

---------------------------------------------------------
A Beginner's Guide To The Computer Underground
Written By Pazuzu  24-Mar-1993 at 13:30 in Long Beach, CA
---------------------------------------------------------

FOREWORD:
     I, nor any SysOp or User of ANY BBS on which this file appears
     are in any way liable for any damages caused by use of information
     or ideas contained in this file. This file serves only to describe
     and introduce the Computer Underground as I myself view it, not
     to encourage illegal activity of any kind.


INTRODUCTION:
     The intended audience of this file is someone who has been modeming for
     a while, and who has through some means discovered that there exists a
     Computer Underground, and who wishes to learn more about said Underground,
     and perhaps become a member of same. If this does not fit you, please
     destroy all on-disk (or tape) and hardcopies of this file and go about
     your happy life as if you never heard of it. But, if this does fit you,
     read on!



UNDERGROUND DIVISIONS
---------------------
     The Computer Underground is basically (although quite loosely) divided
     into five main branches and one minor branch. I say loosely because there
     is much crossover between the branches.
     The branches are (in no particular order): 

     1. Phreaks - May also be referred to as "phreakers", etc. These people
        deal with the telephone grid. They want to learn all they can about
        how it works, and how they can control it, which often leads to making
        telephone calls for free (which is of course illegal). Often groups
        of Phreakers will band together and form an organized group, and 
        publish articles on the subject. 

     2. Hackers - These are the people who love computer systems (and networks)
        and who love to find out how they work, how to get into them, etc.
        A TRUE Hacker is not the malicious scum that the Media and Hollywood
        would have you believe, he is just someone who loves computers and
        computer networks. There's nothing wrong with logging into someone's
        computer, so long as you don't go deleting files or stealing trade 
        secrets. NOTE: Hackers and Phreakers are very often combined into
        one group, referred to as h/p or p/h (for "phreak/hack").

     3. Carders - These people are admittedly criminals. They use credit card
        numbers, checks, checking account numbers, whatever, fraudulently to
        obtain whatever they want for free. However, this isn't as bad as the
        media wants you to think... You are NOT LIABLE for charges made on
        your CC account that you didn't authorize, so the bank has to eat it,
        and that's why they have insurance... 

     4. Anarchists - In the sense it's used in the Computer Underground, 
        an Anarchist is someone who loves to play with fire, explosives,
        etc. This is not all bad either... Who cares if someone makes an
        explosion out in the desert just to see what will happen?

     5. Warez - Although I have never been a real supporter of warez people
        (in fact, I have fought bitter wars over BBSs with them for years)
        they DO serve a needed function in the underground: They distribute
        software. They are pirates. Most warez are distributed by warez 
        groups which exist for the sole purpose of getting the software out
        to BBSs before the other group gets that same program out. 

     6. Virus/Trojan Dudes (for lack of a better term): These people are 
        usually programmers (although not always) who are interested in
        how viruses and trojan horses work and how to make them more
        efficient. For those who don't know, a virus replicates itself
        and waits around before doing anything harmful. The program
        which simply formats your hard drive upon execution IS NOT A VIRUS,
        it is a trojan horse. This is the "minor" branch I spoke of 
        earlier.

     With that out of the way, I must restate that these divisions may not
     always be very clear or noticeable. It is very common to see a BBS with
     stuff from all of them on it (mine is one such system). I just wanted
     to detail all the various activities which comprise the Underground.

     I mentioned in several of the above descriptions that groups of like
     minded modemers often get together and form an organized Group and
     publish Magazines (electronically, as files on BBSs), or distribute
     warez. Some of the most famous Groups (some are LOOOONNNGGG gone)
     are: LOD (Legion of Doom), CHiNA (Communist Hackers in North America),
     CuD (Computer Underground Digest), Phrack, P/HUN (Phreakers/Hackers
     Underground Network) - p/h groups; THG (The Humble Guys), INC (Inter
     national Network of Crackers), the FiRM (First in Releasing Most) -
     warez groups. Of course, there are/were MANY more, these are just
     the most common ones you'll see being referred to. 


TERMINOLOGY
-----------
     Many new Undergrounders have trouble figuring out all the terminology 
     used and are of course afraid to make a post asking for help for fear
     of looking lame, so I'll help with a simple list...

