<-><-><-><-><-><-><-><-><-><-><-><-> <-> Death By Electronics <-> <-> Volume 1, Issue 4 <-> <-> Released on <-> <-> 01/1/95 <-> <-><-><-><-><-><-><-><-><-><-><-><-> +----------+ |Disclaimer| : We, at DBE, take no responsability for your actions +----------+ due to this magazine. We are simply using the freedom of speech, and the freedom of the press. We do not encourage you to do anything that we demonstrate in this magazine. +------------------+ |Quick Introduction| : Did everybody have a kick ass Christmas? Well, the +------------------+ release date of this magazine coincided with the new year. So, lets all make sure that 1995 rocks! I am starting to like what I see. We are now getting more people to apply, and we already have 3 boards that carry all of DBE's products. But I hope that you guys still decide to apply. Lets try to make DBE the best HPACV group in the 6i3/8i9 scene. <-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-> <-> Table Of Contents <-> <-> <-> <-> 1. The Uses of BlueBeep <-> <-> 2. Hacker Gangs Warfare <-> <-> 3. Crashing the Internet (Theory) <-> <-> 4. Microwave Jammers <-> <-> 5. Hacker Whackers <-> <-> 6. Thermite <-> <-> 7. Phreak Story #1 <-> <-> 8. The DBE Chain <-> <-> <-> <-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-><-> (1). The Uses of BlueBeep by Source Unknown Not many people know the use of BlueBeep, and thats why I decided to write this article. Most people don't see the true power that lies behind the amazing program. I hope that after reading this, you will begin to use it more often. But keep in mind, that this is a very simple description of Blue Beep, in which I only explain the key points. I might go more into detail in the next issue. BlueBeep can be used to do many things: -Action Mode -Scanner -Red Box -Frequency Tester -Card Talker -Phone Word Action Mode: Action Mode is the most usefull tool in BlueBeep. This is what you will use to phreak. If used proprely, you can make long distance calls from your house for FREE! BUT, you NEED a sound card. Thats the first thing that you need. The second is a TONE phone line. Sorry, if you have pulse, you can't use it. Scanner: The scanner is a wardialer. But my opinion is to not use it. Toneloc IS the best wardialer out there. Don't use anything else (for now) Red Box: Well, the only use of this red box that I can see, is to tape the sound of a quarter into a GOOD QUALITY cassette. Then to play the cassette next to the mouth peace of a OLD pay phone with a small tape player. The quality has to be the best that you can get. I havent tried it, but Im sure that it would most likely work (not on the new digital phones though). Also, you could always build a cheese box (a device that stimulates your phone so that it acts like a pay phone), and use the Red Box with that. But Im not sure if it would work. Frequency Tester: The only use of the frequency tester is to test different frequencies to use for phreaking. It is mostly used by professional phreaks. So unless you beleive that you are a amazing phreak, don't bother with it. Here is a list of phone frequencies created by Jolly Roger (probably one of the worlds best Anarchist): Frequencies (Hz) Domestic Int'l ------------------------------------- 700+900 1 1 700+1100 2 2 900+1100 3 3 700+1300 4 4 900+1300 5 5 1100+1300 6 6 700+1500 7 7 900+1500 8 8 1100+1500 9 9 1300+1500 0 0 700+1700 ST3p Code 1 900+1700 STp Code 1 1100+1700 KP KP1 1300+1700 ST2p KP2 1500+1700 ST ST The timing of all the MF signals is a nominal 60ms, except for KP, which should have a duration of 100ms. There should also be a 60ms silent period between digits. This is very flexible however, and most Bell equipment will accept outrageous timings. In addition to the standard uses Card Talker: Well, I consider the card talker better for prank calls then for phreaking. Don't bother with it. Just talk to the operator normally instead of using a freggin computer to do it. (Its safer to do it this way also) The author of blue beep suggests you to use it whenever you don't feel like talking to the operator. Phone Word: You probably already know the use of the phone word. It creates a list of words out of the digits that you give em, so that you can remember phone numbers more easily. Try using it on numbers that are important to remember such as PBX's, or amazing pirate boards. I consider quite usefull. The only thing that I have just explained to you, is what BlueBeep is used for. I havent explained HOW to use it. I will probably write on that in the next issue. But, if you are really impatient to use it, either write e-mail to me, or load up BlueBeep, and go into the "Usage" section in the online help. You should get a pretty good idea how proprely use Blue Beep from there. (2). Hacker Gangs Warfare by Source Unknown Here is a story that I read from Time Magazine (December 12th), about hackers who attacked people on the Internet: Quittner and Slatalla are victims of the ILF (Internet Liberation Front). Here is what happened. "Not only had someone jammed his Internet mailbox with thousands of unwanted pieces of electronic mail, finally shutting down his Internet access altogether, but the couple's telephone had been reprogrammed to forward incoming calls to an out-of-state number, where friends and relatives heard a greeting laced with obscenities." The