		       Ocean County Phone Punx Presents
				       OCPP03
				  August 26, 1997

                                                                               
                              Contents
 	                      Intro-Mohawk
                          Interview-Mohawk
                       Usenet Warning-Checkmate
                       AOLeet (editorial)-Mohawk
                          Beyond Hope-Mohawk
                         Extension/Tap-Checkmate
                             News-Mohawk
                   Bell Atlantic/Nynex Merger-Mohawk
                          Project Angel-Mohawk



Intro - Mohawk


	Wow 2 months go by fast.  They say most zines fold after the third

issue.  Well this is it.  Will this be the last issue?  Of course not. The 

OCPP is getting very popular and I would like to thank everyone who has

made that possible.  Special thanks to our writers and to the people that 

mail us.  This issue will focus on the state of phreaking today and 

technology that will have an impact on phreaking in the future.


Interview - Mohawk


	A few months back while I was doing research on project angel I called

Lucent technologies to see if I can get some answers from them.  Of course

they didn't know what I was talkin about so they transfered me all over the

place.  I got to the zillionth menu and one of the options was report a

toll fraud.  I got connected to the electronic toll fraud dividion and I 

asked the guy about project angel,  He had no clue what I was talkin about 

but he was really cool.  We talked for a half an hour.  I figured I'd call

them back up and interview them.  When I called again I got a different 

person and he wasn't very friendly.  In fact he was a dick.  Sorry to 

everyone who was waiting for this.  It was suppose to be alot better but 

here it is.

All text in () are my thoughts.

Jay>Lucent technologies toll fraud this is Jay.

Mohawk>Hi this is Bill from Eastern telecommunications Monthly newsletter, 
and I was wondering If I can just ask you a few questions.  It will only
take a few minutes.  

J>ok.

M>How long have you been working for lucent?

J>who are you with?

M>Eastern telecommunications monthly.

J>ok, we're in the toll fraud group what kind of questions do you need to ask

M>I just wanted to get some background info on the ETF division and the 
people that work there.

J>I think this is something I better clear with my coach first.

M>uh ok.

J>do you wanna call back?

M>when would you like me to call back?

J>tommorow afternoon.

M>this will only take 5 minutes.

J>It's not the time I'm worried about it's the information I'm giving away.

M>If you don't want to answer something than you don't have to.

J>I'll listen to the questions If I don't want to answer them I won't.

M>How long have you been working for Lucent?

J>Well Lucent has only been in existence for..  (obviously asshole)

M>AT&T

J>22 years

M>How long has there been an ETF division.

J>I've been in it for over 3 years, I would say about 5 to 6 years.

M>How did you get the job, what qualifications did you have?

J>PBX experience  (don't get to detailed now)

M>Do you go through any special training?

J>Oh yeah. (well that clears everything up)

M>Do you guys go to seminars to learn new things?

J>Oh yeah.  (notice a pattern)

M>How many other people work at the ETF division?

J>alot.  (a billion is alot)

M>About how many cases do you handle a day?

J>Yeah this is gettin a little proprietary.

M>There's only a few more questions.

J>Well that's not the point.  I don't know who you represent, I'm giving
out information that could be gettin to the wrong hands.(who the russians?)

M>How? It's really nothing that big.

J>How do I know you're not a hacker! (cuz I'm a phreaker)

M>How can a hacker use this?

J>He maybe giving it to Northern telecom, or to our competitors.  
(News Flash-19 year old crushes Lucent and becomes the new CEO of NORTEL
by finding out how many how many cases of ETF they handle a day)

M>I didn't think it that much of a secret.  We do reports alot on computer
crime and security..

J>Well I will tell you I, well I'm speaking biasly of course, I fell that 
our systems are probably the easiest or most user friendly to secure, the 
customers don't have to purchase any additional hardware to secure their 
PBX, we can do it (did I ask you?  No he's not brainwashed or anything)

M>you do it right from the computer

J>exactly

M>the other questions I was just gonna ask were how many cases do you handle
a day
J>it varies

M>What type of computer do you use?

J>I have a COMPAQ, I use the taranova software.

M>Do you ever catch anyone?

J>no, we just stop the fraud

M>what do you refer to these people as, I've already heard you say hackers.

J>Phreakers,scumbags (without us he wouldn't have a job but we're scumbags,
the funny thing is he probably has such a thing against phreakers/hackers
he'll have a heart attack in 2 years.

M>Do you have any repeat problems?

J>Once we do a security tune up it's done.

