diff --git a/textfiles.com/phreak/TRASHING/trash1.rdt b/textfiles.com/phreak/TRASHING/trash1.rdt
new file mode 100644
index 00000000..7c45a0a3
--- /dev/null
+++ b/textfiles.com/phreak/TRASHING/trash1.rdt
@@ -0,0 +1,351 @@
+
+
+ *** Dumpster Insights ***
+
+ Report #1 (NET/NYNEX)
+
+
+ by: ..oooOO Count Zero OOooo..
+
+ &
+
+ Brian Oblivion
+
+
+ : -=Restricted -=Data -=Transmissions :
+ : :
+ : "Truth is cheap, but information costs." :
+
+ (And *some* information you must DIG for...literally..)
+
+ Welcome to issue #1 of _Dumpster Insights_, the magazine that prints TRASH.
+Yes, we at -=RDT have been 'dumpster diving' lately, and have found some
+interesting tidbits of information. We intend to share some of these
+findings in this issue and subsequent releases of _Dumpster Insights_. Of
+course, the contents of each issue of _Dumpster Insights_ will vary according
+to the contents of the DUMPSTERS! We can only print what we dig up.
+
+ Dumpster Diving is a thrill. Phrack #36 left out *one* important item in
+the "REAL Cyberpunks" article:
+
+ REAL Cyberpunks aren't afraid to get their hands dirty.
+
+ Nuff said...here we go.
+
+*** FAX Trash ***
+
+ Lots of faxes get tossed in NYNEX dumpsters. Currently, employee moral is
+very low, with all the recent layoffs and employee/supervisor/union strife.
+Around Christmas, we were delighted to find a number of faxes that illustrate
+this nicely...
+
+FAX transmission: Dec '91------------------------------------------------------
+
+ 'TWAS A MONTH BEFORE CHRISTMAS
+
+ 'Twas a month before Christmas and most managers agreed
+ What for Christmas this year we might get F M P'd!
+ The FMP forms were all carefully prepared,
+ In the hopes that, when time comes, our jobs would be spared.
+ There was Ranking and Rating and everyone was banded,
+ To make sure it was fair and not underhanded.
+
+ When one day in the office there arose such a clatter,
+ I sprang from my desk to se what was the matter.
+ A green letter was spreading unfortunate news,
+ Giving contract details and company views.
+ The new contract was settled a year in advance,
+ With full medical benefits - a real kick in the pants.
+
+ And they extented that sucker to nineteen ninety-five,
+ Which sent hopes for the future into a nosedive.
+ The atmosphere now was as cold as the snow,
+ And forget the morale - I've never seen it so low.
+ So we wait, and we work, but we're sad and angry,
+ That this "Family" company could treat us so badly.
+
+ When the president said, in a televised speech,
+ To reduce through attrition was a goad within reach.
+ But if layoffs become real, he said not to sob,
+ 'Cause he'd set up a board that could get you a job.
+ Now he spoke with a tongue that was lively and quick,
+ And you knew in a moment that this man was a prick.
+
+ That feeling you had in your gut since the strike,
+ Like the Dutch boy whose finger was stuck in a dike,
+ Now became real as the whole "dam" thing falls,
+ And you realize the company has you by the balls.
+ Yeah, they talk about Quality and how it should work,
+ But they must think we're stupid - they take us for jerks.
+
+ For when push comes to shove, it's the union who's boss,
+ And they have the last to say, while we stand at a loss.
+ And I heard him exclaim as he turned off his mike,
+ Screw the management force, give union what they like.
+
+-------------------------------------------------------------------------------
+FAX transmission: Dec '91------------------------------------------------------
+
+ THE NYNEX TWELVE DAYS OF CHRISTMAS
+
+ ON THE TWELFTH DAY OF CHRISTMAS, NYNEX GAVE TO ME....
+ twelve buyout rumors
+ eleven nervous breakdowns
+ ten axes falling
+ nine lawsuits pending
+ eight RMC's closing
+ seven hundred layoffs
+ six officers indicted
+ five plus five
+ four force adjustments
+ three regions combining
+ two reorganizations and
+ ** a head count that didn't include me! **
+
+-------------------------------------------------------------------------------
+FAX transmission: Jan '92------------------------------------------------------
+
+ New England Telephone EMPLOYEE SALE!!
+
+ SAVE up to 46%
+
+ That's right friends....you heard it here first.
+ We can't lay 'em off anymore, so we're SELLING 'em!
+
+ ALL OF THEM!
+
+ We have to downsize our new one-employee-per-business unit goal,
+ and you can help us do it.
+
+ YOU SAY YOU WANT NEW?...We've got 'em..employees with low mileage, high
+ performance, and a lot of good years left.
+
+ YOU SAY YOU WANT OLD RELIABLE?...We've got them, too. Their paint's a
+ little gray and they grumble a lot, but they've seen it all and keep
+ on working.
+
+ We've been thinking of the layoff business for months, and losing ALL that
+ severence pay will take it's TOLL. Now help us make a little money on the
+ deal!
+
+ So...come one, come all to the FIRST ANNUAL NEW ENGLAND TELEPHONE
+ EMPLOYEE SALE.
+
+ Don't miss a bargain!
+
+ SPECIAL - Buy TWO and get a FREE TOUCH TONE PHONE.
+
+-------------------------------------------------------------------------------
+
+Yes, those were GENUINE faxes...funny stuff, but it really gets across the
+current state of employee morale..."We're the one for you New England,
+New England Telephone...part of the NYNEX Family"...swell.
+
+Here's a little blurb culled from a NYNEX Signature Graphics Standards manual:
+
+ "This manual describes the proper use of NYNEX signatures - the
+ building blocks of our corporate identity. It is designed to
+ assist both employees and suppliers alike who are responsible for
+ implementing our corporate identity in all of its visual manifestations.
+ As NYNEX people dedicated to projecting a positive image of NYNEX,
+ to both the public and our fellow employees, it is essential that we
+ apply these standards in a consistent and proper manner.
+
+ The NYNEX corporate signature, consisting of *only* the name NYNEX,
+ is the keystone of our identification system. When shown in its
+ specially designed letterforms, it becomes more than just letters or
+ a name. It is a symbol with nuances built into it which allude to
+ the origins of our information company. *NY* represents New York,
+ *NE* signifies New England, and *X* stands for the excellence of our
+ people, our products and services, and our future. These components
+ joined together with lines extending from the E throught the X form a
+ unique signature which EVOKES THOUGHTS OF HIGH TECHNOLOGY, LINES OF
+ COMMUNICATION AND A SENSE OF UNITY, ORDER, AND STABILITY."
+
+ Ahhh...inspiring...words to build an Empire...
+
+ Here's a list of Public Service Center telephone numbers..these are
+for New England Telephone/NYNEX in Massachusetts...
+
+ PUBLIC SERVICE CENTER
+ TELEPHONE REFERENCE LIST
+
+PUBLIC SERVICE CENTER---------------------------------
+Semi-Public
+ Customer # 1-555-1717
+ Manager 617-965-9030
+ Intra/Expediting 617-965-9018
+ Fax # 617-964-7012
+
+Public
+ Customer # 800-446-7691
+ Manager 617-965-9035
+ Intra
+ 617/508 617-965-9040
+ All others 800-446-7691
+ PTACS 800-446-7691
+ SOA's 617-965-9014
+ Service Order Room 617-969-9726
+ Fax # 617-969-9726
+
+COCOT Service Center
+ Customer # 800-621-0033
+ Manager 617-965-7468
+ Intra # 800-621-0033
+ Fax # 617-969-9249
+
+Centralized Repair Bureau (CRSAB)
+ Business 1-555-1515
+ Coin 1-555-1611
+ Residence 1-555-1611
+
+Customer Names & Addresses (CNA)
+ 617-787-2750
+
+Customer Response Center (CRC)
+ 800-555-5000
+
+Data Base Update Group (DBUG)
+ 508-762-1648
+
+Directory Assist Data Base
+ 617-367-9952
+
+Legal Department
+ Accident/Claims 617-743-2763
+ Claims Information 617-743-2670
+ All Other Inquiries 617-743-7773
+ Final Bills/Bankruptcy 617-743-6773
+
+
+ Ever want to call a NYNEX/NET garage?
+
+ Garage Telephone Number
+ ------ ----------------
+ Milton 802-863-8440
+ Methuen 508-683-1942
+ Conway 603-447-2754
+ South Kingstown 401-789-1088
+ Portland 207-774-4565
+ Medford-West 617-391-9928
+ Framingham 508-879-0775
+ Springfield 413-734-9983
+ Medford-East 617-391-9945
+ Boston 617-451-8295
+ Dedham 617-326-9901
+ E Providence 401-438-9391
+ Brockton 508-587-9912
+ Shrewsbury 508-842-1818
+ Manchester 603-645-2062
+ Bangor 207-945-9996
+ Weymouth 617-337-9969
+ Northampton 413-586-1943
+ Hyannis 508-775-0902
+
+
+ Other interesting trash-prizes include issues of "Inside Operations,"
+a monthly newsletter for NET Operations employees. Here are excerpts from
+December '91 and January '92:
+
+ Operations Forum
+ (To provide a forum for employee thoughts and ideas...)
+
+ "If you could change one thing about your job, what would it be?"
+
+ Employee response: "I would implement a better system to fix NET's
+ circuit troubles. I've been told that unless our
+ own internal troubles are escalated, some trouble
+ tickets don't even get looked at. SCC circuits, for
+ example, impact our daily operation because they're
+ the CO's only link to the SCC for 24-hour alarm
+ service. Priority circuits should be identified
+ and noted in CIMAP/TIRKS."
+
+
+ ** Dial Tone Left at Home **
+
+ Installation and network employees in the Pawtucket/Providence, RI
+ area are involved in a six-month trial of the Left In Dial Tone (LIDT)
+ process. The trial, which began last November in Pawtucket and Buffalo, NY,
+ will evaluate the impacts of the LIDT process on more than 20 provisioning
+ systems.
+ LIDT is a key component of RediServ, a major corporate business plan
+ initiative to provide dial tone to a customer's location quickly, cost
+ effectively, and with minimal manual intervention.
+ LIDT leaves a restriced dial tone on a subscriber's line when service
+ is disconnected. When new occupants move into the LIDT location, they have
+ access to Emergency Services (911/E911) and their Residence Service Center.
+ All other callls from the restriced dial tone, including "0" operator calls,
+ are intercepted by a recording advising the customer of the dialing
+ capabilities of the line.
+ Since the process begins with a customer's disconnect order, Pawtucket
+ was selected for the trial because of its high customer turnover. About
+ 700 lines in the area are now working with restricted dial tone.
+ Mechanized Loop Assignment Center (MLAC) line assigners have matched
+ customer addresses between databases, and verified that cables and pairs
+ are wired from the CO to these locations. In addition, they manually assign
+ any LIDT orders that do not flow directly through the provisioning system.
+ In the Recent Change Memory Administration Center (RCMAC) [Oh GOD..please..
+ ...make these acronyms from HELL go AWAY!... -c0] most translations on
+ LIDT orders are automatically completed.
+ For CO technicians the trial has meant more dedicated wiring on the
+ frame, but less rewire work on subsequent installations. And for splice
+ service technicians (SST) LIDT should mean fewer dispatches on installation
+ orders. However, as with any pilot program, problems occur.
+ Early in the trial SSTs were dispatched unnecessarily for installations
+ at restricted dial tone locations. A vendor-supported system had caused a
+ local coding problem for clerks in the posting of completions on LIDT orders.
+ The problem has since been corrected, and according to Manager Linda
+ Briggs, the "No Premise Visit" (NPV) rate in Pawtucket should drastically
+ improve to meet or exceed the 99.3 percent NPV rate in Buffalo, NY.
+ "Once the LIDT process is fully deployed, installation work for
+ technicians will become the exception rather than the rule. As a result,
+ technicians can spend more time on maintenance and outside plant
+ rehabilitation which will increase service reliability and decrease NET's
+ cost per access line," says Briggs.
+ Another issue involving unnecessary police dispatch to LIDT locations
+ briefly occurred. Rhode Island's Public Service Administration Board
+ mistakenly understood that 911 operators would be able to call back an LIDT
+ location if the customer hung up. To correct the situation new LIDT messages
+ were recorded, expedited through legal channels, and implemented in Pawtucket
+ on January 17.
+ "Access to emergency services has been a lifesaver for some Pawtucket
+ customers who dialed 911 from an LIDT location in a tru emergency and had
+ the appropriate authorities respond immediately," says Frank Lanza, staff
+ manager.
+ Yet another benefit for customers in the LIDT process is service
+ reliability. Throughout the night all central office lines, including the
+ LIDT lines, are scanned and tested by a computer [Hrmmmm...mebbe *monitored*
+ too?...hrmmm... -c0]. As a result, troubles are repaired by the maintenance
+ center often before customers are even aware that a problem existed.
+ "For customers Left In Dial Tone will make NET easy to do business
+ with and will positively position the company in the competitive marketplace,"
+ says Briggs.
+
+
+ ** Of Note... **
+
+ More than 2.4 million (49.8 percent) of NET's residence and simple
+ business customer records have been verified using the NYNEX Data Validation
+ System (NDVS). The system compares critical information from five key
+ databases - CRIS, COSMOS, LFACS, LMOS, and PREMIS - and reports discrepancies
+ for follow up by Mechanized Loop Assignment Centers (MLACs), central offices,
+ and other work groups.
+ In association with RediServ, a major company initiative to allow
+ faster service installation, data management groups at NET and TRG are
+ coordinating the line-by-line record verification effort. Employees often
+ identify inaccurate records as a source of service problems and frustration.
+
+
+
+ Well, that's it for now....nothing 'earth-shattering'....but interesting
+ and fun to read nevertheless....and since NET/NYNEX is so ANAL about giving
+ out information, the only way to get it is to *trash*...
+
+ Look for the next issue of "DI" to come out next month or so......
+
+ Till then...don't stop exploring....and don't be afraid to get your hands
+ a bit dirty....
+
+ ..oooOO Count Zero OOooo.. *cDc* -=RDT
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/TRASHING/trash2.txt b/textfiles.com/phreak/TRASHING/trash2.txt
new file mode 100644
index 00000000..7e3d2b0f
--- /dev/null
+++ b/textfiles.com/phreak/TRASHING/trash2.txt
@@ -0,0 +1,254 @@
+ THE ........ULTIMATE..........GUIDE........ON...........TRASHING
+
+
+ ///\\\ IT's NOT FUN, IT's SCIENCE! ///\\\
+
+ DEFINITION: Trashing is the operation of recovering paper
+ documents, bills, checks etc. from the persons or companies garbage
+ cans(bags). Trashing is one of the the oldest and safest ways to get any
+ kind of information(if u know what r doing)
+
+ SAFETY: This is very safe method, because usually it
+ doesn't involve any illegal actions, except trespassing when it's nececery,
+ it is virtually impossible to get into serious trouble for trashing.
+ Here's the tip, with it u are never gonna get in any kind of trouble,
+ REMEMBER u should never look like u are searching for paper documents or
+ any other kind of private information, which can easily be considered
+ illegal.(will be explained later)
+
+ STRATEGY: Strategy is more important than most of u kids
+ think it is. Everybody should have his own strategy, but here are some
+ hints. It's very important to see three parts of the process which are
+ targeting, planning and action. Most of u clearly see the last part.
+
+ Targeting or choosing the object for your next mission is very important,
+ u wouldn't like to trash some supermarket or store, and then find out that
+ they don't even accept credit cards or bank where they shred all the
+ fucking paper, however usually it's not so hard to choose the right object,
+ a little bit of research and common sense, basically thats all!
+
+ Planning - the most important and probably the most difficult part, here
+ u should plan your mission considering everything: time, weather conditions,
+ location, security (surveillance and police patrolling), crime situation in
+ the area (in poor neighbourhoods, where robberies and usual crimes like
+ that are very frequent, police and people are very suspicious of every dude
+ walking around dressed in the black) , crowdness , "dress code" and of
+ course action itself.
+
+ Action completely depends on your physical abilities
+ (jumping over the fence, sneaking in to the backyard,etc) and abilities of
+ your tools. Also u should know that trashing takes a lot of patience,
+ sometimes u have to go for weeks to the same place, until u find what u r
+ looking for, so it's not a good idea to mess the site up or burn the
+ garbage cans to the ground, even though that can be phun!:-0)
+
+ TARGETING: There are two ways of targeting : RANDOM - when u
+ are basically guessing your future objects using your common sense, for
+ example most people know that banks throw out a lot of paper, so why
+ shouldn't i check one of them. Usually when u use that method u don't know
+ exactly what are u looking for, u r just browsing the paper, searching for
+ something that could interest u, like numbers, signatures, handwriting.
+
+ POINTED - is the other, more sufisticated method of trashing, that involves
+ some research. Here, the goal is to get as much information as u can about
+ organization and its activity. The best example, is the trashing of
+ the private sector, everybody knows that most of the credit card companies
+ send their statements at the end of the month, so the good idea to trash it
+ around this time to get the best results. Following the recycling days also a
+ good example of pointed trashing.
+
+ PLANNING: Remember the most important thing is to plan your
+ actions, so it will take u the least amount of time possible, without
+ getting a lot of attention.
+
+ TIME: of course the best time to go trashing is from 2-5 am
+ (in the big cities), however from my own experience u should do this 4-5 am
+ when it's not dark anymore but there are still no people on the
+ streets and your local police units seem to be more relaxed, waiting for
+ the opening of Dunkin Donuts. Don't be too late, though, if in your area
+ garbage squad works on any kind of schedule(hehe), u don't wanna come over
+ and see all the garbage collected! The best night for trashing is the night
+ before collecting, which u can easily find out by the signs on the street
+ that say :NO PARKING on particular days, recycling days really can be
+ helpful since all the paper and cardboard should be wrapped and left in
+ front of the house, to find out recycling days in your area u should
+ contact your local department of sanitation (212-219-8090 for NYC
+ (sanitation action center)) recycling days usually go with interval of 2
+ weeks (except holidays). By the way do not spend more than 10-15 minuts
+ trashing, 15 minutes should be more than enough!
+
+ WEATHER: of course it doesn't really matter, but
+ if it's raining and weather is shitty itself chances are u'll be doing your
+ thing without major interruptions. It good to start right after the rain has
+ started, that way u won't find most of the paper documents damaged!
+
+ LOCATION: Most of the backyards these days remind
+ concentration camps of the WWII, so u gonna need some skill to go through
+ those fancy fences. If don't have a lot of experience or u just don't
+ feel like breaking the law, choose target with an easy access so u won't
+ get a lot trouble getting in and out.
+
+ DRESS CODE: Get your old dark clothes from the closet and u
+ are set! However u can't look different from the people in the
+ neighbourhood! And of course no need for army stuff like camouflage pants,
+ black gloves and hats, don't get extreme, people will figure some serial
+ killer they were expecting all their life finally came in their
+ neighbourhoods, and will call the cops, just for the regular check up!
+
+ PEOPLE (amount): U should avoid usual hang outs
+ and places where a lot of people happen to like walking through in the
+ nighttime.In the daytime big crowds are you best allies, if u planning to
+ trash the cashier's garbage can, in your local WIZ or whatever, the best
+ hours are from 12 to 4 pm, when either the store is so crowded that you can
+ take the cashier machine with the papers or it's empty, and most of the
+ employees happened to take a lunch break or too lazy even to look around!
+
+ SURVEILLANCE: Of course u know today most of the
+ companies, i don't even talk about banks, armed with the latest pieces of
+ surveillance equipment, cameras in the backyard of course are the worst and
+ most common enemies of the trasher, so before diving in, look around,
+ chances are, theres something that can see u, a lot of private houses have the
+ movement detectors, u know this really annoying thing that lights up when
+ someone's walking around, one of my stupid neighbours put one outside his
+ house, now it goes off, everytime someone walks by the the house, just
+ break the bulb, and that shouldn't be a big problem.
+
+ ACTION: Ok, here we are ,everything is prepared, the date is
+ set, your new armani suit is waiting for you in the closet, u are ready to
+ go! U are gonna need some tools to help you finish everything faster and
+ safer, of course! What u have to know is that u cannot take anything that
+ will not be helpful or can reveal your identity if u loose it.
+
+ BLADE - one of the most important tool for u!
+ Remember those old razors where u had to replace the blade, well thats the
+ blade u need! I know it's pretty hard to get one today, but u definitely
+ should check your local pharmacy for it!
+
+ Utility knives : some people use them
+ because it's safer to carry on and u can use them for other things like
+ striping wires, but i don't like to use utility knives because they are
+ pretty big and it's pretty hard to get rid of when u have to, the other
+ thing is that it doesn't work for me that well! If u don't want
+ accidentally slash yourself u may consider put some iso-tape(electrical)
+ over it, and use it as a handle.
+
+ Rubber(latex) GLOVE(s) - here's another tool, for people
+ like me, who don't really enjoy going through somebodies leftovers or
+ whatever is in there! I use one glove, the technique is: i carry blade in
+ one hand and on the other i put the glove, to go through the actual trash.
+ When u get used to this technique, the work goes amazingly fast. After the
+ job is done the good idea would be not to put the glove in the same
+ garbage can!
+
+ FLASHLIGHT: I know it's a very important thing
+ to have with u, but here in New York i used it maybe twice going trashing, the
+ streets are so lighten up, i guess u can find a penny in the trash here
+ without using any portable source of light!
+
+ BAG(s): First of all u are gonna need a
+ bag to put all you foundings in it, the second bag can be very useful (see
+ SLASHING) My advice do not carry the bag while going through the trash. Put
+ it in the can with the rest of the trash, and only after finishing take the
+ bag and leave fast, otherwise u will cause brain damage to the cop or guard
+ when he will be thinking why is the guy searching for his watches or cans
+ has a bag full of documentation and other paper, and we wouldn't want to do anything
+ like this!
+
+ GOOD LINE (story): REMEMBER, really good line
+ that can explain your actions can save maybe not the life, but your ass for
+ sure, something like: I was today in this bank, and left my student ID on
+ the counter(wherever), and when i called them up they told me that someone
+ must have put it in the garbage, so i called the sanitation and they told
+ that today is the collecting night in that area and to search for the
+ wallet would cost me 70$, so i have decided to go and search for it by
+ myself! This is very good line, even security and cops have a heart, so
+ that can even explain trespassing, and shouldn't cause any problem at all,
+ maybe warning! Now here u want to keep in mind the situation u r in, if u
+ have a bag full of paper u should come up with explanation, which is not so
+ easy, to avoid this situation please refer to the paragraph on disguise!
+
+ * DISGUISE: It's extremely important to
+ include this in your "action pack", what can be considered as disguise, is
+ something that can support your great story, remember this old disguise, i'm
+ sure most of u use, put a couple of cans in your bag, now u can bull shit
+ security about collecting the cans for some competition or just for
+ yourself, very nice! But here something i made up myself, and it seems to
+ be working for me with any line i use: U know, a lot of old people actually
+ collect all the plastic bags, why would they buy new ones, so if u are
+ gonna put about 5 plastic bags in your bag, u can easily get of the hook,
+ claiming that your old grandma asked you to pick up some plastic bags on
+ your way, since she knows that your going to go through the garbage!
+ (for whatever reason u told the cops) Usually they ask u to take out what
+ u have in the bag, u just look inside your bag and find your lifesaving
+ plastic bags, here u go sir, if the cop is really pain in the ass and finds
+ out that u have paper in the bag as well, just tell him that it must have
+ been in the plastic bags u 've found, and u didn't want to take it out here,
+ because it's kind of embarrassing u know, if some of your friends see u
+ diving in the garbage can! hehe Yeah right, i guess that sounds nice! As i
+ said before cop too has a heart and a little bit of brain so if your story
+ sounds LOGIC u shouldn't have a lot of shit on you! hehe Thats idiom!
+
+ Another tip before u've started, don't hang around people's cars,
+ windows and other valuable stuff, u know people usually get pissed off
+ because of that!
+
+ PRIVATE HOUSING: trashing here can be very complicated, if u
+ don't know how to do it right. Here u are gonna have to deal with bags.
+ (see SLASHING) First of all u should think before doing this on the
+ site: it will take u a lot of time, trash here is usually very dirty and if
+ u live in your own house or know some quite place outside, a good
+ idea would be to bring a couple trash bags in your back yard. If u live in
+ apartment like i do, here what u can do: DEPARTMENT OF SANITATION
+ in the big cities is very strict and always make up some shit like
+ recycling or just sorting the trash! Well i guess thats all u need, in NYC
+ city looking for the papers u should check all the GREEN garbage cans,
+ where all the paper should be. U can go further and use you social
+ engineering skills to call up people in the house, posing as an employee of
+ the department of sanitation, and tell them that last time, workers found
+ in the their trash checks, bills and statements, which is illegal
+ to put with the regular paper, because they contain some chemical
+ (dEnopEroXId......whatever)(i'm not Mendeleyev, neither have to be u)
+ which is none recycble, and can cause serious damage to the
+ atmosphere :). SO next time please put all your checks, bills
+ (whatever u want them to) in the pink bag, u can also ask them to mark it,
+ something like "RADIOACTIVE" or "BODY PARTS", even can
+ specify the date when they should take it out! hehe. So next time u'll be
+ around u can easily determine where is everything u need. This
+ method will work in the big cities where SANITATION is very powerful and
+ strict, once i put my paper in the bag, and got ticket just because i
+ didn't wrap it up.
+
+ GOVERNMENT and COMPANIES structures: all the garbage they
+ usually keep in the back yards, however if u don't see any drive access to
+ the back yard they probably take it out on the garbage day(a lot of banks
+ in my neighbourhood do that, because of the limited space in the backyard,
+ or because they don't have a drive access to it, they have to take it out
+ anyway) Certainly this can be the easiest way to trash, just wait until the
+ garbage day, go there and here u go, in front of the bank or whatever, u
+ see 3 or 4 carefully tied bags. If u want to be there first, u should go
+ right after the closing, and don't worry to be late for it, no
+ selfrespectful sanitation department will pick up the garbage earlier than
+ the middle of the night.
+
+ SLASHING: Slashing the bags is the fastest way to open them,
+ right!? If u gonna trash one of those big metal trash cans, u can dive in
+ and leave whatever mess u want, it doesn't really matter those big garbage
+ trucks will take the whole can, but when u trash private house it's very
+ important not to leave any mess after you. All the garbage from houses and
+ streets those garbage men will pick up with their hands, and i don't think
+ they will be happy to see slashed bags with all this mess around, the owner
+ will definitely get a ticket for that. The solution is to take another bag
+ where u can put all your mess, without getting hardworking men angry. U
+ gonna get used to slash the bags in the right places, so u won't get too
+ dirty and finish the damn thing faster.
+
+ CAUTION : Right now, when u r reading this, someone can
+ easily be trashing you, so if u don't want to become victim of this
+ document, please do not throw away any papers that can reveal anything
+ from your personal data!
+
+
+ release date: 11/97 by :
+
+
+ ::::::::::::::::::::::::: GOLDEN DUST ::::::::::::::::::::::::::
diff --git a/textfiles.com/phreak/TRASHING/trash3.phk b/textfiles.com/phreak/TRASHING/trash3.phk
new file mode 100644
index 00000000..5676830b
--- /dev/null
+++ b/textfiles.com/phreak/TRASHING/trash3.phk
@@ -0,0 +1,110 @@
+>>>>> TRASHING TECHNIQUES <><<<<<<<<<<
+
+ ////////////////////////////////
+ / MORDOR AE - 528-6467 ZANDAR /
+ / THE BASEMENT - 223-6404 /
+ ////////////////////////////////
+
+THE UNDERGROUND ALLIANCE RULES!!!!!!!
+
+ Ok guys...first,there has to be a bell telephone station near you or someone
+close to your heart......
+
+ The best type to look for is known as a "VAULT" if you have seen one you know
+why it is called just that... it has four walls, no windows, and most likely a
+digital combination lock.
+
+
+ NEEDED EQUIPMENT
+======================================
+ 1:Sneakers(in case of cops)
+ 2:Sheet of paper w/excuses if caught
+ 3:Clean garbage bag(several)the ones you find in the dumpster reek like all
+ hell
+ 4:One flashlight(good batteries)
+ 5:Dark(possibly camouflage)clothes
+ 6:A friend(trustworthy not a wimp)
+ 7:One bottle of j.d.(just for the hell of it)
+======================================
+ LIST OF EXCUSES
+======================================
+
+ 1:I forgot murder was against the law
+ 2:I was lost..
+ 3:I was hungry
+ 6:Needed a place to sleep
+ 5:Why not?
+ 6:Lost something in the garbage
+ 7:Needed wallpaper
+ 8:Fuck off and die
+ 9:Read me my rights first
+ 10:It's the new fad..garbage pursuit
+
+======================================
+ BE PREPARED FOR...
+======================================
+
+ 1:An immediate unforseen departure from the premises(w/the stuff!)
+ 2:Zandar's law...for every piece of inorganic garbage there is an
+ equal and substatially worse smelling piece of organic shit!
+ 3:Your friendly neighborhood cop
+ 4:A shower when ya get home
+ 5:A lot of garbage
+ 6:Potholes and ditches that you never knew existed
+
+======================================
+ WHAT TO LOOK FOR
+======================================
+
+ 1:Anything that looks dead...
+ 2:Anything that looks like a computer printout(or manual)
+ 3:Hardware(with a lot of luck)
+ 4:Police(look do not find!!)
+ 5:The garbage area
+ 6:An escape route
+ 7:An obscure and well hidden stash area as well as an obscure
+ approach
+
+=======================================
+ WHAT NOT TO DO
+=======================================
+
+ 1:Get caught
+ 2:Panic
+ 3:Leave any sign of your presence
+ 4:(clean the damn place up)
+ 5:Make noise
+ 6:Have more than two people
+ 7:Forget where you live
+ 8:Do not go to the near by restaurant or bar for a quickie
+ 9:Do not do it in the daytime
+ 10:Throw anything back just because you aren't sure what it is...
+ (chances are it is worth all the more 'cause only telco employees
+ can understand it)
+
+=======================================
+ We believe that if you follow these instructions you too can screw over BELL
+w/a little luck and half a brain................
+=======================================
+ as a final note,find out when your local sanitation co. picks up the garbage
+and go the night before.. also,if the bell place nearest you incinerates its
+garbage forget it!
+=======================================
+ written by:
+
+ zandar zan
+ &
+ the boogyman
+=======================================
+u
+ insinerates its garbage forget it!
+
+=======================================
+ written by:
+
+ zandar zan
+ &
+ the boogyman
+=======================================
+Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/TRASHING/trashin2.txt b/textfiles.com/phreak/TRASHING/trashin2.txt
new file mode 100644
index 00000000..62fd96c6
--- /dev/null
+++ b/textfiles.com/phreak/TRASHING/trashin2.txt
@@ -0,0 +1,80 @@
+ Advanced Trashing Techniques
+ -=-=-=-=-=-=-=-=-=-=-=-=-=-=-
+
+ By: Jimmy'z
+
+
+
+Introduction:
+
+ Trashing is the simple act of looking through other peoples
+trash; to find interesting stuff. If you wonder why one would
+ever want to consider doing such an act... Remember : One man's
+garbage is another man's treasure.
+
+ The whole reason for trashing is to find INFORMATION. You
+could be interested in getting credit card numbers, computer
+system passwords, industrial secrets, blackmail material,
+ANYTHING. 99 times out of 100 it'll be in their trash.
+
+
+
+Trashing Techniques:
+
+ The best time for trashing is in the broad daylight *Unless
+the place locks their trash* Remember, if you act really
+inconspicuously, nobody will bother you. If by chance someone
+asks you what the h*ll you're doing, tell them you're looking for
+aluminum cans or something equally as stupid.
+
+ Remember to wear gloves, long sleeved shirts, and jeans of
+some sort. I've jumped into a few dumpsters containing fiber
+glass, nails, and even once : SHIT... It's a dirty business, BUT
+IT CAN PAY OFF IF YOU DON'T GET DISCOURAGED. Last time I went, I
+found over 500 TRW credit reports (Roughly 750 credit cards, plus
+TRW accounts, and passwords.)
+
+
+Best Places to Trash:
+
+ When thinking of a place to go trashing, you must first take
+into account WHAT you are trying to find. (You don't want to
+trash behind McDonalds if you are looking for credit card
+numbers. I highly suggest you NOT trash at a McDonalds - why
+look through all that crap. If you are looking for cards, the
+best places are malls. Malls are good because they receive by
+far THE MOST credit card payments. Trashing really requires
+thought on the part of the trasher, and with a little help from
+me, you'll be on the right track.
+
+ Flower shops are good places to trash. Most flower shops do
+most or all of their business through credit (phone orders) And
+besides, would you rather look through some smelly, shitty crap,
+or dead flowers?! Another really cool place to trash is the
+telephone company. If you have one of those big telephone
+company buildings, you'd be surprised at the types of data they
+throw away. Computer system's passwords, phone card numbers, the
+list goes on.
+
+
+
+Closing:
+
+ Trashing can prove to be very fun, interesting, AND
+PROFITABLE! Just keep on doing it, and you'll stumble upon some
+really interesting stuff. You never know when you'll find a
+briefcase or something filled with cash, or drugs. Another
+thing, when trashing - just jump right in there, leaning over one
+of those dumpsters can start to hurt after a while!
+
+
+
+
+
+Disclaimer:
+
+ This file is for informational use only. I am simply
+reserving my right to free Speech! I love The USA!
+
+
+----------------------------[ J I M M Y ' Z]---------------------
\ No newline at end of file
diff --git a/textfiles.com/phreak/TRASHING/trashing.hac b/textfiles.com/phreak/TRASHING/trashing.hac
new file mode 100644
index 00000000..371d5b8e
--- /dev/null
+++ b/textfiles.com/phreak/TRASHING/trashing.hac
@@ -0,0 +1,134 @@
+ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+ % %
+ % Better Homes and Trashing %
+ % %
+ % Written by..... The Saint %
+ %%%%%%%%%%%%% %%%%%%%%%%%%%
+ % Thanx to Ares for his help! %
+ % %
+ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+Intro:
+
+ This file is intended for informational purposes only!!!
+
+ The authors (The Saint and Ares) take no responsibility whatsoever for
+any actions taken by anyone who reads the contents of this file.
+
+ Primarily, this file will discuss the general idea behind trashing, the
+risks involved, and some general tips to make your trashing venture
+successful.
+
+Basics:
+
+ The basic reasons for trashing can vary, but are generally:
+
+ 1> To obtain credit cards and/or carbons of credit cards.
+ 2> To obtain any information that may be useful in the aid of phreaking.
+
+ When choosing a place to go trashing, one must keep in mind the following:
+
+ 1> Location of dumpster
+ 2> Security of property where dumpster is located
+ 3> Type of trash that may be found
+
+ First, the location. You generally want to pick a place that is somewhat
+isolated, where there will not be a lot (preferably none) of people. To
+accomplish this, it is also best to do your trashing at night, as there
+will not likely be any employees at the location, and it is easier to hide
+and to not be seen by passers-by.
+ Second, the security. Places such as Telco buildings and large companies
+often have security guards on duty 24 hours, and often keep their dumpsters
+behind fences so as to discourage trespassing. Yes, you are trespassing when
+you start looking in someone's garbage can!!! So it is a good idea to check
+out the place you are going to trash for a day or so to get a feel for what
+kind of security they have. This way, you can avoid walking in blindly to
+some place and getting nabbed, or you can figure out where to park your car,
+or where to hide, or how to avoid the security (rent-a-cops).
+ Places such as department stores and banks most likely will not have any
+security for the outside of their buildings as they may not be able to
+afford it or may not anticipate trashers. Also, they may not have anything
+worth taking! So basically, check the place out before you just go and hit
+it.
+ Case in point. One night, my friend and I casually pulled into the
+parking lot of a Pacific Bell office, and before we knew what was
+happening, a security guard had a giant spotlight glaring down on us.
+We just casually made a u-turn as if we were just turning around to go the
+other way. (More on what to do if you get caught later).
+
+ Third, you must pick a place where you know there will be trash that is of
+use to you. Don't go trashing at some little deli, all you'll get is a
+bunch of rotten food! (Unless of course you know for a fact that the deli
+deals alot with credit cards). In searching for cards, pick places such as
+department stores or places that sell alot of expensive stuff.
+
+ Also, the local telephone company is, of course the place to go to find
+your basic phreaking info.
+
+These have been some of the basics to keep in mind before you hit aplace.
+Now for some techniques to use to help increase the efficiency of your
+trashing endeavors.
+
+Tips:
+
+First of all, don't be afraid to actually go into the trash can. This is
+almost always necessary to reach the good stuff. Also, when you are ducking
+down inside a big dumpster, you cannot be seen by passing police cars or
+security guards who happen to waltz by.
+
+Second, always have a lookout somewhere to keep an eye out for cops or
+employees who may be coming out to throw trash away. You may want to have
+some kind if signal so that if you have advanced warning of security, you
+can take evasive measures, like burying yourself in the trash.
+
+Try not to spend too long in a given trash can. The longer you stay, the
+more you put yourself at risk of getting caught. This means that you cannot
+be too picky about what trash you take. There is plenty of time for that
+after you bail the scene with the goods. You may want to have a knife handy,
+however, to cut open boxes or bags, and a small flashlight is a good idea,
+although if possible, avoid using to much light or making too much noise,
+anything that could potentially attract someone.
+
+A car is a good thing to have, if possible. This greatly increases the
+range of places you can hit in one night. It is a good idea, if you are
+accumulating alot of stuff, to stop somewhere secluded and well lit
+(like a school or empty shopping center) and sort out the trash so you
+can get rid of useless garbage like food, etc. Take all the useless
+garbage and dump it into another dumpster.
+
+You may want to wear old clothes that can get messed up, and gloves are not a
+bad idea either, both to keep your hands clean, and to keep prints off of
+anything in case the place discovers what you have done.
+
+What to do if you get caught:
+
+This is perhaps the most important thing to keep in mind when trashing.
+What to do if you happen to be caught be someone and they want to know what
+you are doing.
+
+If you can, run like hell! Only do this if you have a clean getaway
+and you think you can get away without too much problem. Keep in mind that
+trying to escape may only make your situation worse. Only run if it looks
+like they are gonna bust you.
+
+ In most cases, the people may just tell you to get out. They will probably
+ask you some dumb questions, like "What are you doing in the trash?"
+In this case, make up a story, like "Oh, my friend here threw a ball
+in here and I was looking for it." If the guard believes you, he will
+probably just tell you to get out with a strong warning.
+
+ If they are serious about nailing you, however, chances are you'll only
+get charged with trespassing, which is not a major crime. In any case,
+however, maintain an extremely high level of caution when trashing, and
+always remain calm and collected. You can usually bullshit your way out
+of just about anything if you play your cards right.
+
+Hope this has helped you to gain some insight into how to go about gaining
+that valuable information you always wanted.
+
+Look for more informative files in the future from Better Homes and
+Anarchy. And if you have any comments or anything to add, you can get hold
+of me on the Electric Kingdom at (619) 484-5243. Please upload this to
+many BBS's around the country to help your phellow phreakers!
+
+DOWNLOADED FROM P-80 SYSTEMS......
diff --git a/textfiles.com/phreak/TRASHING/trashing.phk b/textfiles.com/phreak/TRASHING/trashing.phk
new file mode 100644
index 00000000..358399f3
--- /dev/null
+++ b/textfiles.com/phreak/TRASHING/trashing.phk
@@ -0,0 +1,67 @@
+Uploaded By: PRIVATE PIRATE
+---------------------------------------
+ Bell Trashing
+ By: The Dragyn
+ The Police Station
+ 612-934-4880
+
+
+ The Phone Co. will go to extreams on occasions. In fact, unless you really
+know what to expect from them, they will suprise the heck out of you with their
+"unpublished tarriffs". Recently, a situation was brought to my attention that
+up till then I had been totaly unaware of, least to mention, had any concern
+about. It involved gar- bage! The phone co. will go as far as to prosecute
+anyone who rumages through their garbage and helps himself to some.
+
+ Of course, they have their reasons for this, and no doubt benefit from such
+action. But, why should they be so picky about garbage? The answer soon
+became clear to me: those huge metal bins are filled up with more than waste
+old food and refuse... Although it is Pacific Tele. policy to recycle paper
+waste pro ducts, sometimes employees do overlook this sacred operation when sor
+ting the garbage. Thus top-secret confidential Phone Co. records go to the
+garbage bins instead of the paper shredders. Since it is constantly being
+updated with "company memorandums, and supplied with extensive reference
+material, the Phone co. must continualy dispose of the outdated materials.
+Some phone companies are supplied each year with the complete "System
+Practices" guide. This publication is an over 40 foot long library of
+reference material about everything to do with telephones. As the new edition
+arrives each year, the old version of "System Practices" must also be thrown
+out.
+
+ I very quickly figured out where some local phone phreaks were getting their
+material. They crawl into the garbage bins and remove selected items that are
+of particular i nterest to them and their fellow phreaks. One phone phreak in
+the Los Angeles area has salvaged the complete 1972 edition of "Bell System
+Practices". It is so large and was out of order (the binders had been removed)
+that it took him over a year to sort it out and create enough shelving for it
+in his garage.
+
+ Much of this "Top Secret" information is so secret that most phone companies
+have no idea what is in their files. They have their hands full simply
+replacing everything each time a change in wording requires a new revision. It
+seems they waste more paper than they can read!
+
+ It took quite a while for Hollywood Cal traffic manager to figure out how all
+of the local phone phreaks constantly discovered the switchroom test numbers.
+
+ Whenever someone wanted to use the testboard, they found the local phone
+phreaks on the lines talking to all points all over the world. It got to the
+point where the local garbage buffs knew more about the office operations than
+the employees themselves. One phreak went so far as to call in and tell a
+switchman what his next daily assignment would be. This, however, proved to be
+too much. The switchman traced the call and one phone phreak was denied the
+tool of his trade.
+
+ In another rather humorous incident, a fellow phreak was rumaging through the
+trash bin when he heard someone approaching. He pressed up against the side of
+the bin and silently waited for the goodies to come. You can imagine his
+surprise when the garbage from the lunchroom landed on his head. Most people
+find evenings best for checking out their local telco trash piles. The only
+thing necessary is a flashlight and, in the case mentioned above, possibly a
+rain coat. A word of warning though, before you rush out and dive into the
+trash heap. It is probably illegal, but no matter where you live, you
+certainly won't get the local policeman to hold your flashlight for you.
+
+---------------------------------------
+Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/TRASHING/trashinguide.txt b/textfiles.com/phreak/TRASHING/trashinguide.txt
new file mode 100644
index 00000000..5daca70e
--- /dev/null
+++ b/textfiles.com/phreak/TRASHING/trashinguide.txt
@@ -0,0 +1,170 @@
+ \Anti-Social Magazine
+ \ Issue 12 31/03/99
+ +------------------
+ =====================
+ Trashing - The Guide
+ By Crashd
+ =====================
+
+Hey, Nice to be back again, This is my first interesting file in a long time,
+And as far as I can tell (sorry if I'm wrong) this subject hasnt been covererd
+at all (for the UK) Although I remeber some rather amusing incidents involving
+trash :) Trashing, is basically just wading through bags of shit and rubbish,
+looking for interesting things - documents, flopwarez, equipment etc..
+
+This deal is split into 2 main areas, personal and business (just like the BT
+phone book :)
+
+Ok, i'm gonna deal with personal first, as this is probably the easiest.
+
+
+1.\ Personal Trashing
+=====================
+
+Let's take target #1. He's maybe a businessman, you want his CC number,
+mobile ESN, Girlfriends phone number, or just want to invade on the poor man's
+private life. Well the best place to start, is find his home address, and
+preferably the post code (if you cant find the latter, just knock at the few
+houses around his, they will probably glady give you it, lie and say your new
+to the neighbourhood) Now, phone the local council dude's, and ask when the
+refuse collectors (garbage men :) pick up the trash/shit. Or just ask the
+nice neighbours again.
+
+The Night before the trash pick-up, be prepared. For clothes, I recommend
+something warm, this is my standard atire:
+
+* 1 heavy-duty flashlight
+* 1 backpack lined with binbag
+* 1 black beanie hat
+* 1 pair of gardeners gloves
+* 1 pair of latex gloves
+* 1 Pair of lightweight bottoms
+* 1 rain-coat, just in case
+
+Now, go for a stroll, probably the best time is about 10 or 11. Walk past the
+person's house, and check to see if he/she has left out their groovy wheely
+bin (most houses in the UK have these, a gift from the Labour Government).
+If so, walk straight past, towards say a shop or phone box, or whatever.
+About 10 minutes later, stroll past again, and accidently shunt into the bin,
+pick it up off of the ground, and walk away with it, take it down a
+back-street or whatever. Open it up, and get searching, dont forget the
+flashlight, dont shine it into cars going past or whatever. If you see
+anything worth stealing, pop it into your nice bag.
+Common stuff for stealing is:
+
+* Phone Bill
+* Receipts
+* Business Cards
+* Filo-Fax's
+* Diary's (blackmail anyone?)
+
+Most people tend not to chuck out Tv's etc..but if you find any electronical
+junk, take it and salvage for components :) When your finished with this bin,
+walk past nice and calm, make the drop off, turn a corner and walk slowly
+home, along with your sack of delights :)
+
+
+2.\ Business Trashing
+=====================
+
+Business Trashing is much more popular than the latter shit. Stuff you can
+get from Companies include:
+
+* Big Lists of ESN's
+* Manuals for Computers etc..
+* Journals (par example, the first Blue Box was derived from a technical
+ manual found in a bin in the US) [Correction, No it wasn't, it was built
+ using the tones published in a technical
+ journal, publically available though
+ not a well distributed one -Ed]
+* Equipment no longer needed
+
+Hmm, the atire should basically remain the same, nice and conspicous and most
+of all old - it will take a little more than vanish to get rid of that Bad
+smell :)
+
+The only time to trash business's is at NIGHT. Make it a weekend (maybe friday
+or saturday). Walk past Target company at about 10 to check out any security
+measures that may harras you, such as watchmen, dog's or camera's. (A
+favourite target of UK phreakers is BT's Exchanges/Offices. A lot of the MED
+archives is supposedly found through trashing =) Pop back to your house and
+pick up any decoy's or help you may need:
+
+Example:
+
+* Dog's - Mace (cruel) some fresh bloddy dripping meat (nice, but expensive
+ and short term)
+ OR
+ An Ultrasonice grenade (Schematic shown below..it works as
+ well...damn good.
+
+* Camera's - Spray paint (good), blakck paper or just wear a lot of black and
+ hope to hell they aint infra-red.
+
+* Watchmen - You will almost certainly need some friends to help, get them to
+ either phone the place in question, or create a decoy, ie:
+ harrasing him while you nip round the back.
+
+Also, bring the bag, in it put some chain cutters, and a crowbar.
+
+If there is chains, cut them. A door? Crowbars work wonders.
+Once past the first obstacle, if there any of the above (dog, camera's etc..)
+If it is a yard etc.. the bins are big green/grey plastic/metal effors,
+probably chained, cut the chains and get rooting, try to have a look-out
+keeping tabs for you.
+
+Obvious items of interest (from experience in BT places) are:
+* Big Chunks Manuals
+* Any Reams of form-feed paper (usually phone bills or quotes)
+* ANY Equipment, electrical or otherwise
+
+Now, your trashing mission is complete, try and escape a different way to
+your way of entry, and if you disturbed anything, for example the camera's,
+leave them, Looks better in the long run.
+
+If you repeat trash a place You will probably get caught quickly, sorry but
+that's the long and short of it, so go trashing maybe once every 2 months,
+and make it a nice big thorough inspection as you aint coming back for a
+while
+
+* Schematics For Ultrasonic grenade.
+====================================
+
+Ok, here's what you will need:
+
+* 1 Gutted Tennis Ball
+* Circuit Board - Bread-Board will do for this.
+* 1 Ultrasonic Transducer (sender, not receiver), (Maplin, rapid, about ú1)
+* 1 555 Timer chip
+* 2 resistors, preferably variable
+* 2 capacitors - .1 Muf should do.
+* 1 Mercury Tilt Switch
+* 1 1 Normal SPDT switch
+
+Ok, first, if you Cant set up a monostable timing circuit, please please
+please dont bother trying to build this. Go check the web or ask a
+electronics lecturer. Ok, for the input of the timing circuit(Chip's pin 1),
+we want the mercury tilt switch, these are bi-polar. Have the timing circuit
+on it's own little PCB, and between then battery and the circuit, have the
+normal SPDT switch, cut out a small hole for this on the tennis ball. Also
+cut out another one, about 2cm's in diameter, for our transducer. Now wire
+the ultrasonice transducer as the output (pin 3) of the timing circuit. Glue
+the transducer into the tennis ball, and close it up with a bit of
+araldite/black tape/whatever.
+
+Operation
+=========
+
+When you want to use this, throw the SPDT switch, and lob it at a wall, make
+sure that it spins, or at least rolls. No dog/cat/bat for a good few meter's
+will be able to come near it and if they do, they will be in a little pain.
+
+IF you want the Proper PCB Schematics and FULL instructions for this (yes,
+even how to build the fucking timer circuit) mail: crash_dave_1997@yahoo.com
+
+Ok, thanks for reading, and if you havent..you've missed it all :)
+Werd
+Mail me:
+crash_dave_1997@yahoo.com
+ICQ UIN: 7538027
+IRC: EFNET: #2600-uk, #phuk
diff --git a/textfiles.com/phreak/TRASHING/trashis.phk b/textfiles.com/phreak/TRASHING/trashis.phk
new file mode 100644
index 00000000..a49499dd
--- /dev/null
+++ b/textfiles.com/phreak/TRASHING/trashis.phk
@@ -0,0 +1,119 @@
+:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
+:% %:
+:% BASIC TRASHING MANUAL %:
+:% Written by: %:
+:% The Blue Buccaneer %:
+:% %:
+:% The Rebel Alliance MegCatLine : [615] - 942 - 6670 %:
+:% %:
+:%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%:
+
+
+ This is an elementry manual on trashing. I don't think I am qualified to
+do one on advanced trashing, so here are the basics:
+
+:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
+
+ Trashing is the act of sorting through trash captured from the garbage bins
+and cans of your local MaBell office. The trash often contains many valuable
+things which can range from office memos instructing an operator to carry out a
+special task (trace someone's line..etc) to actual working phones! In addition
+to those things, you are also very likely to pick up Bell manuals (they have
+this habit of replacing them every time one word is revised)
+
+ The following is a list of suggested instructions and tips to follow when or
+if you go trashing. Trashing can be quite profitable and fun, provided you do
+it right and don't get smelly, dirty, or busted.
+
+:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
+
+
+STEP #1: LOCATE YOUR TARGET
+ This involves deciding on where exactly the place is you want to
+ trash. The place you want to go trashing at is the Switching Office
+ since that's where everything happens. The easiest way to find the
+ S.O. is to look for a lot of microwave towers. (not too hard, eh?)
+ A good place for advanced trashing is your local COSMOS Office. To
+ find it, look for the place in your city which most resembles:
+ 1. A Castle or Fort
+ 2. A Bunker out of WWII.
+ 3. Your local Federal Prison.
+ 4. A Building with the slogan "The more you hear.." on it.
+ The security around these places is that of any of the 1, 2, or 3.
+ Other possible targets would include:
+ 1. Relay stations.
+ 1. Look for a medium to small size tower with a little shack.
+ 2. Look for a big-ass tower with a house with AT&T on the door.
+ The little shacks are usually good to break into because they
+ are left with some really good stuff and are usually out in the
+ middle (maybe a little to the west) or nowhere.
+ I've never been into the houses. You can easily spot them
+ because of the towers in the backyard and the odd fact that they
+ have only one door (the front) and no (0) windows.
+
+STEP #2: SCOUT THE TARGET AREA
+ One person should go out to the place you plan to trash and take a
+ good look around. He should look for: Doors, cameras, fences, dogs,
+ and the garbage bins. This is to minimize the amount of confusion
+ when you go trashing that night or whenever-the-hell you go.