e-mails were signed by the Internet Liberation Front, and they ended with: "Just a friendly warning corporate America; we have already stolen your proprietary source code. We have already pillaged your million dollar research data. And if you would like to avoid financial ruin, get the fuck out of Dodge. Happy Thanksgiving Day turkeys." Why did this couple get attacked by hackers? Quittner and Slatalla had just finished a book about the rivalry between a gang of computer hackers called the Masters of Deception and their archenemies, the Legion of Doom (an excerpt which appears in the current issue of Wired magazine, which got mail-bombed the same day as Quittener with 3000 copies of the same message from the ILF. Speculation on the Net at week's end was that the attacks may have been the work of the Masters of Deception. Well, I would like to show my respect to both LOD and MOD, and whoever it was who sent the mail bombs. You guys have shown the world what real hackers can accomplish. Keep up the excellent work. DON'T LET CORPORATE BASTARDS TAKE CONTROL OF THE INTERNET!!! Now, wondering how you can send thousands of unpleasent messages to a person on the internet? Ok. Find yourself an account somewhere that you don't care what happens to it. Now, go in every Usenet group, and write vulgar messages that would insult the type of people in the group. (ex: In the Sega Usenet, write "Nintendo rules you fucking morons!!". In the Feminist Usenet, write "Get back to the kitchen you ugly whores!". In the Homosexual Usenet, write "All faggets should be shot in the back of the head!". And so on...) Write as many of these messages in as many Usenet groups that you can find. Do everything that you can to be the most annoying, rude, asshole of a guy. Now, quickly, go into your mail setup, and forward you e-mail's to another e-mail address (the target) before people start seeing these messages and replying (a little action). When people start replying to your hate e-mails, they will be sent to your real e-mail address at first, but upon arriving there, they will be re-routed to the new destination that you forwarded them to. If you have done this right, the target should be receiving 1000+ e-mails per day. If you did a really good job, the mail server might crash. If it does, you did an excellent work. Treat yourself to a beer. It all depends on the number of e-mails that you have sent, and on the number of usenet groups that you have posted them on. Remember that over 30 million people can see and reply to these messages (if they know where to go and find them) (3). Crashing the Internet (Theory) by Source Unknown In the past few days, I have been wondering how it would be possible to bring the Internet to a stop. This is the closest method that I can think of. All of this is Theory from what I know about the Internet up to now. In theory, it might work, in practise, I seriously doubt it. No Fear on: You cannot stop the Internet because of the way it functions. The most that you can do is bring a company's or universiy's computer network to a crawl, and maybe a crash. Like if I created a program that would take 50 uuencoded pictures and mail it to each person of the Ottawa freenet(easy to do with a little program that mails from aa000 to zz999, then both my system and the freenet would be down to a crawl, and one or both might crash depending on their system. No Fear off: Ok. You would Need 2 E-Mail Addresses. Lets Name the 1st one A@A.A and the 2nd one B@B.B Now, you would go in the 1st one, and forward your e-mail to the 2nd one, and go in the 2nd one, and forward your e-mail to the 1st one. It would look like this: Forwarded ----> --------A@A.A-------- / \ \ / --------B@B.B------- <---- Forwarded Now. Lets analyse this. If I send something to A, it will be sent to B, which will send it to A, which will send it to B and so on (in theory, this is an infinite loop). No Fear on: This does look like a loop, but since there is a delay between sending in won't do much more than two people chating on the email system like we do sometimes. It does not need a lot of processing power unless you send somthing like 50 or more large files. Remeber that email is mostly a nul operation meaning that it is done when the system is not busy. No Fear off: Now, effort MUST be done to do this. What I mean by this, is that a computer would be working to do this (sending mail around). Lets say that the computer degrates by 1% in speed for every 10K of e-mail flying that is being sent. That means that for 100K, it would be 10% slower, and for 5000K, it would be 500% slower. If we could get enough people to send e-mails to either address (A@A.A or B@B.B), the e-mails would enter this infinite loop and the computer would slow down considerably. No Fear on: Those systems are quite tuff and it takes a lot to knock them down. And the minute that the CPU load of the server increases to a certain level, the sysop is notified and will quickly find out what is going on. And you lose your account. This would mostly work if you had two accounts on the same system. But between McGill and the Freenet it would not work that well. No Fear off: Now, in THEORY, this would work. In practice, maybe not. What I mean by this, is that maybe there is a program that destroys all e-mails that arent received