M>Do you think phreaking will stop, stay the same, get worse or better?

J>It'll get better, It already is gettin better.  

M>Do you ever think you'll put an end to it?

J>I don't know if we'll ever put an end to it.  There's always people out 
there that are gullible.  Our work force went down by 50% I think were doing
something right. (don't jump to conclusions now) 

M>Are there any certain areas that have a big problem?

J>80% of our toll fraud comes from the 212/718 area code.  New York city

M>Yeah I heard there was a convention up there i was gonna do a report on it.

J>They have conventions, newsletters, magazines, books.  

M>Are there any other methods being developed to try and stop ETF?

J>Not that I know of.

M>What is the main problem that most people call you with?

J>Social engineering is still the number one way.

M>What is that? (as if I don't know)

J>That's when they call in and ask to be transferred out. 

M>How do you stop that?

J>You don't.

M>That's my last question, thanks alot.

J>Bye.
 
What can we learn from our friend Jay?  
Phreakers create jobs, they need us.
They know alot about what we do and how we do it.
They have special training and seminars to update them on the H/P scene.
They really, really hate us.
Their employees are brainwashed.
They leech info off of us but won't give us any info at all.
One thing that sux is that they probably all get along and they are always
willing to share new info when hackers/phreakers don't always get along
and aren't always willing to help one another.


(The next article was found in alt.phreaking.  Checkmate copyed it and sent 
it to me.  I figured I'd print it in here because it is intresting.  I am 
not saying that I believe or disbelieve what they are saying.  It is something 
to think about though.)