     [A] General Underground Terminology 
         
         Data: This is the handle of someone who used to be a modemer.
         He is now a worm feast (corpse). He basically pissed off too many 
         people by being a lame asshole dick, and got KILLED. His real name 
         was Stuart Tay, I'm sure you've heard of him. This term is really
         great, and has SO, SO many uses... "He's a Data" ... "He pulled a
         Data" ... etc etc etc
         
         Lamer: This is someone who claims to be knowledgeable/active in 
         some area of the underground, but in fact knows/does nothing. An
         example would be a 2400bps user claiming to be a great warez
         courier.

         Leech: This is someone who calls BBSs and just downloads everything
         in sight without contributing anything (or uploading garbage just to
         get credits). 

     [B] Phreaking/Hacking Terminology (NOT in *ANY* order)

         Rebecca Bigley/Bitchley: The former chief of security at TheftyTel,
         a California private LD service provider. A famed Hacker Hunter and
         bitch from hell.
         
         Extender: This is an important phreaking term. It refers to the 
         number you call when accessing a Long Distance Carrier's service.
         An example is 950-1493, which is ThriftyTel's Extender.

         ANI: Stands for Automatic Number Identification. If you call a 
         telephone number that has ANI, your number (and sometimes address)
         shows up on a console at their location (or is logged to a printer,
         disk file, etc). This is bad, since most private long distance
         carriers use it to see who is calling their extenders.

         ESS: Stands for Electronic Switching System. It is the system
         most Bell Organizations use to switch calls. It is what makes
         horrors like ANI possible. 

         Gestapo: This is used to refer to any security/law enforcement
         agency. Its meaning should be obvious...

         SS: Stands for Secret Service. Any similarities between "SS" being
         used to refer to the Secret Service and the "SS" of Nazi Germany
         during World War II is by no means co-incidental, believe me.

         CNA: This acronym stands for Customer Name/Address (also could be
         CNL - Customer Name/Location). Basically, if you have the CNA
         dialup for an area code, and someone's fone number in that area
         code, you can call the CNA dialup and give their fone number, and
         get their name and address. This is not as easy as it sounds since
         some CNA dialups require talking to an operator, which may be
         suspicious of you, plus you need the code. Some CNAs are automated
         where you call and enter the number on a fone keypad, then the code.
         Some you call with your modem.

         COSMOS: The fone company's operating system.

         NPA: Stands for Numeral Prefix Allocation. An area code in layman's
         terms.

         Code Hacker: A program which repeatedly dials an extender, trying
         different codes, and logging which ones are valid. This is the
         main method which most phreaks use to get their fone calls.

         Telenet: This is a large network of computers. You call a Telenet
         dialup, then if you know a machine's NUA (its address), you type
         it in, and connect. This is good because there are Telenet dialups
         local to everywhere, and then you can connect to computers on
         the network no matter where they are. Other networks like Telenet
         include Tymnet and the Internet (the largest network on earth, 
         a network of networks, really).
     
     [C] Carding/Scamming/Etc Terminology

         CBI: This is a multi-use acronym which stands for Credit Bureau
         Information. It is used to refer to: [1] the information given
         by a credit reporting agency [2] the concept itself [3] a code
         used to access such a service [4] it is also used by one such
         reporting agency (namely Equifax) to refer to itself. 
         Basically, if you have a CBI access code (normally just called
         "a CBI"), you can call a CBI dialup, enter the code, someone's
         name and address (or their Social Security Number), and you will
         get all credit info on them, including account numbers. This
         is quite useful as I'm sure you can see.

         Drop Site: This is where the carder would have the carded merchandise
         sent to, since only a Data would send the shit to his own house. 

     [D] Warez Terminology

         Cracker: This is the person who actually breaks the copy protection
         on a piece of software. This often involves using hex editors, etc.,
         and is quite difficult.

         Courier: This is a person whose sole job is to upload the cracked
         warez to as many BBSs as possible so as to distribute the software
         as widely as possible. 

