DOS=spC>p%NJg "@"NbCNJg @ hpNupNudos.libraryexpansion.library&ne will display shaded blocks. RCL # 7 6 to select NAM. Phone will show 76- Press 0 # to program NAM 1. (NAM 1=0,NAM 2=1,NAM 3=2,NAM 4=3) RCL # 7 1 to enter programming mode. XXXXXXXXXX PRESS # MIN 1234 PRESS # LOCK CODE _ _ _ _ _ PRESS # SID 10 PRESS # GROUP I.D. 0334 PRESS #  INITIAL PAGING CH 0 PRESS # SYSTEM SELECT (1=A) 07 PRESS # ACCOLC 1 PRESS # MIN MARK 1 1 PRESS # LOCAL USE 911 PRESS # EMERGENCY NO. Press Clr (and hold) to exit programming and return to TEST MODE. Press RCL # 0 2 to burn and exit to standby. THESE INSTRLwUCTIONS FOR SERIAL NUMBERS PRIOR TO 135-839601 Insert NAM Programming Cable (41-2019) PWR on RCL # 7 6 to enter TEST MODE Press 0 # to select NAM. RCL # 7 1 You are now in Programming Mode. Enter NAM info as above. Press and hold CLR to exit. Pwr down. Programming Instructions for: NEC P9100 ACTION TO STORE DISPLAY USED EQUIPMENT: TO DISPLAY CURRENT UNLOCK CODE - UNLOCK CODES WILL BE  \TXCHANGED ONLY IN PROGRAMMING MODE FOLLOW THE INSTRUCTIONS THAT FOLLOW Make sure NAM battery is fully charged before attempting programming Switch power on Press RCL #01 display will then show shaded blocks For a USED phone - to clear nam and accumulated call timer Press RCL #39 To program NAM1 Press RCL #760# To enter programming mode Press RCL #71 XXXXXXXXXX Press # MIN 1234 Press # Lock Code _ _ _ _ !_ Press # SYS. I.D. 10 Press # G.I. Mark 0334 Press # First Paging Channel 0 Press # System Select 07 Press # ACCOLC 0 Press # MIN Mark 1 Press # Local Use TO EXIT PROGRAM MODE AT THIS "FTIME PRESS CLR AND HOLD DISPLAY WILL SHOW TEST MODE TO EXIT TEXT MODE PRESS RCL#02 IF THE MEMORY IS CLEARED VIA RCL #39 DURING THE PROGRAMMING THEN THE PHONE WILL AUTOMATICALLY ENTER FULL-LOCK AFTER EXITING THE TEST MODE TO UNLOCK: FCN #XXXX(4 DIGIT LOCK CODE FOR LAST NAM PROGRAMMED). Programming Instructions for: NOKIA P-30 ACTION TO STORE DISPLAY USED EQUIPMENT: TO DISPLAY CURREN# gT UNLOCK CODE - PRESS SEL 7 UNLCODE APPEARS ON THE DISPLAY ENTER 5 DIGIT SECURITY CODE AND THE CURRENT UNLOCK CODE APPEARS IN THE DISPLAY PRESS CLR AND ENTER THE NEW FOUR DIGIT UNLOCK CODE PRESS SEL TO STORE THE NEW CODE - NOTE: IF YOU DON'T PRESS SEL WITHIN FIVE SECONDS THE DISPLAY WILL CLEAR AND CANCEL THE FUNCTION PWR up unit Enter *17*2001*12345* HO-Id must appear on display Press SEL to view current value Display will be one step behind TO STORE instructions _ _ _ _ _ $ ƽ Press SEL ACCESS (SID) 1 Press SEL LOCAL 1 Press SEL PhonE n XXXXXXXXXX Press SEL CLASS 10 Press SEL PAGE ch 334 Press SEL O-LOAd 07 Press SEL GrouP 10 Press SEL SEC 1234% klo5 Press SEL AUTO EXIT PROGRAM MODE TO EXIT PROGRAMMING MODE AT ANY TIME PRESS "END" WHEN THE SEL KEY IS PRESSED FOLLOWING THE LAST PARAMETER VALUE, THE PHONE WILL AUTOMATICALLY EXIT THE NAM PROGRAMMING MODE AND RETURN TO NORMAL OPERATION Programming Instructions for: NOVATEL PTR800 ACTION TO STORE DISPLAY USED EQUIPMENT: TO DISPLAY CURRENT UNLO& /fVmCK CODE - UNLOCK CODES WILL BE CHANGED ONLY IN PROGRAMMING MODE FOLLOW THE INSTRUCTIONS THAT FOLLOW PWR up unit Press FCN Press FCN again Enter *626776* Display will show CMT REV and a date code - Press Volume Up Display will show NAM SELECT1 Press Volume Up _ _ _ _ _ PRESS # PRESS VOLUME UP SIDH PRESS VOLUME UP SCM XXXXXXXXXX PRESS # PRESS VOLUME UP MIN 0333 PRESS # PRESS VOLUME UP ' 1M= IDCCA 0334 PRESS # PRESS VOLUME UP IDCCB 0334 PRESS # PRESS VOLUME UP IPCH 07 PRESS # PRESS VOLUME UP ACCOLC 10 PRESS # PRESS VOLUME UP GIM 123 PRESS # PRESS VOLUME UP LOCK A 456 PRESS # PRESS VOLUME UP LOCK B 1 PRESS # PRESS VOLUME UP OPTION LC 1 PRESS # PRESS VOLUME UP (6EOPTION EX 0 PRESS # PRESS VOLUME UP OPTION PS 0 PRESS # PRESS VOLUME UP OPTION NSC 1 PRESS # PRESS VOLUME UP OPTION EE 1 PRESS # PRESS VOLUME UP OPTION REP 0 PRESS # PRESS VOLUME UP OPTION HA 0 PRESS # PRESS VOLUME UP OPTION HF 0 PRESS # PRESS VOLUME UP OPTION F1 0 PRESS # ) PRESS VOLUME UP OPTION F2 0 PRESS # PRESS VOLUME UP OPTION F3 0 PRESS # PRESS VOLUME UP OPTION F4 TO EXIT PROGRAMMING MODE AT ANY TIME PRESS FCN END FCN FCN *6462257* WILL CLEAR THE NAM IF IT HAS BEEN PROGRAMMED MORE THAN 3 TIMES OR IF THE NEED EXISTS TO CLEAR THE MEMORY Programming Instructions for: NOVATEL PTR825 ACTION TO STOR*8LE DISPLAY PWR up unit Press FCN Press FCN again Enter *697201* Display will show CMT REV 972 105 Press Volume Up 1 PRESS # VOL UP NAM SELECT 1 _ _ _ _ _ PRESS # VOL UP SIDH 10 PRESS VOL UP SCM XXXXXXXXXX PRESS # VOL UP MIN 0333 PRESS VOL UP IDCCA 0334 PRESS VOL UP IDCCB+h 0334 PRESS # VOL UP IPCH 07 PRESS # VOL UP ACCOLC 10 PRESS # VOL UP GIM 123 PRESS # VOL UP LOCK A 123 PRESS # VOL UP LOCK B 1 PRESS # VOL UP LC 1 PRESS # VOL UP OPTION EX 0 PRESS # VOL UP PS - PREF SY,kUSTEM 0 PRESS VOL UP OPTION NSC 1 PRESS # VOL UP OPTION EE-END TO END 1 PRESS # VOL UP OPTION REP 0 PRESS # VOL UP HORN ALERT 0 PRESS # VOL UP HANDS FREE 0 PRESS # VOL UP OPTION F1 0 PRESS # VOL UP OPTION F2 0 -t PRESS # VOL UP OPTION F3 1 PRESS # VOL UP OPTION F4 AIR RND UP 0 PRESS # VOL UP OPTION F5 FUTURE USE 0 PRESS # VOL UP OPTION F6 FUTURE USE 0 PRESS # VOL UP OPTION F7 FUTURE USE Programming will now wrap to beginning SIDH display. Press VOL UP to review entries PRESS # VOL UP OPTION F2 0 Ϭ^2M005rT2DEFCON ----============================[ DEFCON ]============================---- DEFCON takes place every year in Las Vegas. This year is no exception. Here is some basic information regarding the Voice Bridge the DEFCON organisers run. --------------------------------------------------------------------------- --===[ Voice Bridge ]===-- 801-855-3326 ----------------------------------------------------------------b ----------- * Five voice bridge areas with up to 8 people in each * Fast VMBs, anyone can make their own * Two Voice BBS areas for general and more technical discussions Faster than a speeding bullet (Well at least faster than the 2600 VMB) and more powerful than a hacked Meridian 1, the DEF CON voice system was set up so people have a stable place to stay in contact and chat with each other. It's not meant to be the most elite 0-day conf, but instead a location to exchangte and meet other people with similiar interests. Recently the bridge has moved to it's own T1 and there is no more "Phantom Bridge" problem. If you call and get busies from an AT&T phone it might be because all of the AT&T trunks are in use by other services. Try another LD carrier. I always get through on Sprint. We try for daily meetings around 6 or so EST, but that is pretty flexable. --------------------------------------------------------------------------- J1 --===[ DEFCON 4 ]===-- July 26-28th in Las Vegas, Nevada --------------------------------------------------------------------------- es from an AT&T phone it might be because all of the AT&T trunks are in use by other services. Try another LD carrier. I always get through on Sprint. We try for daily meetings around 6 or so EST, but that is pretty flexable. --------------------------------------------------------------------------- ϥ Z2N007r?S`MCI History MCI History MCI founder Bill McGowan founded MICOM (Microwave Communications of America, Inc.) in 1968. McGowan envisioned a completely new, microwave-based national telephone network that could provide business customers with quality connections at a low cost. MCI built a working telecommunications service between Chicago and St. Louis, sold stock, received bank credit, and laid plans for a true nationwide communications network. The MCI that exists today -- MCI Commu|Mnications Corporation -- was incorporated on February 2, 1973. After nearly a decade of fighting AT&T's monopolistic hold on the marketplace, MCI achieved its greatest victory in 1982, when AT&T and the Department of Justice agreed to a divestiture of 22 local operating companies. The break-up of AT&T changed MCI -- and the industry -- forever. In just one year after divestiture, MCI's annual revenues had increased to more than $1 billion and the company was expanding globally. Ove&r the next few years, MCI acquired Western Union International, Inc., and with it, a local presence around the world, as well as introduced long distance connections to Canada and Europe. As it grew, MCI invested heavily in new technology, pioneering the first commercial deployment of single-mode fiber optic cable. This new technology promised greater quality, speed, and throughput of data and voice communications. Amid the excitement of new products, traditional challenges remaine\Dd. Instead of dealing with one monopoly -- AT&T -- MCI now had to deal with seven -- the regional Bell operating companies or "Baby Bells." The Bells charged stiff access fees to all long distance carriers, a heavy cost burden that fell disproportionately upon MCI and other small carriers. But despite these unfair fees, MCI gained 10% of the total long distance market share and had more than doubled its revenue from $2 billion to more than $5.1 billion in 1988. In March of 1991, MC0I introduced the very first long distance brand to the consumer marketplace -- Friends & Family. This savings plan, which offered unprecedented discounts on calls to other MCI customers, was a technological and marketing breakthrough. No other company at the time had the computing power or marketing wherewithal to analyze and provide savings on millions of calls every month. Today, with 20% market share, MCI has expanded from its core long distance business to become the world's thiq}rd largest carrier of international calling and a premier provider of data communications over the vast Internet computer network. With annual revenue of more than $13.3 billion, the company provides a wide array of consumer and business long distance and local services, data and video communications, online information, electronic mail, network management services and communications software. With successful core brands like networkMCI Business, internetMCI, Friends & Family, Proof, of Savings and 1 800 COLLECT, what began as a way to facilitate business communications between Chicago and St. Louis has truly evolved into what MCI Founder Bill McGowan called "the communications company for the information age." ess long distance and local services, data and video communications, online information, electronic mail, network management services and communications software. With successful core brands like networkMCI Business, internetMCI, Friends & Family, Proof !ϒ+*)('&%$#"!2N 008r "/pbFBI Assess Hacker Damage ---============[ FBI rushes to assess damage hacker did ]=============--- Eric Brazil 17/2/95 As authorities scrambled to assess the damage allegedly wrought by the world's most wanted computer hacker, they acknowledged that his capture would have been unlikely without the aid of civilian high-tech experts. In the end, it was the expertise of computer adepts employed by private industry that enabled the FBI to put the handc #T@`uffs on Kevin Mitnick, 31, in his apartment in Raleigh, N.C., Wednesday. "We have developed and continue to develop more expertise, but there are going to continue to be situations in cyberspace and in the real world in which we have to rely on individuals who have particular knowledge," FBI Special Agent Rick Smith said Thursday in San Francisco. In the Mitnick case, both the key figures in the quest that led to his arrest are employed by private industry -- Tsutomu Shimomura of t $H9he San Diego Computer Center and Hua-Pei Chen of The Well on-line service in Sausalito. "The vast majority of citizens in cyberspace are law-abiding and interested in helping the government and stopping cybercrime," said Assistant U.S. Attorney Kent Walker, who helped to coordinate the coast-to-coast Mitnick investigation. Volunteer help was invaluable in arresting Mitnick, he said. Walker and Smith said the full extent of the damage done by Mitnick's alleged intrusions into comput %Eker systems was still being assessed. In an affidavit filed in U.S. District Court of North Carolina, FBI Special Agent Levord Burns said Mitnick's hacking of Shimomura's computer resulted in the pilfering of cellular telephone proprietary software valued at as much as $1 million. The intruder also stole 20,000 credit card numbers from the files of Netcom On-Line Communication Services Inc. of San Jose, the affidavit said. "It's difficult to know (the extent of damage) until we go  &fXcthrough all the files," Walker said. "In The Well, he got as much as 500 megabytes of information, which is the equivalent of 100,000 pages." Mitnick, who served a year in federal prison after pleading guilty to infiltrating Digital Equipment Corp.'s computer system and stealing 16 MCI telephone codes, violated his parole by disappearing in 1992. He is now charged with computer fraud and illegal use of a telephone access device. The former crime is punishable by 20 years in prison, 'r the latter by 15. Each is also punishable by a $250,000 fine. Mitnick was to be arraigned Friday in North Carolina. The Well and Netcom both cooperated with the federal investigation to the extent of opening up their files. Walker said investigators were careful to comply with the Electronic Communications Privacy Act, which permits them such access under precisely defined procedures. According to the FBI affidavit, Mitnick used Netcom's "points of presence" public dial-ups in va (cO7rious cities and used the system as "a platform to intrude and attack other computer sites while connected to Netcom." With Shimomura's aid, Netcom set various traps for the hacker and provided the listening post that made possible the fugitive's location and capture. Don Hutchinson, vice president of sales and marketing for Netcom, a publicly held corporation with more than 90,000 subscribers, minimized the damage caused by Mitnick's alleged intrusions. The accounts tampered with )"c were mostly shell accounts, he said, and "we're not, candidly, aware of any damage -- illicit use of credit card numbers or anything else for that matter. It was more a case of a guy wanting to show off that he could do it." Nevertheless, he said, "We've learned from this intrusion and our collaboration with the folks from San Diego. We think we've got a very secure system in place." Not so sanguine was Chuck Marson, a partner in the San Francisco law firm of Remcho Johansen Purce *1 ll and a specialist in computer privacy issues. "I subscribe to The Well, and everybody who's on The Well was compromised by whoever did this -- assuming it was Mr. Mitnick, who compromised my files by cracking into the system and manipulating it like its most highly rated supervisor. "He could have read everything that was there. I make it a note not to put confidential things on it, but a lot of people do." As for the system's security, Marson said, "The Well doesn't have a fire +5l wall (to protect against hackers). It's about to get one. But the feeling is that whatever fire wall (a system may erect), well, someone like a Kevin Mitnick could cut through it like a knife through butter." Paul Saffo, a director of the Institute for the Future in Menlo Park, said the lesson of the Mitnick case was that "in cyberspace every time you move, you leave a wake of electrons. . . . Even the masters can't hide it. "Our computers will be safer as a result of this escapad He," Saffo said. "Mitnick dug a hole in the security; he exploited something that is common. (But) the next hacker would be crazy to try this." Assistant U.S. Attorney Walker declined to speculate on Mitnick's motivation and would not comment on whether the hackr had capitalized commercially. Carla Marinucci and Elizabeth Fernandez of The Examiner staff contributed to this report. cybersleuths fugitive. asters can't hide it. "Our computers will be safer as a result of this escapad,1->]\[ZYXWVUTSRQPONMLKJIHGFEDCBA@?>=<;:9876543210/.-\C2P 010r,.iAnon.penet.fi Anonymous Server The anon.penet.fi Anonymous Server ================================== Please, do not overload the server. The absolute limit of messages per day is 30. The size limit of the mailings is 48K. Please, keep the traffic below these two limits. Index: 1) Safe Posting! (*Please read this section!*) 2) How to get an anon ID and help 3) Password 3.1) How to set up a password 3.2) How to use a password ,/t/2 3.3) How to change your password 3.4) Typical mistakes made in password usage 4) Mailing anonymously 4.1) recipient@anon.penet.fi 4.2) X-Anon-To: recipient 5) Posting articles to news anonymously 5.1) news.group@anon.penet.fi 5.2) X-Anon-To: news.group 6) Testing how the service works 7) Security 8) Miscellaneous 8.1) Nickname 8.2) Available newsgroups 8.3) Talk of anon servers on newsgroups 8.4) What ,0Gif your e-mail address changes? 8.5) inews error 8.6) Mailing non-anonymously 8.7) Eudora Users 8.8) Deallocating your anonymous ID from the system NEW: #I have provided specific examples of what imaginary user joan@commercial.com #would do to establish different things. She wants a nickname "Ladylike" and #password "45jhkg3425". She has the anon id an48@anon.penet.fi. Other version of help text available in other languages: - German text available ,1zfrom german@anon.penet.fi (deutsch@anon.penet.fi). - Italian text available from italian@anon.penet.fi (italiano@anon.penet.fi). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - 1) Safe posting! ================ Yes, another anonymous server. Why? Well, several well-known servers have bitten the dust recently. And most of them have served only a very limited subset of newsgroups, and mail only to "registered", anonymous users. Due to reasons too comp,2+zlicated to mention here I wanted to set up an anonymous server for the Scandinavian user community. I got hold of a pre-release copy of one of the server packages. As the version I got relied heavily on the advanced features of MMDFII, I had to modify it quite a bit. While hacking around, I removed the restriction of only supporting selected newsgroups. Within a week of startup, the server had been discovered by transatlantic users, and more recent stats show European users are defin,3itely a minority. So what does the anon server really do? Well, it provides a front for sending mail messages and posting news items anonymously. As you send your very first message to the server, it automatically allocates you an ID of the form anNNN, and sends you a message containing the allocated ID. This ID is used in all your subsequent anon posts/mails. Any mail messages sent to your-ID@anon.penet.fi gets redirected to your original, real address. Any reply is of course anony,4ƒmized in the same way, so the server provides a double-blind. You will not know the true identity of any user, unless she chooses to reveal her identity explicitly. In the anonymization process all headers indicating the true originator are removed, and an attempt is made to remove any automatically-included signatures, by looking for a line starting with two dashes (--), and zapping everything from there on. But if your signature starts with anything else, it's your own responsibil,5Fity to remove it from your messages. The user-ID database is based on RFC822-ized forms of your originating address. This may cause problems for some users, either because their site is not properly registered in the name servers, resulting in non-deterministic addresses, or because their mail router doesn't hide the identity of individual workstations, resulting in different originating addresses depending on which workstation you mail from. Talk to your administrator. If that does, 6n't help, let me know, and I will make a manual re-mapping. You might wonder about the sense of using a server out somewhere, as the song goes, "so close to Russia, so far from Japan". Well, the polar bears don't mind, and the ice on the cables don't bother too much :-) Well, in fact, as we live in a wonderfully networked world, the major delay is not going over the atlantic, but my local connection to the Finnish EUnet backbone, fuug.fi. Once you reach a well-connected host, such a, 7Өs uunet.uu.net, there's a direct SMTP connection to fuug.fi. My connection to fuug.fi is currently a polled connection over ISDN, soon to be upgraded to on-demand-SMTP/NNTP. But for now, expect a turn-around delay of 2-4 hours for trans-atlantic traffic. As the server was originally intended to be used by scandinavians, it includes help files for various languages. This works by using the language in question as the address. So to get the german help file, send a message to german@a, 8.non.penet.fi (or deutsch@anon.penet.fi). Support for new languages is added every now and then, when I find volunteers to do the translation. Any new ones? I have gotten a couple of comments about permitting anonymous postings to technical groups. I can only answer that I believe very firmly that it's not for me to dictate how other people ought to behave. Somebody might have a valid reason for posting anonymously to a group I might consider "technical". But remember anonymous posti, 90Acngs are a privilege, and use them accordingly. I believe adult human beings can behave responsibly. Please don't let me down. And remember this is a service that some people (in groups such as alt.sexual.abuse.recovery) _need_. Please don't do anything stupid that would force me to close down the service. As I am running my own company, there is very little political pressure anyone can put on me, but if somebody starts using the system for criminal activities, the authorities might, :!o be able to order me to shut down the service. I don't particularly want to find out, however... 