Usenet warning - Checkmate

~~~ Excerpted from Usenet post: "Warning! Danger! All internet users!"   ~~~

	AT&T, Bell South, Sprint, MCI, have engaged in an illegal conspiracy. 

They are hiding from the public their true involvement in possibly hundreds 

of "front" Internet Service Provider and other telecommunication companies. 

They have made audacious deals amongst themselves that you NEED to know

about.  They have hundreds of cross-ownership links amongst each other and

their subsidiaries.  AOL, and many others you thought were independent, are

all part of their plans.

	By the year 2000 they expect to have you and 480 MILLION people caught 

in their new "seamless" wireless system that will reveal your location and

record it in their databases whenever you use a phone or the Internet. With

their approximate $1 TRILLION DOLLARS IN ASSETS!!!  they have created a

consortium for this purpose.CHECK IT OUT:  http://uwcc.org

	Eventually they plan to control virtually all sources by which you can

receive news and information!  There are already deals or cross-ownership

ties with most major newspapers, this is why it isn't being reported.

	There is much going on here that is very frightening.  You think 

56kbps speed is and pushing the barrier for standard household wiring?  They 

are withholding the truth!  If they were not waiting for another 

reason.  RIGHT NOW YOU COULD GET   9-20  MEGABYTES PER SECOND!!!!! OVER 

STANDARD HOME TELEPHONE LINES!!!   Check out their ADSL "Forum": 

http://www.adsl.com/index.html

	Their plan, which has been developed with the military (ARPA/DARPA) 

and intelligence agencies (FBI, etc.), is hidden by their use of "forums",

"alliances", "consortiums" and "industry associations", etc.  Their goal is

to create a nation where all access to news and information is regulated

and filtered. one BIG company that cooperates with new MONITORING &

SURVEILLANCE laws quietly created by the government. 

	We have thousands of pages of their own documents which describe a 

police type state within a few years. 

	The DoD (military) 1997 strategic assessment says: "Internal unrest 

and extreme human rights violations can be expected."  They conclude by

saying:  "While most of the response will be from civilian authorities, the

military will become increasingly involved." WHAT IS GOING ON?!!!!   THIS

IS THE USA THEY ARE TALKING ABOUT!!!!!  Check it out for yourself:

http://www.dtic.mil/defenselink/news/Feb97/b020497_bt053-97.html

For DARPA's plans in 1997:   

http://www.arpa.mil/documents/testimony3_20_96.html

	Why have our Special Forces, Rangers, SEALS, etc. been training at 

night with explosives in at least 5 US cities (but only been reported in 

those local papers!!??) for the suppression of domestic dissenters!!!!

Ft Lauderdale Sun Sentinel, 11/5/96 & 11/18/96, Charlotte Observer

3/5-6/97, etc.

	We have a solution to stop this madness.  BUT FIRST JOIN WITH OTHER 

USERS FOR STRENGTH AND LEVERAGE.  The Development Association for World

Networking, Inc. (DAWN) became aware of these plans while engaged in other

research about ISP's.  We are organizing an Internet Users Group that will

help fight this, and locate for you an honest, locally based ISP, that

agrees to a code of conduct which includes clauses pertaining to: privacy,

civil rights, individual freedom, anti-snoop, U.S. Constitution, and the

Bill of Rights.  WE MUST STOP THIS NOW! 

Contact: dawn-membership@evcom.net


AOLeet (editorial) - Mohawk

	Whats wrong with phreaking today?  There are two main things that I 

feel are wrong with phreaking.  The first one, discriminating against Aol 

users , is seen mostly on alt.phreaking and IRC.  When ever I see this I ask 

myself, what kind of racist crap is this.  I hate racism more than anything.  

However on the net we cant see whos who  but we can see what ISP someone 

is using.  Most people who arent with AOL think that All Aolers are lamers 

and dont know anything.  If they try to post something somewhere they are 

usually flamed.  This has got to stop.  Im not just saying this because I 

am currently with AOL, Im saying this because I feel that this type of 

discrimination hurts phreaking.  We have to stick together and help each 

other out.  Im not saying that Aol doesnt have its share of lamers.  T

There are a ton of stupid lame warez doodz out there but thats got to be 

expected.  Out of almost 10 million people theres bound to be thousands of 

lamers but its not reason to say everyone on AOL is stupid.  If your 

reading a newsgroup and you see some misguided person take the 5 seconds and 

correct them.  If you see some stupid lame ass postin crap just ignore them 

and they will go away.  The other thing I think is wrong is that we are too 

concerned with whos leet and whos not.  I say who cares.  We put people on 

pedestals for stupid reasons and wish we could be like them or we proclaim 

to everyone how leet we are.  Im sorry to burst your bubble but 

hacking/phreaking wasnt a talent last time I checked.  The reason these 

people are good is because they put time in to what they do.  Some of you 

think you can read the jolly rodger cookbook, download AOHell and instant 

31337.  No.  Some of these people have been in the scene for years and years 

and dedicate a lot of time to learn as much as they can and stay on top of 

things and help out the scene.  However these people are not elite.  There 

is no such  thing.  Who gives a rats ass who can do what.  Some people 

deserve a lot of respect but there is no reason that we should worship them 

or wish that we could be like them.  Some of you need to stop and think 

about what your doing.  If you brag in a chat room somewhere how leet you 

are, where is that gonna get you.  You will probably never meet half these 

people in real life anyway.  You cannot pick up 99% of girls by telling them 

what PBX you hacked.  We all have the ability to make a difference weather 

