,
                                                      This publication Is dedicated to all of those bafore II
                                                      who built the foundation for the hackers of the world I
                                                       xpress themselves openly and without prejudlca.
                                                      While we attempt to continue In our quest to obla/II
                                                      knowledge and understanding, we Invite you, tha read" ,
                                                      to Join In and share any thoughts you may hava
                                                      regarding the magazine, hacking, life, work and anythlnll
                                                      else that you feel Is Important enough to be shared.
                                                      We're not going to knock anyone down for ask/nil
                                                      questions or ridicule the steadfast elitist folks who
                                                      believe that knowledge should not be shared. We ballava
                                                      knowledge should In fact be shared with one anothar, no
                                                      matter how trivial the Infonnatlon may appear to ba.
                                                      After all, knowledge Is power.
                                                      Think back to the way It was, when hackers stuck
                                                      together and had a good time . An amusing time whan
                                                      hackers shared their stories of exploration and ultimata
                                                      conquest.     A wondrous time when hackers ware
                                                      considered the good guys and looked up to by those not
                                                      fortunate enough to understand the technology around
                                                      them. A simple time when a hackers hannless efforle
                                                      gained a new understanding of technology Issues and
                                                      the praise from their peers and superiors alike.
                                                      That time can stili be NOW. Hackers of the world unlta
                                                      and exercise your freedom to dlssemlnate/nfonnationl




                              Blacklisted! 411 sta
                      Editor                                             Office Babes
              Zachary Blackstone                                     Jazzy Kitty, Jess, Lexus

    Co-editors (our backup)                                               Distribution
               Alexander Tolstoy                                  Greg, Boiler, Syntax, David B.
                    Dave S.
                                                                              Artwork
               Photographs                                    Derek Chatwood - A.KA Searcher
                      JB&BJ                                     Kate 0. , Parallax, Mason/Wolf



ISSN 1082·2216
Copyright 1983-2004 by Syntel Vista. Inc.

All opinions and views expressed in Blacklistedl 411 Magazine are those of the writers of the articles, and do not
necessarily reflect the views or opinions of any Syntel Vista, Inc. staff members or it's editors.

Blacklistedl 411 Magazine strongly supports the idea of Freedom of Speech, and will publish any articla of
adequate quality. These articles will often contain material offensive to certain people. If you cannot handle lh...
please do not read the magazine. This information includes (but is not limited to): Information on the compular
underground and material relating to hacking, phreaking and other similar interests. Again. if this sort of thing
offends you, don't read the magazine. or at least don't read the articles which you find offensive. Our purpcse ..
not to offend, but to educate.

All rights reserved. No part of this material may be reproduced, stored in a retrieval system, or transmitted in any
form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior writtan
permission of Syntel Vista, Inc.

Syntel Vista, Inc.
P.O. Box 2506
Cypress CA, 90630

9035768ABBAJBVJB-0019

DBBL 01,07.32,41.52
PRINTED IN THE UNITED STATES OF AMERICA
                 Doc Salvage                                         Neuromancer
                     ECSC                                              Doc Jones
                  oleBuzzard                                            Line Tech
                Dark Tangent                                              Alaric
                   DEFCON                                            Short Circuit
                    Freaky                                               Mingle
                  Blackwave                                         The Goldfinger
             IrvineUnderground                                            E. Coli
              Consumertronics                                           Group 42
                    Wizguru                                               SWAT
                   Greyhawk                                           Trash-OOX
                    Spratt_                                          Doule-O-Jake
            The Underground Mac                                      Ender Wiggin
                   Bobeeve                                           TechnoHeap
                    German                                           GI Electronics
                    Big Dog                                         Briel Computers
                     Skippy
                     Avatar                           ....and a few ANONYMOUS people




                                         Inside this issue
 4 • Introduction                                      41 • Hacker I Phreaker BBS Stings
 5 - Letter from the editor                            44 - Dumpster Diving
 6 • Letters and Comments                              46 • Serious Salvage Part III
 12 • Cloak & Dagger                                   50 • The Timeline of the Mac Underground
 17· The Ear                                           52 • Caught in the Blacklisted Web
 26· Profiling                                         53 • Surplus Sources Part 3
 30 - Hackers and the Media                            54 • Mind Manipulation & Mind Control Part 2
 33 - The Black Market (Marketplace Classifieds)       58 • Monthly Meetings
 37 • The World of Vintage Computers                   59 • Subscription Information
 40 • Amlga Resources                                  59 • Back Issue Ordering




• _
-           .-           ., .   &wi .
                                                .~ '                 f   "    r   ··· ~   G_""- ~-""*"......
                                                                                      'C'"I~
                                                                                          .... ..
                                                                                            ";""..,
                              Additional information
  How to Contact us:                                  Letters:
  Blacklistedl 411 Magazine                           Blacklisted l 411 Letters
  P.O. Box 2506                                       P.O. Box 2506 , Cypress, CA 90630
  Cypress, CA 90630
                                                      Distribution:
  Subscriptions:                                      Blacklisted! 411 Distribution
  $20 U.S., $24 Canada, $35 Foreign                   P.O. Box 2506 , Cypress, CA 90630
  U.S. Funds only.
                                                      Advertising:
  Articles:                                           Blacklisted! 411 Advertising
  Blacklistedl 411 Articles                           P.O. Box 2506 , Cypress, CA 90630
  P.O. Box 2506, Cypress, CA 90630
  (Include name & address-we PA Y       '?'aroc/es)   Website:     http://www.blacklisted411.net
Blacklisted! 411 introduction for those ofyou who are new.....
Who we are... and were .. .                                          chief) , Zack Blackstone , fert it was time to revive the Blacklisted!
                                                                     411 concept, but this time do rt as a print magazine . It was
The question often arises on the subject of, "How did it all start?" extremely difficult to get started because the group was no more.
in reference to OUf rnaqazlne and irs history . In response to this He was the only one of the original group members remaining
popular question , here is a quick history lesson of Blacklisfed! that had an interest in bringing the hacker group and magazine
411 magazine , including names, dates and lillie known facts alive again. With some money, will to make rt happen, and with
which have , thus far , been hidden away for years ...               the help of some top of the line (at the time) computer gear and
Blacklisted 411 magazine dates back to October 1983 with a page layout software Blacklisted! 411 was reborn . Blacklisted!
                                                                     411 Volume 1, Issue 1 was released in January 1994.
group of friends from a Southern California high school that
                                                                     Blacklisted' 411 was finaliy BACK. The issues were released
shared a common interest We were all into OUf Atari computers ,
Commodore computers, electronics , sciences, arcade games, monthly and distribution was smali . After a year passed , rt was
                                                                     decided to try a quarterly format in an effort to increase
etc. We built projects, hacked into this n' that, came up with
                                                                     distribution . During that year lack managed to get in contact
grand ideas and tried to make them into some sort of reality. The
group started a monthly hackers "disk magazine " (an early form with many of the old group members and they are now active
of what is now known as an e-zine) called "Blacklisted 411, the staff members once again.
heckers monthll. This may sound strange today but circulating         In 1999, we published what was to be our last issue of
information on disk was the best way to get rt out without all the    Blacklisted! 411 (Volume 5, Issue 4) for many years to come.
cool toys of today. We didn't have the intemetto send rt out, and     We didn't know it at the time, but many pitfalls would ultimately
no one had printers that could print anything other than plain text   cause the demise of the magazine . After 4 years of regrouping
(and didn't even do that well). With a disk based system we           and planning , Blacklisted! 411 magazine is back in print form
could send text files, primitive graphics/pictures, and utilities     again. We are one of the oldest group of hackers still remaining
more easily and rt could be copied by anyone who had a                and releasing gathered and compiled information wrthin the
compatible computer . At our peak we distributed 150 disk copies      hacker community and the mainstream communrty as well. We
 of the disk maqazine, though there is no way to           still have the same hacker mentality and code of ethics from the
know how many were copied by others .                                 80's . Hackers are not thieves - they're curious people . We are
Eventually modems caught on and we began to distribute the            not elitist hackers by no means and no question is a stupid
monthiy via crude BBS systems. Using the power of a                   question . We're not going to knock you down, call you a "lamer"
Commodore 64, we put up a Blacklisted! 411 info site, which           "Iamah" or give you crap for being a newblel Every hacker
anyone could log into without handle or password. It was a            started somewhere . We remember this most fundamental fact
completely open message center. Using X-modem or Punter file          and we wili never forget rt
                                                                                                .
transfer protocols, you could download the latest Blacklisted! Wltat's Next..,
411 files or readlleave -messages· which later became known
as a "message base" and has evolved into what are now Community
commonly known as "newsgroup postings" or ''forum postings". Over the next few months a lot will be happening . We are
We had only one message center, no email capability & only 1 becoming more active in the Hacker Community . As we are
phone line. Primit;ve, indeed. Effective , however.                 based in the Los Angeles area, we are bUilding relationships
                                                                    with the local Hacker groups such as LA2600, SD26oo ,
Around 1984 we purchased a 9 pin dot matrix printer that could twentythreedotorg , Irvine Underground and more. We will be
 print basic graphics . We experimented with printing out attending and sponsoring Hacker Conventions and Conferences .
copies of the Blacklisted 411 monthly and copying them at the The first being the Layer One Convention, June 12-13, at the LA
media center at the high school. The media center staff Airport Westin. We will have a booth at this event where we will
graciously allowed us to make these copies free of charge which be selling subscriptions, current and back issues of the
was very cool at the time . We 'd pass these out at the local "copy rnaqazine, and other swag. We will also be having several
meets" (an interesting phenomenon of past times - hordes of "convention only" promotions so look tor us there .
computer users would meet at a predetermined location and
setup their computers wrth the sole purpose of copying software Magazine Development
and eXchanging this software with each other). We'd leave a pile A major effort is being made to increase our exposure to the
of our magazine copies anywhere we were allowed to do so. Hacking and Information Securrty Cornmunrty. Our distribution
One popular location was next to the Atari Gauntlet and Gauntlet goals are for the magaZine to break 100K copies distributed
II arcade games strategically located at 7-11's all over the place. each quarter sometime next year. Based on the demand, and
We're only guessing here, bU1 we think people photocopied our orders from distributors we are on the right path. We are seeking
copies and then those were photocopied , etc. There's no telling and hiring freelance wrrters, photographers, and editors to
just how many generations of early printouts of Blacklisted! 411 increase the quality and scope of the magazine . Additionally , we
monthly made rt out there .                                         have people who are actively trying to promote the magazine
                                                                    both inslde and outside of our close community .
Years went by and Blacklisted! 411 evolved. The short I~e-span
of the printouts was both a great success and a miserable Merchandising t SWAG
failure. No matter where we left them, they were taken - and We wish to have a whole series of Blacklisted! 411 themed swag
taken quicklyl The feedback was awesome in that people and merchandise . This indudes stickers, apparel, posters , and
wanted more . The interest was very high, but our inability to whatever else our creative minds can come up with. Input, help,
meet this growing demand was completely overlooked . We had and direct submissions for this will be accepted and appreciated .
to officially pUll the plug on the printout experiment and we stuck
with electronic files. It was really the easiest way to go . The Charities
Blacklisted! 411 info srte grew into a 2-line system. This was a Blecklisted! 411 is run by real people who care about other
 big deal in 1985. By that time , information was almost things aside from hacking. No, really. In the spirit of helping
exclusively passed around by modem (unofficially on paper) and people and organizations outside of our community , Blacklisted!
we were still releasing disks at this time.                         411 Magazine has officially donated to the local chapter of the
                                                                    Ronald McDonald House charity . After all, children are our
June of 1987 marked the end of Blacklisted! 411, the hackers future. Blacklisted! 411 Magazine wholeheartedly supports the
 monthly . Our last disk based rnaqazlne was distributed that Ronald McDonald House mission and their programs.
 month. Now that all of us were out of high school and onto Additionally, we've donated heavily to the Westminster Parish
college, work and the biggerlbetter things in life, nobody had the Festival, specifically wrth the intent to help support their youth
time or inclination to put any effort into the disk based magazine programs and special classes for the mentally and physically
anymore. The once thriving Blacklisted! 411 group broke up and handicapped .
 people went their separate ways. Naturally, we all assumed this
 was the end and Blacklisted! 411 would never come back in any If you have questions , comments , articles, ideas, flames, general
 form.                                                              -screw you guyz· messages or wish to offer support in some
                                                                    way, please contact us immediately and let's see what we can
 In the summer of 1993, one member (and the original editor-in- do. Thanks for your support , hackers!                        BL411

 4                                         Volume 6 Issue 3 • Summer 2004                                          Blacklistedl411
Letterfrom Zachary Blackstone, editor-in-chief, .••.
Welcome to another issue of Blacklisted I 411 Magazine .                Our website is online! No. really . We offer a store where
                                                                        subscriptions and back issues may be purchased. There 's a FAQ
We're now to our Summer 2004 issue and things seem to be                section which answers most of the common questions . We have an
running along somewhat smooth . We've had our share of obstacle s       "about us" section which gives a brief history of our outfit and our
to overcome since our return issue in the Winter 200312004, but         plans for the future . The site also has a contact form for submission
we're plugging along and things just keep getting better. Our           of articles and questions. Check out our website at the following
distribution numbers are growing at an incredible rate which is a       URL:
good thing as long as we can meet the challenge. Fortunately, we
can. If not already, you 'll soon be able to find Blacklisted! 411 in   www.blackli sted411.net
the same places as before plus an entirely new group of location s
we never managed to get a grasp on previously .                      Since we're pretty much the only wide distribution hacker
                                                                     magazine in the world which offers display advertising, we've
With our comeback issue, Volume 6, Issue 1. distributi on was received quite a bit of feedback and requests from prospective
large, but somewhat confined which made location of the magazine advertisers since our comeback issue. In trying to accommodate
difficult in various areas in the U.S. with some stores carrying the majority of these requests, we're going to start offering inside
dozens of copies while others having none to speak of. The Spring cover (both inside front cover and inside back cover) ad space IN
release . while much higher in distribution numbers, appears to have COLOR If interested, get your ad-space requests in ASAP
suffered some of the same issues due to a sporadic distribution because once the space is spoken for, you may have to wait.
network . Our Summer release should mark the end of any
questionable distribution chain and begin with an even distribution Shouts for this issue go out to:
among the stores who carry our title.
                                                                     Vince Briel (of Briel Computers) - Awesome job on the Apple I
It's been three issues now and a lot has been going on for all of us replica, man. We all love what you're doing. Can't wait to get
over here at Blacklistedl 411. We're all excited about the recent mine!!
developments, namely in distribution numbers and the string of
writers we 've picked up. If you're a writer (or interested in Ole Buzzard - been looking for you. Where are you? If anyone
becoming one) and you have a knack for the hacker mindset or knows where he is, can you let him know we're looking for him?
lifestyle, send in your material. We're still looking for good
material from anyone who has the time and inspiration to write.      Spratt_ (ofUndergroundMac.com) - Excellent work on the website!
                                                                     Thanks a billion.
If you're an artist, have samples and would like to make some
money, get in touch with us. We're still looking for people to fill Ender Wiggen - Glad to see you around again . Hope to see new
the gap when it comes to artwork. We'll consider freehand artwork material from you soonll!
as well as computer graphics art. We'd like to keep the magazine
fresh for everyone.                                                  ... .and, of course, the usual gang: Freaky, blackwave, Dark
                                                                     Tangent, Doc Jones, Goldfinger, Big Dog, TechnoHeap, WizGuru ,
Don't forget that we have some hacker conventions coming up real etc. .. Thank you SO much for all the help and referrals. Without
soon. This is probably the best way for hackers in different regions you guys rounding people up for us and providing great material ,
to meet each other face to face and have a good time . In fact, work would be much harder. Thanks again .
they're somewhat reminiscent of the BBS user meets of the early
 80's through the mid 90's. If you were around to witness those, I also have to mention that a large nwnber of people who are too
 imagine something much bigger and a whole lot better organized many to list have been stepping up and offering help in just about
and you have yourselfa hacker convention.                            every area of the magazine - a big THANK YOU to all of you I

LayerOne will be in Los Angeles, CA June 12th and 13th at the Los     So many contacts from hackers all over the world every day has
Angeles Airport Westin.                                               been keeping us on our toes . Love it, so keep it up. Some of you
                                                                      surprised us with your great ideas and we look forward to making
Defcon will be in Las Vegas July 31st through August 1st at the use of those ideas . If you have some crazy, unusual or fresh idea
Alexis Park Hotel & Resort.                                           you think we can use to benefit the magazine and hacker
                                                                      community, please contact us.
Both will be worth your time, so go!
                                                                      We have a lot of comedians out there. too. Namely. the untold
We're already gearing up for both of these conventions, so expect number of people asking, "How do I make a redbox?" It's been an
to see us there with convention specials you won't find anywhere ongoing joke for years and I'm both surprised and glad people still
else.                                                                 remember the comedy surrounding the topic . Thanks for the laugh.
                                                                      people .
To find out more about the conventions, go to the following URU:
                                                                      In closing, if you want to get in touch with us for any reason, do it.
www .layerone.info
 www.defcon.org                                                       BlIlckJist.dl 411 Magazin.




I
                                                                      P.O. Bax 2506
 I know I mentioned it in the last issue, but the name of the game is Cypress, CA 90630
 referrals. So, in keeping with the idea, here's another mention.                                                                   -Editor

~.-    ... £-=-=- ••::II:Jr..Ill=-=-=--=-=-=--.I .-.-• • _.-=--_____=-==
     Notes ofinterest:                                                                                                                      ,

, -W'·"__ "_""_"'_"P_"._·_~_·. _des......,··__                                                                                              ~
     - We currently have aU of Volume 1 back issues ayailable at this time.

                             _
     - Volume 5, Issue 3 and Volume 5, Issue 4 is stillayailable in very limited quantity,

     - Deadline on aU articles.letten, ntwork and ads for vetume 6, Issue 4 is August 2bt, 2004.
     - ALL classified ads are now FREE and are limited to space cODstraints per issue. Fint come, fint served,


                              ____
     - We're a PAYING MARKET for articles we use! We payS25-S600 depending on size, quality & use ofphotoL

I.L"~.~ I £ I I : I I . . . .
Blacklistedl411 Volume 6 Issue 3 • Summer 2004
                                                                        --=.:=--.-. ..........                                     ~
                                                                                                                                            5
Letters and comments/rom our readers.••••
Blacklisted l 411 ,                                                Blacklistedl 411 ,

Hello Guys . I've been a die hard reader of your magazine          Welcome back from the dead . I've been meaning to ask you
since the earty days . I'm glad to see you back after your         about Tempest and wanted to know Wyou could give me a
short absence . You have no idea how much myseW and                brief run down and any useful information on the topic .
everyone else in the scene have missed you. The color              Thanks guys.
cover is a nice touch, tool I was wondering Wyou had a good                                                     Hard Sector
ANAC for the Riverside, CA area (SBC - 909)? I need one                                                      Pittsburgh, PA
fast. I tried 111 and 114 from the hack FAQ, but no luck cuz                                                Routed: Internet
they suck. You guys always seem to be on top of updated
info, so hurry up already.                                         Greetings Hard Sector. If you 're asking abouf the areade
                                                  Skyfox88         game ·Tempes!" ... ..if was a vector graphics game made by
                                             Mira Loma, CA         Atari in 1980. It's one of the most collected games of all time,
                                            Routed: Internet       in fact. Pretty cool game. I'm going to bet you're asking
                                                                   about the ·other" TEMPEST, however. TEMPEST stands for
Hey Skyfo x, we can help you out . You happen to be in our         Transient Electromagnetic Pulse Surveillance. Electronic
neck of the woods, so we 're right on top of it. And the           equipment emits electromagnetic interference into their
answer is: 959 -1122. I just double checked and the ANAC           surroundings. These emissions can be intercepted and
worics fine. Give it a shot. Hope that helps .                     deciphered using special monitoring equipment up to a mile
                                                                   or so away . Oh yes. This can be prevented by properly
                                                                   shielding the electronic equipment to eliminate the emissions.
Blacklistedl 411 ,                                                 However, I'd like to note that it 's illegal in the U.S. for any
                                                                   civilian to possess or use Tempest equipment. To find out
Hey guys , good to see you back. So, uh, how do I make a           more about this topic, please read the Tempest article in this
red box? Just kidding. Yuk ..yuk.. Anyhow I'm building             issue of Blacklisted! 411 . Interesting stuff.
 project for use with the telephone system . It's
going to be a call diverter, but much more sophisticated. So,
I'll require some information I hope you can help me out with.     Blacklisted l411 ,
I know this is available on the intemet, but I want the final
word from you before I dive in. I need to know the                 This is the first time I have ever seen or read your magazine.
frequencies for the following so I can make my box top notch:      I found the latest issue at my local newsstand. The name
dial tone , ring tone and busy tone . Hope you can help. I'm       caught my eye. I have to say that this little magazine is
also in need of a speech chip like the digilalker or something     probably the best piece of gold I've ever bought from my
similar. Do you know where I can get them?                         newsstand . I've never considered myseW a hacker and
                                                                   always thought that hackers (before now) were supposed to
                                                      Frigid       be the equivalent of cyber-crim inals or what have you. The
                                                 Pueblo, CO        media really had ME going all this time with their
                                      Routed: U.S. Snail Mall      misinformation. I had no idea a hacker · community" existed
                                                                   in any capacity until I picked up your magazine. What I take
Frigid, this is an easy one. I was hoping for something a little   from tt is that hackers are mostly technology enthus iasts, to
more difficult, especially coming from you. Ok, so here we         put in into simple terms . I can easily understand this and
go. Dial tone: 350HZ/440Hz, ring tone: 440HZ/480Hz , busy          relate on some level.
tone: 48OHzI620Hz (half sec duty cycle) .         As for the
Digita/ker, a couple of years back I would have suggested          I'm really exclted about what you're doing and what you
Jameco because they had a huge stock of them. However,             stand for . Yes , as a new reader having absolutely no bias
they often dump off their slow-selling items as they did with      towards hacking , I completely understand your position and tt
this particular item . So, why donY you try G.I. Electronics       makes a lot of sense to me. I'm inclined to become involved
(www .gielectronics.com) . Just checked with them and they         on some level, Wonly being a steady reader . Maybe I could
have them in stock along with all the support chips . In fact,     be a closet-hacker or the like. Who knows . Count me in,
they have a really large selection of older speech chips. In       anyway .
case you decide to alter your design. Anyhow, we can't wait
to see your new creation. Keep us in the know. For anyone  The article on War Driving was extremely interesting to me
who doesn': remember Frigid, he 's the one that made the   and really opened up my eyes about how open wireless
clifHJn tone grabber with speech output. Nice stuff!       home networks are. Sure enough , I found no less than three
                                                           open networks in my own neighborhood, walking around wtth
                                                           my laptop. Wow l I also found the Hidden Sounds article
Blacklistedl 411,                                          somewhat enlightening as with the Women Hackers article.
                                                           I'm really floored about all the information I was htt with and
Yol Dudez. I keep hearing about ANAC 's all the time and I irs all excellent material. I'm not really one to hold onto past
know it's a stupid question , but WTF are ANAC 's? YKWIM? issues of magazines , but you can count on me never letting
How can I use them and what willi gain from their use?     go of this onel

                                                South3m One In addition, I'd like to commend you on your unconventional
                                                  Orlando, FL altitude and handling of your readers comments. I'm greaUy
                                              Routed: Internet affected by your magazine. From the look all the way down
                                                               to the words . Excellent.
Yeah, we know what you mean. ANAC stands for ·A utomatic
Number Announcement Circuit" . I bet you 're thinking, ·yeah, I'm a child of the Nintendo age and used to play around with
so what the heck does that moen ?" 1'1/ tell you. An ANAC is electronics when I was in high school. I even took the
a number (Anywhere from 3 to 10 digits in length) you can electron ics classes offered there. It was sort of "the thing· at
dial directly from your phone end once you do this the the time and I went along for the ride because I thought it
number you dialed from is repeated (or ennounced) back to was an easy class . I quickly found that the class was actually
you (with a voice) . This is really useful if you're digging dfficult for me, yet I was drawn in. Everything about tt was
through a panel with dozens of phone lines and you need to interesting to me, but I never went anywhere with tt once I
identify a single (or multiple) wire pair(s).                  was out of high school. Since then , I've toyed with the idea
 6                                      Volume 6 Issue 3 • Summer 2004                                      Blackllstedl411
of getting into electronics, but never had any reason to until BlacklistedI 411 ,
now.
                                                                    New reader, happy to see you in print. I have a quick
I don't know why exactly, but I'm somewhat compelled to get         question for you. I have some old 46149Mhz cordless phones
back into electronics after reading your magazine. I'm              and I need an idea of the possible frequencies these un~s
definitely going to investigate some of these topics a lillie bit   cover, unmodified . Can you help me with this? I know ~'s
more and try my hand el building something. Thanks for the          like really old tech, but you seem to have ~ together . Thenks
push. I desperately needed ~.                                       in advance.