2) How to get an ID and help ============================ Send a message to "ping@anon.penet.fi" to get an anonymous ID. If you already have an anon id, this will send you a response with your anonymous ID in the message body. If you send a message to "help@anon.penet.fi", you will receive this help text. If you want help or have some questions, send mail to "admin@anon.penet.fi". ,;hMail to "admin" goes directly to me unanonymized, and can be used to report problems. If you want to send mail to me anonymously, you can use "an0" or "an1". #Examples: # To: ping@anon.penet.fi # To: help@anon.penet.fi 3) Password =========== Once you have set up a password you have to use it in every single message you send via anon.penet.fi. It is advisable that you establish a password right away. 3.1) To set up a password -=-=-=-=-=-=-=-=-=-=-=-=- The password can be any , Message body: #Example: # To: password@anon.penet.fi # Subject: setting my password #message body: # 45jhkg3425 3.2) How to use a password -=-=-=-=-=-=-=-=-=-=-=-=-= Once you have set your password, you must include it in all your messages, in a "X-Anon-Password:" line. As with the,= "X-Anon-To:" line, it can be either a part of the header or as the first two lines of the message text. Syntax: - ----- Mailer's headers: To: anon@anon.penet.fi Subject: Message body: X-Anon-Password: X-Anon-To: #Example: # To: anon@anon.penet.fi # Subject: my day #message body: # X-Anon-Password: 45jhkg3425 # X-Anon-To: john@other.com If you find this is too m,>uch of a hassle, and are not too concerned about the confidentiality of your anon ID, you may set the password to "none". If your password is none, you don't have to include "X-Anon-Password:" or the password in any form. But I must remind you that it will leave your anon ID vulnerable. Should you wish to use a password again, you can do so by mailing the new password to "password@anon.penet.fi". The problem isn't that someone will find out your real e-mail address, but your real ,?qe-mail address can be faked and .. 1) the faker finds out what anon ID you have. 2) an anonymous post by your ID is send to a newsgroup. 3) (junk/harrassing/threatening) mail is send with your anon ID to different people. This someone can be your friend, a person who has seen your posts or maybe a subscriber to the same mailing list you are on. In the other words, that "someone" can be ANYONE. 3.3) To change your password -=-=-=-=-=-=-=-=-=-=-=-=-=-= Syntax: - ----- Mailer',@as headers: To: password@anon.penet.fi Subject: Message body: X-Anon-Password: #Example: # To: password@anon.penet.fi # Subject: changing my password #message body: # X-Anon-Password: 45jhkg3425 # ot3erpa44word 3.4) Typical mistakes made in password usage -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= If you get bounced mail because of a password failure, please ,Acheck to see if you are making one or *more* of the mistakes listed below. If you don't recognize your mistake and you are still receiving password failure messages, please send the *full* error message with all headers intact to "admin@anon.penet.fi". 1) Do NOT put Subject: or other fields (i.e. To:) into the message body, use the header fields provided by your mailer. Only the "X-Anon-To:" and "X-Anon-Password:" can put be in the message ,BVWbody and still be processed. 2) Do not put the "X-Anon"-fields into the "Subject:" or "To:" field. Use the first two lines of the message body. 3) The "X-Anon"-fields have to start at the beginning of the line. Do NOT put a space or tab before it. 4) When typing the "X-Anon"-fields, put all the letters either in lower case or upper case. You may capitalize the first letter of the three words but the use of any ot,C9her combination will result in a failure message. 5) "X-Anon-To:" field has to be *one* line. 4) Mailing anonymously ====================== You need to set up a password to mail users that do not have a "an@anon.penet.fi" address. (Please, see the section 3: Password on how to set up and use a password.) "Cc:"- and "Bcc:"-field recipients receive your letter non-anonymized as your mailer sends those letters straight to the recipient and not via anon.p,D݀~enet.fi. There are two ways to send mail anonymously: 4.1) recipient@anon.penet.fi -=-=-=-=-=-=-=-=-=-=-=-=-=-= Syntax of sending to an anon.penet.fi user: - ----------------------------------------- Mailer's headers: To: an@anon.penet.fi Subject: Message body: if password set up> #Example: # To: an1@anon.penet.fi # Subject: sending ,Etma message #message body: # X-Anon-Password: 45jhkg3425 # blah blah blah Syntax of sending to a known user: - -------------------------------- Mailer's headers: To: user%host.domain@anon.penet.fi Subject: Message body: X-Anon-Password: #Example: # To: john%o,Fjn$ther.com@anon.penet.fi # Subject: what's up? #message body: # X-Anon-Password: 45jhkg3425 # blah blah blah 4.2) X-Anon-To: recipient -=-=-=-=-=-=-=-=-=-=-=-=- This method is more secure and will preserve your anonymity better. Syntax of sending to an anon.penet.fi user: - ----------------------------------------- Mailer's headers: To: anon@anon.penet.fi Subject: Message body: if passwo,Grd set up> X-Anon-To: an #Example: # To: anon@anon.penet.fi # Subject: sending a message #message body: # X-Anon-To: an1 # X-Anon-Password: 45jhkg3425 # blah blah Syntax of sending to a known user: - -------------------------------- Mailer's headers: To: anon@anon.penet.fi ,HK-f6 Subject: Message body: X-Anon-Password: X-Anon-To: user@host.domain #Example: # To: anon@anon.penet.fi # Subject: what's up #message body: # X-Anon-Password: 45jhkg3425 # X-Anon-To: john@other.com # blah blah 5) Posting articles to news anonymously ======================================= To be able to post to newsgroups on usenet, you need to set up a password. P,IYlease, see the section 3: Password on how to set up and use a password. References: headers do work, so they can (and should) be used to maintain reply threads. If you cannot add headers, you cannot include References: There are two ways to post an anonymous article to news: 5.1) news.group@anon.penet.fi -=-=-=-=-=-=-=-=-=-=-=-=-=-=- Syntax: - ----- Mailer's headers: To: news.group@anon.penet.fi Subject: Message body: ,J|A X-Anon-Password: #Example: # To: alt.test@anon.penet.fi # Subject: IGNORE: testing #message body: # X-Anon-Password: 45jhkg3425 # blah blah 5.2) X-Anon-To: news.group -=-=-=-=-=-=-=-=-=-=-=-=-= Using X-Anon-To: method enables you to crosspost. When putting multiple newsgroups on the X-Anon-To: line, please use only a comma as a separator without any spaces. Syntax: - ----- Mailer's headers: To: anon@anon.penet.,KTGZfi Subject: Message body: X-Anon-Password: X-Anon-To: news.group #Example: # To: anon@anon.penet.fi # Subject: IGNORE: testing #message body: # X-Anon-Password: 45jhkg3425 # X-Anon-To: alt.test # blah blah OR X-Anon-Password: X-Anon-To: news.group,other.news.group ,LK| #Example: # To: anon@anon.penet.fi # Subject: IGNORE: testing #message body: # X-Anon-Password: 45jhkg3425 # X-Anon-To: alt.test,misc.test,comp.test # blah blah 6) Testing how the service works ================================ If you intend to mail/post something that might cost you your job or marriage or inheritance, *PLEASE* send a test message first. The software has been pretty well tested, but some mailers en-route (which are out of my control) c, M(v an screw things up. And if you happen to find a problem, *please* for the sake of all the other users, *let me know asap*. And *please* use the appropriate test newsgroups, such as alt.test or misc.test. Yes, *you* might get excited by reading 2000 "This is a test.." messages on alt.sex, but I warn you that most psychologists consider this rather aberrant... Send a test message to 1) test@anon.penet.fi #Example: # To: test@anon.penet.fi # Subject: testing #message body: #,!Nb! X-Anon-Password: 45jhkg3425 # blah blah 2) your anon account #Example: # To: an48@anon.penet.fi # Subject: testing #message body: # X-Anon-Password: 45jhkg3425 # blah blah 3) your real e-mail address #Example: # To: anon@anon.penet.fi # Subject: testing #message body: # X-Anon-Password: 45jhkg3425 # X-Anon-To: joan@commercial.com # blah blah 4) misc.test/alt.test or the like #Example: # To: alt.test@anon.penet.fi ,"Owg# Subject: testing #message body: # X-Anon-Password: 45jhkg3425 # blah blah 5) any other test message or format you can think of 7) Security =========== Short of having everyone run a public-key cryptosystem such as PGP, there is no way to protect users from malicious administrators. You have to trust my personal integrity. Worse, you have to trust the administrators on every mail routing machine on the way, as the message only becomes anonymous once it reaches my machin,#PmzGe. Malicious sysadmins and/or crackers could spy on SMTP mail channels, sendmail queues and mail logs. But as there are more than 7000 messages being anonymized every day, you have to be pretty perverted to scan everything... Another thing is mail failures. I've had cases of mail routers doing the wrong thing with % addresses, "shortcutting" the path to the destination site. This could cause your mail to go to the final destination without ever touching my server (and thus without g,$QGetting anonymized). This can be avoided by using the X-Anon-To: method. And if your return address bounces for some reason (nameservers down, temporary configuration failures etc.), the original sender and/or postmasters on the way might get error messages showing your true identity, and maybe even the full message. There is at least one known way to discover the anon ID of a user. It involves being able to falsify your real identity, so it is not too easy to use, and it doesn't re,%Rq uveal the real address lurking behind an anon ID, but it can be used to discover what anon ID a certain user is using. To fix this problem, the server requires that you use a password when you try to mail to a non-anonymous user and when you try to post articles to news. Crackers are just too clever. Undoubtedly somebody is going to come up with some novel method.... Not much I can do about that... If you intend to mail/post something that might cost you your job or marriage or inh,&Sa5&eritance, *PLEASE* send a test message first. The software has been pretty well tested, but some mailers en-route (which are out of my control) can screw things up. And if you happen to find a problem, *please* for the sake of all the other users, *let me know asap*. (See section: 6 Testing how the service works for more information.) 8) Miscellaneous ================ 8.1) Nickname -=-=-=-=-=-=- Your e-mail address will be a impersonal code an@anon.penet.fi, but you can ,'T-gchoose a nickanem which will appear in parenthesis after the code name. This is how to set up the nickname: Remember, you're talking to a *robot*, put JUST your desired nickname into the subject field or otherwise you will get funny nicknames as "set my nickname to bunny". Syntax: - ---- Mailer's headers: To: nick@anon.penet.fi Subject: Message body: if password set up> ,(U咛 #Example: # To: nick@anon.penet.fi # Subject: Ladylike #message body: # X-Anon-Password: 45jhkg3425 # blah blah To change your nickname, just send a message to "nick@anon.penet.fi" with the "Subject:" YourNewNick. 8.2) Available newsgroups -=-=-=-=-=-=-=-=-=-=-=-=- Anon.penet.fi has all the newsgroups and can post to all the newsgroups that aren't local to your area. The only world-wide newsgroups anon.penet.fi canno,)Vhmt post to are the moderated newsgroups, the ones that have voted not to receive anonymous articles (there are only 5), and binary newsgroups (because of the volume). 8.3) Talk of anon servers in newsgroups -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- If you have access to USENET and the following newsgroups, you can ask questions of anon.penet.fi and other anonymous servers. I follow these newsgroups and try to answer all questions and inform of changes at anon.penet.fi. Questions of,*W߲ a more personal nature can be send to the "admin@anon.penet.fi" address. alt.anonymous.messages alt.privacy.anon-server alt.anonymous 8.4) What if your e-mail address changes? -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- I can change the address behind your anonymous ID to reflect your new e-mail address. >From your new account, send mail to "admin@anon.penet.fi" and include the following information: Old e-mail address: Anon ID of the old ,+XRe-mail address: Password of that anon ID: 8.5) inews error -=-=-=-=-=-=-=-= If you get a bounced message stating something about an "inews" error, there are two possible reasons for it: 1) There is no such newsgroup, at least at anon.penet.fi. 2) The newsgroup is moderated, so it is not possible to post to it the regular way. Please, check your spelling. If you get an "inews" error of the sort "testpost", you have tried to post an article that,,Y7M has "test" in the "Subject:" field and less than 10 written lines. Please, submit test for the appropriate test groups such as alt.test, misc.test etc. 8.6) Mailing non-anonymously -=-=-=-=-=-=-=-=-=-=-=-=-=-= If you want to send mail to an an@anon.penet.fi and do not want to reveal or get an anonymous ID, you should mail you e-mail to na@anon.penet.fi. For example: if you want to mail a user with the anonymous ID 60 and you want to do it in non-anonymou,-Zakws format (i.e. so that your real name and address appear at the headers of the mail), then send mail to: "na60@anon.penet.fi" and NOT "an60@anon.penet.fi". Do NOT include your anon.penet.fi password with this mail! #Example: # To: na48@anon.penet.fi # Subject: testing #message body: # blah blah 8.7) Eudora users -=-=-=-=-=-=-=-=- Please, do not change your configuration for the "From:" field. If you change the "From:" field to look like your anonymous ID, you are not completely,.[jc anonymized. If you *must* do something to the "From:" field, just put your real e-mail address there and let anon.penet.fi take care of the anonymizing. In the other words, when you send your letter to be anonymized, it *MUST* have your real e-mail address in the From: field. #Example: # From: joan@commercial.com # To: anon@anon.penet.fi # Subject: testing #message body: # X-Anon-Password 45jhkg3425 # X-Anon-To: john@other.com # blah blah 8.8) De-allocating your anon ID from t,/\Y he system -=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=- To have your anonymous ID to be removed from the anon.penet.fi system you need to send a message to "remove@anon.penet.fi". The mail requires the "X-Anon-Password:" field if you have set up a password. If you cannot remember your password send your de-allocation request to "admin@anon.penet.fi". We would appreciate it if you add a couple of lines and explain to us the purpose for which you have used anon.penet.fi. A word ,0]1j}of warning concerning de-allocation. There is a random waiting period to catch hit & runs. Do not think you can escape the flames by asking for removal right after your inappropriate article. There are those that need the service, please do not ruin this for them! #Example: # To: remove@anon.penet.fi # Subject: remove my id #message body: # X-Anon-Password: 45jhkg3425 # blah blah - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - If you think these instr,1 $9uctions are unclear and confusing, you are right. If you come up with suggestions for improving this text, please mail me! Remember English is my third language... Safe postings! Julf There are those that need the service, please do not ruin this for them! #Example: # To: remove@anon.penet.fi # Subject: remove my id #message body: # X-Anon-Password: 45jhkg3425 # blah blah - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - If you think these instr^_ϋlkjihgfedcba`_2S016r^`Private Investigator's Top 15 Web Sites -----==========[ PRIVATE INVESTIGATOR'S TOP 15 WEB SITES ]==========----- Compiled By: Ralph Thomas The National Association Of Investigative Specialists P O Box 33244, Austin, Texas, 78764 Phone 512-719-3595 Fax 512-719-3594 E-MAIL: RThomas007@aol.com WEB SITE: http://www.pimall.com/nais/home.html This is a list of the top fifteen most useful web sites for private investigators that have searchable databases yo^a0u can use in your investigations. [Also if you want info on those peeps that annoy you! Kei] NETCHECK http://www.netcheck.com Netcheck is a kind of internet better business bureau. You can file a complaint and check on complaints for people who are considering doing net business with. It's a great site. SWITCHBOARD http://www.switchboard.com Free surname searches, address, and telephone number criss-cross lookups. Switchboard is a free national telephone criss-cross directory^bgc you can use to locate people or businesses. You can use it as a conventional telephone looup or use it to conduct surname searches. That is, input a first and last name and obtain a list of everyone in the country with the same name. FAA AIRCRAFT REGISTRATION DATABASE http://www.via.net/test.html Is your missing person the proud owner of an aircraft? Here is a database maintained by the federal government that tells you. Check owners of aircraft for free. Will give you registrati^cE٩on information including address. What a great search that costs you nothing that could help locate a missing person, determine assets in the form of aircraft and can be used in your background checks. VITAL RECORDS DATABASE Database Of State Sources Of Vital records (Birth, Marriage, Divorce, Death records) http://www.medaccess.com/address/vital_toc.htm This important database gives you the state government addresses for where to write for vital records including birth, marriage,^dϔ̣ divorce, and death records. Of course, the US Government printing office publishes a hardcopy directory of this information but this database stays more current. AREA CODE LOOK UP gopher://odie.niaid.nih.gov/77/deskref/.areacode/index Area codes for telephone numbers seem to change faster than the latest top ten songs in America. Here is a database that keeps your current. Look up area codes anywhere in the country in a flash. NATIONAL ADDRESS SERVER http://www.cedar.buffalo.e^ef!du/adserv.html United US Post Office Database that actually corrects addresses and gives you zip plus 4. Great search to use before you run credit bureau headers. SEC FILINGS http://www.sec.gov/cgi-bin/srch-edgar SEC searches give you detailed information on companies that trade their stock on the stock exchange. You'll get detailed reports about publicly traded companies. This is a great search that used to cost an arm and a leg. Now it's free. MILITARY LOCATOR SERVICE http://^fH`www.militarycity.com Is your missing person in the armed services? This database actually locates people in the military for you. Nothing could be easier and the cost for this search is GREAT! SEARCH TELEPHONE BOOKS FROM AROUND THE WORLD gopher://gopher.nd.edu:70/11/Non-Notre Dame Information Sources/Phone Books-Other Institutions You'll find phonebooks to search and lots of other directories. FOUR 11 PEOPLE FINDER http://www.Four11.com/ Four 11 is a good place to obtain e-mai^gLl addresses. Approaching one million in number, this database contains e-mail addresses of people who are on an online service (such as Compuserve and America Online) but not an actual direct Internet e-mail address. INTERNET ADDRESS FINDER http://www.iaf.net/ Internet Address Finder has 3,908,102 listings and growing! It will locate an e-mail address of almost four million people. Internet Address Finder (IAF) is the easiest and most comprehensive e-mail white pages on the Intern^ hw!