it be starting a conference, writing for a zine, or just helping some 

newbie.  Well I hope I helped someone.





















Beyond Hope - Mohawk

	This Augast the sequel to the 94 HOPE convention took place.  The 

following are a few news articles about it.  In future issues we will try to 

have some reports on what took place from people that were there.

	With security personnel up from the CIA hometown in Langley, Virginia, 

mixing with hackers up from basements across the country, the techno-

bacchanal Beyond HOPE highlighted the further evolution of computer jocks 

into the mainstream - and into money. Now that security concerns and hacking 

have yielded a booming industry ("tiger teams" of contractual crackers), it 

should come as no surprise that this rowdy, packet-sniffing bunch has 

learned to capitalize on its true talent: working the network. "Five years 

ago, they were a fringe, the Net was this obscure thing used to hack phone 

tech manuals," says security and cryptography expert Bruce Schneier, who 

spoke at this weekend's conference, held in New York and sponsored by 

hacking mag 2600. "Now there are companies whose life blood is the Net, like 

Yahoo, Amazon.... And hackers are being 'outed,' getting hired for 

penetration testing or starting companies." The three-day conference, 

keynoted by MSNBC commentator Brock Meeks, proved that hacking is not a 

lifestyle choice, but a community with its own rock stars (L0PHT), renegades 

(Metro-card hacking Red Balaklava), martyrs (Bernie S., Phiber Optik), and 

even patron saints (Cheshire Catalyst, Captain Crunch). While Steve Rambam 

walked the audience through the method for acquiring a fake Social Security 

card, the media-savvy Mudge, wearing a "Microshit" T-shirt, filled the group 

in on Theo de Raadt's OpenBSD, a hacker-written operating system. With an 

exploit script, an easy-to-use interface, and good name, "it will get 

press," said L0PHT member Mudge. "Microsoft hates that, and that's why we 

love it." But the real attraction was the bank of Unix terminals prepped for 

public consumption - and corruption. And while the hacker movement is 

gaining force, it's also gaining speed. This year, the conference boasted an 

operational 10 Mbps local network, compared to the crawling 28.8 Kbps they 

had in 1994. "If you have a machine on the network, expect to be hacked," 

said 2600 founder and conference organizer Emmanuel Goldstein, "because 

that's what we're here for." The 1,000-person strong Beyond HOPE is among a 

growing number of hacker conferences, including Black Hat and DEFCon IV, 

both held in July in Las Vegas. The happy-camper HIP conference was held, 

perhaps unwisely, simultaneously. HOPE attendee CyberJunkie hacked the HIP 

conference homepage and riddled it with HOPE icons. Though there's clearly a 

greater handshaking between law enforcement and the hacker community, Bernie 

S. knows well that the amity has a ways to go. The co-organizer of the 2600 

meeting, the boyish Bernie was sent to prison in May 1995 by the Secret 

Service for publishing a list of the service's communications frequencies, 

code names, and photos of agents in action (and picking their noses). The 

case against him began to verge on the absurd when agents confused the 

dental putty in his garage with plastic explosive. As the cause celebre of 

the culture, Bernie S. typifies the resiliency of the group. "If you try to 

squelch info, it won't get better," he said. "It'll mushroom." Though most 

hackers subsist off freeware, the conference offered multiple opportunities 

for conspicuous consumption. "Major Hacking" cookies were on sale at the 

"Buy Our Shit" concession stand. A letter-bomb detector went for US$40 

(used), and another table offered "I Love Your Computer" bumper stickers and 

"Co-Ed Naked Hacking" T-shirts ("Finger Me for More Info"). For the more 

serious consumer, Nadir sold hot hard drives and CD-ROM drives for $50 a 

pop. Will he guarantee it works? "I'll guarantee I brought it here," he 

answers. He's a student, and it's the first time he's tried selling hijacked 

equipment, he says. "I just want to make people happy." Ritalin junkies may 

have dominated by far, but the elder statesmen of the movement were there in 

force. Phone phreak Cheshire Catalyst, the founder of 2600 precursor TAP 

(Technical Assistance Program), started his newsletter in 1971 for "pay-

phone justice" - basically a primer on how to make phone calls on a penny. 

Captain Crunch, a more grizzled veteran who served time, reminisced about 

the time he prank-called Nixon in the White House. ("Sir, we have a crisis," 

he recalls saying. "What is the nature of crisis?" Nixon asked. "Sir, we're 

out of toilet paper," Crunch answered, and hung up). But for those on the 

outside, the line between allegiance and antagonism isn't always clear. 

MSNBC commentator Brock Meeks called for hackers to "pump up the volume," 

and bemoaned the loss of elegant hacks like the hole-sniffing Satan or 

Hacker X's coup stripping the Cyber Promotions server and posting it all 

over news groups. "Twenty percent of government computers have been subject 

to hacking attempts - that's a pretty low percentage." he said. "Get off 

your asses and make that go up." Later, a black-clad attendee who requested 

anonymity scoffed at Meeks' coaching. "It's so self-serving," he said. "He 

just wants to write about it."

.c The Associated Press

NEW YORK (AP) - When thousands of young, hip and rebellious computer hackers 

- machines in tow - showed up for a three-day convention on practicing their 

craft, there was one Golden Rule: ``If you hack someone else's machine, 

please don't do anything bad.'' 

	Just to make sure, organizers asked the telephone company to shut off 

the main room's phone jacks, removing a tempting route for attendees to 

freely hack into the outside world's computers. 

	Yet many of the techno-rebels at the Manhattan conference that ended 