+ The scout might want to make out a small map of the streets & stuff
+ in the area if the group is unfamiliar with it. You might also want
+ to use it for quick, safe escape routes.
+
+STEP #3: GATHER EQUIPMENT
+ Here is a brief list of equipment you might want to take along:
+ MAP : Streets, doors, security guards/cameras, garbage bins, etc...
+ CAR : Doors and trunk open (lights off) Liscence Plate Covered
+ While the car is not necessary, it is helpful in quick getaways and
+ is easier than biking or walking.
+ PEOPLE: More than one; Less than six.
+ Almost never go trashing alone. And never bring more than five guys
+ along with you. It's a little obvious when you have six or seven
+ teenage guys with sacks, dark clothing, and flashlights.
+ The recommended group is three, but a duty chart shows more or less:
+ Number of people: 1 2 3 4 5 6
+ Number to search: 1 1 2 3 3 4
+ Number to watch : 0 1 1 1 2 2
+ --- BEST WAY ---: ^
+ EQUIP : Sack (each - nylon recommended as is light & easily washed/hidden)
+ FlashLight (each - with handkerchief)
+ Use the handkerchief to cover the lmght at all times.
+ (Light looks really unusual comming out of a garbage bin at 3am)
+ Sneakers (ratty as possible - it is, afterall, garbage)
+ Dark Clothing (no bright orange or other florecent materials)
+ <+- ADVANCED EQUIPMENT -+>
+ Nitefinder goggles
+ Ski Mask
+ Gloves
+ Walkie Talkies / CB Radio
+ Lockpicks
+ A word on the lockpicks:
+ Lockpicks are very handy to have if the garbage is locked up.
+ BUT DO NOT bring them if you don't know for a fact that there
+ are locks -or- if you don't know how to use them correctly.
+ Should you get caught, you don't want to have attempted breaking
+ and entry and shit like that trying to be pinned on you.
+ Diversion Equipment: Smoke, Gas, Bang, or Flame bombs
+ Bring only that- no pipe bombs, soda can bombs, or harmful stuff
+ like that. If you get caught with that stuff, they get nasty.
+ It is also tempting to level the garbage bin just before you
+ leave, which is not too wise.
+
+:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:-:
+
+ AND NOW, THE EVER PRESENT: DOs and DON'Ts
+
+
+ If you're going advanced trashing, bring along a voltage meter to test fences,
+doors, and stuff that might be electrically wired or monitored.
+
+ DO NOT go poking around anywhere other than the bins. There are probably
+silent alarms on the doors and possibly hidden cameras watching those other
+places you might feel tempted to go poking around.
+
+ DO NOT make a lot of noise. Tipping over the cans and telling dead baby jokes
+is generally unwise.
+
+// FILE ABRUPTLY ENDS //
+Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/TRASHING/trashng.phk b/textfiles.com/phreak/TRASHING/trashng.phk
new file mode 100644
index 00000000..2aad3784
--- /dev/null
+++ b/textfiles.com/phreak/TRASHING/trashng.phk
@@ -0,0 +1,138 @@
+ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+ % %
+ % Better Homes and Trashing %
+ % %
+ % Written by..... The Saint %
+ %%%%%%%%%%%%% %%%%%%%%%%%%%
+ % Thanx to Ares for his help! %
+ % %
+ % June 24, 1987 %
+ %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+Intro:
+
+ This file is intended for informational purposes only!!!
+
+ The authors (The Saint and Ares) take no responsibility whatsoever for any
+actions taken by anyone who reads the contents of this file.
+
+ Primarily, this file will discuss the general idea behind trashing, the risks
+involved, and some general tips to make your trashing venture successful.
+
+Basics:
+
+ The basic reasons for trashing can vary, but are generally:
+
+ 1> To obtain credit cards and/or carbons of credit cards.
+ 2> To obtain any information that may be useful in the aid of phreaking.
+
+ When choosing a place to go trashing, one must keep in mind the following:
+
+ 1> Location of dumpster
+ 2> Security of property where dumpster is located
+ 3> Type of trash that may be found
+
+ First, the location. You generally want to pick a place that is somewhat
+isolated, where there will not be a lot (preferably none) of people. To
+accomplish this, it is also best to do your trashing at night, as there will
+not likely be any employees at the location, and it is easier to hide and to
+not be seen by passers-by.
+
+ Second, the security. Places such as Telco buildings and large companies
+often have security guards on duty 24 hours, and often keep their dumpsters
+behind fences so as to discourage trespassing. Yes, you are trespassing when
+you start looking in someone's garbage can!!! So it is a good idea to check
+out the place you are going to trash for a day or so to get a feel for what
+kind of security they have. This way, you can avoid walking in blindly to some
+place and getting nabbed, or you can figure out where to park your car, or
+where to hide, or how to avoid the security (rent-a-cops).
+
+ Places such as department stores and banks most likely will not have any
+security for the outside of their buildings as they may not be able to afford
+it or may not anticipate trashers. Also, they may not have anything worth
+taking! So basically, check the place out before you just go and hit it.
+
+ Case in point. One night, my friend and I casually pulled into the parking
+lot of a Pacific Bell office, and before we knew what was happening, a security
+guard had a giant spotlight glaring down on us. We just casually made a u-turn
+as if we were just turning around to go the other way. (More on what to do if
+you get caught later).
+
+ Third, you must pick a place where you know there will be trash that is of
+use to you. Don't go trashing at some little deli, all you'll get is a bunch
+of rotten food! (Unless of course you know for a fact that the deli deals alot
+with credit cards). In searching for cards, pick places such as department
+stores or places that sell alot of expensive stuff.
+
+ Also, the local telephone company is, of course the place to go to find your
+basic phreaking info.
+
+ These have been some of the basics to keep in mind before you hit aplace.
+Now for some techniques to use to help increase the efficiency of your trashing
+endeavors.
+
+Tips:
+
+ First of all, don't be afraid to actually go into the trash can. This is
+almost always necessary to reach the good stuff. Also, when you are ducking
+down inside a big dumpster, you cannot be seen by passing police cars or
+security guards who happen to waltz by.
+
+ Second, always have a lookout somewhere to keep an eye out for cops or
+employees who may be coming out to throw trash away. You may want to have some
+kind if signal so that if you have advanced warning of security, you can take
+evasive measures, like burying yourself in the trash.
+
+ Try not to spend too long in a given trash can. The longer you stay, the
+more you put yourself at risk of getting caught. This means that you cannot be
+too picky about what trash you take. There is plenty of time for that after
+you bail the scene with the goods. You may want to have a knife handy,
+however, to cut open boxes or bags, and a small flashlight is a good idea,
+although if possible, avoid using to much light or making too much noise,
+anything that could potentially attract someone.
+
+ A car is a good thing to have, if possible. This greatly increases the range
+of places you can hit in one night. It is a good idea, if you are accumulating
+alot of stuff, to stop somewhere secluded and well lit (like a school or empty
+shopping center) and sort out the trash so you can get rid of useless garbage
+like food, etc. Take all the useless garbage and dump it into another
+dumpster.
+
+ You may want to wear old clothes that can get messed up, and gloves are not a
+bad idea either, both to keep your hands clean, and to keep prints off of
+anything in case the place discovers what you have done.
+
+ What to do if you get caught:
+
+ This is perhaps the most important thing to keep in mind when trashing. What
+to do if you happen to be caught be someone and they want to know what you are
+doing.
+
+ If you can, run like hell! Only do this if you have a clean getaway and you
+think you can get away without too much problem. Keep in mind that trying to
+escape may only make your situation worse. Only run if it looks like they are
+gonna bust you.
+
+ In most cases, the people may just tell you to get out. They will probably
+ask you some dumb questions, like "What are you doing in the trash?" In this
+case, make up a story, like "Oh, my friend here threw a ball in here and I was
+looking for it." If the guard believes you, he will probably just tell you to
+get out with a strong warning.
+
+ If they are serious about nailing you, however, chances are you'll only get
+charged with trespassing, which is not a major crime. In any case, however,
+maintain an extremely high level of caution when trashing, and always remain
+calm and collected. You can usually bullshit your way out of just about
+anything if you play your cards right.
+
+ Hope this has helped you to gain some insight into how to go about gaining
+that valuable information you always wanted.
+
+ Look for more informative files in the future from Better Homes and Anarchy.
+And if you have any comments or anything to add, you can get hold of me on the
+Electric Kingdom at (619) 484-5243. Please upload this to many BBS's around
+the country to help your phellow phreakers!
+
+The Saint
+Lunatic Labs (415) 278-7421
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/TRASHING/trshdisk.ana b/textfiles.com/phreak/TRASHING/trshdisk.ana
new file mode 100644
index 00000000..671fde92
--- /dev/null
+++ b/textfiles.com/phreak/TRASHING/trshdisk.ana
@@ -0,0 +1,58 @@
+*************************************************
+* *
+* BASICS OF TRASHING *
+* PART I *
+* *
+* BY:THE GRIM TRASHER *
+* *
+*************************************************
+
+ IN THIS ARTICLE I WILL COVER THE VERY FIRST STEPS OF TRASHING. THE TRASHING
+METHOD IS VERY SIMPLE SO I DO IT ALL THE TIME. HERE ARE THE STEPS:
+
+ STEP I:FIRST YOU TAKE A DISK YOU WANT TO TRASH AND BRING IT OVER TO THE
+COMPUTER. THE DISK SHOULD HAVE SOMTHING VERY *IMPORTANT* ON IT (LIKE SOMTHING
+YOU HAVE BEEN WORKING ON FOR 3 YEARS) OR A DISK THAT COST ABOUT $500.
+
+ WHEN YOU BRING THE DISK TO TRASH OVER TO THE COMPUTER *BE SURE* TO HOLD IN THE
+*DISK PART*!
+
+ STEP II:THERE ARE A LOT OF WAYS TO TRASH A DISK BUT
+
+ HERE ARE A FEW TO GET THING GOING:
+
+ 1--PUT THE DISK IN THE DRIVE AND GET TO COMMAND LEVEL THEN TYPE 'INIT'.
+ 2--PUT A MAGNET TO THE *DISK PART*.
+ 3--SET ON TOP OF THE DRIVE OR MONITOR AND LEAVE THERE FOR 1 HOUR.
+ 4--TAKE SOMETHING SHARP LIKE A PENCIL ORKNIFE AND START TO SCRATCH THE SURFACE
+ OF THE DISK NICE AND HARD.
+
+ NOTE:YOU CAN USE MANY OF THESE TRASHINw TECHNIQUES TO MAKE ONE *ULTIMATE
+TRASH!!*
+
+ CLASSIC TRASH--PUT THE DISK IN THE MICRO-WAVE!!
+
+
+ STEP III:WHEN YOU ARE ALL DONE WITH THE TRASHING PROCESS THEN LEAVE THE DISK
+LAY IN A NICE DUST PILE AND BURY IT.COME BACK IN ABOUT 2 HOURS AND THE
+
+ TRASHING PROCESS IS COMPLETE!!
+
+
+ IN MY NEXT ARTICLES I WILL COVER THE MORE ADVANCED METHODS OF TRASHING BUT FOR
+NOW JUST:
+
+
+ ***K E E P O N T R A S H I N G***
+
+
+ NOTE:IF YOU OR ANY ONE OF YOUR FRIENDS WANT TO KNOW MORE ON TRASHING CALL MY
+HOT-LINE AT:50-MAD-TRASH OR:62-EL-TRASHO.<-LOCAL NUMBER
+
+
+ THE ONE AND ONLY,
+
+ THE GRIM TRASHER
+
+Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/VOICEMAIL.1 b/textfiles.com/phreak/VOICEMAIL.1
new file mode 100644
index 00000000..c9ec2f5f
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL.1
@@ -0,0 +1,44 @@
+
+
T E X T F I L E S
+
+Phone Phreaking: Voice Mail
+
+
+Filename
|
+Size
|
+Description of the Textfile
|
+
+
+3rdpart1.txt 5385
| 3rd Party Fraud and Voicemail Systems
+ | 800vms.txt 1020
| 1-800 Voice Mail Extenders
+ | amhack.txt 12372
| Hacking Answering Machines 1990 by Predat0r of the Blitzkrieg BBS
+ | anmchhak.txt 1233
| Hacking AT&T Answering Machines by old Buzzard (September 14, 1995)
+ | ans_exc.txt 2319
| Answering Machine Stopper Gadger, by Jon Sreekanth
+ | ansmache.xcl 3653
| Making an Answering Machine Stopper Gadget by Jon Sreekanth (January 25, 1993)
+ | aspentut.txt 8040
| A Tutorial of Aspen Voice Mailbox Systems, by Slycath
+ | at&t.txt 1234
| Hacking AT&T Answering Machines Quick and Dirty by oleBuzzard (September 14, 1995)
+ | audexvp.txt 19656
| Hacking Guide to the Audex Voice Power, by Crazybyte
+ | cinditut.txt 12608
| The CINDI (Voicemail System) Tutorial
+ | hack6 5241
| Hacking Voice Mail Systems
+ | hackam1990.txt 13065
| Hacking Answering Machines in 1990 by Predat0r of Blitzkrieg BBS
+ | hackvmb.txt 10057
| Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
+ | lol12.txt 10698
| Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
+ | phonhack.txt 17674
| Hacking Telephone Answering Machines by Doctor Pizz and Cybersperm
+ | phreak8 5385
| 3rd Party Calling and Voicemail Information
+ | tollfree.txt 1314
| A Collection of Toll-Free Answering Services
+ | unt-att1.txt 2610
| Hacking AT&T Answering Machines by Aoflex of Karma Sutra
+ | vmb.rl 3505
| Renegade Legion Presents: Voice Mailbox Hacking by The Knight
+ | vmb.txt 3296
| Voice Mail Made Easy by Hagar of Phantom Networks
+ | vmb_smc.txt 15681
| On the Essentials of Voice Mail Hacking by the Kryptic Night of SMC
+ | vmbh-rl.txt 3508
| Renegade Legion Technical Reports: Voice Mail Box Hacking, by The Knight (February 1991)
+ | vmbhack.hac 3918
| Voice Mailbox Hacking, by the Knight of the Renegade Legion
+ | vmbhack.txt 2764
| Zod's Voice Mailbox Hacker Doxs
+ | vmbhaq.txt 32929
| Voice Mail Hacking by Road Kill (March/April, 1994)
+ | vmblol.txt 13996
| Voice Mailbox Hacking by the Legions of Lucifer (1990)
+ | vmbrl.txt 3920
| Voice Mailbox Hacking by The Knight of Renegade Legion
+ | vmbs1.txt 3071
| Voice Mail Boxes
+ | vmbzan.hac 4774
| How to Have Your Own Voice Mailbox, by The Exorcist (July 24, 1991)
+ | vmx.txt 1101
| Toll-Free Answering Services
+ | voicmail.txt 3753
| Using Voice Mail on the Inner Sanctum by Jesters
+ | xvmecinf.txt 904
| Xerox Voice Message Exchange Commands by The Lineman (August, 1986)
+ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
There are 32 files for a total of 230,684 bytes. |
\ No newline at end of file
diff --git a/textfiles.com/phreak/VOICEMAIL/.windex.html b/textfiles.com/phreak/VOICEMAIL/.windex.html
new file mode 100644
index 00000000..e4920104
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/.windex.html
@@ -0,0 +1,44 @@
+
+T E X T F I L E S
+
+Phone Phreaking: Voice Mail
+
+
+Filename
|
+Size
|
+Description of the Textfile
|
+
+
+3rdpart1.txt 5385
| 3rd Party Fraud and Voicemail Systems
+ | 800vms.txt 1020
| 1-800 Voice Mail Extenders
+ | amhack.txt 12372
| Hacking Answering Machines 1990 by Predat0r of the Blitzkrieg BBS
+ | anmchhak.txt 1233
| Hacking AT&T Answering Machines by old Buzzard (September 14, 1995)
+ | ans_exc.txt 2319
| Answering Machine Stopper Gadger, by Jon Sreekanth
+ | ansmache.xcl 3653
| Making an Answering Machine Stopper Gadget by Jon Sreekanth (January 25, 1993)
+ | aspentut.txt 8040
| A Tutorial of Aspen Voice Mailbox Systems, by Slycath
+ | at&t.txt 1234
| Hacking AT&T Answering Machines Quick and Dirty by oleBuzzard (September 14, 1995)
+ | audexvp.txt 19656
| Hacking Guide to the Audex Voice Power, by Crazybyte
+ | cinditut.txt 12608
| The CINDI (Voicemail System) Tutorial
+ | hack6 5241
| Hacking Voice Mail Systems
+ | hackam1990.txt 13065
| Hacking Answering Machines in 1990 by Predat0r of Blitzkrieg BBS
+ | hackvmb.txt 10057
| Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
+ | lol12.txt 10698
| Hacking & Scanning Voice Mail Boxes: The Tutorial by Legions of Lucifer
+ | phonhack.txt 17674
| Hacking Telephone Answering Machines by Doctor Pizz and Cybersperm
+ | phreak8 5385
| 3rd Party Calling and Voicemail Information
+ | tollfree.txt 1314
| A Collection of Toll-Free Answering Services
+ | unt-att1.txt 2610
| Hacking AT&T Answering Machines by Aoflex of Karma Sutra
+ | vmb.rl 3505
| Renegade Legion Presents: Voice Mailbox Hacking by The Knight
+ | vmb.txt 3296
| Voice Mail Made Easy by Hagar of Phantom Networks
+ | vmb_smc.txt 15681
| On the Essentials of Voice Mail Hacking by the Kryptic Night of SMC
+ | vmbh-rl.txt 3508
| Renegade Legion Technical Reports: Voice Mail Box Hacking, by The Knight (February 1991)
+ | vmbhack.hac 3918
| Voice Mailbox Hacking, by the Knight of the Renegade Legion
+ | vmbhack.txt 2764
| Zod's Voice Mailbox Hacker Doxs
+ | vmbhaq.txt 32929
| Voice Mail Hacking by Road Kill (March/April, 1994)
+ | vmblol.txt 13996
| Voice Mailbox Hacking by the Legions of Lucifer (1990)
+ | vmbrl.txt 3920
| Voice Mailbox Hacking by The Knight of Renegade Legion
+ | vmbs1.txt 3071
| Voice Mail Boxes
+ | vmbzan.hac 4774
| How to Have Your Own Voice Mailbox, by The Exorcist (July 24, 1991)
+ | vmx.txt 1101
| Toll-Free Answering Services
+ | voicmail.txt 3753
| Using Voice Mail on the Inner Sanctum by Jesters
+ | xvmecinf.txt 904
| Xerox Voice Message Exchange Commands by The Lineman (August, 1986)
+ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
There are 32 files for a total of 230,684 bytes. |
diff --git a/textfiles.com/phreak/VOICEMAIL/3rdpart1.txt b/textfiles.com/phreak/VOICEMAIL/3rdpart1.txt
new file mode 100644
index 00000000..234b8605
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/3rdpart1.txt
@@ -0,0 +1,103 @@
+
+ 3RD PARTY FRAUD & VOICE MAIL SYSTEMS
+ ============================================================================
+
+ 3rd Party Dialing was first brought to my attention when it was listed
+on my telephone bill. I was billed by some person(s) without my authorization.
+This happened about 3 times on the same bill, and all of the times I got the
+charges dropped.
+
+ A few weeks later, after paging through the telephone book for downtown
+prefixes, I noticed information on 3rd Party Calling, which included:
+
+HOW TO PLACE 0+ CALLS
+
+Third-Number Calls
+
+1. Dial "0" + Area Code (if needed) + telephone number.
+
+2. If you hear a tone, ignore it, and a billing operator will come
+ on the line.
+
+3. Tell the operator you are placing a third number billed called.
+
+4. Give the Area Code and telephone number you with the charges billed to.
+
+5. The operator will call that number to verify acceptance of the charges
+ on calls from coin pay phones. No verification on calls from
+ non-coin pay phones.
+
+ The line that caught my eye was like #5. This line pointed out that calls
+from pay phones had to be verified, while non pay phones needed no
+verification.
+
+ With experience, I found out that sometimes there is nothing a person can do
+about unauthorized 3rd Party Calls billed to a another person's number. A lot
+of the times, the operator you call to complain to will simply tell you there's
+nothing they can do.
+
+ With this in mind, I realized that you could bill a call to anybody's number
+and get away with it, and no charges directed to you. Although, as many of you
+know by now...this not safe. For one, you are directing attention to yourself
+as a Fraudist/Phreak. Secondly, on the person's bill that your billed the 3rd
+Party Call to...that person has your number and where you called. Bell can
+also use that information to take action if they feel it necessary.
+
+ One alternative would be to complete a 3rd Party Billed Call from a pay
+phone. This however brings up a question. Who is going to accept the charges
+if you don't want to pay for it in any way?
+
+Here is what I came up with for 3rd Party Calling Fraud:
+
+ First, you need a (VMS) Voice Mail System/Box. You need a Centragram or
+PhoneMail type VMS to handle the call. The reason you need these types of
+VMS's, is because Centragram/PhoneMail type VMS's are direct dial. You don't
+have to enter a process extension number such as 8509. These types of VMS's
+bring you directly to the box.
+
+ You don't know what Voice Mail Systems are? Look for a file. But, here's a
+layman's description of VMS's. You can say that VMS's are distance answering
+services. They are usually set up in other prefixes you can dial in/directly
+on to. They include instructions on how to use them, and have system
+passwords. In respect, they are electronic mail devices...only they use voice
+communications instead. You can find these by scanning, if you have one local.
+
+ Anyways, having a VMS handy...reset your System Greeting to say: "HELLO"
+Pause for approximately 5-6 seconds...then say casually, "YEAH SURE."
+In between the HELLO and YEAH SURE, the billing operator will say something
+like, "JOHN DOE IS BILLING A CALL TO YOUR NUMBER, WILL YOU ACCEPT THE CHARGES?"
+
+ Now go to a pay phone and dial any number anywhere you want, in this
+format: 0+612+555+1212. Ignore the tone you hear for calling card holders,
+and wait for an operator to come on. The operator will announce her/his-self
+as a billing operator and ask you how he/she can help you on billing the call.
+Tell the operator, "THIS IS A 3RD PARTY CALL, MY NAME IS JOHN." Include a last
+name if you wish, but it's not necessary. No real names of course also. The
+operator will call the VMS and he/she will hear the previous recording of you
+saying "HELLO" etc.
+
+ After the operator hears an affirmative from the VMS...the operator will say
+thank you, then put the call through. The only person that gets billed for
+the call is the business/person that owns the VMS that you used by hacking the
+default password.
+
+ I've found out that you can dial overseas, and anywhere in the United States
+this way, with no problems or bad connections. If you have a portable computer
+with an acoustic couple...you can go online. It would be suggested to do this
+in a car, so as not to draw attention during the day. I've tried to set up a
+conference by the 800 Conference Operator and requesting to set up a
+conference. You have to give her the person's numbers and names you want to
+conference with...and the number you want to conference billed to. The
+operator will verify this if you are at a pay phone. I have figured out what
+the Conference Operator asked the 3rd Party as of yet...to time the responses
+preset on the VMS, but if anyone can, it would prove to be very useful.
+
+ Another technique might be to bill 976's to your VMS if you into that.
+Again, you need to attempt to time the perfect responses to the operator's
+questions to the 3rd Party.
+
+ *A Word of Warning*: In most cases, the Operator you handle the 3rd party
+call with will stay on the line. So it's good to have a conversation with
+yourself on the VMS for about 30 seconds after connection if you are making a
+collect call to the VMS.
+
diff --git a/textfiles.com/phreak/VOICEMAIL/800vms.txt b/textfiles.com/phreak/VOICEMAIL/800vms.txt
new file mode 100644
index 00000000..3bdee599
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/800vms.txt
@@ -0,0 +1,31 @@
+
+ 1-800 Voice Mail Systems
+
+
+1-800-222-5275 VMS
+1-800-222-9825 VMS Box:[9]+3 DIGITS
+1-800-228-6423 VoiceBank Box:[4] *Another Dialup for 88-Voice*
+1-800-262-8477 UniSys Answering Service Box:[4]
+1-800-284-6245 Meridian Mail
+1-800-323-3433 VMS
+1-800-323-4555 Dexter Midland Box:[3]
+1-800-323-3938 VMS Box:[4]
+1-800-325-5554 VMS Box:[4]
+1-800-331-1763 INNOVATIVE SOFTWARE BOX:[4]
+1-800-333-6245 PHONE MAIL SYSTEM
+1-800-342-6245 PHONE MAIL SYSTEM
+1-800-346-5104 SECURITY LINK AND TELELINK BOX:[3]
+1-800-423-7574 VMBS BOX:[4]
+1-800-437-6100 PHONE MAIL SYSTEM
+1-800-445-6245 PHONE MAIL SYSTEM
+1-800-521-6245 VMBS
+1-800-541-0641 VMBS BOX:[2]
+1-800-545-6245 VMBS ID:[7], PASS:[8]
+1-800-631-1146 VMBS
+1-800-654-8692 SECURITY CN LIFE INSURANCE BOX:[4]
+1-800-662-6245 VOICE MESSAGE EXCHANGE
+1-800-678-6245 VMBS
+1-800-759-5000 INGRAM SWITCHBOARD BOX:[4]
+1-800-777-6245 MCI MAIL ID:[5], BOX:[7]
+1-800-847-6181 WESTERN DIGITAL BOX:[4]
+
diff --git a/textfiles.com/phreak/VOICEMAIL/amhack.txt b/textfiles.com/phreak/VOICEMAIL/amhack.txt
new file mode 100644
index 00000000..9a926ce3
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/amhack.txt
@@ -0,0 +1,257 @@
+
+
+ */*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
+ Hacking Answering Machines 1990
+ */*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
+ by: Predat0r of Blitzkrieg Bbs 502/499-8933
+
+
+ AT&T reports that in the year 1990, 11 million people
+will buy an answering machine for their home use. In 1989, 10
+million machines were sold. Everyone has called up a person
+at one time or another and got the old "leave your name at
+the beep" message. With this increase in homes using these
+machines there is also a new form of hacking developing. One
+of hacking an answering machine.
+
+ Why would anyone even want to hack an answering machine
+and for what purpose? There are many reasons and things you
+can do once you have control of someone elses machine. If for
+some reason you need to spy on a business or person you can
+hack their machine and take control using the information for
+your own personal use. There is also the old "change the
+message" secret to make it say something to the effect of
+this line accepts all toll charges so you can bill third
+party calls to that number. You can also use an answering
+machine for your own personal use, as in making it your own
+voice mail type system for people to call. Only do this if
+you know someone is out of town. If they come home from
+shopping and find their machine changed it might cause
+problems. With these basic ideas in mind you can see hacking
+an answering machine could be very useful to certain
+individuals.
+
+ How can a person hack an answering machine? Well most
+answering machines built now have remote access features
+which allow the owner, or anyone to call in and press a
+security code to play their messages. This is where the fun
+begins. Some older models don't have remote access so you
+cannot do anything to them. Also if you know someone has a
+machine but you call and it doesn't answer, let the phone
+ring about 15 times. This will tell the machine to turn
+itself on, so you can hack it. The actual number varies
+between machines.
+
+ To practice hacking some machines i will show you how to
+get remote access on a few models. Just look and see what
+kind your friend has and hack it for starters.
+
+ Record a Call- Model 2120
+ -------------------------
+Call in and during the message or after the beep tone to
+leave a message enter the 3 digit security code. Which you
+must find yourself. This will rewind the tape and play all
+new messages. Press 2 to backspace and repeat the last
+message. Press 3 to fast foward the tape.
+
+Changing your message from remote. Call your phone and enter
+the secret code. After several rapid beeps enter your secret
+code again. After a short delay you will hear a long tone.
+After the tone ends begin speaking your message which may be
+17 seconds in length. When finished press the second digit of
+your secret code to end. The machine will then save your
+message and play it back. To turn the unit on from remote let
+it ring 11 times then hangup. Or stay on and it will answer
+so you can access the machine. For express calls or frequent
+calls hit the second digit for two seconds to skip the out
+going message announcement.
+
+Goldstar- Models 6000/6100
+--------------------------
+Call and enter your 1 digit secret code after you hear the
+out going message announcement. The machine will then play
+back new messages. Hangup to save messages or after all
+messages have been played the machine will give a double
+beeptone, you may enter your code to erase all messages.
+You cannot change the out going message on this unit.
+
+Cobra- Model AN-8521
+--------------------
+For this machine there are 2 codes. Both are one digit in
+length. The first one is the play code. The second is to
+erase messages from remote. After the outgoing message and
+beeptone press the play code for 2 seconds to play messages.
+After each message ends there will be a single beep. At the
+end of all message it will beep twice. You may then do the
+following. Replay by pressing the play code again. Erase
+messages by pressing the erase code. Hang-up and save
+messages and continue to take additional calls. To turn this
+unit on from remote you must let it ring 16 times before it
+will activate. If it rings 10 times then you hear 3 beeps it
+is full and messages need to be erased.
+
+Uniden- Model AM 464
+--------------------
+This model is one of the more advanced when it comes to
+remote capabilities. The factory preset security code is 747.
+This can be changed to as many as five digits of your choice.
+To gain access from remote type your security code while the
+outgoing message is playing. Press 1 after hearing the tone
+and the machine will rewind and play your messages. To fast
+foward press 7, to resume normal playback press 8. To stop
+the messages from playing press 8 again. Press 8 to restart
+the messages or 1 to start from the beginning again. Press 9
+to rewind and 8 to resume playing. If you rewind all the way
+it will beep twice. You need to press 1 to play messages.To
+save messages press 4. To erase press 6. To turn the machine
+off from remote press 5 after all messages have been played
+and the machine beeps twice. To turn the machine on from
+remote let the phone ring 12 to 14 times. The machine will
+beep and then you enter your remote code. This will then turn
+your machine to answer mode. This machine also has room
+monitor options. This allows you to listen to what is going
+on in the room of the machine. To do this call the machine
+enter your security code after the beep press 0. The monitor
+stays on for 60 seconds. You will be warned with 2 beeps at
+45 seconds. To continue press 0 again.To change the outgoing
+message from remote erase all the messages. Then call back
+and enter your code after the tone press 3. It will beep
+again and you may then leave your new message. Press 3 when
+finished. To change the security code from remote after the
+beep press # then 1 after the next beep enter your new code
+followed by the # again. There is also a call break through
+where you enter 256 while the outgoing message is playing.
+This will alarm the persons in the house someone is calling
+with a series of loud beeps. Press the * key to stop.
+
+Code-a-phone Model 930
+----------------------
+To access from remote call and enter your security code after
+the announcement and tone. Press your code for 3 full
+seconds. After the new messages have been played you will
+hear 2 tones. You may then save messages by pressing your
+code then hanging up. repeat by entering code wait for 4
+tones then enter code again. To erase message hangup when the
+tape is done playing. To turn the machine on from remote call
+and let ring ten times. When the system answers it will have
+a two second tone. Press your security code. You will hear
+three double tones to let you know the system is on.
+
+Unisonic- Model 8720
+--------------------
+One digit code entered after the outgoing message and tone
+will allow you to hear messages. To change message wait till
+all new messages have been played 2 beep tones will be heard.
+Press code for four seconds. Two beeps will be heard then the
+tape will rewind and beep again. Now leave the new message.
+Press your code when finished to save new outgoing message.
+New message will play for you to hear.
+
+Panasonic- Model KX-T2427
+-------------------------
+Call and enter the three digit code during the outgoing
+message. Machine will beep once, then beep amount of times
+equal to messages. Then rewind and play messages. There will
+be three beeps after the last message. Six beeps means the
+tape is full. Press 2 to foward. Press 1 to rewind. Press 3
+to reset machine and erase messages. To monitor the room
+press 5 after the beeps indicating the number of messages the
+machine has. Press 7 to change the outgoing message, it will
+beep a few quick times rewind then a long beep will be heard.
+Leave new message press 9 when finished. Press 0 right after
+the beep tones to shut the machine off. To turn the machine
+on let it ring 15 times then hangup after machine turns on.
+
+Panasonic- Model KX-T2385d
+--------------------------
+During the outgoing message enter the 1 digit code. This will
+playback messages. Press the code again to rewind. After the
+messages have played the machine will beep three times. Press
+your code again and it will reset the machine. For remote
+turn on let phone ring 15 times. Then after the outgoing
+message hangup.
+
+AT&T- Model 1504
+----------------
+Enter 2 digit code before or after announcement. System will
+beep after each message and five times when messages are
+done. Press the # key anytime to pause. Hanging up will save
+messages. Press 7 and it will rewind and play messages again.
+Press 5 to fast foward. Press 2 to rewind. Press 33 after all
+messages have been played to reset without saving messages.
+To record onto the tape press * after the system answers.
+This will then beep and you may leave a four minute message
+on the tape. Press # when done. This is not an outgoing
+message announcement, only a memo. To turn on from remote let
+ring ten times press 0 when system answers. To turn the
+system off dial and enter your code. Press 88 and it will
+shut the machine down.
+
+Phonemate- Model 4050
+---------------------
+Enter your 3 digit code during the outgoing message. Pressing
+* or # will allow you to scan through the messages. When
+finished pressing 1 will replay the messages. Pressing 2 will
+erase them. To turn on from remote let ring for 15 times.
+Then proceed with remote operations.
+
+Phonemate- Model 7200
+---------------------
+Enter 1 digit code during of after the outgoing message. A
+voice will tell you how many messages you have, then play
+them back for you. To rewind press your code and hold it for
+however long you want to rewind. Let go and it will resume
+playing. After the last message a voice will prompt you with
+a list of options. You have five seconds to respond or it
+will proceed to the next option. These are as follows. The
+first is hanging up to save messages. Next is enter code to
+replay messages. Next enter code to erase messages. Last is
+enter code to change greeting. Follow the voice and it will
+give you complete directions on exact steps to follow. To
+turn on from remote let ring ten times then hang up. If tape
+is full it will say sorry tape is full, enter code and erase
+messages.
+
+Spectra Phone- Model ITD300
+---------------------------
+Enter your 1 digit code after the greeting. Messages will
+play back. Hanging up will save them. Or wait for four beeps
+and press your code to replay them. To erase press your code
+after 2 beeps. To turn the machine on from remote let it ring
+10 times.
+
+Notes: Outgoing message and greeting is what you hear when
+you first call. Code is your personal security code.
+
+Hacking answering machines can be very easy. It can also help
+you obtain valuable information. If you have a targeted
+machine you can try going to a store and saying you just
+bought one and it didn't have instructions in the box. They
+will usually give you a set or make copies for you. This
+basic guide is just to introduce you to answering machine
+hacking and changing the outgoing message and listening to
+messages left by callers. To keep your own machine safe
+purchase one with a changeable security code of 3 or more
+digits. Most home machines are of the 1 digit type and are
+easy to hack. I have no knwoledge of the laws concerning
+hacking into someones answering machine. I am sure once it
+becomes more common we will find out. Of course this article
+is for informational purposes only so you would never have to
+find out the actual laws.
+
+Taken from TAP Magazine Issue #100
+
+
+
+X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
+ Another file downloaded from: NIRVANAnet(tm)
+
+ & the Temple of the Screaming Electron Jeff Hunter 510-935-5845
+ Burn This Flag Zardoz 408-363-9766
+ realitycheck Poindexter Fortran 510-527-1662
+ My Dog Bit Jesus Suzanne d'Fault 510-658-8078
+ New Dork Sublime Demented Pimiento 415-864-DORK
+ The Shrine Tom Joseph 408-747-0778
+
+ "Raw Data for Raw Nerves"
+X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
diff --git a/textfiles.com/phreak/VOICEMAIL/anmchhak.txt b/textfiles.com/phreak/VOICEMAIL/anmchhak.txt
new file mode 100644
index 00000000..d4084a08
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/anmchhak.txt
@@ -0,0 +1,33 @@
+Hacking AT&T Answering Machines
+Quick and Dirty by oleBuzzard
+Written Today / 14-SEP-95
+(c) 1995 Communications
+
+
+1. Dial telephone and wait for AT&T Answering Machine to answer.
+2. Quickly Enter the following string.
+
+ 1234567898765432135792468642973147 (btw: this is the shortest
+ 4193366994488552277539596372582838 string for entering every
+ 491817161511026203040506070809001 possible 2-digit combo.)
+
+3. You'll know you hit the code because the messages will start playing.
+4. Heres a list of TouchTone(c) Commands
+
+
+ Listen to messages: 7
+ Listen to new messages: 6
+ Stop: #
+ Rewind Tape: 2
+ Advance Tape: 5
+ Clear Messages: 3,3
+ Record memo: *
+ Record Announcement: 4,*
+ Play Announcement: 4,1
+ Turn System On: 0
+ Turn System Off: 8,8
+
+****************************************************************************
+*** oleBuzzard's kn0wledge phreak ** kn0wledge phreak World Wide Web Site **
+** AC 719.578.8288 / 28.8oo-24oo ** http://www.uccs.edu/~abusby/k0p.html ***
+****************************************************************************
\ No newline at end of file
diff --git a/textfiles.com/phreak/VOICEMAIL/ans_exc.txt b/textfiles.com/phreak/VOICEMAIL/ans_exc.txt
new file mode 100644
index 00000000..ed25d561
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/ans_exc.txt
@@ -0,0 +1,62 @@
+
+This is the schematic I traced for an answering machine stopper
+gadget : it cuts off the answering machine in case any line is picked
+up. Some answering machines have this feature built-in; the older or
+inexpensive ones don't. The gadget is called Message Stopper (R), by
+Design Tech International Inc., Springfield, VA. Several other mfrs
+make this kind of gadget, so this is just one I happened to buy.
+Cost, roughly $10.
+
+The gadget is in the same form factor as a wall-plug-in Y-splitter.
+That is, it plugs into the wall RJ11 outlet, and has two RJ11 outlets
+on it, one marked TEL, the other marked ANS. There are two LED's, the
+green one on top of the ANS outlet, the red one on top of the TEL outlet.
+
+The two outer wires of the three RJ11's are wired in parallel. The
+schematic for the center two wires is :
+
+
+ .-------------- phone
+ .-----------------
+ | |
+C1 ----|
+C2 -| |
+ | |
+ | |
+ | '----------------- answering machine
+ |
+ +--|<--+--|<--->|----
+ | | two zeners
+ +-->|--+
+ two leds
+
+ Top led is green, bottom is red.
+
+It turns out the leds are basically idiot lights. The outside design
+makes it look like the green should light up when the ANS is offhook,
+and the red when TEL is offhook, but actually, depending on the line
+polarity, only one will glow, and only when the ANS outlet is offhook.
+If a load is connected on the ANS outlet, both leds will glow when
+ring voltage comes through.
+
+I could not read the zener voltage off the diodes, but I measured 11V
+across one of them when operating.
+
+The theory of operation is straightforward. All telephone extensions
+in the house are in parallel with each other, and with any device connected
+on the TEL outlet. If any of these devices is offhook, the phone line
+voltage is expected to drop below 12V or so, at which point the zeners
+isolate the ANS outlet from the line.
+
+It's a fairly simplistic design, and will not work in all situations,
+but it mostly works.
+
+----
+
+Regards,
+
+/ Jon Sreekanth
+
+Assabet Valley Microsystems, Inc. | Fax and PC products
+5 Walden St #3, Cambridge, MA 02140 | (617) 876-8019
+jon_sree@world.std.com |
diff --git a/textfiles.com/phreak/VOICEMAIL/ansmache.xcl b/textfiles.com/phreak/VOICEMAIL/ansmache.xcl
new file mode 100644
index 00000000..5c53b38e
Binary files /dev/null and b/textfiles.com/phreak/VOICEMAIL/ansmache.xcl differ
diff --git a/textfiles.com/phreak/VOICEMAIL/aspentut.txt b/textfiles.com/phreak/VOICEMAIL/aspentut.txt
new file mode 100644
index 00000000..4a12524e
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/aspentut.txt
@@ -0,0 +1,275 @@
+
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+ * *
+ * A Tutorial Of: ASPEN VOICE MAILBOX SYSTEMS *
+ * *
+ * Written by: SLYCATH *
+ * *
+ * Greetz to: Firefly, Adam, Sintax, Voltage and *
+ * *
+ * Everyone who knows me.... Happy Hacking.. *
+ * *
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+
+
+Intro:
+ Well you may be thinking that, Oh! yes I've read tutorials
+ before and they are about as helpful as a dead parrot.....
+ I thought it was about time to write a little series of
+ textfiles on how to use (and abuse) Mailbox systems.
+ This series will NOT just cover Hacking and scanning of mail
+ systems but also the facilities used on each................
+
+Start:
+ O.K. After recently coming across an ASPEN system which I
+ successfully managed to hack a couple of mailboxes for my
+ personal use, I didn't realise all the many facilities
+ available to the (Ab)user. I have collated the following
+ information myself I hope it will be of some help to U.
+
+ Assuming that you already have a mailbox on the system:
+
+ When Entering your mailbox number and passcode the system
+ will tell you if you have any new (or saved) messages.
+ Let's assume you have ONE new message.
+
+ You may select the following options:
+
+ Push:
+ ----- 1 - Recieve Messages
+ 2 - Send a message
+ 3 - Check Reciept
+ 4 - Personal Options
+
+Option chosen:
+--------------
+
+1:
+"" Whilst message is playing you have a sub-menu of options.
+
+ 1: Rewind Message Ten Seconds
+ 11: Rewind To Start Of Message
+ 2: Pause Message (Press Again To Unpause)
+ 3: Fast Forward Message Ten seconds
+ 33: Fast Forward To End Of Message
+
+ 4: Decrease Playing Speed (Slow Down)
+ 6: Increase Playing Speed (Speed Up)
+
+ 8: Decrease Volume
+ 9: Increase Volume
+
+ After listening to the message you may select one of these.
+
+ 4: Replay Message
+ 5: Envelope Message (Find Source Mailbox+Time+Date+Length)
+ 6: Send On Message To Another Subscriber - Record Intro Msg.
+ 7: ERASE Message
+ 8: Reply To Message
+ 9: Save Message In Archives (For Later Listening)
+
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+
+2:
+"" Send a Message will ask you to speak whilst it records you.
+
+ Press # to stop recording then enter Destination Mailbox.
+
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+
+3:
+"" Check reciept of messages sent.
+
+ This will allowyou to check if a message has been read and
+ also if a message has been saved.
+ There are other uses for this function (See L8ter)
+
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+
+4:
+"" Personal Options. Good fun can be had by all !!
+
+ 1: Change Your Passwords
+ ------------------------
+
+ This Section Refers To Guest Box Control.
+ If you are Strapped for boxes then you can assign
+ Guest Boxes so you can send messages to each other even
+ if One person doesn't have a mailbox.
+
+ 1: Change Guest 1's Password
+
+ Guest Can Leave AND Recieve Messages
+
+ 2: Change Guest 2's Password
+
+ Guest Can Leave AND Recieve Messages
+
+ 3: Change Home Password
+
+ Guest Can Leave AND Recieve Messages
+
+ 4: Change Secretary Password
+
+ Can Check How Many Messages You Have +
+ Recieve Messages
+
+ 5: Change Mailbox Password (MAIN)
+
+ This is your password. DON'T FORGET IT
+ ~~~~
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+
+ 2: Change Your Greetings
+ ------------------------
+
+ 1: Change Your Name
+
+ This is the name which people hear when
+ sending you messages from other boxes.
+ i.e. "Your message will be sent to xxxxxx"
+
+ 2: Change Your Greeting
+
+ This is what Non-Subscribers who are leaving
+ you mail will hear.
+
+ 3: Change Your Extended Abscence Greeting
+
+ This is the same as the ordinary greeting but
+ people leaving messages will be alerted that
+ you may not be back for some time.
+
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+
+ 3: Distribution Lists
+ ---------------------
+
+ Distribution lists are so you can record a message and have
+ it automatically sent to all users on your list.
+
+ i.e. Your list could contain EVERYONE'S number
+ Or All Your M8s On the system.
+
+ 1: Create Distribution Lists
+
+ 2: Edit Distribution Lists
+
+ 3: Delete Distribution Lists
+
+ 4: Find Names Of People On Lists
+
+
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+
+ OK ENUFF OF THE OPTIONS NOW ONTO THE HACK STUFF.
+
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+
+ Passwords:
+ ~~~~~~~~~~
+
+ Defaults For ASPEN Are:
+
+ (E.G. Box is 888)
+
+ -------------------------------
+ Passcode | Example
+ -------------------------------
+ Box number - 888
+ Box number + 1 - 889
+ Box number & 1 - 8881
+ 1 & Box number - 1888
+ Box number + 0 - 8880
+ 0 & Box number - 0888
+
+ -------------------------------
+ Use Normal Hacking Techniques:
+ -------------------------------
+ i.e.
+ 1111
+ |
+ \|/
+ 9999
+ 1234
+ 4321
+ -------------------------------
+
+
+ Scanning:
+ ~~~~~~~~~
+
+ Once you have found a NEW Mailbox, or even a used one.
+
+ .-------------------------,
+ / DON'T CHANGE JACK SHIT /
+ `-------------------------'
+
+ Press '3' from the main menu.
+ This Checks for Reciept of messages (See Previous)
+
+ Enter Mailbox Number: xxxx
+
+ When entered number the system will say one of the following:
+
+ 1: The Mailbox Users Name
+ 2: "xxxx Is not a Valid Number"
+ 3: "xxxx"
+
+ Start at 0000 then move up to 9999 making a note as follows:
+
+ If you get :
+
+ 1. Ignore and enter the next number.
+ 2. Ignore and enter the next number.
+ 3. Jump up and down and go WHOOOOPPPEEEEE , you may be in luck.
+
+ When You Have finished you should have a list of POSSIBLE
+ Hackable Mailboxes.
+ ______
+ / \
+ / THEN: /
+ \ /
+ `----'
+
+ 1. Hang Up And call back the system.
+ 2. Press '#'
+ 3. Enter One of Numbers on the list.
+ 4. If it says 'Enter Password' You can either try and hack it
+ but isn't gonna be a VIRGIN mailbox.
+ 5. If it says 'This is a voice messaging bollox.... blahh blahh.'
+ then it will come to a point where it says,
+ 'Please enter the temporary password assigned by your System
+ Manager'.
+ 6. Enter Default Passwords.
+ Defaults Are most likely to be the same for all the other VIRGIN
+ voice mail boxes if not, try the other ones.
+ 7. If It hangs up then GOTO 1.
+ 8. If it allows you access then play with the options (See Previous)
+
+
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+ Thanx For Reading All Of This Text File.
+ I Hope That It Will Be Of Some Use To You.
+
+ And See Ya All In
+ ----------------------------
+ " The Guide To CINDI Systems "
+ ----------------------------
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+ Extra Greeting: Thanx To FIREFLY For Alerting Me To
+ Some Of The Extra Options Which I Hadn't Previously
+ Noticed When Playing Around With It. THANX M8.
+ *-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*
+ / \
+ *-+-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-*-+-*
+ | |
+ | I Expect The Next Bit Will Get Adverts Stuck To It! |
+ | |
+ `-----------------------------------------------------'
+
+
+
+
diff --git a/textfiles.com/phreak/VOICEMAIL/at&t.txt b/textfiles.com/phreak/VOICEMAIL/at&t.txt
new file mode 100644
index 00000000..db6515bf
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/at&t.txt
@@ -0,0 +1,33 @@
+Hacking AT&T Answering Machines
+Quick and Dirty by oleBuzzard
+Written Today / 14-SEP-95
+(c) 1995 Communications
+
+
+1. Dial telephone and wait for AT&T Answering Machine to answer.
+2. Quickly Enter the following string.
+
+ 1234567898765432135792468642973147 (btw: this is the shortest
+ 4193366994488552277539596372582838 string for entering every
+ 491817161511026203040506070809001 possible 2-digit combo.)
+
+3. You'll know you hit the code because the messages will start playing.
+4. Heres a list of TouchTone(c) Commands
+
+
+ Listen to messages: 7
+ Listen to new messages: 6
+ Stop: #
+ Rewind Tape: 2
+ Advance Tape: 5
+ Clear Messages: 3,3
+ Record memo: *
+ Record Announcement: 4,*
+ Play Announcement: 4,1
+ Turn System On: 0
+ Turn System Off: 8,8
+
+****************************************************************************
+*** oleBuzzard's kn0wledge phreak ** kn0wledge phreak World Wide Web Site **
+** AC 719.578.8288 / 28.8oo-24oo ** http://www.uccs.edu/~abusby/k0p.html ***
+****************************************************************************
diff --git a/textfiles.com/phreak/VOICEMAIL/audexvp.txt b/textfiles.com/phreak/VOICEMAIL/audexvp.txt
new file mode 100644
index 00000000..af607e76
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/audexvp.txt
@@ -0,0 +1,432 @@
+AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDE
+UDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX
+DEX- DEX-
+EX-A HACKING GUIDE TO THE EX-A
+X-AU X-AU
+-AUD AUDEX VOICE POWER -AUD
+AUDE AUDE
+UDEX WRITTEN BY UDEX
+DEX- DEX-
+EX-A --==>> CRAZYBYTE <<==-- EX-A
+X-AU X-AU
+-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUD
+AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDE
+UDEX UDEX
+DEX- CALL SIN CITY: +32-3-8252274 DEX-
+EX-A EX-A
+X-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AU
+-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUDEX-AUD
+
+
+
+
+/\/--> DISCLAIMER <--\/\
+------------------------
+Ohooh... I'm scared as shit so I accept no responsibility for any actions
+taken by readers... blahblah NOOOOOOO...
+This text is written with the intention that readers of this text hack
+Audex Voice Power vmb's, and I sure as hell hope that as from now on every
+fucking Audex Voice Power in the galaxy gets abused by hackers.
+
+
+
+
+/\/--> INTRODUCTION <--\/\
+--------------------------
+The Audex Voice Power is the predecessor of the Audex we all know just under
+the name Audex today. There aren't that much of this older system around,
+but the few I found were fucking easy to hack. And again: vmb's are fun to
+have, you can trade them for xxx (fill this in), they lower your phone
+bill,... (you've heard this shit before).
+Anyway, lets get down to business...
+
+
+
+
+/\/--> IDENTIFYING THE AUDEX VOICE POWER VMB <--\/\
+----------------------------------------------------
+Well, you can't recognize them from the first greeting, but the greeting
+will probably contain the usual 'press the ext. of the person you want to
+reach' and the (special for Audex Voice Power) 'if you want to transfer
+using names instead, press the pound (#) key'.
+To REALLY be sure it's an Audex Voice Power: press *7, if it responds with:
+'Welcome to Audex Voice Power, please enter extension and # sign' you've
+got yourself an easy-to-hack Audex Voice Power vmb.
+
+
+
+
+/\/--> LOGGING IN <--\/\
+------------------------
+Press *7, you are asked to enter your box number, these are can be 3 or 4
+digits, but I haven't found a mixture of the two on one system so far.
+After you've entered the box number, press #, enter your password and press
+# again. If you entered and incorrect box number or password, it will say
+'Login incorrect, please try again,...'. On the systems I found you could
+try 4 times to login before you get disconnected. When you get disconnected
+it will say: 'Contact administrator for help, please disconnect... goodbye'.
+
+
+
+
+/\/--> FINDING A VALID BOX AND PASSWORD <--\/\
+----------------------------------------------
+The boxes are grouped, and they will usually be in 2XX or 2XXX. The default
+password is the same as the box number, just like on allmost all other VMB
+systems.
+
+There are two easy ways to find boxes (and one difficult, and another one
+if you really want a box but had extremely bad luck):
+
+1. On the two systems I'm using right now, the attendant-extension (0)
+ has 0 as password, and on one of those two, the options at the login-menu
+ have also got the same password as their extension number (1 for xxx, 2
+ for yyy,...). So first thing to do is trying 0 -> 9, if you can't get in
+ with these, read 2.
+
+2. So you couldn't get in by trying extensions 0 -> 9.
+ Most systems have a directory where you can transfer to people's
+ extensions by entering the first letters of their last name.
