) pursuant to computer programs, |
| (i) performs logic and control, and |
| (ii) may perform any other function; |
| "data" means representation of information or of concepts |
| that are being prepared or have been prepared in a form |
| suitable for use in a computer system; |
| "electro-magnetic, acoustic, mechanical or other device" |
| means any device or apparatus that is used or is capable of |
| being used to intercept any function of a computer system, |
| but does not include a hearing aid used to correct subnormal |
| hearing of the user to not better than normal hearing; |
| "function" includes logic, control, arithmetic, deletion, |
| storage and retrieval and communication of telecommunication to, |
| from or within a computer system; "intercept" includes listen |
| to or record a function of a computer system, or acquire the |
| substance, meaning or purport thereof. |
|
|
| 430. |
| [...] |
| (1.1) Every one commits mischief who willfully |
| (a) destroys or alters data; |
| (b) renders data meaningless, useless or ineffective; |
| (c) obstructs, interrupts or interferes with the lawful |
| use of data; or |
| (d) obstructs, interrupts or interferes with any person |
| in the lawful use of data or denies access to data |
| to any person who is entitled to access thereto. |
| [...] |
|
|
| (8) In this section, "data" has the same meaning as in |
| section 342.1. |
|
|
| As you can see our criminal code carries severe penalties for |
| both Hacking and Virus spreading however, there is little |
| precedent to set sentences by. While this is reassuring, there |
| seems to be a new trends to prosecute those who are caught at |
| computer crime. Moreover it seems to be a trend to prosecute with |
| setting precedence in mind.. So for those of you in .ca who have |
| busted recently I would begin to fear right about now. |
|
|
| For the most part most computer crime in Canada that results in |
| busts is telco related, most often the charges are federal but |
| the sentences are light, however as I said before, this is |
| changing. And will continue to change with each new bust , |
| welcome to the new dawn I suppose. |
|
|
| Datapac, Canada's first net |
|
|
| As it stands Datapac is Canada's largest and most used |
| network, it is old archaic and slow, yet still it is immense |
| amounts of fun to play with. The following is a technical excerpt |
| to help you understand the operation of Datapac and how to |
| maneuver it. Those of you who are already familiar with the |
| workings of this type of network will find this dry and |
| repetitive for those of you who are not familiar it may make for |
| some learning. |
|
|
| After the manual entry you will find a list of interesting sites |
| to explore with, enjoy.... |
|
|
| Datapac 3101 "Welcome to the Dark Ages" |
|
|
| Interface (ITI) in a Packet Assembler/Disassembler (PAD), which |
| allows the devices to access the Network over dial-up (DDD) or Dedicated |
| Access Lines. |
|
|
| ITI, the end-to-end protocol for Datapac 3101, conforms to the |
| CCITT recommendations X.3, X.28 and X.29 and supports access to the |
| Datapac Network for asynchronous, start-stop character mode terminals. |
|
|
| X.3 specifies the operation of the PAD. It contains the |
| specifications for the twenty-two International parameters and |
| their operation. |
|
|
| X.25 specifies the command language between the terminal and |
| the PAD. It also specifies the conditions which define the command |
| mode and the data transfer mode. |
|
|
| X.29 specifies the procedures to be followed by an X.25 DTE |
| to access and modify the parameters in the PAD as well as the data |
| transfer procedure. |
|
|
| The Datapac 3101 service provides for terminal to Host (user's |
| computer) and terminal to terminal communication. The Host access |
| should conform with the X.25 protocol, using the Datapac 3000 access |
| service, and also support the higher level protocol conventions for ITI. |
| Host access may also be provided via the Datapac 3101 service for some |
| applications. The Datapac 3101 service also provides block mode and |
| tape support. |
|
|
| INTERNATIONAL PAD PARAMETERS |
| ---------------------------- |
|
|
| 1) Ability to Escape from Data Transfer State* |
|
|
| The setting of this parameter allows the user to interrupt |
| the communication of his or her application (data transfer mode) and |