Sunday said there was nothing to fear: Good hackers don't crash computers. 

Exposing flaws in high-tech security is more important than undermining it. 

	``Crashing the system should not be your objective. It had been in the 

past. That's the playground bully,'' said a veteran hacker known in the 

community only as Cheshire, sporting a big grin that tells you how he got 

his code name. 

	``Now it's no longer cool. Anyone can crash a system. It's more clever 

to find out how to make it NOT crash.'' 

	Such protests are routinely overshadowed by negative press. 

Technogeeks are accused of using their computer skills to post obscene 

messages on Web sites, launch attacks on e-mail services and even destroy 

computer files. Ever since the 1983 movie ``War Games'' depicted a boy 

cracking the Pentagon's computers - nearly dragging the world into a nuclear 

war - hacking has appealed to youngsters who may be too young to know when 

they're flirting with law-breaking - or too cool to care. 

	Balancing a more positive message against hacker mischief was a main 

challenge for organizers at the Hackers on Planet Earth conference. 

	When conference leaders showed, on an overhead screen, a Web site run 

by a sister conference taking place at the same time in the Netherlands, the 

presentation prompted laughter and applause from the audience. 

	It turned out the Web site had been broken into by hackers who altered 

its description of conference events. ``All our computers were taken over by 

agents of a hostile power...'' said the site's text, painting a fictional 

takeover by aliens. 

	The dichotomy was evident inside the building's high-ceiling rooms, 

which were snaked with black cables that linked rows of computers for 

attendees to explore the limits of the internal network. Adorning the mostly 

twenty-something attendees were so many nose-rings, tatoos and black T-

shirts that the place seemed more like a heavy-metal concert than a high-

tech conference. 

	After informing hackers that the phone jacks in the main room were 

shut off - keeping them from hacking into the outside world - conference 

organizer Pamela Finkel recalls the response: ``People said, `Where's the 

basement?''' 

	Many hackers began as teen-agers who preferred riding the Internet to 

riding their bicycles. They traversed the Web and shared computer codes with 

like-minded jocks, enabling them to visit forbidden places like e-mail 


data-bases. Some even changed what authority figures had created. 

	But after much negative press, hackers today like to think of 

themselves as insanely curious explorers whose antics help point out 

security holes in the World Wide Web and other systems. Anything less would 

be to wrongly lump them with ``crackers'' - hackers who have strayed into 

high-tech lawlessness. 

	``I kind of want to mock them in a way that's not morally wrong,'' 

said a 20-year-old hacker known as Rixoff, who also wanted to keep his 

identity secret. Rixoff was describing why he wore a Nynex hard hat at the 

conference when he doesn't work for the phone company, but it also described 

his attitude toward hacking. 

	All this and more is understood by veterans like Cheshire, who 

acknowledges he himself had crossed that line of temptation. 

	His eyes gleaming like liquid crystal behind a mop of prematurely 

white hair, Cheshire admitted as much to the small crowd of kids that had 

gathered about in a corner of the room. 

	``I just don't believe that a computer is unhackable,'' he said. 

``It's just another machine.'' 	


Extension/Tap - Checkmate


	For all the paranoia junkies out there, here's an idea you might want 

to try if you suspect your neighbors are spying on you.  This is sort of 

along the lines of RBCP's rants in a 2600 article... well just read it.

	Where I live, the apartment complex has a flexible rubber "bag" which 

holds all the splicing points between the trunk for my apartment building, 

and the outside line.  It's held together with several metal clips.  If you 

disconnect the clips you will find a large, messy bundle inside. 

	Using a tone generator on the splicing points(steal one from the 

telco, it's a little orange box) and a lineman's phone on the trunk lines, 

you'll be able to find which pairs in the trunk correlate to which pairs in 

the splicing points.  What I would do is log ANI on every number in that 

box, then mark down the colors of the twisted pairs in the splicing point 

that correlate to the positions, and numbers of the trunk lines.

	Select which lines you want to tap.  Find the related splicing point 

pairs, and look for small metallic flat pieces on those cable pairs.  Once 

you find them, disconnect them.   Secure the ends of one pair of telco 

wire(or else single strand 22 AWG wire) onto one side of the metal pieces, 

and attach another pair to the  other side.  Make sure they do not touch; 

wrap them in tape .  Then measure out the amount of wire from both pairs you 

will need to run to your safe point/bedroom floor.

	Connect the two pairs  of wires to a DPDT switch, one pair will occupy 

two terminals on one side of the switch.  this is a basic "on off" circuit; 

if it's on, they will be able to make a call.  If it's off, they will get 

NOTHING on their phone.

	One pair will lead to the side which will go to the neighbor's 

connection to the trunk and the other pair will go to the outside line.  On 

the pair going to the outside line, add two short lengths of wire (you can 

connect these to the same poles that this pair is connected to on the 

switch).  Expose the ends of the wire.

	You're done!  Now to test it out.  REMEMBER to ALWAYS leave the switch 

ON unless you want to make a call!  Connect your lineman phone or beigebox 

to the two short lengths of wire.  Pick up the phone.  In this mode your 

phone and switch is basically a parallel circuit with the neighbor's phone.  

You basically have an extension