I would like to offer this leller as a testament of your success                                                Rlght.()n
in gelling the word out and explaining yourselves. I'm qu~e                                                     Allen, TX
impressed with your well-worded articles, the clean look of                                              Routed: Internet
your magazine and what you're all about. I'd like to join up
and consider myseW a hacker, at heart at least. Thank you Sure we can help.              Wa have tons of information on
for the good read and keep lt up.                                f/&quane/es filed away.    In your case, here's the full
                                                                 f/&quency list for the older first and second generation
                                                         JakaG. 46149Mhz cordless phones:
                                                    Burbank,CA
                                               Routed: Internet
                                                                     CH                                   Handset
Welcome aboard, Jaka. It looks like we've done our job .                1              48.760                   49.460
We're always happy to see someone new getting excited                   2              48.840                   49.500
about hacking and understanding the whole concept of what
we're about end what we're not about more importantly. It's             3              48.860                   49 .670
a big plus when we can take credit for bringing in new blood,           4              48 .920                  49.845
so to speak. Each and every "newbie " who joins in the                  5              49.020                   49.860
hacker ideal brings with him (or her) e wide a1l'!ly of talents
and ideas to maintain and further explore the concept of                6              49.080                   49 .770
hacking. Even if the newbie has no idea how to hack or what             7              49.100                   49.875
aspect of hacking they're interested in most, we completely
                                                                        8              49 .160                  49.830
support their curiosity and offer our guidence whenever
possible .                                                              9              49 .200                  49.890
                                                                        10             49.240                     49 .930
You said it, man. The media has everyone psyched into
thinking hackers are criminals. As you figlJred out with a little       11              49.260                    49.990
direclion, hackers a'" not crimine/s . Nol by any means. End            12              49.360                    49 .970
of story . Curiosity really scares people. Particularly, when           13
they donY understend what they're seeing end      a'" constantly
                                                                                        49.400
told the same thing over and over agein.                          Please note that channels 16-25 used to be channels 1-10
                                                                  years ago before additional channels were added in. Hope
We think it's a great idea to get back into electronics. It's the this information helps you out.
foundetion of most hackers today . So many of us grew up in
the Atari age or the Nintendo age, playing with electronics
and/or computers end eventuelly moved into technology Blacklisted! 411 ,
",/ated fields later in life. It's the hacker mentality which
makes tadays tachnology viable and interesting .                  I think ~'s cool you guys are back. I'm totally into arcade
                                                                  games now and ~'s all because of you guys . I found out how
Thenk you for the kind words on our magazine and the to get them cheap and even learned quite a M on how to
articles contained within. We eppreciate it. "you ever have repair them. I never knew you could go out and buy these
any questions or need any direction , please feel free to let us things until I read about it in your magazine. Thanks . My
know. As always, we're thrilled to help anyone in need. wife thanks you too (sarcasm - heh heh) Anyhow, on to why
Again , welcome to the hacking scene , Jeke . It's nice to have I'm writing you. I've been looking everywhere for a book
you with us.                                                      which covers older RAM, ROM, PROM and EPROM memory
                                                                  devices, with Cross reference information and pinouts. I've
                                                                  asked EVERYONE else and nobody seems to know if such a
Blacklisted! 411,                                                 book even exists, let alone how to direct me. I know you can
                                                                  help, don't let me down.
I just picked up a copy of your magazine and love~! I
checked out your s~e and read a lillie b~ about you guys                                                                  Scott D.
while I was there. I'm very impressed with the whole                                                                San Dimas, CA
package, guys. You all seem to be so far ahead of the game                                                        Routed: Internet
already. I'm really impressed with your eagerness to help
new recruits and believe this will set you very far above the You're in luck . You need the following book:
rest. This is a difficull tra~ to find with old school hackers
anymore. They seem to be rude, too busy or completely out Up to Date Memory Data & Comparison Tables
of the scene. Good job, Blacklisted! 411. I've been dealing ISBN: 981-214-266-7
with this 'elite " crap far too long and I'm sick ot lt, I'm so by Tech Publications Limited.
damn glad you're around now. I'm going to fly under the 10, Jalan Boser, #81-39 Sim lim Tower, Singapore 0820
Blacklistedl banner from now on as I truly believe in your Tel: 2914595
philosophy and ideals. I don't have any questions , just Fax : 2991550
wanted to greet you and let you know I'm with yal Feel free
to print this if you want. Lars                                    This little book will thrill you to death. Trust me on this one.
                                                      ZerO ZerO Bursting with tons of cross reference data, this book is simply
                                              Los Angeles, CA a MUST GET, hands down . This book covers , static rem,
                                               Routed: Internet bipolar ram, cache addrass compatitors, dynamic ram , prom , /
                                                                  ",gister prom, eprom, eeprom, video ram , serial ram , ram
 Thanks for the greets ZerO ZerO. It's always nice to hear modules, etc .                Awesome book!          I have no other
from a supporter of the cause.                                    recommendations on this topic as the above book sets the

Blacklisted I 411                         Volume 6 Issue 3 • Summer 2004                                                        7
standard. If you're smarl, you'll get   two of them and keep             replacing old pay phone equipment which have this
one in a safe place . Enjoy .                                            fatal loophole with new machines which will not allow
                                                                         Red Boxes to fool them.

Blacklistedl 411,                                                You can get the inslnJctions anywhere. The intemet, 2600,
                                                                 back issues of Blacklisted! 411, THUD magazine , etc. But I
I've just picked up my fourth issue of Blacklisted and ~'s great will answer this question with a super quick response . Buy a
one of the best mags I've read yel. Anyway I have some Radio Shack progremmable memory dialer. Take it aparl.
questions for you guys . I hope you guys wont think they're Replace the crystal inside with a 6.5536 MHz (or 6.50MHz,
dumb or stupid but I'm just gelling started in hacking , dapending on what school of thought you subscribe to). Put
phreaking etc...                                                 back together. Progrem one memory with five statS (the •
                                                                 key). This is your red box . Cheap, doasnl worlc that great
1) In the April issue of 98 you've got the kool pmures and I because tolerences are way off, but it's a Red Box. Use of
would like to know what that phone thing is the telephone this is illegal and should not be done, of COUfSB. Also, buy
repair guys carry M also in the pile with all that other stuff . beck issues of Blacklistedl 411 and read up on this.

2) Where can I gel lt,                                             5.    Crystals. An electronic component which is used in
                                                                         oscillator circuits to create frequencies of specific
3) Whafs the deal with frequencies and scanners?                         value.

4) Whafs a red box and can you send me some instructions 6.              The thing in Tenninator II you speak of is a small
on how to build ~ or tell me were I can get instructiuons.               Apple computer attached to some wires and a card.
                                                                         It's a fantasy device which will not work in the fashion
5) Also whafs with crystals?                                             they porlray in the movie . But it sure looks cool . Then
                                                                         again, I recall an ad. in one of the other hacker mags
6) Last question. In Tenninator 2 Judgement Day what was                 or hacker catalogs that describe the device ·a la
that thing he put into the money machine and where can I                 Terminator 2· or something like that. Still, I cannot see
find it,                                                                 any way the device can do as it is porlrayed.

P.S. I really appreciate all your help and thanks for taking the
time to reed this. I'll deflently be subscribing .                 Blacklisted 411,

                                                   J. Conley Nice to see you guys back again. The Mac Spoofing article
                                                 Whiting, IN you guys did way .back in 1998 is what got me hooked on
                                    Routed> U.S. Snail Mall your magazine but you weren't around much longer after
                                                             thel.    That's ok, Clap happens and now you're back.
Welcorne newbie . Let's answer your questions by the Speaking of which, I about Clapped my pants when I saw
numbelS .                                                    Volume 6, I"ue 1 s~ng on the she~ of the magazine rack.
                                                             Naturally , I had to grab it, knocking someone out of the way
1.    I'm not sure which phone thing you are referring to. to get to~. ;. )
      There a18 two obvious phone items in the picture you
      mention . On the top leff of the picture is a Harris I took the time to check out your website-1l00d jobl I'm
      Model TS22 Unemans Testset and on the top right is impressed with your comeback. You seem to have ~ all tied
      a Progressive Electronics Model 100A Tone up and everything back together again . I've been dabbling in
      Genemtor.                                              electronics for the last f_ years and have made a lot of
                                                             headway so far. I want to further this experience and hope
2.    If you want either of these. try one of the following you can help. Will you be offering any build projects or any
      companies (ask them for a catalog, at least)           pointers on manufacturing circu~ boards, soldering , etc?
                                                             Hope you guys are around for the long haul . Missed you.
              Jensen Tools
              (800)426-1194                                                                                        A.zacks
              http://www.jensentools.com                                                                     Tampa Bay, FL
                                                                                                     Routed: U.S. Snail Mall
              Parls Express
              (800)338-<1531                                 Thanks for the welcome beck . It was a long time coming, but
              http://www.parls-express.com                   we're beck and plan to stick around. We're also planning on
                                                             having some projects in an upcoming issue, so stay tuned.
              Contact East                                   Congmts on getting into electronics. It 's fun stuff.
              (800)225-5370
              http://www.contacteast.com
                                                             Blacklistedl 411 ,
              MCM Electronics
              (800)543-4330                                   I'm a new reader of your magazine. I picked up a copy at the
              http://www.mcme/ectronics.com                  TRW swapmeet and now I'm glad I did. I had no idea what I
                                                              had picked up at the time until I got home and flipped through
3.    Frequencies are useful to hackers in many ways . the pages . I'm astonished as to what I've been missing out
       Wireless units opemte on cerlain frequencies. on all these years . I'm a hard core electronics enthusiast
      Scanners allow anyone to monitor those frequencies. ~ a considerable background in computer technology. I
      I'm sure you can see why and how that is imporlant.     must have been living in a plastic bubble because I had no
                                                              idea about the hacker subculture . From what I've read , I'm
4.    Red Box. I knew this one was coming . (smile) A Red very fascinated with your take on the hacking world and what
      Box is e device the one can use to defraud the phone ifs all about. The similarities to the electronics "groups· of
      company by fooling a pay phone into believing coins the 80's are obvious if not related directiy.
      have been insetted when in fact only some tones were
      produced and directed into the mouthpiece of the I'm amazed by the information you've presented and would
      payphone. Red Boxes do not seem to worlc as offen like to comment on some d the material. I like your style, the
       as they used to. The phone companies are getting articles themselves and your somewhat light hearted
       wise in their old age - somewhat, anyhow - and they'm approach.       I feel that you're providing a clean, open

 8                                      Volume 6 Issue 3 - Summer 2004                                     Blackllstedl 411
environment for people to offer their ideas and exchange         Unless you specify the exact model of the equipment you
information with each other. I can see what target group of      need a manual for, you 're going to have trouble finding it. Be
readers you're trying to appeal to and I think you're doing a    sure to provide this information to whomever you ask.
great job ot it, Hell, I've never been interested in hacking, butPhotocopies are available on the older "obsolete" models if
here I am now after reading a copy of your magazine. That        you look around in the newgroups. If you don't mind PDF's ,
has to say something.                                            try bitsavers.org . This is a cool site with information on
                                                                 obsolete equipment, computers and electronics. Specifically,
I'd like to see more projects or how-to's in your magazine. I you will need to go to:
think ~ would be an asset for the serious hackers who want to
dig in a little more. Being so far into in electronics as I am, http://bitsavers.orglpdf/dataIO/
I'm interested in constructing some equipment which can be
used for hacking in 'some way and then sharing those ideas They have PDF scans of System 19 and 29B units as well as
and plans with others.                                           the Unipak, Unipak2 and Unipak2B . Good luck and let us
                                                                 know if we can find something else for you .
I've found over the years that the number of electronics
enthusiasts have dwindled and our ranks are nearty beat
down to make way for the disposable-tech .                   I'm Blacklisted l 411 ,
unquestionably enthused to have found your I~e magazine
and hope to exchange information with you and your other I'm need some help guys. I've been interested in finding
readers. I think what you're doing is very inspirational. more surplus electronics I can purchase for low prices. Most
Expect to hear more from me later. Thanks for the good of the electronics stores around my area are e~her gone or
read.                                                            have slimmed down their product line to the point where they
                                                                 are no longer useful to me. Can you guide me? Thanx.
                                                     George H.
                                                Northridge, CA                                                        Lord 50th
                                               Routed: Internet                                                   San Diego, CA
                                                                                                               Routed: Internet
Welcome to the party, George . Our comeback and the
subsequent response has been nothing less than Sure we can help you on this one .                          First , check out the
phenomenal . We're gled you took the time to maka your Serious Salvage Part If article on page 46 of this issue and
presence known and offer your comments. Wa're interested the first part in the last issue . They're both great sources for
in offering more how-to 's and project articles sometime soon . parts. Also check out the Surplus Sources article in the last
We realize that the hardcore hackers and hardcore electronic issue on page 40 and 55 of this issue. There are a lot of
enthusiasts have just about everything in common. Thanks great sources listed there. Last, you have to visit the
for the kind words and your thoughts. 'We look forward to following place because they 're so close to you :
hearing from you again .
                                                                 Califomia Electronic & Industrial Supply
                                                                 221 N. Johnson
Blacklistedl 411,                                                EI Cajon , CA 92020
                                                                 Tel: (619)588-5599
You guys always seem to know where to find everything, no Fax : (619)588-0371
matter how old or strange that ttem may be. I'm looking for Toll Free (866)CAL-ELEC
something I bet you can find for me. I am in need of a few URL: www.califomiaeleclronic.com
manuals for some Data 10 programmers. You're always Ebay ID: calelectron
talking about them, so I figured you'd know where to find
them.                                                             They sell on ebay, have a nice big place full of surplus
                                                                 electronics and they will deal. If they have something you
                                                          Sarge want, start negotiations off at 10% of their asking price and
                                                Buriington, VT work your way up . We've been buying stuff from this place
                                               Routed : Internet since before we started up Blacklisted! 411 . They've been
                                                                 around a long time and they 're probably going to stay around
Ah, this is an easy one. First, you have to check eBay . even longer.
Thafs a no brainer. If you can 't find it there, check these
places :
                                                                 Blacklisted l411 ,
Manuals Plus, 100's of thousands of manuals, (801) 882-
 7188.                                                           Congratulations on your return. Not so much of a question
                                                                 letter but more of a series of comments and suggestions .
Ed Matsuda , HP & Tek, good quality, fast delivery , great
prices , (619) 479-0225.                                         Someone asked about a Z-BO emulator to use for diagnostics
                                                                 some time back. I know it's old news, but I thought ~ WCluld
 Manual Merchant,       (619) 490-9076, FAX 490-9075, be nice to follow up on the subject and offer an alternative to
linda...p@ix.netcom.com.                                         the equipment you suggested. Applied Microsystems made
                                                                 the EM-1BOI1BOB Diagnostic Emulator for the Z-BO ~'s a  .
 Susan, HP, Tek, Fluke, about 10,000 manuals , (800) 435- great lillie device and ~'s not very expensive in the surplus
 1516 .                                                          circles . It's even somewhat cheap on ebay as well. Check it
                                                                 out.
Bob Garcia, Tek & Racal, about $35 each, (770) 977-5701 .
                                                                 The hacking scene has changed a lot while you guys were on
Bob Lee, Tek, (503) 774-6560.                                    hiatus. Namely , the internet has grown, allowing all of us to
                                                                 get together and congregate much easier . We all have our
Deana Kidd, Tek, (503) 625-7363.                                 regular online haunts , usually in the form of hacking forums
                                                                 and local hacker meets. There's also a lot of new blood in
Art May, Military connections, (503) 632-6973.                   the hacking scene as well. Under your original discipline of
                                                                 bringing in "noobs", we now have a huge following of people
 Tektronix (800) 428-2200.                                       who may not yet be hackers, but want to become hackers.
                                                                 You guys did a great job of getting the ball rolling on this
 Wavetek (800)622 -5515 .                                        subject with a resu~ing legion of technical dudes ready to act.

Blacklistedl411                           Volume 6 Issue 3 • Summer 2004                                                     9
.11

.
Entrapment, 1999 113min                                     keeping a constant record of your physical location . While
                                                            it's true that there are versions of this device which do exactly
Weird Science, 1985 94min                                   that, the bracelet used in Riverside countly is not the same
                                                            unit. It's a much more simple unit which only transmits a
Enemy of the State, 1998      131min    (touchas on hacking frequency which "announces" it's presence to make sure the
topics)                                                     subject is within the range of the receiving box .

The LawnmowerMan, 1992 107min                             The box has three lights on it to indicate phone , range and
                                                          power. When the box is receiving a call or calling out to
Johnny Mnemonic, 1995 103min                              report (usually when the subjec1 retums after being out of
                                                          range for some time), the phone light will /lash. When the
Electric Dreams, 1984 95min                               subjec1 begins to exceed the range of the receiving box, the
                                                          range light will begin to /lash. Once the subject has been out
Hot Millions, 1968 106min (this one is probably the first of range long enough (time varies), the range light will tum
hollywood hacker-type movie ever made)                    off. The power light is pretty obvious. The receiving box has
                                                          a battery backup in case there is a power outage which will
Takedown, 2000 92min                                      keep the unit running for up to 48 hours.

Independence Dey, 1996        153min    (touches on hacking       Let's talk about range . The manufacturer claims the unit has
topics)                                                           a range of approximately 300 ft. In the real world, it's more
                                                                  like 100ft. Frequency: They operate in the 300Mhz band.
Pirates of Silicon Valley, 1999 95min                             We need an actual unit to get the specific frequency for you.

Anyhow, this is all I can come up with off the top of my head.    Extra phone services. Caller ID: they don1 want you to have
All are great movies in their own right. Each has their           caller ID so you won1 know the monitoring phone numbers
strengths and obvious technical weaknesses. Keep an open          that occasionally call back and exchange information with the
mind and of the era these we", made when watching them. I         unit. Answering machines and fax machines - they don 't
would recommend each and every one of these movies if             want any device on the line which can answer incoming
only for entertainment value alone.                               calls - this could interfere with the receiving box. Same
                                                                  pretty much goes with three way, call waiting, etc.
                                                                  Incidentally, the Sentinel monitoring phone number (the
Blacklistedl 411,                                                 number that calls the boxes) is (949)45:J-8178.

I've always enjoyed your magazine and THUD. I'm glad to           Apparently, the bracelets are fairly dumb devices and their
see you back alter all these years. I figured you were down       only job is to constantly transmit a frequency to allow the
and out for good alter Y2K had come and gone...another one        receiving box to "know" you 're within proximity. Because of
bites the dust. And now you're backll You were right on the       this, if you have a buddy on the same program , you could
money with your suggestions and comments on the Y2K               theoretically stay at his place overnight and he at yours
SUbject back in 1999 and you ended up saving myself and           ovemight and the monitoring people would never suspect any
the company I work for a tremendoue amount of money. I            wrongdoing .      This would defeat the purpose of the
just thought it would only be right to let you know how useful    supervised electronic confinement program , thus put you in a
and appreciated the information you provide ",ally is.            bad position if caught.
Thanks guys. I'll keep reading and tell all my friends you'",
back.                                                     The brecelets, about the size of a small pager, must be in
                                                          contact with the skin of the SUbject at all times. If it's pulled
                                                  Rodney P28
                                                   Raleigh, NC
                                                          away from the skin, it triggers an intemal tamper device,
                                                          which in tum alerts the monitoring company that you\le
                                               Routed: Internet
                                                          "removed" the device from your person . In addition, the
We aim to please. We're ell glad we could be of so much rubber band of the device is reinforced with metal wires.
help to you and your company. If you need any tips on any Naturally , cutting through this triggers the tamper switch as
subject in the future, let us know.                       well. It has an intemal battery which is reported to keep the
                                                          unit operating for 12 months.

Blacklistedl 411,                                                 This was an interesting question. If any readers have further
                                                                  information on the topic, please forward it to us.
I'm writing to ask you for information about the SEC program
in Ontario, California. I know someone with a "ghetto pager"
and wanted to know if you could provide ANY insight on the        Blacklistedl411 ,
device; it's real-world range, frequency , operation, phone
numbers, etc. Any information on why they won't allow you         Really good to see you guys back again. This is from a long-
to have extra service on the phone line that the box is           time reader. Are you ever going to have the summertime
connected to? I can understand no answering machine, but          beach meets and hosted meets with the equipment give-a-
why no caller 10, etc? Last, why can't you have someone           ways that you used to have Way back in the early 90's?
else who is on the program in your home?
                                                  Tech Angle                                                Roasted Toasted
                                                  Ontario, CA                                               Los Alamitos, CA
                                       Routed: U.S, Snail Mall                                         Routed: U.S, Snail Mall

Greetings Tech Angle. The SEC program is actually referred
                                                         Hey Roastyl It's been a long time. We hadn 't considered
to as the "SE CP." in Riverside country and run by the   hosting anymore meets, but we'll think about it. Those beach
Sheriff's Dept. out of Banning, CA. Their exact address is
                                                         meets were outrageous l When we upped the distro back in
1627 S. Hargrave St., Banning, CA 92220. The device you  1995, we officially ended the beach meets and hosted meets .
speak of is an "ankle bracelet" and accompanying receiving
                                                         Perhaps, alter we've been back long enough, we'll host some
box (called HomeGuard 200) made by Bllncorporated (www.  meets on a trial basis to see how they work out Naturally, if
bi.oom) and monitored by Sentinel, a company based out ofwe did such a thing, we'd still have them in Huntington
Irvina, CA.                                              Beach. Anyone else out there interested in us doing
                                                         something like this? Until next issue, keep hacking and don't
Many people think the bracelet is a GPS unit, capable of forget to take notes .

Blacklistedl411                         Volume 6 Issue 3 • Summer 2004                                                      11
                                                        by The Goldfinger


Man. do you guys remember back in the 80's when everything was cool ? Well , maybe not everything, but I am nostalgic right about now
for that movie called Cloak & Dagger.

It came out in 1984 and starred the little kid from ET, Henry Thomas, and Dabney Coleman, who played his pops and also his imaginary
friend, Jack Flack . 'That movie was cool.

I was just a kid but I remember wanting to have adventures like that and wishing I could end up in the middle of some drama,just like
that kid. That movie did have a lasting impression on me because later I learned about real spies, and agencies like the CIA from other
movies .

The only problem was, I didn't see how anyone could possibly get into that line of work .

Nobody] knew , knew how ...and it wasn't really anything that your teachers knew anything about either. So, it was relegated to being a
fantasy , and then later, in high school, I was able to "role-play" those fantasies with such RPG 's as Ninjas & Superspies or Steve
Jackson's G.U.R.P.S.

That's (generic universal role playing system) for the un-initiated.

Yes, I had some nerd-like tendencies in h.s., I will admit that. Role playing games were not exactly what the "cool" kids were doing on
Friday night, but then, I wouldn 't trade those times for anything. I had some good friends, some good times, and playing RPG's
stimulated my imagination to the Nth degree, and as a result of that, I'm still benefiting from those experiences today. Let me also say that
RPG 's were fun for me; back then, I don't play them now and wouldn't No time , or inclination.

RPG 's areJwere cool, but like anything. they should be used in moderation. And not as a substitute for a social life! This goes out to all
the role-playing nerds out there today; Get out a/your parents basement,put away your +5 sword, and get out and try to meet some girls!

Take it from the Goldfioger yo, I know what I'm talkin ' about . Once h.s. gets away, you can 't ever, and I mean, never get it back. Then
you might be left with some regrets, and that 's the worst. I didn 't become the superfly ind ividual I am today until I was in my early
twenties and that's no lie.

But I digres s, were talkin ' ahout Spies and real life cloak & dagger type stuff here . Anyone who doesn't believe that there are real spies
and that intelligence agencies allover the world spend billions of dollars to spy on other countries, foreign industries and corporations
needs to check themselves. The spy business is big business.

One of the things I'm gonna do for ya in this article is show you how to apply to real spy agencies like the CIA, FBI, DIA, and the NSA
so you can realize those dreams if that's your steelo.(what your into). Were also gonna look at some cool ass spy gear and gadgets, as well
as learn some real life techniques and tactics that you can use to your advantage, in a spy vs . spy or counter-surveillance capacity.