| interact with the PAD (common mode). The character to do this is |
| "ControlJP". To return to data transfer mode, press the carriage |
| return or enter a blank command line. If the user wants to send a |
| "ControlJP" to the Host, with this parameter set set to one, simply |
| hit ControlJP twice and the second ControlJP will go to the Host and |
| the user will remain in data transfer mode. This also applies to |
| the user data field in the call request command line. |
|
|
| Parameter Number: 1 |
| Possible Values: 0 = Escape not possible. |
| 1 = Escape is possible. |
|
|
| *Note: Escape from Data transfer mode may also be possible using |
| the break signal if parameter seven is set to eight. |
|
|
|
|
| 2) Echo* |
|
|
| This parameter indicates to the PAD whether or not the |
| terminal input data must be echoed. This may be required if the user's |
| terminal cannot echo back what is being entered. |
|
|
| Parameter Number: 1 |
| Possible Values: 0 = No echo. |
| 1 = Echo. |
|
|
| *Note: Echo will also be affected by the setting of Parameter 20. |
|
|
|
|
| 3) Selection of Data Forwarding Signal |
|
|
| This parameter indicates to the PAD the set to terminal |
| generated characters or conditions that will cause data to be forwarded |
| to the destination. For example, (CR) can be used as a data forwarding |
| signal on receipt of a (CR) from the local DTE Y, the PAD will forward all |
| characters in its buffer to the remote end, including the (CR). If P13 is |
| set to 6.7, 22 or 23, a (LF) will be included in the packet and will delimit |
| it. Data is also forwarded when the buffer is full whether or not a |
| forwarding character is received. |
|
|
| Parameter Number: 3 |
| Possible Values: 0 = No data forwarding signal. |
| 2 = Forward on carriage return. |
| 2 = Carriage return. |
| 126 = All characters in columns 0 and 1 |
| of ASCII table and the character |
| del of International alphabet #5. |
|
|
|
|
| 4) Selection of Idle Timer Delay |
|
|
| This parameter is used to determine the idle timer limit |
| value when data forwarding is based on timeouts. To optimize packetizing |
| of data, no data forwarding signal need be specified. The PAD will then |
| packetize data based on packet size specified (256 or 128 characters). |
| The idle timer is used to send any packets that are not fully filled. |
| If idle timer is activated and the Host requires the (CR) to input data, |
| it still must be provided before the data send is accepted by the Host. |
| The idle timer does not send any empty packets. |
|
|
|
|
| Parameter Number: 4 |
| Possible Values: 0 = No data forwarding on timeout is |
| required. |
| 1-255 = Indicates value of the delay in |
| twenties of a second. (i.e., a |
| value of 250 makes the time wait |
| 10 seconds) |
|
|
| *Note: When editing is on (P15:1), the idle timer is inactive. |
| If this is the only data forwarding condition, turning the editing function |
| on could cause a user terminal to hand or data not to be forwarded. |
|
|
| 5) Auxiliary Device Control* |
|
|
| This is used for flow control of data coming from either a |
| PC or auxiliary device, e.g.: a paper tape machine. When set to |
| 1 it indicates to the PAD that the data is to be read an auxiliary |
| I/O device connected to the terminal. This parameter set to 2 indicates |
| that the data is coming from an intelligent device, i.e., a PC, and that |
| the PAD must exert flow control differently. |
|
|
| Parameter Number: 5 |
| Possible Values: 0 = No use of X-on/X-off. |
| 1 = Use of X-on/X-off for auxiliary |
| devices. |
| 2 = Use of X-on/X-off for |
| intelligent terminals. |
|
|
| *Note: A value of 2 is recommended for PC's. |
|
|
|
|
| 6) Suppress Network Messages |
|
|
| This parameter indicates to the PAD whether or not Network |
| generated messages are to be transmitted to the terminal. |
|
|
| Parameter Number: 6 |
| Possible Values: 0 = Suppress message. |
| 1 = Transmit message. |
| 5 = PAD prompt (*) follows Datapac |
| service signals. |
|
|
| 7) Procedure on Break |
|
|
| This parameter is used to indicate how the PAD should |
| process a break signal that is received from the terminal |
| while the terminal is in data transfer state. |
|
|
| Parameter Number: 7 |
| Possible Values: 0 = Nothing. (remain in data transfer |
| mode) |
| 1 = Interrupt. (remain in data |
| transfer mode) |
| 2 = Reset. (remain in data transfer |