     This is most of the terminology you will see popping up in message
     bases and text files. I haven't (by any means) covered all of the terms
     out there, but these are some of the most common, and should help you
     greatly. If there are any you can't figure out, send me email (you
     can find me, I'm everywhere), and I'll help, and will probably add it
     to the next version of this file.


------------
ABOUT MYSELF
------------
     Before I get to the next section (which will detail techniques for doing
     these various Underground activities), I'd like to tell you a bit about
     my experience. 

     I started screwing with computers when I was only 10. My grandmother gave
     me a Commodore 64 for Christmas (note: this was 12 years ago). I started
     fucking with BASIC, and decided it sucked penii, so I learned 6502 
     Assembler. About five, maybe six years after that, I got an Amiga, and
     then learned C. I had also got a modem, and you KNOW what that led to.
     Shortly after (like 2-3 years), I got my first IBM Clone and started
     really "undergrounding it". In late 1989, my BBS went up for the first
     time, then called Motel 666. By the time April 1990 rolled around, the
     Motel, and two other BBSs (The Drop Site and Louder Than Bombs) were
     probably the most active p/h systems in the Southern California area
     (and some might say the country...). My BBS has been up and down many 
     times since then, due to forced sales of my computers, but the BBS is
     here to stay now, since this computer was paid for legit, with cash.
     
     So, what all this means, is that when I talk about this stuff, I speak
     from experience. I've done all this stuff. And if I'm not too experienced
     in a certain area, I'll say so. 

     My reason for doing this is to revive the Underground to its former glory
     by creating interest in it among newcomers, in the hopes that they'll 
     spread it, and it'll grow and become the Underground it used to be.


----------
TECHNIQUES
----------

NOTE: EVERYTHING DESCRIBED IN THIS SECTION IS UTTERLY AND TOTALLY AGAINST THE
LAW AND IF YOU GET CAUGHT YOU WILL GO TO JAIL. THE AUTHOR OF THIS FILE ASSUMES
NO RESPONSIBILITY FOR ANYTHING THAT HAPPENS BECAUSE OF THIS INFORMATION. IT IS
JUST HERE FOR EDUCATIONAL PURPOSES ONLY. YOU HAVE BEEN WARNED.


I. Phreaking Techniques

Anyway, so you're a new phreak, and you wanna commit your first phraud. Well,
if this were the late seventies/early eighties, I'd tell you to get a blue
box, and blue box away. A blue box is a device capable of making the tones
which telco operators use to control the phone system. However, since this
is 1993, I'll tell you DO NOT BLUE BOX! They WILL catch you and you WILL go
to jail. Unless you are fond of anal sex with niggers possessing 23 inch
penises, take my advice and don't blue box. A much safer (although still
dangerous) way to call for phree is by using codes. 

Start by getting yourself a code hacking program (my favorite is P-Hack,
another popular one is Code Thief) from a p/h BBS. Set it up for the extender
you are hacking (try 9501493 if you live in Southern California). You'll need
to know the phone number for the extender, the dialing order, and the number
of digits they use in their codes. You also need a list of modem numbers that
will never be busy, but most code hackers come with a list of Telenet dialups
built right in, so you almost never have to worry about it. See, the way this
works is the program figures out a code to try, calls the extender, enters 
the code, then the modem number, and if there's a carrier, the code is valid.
You need to know the dialing order since some LD companies have you dial the
phone number first, then the code. You also need to figure out a template to
hack on, which most programs allow you to enter as a series of digits with X's 
in it. Any digits will be used verbatim, and an X means "any digit". For
example, if your template was 1X1XXX, the code hacker will randomly generate 
codes with a "1" as the first and third digits. Also, most hackers will allow 
you to enter an amount of time to delay between hack attempts, and it is very 
important to use this feature if the hacker you are using supports it because 
some hacker busting procedures use the number of times a number is called 
within a certain period to decide if something is shady. I always use 1 
minute and 30 seconds as my delay, and I've never been caught. It is also a 
good idea to be hacking several extenders at once if your hacker supports it. 
Let the thing fly, go to bed, and when you wake up, the Code Fairy should have 
left you a nice little present (or several!). NOTE: I did not go through the 
details of setting the hacker up to work with your modem, since I assume you 
can handle such a task.