in 5 days, or that detects infinite loops like this one. I know that if a e-mail is not sent proprely (something goes wrong while its flying around), a message is generated by the Mailer-Daemon saying that it will keep trying sending the message for 5 days. Now, this is where it gets very interesting (if everything would work according to plan) No Fear on: That is correct, the mailing system could catch this loop and stop it. The server might also have it's own method of stoping it. No Fear off: Lets say that there is only 1 message in the infinite loop. The mailer- daemon sends you a e-mail saying that something is wrong with this e-mail. Now, the e-mail sent to you by the mailer-daemon now enters the infinite loop, and a new e-mail is generated saying so. That means, that the number of e-mails in the infinite loop will grow like this. No Fear on: Yep you got a point with the mail Daemon, his message would be fowared to thye second address. But it would not be an exponential growth like you have stated. Since the Daemon would send one to each of the address and for each message sent it would look like this. [Days] 1 2 3 4 5 6 7 [Emails] 1 3 9 27 81 243 729 The emails is the number of messages flowing between both addresses So the recursive sum is: t(n+1) = 2 * t(n) + t(n) Now this is if the Mail Daemon sends actually does this. All theoretical. No Fear off: But, I must conclude, that there is most likely a program that prevents situations like this, because I am almost certain that somebody has already tried this out somewhere, sometime. BUT, if I am in fact the 1st person to have thought of this, and that this would actually work (probably a 0.001% chance), then oh boy...would we ever get noticed in the world. :) No Fear on: I would say that in fact, you are the first to think of such a thing. I have never heard of it, and it is quite original. No Fear off: (4). Microwave Jammers by No Fear Want to evade a cop's radar, and be able to speed past him without the radar detecting an illegal speed. But a common radar detector is not good enough for you. Well, a microwave jammer might be exactly what you are looking for. Microwave jammers are based around a magnetron, which is the main component of a microwave oven. Don't try to take the microwave oven apart to take a look at it or place it into your car. It is also the main component of a radar. The speed detectors used by police work using the Doppler effect; like the change in the pitch of a siren when an ambulance passes by you. Now, the radar sends a beam to the car and the beam is bounced back to the cop. The shift in phase will indicate your speed. Now if you can transmit, from your car, a stronger radar pulse than what is bounced off the car, you can fool the radar detector into reading what you are sending, or at worse, confuse it. Microwave jammers can do two things, either scramble the signal or emit a preset "speed". And passive system will only scramble, or jam the radar signal that is bounced off of your car. Therefore, the police officer cannot get a reading of your speed. A problem with this is that this will bring suspicion, and the police officer might decide to take a look at your car. If you get caught, and they discover the microwave jammer, it is pretty much game over. A better alternative is an active system which will transmit a preset "speed" i.e. dial up 100 km/h on it and no matter what speed you are doing it will transmit a "100 km/h footprint". But be reminded that speeding by at 200 klics will bring attention even though the cop might read 100. So if you are interested, look into it. But bear in mind that they are not cheap and are even more illegal than your standard radar detector. And don't be stupid and leave it dialled at 100, when you hit a 50 zone, because, the speed detector will read 100 even if you do 30 klics. (5). Hacker Whackers by No Fear DATAMATION, September 15, 1994, p. 21 After years of merely telling its long-distance customers "even if hackers ran up your phone bill, you still gotta pay us," AT&T has adopted a more vigorous approach to combating computer crime. AT&T Global Business Communications Systems (GBCS) has formed an investigative team that it says will "track the theft of business long-distance service to the hacker's hideout." GBCS says the sole purpose to the I-team will be to monitor, track, and catch phone-system bandits in the act of committing toll fraud. The unit will set up electonic stakeouts with its business customers in cooperation with law enforcement agencies and assist in prosecuting evildoers. "We're in a shootout between high- tech cops-like AT&T and high-tech robbers who brazenly steal long- distance devices from our business customers," says Kevin Hanley, marketing director for business security systems at AT&T GBCS. "Our goal is not to defend against hackers but to get them off the street." AT&T says it will use expert systems to monitor AT&T business communications equipment and alert customers to potential security problems. The next step would be to create a profile of the hacker activity and call in the cops to set up the stakeout, AT&T says. The service is available at no additional charge to customers who have a remote maintenance and service contact with AT&T So there you have it folks; AT&T is at war with so called hackers. I