+ To find the directory, just listen to the first greeting you hear when
+ you call the VMB. (you know, 'welcome to xxx... if you need assistance
+ press 0, otherwise press the extension of...'). Usually you have to
+ press # at the login menu. Now, when you enter the directory option,
+ the system will respond with: 'Please enter the last name of the person
+ you want to reach'. Don't enter a complete name, just press 5 or somtehing
+ and the # sign. By the way: lots of VMB systems have some sort of
+ directory, and allmost every VMB system I found had users with last names
+ 'Smith' or 'Jones' (some popular names in the US, and characters from a
+ stupid TV series). Well, lets continue with Audex Voice Power. After you've
+ pressed #, the system will say 'to select blahblah press x' and will
+ start saying names. Now a lot of users also say their box number, so
+ a lot of these names will be like 'John Doe, extension xxxx'. Just
+ write these down. If you found how many digits the box numbers are,
+ and where they are grouped, hang up and call again.
+ Now start trying the box numbers you just found, you probably will get
+ in using the box number as password the 2nd or 3rd time you call, since
+ a lot of people don't use their VMB's, or don't know shit about it, so
+ haven't changed their password.
+
+3. Couldn't get in with one of the above methods ? Never happened to me,
+ but I guess it's possible. Here's what I would do in such a situation.
+ Don't use the login (*7) options to scan for boxes because then you don't
+ even know if it's a valid box. Just transfer to them from the main menu,
+ so you know how much digits the boxes are, and where they're located
+ (since they 'live' in groups). There's a 90% chance the boxes are located
+ in 2xx(x). If you entered an invalid box number, it will first try to
+ transfer you, and then it will say something like 'your transfer couldn't
+ be completed'. Since you don't have to press # after entering an extension
+ to transfer to, it's possible that f.e. after pressing only one digit you
+ will get transfered (read point 1 of this paragraph). When you've located
+ an area that contains lots of valid extensions, try to hack a box in that
+ area with the login (*7) option.
+
+4. Still didn't find a box ??? Well, the best thing you could do in this
+ case is bullshit to the operator. If you couldn't find the area that
+ contains the boxes, and there's no directory, ask her for the extension
+ of f.e. Smith and say you don't know anything else about this Smith.
+ If bullshitting the operator didn't work either, just try to transfer to
+ an extension, and ask the person that picks up the phone for their
+ password. You could say that you're from maintenance, and are installing
+ a new option in the boxes so that people are able to use outside lines
+ from within their boxes or something.
+
+5. You still couldn't get a box ? Well, give up on this system and scan for
+ another VMB system. I NEVER found a system I couldn't get a box after
+ about ten minutes using the method in points 1 and 2 so you are trying to
+ hack a system that has allready been badly abused by hackers or otherwise
+ you are EXTREMELY dumb.
+
+
+
+
+/\/--> OK, YOU'RE IN A BOX, WHAT NOW ??? <--\/\
+------------------------------------------------
+Well, use press 2 to listen to the messages, but only listen to the dates they
+were created. So press # every time to skip to the next message.
+If it contains new messages from 3 months ago, then it means that the legit
+user didn't use his box in 3 months. You can safely listen to the messages
+and use this box without the risk of loosing it in 2 days.
+If it contains no messages it could be possible that the user checks the VMB
+regulary, or that it has never been used in which case you got yourself a
+good box again. There's no quick way to find out if it's unused or often used
+in this case, just use this box to scan for other ones (look below), or check
+regulary if there are new messages and if they get deleted afterwards.
+
+
+
+
+/\/--> SCANNING FOR OTHER BOXES <--\/\
+---------------------------------------
+There are different ways of scanning for other boxes, but the quickest is
+the following:
+First choose option 5 from the main menu, then press 1 to create a
+distribution list. You will be asked for an ID for the list, just press 1
+or something followed by #. Now start entering box numbers, followed by #.
+If the box is valid, the system will respond with the name of the owner, or
+when you're lucky, the system will sa: 'Extension xxx', in which case you
+should write the number down because you've got a 99% chance this is an
+unused box. If the box is not valid, the system will say 'Extension xxx not
+valid'. When you've collected some numbers, press *# and then *3 to delete
+the list. Now hang up, call again and try what boxes have the same passwords
+as their box numbers.
+
+
+
+
+/\/--> OPTIONS AND COMMANDS <--\/\
+----------------------------------
+From the main menu you've got the following options:
+
+1. Record a message
+2. Listen to messages
+3. Administer name or greeting
+5. Administer password and distribution lists
+6. Change outcalling info (INTERESTING)
+*8. Transfer to another extension
+
+
+
+1. RECORDING MESSAGES :
+
+ You will hear a beep, record your message after the beep. When
+ finished recording, press 1. Now you've got the following options:
+
+ 21: Re-record : Your message will be deleted and you can record
+ it again.
+
+ 23: Playback : Just as it says: your just-recorded message will
+ be played back.
+
+ *3: Delete : Your message will be deleted
+
+ *#: Approve : Now enter the boxes you wish to send your message
+ to, followed by #. When finished type *#. To delete
+ the last entry (box), type *3.
+
+
+2. LISTENING TO MESSAGES :
+
+ When there are no messages, you will go back to the main menu.
+ Otherwise you will hear the date and time the actual message was
+ delivered, and the name (if specified) of the sender.
+ Options:
+
+ 0 : Listen : Listen to actual message
+ While listening you can use these commands:
+ 2 : Rewind message. If you press it again you will go to
+ the previous message.
+ 3 : Pause. Press 3 again to continue playing.
+ 5 : Rewind and play
+ 6 : Goto end of message
+
+ # : Skip : go to next message
+
+ *3: Delete : actual message will be deleted
+
+ 1 : Respond/forward message
+ 1 : Reply : Send an answer to the sender
+ 2 : Forward : Record a comment before the message and send
+ it to someone else.
+ 4 : Record new : Record a new message. This does exactly the
+ same as option 1 from the main menu.
+
+
+3. ADMINISTERING OF NAME AND GREETING :
+
+ This submenu will enable you to record name and greeting, and to
+ specify what greeting will be used.
+ Options:
+
+ 1 : Greeting : The message that will be heard whenever someone
+ wants to leave a message in your box.
+ 1 : Record : Record after the beep the greeting that should
+ be played. Press 1 to end recording.
+ 2 : Listen : Listen to your greeting.
+ *#: Select which greeting should answer.
+ 9 : Personal greeting.
+ 6 : Standard system greeting.
+
+ 2 : Name : The message that is heard when someone sends or
+ reveices messages to/from your box.
+ 0 : Listen : Listen to name.
+ 1 : Record : Record name.
+
+
+5. CREATING DISTRIBUTION LISTS AND CHANGING YOUR PASSWORD :
+
+ Distribution lists are used when you regulary need to send messages to
+ several people, and don't want to waste time with typing all their
+ boxes.
+
+ 1 : Create : Creates a new distribution list. First you will be
+ asked for an ID for the list. Now enter f.e. 1 followed
+ by #. You can now enter a box number followed by #,
+ repeat this untill you inputed all the box numbers for
+ the distribution list. If you entered a wrong number,
+ just press *3 to delete the last entry. When finished
+ press *#.
+
+ 2 : Scan : With this option all distribution lists ( If you got
+ any ) will be said, and after saying the ID of the
+ list, you've got the following options:
+ *3: Delete : Delete this distribution list.
+ # : Skip : Go to the next distribution list.
+
+ 3 : Review : This option will allow you to change other users' or
+ your own distribution lists. First enter the box number
+ followed by #, or for your own box, just press #.
+ Now enter the ID of the distribution list followed
+ by #. The system will say how much entries there are in
+ the list, and name them one by one, giving you the
+ following options after naming each entry:
+ # : Skip : Go to the next box.
+ *3: Delete : Delete this box.
+ 1 : Add : Add a box.
+ *#: Quit : Stop review of the entries in the list.
+
+ 4 : Change PW : Enter your new password followed by #. After
+ entering it, you have to enter it again followed
+ by # to check if you didn't enter it wrong the
+ first time. The password can be 1 till 9 digits.
+ If you just press # when you're asked to enter it,
+ no passwords will be assigned to your box.
+
+
+6. CHANGE OUTCALLING INFORMATION :
+
+ The outcalling option is quite fun. Not everyone is allowed to do it,
+ but if you find boxes allowing outcalling, you can use them to call
+ friends, boards or even alliance... I wouldn't suggest putting your
+ own number there, but it would be quite fun that when someone calls
+ you up using the VMB (on a tollfree number ???), and you don't answer,
+ he can leave a message and stuff...
+
+ Options:
+
+ 1 : Change : Enter the number your calls should be transfered to,
+ followed by #. To exit press *#.
+
+ 3 : Info : Will give you instructions on how to enter the number
+ with option 1. If you want to insert a pause in the
+ dial string, use * to pause for 4 seconds. If your
+ number needs to be ended with a #, start your dialing
+ string with ##. Normally you can't end with a #
+ because if you do that, the system thinks that it's
+ the end of the dialing string. This is usefull for
+ pagers and other stuff (use your imagination).
+
+ 6 : Disable : Turn outcalling off.
+
+ 9 : Period : Specify the outcalling period.
+ 1 : Outcalling allowed during the system administration hours.
+ F.e.: Only between 8 AM and 6 PM.
+ 2 : Outcalling allowed 24 hours a day.
+
+
+
+
+/\/--> GREETINGS <--\/\
+-----------------------
+And last but not least some greetings to:
+(A-Z to avoid 'why did ya put X before me ?')
+
+
+Analog: Forget that I told you to kick off Flaming Chaos as a CO.
+ Making a new BBS proggy ?
+
+Apollo: Hope your exams are better than mine... nice talking to ya
+ over the VMB.
+
+A.R.U.P.: For having such a nice and virgin Audex Voice Power VMB.
+
+Cops (the): FUCK OFF !!! I EXTREMELY HATE ALL COPS... I WOULD KILL ALL
+ COPS IF I HAD THE CHANCE (same goes for all kind of security
+ personnel and the endless amount of lamers on this planet).
+
+Donald Duck: Where R you ? Is your girlfriend SO interesting ? We miss
+ your expertise...
+
+Einstein: You're lame and you know it. Hah, I puke on guys like you.
+ I'm not a violent guy, but I swear I'll smash your head when
+ I ever meet you.
+
+Flaming Chaos: Sorry I offended you dude, but I didn't know about that '|',
+ so I thought the message was specifically written for me.
+
+Invalid Media: Quite nice board... too bad you had to make it codefree.
+
+Jules: Your board is OK, but why is it down so much ?
+
+Larry: You're a lamer and your problem is that you won't admit it.
+
+Oink: Hmmm... so you agree that HP3000's are Boooring... Unixes are
+ 1000 times more phun...
+
+Ralph: Been fucking around on the nets lately ???
+
+Sintax: Happy now that I put some greets in ? Don't you ever get bored
+ of CIS ?
+
+Slycath: Nice texts, continue your good work...
+ btw: I LUV Robbie Robot... (and his frog puppet)
+
+Predat0r: Your board is the living proof that a board doesn't need an
+ HST to be one of the best.
+
+Thor: How is army ? Why don't you do something usefull while you're
+ there and look for their computer dialups (if they're using
+ any (hehe)).
+
+Trap Zer0: Nice texts about the VMB's. Getting active again ?
+
+Vinny: You probably won't read this, hehe... your handle is with 'V'
+ so you're last... anyways, THANKS for everything you 'teached'
+ me, THANKS for the job you can get me, GOOD LUCK with the PC.
+
+???: To all guys who call me when I'm sleeping: FUCK OFF.
+
+
+And... to all guys I forgot and also the few cool guys I know among all the
+lamers in the lame Amiga scene. Only greets here to guys I know involved
+in HPA, this will be the first and the last time I put up such a greetings
+list...
+
+
+
+
+/\/--> RECOMMENDED READING <--\/\
+---------------------------------
+ - All texts about Night Ranger, he's the VMB expert.
+ - Texts about Aspen and Cindi systems written by Slycath.
+ - Texts about the IADS and Message Centers by Trap Zer0.
+ - Ofcourse all texts written by me (hehe).
+
+
+
+
+/\/--> OTHER TEXTS WRITTEN BY ME <--\/\
+---------------------------------------
+ - Unix command overview
+ - Hacking Meridian Mail
+ - HP3000 quick command reference
+
+
+
+
+/\/--> TEXTS TO WATCH OUT FOR <--\/\
+-------------------------------------
+ - Maybe a text about the IADS coz I think it's the best VMB ever made.
+ - Text about Audex (the new Audex Voice Power system).
+ - Probably some texts about hacking Unix or the MPE XL or V OS on HP3000's.
+
+
+
+
+L8R ALLIG8R
+
+User CRAZYBYTE ending interactive session at 17:02.
+
+NO CARRIER
+
+
diff --git a/textfiles.com/phreak/VOICEMAIL/cinditut.txt b/textfiles.com/phreak/VOICEMAIL/cinditut.txt
new file mode 100644
index 00000000..cb03f588
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/cinditut.txt
@@ -0,0 +1,361 @@
+ . + . . .
+ + ___/\ /\_/\_______________________/\________
+ . /\__\/\/ /_________________________/ /________\ . +
+ . . / / __\ \/_________/\_____ _______/ /_________/ .
+ . \/ / /\ \/ // \ / \ / / /\ / /
+ . + . \ \ / /\ // /\// /\ \ / / / / / / . .
+ . ________________/\ / / / // / \/\/ // / / /__/ / . +.
+ /\_______________\/ \ \/ / \ \_/\ / // / / / / / .
+ \/_________________/ \ / \___/ / / \/ \/ / / .
+ . / \ . / / . . \/ .
+ . + . . . \/\/ . \/ +
+
+ . IS PROUD TO PRESENT TO YOU:
+ . ___________________________
+ /\_________________________/\
+ / / \ \
+ / / * CINDI SYSTEM TUTORIAL * \ \
+ \/\___________________________/\/
+
+ YO GUYZ, I'M BACK AS PROMISED WITH ANOTHER TUTORIAL.
+ LEAVE ME MAIL IF YOU NEED HELP WITH SOMETHING.
+ YOU CAN CATCH ME ON:
+
+ BORDERLINE: +61 (0) 4987-4875
+ SIN CITY: +32 (0) 3825-2274
+ CONSPIRACY: +44 (0) 633-894-490
+ ULTIMATE DREAM: +44 (0) 222-495-919
+
+ MEGA GREETZ GO TO THESE GUYZ:
+
+ .--------------------------------------.
+ | FIREFLY, TAS, SINTAX, OINK, VOLTAGE, |
+ | HYBRID, PUNISHER, CRAZYBYTE, GRAFFITI|
+ | AND OF COURSE EVERYONE WHO KNOWS ME, |
+ | AND ARE ALSO COOL HACKER - PHREAKERS |
+ `-.----------------------------------.-'
+ / CAN SOMEONE DO ME A COOL ANSI ? TA.\
+ \____________________________________/
+
+ ARE YOU SITTING COMFORTABLY ?
+ -----------------------------
+
+ THEN I'LL BEGIN.
+
+ -----------------------------------------
+ 1. Identifying Voice Mail System As CINDI
+ -----------------------------------------
+
+ When you have connected to your System, upon pressing #,
+ You should get a voice saying :
+
+ "Please enter the persons name using your touchtone keypad, last
+ name followed by first. To enter a Q or a Z push 1... etc etc.."
+
+ Also when you get kicked off the message will be:
+
+ "Thank You, Good-Day."
+
+ One of the most common phrases you are likely to hear will be:
+
+ "If you'd like to speak with someone press zero"
+
+ This is contained in almost all instruction lists.
+
+ ----------------------------------------------
+ 2. Ok So It's CINDI... So How Do I Find A Box?
+ ----------------------------------------------
+
+ Mailboxes Are Going To Be Either 3 or 4 Digits.
+
+ The CINDI Mailboxes Mostly come in Blocks...
+
+ e.g. 860,861,862,865 etc
+
+ So When You Find One Person You Can Find Lots Of Others.
+
+ When Looking For Boxes The System Will Kick You Off If You Get A Box Number
+ Wrong After Three Tries.
+
+ The Three Possibilities For Mailboxes Are:
+
+ 1: Invalid Box "Mailbox XXX Does Not Exist !"
+ 2: The Greeting Of The Owner Will Play
+ 3: It Will Say "Mailbox XXX"
+
+ Once You Have At Least One Valid Box Number Everything Is sooo EASY!
+
+ Upon Second Failure (Of Invalid Mailbox Number)Press Hash To Enter
+ Another Box Number. Now Enter A Valid Box Number.
+ If You Don't Want That Box You Can Press '0'
+ Then Instead Of entering Password You Can Press '#' To Enter Another Box
+ Number, Now There Is No Fear Of Being Cut Off.
+
+ Admin Boxes Are Found At Numbers Like 991, 900, 100, 101 although
+ Some Systems Require You To Press '0' As Soon As Connected.......
+ This Will Then Give You An 'Enter Passcode' Prompt.
+
+ ----------------------------------------------------
+ 3. Strategic Hacking Using The 'Fault' Of The System.
+ ----------------------------------------------------
+
+ The easiest method to hack a box is as follows:
+
+ e.g. Mailbox you want to hack is 1000.
+
+ a. When the system asks you to enter your mailbox number enter: 1000.
+ b. When the message starts playing you can press '0' to stop.
+ c. The system will then ask you for a password.
+ d. The Default Password on a CINDI system is (LAME) '0'
+ Most Users will have passwords of:
+
+ Mailbox number.
+ '123 (4)'
+ 1, 2, 3, --> 9..
+
+ Passwords Are 3/4 Digits...
+
+ Odds are at Least 1/8 Of users will have passwords like these..
+
+ e. If Password was wrong, then try another..
+ f. Upon 2nd Failed Attempt press '#' - This causes the system to give you
+ an 'Enter Mailbox' Prompt... You can repeat this Over, and Over...
+ The System Doesn't Kick You Off and you can find Them Boxes...
+
+ **** Nice Little Bug In The Software METHINKS!!!! ****
+
+ ---------------------------------------------------------
+ 4. WOW! That Was Easy... What Can I Do With My New BOX ??
+ ---------------------------------------------------------
+
+ The Full Commands Available Are As Follows:
+
+ Upon Entering Yor Box You Can Select:
+
+ 0 - TRANSFER TO ATTENDANT
+ 1 - PLACE A CALL (To another mailbox)
+ 2 - RECIEVE MESSAGES
+ 3 - MESSAGE FORWARDING
+ 4 - CALL PLACEMENTS
+ 5 - GROUP MESSAGES
+ 6 - CERTIFIED MESSAGES
+ 7 - GUEST ACCOUNTS
+ 8 - PERSONALISE MAILBOX
+ * - VOLUME. Quiet, Medium OR Loud.
+ ====
+
+ -----------------------------------------------------------------------
+ ___
+ | |
+ | 0 | WILL ALMOST ALWAYS TAKE YOU TO THE ATTENDANT / OPERATOR
+ |___|
+
+ Lots Of CINDI System Operators Are Quite Stupid...
+ Don't Ask Me Why But This Is Fact....
+ Wind Them Up And Make Their Life Hell.
+ Or If Your Kind, Just Worm Info About Other Country Dialups Etc..
+ Use Your Imagination.
+
+ -----------------------------------------------------------------------
+ ___
+ | |
+ | 1 | PLACE A CALL
+ |___|
+
+ This Will Prompt You To Enter A Mailbox Number...
+ Then You Just Start Recording Your Message.
+ The Point Of This Is So That You Can Reply To Messages..
+ i.e. They Will Have Your Mailbox Number Recorded With Them
+
+ -----------------------------------------------------------------------
+ ___
+ | |
+ | 2 | RECIEVE MESSAGES
+ |___|
+
+ Yup, The Whole Point Of A VMB Is To Transfer Messages..
+ So Lets Look At The Available Options.
+
+ 1 - Keep Message
+ 2 - Repeat Message
+ 3 - -10 Seconds
+ 4 - +10 Seconds
+ 5 - Skip Message
+ 6 - Stop playback for 30secs.
+ 7 - Take Action
+ ---------------------------------------
+ PRESS:
+
+ 1 - Copy Message With Comments
+ 2 - Copy Message Without Comments
+ 6 - Relay Info To Another Mailbox
+ 7 - Respond To Sender
+ 9 - Take NO Action
+ ---------------------------------------
+ 8 - Delete Message
+ 9 - End Recieving
+
+
+ -----------------------------------------------------------------------
+ ___
+ | |
+ | 3 | MESSAGE FORWARDING
+ |___|
+
+ This Sends All New Messages To A Given Telephone Number.
+ Allows You To Enter Date, Time.. And How Often To Call.
+
+ 1 - Enable Message Forwarding
+ 2 - Review Message Forwarding Status
+ 8 - Cancel Message Forwarding
+ 9 - Exit
+
+ -----------------------------------------------------------------------
+ ___
+ | |
+ | 4 | CALL PLACEMENTS
+ |___|
+
+ This Allows You To Send A Message To A Telephone Number.
+ The Format For Entering Number Will Allow You To Enter Pauses,
+ Stars, and '#'. This Enables You To Call A PBX Using A Long String Of
+ Commands, And Get The System To Give You A Wake Up Call At Home,
+ Even If You Are Not In USA.....
+
+ One Thing To Remember Is, Once Call Has Been Made Or Not, Check Up
+ On The Status Of Messages And If A Call Couldn't Be Completed Then
+ Kill It As To Avoid Leaving Your Number On The System..
+
+ ( Note On Some Systems Call Placement May Be Off Or Only Available
+ On Specific Mailboxes. Find Admin. Box And Turn It ON !)
+
+ 1 - Place A Call
+
+ This Will Ask You To Enter The Telephone Number You Wish To Leave
+ A Message For.. The Systems I Have Found Only Call USA But This Is
+ Adequate Enough. You Can Enter Pauses ( ), '*' And '#'
+
+ You Will Then Be Prompted To Enter A Password For The Message.
+ This Is So That When The Number You Are Calling Answers They Have
+ To Enter A Password To Allow Them To Hear The Message..
+ If No Password Is Required Then Enter '0' As The Password.
+
+ 2 - To Check Status Of Calls
+ 9 - Exit
+
+ -----------------------------------------------------------------------
+ ___
+ | |
+ | 5 | GROUP MESSAGES
+ |___|
+
+ Allows You To Send A Message To Lots Of People At Once. If You Have
+ A Group With Everyone Listed In It The Chances Are That When You Send
+ A Message The System Will Crash.. (Mention No Names: TAS)
+
+ 1 - Record A Group Message
+ 3 - Add Members To A Group
+ 4 - List A Group
+ 8 - Delete A Group
+
+ -----------------------------------------------------------------------
+ ___
+ | |
+ | 6 | CERTIFIED MESSAGES
+ |___|
+
+ These Are Messages Which Once Read Will Cause The System To Send
+ The Sender A Message Which Says The Message Sent To:.. On ...
+ Has Been Recieved.
+
+ 1 - Send A Certified Message
+ 2 - Check Delivery Status Of A Message
+ 8 - Cancel Notification Of A Message
+ This Stops The System From Sending A Message Once The Sent
+ Message Has Been Read.
+
+ 9 - Exit
+
+ -----------------------------------------------------------------------
+ ___
+ | |
+ | 7 | GUEST ACCOUNTS
+ |___|
+
+ These Allow You To Record And Recieve Messages To And From Non
+ Subscribers (Heheh) To The System.
+
+ 1 - Record A Guest Message
+ 2 - Check Status Of A Message
+ 3 - Open New Guest Account
+ 4 - List Your Guests
+ 8 - Delete A Guest
+
+ -----------------------------------------------------------------------
+ ___
+ | |
+ | 8 | PERSONALISE MAILBOX
+ |___|
+
+ 1 - Change Personal Greeting
+ 2 - Change Password
+ 3 - Change Name
+ 4 - Recover System Bulletin
+ This Will Recover System Defaults For The Box.
+
+ 5 - Check Message Waiting Notification Status
+ This Will Tell You If You Have New Messages.
+ -----------------------------
+ Press:
+ 1 - Change
+ 9 - Exit
+
+ -----------------------------
+ 6 - Change Call Management Level
+ This Will Allow Your Calls To Be Screened.
+
+ -----------------------------
+ Press:
+ 1 - Change
+ 9 - Exit
+
+ -----------------------------
+ 7 - Change Order Of Message Retrieval
+ -----------------------------
+ Press:
+ 1 - Change
+ Last In First Out +
+ First In First Out
+ -----------------------------
+ 9 - Exit.
+ -----------------------------------------------------------------------
+
+ CINDI Systems Are Fun.. Especially For OutDialling Messages....
+ If You Are ALONE ! (awww!) You Can Get The System To Send All Messages
+ At A Specific Time To One Side Of A Loop.. Where You Will Be Waiting
+ On The Other Side... The Possibilities Are Endless... Wake Up Calls.. etc.
+
+
+ I Hope This Was As/More Helpful Than The ASPENTUT.TXT, If You
+ Don't Have That Then Download It NOW From One Of The Boards Listed
+ At the Top Of This TextFile...
+
+ Good Luck And HAPPY HACKING !!!!!!!!!!!!!!
+ .. ..
+ \ /
+ /\/\/\/\
+ | ## |
+ [| .. |] ROBBIE THE ROBOT SAY'S HELLLOOOOOOOOOOOO.
+ |________|
+ \|-|-|-|-/
+ --------
+ ___|--|___ ..
+ / \ {<>} < Do You Like His Frog Puppet ? >
+ / | /\/\ | \/ /
+ / / | \/\/ | \ /
+ -----------------------------------------------------------------------
+ The Next Bit Is Where The TEXT ADDERS Do Their Worst:
+ -----------------------------------------------------------------------
+
+
+
diff --git a/textfiles.com/phreak/VOICEMAIL/hack6 b/textfiles.com/phreak/VOICEMAIL/hack6
new file mode 100644
index 00000000..a4e41fa6
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/hack6
@@ -0,0 +1,87 @@
+ Hacking Voice Mail Systems
+
+Voice Mail is a relatively new concept and not much has been said about it.
+It is a very useful tool for the business person and the phreak. The way it
+works is that somebody wishing to get in touch with you calls a number,
+usually a 1-800, and punches in on his touch-pad your mailbox number and then
+he is able to leave a message for you. Business experts report that this
+almost totally eliminates telephone tag. When a person wishes to pick up his
+message all he needs to do is call the number enter a certain code and he can
+hear his messages, transfer them, and do other misc. mailbox utilities.
+
+Most VMSs are similar in the way they work. There are a few different ways
+the VMSs store the voice. One way is that the voice is recorded digitally and
+compressed and when heard it is reproduced back into the voice that recorded
+it. Another method that is slower and uses more space, but costs less, stores
+the voice on magnetic tape, the same type that is used to store data on a
+computer, and then runs the tape at a slow speed. Using this method the voice
+does not need to be reproduced in any way and will sound normal as long as the
+tape is running at a constant speed. On some of the newer VMSs the voice is
+digitally recorded and is transformed from the magnetic tape at about 2400
+bits per second.
+
+There are many different types and versions of voice mail systems. Some of
+the best and easiest to get on will be discussed.
+
+Centagram
+---------
+These are direct dial (you don't have to enter a box number). To get on one
+of these, first have a number to any box on the system. All of the other
+boxes will be on the same prefix; just start scanning them until you find one
+that has a message saying that person you are calling is not available. This
+usually means that the box has not been assigned to anybody yet. Before the
+nice lady's voice tells you to leave the message, hit #. You will then be
+prompted for your password. The password will usually be the same as the last
+four digits of the box's number or a simple number like 1000, 2000, etc. Once
+you get on, they are very user friendly and will prompt you with a menu of
+options. If you can't find any empty boxes or want to do more, you can hack
+but the system administrators box, which will usually be 9999 on the same
+prefix as the other boxes, will allow you to hear anybody's messages and
+create and delete boxes.
+
+Sperry Link
+-----------
+These systems are very nice. They will usually be found on an 800 number.
+These are one of the hardest to get a box on because you must hack out a user
+ID (different from the person's box number) and a password. When it answers,
+if it says, "This is a Sperry Link voice station. Please enter your user ID,"
+you will have to start trying to find a valid user ID. On most Sperrys it
+will be a five digit number. If it answers and says, "This is an X answering
+service," you first have to hit *# to get the user number prompt. Once you
+get a valid user number will have to guess the password on most systems, it
+will be 4 digits. Once you get in, these are also very user friendly and have
+many different options available.
+
+RSVP
+----
+This is probably one of the worst VMSs but it is by far the easiest to get
+yourself a box. When it answers you can hit * for a directory of the boxes on
+it (it will only hold 23). If you hit # you will be given a menu of options
+and when you choose an option you will then be prompted for your ID number.
+The ID number on an RSVP system will just about always be the same as the
+mailbox number, which are always only 2 digits.
+
+A.S.P.E.N.
+----------
+The Aspen voice message systems made by Octel Telecommunications is in my
+opinion the BEST VMS made. To get a box on an Aspen, you need to find an
+empty box. To find an empty box, scan the box numbers and if one says, "You
+entered XXXX. Please leave a message at the tone," then this is an empty box.
+You next just press # and when prompted for your box number enter the number
+of the empty box and friendly voice of the nice lady will guide you through
+all of the steps of setting up your box. She first tells you what you can do
+with the box and then will prompt you with, "Please enter the temporary
+password assigned to you by your system manager." This password will usually
+be 4 digits long and the same as the box number like 1000, etc. Once you get
+on their are many things you can do. You can make a distribution list where
+if you want to leave a certain message to more than one person, you can enter
+the list number and all of the boxes on the list will get the message. You can
+also have the system call you and notify you that you have new messages. These
+systems also have what they call "Information center mailboxes" that are
+listen only and can also have a password on them so the person calling has to
+enter the password before he hears the greeting message. Aspen VMSs have a
+system managers mailbox that will just about give you total control of the
+whole system and let you listen to people's mail, create and delete boxes, and
+many other things.
+
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/VOICEMAIL/hackam1990.txt b/textfiles.com/phreak/VOICEMAIL/hackam1990.txt
new file mode 100644
index 00000000..1c35776c
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/hackam1990.txt
@@ -0,0 +1,265 @@
+
+ */*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
+ Hacking Answering Machines 1990
+ */*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*/*
+ by: Predat0r of Blitzkrieg Bbs 502/499-8933
+
+
+ AT&T reports that in the year 1990, 11 million people
+will buy an answering machine for their home use. In 1989, 10
+million machines were sold. Everyone has called up a person
+at one time or another and got the old "leave your name at
+the beep" message. With this increase in homes using these
+machines there is also a new form of hacking developing. One
+of hacking an answering machine.
+
+ Why would anyone even want to hack an answering machine
+and for what purpose? There are many reasons and things you
+can do once you have control of someone elses machine. If for
+some reason you need to spy on a business or person you can
+hack their machine and take control using the information for
+your own personal use. There is also the old "change the
+message" secret to make it say something to the effect of
+this line accepts all toll charges so you can bill third
+party calls to that number. You can also use an answering
+machine for your own personal use, as in making it your own
+voice mail type system for people to call. Only do this if
+you know someone is out of town. If they come home from
+shopping and find their machine changed it might cause
+problems. With these basic ideas in mind you can see hacking
+an answering machine could be very useful to certain
+individuals.
+
+ How can a person hack an answering machine? Well most
+answering machines built now have remote access features
+which allow the owner, or anyone to call in and press a
+security code to play their messages. This is where the fun
+begins. Some older models don't have remote access so you
+cannot do anything to them. Also if you know someone has a
+machine but you call and it doesn't answer, let the phone
+ring about 15 times. This will tell the machine to turn
+itself on, so you can hack it. The actual number varies
+between machines.
+
+ To practice hacking some machines i will show you how to
+get remote access on a few models. Just look and see what
+kind your friend has and hack it for starters.
+
+ Record a Call- Model 2120
+ -------------------------
+Call in and during the message or after the beep tone to
+leave a message enter the 3 digit security code. Which you
+must find yourself. This will rewind the tape and play all
+new messages. Press 2 to backspace and repeat the last
+message. Press 3 to fast foward the tape.
+
+Changing your message from remote. Call your phone and enter
+the secret code. After several rapid beeps enter your secret
+code again. After a short delay you will hear a long tone.
+After the tone ends begin speaking your message which may be
+17 seconds in length. When finished press the second digit of
+your secret code to end. The machine will then save your
+message and play it back. To turn the unit on from remote let
+it ring 11 times then hangup. Or stay on and it will answer
+so you can access the machine. For express calls or frequent
+calls hit the second digit for two seconds to skip the out
+going message announcement.
+
+Goldstar- Models 6000/6100
+--------------------------
+Call and enter your 1 digit secret code after you hear the
+out going message announcement. The machine will then play
+back new messages. Hangup to save messages or after all
+messages have been played the machine will give a double
+beeptone, you may enter your code to erase all messages.
+You cannot change the out going message on this unit.
+
+Cobra- Model AN-8521
+--------------------
+For this machine there are 2 codes. Both are one digit in
+length. The first one is the play code. The second is to
+erase messages from remote. After the outgoing message and
+beeptone press the play code for 2 seconds to play messages.
+After each message ends there will be a single beep. At the
+end of all message it will beep twice. You may then do the
+following. Replay by pressing the play code again. Erase
+messages by pressing the erase code. Hang-up and save
+messages and continue to take additional calls. To turn this
+unit on from remote you must let it ring 16 times before it
+will activate. If it rings 10 times then you hear 3 beeps it
+is full and messages need to be erased.
+
+Uniden- Model AM 464
+--------------------
+This model is one of the more advanced when it comes to
+remote capabilities. The factory preset security code is 747.
+This can be changed to as many as five digits of your choice.
+To gain access from remote type your security code while the
+outgoing message is playing. Press 1 after hearing the tone
+and the machine will rewind and play your messages. To fast
+foward press 7, to resume normal playback press 8. To stop
+the messages from playing press 8 again. Press 8 to restart
+the messages or 1 to start from the beginning again. Press 9
+to rewind and 8 to resume playing. If you rewind all the way
+it will beep twice. You need to press 1 to play messages.To
+save messages press 4. To erase press 6. To turn the machine
+off from remote press 5 after all messages have been played
+and the machine beeps twice. To turn the machine on from
+remote let the phone ring 12 to 14 times. The machine will
+beep and then you enter your remote code. This will then turn
+your machine to answer mode. This machine also has room
+monitor options. This allows you to listen to what is going
+on in the room of the machine. To do this call the machine
+enter your security code after the beep press 0. The monitor
+stays on for 60 seconds. You will be warned with 2 beeps at
+45 seconds. To continue press 0 again.To change the outgoing
+message from remote erase all the messages. Then call back
+and enter your code after the tone press 3. It will beep
+again and you may then leave your new message. Press 3 when
+finished. To change the security code from remote after the
+beep press # then 1 after the next beep enter your new code
+followed by the # again. There is also a call break through
+where you enter 256 while the outgoing message is playing.
+This will alarm the persons in the house someone is calling
+with a series of loud beeps. Press the * key to stop.
+
+Code-a-phone Model 930
+----------------------
+To access from remote call and enter your security code after
+the announcement and tone. Press your code for 3 full
+seconds. After the new messages have been played you will
+hear 2 tones. You may then save messages by pressing your
+code then hanging up. repeat by entering code wait for 4
+tones then enter code again. To erase message hangup when the
+tape is done playing. To turn the machine on from remote call
+and let ring ten times. When the system answers it will have
+a two second tone. Press your security code. You will hear
+three double tones to let you know the system is on.
+
+Unisonic- Model 8720
+--------------------
+One digit code entered after the outgoing message and tone
+will allow you to hear messages. To change message wait till
+all new messages have been played 2 beep tones will be heard.
+Press code for four seconds. Two beeps will be heard then the
+tape will rewind and beep again. Now leave the new message.
+Press your code when finished to save new outgoing message.
+New message will play for you to hear.
+
+Panasonic- Model KX-T2427
+-------------------------
+Call and enter the three digit code during the outgoing
+message. Machine will beep once, then beep amount of times
+equal to messages. Then rewind and play messages. There will
+be three beeps after the last message. Six beeps means the
+tape is full. Press 2 to foward. Press 1 to rewind. Press 3
+to reset machine and erase messages. To monitor the room
+press 5 after the beeps indicating the number of messages the
+machine has. Press 7 to change the outgoing message, it will
+beep a few quick times rewind then a long beep will be heard.
+Leave new message press 9 when finished. Press 0 right after
+the beep tones to shut the machine off. To turn the machine
+on let it ring 15 times then hangup after machine turns on.
+
+Panasonic- Model KX-T2385d
+--------------------------
+During the outgoing message enter the 1 digit code. This will
+playback messages. Press the code again to rewind. After the
+messages have played the machine will beep three times. Press
+your code again and it will reset the machine. For remote
+turn on let phone ring 15 times. Then after the outgoing
+message hangup.
+
+AT&T- Model 1504
+----------------
+Enter 2 digit code before or after announcement. System will
+beep after each message and five times when messages are
+done. Press the # key anytime to pause. Hanging up will save
+messages. Press 7 and it will rewind and play messages again.
+Press 5 to fast foward. Press 2 to rewind. Press 33 after all
+messages have been played to reset without saving messages.
+To record onto the tape press * after the system answers.
+This will then beep and you may leave a four minute message
+on the tape. Press # when done. This is not an outgoing
+message announcement, only a memo. To turn on from remote let
+ring ten times press 0 when system answers. To turn the
+system off dial and enter your code. Press 88 and it will
+shut the machine down.
+
+Phonemate- Model 4050
+---------------------
+Enter your 3 digit code during the outgoing message. Pressing
+* or # will allow you to scan through the messages. When
+finished pressing 1 will replay the messages. Pressing 2 will
+erase them. To turn on from remote let ring for 15 times.
+Then proceed with remote operations.
+
+Phonemate- Model 7200
+---------------------
+Enter 1 digit code during of after the outgoing message. A
+voice will tell you how many messages you have, then play
+them back for you. To rewind press your code and hold it for
+however long you want to rewind. Let go and it will resume
+playing. After the last message a voice will prompt you with
+a list of options. You have five seconds to respond or it
+will proceed to the next option. These are as follows. The
+first is hanging up to save messages. Next is enter code to
+replay messages. Next enter code to erase messages. Last is
+enter code to change greeting. Follow the voice and it will
+give you complete directions on exact steps to follow. To
+turn on from remote let ring ten times then hang up. If tape
+is full it will say sorry tape is full, enter code and erase
+messages.
+
+Spectra Phone- Model ITD300
+---------------------------
+Enter your 1 digit code after the greeting. Messages will
+play back. Hanging up will save them. Or wait for four beeps
+and press your code to replay them. To erase press your code
+after 2 beeps. To turn the machine on from remote let it ring
+10 times.
+
+Notes: Outgoing message and greeting is what you hear when
+you first call. Code is your personal security code.
+
+Hacking answering machines can be very easy. It can also help
+you obtain valuable information. If you have a targeted
+machine you can try going to a store and saying you just
+bought one and it didn't have instructions in the box. They
+will usually give you a set or make copies for you. This
+basic guide is just to introduce you to answering machine
+hacking and changing the outgoing message and listening to
+messages left by callers. To keep your own machine safe
+purchase one with a changeable security code of 3 or more
+digits. Most home machines are of the 1 digit type and are
+easy to hack. I have no knwoledge of the laws concerning
+hacking into someones answering machine. I am sure once it
+becomes more common we will find out. Of course this article
+is for informational purposes only so you would never have to
+find out the actual laws.
+
+Taken from TAP Magazine Issue #100
+
+
+
+X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X
+
+ Another file downloaded from: NIRVANAnet(tm)
+
+ & the Temple of the Screaming Electron Jeff Hunter 510-935-5845
+ The Salted Slug Strange 408-454-9368
+ Burn This Flag Zardoz 408-363-9766
+ realitycheck Poindexter Fortran 510-527-1662
+ Lies Unlimited Mick Freen 415-583-4102
+ Tomorrow's 0rder of Magnitude Finger_Man 415-961-9315
+ My Dog Bit Jesus Suzanne D'Fault 510-658-8078
+ New Dork Sublime Demented Pimiento 415-566-0126
+
+ Specializing in conversations, obscure information, high explosives,
+ arcane knowledge, political extremism, diverse sexuality,
+ insane speculation, and wild rumours. ALL-TEXT BBS SYSTEMS.
+
+ Full access for first-time callers. We don't want to know who you are,
+ where you live, or what your phone number is. We are not Big Brother.
+
+ "Raw Data for Raw Nerves"
diff --git a/textfiles.com/phreak/VOICEMAIL/hackvmb.txt b/textfiles.com/phreak/VOICEMAIL/hackvmb.txt
new file mode 100644
index 00000000..85b6ec1b
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/hackvmb.txt
@@ -0,0 +1,202 @@
+
+Hacking & Scanning Voice Mail Boxes: The Tutorial
+
+
+Hello again, and welcome to another Legions of Lucifer text phile! This
+text file has to do with hacking and scanning VMBs. The reason I am writing
+this phile is because I am very good at it, and have had years of experience.
+Infact I have been called by MCI for screwing them over by attacking and
+taking over a whole damn system with a few friends of mine.
+
+Anyways, hacking VMBs is very simple and basically safe, and not only that
+but they are kewl to have around. You can give them to friends, you can
+trade them for access on bulletin boards, or you can use it for yourself.
+As for this 'Tutorial on Hacking VMBs', we will be talking about what systems
+to hack, how you go about hacking them, default passwords, hints on better
+scanning, and having your very own box.
+
+
+Basics:
+
+VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is
+like an answering machine. You can use it for all sorts of things. Most
+VMB systems are dialed though 800 numbers. People call up the VMB system
+that you have a box on, and dial in your box number and then leave you a
+message. Whenever you want to check your box, you just call up, enter your
+password and read your messages. Inside a VMB you can do whatever, you can
+leave messages to others on the system, you can change your 'Out Going'
+message, you can have guest boxes (Explained later), you can have the box
+call your house when you get an Urgent message, you can do a lot of things.
+Infact, on some systems you can even CALL OUT through them, so they can be
+used as a code of sorts! They are cool to have.
+
+
+What Type of System You Should Scan/Hack:
+
+You should scan/hack out Virgin Systems, this is another way of calling a
+system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems
+have the best boxes and the most options that VMB Systems can offer. I will
+be talking about ASPEN System today since I know most about those.
+
+
+Scanning Your 'Virgin ASPEN VMB System':
+
+Okay once you've found your Virgin VMB System, you start to scan. Just incase
+you don't know what scanning is, that means you search for boxes that are
+hackable (Explained later on). Now you dial up the system and when it picks
+up and the bitch starts to talk, press the "#" key. It will then ask you for
+your box number... now there are two different way the ASPEN System can be
+configured: 1) a "3 Digit Box Number System" or 2) a "4 Digit Box Number
+System". Now lets just say this system is a 3 Digit System. Okay, when it
+asks for your Box Number, enter in 999, now it will say one of three things:
+[These are known as 'Greeting Names']
+1. John Doe [Box owners name]
+2. "Box Number 999 Is Not a Valid Box Number"
+3. "Box Number 999"
+Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc,
+but if it says 3, then you are lucky, now it will ask you for your password,
+now you are probably saying 'Shit this is where it gets difficult'... well
+you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords:
+
+* We will use box number 666 as an example box #
+ [ BN = Box Number ]
+
+List of Default Password: Combination Result
+
+ 1-BN 1666
+ BN+1 667
+ 0-BN 0666
+ BN-0 6660
+ Most Common BN 666
+
+Now enter in a those defaults, try JUST the Box Number first, ASPENs usually
+use that most. Now, if you try all those Defaults and still can not get into
+that Voice Mail Box, then that means that the box has been already taken, but
+the owner hasn't changed his 'Generic Message', if you don't get in, you
+will just have to search until you get in.
+
+
+Once You Get Into a Box:
+
+Okay, once you get your first box, *DO NOT* change anything!! That will come
+later. Your first box is, as what is known as a 'Scanning Box'! What you do
+with your Scanning Box is this: You enter "3" from the main commands menu,
+and it will ask you for the box number. Now that command is the "Check for
+Reciept" command, what it does it check Box #xxx for mail from you. This
+command is very convienient for us VMB Hackers. To use that command to your
+advantage, you enter in box a box number and it will say 1 of the three
+'Greeting Names', like before, if it say #3, then you write down that Box
+Number and hack it later. But if it says 1 or 2, then just keep scanning!
+All boxes with the number 3 Greeting Name is known as a 'Hackable Box'.
+Now you keep scanning until you have gone all the way down to Box number 000
+or whatever is the lowest box it supports. Now, once you have your list this
+is when all the fun starts! Now you are ready to hack!
+
+
+Hacking Out Your New Found 'Hackable' Boxes:
+
+Okay this is the easy part. After you spent most of your time by scanning
+the system you should be used to the system and how it works, that should
+make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you
+should know what the default password was for your Scanning Box. Well if the
+password for your Scanning Box was just the Box Number, then *EVERY* other
+hackable box should have the SAME default password. VMB Systems have only
+one default password, If one box has the BN for a Default PW, the all the
+others will too.
+
+Okay, you call up the VMB System will the list of 'Hackable' boxes by your
+side, and when the bitch is talking, press the "#" key. When it asks you for
+your box number, enter in the first box number on your list. When it asks for
+your password, enter in the Default Password Sequence. Now if you don't get
+into that box, it's not a problem, just keep going down your list. You should
+get into a few. But remember, just because a box is marked 'Hackable', it
+doesn't mean you will definatly get into it.
+
+Okay, now you have a few dozen boxes. You can now use you Scanning Box to do
+whatever you please.
+
+
+ASPEN Guest Boxes:
+
+Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes
+are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out
+Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set
+for him, and leave you messages, but not only that, you can leave messages
+to HIM! Which means, if his is in New York, and you are in California, and
+neither of you have codes to call eachother, then you can leave messages thru
+your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes:
+
+0. Main Box - Your Voice Mail Box!
+1. Guest Box #1 - Can Leave & Recieve Messagez
+2. Guest Box #2 - Can Leave & Recieve Messagez
+3. Home Box - Can Leave & Recieve Messagez
+4. Secretary Box - Can Check How Many Messagez You
+ Have & Receive Messagez
+
+
+Hints On Better Scanning:
+
+A lot of people say hacking and scanning for VMBs is too damn hard... well
+that's because they are going at it all wrong, they probably read some lame
+piece of shit text file on Hacking VMBs that was about 500 bytes long. Well,
+here is a small list of hints on better scanning and hacking:
+
+1. Do not use a Voice Mail Box hacking/scanning program
+ (ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..)
+2. Do not hack in random order (ei: B#999, 345, 810, etc)
+ Always hack in order: 999, 998, 997, 996, 995...000.
+3. Try to find out if it's virgin. The newer the System,
+ the better.
+4. If you have a phone with memory dial, change one entry
+ to the number of the VMB System.
+5. Don't hack the System Managers box unless you really
+ want to.
+
+
+Ideas of Things To Do With Your Extra Boxez:
+
+Well since you can have up to 500 extra Voice Mail Boxes, you might
+not know what to do with them, here are a few ideas that can help you out:
+
+1. Give them to friends
+2. Sell them to friends
+3. Offer them to sysops for
+ for better access
+4. Trade them for HSTs or
+ whatever
+5. Use them as a Voice Verifing line (So you don't have to give out
+ your real voice number to BBSes when you apply!)
+
+
+Well, that's it to the Legions of Lucifer Hacking & Scanning Voice Mail Box
+Systems Tutorial! I hope it helped you and I, along with L.o.L wish you the
+best of luck with your new found hobby! And remeber if you found this text
+of any help, please spread it around to help others! Also, if you think you
+are any good at writing H/P, please apply to be a Member! Call the L.o.L Home
+at:
+
+ Digital Hackers Network
+ Legions of Lucifer HeadQuarters/Home
+ No Warez! A truely serious Hack/Phreak board
+ Hack, Phreak, Scanning, Phraud, Crashing disscusions
+ Viral Research & Development Sections (500+ Virii!)
+ "Personalized ANSi Bombs" made by request
+ Running AfterShock v1.20 - 2400 Baud
+ PH: 213-274-1333
+
Call these Legions of Lucifer support boards for information or application
+inquiries:
+
+Digital Hackers Network 213/274+1333 L.o.L HeadQuaters/Home
+Electric Eye ][ 313/776+8928 L.o.L Distribution Site #1
+Digital Information Exchange 612/356+2209 L.o.L Distribution Site #2
+Legions of Lucifer High Office Members:
+
+Prezident/Founder: Wave Runner!
+Vice Prezident : Count_Zer0
+
+ This text file is (C)Copyrite 1990 L.o.L Inc.
+ L.o.L is a registered trademark of DHN, All rights reserved
+ Any modifications to this text file is a violation of copyrite.
+ Digital Hackers Network 213/274+1333 -=L.o.L Home=-
+
+
diff --git a/textfiles.com/phreak/VOICEMAIL/lol12.txt b/textfiles.com/phreak/VOICEMAIL/lol12.txt
new file mode 100644
index 00000000..e91ee61f
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/lol12.txt
@@ -0,0 +1,210 @@
+The THC Hack/Phreak Archives: LOL12.TXT (205 lines)
+Note: I did not write any of these textfiles. They are being posted from
+the archive as a public service only - any copyrights belong to the
+authors. See the footer for important information.
+==========================================================================
+
+Hacking & Scanning Voice Mail Boxes: The Tutorial
+
+Hello again, and welcome to another œegions “f œucifer text phile! This
+text file has to do with hacking and scanning VMBs. The reason I am writing
+this phile is because I am very good at it, and have had years of experience.
+Infact I have been called by MCI for screwing them over by attacking and
+taking over a whole damn system with a few friends of mine.
+
+Anyways, hacking VMBs is very simple and basically safe, and not only that
+but they are kewl to have around. You can give them to friends, you can
+trade them for access on bulletin boards, or you can use it for yourself.
+As for this 'Tutorial on Hacking VMBs', we will be talking about what systems
+to hack, how you go about hacking them, default passwords, hints on better
+scanning, and having your very own box.
+
+
+Basics:
+ÄÄÄÄÄÄ
+
+VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is
+like an answering machine. You can use it for all sorts of things. Most
+VMB systems are dialed though 800 numbers. People call up the VMB system
+that you have a box on, and dial in your box number and then leave you a
+message. Whenever you want to check your box, you just call up, enter your
+password and read your messages. Inside a VMB you can do whatever, you can
+leave messages to others on the system, you can change your 'Out Going'
+message, you can have guest boxes (Explained later), you can have the box
+call your house when you get an Urgent message, you can do a lot of things.
+Infact, on some systems you can even CALL OUT through them, so they can be
+used as a code of sorts! They are cool to have.
+
+
+What Type of System You Should Scan/Hack:
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+You should scan/hack out Virgin Systems, this is another way of calling a
+system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems
+have the best boxes and the most options that VMB Systems can offer. I will
+be talking about ASPEN System today since I know most about those.
+
+
+Scanning Your 'Virgin ASPEN VMB System':
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+Okay once you've found your Virgin VMB System, you start to scan. Just incase
+you don't know what scanning is, that means you search for boxes that are
+hackable (Explained later on). Now you dial up the system and when it picks
+up and the bitch starts to talk, press the "#" key. It will then ask you for
+your box number... now there are two different way the ASPEN System can be
+configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital Box Number
+System". Now lets just say this system is a 3 Digit System. Okay, when it
+asks for your Box Number, enter in 999, now it will say one of three things:
+[These are known as 'Greeting Names']
+1. John Doe [Box owners name]
+2. "Box Number 999 Is Not a Valid Box Number"
+3. "Box Number 999"
+Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc,
+but if it says 3, then you are lucky, now it will ask you for your password,
+now you are probably saying 'Shit this is where it gets difficult'... well
+you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords:
+
+* We will use box number 666 as an example box #
+ [ BN = Box Number ]
+
+List of Default Password: Combination Result
+
+ 1-BN 1666
+ BN+1 667
+ 0-BN 0666
+ BN-0 6660
+ Most Common Äį BN 666
+
+Now enter in a those defaults, try JUST the Box Number first, ASPENs usually
+use that most. Now, if you try all those Defaults and still can not get into
+that Voice Mail Box, then that means that the box has been already taken, but
+the owner hasn't changed his 'Generic Message', if you don't get in, you
+will just have to search until you get in.