Ok, so now you've hacked some codes, and you're ready to use them. Well, go
to a pay phone, dial the extender, wait for a tone, enter the code (this 
assumes code-first dialing, of course), wait for another tone, then enter
the area code and phone number you are calling, and you have just made a
call FOR FREE! NOTE: You must ALWAYS use the area code, even if it's the one
you're in. You can also use this to call out-of-state BBSs for free, and it's
especially easy with Telix... You just make the phone number in your dialing
directory "!,,,@,,7146469180" (for example, substitute the number of the BBS
you want to call), and then set up the long distance codes in Telix... Set
"!" to the extender, and "@" to the code, and you're set.

Wow! Now you've been using codes for awhile, saving all kind of cash on fone
calls, but, "Is this all?" you ask... Well, NO!, it's not. 

There's another fun thing called a Beige Box (I didn't put this in the 
terminology section because I planned to detail it here anyway).  A TRUE 
beige box is really a Telephone Lineman's handset, they cost around a thousand 
bucks. However, anything you can use to clip onto a phone line and dial a call 
can be termed a beige box. Here's how to make one... Go to Radio Shaft, and get
their real cheap one-piece fone, the one that's just basically a fone 
handset, with a modular cord coming out of it, and ending in a standard
modular plug. They're on sale all the time for $14.95, and they only cost
$19.95 when they're not on sale, and they can save you thousands, so it's
well worth it. While at Radio Shaft, pick up some alligator clips also.
Cut the modular plug off the fone, then solder an alligator clip on to
each wire, and try to match the colors, black and red. You now have a fully
functional beige box. Now go find a phone terminal box. There's one on every
house, and apartment building in the world. Also, if you live near South
Coast Plaza in Orange County (California), the service corridors are filled
with open, exposed phone terminal boxes. To get, in just come out of Sears
on the top level, hang a left, and just before you get to Birraporetti's, 
there's a door marked "Authorized Personnel Only", or some such bullshit.
Simply open that door, and walk in like you know what you're doing and no-one
will care. Clip one alligator clip onto each terminal for the line (there are
two per phone line, usually one right next to the other). Then listen for
a dial tone. If you get a dial tone, you're set! If not, either the line is
dead, your beige box is busted, you soldered the clips wrong, or the phone
box is weird. Anyway, if you get tone, dial away, and if you get tone but
the thing won't dial, reverse the clips and try again, also making sure the
phone is set to dial tone. You are now a successful beige boxer. There is
also a variation on the beige box that some people will call a "beagan box".
I call it a "beige box with a real long cord", since that's what it really
is. A word of caution, though: While we phreakers call this "beige boxing",
the law likes to call it "wire tapping", which also happens to be a felony,
so please don't get caught. WORD OF CAUTION #2: I have seen some files
on "began boxing" that tell you to clip onto your neighbor's line, then run
one to your house and call away. This is a bad idea, and could get you
shot full of holes, or thrown in prison. Don't do it. 

There are many other ways to phreak (PBXs, PCP hacking, etc), but these are 
the two most basic and will save you thousands on your phone bill, especially
after you get established in the underground, and start calling BBSs in 
multiple states, even multiple countries. And anyway, I've never had to mess
with any other methods, so I don't think you will either, unless you just
want to for the hell of it, which is fine. 



II. Hacking Techniques

Now we move onto hacking: obtaining illegal access to someone else's computer
system. 

In the past, any beginner's hacking file would tell you to start with Telenet,
since Telenet used to be full of really low-security systems that any five
year old could hack into. Now, most of the systems on Telenet are so secure
(since every hacker in the world already hacked them), that you probably 
couldn't hack into them with an axe. So, if you want to fuck with Telenet
(and it's fine if you do, I still do now-and-then as well), get Dr.
Dissector's NUA Attacker (an NUA is basically the node number of a machine
on Telenet), read the docs, and go for it. 

The way I'm going to tell you to start hacking should be much easier as well 
as safer. It's called Carrier Scanning. What you do is get a Carrier Scanning
program (there are MANY...), and tell it what NPA and Exchange (area code
and prefix, for laymen) you want to scan, and go to sleep. What it will do
is call every number in the exchange, and log which ones answered with a 
carrier. Then, you just check the log, and see which ones look cool. A good
way to find a good exchange to scan is to find one that's in a Big Business
district, or one where a large University is. All Universities have big 
computer systems, and most have modems. 