| mode) |
| 4 = Send an "indication of break" |
| message to the packet mode DTE. |
| (remain in data transfer mode) |
| 8 = Escape from data transfer mode |
| (i.e., enter command mode) |
| 16 = Discard output to terminal |
| activate Parameter 8 (P8:1) |
| (remain in data transfer mode) |
| 21 = A combination of 1, 4 and 16. |
|
|
|
|
| *Note: The break signal is ignored if the virtual circuit is not |
| established while in command state. The break signal will delete |
| the current line. |
|
|
| The valid values for P7 are 0, 1, 2, 8 and 21. |
|
|
| 8) Discard Output |
|
|
| This parameter is used in conjunction with Parameter 7. |
| Depending upon the break procedure selected, this parameter may be |
| set by the PAD when the terminal user requests that terminal data be |
| discarded. This parameter must then be reset by the destination |
| computer to allow normal delivery. The PAD will discard all packets |
| destined for the terminal from the time the PAD sets this parameter |
| (i.e., it receives a break signal when Parameter 7 is set to 21) to |
| the time the parameter is reset by the destination. It can only be |
| reset by the destination. |
|
|
| Parameter Number: 8 |
| Possible Values: 0 = Normal delivery of output to |
| terminal. |
| 1 = Discard output to terminal. |
|
|
| 9) Padding after Carriage Return |
|
|
| This parameter is used to specify the number of padding |
| characters to be inserted by the PAD following a CR transmitted |
| to the terminal. Padding allows time for the carriage to return |
| on mechanical printing devices. |
|
|
|
|
| Parameter Number: 9 |
| Possible Values: 0 = 2 padding characters will be |
| inserted at 110 bps and 4 |
| padding characters will be |
| inserted at higher speeds, in |
| command mode only. (no padding |
| is done in data transfer mode) |
| 1-255 = The number of padding characters |
| to be inserted in both data |
| transfer and command mode. |
|
|
| 10) Line Folding |
|
|
| This parameter indicates the maximum number of printable |
| characters that can be displayed on the terminal before the PAD must |
| send a format effector (i.e.., <CR><LF>). This permits more data to |
| be transmitted in one packet while still letting the user print out |
| more than one line, i.e., printing out forms. |
|
|
| 11) Transmission Speed (Read only) |
|
|
| This parameter is set by the PAD as a result of transmission |
| speed detection if the terminal accesses an autobaud port. When a |
| private port with fixed speed is used, this parameter is set based |
| on the pre-stored information selected at subscription time. |
|
|
| Parameter Number: 11 |
| Possible Values: 0 = 110 bps |
| 2 = 300 bps |
| 3 = 1200 bps |
| 4 = 2400 bps |
| This is all very dry stuff (what buffer isn't?) however if you need more |
| info on it simply mail me. |
|
|
| NUA list |
| 20500011 Bell Northern Research |
| 39400100 Envoy (English/Francais) |
| 30400101 Envoy (Anglais/French) |
| 39500032 Globe and Mail |
| 41100015,I Infoglobe |
| 59600072 University of Athabasca |
| 60100010 Universtiy of Alberta |
| 67100752 ? |
| 67100673 ? |
| 20400177 QL |
| 29400138 Tymnet CIS02 7770,101 'free demo' |
| 20401338 Tymnet |
| 41100043 CSG Infoglobe |
| 73500023 KN Computer MCT |
| 59100092 Keyano College (Alberta) |
| 72400014 System Max-Daisey (VAX/VMS) |
| 69100018 Cybershare |
| 55500010 ? |
| 29400263 ? |
| 29400263 ? |
| 67100086 Sears |
| 67100132 Primenet |
| 67100489 Terminal ID=VAX |
| 67100629 (VAX/VMS) |
| 67100632 McKim Advertising (Vancouver) |
| 93200233 University of Manitoba |
| 79400100 Envoy Info/Mailbox |
| 92100086 Datapac General Info |
| 20500011 Canole II |
|
|
| I have kept a number of sites I have, off this list simply |
| to ensure I keep them, however there are thousands of Virgin |
| sites available off of Dpac. Something to keep your eyes open for |
| are Canadian government machines which are fairly abundant on the |
| Dpac. |
|
|
| Beyond Dpac, there are some actual BBS's worth calling, most |
| however would rather not have there numbers published in Phrack. None |
| the less here are some stable, and relatively active BBS's: |
|
|
| The Underground Subway 606-590-1147 |
| Gridpoint 403-283-5519 |
| The G-spot (Rabid HQ) 416-256-9017 |
| Front 242 (VX)(Rabid) 416-790-6632 |
|
|
| I am sorry for what this article did not cover, in the umpteen or so |