-et. By using IAF, you agree to the IAF Use Agreement. Help us build IAF - add a listing today! FINDING PEOPLE WITH FINGER UTILITY http://alpha.acast.nova.edu/cgi-bin/finger This site lets you input an e-mail address and it will search for more information such as name, phone number and physical address. You can also use this site as a spy for other Internet Sites to see who is on them and get more information about them. WHO'S WHO ON THE NET: THE PEOPLE LOCATOR http://web.city^ iu.uk/city/live/pages.html Trying to find an individual on the net but don't have their URL? This is the place to look. Will also locate people's e-mail address. MAPQUEST http://www.mapquest.com Need a city street map? You don't need to purchase a CD-Rom program for this. You can use a database on the net for free. Insert an address and get a street map. CROSS ROADS-STATE GOVERNMENT http://seamless.com/roadstat.html Very, very good link site to state government and state laws tha^ j|ut can be accessed on the net. Includes state statues, local county and city. US Government Information Sources. -==[ YOU'LL ALSO WANT TO KNOW ABOUT: ]==- THE P.I. CATALOG: Sixty pages that list hundreds of books on subjects ranging from locating missing persons and conducting a physical surveillance to insurance claims investigations and investigations by computer, from criminal and civil investigations to electronic surveillance- eavesdropping and countermeasures to background^ k/d checks, sources of information directories, service of process, bail bond recovery and legal investigation. The catalog also contains huge section on investigative and surveillance equipment-privacy products-self defense products. You'll also find software for private investigators, computer products, online information sources, professional badges for private investigators and a PI Gift section. The PI Catalog is $5.00 (refundable with first order) from: Thomas Investigative Public^ lΑY>ations, P O Box 33244, Austin, Texas, 78764. Phone 512-719-3595 NAIS WEB SITE http://www.pimall.com/nais/home.html You'll find a huge section that gives you access to the membership directory of the National Association Of Investigative Specialists, a huge newsletter and article section, one of the very best link page sections that links you to various useful sites on the web and information on books, manuals, training products, seminars, investigative equipment, gifts and profes^i&sional badges for private investigators. THE NET NEWSGROUP OF PRIVATE INVESTIGATORS: alt.private.investigators THE NET WEB SITE FOR PRIVATE INVESTIGATORS http://www.pimall.com THE NET MAILING LIST FOR PRIVATE INVESTIGATORS private-eye@netcom.com huge newsletter and article section, one of the very best link page sections that links you to various useful sites on the web and information on books, manuals, training products, seminars, investigative equipment, gifts and profesm nϓyyxwvutsrqpon 2O009rmo^IKevin Mitnick Timeline ---===================[ THE KEVIN MITNICK TIMELINE ]===================--- 1978 - Kevin Mitnick meets phone phreak Roscoe of Roscoe gang while harassing a HAM radio operator on the air in Southern California. -=- 1980 - Eddie Rivera writes cover story on Roscoe Gang for LA Weekly magazine. -=- 1980 - December - Roscoe Gang, including Kevin Mitnick, invade computer system at US LeampTQ)sing. -=- 1981 - Roscoe, Kevin Mitnick and an accomplice bluff way into PacBell's downtown office after hours and burgle documents and manuals. Susan Thunder, paramour of Roscoe and member of Roscoe Gang, squeals on Mitnick and PacBell burglary to Los Angeles district attorney's office investigator. Mitnick's home in San Fernando Valley searched; Mitnick, Roscoe and accomplice subsequently arrested. -=- 1982mqh~ - Roscoe pleas guilty to conspiracy and fraud. Sentence: 150 days in jail. Accomplice gets thirty. Mitnick gets ninety day diagnostic study by juvenile justice system, plus a year probation. Kevin Mitnick and Lenny DiCicco enter USC campus and begin using student computers for hacking. Eventually, campus police arrest Mitnick and DiCicco, handcuff them to office benches. USC drops any charges but Los Angeles Police Department computer crime unit pursues Mitnick case. Mitnick smr٪ent to juvenile prison in Stockton, California, for breaking probation. Sentence: 6 months. -=- 1984 - Mitnick working for Great American Merchandising, a company operated by acquaintance of family. Begins running unauthorized TRW credit checks and calling PacBell from Great American. Company manager reports Mitnick to district attorney's office again. Mitnick's home again searched. Mitnick goes into hiding. msS -=- 1985 - Mitnick resurfaces in Los Angeles, contacts DiCicco who is now working for Hughes in El Segundo. Mitnick comes to Hughes and logs onto Dockmaster, National Security Agency's public system. DiCicco subsequently fired from Hughes. Mitnick enrolls at Computer Learning Center, Los Angeles. Meets future wife. -=- 1987 - Mitnick invades system at Santa Cruz Operation. Santa Cruz police travel to Los Angeles to search apartment where cmtall coming into SCO originates. It belongs to Mitnick's girlfriend. Mitnick and girlfriend subsequently arrested and charged with unauthorized access to a computer. Charges against girlfriend dropped. Mitnick's representation bargains felony charge down to misdemeanor. Sentence: three years probation. During period, Mitnick marries girlfriend. -=- 1988 - Pierce College authorities contact LAPD about Kevin Mitnick and Lenny DiCicco misusing camud[pmpus systems. Mitnick and DiCicco now enrolled in computer class at Pierce. Mitnick and DiCicco again become targets of LAPD investigation. Mitnick attempts to pull down job at Security Pacific. LAPD detective tips company. Mitnick ejected from premises. Pierce College begins disciplinary action against Mitnick and DiCicco. Both expelled. They appeal unsuccessfully. Jet Propulsion Laboratory computer break-in Pasadena, CA, profiled in Los Angeles Times. Attributed to Mitnick andmv * DiCicco in John Markoff's "Cyberpunk". Mitnick using DiCicco's workplace as jumping off point for hacking. DiCicco begins talking to FBI. With DiCicco cooperating, FBI arrests Mitnick for invading Digital Equipment Corporation systems and allegedly stealing software. DiCicco also indicted. Government proceeds to attempt to convict Mitnick on four felony counts. Defense eventually gets prosecution to accept idea that Mitnick addicted or psychologically compelled to actions. Mitnicm w~*k convicted and given one year sentence at Lompoc, California. DiCicco pleads guilty to one felony. Sentence: 5 years probation, community service. Mitnick and wife separate. -=- 1992 - Mitnick working at private investigating firm in Calabasas while on probation. FBI arrives to arrest Mitnick for alleged break-ins at PacBell. Mitnick again goes into hiding. -=- 1994 - California Department of Motor Vehiclesm xd issues $1-million warrant for Mitnick's arrest on charges of fraudulently trying to acquire driver identification. Mitnick traced to Seattle, Washington, where he allegedly worked as a computer "trouble-shooter." Mitnick once again on move. Christmas - Mitnick accused of invading security expert Tsutomu Shimomura's system in San Diego. -=- 1995 - Mitnick hacks The WELL in Sausalito, California. Few mention WELL security is routinely broken. Tm ymhe WELL, security-wise, is known as a "hot" system. Mitnick and Shimomura become media sensations after hacker's arrest in Raleigh, North Carolina. Tracked by Shimomura, news hounds overhype events into Dark Hacker v. rock'n'rollin,' groovy lookin' computer security guru White Knight story. Mitnick continually portrayed as obese, foul-looking dump. Reality shows Mitnick well-groomed, rather fit. Mitnick alleged to have broken into Netcom, stealing credit card base in process. Netcom 0m's credit card base said to be commonplace on 'Net. Miramax announces aim of producing movie based on life and times of Kevin Mitnick. [Sources: The Los Angeles Times, John Markoff's "Cyberpunk" (Simon & Schuster), LA Weekly.] -=- White Knight story. Mitnick continually portrayed as obese, foul-looking dump. Reality shows Mitnick well-groomed, rather fit. Mitnick alleged to have broken into Netcom, stealing credit card base in process. Netcoz/{3~}|{YU2R y015rz|LTThe Wonderful World Of Pagers ---=================[ The Wonderful World of Pagers ]=================--- by Erik Bloodaxe [ I recently came into possesion of a pager. An interesting little device, the following file is printed here for those wishing to know more. Kei] Screaming through the electromagnet swamp we live in are hundreds of thousands of messages of varying degrees of importance. Doctors, police, corporate executives, housewives and dz}L@rug dealers all find themselves constantly trapped at the mercy of a teeny little box: the pager. Everyone has seen a pager; almost everyone has one. Over 20 million pagers are on the streets in the US alone, sorting out their particular chunk of the radio-spectrum. Another fifty-thousand more are put into service each day. But what the hell are these things really doing? What more can we do with them than be reminded to call mom, or to "pick up dry-cleaning?" Lots. ** PROTOCOz~LS ** Pagers today use a variety of signalling formats such as POCSAG, FLEX and GOLAY. The most common by far is POCSAG (Post Office Standardization Advisory Group), a standard set by the British Post Office and adopted world-wide for paging. POCSAG is transmitted at three transmission rates--512, 1200 and 2400 bps. Most commercial paging companies today use at least 1200, although many companies who own their own paging terminals for in-house use transmit at 512. Nationwide carrzHkiers (SkyTel, PageNet, MobileComm, etc.) send the majority of their traffic at 2400 to make the maximum use of their bandwidth. In other words, the faster they can deliver pages, the smaller their queue of outgoing pages is. Although these carriers have upgraded their equipment in the field to broadcast at 2400 (or plan to do so in the near future), they still send out some pages at 1200 and 512 to accommodate their customers with older pagers. Most 512 and 1200 traffic on the natzzҒIionwide services is numeric or tone-only pages. POCSAG messages are broadcast in batches. Each batch is comprised of 8 frames, and each frame contains two codewords separated by a "synchronization" codeword. A message can have as many codewords as needed to deliver the page and can stretch through several batches if needed. The end of a complete message is indicated by a "next address" codeword. Both addressing and user data are sent in the codewords, the distinction being the lz,east significant bit of the codeword: 0 for address data, and 1 for user-data. Standard alphanumeric data is sent in a seven-bit format, with each codeword containing 2 6/7 characters. A newer 8-bit alphanumeric format is implemented by some carriers which allow users to send data such as computer files, graphics in addition to regular alphanumeric messages. The 8 bit format allows for 2.5 characters per codeword. Numeric data is 4 bit, allowing up to 5 numbers to be transmitted pzLer codeword. Tone and voice pages contain address information only. (NOTE: Pager data uses BCH 32,21 for encoding. I don't imagine very many of you will be trying to decode pager data by building your own decoders, but for those of you who may, take my interpretation of POCSAG framing with a grain of salt, and try to dig up the actual POCSAG specs.) ** THE PAGING RECEIVER ** Paging receivers come in hundreds of shapes and sizes, although the vast majority are manufactured bzTy Motorola. Numeric pagers comprise over fifty percent all pagers in use. Alphanumeric comprises about thirty percent, with tone and voice pagers making up the remainder. Pagers are uniquely addressed by a capcode. The capcode is usually six to eight digits in length, and will be printed somewhere on the pager itself. Many pager companies assign customers PIN numbers, which are then cross-referenced to a given capcode in databases maintained by the service provider. PIN numberz  s have no other relationship to the capcode. Tone pagers are by far the most limited paging devices in use. When a specified number has been called, an address only message is broadcast, which causes the intended receiver to beep. Wow. Tone pagers usually have 4 capcodes, which can correspond to different locations to call back. Voice pagers are similar, except they allow the calling party to leave a 15 to 30 second message. The voice message is broadcast immediately after the capz H㷮code of the receiver, which unsquelches the device's audio. Numeric pagers, although seemingly limited by their lack of display options have proven otherwise by enterprising users. Most numeric data sent is obviously related to phone numbers, but numerous users have developed codes relating to various actions to be carried out by the party being paged. The most prolific users of this have been the Chinese who have one of the most active paging networks in the world. I suppose thez g5 next biggest users of code-style numeric paging would be drug dealers. (2112 0830 187 -- get to the fucking drop site by 8:30 or I'll bust a cap in your ass!) :) Alphanumeric pagers are most often contacted through a dedicated service that will manually enter in the message to be sent onto the paging terminal. One such service, NDC, offers its phone-answering and message typing services to various pager companies. Next time you are talking to a pager operator, ask him or her ifz @ they are at NDC. They probably are. In addition to the capcode, pagers will have an FCC ID number, a serial number, and most importantly, the frequency that the device has been crystaled for imprinted on the back of the device. Although technology exists that would allow pagers to listen on a number of frequencies by synthesizing the frequency rather than using a crystal, pager manufacturers stick to using crystals to "keep the unit cost down." Pagers may have multiple capcodes z  Hong Kong 172.525 N,A 280.0875 T,N,A Indonesia 151.175 - 153.050 A Ireland 153.000 - 153.825 T,N,A Italy 466.075 T,N,A 161.175 T,N Japan 278.1625 - 283.8875 T,N Korea 146.320 - 173.320 T,N,A Malaysia 152.175 - 172.525 N,A,V 931.9375 N,zYA Netherlands 156.9865 - 164.350 T,N,A New Zealand 157.925 - 158.050 T,N,A Norway 148.050 - 169.850 T,N,A Singapore 161.450 N,A 931.9375 N,A Sweden 169.8 T,N,A Switzerland 149.5 T,N,A Taiwan 166.775 N,A 280.9375 N,A Thailand 450.525 z|i N,A 172.525 - 173.475 N,A UK 138.150 - 153.275 T,N,A 454.675 - 466.075 T,N,A T = Tone N = Numeric A = Alphanumeric V = Voice ** INTERCEPTION AND THE LAW ** For many years the interception of pages was not considered an invasion of privacy because of the limited information provided by the tone-only pagers in use at the time. In fact, when Congress passed the Electronic Communications Privacy Act in 1986 tonzqAe-only pagers were exempt from its provisions. According to the ECPA, monitoring of all other types of paging signals, including voice, is illegal. But, due to this same law, paging transmissions are considered to have a reasonable expectation to privacy, and Law Enforcement officials must obtain a proper court order to intercept them, or have the consent of the subscriber. To intercept pages, many LE-types will obtain beepers programmed with the same capcode as their suspect. Toz Z2 do this, they must contact the paging company and obtain the capcode associated with the person or phone number they are interested in. However, even enlisting the assistance of the paging companies often requires following proper legal procedures (warrants, subpoenas, etc.). More sophisticated pager-interception devices are sold by a variety of companies. SWS Security sells a device called the "Beeper Buster" for about $4000.00. This particular device is scheduled as a Title IIz!$]I device, so any possession of it by someone outside a law enforcement agency is a federal crime. Greyson Electronics sells a package called PageTracker that uses an ICOM R7100 in conjunction with a personal computer to track and decode pager messages. (Greyson also sells a similar package to decode AMPS cellular messages from forward and reverse channels called "CellScope.") For the average hacker-type, the most realistic and affordable option is the Universal M-400 decoder. Thiz"[s box is about 400 bucks and will decode POCSAG at 512 and 1200, as well as GOLAY (although I've never seen a paging service using GOLAY.) It also decodes CTCSS, DCS, DTMF, Baudot, ASCII, SITOR A & B, FEC-A, SWED-ARQ, ACARS, and FAX. It takes audio input from any scanners external speaker jack, and is probably the best decoder available to the Hacker/HAM for the price. Output from the M400 shows the capcode followed by T, N or A (tone, numeric or alpha) ending with the message senz#t. Universal suggests hooking the input to the decoder directly to the scanner before any de-emphasis circuitry, to obtain the true signal. (Many scanners alter the audio before output for several reasons that aren't really relevant to this article...they just do. :) ) Obviously, even by viewing the pager data as it streams by is of little use to anyone without knowing to whom the pager belongs to. Law Enforcement can get a subpoena and obtain the information easily, but anyone ez$( lse is stuck trying to social engineer the paging company. One other alternative works quite well when you already know the individuals pager number, and need to obtain the capcode (for whatever reason). Pager companies will buy large blocks in an exchange for their customers. It is extremely easy to discover the paging company from the phone number that corresponds to the target pager either through the RBOC or by paging someone and asking them who their provider is when they retuz%U'rn your call. Once the company is known, the frequencies allocated to that company are registered with the FCC and are public information. Many CD-ROMs are available with the entire FCC Master Frequency Database. (Percon sells one for 99 bucks that covers the whole country - 716-386-6015) Libraries and the FCC itself will also have this information available. With the frequency set and a decoder running, send a page that will be incredibly easy to discern from the tidal wave of paz&:G ges spewing forth on the frequency. (6666666666, THIS IS YOUR TEST PAGE, etc...) It will eventually scroll by, and presto! How many important people love to give you their pager number? ** THE FUTURE ** With the advent of new technologies pagers will become even more present in both our businesses and private lives. Notebook computers and PDAs with PCMCIA slots can make use of the new PCMCIA pager cards. Some of these cards have actual screens that allow for use without the compz'b5uter, but most require a program to pull message data out. These cards also have somewhat large storage capacity, so the length of messages have the option of being fairly large, should the service provider allow them to be. With the advent of 8-bit alphanumeric services, users with PCMCIA pagers can expect to receive usable computer data such as spreadsheet entries, word processing documents, and of course, GIFs. (Hey, porno entrepreneurs: beeper-porn! Every day, you get a new z(gif sent to your pagecard! Woo Woo. Sad thing is, it would probably sell.) A branch of Motorola known as EMBARC (Electronic Mail Broadcast to A Roaming Computer) was one of the first to allow for such broadcasts. EMBARC makes use of a proprietary Motorola protocol, rather than POCSAG, so subscribers must make use of either a Motorola NewsStream pager (with nifty serial cable) or a newer PCMCIA pager. Messages are sent to (and received by) the user through the use of special clienz)t software. The software dials into the EMBARC message switch accessed through AT&T's ACCUNET packet-switched network. The device itself is used for authentication (most likely its capcode or serial number) and some oddball protocol is spoken to communicate with the switch. Once connected, users have the option of sending a page out, or retrieving pages either too large for the memory of the pager, or from a list of all messages sent in the last 24 hours, in case the subscriber haz*`Æd his pager turned off. Additionally, the devices can be addressed directly via x.400 addresses. (X.400: The CCITT standard that covers email address far too long to be worth sending anyone mail to.) So essentially, any EMBARC customer can be contacted from the Internet. MTEL, the parent company of the huge paging service SkyTel, is implementing what may be the next generation of paging technologies. This service, NWN, being administrated by MTEL subsidiary Destineer, is most oftz+Aen called 2-way paging, but is more accurately Narrowband-PCS. The network allows for the "pager" to be a transceiver. When a page arrives, the device receiving the page will automatically send back an acknowledgment of its completed reception. Devices may also send back some kind of "canned response" the user programs. An example might be: "Thanks, I got it!" or "Why on Earth are you eating up my allocated pages for the month with this crap?" MTEL's service was awarded a Pionez,^ers Preference by the FCC, which gave them access to the narrowband PCS spectrum before the auctions. This is a big deal, and did not go unnoticed by Microsoft. They dumped cash into the network, and said the devices will be supported by Chicago. (Yeah, along with every other device on the planet, right? Plug and Pray!) The network will be layed out almost identically to MTEL's existing paging network, using dedicated lines to connect towers in an area to a central satellite up/z-8downlink. One key difference will be the addition of highly somewhat sensitive receivers on the network, to pick up the ACKs and replies of the customer units, which will probably broadcast at about 2 or 3 watts. The most exciting difference will be the speed at which the network transmits data: 24,000 Kbps. Twenty-four thousand. (I couldn't believe it either. Not only can you get your GIFs sent to your pager, but you get them blinding FAST!) The actual units themselves will mz.