So now you have a list of carriers in some exchange, and you want to hack.
You'll need to know a bit about operating systems, since once you get in,
if you don't know the OS the machine it running, you can't do much of 
anything. 

The most common (and fun) operating system you'll find on-line is of course 
Unix. Unix is a great OS (I run it at home), and, if set up wrong, is easier 
to hack than a paper bag. You'll recognize a Unix system by the distinctive
"login:" or "Login:" prompt. Sometime, you'll connect to a tty (a tty in
Unix is the line on the host that the modem or terminal is connected to)
where someone didn't log out, they just hung up. This is great, and you'll 
know you've hit it when you connect and instead of a login prompt, you
get a shell prompt, which is either "#", "$", or "%", depending on who was
logged in. Everyone who logs into a Unix system must have a login name 
and password, and the OS itself defines several default "special" accounts. 
The most important account on a Unix is "root". Every system will have root, 
and anyone who can login as root can do ANYTHING, ANYTHING, they want to the 
system, because root is the "super-user", the one account that can do 
EVERYTHING. When logged in as root, the shell prompt will be "#", otherwise 
(usually), it will be "%" or "$". Other common accounts are guest, bin,
admin, and mmdf. There are many others. Anyway, once you get in, Unix is
fairly simple to use. The directory structure is a tree, just like dos, 
except unix uses "/" instead of "\" to separate subdirectories. To get a 
list of files, type "ls" or "ls -l". To see what directory you're in, type
"pwd". cd will change directories, just like dos. REMEMBER, Unix is 
case-sensitive, unlike dos, and most (basically ALL) unix commands are 
lower-case. If you use "ls -l", you'll notice there's three groups of three
characters each in front of the file name. These are the file permissions,
which tell whether certain users can read, write, or execute the file in
question. If there's an 'x' in the third group (for example "rwxr-xr-x"),
and you're not logged in as root, you can execute the file (unix doesn't
use an .exe extension or anything like dos does, it uses the permissions
to determine if a file is an executable). If logged in as root, it doesn't
matter, you can do it anyway, no matter what, IF there's an 'x' anywhere in
the groups. So, just screw around with executable files and have fun.

This is by no means a complete hacking guide, as there are many more
operating systems besides unix (VMS for example, which will give you a
"Username:" prompt on connection), other ways to get to the systems 
(through telenet, tymnet, the Internet, etc), and so on and so forth. But,
this should get you started, and there are many other files out there that
can help you also. When in doubt, try typing "help" or "man". A lot of 
systems have online help... Also, if you connect to a system, and nothing
happens (i.e., no prompt), try hitting return a few times, or changing the
comm parameters (usually 7-e-1 will work), or sending a BREAK signal 
(CTRL-END in Telix). 



III. Carding/Scamming/Etc Techniques

NOTE: THIS SECTION DESCRIBES ACTIVITIES WHICH ARE VERY VERY VERY ILLEGAL, AND
IF YOU GET CAUGHT REALLY BAD THINGS WILL HAPPEN. THEREFORE THE AUTHOR REALLY
ASSUMES NO RESPONSIBILITY SHOULD ANY UNPLEASANT THINGS HAPPEN IF YOU DO ANY
OF THIS SHIT. BE CAREFUL. YOU HAVE BEEN WARNED.


Carding (a term a lot of people will use to describe not only actual carding,
but also checking, PO fraud, etc, etc), is the one Underground activity that
can really save you a lot of money, but can also get you thrown in prison
really fast, so, when I mention a safety technique, be sure to follow it,
since I haven't been caught and have been really careful every step of the
way. 

To get started in your scamming career, I'm going to recommend you pull a 
very simple scam that may seem piddly-ass at first, but will help you
discover one thing: whether you can handle being a carder/scammer/whatever
you wanna call it. The scam is very simple: You get a Columbia House (or BMG)
ad from a magazine, order as many CD's as they'll send you without sending
money first, and then never pay. I have over 300 CD's in my collection, and
the only ones I paid for (only about 20) were ones they didn't have. The
key here is to use a BOGUS name, not your own. Sending it to your own house
is fine (the first time anyway, not after), but NEVER use your own name. This
will save your ass. "Must be a practical joke", you'll tell them. After the
first time you do it, if you're going to do it again, use a different address
(but one where you can pick them up at), and a different name. 