| pages I have punched up, I still have covered not even a tenth |
| of what I would like to cover. For those who wish a reliable UG |
| bbs for list .ca or more info on the Dpac or wish to elicit any other |
| response to this article please e-mail me at besaville@sait.ab.ca |
|
|
| ********************************************************************* |
|
|
| The German Scene |
| (by SevenUp) |
| ---------------- |
|
|
| CCC |
| --- |
|
|
| Talking about the German Hacker Scene, the Chaos Computer Club (CCC) comes |
| to most people's mind. They are most famous for their 'NASA-Hack' and their |
| publications like Hackerbibel and Datenschleuder, a monthly magazine talking |
| about 'softer' stuff than 2600, such as MUD's, the Internet and BBS'es. |
|
|
| They organize the annual Chaos Communication Congress, held annually |
| from December, 27th till 29th in Hamburg. Usually around 1000 people show up |
| there, discussing many different topics, such as Phreaking, Internet, |
| Women and Computer, Cellular Phones, Phone Cards and others. Many well-known |
| people, like Pengo and Professor Brunnstein the meeting. There are usually |
| also shows of Horror Movies (but no porns like at HohoCon), but it's not |
| a real 'party' like SummerCon or the upcoming Hacktic Party. |
|
|
| Another annually meeting from CCC members and many other hackers is at the |
| huge computer fare 'CeBit' in Hannover in March. The Get Together is at the |
| Telekom booth on Tuesday at 4pm. Usually Telekom (the German phone company) |
| representatives are very kind, give away phone cards (value: $4), but |
| usually don't have any interesting new informations. |
|
|
| There haven't been any hacks affiliated with the CCC for the last couple of |
| years. The CCC tries to get away from their former criminal image, talking |
| mostly about risks of computers in society, and producing lots of press |
| releases. |
|
|
| The KGB Hack |
| ------------ |
|
|
| Most of you might know "The Cuckoo's Egg" by Cliff Stoll. His exciting |
| novel talks about German Hackers hacking for the KGB. |
| These guys were using the German x.25 network Datex-P to get to a US |
| University, and from there to several hosts on the Arpa/Milnet (Internet). |
| They were using mostly basic knowledge to get into several UNIX and VMS |
| Systems, reading personal Mail and looking for documents the 'Russians' |
| might have been interested in. |
|
|
| It all ends up with the suicide (murder?) of Karl Koch, one of the hackers. |
| Although these hackers weren't CCC members, there is a pretty good book |
| from the CCC about it, containing more facts than Cliff's book: |
| "Hacker fuer Moskau", published by Wunderlich. |
|
|
| This is probably the best known German hack of all times. |
|
|
| Networks |
| -------- |
|
|
| I. x.25 |
|
|
| The German x.25 System is called 'Datex-P' and has the DNIC (2624). |
| Dialups are in almost every area code, or can be reached locally from |
| everywhere. There are also Tymnet and Sprintnet Dialups available in |
| the major cities, with some limitations though. Tymnet won't connect you |
| to dpac (Datapac Canada). Sprintnet has just a true dialup in Frankfurt, |
| the other dialups are handled by their partner Info AG, which allow |
| calling most RNUAs, but most Sprintnet NUIs won't work. |
|
|
| There is a 'Subnet' in the Datex-P Network, the so called 'WiN' |
| (which means scientific network). Almost all universities have connections |
| to the WiN, which means they pay a flat rate each month, which allows |
| them to make as many calls and transfer as much data to other WiN hosts, |
| as they like. Usually x.25 rates are charged by the volume of packages/data. |
| You can identify WiN addresses easily, because they start with |
| (0262)45050... There are many gateways from WiN to Internet, and also a few |
| from Internet to WiN. WiN NUAs can be reached without problem from any x.25 |
| network in the world, like Sprintnet or Tymnet; though most WiN PADs will |
| refuse to connect to non-WiN NUAs. |
|
|
| There are also a couple of German systems, international hackers used to like. |
| The most-famous is probably Lutzifer in Hamburg, Germany. It can still |
| be reached from x.25 Networks like Sprintnet or Tymnet. |
| Around two years ago, British, American and other hackers used to trade |
| all kinds of codez on "Lutz". But now, Pat Sisson ("frenchkiss") from Sprintnet |