>+ost likely look like existing alphanumeric pagers with possibly a few more buttons, and of course, PCMCIA units will be available to integrate with computer applications. Beyond these advancements, other types of services plan on offering paging like features. CDPD, TDMA & CDMA Digital Cellular and ESMR all plan on providing a "pager-like" option for their customers. The mere fact that you can walk into a K-Mart and buy a pager off a rack would indicate to me that pagers are far toz/~ ingrained into our society, and represent a wireless technology that doesn't scare or confuse the yokels. Such a technology doesn't ever really go away. ** BIBLIOGRAPHY ** Kneitel, Tom, "The Secret Life of Beepers," _Popular Communications_, p. 8, July, 1994. O'Brien, Michael, "Beep! Beep! Beep!," _Sun Expert_, p. 17, March, 1994. O'Malley, Chris, "Pagers Grow Up," _Mobile Office_, p. 48, August, 1994. buy a pager off a rack would indicate to me that pagers are far to%I}D2T018rghIntelligence + Interrogation Processes ---============[ Intelligence and Interrogation Processes ]============--- By: Master Of Impact and the Legion Of Hackers INTRODUCTION Doing what we do best always carries the risk of someone, somewhere, wanting to hold you for questioning. In this article I hope to give those persons who that are in use (and are in no ways happen to be all new), that can give you the edge you need to come away "sin faulta". In fact, these i:~q5nterrogation practicies are used a lot by teachers, local police, the FBI and Secret Service girlfriends, wives, parents, etc. to obtain information from you that you probably don't want to give out. Interrogation is the art of questioning and examining a source in order to obtain the maximum amount of useful information. The goal of any interrogation is to obtain useful and reliable information in a lawful manner and in a minimum amount of time. The goal of any source is to deceiveZ!` or hinder any attempts of the interrogator to get information out of him. This article will deal primarily with the principles, techniques, and procedures of intelligence interrogation. By reading this article, one who runs the risk of being interrogated can build countermeasures for common interrogation techniques. This article has some paraphrased material from a government interrogation manual but the majority of the information was from personal experience and prior knowledge o<f the subject. You cannot hope to defeat interrogation techniques unless you first know what they are. The ones listed herein are the most commonly used. After reading this article, you should be able to tell when you are being interrogated by people, and what technique(s) they are using when you probably would not have known before. Once you know what they are up to and how they are going to TRY to accomplish it, YOU have the initiative! INITIATIVE Achieving and maintaining the i/ynitiative is essential to a successful interrogation just as offense is the key to success in combat operations. The initiative in any interrogation must rest with the interrogator throughout the entire interrogation. He will have certain advantages at the beginning of an interrogation which will enable him to grasp the initiative and assist in maintaining the initiative throughout the interrogation. The interrogator has a position of authority over you. You realize this fact, and ip_r.n some cases, believe that your future might well depend upon your association with the interrogator. As in the case of police questioning, "cooperate and we will go easy on you". Like hell they will. The interrogator knows the purpose of the interrogation; the source does not necessarily know the exact reason, but can generally assume (especially in the case of a computer hacker or phone phreak, which is what the term "source" will be referring to during this article) because he or߳ she is most usually conscious of horrible and nasty wrong-doings he or she may have been responsible for. Unfortunately for the source, he is generally very much in the dark about what's happening to his life while it is, in fact, crumbling around him (temporarily, anyway). This gives the source a not-so-illusionary behavior pattern of the proverbial chicken who's had its head chopped off. Having gained the initial advantage which is quite an understatement, seeing that, although trWhe risks to the source during the perpetration of a crime are quite obvious, the possible realistic results of being caught aren't quite as impressive while one is getting away with a crime than when one's home is invaded by the JC Penny-suit men wearing mirrored sunglasses, the interrogator must strive to maintain the initiative applying appropriate interrogation techniques through the exercise of self-control; by taking advantage of the source's weaknesses as they become apparent;  and by continuously displaying an attitude of confidence and self-assurance. The interrogator, however, is 'supposed' to never take advantage of your weaknesses to the extent that the interrogation involves threats, insults, torture or exposure to unpleasant or inhumane treatment of any kind. Remember, the keyword is supposed. It is possible for the interrogator to lose the initiative during the interrogation of a source. If this should occur, he will probably postpone the interroga L+tion and reassess the situation. If the interrogation is resumed, a different interrogator will probably be introduced. Following are some examples of loss of initiative: * The interrogator becomes angry and completely loses his self-control because of the arrogant actions of the source (such as the unbuttoning of a jacket to reveal "Secret Service Sucks" spray painted onto the source's T-shirt.) As a result, the interrogator loses sight of his objective and c 滑oncentrates his efforts on humbling the source. * During the interrogation the interrogator fails to note significant discrepancies in the source's story. The interrogator may lose his initiative as the source gains confidence from his success and resorts to further deception, leading the interrogator away from his objective. * The interrogator becomes overly friendly with the source and allows him to lead the interrogation. The source reports only wh  at he believes to be important and neglects several significant items of info which could have been obtained had the interrogator maintained the initiative. PHASES OF INTERROGATION Approach Phase Regardless of the type of source you are and your outward personality, you do possess weaknesses which, if recognized by the interrogator, can be exploited. A human being is likely to: * Talk, especially after harrowing experiences * Show deference when confronted by P] superior authority * Rationalize acts about which he feels guilty * Lack the ability to apply or to remember lessons he may have been taught regarding security if confronted with a disorganized or a strange situation. * Cooperate with those who have control over him * Attach less importance to a topic which the interrogator demonstrates identical or related experiences and knowledge * Appreciate flattery and exoneration from guilt * Cooperate readily[ when given material rewards * Cooperate readily when treated as an equal TECHNIQUES File and Dossier The interrogator prepares a dossier containing all available info obtained from records and docs concerning you. Careful arrangement of the material with- in the file may give the illusion that it contains more data than is actually there. The file may be "padded" with extra paper, if necessary. Index tabs with titles such as "education", "employment", "criminal record", "bulle4PAvtin boards", "violated computer systems", and others are particularly effective for this purpose. The interrogtor will confront you with the dossier at the beginning of the interrogation and explain that "intelligence" has provided a complete record of every significant happening in your life; therefore, it would be useless to resist interrogation. The interrogator may read a few selected bits of known data to further impress you. If the technique is successful, you will be impressed{ with and more importantly, terrified by the "voluminous" file, conclude that everything is known, and resign to complete cooperation. We know ALL This technique may be employed in conjunction with the above or by itself. The interrogator must first become thoroughly familiar with the available data concerning you. To begin the interrogation, the interrogator asks questions based on his known data. When you hesitate, refuse to answer, or provide an incomplete or incorrect reply, tw\he interrogator himself provides the detailed answer. Through the careful use of the limited number of known details, the interrogator may convince you that all the info is already known; therefore, your answers to the questions are of no consequence. When you begin to give accurate and complete information, the interrogator interjects questions designed to gain the needed info. Questions to which answers are already known are also asked to test you and to maintain the deception that:M all the info is already known. A VERY effective technique I might add. Rapid Fire This approach technique involves a psychological ploy based on the principles that: * Everyone likes to be heard when they speak; and * It is confusing to be interrupted in mid-sentence with an unrelated question. This technique may be used with one, or simultaneously by two or more interrogators in questioning the same source. In employing this technique the interrogator asks a series oX%f questions in such a manner that you do not have time to answer a question completely before the next question is asked. This tends to confuse you and you are apt to contradict yourself, as you have little time to prepare your answers. The interrogator then confronts you with the inconsistencies, causing further contradictions. In many instances you will begin to talk freely in an attempt to explain yourself and deny the inconsistencies pointed out by the interrogator. In attemptingL< to explain your answers, you are likely to reveal more than you intend, thus creating additional leads for the interrogator. Mutt and Jeff This technique involves a psychological ploy which takes advantage of the natural uncertainty and guilt which a source has as a result of being detained and questioned. Use of this technique necessitates the employment of two experienced interrogators who are convincing as actors. Basically, the two interrogators will display opposing personalikties and attitudes towards you. For example the first interrogator is very formal and displays an unsympathetic attitude. This is to make you feel cut off from your friends. At the time when you act hopeless and alone, the second interrogator appears (having received his cue by a signal, and is hidden from you), scolds the first interrogator for his harsh behavior and orders him from the room. He then apologizes to soothe you, perhaps offering coffee and a cigarette. He explains that zw< the actions of the first interrogator were largely the result of an inferior intellect and lack of human sensitivity. The inference is created that the other interrogator and you have in common a high degree of intelligence and an awareness of human sensitivity, above and beyond that of the first interrogator. You are normally inclined to have a feeling of gratitude towards the second interrogator, who continues to show a sympathetic attitude in an effort to increase the rapport andu5 control for the questioning which will follow. Should your cooperativeness begin to fade, the second interrogator can hint that since he is of high rank, having many other duties, he cannot afford to waste time on an uncooperative source. He may broadly infer that the first interrogator might return to continue the questioning. When used against the proper source, this trick will normally gain complete cooperation for the interrogation. Repetition Repetition is used to induce coopÇK=eration from a hostile source. The interrogator listens carefully to your answer to a question, and then repeats both the question and answer several times. He does this with each succeeding question until you become so bored with the procedure that you answer the question fully and truthfully to satisfy the interrogator and to gain relief from the monotony of this method of questioning. The repetition technique will generally not work when employed against introverted sources or thoįovse having great self control. Pride and Ego This technique works effectively on many phreaks and hackers due to the fact that many are so damn egotistical. The strategy is to trick you into revealing desired information by flattering you. It is effective with sources who have displayed weaknesses or feelings of inferiority. The interrogator accuses you of weakness or implies that you are unable to do a certain thing. The proud or egotistical source will jump to the defensive. An exF ample of an opening question for this technique may be: "Why would you own a blue box when you have absolutely no idea how to use one?" or, "Why do you hack VMS systems if you can't do a damn thing once you're inside of one?" It provides you with the opportunity to show someone that you have "brains" and in doing so, you give the interrogator more information than you should have. Silent The Silent technique may be successful when used against either the nervous, or the confident-te[ype source. When employing this technique, the interrogator says nothing to you, but looks you squarely in the eye, probably with a slight smile on his face. It is important for the interrogator not to look away from you, but force you to break eye contact first. You will become nervous, begin to shift around in your chair, and look away. If you ask questions the interrogator probably will not answer them until he is ready to break the silence. A source may blurt out questions such aǛ@s, "What the hell do you want with me". When the interrogator is ready to break the silence, he may do so with some quite nonchalant questions such as, "You've been logging on to our system for a long time now, haven't you? Did you hack the passwords yourself?". In some cases the interrogator will use several approach techniques concurrently, or in succession. QUESTIONS There are various questions that the interrogator may ask you: Prepared questions When the topic under inqZuiry is very technical or when legal aspects of the interrogation require preciseness, the interrogator will have a list of prepared questions to follow during the interrogation. Control questions To maintain control and to check on the truthfulness of a source, the normal questions will be mixed with control questions-those with known answers. If you fail to answer these questions, or answer wrong, it will indicate that you are either not knowledgeable.C in the topic or that you are lying. Nonpertinent questions Sometimes it is necessary for the interrogator to keep the true objective of the interrogation from you. By carefully blending pertinent questions with nonpertinent questions, the interrogator can conceal the true purpose of the inquiry. Direct and leading questions The manner in which the questions are worded has a direct bearing on your response. A question may be posed in a number of wDays: o "What system did you hack into on 11/11/86?" o "Did you break into General Dynamics' computer on 11/11/86?" o "You did break into GD's computer on 11/11/86?" o "You didn't break into GD'S computer on 11/11/86, did you?" PSYCHOLOGY IN INTERROGATION The interrogator will watch for various psychological responses from you during an interrogation. Some of these are: * Rationalization: Creating plausible excuses or explanations for one's a ˃jQcts without being aware that these excuses or explanations are way off the [obvious] reality. * Identification: To identify with and mimic a mental image of some one important to you. * Compensation: Trying to make up for a psychological weakness by building up or exaggerating a psychological strength. * Exhibitionism: Showing off, bragging, etc. * Fear, Anger, Frustration, etc. Of course when being interrogated, you should remain as emotionless as possibl!ɸ~e and never show anger, or get upset (NEVER inflict physical abuse upon the unsuspecting interrogator. This only creates tension between both the inter- rogator and yourself). Your every move, every response, every action is noted and used by the interrogator to get you to screw up and give him what he wants. There can be two main objectives that you can obtain when being interrogated. The first is to find ways to force the interrogator to lose his initiative. You can do this in many"> ways. A few that come to mind are: Repeat everything the interrogator says. Mimic the interrogator. Laugh at the interrogator. Basically piss the interrogator off and make him so mad that he loses sight of his objective. This may however, get you in deeper trouble, but it may give you extra time while another interrogator is found. Lie like hell to the interrogator and piss him off. Such as the pathological liar gimmick: "I broke into the NSA's computer, yeah, and then used their n#ļetwork to get into the presidents private computer yeah that's it, the password was uh...Bonzo, yeah, and then used it to take control of a satellite used for Star Wars, and made it land right on top of the Kremlin, yeah that's the ticket!" You can also change the subject over and over again to totally unrelated things such as: its a nice day out today, hows the wife and kids, how about some food, who do you think is going to the superbowl, etc. The other and probably better objectiv$ҝe is simply to pretend to fall for any of the various techniques used against you and feed the interrogator more and more bullshit, of course being very sincere. This way he gets totally bogus information while thinking you are cooperating fully. Well, I hope you never have to put this article to use in a legal manner, but you would be surprised how everyday you are interrogated without even realizing it by normal people who probably don't realize they are interrogating you! As sta%\f{yted in the other articles, you can reach me for comment via the staff account. MofI (LOH) he interrogator more and more bullshit, of course being very sincere. This way he gets totally bogus information while thinking you are cooperating fully. Well, I hope you never have to put this article to use in a legal manner, but you would be surprised how everyday you are interrogated without even realizing it by normal people who probably don't realize they are interrogating you! As staH̨{     l2V*020rłGuide To Cellular Technology ---=================[ GUIDE TO CELLULAR TECHNOLOGY ]==================--- CONTENTS: Part 1 - Cellular phone channel construction Part 2 - Cellular phone frequency and cell construction Part 3 - The Electronic Communications Privacy Act and CMT Part 4 - The ECPA Part 5 - A lawyer's review and perspective of the ECPA Part 6 - Modifying two scanners for cellular reception Part 7 - How to discover other scanner modifications ==========================F===================================================== Cellular phone channel construction =============================================================================== Here is a method of determining which frequencies are used in a cellular system, and which ones are in what cells. If the system uses OMNICELLS, as most do, you can readily find all the channels in a cell if you know just one of them, using tables constructed with the instructions below.4 Cellular frequencies are assigned by channel number, and for all channel numbers, in both wireline and non-wireline systems, the formula is: Transmit Frequency = (channel number x .030 MHz) + 870 MHz Receive Frequency = (channel number x .030 Mhz) + 825 Mhz "Band A" (one of the two blocks) uses channels 1 - 333. To construct a table showing frequency by cells, use channel 333 as the top left corner of a table. The next entry to the right of channel 333 is 332, tٳ he next is 331, etc., down to channel 313. Enter channel 312 underneath 333, 311 under 332, etc. Each channel across the top row is the first channel in each CELL of the system; each channel DOWN from the column from the the first channel is the next frequency assigned to that cell. You may have noted that each channel down is 21 channels lower in number. Usually the data channel used is the highest numbered channel in a cell. "Band B" uses channels from 334 to 666. Constru֓\ct your table in a similar way, with channel 334 in the upper left corner, 335 the next entry to the right. The data channel should be the lowest numbered channel in each cell this time. Cellular Phone Band A (Channel 1 is Data) Cell # 1 -------------------------------------------------- Channel 1 (333) Tx 879.990 Rx 834.990 Channel 2 (312) Tx 879.360 Rx 834.360 Channel 3 (291) Tx 878.730 Rx 833.730 Channel 4 (270) Tx 878.100 Rx 833.100 Channel 5 (249) Tx 8ך[77.470 Rx 832.470 Channel 6 (228) Tx 876.840 Rx 831.840 Channel 7 (207) Tx 876.210 Rx 831.210 Channel 8 (186) Tx 875.580 Rx 830.580 Channel 9 (165) Tx 874.950 Rx 829.950 Channel 10 (144) Tx 874.320 Rx 829.320 Channel 11 (123) Tx 873.690 Rx 828.690 Channel 12 (102) Tx 873.060 Rx 828.060 Channel 13 (81) Tx 872.430 Rx 827.430 Channel 14 (60) Tx 871.800 Rx 826.800 Channel 15 (39) Tx 871.170 Rx 826.170 Channel 16 (18) Tx 870.540 Rx 825.