+
+
+Once You Get Into a Box:
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+Okay, once you get your first box, *DO NOT* change anything!! That will come
+later. Your first box is, as what is known as a 'Scanning Box'! What you do
+with your Scanning Box is this: You enter "3" from the main commands menu,
+and it will ask you for the box number. Now that command is the "Check for
+Reciept" command, what it does it check Box #xxx for mail from you. This
+command is very convienient for us VMB Hackers. To use that command to your
+advantage, you enter in box a box number and it will say 1 of the three
+'Greeting Names', like before, if it say #3, then you write down that Box
+Number and hack it later. But if it says 1 or 2, then just keep scanning!
+All boxes with the number 3 Greeting Name is known as a 'Hackable Box'.
+Now you keep scanning until you have gone all the way down to Box number 000
+or whatever is the lowest box it supports. Now, once you have your list this
+is when all the fun starts! Now you are ready to hack!
+
+
+Hacking Out Your New Found 'Hackable' Boxes:
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+Okay this is the easy part. After you spent most of your time by scanning
+the system you should be used to the system and how it works, that should
+make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you
+should know what the default password was for your Scanning Box. Well if the
+password for your Scanning Box was just the Box Number, then *EVERY* other
+hackable box should have the SAME default password. VMB Systems have only
+one default password, If one box has the BN for a Default PW, the all the
+others will too.
+
+Okay, you call up the VMB System will the list of 'Hackable' boxes by your
+side, and when the bitch is talking, press the "#" key. When it asks you for
+your box number, enter in the first box number on your list. When it asks for
+your password, enter in the Default Password Sequence. Now if you don't get
+into that box, it's not a problem, just keep going down your list. You should
+get into a few. But remember, just because a box is marked 'Hackable', it
+doesn't mean you will definatly get into it.
+
+Okay, now you have a few dosen boxes. You can now use you Scanning Box to do
+whatever you please.
+
+
+ASPEN Guest Boxes:
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes
+are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out
+Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set
+for him, and leave you messages, but not only that, you can leave messages
+to HIM! Which means, if his is in New York, and you are in California, and
+neither of you have codes to call eachother, then you can leave messages thru
+your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes:
+
+0. Main Box - Your Voice Mail Box!
+1. Guest Box #1 - Can Leave & Recieve Messagez
+2. Guest Box #2 - Can Leave & Recieve Messagez
+3. Home Box - Can Leave & Recieve Messagez
+4. Secretary Box - Can Check How Many Messagez You
+ Have & Recieve Messagez
+
+
+Hints On Better Scanning:
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+A lot of people say hacking and scanning for VMBs is too damn hard... well
+that's because they are going at it all wrong, they probably read some lame
+piece of shit text file on Hacking VMBs that was about 500 bytes long. Well,
+here is a small list of hints on better scanning and hacking:
+
+1. Do not use a Voice Mail Box hacking/scanning program
+ (ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..)
+2. Do not hack in random order (ei: B#999, 345, 810, etc)
+ Always hack in order: 999, 998, 997, 996, 995...000.
+3. Try to find out if it's virgin. The newer the System,
+ the better.
+4. If you have a phone with memory dial, change one entry
+ to the number of the VMB System.
+5. Don't hack the System Managers box unless you really
+ want to.
+
+
+Ideas of Things To Do With Your Extra Boxez:
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+Well since you can have up to 500 extra Voice Mail Boxes, you might
+not know what to do with them, here are a few ideas that can help you out:
+
+1. Give them to friends
+2. Sell them to friends
+3. Offer them to sysops for
+ for better access
+4. Trade them for HSTs or
+ whatever
+5. Use them as a Voice Verifing line (So you don't have to give out
+ your real voice number to BBSes when you apply!)
+
+
+Well, that's it to the œegions “f œucifer Hacking & Scanning Voice Mail Box
+Systems Tutorial! I hope it helped you and I, along with œ.“.œ wish you the
+best of luck with your new found hobby! And remeber if you found this text
+of any help, please spread it around to help others! Also, if you think you
+are any good at writing H/P, please apply to be a Member! Call the œ.“.œ Home
+at:
+
+ Digital Hackers Network
+ œegions “f œucifer HeadQuarters/Home
+ No Warez! A truely serious Hack/Phreak board
+ Hack, Phreak, Scanning, Phraud, Crashing disscusions
+ Viral Research & Development Sections (500+ Virii!)
+ Running AfterShock v1.20 - 2400 Baud
+ PH: 213-274-1333
+
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+Call these œegions “f œucifer support boards for information or application
+inquiries:
+
+Digital Hackers Network 213/274+1333 œ.“.œ HeadQuaters/Home
+Electric Eye ][ 313/776+8928 œ.“.œ Distribution Site #1
+Digital Information Exchange 612/356+2209 œ.“.œ Distribution Site #2
+ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
+ This text file is (C)Copyrite 1990 œ.“.œ Inc.
+ œ.“.œ is a registered trademark of DHN, All rights reserved
+ Any modifications to this text file is a violation of copyrite.
+ Digital Hackers Network 213/274+1333 -=œ.“.œ Home=-
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
diff --git a/textfiles.com/phreak/VOICEMAIL/phonhack.txt b/textfiles.com/phreak/VOICEMAIL/phonhack.txt
new file mode 100644
index 00000000..d5992b8c
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/phonhack.txt
@@ -0,0 +1,330 @@
+ Hacking Telephone Answering Machines
+
+by Doctor Pizz and Cybersperm
+
+******************************************************************************
+DISCLAIMER: The following is for informational purposes only. All information
+provided is simply to point out how easy it is to access such a system. The
+author accepts no responsibility for irresponsible use of this knowledge, and
+it is provided solely so people can be aware of the low security of such
+systems. (Now that I'm off the hook in case you do something stupid...).
+******************************************************************************
+
+
+ It seems that lately there is very little discussion of one of the most
+simple but useful and rewarding forms of electronic information gathering,
+hacking the telephone answering machine. Almost everyone has one of these
+wonderful devices these days, to catch important messages while they are away
+from their phones, or to screen important telephone calls. Nowadays, they
+typically have the added advantage of being accessible from remote telephones,
+so one needs to simply call his or her answering machine, enter their secret
+code, and then either retrieve new messages, or listen to anything they had
+previously recorded on the incoming messages tape, or perform any of a set of
+additional functions determined by which key they press on their touch tone
+phone. They also typically ignore the fact that virtually anyone else can
+gain access to their messages by entering the appropriate code. Hence this is
+a wonderful system to gather information from anyone without their knowledge,
+especially if they are technologically illiterate.
+
+ For the most part, there are two main types of "electronic password"
+used by these systems. They are amazingly simple to crack, as they are
+typically only 2-digit or even 1-digit numbers!!!!!! On some machines, the
+code must be entered before the outgoing message is over, on others, it must
+be entered after the outgoing message, and on more sophisticated models, it
+can be entered at any time.
+
+
+MODERN 2-DIGIT PASSCODE SYSTEMS:
+
+ These are the most common systems in use today, typically made by
+Panasonic, AT&T, etc. In these systems, the code can be entered before during
+or after
+the beep tone. For security reasons, we recommend BEFORE the beep tone, so
+your intrusions are unnoticed... We will begin by discussing how to identify
+the passcode.
+
+
+ Now, the question of how to hack their code. Well, this is so simple,
+you don't even need a computer to do it. You can just enter all 2-digit
+combinations until you get the right one (usually signalled by a series of
+beeps on the other end). A relatively crude way was to enter each number in
+sequence 01, 02, 03, 04,...,99. This works, but may take too long to enter
+all numbers within the 20-30 second window we typically have before the beep
+(The best time to play arounnd, as any tones entered after the beep will be
+recorded on his incoming messages tape, and could let him know something is
+up...). It is also important to stop as soon as you hit the right number, as
+the additional entered numbers may be interpreted by the answering machine as
+codes, and cause you to delete all their messages, or record a new greeting,
+etc. That is really asking for trouble, and may cause them to try and change
+their password (though it's usually only possible to choose from a range of
+three consecutive numbers anyway...). Still, you need to be careful not to
+let them catch on, eh?
+
+ A more sophisticated and fast way to do this is to take advantage of the
+fact that such machines typically do not read two numbers at a time, and
+discard them, but just look for the correct sequence, reading one at a time.
+In other words, you can enter all 100 possible codes with roughly 1/2 the
+number of keystrokes. Just enter as follows:
+
+0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9,etc.
+
+By reading in one phase we get:
+
+0 0,1 0,2 0,3 0,4 0,5 0,6 0,7 0,8 0,9 1,1 2,1 3,1 4,1 5,1 6,1 7,1 8,1 9,etc.
+
+In the other phase we get:
+
+ 0 1,0 2,0 3,0 4,0 5,0 6,0 7,0 8,0 9,1 1,2 1,3 1,4 1,5 1,6 1,7 1,8 1,etc.
+
+So by proceeding as follows we enter the following matrix sequentially,
+encompassing all possible 2 digit numbers:
+
+
+0 0 1 0 2 0 3 0 4 0 5 0 6 0 7 0 8 0 9
+ 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9
+ 2 2 3 2 4 2 5 2 6 2 7 2 8 2 9
+ 3 3 4 3 5 3 6 3 7 3 8 3 9
+ 4 4 5 4 6 4 7 4 8 4 9
+ 5 5 6 5 7 5 8 5 9
+ 6 6 7 6 8 6 9
+ 7 7 8 7 9
+ 8 8 9
+ 9 0
+
+The last zero is important, as it completes the cycle, and allows for the code
+9 0, which is the only one not as yet allowed for. I must emphasize the
+importance of quitting as soon as you get the correct code, and also do not
+keep going after the beep, if you are on a modern 2-digit access code system.
+This way, you can record the passcode for your future reference, and prevent
+detection.
+
+ Now, we shall get on to the question of how to use their system, once
+you've broken in. In general, it is recommended to obtain a copy of the
+owners' manual for various machines, but I have summarized some of the basics
+below.
+
+PANASONIC
+
+Here are the codes for a Panasonic Easa-phone KX-T1450. The KX-T2420 is
+identical without Room Monitor function In this case, strange things happen
+when you enter 5:
+
+1 = Back Space (Rewind the OGM tape)
+2 = Skip Forward (Fast forward the OGM tape)
+3 = Reset (Go back to the beginning of the OGM tape. MAY CAUSE ERASURE!!!)
+4 = Memory Playback (Listen to new messages)
+5 = Room Monitor (!!!! Listen to what is going on in the room NOW !!!!)
+ (This is only available on some models... But, try it...)
+7 = OGM-REC (Record a new greeting!!!)
+9 = OGM-STOP (Stop recording the new greeting)
+* = OGM Skip (Don't Listen to the OGM)
+0 = Turn off the machine !!!!!
+
+To set to the answer mode remotely,
+ 1. Dial the phone number
+ 2. Wait 15 rings and hang up
+
+To turn off the unit remotely (!!),
+ 1. Dial the phone number
+ 2. Push the code number, wait for the beep, enter 0, and hang up. Panasonic answering machines also respond to the user with a series of
+codes which I will now outline. If you hear something different, you may not
+be on a Panasonic system.
+
+1 long beep : This is the "beep" after which people can leave their messages.
+
+ Also, this is sounded when the correct passcode is entered from
+
+ a remote telephone. (Same sound- Hint for software developpers)
+ It sounds when the tape has fully rewound, and after each
+
+ message is played back in entirety.
+3 short bps : This sounds after the last message has been played back.
+
+2 short bps : (10 seconds later) You are then being recorded - marker message
+
+6 short bps : End of the incoming message tpe
+
+6 short bps : (Quickly) Tape Broken (either incoming or outgoing)
+
+Also, after entering the correct code, and after the one long beep, you will
+hear n additional short beeps, where n is the number of new messages since the
+last time the messages were retrieved. Remember, you can listen to earlier
+ones on the same tape, by additionally backspacing from the first new message.
+
+Anyway, that is a basic summary of the Panasonic answering machine system for
+this machine. Many machines unfortunately do not have the Room monitor
+function, so you can not see if you left your TV on, or anything like that...
+Also, not all systems are identical, but on Panasonic machines, the numbers 1-
+4 are the same, so this is the most important thing for you to remember
+anyway...
+
+
+
+AT&T
+
+On AT&T machines, like the Answering System 1304, the passcode is again a 2-
+digit number enterable before, during, or after the beep. Follow the same
+guidelines as above.
+
+After you enter the correct code on these machines, the system will
+automatically begin to play back new messages. This is one key way to
+distinguish these machines from the Panasonic ones discussed above.
+
+To summarize the key functions for the AT&T system, look below:
+
+2 Rewind tape (tape rewinds for as long as this key is depressed)
+3 3 Clear messages (reset the tape to the beginning.)
+5 Fast Forward (tape ffwds for as long as this key is depressed)
+7 Replay messages from the beginning
+8 8 Turn off the answering machine
+* Record a memo (After listening to messages) OR
+ Skip the greeting (w/o entering code)
+0 Turn on the machine (after hearing two beeps)
+# Pause (for 5-7 seconds)
+
+Basically this system is less sophisticated than the Panasonic. You cannot
+change the OGM remotely (Damn!). As seen above, the codes are also quite
+different, but fortunately they are easily distinguished by how they answer
+after the security code is entered. The AT&T plays the messages, while the
+Panasonic just beeps to tell you how many new messages are waiting. Here
+also, the rewind and fast forward functions operate for the length of time you
+depress the 2 and 5 keys respectively. On the Panasonic, they reewind or fast
+forward for 15 seconds. Also, this system has a pause feature. By entering
+the # sign, you can pause for a few seconds while listening to a message. One
+extra safety (from your perspective...) feature is that on this system you
+cannot erase messages until they have all played back, so you have less risk
+of fucking up someone's system if it is an AT&T. You cannot change his
+greeting, and it is difficult to accidentally erase his messages. If you wish
+to do so, however, you must hit the 3 key twice after listening to the
+messages in their entirety. To record a memo (why would you want to do
+this???), you can press the * key after you hear 5 beeps (after listening to
+the messages). Then begin to record. Also, the * key can be used before the
+message is finished to skip listening to the OGM (useful for long distance
+callers who are actually paying for the calls...) without the need for
+entering a security code. To turn on the system from remote points, you need
+to let it ring ten times, and after it answers with 2 "beeps", hit the 0 key.
+It will subsequently be on. Similarly to turn it off, just enter 88. If the
+machine answers the phone with no greeting, and just 2 beeps, it means the
+tape is full. You can now enter the security code (without risk of them
+recording the BEEPS!!!) and listen away for a long time!!! Basically, this
+sums up the properties of the two most common systems I've encountered of the
+2-digit passcode variety.SINGLE DIGIT PASSCODE MACHINES:
+
+ On some old model Panasonic and Phone Mate systems, the secret entry
+passcode is only a one digit number(!!!). On these primitive systems, one
+merely enters the correct number, during the message, and playback begins.
+The other codes are simple to derive, and just for the sake of making this
+hobby a sport, I will not give details for these systems. It is easy enough
+to figure them out, and on these systems, it is hard to screw things up, as
+there is little you can do anyway.
+
+APPLICATIONS:
+
+ This can be a rewarding adventure if you decide to follow those
+instructions (though far be it from me to suggest you to do this...). I will
+point out some of the potentially entertaining, useful, and/or informative
+applications of this technology.
+
+ As the true weirdos that we are, we shall begin with what we consider
+the truly entertaining applications... If you have ever read the Village
+Voice, Screw or other such newspaper, you will notice a large number of
+advertisements for "unlicensed massage parlors", "Oriental relaxation spas",
+"Escort services", etc. Call some of those numbers, preferrably at off-duty
+hours (6-9 AM??) and try to hack their answering machine codes, listen to
+their messages, and let the fun begin. You can hear lots of perverts, and
+lowlifes making appointments for "services" about which they are sometimes
+graphic. Also, they often leave telephone and credit card numbers (What
+fun!!!). In case they are married, think of the blackmail potential...
+
+ Further, these "adult entertainment companies" also often run help
+wanted ads in the Village Voice, and other such publications. Call these, and
+you will get a plethora of phone numbers for nubile young women who might
+believe you are the proprietor of the establishment in question. You might be
+able to con some "free samples" as a sort of "job interview"... (hehehe)
+Especially given the illegal activity they desire to become involved in, they
+will be in no position to complain when they find out you are not for real...
+Also, this way, the girls are often not so jaded as the old pros... They will
+be trying to impress you if you get my drift, so you'll "hire" them.
+
+ Other similar companies can be hacked to get similar entertaining and
+enjoyable results. In many cases, the outcomes can be QUITE LUCRATIVE in one
+way or another... I do not advocate that you do these things, but I just want
+to point out what COULD be done...
+
+ Let us move on to the informative espionnage type of application of this
+technology. One could very easily use this technology to listen to the
+messages of friends, and see what they are up to. If you are trying to call
+your buddy Evan, and he isn't home, perhaps you can find out where he is by
+going through some of his old answering messages. Say, Eric called him a
+couple of hours ago and suggested that Evan come over to his place for some
+beers. Well, you could then call Eric and voila, you may connect with Evan.
+
+ Now, let us assume you have a girlfriend, and you suspect she might be
+cheating on you, yet you do not wish to confront her about it without any
+evidence, or certainty of her cheating. Well, her new beau probably thinks
+her answering machine is secure, and calls leaving messages about their
+upcoming dates, or various discussions of their relationship. If you can hack
+her machine {actually, you might even look at the bottom (where the passcode
+is usually printed...) to save time and energy.} you will be afforded with a
+plethora of potentially incriminating evidence. Hehehe.
+
+ A similar application can be when you have a new love interest. Suppose
+there is some woman you are interested in, but you aren't sure if she is
+available. A little phone answering machine surveillance can provide all of
+the answers, and then some... In case she asks her friends about you, you'll
+know everything she does. Also, you will learn details about her life, and
+schedule, the better to run into her "accidentally", or strike up a
+conversation about "common" interests...
+
+ Now, if you know someone in the same profession, say musicians, and you
+call his answering machine, and hear someone offering him a gig. You could
+call that person back, and accept the gig in your name, saying the originally
+called musician was unavailable, but suggested that you call. Then be sure to
+erase the original message on your buddy's machine. He'll never be the wiser,
+and you'll get more work. Though he may wonder why he isn't getting much work
+anymore...
+
+ Millions of applications exist, and if you have any additional
+suggestions, please leave them with us. We can be reached on several BBS'es,
+in 212, 718, and 914 area codes. Thanks. Also, if you have information on
+other answering machine systems, please pass it along...
+
+ Again, in closing, we reiterate that the authors take no responsibility
+for the misuse of this information. The ideas for applications were presented
+for informational and entertainment purposes only, and we do not encourage you
+to try any of the above suggestions. Remember, listening to the pass-code
+protected messages of others constitutes an invasion of privacy, and may be in
+violation of state and federal laws.
+
+******************************************************************************
+
+ANOTHER FINE PIZZ-SPERM T-FILE...
+
+Please upload this file to other fine BBS'es, and give credit to the original
+authors, Doctor Pizz and Cybersperm, of the TUBA crew.
+
+******************************************************************************
+
+
+ ***************************************************************
+ * *
+ * Another Fine File From the libraries of the TUBA crew. *
+ * *
+ ***************************************************************
+
+ ____ _______ *
+ / \ ___ ___ ____ ___ ___ / / ___ ___
+ / // // / / // / /______/ / / /
+ / // // / / //-< / / / /
+ /_____//__//__ / /__// / / / /__ /__
+
+ -N-
+
+ CCCC Y Y BBB EEEE RRR SSSS PPP EEEE RRR M M
+ C Y Y B B E R R S P P E R R MM MM
+ C Y BBB EEE RRR SSSS PPP EEE RRR M M M
+ C Y B B E R R S P E R R M M M
+ CCCC Y BBB EEEE R R SSSS P EEEE R R M M M
+
+
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/VOICEMAIL/phreak8 b/textfiles.com/phreak/VOICEMAIL/phreak8
new file mode 100644
index 00000000..b0965aa9
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/phreak8
@@ -0,0 +1,103 @@
+ 3RD PARTY FRAUD & VOICE MAIL SYSTEMS
+ ============================================================================
+
+ 3rd Party Dialing was first brought to my attention when it was listed
+on my telephone bill. I was billed by some person(s) without my authorization.
+This happened about 3 times on the same bill, and all of the times I got the
+charges dropped.
+
+ A few weeks later, after paging through the telephone book for downtown
+prefixes, I noticed information on 3rd Party Calling, which included:
+
+HOW TO PLACE 0+ CALLS
+
+Third-Number Calls
+
+1. Dial "0" + Area Code (if needed) + telephone number.
+
+2. If you hear a tone, ignore it, and a billing operator will come
+ on the line.
+
+3. Tell the operator you are placing a third number billed called.
+
+4. Give the Area Code and telephone number you with the charges billed to.
+
+5. The operator will call that number to verify acceptance of the charges
+ on calls from coin pay phones. No verification on calls from
+ non-coin pay phones.
+
+ The line that caught my eye was like #5. This line pointed out that calls
+from pay phones had to be verified, while non pay phones needed no
+verification.
+
+ With experience, I found out that sometimes there is nothing a person can do
+about unauthorized 3rd Party Calls billed to a another person's number. A lot
+of the times, the operator you call to complain to will simply tell you there's
+nothing they can do.
+
+ With this in mind, I realized that you could bill a call to anybody's number
+and get away with it, and no charges directed to you. Although, as many of you
+know by now...this not safe. For one, you are directing attention to yourself
+as a Fraudist/Phreak. Secondly, on the person's bill that your billed the 3rd
+Party Call to...that person has your number and where you called. Bell can
+also use that information to take action if they feel it necessary.
+
+ One alternative would be to complete a 3rd Party Billed Call from a pay
+phone. This however brings up a question. Who is going to accept the charges
+if you don't want to pay for it in any way?
+
+Here is what I came up with for 3rd Party Calling Fraud:
+
+ First, you need a (VMS) Voice Mail System/Box. You need a Centragram or
+PhoneMail type VMS to handle the call. The reason you need these types of
+VMS's, is because Centragram/PhoneMail type VMS's are direct dial. You don't
+have to enter a process extension number such as 8509. These types of VMS's
+bring you directly to the box.
+
+ You don't know what Voice Mail Systems are? Look for a file. But, here's a
+layman's description of VMS's. You can say that VMS's are distance answering
+services. They are usually set up in other prefixes you can dial in/directly
+on to. They include instructions on how to use them, and have system
+passwords. In respect, they are electronic mail devices...only they use voice
+communications instead. You can find these by scanning, if you have one local.
+
+ Anyways, having a VMS handy...reset your System Greeting to say: "HELLO"
+Pause for approximately 5-6 seconds...then say casually, "YEAH SURE."
+In between the HELLO and YEAH SURE, the billing operator will say something
+like, "JOHN DOE IS BILLING A CALL TO YOUR NUMBER, WILL YOU ACCEPT THE CHARGES?"
+
+ Now go to a pay phone and dial any number anywhere you want, in this
+format: 0+612+555+1212. Ignore the tone you hear for calling card holders,
+and wait for an operator to come on. The operator will announce her/his-self
+as a billing operator and ask you how he/she can help you on billing the call.
+Tell the operator, "THIS IS A 3RD PARTY CALL, MY NAME IS JOHN." Include a last
+name if you wish, but it's not necessary. No real names of course also. The
+operator will call the VMS and he/she will hear the previous recording of you
+saying "HELLO" etc.
+
+ After the operator hears an affirmative from the VMS...the operator will say
+thank you, then put the call through. The only person that gets billed for
+the call is the business/person that owns the VMS that you used by hacking the
+default password.
+
+ I've found out that you can dial overseas, and anywhere in the United States
+this way, with no problems or bad connections. If you have a portable computer
+with an acoustic couple...you can go online. It would be suggested to do this
+in a car, so as not to draw attention during the day. I've tried to set up a
+conference by the 800 Conference Operator and requesting to set up a
+conference. You have to give her the person's numbers and names you want to
+conference with...and the number you want to conference billed to. The
+operator will verify this if you are at a pay phone. I have figured out what
+the Conference Operator asked the 3rd Party as of yet...to time the responses
+preset on the VMS, but if anyone can, it would prove to be very useful.
+
+ Another technique might be to bill 976's to your VMS if you into that.
+Again, you need to attempt to time the perfect responses to the operator's
+questions to the 3rd Party.
+
+ *A Word of Warning*: In most cases, the Operator you handle the 3rd party
+call with will stay on the line. So it's good to have a conversation with
+yourself on the VMS for about 30 seconds after connection if you are making a
+collect call to the VMS.
+
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/VOICEMAIL/tollfree.txt b/textfiles.com/phreak/VOICEMAIL/tollfree.txt
new file mode 100644
index 00000000..b49a5a69
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/tollfree.txt
@@ -0,0 +1,23 @@
+
+Toll-Free Answering Services
+
+
+Allied Toll-Free Service Bureau(ask for oper 526) 800-824-7888
+American Discount Dialing System 800-227-1617 (CA 800-852 7777)(CA800-772-3545)
+Dialog Marketing 800-447-4700 (IL 800-322-4400)
+Direct Marketing Services Inc. 800-223-1944
+Executive Locator 800-323-6556
+H Q Co 800-227-3004 (800-652-1848)
+National Communications Center Inc. 800-824-5120 (CA 800-525-7711)
+National Data Corperation 800-257-9611
+National Switchboard 800-528-6052
+Nice-National Instant Consumer Exchange 800-453-9000
+Operator 800 800-448-4511 (NY 800-962-1480)
+Ring America 800-621-5199
+Share-a-Wats Inc. 800-854-2003
+Skycall 800-631-5488 (NJ 800-352-4951)
+Team Telephone 800-228-5000
+Tel-Com Message Service 800-451-4453 (VT 800-622-4429)
+Teletrak Response Center 800-328-5257
+USA 800 800-821-2280 (MO 800-892-7655)
+
diff --git a/textfiles.com/phreak/VOICEMAIL/unt-att1.txt b/textfiles.com/phreak/VOICEMAIL/unt-att1.txt
new file mode 100644
index 00000000..7ec48471
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/unt-att1.txt
@@ -0,0 +1,62 @@
+ÚÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄijÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄijÄÄÄÄÄÄÄÄÄÄÄÄÄ¿
+³UNTOUCHABLES! ßßßßßßÛÛßßßÛÛÛÛÛÛÛßß ³[File Name]: UNT-ATT1.ZIP ³ Difficulty ³
+³ ÜÜÜ ÜÜÜÜÜÜ ßßÛÛÛÝßß ³[Writer] : Aoflex ³ ³
+³ ßßßÛ ßßßßßÛÛÛ ÞÛÛÛ ³[Packager] : Karma Sutra ³ [ ] 0 ³
+³ ÛÛÛÝ Û ÞÛÛÛ ÞÜÜ ÜÜÛÝ ³ ³ [X] 1 ³
+³ ÞÛÜÜ ÛÛÜ ÜÜÜÝ ÛÛÛ ßÛÛÛ ³[Description]: Hacking ³ [ ] 2 ³
+³ ÛÛÛÝ ÜÛÛ ÞÛÛÛ ÞÛÛÝ ÛÛÛÝ ³At&t Answering Machines. ³ [ ] 3 ³
+³ÞÛÛÛ ÛÛ ÛßÛÝ ÛÛÛ ÞÛÛÛ ³ ³ [ ] 4 ³
+³ÛÛÛÜÜÜÛÛÛ ÞÛÛÛ ÞÛÛÝ ÛÛÛÝ 1996! ³[Date]: 06/18/96 ³ [ ] 5 ³
+ÀÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄijÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄijÄÄÄÄÄÄÄ-ÄÄÄÄÄ
+
+
+1. Dial the telephone that is being answered by an AT&T Answering Machine.
+2. When the machine answers, quickly enter the following:
+
+ 1234567898765432135792468642973147
+ 4193366994488552277539596372582838
+ 491817161511026203040506070809001
+
+3. The messages should start playing after this.
+4. Here is a short list of common AT&T Answering Machine comands:
+
+
+Message Commands:
+-----------------
+
+Review Messages: 7
+Locate New Messages: 6
+Stop: #
+Rewind Messages: 2
+Clear Messages: 3, 3
+
+Announcement Commands:
+---------------------
+
+Record New Announcement: 4, *
+Play Current Announcement: 4, 1
+
+System Commands:
+----------------
+
+Turn System On: 0
+Turn System Off: 8, 8
+
+
+
+Please Note: The easiest way to play the numbers to the answering
+ machine would be program them in your phone's memory dialing
+ setup.
+ ________ _ _
+ /|/| | __ ____ _ _ ____ _ __ ___ _ ____/ ________ _ _ . .
+ /| | | |/ |/| _| \/| | |/ __\|| |/ \| \| || ___| |__
+ || | | | | || | || | | /|| | | /| || __||__ |
+ || \| | | | || | | \| | \_|_|| | || | \| ||_ \____| |
+ |/\____|_|___||_|\__/\____|\____\|_|_||_|___/|____|_______|
+ \/___/_//__//_/\/_/\/___/\/____/_/_//_//__//____//__/___/
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+ ARRESTED DEVELOPMENT II - UNT WORLD HEADQUARTERS - 410-720-5305
+ BLACK OPIUM - UNT CENTERAL HQ - 701-523-5909
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+
diff --git a/textfiles.com/phreak/VOICEMAIL/vmb.rl b/textfiles.com/phreak/VOICEMAIL/vmb.rl
new file mode 100644
index 00000000..24dfbd30
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/vmb.rl
@@ -0,0 +1,124 @@
+ R e n e g a d e L e g i o n
+ T e c h n i c a l R e p o r t s
+
+
+
Technical Report #3
+
+ ....
+ ........
+ .........
+ ... ....
+ ... ....
+ .....
+ ....
+ ....
+ ... ...
+ ... ...
+ .. ...
+ ...
+
+ February 1991
+
+
+RL HQ - 617.623.7151
+
+VMB Hacking
+-----------
+
+Written By: The Knight
+
+
+
+Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
+a great deal of 'hidden info' that isn't common sense. But, If you are out
+there trying to hack a box and can't, follow through the VERY logical and
+simple steps and make sure they are matching up.
+
+
+Step 1:
+
+Finding a VMB System
+
+There are many ways you can find a VMB system, for instance, on a BBS when
+someone says 'Here are some systems' usually thats what they're referring
+to. Also, Try setting up your scanner and listening for 'Welcome to XX
+company, Enter extension #' or something similar to that. Then you have
+found a VMB system.
+
+
+Step 2:
+
+Finding a Box
+
+This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
+You must make sure that no one is using it. There are several ways to do
+this. One EASY way is when you hack it, check the date on the latest
+messages, if they are OVER a month old, then I'd say your safe to use them.
+Also, watch in case there is just like _2_ messages in there from the last
+4 months that those messages could be messages sent to ALL the boxes, see if
+they sound personal. If they DON'T, then grab the box.
+
+Let's say there's a box you REALLY want bad and someone's using it regularly,
+try doing this: Go in twice a day (make SURE you DON'T change the greeting
+etc.) and erase all the messages. He will complain and will eventually move
+out of the box. Then there is a good chance of you having that box. It's
+happned to me.
+
+
+Step 3:
+
+Hacking the VMB
+
+This is the most SIMPLE part of all. MY general method is as follows:
+
+Find a box, let's say box 260. It's empty and I want it (obviously).
+First, try passcode '000', if that doesn't work, try passcode '260',
+just make very general guesses that's ALL. Some of the MOST Common passcodes
+are:
+
+3 digit boxes:
+000
+123
+111
+222
+333
+444
+555
+666
+777
+888
+999
+box # (say it's box 260, passcode: 260)
+321
+
+4 digit boxes:
+
+1234
+0000
+1111
+2222
+3333
+4444
+5555
+6666
+7777
+8888
+9999
+box # (Say its box 1200, try passcode: 1200)
+
+
+The Key: REALLY try ALL of those. I knew one system with a passcode of
+ '5555' and NO ONE could hack it. And I did. So don't give up.
+ UNLESS you've exhausted all of those possibilities. Then forget
+ it.
+
+That's it really. The most simple thing to do. Just remember not to
+give up before you should and also try 3 digit passcodes on 4 digit
+boxes. Also, once you get in for added security, a lot of these boxes
+allow more digits for passcodes, so make a 5 digit passcode. Or if you
+thing its worth it, try like '00000' so that's really about all.
+
+Have fun and don't stop.
+
+
+
diff --git a/textfiles.com/phreak/VOICEMAIL/vmb.txt b/textfiles.com/phreak/VOICEMAIL/vmb.txt
new file mode 100644
index 00000000..d7b6f183
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/vmb.txt
@@ -0,0 +1,82 @@
+
+
+
+ _____ __ __ ____ _ _ ______ ____ __ __
+| __ \ | | | | / _ | | \ | | |__ __| / __ | \ / |
+| | \ | ||___|| | / | | | \ | | || | / \ | | \ / |
+| | | | | ___ | | | | | | \| | || || || | |\ \/ /| |
+| |__/ | || || | \_| | | |\ | || | \__/ | | | \ / | |
+| ___/ |__| |__| \____| |_| \__| |__| \____/ |_| \/ |_|
+| |
+| | N E T W O R K S P R O D U C T I O N
+|_|
+
+
+ Voice Mail Made Easy
+
+ by HAGAR
+ CoSysop and PHREAK Sigop, Phantom Networks
+
+
+Voice Mail Boxes, yes, VMB's. They seem so trivial to the advanced phreak yet
+most beginners find them very fascinating. They often make a habit of begging
+other people for them. A real pain in the ass.
+
+I am not a studly VMB hacker. VMB's should not encompass your entire phreak
+activities, as they really can be a waste of time. This article is just the
+basiic guidelines for attaining a VMB.
+
+[1] Find a system. The easiest way to do this is to just find
+ a codeline.
+
+[2] Get in good with the codeline operator. If you continuously
+ post shit he will get to like you..
+
+[3] Ask him where you can find empty boxes on the system. If he
+ readily complies ask if he might know the system default (more
+ on this later)
+
+[4] Scan for an empty box. You will know that you have hit
+ an empty when it says "Box XXXX, Please leave your message
+ after the tone.." You now have your empty box.
+
+[5] Hack the box. In order to do this you will need to find the
+ point where it says "Enter your password". On some systems you
+ will have to enter pound (#) as soon as you log in. It will
+ then ask for your box number (the empty one you just scanned)
+ and then your password. Try defaults (again, see below). Some
+ systems will require you to enter the box by calling up the
+ box in a regular manner, and during the greeting hit star (*).
+ You will then be asked for your password.
+
+
+[Defaults]
+
+Some systems have a certain password that is used for all empty boxes. Many
+times this password will be "1234" or the box number. Here is where you get
+creative. The password COULD be up to 14 digits, but will usually only be
+four. Once you find a password that works it will probably be applicable to
+every empty box on the system..
+
+Here is also some good news.. on some systems empty boxes will have NO
+password.
+
+
+This is just a basic overrview... a crash course. For more information check
+out the Phrack World News article on this subject, you will get a bit of a
+background on how these damn things work.
+
+
+Produced February 8, 1990. Leave me comments on my Direct Dial VMB at
+ 714/665-5190
+
+Special thanks to:
+
+ Huntington Hangout BBS (Hobbes)
+ Blackened
+ Misfit
+
+
+Go ahead and upload this file, just make sure that all of the original credits
+are intact.
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/VOICEMAIL/vmb_smc.txt b/textfiles.com/phreak/VOICEMAIL/vmb_smc.txt
new file mode 100644
index 00000000..74deae15
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/vmb_smc.txt
@@ -0,0 +1,309 @@
+ On the Essentials of Voice Mail Hacking
+ by the Kryptic Night
+ -S M C-
+
+ This file will describe several simple ways for hacking out
+your own voice mail box. It is by no means a comprehensive
+document on the subject, but rather, is meant to help those
+beginning in the field. I myself have several voice mail boxes,
+and have hacked on various systems. I will describe several of
+the methods I have used, and try to explain the format for them.
+
+An overview of several common commands:
+ # (Pound) - Used either to access the password prompt or a
+ dialing list.
+ * (Star) - This is either used to abort the current menu, or
+ to amplify the volume.
+ 0 (Duh) - Used either to access the password prompt, or to chat
+ with our friend, the operator.
+ 9 - This is occasionally used to hang up.
+
+
+ The First Step
+ Type of systems to look for
+
+ First of all you need a system to hack at. Unless you are a
+pre-teenage new kid fan, answering machines usually aren't that
+exciting.
+ Try to look for an 800 voice mail system. I know I don't like
+having to pull out codes every time I want to call a VMB, only to
+find that their is nothing there worth my while, and I'm sure
+other people feel the same. This will not only provide yourself
+with a free method for calling your box, but will also allow you
+to call it from a payphone, and you can call it anytime, rather
+than when you just have a code handy.
+ Another great advantage is using a system that is up for all
+24 hours. This isn't a necessity, but is a great convenience. For
+instance, imagine that you just gave out your number to someone
+who be beneficial to your VMB as a good source of codes or
+general info, but he has better things to do at night than call
+VMB systems, with an afterhours VMB, you cut him off, is that what
+you want? I'd hope not.
+
+
+
+ The Second Step
+ Finding out how many digits the boxes are
+
+ Ok, so you now have a system to play with. Let's see if the
+system is worth your time, and find out the basics of it.
+Now you have to try to ascertain how many digits the box numbers
+are, this may take a while if it requires you to press a '#'
+(pound) sign after the box number, as these systems usually do not
+tell you whether you entered the correct amount of digits or not.
+For now, I'd recommend you just ignore these, as they would
+require extra work. Try entering any 3 digits, you will in most
+cases get an 'incorrect box number' message if the system is only
+a 3 digit system. However, if it just hangs, does nothing, then
+the odds are it's a four digit system. Try typing 4 digits now,
+and if you still get no message, then it's either one of two
+things. One, you may need to press a '#' (pound) sign after the
+number, or in some cases, before it. Or two, the system is longer
+than 4 digits, in which case you should ignore it for now. Some
+systems contain a built-in time delay that will tell you a message
+if you haven't entered the correct box in a given time, these
+should also be avoided for now, as they will say something even if
+you only type one digit, or if you type 100 digits.
+
+
+ The Third Step
+ Finding where the boxes are located
+
+ Now comes a rather tedious chore, finding out where on the
+system the boxes are located. Unless it is a professional voice
+mail company, they will probably have under 100-200 mail boxes in
+use at any one time. These boxes may be found on the system in any
+of two forms, clumped or scattered. Clumped boxes are when their
+are several boxes all in one area of the system. Usually this is
+the only area on the system that boxes are located, but
+occasionally some systems have scattered clumps all around the
+system. Scattered boxes occur when the boxes seem to have no
+apparent order for their location, these are more difficult to
+find empty boxes on, but not impossible.
+ Now you need to start looking for the clumps (We will start
+with these, as they are generally easier to locate). Start
+searching from 100, for a three digit system, or 1000, for a 4
+digit system. Increment your searching by 25-50 for a three digit
+system, and 100-500 on a four digit system. This will undoubtedly
+be inaccurate, but it will allow you a better chance of finding
+the clumps than random guessing. You may get several messages
+while looking for these, anything from 'Boxes cannot start with
+an x' to 'Incorrect box number' Generally these should be self-
+explanatory, and you should be able to figure out how to respond
+on your own. You are looking for any box with a message in it, any
+message. When you find a used box, mark down the number, and scan
+around that box in increments of 5 or so. If you find any more,
+mark down that location as a clump. Remember however, that if you
+get an incorrect box number message, that doesn't mean that that
+area isn't a clump, just that that box is empty. This will provide
+added inaccuracy to the job, but it's a fact that can't be
+overcome by anything other than monotonous scanning by 1.
+Try to make this fun, invite your friends over, have a phone
+party....they can be fun and profitable if you know what you are
+looking for.
+ As for scattered boxes, I don't have much to say, they aren't
+the easiest systems to play with, as you can't tell with any
+certainty where on the system a box will be, and if it's a four
+digit system, that's 10,000 possible boxes...Not an encouraging
+number. If you are on a system with scattered boxes, just ignore
+this section and read how to find empty boxes next.
+
+
+
+ The Fourth Step
+ The Miraculous Void
+
+ Once you've found the system, your real job has just begun.
+You now need to find an empty box. Although it is possible to hack
+out used boxes, this is usually undesirable, since used boxes tend
+to have people who use them (makes sense doesn't it...I thought so
+too) When some complaining customer calls and gets a message such
+as "To call cosmos and fuck up the entire region, dial...blah blah
+blah...remember to slaughter a cat for Halloween...", they will
+most likely be a bit suspicious and will call the business
+bitching about how they are so unprofessional, and that their
+employees really should clean up their mouths...blah blah, you
+know, the usual line of bullshit. If that doesn't happen, then the
+person who owns the box will check it out, and if that happens,
+you can be assured that the box won't last.
+ Now is the time to pull out that list of clumps you made.
+Start searching around these boxes in increments of 1, yes one,
+this may take a while...but if you've come this far...you
+obviously have too much free time.
+ What you are looking for is any box that asks you to leave a
+message at the tone, and doesn't play a prerecorded message to you
+before that. These are relatively easy to recognize, and you
+shouldn't have any problems with it. Just look for the anomaly.
+
+
+
+ The Fifth Step
+ On the Art of Hacking
+
+ This is where the excitement begins, or the agony ends. By
+now you should have found an empty box or two. If you haven't,
+start over again with a different system. There are several ways
+to access the password prompt. Usually most systems tell you right
+up front at the main menu how to do it, but since some do not,
+I'll explain the most common ways that I know of.
+ The magical pound sign is the most common way of accessing
+the password prompt. From the main menu you should press the #
+sign, and then the box number. It will then ask for your security
+password, or some other such inane jargon. The other common way of
+accessing the prompt is to dial the box number, and press 0 while
+the message is playing, or sometime after you dial the box number.
+You will then be asked to enter your security password, or
+whatever they choose to call it.
+ A security password is usually, but not always, the same
+length as the box number. The most common default password for
+voice mail systems is a string of zero's, 000 for three digit
+systems and 0000 for four digit systems. Other common passwords
+are: The box number, IE - box 2045 would have a password of 2045,
+box of 0981 (four digit system) would have a password of 0981, and
+a three digit system might have something like 521 for a box
+number of 521, a string of some common digits, such as 1111,
+2222, 3333, ainsi du suite, the year, or 1234. By no means are
+these the only default passwords, but these are the ones I've
+seen, and have heard about. You should be able to catch a
+significant number of empty boxes with these.
+
+
+
+ The Sixth Step
+ You're in, now what
+
+ So you think you're cool, right? You've found a box or two
+that you can get into. Well, congrats, from here on out everything
+is cake. This section and following sections won't tell you too
+much that you shouldn't be able to figure out with
+experimentation, but I'm trying to be thorough...
+ You've gotten past the password, and are at a prompt that
+asks you to 'send a message to another box' 'read new mail', or
+what not. If their are messages in the box, you should read them
+and pay attention to the date stamp if it's there. If the message
+is only a day or so old, then you might want to make sure you have
+other boxes to fall back on. Besides that, just enjoy the thrill
+of listening to other people's private mail...I once got a message
+from some guy's mistress...Funnier than hell. All the commands for
+these options should be readily apparent, and told to you when you
+get in.
+ To configure your system with your message, name, and
+password you will need to enter the 'Setup menu' or whatever it is
+called. Sometimes this function won't be told to you, but that's
+not really a problem, their are only 12 digits to try. Most
+systems default to an 8 or a 3. I'll assume you can find it on
+your own...
+ You've gotten into the config menu by now, and you are
+confronted with a multitude of options. First you should ALWAYS
+change your password to something that you feel is unhackable,
+your phone number is not a good choice. Next you should enter your
+own personal message. Try to figure out if the message is time
+limited to 30 seconds or a minute, a lot of systems do that. These
+systems are usually only good for personal message boxes, and not
+code lines. Next, change your name if the system allows you to do
+that...I don't think you want to be called Edwina Lipshitz when
+someone tries to leave you a message.
+ Their may be other functions, such as message forwarding,
+call placements, group messages, message waiting status, etc.
+Generally these should be ignored, unless you're adventurous and
+willing to risk your box with something like having the system
+call you when you get a message.
+ So, you've done everything, and set up a cool box, eh? Great,
+now just for fun, go back to the main system menu, and try to
+enter your box as a user would. Type to box number and listen to
+your message, if it's satasfactory...You've done it, you now have
+a brand new box you can tell your friends.
+
+
+
+ The Seventh Step
+ What to do with a VMB
+
+
+ Just for kicks, you might want to figure out what to do with
+a VMB once you have it. I'll describe two of these options, their
+are infinity more to the imaginative.
+
+ Code lines: These are quite possibly the best thing you can
+ever have if you are interested in the underground scene. If it is
+well advertised, and you post all the info you get, you will have
+a popular box. With a popular box, you'll get a vast amount of
+information that you wouldn't find on most boards, such as cosmos
+dialups, telenet accounts, codes, and other such info. These type
+of boxes can get you into trouble quite quickly if the gestapo
+finds out about it, as they are a bit more annoyed with someone
+who posts all their private information, over someone who just
+asks to leave a message at the prompt. But when you live the life
+you need to, the risks are not a factor.
+ Personal boxes are also great for several reasons. You can
+post your VMB to people who need to get in touch with you, even
+when they don't have a code. You can also use them in the fine
+art of carding. When the salesperson asks for your phone number,
+tell 'em something like "It's being fixed, but you can call my
+voice mail system at XXX-XXX-XXXX." This will make them a lot less
+suspicious then if you give them a bad phone number. Of course you
+would want to change the box message to that of the person whose
+card you used, but that's obvious.
+
+
+
+ The Eighth Step
+ How to keep your VMB safe and sound
+
+ Once you've gone through all the trouble of hacking out a
+VMB, the last thing you want is for it to go bad the next week,
+their is little in this more infuriating then spending a lot of
+time getting a box, to find it go dead the next day.
+
+Several ways to keep your box safe include...
+ NEVER hack out more than 1 or 2 boxes at ANY time. If you
+need another VMB be kind to yourself, do it on another system.
+Their have been too many busts of people who get greedy.
+ DON'T allow other people to hack on your system. Threats or
+warnings will sometimes be effective, threaten them with things
+such as ruining their credit ratings with TRW, sending a few
+thousand dildo's to their mother, care of them, or whatever...be
+imaginative. Or you can offer to hack out a box for them somewhere
+else. This may seem like a bitch to do, but it's worth your time
+if the person is an asshole.
+ DON'T post your VMB on lame systems, or on systems where
+their are a large amount of people who dislike you. These idiots
+usually have less of a life than you, and are not against spending
+days trying to hack out your password. Since you probably can't
+kill them upfront, just make sure they don't get your number.
+
+
+
+ The Conclusion
+ The Usual Bullshit
+
+ This file was researched are written by the Kryptic Night. It
+was produced as the first in a series of quality SMC text files
+released for the private public. In no way do I care whether you
+get busted or not, and accept no responsibility for corrupting
+your young minds. Thanx go out to the members of SMC, Scooter, and
+everyone else who is interested in freedom of speech.
+
+ Information is the most powerful weapon one can possess
+ against the masses.
+
+
+
+
+ |
+ | \
+ | /\/\ / ³\ ÄÂÄ
+ | / \ / ³ \ A ³ A
+ | / |/| / / \ ³ / ³ /
+ |/ | < \ ³/ ³/ U L T
+ |\ RYPTIC / | \ \ / ³\
+ | \ / | \ ³ \
+ |\ | | \
+ | \ |
+ | \|IGHT
+ / `
+
+ - Servants of the Mushroom Cloud -
+
+ Data Kult, Kryptic Night, Lord Logics, Nacht Habicht,
+ Shadow Walker, the Scorpion
diff --git a/textfiles.com/phreak/VOICEMAIL/vmbh-rl.txt b/textfiles.com/phreak/VOICEMAIL/vmbh-rl.txt
new file mode 100644
index 00000000..65f63d3a
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/vmbh-rl.txt
@@ -0,0 +1,126 @@
+
+ R e n e g a d e L e g i o n
+ T e c h n i c a l R e p o r t s
+
+
+
Technical Report #3
+
+ ....
+ ........
+ .........
+ ... ....
+ ... ....
+ .....
+ ....
+ ....
+ ... ...
+ ... ...
+ .. ...
+ ...
+
+ February 1991
+
+
+RL HQ - 617.oOo.oOOo
+
+VMB Hacking
+-----------
+
+Written By: The Knight
+
+
+
+Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
+a great deal of 'hidden info' that isn't common sense. But, If you are out
+there trying to hack a box and can't, follow through the VERY logical and
+simple steps and make sure they are matching up.
+
+
+Step 1:
+
+Finding a VMB System
+
+There are many ways you can find a VMB system, for instance, on a BBS when
+someone says 'Here are some systems' usually thats what they're referring
+to. Also, Try setting up your scanner and listening for 'Welcome to XX
+company, Enter extension #' or something similar to that. Then you have
+found a VMB system.
+
+
+Step 2:
+
+Finding a Box
+
+This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
+You must make sure that no one is using it. There are several ways to do
+this. One EASY way is when you hack it, check the date on the latest
+messages, if they are OVER a month old, then I'd say your safe to use them.
+Also, watch in case there is just like _2_ messages in there from the last
+4 months that those messages could be messages sent to ALL the boxes, see if
+they sound personal. If they DON'T, then grab the box.
+
+Let's say there's a box you REALLY want bad and someone's using it regularly,
+try doing this: Go in twice a day (make SURE you DON'T change the greeting
+etc.) and erase all the messages. He will complain and will eventually move
+out of the box. Then there is a good chance of you having that box. It's
+happned to me.
+
+
+Step 3:
+
+Hacking the VMB
+
+This is the most SIMPLE part of all. MY general method is as follows:
+
+Find a box, let's say box 260. It's empty and I want it (obviously).
+First, try passcode '000', if that doesn't work, try passcode '260',
+just make very general guesses that's ALL. Some of the MOST Common passcodes
+are:
+
+3 digit boxes:
+000
+123
+111
+222
+333
+444
+555
+666
+777
+888
+999
+box # (say it's box 260, passcode: 260)
+321
+
+4 digit boxes:
+
+1234
+0000
+1111
+2222
+3333
+4444
+5555
+6666
+7777
+8888
+9999
+box # (Say its box 1200, try passcode: 1200)
+
+
+The Key: REALLY try ALL of those. I knew one system with a passcode of
+ '5555' and NO ONE could hack it. And I did. So don't give up.
+ UNLESS you've exhausted all of those possibilities. Then forget
+ it.
+
+That's it really. The most simple thing to do. Just remember not to
+give up before you should and also try 3 digit passcodes on 4 digit
+boxes. Also, once you get in for added security, a lot of these boxes
+allow more digits for passcodes, so make a 5 digit passcode. Or if you
+thing its worth it, try like '00000' so that's really about all.
+
+Have fun and don't stop.
+
+
+
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/VOICEMAIL/vmbhack.hac b/textfiles.com/phreak/VOICEMAIL/vmbhack.hac
new file mode 100644
index 00000000..680398bc
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/vmbhack.hac
@@ -0,0 +1,127 @@
+ R e n e g a d e L e g i o n
+ * * T e c h n i c a l R e p o r t s * *
+ * R * * L *
+ * *
+
+ Eastern Western
+ ....
+Net Runner ........ Overdose
+The Knight ......... Sirus
+Kingpin ... .... Snuggle
+Highlander ... ....
+Nemesis .....
+Rogue .... Canadien
+Zardoz ....
+Cursor ... ...
+The Gypsy ... ... Blackheart
+Iceburg .. ...
+White Knight ...
+
+ Presents
+
+
+Eastern RL HQ - 617-XXX-XXXX
+Canadien HQ - 902-XXX-XXXX
+
+
+VMB Hacking
+-----------
+
+Written By: The Knight
+
+
+
+Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
+a great deal of 'hidden info' that isn't common sense. But, If you are out
+there trying to hack a box and can't, follow through the VERY logical and
+simple steps and make sure they are matching up.