| Security and Dale Drew ("Bartman") from Tymnet Security, try to track |
| down everyone abusing their NUIs or PADs. |
|
|
| Before Lutzifer went up 2.5 years ago, tchh and Altos Munich were most |
| attractive. They were running the same simple Korn-Chat on an Altos. |
| There are still a couple of other x.25 Systems, which attract hackers |
| from all over the world, like qsd, Pegasus (in France and Switzerland) and |
| Secret Tectonics / sectec, a rather new semi-private Board in Germany with |
| x.25 and Direct Phone Dialups, uucp/Internet Mail, File and Message Bases and |
| all Phrack Issues as well. |
|
|
| II. Internet |
|
|
| But now, most hackers quit the x.25 scene and tried to get onto Internet. |
| Unlike the fast Internet connections in the USA between .edu sites, |
| German Internet connections are mostly routed through slow (9.6kbps or 64k) |
| x.25 Links. |
|
|
| This is mostly the fault of the German phone company 'Telekom'. They have a |
| monopoly on phone lines in Germany and charge 2-10 times higher fees than |
| American phone co's. Even local calls are US$1.50/hour. |
|
|
| There aren't many German Internet Sites that attract foreign hackers, |
| compared to US Sites that German Hackers are interested in. |
|
|
| There are almost no public Internet BBSes with free access in Germany. |
| Also, German Universities have often a pretty tight security and get |
| mad easily. |
|
|
| III. Amiga Kiddos |
|
|
| BBS'es are still the major hang-out besides IRC. The Amiga Scene with |
| its K-rad Kiddos (most of them under 18 years) used to be dominant a |
| couple of years ago, trading Calling Cards and new Blue Box frequencies |
| to call the best boards in the US to leech the latest games. |
| But recently, the IBM scene caught up and many guys switched from Amiga |
| to IBM; so over 50% of pirate boards are IBM boards now. |
|
|
| But recently, BBS sysops have to face hard times. A couple of months |
| ago, lots of BBS'es in Berlin, but also in Bavaria and North Germany |
| got 'busted' - raided by the police because of their illegal warez. |
| (see my article in Phrack 42 about it) The man behind these actions |
| is the lawyer 'Guenther Freiherr von Gravenreuth', who works for Acti- |
| vision, the SPA and BSA. He is tracking down kids with piracy as recklessly |
| as BBS Sysops, who sell subscriptions for a 'Disabled Upload/Download Ratio' |
| for around $100 a month. There have been a couple of these trials lately, |
| without much notice by the press. Mr Gravenreuth is also responsible for |
| many people's fear to put up a new BBS - especially in Bavaria where he lives. |
|
|
| Also, calling the favorite Board in the US is getting harder and harder, |
| as covered in the next Chapter. |
|
|
| IV. The Phone System |
|
|
| Blueboxing used to be the favorite sport of many German traders for the |
| last couple of years. But some phreakers wanted to make more money, |
| selling the Bluebox Story to Magazines like Capital or Spiegel, or to |
| TV Shows. Even AT&T and the German Telecom, who seemed to be blind about |
| this phreaking, couldn't avoid facing the truth now - they had to do |
| something, not only to recover from the huge losses, but also to save |
| their reputation. |
|
|
| There are a lot of rumors and text files about the actions these phone |
| companies took; most of them are fakes by 'eleet' people, who don't want |
| the 'lamers' to keep the trunks and the eleet boards busy. But some actions |
| seem to be certified; e. g. Telekom bought some intelligent filter boxes |
| from British Telecom. These boxes should detect any C5 tones (especially |
| 2600 Hz), being sent by phreakers; and log the number of the phreaker, |
| if possible. |
|
|
| If possible, because the Telekom doesn't have ANI in most cases. Until |
| recently, all phone lines used to be analog, pulse dialing lines |
| with huge relay switches. Then the Telekom started switching to 'modern' |
| digitally switched lines, which allow Touch-Tone-Dialing, and also a few |
| other nice features, which I want to cover now. |
|
|
| One of these nice features 'died' just about 3 weeks ago, because someone |
| informed the new magazine 'Focus'. |
|
|
| The trick was very simple. All you need was a digital line which allowed |
| you to dial touch tone, and a 'Silver Box' - a device, that allows you to |
| dial the digits 0...9, #, * and also A, B, C and D - many modems have |