̩Channel 7 (196) Tx 875.880 Rx 830.880 Channel 8 (175) Tx 875.250 Rx 830.250 Channel 9 (154) Tx 874.620 Rx 829.620 Channel 10 (133) Tx 873.990 Rx 828.990 Channel 11 (112) Tx 873.360 Rx 828.360 Channel 12 (91) Tx 872.730 Rx 827.730 Channel 13 (70) Tx 872.100 Rx 827.100 Channel 14 (49) Tx 871.470 Rx 826.470 Channel 15 (28) Tx 870.840 Rx 825.840 Channel 16 (7) Tx 870.210 Rx 825.210 Cell # 13 -------------------------------------------------- "Channel 1 (321) Tx 879.630 Rx 834.630 Channel 2 (300) Tx 879.000 Rx 834.000 Channel 3 (279) Tx 878.370 Rx 833.370 Channel 4 (258) Tx 877.740 Rx 832.740 Channel 5 (237) Tx 877.110 Rx 832.110 Channel 6 (216) Tx 876.480 Rx 831.480 Channel 7 (195) Tx 875.850 Rx 830.850 Channel 8 (174) Tx 875.220 Rx 830.220 Channel 9 (153) Tx 874.590 Rx 829.590 Channel 10 (132) Tx 873.960 Rx 828.960 Channel 11 (111) Tx 873.330 Rx 828.330 Channel 12 (90MVR) Tx 872.700 Rx 827.700 Channel 13 (69) Tx 872.070 Rx 827.070 Channel 14 (48) Tx 871.440 Rx 826.440 Channel 15 (27) Tx 870.810 Rx 825.810 Channel 16 (6) Tx 870.180 Rx 825.180 Cell # 14 -------------------------------------------------- Channel 1 (320) Tx 879.600 Rx 834.600 Channel 2 (299) Tx 878.970 Rx 833.970 Channel 3 (278) Tx 878.340 Rx 833.340 Channel 4 (257) Tx 877.710 Rx 832.710 Channel 5 (236) Tx 877.080 Rx 832.080 Channel 6 (219*5) Tx 876.450 Rx 831.450 Channel 7 (194) Tx 875.820 Rx 830.820 Channel 8 (173) Tx 875.190 Rx 830.190 Channel 9 (152) Tx 874.560 Rx 829.560 Channel 10 (131) Tx 873.930 Rx 828.930 Channel 11 (110) Tx 873.300 Rx 828.300 Channel 12 (89) Tx 872.670 Rx 827.670 Channel 13 (68) Tx 872.040 Rx 827.040 Channel 14 (47) Tx 871.410 Rx 826.410 Channel 15 (26) Tx 870.780 Rx 825.780 Channel 16 (5) Tx 870.150 Rx 825.150 Cell # 15 ----------------------- P--------------------------- Channel 1 (319) Tx 879.570 Rx 834.570 Channel 2 (298) Tx 878.940 Rx 833.940 Channel 3 (277) Tx 878.310 Rx 833.310 Channel 4 (256) Tx 877.680 Rx 832.680 Channel 5 (235) Tx 877.050 Rx 832.050 Channel 6 (214) Tx 876.420 Rx 831.420 Channel 7 (193) Tx 875.790 Rx 830.790 Channel 8 (172) Tx 875.160 Rx 830.160 Channel 9 (151) Tx 874.530 Rx 829.530 Channel 10 (130) Tx 873.900 Rx 828.900 Channel 11 (109) Tx 873.270^@3 Rx 828.270 Channel 12 (88) Tx 872.640 Rx 827.640 Channel 13 (67) Tx 872.010 Rx 827.010 Channel 14 (46) Tx 871.380 Rx 826.380 Channel 15 (25) Tx 870.750 Rx 825.750 Channel 16 (4) Tx 870.120 Rx 825.120 Cell # 16 -------------------------------------------------- Channel 1 (318) Tx 879.540 Rx 834.540 Channel 2 (297) Tx 878.910 Rx 833.910 Channel 3 (276) Tx 878.280 Rx 833.280 Channel 4 (255) Tx 877.650 Rx 832.650 Channel 5 (234) Tx 877.020  Rx 832.020 Channel 6 (213) Tx 876.390 Rx 831.390 Channel 7 (192) Tx 875.760 Rx 830.760 Channel 8 (171) Tx 875.130 Rx 830.130 Channel 9 (150) Tx 874.500 Rx 829.500 Channel 10 (129) Tx 873.870 Rx 828.870 Channel 11 (108) Tx 873.240 Rx 828.240 Channel 12 (87) Tx 872.610 Rx 827.610 Channel 13 (66) Tx 871.980 Rx 826.980 Channel 14 (45) Tx 871.350 Rx 826.350 Channel 15 (24) Tx 870.720 Rx 825.720 Channel 16 (3) Tx 870.090 Rx 825.090 Cell 1\# 17 -------------------------------------------------- Channel 1 (317) Tx 879.510 Rx 834.510 Channel 2 (296) Tx 878.880 Rx 833.880 Channel 3 (275) Tx 878.250 Rx 833.250 Channel 4 (254) Tx 877.620 Rx 832.620 Channel 5 (233) Tx 876.990 Rx 831.990 Channel 6 (212) Tx 876.360 Rx 831.360 Channel 7 (191) Tx 875.730 Rx 830.730 Channel 8 (170) Tx 875.100 Rx 830.100 Channel 9 (149) Tx 874.470 Rx 829.470 Channel 10 (128) Tx 873.840 Rx 828.840 ChICannel 11 (107) Tx 873.210 Rx 828.210 Channel 12 (86) Tx 872.580 Rx 827.580 Channel 13 (65) Tx 871.950 Rx 826.950 Channel 14 (44) Tx 871.320 Rx 826.320 Channel 15 (23) Tx 870.690 Rx 825.690 Channel 16 (2) Tx 870.060 Rx 825.060 Cell # 18 -------------------------------------------------- Channel 1 (316) Tx 879.480 Rx 834.480 Channel 2 (295) Tx 878.850 Rx 833.850 Channel 3 (274) Tx 878.220 Rx 833.220 Channel 4 (253) Tx 877.590 Rx 832.590 Ch Lannel 5 (232) Tx 876.960 Rx 831.960 Channel 6 (211) Tx 876.330 Rx 831.330 Channel 7 (190) Tx 875.700 Rx 830.700 Channel 8 (169) Tx 875.070 Rx 830.070 Channel 9 (148) Tx 874.440 Rx 829.440 Channel 10 (127) Tx 873.810 Rx 828.810 Channel 11 (106) Tx 873.180 Rx 828.180 Channel 12 (85) Tx 872.550 Rx 827.550 Channel 13 (64) Tx 871.920 Rx 826.920 Channel 14 (43) Tx 871.290 Rx 826.290 Channel 15 (22) Tx 870.660 Rx 825.660 Channel 16 (1) T!Xӽx 870.030 Rx 825.030 Cell # 19 -------------------------------------------------- Channel 1 (315) Tx 879.450 Rx 834.450 Channel 2 (294) Tx 878.820 Rx 833.820 Channel 3 (273) Tx 878.190 Rx 833.190 Channel 4 (252) Tx 877.560 Rx 832.560 Channel 5 (231) Tx 876.930 Rx 831.930 Channel 6 (210) Tx 876.300 Rx 831.300 Channel 7 (189) Tx 875.670 Rx 830.670 Channel 8 (168) Tx 875.040 Rx 830.040 Channel 9 (147) Tx 874.410 Rx 829.410 Channel 10 (126)"] Tx 873.780 Rx 828.780 Channel 11 (105) Tx 873.150 Rx 828.150 Channel 12 (84) Tx 872.520 Rx 827.520 Channel 13 (63) Tx 871.890 Rx 826.890 Channel 14 (42) Tx 871.260 Rx 826.260 Channel 15 (21) Tx 870.630 Rx 825.630 Cell # 20 -------------------------------------------------- Channel 1 (314) Tx 879.420 Rx 834.420 Channel 2 (293) Tx 878.790 Rx 833.790 Channel 3 (272) Tx 878.160 Rx 833.160 Channel 4 (251) Tx 877.530 Rx 832.530 Channel 5 (#,A230) Tx 876.900 Rx 831.900 Channel 6 (209) Tx 876.270 Rx 831.270 Channel 7 (188) Tx 875.640 Rx 830.640 Channel 8 (167) Tx 875.010 Rx 830.010 Channel 9 (146) Tx 874.380 Rx 829.380 Channel 10 (125) Tx 873.750 Rx 828.750 Channel 11 (104) Tx 873.120 Rx 828.120 Channel 12 (83) Tx 872.490 Rx 827.490 Channel 13 (62) Tx 871.860 Rx 826.860 Channel 14 (41) Tx 871.230 Rx 826.230 Channel 15 (20) Tx 870.600 Rx 825.600 Cell # 21 -----------------$w3--------------------------------- Channel 1 (313) Tx 879.390 Rx 834.390 Channel 2 (292) Tx 878.760 Rx 833.760 Channel 3 (271) Tx 878.130 Rx 833.130 Channel 4 (250) Tx 877.500 Rx 832.500 Channel 5 (229) Tx 876.870 Rx 831.870 Channel 6 (208) Tx 876.240 Rx 831.240 Channel 7 (187) Tx 875.610 Rx 830.610 Channel 8 (166) Tx 874.980 Rx 829.980 Channel 9 (145) Tx 874.350 Rx 829.350 Channel 10 (124) Tx 873.720 Rx 828.720 Channel 11 (103) Tx 8%c773.090 Rx 828.090 Channel 12 (82) Tx 872.460 Rx 827.460 Channel 13 (61) Tx 871.830 Rx 826.830 Channel 14 (40) Tx 871.200 Rx 826.200 Channel 15 (19) Tx 870.570 Rx 825.570 ************************************************** Cellular Phone Band B (Channel 1 is Data) Cell # 1 -------------------------------------------------- Channel 1 (334) Tx 880.020 Rx 835.020 Channel 2 (355) Tx 880.650 Rx 835.650 Channel 3 (376) Tx 881.280 Rx 836.280 Chan&5 nel 4 (397) Tx 881.910 Rx 836.910 Channel 5 (418) Tx 882.540 Rx 837.540 Channel 6 (439) Tx 883.170 Rx 838.170 Channel 7 (460) Tx 883.800 Rx 838.800 Channel 8 (481) Tx 884.430 Rx 839.430 Channel 9 (502) Tx 885.060 Rx 840.060 Channel 10 (523) Tx 885.690 Rx 840.690 Channel 11 (544) Tx 886.320 Rx 841.320 Channel 12 (565) Tx 886.950 Rx 841.950 Channel 13 (586) Tx 887.580 Rx 842.580 Channel 14 (607) Tx 888.210 Rx 843.210 Channel 15 (628) 'Q Tx 888.840 Rx 843.840 Channel 16 (649) Tx 889.470 Rx 844.470 Cell # 2 -------------------------------------------------- Channel 1 (335) Tx 880.050 Rx 835.050 Channel 2 (356) Tx 880.680 Rx 835.680 Channel 3 (377) Tx 881.310 Rx 836.310 Channel 4 (398) Tx 881.940 Rx 836.940 Channel 5 (419) Tx 882.570 Rx 837.570 Channel 6 (440) Tx 883.200 Rx 838.200 Channel 7 (461) Tx 883.830 Rx 838.830 Channel 8 (482) Tx 884.460 Rx 839.460 Channel 9 (503() Tx 885.090 Rx 840.090 Channel 10 (524) Tx 885.720 Rx 840.720 Channel 11 (545) Tx 886.350 Rx 841.350 Channel 12 (566) Tx 886.980 Rx 841.980 Channel 13 (587) Tx 887.610 Rx 842.610 Channel 14 (608) Tx 888.240 Rx 843.240 Channel 15 (629) Tx 888.870 Rx 843.870 Channel 16 (650) Tx 889.500 Rx 844.500 Cell # 3 -------------------------------------------------- Channel 1 (336) Tx 880.080 Rx 835.080 Channel 2 (357) Tx 880.710 Rx 835.710 Channel 3 ()378) Tx 881.340 Rx 836.340 Channel 4 (399) Tx 881.970 Rx 836.970 Channel 5 (420) Tx 882.600 Rx 837.600 Channel 6 (441) Tx 883.230 Rx 838.230 Channel 7 (462) Tx 883.860 Rx 838.860 Channel 8 (483) Tx 884.490 Rx 839.490 Channel 9 (504) Tx 885.120 Rx 840.120 Channel 10 (525) Tx 885.750 Rx 840.750 Channel 11 (546) Tx 886.380 Rx 841.380 Channel 12 (567) Tx 887.010 Rx 842.010 Channel 13 (588) Tx 887.640 Rx 842.640 Channel 14 (609) Tx 888.2*\70 Rx 843.270 Channel 15 (630) Tx 888.900 Rx 843.900 Channel 16 (651) Tx 889.530 Rx 844.530 Cell # 4 -------------------------------------------------- Channel 1 (337) Tx 880.110 Rx 835.110 Channel 2 (358) Tx 880.740 Rx 835.740 Channel 3 (379) Tx 881.370 Rx 836.370 Channel 4 (400) Tx 882.000 Rx 837.000 Channel 5 (421) Tx 882.630 Rx 837.630 Channel 6 (442) Tx 883.260 Rx 838.260 Channel 7 (463) Tx 883.890 Rx 838.890 Channel 8 (484) Tx 88+M4.520 Rx 839.520 Channel 9 (505) Tx 885.150 Rx 840.150 Channel 10 (526) Tx 885.780 Rx 840.780 Channel 11 (547) Tx 886.410 Rx 841.410 Channel 12 (568) Tx 887.040 Rx 842.040 Channel 13 (589) Tx 887.670 Rx 842.670 Channel 14 (610) Tx 888.300 Rx 843.300 Channel 15 (631) Tx 888.930 Rx 843.930 Channel 16 (652) Tx 889.560 Rx 844.560 Cell # 5 -------------------------------------------------- Channel 1 (338) Tx 880.140 Rx 835.140 Channel 2 (359) Tx,h 880.770 Rx 835.770 Channel 3 (380) Tx 881.400 Rx 836.400 Channel 4 (401) Tx 882.030 Rx 837.030 Channel 5 (422) Tx 882.660 Rx 837.660 Channel 6 (443) Tx 883.290 Rx 838.290 Channel 7 (464) Tx 883.920 Rx 838.920 Channel 8 (485) Tx 884.550 Rx 839.550 Channel 9 (506) Tx 885.180 Rx 840.180 Channel 10 (527) Tx 885.810 Rx 840.810 Channel 11 (548) Tx 886.440 Rx 841.440 Channel 12 (569) Tx 887.070 Rx 842.070 Channel 13 (590) Tx 887.700 Rx 84-3*2.700 Channel 14 (611) Tx 888.330 Rx 843.330 Channel 15 (632) Tx 888.960 Rx 843.960 Channel 16 (653) Tx 889.590 Rx 844.590 Cell # 6 -------------------------------------------------- Channel 1 (339) Tx 880.170 Rx 835.170 Channel 2 (360) Tx 880.800 Rx 835.800 Channel 3 (381) Tx 881.430 Rx 836.430 Channel 4 (402) Tx 882.060 Rx 837.060 Channel 5 (423) Tx 882.690 Rx 837.690 Channel 6 (444) Tx 883.320 Rx 838.320 Channel 7 (465) Tx 883.950 Rx. 838.950 Channel 8 (486) Tx 884.580 Rx 839.580 Channel 9 (507) Tx 885.210 Rx 840.210 Channel 10 (528) Tx 885.840 Rx 840.840 Channel 11 (549) Tx 886.470 Rx 841.470 Channel 12 (570) Tx 887.100 Rx 842.100 Channel 13 (591) Tx 887.730 Rx 842.730 Channel 14 (612) Tx 888.360 Rx 843.360 Channel 15 (633) Tx 888.990 Rx 843.990 Channel 16 (654) Tx 889.620 Rx 844.620 Cell # 7 -------------------------------------------------- Channel 1 (340) Tx 880.200 /:; Rx 835.200 Channel 2 (361) Tx 880.830 Rx 835.830 Channel 3 (382) Tx 881.460 Rx 836.460 Channel 4 (403) Tx 882.090 Rx 837.090 Channel 5 (424) Tx 882.720 Rx 837.720 Channel 6 (445) Tx 883.350 Rx 838.350 Channel 7 (466) Tx 883.980 Rx 838.980 Channel 8 (487) Tx 884.610 Rx 839.610 Channel 9 (508) Tx 885.240 Rx 840.240 Channel 10 (529) Tx 885.870 Rx 840.870 Channel 11 (550) Tx 886.500 Rx 841.500 Channel 12 (571) Tx 887.130 Rx 842.130 Cha03:nnel 13 (592) Tx 887.760 Rx 842.760 Channel 14 (613) Tx 888.390 Rx 843.390 Channel 15 (634) Tx 889.020 Rx 844.020 Channel 16 (655) Tx 889.650 Rx 844.650 Cell # 8 -------------------------------------------------- Channel 1 (341) Tx 880.230 Rx 835.230 Channel 2 (362) Tx 880.860 Rx 835.860 Channel 3 (383) Tx 881.490 Rx 836.490 Channel 4 (404) Tx 882.120 Rx 837.120 Channel 5 (425) Tx 882.750 Rx 837.750 Channel 6 (446) Tx 883.380 Rx 838.380 1{Channel 7 (467) Tx 884.010 Rx 839.010 Channel 8 (488) Tx 884.640 Rx 839.640 Channel 9 (509) Tx 885.270 Rx 840.270 Channel 10 (530) Tx 885.900 Rx 840.900 Channel 11 (551) Tx 886.530 Rx 841.530 Channel 12 (572) Tx 887.160 Rx 842.160 Channel 13 (593) Tx 887.790 Rx 842.790 Channel 14 (614) Tx 888.420 Rx 843.420 Channel 15 (635) Tx 889.050 Rx 844.050 Channel 16 (656) Tx 889.680 Rx 844.680 Cell # 9 ------------------------------------------------2<-- Channel 1 (342) Tx 880.260 Rx 835.260 Channel 2 (363) Tx 880.890 Rx 835.890 Channel 3 (384) Tx 881.520 Rx 836.520 Channel 4 (405) Tx 882.150 Rx 837.150 Channel 5 (426) Tx 882.780 Rx 837.780 Channel 6 (447) Tx 883.410 Rx 838.410 Channel 7 (468) Tx 884.040 Rx 839.040 Channel 8 (489) Tx 884.670 Rx 839.670 Channel 9 (510) Tx 885.300 Rx 840.300 Channel 10 (531) Tx 885.930 Rx 840.930 Channel 11 (552) Tx 886.560 Rx 841.560 Channel 12 3[3(573) Tx 887.190 Rx 842.190 Channel 13 (594) Tx 887.820 Rx 842.820 Channel 14 (615) Tx 888.450 Rx 843.450 Channel 15 (636) Tx 889.080 Rx 844.080 Channel 16 (657) Tx 889.710 Rx 844.710 Cell # 10 -------------------------------------------------- Channel 1 (343) Tx 880.290 Rx 835.290 Channel 2 (364) Tx 880.920 Rx 835.920 Channel 3 (385) Tx 881.550 Rx 836.550 Channel 4 (406) Tx 882.180 Rx 837.180 Channel 5 (427) Tx 882.810 Rx 837.810 Channel 4996 (448) Tx 883.440 Rx 838.440 Channel 7 (469) Tx 884.070 Rx 839.070 Channel 8 (490) Tx 884.700 Rx 839.700 Channel 9 (511) Tx 885.330 Rx 840.330 Channel 10 (532) Tx 885.960 Rx 840.960 Channel 11 (553) Tx 886.590 Rx 841.590 Channel 12 (574) Tx 887.220 Rx 842.220 Channel 13 (595) Tx 887.850 Rx 842.850 Channel 14 (616) Tx 888.480 Rx 843.480 Channel 15 (637) Tx 889.110 Rx 844.110 Channel 16 (658) Tx 889.740 Rx 844.740 Cell # 11 ------------5-------------------------------------- Channel 1 (344) Tx 880.320 Rx 835.320 Channel 2 (365) Tx 880.950 Rx 835.950 Channel 3 (386) Tx 881.580 Rx 836.580 Channel 4 (407) Tx 882.210 Rx 837.210 Channel 5 (428) Tx 882.840 Rx 837.840 Channel 6 (449) Tx 883.470 Rx 838.470 Channel 7 (470) Tx 884.100 Rx 839.100 Channel 8 (491) Tx 884.730 Rx 839.730 Channel 9 (512) Tx 885.360 Rx 840.360 Channel 10 (533) Tx 885.990 Rx 840.990 Channel 11 (554) 6K/ Tx 886.620 Rx 841.620 Channel 12 (575) Tx 887.250 Rx 842.250 Channel 13 (596) Tx 887.880 Rx 842.880 Channel 14 (617) Tx 888.510 Rx 843.510 Channel 15 (638) Tx 889.140 Rx 844.140 Channel 16 (659) Tx 889.770 Rx 844.770 Cell # 12 -------------------------------------------------- Channel 1 (345) Tx 880.350 Rx 835.350 Channel 2 (366) Tx 880.980 Rx 835.980 Channel 3 (387) Tx 881.610 Rx 836.610 Channel 4 (408) Tx 882.240 Rx 837.240 Channel 5 (427C9) Tx 882.870 Rx 837.870 Channel 6 (450) Tx 883.500 Rx 838.500 Channel 7 (471) Tx 884.130 Rx 839.130 Channel 8 (492) Tx 884.760 Rx 839.760 Channel 9 (513) Tx 885.390 Rx 840.390 Channel 10 (534) Tx 886.020 Rx 841.020 Channel 11 (555) Tx 886.650 Rx 841.650 Channel 12 (576) Tx 887.280 Rx 842.280 Channel 13 (597) Tx 887.910 Rx 842.910 Channel 14 (618) Tx 888.540 Rx 843.540 Channel 15 (639) Tx 889.170 Rx 844.170 Channel 16 (660) Tx 889.8008 af Rx 844.800 Cell # 13 -------------------------------------------------- Channel 1 (346) Tx 880.380 Rx 835.380 Channel 2 (367) Tx 881.010 Rx 836.010 Channel 3 (388) Tx 881.640 Rx 836.640 Channel 4 (409) Tx 882.270 Rx 837.270 Channel 5 (430) Tx 882.900 Rx 837.900 Channel 6 (451) Tx 883.530 Rx 838.530 Channel 7 (472) Tx 884.160 Rx 839.160 Channel 8 (493) Tx 884.790 Rx 839.790 Channel 9 (514) Tx 885.420 Rx 840.420 Channel 10 (535) Tx 8869 LN.050 Rx 841.050 Channel 11 (556) Tx 886.680 Rx 841.680 Channel 12 (577) Tx 887.310 Rx 842.310 Channel 13 (598) Tx 887.940 Rx 842.940 Channel 14 (619) Tx 888.570 Rx 843.570 Channel 15 (640) Tx 889.200 Rx 844.200 Channel 16 (661) Tx 889.830 Rx 844.830 Cell # 14 -------------------------------------------------- Channel 1 (347) Tx 880.410 Rx 835.410 Channel 2 (368) Tx 881.040 Rx 836.040 Channel 3 (389) Tx 881.670 Rx 836.670 Channel 4 (410) Tx: : 882.300 Rx 837.300 Channel 5 (431) Tx 882.930 Rx 837.930 Channel 6 (452) Tx 883.560 Rx 838.560 Channel 7 (473) Tx 884.190 Rx 839.190 Channel 8 (494) Tx 884.820 Rx 839.820 Channel 9 (515) Tx 885.450 Rx 840.450 Channel 10 (536) Tx 886.080 Rx 841.080 Channel 11 (557) Tx 886.710 Rx 841.710 Channel 12 (578) Tx 887.340 Rx 842.340 Channel 13 (599) Tx 887.970 Rx 842.970 Channel 14 (620) Tx 888.600 Rx 843.600 Channel 15 (641) Tx 889.230 Rx 84; 0ĸ?dhannel 15 (643) Tx 889.290 Rx 844.290 Channel 16 (664) Tx 889.920 Rx 844.920 Cell # 17 -------------------------------------------------- Channel 1 (350) Tx 880.500 Rx 835.500 Channel 2 (371) Tx 881.130 Rx 836.130 Channel 3 (392) Tx 881.760 Rx 836.760 Channel 4 (413) Tx 882.390 Rx 837.390 Channel 5 (434) Tx 883.020 Rx 838.020 Channel 6 (455) Tx 883.650 Rx 838.650 Channel 7 (476) Tx 884.280 Rx 839.280 Channel 8 (497) Tx 884.910 Rx 839.9?N]10 Channel 9 (518) Tx 885.540 Rx 840.540 Channel 10 (539) Tx 886.170 Rx 841.170 Channel 11 (560) Tx 886.800 Rx 841.800 Channel 12 (581) Tx 887.430 Rx 842.430 Channel 13 (602) Tx 888.060 Rx 843.060 Channel 14 (623) Tx 888.690 Rx 843.690 Channel 15 (644) Tx 889.320 Rx 844.320 Channel 16 (665) Tx 889.950 Rx 844.950 Cell # 18 -------------------------------------------------- Channel 1 (351) Tx 880.530 Rx 835.530 Channel 2 (372) Tx 881.160 Rx 8@mn36.160 Channel 3 (393) Tx 881.790 Rx 836.790 Channel 4 (414) Tx 882.420 Rx 837.420 Channel 5 (435) Tx 883.050 Rx 838.050 Channel 6 (456) Tx 883.680 Rx 838.680 Channel 7 (477) Tx 884.310 Rx 839.310 Channel 8 (498) Tx 884.940 Rx 839.940 Channel 9 (519) Tx 885.570 Rx 840.570 Channel 10 (540) Tx 886.200 Rx 841.200 Channel 11 (561) Tx 886.830 Rx 841.830 Channel 12 (582) Tx 887.460 Rx 842.460 Channel 13 (603) Tx 888.090 Rx 843.090 Channel A.14 (624) Tx 888.720 Rx 843.720 Channel 15 (645) Tx 889.350 Rx 844.350 Channel 16 (666) Tx 889.980 Rx 844.980 Cell # 19 -------------------------------------------------- Channel 1 (352) Tx 880.560 Rx 835.560 Channel 2 (373) Tx 881.190 Rx 836.190 Channel 3 (394) Tx 881.820 Rx 836.820 Channel 4 (415) Tx 882.450 Rx 837.450 Channel 5 (436) Tx 883.080 Rx 838.080 Channel 6 (457) Tx 883.710 Rx 838.710 Channel 7 (478) Tx 884.340 Rx 839.340 ChanBinel 8 (499) Tx 884.970 Rx 839.970 Channel 9 (520) Tx 885.600 Rx 840.600 Channel 10 (541) Tx 886.230 Rx 841.230 Channel 11 (562) Tx 886.860 Rx 841.860 Channel 12 (583) Tx 887.490 Rx 842.490 Channel 13 (604) Tx 888.120 Rx 843.120 Channel 14 (625) Tx 888.750 Rx 843.750 Channel 15 (646) Tx 889.380 Rx 844.380 Cell # 20 -------------------------------------------------- Channel 1 (353) Tx 880.590 Rx 835.590 Channel 2 (374) Tx 881.220 Rx 836.220 CChannel 3 (395) Tx 881.850 Rx 836.850 Channel 4 (416) Tx 882.480 Rx 837.480 Channel 5 (437) Tx 883.110 Rx 838.110 Channel 6 (458) Tx 883.740 Rx 838.740 Channel 7 (479) Tx 884.370 Rx 839.370 Channel 8 (500) Tx 885.000 Rx 840.000 Channel 9 (521) Tx 885.630 Rx 840.630 Channel 10 (542) Tx 886.260 Rx 841.260 Channel 11 (563) Tx 886.890 Rx 841.890 Channel 12 (584) Tx 887.520 Rx 842.520 Channel 13 (605) Tx 888.150 Rx 843.150 Channel 14 (62DI<6) Tx 888.780 Rx 843.780 Channel 15 (647) Tx 889.410 Rx 844.410 Cell # 21 -------------------------------------------------- Channel 1 (354) Tx 880.620 Rx 835.620 Channel 2 (375) Tx 881.250 Rx 836.250 Channel 3 (396) Tx 881.880 Rx 836.880 Channel 4 (417) Tx 882.510 Rx 837.510 Channel 5 (438) Tx 883.140 Rx 838.140 Channel 6 (459) Tx 883.770 Rx 838.770 Channel 7 (480) Tx 884.400 Rx 839.400 Channel 8 (501) Tx 885.030 Rx 840.030 Channel 9 E2 (522) Tx 885.660 Rx 840.660 Channel 10 (543) Tx 886.290 Rx 841.290 Channel 11 (564) Tx 886.920 Rx 841.920 Channel 12 (585) Tx 887.550 Rx 842.550 Channel 13 (606) Tx 888.180 Rx 843.180 Channel 14 (627) Tx 888.810 Rx 843.810 Channel 15 (648) Tx 889.440 Rx 844.440 =============================================================================== Cellular phone frequency and cell construction ===================================================F=v============================ __ __ \__/C \__/D \__ \__/G \__/A \__/ _/D \__/E \__/F \__ \__/B \__/C \__/ _/F \__/G \__/A \__ \__/D \__/E \__/ _/A \__/B \__/C \__ \__/ \__/ \__/ This represents how a cellular system might be laidG0A out. Cells A and B never share a common border. Neither do B and C, A and G, etc. Cells that are next to each other are never assigned adjacent frequencies. They always differ by at least 60 kiloHertz. To track a mobile phone as it changes cells, let's put the mobile in a B cell. When the mobile switches frequencies, you know that he could only go to an D, E, F or G cell because A and C have adjacent frequencies. The two tables below will help you determine which channel cellsH;w can go next to each other. You can contact your local cellular phone company and see if they have any maps of the cells available. This is not a sure thing, but it couldn't hurt to try. Cells that can go next to each other: Cell Compatible cells A C, D, E, F B D, E, F, G C E, F, G, A D F, G, A, B E G, A, B, C F A, B, C, D G B, C, D, E Here is a frequency/cell layout chart. The cell frequencies are used by Ha`_^]\[ZYXWVUTSRQPONMLKJIHGFEDCBA@?>=<;:9876543210/.