+
+
+Step 1:
+
+Finding a VMB System
+
+There are many ways you can find a VMB system, for instance, on a BBS when
+someone says 'Here are some systems' usually thats what they're referring
+to. Also, Try setting up your scanner and listening for 'Welcome to XX
+company, Enter extension #' or something similar to that. Then you have
+found a VMB system.
+
+
+Step 2:
+
+Finding a Box
+
+This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
+You must make sure that no one is using it. There are several ways to do
+this. One EASY way is when you hack it, check the date on the latest
+messages, if they are OVER a month old, then I'd say your safe to use them.
+Also, watch in case there is just like _2_ messages in there from the last
+4 months that those messages could be messages sent to ALL the boxes, see if
+they sound personal. If they DON'T, then grab the box.
+
+Let's say there's a box you REALLY want bad and someone's using it regularly,
+try doing this: Go in twice a day (make SURE you DON'T change the greeting
+etc.) and erase all the messages. He will complain and will eventually move
+out of the box. Then there is a good chance of you having that box. It's
+happned to me.
+
+
+Step 3:
+
+Hacking the VMB
+
+This is the most SIMPLE part of all. MY general method is as follows:
+
+Find a box, let's say box 260. It's empty and I want it (obviously).
+First, try passcode '000', if that doesn't work, try passcode '260',
+just make very general guesses that's ALL. Some of the MOST Common passcodes
+are:
+
+3 digit boxes:
+000
+123
+111
+222
+333
+444
+555
+666
+777
+888
+999
+box # (say it's box 260, passcode: 260)
+321
+
+4 digit boxes:
+
+1234
+0000
+1111
+2222
+3333
+4444
+5555
+6666
+7777
+8888
+9999
+box # (Say its box 1200, try passcode: 1200)
+
+
+The Key: REALLY try ALL of those. I knew one system with a passcode of
+ '5555' and NO ONE could hack it. And I did. So don't give up.
+ UNLESS you've exhausted all of those possibilities. Then forget
+ it.
+
+That's it really. The most simple thing to do. Just remember not to
+give up before you should and also try 3 digit passcodes on 4 digit
+boxes. Also, once you get in for added security, a lot of these boxes
+allow more digits for passcodes, so make a 5 digit passcode. Or if you
+thing its worth it, try like '00000' so that's really about all.
+
+Have fun and don't stop.
+
+ -- The Knight, Sysop Eastern RL HQ BBS
+
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/VOICEMAIL/vmbhack.txt b/textfiles.com/phreak/VOICEMAIL/vmbhack.txt
new file mode 100644
index 00000000..a6a5ab91
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/vmbhack.txt
@@ -0,0 +1,59 @@
+[0m
+
+ +------------------------+
+ | A.C.E. Presents |
+ | |
+ | Zod's VMB Hacker Dox |
+ +------------------------+
+
+Dox by Zod
+
+ I wrote this program because of the amount of time and effort that is
+needed to hack out a VMB by hand manually. This program is not totally auto-
+mated because the computer has no way of knowing if it got the correct PW or
+not, but it will certainly speed up the process of hacking out a VMB and make
+it much easier.
+
+How To Use It
+-------------
+
+Using VMB Hacker is very easy. Just load it up and answer all the questions.
+First, (obviosly) enter the VMB's number. Then, enter the numbers and signs
+that VMB Hacker should dial before it dials the security code (such as *, #
+or box number, etc.) Next, enter the code that VMB Hacker should start hacking
+at. VMB Hacker can either go down or up. Next, enter the PW length so it knows
+how many 0's to add before the number (PW length can be 3, 4, 5, or 6... Maybe
+next version will be able to do longer ones). Next, enter either 1 to hack up
+or -1 to go down. In the next version, I may add random hacking, if and when
+VMBs start tracing (who knows). Next, enter the comport that your modem is in.
+Next, enter the amount of attempts that VMB Hacker should make before hanging
+up, calling the VMB back and trying some more, or just 0 if the VMB lets u
+keep trying. Next, is auto-hack. If you select Auto-Hack, VMB Hacker will keep
+trying PWs until you press C for Correct PW. This is very useful cuz it lets
+u just sit back and relax and listen, but it will only work well if your modem
+has a nice loud speaker. If you select Auto-Hack, u must now tell it the amount
+of seconds to wait for u tel press C before it tries the next code. Next, you
+must tell VMB Hacker how many seconds to wait after dialing the VMB before it
+starts hacking.
+
+Hope this program helps you out in hackout out your VMB's. If u have any
+questions, u can call my board and ask me or contact me on any of the other
+A.C.E. boards in New York. Also, I'd like to thank PO\/\/ER 1 and Outlaw for
+for giving me the idea to write this program.
+
+L8r, d00dz...
+
+ [1;36m---===[1;33m< [1;35mZod [1;33m>[1;36m===---[0m
+
+
+ Call These Fine A.C.E. Boards:
+
+ The Dead Of Night BBS
+ (212)979-0719
+ Sysop - Zod
+
+ HPCLand
+ (718)531-7846
+ Sysop - PO\/\/ER 1
+
+
diff --git a/textfiles.com/phreak/VOICEMAIL/vmbhaq.txt b/textfiles.com/phreak/VOICEMAIL/vmbhaq.txt
new file mode 100644
index 00000000..fcca3186
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/vmbhaq.txt
@@ -0,0 +1,1654 @@
+
+
+ Stripped Ink
+
+ Issue 4, Volume 1
+
+ Presents
+
+
+
+
+
+ *********************************
+
+ * *
+
+ * Voice Mail Hacking *
+
+ * *
+
+ * By: ROADKILL *
+
+ * *
+
+ * March/April 1994 *
+
+ * *
+
+ *********************************
+
+
+
+
+
+ Contents:
+
+
+
+ I. Introduction
+
+ II. Voice Mail Hacking Basics
+
+ III. AUDIX
+
+ IV. Message Center
+
+ V. Infostar VX Voice Processing System
+
+ VI. Meridian Mail
+
+ VII. ASPEN
+
+ VIII. Phone Mail
+
+ IX. Ready
+
+ X. Sydney
+
+ XI. Pac-Tel Meridian
+
+ XII. System Manager Functions (TaKiNG C0NTR0L!)
+
+ A. System Management Overview
+
+ B. Message Center Administration
+
+ C. Infostar VX Administration
+
+ XIII. Hacking Unknown Systems
+
+ XIV. Advanced VMB Hacking
+
+ XV. Conclusion
+
+ _________________________________________________________________
+
+
+
+ Introduction:
+
+
+
+ OK, so you want to know how to hack VMB's. In case you
+
+ don't know already, VMB is an acronym for Voice Mail Box. A VMB
+
+ is basically a sophisticated answering machine run by computer.
+
+ The computer is usually an IBM compatible with a large hard
+
+ drive, and the necessary voice mail equipment. Some systems such
+
+ as ROLM's Phone Mail store their data on magnetic tape, and the
+
+ ASPEN, made by Octel, uses a modified Quantum hard drive. A
+
+ typical voice mail system can have hundreds, sometimes thousands
+
+ of voice mail boxes available. Most companies now use voice mail.
+
+ A voice mail system can be of great convenience to a company. It
+
+ can reduce the number of calls to a receptionist, therefore
+
+ providing her/him with more time for other tasks. It also aids an
+
+ employee by being able to record messages while he/she is out of
+
+ the office or on another line. Some voice mail systems can even
+
+ page a person when they receive a message, and most voice mail
+
+ systems allow you to transfer messages to another user and other
+
+ cool functions.
+
+ "What the hell can I use a VMB for?" you ask? Well they
+
+ are handy to have to trade with, or if your K-RaD enough, you
+
+ could run an 3l33t code line (k0DeZ!). However, most people use
+
+ them as an easy way to keep in touch with people. What I'm going
+
+ to describe in this file is how to get a box on a system, and
+
+ some other stuff I hope you find interesting. Well, enough of
+
+ this; let's learn how to hack some VMB's!
+
+ _________________________________________________________________
+
+
+
+ Voice Mail Hacking Basics:
+
+
+
+
+
+ To hack VMB's, it's necessary to be able to know the
+
+ following things:
+
+
+
+ What kind of system it is,
+
+ Some of the common defaults,
+
+ How to transfer to the box itself,
+
+ How to login to the box,
+
+ The number of digits the boxes are,
+
+ The range of the boxes (ex.2200 to 9999),
+
+ How to access the names directory...
+
+
+
+
+
+ If you know what kind of system you're trying to get a
+
+ box on, it will be easier for you because you'll know how to
+
+ exploit the weaknesses of a system. Read the individual system
+
+ descriptions that are in this file.
+
+
+
+ OK, as usual, people are often lazy and use a passcode
+
+ that is easy to remember. The following is a list of the most
+
+ common passcodes that people use:
+
+
+
+ Box Number (ie. Box number:2225, Passcode:2225)
+
+
+
+ 1234 12345 123456
+
+ 0000 00000 000000
+
+ 1111 11111 111111
+
+ 2222 22222 222222
+
+ 3333 33333 333333
+
+ 4444 44444 444444
+
+ 5555 55555 555555
+
+ 6666 66666 666666
+
+ 7777 77777 777777
+
+ 8888 88888 888888
+
+ 9999 99999 999999
+
+
+
+ Some systems have a default that is unique to that
+
+ system. I'll cover these in the system descriptions below.
+
+
+
+ Finding out how to transfer to the box should be pretty
+
+ easy, the reason for this should be obvious. Finding out how to
+
+ login to the box can sometimes be a little more difficult, but it
+
+ shouldn't be that hard.
+
+
+
+ Determining the number of digits and the range of the
+
+ boxes is essential; you need to know this in order to find out
+
+ where the boxes are.
+
+
+
+ It is not necessary to use the names directory. However, it
+
+ sure does make finding empty boxes, the number of digits in the
+
+ box number, and the range a lot easier.
+
+ _________________________________________________________________
+
+
+
+ AUDIX
+
+
+
+ AUDIX (AUDio Information eXchange) is a voice mail system
+
+ made by AT&T. It is easily identified by the command voice:
+
+ "Entry not understood, please try again after the tone. [BEEP!]"
+
+ You'll hear this message after you enter an invalid key or
+
+ option. You can usually snag a box off an AUDIX system without
+
+ much difficulty. First, press "*"+"T" (to transfer). Try this
+
+ when you get the main greeting. It should say enter the X
+
+ (number) digit extension. Remember the number of digits the
+
+ extensions are. Now press "*"+"*"+"N" (for the names directory).
+
+ Now, try a couple of common names to get an idea of the range of
+
+ the boxes. After you got an idea of the range press "*"+"A" (to
+
+ look up by extension). Now, just start scanning for boxes. Do
+
+ this by entering the box number plus "#". You should get
+
+ one of following responses:
+
+
+
+ 1. The name of the box owner.
+
+ 2. Extension XXXX, Not Valid.
+
+ 3. Extension XXXX (This is what we're looking for).
+
+
+
+ OK, keep track of all the extensions that give you
+
+ response number three. After you're done scanning, press "*"+"#"
+
+ to exit the directory. Now enter "*"+"R" (to login). Enter the
+
+ number of one of the boxes you found while scanning, then press
+
+ "#". You'll now be prompted for a password. The default password
+
+ for AUDIX is the "#" sign (ie. Bx.1234, Pw.#). If you can't login
+
+ using the "#" sign try the defaults listed above.
+
+
+
+ Once you get into a box, if no one has used it before, it
+
+ will give you a brief tutorial, and help you set the box up.
+
+ DO NOT record a name for the box. Just leave silence. You don't
+
+ want some one going through the directory and hearing: "For [your
+
+ name] press 2222". So, just record silence. Sometimes you'll find
+
+ an empty box that won't have the tutorial. These are cool to use
+
+ too (as long as they are empty). Remember, anytime you need help
+
+ on an AUDIX, press "*"+"H".
+
+
+
+ AUDIX Commands:
+
+
+
+ *R - login
+
+ *H - help
+
+ *T - transfer to extension
+
+ **N - names directory (*A to look up by extension)
+
+ 1 - send message to another user
+
+ 2 - get messages
+
+ 3 - personal greetings
+
+ 4 - check outgoing messages
+
+ 5 - personal options(see below)
+
+ 6 - outcalling information(see below)
+
+ 7 - autoscan incoming messages
+
+
+
+ Personal Options:
+
+
+
+ 1 - mailing lists
+
+ 2 - personal directory
+
+ 4 - password
+
+ 5 - record mailbox name
+
+
+
+
+
+ Outcalling Information:
+
+
+
+ AUDIX can be set up to notify you when you receive an
+
+ incoming message. From the outcalling menu, you enter the
+
+ number that it will contact you at. It can also be used to
+
+ call a pager. When you receive a message AUDIX will call you and
+
+ say: "This is AUDIX". "[mailbox name], please enter your
+
+ password." This is a neat feature, but I don't recommend that you
+
+ use it, for obvious reasons.
+
+ _________________________________________________________________
+
+
+
+ Message Center
+
+
+
+ Message Center is another system that is widely used with
+
+ companies today. A good way to tell if you've found a Message
+
+ Center is to press "*" or "* + *" at the system greeting. If it's
+
+ a Message Center it will say "Welcome to the Message Center". OK,
+
+ find the range of the boxes by checking out the directory. If you
+
+ come across an entry that just lists the box number, take note of
+
+ it, it's probably a vacant box. Now, transfer to the box. While
+
+ the greeting is playing press "*". One of two things will happen:
+
+
+
+ 1. You'll be prompted for the passcode
+
+ 2. You'll be let into the box
+
+
+
+ There is no real default for the Message Center. If a box
+
+ hasn't been assigned a passcode, pressing "*" during the greeting
+
+ will let you into the mailbox. If it asks for a passcode you can
+
+ try the regular defaults. You can also press "*" at the passcode
+
+ prompt to transfer another extension.
+
+
+
+ The Message Center uses a couple of tricks to discourage
+
+ hacking. This can also be of use to us. The first trick is: When
+
+ entering the passcode, it will stop you when you enter one digit
+
+ more than the length of the passcode. The corollary is, that the
+
+ passcode length is one digit less than the length of the passcode
+
+ you entered before you were stopped. The second trick is: If your
+
+ first passcode guess is wrong, but the second is correct, it will
+
+ still give you an error. If you enter the correct passcode the
+
+ third time it will let you in the mailbox. However, both the
+
+ second and the third entry must have the correct passcode entry.
+
+
+
+ Two more things, if your scanning through the directory,
+
+ and happen to come across a box with the name System Manager or
+
+ System Administrator, remember this; this is the System Manager
+
+ mailbox. See the section on System Manager functions below. Also
+
+ the Message Center will tell a mailbox subscriber when a
+
+ suspicious amount of invalid passcodes have been entered.
+
+
+
+
+
+ Message Center Commands:
+
+
+
+ M(6) - Send a message to another user
+
+ P(7) - Play messages
+
+ U(8) - User options
+
+ X(9) - Exit system
+
+
+
+
+
+ User Options Menu:
+
+
+
+ N(6) - Change mailbox name
+
+ P(7) - Change passcode
+
+ L(5) - Distribution list
+
+ T(8) - Tutorial (not always implemented)
+
+ X(9) - Exit user options
+
+ _________________________________________________________________
+
+
+
+ Infostar VX Voice Processing System
+
+
+
+
+
+ The Infostar VX is another common system. To login to a
+
+ mailbox you press the "#" sign at the main greeting. You are then
+
+ prompted to enter your mailbox number, then your password. To
+
+ transfer to a box press "*" then the box number. The Infostar VX
+
+ has no set default. When a mailbox is created it assigns a random
+
+ passcode for the box. The system manager usually changes this to
+
+ something easy to remember, so when you find an empty box try all
+
+ the common defaults.
+
+
+
+ A good way to find boxes on an Infostar is to go to the
+
+ directory. It will tell you to enter the first couple of letters
+
+ of a person's name. A cool trick here is that you can usually
+
+ enter just one letter, and it will start spitting all the people
+
+ whose name's begin with that letter. If you happen to transfer to
+
+ a box that says "This is the Infostar VX Voice Processing
+
+ System." "Dial the number of the person you're calling." "If you
+
+ have a mailbox on the system press pound." Remember this is the
+
+ administrator mailbox. See the section on system management
+
+ below.
+
+
+
+
+
+ Infostar VX Commands:
+
+
+
+ Main Menu:
+
+
+
+ 1 - To listen to messages
+
+ 2 - Record and send a message
+
+ 3 - Personal options
+
+ 4 - Check delivery
+
+
+
+ User Options:
+
+
+
+ 1 - Greetings
+
+ 2 - Access code
+
+ 3 - Group list
+
+ 4 - Message notification
+
+
+
+ -----------------------------------------------------------------
+
+
+
+ Meridian Mail
+
+
+
+
+
+ Meridian Mail is a very popular system. It's made by
+
+ Northern Telecom. A good way to tell is, when you transfer to a
+
+ box it will usually say "Meridian Mail, mailbox?". Another way to
+
+ tell is pressing "81" during the mailbox greeting. If it says
+
+ something like "mailbox?", you can be pretty sure it's a
+
+ Meridian. "81" is the command to login to a box. You enter the
+
+ box number and "#", followed by the passcode and "#". The default
+
+ is usually the mailbox number.
+
+
+
+ Meridian Mail Commands:
+
+
+
+ * - Help
+
+ 0* - OUTCALLING! (see below)
+
+ 2 - Play message
+
+ 4 - Goto previous message
+
+ 6 - Goto next message
+
+ 9 - Call the sender of a message
+
+ 70 - Message options
+
+ 71 - Reply to the message you just listened to.
+
+ 72 - Play envelope
+
+ 73 - Forward message to another mailbox
+
+ 74 - Record one reply for all messages
+
+ 75 - Record a message. Press "#" to stop recording.
+
+ 76 -Delete message
+
+ 79 - Send message
+
+ 80 - Mailbox options
+
+ 1 -Change operator assistance number
+
+ 2 - Remote notification (depends on class of service)
+
+ 81 - Login
+
+ 82 - Change greeting
+
+ 1 - Internal greeting
+
+ 2 - External greeting
+
+ 83 - Logout
+
+ 84 - Change passcode
+
+ 85 - Create distribution list
+
+
+
+ ( This can be used to scan for other mailboxes.
+
+ Press "5" to compose a new list. Now enter the
+
+ box number plus "#". Take note of boxes that
+
+ respond with "mailbox XXXX". Press "#+#" to
+
+ stop, then 76 to delete the list. )
+
+
+
+ 86 - Goto message
+
+ 89 - Personal verification
+
+ 4 - Exit
+
+ 5 - Record mailbox name
+
+
+
+ Outcalling:
+
+
+
+ Yes, you can dial out of a Meridian Mail mailbox. Press
+
+ "0+*", it will then say something like: "This is a service that
+
+ will connect you to the number that you specify." On some systems
+
+ you can only connect to another extension. A lot of them usually
+
+ dial local. However, there are a few that can dial LD and
+
+ overseas. There are a few different formats that are used.
+
+
+
+ Extension+#
+
+ 9+Local number+#
+
+ 9+0+Local number+#
+
+ 9+1+Local number+#
+
+ 8+Local number+#
+
+ 8+0+Local number+#
+
+ 8+1+Local number+#
+
+ 9+Area code/number+#
+
+ 9+1+Area code/number+#
+
+ 8+Area code/number+#
+
+ 8+1+Area code/number+#
+
+ 9+011+Country code/city code/number+# (Very rare)
+
+
+
+
+
+ A lot of companies are becoming aware of this little
+
+ trick, so you might have to look for a while until you can find
+
+ one that will outdial to anything other than another extension.
+
+ However there are a lot out there that will still dial locally.
+
+ _________________________________________________________________
+
+
+
+ ASPEN
+
+
+
+
+
+ The ASPEN (Automated SPeech Exchange Network) is made
+
+ by Octel. The is a good article on the hardware specifics of
+
+ this system in Phrack #45. To hack a box start scanning through
+
+ the boxes until you come across one that says: "You have reached
+
+ mailbox number XXXX please record a message at the tone." Most
+
+ likely that is an empty box. To login to an ASPEN press "#".
+
+ You'll be prompted for your mailbox number and your passcode. If
+
+ it is a new box after you enter the box number it will say:
+
+ "Welcome to your new mailbox, please enter the temporary passcode
+
+ assigned to you by your system manager". There is no set default
+
+ for an ASPEN mailbox. Just try all the common ones until you get
+
+ in. ASPEN's are full of features that make it appealing to
+
+ people.
+
+
+
+ ASPEN Commands:
+
+
+
+ Main menu:
+
+
+
+ 1 - Review messages
+
+ 2 - Send message
+
+ 3 - Check for a receipt (of a message sent)
+
+ 4 - Personal options
+
+
+
+
+
+ Review Messages menu:
+
+
+
+ During message review:
+
+
+
+ 1 - Rewind
+
+ 2 - Pause or restart
+
+ 3 - Forward
+
+ 4 - Play slower
+
+ 5 - Message envelope
+
+ 6 - Play faster
+
+ 7 - Quieter
+
+ 8 - Normal volume
+
+
+
+ After message review:
+
+
+
+ 4 - Replay
+
+ 5 - Message envelope
+
+ 6 - Send copy
+
+ 7 - Delete message
+
+ 8 - Reply
+
+ 9 - Save message
+
+
+
+ Send Message menu:
+
+
+
+ 1 - Private message
+
+ 2 - Urgent message
+
+ 3 - Message confirmation
+
+ 1 - Confirm receipt
+
+ 2 - Notify of non-receipt
+
+ 4 - Future delivery
+
+
+
+ Personal Options menu:
+
+
+
+ 1 - Message notification on/off
+
+ 2 - Administration
+
+ 1 - Change password
+
+ 2 - Distribution list
+
+ 3 - Prompt levels
+
+ 3 - Greetings
+
+ 1 - Personal greeting
+
+ 2 - Extended absence greeting
+
+ 3 - Mailbox name
+
+ 4 - Notification schedule
+
+ 1 - First schedule
+
+ 2 - Second schedule
+
+ 3 - Temporary schedule
+
+ _________________________________________________________________
+
+
+
+ Phone Mail
+
+
+
+
+
+ Phone Mail is made by ROLM. It is one of the most
+
+ challenging voice mail systems to hack. It is also one of the
+
+ most rewarding. On some boxes you can have over a ten minute
+
+ greeting (depends on class of service). The Phone Mail system can
+
+ be configured in several different ways, one which is almost
+
+ impossible to hack. Phone Mail can be set up to be a sort of
+
+ information center. When it's set up for this there are usually
+
+ no boxes on the system. You can usually tell if a system has been
+
+ set up this way if it says something like "Press 1 for info.
+
+ on "blah." Press 2 for info. on blah, etc." These are usually set
+
+ up by companies for advertising, and it will not allow you to
+
+ leave a message.
+
+ When you do find a system, just start scanning through
+
+ the directory. All Phone Mail systems have some sort of directory
+
+ you can scan through.
+
+ The hardest thing about Phone Mail is finding the
+
+ access method. Some are set up where you have to dial an access
+
+ number (try scanning around where you found the Phone Mail at).
+
+ On these you dial the number and it says: "This is the Phone Mail
+
+ system, you can either enter your extension or your name."
+
+ Sometimes they set up a specific extension you have to dial
+
+ before you can access your mailbox. Also sometimes they have it
+
+ set up where you just press "#" to login to your mailbox.
+
+ No matter what method they use, there's no reason to worry,
+
+ because there's a simple way around this.
+
+ Here's an example of how to use this: Transfer to an
+
+ extension. Wait until you heard the greeting and the tone. Now
+
+ press "*"+"6"+"#". It will now say something like: "Please enter
+
+ the extension of the person you are calling, or press "#" to use
+
+ the Phone Mail features". Now all you have to do is enter the
+
+ extension + "#", then the passcode + "#". The default for
+
+ Phone Mail seems to be "111" or "1111". I'm not positive about
+
+ this, but it's what I've usually came across.
+
+
+
+ One more thing: when you're in the directory try entering
+
+ "Test" or "TestMailbox" for the person's name. Most systems
+
+ usually have one of these boxes set up. It's usually empty (This
+
+ also may work on some other voice mail systems also). Try using
+
+ "111" or "1111" to get in the mailbox.
+
+
+
+
+
+ Phone Mail Commands:
+
+
+
+ 1 - Record message
+
+ 3 - Listen to messages
+
+ 8 - Answering options
+
+ 9 - Mailbox options
+
+ 70 - Transfer out of Phone Mail
+
+ 76 - Disconnect from Phone Mail
+
+
+
+ Answering Options menu:
+
+
+
+ 1 - Greetings
+
+ 2 - Answering mode
+
+ 3 - Set referral extension
+
+ 4 - Mailbox name
+
+ # - Goto main menu
+
+
+
+ Mailbox Options menu:
+
+
+
+ 1 - Distribution lists
+
+ 2 - Prompt level
+
+ 3 - Password
+
+ 4 - Outcalling schedule
+
+ # - Goto main
+
+ _________________________________________________________________
+
+
+
+ Ready Systems
+
+
+
+
+
+ Ready systems are also known as Bix. Hacking this
+
+ system is easy, but it can take a while. First you can do two
+
+ things: the first is that you can scan through the directory
+
+ until you find an empty box. Now go back to the main menu and
+
+ login to the box by pressing "#". You'll then be prompted for you
+
+ mailbox number then your passcode. If the box is new, you will
+
+ not need a passcode. It will let you right in. Sometimes people
+
+ assign a simple passcode for new boxes. If that is the case, try
+
+ the defaults. The second way to hack a Ready system is after you
+
+ find the range of the boxes, go back to the main menu and login
+
+ (by pressing "#"). Now enter the number of the mailbox you want
+
+ to start scanning from. If it prompts you for a passcode, press
+
+ "*"+"0"+"#". Then try the next box. You can scan through the
+
+ entire range to see if you can get into any boxes.
+
+
+
+ What the "*"+"0"+"#" combination does is this:
+
+
+
+ * - Aborts the passcode entering feature.
+
+ 0 - Pages the operator (You should get a message, but
+
+ if a human answers, hang up and try hacking the
+
+ system after hours. When you page the operator
+
+ this sets the error count to zero.)
+
+ # - Command to login to a box.
+
+
+
+ Ready Commands:
+
+
+
+ 4 - Change greeting
+
+ 5 - Listen to messages
+
+ 6 - Record and send a message
+
+ 9 - Exit
+
+ 0 - Dial another box
+
+ 9 - Exit system
+
+ * - Continue using mailbox
+
+ 1+8 - Change volume of prompts
+
+ 1+6 - Administration options
+
+ 1 - Message waiting
+
+ 2 - Passcode
+
+ # - Return to main
+
+ 0+Command - Help description for command
+
+ _________________________________________________________________
+
+
+
+ Sydney
+
+
+
+ The Sydney system is from Australia, and can be easily
+
+ identified by its unique logoff message of "Good day" (it also
+
+ can be "Good morning" or "Good evening" -depends on the time of
+
+ day). Another indication is that when you press "*" it will
+
+ change the volume level. Sydney can be hacked pretty easy,
+
+ however you'll get logged off if you enter three invalid
+
+ mailboxes in a row.
+
+ There is a simple trick to hacking Sydney. For example,
+
+ let's say the boxes start at 100. You transfer to the box and
+
+ during the greeting press "0" (This is the login command. You can
+
+ also use this at the system greeting). Now it will prompt you for
+
+ a passcode try "0". If it doesn't say "You have no messages.",
+
+ then press "#"+"#". Repeat the process for mailbox 101 and so on.
+
+ "0" is the default passcode for mailboxes that have just
+
+ been set up. If you press "0" and it just sits there, it is
+
+ actually waiting for you to enter three more digits (the maximum
+
+ passcode length on a Sydney seems to be four digits) which is why
+
+ you press "#"+"#".
+
+ Sydney has a function called "Call Placement". Using this
+
+ you can record a message, have Sydney dial a number and the
+
+ person will hear the message, and their response will be saved in
+
+ your mailbox. You can set it up so that Sydney will call the
+
+ number every X number of minutes, and deliver the message. (This
+
+ is great for pranking someone you dislike.)
+
+
+
+ Sydney Commands:
+
+
+
+ 1 - Record message
+
+ 2 - Receive messages
+
+ 3 - Message forwarding
+
+ 4 - Call Placement
+
+ 5 - Group messages
+
+ 6 - Certified messages
+
+ 7 - Guest accounts (Create an account for a buddy.)
+
+ 8 - Personal Options
+
+ 9 - End call
+
+
+
+ Personal Options menu:
+
+
+
+ 1 - Change greeting
+
+ 2 - Change passcode
+
+ 3 - Change mailbox name
+
+ 4 - Listen to system bulletin
+
+ 9 - Return to main menu
+
+ _________________________________________________________________
+
+
+
+ Pac-Tel Meridian
+
+
+
+
+
+ This is a great system. It's easy to use and you can
+
+ have a long greeting. Sometimes you can identify one because it
+
+ will play four tones when the system answers. Some systems have
+
+ this disabled. The way to login is to press "#" at the system
+
+ greeting. The default is "0000". A good way to find empty boxes
+
+ is to go to the directory. When it asks you to press a letter
+
+ just press one key. It will go through all the extensions that
+
+ begin with the corresponding letters. When you come across
+
+ something like "Mailbox XXXX", you've found a blank box.
+
+
+
+
+
+ Pac-Tel Meridian Commands:
+
+
+
+ 2 - Record and send a message
+
+ 3 - Phone manager functions
+
+ * - Quit
+
+ # - help
+
+
+
+ Phone Manager Functions:
+
+
+
+ 1 - Personal Options
+
+ 1 - Immediate message notification
+
+ 2 - Daily message reminder
+
+ 3 - Record greeting
+
+ 4 - Change passcode
+
+ 5 - Record mailbox name
+
+ 6 - Record announcement for a mailbox you sponsor
+
+ * - Exit personal options
+
+ 2 - Voice Mail Options
+
+ 1 - Check unacknowledged messages
+
+ 2 - Record the name for a mailbox you sponsors
+
+ 3 - Change distribution list
+
+ * - Exit voice mail options
+
+ 3 - Automated Attendant Options
+
+ 1 - Call Screening
+
+ 2 - Call processing
+
+ 3 - Extension specific processing
+
+ * - Exit automated attendant options
+
+ _________________________________________________________________
+
+
+
+ System Manager Functions (TaKiNG C0NTR0L!)
+
+
+
+
+
+ Overview:
+
+
+
+ If you have come across a box with the name "System
+
+ Manager" or "System Administrator" definitely try to access this
+
+ box. This could be the Administrator Box! Once in this box you
+
+ can create boxes, delete boxes, change class of service, send a
+
+ broadcast message (sends the message to every box on the system),
+
+ change passcodes and a lot of other stuff. In other words this is
+
+ the God box. It is usually the last (most common) or first box on
+
+ a system. Not all systems have administrator boxes. For example
+
+ all Phone Mail administration is handled through a computer dial
+
+ up. (There will be an article on this in a future issue of this
+
+ publication). Basically, if you can get in the administrator box
+
+ you control the system. Out of the systems I covered in this
+
+ article, Infostar, ASPEN and the Message Center have
+
+ administrator boxes. I'm going to cover Infostar and the Message
+
+ Center here. Alas, I haven't been able to access an ASPEN
+
+ administrator box yet, so I don't know the commands. If anyone
+
+ reading this does please contact me.
+
+
+
+ Message Center Administration Commands:
+
+ (Once in the admin box press "*" from user options)
+
+
+
+ A(2) - Add a mailbox
+
+ D(3) - Delete a mailbox
+
+ M(6) - Modify a mailbox
+
+ P(7) - Change the passcode of a mailbox
+
+ K(5) - Clock
+
+ I(4) - Backup to floppy
+
+ U(8) - Usage statistics
+
+ * - Exit mailbox administration
+
+
+
+
+
+ When you add a mailbox you need to enter a class of
+
+ service, a limits class of service and a message waiting class.
+
+ Here is a list of the ones to use:
+
+
+
+ Normal Box Check In Check out Time Box
+
+ Class: 01 04 05 09
+
+ Limits class: 03 05 05 05
+
+ Mess.waiting: 00 05 05 05
+
+
+
+ The Time Box tells the time when you transfer to the
+
+ box. The Check In and Check Out boxes allow you to read mail and
+
+ change the passcode on other boxes.
+
+
+
+ Infostar VX Administration Commands:
+
+
+
+ 1 - System greetings
+
+ 2 - Broadcast message
+
+ 3 - Mailbox administration
+
+ 1 - Change passcode
+
+ 2 - Add mailbox
+
+ 3 - Delete mailbox
+
+ 8 - Record mailbox greeting
+
+ 9 - Reset message waiting indicator
+
+ 4 - System group lists
+
+ 5 - Time and date
+
+
+
+ When you add a box on an Infostar system always use "100" for the
+
+ class of service. The mailbox types are:
+
+
+
+ 1 to 3-Regular box
+
+ 10-Administrator box (You can have more than one on
+
+ a system!)
+
+
+
+ Also when you create a mailbox you'll be prompted for the
+
+ following:
+
+
+
+ Extension number
+
+ Attendant extension number
+
+ Department number
+
+ Spell subscriber's name
+
+
+
+ When you get these prompts,just hit "#" to skip them. The only
+
+ things you need to enter are: The mailbox number, class of
+
+ service and mailbox type. The system will add the box and assign
+
+ a random four digit passcode.
+
+ _________________________________________________________________
+
+
+
+ Hacking Unknown Systems
+
+
+
+ There are a lot of systems out there that I haven't
+
+ covered. A lot of companies also use proprietary systems. It can
+
+ be just as easy (if not easier) to get a box on these systems as
+
+ well. Start by finding out the main functions (See VMB Hacking
+
+ Basics above). Go through the directory, and all that good stuff.
+
+ Look for administrator boxes. Do it all. Just remember, most
+
+ people aren't security conscious when it comes to voice mail, Oh
+
+ well, their negligence can be to your benefit.
+
+ _________________________________________________________________
+
+
+
+ Advanced VMB Hacking
+
+
+
+ These are just some tips that I picked up over time.
+
+ OK, first of all check out all of the extensions you can (this
+
+ takes time), and see what you find. You may come across fax
+
+ machines, carriers, PBX tones or a bridge. Sometimes these will
+
+ be in the directory as an extension with no recorded name.
+
+ Definitely check the box out. If you transfer to the box and
+
+ don't get anything but a short beep, have a friend try to
+
+ transfer to the same extension while you are on it to see if it
+
+ is a bridge. I don't think I need to explain what is possible
+
+ with a PBX tone. The carriers can be PBX dial-ups, company
+
+ dial-ups, anything is possible. If you're nosy like myself you
+
+ can login other peoples boxes and hear thief messages. Take care
+
+ when doing this, because you don't want the company to know you
+
+ are doing this. It's a good idea to reset the message pointer
+
+ (if you can). The boxes I always try to listen messages are:
+
+ Computer Room, MIS, System Administrator, Switch Room and
+
+ Computer Operations. Well, you get the idea just try to get in
+
+ any box that might have something that could be interesting.
+
+ Another thing you may want to find is an after hoursorder line.
+
+ If you can get into one of these you could have an abundant
+
+ supply of credit cards (KeWL! KaRDZ F0R MY K0De LiNE!).
+
+ Another thing is for those of you that want a 800 VMB,
+
+ but can't get a box on it. Try to find a company in your area
+
+ code that has an 800 number going to their voicemail system. Find
+
+ the local number and go through the system and find the boxes you
+
+ want. Now go load up your favorite code hacker. Now you can set
+
+ it up to try to get into the box. You can do a couple of things:
+
+ You can set it up to go in and change the passcode , or you can
+
+ set it up to send a message after it has got into the box. Just
+
+ find a box you can get into. It doesn't matter if someone is
+
+ using it or not. Now have your code hacker programmed to dial the
+
+ system, access the box, enter a passcode, and send a message to
+
+ the box you can get in. For example we'll say that you have a
+
+ Message Center that the box you want the passcode to is 999 and
+
+ you can get into box 222.
+
+
+
+ Now set your code hacker to dial the following string:
+
+
+
+ atdt XXX-XXXX,,,999,,*,,YYYY,,6,,222,,,#,,,,,#,9
+
+
+
+ XXX-XXXX-The number of the voice mail system
+
+ 999-Transfers to the box you want to hack
+
+ *-to login
+
+ YYYY-The passcode the for the code hacker to try
+
+ 6-To send a message to another user
+
+ 222-The box to send the message to.
+
+ #-To start recording to message
+
+ #-To stop recording
+
+ 9-Send message
+
+
+
+ Now all you have to do is check mailbox number 222,
+
+ and see what time the message was delivered.Now look at your scan
+
+ logs and see what number it dialed at the time your message was
+
+ sent. Voila! You now have the passcode for box 999!
+
+ If your can't set your code hacker to record all numbers
+
+ dialed, just set it to scan sequentially. Every 30 minutes or so
+
+ jot down what code it's trying. This way you can get a good idea
+
+ of the area that the passcode is in. Another way: If you came
+
+ across a carrier on the system. Set the code hacker to transfer
+
+ to the extension of the carrier. When it connects to the carrier
+
+ you'll have the passcode in your log. (This is the method I
+
+ prefer.)
+
+ _________________________________________________________________
+
+
+
+ Conclusion
+
+
+
+ Well that's about it for this file. I hope some of out
+
+ there found this file useful. If anyone has any questions,
+
+ comments or complaints, you can email me at:
+
+
+
+ roadkill@uss.lonestar.org
+
+
+
+
+
+ Greetings to:
+
+ Bane(314), Cjesus(313), Mr.Smith(615),
+
+ Lucid Nightmare(214), Sirius(214),
+
+ Dr.Strange(901), FuNKY G00DHeaRT(214)
+
+ and to Jack the Ripper(214) for putting
+
+ this in Stripped Ink.
+
+ _________________________________________________________________
+
diff --git a/textfiles.com/phreak/VOICEMAIL/vmblol.txt b/textfiles.com/phreak/VOICEMAIL/vmblol.txt
new file mode 100644
index 00000000..548e39e1
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/vmblol.txt
@@ -0,0 +1,248 @@
+[40m[2J[2H[24C[0;1;31mßÛ[41mÜ[0;31mÛÛÛß [1mÜÛ[41mß[0;31mÛÛÛÜ [1mßÛ[41mÜ[0;31mÛÛÛß[3H[34mÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ[1;31mÛÛ[0;31mÛÛÛ[34mÄÄÄÄ[1;31mÛÛ[0;31mÛÛß[1mÛ[41mÜ[0;31mÛÛ[34mÄ[1;31mÛÛ[0;31mÛÛÛ[34mÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ[s
+[uÄÄÄÄÄÄ[4H[1mÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ[31mÛÛ[0;31mÛÛÛ[1;34mÄ[31mÜÜ[0;31mÜ[1mÛÛ[0;31mÛÛÜ[1mÛ[41mß[0;31mÛÛ[1;34mÄ[31mÛÛ[0;31mÛÛÛ[1;34mÄ[31mÜÜ[0;31mÜ[1;34mÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ[5H[0;34mÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ[1;31mÜÛ[s
+[u[41mß[0;31mÛÛÛ[41m [40mÛ[34mÄ[1;31mßÛ[41mÜ[0;31mÛÛÛß[34mÄ[1;31mÜÛ[41mß[0;31mÛÛÛ[41m [40mÛ[34mÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ[6H[24C[1;37;47mßß[30mÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜÜ[7H[24C[40mßß[8H [0;35mú[1mù[0;35mú [37mCardin[s
+[ug [35mú[1;31mù[0;35mú [37mPhreaking [35mú[1;32mù[0;35mú [37mHacking [35mú[1;36mù[0;35mú [37mAnarchy [35mú[1;33mù[0;35mú [37mPhraud [35mú[1;37mù[0;35mú[9H[10H[1;31mWritten by: [36mW[34mave [37mR[0munner![35C[1;31m[s
+[uDate: [36m10/22/90[11H[31mEdited by : [36mC[0;36mount[34m_[1mZER0[8C[36mœ[0;36megions [1m“[0;36mf [1mœ[0;36mucifer[12H[30C[32mText # [1;37m12[13H[30C[0;32mPart [1m1 [0;32mout of [1m1[14H[15H[0;34mÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ[s
+[uÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ[16H[1mÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ[17H[36mÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ[18H[19H[13C[s
+[u[32mHacking & Scanning Voice Mail Boxes: The Tutorial[20H[21H[36mÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ[22H[34mÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ[23H[0;34m[A
+ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ[0m
+
+Legions of Lucifer ('l‚jen ov l–cifŠr) n. 1. Any multitude of followers
+ of the chief evil spirit, Satan. 2. A group of Anarchists and Computer
+ Experts that work together as one to cause havok in the anarchy bound
+ society of this nation.
+
+
+Hello again, and welcome to another œegions “f œucifer text phile! This
+text file has to do with hacking and scanning VMBs. The reason I am writing
+this phile is because I am very good at it, and have had years of experience.
+Infact I have been called by MCI for screwing them over by attacking and
+taking over a whole damn system with a few friends of mine.
+
+Anyways, hacking VMBs is very simple and basically safe, and not only that
+but they are kewl to have around. You can give them to friends, you can
+trade them for access on bulletin boards, or you can use it for yourself.
+As for this 'Tutorial on Hacking VMBs', we will be talking about what systems
+to hack, how you go about hacking them, default passwords, hints on better
+scanning, and having your very own box.
+
+
+Basics:
+ÄÄÄÄÄÄ
+
+VMB, in case you don't know, stands for 'Voice Mail Box'. Now a VMB is
+like an answering machine. You can use it for all sorts of things. Most
+VMB systems are dialed though 800 numbers. People call up the VMB system
+that you have a box on, and dial in your box number and then leave you a
+message. Whenever you want to check your box, you just call up, enter your
+password and read your messages. Inside a VMB you can do whatever, you can
+leave messages to others on the system, you can change your 'Out Going'
+message, you can have guest boxes (Explained later), you can have the box
+call your house when you get an Urgent message, you can do a lot of things.
+Infact, on some systems you can even CALL OUT through them, so they can be
+used as a code of sorts! They are cool to have.
+
+
+What Type of System You Should Scan/Hack:
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+You should scan/hack out Virgin Systems, this is another way of calling a
+system that hasn't been hack out yet. Also, CINDI Systems and ASPEN Systems
+have the best boxes and the most options that VMB Systems can offer. I will
+be talking about ASPEN System today since I know most about those.
+
+
+Scanning Your 'Virgin ASPEN VMB System':
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+Okay once you've found your Virgin VMB System, you start to scan. Just incase
+you don't know what scanning is, that means you search for boxes that are
+hackable (Explained later on). Now you dial up the system and when it picks
+up and the bitch starts to talk, press the "#" key. It will then ask you for
+your box number... now there are two different way the ASPEN System can be
+configured: 1) a "3 Digit Box Number System" or 2) a "4 Digital Box Number
+System". Now lets just say this system is a 3 Digit System. Okay, when it
+asks for your Box Number, enter in 999, now it will say one of three things:
+[These are known as 'Greeting Names']
+1. John Doe [Box owners name]
+2. "Box Number 999 Is Not a Valid Box Number"
+3. "Box Number 999"
+Now, if it eithers says 1 or 2, go to box number 998...997...996...995..etc,
+but if it says 3, then you are lucky, now it will ask you for your password,
+now you are probably saying 'Shit this is where it gets difficult'... well
+you are WRONG! This part is easy. Here is a list of ASPEN Default Passwords:
+
+* We will use box number 666 as an example box #
+ [ BN = Box Number ]
+
+List of Default Password: Combination Result
+
+ 1-BN 1666
+ BN+1 667
+ 0-BN 0666
+ BN-0 6660
+ Most Common Äį BN 666
+
+Now enter in a those defaults, try JUST the Box Number first, ASPENs usually
+use that most. Now, if you try all those Defaults and still can not get into
+that Voice Mail Box, then that means that the box has been already taken, but
+the owner hasn't changed his 'Generic Message', if you don't get in, you
+will just have to search until you get in.
+
+
+Once You Get Into a Box:
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+Okay, once you get your first box, *DO NOT* change anything!! That will come
+later. Your first box is, as what is known as a 'Scanning Box'! What you do
+with your Scanning Box is this: You enter "3" from the main commands menu,
+and it will ask you for the box number. Now that command is the "Check for
+Reciept" command, what it does it check Box #xxx for mail from you. This
+command is very convienient for us VMB Hackers. To use that command to your
+advantage, you enter in box a box number and it will say 1 of the three
+'Greeting Names', like before, if it say #3, then you write down that Box
+Number and hack it later. But if it says 1 or 2, then just keep scanning!
+All boxes with the number 3 Greeting Name is known as a 'Hackable Box'.
+Now you keep scanning until you have gone all the way down to Box number 000
+or whatever is the lowest box it supports. Now, once you have your list this
+is when all the fun starts! Now you are ready to hack!
+
+
+Hacking Out Your New Found 'Hackable' Boxes:
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+Okay this is the easy part. After you spent most of your time by scanning
+the system you should be used to the system and how it works, that should
+make hacking the ASPEN all the easier. Now, if you had a 'Scanning Box', you
+should know what the default password was for your Scanning Box. Well if the
+password for your Scanning Box was just the Box Number, then *EVERY* other
+hackable box should have the SAME default password. VMB Systems have only
+one default password, If one box has the BN for a Default PW, the all the
+others will too.
+
+Okay, you call up the VMB System will the list of 'Hackable' boxes by your
+side, and when the bitch is talking, press the "#" key. When it asks you for
+your box number, enter in the first box number on your list. When it asks for
+your password, enter in the Default Password Sequence. Now if you don't get
+into that box, it's not a problem, just keep going down your list. You should
+get into a few. But remember, just because a box is marked 'Hackable', it
+doesn't mean you will definatly get into it.
+
+Okay, now you have a few dosen boxes. You can now use you Scanning Box to do
+whatever you please.
+
+
+ASPEN Guest Boxes:
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+Once you have a box of your own, you can give out 'Guest Boxes'. Guest Boxes
+are like Sub Boxes in your box. In ASPEN you have 4 of them. If you give out
+Guest Box #1 to John Doe, Mr. Doe can call in, enter in the password YOU set
+for him, and leave you messages, but not only that, you can leave messages
+to HIM! Which means, if his is in New York, and you are in California, and
+neither of you have codes to call eachother, then you can leave messages thru
+your 800 VMB. Here is a list and explination of all 4 of the Guest Boxes:
+
+0. Main Box - Your Voice Mail Box!
+1. Guest Box #1 - Can Leave & Recieve Messagez
+2. Guest Box #2 - Can Leave & Recieve Messagez
+3. Home Box - Can Leave & Recieve Messagez
+4. Secretary Box - Can Check How Many Messagez You
+ Have & Recieve Messagez
+
+
+Hints On Better Scanning:
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+A lot of people say hacking and scanning for VMBs is too damn hard... well
+that's because they are going at it all wrong, they probably read some lame
+piece of shit text file on Hacking VMBs that was about 500 bytes long. Well,
+here is a small list of hints on better scanning and hacking:
+
+1. Do not use a Voice Mail Box hacking/scanning program
+ (ei: VMB v1.0, ASPEN v1.0, VMBHACK v2.3, etc..)
+2. Do not hack in random order (ei: B#999, 345, 810, etc)
+ Always hack in order: 999, 998, 997, 996, 995...000.
+3. Try to find out if it's virgin. The newer the System,
+ the better.
+4. If you have a phone with memory dial, change one entry
+ to the number of the VMB System.
+5. Don't hack the System Managers box unless you really
+ want to.
+
+
+Ideas of Things To Do With Your Extra Boxez:
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
+Well since you can have up to 500 extra Voice Mail Boxes, you might
+not know what to do with them, here are a few ideas that can help you out:
+
+1. Give them to friends
+2. Sell them to friends
+3. Offer them to sysops for
+ for better access
+4. Trade them for HSTs or
+ whatever
+5. Use them as a Voice Verifing line (So you don't have to give out
+ your real voice number to BBSes when you apply!)
+
+
+Well, that's it to the œegions “f œucifer Hacking & Scanning Voice Mail Box
+Systems Tutorial! I hope it helped you and I, along with œ.“.œ wish you the
+best of luck with your new found hobby! And remeber if you found this text
+of any help, please spread it around to help others! Also, if you think you
+are any good at writing H/P, please apply to be a Member! Call the œ.“.œ Home
+at:
+
+ Digital Hackers Network
+ œegions “f œucifer HeadQuarters/Home
+ No Warez! A truely serious Hack/Phreak board
+ Hack, Phreak, Scanning, Phraud, Crashing disscusions
+ Viral Research & Development Sections (500+ Virii!)
+ "Personalized ANSi Bombs" made by request
+ Running AfterShock v1.20 - 2400 Baud
+ PH: 213-274-1333
+
+[40m
+[39m[29C[0;1;30mÜÜÛÛÛÛÛÛÛÛÛÛÛÜÜ
+[25CÜÜÛÛÛÛßß [31mÜÜ [30mßÛÛÛÛÜÜ
+[23CÜÛÛÛÛß[5C[31mÜÛÛÛÛÜ [30mßßÛÛÛÜ
+[21CÜÛÛÛÛß[6C[31mÛÛÛÛÛÛÛÛ[6C[30mßÛÛÛÜ
+[20CÜÛÛÛß[6C[31mÜÛÛÛÛ[0;31mßß[1mÛÛÛÛÜ[6C[30mßÛÛÛÜ
+[19CÛÛÛÛß[7C[31mÛÛÛÛ[0;31mß ß[1mÛÛÛÛ[8C[30mßÛÛÜ
+[18CÞÛÛÛÝ[6C[31mÜÛÛÛÛ[41mß[4Cß[40mÛÛÛÛÜ[7C[30mÛÛÛÜ
+[18CÛÛÛÛ[7C[31mÛÛÛÛ[0;31mß[6Cß[1mÛÛÛÛ[8C[30mÛÛÛ [36mÛ
+[17C[30mÞÛÛÛ[6C[31mÜÛÛÛÛ[41mß[8Cß[40mÛÛÛÛ[7C[30mÞÛÛÝ[36mÜÛ[46mß[40m
+[46m[15C[40mÜÜÜÜÜÜÜÜÜÜÜÜ[31mÛÛÛÛ[36mÜÜÜÜÜÜÜÜÜÜÜ[41mÜÜÜÜÜ[40mÜÜÜÜÜÜÜÜÜÜÛ[0;36mß
+[14C[1mÛ[46mßß[0;36mß[1;30;46mÜÜÜ[0;36mßßßß[1;31;46mÜ[40mÛÛÛÛ[41mß[0;36mßßßßßßßßßßßßß[1;31;46mÜÜÜÜ[0;36mßßßßßß[1;30;46mÜÜÜ[0;36mß
+[12C[1mÜÛ[46mß[3C[30;40mÛÛÛ [31mÛÛÛÛ[0;31mß[14Cß[1mÛÛÛÛ[5C[30mÛÛÛ
+[12C[36;46mß[0;36mß[5C[1;30mÛÛÛ [31mÜÛÛÛÛ[41mß[16Cß[40mÛÛÛÛÜ [30mÛÛÛ
+[20CÛÛ[31;47mÛ[40mÛÛÛÛ[0;31mß[18Cß[1mÛÛÛÛ [0;30mÛ[1mÛÛÛ
+[21Cß[41mÜ[31mßßß[0;31mß[20C[1;41mß[40mÛÛÛÛ[0;30mÛÛ[1mÛß
+[23CßÛÛÛÜ[18CÜÜ[41mÜ[31;40mÛÛÛÛ
+[25C[30mßÛÛÛÛÜÜÜ[9CÜÜÛÛÛÛÛ[31;41mß[40mÛÛÛÛÜ
+[29C[30mßßßÛÛÛÛÛÛÛÛÛÛÛÛßß [0;31mß[1mÛÛÛÛ
+[51C[0;31mß[1;41mßß[0;31mß
+
+ [1;36m"[0;36mAnarchy is the base of todays society, without it, we would be in chaos[1m"
+[40C- Anarchist[0m
+
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+Call these œegions “f œucifer support boards for information or application
+inquiries:
+
+Digital Hackers Network 213/274+1333 œ.“.œ HeadQuaters/Home
+Electric Eye ][ 313/776+8928 œ.“.œ Distribution Site #1
+Digital Information Exchange 612/356+2209 œ.“.œ Distribution Site #2
+ÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ
+œegions “f œucifer High Office Members:
+
+Prezident/Founder: Wave Runner!
