The Anarchist Cookbook (16 page)

Read The Anarchist Cookbook Online

Authors: William Powell

Tags: #Reference, #Handbooks & Manuals

BOOK: The Anarchist Cookbook
8.25Mb size Format: txt, pdf, ePub

Rumors: Why Spread Them?

Do you ever get tired of hearing rumors? You know, someone gets an urge to impress

others, so they create a rumor that some long distance company is now using tracing

equipment. Why start rumors? It only scares others out of phreaking, and then makes

you, the person who started the rumor, look like Mr. Big. This article is short, but it

should make you aware of the rumors that people spread for personal gain. The best thing

to do is to denote them as a rumor starter and then leave it at that. You should not rag on

them constantly, since if the other users cannot determine if it is fact or rumor, then they

should suffer the consequences.

The New Sprint FON Calling Cards

US Sprint has opened up a new long distance network called the Fiber Optic Network

(FON), in which subscribers are given calling cards. These calling cards are 14 digits, and

though, seem randomly generated, they are actually encrypted. The rumors floating

around about people getting caught using the Sprint FON calling cards are fact, not

rumors. The reason people are getting caught is that they confuse the FON calling cards

with the local 950 port authorization codes. If you will remember, you never use AT&T

calling cards from you home phone. It has ANI capability, which is not tracing, but rather

the originating phone number is placed on the bill as soon as the call is completed. They

know your phone number when you call the 800 access port, but they do not record it until

your call is completed. Also, through several of my hacks, I came up with some interesting

information surrounding the new Sprint network. They are listed below.

800-877-0000 - This number is for information on US Sprint's 800 calling card service. I

have not played around with it, but I believe it is for trouble or help with the FON calling

cards. I am not sure if it is for subscribing to the FON network.

800-877-0002 - You hear a short tone, then nothing.

800-877-0003 - US Sprint Alpha Test Channel #1

800-877-(0004-0999) - When you call these numbers, you get a recording saying:

"Welcome to US Sprint's 1 plus service." When the recording stops, if you hit the pound

key (#) you will get the calling card dial tone.

Other related Sprint numbers

800-521-4949 - This is the number that you subscribe to US Sprint with. You may also

subscribe to the FON network on this number. It will take 4 to 5 weeks for your calling

card to arrive.

10777 - This is US Sprint's equal access number. When you dial this number, you then dial

the number you are calling, and it will be billed through US Sprint, and you will receive

their long distance line for that call. Note that you will be billed for calls made through

equal access. Do not mistake it to be a method of phreaking, unless used from a remote

location. If you are in US Sprint's 1+ service then call 1+700-555-1414, which will tell you

which long distance company you are using. When you hear: "Thank you for choosing US

Sprint's 1 plus service," hit the pound key (#), and then you will get the US Sprint dial

tone. This however is just the same as if you are calling from your home phone if you dial

direct, so you would be billed for calls made through that, but there are ways to use this

to your advantage as in using equal access through a PBX.

Automatic Number Identification (ANI)

The true definition for Automatic Number Identification has not been widely known to

many. Automatic Number Identification, (AKA: ANI), is the process of the destination

number knowing the originating number, which is where you are calling from. The method

of achieving this is to send the phone number that you are calling from in coded form

ahead of the destination number. Below is an example of this.

ANI Method

Dial: 267-0293

Sent: ********2670293

* - Denotes the originating number which is coded and sent before the

number

As you noticed there are 8 digits in the coded number. This is because, at least I believe,

it is stored in a binary-like form. Automatic Number Identification means a limited future

in phreaking. ANI does not threaten phreaking very much yet, but it will in the near future.

A new switching system will soon be installed in most cities that are covered by ESS,

Electronic Switching System, now. The system will have ANI capabilities which will be

supplied to the owners of phone lines as an added extra. The owner's phone will have an

LED read-out that will show the phone number of the people that call you. You will be able

to block some numbers, so that people cannot call you. This system is in the testing stages

currently, but will soon be installed across most of the country. As you see, this will end a

large part of phreaking, until we, the phreakers, can come up with an alternative. As I

have been told by several, usually reliable, people, this system is called ISS, which I am

not sure of the meaning of this, and is being tested currently in Rhode Island. 800 in-

watts lines set up by AT&T support ANI. The equipment to decode an ANI coded

origination number does not costs as much as you would expect. 950 ports do not offer

ANI capability, no matter what you have been told. The 950 ports will only give the city in

which they are based, this usually being the largest in the state, sometimes the capitol.

One last thing that I should tell you is that ANI is not related to tracing. Tracing can be

done on any number whether local, 950, etc. One way around this, especially when dialing

Alliance TeleConferencing, is to dial through several extenders or ports. ANI will only

cover the number that is calling it, and if you call through a number that does not support

ANI, then your number will never be known.

68. Jackpotting ATM Machines by The Jolly Roger

JACKPOTTING was done rather successfully a while back in (you guessed it) New York.

What the culprits did was sever (actually cross over) the line between the ATM and the

host. Insert a microcomputer between the ATM and the host. Insert a fraudulent card

into the ATM. (By card I mean cash card, not hardware.) What the ATM did was: send a

signal to the host, saying "Hey! Can I give this guy money, or is he broke, or is his card

invalid?" What the microcomputer did was: intercept the signal from the host, discard it,

send "there's no one using the ATM" signal. What the host did was: get the "no one using"

signal, send back "okay, then for God's sake don't spit out any money!" signal to ATM.