A good place to start to get a well-rounded education in the Spy game is Tech TV's show called 'S py School: Sccret World of Crime,
Iotrigue, SurveiUaDee aod Gadgetry' which premieres every Friday at 8:30pm eastern. Check the website for tv schedules, etc . www .
techtv .com

The show hits on just about everything you could ever want to know about the spy game, from surveillance to seduction, from blackmail
to brainwashing, its all there . This program is full of cool features, spy challenges, how-to guides, and reconstructions. Many of the
world's elite spy organizations secrets are revealed. Fifteen half-hour episodes come from a safe house in an undisclosed part of Britain
where two students receive a crash course in espionage taught by controversial fonner British Intelligence officer David Shayler. Special
challenges are the backbone of each show . Rookie spies are put into real-life situations to see how they cope after they've received an
initial briefing. I'd rather go on that show than Fear Factor anyday!

Sample episode titles Include:...(excerpts from the site) Interrogation and Torture Our two spies are briefed on surviving interrogation
and torture scenarios and then put in those exact situations.

The Honeytrap Our female spy faces a challenge that involves investigating club-goers a la Mata Hari, shot with a lipstick camera.

Getaway Driving Our spies are trained in evasive driving.

Coocealment and Disguise Operating incognito is an essential espionage skill. Here the spies are trained in all aspects of disguise.

How to Di...ppear Two apprentice agents are instructed on how to successfully disappear from the face of the Earth .

All very cool. In this article your gonna get a mini "spy school" primer from one of Tech Tv's episodes; Return to Sender on How To
Detect Suspicious PackageslLetters, we 'll follow that up with Dead Drops, or Dead Letter Boxes; what they are, how they're used, and
how to use 'em .

How to Detect Suspicious paekages and lett ers :

No one likes to see a stack of bills in the mailbox., but it's defmitely better than being the recipient of a letter bomb. Unfortunately,
detecting one isn't as easy as listening for a tick, tick, tick. .. but there are some other signs to loo k out for. Peep it.

12                                          Volume 6 Issue 3 • Summer 2004                                          Blacklisted I 411
"Remember" The itemdoesn't haveto be delivered by a carrier. Most bombersset up and deliverthe bombthemselves.

I.   If delivered by carrier, inspect for lumps, bulges, or protrusions, without applying pressure.
2.   If delivered by carrier, balance check iflopsided or heavy sided.
3.   Handwritten addresses or labels from companies are improper. Check to see if the company exists and if they sent a package or letter.
4.  Packageswrapped. in stringareautomatically suspicious,as modem packagingmaterialshave eliminatedthe need for twine or string.
5. Excess postageon small packagesor lettersindicates thatthe objectwas notweighed by the Post Office.
6. No postageor non-canceled postage       .
7. Any foreign writing. addresses, or postage .
8. Handwritten notes, such as: "To Be Opened in the Privacy of' "CONFIDENTIAL" - "Your Lucky Day is Here" - "Prize Enclosed".
9. Improper spelling of common names, places, or titles .
to. Genericor incorrect titles.
II. Leaks , stains, or protruding wires , string. tape, etc.
12. Hand delivered or dropped off for a friend packages or letters .
13. No return addressor nonsensicalreturn address.
14. Any letters or packages arriving before or after a phone call from an unknown person asking if the item was received.
IS. If you have a suspicious letter or package.

CALL 911-ISOLATE-EVACUATE

Bombs
Bombs can be constructed to look like almost anything and can be placed or delivered in any number of ways. The probability offmding
a bombthatlooks like the stereotypical bomb is almostnonexistent The only common denominator thatexists among bombs is thatthey
are designed or intended to explnde . Most bombs are homemade and are limited in their design only by the imagination of, and resources
available to, the bomber . Remember, when searching for a bomb, suspect anything that looks unusual. Let the trained bomb technician
determine what is or is not a bomb.

For more information call the BATF : Arsons contact; 1-888-ATF-FIRE
Explosives Incidents call; 1-88g-ATF-BOMB
A TF Arson &. Explosives Division
Washington, DC
202-927-7930

the Dead Drop

Now lets take a look at Dead Drops, or OLB's also known as Dead Letter Boxes .

A OLB is a physical location where materiaI is covertly placed for another person to collect without direct contact between the parties.
Good locations for OLD's are cracks in walls, in and around public trash receptacles, in and around trees and shrubs, inside vegetables
suchas pumpkins, in someone else'smailbox. between books in a public library, inside a paper towel dispenser,etc. The keyto success is
ingenuity, so none of those mentioned are especially good ideas, since someone has already thought of them. If the item being passed can
be disguised as a discarded candy wrapperor hidden inside a cigarette butt, etc., all the better.

The protocol has pretty much stayed the same since the KGB devised and perfected this method for use in the UK and US during the cold
war.

This technique is so effective, its still being used today . More than 30 intel agencies and underground groups worldwide use this
technique. Whenused by 2 people wbo have basic skills in counter surveillance, this method has confounded surveillance. Thus, it works.

You need to know three pieces of t.adeonft:

"Pick a good site for your OLD. This moans choosing a spot where you're momentarily hidden from view while .you passby (and either
load or empty the box). It also moans selecting a site that is easily accessible and in a public location.

- Use a separate set of sites to signal whenyou're readyto place somethingin the DLD, or retrievesomethingfromthe DLB.

• Use a foolproof signal that tells both parties that material in the site has been picked up . The first agent can then go back and recover the
items if the secondagent is unableto make the pickupfor some reason.

Step I: The ready-to-fill signal

Suppose that you need to deliver a disk to your contact. The first thing you gotta do is transmit a "ready-to- fill" signal . You need to tell
your contact that you're ready to fill the OLB with your material. For example, you might place a piece of chewing gum on a lamp post at
a pre-arranged location at a pre-arranged time (perhaps the I" Wednesday of each month at 3:00 pm) .

The trick is to use signals that can be easily seen by a lot of people, which means your contact doesn't have to compromise hislher
security while reading your signal .

Don't fill the OLB until you see the ready-to-pickup acknowledgement

Step 2: The ready-to-pickup signal

When your contact sees the ready-to-fill signal, helshe will send a ready-to-pickup signal. Again, this signal must be sent at a pre-arranged
time and location, say at 3:00 pm. It might be a chalk-mark on a traffic signpost or a piece of black tape on the back of a park bench .

When you see the ready-to-pickup acknowledgement you should fill the OLD within IS minutes (ie by 3:IS pm). After placing your
materials in the OLB, you immediately return and remove your ready-to-fill signal, thereby indicating to your contact that the box is
filled. Word up.
Blacklistedl411                              Volume 6 Issue 3 - Summer 2004                                                                 13
When you see the all-clear signal, you can bounce . If you don't see the signal, return to the DLB and remove the material.

Step 3: The all-clear signal

Once you see that your ready-to-fill signal bas been removed, your contact goes to the DLB and retrieves the material that you placed
there for himlher. This must be accomplished before a pre-arranged deadline, say 3:30 pm. Your contact then returns and removes hislher
ready-to-pickup signal, indicating that the box has been emptied .

Whenyou see this all-clear signal, you leave the area However if you don'tsee the signal by a pre-arranged time, you returnto the DLB
                                                     .         ,
and retrievethematerial in orderto preventit fromfalling into unauthorized hands.

This system of signals can be made even more secure by using positive acknowledgement signals insteadof simply removingexisting
signals. To maintain airtight securityfor yourDLB, simplyweave a nwnberof FAKE DLB locationsinto yourroutineon a daily, weekly,
or monthly basis . Narrow passageways between buildings , covered pathways in public parks, nearby dumpsters behind restaurants... all
these are ideal.

Simply make it a point to walk past these fake DLBs on a regular hasis . Remember, each DLB is located sucb that you11 be momentarily
hidden from view as you pass it, and if you're under surveillance, "THEy" will go ballistic . They'll need to place an agent at each
suspectedDLB at the precise momentyou walk by. Majorpain in the ass for them. If you've chosen your sites carefully there's no way
                                                                                                                        ,
for "THEM" to monitorthese locations If you have threeor four fake DLBs thatyou regularly walk past, you'll soon notice the telltale
                                        .
pattern of strangers who just happen to be loitering nearby at the instant you're momentarily hidden from general view.

Whenthis happens, you'vedetectedthe presenceof a surveillance team. Suspendyourcovertactivitiesuntilthe surveillance passes. Well
now you know 2 very important skills used by spys and various agents the worldover, but your still not even close to being a spy my
friend.

But don't fret, I'm gonna give you the 41 I on how to apply to the agencies that hire people for real spy work . It won't be easy, because
therearerequirements, some of which include:

Being poked and prodded. If you pass the initial application process - U.S. citizens only - you'll be subjected to a polygraph examination
and drug test . Drug policies at the agencies do have a small amount ofleeway with regards to former drug use (e.g, "I smoked, but didn't
inhale "-Slick Willie Style baby!), but not much. You may fly through the urine and lie detector gauntlet, but not the background check.
All agencies will check credit and criminal records , plus they'll interview current and former employers. Be patient The process can take
morethana year.

If you didn't give anyof yourpreviousbosses the fingerwhen you walkedout the door, the worldof intelligencecould bewaitingfor you.

FBI) What it does: Investigative ann of the Department of Justice Pursuesviolationsof federal criminallaw and protectsthe United
                                                                  .
Statesfromterro activities. Since lastyear focus has shiftedto counterterrorism.
              rist                        ,

Who it needs: Special agents with expertise in a multitude of areas including.but not limitedto, information technology engineering,
                                                                                                                       ,
physicalsciences, foreignlanguages, militaryintelligence andaccounting.
                                                       ,

RequiremeDU: Between the ages of 23 and 37. Must have four-year college degree and good vision, and must pass certainphysical
requirements. "off the record- the FBI won't even really look at your application until you've accumulated 3 years of related field
experience www.fbi.gov
          .

CIA) What it does: Collects and analyzes foreign intelligence for the president and senior policymakers. Intelligence is collected via
satellites, signal interception, and infonnants. The agency doesn'thave to publicly report its spending or operations, and many people
presume the agencyuses shadycollection methods     .

Who it D .....: Eagerly seeks diversity. At last check , 6-foot blond Nordic he-men don't blend in smoothly in the Middle East. Being able
to speak multiple languages is key. Right now the CIA is most interested io people who know Central Eurasian, East Asian, and
especially MiddleEastern languages. Experience in international economics andbusinessis a plus.

Requirements: Maximwn age 35. You'll also be tested on your ability to withstand coercionand keep a secret Although you may be
traveling, you mustrelocateto the Washington, D.C., area.

How to apply: Checkavailablepositionsat www.cia.gov

Those in theagencyrecommend you learnas muchaboutthe CIA beforeyou apply.

Always bewillingto adapt Nothingis routine.
                       .

DlA) What it does: Produce foreignintelligenceforthe militaryto be used in defenseandin times of war. It differsfromthe CIA in that
it's a combat support agencyof the Deparbnent of Defense.

Who it needs: Peoplewith degreesandexperience in aUsciences plus history,engineering. andenvironmental health, just to namea few
others Proficiencyin additional languages such as Korean, Chinese, Russian,and Serbo-Croatian also a plus. If you can collect tons of
      .
infonnation andmakesense of it, the DIA wantsyou.

Requirements: None beyond U.S. citizenshipand passing the aforementioned testing. Best candidates have at least a 3.0 GPA, good
writing and speaking skills.

How to Ipply: Checkwww.dia.milfor availablepositions. If you findone you like send in yourresume and be prepared to flll out a lot
                                                                                               ,
of paperwork.



14                                         Volume 6 Issue 3 - Summer 2004                                           Blacklistedl411
NSA) What it does: Makes and breaks codes. It 's our nation's cryptographer. In addition, it intercepts endless volumes of
communications data via radio, phone, and email, and it makes sense of it. Who itneeds: Mathematicians. Irs believed that the NSA is the
largest employer of them in the United States . IT experts are also in great demand.

Requirements: Must undergo a psychological and aptitude test.

How to apply: Check www.nsa.gov

If positionsarc available. click the option to apply online.

A life in intelligence could be the coolest job ever. Vou'll be the life ofa cocktail party.

You'll finally have something super cool to really impress chicks with ... Too bad your new position requires you to keep your mouth shut.
Doh!

Maybe your dream of being a spy or agent isn't quite realistic , maybe you don't really want to invest the time. money and supreme effort
that is required to actually become a spy or agent from one of the aforementioned alphabet-soup agencies . Being a real spy is hard work.
and if you think about how much time and effort your going to have to dedicate to this endeavor, you'll see that its going to eat up lots of
prec ious 1V time and that imprint )'OU 've already invested so much time molding into your couch might fade away. So for you, there is
another option! Weekend Warrior Spy's rejoice!

Visit www .incredible-adventures.com (excerpt taken directly from their site)

Live the life you have only seen in movies or read about in novels . Each trainee at COVERT OPS will experience all the thrills and
excitement of the clandestine life in a completely safe and secure environment

Your Mission Impossible Seenario: You have been selected by an ultra-secret paramilitary unit for a covert mission in hostile territory.
Only the best-trained agents will be able to survive the mission, so your training must be thorough and intense . You will be taken to a
secret training base where a hand-p icked cadre of Green Berets and contract mercenaries from the world's toughest special operations
units will teach you all the actual skills needed for this operation.

High speed evasive driving both on and off road, combat pistol shooting" unarmed self-defense, espionage techniques, counter-
surveillance, explosives and booby-traps. The mission is critical, the training is absolutely real, and the atmosphere is PURE FUN AND
EXCITEMENT!

Your adve nture begins at the Tucson, Arizona airport . A COVERT OPS undercover agent, displaying the recognition signal you
received with your orientation packet , meets your flight. You follow the agent to a PMP (personal Meeting Point) and are briefed on your
mode of transportation to the training site. It may be by bus, car or even belicopteror light aircraft .

Once at the site you're cleared by the armed guard at the gate. Don't expect to see the outside world again until your training is complete .
COVERT OPS instructors in their distinctive desert camouflage fatigues are waiting to show you to your room and explain the meal
schedule and other administrative functions . Tonight you bed down early , knowing the following day will be as intense as any in your
life.

Sounds pretty cool bub? I would've checked it out myself, but I get all this drama in my day to day life.


          "I Can't find your magazine in my local bookstore"
                     Sound familiar?
       Are you having trouble finding our Magazine?
Since we 've been out of print for a few years, most of the retail boo k stores and newsstands are not carryinq our title ... .yet
After a few issues hit the streets, more and more stores WIll carry our magazine. It's all a matter of time We know it can be
next to impossible to frnd Blackhsted ! 411 m your local neighborhood bookstore at a time like this . There are a few ways you
can get our magazine Subscnbinq IS the best way to get the magazine ...NOW. This can be done through regular 
mail or by visitmq our website. 'It's somewhat eas y to obta in our magazine if you really want it.

If you 're in a place that doesn't carry our magazine and YOU 'd like to see it there in the future . do one of the followinq

1, If you're not sure if the store you 're in carr ies our magazine . ASK THEM ~ They might be sold out or they may have hidden
the magazine in a.special section or behind other magazines Those pesky anti-hacker type drones might be hiding them .
2. If they do not carry our magazine , tell the store manager that yo u would like to see this magazine In their store In the
future , Our ISSN is 1082-22 16, Give them this number and tell them they should call the" magazine distnbutorts ) to obtain
Ihe title , Make sure you let them know how disappointed you 'd be If they didn 't stock them or ' forgot" to at least call and TRY
to get them in stock
3 If that falls , you can give us the ir address and phone number and possibly a conta ct name . We Will have the chance to
call them and convince them into carrying our wonderful magazine.
4 . Subscribe if you don 't want to bother with any of the previous methods
5 Take a look in Tower Re cords /Magazines . Barnes & Nobles, Bo rde rs or Bookstar The y usuall y hav e them In stock
6 . Borrow a copy from a frrend • make sure to return It whe n you' re done

                                                     Blacklisted! 411 Magazine
                                                     P.O. Box 2506
                                                   Cypress , CA 90630
Blacklistedl411                               Volume 6 Issue 3 • Summer 2004                                                             15
             ertroniw.net Roc et s Re Devices
                      tttJ.

P.O. Box 23097. ABO. NM87192.
                              Hlgb Voltage
                                            lare
                                  Cryptana1~ls
                                           Techniques
(WliguruaPconsumert.roiilcs.net) Auto Theft Countermeasures
Some ofour 150+ p>puJar Hlgh-1ec:h PlJ'!iTNRi£;P'lNAM';!AL
Sec:urtty & Survival Offers. see our ATM Security
Free Online Catalog for descrip-      The Placak. Report
dons, prices, polides. Or please send Ch k &: M 0 Security
$3 for hardcopy (USA/Canada)      cr:Jit Card     S~urlty
                                  The Cons &: Scams Databook
 ntemet Security Manual           Remote Office 18ctlcslStrategi
Internet Frauds Databook          Social Enaineerlna
Internet Tracking &: 'li'aclng    Ultimate Success Manual
Computer Security                 The "Goldfinger"
   e Hacker Flles                 Government Land Grab
     Hard Drive Manual            Casino Secrets
     PHONB?.RAKRIfi'PX                  MW4AwslD7S
Caller ID &: ANI Security         Unpublished &: Secret Law•••
Cellular/Cordless Phreaktng       LeJial Citations to
Beyond Phone Color Boxes            Prevent Dismissals .
Fax Machine Security              Secrets of Federal Civil Rico
 olce Mall Security               Suing U.S. Co,,-/ Officials
 BX Security                      LegafFIUng SysJlnltial Steps
PagerlBeeper Manual
    wer. Maclrlne Security    Radionics Manual
      B'NllllGYNlf/1iRS       Heal Thvselfl
St~PPlJJg Power Meters +Video EMF &: (igbt Therapies
KW-HR Meters                  Faking Illiless &: Injury
   elGManual                    Disabilities
Gas &: Water Securlty         Cancer PreventionlRemedies
   e Loadflnder               Prevent/Cure Denta1lD1sease
   e Heat X-Changer           Prevent/Cure ColdslFlus
   e Vortex Generator         Bio-Spectrum Analysis
                              X-Ray to Death!
 S.EC'lI.RLTY:GURWYAL Body Sculpturing
Identity Theft Manual
Polygraph Secrets                 MIND WNIR04
Secret &: Alternate IDs          'WElRDNisa:Oaoeous
Beyond Van Eck Tempest +Video The Di!'tY 2-Dozen
By Order of the Magnitude Mind Control
Enemy POW. Civilian Internees Subliminal Mind Control
  & Detained Persons          Under Attack!
Stealth Technology            EM BralnBlaster
Simple/Cheap SeCurity Elec. Faking Psychic Powers
Secret &: Survival Radio      Sedona MaRic
Security/Survelllance Freqs UFO's &: E1S
   e "Silkwood" (Radiation) Secrets of Solderless BBs
Survival Guns &: Ammo         H draulic The       to Cheo s
16                 Volume 6 Issue 3 - Summer 2004     Blacklisted I 411
r'--------                --*---~---~------------------.......
                                                The Ear
                                                                .                              ~.




ff                            For the beginning scanner enthusiast
                                                   By M L Shannon

The Hacke. Ethic
There is a certain fascination, a curiosity, a need, To want to know, To obtain information It sometimes borders on an
obsession, sometimes at the cost of jeopardizing one's academic standing, as in the earty days of the Tech Model Railroad
Club at MIT, Or being little more than a nuisance in the early days of computing, and on into the dangerous days of hacking
in the 'New Millennium', After 9-11, This is known as the Hacker Ethic, The idea that information should be available to
people and that secrets suck, It is a mindset, an attitude, a way of living, It is something that either you understand , or you do
not.

It is about people who like to take things apart and figure out what makes them tick, and in putting them back together ,
finding a way to make them better. And, a isn't just about computers, It is also about wanting to know what is happening in
the world around us, On the Intemet, yes, but also the countless thousands of radio signals that permeate the atmosphere ,
no matter where we are. To be able to know- who is saying what to whom . Again, It is something- a way of life that either
you understand, or you do not.

In this article, I hope to encourage you to explore the fascinating hobby of scanning. Fascinating, indeed, as you begin to
search the wavelengths and intercept the signals that are just waaing for you, if you tune to the right frequency. Read on, and
you will learn about some of them. But bewarel There will be times when you find it difficutt to tear yourself away from
listening. You might tend to put off things in order to figure out that 'mystery' signal that you stumbled across but haven't been
able to identify.

I will start with a few words about the history of radios and, in the first person, some of my experiences.

How I Got Started
I first became interested in radio communications when my dad bought me a klt from the National Radio Institute. With a and
a soldering iron I could build any number of gadgets, including a five tube superhet AM radio. Oh, we already had a radio, but
somehow building my own made it more interesting to listen to.

Down the alley from our house, there was a guy who had a little shack in his back yard. A TV repair shop. His name was
Fred Freeman, and being a precocious kid, I pestered the poor fellow wah questions about electronics. It was he who took
the time to explain the resistor color code to me. Well, maybe just out of generosity, but then more likely in the hope that I
would go away for a while, (a worked) he gave me a military surplus BC-342-M short-wave receiver. This was a real treasure
for a kid in the frfties, and I was soon hooked on short-wave. In the wee small hours, Trimm headphones clamped tight to my
ears, pencil in hand, I was oblivious to all but distant and mysterious sounds from exotic places. And from countless hours of
listening I soon leamed how to identify what I was hearing.

Radio Moscow always announced the news with "And now the news". Accents helped, and it wasn't long before I knew
when I was listening to the BBC without having to wait for a station break. Some broadcasts by the AFRS , the Anmed Forces
Radio Service signed on with the first six notes of 'My country tis of Thee' , and there was the exotic call of the Kookaburra
bird when a "Down Under" station came on the air. I could tune in HCJB, a religious station in Quao, Ecuador , and some
times even Radio Sophia, Bulgaria. Signals from around the world with the BC-342M and the antennas I was stringing up
much to the constemation of the neighbors and the GTE 'Telephone Man' who told me I could not use their telephone pole (in
the alley behind our house) for my 40 meter dipole. They finally gave up since I kept putting it back every time they cut it
down.                                                                                                               .

Indeed, there was a lot to listen to, but there were things I could not tune in. Such as what was happening in my
neighborhood. Like the local police department. They had radios that transmitted on VHF, which at that time , was Terra
Incognao to most hobbyists. There were no scanners, the receivers available on the surplus market were expensive , and
they were crystal controlled.

I have never lost my interest in short-wave, but back then I became intensely interested in being able to monitor what I could
not and was determined to find a way.

Then, one day, I read an article, I believe it was in Popular Electronics , about how to modify a standard FM broadcast radio to
pick up police calls in the 150 megacycle band. I had an old Magnavox tube type and so I started tweaking, changing the
number of turns on the oscillator coil and adjusting the trimmers on the variable capacitor , Tuning was critical because of the
difference in bandwidth, reception was poor with the audio being faint, but a worked . My basement workshop was often
visaed by kids in the neighborhood who wanted to see if I could "really tune in police calls".

A few years later, there were battery powered portable radios that tuned VHF and , if you tuned carefully enough, it became
possible to intercept the local police as well as some of the federal agencies . Yep, Hoover's boys. And, since the feds
apparently didn't realize that they could be monitored, they weren't too careful about what they had to say.

Most equipment was still made with vacuum tubes; the transistors available didn't work well above about 50 megacycles, until
Fairchild came out with a half-dollar size bipolar. They were far too expensive for us, but then someone discovered that
General Telephone was junking equipment that used them. GTE refused to sell the scrap to us, so in the dead of night, we
sneaked into the yard at Superior Scrap Iron to get these forbidden treasures. Soon we were building battery operated
"home brew" receivers. VHF!

Blacklisted! 411                         Volume 6 Issue 3 • Summer 2004                                                        17
And then, in the seventies, programmable scanners appeared on the market. I remember well my first one, a Regency 'Touch
Series' model. It used membrane buttons and was indeed touchy. Sometimes ij worked, sometimes ij did not. This was
followed by the Bearcat 250, a quantum leap in programmables, and the first to incorporate Search and Store. One of the
greatest scanners ever made . And although coverage was limijed , ij was possible to '1rick" the BG-250 into receiving the
406 - 420 MHz federal agency band. Something that the manufacturer was very uncomfortable with and didn't want to talk
about.