-,+*)('&%$#"! bI~\the cell site towers, and the mobile frequencies are the input frequencies used by the cars. Wireline company cell frequencies (BAND B) CELL A CELL B CELL C CELL D CELL E CELL F CELL G ======= ======= ======= ======= ======= ======= ======= 889.890 889.920 889.950 889.980 Ŀ 889.680 889.710 889.740 889.770 889.800 889.830 889.860 889.470 889.500 889.530 889.560 889.590 889.620 J 889.650 889.260 889.290 889.320 889.350 889.380 889.410 889.440 889.050 889.080 889.110 889.140 889.170 889.200 889.230 888.840 888.870 888.900 888.930 888.960 888.990 889.020 888.630 888.660 888.690 888.720 888.750 888.780 888.810 888.420 888.450 888.480 888.510 888.540 888.570 888.600 888.210 888.240 888.270 888.300 888.330 888.360 888.390 888.000 888.030 888.060 888.090 888.120 K 888.150 888.180 887.790 887.820 887.850 887.880 887.910 887.940 887.970 887.580 887.610 887.640 887.670 887.700 887.730 887.760 887.370 887.400 887.430 887.460 887.490 887.520 887.550 887.160 887.190 887.220 887.250 887.280 887.310 887.340 886.950 886.980 887.010 887.040 887.070 887.100 887.130 886.740 886.770 886.800 886.830 886.860 886.890 886.920 886.530 886.560 886.590 886.620 LCt886.650 886.680 886.710 886.320 886.350 886.380 886.410 886.440 886.470 886.500 Voice 886.110 886.140 886.170 886.200 886.230 886.260 886.290 885.900 885.930 885.960 885.990 886.020 886.050 886.080 885.690 885.720 885.750 885.780 885.810 885.840 885.870 885.480 885.510 885.540 885.570 885.600 885.630 885.660 885.270 885.300 885.330 885.360 885.390 885.420 885.450 885.060 885.090 885.12M!0 885.150 885.180 885.210 885.240 884.850 884.880 884.910 884.940 884.970 885.000 885.030 884.640 884.670 884.700 884.730 884.760 884.790 884.820 884.430 884.460 884.490 884.520 884.550 884.580 884.610 884.220 884.250 884.280 884.310 884.340 884.370 884.400 884.010 884.040 884.070 884.100 884.130 884.160 884.190 Channels 883.800 883.830 883.860 883.890 883.920 883.950 883.980 883.590 N z% 883.620 883.650 883.680 883.710 883.740 883.770 883.380 883.410 883.440 883.470 883.500 883.530 883.560 883.170 883.200 883.230 883.260 883.290 883.320 883.350 882.960 882.990 883.020 883.050 883.080 883.110 883.140 882.750 882.780 882.810 882.840 882.870 882.900 882.930 882.540 882.570 882.600 882.630 882.660 882.690 882.720 882.330 882.360 882.390 882.420 882.450 882.480 882.510 O!j882.120 882.150 882.180 882.210 882.240 882.270 882.300 881.910 881.940 881.970 882.000 882.030 882.060 882.090 881.700 881.730 881.760 881.790 881.820 881.850 881.880 881.490 881.520 881.550 881.580 881.610 881.640 881.670 881.280 881.310 881.340 881.370 881.400 881.430 881.460 881.070 881.100 881.130 881.160 881.190 881.220 881.250 880.860 880.890 880.920 880.950 880.980 881.010 88P"R{]1.040 880.650 880.680 880.710 880.740 880.770 880.800 880.830 ------------------------------------------------------------------- 880.440 880.470 880.500 880.530 880.560 880.590 880.620 ĿDigital 880.230 880.260 880.290 880.320 880.350 880.380 880.410 Control 880.020 880.050 880.080 880.110 880.140 880.170 880.200 Channels Wireline company mobile frequencies (BAND B) CELL A CELL B CELL C CELL D CELLQ#:O E CELL F CELL G ======= ======= ======= ======= ======= ======= ======= 844.890 844.920 844.950 844.980 Ŀ 844.680 844.710 844.740 844.770 844.800 844.830 844.860 844.470 844.500 844.530 844.560 844.590 844.620 844.650 844.260 844.290 844.320 844.350 844.380 844.410 844.440 844.050 844.080 844.110 844.140 844.170 844.200 844.230 843.840 843.870 843.900 843.930 84R$(yM3.960 843.990 844.020 843.630 843.660 843.690 843.720 843.750 843.780 843.810 843.420 843.450 843.480 843.510 843.540 843.570 843.600 843.210 843.240 843.270 843.300 843.330 843.360 843.390 843.000 843.030 843.060 843.090 843.120 843.150 843.180 842.790 842.820 842.850 842.880 842.910 842.940 842.970 842.580 842.610 842.640 842.670 842.700 842.730 842.760 842.370 842.400 842.430 842S%?.460 842.490 842.520 842.550 842.160 842.190 842.220 842.250 842.280 842.310 842.340 841.950 841.980 842.010 842.040 842.070 842.100 842.130 841.740 841.770 841.800 841.830 841.860 841.890 841.920 841.530 841.560 841.590 841.620 841.650 841.680 841.710 841.320 841.350 841.380 841.410 841.440 841.470 841.500 Voice 841.110 841.140 841.170 841.200 841.230 841.260 841.290 840.900 840.930 T&d`x 840.960 840.990 841.020 841.050 841.080 840.690 840.720 840.750 840.780 840.810 840.840 840.870 840.480 840.510 840.540 840.570 840.600 840.630 840.660 840.270 840.300 840.330 840.360 840.390 840.420 840.450 840.060 840.090 840.120 840.150 840.180 840.210 840.240 839.850 839.880 839.910 839.940 839.970 840.000 840.030 839.640 839.670 839.700 839.730 839.760 839.790 839.820 839.430 U'?5839.460 839.490 839.520 839.550 839.580 839.610 839.220 839.250 839.280 839.310 839.340 839.370 839.400 839.010 839.040 839.070 839.100 839.130 839.160 839.190 Channels 838.800 838.830 838.860 838.890 838.920 838.950 838.980 838.590 838.620 838.650 838.680 838.710 838.740 838.770 838.380 838.410 838.440 838.470 838.500 838.530 838.560 838.170 838.200 838.230 838.260 838.290 838.320 838.V(`#350 837.960 837.990 838.020 838.050 838.080 838.110 838.140 837.750 837.780 837.810 837.840 837.870 837.900 837.930 837.540 837.570 837.600 837.630 837.660 837.690 837.720 837.330 837.360 837.390 837.420 837.450 837.480 837.510 837.120 837.150 837.180 837.210 837.240 837.270 837.300 836.910 836.940 836.970 837.000 837.030 837.060 837.090 836.700 836.730 836.760 836.790 836.820 836.8W)50 836.880 836.490 836.520 836.550 836.580 836.610 836.640 836.670 836.280 836.310 836.340 836.370 836.400 836.430 836.460 836.070 836.100 836.130 836.160 836.190 836.220 836.250 835.860 835.890 835.920 835.950 835.980 836.010 836.040 835.650 835.680 835.710 835.740 835.770 835.800 835.830 ------------------------------------------------------------------- 835.440 835.470 835.500 835.530 835.560 X* 835.590 835.620 ĿDigital 835.230 835.260 835.290 835.320 835.350 835.380 835.410 Control 835.020 835.050 835.080 835.110 835.140 835.170 835.200 Channels =============================================================================== Non-wireline company cell frequencies (BAND A) CELL A CELL B CELL C CELL D CELL E CELL F CELL G ======= ======= ======= ======= ======= ======= ======= 879.900 879.930 8Y+ϯ!;79.960 879.990 ĿDigital 879.690 879.720 879.750 879.780 879.810 879.840 879.870 Control 879.480 879.510 879.540 879.570 879.600 879.630 879.660 Channels ------------------------------------- 879.390 879.420 879.450 879.270 879.300 879.330 879.360 --------------------------- Ŀ 879.060 879.090 879.120 879.150 879.180 879.210 879.240 878.850 878.880 878.910 878.940 878.970 879.000 8Z,嶬79.030 878.640 878.670 878.700 878.730 878.760 878.790 878.820 878.430 878.460 878.490 878.520 878.550 878.580 878.610 878.220 878.250 878.280 878.310 878.340 878.370 878.400 878.010 878.040 878.070 878.100 878.130 878.160 878.190 877.800 877.830 877.860 877.890 877.920 877.950 877.980 877.590 877.620 877.650 877.680 877.710 877.740 877.770 877.380 877.410 877.440 877.470 877.500 87[-!غ7.530 877.560 877.170 877.200 877.230 877.260 877.290 877.320 877.350 876.960 876.990 877.020 877.050 877.080 877.110 877.140 876.750 876.780 876.810 876.840 876.870 876.900 876.930 876.540 876.570 876.600 876.630 876.660 876.690 876.720 876.330 876.360 876.390 876.420 876.450 876.480 876.510 876.120 876.150 876.180 876.210 876.240 876.270 876.300 875.910 875.940 875.970 876.000 876\.w4f.030 876.060 876.090 875.700 875.730 875.760 875.790 875.820 875.850 875.880 Voice 875.490 875.520 875.550 875.580 875.610 875.640 875.670 875.280 875.310 875.340 875.370 875.400 875.430 875.460 875.070 875.100 875.130 875.160 875.190 875.220 875.250 874.860 874.890 874.920 874.950 874.980 875.010 875.040 874.650 874.680 874.710 874.740 874.770 874.800 874.830 874.440 874.470 874.500 ]/C 874.530 874.560 874.590 874.620 874.230 874.260 874.290 874.320 874.350 874.380 874.410 874.020 874.050 874.080 874.110 874.140 874.170 874.200 873.810 873.840 873.870 873.900 873.930 873.960 873.990 873.600 873.630 873.660 873.690 873.720 873.750 873.780 873.390 873.420 873.450 873.480 873.510 873.540 873.570 Channels 873.180 873.210 873.240 873.270 873.300 873.330 873.360 872.970 ^0<)3873.000 873.030 873.060 873.090 873.120 873.150 872.760 872.790 872.820 872.850 872.880 872.910 872.940 872.550 872.580 872.610 872.640 872.670 872.700 872.730 872.340 872.370 872.400 872.430 872.460 872.490 872.520 872.130 872.160 872.190 872.220 872.250 872.280 872.310 871.920 871.950 871.980 872.010 872.040 872.070 872.100 871.710 871.740 871.770 871.800 871.830 871.860 871.890 8_1m71.500 871.530 871.560 871.590 871.620 871.650 871.680 871.290 871.320 871.350 871.380 871.410 871.440 871.470 871.080 871.110 871.140 871.170 871.200 871.230 871.260 870.870 870.900 870.930 870.960 870.990 871.020 871.050 870.660 870.690 870.720 870.750 870.780 870.810 870.840 870.450 870.480 870.510 870.540 870.570 870.600 870.630 870.240 870.270 870.300 870.330 870.360 870.390 870`2\]l.420 870.030 870.060 870.090 870.120 870.150 870.180 870.210 Non-wireline company mobile frequencies (BAND A) CELL A CELL B CELL C CELL D CELL E CELL F CELL G ======= ======= ======= ======= ======= ======= ======= 834.900 834.930 834.960 834.990 ĿDigital 834.690 834.720 834.750 834.780 834.810 834.840 834.870 Control 834.480 834.510 834.540 834.570 834.600 834.6a36 30 834.660 Channels ------------------------------------- 834.390 834.420 834.450 834.270 834.300 834.330 834.360 --------------------------- Ŀ 834.060 834.090 834.120 834.150 834.180 834.210 834.240 833.850 833.880 833.910 833.940 833.970 834.000 834.030 833.640 833.670 833.700 833.730 833.760 833.790 833.820 833.430 833.460 833.490 833.520 833.550 833.580 833.610 833.220 833.250 833.280 833.310 b4zjB 833.340 833.370 833.400 833.010 833.040 833.070 833.100 833.130 833.160 833.190 832.800 832.830 832.860 832.890 832.920 832.950 832.980 832.590 832.620 832.650 832.680 832.710 832.740 832.770 832.380 832.410 832.440 832.470 832.500 832.530 832.560 832.170 832.200 832.230 832.260 832.290 832.320 832.350 831.960 831.990 832.020 832.050 832.080 832.110 832.140 831.750 831.780 831.810 c5 831.840 831.870 831.900 831.930 831.540 831.570 831.600 831.630 831.660 831.690 831.720 831.330 831.360 831.390 831.420 831.450 831.480 831.510 831.120 831.150 831.180 831.210 831.240 831.270 831.300 830.910 830.940 830.970 831.000 831.030 831.060 831.090 830.700 830.730 830.760 830.790 830.820 830.850 830.880 Voice 830.490 830.520 830.550 830.580 830.610 830.640 830.670 830.280 830.d6c?310 830.340 830.370 830.400 830.430 830.460 830.070 830.100 830.130 830.160 830.190 830.220 830.250 829.860 829.890 829.920 829.950 829.980 830.010 830.040 829.650 829.680 829.710 829.740 829.770 829.800 829.830 829.440 829.470 829.500 829.530 829.560 829.590 829.620 829.230 829.260 829.290 829.320 829.350 829.380 829.410 829.020 829.050 829.080 829.110 829.140 829.170 829.200 828.8e7#10 828.840 828.870 828.900 828.930 828.960 828.990 828.600 828.630 828.660 828.690 828.720 828.750 828.780 828.390 828.420 828.450 828.480 828.510 828.540 828.570 Channels 828.180 828.210 828.240 828.270 828.300 828.330 828.360 827.970 828.000 828.030 828.060 828.090 828.120 828.150 827.760 827.790 827.820 827.850 827.880 827.910 827.940 827.550 827.580 827.610 827.640 827.670 827.700 f8 +w 827.730 827.340 827.370 827.400 827.430 827.460 827.490 827.520 827.130 827.160 827.190 827.220 827.250 827.280 827.310 826.920 826.950 826.980 827.010 827.040 827.070 827.100 826.710 826.740 826.770 826.800 826.830 826.860 826.890 826.500 826.530 826.560 826.590 826.620 826.650 826.680 826.290 826.320 826.350 826.380 826.410 826.440 826.470 826.080 826.110 826.140 826.170 826.200 g9y)H@ 826.230 826.260 825.870 825.900 825.930 825.960 825.990 826.020 826.050 825.660 825.690 825.720 825.750 825.780 825.810 825.840 825.450 825.480 825.510 825.540 825.570 825.600 825.630 825.240 825.270 825.300 825.330 825.360 825.390 825.420 825.030 825.060 825.090 825.120 825.150 825.180 825.210 Monitoring of the base sites is obviously going to be easier than monitoring the mobiles. The cell base sh:JSites are towers (usually blue) with a triangle shaped "head" on top, and sporting a couple of what appear to be vertical antennas. These base sites have a range of 3-5 miles. If you take a look at the honeycomb diagram, you can see how they are laid out. The cell transmitter is in the middle of the cell. It is possible to hear many, most, or all of the cells in your city, depending on your location. The closer you live to a boundary, the greater the chances of your being able toi;v, receive more cells. Due to the nature of radio signals, the actual cell shape is more or less round. However, the hexagon shape lends itself better to show how the system is laid out. With a circular coverage area, there will be some overlapping between adjacent cells. __ __ \__/C \__/D \__ \__/G \__/A \__/ _/D \__/E \__/F \__ \__/B \__*C jJqD*he cell frequencies. You may not be able to hear both sides of the conversation if you listen only to the mobile frequencies!!! It is useful, however, for determining which channel cell you're in. If you use the antenna that came with the scanner, mobile range will be decreased down to 1 or 2 miles. By checking the scanner readout against the cell list above (825.030-844.980 MHz), you can tell what cell the mobile is in. This is also useful on the cell site frequencies. If you hem?"ar someone say, "I'm at the corner of highway FF and 37," and you know where the cell site antenna is in that area, you can check the frequency listing above and determine what cell that antenna belongs to. =============================================================================== The Electronic Communications Privacy Act of 1986 and CMT =============================================================================== The ECPA, passed in 1986, is partly responsin@5^ble for the extreme interest in CMT monitoring. After all, if you tell someone they can't listen to these phone calls, they'll immediately want to do so. "There must be _something_ going on there that's either interesting or important. Why else would they want to keep us from listening?" seems to be the predominant reaction. Be assured that it is illegal under the ECPA to listen to cellular phone calls. This law was passed mainly to satisfy the CMT manufacturers. They can nooA)'w tell their customers that their conversations are 'protected by federal law.' However, when this law was drawn up, it was obviously felt to be too narrow in its views, since it protected only one service. So it was amended to include various services, such as microwaves, some satellites, broadcast STL links (studio-transmitter links), and the descrambling of scrambled signals. However, from the very beginning, the government has shown an extremely bored attitude when it comespBy to the ECPA. There is virtually no attempt at enforcement, unless it's a case involving blackmail, or an overt attempt is being made to provide radios with CMT-specific frequencies. In the latter case, a dealer was modifying the radios he was selling. After a government visit, he agreed not to modify the radios, but he was allowed to include instructions on how to make the modification. With the Pro-2005 and Pro-2005, this consists of opening the radio and clipping one diode, anqC@ operation that takes all of 15 minutes, including disassembly. What does all this mean? You can receive any frequency you wish. There is literally no way to tell what you're listening to in the privacy of your home. Your scanner (as well as EVERY radio) _does_ transmit an extremely small amount of RF energy from the local oscillator, but unless the radio is in very bad shape, that energy won't go past 40 or 50 feet. The "gummint" would have to drive around in detection vansrDee with beam antennas, and with 100,000 scanner owners, it's an extremely good bet that they're not even going to consider thinking about the merest possibility that someone might put this idea forward to be comtemplated. They've got more important stuff to worry about. What it comes down to is this: listen to whatever you want to, but don't divulge it or use the information for personal or illegal gain. That will get you into deep doo-doo in double-quick time. Most people havsEe the opinion that if it's unscrambled, and it's passing freely through their home and body, that they have the right to receive it. This sounds like good solid thinking. The laws of this land provide for just compensation to individuals. Perhaps a few bills to CMT companies for transmission rights would help to remove this silly law from the books. =============================================================================== The Electronic Communications Privacy ActtF0 of 1986 =============================================================================== February 2, 1987 TITLE 18 - CRIMES AND CRIMINAL PROCEDURE PART I. CRIMES Chapter Sec. * * * General provisions............................................. 1 * * * 119. WiruG=e and electronic communications interception and interception of oral communications................. 2510 * * * 121. Stored Wire and Electronic Communications and Transactional Records Access...................................... 2701 * * * PART II. CRIMINAL PROCEDURE 201. General provisions.................................. 3001 * *vH4k * 206. Pen Registers and Trap and Trace Devices............ 3121 * * * CHAPTER 65 - MALICIOUS MISCHIEF Sec. * * * 1367. Interference with the operation of a satellite. * * * { 1367. Interference with the operation of a satellite (a) Whoever, without the authority of the satellite operator, intentionally or maliciously wIinterferes with the authorized operation of a communications or weather satellite or obstructs or hinders any satellite transmission shall be fined in accordance with this title or imprisoned not more than ten years of both. (b) This section does not prohibit any lawfully authorized investigative, protective, or intelligence activity of a law enforcement agency or of an intelligence agency of the United States. * * * xJ_ CHAPTER 109 - SEARCHES AND SEIZURES * * * { 2232. Destruction or removal of property to prevent seizure (a) Physical Interference With Search. -- Whoever, before, during, or after seizure of any property by any person authorized to make searches and seizures, in order to prevent the seizure or securing of any goods, wares, or merchandise by such person, staves, breaks, throws overboard, destroys, or removes the same, shall be fined yKHnot more than $10,000 or imprisoned more than five years, or both. (b) Notice of Search. -- Whoever, having knowledge that any person authorized to make searches and seizures has been authorized or is otherwise likely to make a search or seizure, in order to prevent the authorized seizing or securing of any per- son, goods, wares, merchandise or other property, gives notice or attempts to give notice of the possible search or seizure to any person shall be fined not more than zLI $100,000 or imprisoned not more than five years, or both. (c) Notice of Certain Electronic Surveillance. -- Whoever, having knowledge that a Federal investigative or law enforcement officer has been authorized or has applied for authorization under chapter 119 to intercept a wire, oral, or electronic communication, in order to obstruct, impede, or prevent such interception, gives notice or attempts to give notice of the possible interception to any person shall be fined under {MKthis title or imprisoned not more than five years, or both. Whoever, having knowledge that a Federal officer has been authorized or has applied for authorization to conduct electronic surveillance under the Foreign Intelligence Surveillance Act (50 U.S.C. 1801, et seq.), in order to obstruct, impede, or prevent such activity, gives notice or attempts to give notice of the possible activity to any person shall be fined under this title or imprisoned not more than five years|N*a, or both. * * * CHAPTER 119 -- WIRE AND ELECTRONIC COMMUNICATIONS INTERCEPTION AND INTERCEPTION OF ORAL COMMUNICATIONS Sec. 2510. Definitions. 2511. Interception and disclosure of wire or oral communications prohibited. 2512. Manufacture, distribution, possession, and advertising of wire or oral communication intercepting devices prohibited. 2513. Confiscation of wire,}OV&v: oral, or electronic communication intercepting devices. 2514. Immunity of witnesses. 2515. Prohibition of use as evidence of intercepted wire, oral, or electronic communications. 2516. Authorization for interception of wire, oral, or electronic communications. 2517. Authorization for disclosure and use of intercepted wire, oral, or electronic communications. 2518. Procedure for interception of wire, oral, or electron~PnUic communications. 2519. Reports concerning intercepted wire, oral or electronic communications. 2520. Recovery of civil damages authorized. 