+Vice Prezident : Count_Zer0
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+ This text file is (C)Copyrite 1990 œ.“.œ Inc.
+ œ.“.œ is a registered trademark of DHN, All rights reserved
+ Any modifications to this text file is a violation of copyrite.
+ Digital Hackers Network 213/274+1333 -=œ.“.œ Home=-
+ÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄÄ
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/VOICEMAIL/vmbrl.txt b/textfiles.com/phreak/VOICEMAIL/vmbrl.txt
new file mode 100644
index 00000000..0c1f6540
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/vmbrl.txt
@@ -0,0 +1,126 @@
+ R e n e g a d e L e g i o n
+ * * T e c h n i c a l R e p o r t s * *
+ * R * * L *
+ * *
+
+ Eastern Western
+ ....
+Net Runner ........ Overdose
+The Knight ......... Sirus
+Kingpin ... .... Snuggle
+Highlander ... ....
+Nemesis .....
+Rogue .... Canadien
+Zardoz ....
+Cursor ... ...
+The Gypsy ... ... Blackheart
+Iceburg .. ...
+White Knight ...
+
+ Presents
+
+
+ Eastern RL HQ - 617-XXX-XXXX
+ Canadien HQ - 902-XXX-XXXX
+
+
+VMB (Voice Mail Box) Hacking
+----------------------------
+
+Written By: The Knight
+
+
+
+Ok, Here's the deal. VMB Hacking Is not a HUGE deal and there really isn't
+a great deal of 'hidden info' that isn't common sense. But, If you are out
+there trying to hack a box and can't, follow through the VERY logical and
+simple steps and make sure they are matching up.
+
+
+Step 1:
+
+Finding a VMB System
+
+There are many ways you can find a VMB system, for instance, on a BBS when
+someone says 'Here are some systems' usually thats what they're referring
+to. Also, Try setting up your scanner and listening for 'Welcome to XX
+company, Enter extension #' or something similar to that. Then you have
+found a VMB system.
+
+
+Step 2:
+
+Finding a Box
+
+This is the part where most IDIOTS fuck up. You can NOT just take ANY box.
+You must make sure that no one is using it. There are several ways to do
+this. One EASY way is when you hack it, check the date on the latest
+messages, if they are OVER a month old, then I'd say your safe to use them.
+Also, watch in case there is just like _2_ messages in there from the last
+4 months that those messages could be messages sent to ALL the boxes, see if
+they sound personal. If they DON'T, then grab the box.
+
+Let's say there's a box you REALLY want bad and someone's using it regularly,
+try doing this: Go in twice a day (make SURE you DON'T change the greeting
+etc.) and erase all the messages. He will complain and will eventually move
+out of the box. Then there is a good chance of you having that box. It's
+happned to me.
+
+
+Step 3:
+
+Hacking the VMB
+
+This is the most SIMPLE part of all. MY general method is as follows:
+
+Find a box, let's say box 260. It's empty and I want it (obviously).
+First, try passcode '000', if that doesn't work, try passcode '260',
+just make very general guesses that's ALL. Some of the MOST Common passcodes
+are:
+
+3 digit boxes:
+000
+123
+111
+222
+333
+444
+555
+666
+777
+888
+999
+box # (say it's box 260, passcode: 260)
+321
+
+4 digit boxes:
+
+1234
+0000
+1111
+2222
+3333
+4444
+5555
+6666
+7777
+8888
+9999
+box # (Say its box 1200, try passcode: 1200)
+
+
+The Key: REALLY try ALL of those. I knew one system with a passcode of
+ '5555' and NO ONE could hack it. And I did. So don't give up.
+ UNLESS you've exhausted all of those possibilities. Then forget
+ it.
+
+That's it really. The most simple thing to do. Just remember not to
+give up before you should and also try 3 digit passcodes on 4 digit
+boxes. Also, once you get in for added security, a lot of these boxes
+allow more digits for passcodes, so make a 5 digit passcode. Or if you
+think it's worth it, try like '00000' so that's really about all.
+
+Have fun and don't stop.
+
+ -- The Knight, Sysop Eastern RL HQ BBS
+
diff --git a/textfiles.com/phreak/VOICEMAIL/vmbs1.txt b/textfiles.com/phreak/VOICEMAIL/vmbs1.txt
new file mode 100644
index 00000000..a4c94095
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/vmbs1.txt
@@ -0,0 +1,52 @@
+ VMB's (Voice Mail Box) | 1&2 = Both call same number
+ | 1 = One calls this number
+ Call : 213-598-7900 (Party Pirate Line) BRIDGE| 2 = the other calls this
+ Call : 317-265-4488 (Unused Bridge) |
+ VMB Number |EXTEN | Operator of VMB | Loops
+ _______________| SION|______________________ | _____________________
+ N O L E E C H I N G |
+ 716-987-7439 : None : The Pirate | 1&2 @ 212-567-9938
+ 716-987-7648 : None : AK 47 (Brother) | 1&2 @ 504-356-5619
+ 716-987-7666 : None : Jack the RIPPER | 1 @ 202-678-8049
+ 716-987-7623 : None : Romper | 2 @ " " 8048
+ 716-987-7502 : None : DEATH (Not Master) | 1 @ 504-831-9099
+ 213-856-2580 : None : Black Ball Mis ]I[! | 2 @ " " 9098
+1-800-333-5625 : 354 : The Flaw |
+1-800-438-1061 : 135 : MW 8 |__________________________
+ 312-410-7213 : : MC Docs | 1999 | 0488 |
+ 213-494-9700 : : Public Enemy |_________|________________|
+ 714-647-1958 : : Mr Music | | |
+ 213-202-4381 : : JDT | | |
+ 313-399-2596 : : The Stranger | | |
+1-800-525-7243 :**8889: Pure Genius | | |
+ 619-492-8087 : : Trixder Ice |_________|________________|
+1-800-632-6681 : 2614: Con Artist | 0266 | AT&T |
+1-800-552-2440 : 5206: Console Cowboy | |80446713159980 |
+ 619-496-3393 : : The Saint | |60110804335933 |
+1-800-289-2121 : 255: Gremlin | |71333331316212 |
+ 818-594-7049 :**7751: WhipLash | |70238697343418 |
+ 818-594-7049 :**7754: Ace / WhipLash | | |
+ 818-594-7049 :**7757: ChainSaw | | |
+ 818-594-7049 :**7759: Hercules | | |
+ 818-594-7049 :**7760: The Faker | | |
+ 714-987-5128 : : AlphaBits | | |
+ 213-856-8450 : : Iniolater | | |
+ : : | | |
+ : : | | |
+ : : | | |
+____________________________________________________________________________
+-Don't Work for me. -
+ 950-0488
+0471041692102
+7261041692102
+1151041692102
+7411041692102
+0721041692102
+2591041692102
+ 950-0266 Public Bridges:
+5024180 312-630-9590;9592;9594;9596;9598
+ 312-606-9214
+ 312-606-0766
+ 312-704-0724
+
+
diff --git a/textfiles.com/phreak/VOICEMAIL/vmbzan.hac b/textfiles.com/phreak/VOICEMAIL/vmbzan.hac
new file mode 100644
index 00000000..24d116cf
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/vmbzan.hac
@@ -0,0 +1,86 @@
+###############################################################################
+## ÄÍðZhit Axis Nation presentsðÍÄ W () W ##
+## How to have your own VMB \||/ ##
+## || ##
+## Written by: The Exorcist _/ \_ ##
+## Dated: 7/24/91 ##
+## Greet(s) to: Doc Logic, my teacher at school, and the godly CoP... ##
+## ##
+## Ying Yang BBS The Baron's Bistro FuNHouse BBS ##
+## ZAN Promised Land ZAN Mosque#001 ZAN Mosque#002 ##
+## SysOp: CoP SysOp: The Baron SysOp: Erasmus ##
+###############################################################################
+Here is another ultimately cool ZAN text file brought to you by the Exorcist.
+Call 1-312-839-3850 and leave all the shit you want, codes and nos and shit..
+
+
+This file is only based upon the information gathered from VMB's with the
+839 prefix.
+
+Ok here is a file from Z.A.N. so I wont be purged! What is a VMB? A VMB
+is a Voice Mail Box.. or sometimes known as a Voice Mail System. Their
+purpose is to record messages for people.. (id est OB/Gyn's and Pediatrists,
+Drug Dealers, and a curious of other rich and filthy scum.) Lets say Joe
+Supplier is out with his hoe.. Of course he can't get in touch with his
+fiendish hommies so what does he do? No, he doesn't get a beeper cuz that
+might tick of his hoe.. He get's a VMB where he has the caller has the option
+to leave a phone no. or a voice message.
+
+Joe S. finishes with his hoe calls up his VMB listens to his pre-recorded
+message for a little while " Yea Man, I ain't no home now, but you leave
+message an I call you when I done with yo sis'" then presses "0" on his touch
+tone phone. A nice little voice comes on saying "Please enter your access
+code." He enters his code and hears " You have xx messages press 7 to play."
+He presses 7 and hears his messages.
+
+So you get the point by now, and if you don't you shouldn't be reading this..
+So how do you get one, why you just look it up in the yellow pages and let
+your fingers do the talking.. But everyone knows that the real way is to
+HACK it.. Find out some pager prefixes, I know some in Illinois are 312-839
+and then theres 708-xxx. Then attempt to call every no. combination there is
+unless you have a scanner or something that you can program to act upon
+different messages.. To make your time go faster try little combinations
+like 839-fuck or 839-hack. About 95% of the time you will simply here a few
+beeps. This is for the conventional pager, the correct procedure is to type
+in your phone no. and press the # button. By the way, if you really get
+pissed at someone, you can type in their no. and then they will be getting
+calls from people saying "John Doe from 1st National back returning your
+call" or "Yeah man, dis be Tyrone, wha you be, G?"
+
+When you finally get one, either by taking someone elses - trying to hack
+their passwords or believe this, some persons are to stupid to even have
+passwords - or by finding an empty one. The second of the two being the
+better and safer. Hacking someones VMB cant get you in any trouble.. Just
+don't attemt to change the message right away.. But if you are the true
+anarchist, you will change his/her message, Call back the next day, and find
+the old message back with a new password.. Now is your time to have fun.
+Keep saying "I got your VMB along with your address and shit, be expecting
+a ton of manure on your front lawn Monday." I kept doing this along with
+saying "I am going to kill your Grandmother" After awhile the guy changed
+his message to say something like "Hey man stop leaving me messages, I'll
+use ANI to bust you" What a looser!
+
+What exactly are the commands once you get in to your own little VMB?
+
+Pressing the "*" will give you the following options..
+
+3 to delete
+2 to play again
+4 to skip forward in message
+11 to update greeting
+13 to forward message
+17 to change access code
+
+I also found out some that they don't tell you once you press "*"
+
+8 will get you the time that the messages were left
+5 will tell you what message you are at
+6 sets you back to the beginning
+
+
+If you do succeed, please post your VMBs so that the anarchistic public can
+leave you mail. Who knows maybe you'll get some CC's or codes and shit..
+
+
+
+Downloaded From P-80 International Information Systems 304-744-2253
diff --git a/textfiles.com/phreak/VOICEMAIL/vmx.txt b/textfiles.com/phreak/VOICEMAIL/vmx.txt
new file mode 100644
index 00000000..b6f79b81
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/vmx.txt
@@ -0,0 +1,52 @@
+
+
+==)--- P TO PAUSE S TO STOP ---(==
+
+Toll-Free Answering Services
+
+
+Allied Toll-Free Service Bureau(ask for oper 526) 800-824-7888
+
+American Discount Dialing System 800-227-1617 (CA 800-852 7777) (CA 800-772-3545)
+
+Dialog Marketing 800-447-4700 (IL 800-322-4400)
+
+Direct Marketing Services Inc. 800-223-1944
+
+Executive Locator 800-323-6556
+
+H Q Co 800-227-3004 (800-652-1848)
+
+National Communications Center Inc. 800-824-5120 (CA 800-525-7711)
+
+National Data Corperation 800-257-9611
+
+National Switchboard 800-528-6052
+
+Nice-National Instant Consumer Exchange 800-453-9000
+
+Operator 800 800-448-4511 (NY 800-962-1480)
+
+Ring America 800-621-5199
+
+Share-a-Wats Inc. 800-854-2003
+
+Skycall 800-631-5488 (NJ 800-352-4951)
+
+Team Telephone 800-228-5000
+
+Tel-Com Message Service 800-451-4453 (VT 800-622-4429)
+
+Teletrak Response Center 800-328-5257
+
+USA 800 800-821-2280 (MO 800-892-7655)
+
+DOWNLOADED FROM P-80 SYSTEMS
+
+
+
+Archives #4
+
+
+<2>United Kingdom BBS'S
+<3>Weers Group...... 02 238 9034
\ No newline at end of file
diff --git a/textfiles.com/phreak/VOICEMAIL/voicmail.txt b/textfiles.com/phreak/VOICEMAIL/voicmail.txt
new file mode 100644
index 00000000..c86820a2
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/voicmail.txt
@@ -0,0 +1,84 @@
+ ____________________________ _____
+ \___ | ___/___/_ ___\___/ _ \/ ___/
+ | | |/ /____| | | | | |\ )/____
+ | | |>____ / | | |> | __/___ /
+ ___| | |____/ /| | | |__| |\ \_/ /
+ \____|____/__/ |_| |____/_| \_\_/ HL
+ -------------------------------------
+
+ THERE IS NOW A NEW FACILITY FOR COOL DUDES WHO WANTS IT....
+
+ IT'S TOTALLY FREE, BUT IS RESTRICTED TO THOSE WHO....
+
+ A) OWN A TONE PAD OR TONE DIALING PHONE.
+ B) WILL USE IT REGULARLY.
+ C) AREN'T LAME!!
+
+ THE FACILITY IS A FREE-PHONE MESSAGE BOX SYSTEM FOR YOU TO CALL AND LEAVE
+ MESSAGES, GOSSIP, ETC TO OTHERS ON THE SYSTEM. EACH PERSON IS GIVEN
+ HIS/HER OWN PERSONAL MAIL BOX WITH ITS OWN PASSWORD (CHANGABLE!). THE
+ SYSTEM ALSO ALLOWS THOSE OF YOU UNABLE TO PHREAK TO HAVE CHATS USING MAIL.
+
+ APPLYING FOR A MAIL BOX IS REALLY EASY. YOU CAN EITHER....
+
+ A) PHONE 0800 899224, LEAVE A MESSAGE CONTAINING YOUR NAME AND PHONE
+ NUMBER TO LORD FLIGHT/JESTERS AT MAIL BOX 510. THIS IS DONE BY DIALING
+ THE FREE=PHONE NUMBER, PRESSING THE `*' KEY AS SOON AS YOU HEAR THE
+ RECORDED VOICE, ENTERING `510', LEAVE YOUR DETAILS AFTER THE TONE, AND
+ HANGING UP WHEN YOU HAVE FINISHED!
+
+ B) CALL A BBS AND MAIL YOUR DETAILS TO ANY OF THESE USERS, IF THEY ARE
+ MEMBERS OF THE BOARD :-
+
+ SKITZ
+ HIGHLANDER
+ JESTERS
+ ZEBEDI
+
+ C) MAIL YOUR DETAILS TO ANY OF THE ABOVE USERS AT THE JESTERS HQ...
+
+ INNER SANCTUM ON 44 (0)229 430327.
+
+
+ IF YOUR APPLICATION IS ACCEPTED YOU'LL GET A CALL AND WILL BE TOLD YOUR
+ MAIL BOX NUMBER, YOUR PASSWORD (WHICH MUST BE CHANGED) AND A LIST OF
+ OTHER USERS ON THE SYSTEM.
+
+ NB : AS SOON AS YOU READ THIS TEXT, GIVE IT A GO, CAUSE EVERYTHING IS
+ FREE. THIS NUMBER WILL NOT GO DOWN FOR A GOOD 2 MONTHS OR SO, BUT IT WILL
+ EVENTUALLY, AND WHEN IT DOES YOU WILL BE NOTIFIED OF A NEW NUMBER TO CALL
+ WITHIN A WEEK!
+
+ CREDITS GO TO DEATH FOR FINDING THE ORIGINAL NUMBER...
+
+ ALLOCATED MAIL BOXES THAT ARE ABUSED OR NOT USED WILL BE RE-ALLOCATED TO
+ MORE APPRECIATIVE USERS!
+
+ NO TRICKS, NO CHARGES....WE DO THIS OUT OF THE GOODNESS OF OUR HEARTS!!
+
+ BULK ORDERS CAN ALSO BE MADE FROM LARGE GROUPS! RESERVATIONS ONLY TAKE
+ A SECOND!!!
+
+/* LORD FLIGHT */ - YOUR SYSTEM ADMINISTRATOR
+ _ __ ______ __________________
+ THE //\// \ // // \ // // ___// __ \ SYSOP: HIGHLANDER
+ // // \ // // \ // // /_ // /// /
+ // // /\ \/ // /\ \/ // __/// __/ COSYSOPS: RUTGER SOUND
+ // // / \\ // / \\ // / // /\ \ RISK
+ // // / \\_// / \\_// /__// / \\ \_________________________
+ \\/\\_/ \\_/ \\____/\\_/ \\__________________________/
+ ________ ________ __ ________________________ __ __ __
+ // ___ \ // ____ \// \ // // __ \\____ ___// \ // \// \ // \
+ // / \\_/// / // // \ // // / \\_/ // / // / // // \/ \
+ \\ \___ // \_// // /\ \/ // / // / // / // // /\ /\ \
+ __\\___ \// /\__ // / \\ // / __ // / // / // // / \/// /
+ // \__// // / // // / \\_// \// \ // / // \// // / // /
+ \\_______/\\/ \\_/\\_/ \\______/ \\_/ \\_______/\\_/ \\_/
+
+68030 POWER * 200 MEG STORAGE * DUAL STANDARD 14.4K * SERIAL LOCKED AT 38.4K
+ JESTERS U.K HQ * 0-1 DAYS ONLY
+«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»
+->->->->->->->->-> THE INNER SANCTUM +44 (0) 229 430327 <-<-<-<-<-<-<-<-<-
+«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»«»
+
+
diff --git a/textfiles.com/phreak/VOICEMAIL/xvmecinf.txt b/textfiles.com/phreak/VOICEMAIL/xvmecinf.txt
new file mode 100644
index 00000000..f3761faa
--- /dev/null
+++ b/textfiles.com/phreak/VOICEMAIL/xvmecinf.txt
@@ -0,0 +1,36 @@
+========================================
+= =
+= Xerox Voice Message Exchange Commands=
+= =
+= Written & Typed By:The Lineman =
+= =
+= Atlantis BBS 215/844-8836 (Private) =
+= =
+========================================
+
+ Command List:
+
+ 1 = Start/Stop Recording
+ 2 = Start/Stop Playing
+ 3 = Back Up
+ 33 = Back Up to Beginning
+ 4 = Skip Forward
+ 44 = Skip to End
+ 5 = Send/Erase
+ 55 = Notification of Non-Delivery
+ 7 = Save/Scan
+ 8 = Future Delivery
+ 0 = End of Address
+ * = End of Address
+
+ Special Commands:
+
+ 011 = New Message Queues
+ 012 = Saved Message Queues
+ 021 = Redirect
+ 022 = Reply
+
+Any questions? Dial 1-800-TEAM-XRX (1-800-832-5979)
+
+8/86
+
diff --git a/textfiles.com/phreak/WIRETAPPING.1 b/textfiles.com/phreak/WIRETAPPING.1
new file mode 100644
index 00000000..0c3002a9
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING.1
@@ -0,0 +1,80 @@
+
+T E X T F I L E S
+
+Phone Phreaking: Wiretapping and Bugs
+
+The Great Fear of people who use telephones to conduct their business (private
+or professional) is that someone is listening in, taking notes, recording.
+It's a concern that has allowed some very rough laws to be put into place, and
+it's a central theme of these files. They tell you how to bug telephones or
+rooms, get in the way of electronic transmissions, and they even touch on
+some of the politics behind this method of information gathering.
+
+Of course, it should be noted that not everyone out there wiretapping is a
+private citizen.
+
+
+Filename
|
+Size
|
+Description of the Textfile
|
+
+
+bellinfo.txt 10630
| Some Bell Telephone Info, by Phucked Agent 04 (Revised October, 1984)
+ | bug.txt 9176
| Automatic Phone Recorder by Atomic Punk (May 1, 1989)
+ | bugdetct.phk 1893
| Bug Detection on Home Phones, by Dr. Jimmy and Mr. Jim
+ | bugging.guide 7040
| Bugging I: A Little Electronics Goes a Long, Long Way by Brew Associates
+ | bugging.phk 7201
| Bugs on a Budget, Inexpensive Surveillance, 8-85
+ | buggy.phk 1579
| A little history about the Infinity Transmitter
+ | bugphone.phk 4640
| An Automatic Phone Recorder, by Atomic Punk
+ | bugstaps.txt 1891
| Bugs and How to Tap Someone's Room by Fireball
+ | buildbug.phk 3852
| How to Build a Bug Detector by The Gremlin
+ | caller 6623
| Notes on Recording Caller ID Signals and Voice Notes
+ | callwai.txt 2878
| The Call Waiting Tap, by The Byte
+ | cordless.phk 6713
| How to listen into cordless phone conversations, by Beowulf
+ | datatap.hac 3968
| Tapping Computer Data is Easy! By Rick Blackmon
+ | detectbug.phk 2912
| Detecting Bugs on Home Phones by Dr. Jimmy and Mr. Jim
+ | dltp1.txt 4738
| Detecting Line Taps of C-Net Compatibles
+ | dltp2.txt 3585
| Detecting Line Taps Part type by C-Net Compatibile
+ | eaves1.txt 14460
| Basic Eavesdropping #1: The Electronic Ear by The Freddy and NNAN
+ | es.txt 25505
| Electronic Bug Detection
+ | faxint.phk 14663
| Fax Machine Interception, from Full Disclosure #23
+ | fmbug.hac 4736
| How to Make an FM Wireless Bug, by Johnny Rotten
+ | fmphone.bug 2340
| Making An FM Monitoring Device Cheap, Small, and Interesting! by Lord Foul
+ | fonebugs.hac 2199
| Bug Detection on Home Phones
+ | fonepole.txt 4097
| Climbing Phone Poles- Tips and techniques by The Mad Phone-man
+ | foneptch.phk 29642
| Building and Using Phone Patches, by Julian Macassey
+ | fonesci.phk 18900
| The Science of Telephone Surveilance, by Eric The Red
+ | intercpt.txt 22529
| Pager, Fax, and Data Intercept Techniques
+ | lbt-alt1.txt 3651
| Info on Automatic Line Testers (APR) by RiPMax of Liberty
+ | lbt-alt2.txt 3796
| Automatic Line Testers (SALT) by RiPMaX of Liberty
+ | lineman.phk 6645
| Wiretapping and Divestiture: A Lineman Speaks Out, by The Shadow
+ | listenin.txt 4520
| How to Listen to Phone Conversations by The Prowler and Icecube (August 22, 1989)
+ | lmos.phk 4286
| How to Monitor a Phone Line (From a Dial-Up Line) with LMOS by Monique
+ | mism32.hac 5248
| Wiretape Loophole Concerns by Geoffrey S. Goodfellow
+ | mism36.hac 12928
| Private Audience (The Art of Listening In) by The Overlord
+ | mism37.hac 7040
| Wiretapping, Bugs on lines, and Listening in, by Forest Ranger
+ | mobfone.phk 9745
| How to Get Into the AT&T Network by Building Your Own Mobile Phone
+ | nightl.txt 21788
| Trascription: Nightline: FBI, Privacy, and Proposed Wiretap Legislation (May 22, 1992)
+ | phone.tap 4243
| How Many Different Phone Taps Work
+ | phonetap.phk 2896
| Bug Detection on Home Phones, by Mr. Jimmy
+ | phonetap.txt 3767
| Phone Tapping, by Lord Jaxom
+ | phontap.phk 2913
| The Call Waiting Tap, by The Byte
+ | precord.phk 5878
| Automatic Phone Recorder by Atomic Punk, May 1, 1989
+ | ptapping.phk 14476
| Under Surveillance: Phone Tapping by The Dark Knight (November 3, 1990)
+ | swtchbrd.phk 7031
| Building Your Own Switchboard by Autopsy Saw
+ | tapfones.hac 11956
| Private Audience: A Basic Guide to the Art of Listening In
+ | taphones.phk 3105
| How to Tap Into Your Neighbor's Phones, by Lord Jaxon
+ | tapownline.phk 4533
| How to Tap your Own Phone Line, by The Smartass Hindering Irritating Timelord
+ | tapphon.txt 8303
| How to Listen in to Cordless Phone Conversaitons by Beowulf
+ | tapping.phk 1644
| Bugs and How to Tap Someone's Room, by Fireball
+ | tapping.txt 2468
| The Call Waiitng Tap by The Byte and Road Agent
+ | taps2.txt 4550
| Some Information on Phone Taps
+ | tempest.txt 46237
| Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and
+ | wait.tap 2683
| The Call Waiting Tap by The Byte, Distributed by RAM Kracker
+ | wiretap.ana 3896
| General Wiretap Information
+ | wiretap.txt 13663
| Wiretapping Abuse Report on the FBI in 1991
+ | wiretapp 6479
| Wiretapping and Eavesdropping: Is There Cause for Concern? by the Privacy Rights Clearinghouse
+ | wiretaps.txt 23758
| Can Wiretaps Remain Cost-Effective? By Robin Hanson
+ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
There are 56 files for a total of 472,516 bytes. |
+
+
diff --git a/textfiles.com/phreak/WIRETAPPING/.windex.html b/textfiles.com/phreak/WIRETAPPING/.windex.html
new file mode 100644
index 00000000..a750ca90
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/.windex.html
@@ -0,0 +1,80 @@
+
+T E X T F I L E S
+
+Phone Phreaking: Wiretapping and Bugs
+
+The Great Fear of people who use telephones to conduct their business (private
+or professional) is that someone is listening in, taking notes, recording.
+It's a concern that has allowed some very rough laws to be put into place, and
+it's a central theme of these files. They tell you how to bug telephones or
+rooms, get in the way of electronic transmissions, and they even touch on
+some of the politics behind this method of information gathering.
+
+Of course, it should be noted that not everyone out there wiretapping is a
+private citizen.
+
+
+Filename
|
+Size
|
+Description of the Textfile
|
+
+
+bellinfo.txt 10630
| Some Bell Telephone Info, by Phucked Agent 04 (Revised October, 1984)
+ | bug.txt 9176
| Automatic Phone Recorder by Atomic Punk (May 1, 1989)
+ | bugdetct.phk 1893
| Bug Detection on Home Phones, by Dr. Jimmy and Mr. Jim
+ | bugging.guide 7040
| Bugging I: A Little Electronics Goes a Long, Long Way by Brew Associates
+ | bugging.phk 7201
| Bugs on a Budget, Inexpensive Surveillance, 8-85
+ | buggy.phk 1579
| A little history about the Infinity Transmitter
+ | bugphone.phk 4640
| An Automatic Phone Recorder, by Atomic Punk
+ | bugstaps.txt 1891
| Bugs and How to Tap Someone's Room by Fireball
+ | buildbug.phk 3852
| How to Build a Bug Detector by The Gremlin
+ | caller 6623
| Notes on Recording Caller ID Signals and Voice Notes
+ | callwai.txt 2878
| The Call Waiting Tap, by The Byte
+ | cordless.phk 6713
| How to listen into cordless phone conversations, by Beowulf
+ | datatap.hac 3968
| Tapping Computer Data is Easy! By Rick Blackmon
+ | detectbug.phk 2912
| Detecting Bugs on Home Phones by Dr. Jimmy and Mr. Jim
+ | dltp1.txt 4738
| Detecting Line Taps of C-Net Compatibles
+ | dltp2.txt 3585
| Detecting Line Taps Part type by C-Net Compatibile
+ | eaves1.txt 14460
| Basic Eavesdropping #1: The Electronic Ear by The Freddy and NNAN
+ | es.txt 25505
| Electronic Bug Detection
+ | faxint.phk 14663
| Fax Machine Interception, from Full Disclosure #23
+ | fmbug.hac 4736
| How to Make an FM Wireless Bug, by Johnny Rotten
+ | fmphone.bug 2340
| Making An FM Monitoring Device Cheap, Small, and Interesting! by Lord Foul
+ | fonebugs.hac 2199
| Bug Detection on Home Phones
+ | fonepole.txt 4097
| Climbing Phone Poles- Tips and techniques by The Mad Phone-man
+ | foneptch.phk 29642
| Building and Using Phone Patches, by Julian Macassey
+ | fonesci.phk 18900
| The Science of Telephone Surveilance, by Eric The Red
+ | intercpt.txt 22529
| Pager, Fax, and Data Intercept Techniques
+ | lbt-alt1.txt 3651
| Info on Automatic Line Testers (APR) by RiPMax of Liberty
+ | lbt-alt2.txt 3796
| Automatic Line Testers (SALT) by RiPMaX of Liberty
+ | lineman.phk 6645
| Wiretapping and Divestiture: A Lineman Speaks Out, by The Shadow
+ | listenin.txt 4520
| How to Listen to Phone Conversations by The Prowler and Icecube (August 22, 1989)
+ | lmos.phk 4286
| How to Monitor a Phone Line (From a Dial-Up Line) with LMOS by Monique
+ | mism32.hac 5248
| Wiretape Loophole Concerns by Geoffrey S. Goodfellow
+ | mism36.hac 12928
| Private Audience (The Art of Listening In) by The Overlord
+ | mism37.hac 7040
| Wiretapping, Bugs on lines, and Listening in, by Forest Ranger
+ | mobfone.phk 9745
| How to Get Into the AT&T Network by Building Your Own Mobile Phone
+ | nightl.txt 21788
| Trascription: Nightline: FBI, Privacy, and Proposed Wiretap Legislation (May 22, 1992)
+ | phone.tap 4243
| How Many Different Phone Taps Work
+ | phonetap.phk 2896
| Bug Detection on Home Phones, by Mr. Jimmy
+ | phonetap.txt 3767
| Phone Tapping, by Lord Jaxom
+ | phontap.phk 2913
| The Call Waiting Tap, by The Byte
+ | precord.phk 5878
| Automatic Phone Recorder by Atomic Punk, May 1, 1989
+ | ptapping.phk 14476
| Under Surveillance: Phone Tapping by The Dark Knight (November 3, 1990)
+ | swtchbrd.phk 7031
| Building Your Own Switchboard by Autopsy Saw
+ | tapfones.hac 11956
| Private Audience: A Basic Guide to the Art of Listening In
+ | taphones.phk 3105
| How to Tap Into Your Neighbor's Phones, by Lord Jaxon
+ | tapownline.phk 4533
| How to Tap your Own Phone Line, by The Smartass Hindering Irritating Timelord
+ | tapphon.txt 8303
| How to Listen in to Cordless Phone Conversaitons by Beowulf
+ | tapping.phk 1644
| Bugs and How to Tap Someone's Room, by Fireball
+ | tapping.txt 2468
| The Call Waiitng Tap by The Byte and Road Agent
+ | taps2.txt 4550
| Some Information on Phone Taps
+ | tempest.txt 46237
| Eavesdropping On the Electromagnetic Emanations of Digital Equipment: The Laws of Canada, England and
+ | wait.tap 2683
| The Call Waiting Tap by The Byte, Distributed by RAM Kracker
+ | wiretap.ana 3896
| General Wiretap Information
+ | wiretap.txt 13663
| Wiretapping Abuse Report on the FBI in 1991
+ | wiretapp 6479
| Wiretapping and Eavesdropping: Is There Cause for Concern? by the Privacy Rights Clearinghouse
+ | wiretaps.txt 23758
| Can Wiretaps Remain Cost-Effective? By Robin Hanson
+ | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | |
There are 56 files for a total of 472,516 bytes. |
+
+
diff --git a/textfiles.com/phreak/WIRETAPPING/bellinfo.txt b/textfiles.com/phreak/WIRETAPPING/bellinfo.txt
new file mode 100644
index 00000000..f49c7713
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/bellinfo.txt
@@ -0,0 +1,201 @@
+
+/-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-\
+! Bell Telephone Info !
+\-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-/
+
+
+******************************************************************************
+
+ BRIDGING HEADS, RESIDENTIAL AND BUSINESS MULTILINE DISTRIBUTION BOXES, LINE
+AND TRUNK SPLITTERS, AND OTHER BELL SYSTEM WIRE TERMINATIONS.
+
+ - HOW TO USE, AND/OR ABUSE THEM -
+
+(INCLUDING A TUTORIAL ON BASIC TELEPHONE EAVESDROPPING TECHNIQUES.)
+
+******************************************************************************
+
+WRITTEN BY : PHUCKED
+ AGENT 07/29/84
+ 04
+
+REVISED FOR LOD! 10/84
+CURRENTLY REVISION II
+
+****************************************************************************
+
+ IN THIS ARTICLE, I WILL FIRST BESCRIBE THE TERMINATION, WIRING, AND
+TERMINAL HARDWARE MOST COMMONLY USED IN THE BELL SYSTEM, AND I WILL INCLUDE
+A SECTION ON METHODS OF USING THEM.
+
+*****************************************************************************
+
+-------------
+LOCAL NETWORK
+-------------
+
+ THE LOCAL TELEPHONE NETWORK BETWEEN THE CENTRAL OFFICE/EXCHANGE AND
+THE TELEPHONE SUBSCRIBERS CAN BE BREIFLY DESCRIBED AS FOLLOWS:
+ FROM THE CENTRAL OFFICE (OR LOCAL EXCHANGE) OF A CERTAIN PREFIX(ES),
+UNDERGROUND AREA FEEDER TRUNKS GO TO EACH AREA THAT HAS THAT PREFIX. (USUALLY
+MORE THAN ONE PREFIX PER AREA) AT EVERY FEW STREETS OR TRACT AREAS, THE
+UNDERGROUND CABLES SURFACE. THEY THEN GO TO THE SECONDARY TERMINATION, (THE
+AERIAL TELEPHONE FEEDER CABLE) (OR BACK UNDERGROUND, DEPENDING ON THE AREA) AND
+THEN TO THE SUBSRIBERS HOUSE (OR IN THE CASE OF AN APARTMENT BUILDING OR
+MUTLILINE BUSINESS, TO A SPLITTER OR DISTRIBUTION BOX/PANEL).
+
+NOW THAT WE HAVE THE BASICS, I'LL TRY AND GO IN-DEPTH ON THE SUBJECT.
+
+------------------
+UNDERGROUND CABLES
+------------------
+
+ THESE ARE SOMETIMES INTEROFFICE TRUNKS, BUT USUALLY IN A RESIDENTIAL AREA
+THEY ARE FEEDER GROUPS THAT GO OTO BRIDGING HEADS OR DISTRIBUTION CASES. THE
+CABLES ARE ABOUT 2-3 INCHES THICK (VARIES), AND ARE EITHER IN A METAL OR
+PVC-TYPE PIPE (OR SIMILAR). RARELY (MAYBE NOT IN SOME REMOTE RURAL AREAS) ARE
+THE CABLES JUST 'ALONE' IN THE GROUND. INSTEAD, THEY ARE USUALLY IN AN
+UNDERGROUND CEMENT TUNNEL (RESEMBLES A SMALL SEWER OR STORMDRAIN). THE MANHOLES
+ARE >HEAVY< AND WILL SAY 'BELL SYSTEM' ON THEM. THEY CAN BE OPEN ED WITH A 1/2
+INCH WIDE CROWBAR (HOOK SIDE) INSERTED IN THE TOP RECTANGULAR HOLE. IF YOU GET
+IT OPEN, GO INSIDE!! THERE ARE LADDER RUNGS TO HELP YOU CLIMB DOWN. YOU WILL
+SEE THE CABLE PIPES ON THE WALL, WITH THE BLUE AND WHITE STRIPED ONE BEING THE
+INTEROFFICE TRUNK GRP (AT LEAST IN MY AREA). THE OTHERS ARE LOCAL LINES, AND
+ARE USUALLY MARKED OR COLOR CODED. THERE IS ALMOST ALWAYS A POSTED COLOR CODE
+CHART ON THE WALL, NOT TO MENTION TELCO MANUALS DESCRIBING THE CABLES AND
+TERMINALS, SO I NEED NOT GET INTO DETAIL. AGAIN: >IF YOU CAN GET INTO A
+BELL MANHOLE, DO IT!, IT WILL PAY OFF<. ALSO, THERE IS USUALLY SOME KIND OF
+TEST EQUIPMENT, AND OFTEN BELL TEST SETS ARE LEFT IN THERE. SO GET YOUR
+CROWBARS!
+
+--------------
+BRIDGING HEADS - (WE MS2'S)
+--------------
+
+ THE INNOCENT-LOOKING GRAYISH-GREEN BOXES. WHEN IN GROUPS OF TWO OR THREE,
+THEY ARE FOR SECONDAY/TERTIARY TERMINATION AND ACCESS POINTS (BRIDGED ACCESS).
+THESE ARE THE WESTERN ELECTRIC SAI 55 OR 22/E TERMINAL CASES. THEY HOLD ON THE
+ORDER OF 900-1200 CABLE PAIRS. THIS IS USUALLY THE SECOND TERM. POSITION ON THE
+LOCAL LOOP (AFTER THE MTF FRAME AT THE CO/ OR THE UNDERGROUND 'FTP' POSITION).
+THESE CAN BE EITHER TRUNK BRIDGES OR BRIDGING FOR RESIDENCES. THE AREA FEEDER
+BRIDGING HEADS ARE USUALLY LARGER, AND THEY HAVE THE 'WESTERN ELECTRIC' LOGO AT
+THE BOTTOM, WHEREAS THE NORMAL BRIDGING HEADS (WHICH MAY BE DIFFERENT IN SOME
+AREAS DEPENDING ON THE COMPANY YOU ARE SERVED BY. GTE B.H'S LOOK SLIGHTLY
+DIFFERENT. ALSO, DO NOT BE FOOLED BY SPRINKLER BOXES!) CAN BE FOUND IN JUST
+ABOUT EVERY CITY.
+ TO OPEN A BRIDGING HEAD: IF IT IS LOCKED (AND YOU'RE FEELING DESTRUCTIVE),
+PUT A HAMMER OR CROWBAR (THE SAME ONE YOU USED ON THE MANHOLE) IN THE SLOT
+ABOVE THE TOP HINGE OF THE RIGHT DOOR. PULL HARD, AND THE DOOR WILL RIP OFF.
+VERY EFFECTIVE!
+ IF IT ISN'T LOCKED (AS USUAL), TAKE A 7/16 INCH HEX SOCKET AND WITH IT, TURN
+THE BOLT ABOUT 1/8 OF A TURN TO THE LEFT (YOU SHOULD HEAR A SPRING RELEASE
+INSIDE). HOLDING THE BOLT, TURN THE HANDLE ALL THE WAY TO THE RIGHT AND PULL
+OUT.
+ NOW INSIDE, FIRST CHECK FOR A TEST-SET (WHICH ARE OFTEN LEFT BY BELL
+EMPLOYEES). THERE SHOULD BE A PANEL OF CABLE PAIRS + SCREW TERMINALS (TYPE
+45/47IB REGULAR BINDERS) . PUSH THE PANEL BACK ABOUT AN INCH OR SO, AND ROTATE
+THE TOP LATCH (ROUND WITH A FLAT SECTION) DOWNWARD. RELEASE THE PANEL AND IT
+WILL FALL ALL THE WAY FORWARD. THERE IS USUALLY A LARGE AMOUNT OF WIRE AND
+EXTRA TERMINALS. THE TEST-SETS ARE OFTEN HIDDEN HERE, SO DONT OVERLOOK IT (400
+FOOT ROLLS OF #22 SOLID WIRE ARE OFTEN NEAR THE TOP IN THE BACK OF THE BOX.
+'BORROW THEM'). ON THE RIGHT DOOR IS A METAL BOX OF INSULATORS, BINDERS, CLIPS,
+ETC. TAKE A FEW (COMPLIMENTS OF BELL...). ON EACH DOOR IS A USEFUL ROUND METAL
+DEVICE. (SAYS 'INSERT GENTLY' OR 'CLAMP GENTLY - DO NOT OVERTIGHTEN' ETC..) ON
+THE FRONT OF THE DISC, YOU SHOULD FIND TWO TERMINALS. THESE ARE FOR YOUR TEST
+SET. (IF YOU DONT HAVE ONE, DONT DEPAIR -I'LL SHOW YOU WAYS TO MAKE BASIC TEST
+SETS LATER IN THIS ARTICLE). HOOKING THE RING (-) WIRE TO THE 'R' TERMINAL; AND
+THE TIP (+) WIRE TO THE OTHER. (BY THE WAY, AN EASY WAY TO DETERMINE THE
+CORRECT POLARITY IS WITH A 1.5V LED. TAP IT TO THE TERM. PAIR, IF IT DOESNT
+LIGHT, SWITCH THE POLES UNTIL IT DOES. WHEN IT LIGHTS, FIND THE LONGER OF THE
+TWO LED POLES. THIS ONE WILL BE ON THE TIP WIRE (+)) BEHIND THE DISC IS A
+COILED UP CORD. THIS SHOULD HAVE A SPECIALIZED CONNECTOR. ITS VERY USEFUL,
+BECAUSE YOU DONT HAVE TO KEEP CONNECTING AND DISCONNECTING THE FONE (TEST SET)
+ITSELF, AND THE CLIP IS DESIGNED TO AID IN LOCATING THE PAIR AND ASSURING THE
+CORRECT POLARITY.
+ ON THE TERMINAL BOARD, THERE SHOULD BE ABOUT 20 PAIRS (RED/WHITE) PER ROW
+PER SIDE. HOOK THE CLIP TO ANY TERMINAL PAIR, AND YOU'RE SET! DIAL OUT IF YOU
+WANT, OR JUST LISTEN (IF SOMEONE'S ON THE LINE). LATER, I'LL SHOW YOU A WAY TO
+SET UP A TRUE 'TAP' THAT YOU CAN SETUP, AND WILL LET THE PERSON DIAL OUT ON HIS
+LINE AND RECEIVE CALLS AS NORMAL, AND YOU CAN LISTEN IN THE WHOLE TIME. MORE
+ABOUT THIS LATER...
+ ON MAJOR PREFIX-AREA BRIDGING HEADS ('SAI' FOR AREA C.O. FEEDER CABLE) YOU
+CAN SEE TEMPORARY 'LOCAL LOOPS', WHICH ARE TWO CABLE PAIRS (CABLE PAIR =RING +
+TIP, A FONE LINE) THAT ARE DIRECTLY CONNECTED TO EACH OTHER ON THE TERMINAL
+BOARD. THESE 'CHEAP LOOPS' AS THEY ARE CALLED, DO NOT WORK NEARLY AS WELL AS
+THE EXISTING ONES SET UP IN THE SWITCHING HARDWARE AT THE EXCHANGE OFFICE. (TRY
+SCANNING YOUR PREFIXES' 00XX OR 99XX #'S. THE TONE SIDES WILL ANNOUNCE
+THEMSELVES WITH THE 1000 HZ LOOP TONE, AND THE HANG SIDE WILL GIVE NO RESPONSE.
+THE FIRST PERSON SHOULD DIAL THE 'HANG' SIDE, AND THE OTHER PERSON DIAL THE,
+TONE SIDE, AND THE TONE SHOULD STOP IF YOU HAVE GOT THE RIGHT LOOP). THE LOOPS
+ARE USED IN FRAME TERMINATION AND IN SONIC/600 OHM TERM. TESTING AND
+LINE/CABLE/FEEDER LOCATION.
+ IF YOU WANT TO FIND THE NUMBER OF THE LINE THAT YOU'RE ON, YOU CAN EITHER
+TRY TO DECIPHER THE 'BRIDGING LOG' (OR WHATEVER), WHICH IS ON THE LEFT DOOR. IF
+THAT DOESNT WORK, YOU CAN USE THE FOLLWING:
+
+---
+ANI # (AUTOMATIC NUMBER INDENTICATION)
+---
+ THIS IS A TELCO TEST NUMBER THAT REPORTS TO YOU THE NUMBER THAT YOU'RE
+CALLING FROM (IT'S THE SAME, CHOPPY 'BELL BITCH' VOICE THAT YOU GET WHEN YOU
+REACH A DISCONNECTED #) (PIP OR ONE OF THE 11X SERIES ANNOUNCE MENT FRAME
+MACHINES.)
+
+FOR THE 213 NPA - DIAL 1223
+ 213 NPA - (GTE AREAS) DIAL 114
+ 408 NPA - DIAL 760
+ 914 NPA - DIAL 990
+
+THESE ARE EXTREMELY USEFUL WHEN MESSING WITH ANY KIND OF LINE TERMINALS,
+FEEDER BOXES, ETC.
+
+ WHEN FINISHED, BE SURE TO CUT OFF THE CONNECTOR AND TAKE IT WITH YOU (THEY
+ARE VERY HANDY), AND CLOSE/LATCH THE BOX TO AVOID SUSPICION.
+
+
+"CANS" - AERIAL-MOUNTED (TELEPHONE POLE TERMINAL) BRANCH FEEDER CABLE
+SPLITTER.
+ ----
+
+BASICALLY, TWO TYPES:
+
+1> MS3A SERVICE AREA INTERFACE. (LARGE, RECTANGULAR SILVER BOX AT THE END OF
+ EACH STREET.)
+
+2> SERIES 600 LOADING COIL, INCLUDES THE MSX AERIAL DROP SPLITTER. (BLACK,
+ ROUND OR RECTANGULAR THING AT EVERY TELEPHONE POLE.)
+
+
+TYPE 1 - THIS IS THE CASE THAT TAKES THE UNDERGROUND CABLE FROM THE BRIDGER
+AND RUNS IT TO THE AERIAL BRANCH FEEDER CABLE (THE LOWEST, LARGEST WIRE ON THE
+TELEPHONE POLE). THE BOX IS ALWAYS ON THE POLE NEAREST THE BRIGING HEAD, WHERE
+THE LINE COMES UP. LOOK FOR THE 'CALL BEFORE YOU DIG - UNDERGROUND CABLE'
+STICKERS..
+ THE CASE BOX IS HINGED, SO IF YOU WANT TO CLIMB THE POLE, YOU CAN OPEN IT
+WITH NO PROBLEMS. THESE USUALLY HAVE 2 ROWS OF TERMINAL SETS. (TOTAL APPROX.
+200-600 PAIRS, DEPENDING ON THE AREA.) THESE ARE ALL THE CABLE PAIRS FOR YOUR
+STREET. (ITS SIMILAR TO A MINIATURE BRIDGING HEAD). USE/ABUSE IT IN THE SAME
+MANNER AS WE DID BEFORE. (NOTE: ALL THE ACTIVE LINES CARRY FROM 15 TO 48 VDC,
+AND EVEN 90VAC (WHEN RINGING), SO BE CAREFUL - IT'S NOT GOING TO HURT YOU,
+BUT IT CAN SURPRISE YOU (AND IF YOU'RE HANGING BY ONE HAND FROM A TEL. POLE, IT
+>CAN< BE HARMFUL!))
+ OH, BY THE WAY, IF YOU USE ANI ON EVERY PAIR AND YOU FIND ONE THAT ISNT IN
+USE ON YOUR STREET, YOU CAN HOOK IT UP FOR YOURSELF (ALMOST). ALSO, YOU HAVE TO
+BE ABLE TO IMPERSONATE A TELCO TECHNICIAN AND REPORT THE NUMBER AS 'NEW ACTIVE'
+(GIVING A FAKE NAME AND FAKE REPORT, ETC) I DONT RECOMMEND THIS AND IT PROBABLY
+WONT (ALMOST POSITIVELY WONT) WORK, BUT THIS IS BASICALLY WHAT TELCO LINEMEN
+DO).*
+
+ * THE USE OF THE 'TEST BOARD' (A 7D# FOR LINEMEN TESTS, OFTEN FOUND
+NXX-0003 OR NXX-0004) IS BEYOND THE SCOPE OF THIS ARTICLE, BUT WILL BE COVERED
+IN A FUTURE ARTICLE.
+
+
+TYPE 2 - THIS IS THE SPLITTER BOX FOR THE AERIAL DROP WIRES FOR THE GROUP OF
+HOUSES AROUND THE POLE. (USUALLY 4 OR 5 HOUSES). USE IT LIKE I MENTIONED
+BEFORE. THE TERMINALS (20 OR SO) WILL BE IN 2 HORIZONTAL ROWS OF SETS. THE
+EXTRA WIRES THAT ARE JUST 'HANGING THERE' ARE PROVISIONS FOR EXTRA LINES TO
+RESIDENCES (1 EXTRA LINE PER HOUSE, THATS WHY THE INSANE CHARGE FOR LINE #3).
+IF ITS THE BOX FOR YOUR HOUSE ALSO, HAVE FUN AND SWAP LINES WITH YOUR NEIGHBOR!
+'PIGGYBACK' THEM OR USE A CHEESEBOX FOR A LOOP-AROUND, ETC. AGAIN, I DONT
+RECOMMEND THIS, AND ITS DIFFICULT TO DO IT CORRECTLY. (ALTHOUGH USEFUL)
diff --git a/textfiles.com/phreak/WIRETAPPING/bug.txt b/textfiles.com/phreak/WIRETAPPING/bug.txt
new file mode 100644
index 00000000..699d5287
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/bug.txt
@@ -0,0 +1,208 @@
+
+ Automatic Phone Recorder
+
+ by
+
+ Atomic Punk
+
+ May 1, 1989
+
+This device will allow any standard cassette tape recorder the
+ability to automatically record phone conversations. The device
+will start the tape recorder when the phone handset is lifted and
+stop the recorder when the handset is returned to the cradle.
+
+The device is a DC switch that is normally on via the forward
+biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by
+biasing its complement well into a saturated state via R4. The
+DC switch is turned off via a negative voltage above that of the
+Zener (D1). This voltage is usually about 48 volts and is the on
+hook value of the phone line. This negative voltage over rides
+the effect of R3 and keeps the circuit off. When the phone is
+off the hook, the 48 volts drops to 10 volts, which is below the
+[more]
+
+zener voltage of D1, and R3 now turns the circuit on. Audio
+signal is via attenuator resistor R1 and DC isolating capacitors
+C1 and C2.
+
+This device is really only a high impedance switch that isolates
+the recording controlled device from the phone line via some
+simple electronic circuitry. It requires no battery and obtains
+power for operating from the remote jack that in most recorders
+is a source of 6 volts. When the remote jack is grounded,
+recorder operation starts, and when the grounding condition is
+removed, recorder operation stops.
+
+Parts list: Here's all you need:
+
+Name Qty Description
+R4 1 220 ohm 1/4 watt resistor
+R3 1 39k ohm 1/4 watt resistor
+R1 & R2 2 100k ohm 1/4 watt resistor
+C1 & C2 2 0.01 mfd/ 50V disc cap.
+Q2 1 PN2222 NPN Silicon
+Q1 1 PN2907 NPN Silicon
+[more]
+
+Z1 1 15 volt Zener diode
+P1 1 Sub-mini plug 2.5mm dia.
+CL1 & CL2 2 Alligator clips
+P2 1 Mini-Plug 3.5mm dia.