Soon, the use of VHF was growing and the bands becoming crowded, so many services were moving to UHF . Between the
two, there were countless stations to monitor . So many that ij was becoming difficu~ to keep track of all of them. Police and
fire departments, public works and so forth. So many agencies , so many transmissions. How could you tell one from
another?

The Ear.
Just as with short-wave, over a period of time, I developed the ability to quickly identify the different transmissions that I tuned
in. Much of this is second nature to experienced "scannists" but you who are new to this hobby may find these techniques
useful. Developing The Ear means hearing what you hear, not just monitoring . Wijh some practice , you will in most cases be
able to quickly- almost instanUy- detennine the type of service you are tuned to.

The Good News
To a certain extent. you probably have already acquired this skill, but in a way that you may have not realized . Television .
Yes, television . Think about ij. You are watching a sitcom . Suddenly the background music and the canned laughter stops
and the voice emanating from the speaker is different. Polished, practiced, professional. It is a preview of the Ten O'clock
neWS or whatever . And you instantiy recognize the change . Sometimes ij is more subtie. You are watching a movie in which
there is a chase scene . You hear the screeching of tires, the roar of engines , and suddenly you are watching a commercial.
You are still hearing the same things, the speeding vehicles, and then you See a well known NASCAR driver pulling over to
the side of the road, getting out, and then telling you about how he loves his Ford Taurus . The networks are sneaky in how
they work these commercials into the movie. And , again , so ij is with scanning . Things can change quickly as your radio
hops from one station to another. So now, let us look at some of the ways...

Frequency Allocations
As you become experienced at scanning the airwaves , you will start to become familiar with frequency allocations . Bands
that are used for specific purposes , such as business, military, federal agencies , police and fire departments. But what you
might expect to hear in a particular area of the RF spectrum, and what you may actually intercept may not be the same .
While the radio spectrum is divided into many bands , there is an overlapping of what agencies , businesses, individuals, might
be using them at any given time .

An excellent aid is the frequency spectrum poster available from the US Govemment Printing Office . This is a large (30" x
40") chart that graphically lists all allocations in the Radio Frequency spectrum . As you will see on the chart , sometimes the
same bands are assigned to different services , shared by both government and non-government agencies , so you might hear
the local police or a three letter agency or business radio. And what business uses a particular frequency in one area may be
used by someone else in a different location.

Some of the Federal agencies use the same frequencies in all areas , such as the Secret Service 'Charlie' at 163.375. But
where 461.175 in San Francisco is Hyatt Hotel security ij will probably be used by another business in Dallas or Baltimore
even though both cities have Hyatts . Please keep this in mind as you are scanning .

Now, way back when , there weren't many frequency guides other than FCC records which weren't readily accessible . You
had to go to a field office and search through a microfilm ('fiche') reader which was a very time consuming process , and in
some offices the people there were not exactly 'user friendly'. Kneitel's Top Secret registry was first published in 1978 by
CRB Research , and before that, there were only a few regional lists available .

                     There is no such thing as a "secret" frequency. All frequencies are simply numbers . How
                     many cycles , megacycles, gigacycles . I have heard people tell me, upon Ieaming that I am
                     into scanners and short-wave listening, that some frequencies are so secret that I could be
                     arrested for espionage just for having them . Malarkey . There are, naturally , frequencies
                     used by people who would rather you not know about and there are transmissions that the
                     law says you can not monitor, and for the most part , you are not allowed to repeat anything
                     you hear on most frequencies, so if you do, and ij gets back to certain people , then indeed ,
                     you may find yourse~ in hot water. But, again , frequencies are just a matter of numbers .


Today, there are many frequency guides available . Books , CDs and Internet sites. Using them to look up a frequency that
you are monitoring may solve the mystery of an unknown station, but then it might not. The actual FCC listings, which are
available on CD, sometimes reveal very little information . A license may be issued to the ABC Corporation but this may not
tell you exactly what it is; the radios may be used by taxicabs , a construction company or whatever else. Federal agencies
such as FBI, Secret Service, etc. are not licensed by the FCC so they are not included in FCC records. However, there are
other sources of these frequencies listed at the end of this article .

What The Ear Might Hear:
Aircraft , private and commercial and Air Traffic Control
Airport Security
Airport Shuttles
Air Shows. Including the incredible Blue Angels
Amateur Radio
Analog cell phones : Not legal to monitor

18                                       Volume 6 Issue 3 • Summer 2004                                      Blacklisted I 411
Baby Monitors
Businesses of all kinds
Cable TV leakage
Citizens Band
Coast Guard vessels
Cordless Telephones: Not legal to monitor
Emergency Services; Emergency Broadcast System , Red Cross , FEMA
Family Radio Service, a license free band anyone can use
Fast Food drive-up windows employees
Federal agencies
Ferries in most coastal areas
Fire departments and networks, local and federal
Forest Rangers
General Mobile Radio Service (GMRS )
Law enforcement, City, County and State
Local government agencies; public works , utilities
Marine ; ships large and small and marine telephone.
Media and remote relay (May be unlawful to monitor)
Military aircraft. The SAC , fighters on training missions, aircraft refueling
Military facilities, Army , Navy , Air Force and Marine Corps posts .
Networks. State and nationwide common channels for law enforcement, firefighters and others
Pirate 'Micro-Broadcasting' (Low Power) stations and some that are (for now) legal.
Public Transportation, busses , trolleys and here in San Francisco, cable cars
Railroads, freight trains , switch-yards, Amtrak
Search and Rescue operations
Security guards; patrols and fixed locations
Surveillance transmitters
Taxicabs and Limos
Telephone company maintenance

Thafs a lot of coverage , a lot of services. So, in order to Ieam to recognize the signals to which you are tuned, to develop
The Ear, here are some things to leam .

Signal Strength and Clarity
Commercial and govemment radio systems are designed so that that reception is full quieting meaning no background noise ,
and sound quality is such that the transmissions are clearly understood. Important, in the case of law enforcement and other
emergency services, lives often depend upon radio communications. Unfortunately this is not always the case. Before they
installed the new trunked system, I used to hear many complaints on San Francisco Police Instant Communication Channel
Six, where reception is poor in cerlain areas .

So Wyou tune in something where the sound is muffled, like the voices are " inside a barrel " this should starl to narrow down
the source. You may be intercepting a baby monitor or Wyour ere lucky, even a surveillance transmitter. Think frequency.
Most baby monitors use cordless telephone channels in the low VHF range ; 46 and 49 MHz. Surveillance 'bugs' can operate
on virtually any frequency but those used by amateurs are most likely to be heard on or just above and below FM
broadcasting. A spy worth his sa~ will use other frequencies and the Feds probably use Spread Spectrum which you aren't
likely to hear at all .

Duplex and Full Duplex
Duplex refers to radio services where the mobile units can talk to each other through the repeater but only one can transmit
at a time . Full Duplex means both parties can talk at once . So, when you hear this, you are most likely tuned to a wireless
telephone. But, it could be a phone conversation between two actors in a TV sitcom or movie from cable TV leakage. Think
frequency.




                            "::;2d''If;r
Blackllstedl411                            Volume 6 Issue 3 - Summer 2004                                                  19
Length of Transmission
Wireless telephone (cellular or cordless) conversations may go on for hours . Cellular calls, which once were kept short due to
the high cost, tend to be longer now that the price has dropped and usually longer than commercial liNo-way radio which tend
to be brief . Local police departments sometimes need to make long transmissions when describing several suspects at a
crime scene, but will usually break them up into a series , to temporarily clear the air for an incoming emergency call. Fire
department transmissions are usually short and somewhat terse .

Gender
Once, the world of radio communications was male dom inated . Today , fortunately, this is no longer true . And while you can
not necessarily identify a service by the sex of the person speaking, you may be able to narrow ~ down. Police dispatchers
are more often than not women, particularly in large cities . Here in San Francisco, I sometimes hear one male but the rest
are female . Fire Departments are more likely to use male dispatchers for some reason. Taxicab compan ies may be either
sex but are more often males. Most of the voices you hear on Federal law enforcement agencies will be male, but not all.

Age

Sometimes you can make a good guess as to the approximate age of a person , sometimes not. Elderly people may sound
their age, as might the very young . It is unlikely that, at e~her extreme , they will be dispatchers for a police or fire department
but they might work for a cab company . Ne~her are likely to be dispatching for a federal agency , or to be an agent on the
other end of the communication, but people of all ages may use the General Mobile Radio Service (GMRS) as well as
amateur radio frequencies and of course , wireless telephone .

Voice Quality
It is easy to tell when you are tuned to a commercial station. Professional broadcasters such as newscasters disk jockeys
and people who make TV commercials are easy to recognize ; you hear them every day . So should you hear these
'professional' voices on your scanner, you may wonder Why. There are a couple possibilities. You may be hearing a remote
broadcast channel ; an on-location reporter relaying to a radio or TV station . Or, in the UHF bands , you may be hearing the
audio from a TV station wh ich is FM. Hint: if you hear a lot of 'buzzing' sounds that lock up your radio and you have to keep
hitting the SCAN button , then this is probably what you are tuned to. What frequency band are you on?

Terminology
You tune in on a transmission and you hear Dry Standpipe, Phantom Box, or Engine Company then you know you are
hearing a fire department even before terms like 'structure fire' . Ambulance attendants and Paramedics frequently use
phrases like' consc ious and breathing' or 'equa l and reactive '. Should you be tuned to a taxicab company, you will hear terms
such as 'No-Go' (the passenger wasn't at the pickup location) 'Bingo' (after dropping a passenge r, at that location there was
another one waiting for a cab) 'Stand' (A taxi stand, a place where cabs wa~ for the next assignment) and you may also hear
conversation s if the cab company has duplex radio system ; the drivers talking back and forth . I drove a cab for a while after
graduating from college , and I can tell you ~ can get really interesting . Especially late night at a small company.

Physical descriptions of a person , height , clothing , etc. usually means police but could also be a private secur~ guard
company . If you hear the word 'signal' you may be tuned to the FBI as this is a word they sometimes use for agent. Another
FBI term is '91 New' which means a bank robbery that has just occurred . The Secret Service usually use the agents name
and city. Baker, San Francisco is agent Baker calling the San Francisco dispatcher, and on Customs Service channels you
will frequently hear the word 'sector' What seem like ordinary household items such as pillowcases, towels , sheets , might not
be emanating from someone 's house ; you may be hearing the house-keeping staff at a hotel. Their security guards may be
close to the same frequency, and these channels can get very interesting I

Emotion
If you hear someone getting emotional , raising their voice , screaming, then you may be tuned to a commercial station (movie ,
sitcom), relay link or cable TV leakage around 150 - 170 MHz, or wireless telephone . Perhaps business bands , taxi
companies (not all that unusual) , and some local govemment agencies such as public works, street cleaning and etc. Some
of the people at some of these agencies here in San Francisco get real chatty , since they (apparently) don't know the new
trunked system can be monitored . Amateur radio is another possibility , what with the way it has deteriorated in recent years.
But this is rare on law enforcement radio.

A few years ago, I was sitting here typing when I heard gunfire . A full automat ic weapon . And not very far away . A few
seconds later I heard sirens . Lots of them. I spun the knob on my R7000 to the Police Instant Communication channel 3
(460.075) and heard 'code 33'. Police codes vary from one area to another but in San Francisco , 33 means restricted traffic;
an emergency situation.

A sniper fired dozens of shots, hitting several people including liND police officers . Even though liND cops had been shot, the
officers and dispatchers maintained the same calm professionalism as always . True , as an experienced scannist , I could
sense the stress in their voices but no one lost control through the entire incident until the final Code 4; 'Suspect in custody '.

Laughter
On how many stations you monitor will you hear people laughing? Well, you rightly figure wireless telephones and the Family
Radio Service, of course, GMRS (General Mobile Radio Service a sort of Citizens Band on UHF) which is also likely, and
perhaps some business channels as well as, yep, taxicab companies. Also commercial radio and TV stations and remote
broadcast locations , and on amateur radio. On Fire department channels this is most unlikely but don't overlook police
departments. It is not unusual to hear people chatting and laughing quietly in the background at the San Francisco Police
Department.




20                                       Volume 6 Issue 3 - Summer 2004                                       Blacklisted I 411
Profanity
Profanity, 'foul language' or whatever you want to call it is a no-no, but you still hear it. The most likely service is, of course,
wireless telephones. Other possibilities are amateur radio (especially since unlicensed operators can walk in and buy two
way radios at Radio Shack) and possibly GMRS and FRS. As you already read , cab drivers sometimes get a lillie hot and
become rather expressive. Like when a competing cab company 'spears' (steals) their passenger at a pickup point. Yup,
some cabbies have scanners, too.

Put It All Together
Your radio stops on a signal and you want to know what it is. You hit the  button to stop the scanning and wait for the
next transmission. Think about what you have leamed so far. What frequency is in the display and what does that tell you?
How long do the transmissions last? Is the sound quality good; easily understood or is it muffled? Can you hear both sides of
the conversation? Are the voices excited? Are they cussin' up a storm? Listen for the terms you have read about. After a
while, all these things will become second nature and you will quickly know what you are hearing.

What The Ear Might Not Hear
Signals on the airwaves may take forms other than the ordinary speech. They may be encrypted analog, digital , or encrypted
digital. Right- digital is not necessarily encrypted.

Types of Transmissions
Let's start with encrypted analog transmissions which use Frequency Inversion . This is a method of processing an audio
signa~speech- by taking the frequencies above a certain point called the baseline and substituting them or converting them
to low frequencies and vice versa. The frequencies are switched or 'inverted'. Low becomes high and high becomes low.
This is one of the signals you may hear on cordless telephone frequencies or certain brands of Baby Monitors.

What It sounds like
A bit like Donald Duck with a sort of metallic twang or whine. You can tell that this is Human speech and sometimes you think
you can make out a word here and there. It may be possible to reconstruct this type of signal back into clear speech using
another Frequency Inversion scrambler if it is the same kind; ~ the baseline frequency is the same and many of them do use
the same one. And, there are programs available on the Internet that have an adjustable base frequency.

Frequency Inversion, Variable Baseline
Also called "Rolling-Code Analog" this is a form of Frequency Inversion scrambling in which the baseline frequency is
changed according to a pre-arranged scheme or at random, many times per second . When this system was new, some ten
years ago, it sounded much the same as ordinary frequency inversion but with a loud 'knock' sound about two times per
second. I haven't found a wave sample of this on the Internet but the term 'knock' is an accurate description. If you happen to
hear this transmission, you will recognize it. Sophisticated software (Fast Fourier Series, I believe) and a powerful
workstation or perhaps a super-computer may convert some such scrambled speech back to "clear". This depends upon how
often it changes.

Since then, several 'levels' of FI have been developed by Transcrypt International, as well as other speech encryption
systems. Samples of the scrambled sound are available at some site listed at the end of this article.

Digital Transmissions
The method of converting analog speech to digital in two way radio systems is not unlike that which is used in the digital CDs
you play on your stereo. Sound feeds into the front end of a circuit that opens a 'window' for a specified length of time
(microseconds) where it is 'sampled' or measured. The frequency that is in the window at the time is given a digital (binary)
number.

How long the window is open; the sampling rate, depends on the required frequency response. For music , the rate is much
higher in order to be able to reproduce the entire range of hearing; 20 to 20,000 cycles. For two way radio, a bandwidth of
3000 cycles is sufficient so they have a 'splatter filter' that reduces or 'clips' the audio so it has a narrower bandwidth, and so
the sampling rate is lower. To tum it back to sound, the process is reversed . An oversimplification but basically that's how it
works.

Unencrypted Digital
This includes PCS cellular phones and NexTel and probably others. Digital speech sounds much like the background noise
on your scanner; with the squelch open while tuned to an unused frequency.

Encrypted Digital
There are several digital encryption methods used, some more complex than others , the difference being in how secure, they
are. This is based upon the 'keyspace' or length of the 'password'. None of them - as far as I know - can be converted back to
normal clear speech by us hobbyists with our Pentiums.

One of the first methods used was the Data Encryption Standard; the DES, Developed by IBM many years ago as Project
Lucifer. It used a keyspace of 56. The DES can be successfully attacked with a specially designed computer, such as the one
developed by the Electronic Frontier Foundation several years ago. It cost them something like half a million dollars to build.
Today, a group of hobbyists might be able to crack the DES as a joint effort, but for radio transmissions, I doubt it is being
used much any more; With the DES compromised, new systems of encryption are in use by federal agencies . DVP or Digital
Voice Protection is one, the military Fascinator algorithm is another, but they are secure enough that they won't be defeated
for many years (centuries?) to come, after which the information won~ be of much use to anyone.



BlacklistedI 411                         Volume 6 Issue 3 • Summer 2004                                                         21
Digital Sunners
Uniden has several scanners that can meonor some dig~ltransmi••ions. such a. APCO 25. used in trunking systems. But
as to other dig~al.y.tems such as NexTel or cell phones. and the above. nope.

The problem is not just that transm issions are dig~l. but that timing. sampling rate and sync and other faelors may not be the
same for different signals. GSM (Global Systems Mobile) wireless telephone isn't necessarily the same as the dig~1
transmissions in the trunked radio system , and etc.

Data Transmls.lons
So far this article has been about voice transmissions but a great deal of what is being broadcast over the ailWaves is data.
Transmitting data by radio has been used since at least the days of World War II when there was wireless teletype (RTTY).
and weather map. and documents were sent by ·wirephoto·. These are some of the strange sounding signals you can hear
on the HF bands . one that sounds much like the percolating of a coffee pol.

In the VHF and UHF bands you will hear many data signals. Pagers such as Flex. ReFlex and Pocaaq. Mobitex data
terminals . police Mobile Data Terminals . Ardis. and others. Now most of these signals are not. technically. encrypted . They
are not 'scrambled'. They may use a proprietary system but some of them use plain old ASCII. Nevertheless. ~ may be- and
probably is- unlawful to decode them. Pagers. for example.

Amateur radio
Ham radio operators can communicate using data over the ham bands similar to commercial pagers . using a computer and
two way radio connected together with a Terminal Node Connecter ; TNC. with a format much like pagers .

ACARS
This. ACARS. is a method of intercepting signals from commercial aircraft and being able to plot them on a computer screen
map. You can actually track the flight of a given airliner. For details on ACARS and amateur packet radio. see http://web.
u.na.navy.miU-bruningaiacar.hlrnl

At the end of this article are listed a few web sites that have captured some of these sounds and stored them as wave file s.
Listening to them makes it possible to identify some of the data signals you will hear.

                                                                          The Trunked Radio System
Scanners and The Law
Federal and local laws prohtbit monitoring some types of                  I will use the San Francisco Police Department as
transmissions . Cellular radio. cordless telephona are verboten. as is    an example here. Before the trunked system went
commercial paging. even if you can't "decode" the signals. The same       into effeel a few years ago. they used conventional
is apparently true of federal agencies using encryption. even though      UHF on the 460 MHz band and "Low Band" on 45
there is no way you will ever be able to decode the tran.missions.        MHz. The UHF was referred to PIC (Police Instant
                                                                          Communications) ~h which . as I mentioned . ther..
It is possible that mere poseeselon of devices that can be used to        were reception problems In certain area. of The
decode tran.mi••ions. such a. pagers. may be unlawful even though         City. PIC consisted of about 14 fr&quenci.... of
they have leg~imate uses in amateur radio. There have been raids.         which several were infrequently or rarely used, so
by federal agents, of companies that sell devices that can decode         most traffic was over only PIC 1.2.3,4 and 6. The
data tran.missions and the owners arrested and prosecuted. If you         new trunked system eliminated these problems
want to know just what is and is not legal to tune in. please consult     almost completely . and I talked to several cops, all
an attomey.                                                               of whom like ~ much better than PIC. That is. once
The law also contains provisions that alfe<:l th& manufaetun, of          they got used to It:
&quipm&nt used for listening to or receMng radio transmissions ,
such as ·scanners ." Section 302{d) of the Communications Act, 47         Here Is how It worlks .
U.S.C. Section 302{dl. prohibits th& FCC from authorizing scanning        The system conslsts of 21 or so individual
equipment that is capable of receiving transmissions in the               frequencies which are shared by various ssrvices
fr&quencies allocated to domestic cellular services. that is capable of   including police. county sheriff . parking and traffic .
readily being altered by the user to intercept cellular                   Department of Public Work. (the people who blast
communications , or that may be eqUipped with decoders that convert       you awake at 7 AM with a chorus of jackhammers)
dlg~al transmissions to analog voice aUdio. In addition, such             Animal Control . and qu~e a few others .
receivers may not be manufaelured in the Un~ States or imported
for use in the United States after April 26. 1994.47 CFR 15.121.          When any radio in the system keys their
FCC regulation. also prohibit the sale or tease of scanning               microphone. the computer picks up the .ignal and
equipment not authorized by the FCC. 47CFR 2.803.                         as.igns it to the first available . unused. frequency .
 More on this at hllp :/twww.fce.gov/BureausiCommon_Carrier/              Regardless of What service it is; police or
 Faelsheetslinvestigation.htmt                                            dogcatcher. When the transmission ends. after a
                                                                          short delay . the fr&quency i. clear and will be placed
 Then. there I. the Communications Ael of         1934 that restricts     back in the "pool" wa~ing to be used by the next
 scannlsts from repeating anything th..y         hear except from         service that transmits.
 transmiselons intended for the general          public (commercial
 broadcasting) amateur and CB. and emergency     dislresa .ignals.        Now, to avoid the po.slbimy that when a police
                                                                          officer has an emergency situation and needs to call
 And also be aware that having a scanner in a motor vehicle may be        the dispatcher and not end up talking to the
 unlawful in some areas. Some slates make exception for ham               dogcatcher. the system has a number of 'channels'
 operators. and the laws apparently also except the news media.           called Talk Groups . When a radio. any radio, is set
 If you have any doubts about what you can or can not do. consutt an      to a particular TG, it hears (and transmits) only to
 attorney. As.umlng you can find one that even knows what a               other radios that are tuned to that TG. Regardless of
 aeanner is.                                                              the frequency being used, only that particular TG.



22                                     Volume 6 Issue 3 • Summer 2004                                      BlacklistedI 411
Now, again using San Francisco as an example, there are hundreds of these TGs . The police have radios , Motorola, that
can operate on any of three sels of TGs, A, B, and C, with each set having 16 TGs . There are two rotary switches, the first
labeled for the set, A, B, C, and the second numbered from 1 to 16. Total of 48 TGs . All 16 of the A TGs are used and are
assigned to particular areas of the city or for special events , So if you want to monitor the police , you have to select the TGs
for your area plus some of those used for special events

As of this writing, none of the C TGs are in use and many of the B TGs are used only under special sltuatlcns. One of them is
to track bank robbers using the RAT system. And once , I heard a raid on a suspected crack house. That was interesting .
Especially what I could hear in the background l

Riding the cable car home from work one day. I saw a bunch of           The trunked system provides a great deal of
SFPO vehicles parked around the Huntington Hotel , so I hopped          nece ssary privacy for police that the old PIC system
off and trolled over to see what was happening. It was a                did not. W~ at least the 48 talk groups to choose
demonstration having to do w~h Pacific Gas and Electric and I           from , they can quickly select one that normally isn't
stayed for a While. talking to the demonstrators and several bored      used much if at all..
looking cops.
                                                                        So, this makes lt difficun for the bad guys to stay on
"Uh, any chance you could tell me what Talk Group you're using"?        top of what the cops are doing - they can switc h to any
"Yeah, A·2 ."                                                           of the 48 TG as they wish - while still making ~
"Thanks . I pulled out my list to see which numbers to punch in to      possible for we scannisls with trunking radios to know
my PRO-91 to get A-2 and one of the cops asked. 'What's thar?           what is going on in our neighborhoods, and to be able
I explained that ~ was a list of talk groups, from Robert Kelly's       to call in the '20' of a bad guy we happen to spot. It
book (see credits at the end of this article) and he asked if he        doesn 't happen that often but one I remember was for
could see it,                                                           a 21 1-221 ; a guy with a gun who car-jacked; yanked a
Handing ~ to him I mentioned that there are a lot of TG I don't         woman out of her vehicle at a red light and stole it, I
know about to which he replied with a laugh, "Hell. there 's a lot of   got a call from the watch commander thanking me for
TG that WE don't know about ."                                          being an "alert citizen". Using the trunked input
                                                                        frequencies (explained later in this article) , makes ~
 There are TGs reserved for the Mayor, the Oislricl Attorney's          possible to stay on top of what is happen ing in your


....._-----------.......
 office, emergency services and the list goes on.                       neighborhood.