| this capability too. |
|
|
| All you had to do was to dial 'B' + 'xxx' + 'yyyy', where 'B' is the |
| Silver Tone B, 'xxx' is an internal Telekom code, and 'yyyy' are the last |
| four digits of a phone number. The internal codes 'xxx' usually look like |
| 010, 223, 011, and so on - they switch you to an exchange, mostly in your |
| own area code, but often in a different one! Notice that exchange number and |
| internal code are different. When you are connected to a certain exchange, |
| dialing the four 'yyyy' digits connects you to a certain phone number in |
| that exchange. This enables you to make free calls - also to different area |
| codes, but you have to try around to find which code matches with which |
| exchange. But that's not all; now the fun just begins! Imagine the number |
| you dial is busy... you won't hear a busy signal then, you would just be |
| connected into the call! You could listen to the conversation of two parties! |
| Imagine how much fun this could be... and imagine someone would be listening |
| to your private conversations! |
|
|
| When Telekom read the article, most area codes lost this capability; |
| but there are still some reported to work. |
|
|
| Blueboxing is getting harder and harder, MCI and AT&T keep on changing their |
| 'Break' frequencies more rapidly (though they still use in-band CCITT C5 |
| signalling); so more and more people offer Calling Card subscriptions, and |
| even more traders, who refuse paying Telekom's high fees, buy them. They |
| are offered mostly by Americans, Belgium people and Germans, for about $100 |
| a month. Also, I haven't heard of any case where a German got busted for |
| abusing AT&T's Calling Cards; probably because Telekom can't really trace |
| phones lines, either technically nor legally (they may not just 'tap' phone |
| lines because of people's privacy). |
|
|
| Also, German Toll Free Numbers (they start with 0130) are getting more and |
| more. I would take a guess and say they grow 20%-80% a year. There isn't any |
| official directory nor a directory assistance for these numbers, and many |
| companies want these numbers to remain 'unknown' to the evil hackers, since |
| Telekom is asking high fees for them. |
|
|
| So many Germans compile and scan these numbers; there is also a semi-public |
| list on them by SLINK - available on many BBS'es and on local German Newsgroups. |
| This list also contains numbers of business companies like Microsoft, |
| Hewlett Packard or Dell in Austin (hi erik :) ), so it is quite useful for |
| 'normal people' too. |
|
|
| There have also been reported the first PBX-like Systems in Germany; this is |
| quite a sensation, because German Telekom laws don't allow PBX'es, or even the |
| linking of two phone lines (like 3-way calling). So in fact, these Systems |
| weren't real PBX'es, but Merial Mail VMB Systems with the Outdial feature. |
|
|
| PaRtY 0n! |
| --------- |
|
|
| There are a couple of interesting get-togethers and parties. |
| I mentioned the annual Chaos Communication Congress after Christmas; |
| the CCC also has weekly meetings on Tuesday. There are the annual |
| CeBIT hacker parties, on the Tuesday at CeBIT in March. After the |
| CeBIT meeting and weekly, there are get-togethers at the 'Bo22', |
| a cafe in Hannover. These meetings have tradition since the KGB |
| Hacks of Pengo and 'Hagbard Celine' Karl Koch, as I mentioned above. |
| You will still find friends of them there, if you drop by on a Tuesday. |
| Since a couple of months and with Emmanuel Goldstein's great support, |
| we are having 2600 meetings in Munich, Germany too! These are the first |
| 2600 meetings outside of the US; the first meeting was quite successful |
| with over 30 people, and the next one in July will be successful too, |
| hopefully. Some international visitors from the US are expected, too. |
| These meetings are held at around 6pm in front of Burger King at |
| Central Station, Munich. I also like to thank Munich's Number One |
| Hit Radio Station 89 HIT FM at this point, for letting us into the |
| air for 3 minutes, talking about the 2600 meeting and a bit about 'hacking'. |
| There are also semi-annual IRC parties in Germany, but they are |
| 'just' parties with usually 100-150 people. Hacking and phreaking |
| isn't a topic there; probably less than 10% of them know what H/P means. |