+Enclosure 1 Suitable enclosure for device
+PB1 1 1.25x1.67 perfboard
+WR4 (18") #24 hook-up black wire
+WR3 (18") #24 hook-up red wire
+Casto Castolite or paraffin wax
+
+[more]
+
+Circuit Diagram
+
+
+Red wire
+----------|---------Z1--------|--------------------|--------|----------
+ | | | |
+Green | | | |
+-----| | | | |
+ | | | | |
+ | | | e |
+ | | | | |
+ | | R3 |-----R4---b-Q2 |---P1
+ | | *No connection* | | | |To remote
+ | | | c c |of
+ | *|* | | | |recorder
+ |--- | ------------------|-----b-Q1 | |
+ | | | | |
+ | | e | |
+ | | |------------|--------|
+ | |
+ | | C1
+[more]
+
+ | |----------------------------3 3-----------------|
+ | |
+ | |---P2
+ | C2 |To Aux
+ |--------------R1-----------------3 3-----------------|on
+ Recorder
+
+** Green and Red wires go to corresponding color of telephone wires.
+** Make sure to connect Q1 and Q2 properly -- follow label c,b,e
+ with the wires facing toward you and flat side up.
+ - c is the located on the upper right hand side
+ - b is the next wire left of c
+ - e is the next wire left of b
+
+Anyway that concludes this circuit. Now you'll be able to
+monitor your phone line, and hear what goes on while you not
+around.
+
+**** Coming soon ******
+How to safely build waterproof M-80s.
+
+(>
+(>
+(>
+
+ Automatic Phone Recorder
+
+ by
+
+ Atomic Punk
+
+ May 1, 1989
+
+This device will allow any standard cassette tape recorder the
+ability to automatically record phone conversations. The device
+will start the tape recorder when the phone handset is lifted and
+stop the recorder when the handset is returned to the cradle.
+
+The device is a DC switch that is normally on via the forward
+biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by
+biasing its complement well into a saturated state via R4. The
+DC switch is turned off via a negative voltage above that of the
+Zener (D1). This voltage is usually about 48 volts and is the on
+hook value of the phone line. This negative voltage over rides
+the effect of R3 and keeps the circuit off. When the phone is
+off the hook, the 48 volts drops to 10 volts, which is below the
+[more]
+
+zener voltage of D1, and R3 now turns the circuit on. Audio
+signal is via attenuator resistor R1 and DC isolating capacitors
+C1 and C2.
+
+This device is really only a high impedance switch that isolates
+the recording controlled device from the phone line via some
+simple electronic circuitry. It requires no battery and obtains
+power for operating from the remote jack that in most recorders
+is a source of 6 volts. When the remote jack is grounded,
+recorder operation starts, and when the grounding condition is
+removed, recorder operation stops.
+
+Parts list: Here's all you need:
+
+Name Qty Description
+R4 1 220 ohm 1/4 watt resistor
+R3 1 39k ohm 1/4 watt resistor
+R1 & R2 2 100k ohm 1/4 watt resistor
+C1 & C2 2 0.01 mfd/ 50V disc cap.
+Q2 1 PN2222 NPN Silicon
+Q1 1 PN2907 NPN Silicon
+[more]
+
+Z1 1 15 volt Zener diode
+P1 1 Sub-mini plug 2.5mm dia.
+CL1 & CL2 2 Alligator clips
+P2 1 Mini-Plug 3.5mm dia.
+Enclosure 1 Suitable enclosure for device
+PB1 1 1.25x1.67 perfboard
+WR4 (18") #24 hook-up black wire
+WR3 (18") #24 hook-up red wire
+Casto Castolite or paraffin wax
+
+[more]
+
+Circuit Diagram
+
+
+Red wire
+----------|---------Z1--------|--------------------|--------|----------
+ | | | |
+Green | | | |
+-----| | | | |
+ | | | | |
+ | | | e |
+ | | | | |
+ | | R3 |-----R4---b-Q2 |---P1
+ | | *No connection* | | | |To remote
+ | | | c c |of
+ | *|* | | | |recorder
+ |--- | ------------------|-----b-Q1 | |
+ | | | | |
+ | | e | |
+ | | |------------|--------|
+ | |
+ | | C1
+[more]
+
+ | |----------------------------3 3-----------------|
+ | |
+ | |---P2
+ | C2 |To Aux
+ |--------------R1-----------------3 3-----------------|on
+ Recorder
+
+** Green and Red wires go to corresponding color of telephone wires.
+** Make sure to connect Q1 and Q2 properly -- follow label c,b,e
+ with the wires facing toward you and flat side up.
+ - c is the located on the upper right hand side
+ - b is the next wire left of c
+ - e is the next wire left of b
+
+Anyway that concludes this circuit. Now you'll be able to
+monitor your phone line, and hear what goes on while you not
+around.
+
+**** Coming soon ******
+How to safely build waterproof M-80s.
diff --git a/textfiles.com/phreak/WIRETAPPING/bugdetct.phk b/textfiles.com/phreak/WIRETAPPING/bugdetct.phk
new file mode 100644
index 00000000..f193a031
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/bugdetct.phk
@@ -0,0 +1,40 @@
+
+
+File: BUG DETECTION AT HOME
+ Read 24 times
+
+ Bug Detection on Home phones
+ (COURTESY OF DR JIMMY AND MR JIM)
+
+First of all to test for bugs, you need a VOM (Multimeter) the higher the
+impedance the better (a Digital with FET circuitry or a Vacuum Tube Volt Meter
+is the best).
+
+First disconnect the phone line(s) AT BOTH ENDS. Undo the phone instrument and
+hook it up to the entry point of the phone line from the outside world (Ma Bell
+does not like you cut her off completely.) The scheme is the physically
+isolate your house, apartment, etc from the outside world. But before you do
+this measure the line voltage (It should be approximately 48 Volts).
+
+Now with the wires disconnected at both ee set your resistance scale to a high
+reading and measure the resistance of the phone line, it should be very high on
+the order of million ohms or more, this is the normal condition, since you
+are measuring the resistance of an open circuit. If it is much less, say
+50-100Kohms then you a device on the line that does not belong there, probably
+a parallel bug.
+
+Now twist the end of the disconnected wire and go to the other end and measure
+the resistance of this. This resistance should be about one ohm or two at the
+most in a big house with a lot of phones. If it is more, then you probably
+have a series bug.
+
+If in the first case, taking parallel measurements using a meter (not LED/LCD)
+and you notice a "kick" in the needle, you probably have a line tap
+
+Now if you also make a measurement with the wire end twisted together and you
+notice the resistance reads about 1-2kohms, then you may have a drop-out relay.
+ A drop-out relay is a relay that senses a phone going off hook, and signals a
+tape recorder to start recording.
+
+Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/WIRETAPPING/bugging.guide b/textfiles.com/phreak/WIRETAPPING/bugging.guide
new file mode 100644
index 00000000..526fb760
Binary files /dev/null and b/textfiles.com/phreak/WIRETAPPING/bugging.guide differ
diff --git a/textfiles.com/phreak/WIRETAPPING/bugging.phk b/textfiles.com/phreak/WIRETAPPING/bugging.phk
new file mode 100644
index 00000000..c1cd12f0
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/bugging.phk
@@ -0,0 +1,121 @@
+ Bugs on a Budget
+ Inexpensive surveillance
+ Data Line 8-85.
+
+Post this phile as you will, but leave my name on it.
+
+ Gordon Liddy dreamt up an elaborate scheme for bugging the Democratic National
+Headquarters. Included were such things as a type of UHF bug that required an
+O-scope for the listeners to find, and other bugs that got power thru paint-on
+electrical connectors. He was also financed out of a slush fund controlled by
+the most powerful men in the nation.
+
+ I'm not that lucky. My money comes from a "Blue" collar job, so spending $5k
+on a bug is laughable. Still, not getting the information I need because I
+couldn't find any appropriate devices is just as silly. With a small bit of
+skill, you can build a reliable intelligence collecting system for about $250.
+
+
+ 1. FOR LIVE SETUPS. If it's important or your targets are just paranoid,
+forget about phone taps. They may set up a meeting place on the line and that
+is about it. Besides, you can do a huge amount of random eavesdropping with a
+live collection system. You'll need a good cardioid mike element, amplifier,
+and set of headphones. The most efficient way to go is to purchase a Hunter's
+or Bionic Ear (See the Sources section at the end for locations). They run from
+$50 to $90. Everything is included in a package that looks a lot like a metal
+police flashlight. But to narror the collection angle, a parabolic dish is
+essential. Don't get the one available with the Ear, it's small and you'll look
+dumb using it. Instead, but ETCO's 18" dish for about $35. Bend 3 heavy wires
+(e.g. welding rods) to grip the dish edge and syspend the Ear in the center. I
+used a hose clamp to secure it. Rubber bands link he support rods at te rear of
+the dish. Note: the focus is at a point intersected by the plane of the dish
+and a line extending out from the plastic "pip" in te center. Since the dish is
+transparent and the amp faces the target, the setup isn't too conspicuous from a
+distance. The regular commercial reflector is black and quite obvious when in
+use.
+
+ How good is the system? My hearing is below par and I was able to understand
+whispers at 30m. The range you get may differ. In summer, crickets will drown
+out a lot. Traffic and overhead jets can also do nasty things. Oh yes, there's
+an automatic cutoff so if the target coughs, you won't have to pick up your
+eardrums from the ground.
+
+
+
+ 2. VISUAL SURVEILLANCE. Sometimes this is all you need, but mostly it
+complements the audio. Forget the 17x80 monster binoculars you saw in Soldier
+of Fortune. If a gnat on your arm farts, the scene will jump. Instead save a
+lot of money and get one or two more suitable pieces of equipment. One is a
+good pair of 7x50 binoculars. Buy from a wholesale place in Shotgun News and
+save big. These can be used well at night because of their large objective
+size. Some like a zoom feature, but I find it raises price and at these powers
+isn't needed.
+
+ Personally, I like to get further away and stay stationary for as long as
+possible. Of course the parabolic setup is no good for audio at such a range
+(100 to 300m). Oddly, I've never felt handicapped by not being able to hear the
+action. You'd be surprised what lipreading and nonverbal cues you can pick up
+with a little practice. I use a 20-60x60mm. spotting scope. It comes mounted
+on a tripod for flat surface use, but I find a photographers C-clamp tripod is
+handier for using on car windows. In daylight nothing can come close to this
+system. It's less than 1/2m long and at 60x it's actually easy to reas
+newspaper headlines at 1Km or so. After all, these things were meant to spor
+bullet holes in targets at up to 500m and the cheapest low power spotter will do
+that with no problem. Just how much is 60x ? Well, most rifle scopes are 4x,
+binoculars are typically 7x, and the classic sniper scopes (Unertl and
+Leatherwood) are only 10x. Just look through one at a sporting goods store and
+you'll see what a deal these are. Astronomy-type telescopes usually are too
+big, show an upside-down image, and have too much magnification for their
+objective size, making the view too dark.
+
+ In fact, at night the spotter is a bit dim even at only 20x. Nothing's
+perfect.
+
+
+
+ 3. WIRELESS. Here's the area most people immediately go for and sometimes
+get suckered real bad. Worst are "Law Enforcement Supply" places. Some sell to
+anyone with a letterhead. For the money they charge, it actually makes no
+difference who you are; besides it's YOU who will get nailed for impersonating a
+cop if THEY decide to turn you in. One of these joints advertises in Soldier of
+Fortune and chagres $10 for their catalog. Its full of neat shit, all at least
+5x over what anyone else could even think of charging. ETCO, on the other hand,
+sells lots of transmitters for "wireless mikes". They also sell cheap mike
+elements. Hmmm. For $25 you can build a workable unit. Nothing Harry Call
+would be caught using, but usable nonetheless. Those little wireless mikes you
+see in the backs of magazines shown next to a paper clip are really quite good,
+but make sure they use the Mercury batteries. Even Alkalines will crap out
+after a few hours of constant transmitting.
+
+ Those and most inexpensive transmitters work in the Commercial FM Band. The
+good news is that you don't need a VHF receiver to pick them up, a regular FM
+set does fine. Unfortunately, the same goes for the target. The best way out
+is to find a station at either end of the band (88 or 108) that the target isn't
+likely to listen to. In St. Louis it's KMJM at 107.7, an all Black station
+(assuming the target is a WASPish businessman or a rocker) . Set your bug to
+transmit on top of the station, and get in REAL CLOSE with your receiver. Since
+it's at the end of tha dial, he/she isn't likely to tune past it and get a jolt
+of audio feedback.
+
+ Finally, a bit of common sense. Wireless equipment should not take up a large
+portion of your budget. It's hard to place, risky to maintain, and will be
+destroyed if found. Also, the cops sort of look down on this sort of thing to
+the tune of Federal time. Watergate did a lot to influence that. Don't be a
+putz and try to break in a place to recover a $40 transmitter. Consider them
+disposable and you may stay free.
+
+
+ 4.GETTING IT DOWN. Buy a Voice-activated (VOX) microcassette. It'll free you
+up for more important stuff than listening to silence or irrelevant bullshit.
+Especially with transmitters, a lot of time is just wasted. Live monitoring is
+fun... for fifteen minutes. A good unit is the Panasonic RN 109A at about $50.
+It'll record 1 hour per side at low speed. With the VOX on, that's an hour of
+solid sound. Use one on the parabolic dish, too. Replay through your stereo
+and use the equalizer or tone controls to sharpen up the stuff you may have
+missed the first time.
+
+ Stay tuned to this BBS for more philes from Data Line, the Old Man who taught
+Donald Segretti how to rig his first election in college.
+
+MCI Telex # 650-240-6356.
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/WIRETAPPING/buggy.phk b/textfiles.com/phreak/WIRETAPPING/buggy.phk
new file mode 100644
index 00000000..b517d578
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/buggy.phk
@@ -0,0 +1,30 @@
+
+ IN ANSWER TO ALL THOSE WHO DON'T KNOW WHAT AN INFINITY TRANSMITTER IS, HERE
+IS A LITTLE HISTORY:
+
+ A GUY BY THE NAME OF MANNY MITTLEMAN RAN A COMPANY CALLED THE WIRELESS GUITAR
+COMPANY LOCATED ON LIBERTY ST. IN NY. ASIDE FROM WIRELESS GUITARS, MANNY ALSO
+BUILT ALL SORTS OF ELECTRONIC WIRELESS "BUGS". ONE ITEM, THE INFINITY
+TRANSMITTER WAS A DEVICE THAT WAS PLACED INSIDE AN UNSUSPECTING PERSONS
+TELEPHONE. WHEN THE PHONE NUMBER OF THAT TELEPHONE WAS DIALED AND A CERTAIN
+NOTE WAS BLOWN INTO THE PHONE FROM A HOHNER, KEY-OF-C, HARMONICA, THE BUGGED
+PHONE DID NOT RING, AND WHAT'S MORE, ENABLED THE CALLER TO THEN HEAR EVERYTHING
+SAID IN THE ROOM THAT THE PHONE WAS LOCATED IN. AS LONG AS THE CALLER WANTED
+TO STAY ON THE PHONE, ALL WAS OPEN TO HIM OR HER. IF THE PHONE WAS LIFTED OFF
+THE HOOK, THE TRANSMITTER WAS DISCONECTED AND THE "BUGGED" PARTY RECEIVED A
+DIAL TONE AS IF NOTHING WAS WRONG WITH THE LINE.
+
+ REMEMBER, ALL THIS WAS CONSTRUCTED IN THE 1960x'S WHEN IC'S WERE NOT AS
+COMMONPLACE AS THEY ARE TODAY. ALSO BEAR IN MIND THAT DURING THAT PERIOD IN
+TIME, EVEN THE TELEPHONE COMPANY WAS NOT QUITE SURE ON HOW WELL OR HOW PORTABLE
+TONE DECODING WAS.
+
+ MY HAT IS STILL OFF TO TO MANNY MITTLEMAN, THE GREATEST DEVELOPER OF
+TELEPHONE GIMMICKERY AND BUGGER OF HOTEL ROOMS IN DIVORCE CASES.
+
+ IF THERE IS ANY INTEREST ON BUGGING, I'LL BE GLAD TO LET YOU KNOW SOME MORE
+OF MANNY'S STUFF.
+
+PS. MANY GOVERNMENT AGENCY'S WERE SOME OF MANNY'S BEST CUSTOMERS.
+Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/WIRETAPPING/bugphone.phk b/textfiles.com/phreak/WIRETAPPING/bugphone.phk
new file mode 100644
index 00000000..0daf4733
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/bugphone.phk
@@ -0,0 +1,96 @@
+bugoph phone.txt
+ Automatic Phone Recorder
+
+ by
+
+ Atomic Punk
+
+ May 1, 1989
+
+This device will allow any standard cassette tape recorder the
+ability to automatically record phone conversations. The device
+will start the tape recorder when the phone handset is lifted and
+stop the recorder when the handset is returned to the cradle.
+
+The device is a DC switch that is normally on via the forward
+biasing of Q1 via R3. Q1 now clamps Q2 into a forward state by
+biasing its complement well into a saturated state via R4. The
+DC switch is turned off via a negative voltage above that of the
+Zener (D1). This voltage is usually about 48 volts and is the on
+hook value of the phone line. This negative voltage over rides
+the effect of R3 and keeps the circuit off. When the phone is
+off the hook, the 48 volts drops to 10 volts, which is below the
+[more] zener voltage of D1, and R3 now turns the circuit on. Audio
+signal is via attenuator resistor R1 and DC isolating capacitors
+C1 and C2.
+
+This device is really only a high impedance switch that isolates
+the recording controlled device from the phone line via some
+simple electronic circuitry. It requires no battery and obtains
+power for operating from the remote jack that in most recorders
+is a source of 6 volts. When the remote jack is grounded,
+recorder operation starts, and when the grounding condition is
+removed, recorder operation stops.
+
+Parts list: Here's all you need:
+
+Name Qty Description
+R4 1 220 ohm 1/4 watt resistor
+R3 1 39k ohm 1/4 watt resistor
+R1 & R2 2 100k ohm 1/4 watt resistor
+C1 & C2 2 0.01 mfd/ 50V disc cap.
+Q2 1 PN2222 NPN Silicon
+Q1 1 PN2907 NPN Silicon
+[more] Z1 1 15 volt Zener diode
+P1 1 Sub-mini plug 2.5mm dia.
+CL1 & CL2 2 Alligator clips
+P2 1 Mini-Plug 3.5mm dia.
+Enclosure 1 Suitable enclosure for device
+PB1 1 1.25x1.67 perfboard
+WR4 (18") #24 hook-up black wire
+WR3 (18") #24 hook-up red wire
+Casto Castolite or paraffin wax
+
+[more] Circuit Diagram
+
+
+Red wire
+----------|---------Z1--------|--------------------|--------|----------
+ | | | |
+Green | | | |
+-----| | | | |
+ | | | | |
+ | | | e |
+ | | | | |
+ | | R3 |-----R4---b-Q2 |---P1
+ | | *No connection* | | | |To remote
+ | | | c c |of
+ | *|* | | | |recorder
+ |--- | ------------------|-----b-Q1 | |
+ | | | | |
+ | | e | |
+ | | |------------|--------|
+ | |
+ | | C1
+[more] | |----------------------------³ ³-----------------|
+ | |
+ | |---P2
+ | C2 |To Aux
+ |--------------R1-----------------³ ³-----------------|on
+ Recorder
+
+** Green and Red wires go to corresponding color of telephone wires.
+** Make sure to connect Q1 and Q2 properly -- follow label c,b,e
+ with the wires facing toward you and flat side up.
+ - c is the located on the upper right hand side
+ - b is the next wire left of c
+ - e is the next wire left of b
+
+Anyway that concludes this circuit. Now you'll be able to
+monitor your phone line, and hear what goes on while you not
+around.
+
+**** Coming soon ******
+How to safely build waterproof M-80s.
+
+(>
\ No newline at end of file
diff --git a/textfiles.com/phreak/WIRETAPPING/bugstaps.txt b/textfiles.com/phreak/WIRETAPPING/bugstaps.txt
new file mode 100644
index 00000000..bd59c2be
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/bugstaps.txt
@@ -0,0 +1,48 @@
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+% BUGS & %
+% HOW TO TAP SOMEONES ROOM %
+% %
+% BY ---> *$> FIREBALL <$* %
+% %
+%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
+
+HAVE YOU EVER HAD A STRONG DESIRE TO KNOW WHAT BOY YOUR OLDER SISTER LIKES
+OR HOW YOUR PARENTS SEX LIFE IS GOING, WELL NOW YOU CAN KNOW ALL BY
+BUGGING THERE ROOMS!
+
+THE FIRST THING YOU CAN USE IS THE WIRELESS MICROPHONE FROM RADIO SHACK-
+$6.99. IT IS DESIGNED TO PUT VOICES ON TO AN FM RADIO BUT NO ONE SAYS YOU
+CAN'T HIDE IT AND LET IT PICK UP UNSUSPECTING PEOPLE....FIRST TUNE THE
+MICROPHONE WITH ANY BLANKSPOT ON YOUR FM RADIO (DON'T WORRY IT WILL
+EXPLAIN HOW TO TUNE IT ON THE BACK OF THE PACKAGE.) ....THEN HIDE IT WHEN
+NO ONE IS AROUND (WHEN HIDING THE MICRO- PHONE TALK INTO IT AS YOU'RE
+WALKING TO MAKE SURE YOU HAVEN'T WALKED OUT OF IT'S RANGE.)
+
+THERE ARE, HOWEVER, 2 DISADVANTAGES TO USING ONE OF THESE MICROPHONES:
+
+ 1) YOU CAN ONLY PUT IT IN A ROOM THAT
+IS RIGHT NEXT TO YOUR ROOM AND ONLY
+ONE WALL CAN SEPERATE THEM.
+
+ 2) THE MIKE IS 8 INCHES LONG AND THE
+ONLY DECENT HIDING PLACES FOR SOMETHING
+THAT BIG IS UNDER A BED OR IN A CLOSET.
+(YOU MAY WANT TO TAKE IT APART TO MAKE
+IT SMALLER BUT I DONT RECCOMMEND DOING
+THIS.)
+
+ANOTHER THING YOU CAN USE IS THE CLIP ON WIRELESS MIKE BY RADIO SHACK FOR
+ABOUT $18. IT WORKS IN BASICLY THE SAME WAY EXCEPT IT IS VERY SMALL AND IT
+WILL WORK THE DISTANCE OF YOUR HOUSE AND POSSIBLY EVEN YOUR NEIGHBORS
+HOUSE.
+
+ HAVE PHUN...I SURE DID!!
+ STORE MANAGER.
+ CALL THE UNDERGROUND AT:
+ 201-223-64 CALL THE BASEMENT:HEAD UNDERGROUND
+BBS AT......201-223-6404....
+
+Downloaded from Just Say Yes. 2 lines, More than 500 files online!
+ Full access on first call. 415-922-2008 CASFA
+
+
diff --git a/textfiles.com/phreak/WIRETAPPING/buildbug.phk b/textfiles.com/phreak/WIRETAPPING/buildbug.phk
new file mode 100644
index 00000000..b97894a7
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/buildbug.phk
@@ -0,0 +1,118 @@
+ This file Presented by METRONET system (301)-944-3023 The bug's that this
+device detects are Infinity transmitters, read the Infinity transmitter
+bulletin for more info.
+
+ ::::::::::::::::::::::::::::::::::::::
+ : :
+ : How to build a Bug Detector :
+ : :
+ : by :
+ : :
+ : The Gremlin :
+ : :
+ ::::::::::::::::::::::::::::::::::::::
+
+
+
+Warning: This formatted for 80 column and upper/lower case capabilities...
+
+][][][
+Basic theory
+][][][
+
+Because most bugs are triggered through certain frequencies, it is very simple
+to build a small sweeping device that will trigger any bug present. The two
+IC's are what create the oscillating tone. The IC1 operates at .8 Hz where the
+IC2 runs at about 10 Hz. Frequency is determined by this formula:
+
+f=1.44/(R1+2R2)C)
+
+f measured in Hertz, R in megohms, and C in microfarads
+
+The oscillation can be varied by the voltage placed upon pin #5. This is how
+we create the wave sound. When voltage goes up, so does the frequency, and
+vice-versa.
+
+Normally, the output pin 3 is a square wave. Since we need varying wave at pin
+#5, we need a triangular wave. We get this through integrating the square wave
+created at pin #3 of IC1. It is acheived by D1, D2, R3, R4 and C2.
+
+This varying output is fed into the phone line by transformer T1 which has an 8
+ohm winding going to pin #3 of IC2 and the 500 end to a 0.1 microfarad capaci-
+tator at the phone line.
+
+Enuf talk..let's get movin!
+
+
+][][][
+Schematic Design
+][][][
+
+
+ +9v
+
+ __________|_____________________________
+| _|__|_ _|__|_ |
+R1 | 4 8 | _||R2__R4__| | | | |
+R2 | ic1 | | | ic2 | R6 D3
+| +-+6 | ___| | 6+-+ | V
+| | | | | | | | | -
++---+-+7 | | +--+3 7+-+-----+----+
+| |___1__| | | |___1__| |
+| | | | | C4
+| | | | | ^
+C1 | C2 T1 _|_._C3|(_. |
+^ | ^ 8--500<_|_. |
+|_________|______________|__|______|__________|
+ |
+ -G-
+
+
+][][][
+Parts List
+][][][
+
+ C1 10-uF electrolytic capacitator 25 WDVC
+ C2 300-uF electrolytic capacitator 25 WDVC
+ C3 0.1-uF capacitator
+ C4 0.068-uF capacitator
+ D1-D3 1N914
+ IC1,IC2 555 timers
+ R1, R4-R6 1-kilohm resistors
+ R2 91-kilohm resistor
+ R3 22 kilohm resistor
+ T1 500-to-8 ohm audio output transformer
+
+][][][
+Construction
+------------
+
+When building this unit, it is very useful to use a breadboard or vector board.
+I suggest that leads being connected to phone line (T1, C3) end in a jack or a
+modular connector to make the hookup easier. To test it, hook it to the phone
+line (not the suspected line) and call the line you suspect is being bugged.
+The party you are calling should not answer the phone. Now, the unit is
+activated. 3 times, every 4 seconds, the oscillator will go up to 10 kHz and
+back down again..like a bell curve..If there is a frequency sensitive bug on
+the line, the phone will stop ringing, and you will be able to hear everything
+said in the room. If the phone keeps ringing, chances are that all is
+fine..unless the bug requires a multi-frequency trigger..but these are very
+rare..
+
+So, we can see that 415-BUG-1111 really does work! It creates the tone..any
+click heard is the Phone Co's (or whoever is bugging) speaker/tape recorder
+picking up!
+
+
+Have phun, and hope it helped!
+
+The Gremlin
+
+...call the Gremlin's Lair..201-536-7794..today!...
+
+[Thanks again Metronet!]
+Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/WIRETAPPING/caller b/textfiles.com/phreak/WIRETAPPING/caller
new file mode 100644
index 00000000..5b94eb1c
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/caller
@@ -0,0 +1,133 @@
+
+NOTES ON RECORDING CALLER ID signals ....(AND VOICE NOTES)
+
+There have been a number of people who have complained that caller
+id is not working perfectly in their area. I have been working
+with ZyXEL to try to get it and distinctive ring working perfectly.
+It now does work in most of Canada and the US.
+Caller id works great combined
+with distinctive ring.
+I enjoy such features as, if the modem encounters a busy bbs, it
+sets distinctive ring to answer a CALL return (another feature
+from the phone company), then answers in originate mode. Thus you
+can make contact with the bbs at the first opportunity after the
+line clears, and not have your modem be disturbed by other calls.
+
+For those (hopefully few) people who still have problems with
+caller-id, here is a simple way to get information to allow
+these problems to be resolved more quickly. In the past I circulated
+a circuit to do this.
+
+However, thanks to the new voice features, there is an easier way.
+The idea is to record the ring/callerid signalling on a voice file
+which can then be listened to, and uploaded to the engineers
+if necessary. This also allows the cadence of the distinctive ring
+to be measured if necessary.
+
+It is REALLY simple to do also and is fun because you can even
+listen to the signal and get a bit of an idea what might be wrong,
+even without sending in the file. It is also instructive to
+write a little voice display program to become more familiar with
+this format-- since the signals are predictable, monotonic, and
+thus relatively easy to analyse with a simple program.
+
+One of the problems is that some exchanges do not seem to follow
+the Bellcore specs for callerid. The way it is supposed to work,
+is that after the first complete ring (or distinctive ring)
+stops, there is a 500 ms
+pause, then a 250 ms section of "continuous"
+U characters sent (called a channel seizure signal), then a 150 ms
+section of mark sent, then the data. A simple number will take
+about 200 ms further. Then silence reigns until the next ring.
+
+Now the tones used are 1200 hz for the mark or 1 bit, and
+2200 for the space or 0 bit. Data is sent at 1200 baud in
+an asychronous mode. (this is called bell 202 standard).
+
+Now the The U character is interesting in that it is 1 bit on ,
+one bit off.
+Thus when it is being sent in a continuous mode, it also looks
+like 250 ms of the frequency shift keying signal shaped as
+a 600 hz square wave. What does this mean?? it means that
+it sounds like a quarter second of 600 hz tone.
+
+So you should hear a ring, a 1/2 second of silence, a 1/4 second
+of 600 hz (fundamental) tone, and then a quarter second
+of 1200 hz tone-- followed by a short blast of a higher note.
+
+What can go wrong?? 1st, one problem is that some switches don;t
+have a proper pause. you might get the U's not sent continuously
+which might sound like a lower note. Third the mark might not
+be long enough. next the frequencies may not be correct.
+The data can come slowly--with up to 2 characters of mark
+signals between data. (according to the spec). Thus you can
+give ZyXEL some information without sending the file. Your local
+exchange sends all these notes (they are not sent from long distance),
+so they are not attenuated very much.
+Please also try to find out what kind of switch the exchange has. This
+information can often be obtained from 611 repair service from a
+nice teckie. Another interesting thing is some of these switches have
+more than one way caller id can be sent. They may just be set to
+do it the non compliant way!! perhaps the technical people do not
+know they have a choice.
+
+Once you have the voice file,
+Another crude way of timing, is to use a hex editor, and lop off pieces
+from the end of the file (checking for the shielded code--and
+preserving shielded data--make sure the file is properly terminated).
+this way you can listen do some timing
+by looking a t the size of the lopped off file. You can even look
+at the raw data, and get the idea which area you are in. (espec
+in 2 bit mode).
+A less crude way, is to write a little program-- hey and what better
+way for all you folks wanting to write a voice mail system to
+force yourself to get started!. You can convert the voice file
+into one readable by some of the standard voice/oscilloscope
+sound blaster type programs. so you can see it on your screen.
+
+The idea is to find out what went wrong, tell ZyXEL and provide
+a backup recording.
+
+Now-- you may ask,, how do I get started. WELLL,, there is
+a little trick. You need to read the signals without actually
+answering the line. The best way to do this is to fool the
+phone company into thinking you have not answered the line.
+One very easy way to do this is to get a capacitor and put it
+in series with the line. I found a .68 microfarad 400 volt
+non polarized (ie no + on one of the terminals)
+capacitor (eg from radio shack).--just a cheap
+mylar capacitor (could even be 200 volts). (but
+.22 - 4 microfarad also seemed to work). and put it
+in series with the line. ONe easy way to do this is to modify
+your wall plug (which has screws ). Unscrew one red wire,
+and put a capacitor in series with it and the other red wire
+formerly going to the same terminal. You may want to leave
+an extension phone plugged in on another outlet so you can
+hear the ring (and answer any calls you get while playing).
+
+Now bring up your zfax and select the voice utilties. pick
+record voice and select the telco line. then before starting
+the recording by pushing enter on the OK message,
+ have someone dial your phone. press enter about the time they
+have finished dialing your phone. This will creat a nice short
+voice file. PUSH ESCAPE as the second ring starts. This
+should create a nice 30k file or so with all the info on it.
+Then play back the voice and start analysing. You should be
+able to hear it as well as a regular call on your internal
+modem speaker. The ring will sound like a blast of sound--but
+not too loud and you should hear a beat of nothing (.5 sec) then
+beeep(600hz,1/4 sec) beep (1200hz 1/8 sec) bep (1800-2400hz 1/16 sec).
+
+ I am interested in any voice software people do also. Please
+send me a note if you have some success. I would also love to
+supply you with a ZyXEL modem, esp if you are in Canada.
+(I can provide extra callerid software also)
+
+George Vande Bunte PENG
+OCOMP
+416 5341508 gvb@telly.on.ca
+238 Davenport Rd. Toronto m5r1j6
+
+Please keep whole file together.
+
+
diff --git a/textfiles.com/phreak/WIRETAPPING/callwai.txt b/textfiles.com/phreak/WIRETAPPING/callwai.txt
new file mode 100644
index 00000000..1cf3ede8
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/callwai.txt
@@ -0,0 +1,67 @@
+
+
+==)--- P TO PAUSE S TO STOP ---(==
+
+
++*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+
+* *
++ THE CALL WAITING TAP +
+* *
++ WRITTEN BY: The Byte +
+* *
++ DISTRIBUTED BY: Marauder +
+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*+*
+
+ So, you have an enemy who talks behind your back, eh? Or, maybe you just
+would like to "listen" in on your friend's conversations? Well, if you have
+2 phone lines and call waiting on one of them, you are in luck. (Only one
+prob|em: your friend must also have call waiting!)
+
+Procedure:
+
+[1] Call up your friend with the phone you want to listen with. When he
+ answers call waiting (he's already on the phone, and you are the 2nd
+ caller), then you either sit there or say: sorry, I have the wrong #.
+
+[2] Next, you wait until he goes back to the other line (puts you on hold).
+
+[3] Then, pick up your other line and call ->YOUR<- call waiting.
+
+[4] Answer call waiting
+
+[5] Then go back to him. (Answer, and then click back.. Click ->2<- times
+ Answer, and go back..)
+
+[6] Hang up your second line
+
+[7] You are now on the line!
+
+[8] Listen and be Q U I E T ! He can hear you!
+
+Techniques I use to prevent noise or confusion:
+
+If you have call forwarding, turn it on and forward calls somewhere
+before you start listening. If a call comes through on your call waiting
+circuit, the people talking (your buddie and his pal) will not hear
+anything, but after you answer call waiting and come back, they will
+hear the other call hang up (two clicks). If you don't have call forwarding,
+I suggest you get it if you are going to make a habit of this, because it
+will become a major pain in the ass. When your call waiting rings, you are
+removed from the "listening" conversation and placed back on his hold
+circuit. In order to get back on, you must answer the phone and wait for
+your party (when you answer the phone, tell the guy you are in a hurry and
+you have to go or you'll call him back later or something) to hang up. When
+he or she hangs up, you will be back on the conversation. Then, one of your
+pals will say: What was that? (because of the clicks).. So, try to use call
+forwarding if you can. Remember: Have fun, and don't abuse it. I am not sure
+about it, because I just discovered it. It is illegal (what isn't these days)
+because it is "invading privacy". I don't know if the phone company just did
+not realize there was a flaw in it, or that was planned for line testing, I
+am not sure. Have fun!
+-THE BYTE
+=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
+[ Be careful and remember in no way ]
+[ am I responsible for your actions ]
+Uploaded to P-80 by John Tynes
+
+ 'OUT OF BAND' TECHNIQUES. BY THE WAY,REAL PHREAKS
\ No newline at end of file
diff --git a/textfiles.com/phreak/WIRETAPPING/cordless.phk b/textfiles.com/phreak/WIRETAPPING/cordless.phk
new file mode 100644
index 00000000..0e94f1be
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/cordless.phk
@@ -0,0 +1,117 @@
+
+
+)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
+)( How To Listen In On Cordless Telephone Conversations )(
+)( )(
+)( An Original 'Phile' By: Beowulf )(
+)( )(
+)( Call The Outhouse BBS 201-756-9575 )(
+)( )(
+)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
+
+ Have you ever wanted to know what your brother/sister/parents/ friends/enemies
+were saying as they hid somewhere, cordless phone in hand? With this phile, now
+you can! Just follow the simple instructions outlined inside.
+
+ First some information about cordless telephones:
+
+ The original cordless telephones (1978-about late 1983) were made to be used
+on the 1.6 to 1.8 MHz band. If you will notice, 1.6 MHz is also the top end of
+the AM broadcast band. These phones operate on AM (just like the radio
+stations) and use the wiring in your house for an antenna. The power of these
+phones is 1/10 of a watt in most cases, or about 1/50th of the power that your
+average CB radio will put out. So, not having a lot of power, it is tough to
+hear these phones. You know how they say '500 foot range'? Sure, that's the
+range of the handset to the base, but not of the signals emitted by the base!
+Which means that on good nights you can hear them for many miles (I live in NJ
+an have heard telephones VERY loudly from NY City, 35 MILES away!).
+
+ The newer phones, however, are not as easy to hear. They operate on FM on the
+49 MHz band, which is the same frequency which your little walkie-talkies that
+you loved as a ten year old operate on. These phones require a little bit more
+effort to be heard than do the old ones (and a little $$$). Never fear,
+however, because about 1 out of 10 phones is the old style, and they are still
+being made and sold today.
+
+ How To Do It:
+
+ For the old style phones, you will need to get a pocket size AM transistor
+radio. The one I used was an AM/FM Realistic (bought for $9 at Radio Shack).
+There should be a small plastic box inside the radio. This little 'box' is the
+VFO (Variable Frequency Oscillator) which controlls the frequency of the radio.
+Now of course, you aren't going to have a digital frequency counter (they only
+cost $400, so everyone should have at least two of them) so before you do
+anything, turn on the radio and tune to the top of the band and find the station
+which is closest to the top of the broadcast band. Write down the frequency so
+you have something to compare to later.
+
+ Now, turn off the radio, get a small size screwdriver, and adjust the small
+screw(s) on the back of the little plastic box. Don't turn them more than a
+quarter turn at a time. Now, when you have done your first 'tweak' of the
+screws, turn on the radio and see where that station at the top of the band is
+now on the frequency dial. When you have gotten the station 150-200 kHz down
+from where it was, (like if the frequency was 1600, get it down between 1400 and
+1450), you are all set to recieve cordless telephones at the top end of the
+radio! Note: this little 'trick' may not work as well on all radios, but it is
+worth a try. If worse comes to worse, you can turn them back.
+
+ The ideal distance is a close to the base as you can get, but this sucker
+should pull in signals from up to 500 feet away with no problem. Simply go near
+someones house with this, and then have fun!
+
+
+ Another way: Another way to do this, if the VFO adjustment trick doesn't
+work, is to adjust the small metal boxes that have little colored screws in
+them. These are the tuning coils for the reciever circuit, and they affect the
+frequency also. Another possibility is a combination of turning the VFO screws
+and the coils to try to get the desired effect. Good Luck!
+
+ Now for the tough ones, the new phones. The new phones work on the 49 MHz
+band. You are going to need one of the 'new' walkie talkies that operate on 49
+MHz ===- FM -=== (the cheap shit ones are AM). If you decide to invest in one
+at Radio Shack or similar store, make damn sure you get FM walkie talkies. If
+you get AM, you're screwed, unless you have a friend who is killer into
+electronics or ham radio who has the knowledge to convert AM to FM. (Yes, it
+can be done. I have done it with CB's, and it is great for CB because no one
+can understand what you are saying unless they have a FM-converted
+CB.....Hmm.....that may be my next text phile...look for it!!) Anyway.....when
+you get your FM walkie talkie, you can do one of two things:
+
+ A) You can play the adjust the coils trick as mentioned in the last article
+(there is no VFO because walkie talkies are crystal controlled).
+
+ B) You can change the crystal. Popular frequencies for cordless phones are
+49.830, 49.860 and 49.890 MHz. These crystals can be obtained from electronic
+supply houses (like ones that sell chips for your Apple) for about $2 or less
+each.
+
+ And that just about concludes this phile. There are two other shortcut
+methods that can be used to bypass this mess and get you listening in right
+away.
+
+ 1) Get a general coverage receiver. They cover all frequencies from 100 kHz
+to 30 MHz, and will provide you with 'armchair' reception because you can hook
+up a monster antenna. (I have a 1964 vintage model that I got for $10 sitting
+on my desk with a 600 foot long piece of wire for an antenna....boy, I know
+everything in my neighborhood before the ladies start gossiping!)
+
+ 2) If you play guitar or bass, and have a 'wireless' system for your guitar
+like the Nagy 49R, you can hook up a 12 volt lantern battery and go prowling
+around listening for the phones. (Bass rules!)
+
+ Method 1 only works on the old phones because of the frequency limitations of
+the reciever, and method 2 is for new phones only because the 'wireless' systems
+only work on 49 MHz FM.
+
+ Have phun with your new knowledge, and look for more philes from me in the
+future (that CB FM is a good idea.....hmmmm...)
+
+
+)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
+)( This has been on original phile by: Beowulf )(
+)( Copyright June 1985 This file is for use on AE, Catsend, and )(
+)( AE/BBS's only. )(
+)( Call The Outhouse BBS 201-756-9575 24 hours a day! )(
+)()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()()(
+Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
+
\ No newline at end of file
diff --git a/textfiles.com/phreak/WIRETAPPING/datatap.hac b/textfiles.com/phreak/WIRETAPPING/datatap.hac
new file mode 100644
index 00000000..e010aa8f
Binary files /dev/null and b/textfiles.com/phreak/WIRETAPPING/datatap.hac differ
diff --git a/textfiles.com/phreak/WIRETAPPING/detectbug.phk b/textfiles.com/phreak/WIRETAPPING/detectbug.phk
new file mode 100644
index 00000000..2bea5f1b
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/detectbug.phk
@@ -0,0 +1,61 @@
+Title: Bugging, detecting bugs
+
+
+
+ [ Detecting Bugs on Home Phones ]
+ [ By: Dr. Jimmy and Mr. Jim ]
+
+
+FIRST OF ALL TO TEST FOR BUGS, YOU NEED A VOM (MULTIMETER) THE HIGHER
+THE IMPEDANCE THE BETTER (A DIGITAL WITH FET CIRCUITRY OR A VACUUM TUBE
+VOLT METER IS THE BEST).
+
+FIRST DISCONNECT THE PHONE LINE(S) AT BOTH ENDS. UNDO THE PHONE INSTRUMENT
+AND HOOK IT UP TO THE ENTRY POINT OF THE PHONE LINE FROM THE OUTSIDE WORLD
+(MA BELL DOES NOT LIKE YOU CUT HER OFF COMPLETELY.) THE SCHEME IS THE PHYSI-
+CALLY ISOLATE YOUR HOUSE, APARTMENT, FROM THE OUTSIDE WORLD. BUT BEFORE YOU
+DO THIS MEASURE THE LINE VOLTAGE (IT SHOULD BE APPROXIMATELY 48 VOLTS).
+
+NOW WITH THE WIRES DISCONNECTED AT BOTH ENDS SET YOUR RESISTANCE SCALE TO A
+HIGH READING AND MEASURE THE RESISTANCE OF THE PHONE LINE, IT SHOULD BE VERY
+HIGH ON THE ORDER OF MILLION OHMS OR MORE, THIS IS THE NORMAL CONDITION,
+SINCE YOU ARE MEASURING THE RESISTANCE OF AN OPEN CIRCUIT. IF IT IS MUCH LESS,
+SAY 50-100KOHMS THEN YOU HAVE A DEVICE ON THE LINE THAT DOES NOT BELONG THERE,
+PROBABLY A PARALLEL BUG.
+
+NOW TWIST THE END OF THE DISCONNECTED WIRE AND GO TO THE OTHER END AND
+MEASURE THE RESISTANCE OF THIS. THIS RESISTANCE SHOULD BE ABOUT ONE OHM OR
+TWO AT THE MOST IN A BIG HOUSE WITH A LOT OF PHONES. IF IT IS MORE, THEN
+YOU PROBABLY HAVE A SERIES BUG.
+
+IF IN THE FIRST CASE, TAKING PARALLEL MEASUREMENTS USING A METER (NOT LED/
+LCD) AND YOU NOTICE A "KICK" IN THE NEEDLE, YOU PROBABLY HAVE A LINE TAP
+
+NOW IF YOU ALSO MAKE A MEASUREMENT WITH THE WIRE END TWISTED TOGETHER AND YOU
+NOTICE THE RESISTANCE READS ABOUT 1-2KOHMS, THEN YOU MAY HAVE A DROP-OUT
+RELAY. A DROP-OUT RELAY IS A RELAY THAT SENSES A PHONE GOING OFF HOOK, AND
+SIGNALS A TAPE RECORDER TO START RECORDING.
+
+ANOTHER TEST TO DO WITH THE PHONES STIL HOOKED UP TO THE OUTSIDE WORLD, ON HOOK
+VOLTAGE IS ABOUT 48 VOLTS AND OFF HOOK IS ABOUT 6-10 VOLTS. ANY OTHER CON-
+DITIONS MAY MEAN TELEPHONE SURVEILLANCE
+
+IF YOU USE A WIDE RANGE AUDIO FREQUENCY GENERATOR AND CALL YOU HOUSE, APARTMENT
+ETC. FROM ANOTHER PHONE AND SWEEP UP AN DOWN TE SPECTRUM, AND YOU NOTICE THE
+PHONE ANSWERS ITSELF SOMEWHERE IN THE SWEEP YOU PROBABLY HAVE AN INFINITY
+TRANSMITTER ON YOUR LINE.
+
+THE ABOVE INFORMATION TELLS NOTHING BUT TELCO TAPS AT THE CENTRAL OFFICE,
+OR ANYWHERE ELSE ALONG THE LINE, BUT THIS INFORMATION MAY TELL YOU THAT YOUR
+WIFE, GIRLFRIEND(BOYFRIEND), OR BUSINES ASSOCIATE MAY BE MONITORING YOUR PHONE
+ACTIVITIES.
+
+AN INFINITY TRANSMITTER,IS A NEAT DEVICE IT ALLOWS YOU TO CALL THE BUGGED PLACE
+AND IT SHUTS OFF THE RINGER AND DEFEATS THE SWITCHHOOK, SO THE MOUTHPIECE NOW
+BECOMES A ROOM BUG. IT WAS ORGINALLY SOLD FROM THE TRAVELLING BUSINESS MAN
+TO MAKE SURE HIS WIFE WAS SAFE AT HOME NOT BEING ATTAKCED...
+
+[ DETECTING PHONE BUGS - DR. JIMMY & MR. JIM ]
+
+
+Downloaded From P-80 International Information Systems 304-744-2253
diff --git a/textfiles.com/phreak/WIRETAPPING/dltp1.txt b/textfiles.com/phreak/WIRETAPPING/dltp1.txt
new file mode 100644
index 00000000..a7353471
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/dltp1.txt
@@ -0,0 +1,95 @@
+
+
+ MAD! PRESENTS...
+
+A C-NET COMPATABLE MAD! FILE.
+
+DETECTING LINE TAPS
+PART #1
+
+THE INFORMATION PRESENTED IN THE FOLLOWING FILE IS FOR ENTERTAINMENT PURPOSES ONLY.
+IT IS NOT FOR CHILDREN OR THE MENTALLY UNBALANCED. THE AUTHORS OF THIS FILE TAKE NO
+RESPONSIBILITY FOR ANY OF ITS CONTENTS.
+
+
+INTRODUCTION BY THE COMMODORE KID.
+
+WITH THE FBI WATCHING US ALL THE TIME, YOU CAN NEVER BE SURE IF ITS SAFE TO SAY
+SOMETHING. EVEN IF YOUR NOT INTO GOOD STUFF, ITS STILL NICE TO KNOW THAT YOUR THE ONLY
+ONE ON THE PHONE. YOU DON'T WANT YOUR SISTER LISTENING IN ON YOU. IT IS ALSO WELL
+KNOWN THAT ALOT OF THE MAJOR BBS'S ARE BEING MONITORED BY THE FEDS. WELL, WE HOPE
+THAT THE INFORMATION PRESENTED HERE WILL ALLOW YOU TO FEEL SAFER ON YOUR TELEPHONE.
+
+
+
+MOST TELEPHONE SURVEILLANCE DEVICES USED ON HACKERS NUMBERS ARE VERY SIMPLE. THEY
+USUALLY SAVE THE GOOD STUFF FOR SPYS AND PEOPLE LIKE THAT. IT IS IMPOSSIBLE TO TELL
+IF THE GOOD STUFF IS ON, BUT WE HAVE LISTED WAYS TO DETECT SOME OF THE CHEAPER MACHINES,
+AND IN SOME CASES HOW TO SHUT THEM OFF OR SCREW THEM UP.
+
+THE MLT-2. THIS DEVICE IS ONE OF THE MAINSTAYS OF BS (BELL SECURITY). ITS MAIN
+WEAKNESS IS IN THAT GIVE TONES TO DO ITS OPERATION. A FRIEND OF MAD!'S IS CURRENTLY
+WORKING ON A DEVICE HE PLANS TO CALL A PURPLE BOX THAT WILL DETECT THESE TONES. YOU
+WILL JUST BE ABLE TO KEEP IT ON, AND IT WILL REPORT ON ANY SUCH TONES. WE WILL KEEP
+YOU UPDATED IN FUTURE FILES. OK, IF THE MLT-2 IS IN MON (MONITOR) MODE, YOU CAN DO THE
+FOLLOWING: A GOOD OLD LOUD 2600HZ WILL USUALLY SWITCH IT TO LOOP MODE. SOME TIMES A
+7200 WILL EXECUTE A TT (DIAL MODE). THESE WILL GET THEM OFF YOUR BACK FOR A WHILE.
+IF YOU OWN A MLT-2 ALSO, YOU CAN DAMAGE THE OTHER MLT-2. FIRST GET THE OTHER MLT-2 INTO
+LOOP MODE. NOW WAIT TILL IT GETS TO LIN (TEST THE INSIDE PART OF THE LOOP). NOW DO
+A K2. THIS WILL PUT THE MLT-2 INTO A STATE OF LIMBO. NOW TO FINISH UP, DO A MLT SOAK
+TEST. THIS WILL PUT THE OFFENDING MACHINE OUT OF COMMISSION FOR A LITTLE WHILE. IF
+YOU HAVE AN OMEGA BOX (NICE LITTLE THINGS), A FLAT TONE WILL PUT THE MLT-2 INTO A LRM
+(FAST LOOP MEASUREMENT), THUS GETTING IT OFF YOUR LINE).
+
+
+CONDUCTER TAGGER AND ANALYZER TEST.
+
+THIS WILL SHOW YOU APPROXAMATLY HOW MANY PEOPLE ARE ON A LINE. FIRST YOU NEED TO HOOK
+A VOLT/OHMS METER UP TO THE PHONE BOX IN YOUR WALL. HOOK THE LINE AND THE GROUND UP
+TO THE RED AND GREEN WIRES. YOU CAN USE ONE MADE FOR IT, OR YOU CAN MODITY THE KIND
+YOU USE TO CHECK BATTERYS BY PUTTING ALIGATOR CLIPS ON IT. NOW THE VOLT METER WILL RISE
+AN FALL DEPENDING ON HOW MANY PEOPLE PICK UP THE PHONE, AND HOW GOOD THE CONNECTION IS.
+IF YOUR SISTER PICKS UP THE PHONE, IT WILL FALL. IT PICKS UP OPERATORS, AND WHATEVER.
+MOST OF THE CHEAPER TAPPING MACHINES WILL BE DETECTABLE. TAPE RECORDERS CAN ALSO BE
+DETECTED. EVEN A PERSON ON A TEST PHONE WILL SHOW UP. ITS A GREAT TOOL. TRY USINGIT ON CONFERENCES SOME TIME.
+
+IF YOU HAVE FRIENDS (OR ENEMYS) THAT LIKE TO LISTEN TO THEIR PHONE CONVERSATION OUT
+A PHONE BOXES WITH TEST PHONE THERES SOMETHING YOU CAN DO ABOUT IT. THE FOLLOWING
+INFORMATION COMES FROM ABBIE HOFFMAN AND GEORGE HAYDUKE IN THE CLASSIC BOOK 'GETTING
+EVEN' THE COMPLETE BOOK OF DIRTY TRICKS.