What the microcomputer did was intercept the signal (again), throw it away (again), send

"Wow! That guy is like TOO rich! Give him as much money as he wants. In fact, he's so

loaded, give him ALL the cash we have! He is really a valued customer." signal. What the

ATM did: what else? Obediently dispense cash till the cows came home (or very nearly so).

What the crooks got was well in excess of $120,000 (for one weekend's work), and several

years when they were caught. This story was used at a CRYPTOGRAPHY conference I

attended a while ago to demonstrate the need for better information security. The lines

between ATM's & their hosts are usually 'weak' in the sense that the information

transmitted on them is generally not encrypted in any way. One of the ways that

JACKPOTTING can be defeated is to encrypt the information passing between the ATM

and the host. As long as the key cannot be determined from the ciphertext, the

transmission (and hence the transaction) is secure. A more believable, technically accurate

story might concern a person who uses a computer between the ATM and the host to

determine the key before actually fooling the host. As everyone knows, people find

cryptanalysis a very exciting and engrossing subject..don't they? (Hee-Hee)

_____ ______

| |-<<-| |-<<-| |

|ATM| micro |Host|

|___|->>-| |->>-|____|

The B of A ATM's are connected through dedicated lines to a host computer as the Bishop

said. However, for maintenance purposes, there is at least one separate dial-up line also

going to that same host computer. This guy basically BS'ed his way over the phone till he

found someone stupid enough to give him the number. After finding that, he had has Apple

hack at the code. Simple.

Next, he had a friend go to an ATM with any B of A ATM card. He stayed at home with

the Apple connected to the host. When his friend inserted the card, the host displayed it.

The guy with the Apple modified the status & number of the card directly in the host's

memory. He turned the card into a security card, used for testing purposes. At that point,

the ATM did whatever it's operator told it to do.

The next day, he went into the bank with the $2000 he received, talked to the manager

and told him every detail of what he'd done. The manager gave him his business card and

told him that he had a job waiting for him when he got out of school.

Now, B of A has been warned, they might have changed the system. On the other hand,

it'd be awful expensive to do that over the whole country when only a handful of people

have the resources and even less have the intelligence to duplicate the feat. Who knows?

69. Jug Bomb by The Jolly Roger

Take a glass jug, and put 3 to 4 drops of gasoline into it. Then put the cap on, and swish

the gas around so the inner surface of the jug is coated. Then add a few drops of

potassium permanganate solution into it and cap it. To blow it up, either throw it at

something, or roll it at something.

70. Fun at K-Mart by The Jolly Roger

Well, first off, one must realize the importance of K-Marts in society today. First off, K-

Marts provide things cheaper to those who can't afford to shop at higher quality stores.

Although, all I ever see in there is minorities and Senior Citizens, and the poor people in

our city. Personally, I wouldn't be caught dead in there. But, once, I did. You see, once,

after The Moon Roach and Havoc Chaos (Dear friends of mine) and I were exploring such

fun things as rooftops, we came along a K-Mart. Amused, and cold for that matter, we

wandered in. The Tension mounts. As we walked up to the entrance, we were nearly

attacked by Youth Groups selling cheap cookies, and wheelchair sticken people selling

American Flags. After laughing at these people, we entered. This is where the real fun

begins... First, we wandered around the store, and turned on all the blue lights we could

find. That really distracts and confuses the attendents...Fun to do... The first neat thing,

is to go to the section of the store where they sell computers. Darkness engulfs the earth

the day they find Apple Computers being sold there. Instead, lesser computers like the

laughable C-64 can be found there...Turn it on, and make sure nobody's looking...Then, once

in Basic, type...

]10 PRINT "Fuck the world! Anarchy Rules!" (or something to that effect.)

]20 GOTO 10 and walk away.

Also, set the sample radios in the store to a satanic rock station, and turn the radio off.

Then, set the alarm for two minutes ahead of the time displayed there. Turn the volume

up all the way, and walk away. After about two minutes, you will see the clerk feebly

attempt to turn the radio down or off. It's really neat to set ten or more radios to

different stations, and walk away. One of my favorite things to do, is to get onto the

intercom system of the store. Easier typed then done. First, check out the garden

department. You say there's no attendent there? Good. Sneak carefully over to the

phone behind the cheap counter there, and pick it up. Dial the number corresponding to

the item that says 'PAGE'... And talk. You will note that your voice will echo all over the

bowels of K-Mart. I would suggest announcing something on the lines of: "Anarchy rules! "

71. Mace Substitute by The Jolly Roger


3 parts Alcohol


« part Iodine


« part Salt

-or-


3 parts Alcohol


1 part Iodized Salt (Mortons)

It's not actual mace, but it does a damn good job on the eyes...

72. How to grow Marijuana by The Jolly Roger

MARIJUANA

Marijuana is a deciduous plant which grows from seeds. The fibrous section of the plant

was (has been replaced by synthetics) used to make rope. The flowering tops, leaves,

seeds, and resin of the plant is used by just about everyone to get HIGH. Normally, the

vegetable parts of the plant are smoked to produce this "high," but they can also be eaten.

The active ingredient in marijuana resin is THC (Tetahydrocannabinol). Marijuana contains

from 1%-4% THC (4% must be considered GOOD dope). Marijuana grows wild in many parts

of the world, and is cultivated in Mexico, Vietnam, Africa, Nepal, India, South America,

Other books

2 CATastrophe by Chloe Kendrick
Expect the Sunrise by Warren, Susan May
The Great Agnostic by Susan Jacoby, Susan Jacoby
Fall of Night by Rachel Caine
By Book or by Crook by Eva Gates
Ask For It by Faulkner, Gail