2521. Injunction against illegal interception. { 2510. Definitions As used in this chapter -- (1) "wire communication" means any aural transfer made in whole or in part through the use of facilities for the transmission of communications by the aid of wire, cable, or other like coQyynnection between the point of origin and the point of reception (including the use of such connection in a switching station) furnished or operated by any person engaged in providing or operating such facilities for the transmission of interstate or foreign communications or communications affecting interstate or foreign commerce and such term includes any electronic storage of such communication, but such term does not include the radio portion of R>+RHa cordless telephone communication that is transmitted between the cordless telephone handset and the base unit; (2) "oral communication" means any oral communication uttered by a person exhibiting an expectation that such communication is not subject to interception under circumstances justifying such expectation, but such term does not include any electronic communication; * * * (4) "interceSept" means the aural or other acquisition of the contents of any wire, electronic, or oral communication through the use of any electronic, mechanical, or other device. (5) "electronic mechanical, or other device" means any device or apparatus which can be used to intercept a wire, oral, or electronic communication other than -- (a) any telephone or telegraph instrument, equipment or facility, or any component thereof, (i) fuT|rnished to the subscriber or user by a provider of wire or electronic communication service in the ordinary course of its business and being used by the subscriber or user in the ordinary course of its business or furnished by such subscriber or user for connection to the facilities of such service and used in the ordinary course of its business; or (ii) being used by a communications common carrier in the ordinaryUP[ course of its business, or by an investigative or law enforcement officer in the ordinary course of his duties; * * * (8) "contents", when used with respect to any wire, oral, or electronic communication, includes any information concerning the substance, purport, or meaning of that communication; (9) "Judge of competent jurisdiction" means -- (a) a judge of a United StaVK^tes district court or a United States court of appeals; and (b) a judge of any court of general criminal jurisdiction of a State who is authorized by a statute of that State to enter orders authorizing interceptions of wire, oral, or electronic communications; (10) "communication common carrier" shall have the same meaning which is given the term "common carrier" by section 153(h) of title 47 of the United WGStates Code; (11) "aggrieved person" means a person who was a party to any intercepted wire, oral, or electronic communication or a person against whom the interception was directed; (12) "electronic communication" means any transfer of signs, signals, writing, images, sounds, data, or intelligence of any nature transmitted in whole or in part by a wire, radio, electromagnetic, photoelectronic or photo optical system that affects interstXE{Date or foreign commerce, but does not include -- (A) the radio portion of a cordless telephone communication that is transmitted between the cordless telephone handset and the base unit; (B) any wire or oral communication; (C) any communication made through a tone-only paging device; or (D) any communication from a tracking device (as defined in section 3117 of this title)YU; (13) "user" means any person or entity who -- (A) uses an electronic communication service; and (B) is duly authorized by the provider of such service to engage in such use; (14) "electronic communications system" means any wire, radio, electromagnetic, photooptical or photoelectronic facilities for the transmission of electronic communications, and any computer facilities or related electronic equipmeZ?nt for the electronic storage of such communications; (15) "electronic communication service" means any service which provides to users thereof the ability to send or receive wire or electronic communications; (16) "readily accessible to the general public" means, with respect to a radio communication, that such communication is not -- (A) scrambled or encrypted; (B) transmitted using modulation techniques wh[3hose essential parameters have been withheld from the public with the intention of preserving the privacy of such communication; (C) carried on a subcarrier or other signal subsidiary to a radio transmission; (D) transmitted over a communication system provided by a common carrier, unless the communication is a tone only paging system communication; or (E) transmitted on frequencies al\O@located under part 25, subpart D, E, or F of part 74, or part 94 of the Rules of the Federal Communications Commission, unless, in the case of a communication transmitted on a frequency allocated under part 74 that is not exclusively allocated to broadcast auxiliary services, the communication is a two-way voice communication by radio; (17) "electronic storage" means -- (A) any temporary, intermediate stor]9wage of a wire or electronic communication incidental to the electronic transmission thereof; and (B) any storage of such communication by an electronic communication service for purposes of backup protection of such communication; and (18) "aural transfer" means a transfer containing the human voice at any point between and including the point of origin and the point of reception. { 2511. Interception an^4ed disclosure of wire or oral communications prohibited (1) Except as otherwise specifically provided in this chapter any person who-- (a) intentionally intercepts, endeavors to intercept, or procures any other person to intercept or endeavor to intercept, any wire, oral, or electronic communication; (b) intentionally uses, endeavors to use, or procures any other person to use or endeavor to use any electronic, mechani__~\cal, or other device to intercept any oral communication when -- (i) such device is affixed to, or otherwise transmits a signal through, a wire, cable, or other like connection used in wire communication; or (ii) such device transmits communications by radio, or interferes with the transmission of such communication; or (iii) such person knows, or has reason to know, that such device or an`osOy component thereof has been sent through the mail or transported in interstate or foreign commerce; or (iv) such use or endeavor to use (A) takes place on the premises of any business or other commercial establishment the operations of which affect interstate or foreign commerce; or (B) obtains or is for the purpose of obtaining information relating to the operations of any business or other commercial establishment ax the operations of which affect interstate or foreign commerce; or (v) such person acts in the District of Columbia, the Commonwealth of Puerto Rico, or any territory or possession of the United States; (c) intentionally discloses, or endeavors to disclose, to any other person the contents of any wire, oral, or electronic communication, knowing or have reason to know that the information was obtained through thecڦ: interception of a wire oral, or electronic communication in violation of this subsection; or (d) intentionally uses, or endeavors to use, the contents of any wire, oral, or electronic communication, knowing or having reason to know that the information was obtained through the interception of a wire, oral, or electronic communication in violation of this subsection; shall be punished as provided in subsection (4) or shall be subject to suit bH~}|{zyxwvutsrqponmlkjihgfedcdyas provided in subsection (5). (2)(a)(i) It shall not be unlawful under this chapter for an operator of a switchboard, or an officer, employee, or agent of a provider of wire or electronic communication service, whose facilities are used in the transmission of a wire communication, to intercept, disclose, or use that communication in the normal course of his employment while engaged in any activity which is a necessary incident to the rendition of his service or to the protecteEion of the rights or property of the provider of that service, except that a provider of wire communication service to the public shall not utilize service observing or random monitoring except for mechanical or service quality control checks. (ii) Notwithstanding any other law, providers of wire or electronic communication service, their officers, employees, and agents, landlords, custodians, or other persons, are authorized to provide information facilities, or technical assfj]istance to persons authorized by law to intercept wire, oral, or electronic communications or to conduct electronic surveillance, as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978, if such provider its officers, employees, or agents, land- lord, custodian, or other specified person has been provided with -- (A) a court order directing such assistance signed by the authorizing judge, or (B) a certification in writing by a persogӿkn specified in section 2518(7) of this title or the Attorney General of the United States that no warrant or court order is required by law, that all statutory requirements have been met, and that the specified assistance is required. setting forth the period of time during which the provision of the information, facilities, or technical assistance is authorized and specifying the information, facilities, or technical assistance required. No provider of wire or ehGq.#lectronic communication service officer, employee, or agent thereof, or landlord, custodian, or other specified person shall disclose the existence of any interception or surveillance of the device used to accomplish the interception or surveillance with respect to which the person has been furnished an order or certification under this subparagraph, except as may otherwise be required by legal process and then only after prior notification to the Attorney General or to the principali# prosecuting attorney of a State or any political subdivision of a State, as may be appropriate. Any such disclosure, shall render such person liable for the civil damages provided for in section 2520. No cause of action shall lie in any court against any provider of wire or electronic communication service its officers, employees, or agents, landlord, custodian, or other specified person for providing information, facilities, or assistance in accordance with the terms of a court oj/rder or certification under this chapter. (b) It shall not be unlawful under this chapter for an officer, employee, or agent of the Federal Communications Commission, in the normal course of his employment and in discharge of the monitoring responsibilities exercised by the Commission in the enforcement of chapter 5 of title 57 of the United States Code, to intercept a wire or electronic communication, or oral communication transmitted by radio, or to disclose or use the inforkqmation thereby obtained. (c) It shall not be unlawful under this chapter for a person acting under color of law to intercept a wire, oral, or electronic communication, where such person is a party to the communication or one of the parties to the communication has given prior consent to such interception. (d) It shall not be unlawful under this chapter for a person not acting under color of law to intercept a wire, oral, or electronic communication where such person is lCa party to the communication or where one of the parties to the communication has given prior consent to such interception unless such communication is intercepted for the purpose of committing any criminal or tortious act in violation of the Constitution or laws of the United States or of any State. (e) Notwithstanding any other provision of this title or section 705 or 706 of the Communications Act of 1934, it shall not be unlawful for an office, employee, or agent of the Unma|ited States in the normal course of his official duty to conduct electronic surveillance, as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978, as authorized by that Act. (f) Nothing contained in this chapter or chapter 121, or section 705 of the Communications Act of 1934, shall be deemed to affect the acquisition by the United States Government of foreign intelligence information from international or foreign communication, or foreign intelligence nazgdactivities conducted in accordance with otherwise applicable Federal law involving a foreign electronic communications system, utilizing a means other than electronic surveillance as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978, and procedures in this chapter and the Foreign Intelligence Surveillance Act of 1978 shall be the exclusive means by which electronic surveillance, as defined in section 101 of such Act, and the interception of domestic wire ando8 oral communications may be conducted. (g) It shall not be unlawful under this chapter or chapter 121 of this title for any person -- (i) to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public; (ii) to intercept any radio communication which is transmitted -- (I) by any station fpY9or the use of the general public, or that relates to ships, aircraft, vehicles, or persons in distress; (II) by any governmental, law enforcement, civil defense private land mobile, or public safety communications system, including police and fire, readily accessible to the general public; (III) by a station operating on an authorized frequency within the bands allocated to the amateur, citizens band,q or general mobile radio services; or (IV) by any marine or aeronautical communications system; (iii) to engage in any conduct which -- (I) is prohibited by section 633 of the Communications Act of 1934; or (II) is excepted from the application of section 705(a) of the Communications Act of 1934 by section 705(b) of that Act; (iv) to intercept any wire or electronic communication r"xthe transmission of which is causing harmful interference to any lawfully operating station or consumer electronic equipment, to the extent necessary to identify the source of such interference; or (v) for other users of the same frequency to intercept any radio communication made through a system that utilizes frequencies monitored by individuals engaged in the provision or the use of such system, if such communication is not scrambled or ensF̒crypted. (h) It shall not be unlawful under this chapter -- (i) to use a pen register or a trap and trace device (as those terms are defined for the purposes of chapter 206 (relating to pen registers and trap and trace devices) of this title); or (ii) for a provider of electronic communication service to record the fact that a wire or electronic communication was initiated or completed in order to protect such provider, another provit===der furnishing service toward the completion of the wire or electronic communication, or a user of that service, from fraudulent, unlawful or abusive use of such service. (3)(a) Except as provided in paragraph (b) of this subsection a person or entity providing an electronic communication service to the public shall not intentionally divulge the contents of any communication (other than one to such person or entity, or an agent thereof) while in transmission ou n that service to any person or entity other than an addressee or intended recipient of such communication or an agent of such addressee or intended recipient. (b) A person or entity providing electronic communication service to the public may divulge the contents of any such communication -- (i) as otherwise authorized in section 2511(2)(a) or 2517 of this title; (ii) with the lawful consent of the originator or any addressee or intended reciv|,pient of such communication; (iii) to a person employed or authorized, or whose facilities are used, to forward such communication to its destination; or (iv) which were inadvertently obtained by the service provider and which appear to pertain to the commission of a crime, if such divulgence is made to a law enforcement agency. (4)(a) Except as provided in paragraph (b) of this subsection or in subsection (5), whoever violates subsectiw;*on (1) of this section shall be fined under this title or imprisoned not more than five years, or both. (b) If the offense is a first offense under paragraph (a) of this subsection and is not for a tortious or illegal purpose or for purposes of direct or indirect commercial advantage or private commercial gain, and the wire or electronic communication with respect to which the offense under paragraph (a) is a radio communication that is not scrambled or encrypted, then -- xPi (i) If the communication is not the radio portion of a cellular telephone communication, a public land mobile radio service communication or a paging service communication, and the conduct is not that described in subsection (5), the offender shall be fined under this title or imprisoned not more than one year, or both, and (ii) if the communication is the radio portion of a cellular telephone communication, a public land mobile radio servyϜice communication or a paging service communication, the offender shall be fined not more than $500. (c) Conduct otherwise an offense under this subsection that consists of or relates to the interception of a satellite transmission that is not encrypted or scrambled and that is transmitted -- (i) to a broadcasting station for purposes of retransmission to the general public; or (ii) as an audio subcarrier intended for redistribution to z ( facilities open to the public, but not including data transmissions or telephone calls, is not an offense under this subsection unless the conduct is for the purposes of direct or indirect commercial advantage or private financial gain. (5)(a)(i) If the communication is -- (A) a private satellite video communication that is not scrambled or encrypted and the conduct in violation of this chapter is the private viewing of that communication and is {;Inot for a tortious or illegal purpose or for purposes of direct or indirect commercial advantage or private commercial gain; or (B) a radio communication that is transmitted on frequencies allocated under subpart D of part 74 of the rules of the Federal Communications Commission that is not scrambled or encrypted and the conduct in violation of this chapter is not for a tortious or illegal purpose or for purposes of direct or indirect commerc|/ial advantage or private commercial gain. then the person who engages in such conduct shall be subject to suit by the Federal Government in a court of competent jurisdiction. (ii) In an action under this subsection -- (A) if the violation of this chapter is a first offense for the person under paragraph (a) of subsection (4) and such person has not been found liable in a civil action under section 2520 of this title, the Federal Government shal}jl be entitled to appropriate injunctive relief; and (B) if the violation of this chapter is a second or subsequent offense under paragraph (a) of subsection (4) or such person has been found liable in any prior civil action under section 2520, the person shall be subject to a mandatory $500 civil fine. (b) The court may use any means within its authority to enforce an injunction issued under paragraph (ii)(A), and shall impose a civil fine of no~$Wt less than $500 for each violation of such an injunction, { 2512. Manufacture, distribution, possession, and advertising of wire or oral communication intercepting devices prohibited (1) Except as otherwise specifically provided in this chapter, any person who intentionally -- (a) sends through the mail, or sends or carriers in interstate or foreign commerce, any electronic, mechanical, or other device, knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications; (b) manufacturers, assembles, possesses, or sells any electronic, mechanical, or other device, knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications, and that of wire, oral, or electronic communications; or (ii) any other electronic, mechanical, or other device, where such advertisement promotes the use of such device for the purpose of the surreptitious interception of wire, oral, or electronic communications, knowing or having reason to know that such advertisement will be sent through the mail or transported in interstate or foreign commerce, shall be fined not more than $10,00M 0 or imprisoned not more than five years, or both. (2) It shall not be unlawful under this section for- (a) a provider of wire or electronic communication service or an officer, agent, or employee of, or a person under contract with, such a provider, in the normal course of the business of providing that wire or electronic communication service, or (b) an officer, agent, or employee of, or a person under contract with, the United St=ates, a State, or a political subdivision thereof, in the normal course of the activities of the United States, a State, or a political subdivision thereof, to send through the mail, send or carry in interstate or foreign commerce, or manufacture, assemble, possess, or sell any electronic, mechanical, or other device knowing or having reason to know that the design of such device renders it primarily useful for the purpose of the surreptitious interception of wire, oral, or electronic communications. { 2513. Confiscation of wire, oral, or electronic communication intercepting devices Any electronic, mechanical, or other device used, sent, carried, manufactured, assembled, possessed, sold, or advertised in violation of section 2511 or section+ 2512 of this chapter may be seized and forfeited to the United States. All provisions of law relating to (1) the seizure, summary and judicial forfeiture, and condiemnation of vessels, vehicles, merchandise, and baggage for violations of the customs laws contained in title 19 of the United States Code, (2) the disposition of such vessels, - vehicles, merchandise, and baggage or the proceeds from the sale thereof, (3) the remission or mitigation of such forfeiture, (4) the compromise of claims, and (5) the award of compensation to informers in respect of such forfeitures, shall apply to seizures and forfeitures incurred, or alleged to have been Aincurred, under the provisions of this section, insofar as applicable and not inconsistent with the provisions of this section; except that such duties as are imposed upon the collector of customs or any other person with respect to the seizure and forfeiture of vessels, vehicles, merchandise, and baggage under the provisions of the customs laws contained in title 19 of the United States Code shall be performed with respect to seizure and forfeiture of electronic, mechanical, or othe]V*r intercepting