+
+CUT THE FEMALE END OFF AN ORDINARY EXTENSION CORD. UNSCREW THE MOUTHPIECE ON THE
+TELEPHONE. YOU WILL SEE A TERMINAL FOR A RED WIRE AND ONE FOR A BLACK. ATTACH ONE OF
+THE WIRES FROM THE EXTENSION CORD TO THE RED, AND ONE TO THE BLACK. NOW PLUG THE
+EXTENSION CORD INTO A POWER SOCKET. ACCORDING TO HOFFMAN YOU ARE SENDING 20 VOLTS OF
+ELECTRICITY BACK THROUGH EQUIPMENT MADE FOR 6 VOLTS. FIZZ.
+
+
+NOTE! MAD! SUGGESTS YOU DO NOT TRY THIS. IT IS NOT RESPONSIBLY FOR ANY DAMAGE DONE TO
+PHONE EQUIPMENT, OR TO YOU. ACTUALLY YOU WOULD BE SENDING 110 VOLTS THROUGH EQUIPMENT
+MADE FOR 48. IF YOU ARE REALLY SERIOUS ABOUT DOING THIS, WE SUGGEST YOU GET A
+TRANSFORMER TO STEP THE VOLTAGE LEVEL DOWN.
+
+
+
+ANY INFOMATION THAT IS PASSED OVER PHONE LINE CAN BE INTERCEPTED BY THE PHONE COMPANY.
+THIS INCLUDES MODEM SIGNALS. REMEMBER, THEY INVENTED ALL THAT STUFF. IN PART TWO WE
+WILL EXAMINE WAYS TO STOP THEM FROM MONITORING BBS'S AND EXAMINE OTHER EQUIPMENT.
+
+
+THIS FILE WAS WRITTEN BY THE TRIO.
+THE COMMODORE KID
+ DEATH-STALKER
+ MR. C0SMOS
+
+GUEST WRITERS THIS WEEK WERE M, QVI, PHONE BANDIT, THE GREMLIN, AND EXORCIST.
+
+MAD! IS A GROUP DEVOTED TO G-FILES. IF YOU HAVE ANY QUESTIONS, OR THERE IS ANYTHING
+YOU WANT US TO WRITE ABOUT, CONTACT US AT MAD! WORLD HEADQUARTERS- PC MAIN (313)
+386-4698
+
+8/20/85
+
+CALL THE CIA FOR ALL MAD FILES
+ 607-324-0197 TELL'EM MAD SENT YA'
+
diff --git a/textfiles.com/phreak/WIRETAPPING/dltp2.txt b/textfiles.com/phreak/WIRETAPPING/dltp2.txt
new file mode 100644
index 00000000..e2824059
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/dltp2.txt
@@ -0,0 +1,98 @@
+
+ MAD! PRESENTS...
+
+A C-NET COMPATABLE MAD! FILE.
+
+DETECTING LINE TAPS PART 2
+
+
+THE INFORMATION PRESENTED IN THE FOLLOWING FILE IS FOR ENTERTAINMENT PURPOSES ONLY.
+IT IS NOT FOR CHILDREN OR THE MENTALLY UNBALANCED. THE AUTHORS OF THIS FILE TAKE NO
+RESPONSIBILITY FOR ANY OF ITS CONTENTS.
+
+
+THANKS TO MR. X OF A BELL COMPANY WE HAVE LEARNED HOW TO DEFEAT MOST SURVEILLANCE
+DEVICES USING BLUE/OMEGA BOXES. THE BLUES RANGE IS VERY LIMITED, BUT THE OMEGA BOXES
+COVERS MOST OF THEM. SEE MAD!'S NEW OMEGA BOX HANDBOOK FOR MORE INFO.
+
+DEVICE NAME RANGE TONE
+ NOTES.
+
+MLT-2 1400-7200 4800
+ SEE DETECTING TAPS #1
+
+MLT-1 1400-6400 1200
+
+AT&T SCANCAT 900-1200 2600
+ SEE SCANNER BY CAN-AM PIRATING
+ NETWORK
+
+SCANCAT 2 1200-2600 2600
+
+ADS SCANNING SYSTEM 2600-4800 12000
+
+BELL 1021 7200 12000
+
+BELL 1100 400-800+1200-7200 GOLD 2600
+ SEE OMEGA BOX HANDBOOK AND FUN/OMEGA BOXES 1-2
+
+MACE(NICKNAME IF YOU KNOW THE REAL NAME TO THIS MACHINE, PLEASE GIVE IT TO US.)
+ 6200 GOLD 6200
+ THIS DOESN'T ALWAYS WORK.
+
+ADS MONITORING TEST.
+
+ADS IS THE NEW TRACE/MONITORING TEST BEING USED BY AT&T, MCI, SOON SPRINT, AND MORE.
+IT IS VERY FAST AND ACCURATE, BUT IT HAS MANY MANY FAULTS.
+
+AFTER MUCH TESTING WE FOUND THAT IF YOU DO A 7200 AND ADS IS ON THE LINE, A VOLT METER
+WILL GO GO CRAZY. A SIMPLE GOLD WILL MAKE A POP IF ADS IS ON THE LINE. FOR A LOT
+MORE ON ADS SEE MAD!'S UPCOMING DETECTING LINE TRACES.
+
+TAP TEST NUMBERS
+
+LATELY MAD! HAS AS BEEN SEEING ALOT OF THOSE TAP TEST #'S. OUR FRIENDS AT THE PHONECOMPANY SAID THERE ARE SUCH #'S, BUT THEY WILL ONLY DETECT CERTAIN THINGS. HERES A
+SMALL LIST. MAD! IS NOT SURE IF THEY WORK, AND DIDN'T HAVE TIME TO TEST THEM. WE
+WILL PRINT THE RESULTS IN AN UPCOMING FILE. IF THEY DO, WE WILL PRINT ABOUT 25 OF
+THEM.
+
+THIS CAME FROM SOMEONE NAMED HACKER SMITH, BUT WERE NOT SURE WHAT SYSTEM. HERE IT IS...
+
+
+I GOT A # TO SEE IF YOUR BEING TRACED. WHEN YOU CALL IT USING YOUR PHREAKING
+SERVICE,YOU SHOULD HEAR A TONE THAT GOES UP IN FREQUENCY,THAT MEANS YOUR NOT BEING
+TRACED. IF YOU HEAR A STEADY TONE, THEN YOUR BEING TRACED AN YOU'D BETTER HANG UP IN
+LESS THAN 30 SECONDS OR YOU RUN THE RISK OF BEING TRACED...THE # IS 617-890-9900.
+ ENJOY,
+ HACKER SMITH
+
+ALSO YOU SEE THE NUMBER POSTED AROUND 200-XXX-XXXX. THIS IS A ADS SYSTEM USED BY BELL
+LINEMEN FROM PHONE BOXES (SEE THE MAD! FILE ON TEST PHONES FOR INFO ON PHONE BOXING.).
+IT IS NOT A TRACE TEST AT ALL.
+
+THERE MAY OR MAY NOT BE A DETECTING TAPS 3, DEPENDING ON HOW MUCH MORE INFO WE GET.
+WATCH FOR DETECTING LINE TRACES COMING SOON TO A BBS NEAR YOU.
+
+THIS FILE WAS WRITTEN BY THE MAD!
+ BULLPEN.
+
+THE COMMODORE KID COMPLIER WRITER MR. C0SMOS ELECTRONICS INFO WRITER
+
+THE GREMLIN THE WORLDS GREATEST EXPERT ON
+THE OMEGA BOX
+MR. X TELEPHONE INFORMATION
+
+AND THE MANY PEOPLE WHO HELP US OUT... DEATH-STALKER THE DEFENDER DEMON PHONE BANDIT
+MR. Y 8-BALL AND MANY MANY MORE.
+
+MAD! IS A GROUP DEVOTED TO G-FILES. TO CONTACT US CALL THE MAD! MAILBOX ON THE ? MAIN
+BBS (313)-278-9629 OR PIRATES CORNER 1 (313)-386-4698.
+
+9-9-85
+
+ CALL THE CIA 607-324-0197 FOR ALL
+ THE MAD FILES AND TELL THEM
+ RITZ CRACKER SENT YA'
+
+
+
diff --git a/textfiles.com/phreak/WIRETAPPING/eaves1.txt b/textfiles.com/phreak/WIRETAPPING/eaves1.txt
new file mode 100644
index 00000000..7401f117
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/eaves1.txt
@@ -0,0 +1,316 @@
+12/19/91 11:14pm
+
+Basic Eavesdropping #1
+The Electronic Ear
+------------------
+Written By The Freddy
+In Association With The National Newtwork of Anarchists and Nihilists (NNAN)
+
+Introduction
+------------
+ This text file is the first in a series on the topic of eaves-
+dropping. My trusty Webster's Compact Dictionary defines eavesdropping as
+the art of listening secretly. This can be useful to the young anarchist
+in many ways. Suppose that, as a beginning phreak, you are given the
+undubious assignment of being the lookout. Well, you want to hear the
+guard coming while being as far away as possible. Or you stake out your
+mark's house to find out as much as you can before you get your revenge.
+Well, again, you want to hear as much as possible without making yourself
+known. To find out how to properly accomplish these and many other tasks,
+read on.
+
+Disclaimer
+----------
+This document was intended for informational purposes ONLY, the author and
+the National Network of Anarchists and Nihilists do not endorse or support
+any illegal action presented here or in any other documents which we
+release. The only motivation for the writing of this document is purely
+for educating the general public. The author and the National Network of
+Anarchists and Nihilists will not be held responsible for any actions by
+the reader of this document.
+
+Description
+-----------
+ The Electronic Ear is alot like those "high tech" Listenaiders
+which boost sound. Think of the possibilities. With the Electronic Ear
+you can hear whispers 500 feet away or a conversation half a block away.
+You can listen in and record for all posterity the conversation on the tape
+of your choise. Of course, it is illegal to listen in on and/or record a
+conversation without the permission of the parties doing the conversing.
+Two versions will be presented. One that uses a parabolic dish (like on
+satellites); the other uses a highly directional shotgun microphone. Both
+use the same easy to build superamplifier circuit.
+
+Parts List
+----------
+Amplifier Circuit
+-----------------
+R1 10 k-ohm resistor
+R2 100 ohm resistor
+R3 4.7 M-ohm resistor
+R4,R6 3.3 k-ohm resistor
+R5 220 ohm resistor
+C1 220 pF disc
+C2,C3,C5 0.47 æF disc
+C4 1.0 æF polarized electrolytic
+IC1 LM387 integrated amplifier IC
+D1 1N34A
+S1 SPST switch
+Mike Electret condenser microphone
+(1) Project box, 2 3/4 by 5 1/8 by 1 3/4
+(1) 1/8 inch microphone input audio jack
+(1) 1/8 inch sound output audio jack
+
+All resistors are 5 to 10 percent tolerance, 1/4 watt.
+All capacitors are 10 to 20 percent tolerance, rated at 35 volts or more.
+LM387 amp is available in kit form from:
+
+ ALLEGRO ELECTRONICS SYSTEMS
+ 3E MINE MOUNTAIN
+ CORNWALL BRIDGE, CT 06754
+ (203)672-0123
+
+Mail order company. Catalog available.
+
+Construction Of The Amplifier Circuit
+-------------------------------------
+ The Amplifier Circuit is based on an LM387 dual preamp IC. In
+layman's terms, the preamp first increases the amplification from the
+microphone about 47,000 times, and then limits the audio signals of only 1
+volt peak to peak or less to go to the output jack. This will save your
+ears in case one of your less scrupulous friends shoots a cap gun in front
+of the mike. Use a universal solder board for the circuit.
+ Construction is pretty straightforward. I have included both the
+schematic and a picture of what the finished circuit should look like.
+
+Schematic Of The Amplifier Circuit
+----------------------------------
+
+ C6 220pF o To tape Power supply
+ ----|(--ground | circuit decoupling/filtering
+ | C5 \./ or C2
+ | .47 æF --- headphone ---|(---
+ | | amp | .1æF |
+ | ----o----------------o V+ o--o--|(--o--ground
+ | | | | C1
+ | D1 \/ | | 1000æF
+ | 1N34A - | |
+ | | | | Recorder interface
+ |___________o | | J1
+ | | | (o)------
+ R5 / / R6 | Tip| |
+ 220 ohm \ \ 3.3 k-ohm |5 \/ |
+ / / /\ ---/\/\/\/---o--ground
+ \ \ / \ | R1
+ | | / \ o 10 k-ohm
+ S1 ----o 6 / IC1b \ 3
+ o-o /o--o-------| -------/ LM387 \-------o-ground
+ / | | /--------------------\ |
+ | | |7 |8 C4 1.0 æF|
+ | | | | + |
+ | |------------o |----o---|(---
+ | | |
+ | R4 / |
+ | 3.3 k-ohm \ |
+ | / |
+ | \ |
+ | | |
+ | \./ C3 |
+ | ---.47 æF |
+ | +| | Headphone amp
+ | | | J1
+ | ------------------o | (o)-------
+ | | 4| | Tip| |
+ | / /\ | | |
+ | \ R3 / \ | C2 \./ |
+ | / 4.7 M-ohm / \ | 4.7æF --- |
+ | \ / IC1a \ | | C1 |
+ | | / LM387 \ | | .1æF |
+ | | /-------------------\ | o--|(---o
+ | | 2| 1| | Q1 | |
+ | --------------o --------- 2N2222 | |
+ | | c e | R4 |
+ | R2 / V+ o------o----\ /--o-\/\/\-o-ground
+ | 100 ohm \ | \/ 1 k-ohm|
+ | / R2 / ---- \
+ | \ 22 k-ohm\ b| R3 /
+ | | / | 27 k-ohm\
+ | C2 \./ \ | /
+ | .47 æF --- C1 --------o-------------
+ | R1 | 220 pF \
+ |----\/\/\/\-----o----|(------- / R1
+ 10 k-ohm | | \ 1 k-ohm
+ | ---------o---ground /
+ | | |
+ Mike o
+
+Suggested Parts Layout
+----------------------
+ Headphnone Mike Jack
+ Jack_____ _____
+ --| |-----| |------------------------------------------------
+ | | | | | -------- |
+ ON/OFF | --- --- _____|______|____ |
+ switch --- ______________________________________ | | |
+ O--| | | __________ | | | |
+ --- | -|__________|- _|_ _|_ | | | |
+ | | | | | | | | | |
+ | | ____/------------\____ | | | | | | | |
+ | | \------------/ | | | | | | Battery | |
+ | | | | | | | | | |
+ | | _|_ -|- -|- | | | |
+ | | | | _ _ _ _ | | | |
+ | | | | _|_|_|_|_|_|_|_|_ | | | |
+ | | | | | | | | | |
+ | | | | | | | | | |
+ | | -|- |_______________| | | | |
+ | | |_| |_| |_| |_| | | | |
+ | | Circuit board | | | |
+ | -------------------------------------- | | |
+ | ----------------- |
+ |_______________________________________________________________|
+
+
+Notes
+-----
+ If you cannot understand the schematic, then get a friend to make
+it for you. You should be able to build the circuit with a minimal amount
+of electrical experiance.
+ If you plan to connect the output to the line input of a tape
+recorder, use a 10 k-ohm potentiometer as a level control and be sure to
+use shielded cable to reduce unwanted hiss.
+ Test the circuit before building the rest of the Electronic Ear.
+Connect a electret condenser mike to the input jack and a pair of
+headphones to the output. Don't put the headphones directly over your
+ears. I found this out the hard way. Turn the circuit on and listen for
+the squealing sound of the oscillating circuit. If you don't hear it, go
+to the next step. If there is an oscillation problem, increase the value
+of C6 to 330 pF or 470 pF. Also try increasing R5 from 220 ohms to a
+higher value that will reduce or eliminate oscillation, but it will also
+decrease the gain of the circuit. If oscillation is still a problem, then
+try replacing R3 with a 1.5 m-ohm resistor. This should decrease the
+overall gain of the circuit.
+
+The Parabolic Dish
+------------------
+Parts List
+----------
+1 Spun aluminum or plastic parabolic dish
+1 10 inch length of 12 gauge wire
+2 #12 crimp on connector
+
+Dish available from:
+
+ EDMUND SCIENTIFIC CO
+ P.O. BOX 5408
+ SCOTTSDALE, AZ 85261
+ (609)573-6250
+
+Mail order company. Catalog available.
+
+Construction Of The Parabolic Dish
+----------------------------------
+ The most effective way of tuning in on distant sounds is to use a
+parabolic dish. I used an 18 inch diameter dish purchased surplus from
+Edmund Scientific. Other dishes, both metal and plastic, will do.
+ The microphone must be positioned at the focal point of the dish.
+You could use the complicated algebra method, but an easier way is to
+position the dish in full sunlight and move small piece of paper in and
+out of the center until you see a small, bright spot. Measure the distance
+from the paper to the base of the dish and you have the focal point. If
+the dish is not reflective, try covering it with aluminum foil.
+ You want to mount the microphone to a standoff. This can be made
+from a coat hanger adjusted to fine tune the focal point. The microphone
+should be physically insulated from the standoff using double sided tape.
+The finished standoff and mike should look like this:
+
+ _________
+ / \
+ | \
+ | |
+ | |-|
+ Coat | | | Crimp-on spade
+ hanger | | | connector (bend
+ bent | --|-| out tongue)
+ to |
+ shape |
+ |
+ |
+ |
+ |
+ |-|
+ | | Crimp-on spade
+ | | connector
+ |-|
+ |
+
+ Attach the amplifier to the side of the dish using some hardware or
+double sided tape.
+ Paint the dish flat black so it does not glint in the sunlight.
+Also, add a 1/4" 20 bolt and sleeve coupling to one side of the dish to
+provide a meansto secure it to a tripod. This works quite well.
+
+ _
+ /
+ / Parabolic
+ / dish
+ Amplifier /
+ circuit /
+ |---/
+ | |
+ | |--\ o\
+ | | \-----/
+ |---\
+ \
+ \
+ \
+ /\\
+ / \\_
+ \ /
+ |__|
+ / \
+ / \ Tripod
+ / /\ \
+
+The Shotgun Mike
+----------------
+Parts List
+----------
+1 40 inch lenght of 4 inch PVC or ABS plastic pipe
+1 4 inch end cap to fit onto one end of pipe
+1 3 inch round speaker (replaces Mike)
+
+Construction Of The Shotgun Mike
+--------------------------------
+ The Shotgun Mike is cheaper to build than the parabolic dish. It
+does not collect as much sound, though, but it is more directional.
+ The speaker needs to be physically isolated from the tube to reduce
+the effects of vibration. I have found that a pice of 2 inch thick foam
+cut to 4 1/2 inches in diameter works well. Punch or cut out a small
+circle in the center so it looks like a doughnut.
+ Solder an 8 inch length of shielded cable to the terminals of the
+speaker. Press the magnet of the speaker through the small hole and slip
+the foam and speaker into one end of the tube.
+ Solder the other end of the speaker wire to a 1 1/8 inch plug.
+Drill a hole in the end cap for the speaker wire, mount the amplifier, and
+you're set. The finished product should look like this:
+
+ Amplifer PVC pipe
+ circuit ---------------------------------------------------
+ ##########||----| /
+ ##########|| F | / Speaker
+ ##########|| o |-|
+ ##########|| a |-|
+ ##########|| m | \
+ ##########||----| \
+ --------------------------------------------------
+
+Conclusion
+----------
+ Now that you know how to build an Electronic Ear, you probably want
+to know how to use it. That will be upcoming in a future installment.
+Until then, build one yourself. I can be reached at The DeaTh BoX
+BBS--(714)970-6710--which is the home of NNAN. Well, it's getting late so
+until next time, adieu.
+
+12/24/91 1:27am
diff --git a/textfiles.com/phreak/WIRETAPPING/es.txt b/textfiles.com/phreak/WIRETAPPING/es.txt
new file mode 100644
index 00000000..59b8e887
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/es.txt
@@ -0,0 +1,429 @@
+Electronic bug detection
+''''''''''''''''''''''''
+
+ Electronic bug detection will probably be the most difficult aspect of this entire
+field, as you will be working on your own, without the aid of much useful information
+that can be gathered from the telephone company or other agencies. (Most telphone bu
+gs, except the sophisticated ones, can be detected by an overload on the phone line
+itself) A good tool for bugging detection is a normal AM-FM radio receiver, portable,
+with a telescopic antenna. For application, extend the antenna in the room suspecte
+d of being bugged and tune the receiver carefully from the bottom to the top, covering
+all the FM frequencies, at the same time, talking to yourself continually. At one
+point, if a bug is present, you will be able to hear your voice through the receiver,
+ although the voice may be indistishguishable, because of top volume feedback. This
+feedback will always be a deafening continuous howl, scream, or high-pitched whistle.
+To learn the exact location of the bug, cut the volume of the receiver, and slowly
+move around the room. The feedback will increase in volume as you get closer to the
+bug. When a bug is discovered, there is a moment of confusion and fear in reguards to
+its elimination. In one sense, destroying a bug is an admission of guilt, and can
+do nothing more than provoke the enemy to rebug in a more sophisticated manner. For
+that reason, I would hesitate to remove a bug. Instead I would attempt to use it
+against the bugger himself, by feeding him flase and misleading information.
+ In some cases the bugger may have taken precautions on this type of detection and,
+by readjustment of his oscillating capacitor, he may be transmitting on a range below
+the sensitivity of your radio. In this case employ your television set in the same
+manner as you did the radio, using the ultrahigh frequency knob. As you move across
+the range of frequencies, keep your eyes on the picture, until you have found a pattern
+of dark wavy lines that move in relation to your own voice, coupled with top-volum
+e feedback. The actual location of the bug is a little more difficult, unless your TV
+set is battery operated, but by use of several extension cords and slow movement, this
+can be accomplished.
+ The feedback technique can also be used when the bugging involves (citizens band)
+walkie-talkie. One of the simplest methods of bugging is to tape down the transmitter
+button on a cheap walkie-talkie, and plant it to where the conversation is to be hel
+d. The process of detection is exactly the same as above, except that, instead of using
+a radio ro TV set, one uses a tunable CB receiver to check for feedback.
+ Although the previous "feedback technique" can be effective, it is time-consuming and
+not 100 percent efficient. For these reasons, electronic experst have invented an
+marketed a small meter, which detects transmitters. The interesting problem that th
+ese experts have overcome was, with all the high-powered radio and TV stations
+transmitting, how would it be possible for an individual to detect a low-powered
+transmitter, such as a microphone? This was overcome by simply reversing the gauge.
+In other
+words, when the meter was "wide open,"no signal was present. However, the closer the
+meter was taken to the transmitting device, the less of the reading the meter registers.
+These fie~- meters are available from most large electronic companies and range
+ in price from about $10 to $200, depending on quality and strength.
+ A device similar to the "strength meter," which a Texas company has marketed, utilizes
+a small bulb, which blinks only in the presence of a bug. The true value of this device
+is that it is capable of seperating normal radio wave (which do not affect it
+) from the dangerous radio signals emitted from a bug. It is available from Dee
+Company, Houston, Texas for about $200.
+ If your not electronically minded, or just not equiped to find the tap on your phone,
+Continental Telephone has a device that allows you, through the use of its meter, to
+determineif the wire is tapped, and, if so, where it is located. Unfortunately th
+is device (called "the Private Sentry) costs $250.
+
+
+Electronic jamming
+''''''''''''''''''
+
+ Most of the devices written about so far in this chapter are legal, with regulations
+placed on their application, but the very possession of certain jamming devices is
+illegal. These jamming devices basically destroy the effectiveness of a bug rather t
+han locate it. The reason the FCC has put strict regulations on these is the effect
+they have on other means of communications, such as completely destroying AM radio
+reception, rendering TV sets useless, making communications on police band radios impos
+sible, and even to some degree interfering with aircraft communications. To be truly
+effective as any-bugging devices they must cover the whole spectrum of radio
+frequencies, which in turn will cause interference to other outside receivers and
+transmitte
+rs. For this reason control is of the essence. When determining what exactly you wish
+to jam, you must also determine the frequency to be used, so as not to interfere with
+other signals. If you decide to use a jamming device for an illegal purpose, you
+ must at all cost maintain mobility. (Jamming from the back of a moving truck has been
+prooven effective) Mobility is necessary, because the FCC also employs detecting and
+locating devices for use against underground radio stations and unregulated jammin
+g devices.
+ There are basically two types of jamming devices, the first of which is not
+manufactured commercially and would have to be built by the individual. This type is
+called "spa~-gap device," and is more powerful than the other, covering greater
+distance.
+The second type is refered to as "the white noise device," and is manufactured by
+Continental Telephone, Dectron Industries, Inc., and Telsec, with a price range from
+about $150 to $350, depending on strength.
+
+
+Electronic scramblers
+'''''''''''''''''''''
+
+ Electronic scramblers are devices that simply act as an an~-bug mechanisms by
+transforming normal speech patterns into unintelligable sounds. The most primative
+method, outdated today, is recording a message on a tape recorder, and then transmitting
+it
+, either by playing it backward or at a different speed. Although this method may
+momentarily frustrate the bugger, if he has half a brain, it won't take him long to
+decode your message. The basic principle of scramblers, or any coding device, is to
+ren
+der the message useless to anyone except the desired recipient in cont
+
+ There are several types of electronic scramblers, all effective but all sharing the
+same disadvantage - price. The most inexpensive one I found in any catalogue ran about
+$500, but then anyone with the slight knowledge of burglary will not be put off by
+ this obstacle. The most popular type is manufactured by Dectron, and is used as an
+extension to the telephone. The spech is garbled before it enters the mouthpiece of
+the phone, and decoded after it has left the receiver. A pair of these run just over
+ $500, but the real disadvantages to these devices is that the individual code your
+devices are working with is retained in a vault by the company, so that anyone with
+access to that vault can break down your security.
+ The second device used for scrambling is manufactured by an English company, and it
+works on the principle of inverting the normal speech patterns. In other words, it
+makes low notes high, and high notes low. This offers the individual a little bit mo
+re security, as each person's speech frequency is as differnt as his fingerprints.
+Their major disadvantage is price. It sells for between $1,000 and $1,500.
+ The third type of scrambler is used only for radio transmission. This device can also
+be purchased through Dectron, for about the same price as mentioned before. The radio
+scrambler works on basically the same principle as all other scrambling devices
+, in that it inverts or disorders the frequency and pitch of the speech pattern while
+it is being transmitted, and then reverses the garble to render it understandable to
+the receiver.
+
+
+Mail order & retail electronic outlets
+''''''''''''''''''''''''''''''''''''''
+
+ I have listed below some of the major electronic mail order and retail outlets. Many
+companies that sell this type of equipment do so only to police officers, and require
+the purchaser to prove his relationship with some law enforcement agency. For th
+at reason they have not been included. These companies listed are all involved in the
+manufacturing and/or sales of eavesdropping and surveillance equipment.
+
+ S.A.C. Electronics,
+ 4818 West Jefferson Blvd.,
+ Los Angeles 18, California
+
+ Baker Electronics Co.,
+ R.R. 3,
+ Greencastle, Indiana
+ (mail-order plans and kits only)
+
+ Dehart Electronics,
+ P.O. Box 5232,
+ Sarasota, Florida
+
+ Continental Telephone Supply Co.,
+ 17 West 46th Street
+ New York, N.Y.
+ (fantastic catalog)
+
+ Martel Electronics Sales, Inc.,
+ 2356 S. Cotner Ave.,
+ Los Angeles, California
+
+ R & S Research, Inc.,
+ 2049 Richmond Ave.,
+ Houston, Texas
+
+ Mittleman Manny,
+ 136 Liberty Street,
+ New York, N.Y.
+ (only custom devices $400 )
+
+ Clifton,
+ 11500 N.W. 7th Ave.
+ Miami, Florida
+
+ Consolidated Acoustics,
+ 1302 Washington Street,
+ Hoboken, N.J.
+ {only listening devices)
+
+ Ekkottonics Co.,
+ P.O. Box 5334,
+ Milwaukee, Wisconsin
+ {(che})
+
+ Dectron Industries, Inc.,
+ 13901 Saticoy Street
+ Van Nuys, California
+ (only an~-bugging equipment)
+
+ Dee Co.,
+ Box 7263,
+ Houston, Texas 77008
+
+ T~-Tron of Dallas,
+ 330 Casa Linda Plaza,
+ Dallas, Texas
+ {(discount bugging equipme})
+
+ Security Electronics,
+ 11 East 43rd Street,
+ New York, N.Y.
+
+ Telephone Dynamics Corp.,
+ 1333 Newbridge Road,
+ North Bellmore, N.Y.
+ {(only miniture microphon})
+
+ Simlar Electronics, Inc.,
+ 3476 N.W. 7th Street,
+ Miami, Florida
+
+ Tracer Systems,
+ 256 Worth Ave.,
+ Plam Beach, Florida
+
+ The federal Communications Commission and the Supreme Court have been uptight about
+wiretapping and eavesdropping for some time. They have both passed laws and made
+regulations concerning electronic surveillance. For these reasons, I would emphasize
+t
+he utmost care and knowledge in the application of these devices. What is intersting
+is the actual wording of the law, where any interstate wireta{(interstate does not mean
+interstate, it applies to all tapping through some strange log}) except in a matt
+er of security is against the FCC's regulations and is punishable by a fine of no more
+than $10,000 or five years in jail. The neat little exception made for security gives
+all of government agencies, particularly the FBI and the CIA, and all local polic
+e departments, free license to practice all and any forms fo surveillance without any
+restrictions. Although certain cases have been dismissed in court cases because of
+"tainted" methods of collecting evidence, in reality if the government feels an indiv
+idual is a security ris{(for any reas}) it can produce tapes in court that have been
+gathered by wiretapping, supposedly not as evidence, but the defendant goes to jail
+anyway.
+ America, at this point, is operating on a li~-size Monopoly Board. Everyone who isn't
+in jail or going dirrectly to jail is buying and selling thousands of pieces of paper,
+with absolute seriousness of purpose, unable to realize that there will be only
+ one winner, and when he gets out of jail, he's going to kick all their asses.
+
+
+Broadcasting free radio
+'''''''''''''''''''''''
+
+ In any underground, throughout history, a prime concern has been communications or
+propaganda. Propaganda, as a word, has ugly connotations, but in reality it means
+nothing more than the distribution of information. This country has begun to develop
+a
+n underground network of communications, in the many small newspapers which has cropped
+up all over the country. Although there is a spark, there is also a monstrous lack of
+communications, once you get outside any of the large metropolitan areas. In pr
+eparation of writing this book, I had to do a great deal of reference work. In this
+reading encompassed almost all extremities of the political spectrum, from far left to
+far right. These extremities are so alike, and could be so powerful if they ever g
+ot over their preconceived impressions of each other and started to communicate. This
+is the reason I feel the underground has to take propaganda one step further, from the
+printed page, to the radio broadcast.
+
+ The radio is a factor of ext~-
+ ordinary importance. At moments
+ when war fever is more or less
+ palpitating in every one region
+ or a country, the inspiring,
+ burning word increases this fever
+ and communicates it to every one
+ of the future combatants. It ~-
+ plains, teaches, fires, and f~-
+ es the future positions of both
+ friends and enemies. However,
+ the radio should be ruled by the
+ fundamental principle of popular
+ propaganda, which is truth; it
+ is preferable to tell the truth,
+ small in its dimensions, then a
+ large lie artfully embellished.
+ ~-Che Guevara
+ Guerrilla warfare
+
+ Kwame Nkrumah, in his HANDBOOK OF REVOLUTIONARY WARFARE, also stresses the use of
+radio propagnda. He breaks it down into two basic forms: The first and most important
+is the same as Che was writing about in the above quotation, this being to communic
+ate truth to people of the country about the struggle. Nkrumah takes this idea one step
+futher, and says that really to communicate the underground must speak on many different
+levels, and this is a key point. How can an anarchist who has a rig~-wing ba
+ckground understand or relate to a le~-wing anarchist, who uses Marxist terminology?
+This forces the underground to communicate with many different frames of reference.
+This hasn't happened in this country: Everyone from far left to far right is hung up
+ with dogmatic ideals, over used terminology, and is absolutely blind to practicality.
+ Nkrumah's second concept of propaganda is for the purpose of subverting the enemy.
+
+ An indispensable primarily to
+ battle is to attack the mind of
+ the enemy, to undermine the will
+ to fight so that th result of
+ the battle is decided before the
+ fighting begins. The revoluti~-
+ ary army attacks an irresolute
+ and demoralized army.
+ ~-Nkrumah
+ Handbook of
+ Revolutionary
+ Warfare
+
+ This use of propaganda to discourage the enemy has also a great place in the struggle
+that is going on in this country today. It has been used to a small degree, with
+fantastic success, around military bases. There was a regiment of the National Gaurd
+ that refussed to go to Chicago during the National Democratic Convention. Underground
+newspapers and handbills have encouraged G.I.'s to dissent and desert, and have shown
+them that it is possible. The effectiveness demonstrated by this demoralizing fo
+rm of propagnda depicts nothing more than the real turmoil that exists. The successful
+effect of this communication has resulted from one aspect of its natu~--that being its
+passionate reguard for truth.
+ Printing a revolutionary newspaper is a great deal easier than forming a underground
+radio station. Althought the government has strict restrictions on printed material,
+it is nothing like the regulations it places on radios and television broadcasting
+. The FCC runs the radio networks with an iron hand, wih the ever present threat of
+revoking a license. For this reason, any radio station which is striving to be
+absolutely free must make the ultimate break with the FCC. This can be accomplished
+in tw
+o ways. The first and most dangerous, but at the same time the most effective, is by
+using high powered equipment, jamming out other stations, from a mobile base of
+operations. The FCC has incredibly sophisticated equipment, and can locate any pirate
+r
+adio station in a matter of minutes. For this reason, mobility is essential.
+Transmitting from the back of a disguised truck has been used successfully, although
+the movement of the truck while broadcasting must be constant, never repeating the same
+pat
+tern, but at the same time keeping within the broadcast power area. This means of
+transmission is especially effective at gathering, such as demonstrations and riots to
+keep people informed as to the movement of the enemy. The best method of obtaining e
+quipment is building your own, as to buy a large transmitter requires the individual
+to be licensed. Not only that, it's expensive. You can build your own from plans and
+equpiment purchased through mail order, from most of the companies listed earlier i
+n the text file.
+ The second method for getting around the strict FCC regulations is legal. Under the
+FCC's l~-pow~-transmission regulations, one can legally broadcast below 100 milowatts
+at any empty space on the AM or FM dial, without registering or being licensed. T
+he disadvantages are obvious: One can be only broadcast up to one mile. Even within
+that mile, interference from the hi~-power commercial stations is present. And if
+enough people get into this form of broadcasting the FCC is going to make some sort of
+ regulation against it. This method is not just theoretical, it has been inplemented
+on the Lower East Side, by John Giorno and his Guerrilla Radio. He broadcast from the
+top of the St. Mar~-~-t~-Bowerie's belltower at 1400 on the AM dial, and calims he
+ did everything the FCC said he couldn't. I am sorry to say I did not hear the
+broadcast, as I was out of the o~-mile area at the time.
+
+
+Telephone and communications sabotage
+'''''''''''''''''''''''''''''''''''''
+
+ Telephone sabotage can be applied on many levels. First I am going to explain what
+I am not going to write about. I feel there is no need for me to explain how to make
+free phone calls by telling the operator that you dialed the wrong number, just as
+I am not going to get into explaining how to use a number 14 washer with scotch take
+in a pay phone, or cheating on credit card calls, or spitting on a penny. These are
+all explained in FUCK THE SYSTEM, a pamphlet on living freely in New York City. The
+interst I have in telephone sabotage is purely communicational and commercial.
+ Commercial inn the sense, that over the past few years my absolute hatred of vending
+machines and pay phones has led me to break into almost every kind I could find.
+Parking meters are the easiest by far: All you need is a hammer and chisel or a larg
+e money wrench. Soda machines are almost as easy, but real delight comes from ripping
+a Kotex machine off the wall of a womans restroom, or sticking an explosive charge in
+the coin slot of a pay toilet. I have never been able to break into a pay teleph
+o~--smash them, yes, put them out of order, but never able to open them up and remove
+the coins. This is for several reasons: One is the time element, as most public phones
+are easily seen, and the other is that all public phones are installed with amaz
+ing locks, which have completely baffled me.
+ To get back to the purpose of this section, I must emphasize the importance of
+breaking down the enemie's communications. This in turn results in confusion and chaos.
+Imagine, for a moment, a squad car without menas of communicating with its precinct,
+ or an enemy aircraft with its radio jammed. This act of breaking down the enemy's
+lines of communications is not and end in itself, rather it is a tact~--a small, but
+extremely important, part of a total operation.
+ When considering communications, it is best to start from primative base and work up
+to more sophisticated tactics. The first and simplest method for rendering a telephone
+inoperative is only temporary. It entails calling the phone company that a cert
+ain number be disconnected. This will work for individuals, but not for agencies or
+law enforcement organizations. An important factor in any form of telephone sabotage
+is the time aspect of verificati~--in other words, the amount of time it takes the
+phone company to trace a call. The phone company can tell right away if you are calling
+from a pay phone, so this should be avoided. Call from a private phone which you can
+not be connected with, and limit your conversation to under ninety seconds. IMP
+ORTANT: Most law enforcement organizations, companies, corporations, and businesses
+have more than one phone line, and in most cases one or more will be unlisted.
+ A common misconception is that a person can render a phone useless by dialing a number
+and, before the party answers, leave the phone off the hook. This si not true, and
+doesn't work. Even if the caller does not hang up the phone, the receiver can get
+ a dial tone by hanging up himself and holding the hook down for a little over thirty
+seconds. Although this method does not work in the cit{(I know because I have
+experimented with }), I have heard reports that it has been used in rurla areas with
+varyi
+ng degrees of sucess. I would suggest trying it out with a friend, to see if it is
+effective in your area.
+ The other truly effective method is the most dangerous. It entails the actual cutting
+of the phone wires. This is much easier in a rural area where the phone lines are above
+the ground, and there are not so many of them. It should be noted that compl
+ete telephone communications with a small town or village can be broken in less than
+ten minutes. Probably the most important thing here is having a complete understanding
+of what you are doing, and using the correct tools. Phone lines do carry electric
+al charges and, without the complete knowledge of what you are doing and without the
+correct tools, it would be very easy to electrocute yourself. In rural areas, the basic
+tools should be: rubb~-soled shoe{(sneake}); pliers with rubber grips; large heav
+~-duty wire or tin cutters, also with rubber grips; a pair of surgical rubber gloves;
+a small flashligh{(operate at nig}); and a body strap to allow you free movement of your
+hands once at the top of the pole. IMPORTANT, before attempting any telephone w
+ire cutting, get hold of a copy of telephone repairman's manual, and read it.
+ This same operation can be preformed in urban areas, although the process is much more
+involved. In most urban areas the phone lines run beneath the street level, and they
+are`usually`)
+
+ to the phone lines in the sewers, there are also all the hi~-voltage electric lines.
+If you cut into one of these, I don't care how well insulated you are, you'll fry. An
+urband saboteur should either be in possession of a detailed map of the phone lin
+es, available at any municipal library, or carry a small electric line locator, so that
+he can find the right line to cut. The urban guerrilla, on this sort of mission, should
+carry all the tools the rural guerrilla would have, except he should exchange
+the body strap for a rubb~-insulated hack saw, also add a crowbar. The hack saw is for
+the mtal encasement that surrounds all phone and electric wires in the sewers. Access
+to the sewers is pretty easy, as most manholes will take you into an amazing com
+plex of all differe~-sized tunnels, where you can get thoroghly lost, unless you have
+had the foresight to study a map of the sewers, also available from any municiple
+library. Know exactly where you are going, know all the obstacles that you may come
+in
+ contact with, and have several routes of escape planned, in case of an emergency.
+Needless to say, if you decide to go into the sewers, dress accordingly. It's cold,
+damp infested with rodents, and dark, and many tunnels are partially full of water.
+ A word of caution about using explosives to sever phone lines: In the sewers, don't.
+In Paris in 1945, the French resistance decided that to aid the oncoming Allied troops,
+they would cut all lines of communication from the Nazi headquarters and Berli
+n. This proved insuccessful, for many reasons, but the important fact was that they
+did attempt to use explosives in the sewer system. A small charge was placed right
+on the phone lines, and denoted from a good distance away. The phone line was cut, b
+ut unknown to the resistance, so was a gas main, right next to lines. The result:
+phone lines cut, a large number of civilians dead, and a block and a half completely
+leveled. Not only was the area totally destroyed, it was flooded by the bursting of
+t
+he water mains which also shared the sewers with the phone wires.
+ One can use small explosive charges in rural areas, as the lines are above the ground.
+
+
+DOWNLOADED FROM P-80 SYSTEMS 304-744-2253
+
diff --git a/textfiles.com/phreak/WIRETAPPING/faxint.phk b/textfiles.com/phreak/WIRETAPPING/faxint.phk
new file mode 100644
index 00000000..46b55841
--- /dev/null
+++ b/textfiles.com/phreak/WIRETAPPING/faxint.phk
@@ -0,0 +1,254 @@
+FAX INTERCEPTION
+
+This article is reprinted from Full Disclosure #23. Copyright (c) 1991 Full
+Disclosure. Permission granted by publisher to reprint when subscription
+information provided: Full Disclosure, Box 903-R, Libertyville, Illinois
+60048, Phone: (708) 395-6200, Fax: (708) 395-6022, BBS: (708) 395-3244, Toll
+free: (800) 786-6184. Subscriptions: $18 for 12 issues.
+
+As with the introduction of all new communications technologies, there is a
+time lag between the availability of the technology and commercial
+development of interception devices. Accompanying the use of both are
+unanticipated risks and the potential for misuse and misunderstandings.
+
+False Sense of Security
+
+With the widespread proliferation of fax machines came increased use. In
+general, a document transferred has been given the same sort of validity as
+one sent or received by U.S. Mail. In general, such communications were
+originally secure. Now that interception equipment is available, the sense of
+security has become false.
+
+For all practical purposes, fax is a remote photocopying machine. The process
+begins with the sending unit converting the image on the page into a
+digitized image (numbers in an electronic format) and transmitting it as a
+noise sounding signal over a phone line. The receiving fax converts the
+signal into dots and prints it.
+
+Since the image is transmitted over standard phone lines, the communication
+is subject to interception. However, rather than tapping the line with a tape
+recorder or simply listening to the oral communications, an interception
+device that makes sense of the specialized signal is necessary. Sometimes
+this is done by recording the transmission and later converting the recording
+of the modem signal to a computer image, sometimes it is done 'on the fly' as
+the signal is being intercepted.
+
+Simple Fax Intercepts
+
+Why not just use a standard fax machine for interception? The signal
+sequences and handshaking at the time machines first connect complicates the
+possibility. During startup, the machines automatically select one of several
+built in protocols depending on line conditions. That is why on really noisy
+connections, the transmission of a page can take much longer. Directly
+connecting a 3rd fax machine to the line may confuse this process. Both the
+receiving unit and the intercepting machine would be sending signals about
+line conditions and protocol. However, if a 3rd fax machine did manage to get
+properly synchronized to the signal in use without interfering with the
+initial handshake, it would print an image identical to the one received by
+the intended recipient. We had mixed results when we tried this in our lab.
+Sometimes we managed to get all three machines synchronized. Using unmodified
+fax machines to attempt intercepts didn't provide sufficient reliability to
+be considered a viable approach. Indeed, continued attempts of this approach
+would likely put both sender and recipient(s) on notice that something was
+wrong as connections would be repeatedly lost.
+
+This doesn't mean that it is really complicated to intercept faxes. The
+Philadelphia Inquirer reported in September 1990 that Japanese hackers have
+been stealing valuable information from corporations by using fax
+interception. The article claimed it could be done by anyone with a little
+knowledge of electronics. We agree, we have intercepted faxes in our lab.
+(See front cover for one such example.)
+
+Doing It Right
+
+The latest commercially available fax interception devices generally use fax
+boards in IBM PC or compatible computers. The actual hardware used for fax
+interception is often the same as used by normal computer-fax systems. The
+software is more sophisticated. Rather than attempting to synchronize with
+the sending unit by sending protocol information, it adjusts to whatever
+protocol the two main players have established and stores the signal
+information.
+
+After interception, the electronic information is stored in the computer and
+is available for review, to be printed, altered or discarded. Such equipment
+can be left unattended for long periods if necessary, or monitored for the
+instant use of information in cases where law enforcement is standing by
+waiting for some specific bit evidence.
+
+Cellular Fax Interception
+
+Cellular phone based fax machines provide ripe opportunity for `hacker'
+intercepts, since the signal is available via low cost police scanners. No
+physical connection to a common carrier network is necessary. There is
+absolutely no risk of being detected.
+
+Commercial fax interception equipment gets more complicated, though. Since
+fax messages might be on the same phone lines as voice or other computer
+modem communications, some of the interception devices automatically route
+different types of communications to different interception devices. This
+provides the interceptor with a separate recordings of voice phone calls,
+faxes, and other computer communications.
+
+Such fax interceptions are based upon the interceptor having a specific
+target. Distributing the sorts of information received for analysis isn't
+much different from an ordinary, now old fashioned, wiretap.
+
+Broadband Interception
+
+Presorting of signals and voice communications as described above makes
+broadband scanning for fax messages easy. The interception of satellite or
+microwave links has become possibile. Cooperation by a common carrier with
+the government has happened in the past, and strikes a chord of dangerous
+reality today. But it really takes little by way of home fabricated equipment
+to monitor much of the satellite link traffic. Commercial equipment is also
+available. One commercial fax interception unit can decode up to 150
+simultaneous fax transmissions from a 6,000 phone line satellite link.
+
+Such broadband interception can also be done on oral calls, however, the task
+of listening to all the conversations for the important ones is much, much
+greater compared to scanning faxes. First, faxes are usually much more direct
+and to the point than normal phone conversations (not so much about Sunday's
+game). Additionally, optical character recognition (OCR) process can be used
+to convert much of the text to standard computer data and then be
+mechanistically selected for closer scrutiny by an automated search of
+keywords of interest. Encryption of a fax could also be noted, perhaps
+triggering further attention.
+
+The risks resulting from broadband interceptions are henious. Your fax could
+be intercepted not because you were a selected target of law enforcement,
+industrial spies or miscreant hackers, but because of the route your fax
+travelled through the common carrier networks. Broadband interceptions become
+a modern day version of general warrants. Satellite signals don't respect
+borders. Interception in nations with no privacy concerns for radio signals
+of what we, as users, understand to be Constitutionally protected
+communications has become a real threat. There are areas contained within our
+national frontiers where the United States Constitution does not apply.
+Foreign embassies present one such clearcut example. The status on Indian
+Reservations is not cleancut.
+
+Dangers of Fax
+
+The February 13, 1990 issue of the American Bankers' Association publication
+``Bankers Weekly'' reported that ``In one incident, a bank suffered a $1.2
+million loss through fraudulent funds transfer requests which were
+accomplished using nothing more than business letterhead, tape and sissors.''
+A fax machine made such simple tools effective. Inordinate reliance on
+technology permitted the loss to actually happen.
+
+The journal continues that there is a need for legislation (changes to the
+Uniform Commercial Code) to put a stop to the problem. Unfortunately,
+legislative efforts alone cannot correct the problem. The first step, is an
+understanding of the technology.
+
+Once the technology is understood, administrative procedures can be
+implemented by users of fax machines to protect themselves. That protection
+cannot be successful without understanding the limitations of the machinery.
+Taking any communications device for granted is a high risk path.
+
+New Techniques For Fraud
+
+The advent of fax technology has opened the door to new methods of fraud.
+Those intent on committing fraud have always devised methods of bypassing
+normal authentication systems in order to steal. As technology evolves, these
+methods also evolve. Protective measures must follow suit.
+
+Faxes represent a multiple whammy. People who send faxes have some geographic
+distance between them. Because of past reliance on semi-automated
+communications, formal verification proceedures are bypassed, substituting
+the mysterious nature of modern communications. There was a time, even
+recently, that tellers at banks asked for positive identification even in the
+case of small cash transactions inside a bank. Yet today we witness orders
+for large sums being processed simply because ``it came by fax.'' This is
+truly a conspiracy of laxness and misinformation.
+
+A written purchase order from a company is likely to have a particular form,
+and include a signature. One attempting to issue a fraudulent purchase order
+would need to forge both the form and the signature. Additionally, envelopes
+and possibly a postage meter imprint from the issuing company would also be
+needed. Elsewhere in this issue we reprint a letter from the Federal
+Communications Commission. The letterhead was, for reasons we have been
+unable to determine, typed instead of printed. Some of the recipients we've
+talked to have placed calls to verify the authenticity of the letter. As it
+turns out, the letter was authentic and official.
+
+A purchase order sent by fax on the other hand, can be created by cutting,
+pasting and xeroxing together parts of other orders from the company. When
+received by fax, the fake would appear legitimate.
+
+PC's & Fax: The Miscreants Gun
+
+The advent of PC based fax boards exaggerates these problem. A fax that
+originates, is received by, or intercepted by a personal computer (PC) fax
+board really opens the door for miscreants.
+
+A fax, when stored on a PC is easily modified using ordinary commercial
+software intended for preparation of graphics. An image of the fax can be
+brought up on the screen and parts of it altered or cut and pasted
+electronically. For example, a purchase order could have a shipping address
+altered. A signature could be removed from one document and placed on
+another. All such operations can be done on a computer screen in moments.
+Document changes that could take a professional forger hours to accomplish
+could be done in minutes by an amateur, even an underage one.
+
+Bogus faxes can be created to be sent to another fax, or incoming faxes could
+be altered by an employee and printed as authentic. Detection is difficult to
+impossible, depending on verification techniques used at audit.
+
+The difficulty of intercepting standard U.S. Mail or voice phone calls and
+altering the content by a third party is enormous compared to fax messages.
+Before a fax message is printed, it is just a series of electrical signals.
+Any alternations result in changes without a trace of the alteration.
+
+The receipt of a fax is not a confirmation of its content, unless other
+corroborative authentication validates the information.
+
+Someone with access to a phone closet can route incoming fax line to a PC.
+The fax can then be connected to a different phone line. All incoming faxes
+would be first received by the PC and the operator could alter, erase, or
+forward without change those faxes to the standard fax machine. A pre-review
+and alteration if desired scheme can be effected. The same can not easily be
+accomplished with normal voice phone calls, or the U.S. Mail.
+
+With the advent of the Caller-ID services, this information should soon be
+incorporated into fax machines, so the true number of the caller will be
+placed on the fax. This will still do nothing to prevent transmission of
+bogus faxes over that phone line.
+
+Protect Yourself
+
+The best rule for protecting one's interests when using faxes is to use them
+only with other confirmation or as confirmation of other communications. They
+should never be used for final copies of contracts, purchase orders or other
+important documents that could have a significant impact if altered, or
+entirely fabricated. Where would we be if our WW2 treaties terminating
+hostilities were faxed documents. Additionally, information that would not be
+given out over a standard phone conversation, subject to a wiretap, or other
+listeners (via a speakerphone, extension, etc), should not be sent by fax.
+There is no way to tell who may pick up a received fax and read it. In fact,
+it is more likely an unintended party will read a fax than pick up an
+extension phone and eavesdrop on a voice call (intentionally or not).
+
+It should be kept in mind that any errant employees or others that could get
+access to the fax phone line(s) could intercept all faxes sent or received
+and make use of the fax images for whatever purpose they desired.
+
+The intercepted faxes can be used to collect or create incriminating
+evidence, industrial espionage, or as the base of documents to be used in
+forgery. There's a whole new meaning to autograph collection.
+
+Conclusion
+
+Fax technology in its current form provides a useful service for business and
+others. However, the risks must be examined so the use doesn't go beyond that
+which is appropriate given its current functionality / risk ratio.
+
+In conclusion, the convenience of a fax must be weighed against its risks and
+procedures implemented to authenticate incoming and outgoing faxes as well as
+what information is communicated by fax. As with all technologies, it must be
+understood so that it can be used for purposes that are appropriate for the
+needs of the technology and the user. A lack of understanding can leave the
+user exposed to unnecessary danger, liability and loss. When used with an
+understanding of the benefits as well as the pitfalls, a fax machine can
+greatly enhance productivity.
+
+Downloaded From P-80 International Information Systems 304-744-2253