have the feeling that AT&T has no clue on the price of such a project. You can bet the thoses hackers will enjoy seeing AT&T dish-out a lot of money chasing after them. (6). Thermite by No Fear Disclaimer: The following is a description on how to generate a thermite reaction. There are risks involved with any high energy chemical reactions, so please use common sense and good judgment. Do not attempt this experiment unless you know exactly what you are doing, and you understand the consequences. I cannot be held responsible for any of your actions and wrote this simply to inform you. Note that I have yet to attempt this experiment. The thermite reaction is a reduction-oxidation reaction if any of you know your chemistry. This redox reaction produces a lot of heat and light. In its usual configuration, temperatures can exceed 3000 degrees Celsius, and has the potential of producing molten iron. It is therefore mainly used for welding, and by the Army in incendiary grenades. There are many possible configurations, but it is basically the reaction between a reactive metal and the oxide of a less reactive metal. The most common is the following: Aluminium powder, Al (coarse) 2 part/volume or 3 parts/weight Iron (III) Oxide, Fe2O3 1 part/volume or 1 part/weight Both the metal and the oxide are grinned into a powder and mixed together and ignited with a suitable fuse. The finer the powder well mixed will give best results meaning more energy. A fuse the generates a lot of heat is required, so a standard black powder fuse is not enough. A magnesium ribbon can be used, but it is not all that easy to light, and quite prone to going out due to oxygen starvation. A much better fuse for thermite is a common sparkler. The mixture should be shielded with aluminium foil or something similar to prevent sparks from the sparkler igniting the thermite prematurely. Here is the chemical reaction for the chemists out there. Note that a stoichiometric portion of the metal and oxide will produce the best results. 2Al + Fe O ---> Al O + 2Fe + lots of heat (s) 2 3(s) 2 3(s) (l) The mixture can be varied easily, as long as the metal oxide you are using is of a less reactive metal than the elemental one you are using, e.g. aluminium is more reactive than iron, so copper oxide and zinc will also work. But you must adjust the ratios accordingly. Make sure you no longer need whatever you are igniting the thermite on because the reaction will melt and/or ignite just about anything. If you ignite the thermite on the ground, make sure the ground is dry and free of flammable material. If the ground is wet a burst of steam may occur, scattering molten metal everywhere. Be careful when igniting the thermite use adequate shielding to prevent premature ignition. Don't get close to the mixture once ignited it has been known to spark and splatter. Don't look at the reaction directly, it produces large amounts of ultraviolet light that can damage the eyes. Use welder's goggles, or do not look at all. Chemical dust in the lungs is to be avoided. Make sure the environment you are working in is dry and well ventilated since dry aluminium powder can be dangerous when wet. Fine aluminium dust is pyrophoric which means it can spontaneously ignite in air if the conditions are right. (7). Phreak Story #1 by Source Unknown Here is an event that I experienced at 9:00PM on December 27th 1994. I just felt like sharing it with you guys. Maybe youll learn something from this. I was in back of a Plaza looking around for things to do since I didn't feel like watching my friends steal "No Parking" signs on the side of the building. In a distance, I noticed a shiny metal box hanging on the wall. I walked towards it, and read the writing on the box. It said "Northen Telecom". I quickly tried to open it, but to my fustration, it was locked. So I took out my Swiss Army Knife (remember DBE Mag #1?) and tried to unlock it, but after a few seconds, I gave up. I then searched for other ways to get into that box. Something caught my eye: there were about 20 black wires leading from the top of the building into the box! I tried pulling on one, hoping to yank it out, but that didnt work. I then though of cutting one open, but I didn't want to take the risk of electrocuting myself. So I stood there, thinking of other ways to open it, while my friends were still trying to steal those damn signs. I then thought of something: maybe I could BURN the rubber off the wires, and simply connect the exposed copper wires to a beige box! (in case you don't know what a beige box is, it would allow me to make outgoing calls or even receive calls for free, since what I have just created, is an extension to their phone lines). I asked my friends if they had a lighter (even though I didn't have a beige box on me, I still wanted to try it out), but they said that they didn't. I then though that maybe burning it wouldnt be the best solution, since it would probably take a long time, and the job would be a messy one. I then thought of running home, and getting my dad's gas blow torch (the type that you use to weld something together) to cut the wires open. Ya, that would do the trick I thought. The only problem was that it was now too late, and my friends were running back to the car with the "No Parking" signs in their hands yelling "We better