Well, now you've stole 3,000 CD's from Columbia House, and you haven't killed
yourself from the guilt, what's next? Well, I'm going to describe Traditional
Carding because it was actually the first scam I ever did. I don't do it 
anymore, because it's hard to find a good vendor who'll take cards without
a DNA sample or some bullshit, plus it's real dangerous now that everyone's
caught on, but several people here in my area claim to be still doing it
with great success. Traditional Carding used to be the stock way everyone
got their HST's when they first came out and were over $1200, but now, anyone
who sells computer stuff knows that COMPUTER MERCHANDISE+A CREDIT SALE = FRAUD
so they want all kind of info before they'll send anything. This is ridiculous
since if they knew anything, they'd know that the approval code means they'll
get paid regardless if it's fraud or not. The credit company may try to screw
them but the law says APPROVAL=THEY GET PAID. They just have to fight a bit
to get the money. ANYWAY, just because you can't get computer stuff doesn't
mean you can't get all kind of other stuff, sell it, and buy that 3gig hard
drive you've cumming over.

Ok, so here goes... You'll need several things for Traditional Carding:
[a] A Drop Site, [b] A CC account - WITH FULL INFO, and [c] a vendor who
will not require a DNA sample, blood, or some other bullshit before they'll
send the merchandise. 

[a] - The Drop Site - First off, don't ever send carded stuff to your house.
      Only a Data would do that. If you send it to your house, you will get
      caught, you will go to jail, and you will get buttfucked. You need
      a drop site. A drop site is usually a house where the people that live
      there are out of town, or maybe even a vacant place. If you use a vacant
      place, make sure it isn't obvious (usually, a "For Sale" sign makes it
      real obvious), because UPS and FedEx people aren't as dumb as you think.
      Write down the address and zip code of the place, then say it over and 
      over a million times in your head, so it becomes familiar to you and you 
      can rattle it off like you've lived there forever.

[b] - The CC Account - This is very important, since it's very hard to card
      without a CC account. There are many ways to get them. One is by looking
      in someone's mail, and taking their statements, another is by forwarding
      their mail, or trashing (looking in trash for statements, etc), or
      if you work retail, it's REAL easy... Once you have the CC number, you're
      not home yet, you need the person's name, and BILLING ADDRESS. They won't
      always ask, but have it just in case. Also, there is a very common 
      misconception about expiration dates. THEY DON'T MEAN ANYTHING, AND 
      ANYONE WHO TELLS YOU THEY DO IS AN BLITHERING IDIOT. You just have to
      make one up that's 2 or 4 months ahead of what the current day is.
      Like if it's July 4, 1993, just say "June 1994", and you'll be fine.
      
[c] - The Vendor - You're on your own here, since I don't do this anymore.
      The way I used to do it is by getting magazines catering to the type
      of stuff I'm buying (Computer Shopper for computer shit, Guitar for
      musical stuff, you get the idea), then finding a small, non-color ad
      and using that vendor.
      
Anyway, now that you have everything together, you need to actually card the
shit. Again, I can't stress this enough, practice the whole thing in your
head so that is sounds natural, and you feel comfortable with it, because,
believe me, they'll spot you if you don't. So, once you've got it, go to 
A PAY PHONE (safety tip), call them and order. Give them the drop site address
and the cardholder's name. If they ask "is that the address on the card?", say
no, and then give them a bogus story about the fact that this a birthday 
present for a relative in another city, make it up, you get the idea. And if 
they say "this is fraud... we *know* who you are! you're dead!" (or something)
hang up, and bail, then start over at step A, and DON'T TRY TO USE THAT CARD
AGAIN, BECAUSE IT *WILL* BE FLAGGED AS "FRAUD ATTEMPTED"!!! If they ask for
a number to call you back at, DO NOT GIVE THEM THE PAY PHONE NUMBER, try
to talk them out of it. Tell them you're at an airport on a business trip
and just remembered to send the gift, etc, just MAKE SURE IT MATCHES YOUR
OTHER STORY, OR YOU'RE DEAD. If that's doesn't work, give them a bogus number
and forget it. Try again, with a DIFFERENT CARD. If all goes well, you will
have just carded something. Congratulations! (NOTE: My first card run was
when the TI TravelMate 2000 Notebook Computer first came out, and with
2 megs of RAM, and a 2400bps modem with sendfax, it cost $3500. I got two
of them on the first try, but that was the good old days...)