CAS: Computer Aided Scanning
Monitoring has come a long way since the days when VHF was terra incoqnito, modifying the old Magnavox . From home built
receivers to crystal controlled scanners and then the programmable model s. And now - ~ had to happen - we have radios that
can be interfaced to a computer.

This means much faster scanning, and unlirntted channels in as many 'bank s' as the user desires. For example , you could
make up a bank that scanned local police (if they are not using a trunked system) and fire departme nt, or fire and Sheriff, or
news media and dogcatcher and airport ope rations; whateve r you like to listen to the most. The poss ib il~ies are unlimited.

Practically any computer will work for CAS; it isn't necessary to spend two thousand bucks on a new Pent ium 111 1when a
Pentium I will do the job. Many radios on the market are equipped w~h a serial port that plugs directly into the computer and
include the software you need. And , some work with the Mac and probably Linux, too , so you aren't forced to use any
Microsoft products,

Or use your own program . There are a number of these applications available, some excellent , some only fair , two of which I
have tried . First, there is Scan Star from Signal Intelligen ce. I have an older version and while ~ has no doubt been
improved, ~ is the most versatile and powerful program I know of. It does many things besides just tune frequenc ies,
including an on-screen spectrum analyzer , the ability to record audio transmissions on the computer's hard disk drive , and
much more. Scan Star has a definite learning curve, ~ takes some time to master all of ~ many funct ions , but ~ is not
necessary to learn all of them to be able to use its most important feature : controlling the radio.

Another program is Radio Max from Future Scanning Systems. This is the one I use for several reasons. It costs much less
than Scan Star , and does everything I need ~ to do. It is fast , has unlimited banks , interfaces to most radios , and it is very
easy to learn to use. You can set ~ to announce time and frequency for each transmission, set delays for how long the radio
wails until ~ moves on to the next frequency , and can record the transmissions as wav files. Demo versions of both Scan
Star and Radio Max are available from the producers .

                                                                                               The Future of Scanning
                                                                                               Those of us who have been
                                                                                               addicted to radios for many years
                                                                                               will miss being able to listen to
                                                                                               the things we once could.
                                                                                               Cellular phones, for example.
                                                                                               Radios made after about 1993 no
                                                                                               longer can cover cellular , and
                                                                                               while there are plenty of
                                                                                               scanners that still do, most
                                                                                               phones are dig~1 so they are
                                                                                               useless unless someone is using
                                                                                               analog . Actually, to me ~ is
                                                                                               boring, listening to people
                                                                                               scream at each other over the
                                                                                               silliest things such as who was
                                                                                               supposed to pick up a quart of

Blacklistedl411                          Volume 6 Issue 3 • Summer 2004                                                       23
milk on the way home . lance worked as a technician for a company that manufactured automated cellular interception
systems, and I had to listen to the calls they monitored in order to test them and get them ready to sell. And then, there was
the guy who was driving around my neighborhood, in a Jaguar, talking for hours to a 900 sex line . b-o-r-i-n-gl Details are in
The Phone Book , published by Paladin Press .

Federal law enforcement agencies have dig~al encrypted radio systems as described above , and there is no way that we
hobbyists are going to defeat them . But keep in mind that they don't always use '10- 10'. They often transmit 'in the clear',

Local governments are sw~ching to Trunked radio because ~ is a better and more efficient system. It also provides more
privacy as described above, makes it much more difficun for the bad guys to monttor while we hobbyists can s~1I hear them
and call in when we see a bad boy .

But Trunked is not necessarily encrypted (although some talk groups are dig~l) and trunking scanners are becoming less
expensive as time passes . I got a Uniden PR0-91 on sale for $150.00 and while tt doesn't have the bells and whistles of the
more expensive models , it is a pretty decent receiver. Later, I moved up to a PRO-95 .

Eventually, the technology to monitor unencrypted digital transmissions, beyond will be available to hobbyists. And, of
course, there will be many services that do not convert to these systems; they will continue to use analog. So even though
the wortd of radio ccmmunlcations is constantly changing, for years to come there will be a great many signals to monttor. It
all depends upon what you want to hear, and of course learning to heart

This article will , I hope , make the fascinating world of scanning a   I~e   easier for those of you who are just discovering tt.

The Last Word
On the eleventh of September, I had just anrived at work to find the dispatcher and everyone in the shop huddled around the
radio , wondering what was happening. They knew only that apparently an airplane of some kind had crashed into a building
somewhere in Manhattan. I had my scanner with me as I usually do and tumed tt on while some of the people were
probably wondering what I could hope to hear from New York .

Since we were hearing tt on the FM radio, the media was aware that something was happening and as I suspected, the local
TVtwo way  radio channels were very active; traffic was heavy .

It took only a few minutes until I knew more than what was on the shop radio . That a hijacked airtinef was on            its way to the
Bay Area . I didn't know how far away ~ was , so naturally I was concemed.

I also a~vated the Emergency frequencies bank in case there was traffic from the HF Red Cross channels (nothing at the
time) as well as police networks like NALEMARS and CLEMARS and also the rarely used frequency the local police can
communicate directly with some federal agencies.

When you have a radio like the PRO-95, you are ready for just about anything . It is good to be informed.

I also have one of those I~e credtt card radios, an Alinco DJ-e5 preset to the local ARES , Amateur Radio Emergency
Service on 443 .100 so I checked in to advise that I was available. And ~ is good to get involved.

Credits

Thanks to Steve Uhrig of SWS Security, for advice and proofreading this article .

Sources
Computer Aided Scanning
Scan Star is available from
Signal Intelligence
PO Box 640891
San Jose CA 95164
408-926-5630
www.scanstar.com

Radio Max is available from
Future Scanning Systems
120 NE DeBell, Sutte 8
Bartlesville, OK 74006
918·335-3318

Frequency Guides
Grove Enterprises
http://www .grove-ent.comiSCANNERBOOKS.htrnl
A nice selection of frequency listings, both books and CDs , and books on all areas of scanning including technical stuff and
radio modifications.

Robert Kelty, Mobile Radio Resources
Mr. Kelty has compiled some of the most comprehensive frequency listings available. Local, State, Federal agencies and the
mil~ry, his works include not just frequencies, but also repeater inputs, PL tones , codes and other useful information. Some
are in book form, others on disk .

Mobile Radio Resources
1224 Madrona Avenue, San
Jose , CA, 95125-3547.

24                                        Volume 6 Issue 3 • Summer 2004                                          Blacklisted I 411
Frequency Allocation Chart
Title: Unned States Frequency Allocations: The Radio Spectrum, March 1996
Stock Number. 003-000-00652-2
Poster, 30x40". Price: $6.00
Description: Shows through color codes the parts of the radio spectrum that are allocated to each type of radio service .
hltps :/Iorders.access.gpo.gov/cgi-binlprfgate .cgi

Order by mail:
Superintendent of Documents
P.O. Box 371954
Pittsburgh, PA 15250-7954

The chart may be available at, or can be ordered through GPO Stores . A list is at:
hltp:/Ibookstore .gpo.govnocationslindex.html

Dignal signals; Samples of many different data transmissions .
Southeastem Wisconsin Monitoring Page
hltp:/Iwww.execpc.coml-ghahn/dignaVindex.hlm

Monnoring Digital Signals Wnh Your Scanner
hltp:/Iwww .lcblanton.comldfw/download.hlm

Technical info on dignal signals
hltp:/Iwww.wunclub.comldigfaqlsignals.hlml
For those interested in the technical aspects, this site has a great deal of information including M ...treams and timing for
many services. Published in 1997, much of the data here still applies to current technology.

Frequency Inversion Scrambling
This site has technical information about FI
hltp:/Iwww.lranscryplsecure.comltechcomer/scrames.hlml

About the author
M L Shannon is a San Francisco writer, relocated to New Zealand, author of several books and a dozen or so magazine
articles on electronic surveillance and computer security. Credns are at WNW.fusionsnes.comlwritlen
Email writer34us@yahoo .com



           For the most realistic, mind blowing kidnapping
                    adventures anywhere period!
   Get kidnapped by our sexy Elite All Girls Team, or get
  your ass kicked by the hardcore and sinister Henchman!
                     Its your choice, but you only live once!




          w w w .             !:: X    r   l~   !:: M l:: f<. I D N A P PIN                      n . CO           M



Blacklistedl411                         Volume 6 Issue 3 • Summer 2004                                                      25
                               --         ...                 -
                                                      By The Goldfinger

Does anybody remembar that TV show from 1996 cal/ad Profiler1 Well , if your like me you watched that show religiously and
was fascinated by Ally Walkers portrayal of forensic psychologist/profiler Samantha "Sam" Waters . Sam was a prcfiler in the
                                                                                                                            '='


FBI's VCTF; Violent Crimes Task Force. She had a special skill that enabled her to "think" in pictures and visualize a crime
through the eyes of both the killer and the victim. The VCTF was in charge of investigating & solving violent crimes all over
the US. The subplot was a serial killer known as "Jack", or "jack of all trades" who was obsessed with Sam after killing her
husband years ago. Bailey Malone (played by Robert Davi) was her friend and mentor and headed up the task force. The
show lasted for 4 seasons on NBC but Ally Walker only stayed on until the 1st 2 episodes of the 4th Season. No offense to
Jamie Luner, her replacement, but the show just wasn't the same without Sam. At any rate, the show was top notch in my
opinion and was about as entertaining as X-Files or the Pretender. However, TV tends to focus on the extraordinary aspects
of such endeavors and downplays certain mundane aspects, as well as taking creative license with certain things there not
sure abou t.

For example, in real life, the ''VCTF'' is called the National Center for the Analysis of Violent Crime, located in northern
Virginia.. The Center Was created in 1984 and provides expertise to U.S. and international law enforcement (LE) agencies
seeking help in solving Violent crimes that are unusual, or particularly vicious or repetitive.

The FBI profilers borne of TV scripts can "see" the crime in their minds. They get vibes and psychic flashes as they walk
around a crime scene, catching glimpses into the crime as it unfolded. NOTI There are no clairvoyants working in the FBI's
Eme Serial Crimes Un~ or more specifically; the Investigative Support Un~ (ISU), formerly known as the Behavioral Science
Un ~. No, real profilers pour Overevidence, police and autopsy reports and crime scene photos.


They stUdy the victim closely. Why was this particular victim chosen ? What made this victim more appealing than someone
else? They learn everything they can about the victim.

And since behavior reflects personality, profilers are trained to think like the offender.

They try to put themselves in their shoes to get inside their minds. Everything they see at a crime scene tells something
about the UNSUB (unknown SUb   ject).

These predators Weave a tapestry of information as they commit these often disgusting and disturbing crimes. There are sa
many choices to make; who to target, when to strike, what weapon to use, where to dump the body... They can choose to
take a life or spare it.

Rape, mutilate, torture, kill, so many choices. But every Choice has real consequences , and every move they make, and what
ever they leave behind is a print of sorts, a personalitY print.

Sort of like a behavioral fingerprint. A profiler will read the behavior from the crime scene and then begin to develop a profile
of the UNSUB. Behavior is the key: What did the killer do that he didn't have to do?

When attempting to link cases together, cases that could have been perpetrated by the same offender, profiler$look for what
they call the "signature".




The Underground Mac (UGM) Is a alte dedicated to providing maclntoah uaers with all their hacking, Security, and
Meaaaging need a. The alte Is was made to help t he macintosh underground community wh ich has rlyn and fallen
over the years . and pro vid e a good place fo r knowledge and toola. The alte haa grown end adapted to the
community and Is nOWone of the largest mac underground alt ... The aite has also grown a lot, It went from a amall
alte to an enormoua alte with many aectlons and hundreda of megabytes In t oola. Th la alte alao opened the doors
f or the network It la now a part of and made It poaalble for many other grea t alt es to rla e. Ugm has e~panded and
helped the community greatly, and It will continue to do ao and continue to grow aa long aa It Is around. It wa s
sta rted by me (Spratt-> but la now the work of quite a f_ people and all of If a content Is made by great
programmers which also playa huge role In the alt e.
A "signature" is sort of like an artists way of signing his work. Many of these creeps consider their stalking , torturing, and
killing people their "work", as ~ does take up a significant amount of time . The signature is unique to the offender. Ifs often a
ritual that provides some personal satisfaction , but isn't necessary to commit the crime. You don't have to torture someone
repeatedly before you rape and kill them. You don't have to pose the body in a degrading fashion once the individual is
dead...but they often do because it provides that extra satisfaction , hence the signature. It fuWills some sick intemal need...

Lets take a step back for a moment and look more closely at the history of profiling.

The "godfather" of profiling was Howard Teten . He joined the FBI in 1962 , and developed it through out the 1960's . Before
joining the Bureau he was a police officer in California and was promoted to crime scene specialist while taking some
criminology classes. His studies had made him look at crime scenes a little differently. He tended to focus more on
psychology , and less on sociology. He, along with his partner, Pat Mullany, developed a training course in applied
criminology and they taught the concept at road schools across the country. Road school is where FBI instructors go "on
tour"out in the field and teach local police new techniques .
They also teach at the FBI's National Academy. They are like short intensive training programs for LE officials to keep up to
date with the latest LE tactics and techniques .

Teten and Mullany continued to teach when the Behavioral Science Unit was formed in 1972.

The fledgling unit did some informal profiling, but   ~   wasn't officially sanctioned.

Back then, the FBI was still "just the facts , ma'am", and Behavioral Science or "B .S." (bullsM) as many at the FBI referred to
it as, was considered maybe one step removed from w~chcraft or voodoo . T he y had to tread lightly.

In the late 1970s, agents Robert Ressler and John Douglas brought a new dimension to profiling .

The new dimens ion was interviewing the killers themselves to gain insight. While teaching at road schools , they began
stopping at nearby prisons and interviewing killers, rapists and other violent criminals. They wanted to know why these guys
committed these crimes and they found that most of them were willing to talk . And why not? Most of these guys were gonna
be on ice for life or were already on death row. According to John Douglas , some of these guys did feel remorse and fett that
maybe by participating in a psychological study they might somehow make some partial amends and perhaps gain a better
understanding of themselves in the process .

Others were crime buffs , and just like being around cops and FBI agents . Many of these type of offenders opted for careers
in LE, but couldn 't hack ~, so they gravitated towards jobs like security guard or night watchman . Th ey often bUy old cop cars
and outfit them with police style equipment , Some of the offenders think that if they cooperate with the "authorities" they
might benefit somehow, though they were never promised anything , accord ing to Douglas .

Some of them simply felt ignored and forgotten and wanted an cpportuntty to relive their murderous deeds in graphic detail .
For others, ~ was simply relief from boredom that a visit from the FBI represented.

However, talking w~h FBI agents in prison is not always a smart move . The walls of the prison hear everything, and you don't
want to be thought of as a rat, so they were careful not to put the prisoners lives in jeopardy . They would often drop in
unannounced for impromptu interviews, that way ~ looked like they were merely being questioned about some crime. You
might ask yourself; Why woutd they even take such a consideration for these sick bastards that killed and raped women and
children and tortured people to death? The answer is because they knew that this information was going to be vital and the
insight gained by these people was going to be priceless, more importantly, it was going to help save lives in the future . PlUS,
these guys were already paying for their misdeeds and so there was no reason to compound ~ by making their miserable
lives any harder.

John Douglas made an analogy that "you can learn a lot about the artist by look ing at his work, but you learn even more by
talking to the artist himself' in his fascinating and riveting New York Times bestseller; Mind Hunter: Inside the FBI's Elite
Serial Crime Unit.

They were learning more and more with each prison encounter, but they needed to figure out a way to organize the research
information into a usable framework. That step came through Roy Hazelwood who had done some research w~ Ann
Burgess, a professor of psychiatric mental health nursing at the University of Pennsylvania School of Nursing and associat e
director of nursing research for the Boston Dept of Health and Hospitals . She was already a prolific author and widely known
nationally as an authority on rape and its psychological consequences.

Roy introduced her to Bob Ressler and John Douglas. He explained to her what they were trying to do, she was impressed,
and agreed to work ~h them. Ann then pursued and obtained a $400 ,000 grant from the National Institute of Justice . The
goal was to interview 36-40 incarcerated felons and see what conclusions could be drawn . Ann and the boys developed a 57
page instrument to be filled out for each interview. John and Bob conducted most of the interviews, documenting pre and
post offense behavior, then Ann would crunch the numbers , an they wrote up the results . They expected the project to take
3-4 years, and in that time, criminal investigative analysis came into the modem age .

By 1983, they had completed a study of 36 individuals, and collected data from 118 of their victims, mostly women . Out of the
study came a system to better understand and classify violent offenders . With this system , they were now able to link what
was going on in a perp's mind with the evidence that he left at the crime scene . This in tum , helped them to hunt , catch , and
prosecute more effectively . In 1998, they expanded their conclusions into a book, entitled

Sexual Homicide: Pattems & Motive s published by Lexington Books.

Still, even with all they leamed, they admitted in their conclusion, "this study raises far more questions than it answers". But
thanks to this pioneering work, todays profilers base much of their accumulated knowledge on those very interviews .


Blacklistedl411                          Volume 6 Issue 3 • Summer 2004                                                       27
Reading about such things   we tend to focus   on the flashy, glamorous aspects of   ~   all.

It all sort of unfolds like a TV show. You find out someone was brutally killed , cops arrive, then the FBI gets involved for one
reason or another , a profiler enters the picture , the media writes up more stories , etc. etc. etc. But what about the person thlll
was murdered? Of course you thought about that, you probably feel bad for them , and their family as well . You might have
even seen a picture in the paper of a body partially covered , or a body bag being loaded into a ambulance.

What we don't see is the crime scene , as ~ was when LE first arrived. We don't see the crime scene photos or know about
the brutal torture , humiliation , domination and control that probably played out minutes or hours before this persons I~e
stopped . If we did, many of us would feel nauseous, perhaps vomit. Many of these crime's are so horrific that even seasoned
homicide cops are shocked and appalled by what they've seen.

In the case of every horrible crime since the beginning of civilization, there is always that buming fundamental question :
"What kind of person could have done such a thing? ' Stories and legends that have filtered down thru the ages about
witches , werewolves and vampires may have been a way of explaining outrages so heinous, no one could comprehend a
person actually doing. These stories were probably a way to somehow explain these crimes . Monsters had /0 be
supernatural creatures, because they couldn 't possibly be like us. Unfortunately, this is seemingly not the case . Every single
murderer/rapist/serial killer in prison today is human, not one va~ire or werewo~ yet.

The Scene of the Crime

The crime scene is where profilers begin the hunt. Scenes can be brimming with evidence like blood , semen , fingefl)rints, a
weapon , hair and fibers or ~ can be seemingly picked clean without any trace or link to the offender. E~er way , the scene
still tells them a lot and provides direction. Profilers will attempt to characterize a crime scene and the offender as e~er
"organized" or "disorganized". In layman's terms, an organized offender's crime is premed~ted , perhaps carefully scripted,
while a disorgan ized offender acts with little or no planning, often taking advantage of "victims of opportunity" . There is also a
"mixed" category for offenders who exhib~ both types of behavionl.

A perfect example of an organized offender is Dr. Hannibal Leete r, In the movie Silence of the Lambs, Lecter displays
classic organized offender behavior . He is manipulative, cunning, deliberate and methodical. He's clean cut, takes pride in his
appearance , and seemingly has no empathy or remorse for his actions . He's very articulate, and pleasant enough on the
surface.

Because of this abil~ to appear non-threatening, individuals like this are able to snare their victims by charming or conning
them . Lecter appears to be a classic psychopath , and a genius, which makes him that much more dangerous.

Organized offenders usually plan out and execute their crimes very methodically.

They usually target their victims and prey primarily on strangers . They bring their own weapon and make sure to retrieve any
spent shells/cartridges, bloody implements, restraints, etc. or olher evidence when they leave. They usually will attempt to
conceal the body , hiding or dumping ~ in another location . The whole crime, from the planning stage , to ~ conclusion is gone
about in a organized way. "Control is of the essence for the organ ized offender ." according to Bob Ressler in his book,
"Whoever Fights Monsters ".

Disorganized offenders, on the other hand, are usually loners with poor social skills.

They often feel inadequate and just have a hard time relating to people or forming normal relationships . They tend to be
disheveled in appearance, and their homes are often unkept as well . Their crimes are often committed on impulse and
against victims of opportun~.

No one is safe from this time of offender , friends , family, neighbors, acquaintances- everyone is fair game. The spark that
sets them off can be a result of mental illness, or drugs and alcohol.

These crime scenes might display victims that were mutilated beyond comprehension and there may be signs of overkill.
Ressler says in his book that a disorganiZed crime scene "displays the confusion of the killer's mind and has spontaneous
and symbolic qualities that are commensurate with his delusions ."

In general terms organized criminals tend to be older, and more matured than the disorgan ized criminal. DisorganiZed
criminals attack closer to home or areas they frequent. Organized predators like to put some distance between their crimes
and themselves .

Then there's the "mixed" category. Crime scenes with elements of both sophistication and chaos would point to an offender
~h mixed characteristics. Possibil~ies include a young offender making the transition from disorganized to organized
criminal; or perhaps a person who has a short temper but can maintain enough control to avoid taking unnecessary risks; or
stressors and an inab il ~ to control the Victim, resulting in a change in the offender's behavior .

Mixed behavioral pattem s can also point to another real possibility: more than one person participated in the crime .

Fantasies

The word "fantasy" is standard in the vocabulary of profilers . You'U hear ~ over an over again.

 Many of the crimes they investigate are actually fantasies that were acted out.

"Probably the most crucial single factor in the development of a serial rapist or killer is the role of fantasy ," Douglas says in
his book , "Mindhunter." Serial murder and rape, like most predatory crimes is fueled by fantasy. These fantasies combine sex
and violence , and though there is often a sexual aspect to the crimes , the sex is often really secondary to power , control and
domination.
28                                       Volume 6 Issue 3 • Summer 2004                                       BlacklistedI 411
Many of these types of offenders feel powerless in their own lives and believe they can overcome thl. by controlling others .

Fantasy continues to playa significant role in the offender's IWe even after the crime has been committed. Many will replay
the events in their mind allowing them to relive the crimes indefinijely. Many killers keep trophies as well, mementos of the
crime that feed his fantasies . A killer might take jewelry from a victim, which he might give to his wife, girlfriend or mom .

He might take a drivers license, a lock of hair, underwear, etc.

He may clip newspaper articles about the crime and keep a joumal. He may even take a severed body part, or parts, in order
to extend the fantasy.

When an offender commits a crime, he views ij as an accomplishment and likes to keep it going, like a former athlete who
pops in an old playoffs tape to relive old glories .

Incarcerated offenders relive their crimes so often that they can provide profilers wijh very specific details during interviews.

"Right in front of you, they will begin to relive the crime and fantasize ," says Jim Wright, former FBI profiler . The crime may be
over, but these guys are constantly replaying ij in their head, like a favorite song .

So you wanna be a Profiler huh?

Well, ij ain't gonna be easy. The FBI is more selective than Harvard. Here's the basics.

First, you golla get accepted to the FBI and become a special agent (SA). These are the MINIMUM requirements. If you don't
meet all these criteria, there's no way you'll get into the Bureau as a SA.

       must be a U.S. citizen or a citizen of Northem Mariana Islands
       you must be at least 23 years old an no older than 37 when you apply
       you must have uncorrected vision that's no worse than 201200; your corrected vision must be 20120 in one eye and no
       worse than 20/40 in the other eye. You must also pass a color vision test to check for color blindness.
       must have a valid drivers license
       you must have a DEGREE from a 4 year resident program al an accredited college
       you must pass a thorough investigation , which includes the following :

Background check

Drug lest: Note to those that don't consider mary-jane a drug; If you've loked in the last 3 years, or Wyou've taken ANY illegal
drug in the last 10 years, your out.

Polygraph exam : you'll be asked about your criminal & drug history , etc. Basically, Wyou got a clean record you got nuthin to
worry about.

Finally, and this isn't "on the books" or offICial, but the Bureau really doesn 't even look at applicants until they have at least 3
years work experience . This is what you have to do before you can even think about getting into profiling. And in those 3
years of gelling work experience , who knows where you'll end up or what other programs you might gravitate towards?

How do you get the kind of experience they would be interested in?

Can you say free inlernships? Hij up every alphabet soup agency you know and tell 'em you'll work for free . Sooner or later, ij
might tum into a paid gig, meanwhile your learning the ropes from experienced pro's in the field, getting ' your resume
together , and getting' that all-important work experience the FBI wants.