take off!". Oh well, maybe next time... (8). The DBE Chain by Source Unknown (1) MEMBER: Being a DBE member is slightly demanding. Here are all the duties and rules that you must fulfill. -Every 28 days (4 weeks), I expect you to produce something. This can be anything from an article, a Prefix scan, a program, or something that I or any other DBE member can benefit from. This also includes projects that two or more people work on (programs only) -If you don't produce something after 28 days, I will tell you so. I will now give you 7 days to create something. If after 7 days you still didn't do anything, I will give you a warning and ask for an explenation. I will now give you a maximum of 14 days to create something. If after this period of time, you still havent created anything, I will now be very pissed. You must now write to me a very good explenation to why you werent able to create something within 49 days, and to why you should remain in DBE. From here, unless your excuse is excellent, or I consider you very important, you will be expelled from DBE. If you want to join again, you will be forced to produce something every 21 days for 4 months. -Notice that I said that you have to produce AT LEAST 1 product every 28 days. Feel free to do more, because the more you do, the more I will respect you (and the more you will become known to the world), and if ever you can't produce something within 28 days, I will remember that you had been a very good member. (1.1) BENEFITS: From being a DBE member, you benefit from a few things. You will now have the ability to brag to others that you are a member. You will also have INSTANT access on any DBE DiST or PLAN SiTES's that you apply on. Also, all DBE members are expected to "support" each other. That is, they help each other out whenever trouble happens (MAJOR flame war, virus wars, etc) or to share PBX's, hacked Internet accounts, etc. Finally, you will gain vast knoledge and experience from being a DBE member. (2) DiST SiTES: It dosen't take much to be a Distribution Site, except for the fact that the board CANNOT be PD. It must either be HPACV or PI. The only things that we expect from you, is that you must collect every single DBE products that were created and put them on your BBS so that people can download them (We will U/L them all to you, so there is no need to go searching around for them). We also expect you to have a DBE file section, and optionally, a DBE message base. Finally, we expect you to give instant access to any DBE members that applies to your BBS, and to be more "generous" to all the DBE members on your BBS. Such generosity could be: More Time, Lower Ratio, bonus file points, Leech Access, etc. (2.1) BENEFITS: From being a DBE DiST site, you will benefit having your BBS named in all DBE articles (including the monthly magazine), and also having your BBS name (and your alias if you choose to) in any loaders or "commercials" that we decide to create. You are now able to put the letters "DBE" in the affiliations coner of your board. The main benefits however, is that your board will become recognized as an excellent board, and thus, become more popular. (3) PLAN SiTES: The PLAN SiTE ressembles exactly that of a DiST SiTE, except for a few changes. All the requirements are the same as above, and 3 more are added: The Sysop MUST already be a DBE member; at least 75% of the members in DBE must be present on the BBS, and a DBE file and message base are also required. A DBE PLAN SiTE is where projects are going to be discussed, and beta's are going to be released for testing. (3.1) BENEFITS: There aren't that many more benefits from being a PLAN SiTE then a DiST SiTE, except for the fact that you will be viewed as a "higher level" BBS in the DBE Chain. +--------------------------------------------------------------------------+ | <*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*> | | <*> Excellent! I am satisfied with the response that DBE has been <*> | | <*> getting in the past few weeks. We now have 3 boards that are <*> | | <*> affiliated with DBE in 6i3. We also now have 5 members. This <*> | | <*> is what I want to see. Well, I have to continue to ask you to <*> | | <*> consider joining us. BUT, since DBE is starting to be taken <*> | | <*> seriously, I now expect serious work. I now demand one new <*> | | <*> product per member every 28 days (this includes an article in <*> | | <*> the magazine.) That means that you people should expect more <*> | | <*> products comming from us. DONT FORGET TO APPLY!! <*> | | <*> <*> | | <*> "The very first element for success, is a perpetually constant <*> | | <*> and regular use of violence." <*> | | <*> -Adolf Hitler <*> | | <*> <*> | | <*> --[Members in DBE up to Date]-- <*> | | <*> <*> | | <*> Source Unknown <*> | | <*> No Fear <*> | | <*> NightWidow <*> | | <*> Dark Daemon <*> | | <*> Vertical Dancer <*> | | <*> <*> | | <*> <*> | | <*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*><*> | +-----------+++--------------------------------------------+++-------------+ [|||] [|||] +------+++--------------------------------------------+++------+ | System Malfunction (6i3) XXX-XXXX DBE WHQ | | Involution Ocean (6i3) XXX-XXXX DBE PLAN | | The Overdose (6i3) ITS-DOWN? DBE DiST | +--------------------------------------------------------------+