A WORD ABOUT CBI: CBI (see terminology section) used to be a good way to get
card numbers: you looked in the phone book for some guy's name and address,
CBI'ed the poor fool, then used his cards. I used to run like 30 CBIs every
day just for the fun of it, until Equifax called me. I don't use CBI anymore
and unless you have a portable computer you can use clipped onto a phone
line somewhere, I don't think you should do it either.

I mentioned in the Traditional Carding section that carding used to be the
stock way everyone got their high-speed modems. A new way has come out
recently that works quite well... It's called PO Fraud (PO stands for
Purchase Order, it's how most companies buy things). What you do is go to
a stationery store, buy some PO forms, then get a bogus company logo, name,
and address, and photocopy it onto a PO form. Then you call US Robotics,
talk to a sales weasel, and say you're from whatever company and that
you need two power supplies for a Dual Standard. They'll ask how you want
to pay, say Purchase Order. They'll ask you to send the PO. You'll get all
the cost info, etc, TYPE that onto the PO then send it. They'll send you
two power supplies, with an invoice for $21 (the supplies cost $10.50 each)
or more, depending on shipping, etc. PAY THE INVOICE. THIS IS IMPORTANT.
YOU ARE GETTING A USR DUAL STANDARD FOR $21 - IT'S WORTH IT. Then, like
a week or two after you get the power supplies (just chuck 'em, you don't
need them anyway), and have paid the invoice, call back the same sales fool,
and say you need a Dual Standard modem. They'll send it to you on a PO,
send them the PO like before, then when the modem comes, don't pay the
invoice. You just grabbed a Dual Standard for $21. 

Another scam I used alot last summer was check fraud. The stuff I'm going
to describe here seems quite wimpish at first, but I'm sure you can adapt
it to your needs. Grab someone's checks. Call a pizza place, say you have 
to be at work for an emergency meeting (or whatever) in five minutes, but 
your kids need food. Tell them you'll send your son/daughter over with a 
check. Write out the check, and go pick up your free pizza. 

This is only the beginning of the scams you can have fun with. If you come 
up with any new ones, email me.



IV. Anarchy Info

I'll admit that when I first heard about it, anarchy seemed pretty dumb to
me. I mean who the HELL wants to go around setting off bombs. Then the LA
riots hit (I LIVE in LA), and I thought different. I don't know a lot about
the anarchy side of the Underground, but I'm snatching all the files I can
find on it, and learning fast. It useful just to be able to blow things up,
especially of you get caught in a riot zone. It's also useful for just
normal ordinary revenge. Like I said, I don't know it too well yet, but
I will soon, and that'll be for another file...




Anyway, I think that's it for now. I've covered quite a bit here and I'm sure
you're itching to go try it out. Go for it, but remember, YOU WERE WARNED. 
If you have any interesting experiences, call my BBS (the number is at the
end of this file), and post about it.

I mentioned before that my reason for doing this was to revive the 
Underground. That is a major goal of mine. We need new blood down here. If
you are interested in writing a piece for one of my files, or starting
up a newsletter, or whatever, email me somewhere (I shouldn't be too hard
to find), and let me know. WE NEED TO RESTORE THE UNDERGROUND...

Look for my next file coming when it comes...

Until then: STAY ALERT, TRUST NO-ONE, AND KEEP YOUR LASER HANDY...


- Pazuzu, March 25, 1993 09:47, Long Beach, CA -

call Minas Morgul (my BBS) at 714.646.9180 

- 333 megs
- 14.4kbps
- p/h/c/v/a/etc/etc/etc

714.646.9180