      WWW.HACKERSHOMEPAGE.COM
        •      MAGNETIC STRIPE READERSIWRITERS
        •      GAMBLING MACHINE JACKPOTTERS
        •      VENDING MACHINE DEFEATERS
        •      KEYSTROKE LOGGERS
        •      SMARTCARD LOADERS        /
        •      LOCKPICKS

            OUR 8TH YEAR IN BUSINESS (407)650-2830
Blacklistedl411                          Volume 6 Issue 3 • Summer 2004                                                          29
              HACKERS
 AND THE MEDIA
   Hackers getting a bad rap from the media
                      By: Double-o-Jake

Early on, computer and technical wizards who bore the honor of being
called a 'hacker" were highly regarded by their peers and the media
because of their ability to work around problems and 'fix" everything. In
the most generic use of the term, famous people such as Thomas Edison,
Nicola Tesla, Steve Wozniak, Bill Gates and even Henry Ford would easily
fall into the category of the trlle of 'hacker" . Yes, they all thought outside
of the box and rose above normal thinking - to produce the things we've all
come to enjoy and take for granted.

Somewhere along the way, the name ' hacker" became synonymous wrlh
'criminal'. It was in the early 80's some time after the movie War Games.
This was the pivotal time when the media began to bastardize the term. •
Some say that definitions change and hacker now means nothing more
than criminal and, 'ifs too bad, deal with rl: Perhaps, but remember, just
because people say rl, doesn't mean ifs true.

Hackers truly are given a bad rap and ifs a shame. For all the hard work            .;","\
they put into what they love so much and the gigantic leaps in technology and understanding we *all* gain from them, ifs sad
the one term reserved which encompasses anyone who fits the bill as a smarty-pants has been dragged through the mud.
To most of the media, an everyday criminal tagger, who just happens to tag a phone booth, must be a hacker. Hackers are
blamed for everything from cable channels blinking out and static on the phone line to satellites dropping from the sky and
power outages.

You really can't blame people for thinking hackers are criminals. That's all they ever hear. Day after day, they are
bombarded by news heedlines which profile hackers as criminals. Your every day Joe Blow isn't going to dig any further to
find the truth - they'll just take rl for face value and file rl away until the next office meeting, when they blame hackers for
their server going down. Oh, a hacker must have done rll And the viscous path of misinformation continues.

Really, the mainstream media is to blame for the general public's belief that hackers are criminals by their flashy  use of the term. The media loosely uses the term hacker to describe anyone who gains unauthorized access to
a computer system to destroy files, steal information or some other illegal act. nles like, 'Hacker breaks into Pentagon
Computer: ' Hackers are stealing your credrl cards: 'Hackers are watching you: etc...are used for hype value and really only
help to fuel the public's lack of understanding of the hacker culture as well as the good nature of the hacker community.

Hacker community? There's no community of hackersl .... right? Wrong again. There are thousands of hackers around the
world who openly admrl to being a hacker. DEFCON, a yearly convention for hackers held in Las Vegas, NV is the premier
hacker meeting place. Each year, you'll find 5000+ hackers who show up, have a good time, party and then go back to their
normal lives at the conventions end. You'll find people that look just like you, like your neighbor next door, your teacher, even
your parents. There are no boundaries on age, gender, race or technical background. If you read between the lines, yes
there are girl hackers. Pretty cool, huh?

This community is a shared culture of expert programmers, networking wizards, electronic engineers, musicians and
scientists that traces rls roots back through decades to the first time-sharing minicomputers. The members of this very
culture originated the term 'hacker'. Hackers built the Internet. Hackers made the Unix operating system what it is today.
Hackers run Usenet. Hackers make the World Wide Web work. If you are part of this culture, if you have contributed to rl and
other people in rl know who you are and call you a hacker, you're a hacker.

Hackers solve problems and build things, and they believe in freedom and voluntary mutual help. To be accepted as a




                                                               ,
                                         Volume 6 Issue 3 • Summer 2004                                    Blacklisted I 411
hacker, you have to behave as though you have this kind of attitude yourself. And to behave as though you have the
attitude, you have to really believe the altitude.

Mainstream media writers will argue that any use of the term "hacker" defined in any other sense than "criminal" is a
misguided attempt to hold onto an old school belief. Further, they will surely argue that a hacker "breaks into systems,
therefore they are criminals." This argument is flawed. A hacker doesn't necessarily "break" into systems. Somewhere, the
media got ahold of this idea that heckers break into computer systems . Again , probably because of "War Games" where the
main character unwillingly gained unauthorized access to a military computer which controlled nukes. People who do
knowingly break into computer systems by circumvention of the security measures are performing a criminal act. I won't
argue the point, neither will most other hackers in the world. Understand what you're writing about, then maybe you can
make an informed presentation for readers to enjoy rather than another sludge-fest-beat-up-the-evil-hacker article.

In the mid 80's in direct response to the journalists misuse of the term hacker, the altemate term "cracker" was created. The
hacker cuilure came up with this term to help direct the media  to describe the criminal-minded types who
broke into computer systems and did the awful things hackers were being blamed for. For nearly two decades there has
been a fierce fight over the topic of cracker versus hacker. The pro-hackers have been working hard to help the media and
public understand the difference. The media, while generally still using the terminology incorrectly on a regular basis, has
persuaded a few open-minded joumalists to hop on board the hacker band -wagon. Realizing there is a difference, they
make this distinction in their writings. Hooray. There is a bit of good news.

A Quickpoll conducted by ZDNN in 1998 helped prove the point that people are starting to come around. More than 3000
people were polled and 78% of those polled understood the difference . "Hackers are Noble. Crackers break the law."
Another WIN for hackers of the world.

In addition, currently there are several sources online which define the hacker in a warm light

Wired Style : Principles of English Usage In the Digital Age· http://hotwlred.wlred.comlhardwlredlWlredstylei

They state that a hacker is "not synonymous with computer criminal or security breaker."

Jargon Dictionary (ve...lon 4.4.7) - http://Www.catb.orgl-esr/Jargonl

They define hacker as the following: "1. A person who enjoys exploring the details of programmable systems and how to
stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs
enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person
capable of appreciating hack value. 4. A person who is good at programming quickly. 5. An expert at a particular program, or
one who frequently does work using it or on it; as in ' a Unix hacker', (Definitions 1 through 5 are correlated, and people who
fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who
enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated) A malicious meddler
who tries to discover sensitive information by poking around. Hence ' password hacker', 'network hacker', The correct term
for this sense is cracker .·
Please note that they correctly make mention of the term "cracker".

Wlklpedla - htlp:/Ien.wlklpedla.orglWlkJlHacker
They define hacker as the following: "A hacker is anyone who enjoys the intellectual challenge of creatively overcoming or
circumventing limitations, primarily in their fields of interest namely programming or electrical engineering. As will be
discussed below, there is a trend in the popular press to use the term to describe computer criminals, and others, whose
motivations are less pure than the traditional hacker. This trend greatly annoys many of those old-school computerf
technology enthusiasts."
So, what does all of this mean? It means that there's a chance the hacker name may finally be somewhat rid of the stigma of
criminal overtones sometime in the future. As the mainstream media journalists take care in their writings and online
dictionaries correctly make the distinction between hackers and crackers , the general public will slowly become more
educated on the topic. As this happens, so will the good name of hackers be restored. This along with media coverage of
DEFCON and old school hackers who are now CEO's opening up about their past as a hacker really helps people
understand that hackers aren't bad - they're just people... .who are skilled at  their interest in
technology. No longer will the hacker need cringe before he  states in mixed company that they are in fact a hacker.




     We want to hear from our reade... and get some Input on every topic from the articles we print to the
     content on our website. If you have any Ideas, comments, complaints or suggestions, the best way to get
     something done about It Is to contact us and let us know what you're thinking. We are a magazine written
     for the hacker community. We want to have the best possible magazine with the most fresh Ideas and
     subject matter. This Is your chance to help out and get something done. Don't fall prey to the t hought,
     "what I th ink won 't matter" or " let someone else do It." You can make a dlfferencel

     We want to hear from hacke ..., event coordlnato , group leade... , graphic artists, write... , creative
     assistants, magazine edito..., system admlnlstrato , forum moderato... , webmaste... , photographe... ,
     electronic hobbyists, design eng In....., technical writers, field techn ician s and anyone else who is
     Interested In the hacker community In any way. Here's how to contact us :

                                                Blackllstedl411 Magazine
                                            P.O. Box 2506, Cypress, CA 90630


Blacklisted I 411                       Volume 6 Issue 3 - Summer 2004                                                      31
32   Volume 6 Issue 3 • Summer 2004   Blacklistedl411
THE WORLDWIDE WARDRIVE is an effort by security                      HIGH-TECH security/survival books/manuals: Computers,
professionals and hobbyists to generate awareness of the             Intemet, Phones, Energy, Physical SUrvival, Financial, Law,
need by Individual users and companies to secure their               MedicaVRadionics, Mind Control, WeirdlParanormal. Free
access points. The goal of the WorldWide WarDrive (or                Online Catalog at: Consumertronics.net (PO 23097, ABO,
WWWD) is to provide a statistical analysis of the many               NM 87192), or $3 hardcopy (USA/Canada, $7 foreign). See
access points that are currently deployed. hllp :/twww.              display.
wor1dwidewardrive.org/                                               SIX DIGIT LED CLOCKS (with seconds); AC powered,
LOCKPICKING101.COM Open forum discussion to educate                  highly accurate . Several models. Free catalogl Whnerock
yourself and others about lock picking and lock security.            Products. 309 South Brookshire, Ventura, CA 93003. (805)
HACKER ART WANTEDI We're actively recruiting people                  339-0702.-9169 .
to submit artwork to us. We're looking for freehand as well          COMPUTER REPAIRS for Atari, Commodore , Coleco,
as computer artwork of technology, people using technology,          SinciairfTimex, Osbome , TI, TRS-80 and IBM compatible.
events, devices, utility personnel, utility vehicles in action (or   Reasonable flat rate piUS parts and shipping. Buy/SeIVTrade/
doing nothing at all), tradeshows, technology swap meets             Upgrade. SASE appreciated. Computer Classics, RT-l , Box
and hacker meels, comics, etc. If irs related in any way, we         117, Cabool, MO 65689. (417)4694571 .
want artworkll Blacklistedl 411 Magazine, P.O. Box 2506,             CELL PHONE cloning for the guy who has (two of)
Cypress, CA 90630 www.blacklisted411.net                             everything. Must have current service contract. For more
SCANNERS AND SECRET FREQUENCIES. Best selling                        info, call Kerth (512)2594770. 6426, Yuma, AZ.85366-6426.
new 320 page book covers scanning from A to Z. "Useful,              BUILD A RADAR JAMMER out of your old radar detector.
knowledgeable, and readable" (Popular Communications).               No electronic knowledge needed. Only $9.95 + $2.50 S&H
"Wry, cynical, and immensely entertaining" (Paladin Press).          Call 24fr. for easy step-by-step plans. 1-800-295-0953 Visa!
"A must for the radio monnoring enthusiast" (Radio Monnors           MClDis.
of Maryland). "An enormous collection of information...plenty        SEARCH AND SEIZURE. What you need to know before
of great reading" (Monnoring Times).                 "You can't      they knock on your door. Send $8 to Vemas Publishing P.O.
miss" (American Survival Guide). "A high point of scanner            Box 14137 Pinedale, CA 93650.
publication" (RCMA). Only $19.95 + $3 S&H. Check, Money              BOGEN FRIDAY FR·1000 all digital answering machines.
Order to Index, 3368 Govemor Drive, Ste. 273-N, San Diego,           An excellent all-purpose digrtal answering machine with 8
CA 92122. Credn cards only, 800-546-6707. Free catalog of            mailboxes (4 announcement only). Has a total recording time
insider books on scanners, cellular, eavesdropping, cable,           of 18 minutes. $52 each including shipping. GI Electronics
much more.                                                           www.gielectronics .comP.O.Boxll029.Westminster.CA
CELLULAR TELEPHONE. Reprogram from your computer,                    92685
Moloroia bag changed in minutes. Compare, ours is at a               ALL YOUR 802.11B ARE BELONG TO US Unlike any other
much lower cost. Software & manual $199. Loader phone                database system that exists since or during the period of "the
available. Voice or FAX (903)389-8352. Call now. MC/                 collective" (2002), none other has given a retum of the entire
VISA.                                                                collective back to the submitter. The collective is nol a
HACKERSHOMEPAGE.COM - Your source for Keyboard                       mapping database system. It is a mechanism to exchange
Loggers, Gambling Devices, Magnetic Stripe ReaderlWriters,           data in a cumulative fashion for such interested parties
Vending Machine Defeaters, Satellne TV Equipment,                    through       anonymous       assimilation .        http ://www.
 lockpicks, etc...(407)650-2830                                      allyour80211barebelongtous.orgl
 HACKER STICKERS Geeks, Coders and Hackers get your                  BLACKLISTEDI 411 MEETINGS We know some of the
stickers, shirts, hardware and caffeine from www.                    diehards kept the meetings going while we were out of print.
 hackerstickers.com                                                  Thanks guys ll You need to contact us and let us know the
 CELLULAR PROGRAMMING CABLES: For Motorola Flip                      details of your meetings so we can list you in the magazine.
 Series $100, 8000/Brick Series $150, Mobile/Bag: $100                For everyone else. Would you like to start up a meeting,
 (includes handset jack, the only way to program Series 1).           yourself? It's fun, irs easy and you get a free SUbscription
 Panasonic and Mitsubishi Cables $100. All cables are high           out of it. Tell us where you want it held and give us a contact
 quality, professionally assembled and guaranteed. Guide to           name and number or email address. If you want your free
 Cellular Programming, everything you ever wanted to know,            subscription , you'll need to provide an address, of course.
correct wiring diagrams, troubleshooting, etc.: $45. Other            Think about starting a meeting yourself. Blacklisted! 411
 accessories and programming software available. Inquiries           Magazine, P.O. Box 2506, Cypress, CA 90630 www.
to: (714)643-8426, orders only to: (800)4574 556. C.G.C.             blacklisted411.net
 HIGHLY COLLECTIBLE INTEL 4004 Processors. We have                   SCIENTIFIC ATLANTA 8580 $225, 8570 $250, 8550 $150,
these available in NEW OLD STOCK condition. Ceramic as                8500 $120. Will program your 8550, 8500 EAROMS for
well as plastic. Ceramic "04004 " $70. Plastic "P4004" $40.           $7.50. Cable security key gets past collars $25. Add $5
 Shipping cost of $6 not included. We also have P4001/                shipping. No TX sales. Send money order to: K. Perry, PO
 P4002 support devices available @ $26 each, shipping                 Box 816, Leander, TX 78646-0816. Phone: (512)2594770.
 included. GI Electronics www.gielectronics.com P.O. Box              HEAR NON-COMMERCIAL SATELLITE RADIO programs
 11029, Westminster, CA 92685                                         right in your area without the use of a dish or any other
 GET YOUR FREE AD IN BLACKLISTED I 411 Reach                          expensive receiving equipment.           Thousands of these
 thousands of readers in the US, Canada, Japan, the UK,               programs are operating today across America . Programs
 Australia, and elsewhere. Join our long list of satisfied clients    may include talks shows, weather, sport events, news feeds,
 who have made Blacklisted.411 their vehicle for reaching             financial reports, music programs and data ports. This
 customers. Blacklistedl 411 Magazine, P.O. Box 2506,                 technology is received through a high tech. SCSRT1 card.
 Cypress, CA 90630 www.blacklisted411.net                             Find out today what you have been missingl (800) 944-0630.
 SCANNER MODIFICATION HANDBOOK. Bigl 160 pages!                       Credn card orders acceptad.
 More than 20 performance enhancements for PRO-2004 and               USED CELLULAR HANDHELDS:                    Panasonic EB3500
 PRQ-2005. Restore cellular, increase scanning speed, add             portables, includes a batiery (but no charger) forty number
 6,400 memory channels, etc. Step by slap instructions,               alpha memory, good working order, available as an extension
 photos, diagrams. Only $17.95, + $3.50 hipping ($4.50                to your existing line for $279, or as is for $129. Orders only:
 Canada). (NYS residents add $1.38 tax.) CRB research, Box            (800)457-4 556, Inquiries to: (714)643-8426. C.G.C.
 56Bl, Commack, NY 11725. Visa/MC welcome. (516) 543-                 HOME AUTOMATION. Become a dealer in this fast growing
 9169.                                                                field. Free information. (800)8384051 .

Blacklistedl411                           Volume 6 Issue 3 " Summer 2004                                                         33
TIRED OF SA TEST KITS with marginal or inconsistent                 GET THE ULTIMATE CD-ROMI The virus-base contains
performance?         21st Century Electronics and Repair            thousands of fully functional computer viruses, virus
guarantees peak performance with 4Q-pin processor kijs.             construction toolkits and virus related info. $99.95 + $7.00
New, more flexible program with additional features puts            express shipping.          Better hurryl      American Eagle
others to shame. Price $49 each or 5 for $233. 1st time             PUblications P.O. Box 41401, Tucson, AZ 85717.
                                                                                   ,
offered. (404}448-1396                                              OBSOLETE COMPONENTS Are you looking for an old IC
FEDERAL FREQUENCY DIRECTORYI                    Kneijel's "Top      you can't seem to find anymore? We have a very wide
Secref registry of govemment frequencies, New 8th edition.          variety of hard to find and obsolete components available.
268 pagesl FBI, DEA, Customs, Secret Service, BATF,                 Check us out. Odds are, we have the part you need or can
Immigration, Border Patrol, IRS, FCC, State Dept., Treasury,        find ij for you. GI Electronics www.gielectronics.com P.O.
CIA, etc. & surveillance, bugs, bumper beepers, worldwide           Box 11029, Westminster, CA 92685
US milijary, 225 to 400 Mhz UHF aero band, Canadian                 COIN-CP VIDEO ARCADE GAMES. Parts, boards, and
listings, & morel Ultimate "insider's" directoryl Standard          empty cabinets available for your projects.            Cabinets
reference of law enforcement, news media, private security,         available for $75. C.J. Stafford, (301)419-3189.
communications industry & scanner owners. $21.95 + $4.00            WANTED: FEATURE FILM JUNKIE who can access up-to-
shipping ($5.00 to Canada). NY State residents add $2.21            date FAX numbers for hot agents andlor producers &
tax. CRB Research Books, Box 56BL, Commack, NY 11725.               directors. My objective: to bring to their attention my action-
Visa/MC welcome. Phone orders (516) 543-9169 weekdays               thriller script. Can pay by the hour. (909)275-9101
(except Wednesday) 10 to 2 Eastern.                                 THE BLACK BAG TRIVIA QUIZ: On MSDOS disk.
TV      CABLE/SATELLITE             ("GRAY"         MARKET)         Interactive Q&A on bugging, wiretapping, locks, alarms,
DESCRAMBLER EXPOSE. 160pp, illustrated, wijh vendor                 weapons and other wonderful stuff. Test your knowledge of
lists for chips, parts. Law, countermeasures, much morel            the covert sciences. Entertaining and VERY educational.
$23.95 + $3 S/H. Check/MO. INDEX, 3368 Govemor Dr.,                 Includes catalogs of selected (no junk) shareware and
Ste. 273, San Diego. CA 92122. Credit cards only: (800)             restricted books. Send $1.00 for S.25 disk, $1.50 for 3.5, pius
54~707 .       Free catalog of "insider" books on scanners,         two stamps, to: MENTOR PUBLICATIONS, Box 1549-W,
cellular, credit, eavesdropping, much more.                         Asbury Pari< NJ 07712
TOP SECRET SPY DEVICES Home of the Worlds' Smallest                 6.500MHz or 6.5538MHz CRYSTALS Your choice. $4 each.
Digital Voice Recorders and Spy Cameras. We stock many              No shipping charges. Send to TCE Information Systems,
items including: Transmitters, Bug Detectors, Audio                 P.O. Box 5142, Los Alamitos, CA 90721
Jammers, Telephone Recorders, Lock Picks, Voice                     ANARCHY ONLINE A computer bulletin board resource for
Changers, Keystroke Loggers. www.spydevicecentral.com               anarchists, survivalists, adventurers, investigators,
(305)418-7510                                                       researchers, computer hackers and phone phreaks.
EUROZINES AND OTHER CULTURAL HACKER ZINESI A                         Scheduled hacker chat meetings. Encrypted E-maiVfile
one-stop, cutting-edge mail-order source for over 1,000 titles.     exchange.         WWW: hhtp:/!anarchy-online.com         Telnet:
Beautifully illustrated 128-page catalog includes: altemativel       anarchy-online.com Modem: 214-289-8328
fringe science, conspiracy, Forteana, sexuality, computer           WAR DRIVING IS NOT A CRIME The benign act of locating
hacking, UFOs, and much more. Send $3.00 to Xines, Box              and logging wireless access points while in motion -
26LB, 1226-A Calle de Comercio, Santa Fe, NM 87505.                 Wardriving is NOT a crime, being stupid should be. http://
WEB SITES We have a list of hundreds of interesting and             www.wardrivingisnotacrime.comt
unusal web sites. Some of the sites are related to this             ARE YOU A PHOTOGRAPHER?                    With the increasing
magazine and some are not. Hacking, phreaking, breaking             number of high resolution digital cameras in the hands of our
the law, sovereign citizenship, lasers, electonics, surplus,        readers, we're actively recruijing people to submit photos to
credit, etc.. You have to check this out! Save hundreds of           us. We're looking for 3.0megapixel or better digijal photo's of
hours of time by getting our list. We will provide the list on 3-   technology, people using technology, events, devices, utility
 112" disk and you can load ij directly into your web browser        personnel, utility vehicles in action (or doing nothing at all),
and click on the links OR we can provide the list on paper -        tradeshews, technology swap meets and hacker meets. If irs
whichever you prefer. Send $5 to TCE Information Systems,            related to hacking in any way, we want photographsll
P.O. Box 5142, Los Alamijos, CA 90721                                Blacklistedl 411 Magazine, P.O. Box 2506, Cypress, CA
FM STEREO TRANSMITTER KIT. Transmitter broadcasts                   90630 www.blacklisted411.net
any audio signal from a CD player, VCR, or cassette player           HACK THE PLANET A new and exciting board game in
to FM stereo radios throughout your home and yard. Uses             which 2-4 players race to complete a hacking mission.
the unique BAI404IC. Tunable across the FM band, runs on             Please send $3.00 check or money order payable to CASH.
 1.5 to 12 volts CD. PC boardlcomponents, $24. Visa/MC.              Hand-scanned 99XX exchanges in 516 AC. Included may be
TENTRONIX, 3605 Broken Arrow, Coeur d'Alene, 10 83814.               data kit modem numbers, WFAlFA, SSCU, TSAC(SCC),
(208)654-2312.                                                       CO#'s, etc. Send $2.00 check or money order payable to
CALLING ALL WRITERSI We want YOU to write for us.                    CASH and specify exchange. "MCI-Style" Phone Patrol hats
We're looking for articles related to the hacker "scene",            are now availablel Just $18 check or money order payable to
technology reviews, opinions on issues, etc. If you subrnlt an       CASH. 2447 5th Ave, East Meadow. NY 11554.
article for print and we use it, we'll pay you $25-$600,            ATTENTION HACKERS & PHREAKERS. For a catalog of
depending on length, content and the use of additional               plans, kits & assembled electronic "TOOLS" including the
material such as (diagrams, photos, pictorials, schematics,         RED BOX, RADAR JAMMER. SURVEILLANCE, COUNTER
 etc). We require all photos to be 3.0megapixel or greater.          SURVEILLANCE, CABLE DESCRAMBLERS & many other
 JPG format is acceptable. Blacklisted! 411 Magazine, P.O.           HARD-TO-FIND equipment at LOW PRICES. Send $1.00 to
 Box 2506, Cypress, CA 90630 www.blacklisted411.net                  M. Smith-02, P.O. Box 371, Cedar Grove, NJ 07009
 TRUE TAMPER-PROOF Security Screw Removal Bits. The                  PRIVACY ACT           AND SOCIAL SECURITY NUMBER
 super torx kit includes: T-10, T-15, T-20 & T-25. Complete          LIMITATIONS, How anyone can win $10K fine for this simple
 set for $19.60. TOCOM 5503 bit $8.95. TOCOM 5507 bit                violation of your rights. Open a bank account without aSSN
 $19.95. Zenith PM/PZ-1 bij $10.95. Jerrold Starcom brt              $5 plus 3 FIC stamps. Obtain a major credit card without a
 $19.95. Pioneer (oval) bij $23.95. Oak Sigma (oval)bij              SSN (making lt impossible for a bank or any institution to
 $23.95. Securijy Screws available. Tamper-Bit Supply Co.            check your credit history or records) $25 plus 5 FIC stamps.
 (310)866-7125.                                                      For info send $1 and LSASE to: Know Your Rights, c/o R.
 CELLULAR RESTORATION on your 800 Mhz scanner                        Owens, 1403 Sherwood Dr., Bowling Green, KY 42103. NO
 performed expertly for $40 including retum shipping.                CHECKS PLEASE. MIO or FRN's only.
 Guaranteed. Offer expires soon. Keijh Perry, 607 Osage              HARD TO FIND 6502 6800 68000 Microprocessors. We
 Dr., PO Box 816, Leander, TX 78641. (512) 259-4770.                 have a wide array of very hard to find microprocessors and
 6.500 MHZ CRYSTALS $4 a piece, 50 for $115, 100 for                 micro support devices available. If you need it, we probably
 $200. Add $3.00 for shipping. Send checks to C. Wilson, P.          have lt, GI Electronics www.gielectronics.com P.O. Box
 O. Box 54348 Philadelphia, PA 19105-4348                            11029, Westminster, CA 92685

34                                      Volume 6 Issue 3 • Summer 2004                                       Blacklisted I 411
VOICE CHANGING ACCESSORY. Digital voice changing:                 CB RADIO HACKERS GUIDEI New! Big 150 pages;
male to female, female to male, adu~ to child, child to adu~.     pictorials, diagrams , text. Peaking, tweaking and modifying
Use with any modular phone. 16 levels of voice masking.           200 AM and SSB CB radios. Impmvad perfonnance, extra
Connects between handset and phone. STOP THOSE                    capabilities' Which screws to tum, which wires to cut, what
ANNOYING TELEPHONE CALLS! Sound older and tougher                 components to add: Cobra, Courier, GE, Midland, Realistic,
when you want to. Not a kij. Fully assemblad. Use with            SBE, Sears, UnidenlPresident.         $18.95 + $4 S&H ($5
single or multi-line phones. 3O-day refund policy. Ask for        Canada.) NY Stale residents add $1.96 tax. CRB research,
free catalog of our products.         VISAIMC ok.         Xandi   Box 56BL, Commack , NY 11725. VISSIMCaccepted . Phone
Electronics. 1270 E. Broadway, Tempe AZ. 85282-5140. Toll         order M-Tu-Th-F, 10 to 2 Eastem time. (516) 543-9169.
Free order line: (800)336-7389. Technical Support: (602)          S-100 BUSS CARDS for sale. I have piles & piles of 5-100
894-0992                                                          cards I'd like to sell off at $15 each. Vector, Corvus,
MAGENCODERS.COM               Manufacturer of the World's         SpaceByte , Cromemco , Heath, etc. Please contact me for a
Smallest Portable Magnetic Card Reader & Point of Sale            complete list of available rtems. techgathering@comcast.net
Data Loggers. We also have Magnetic Stripe Readerl                AUCTIONS I You hear about them all the time, but you've
Writers, Smart Card Loaders & Copiers, etc... (407)540-           never been to one? You golla GO to one. You can buy just
9470                                                              about anything for pennies on the dollarl Cars, trucks, boats,
UNDETECTABLE VIRUSES. Full source for five viruses                houses, electronic equipment, fumijure , etc. Forget that "cars
which can automatically knock down DOS & windows (3.1)            for $100" crap. Thafs a Ioadl But. you can get some pretty
operating systems at the victim's command . Easily loaded,        awesome deals for small amourrts of cash.. Our favorite
recurrently destructive and undetectable via all virus            auctions (and many of the BL411 staff) include the arcade
detection and cleaning programs with which I am familiar.         auctions and the car auctions. Remember those arcade
Well-tested, relatively simple and designed with stealth and      games you played as a kid in the eo's? Man, you can get
victim behavior in mind. Well-written documentation and live      some bitchen deals on thosel This is only the tip of the
antidote programs are included. Priced for sharing, not for       iceberg . There 's SO MANY things you can get for a small
making a ridiculous profrt. $10.00 (complete) on six 1.44MB,      fraction of their worth. Send $5 and we'll send you a booklet
3.5" floppy discs. Money orders and checks accepted. No           loaded with names , numbers and places to go...You NEED to
live viruses providedl Do NOT ask. Satisfaction guaranteed        do thisl You'lI find out how you can attend the non-advertised
or you have a bad attitudeI The Omega Man. 8102 Fumess            auctions , which will mean better deals for you. Don't miss
Cove, Austin, TX 78753                                            out on all the great dealsl So send $5 right NOW: TCE
NO SOUND ON PREMIUM CHANNELS? It will happen                      Information Systems, P.O. Box 5142, Los Alamitos , CA
sooner or later on your Jerrold DPBB-7 Impulse. Ask               90721.
Manhattenl Soundboard brings the sound back. Best sound           WE WANT WRITERSl Thafs right! We want YOU to write
fix on the market. Easy to install soundboard $24.95. Easy        for us. The people at Blacklistedl 411 are currently seeking
to build soundboard schematic, parts list and common chip         freelance writers to increase the quality and scope of the
number $34.95. Send us your unit and we will install the          magazine. We're looking for quality articles related to the
soundboard for $59.95. SOUNDMAN, 132 North Jardin St.,            hacker "scene" , events, technology reviews , opinions on
Shenandoah, PA 17976. (717) 462-1134.                             issues, etc. If you submij an article for print and we use it,
BAD CREDIT? WANTINEED A VISA CARD? If so, send us                 we'll pay you $25-$600, depending on length , content and
$19.95 (cash/checklMO) and we will send you a very useful         the use of addijional material such as (diagrams , photos,
list of addresses and phone numbers of banks and financial        pictorials , schematics , etc). We require all photos to be
institutions that "WILL" work with you. Most will give you a      3.0megapixel or better.         JPG format is acceptable.
VISA credit card regardless of your credij rating. We even        Blacklistedl 411 Magazine, P.O. Box 2506 , Cypress, CA
include a few banks that will require a deposit, just to "round   90630 www.blacklisted411 .net
out" the list a bit. For an addijional $10 we will include a      NULL MODEMS - Download laptop: or upload to your pc the
small 'how-to " program showing you step-by-step how to           easy wayl wi direct connect, or (DOS 6.1) Customized setup,
improve your credit rating and dealing wijh creditors. You        no bulky adapters , MAC or IBM compatibles. Send $18.95 for
might think that your bad credit doesn't mean anything right      6ft cable, specify 25 or 9db ends, custom ok. Instructions
now.. Wart until you need to buy a house or a car, then you'll    included . P.O. Box 431 Pleasamon, CA 94566 (510)485-
see how much you REALLY need to have GOOD CREDIT.                 1589
So, get back on track. Buy our list and the how-to program        NEW BDOK FOR CABLE HACKING . All about the industry
and start your way back into a good credit status. Cash or        and how to install test chips in nearly every model of
money order. TCE Information Systems. P.O. Box 5142,              decoder. Test chips available, Etc. (408)581 -2380
Los Alamitos, CA 90721.                                           SECURITY SCREWDRIVER BIT SET Our best selling 30
SINGLE DUPLICATION OF CD-ROMS Send your CD and                    piece screwdriver bij set is now available for $40 including
$25 and you will receive your CD and an exact copy. Want          shipping to anywhere in the U.S. The set includes 9 security
more than one copy? Send a addijional $15 for each                Torx bits from TI7 through IT40, 7 security Hex bits from
duplicate. Make checks or money orders Payable tolMail to:        5/64" through 1/4", 4 Scrulox brts from s-o through 5-3 , 8
Knoggin, 582 Merket Street Suije 616, San Francisco, CA           standard pieces , covered plastic case wi a nice handle for all
94114                                                             of the bits, This is an extremely handy toolset you'll wonder
LOOKING FOR A BLACKLISTEDI411 MEETING IN YOUR                     how you ever did withouti TCE Information Systems, P.O.
AREA? Why not host one yourself? Irs easy. Tell us where          Box 5142, Los Alamijos, CA 90721
you warn ij held and give us a contact name and number or         DON'T BUY A MODIFIED CABLE CONVERTERI I'll show
email address. If you want your free subscription, you'll need    you what to do . Where to get parts, everything . Call 24hr.. 1-
to provide an address, of course. Think about starting a          800-295-0953 Only $9.95 + $2.20 S&H VisalMClDis.
meeting yourse~.                                                  SPEECH CHIPS - WE GOT 'EM Yes, we have hard to find
FIND PIRATE SOFTWARE Leam how to find pirate software             speech chips. We have General Instruments SP0250,
on the Intemet. Get thousands of dollar's worth of programs       SP0256, Votrax Se-01, Harris HC-55532, Texas Instruments
for free such as Office97 and more games than you can play.       TMS5220NL, TMS5220CNL and more. Corne and check us
Complete guide includes background, tools, techniques ,           out. We have a wide selection to choose from. GI
locations, and shell scripts that will find software for youl     Electronics www.gielectronics.com          P.O. Box 11029,
Send $5.00 money order or CASH (no checks) to The                 Westminster, CA 92685
Knoggin Group, P.O. Box 420943, San Fransisco , CA 94121-         HACKERS '95 THE VIDEO by Pho~E & R.F. Bums: See
0943, USA.                                                        what you missed at Defcon III and Summercon 951 Plus, our
RAM DRAM SRAM GALORE We have many hard to find                    trip to Area 51 and coverage of the ·CyberSnare" Secret
memory devices available. If your project requires old RAM        Service BUSTS. Elec Cntr Measures, HERF, crypto, and
not available any longer, check us out. We have a very wide       morel Interviews with Eric BlookAxe, Emmanuel, and others.
selection of RAM to choose from. GI Electronics www.              VHS 90 min . Only $25 - distributed by Custom Video 908-
gielectronics.com P.O. Box 11029, Wesllninster, CA 92685          842-6378 .

Blacklisted I 411                       Volume 6 Issue 3 • Summer 2004                                                        35
HACKERS SCREWDRIVER BIT SET Brand new for 20041 MAKE MONEY NOW, HACKERSI Have an interesting story
Our newest selling 60 piece security screwdriver bit set is to share? Write for us and make some money. Have some
now available for $55 inclUding shipping to anywhere in the cool photo's of something nobody has seen? Send il to us
U.S. The set includes 3 Spline bits M5 through M8, 4 scrulox and get PAIDI Doodle on paper all the time and wish you
(square) bits SO through S3, 3 torq-set btts 6 through 8, 12 could catch a break...along with a paycheck? Draw for us
security torx T-5 through T-40, 13 security hex bits 2mm and make $$$! Blacklisted! 411 Magazine, P.O. Box 2506,
through 5/32', 5 tri-wing bits 1 through 5, 3 posidrive btts PZO Cypress, CA 90630 www.blacklisted411.net
through PZ2, two flat bits 1/8" and 3/16 ' , 3 phillips bits 0 ZINE PUBLISHER RESOURCE BOOK If you're thinking
through 2, 5 spanner bits 4 throu9h 12, 3 bowlie bits C1 about publishing or already started publishing a zine, you
through C3, triangle bit 2mmx2mmx2mm, wing nut driver, need this resource booklet. Discover who you can distribute
1/4" x 60mm bits holder, bit holder socket, socket adaptor, your zine through and make more money. Send $14.95,
ratchet screwdriver and a covered plastic case. This is an cash or money order only. TCE Information Systems, P.O.
extremely handy toolset no hacker should be withouli TCE Box 5142, Los Alamitos, CA 90721
Information Systems, P.O. Box 5142, Los Alamitos, CA CELLULAR EXTENSIONS, SEND US YOUR PHONE or buy
90721                                                              a new or used phone from us! Proof of line ownership
SPEECH CHIPS· WE GOT 'EM Yes, Wehave hard to find requlred. We have phones from $129. Call for a list of
speech chips. We have General Instruments SP0250 , available models, we program many different brands
SP0256 , Votrax SC'{)1, Harris HC-55532, Texas Instruments including all Motorola, same day service. On:lers only: (800)
TMS5200NL, TMS5220NL, TMS5220CNL and more. Come 457-4556, inquiries to: (714)643-8426. C.G.C.
and check us out. We have a wide selection to choose from. WANTED: OLD COMPUTERS for my collection. Looking for
GI Electronics www.gielectronics.comP.O.Box11029.Commodore.Alari.Amiga computers, accessories, books,
Westminster, CA 92685                                              cables, software. If you have something like this that you no
A TO Z OF CELLULAR PROGRAMMING. Programming longer                             want ,      please      contact      me    ASAP .
instructions on over 300 phones in a software database. techgathering@comcast.net
Also back door and test mode access instructions for all the NEW BOOK ON HACKING We're going to put together a
popular models; manufacturer's contacts, system select, lock! hard cover book full of interesting stories from hackers,
unlock info. Just $59.95. Orders only: (800)457-4556, crackers and phreakers. If you have a story to share, please
 inquiries: (714)643-8426. C.G.C.                                  send it to us along with some contact information (ie: name,
WE NEED ARTISTSI              We're actively recruiting people to address, email, phone number - we won't publish this
submit artwork to us. We're looking for freehand as well as information), your handle/aliaslpen-name for print. The
computer artwork of technology, people using technology, longer the story, the better. We'd like factual stories, but we'll
events, devices, utility personnel, utility vehicles in action (or consider fictional stories as well. If you have any suggestions
doing nothing at all), tradeshows, technology swap meets on the topic of this book, we'll consider your ideas. Once the
and hacker meets, comics, etc. If it's related in any way, we book is complete, each person who submitted material we
want artworkll Blacklisted! 411 Magazine, P.O. Box 2506, use will get a FREE copy of the book. Please send your
Cypress, CA 90630 www.blacklisted411.net                           material to: Blacklisted! 411 Book Project, P.O. Box 2506,
 GAMBLING MACHINE JACKPOTTERS We offer a Cypress, CA 90630.
 complete range of gambling products designed to cheat ATARIIBALLYlWlLlIAMS ARCADE PARTS We stock hard
gambling machines as well as other games. Our products are to find parts for your arcade games. We have custom ROMs,
designed to demonstrate to gambling machine owners the PROMs, custom sound and speech chips (AY-3-8910, AY-3-
vulnerabilities of their machines. Our product line consists of 8912, AY-3-8913, HC-55532, TMS52oo, TMS5220, SC'{)1,
 Gambling Machine Jackpotters, Emptiers, Credit Adding SP0250, SP0256, LM379, etc), custom video chips
Devices, Bill Acceptor Defeats and Black Jack Card Counting (1MS9928), custom Alari chips (AVG, SLAG, SLAPSTIC,
Devices. Please visit www.jackpotters.com                          POKEY, etc), custom Namco chips, custom Williams ' Special
ADVERTISE IN BLACKLISTEDI 411 Classifieds are now Chip 1", D-to-A and A-to-D converter chips (AD561JD,
 FREE for everyone. Reach thousands of readers in the US, AM6012, AD7533, ADC0804, ADC0809, ete), Alari LED
 Canada, Japan, the UK, Australia, and elsewhere. Join our buttons, Keltron brand Cinematronics flyback transformers,
 long list of satisfied clients who have made Blacklistedl 411 trackball roller repair kits, 6500, 6800 and Z80 series CPU's
their vehicle for reaching customers. Blacklistedl 411 and support chips. We even carry manuals and schematics.
Magazine, P.O. Box 2506, Cypress, CA 90630 WNW. We have a wide selection ofarcade parts \<) choose from. GI
 blacklisled411.net                                                Electronics www.gielectronics.com           P.O. Box 11029,
 KEYSTROKEGRABBERS.COM Manufacturer of discreet Westminster, CA 92685
 keyboard logging hardware. Our devices capture ALL CHIP COLLECTOR I SALVAGE SOURCEBOOK Have you
 keystrokes on a computer including user name and ever looked online for some collectable components or
 password. PARENTS-Monitor your child's intemet. e-mail, vinlage electronic equipment, only to find out that ifs cost is
 instant messaging and chat room activity. EMPLOYERS- way too high? This sourcebook will provide you with the
 Monitor employee computer usage compliance. Employees ability to locate the same items at only a small fraction of the
 will spend less time browsing the intemet and sending e- bloated online cost. Buy collectable gold chips (Intel,
 mails W they are being monitored. EXECUTIVES & SYSTEM Motorola, Zilog, National Semiconductor, etc) for $20-$40nb.
 ADMINS-detect any unauthorized access of your PC. If Do you have any idea how many chips are in a single pound?
 someone uses your computer afler hours, you will know. More than enough to make this sourcebook worth a peekl
 (305)418-7510                                                     Find that Intel C4004 you've been looking for and pay
 ADAPTEC SCSI CARDS for sale. We have AHA-2940, pennies, not hundreds of dollars. Grab a few thousand
 AHA2940UW, AHA-2944, etc. $20-$30 each. We also have EPROMs and pay a few bucks a pound, not a few bucks per
  brand new 3' and 6' SCSI cables $2-$4 each. DB25-to-SCSI, EPROMII Find older high end EPROM programmers for $20-
 SCSI-to-SCSI II, etc. We also have brand new Belkin 15' $30, not $200-$3001 The deals are many, the price is
 IEEE printer cables $3 each. Shipping extra. We have a minimal. You'll be glad you got youlllelf a copy of this
 wide selection of SCSI products to choose from at low, low sourcebook and wonder how you ever did withoutl Send
  prices. GI Electronics www.gielectronics.com P.O. Box $19.95, cash or money order only.                         TCE Information
  11029, Westminster, CA 92685                                     Systems, P.O. Box 5142, Los Alamitos, CA 90721
 INTEL SDK.lJSSYSTEM DESIGN KITS available here. I've BUILD YOUR OWN REPLICA APPLE I 8-bit computer! The
 been collecting this stuff for years. They're in GREAT replica 1 is a functional clone of the first Apple computer.
 condition. $100 each plus shipping. If you're interested, Prices slart at $129. See WWW,vintagecomputer.tk for more
  please conlact me ASAP. techgathering@comcast.net                details,
  Marketplace classified advertising Is cunrently FREE to anyone. It's s first come, first served offer, limited only by
  space constralnls within each Issue. If you'd like an ad placed within Blacklistedl 411, you should send It In as
  soon as possible. We accept both commercial as well as personal ads. We may decide not to publish any ads
  which are Inappropriate or have no connection with lihe hacker community.
                                         CONTACT US AT: www.b/ackl/atlHU11.net
36                                      Volume 6 Issue 3 - Summer 2004                                     Blacklistedl411
 The Social Engineer
 Thoughts , stories and a perspec tive from someone experienced
     in the relatively unknown a rt of socia l engi neer i ng.
I'm sure ff you read Blacklistedl 411, you've heard the term, "Social Engineering " or possibly even know someone very
capable in the art. Because the readers of this fine magazine are most likely in the know, I won't bother going into detail
trying to describe what a social engineer is or how to become one. I'm going to write about some of my experiences and
thoughts on the subject. We'll leave it at that. I hope you enjoy the article , folks .

I've been a social engineer most of my Iffe. Early on, I had no idea and I don't believe there was even a term for ~ at the
time. What I did know was that I could get just about any piece of information I wanted out of anyone I approached or deall
with - both in person, over the phone, on BBS's and the internet when ~ became the new and popular method of
communication. No matter what ~ was, I seemed to have a knack at getting the exact information I wanted. I always
considered myseff a gifted "talker" and didn't think ebout ~ much beyond that.

When the 80's rolled around, the term started to take hold and I realized I was in fact a Social Engineer. I suppose ~ was
cool to know there was a following which deall w~h the SUbject, but I didn 't flaunt the fact that I was good at pulling
information from people. In fact, I kept that piece of information ~ to myseff only until very recently. Today, it's not such a big
deal anymore because social engineering seems to be a standard trait among most hackeB and technical oriented people
alike.

I've noticed, however, that many of the social engineeB of today rely much too heavily on trash digging and gaining access
to information by means of forced entry. There's much more subtle and direct ways to get the information sought after
w~hout using questionable tactics to do so. While trash digging and forced entry may result in getting the information you
want, going to directly to the source of the information will bring in positive resulls time and time again ff you know what
you're doing. I can't stress enough that direct contact is the best way to get the information you seek.

Most people, even today, are generally "easy" and quite susceptible to persuasive measures in a carefully calculated social
engineering conversation. Many people supposedly experts on the subject will tell you that certain "types" of people are
incapable of being worked for information, like cops, "smart" people (notice I didn't say "smart cops"), or technically gifted
people. Contrary to this belief, this is unquestionably not true. The fact of that matter is that anyone can be worked for
information given the proper circumstances and the level of talent of the social engineer.

In my decades of social engineering activ~ies , I've found the following methods to work best:

       In dealing wi1h a computer user or technically gifted person, obvious ly use the subject of technology as an easy "In" to
get the manufactured conversation going. Once going, appeal to their specific interest(s). This works out really well most of
the time. You have to get in "tighr w~ these guys. Nine times out of ten, you'll get what you want fairly quick.

       In dealing with a cop or other authority figure, do not take an aggressive position. This will almost always work against




Blacklistedl411                          Volume 6 Issue 3 - Summer 2004                                                        37
you. Instead, take what appears to be a "submissive" pos~ion and be friendly to them . Further, acting "stup id" will get you
"everywhere" with these people. Before you know it, they're telling you everything you want to know and they won't realize
you're working them. Surprisingly, this method works so well, I've used ~ quite a b~. If you can get over the way ~ makes
you "look", playing stupid is such a perfect method of social engineering. Als o, in add~ion to this, many times cops will
"respect" someone who appears to be very smart , particularty when ~ comes to technology/computers, as long as this person
doesn't also appear aggressive in any way. Most of the time, they'll want you to help them find software or fix their
computer - they rely on help from this type of person. It's an easy "in" for you.

      In dealing with your every day drone (ie: not technically gifted , not really smart), take a position of author~. If you
appear to know what you're doing or know what you 're talking about , these people will subm~ nearty every time without so
much as a single opposition to your apparent authority. This works espec ially well ~ they can 't "see" you (ie: on the phone ) or
~ you wear suilllie and look like someone "above' them . They usually won't question you, and ~ they do, ~ will be a very
weak questioning you can get around . Just be bossy l

        In dealing with pushy or stubborn people you may have to use anyone or more of several methods. These people are
what I cons ider to be the wildcards as they don't tend to fit into any single method of attack . Sometimes pushing back works ,
sometimes playing the role of an authoritative figure will work . What I try to do ~h these people is start easy, ask them for
their full name , extension, department and supervisors name. If they get snippy , I push back real hard and go directly into
authoritative role. I work on them for a minute or two this way and then back up to friendly role . This usually does the trick.
What you're doing is putting them on the defensive, making them realize maybe you 're someone important and then they
start thinking about losing their job or freedom in some way . Once you s~ch back to being friendly, suddenly thay have
"out" which comforts the crap out of them . Suddenly, you're in a position to get information.

These are the four bas ic personality types I have dealt w~h and the methods I've used to get results . Naturally, your mileage
will vary greatly on your skills. I've fou nd that your physical size , powe r of your voice , your knowledge of the subject matte r
and they way you groom yourse~ will greatly affect what you can and cannot do when ~ comes to social eng ineering . For
instance , if you're BIG , play ing the role of author ity works great. If you're small , playing the role of ' submissive' works fine . If
you have a loud voice, but your small , you can play authority role on the phone . If you're big but have a soft voice , you can
play the submis sive , stup id or friendly roles with ease . Naturally, ~'s easy to figure out what roles you 'll be best at. W ith
practice, you can be excellent at each and every role , leaming to control your voice and change you r attire according to the
s~u ation at hand , etc.


Now, I'll briefly mention a couple of the more interesting experiences I've had.

No kidding , lance played the role of a "secret agent " (authority figure ) when I was younger (ok, I had a deep voice ) and was
able to get an individual to give up a login and password for a BBS he frequented. It took all of 2 minutes , a conference
phone and a really pushy att~ude. I had effectively scared the information out of him . Later , I discovered the guy had pulled
all of his com puter eq uipment apart and hid ~ away. Heh , that was very funny at the time.

One time a buddy of mine was starting up a new business to com pete with a sleazy company which had screwed him over in
a business deal eartier that year. He needed some information on the vendo rs and custome rs the company was dea ling w~h
so he could move in on them , offe ring superior product and support. He unsucce ssfu lly attempted to gain this information
several times. I was asked to help out in the situation. I agreed because ~ seemed harmless enough. So , I scoped out this
company for a day to figure out who was who and the movem ent of the workers. I then went into the establishment and
immediately started grilling the secretary running the front office (playing authority figure , never even id e n t~i n g myself). With
a small notepad in hand , I asked her for her name (first , middle , last) , her bosses name , the names of the people in the
warehouse , etc. I scribbled on the notepad as she spoke . She started to ask me , "what's this all abour and I ignored her,
cutting her off ask ing more questions - how long have you worked here , are they mistreating you in any way (surpris ingly , she
said YES I), then I asked her several questions on how she was mistreated and ~ ' she was the one who contacted the
authorities'. Suddenly, the floodgate opened up for me. She told me no, but she immediately opened up to me - this is when
I M her with the real questions. I asked her for information on vendors and customer information and told her that ~ she
cooperated, she would not be prosecuted. After only 8 minutes of direct contact and I had a complete list in hand. I eve n
told her ' thank you."

Obviously , the authority role has always worked well for me. However, I should mention that every other role has worked
well, too . I guess I can look pretty stupid when I play the stupid role . :-)

Again , I'm a big believer that all information can be gained from your target, using legal yet persuasive methods. I've never
had to dig in the trash and I've never had to break into an office or a desk to get information I wanted . If you stick ~h ~ and
work on your methods , you will become a skilled social engineer., capable of getting information on demand . Ifs really a very
useful tool in today's wortd . Social engineering is an incredible asset.




                                                                 tf
                                          Vo lume 6 Issue 3 • Summer 2004                                          Blacklisted I 411
                                     G.I. ELEC1'RONICS
                YOUR BEST SOURCE FOR HARD TO FIND AND OBSOLETE COMPONENTS
                                 WWW.GIELECTRONICS.COM
          DRAM/SRAM                                                 6800/68000               SPECIAL SERIES
  1101               518.00    ZBO                 52.00   6800                   $4.00    Io1C1415       $8 .00
  1103               515.00    ZBOA                $4.00   5802                  510.00    AM2901         $8 .00
  2018                 $5.00   ZBOB                58.00   8803                   51.00    AM2903        520 .00
  2101                 $8.00   ~TC                 52.50   8508                  512.19    AM2907         $8 .00
  2102               510.00    ZBOAoCTC            $4.50   5a09                   $8.00    AM290I         $8 .00
  2104                 $8.00   ZBOBoCTC            58.50   5a09E                  $8.00    AM2910         $8 .00
  2107               515.00    ZBO-f'IO            53.00   8810P                  52.11    AM2911         $8 .00
  2114                 $5.00   ZBQA-PIO            53.50   8810                   59.99    AM2914        515.00
  2115               515.00    ZBOB-OART           $3.00   8821                   $8.00    AM2960        515.00
  2117               512.00    Z80A-oART           $3.00   88B21                  $5.00    AM2984        514.00
  2128                $8.50    Z80-S10I0           $4.00   8840                   $8.00    AM29118       520.00
  2147                $7.00    Z80A-SIOIO          $4.00   5850                   $4.00    AM29518       520 .00
  2148                $8.00    ZBOB.sIOIO         $4.00    58000P8                $4.19    AM29701        $8.00
  2149                $1 .00   Z80-SIO/2           $4.00   88OOOP10               $5 .19   TM59927       $35 .00
  X2212               535.00   ZBOA-SIOI2          $4.50   88000P12               $8.11    TM59128       $45.00




                               ............
  27503                $5.00   Z84C00-4            58.00   88000U                514.99    OG201          $4.50
                               Z8530 5CC           S8.00




                               -
  4018                 $8.50                               58000Ll0              518.19    LF13201        $4.50
  4027                 $4.00   Z8803R5            520.00   88000L12              517.11    LF13331        59.95
  4118                 $4.00                               88008                 510.00    CD4016         51.50
  4118                510.00                                 EPROM/EEPROM                  CD4Oll8        52.00
  4184                 $4.00   8502                55.00   2518                  510.00    LM324          $8.50
  4418                 $8.00   5502A               $8.50   2532                  518.00    LM3900         $8.50
  4801                510.00   8502B               $8.00   2584                  515.00    TLOIl          53.50
  5101               510.00    85C02               $8.00   2708                  515.00    TL0I2          $3.50
  5114               525.00    8504A               $8.00   2718                  510.00    TL084          $4.00
  5118                 $8.00   8507                $8.00   27C18                  $8.00    WDl0l0        515.00
  8284                 57.00   5510                $8.00   2732                  512.00    WDl014        515 .00
  1101                 $8.00   8512                $8.00   2732A                 510.00    lnl           515.00
  1128                 $8.50   5520                $8.00   27C32                  $8.00    1781          515.00
  74581               $5.00    5522                $8.00   TM82732               511.00    1793          515.00
  13415              515.00    85C22               $8.00   TM82732A              511.00    1715          515.00
  13411              510.00    8525                $8.00   2784                   $4.50    1717          515.00
  13422              515.00    6528                57.00   2784A                  $4.50    2713          $21 .00
  82509              515.00    5529                57.00   27C84                  $2.00    2797          521.00
     SOUND/SPEECH              5532                $8.50   27128                  $3.50    D5P32010      515.00
  AY-3-ll110        515.00     5551                58.00   27128A                 $3.50    TMS32020      515 .00
  AY-3-llI12        515.00     6551A               $8.00   27Cl28                 $2.50    TMS3S010      515.00
  AY-3-llI13        518.00                                 27258                  $4.50    TMS4500A      515.00
  COl22948          515.00                 PROM            27C258                 $2.00    TM55501NL     $45 .00
  LM3715             525.00    82823              515.00   27512                  $5.50    TM55502NL     $45 .00
  Io1B373O           $35.00    825123              $8.00   27C512                 $2.50    8X300         515.00
  sc-et              $45.00    825128              S8.oo   27C010                 55.00    8X305         515.00
  8P0250             $35.00    828129              58.00   27C010A                55.00    G1718-35C     510.00
  8P025f             535.00    825130              51.00   27C02O                 $8.00    N3oo21        535.00
  TDA1004            525.00    825131              S8.oo   27C040                 59.00    N532201       510 .00
  TDA2oo2            515.00    828137              51.00   27C080                 59.00    N832203       510 .00
  TM85200NA         $25.00     828140             518.00   27Cl024                $8.00    P4004         $40.00
  T10155220NA       525.00     828141             518.00   27C2048                $8.00    D4OO4         570.00
  TM85220NL         525.00     825147             $20.00   27C4098               510.00    INS4004       $6ll.OO
  TM55220CNL        530.00     828153             525.00   NC7055                $35.00    P4001         520.00
  HI55532           555.00     825180             512.00   ER2055                535.00    P4002·1       520.00


                                 WWW.GIELECTRONICS.COM
                           GI ELECTRONICS, P.O. BOX 11029, WESTMI NSTER, CA 92685

Blacklistedl411                        Volume 6 Issue 3 • Summer 2004                                          39
       ANIGA RESOURCES
                    finding parts and support for these aging computers
                                                 By Wild E, Coyote
Ok, so ~'s been almost two decades since the introduction of the Amiga line-up and you're still holding onto your aging
collection of once leading edge computer equipment in hopes there will be a resurgence of the long since disbanded group of
Amiga enthusiast. Well, perhaps that 's not entirely fair . There are still a very large number of people who are pre>-Amiga and
hold onto their equipment and actively support their computers . However, many of the original of the Amiga enthusiasts are
no longer active, which makes the task of finding others with the same interest somewhat difficutt . Lucky for everyone , the
Blacklistedl 411 crew and an undetermined number of people on the intemet still hold a place in their hearts for the Amiga
computers and don't mind adm~ng it. We'll try to direct Amiga lovers to others with a similar interest.

Will the Amiga ever be at the level it was before the crash of Commodore? Possibly , but not w~out the passage of time and
a lot of effort. But that 's not to say there won't be some exciting equipment to be produced in the near future which is based
on the Initial Amiga design in some way. For instance, the Amiga One is now available to Amiga lovers and offers many new
features and advanced arcMecture. It's sure a hot topic and is the best thing to happen to Amiga in a long time.

So, here's our small listing of Amiga resources. If you'd like to have a resource listed in an upcoming issue , please contact
us either by mail or through our website at hllp :/Iwww.blacklisted411.net

NEWS AND INFORMATION:
AmigaOS - hltp:/Ios.amlga.com/
Run by the current owner of Amiga, this s~e is worth the look if you're into the Amiga . There is a forum section complete ~h
recent postings and new topics . The Amiga One forum is actually quite busy with traffic . There is even a dealer section
where they list Amiga dealers . That's sort of cool.

DEALERS & MANUFACTURERS:
Amlga Forever - hltp:/Iwww.amlgaforever.com/
Official s~e of the Amiga Forever emulation software - for those who want to run workbench on a Windows machine.
Currently , version 5.3 is available . It's actually nice for a PC Windows software . If we can't keep people with the Amiga
through the hardware , maybe we can keep them through software .

EyeTech · http://www.eyetech.co.ukl
Interested in the new Amiga One, check this s~e out. There's plenty of information on the Amiga One as well as older Amiga
computers and accessories. They list all the dealers who carry the Amiga One at hllp :/Iwww .eyetech .co.ukldea lers.php
Check them out, they're worth the visit.

Software Hu1 - www.softhulcom
A mail order Amiga dealer from the old days which is still in business . They have new, used and everything in between .
We've bought from them many times and think they have a good thing going.        .

RESOURCES:
AMI SECTOR ONE - hltp:/Iamlga.emucamp.comllndex2.htrn
A great resource for emulators, games, demos , applications, music, etc. They've been around awhile and the y've become a
wonderful place to vis~. Check them out.

Amlga.org - hltp:/Iwww.amlga.org/
A great resource complete with a forums section , images, advertisements, etc. It's an interesting site worth the look , so if you
have the time , vis~1

Amlga Forums - hltp:/Iwww.amlgaforums.org/
This is another Amiga forum site run on phpBB. I personally think that the forum sites are some of the best resources
available right now. It can put you in touch with a lot of other people ~h similar interests . Anyhow , this forum site is current
with a lot of activity . Again , worth the look.

Amiga Source - hltp:/Iwww.amlgasource.com/
Excellent s~e filled w~ links to over 1400 Amiga related sites spanning over 41 categories. You 'll find this s~e to be worth
the look in that you'll find MANY other Amiga resources .

Total Amlga - hltp:/Iwww.totalamlga.org/
A real honest to goodness Amiga PRINT magazine . One of the last, if not the last print magazine fo r the Amiga . This
magazine used to be called ' Clubbed' but they changed the name ~h issue 10. They're now to issue 17 which was just
printed as of 02119/04. Go and gel a subscription .

40                                      Volume 6 Issue 3 • Summer 2004                                     Blacklisted I 411
   Hacker/Phreaker BBS Stings
                                      By Gary D. Robson for Blacklistedl411

                                                               · t 1iii' ·~ i·"                                                r ··      #'
Law enforcement has a mixed response to hacking. Most agencies don't understand what it is, and don't know the difference between an
old-school hacker, a white-hat hacker, a cracker, a phreaker, or a virus author. The laws are often ambiguous, and prosecution is
dependant on who, exactly , is hurt-or thinks they are.

Intemet-based stings are getting fairly common. There are regular courses taught in the development of "honey pots" on corporate
networks, and whole books about catching invaders in computer systems.

There are a lot of ways to set up a sting. Read Cliff Stoll's book. TheCuckoo 's Egg. The whole book describes one large hunt for a digital
invader (Hans Huebner, e.k.a. Pengo), including an elaborate sting where he created a fictitious government project as bait.

When Janaka Jayawardene was trying to track down the cracker that had invaded his systems at Portland State University (a minor, using
the name Phantom Dialer), he used a classic cracker technique - the Trojan horse. He modified the telnet program to keep a keystroke log
so that he'd be able to see everything that Phantom Dialer did when using telnet from the Portland State University computers. The tale of
Phantom Dialer is told in the book. @ Large: TheStrange Case ofthe World 's Bigges t Internet Invasion .

These operations, fascinating for the way they pitted hacker against cracker, don't fit the classic law enforcement definition of a sting,
though, because they had a very specific target right from the beginning. A more classic sting was the Phreaker', Phortress.

The Revenger and the Phreaker's Phortress
In 1985, most police officers had never used a computer, and had no idea what a modem was. Sgt. Dan Pasquale of the Fremont Police
was an exce ption .

Fremont. California is big enough to be called a city, but small enough to feel like a town. There are no high-rise office buildings,
subways, and other trappings of big-city life. The police headquarters building overlooks a big lake in Central Park. and has a view of the
mountains at the edge of town. With 100 square miles of land, Fremont has plenty of space to spread out. and it does.

Fre mont, however, is no stranger to technology. It is at the edge of Silicon Valley, a few miles from San Jose. It was inevitable that
technophiles would find their way onto the Fremont Police Department, and Pasquale was one of the first .

He had a Commodore 64 at home . just for fun, and the thought of combining his job in law enforcement with his computer hobby didn't
occur to him until he arrested a juvenile for shoplifting. The kid was carrying a stack of credit card receipts he had pulled from a
dumpster, and Pasquale asked him what he intended to do with them. As they say in the gangster movies, the kid sang like a canary: He
was part of a group that traded and/or sold credit card numbers .

Pasquale was fascinated by the whole computer underground and the BBSs that were popping up all over the country. He asked his
superiors at Fremont PD for approval to set up one of the country 's first sting BBSs. and wu told that she department would authorize a
couple of hours a week of his time, but wouldn't cover all the expenses of setting up and operating the BBS .

There was no problem finding Silicon Valley companies that were concerned with computer fraud and cracking at the time, and Pasqua le
went hunting for support. Apple Computer donated an Apple lIe computer with an extema140 megabyte disk drive (that was a lot of disk
space in 1985) and a 1200 baud modem . Since his primary targets were people stealing credit card numbers and long-distance calling
cards. he a lso got support from the credit card companies and phone companies.




                                         Photographs!
     If you have a photo of a payphone , local telephone company vehicle or building, local cable
     company vehicle or bUilding, Interior of a telecomm, or othe r utility building, inside a
     manhole, Inside a utility box or some other Interesting Item, please send them to us along
     with a short "memo" explaining what it Is that we're looking atl

     If you send a photo that we end up using In our magazine , we'll mention your name along
     with the photo ,
                                             Send to:
            Blackllstedl411 Photograph Submissions, P.O. Box 2506, Cypress, CA 90630


Blacklisted ! 411                                                                                                                      41
Visa, MasterCard, and Wells Fargo Bank all created credit cards just for Pasquale 's sting . The cards had $500 limits, and the verification
systems were set up to track them. AT&T, Sprint, and Mel donated calling card numbers with similar tracking.

The local phone company. Pacific Bell, agreed to install a telephone line into police headquarters that was shown on all the records as
being in a nearby apartment complex. Pasquale said that the only way of actually tracing it to the police would have been to crack the 911
system- that was one thing Pacific Bell would not agree to mess with. All other verifications,includingcracking the switches and social-
engineering operators, would have led to the false front in the apartment.

With the infrastructure coming together, the next thing Pasquale needed to do was go undercover himself. He adopted the handle "Speedy
Da Mouse" (for his favorite cartoon character, Speedy Gonzales), and started joining all the underground BBSs he could find .

Sysops of crackinglphreaking boards were justifiably paranoid, and most required verification of a new user's true identity . Often, this
involved a telephone conversation. Pasquale said, "Even then, I didn't sound like a 17-year-old, so I needed another way to buy into their
confidence." That way was card nwnbers .

On virtually every board he contacted, giving them a valid credit card number or long-distance calling card nwnber was all the In he
needed. Speedy began developing an identity .

Even as Speedy Da Mouse infiltrated BBSs across the country , Pasquale was putting the finishing touches on his sting BBS . The Apple
lIe went into a broom closet at police headquarters, and Pasquale created a main board with five sub-boards. Most of the maintenance
could be done from his Commodore 64 at home, so he didn't actually have to climb in the crowded closet with the Apple very often .

The BBS took shape. He built sub-boards specifically for stolen credit cards, phreaking, and cracking. In September of 1985, Phreaker's
Phortress went online .

The SYSOP of Phreaker's Phortress was another Pasquale identity : The Revenger. Speedy Da Mouse posted messages on every BBS he
knew of, announcing this cool new boardin California, and vouching for The Revenger.

I asked Pasquale what made the Phreaker's Phortress look real . "It was real," he replied . Sure, there were users who suspected this
unknown Revenger guy of being a cop, but their suspicions went away when he handed out bait.

Throughout the remainder of 1985 and into early 1986. Pasquale gathered evidence and continued to leam about his BBS and the
computer underground. He found, for example, that as he was monitoring the BBS one day, someone pressed the Z key 36 times, and was
immediately given full access to the board . He contacted the company that had written the BBS software, and they sheepishly admitted
that they had written this back door into the program to allow them to check on installations and see if they were legitimate, and to help
sysops that locked themselves out of their own BBSs .

In late March, Pasquale went full-time. For two weeks, he got his warrants, and built up to the arrests in April. Seven of the targets were
locals, two were out-of-towners who lived elsewhere in California, and another half-dozen were from other states . He rounded up the
seven locals and turned the others over to appropriate agencies. To the best of his knowledge, the Feds never even followed up on the
ones from out of state.

The seven locals all turned out to be juveniles. He had them red-handed, not just for computer intrusions and theft of long-distance
service, which the courts didn't understand, but also for having and using stolen credit cards . All seven pled guilty to possession of stolen
property. They had their equipment seized, and they cost their parents a bundle in legal fees and fines .

Since they were minors, their court records were seale d when they turned 18. Their names were never disclosed to the press. I asked
Pasquale if he had kept in touch with any of them . He told me that one had become a nuclear engineer and joined the military . As of a
couple of years ago, he was serving on a nuclear submarine.

When Pasquale took down Phreaker's Phortress, the credit card companies and long-distance companies shut off their bait cards. "Were
they out a lot of money?", I asked Pasquale . Actually, he told me, they went after the parents of the kids for reimbursement of everything
they charged on the cards. In some cases, however, it was merchants that got stuck.

Visa and MasterCard have very strict rules about verifying purchases. These days, your card is run through a reader that dials up a
verification service . In 1985, merchants were supposed to call themselves to check out purchases over a certain limit. In one case, one of
the credit card thieves had purchased $3,000 worth of computer equipment, and the store never bothered to check the card, which only
had a S500 limit. Because they broke the rules by not verifying the card, the store was stuck for the money. Their only choices were to
write it off or sue the parents of the kid that bought the equipment.

As you can see, even though the criminal investigation may only net probation and confiscation of computer equipment, the civil lawsuits
can drag on for years and cost thousands of dollars in legal fees and eventual settlements.

Could a sting like Phreaker's Phortress happen again today? You bet it could . Pasquale doubts that a BBS sting would be worth it
anymore, because everyone has moved on to the Web. There are still BBSs, although most of them are accessible through the Internet
rather than dial-up, but nothing like the hundreds of underground boards that existed in the 80's.

Today, Pasquale said, a sting like that would be done with a Web site . I asked Alameda County (California) Assistant District Attorney
Don Ingraham if a similar Web sting had ever been done. Yes, he said, it has.

The Legality of a Stin g
There's nothing new about stings. Law enforcement has used them for decades . Ingraham explained that the only things police need to
watch out for is entrapment. Pasquale set up a BBS and allowed people to talk about what they were doing . They freely shared stolen card
numbers and bragged about their cracking and phreaking exploits. They did it on a system that he had the right to monitor.

"You can't seduce innocent people," Ingraham said . If you talk someone into committing a crime that they wouldn't have otherwise
committed, that's entrapment. If you give them an environment where they can discuss the crimes without actually encouraging them to
commit crimes, you have a legal sting .
42                                          Volume 6 Iss ue 3 • Summer 2004                                          Blacklistedl411
It's hard to arguethat stealing credit cards is moralor ethical. It's theft. Often, however, crackers present argwnents that breaking into
systems is a benefi t to society . Ingraham appeare d on TV 's Geraldo show with Craig Neidorf-the famed Night Lightning. Neidorf made
precise ly that argume nt, explaining that by finding security holes and poi nting them out, he was improving security and making the
systems better . Geraldo asked Ingraham whethe r he consideted Neidorf's cracking (Gera ldo, of course , called it "hacking") a public
service.

"Right, " responded Ingraham, "and just like the people who rape a co-ed on campus are exposing the flaws in nur nation's higher
educationsecurity It's absolutenonsense. They are doing nothingmore than showing off to each other andsatisfying theit own appetite
                  .                                                                              ,
to know somethingthat is not theirs to know ."

Neidorf and Ingraham represent two ends nfthe spectrum, and most of us are in the middle somewhere . If you break into your brother 's
computetas a gag. most people would not considerthatto be a crime . If you break. into Bank of America'scentral computerandtransfer
a few milliondollarsto yourown account, it's pretty obvious that'sa Federalcrime.

I asked Ingraham whether he still agrees with what be said on Geraldo over ten years ago. "Absolutely," he responded. He explained that
he wasn 't actually equating the severity of breaking into a computer with committing a rape, but that be felt the comparison of logic was
perfectly valid.

We also discussed Ingraham 's opinion ofNeidorfs case. As you may recall, Neidorf was the co-editor of Phrack who was arrested for
publishing a document stolen from BellSouth. The document was lifted by a member of the Legion of Doom, who went by the handle of
Prophet . He copied the document from BellSouth ' s computer as a trophy , to show that he had actually been there . It passed through
several hands , and finally made its way to Neidorf, who edited it down and printed it in Phrack .

The document, which became known as the "E91 I document," was a description of the BellSouth Extended 91 I service. Not the
equipment-theservice. There was virtuallyno useful information aboutthe computersat all. BellSouth claimed the document to have a
value of $70,000, which made the theft and possession major felony offenses. It was only after the E911 document was found in a
directory of products offered by BellSouth, and court shown that anyone who wanted it could get it for $13, that the trial began to fall
apart.

Ingraham, who was responsible for overhauling some of Califamia's search and seizure laws, felt thatCraigNeidorfwas a nice guy that
was taken down by a very bad warrant. Unlike many prosecutors, Ingraham is no stranger to the world of hacking. cracking, and
phreaking. He subscribes to 2600, andregularlyreadsPhrack and BlackJi ted1411 . He believes that publications like this are covered by
                                                                      s
the FirstAmendment,andthattheycontain useful information as well.

It's unfortun for Neidorf that he was in Chicago rather than Alameda County California It sounds like he would have faredmuch
             ate                                                           ,          .
better.

What Should You Do About Stings?
If you 're not doing anything illegal, a sting hoard (or Web site) shouldn't be anything for you to wnrry ahout. Unfortuna tely, that ' s not
always the way it works.

TIle laws in this country are based uponthe assumption that individuals are innocent unless they are proven guilty. It is likely, however,
that if you get involved in a board wherecriminalactivitiesare being discussed, you will end up being investigated. Even if yo u are never
charg with a crime, it could cost you money for legal fees anda greatdeal of potential hassle if yourequipmentis impounded
      ed                                                                                                                        .

Your bestbet is to stay clear, orjust lurk.You just neverknow who's on the otherend of the network ,



You're a technophile looking for a convention.
We're a convention looking for technophiles.
It's funny how that works out, isn't it?


                                                                                                ~Layerone



Blackllstedl411                             Volume 6 Issue 3 - Summer 2004                                                               43
r
J"
                DU.h\P/TIIJ DIVING
                 The talent of digging up valuable items from a heap of garbage

                                                      By Trash-DOX

You may have heard the tenn ·dumpster diving · a few times and wondered to yourself what ~'s all about. It's easy to imagine
~ as a sport of some kind where someone jumps off a roof into a dumpster. I mean , there have been much more crazy
"sports" out there , so why not? Maybe, but thafs not what ~ is. In fact , dumpster diving isn't really a sport but rather a way of
living. In a nutshell , dumpster diving is nothing more than the act of digging through the trash. I'm sure you know what a
"trash digger" is, right? Dumpster diving is what a trash digger does , most likely to make a living or to obtain something with
perceived value lor no cost at all.

According to the dictionary jargon file, Dumpster Diving is defined as:

"The practice of raiding the dumpsters behind buildings where producers andlor consumers of high-tech equipment are
located, with the expectation (usually justified) of finding discarded but still-valuable equipment to be nursed back to health in
some hacker's den. Experienced dumpster-