devices under this section by such officers, agents, or other persons as may be authorized or designated for that purpose of the Attorney General. { 2515. Prohibition of use as evidence of intercepted wire, oral, or electronic communications Whenever any wire, oral, or electronic communications has been intercepted, no part of the contents of such communication and no evidence derived therefrom may be received in evidence in any trial, hearing, pfSor other proceeding in or before any court, grand jury, department, officer, agency, regulatory body, legislative committee, or other authority of the United States, a State, or a political subdivision thereof if the disclosure of that information would be in violation of this chapter. { 2516. Authorization for interception of wire, oral, or electronic communications (1) The Attorney General, Deputy Attorney General, Associate Attorney General, any Assistant@) Attorney General, any acting Assistant Attorney General, or any Deputy Assistant Attorney General in the Criminal Division specially designated by the Attorney General, may authorize an application to a Federal judge of competent jurisdiction for, and such judge may grant in conformity with section 2518 of this chapter an order authorizing or approving the interception of wire of oral communications by the Federal Bureau of Investigation, or a Federal agency having responsibility fo߿Ϣr the investigation of the offense as to which the application is made, when such interception may provide or has provided evidence of- (a) any offense punishable by death or by imprisonment for more than one year under sections 2274 through 2277 of title 42 of the United States Code (relating to the enforcement of the Atomic Energy Act of 1954), section 2284 of title 42 of the United States Code (relating to sabotage of nuclear facilities or fuel), orm ~ under the following chapters of this title: chapter 37 (relating to espionage), chapter 105 (relating to sabotage), chapter 115 (relating to treason), chapter 192 (relating to riots), chapter 65 (relating to malicious matter mischief), chapter 111 (relating to destruction of vessels), or chapter 81 (relating to piracy); (b) a violation of section 186 or section 501(c) of title 29, United States Code (dealing with restrictions on payments anلxd loans to labor organizations), or any offense which involves murders, kidnapping, robbery, or extortion, and which is punishable under this title; c) any offense which is punishable under the following section of this title: section 201 (bribery of public officials and witnesses), section 224 (bribery in sporting contests), subsection (d), (e), (f), (g), (h), or (i) of section 844 (unlawful use of explosives), section 1084 (transmiss~ion of wagering information), section 751 (relating to escape), sections 1503, 1512, and 1513 (influencing or injuring an officer, juror, or witness generally), section 1510 (obstruction of criminal investigations), section 1511 (obstruction of State or local law enforcement), section 1751 (Presidential and Presidential staff assassination, kidnapping, and assault), section 1951 (interference with commerce by threats or violence), section 1952 (inteKrstate and foreign travel or transportation in aid of racketeering enterprises), section 1952A (relating to use of interstate commerce facilities in the commission of murder for hire), section 1952B (relating to violent crimes in aid of racketeering activity), section 1954 (offer acceptance, or solicitation to influence operations of employee benefit plan), section 1955 (prohibition of business enterprises of gambling), section 659 (theft from interstate˺ shipment), section 664 (embezzlement from pension and welfare funds), section 1343 (fraud by wire, radio, or television), section 2252 or 2253 (sexual exploitation of children), Section 2251 and 2252 (sexual exploitation of children), section 2312, 2313, 2314, and 2315 (interstate transportation of stolen property), the second section 2320 (relating to trafficking in certain motor vehicles or motor vehicle parts), section 1203 (relating to hostage ,Vtaking), section 1029 (relating to fraud and related activity in connection with access devices), section 3146 (relating to penalty for failure to appear), section 3521(b)(3) (relating to witness relocation and assistance), section 32 (relating to destruction of aircraft or aircraft facilities), section 1963 violations with respect to racketeer influenced and corrupt organizations), section 115 (relating to threatening or retaliating against a Feder~:al official), the section in chapter 65 relating to destruction of an energy facility, and section 1341 (relating to mail fraud), section 351 (violations with respect to congressional, Cabinet, or Supreme Court assassination, kidnapping, and assault), section 831 (relating to prohibited transaction involving nuclear materials), section 33 (relating to destruction of motor vehicles or motor vehicle facilities), or section 1992 (relating to wrecking trains); (d) any offense involving counterfeiting punishable under section 471, 472, or 473 of this title; (e) any offense involving fraud connected with a case under title 11 or the manufacture, importation, receiving, concealment, buying, selling, or otherwise dealing in narcotic drugs, marijuana, or other dangerous drugs, punishable under any law of the United States; (f) any offense including extortionate credit transactions under} sections 892, 893, or 894 of this title; (g) a violation of section 5322 of title 31, United States Code (dealing with the reporting of currency transactions); (h) any felony violation of sections 511 and 2512 (relating to interception and disclosure of certain communications and to certain intercepting devices) of this title; (i) any violation of section 1679(c)(2) (relating to destruction of a natural gas pipeline) or sublonger than thirty days. Such thirty-day period begins on the earlier of the day on which the investigative or law enforcement officer first begins to conduct an interception under the order or ten days after the order is entered. Extensions of an order may be granted, but only upon application for an extension made in accordance with subsection (1) of this section and the court making the findings required by subsection (3) of this section. The period of extension shall be no lon8ger than the authorizing judge deems necessary to achieve the purposes for which it was granted and in no event for longer than thirty days. Every order and extension thereof shall contain a provision that the authorization to intercept shall be executed as soon as practicable, shall be conducted in such a way as to minimize the interception of communications not otherwise, subject to interception under this chapter, and must terminate upon attainment of the authorized objective, orHx in any event in thirty days. In the event the intercepted communications is in a code or foreign language, and an expert in that foreign language or code is not reasonably available during the interception period, minimization may be accomplished as soon as practicable after such interception. An interception under this chapter may be conducted in whole or in part by Government personnel, or by an individual operating under a contract with the Government, acting under the supervis`t ion of an investigative or law enforcement officer authorized to conduct the interception. (6) Whenever an order authorizing interception is entered pursuant to this chapter, the order may require reports to be made to the judge who issued the order showing what progress has been made toward achievement of the authorized objective and the need for continued interception. Such reports shall be made at such intervals as the judge may require. (7) Notwithstanding any othekdr provision of this chapter, any investigative or law enforcement officer, specially designated by the Attorney General, the Deputy Attorney General, the Associate Attorney General, or by the principal prosecuting attorney of any State or subdivision thereof acting pursuant of that State, who reasonably determines that- (a) an emergency situation exists that involves- (i) immediate danger of death or serious physical injury to any person;  '* (ii) conspiratorial activities threatening the national security interest; or (iii) conspiratorial activities characteristic of organized crime, that requires a wire, oral, or electronic communication to be intercepted before an order authorizing such interception can, with due diligence, be obtained, and (b) there are grounds upon which an order could be entered under this chapter to authorize such inteVrception. may intercept such wire, oral, or electronic communication if an application for an order approving the interception is made in accordance with this section within forty-eight hours after the interception has occurred, or begins to occur. In the absence of an order, such interception shall immediately terminate when the communication sought is obtained or when the application for the order is denied, whichever is earlier. In the event such application for approval is den6ied, or in any other case where the interception is terminated without an order having been issued, the contents of any wire, oral, or electronic communication intercepted shall be treated as having been obtained in violation of this chapter, and an inventory shall be served as provided for in subsection (d) of this section on the person named in the application. (8)(a) The contents of any wire, oral, or electronic communication intercepted by any means authorized by this cwU]1hapter shall, if possible, be recorded on tape or wire or other comparable device. The recording of the contents of any wire, oral, or electronic communication under this subsection shall be done in such a way as will protect the recording from editing or other alterations. Immediately upon the expiration of the period of the order, or extensions thereof, such recordings shall be made available to the judge issuing such order and sealed under this directions. Custody of the recordi\&vngs shall be wherever the judge orders. They shall not be destroyed except upon an order of the issuing or denying judge and in any event shall be kept for ten years. Duplicate recordings may be made for use or disclosure pursuant to the provisions of subsections (2) and (2) of section 2517 of this chapter for investigations. The presence of the seal provided for by this section, or a satisfactory explanation for the absence thereof, shall be a prerequisite for the use or disclosure of the contents of any wire, oral, or electronic communication or evidence derived therefrom under subsection (3) of section 2517. (b) Applications made and orders granted under this chapter shall be sealed by the judge. Custody of the applications and orders shall be wherever the judge directs. Such applications and orders shall be disclosed only upon a showing of good cause before a judge of competent jurisdiction and shall not be destroyed except on order of the issuing or denying judge, and in any event shall be kept for ten years. (c) Any violation of the provisions of this subsection may be punished as contempt of the issuing or denying judge. (d) Within a reasonable time but not later than ninety days after the filing of an application for an order of approval under section 2518(7)(b) which is denied or the termination of the period of an order or extensions thereof, the issuing or denying judge shall cause to be served, on the ;@persons named in the order or the application, and such other parties to intercepted communications as the judge may determine in his discretion that is in the interest of justice, and inventory which shall include notice of- (1) the fact of the entry of the order or the application; (2) the date of the entry and the period of authorized, approved or disapproved interception, or the denial of the application, and (3) the fact that during the p< ;eriod wire, oral, or electronic communications were or were not intercepted. The judge, upon the filing of a motion, may in his discretion make available to such person or his counsel for inspection such portions of the intercepted communications, applications and orders as the judge determines to be in the interest of justice. On an ex parte showing of good cause to a judge of competent jurisdiction the serving of the inventory required by this subsection may be postponed. R^ (9) The contents of any wire, oral, or electronic communication intercepted pursuant to this chapter or evidence derived therefrom shall not be received in evidence or otherwise disclosed in any trial, hearing, or other proceeding in a Federal or State court unless each party, not less then ten days before the trial, hearing, or proceeding, has been furnished with a copy of the court order, and accompanying application, under which the interception was authorized or approved. ThiA_ϰs ten-day period may be waived by the judge if he finds that it was not possible to furnish the party with the above information ten days before the trial, hearing, or proceeding and that the party will not be prejudiced by the delay in receiving such information. (10)(a) Any aggrieved person in any trial, hearing, or proceeding in or before the any court, department, officer, agency, regulatory body, or other authority of the United States, a State, or a political subdivision thereof, may move to suppress the contents of any wire or oral communication intercepted pursuant to this chapter, or evidence derived therefrom, on the grounds that- (i) the communication was unlawfully intercepted; (ii) the order of authorization or approval under which it was intercepted is insufficient on its face; or (iii) the interception was not made in conformity with the order of authorization or approval. Such motio}0n shall be made before the trial, hearing, or proceeding unless there was no opportunity to make such motion or the person was not aware of the grounds of the motion. If the motion is granted, the contents of the intercepted wire or oral communication, or evidence derived therefrom, shall be treated as having been obtained in violation of this chapter. The judge, upon the filing of such motion by the aggrieved person, may in his discretion make available to the aggrieved person or mٹhis counsel for inspection such portions of the intercepted communication or evidence derived therefrom as the judge determines to be in the interests of justice. (b) In addition to any other right to appeal, the United States shall have the right to appeal from an order granting a motion to suppress made under paragraph (a) of this subsection, or the denial of an application for an order of approval, if the United States attorney shall certify to the judge or other official granting such motion or denying such application the the appeal is not taken for purposes of delay. Such appeal shall be taken within thirty days after the date the order was entered and shall be diligently prosecuted. (c) The remedies and sanctions described in this chapter with respect to the interception of electronic communications are the only judicial remedies and sanctions for nonconstitutional violations of this chapter involving such communications. (11) The req!Duirements of subsections (1)(b)(ii) and (3)(d) of the section relating to the specification of the facilities from which, or the place where, the communication is to be intercepted do not apply if- (a) in the case of an application with respect to the interception of an oral communication- (i) the application is by a federal investigative or law enforcement officer and is approved by the Attorney General, the Deputy Attorney Gener' :al, the Associate Attorney General, an Assistant Attorney General, or an acting Assistant Attorney General; (ii) the application contains a full and complete statement as to why such specification is not practical and identifies the person committing the offense and whose communications are to be intercepted; and (iii) the judge finds that such specification is not practical; and DР(b) in the case of an application with respect to a wire or electronic communication- (i) the application is by a Federal investigative or law enforcement officer and is approved by the Attorney General, the Deputy Attorney General, the Associate Attorney General, and Assistant Attorney General, or an acting Assistant Attorney General; (ii) the application identifies the person believed to be committing the offense and whose communications are to be intercepted and the applicant makes a showing of a purpose, on the part of that person, to thwart interception by changing facilities; and (iii) the judge finds that such purpose has been adequately shown. (12) An interception of a communication under an order with respect to which the requirements of subsections (1)(b)(ii) and (3)(d) of this section do not apply by É*reason of subsection (11) shall not begin until the facilities from which, or the place where, the communication is to be intercepted is ascertained by the person implementing the interception order. A provider of wire or electronic communications service that has received an order as provided for in subsection (11)(b) may move the court to modify or quash the order on the ground that its assistance with respect to the interception cannot be performed in a timely or reasonable fashion. The court, upon notice to the government, shall decide such a motion expeditiously. { 2519. Reports concerning intercepted wire, oral, or electronic communications (1) Within thirty days after the expiration of an order (or each extension thereof) entered under section 2518, or the denial of an order approving an interception, the issuing or denying judge shall report to the Administrative Office of the United States Courts- (a) the fact thatP an order or extension was applied for; (b) the kind of order or extension was applied for (including whether or not the order was an order with respect to which the requirements of sections 2518(1)(b)(ii) and 2581(3)(d) of this title did not apply by reason of section 2518(11) of title); (c) the fact that the order or extension was granted as applied for, was modified, or was denied; (d) the period of interceptions authorized bƯqTy the order, and the number and duration of any extensions of the order; (e) the offense specified in the order or application, or extension or an order; (f) the identity of the applying investigative or law enforcement officer and agency making the application and the person authorizing the application; and (g) the nature of the facilities from which or the place where communications were to be intercepted. (2) In JCanuary of each year the Attorney General, an Assistant Attorney General specially designated by the Attorney General, or the principal prosecuting attorney of a State, or the principal prosecuting attorney for any political subdivision of a State, shall report to the Administrative Office of the United States Courts- (a) the information required by paragraphs (a) through (g) of subsection (1) of this section with respect to each application for an order or exte^pnsion made during the preceding calendar year; (b) a general description of the interceptions made under such order or extension, including (i) the approximate nature and frequency of incriminating communications intercepted, (ii) the approximate nature and frequency of other communications intercepted, (iii) the approximate number of persons whose communications were intercepted, and (iv) the approximate nature, amount, and cost of the manpower aɣZnd other resources used in the interceptions; (c) the number of arrests resulting from interceptions made under such order or extension, and the offenses for which arrests were made; (d) the number of trials resulting from such interceptions; (e) the number of motions to suppress made with respect to such interceptions, and the number granted or denied; (f) the number of convictions resulting from such interceptions and the offenses for which the convictions were obtained and a general assessment of the importance of the interceptions; and (g) the information required by paragraphs (b) through (f) of this subsection with respect to orders or extensions obtained in a preceding calendar year. (3) In April of each year the Director of the Administrative Office of the United States Courts shall transmit to the Congress a full and complete report concerning the numbe=} r of applications for orders authorizing or approving the interception of wire, oral, or electronic communications pursuant to this chapter and the number of orders and extensions granted or denied pursuant to this chapter during the preceding calendar year. Such report shall include a summary and analysis of the data required to be filed with the Administrative Office by subsections (1) and (2) of this section. The Director of the Administrative Office of the United States Courts isDN authorized to issue binding regulations dealing with the content and form of the reports required to be filed by subsections (1) and (2) of this section. { 2520. Recovery of civil damages authorized (a) IN GENERAL,--Except as provided in section 2511(2)(a)(ii), any person whose wire, oral, or electronic communication is intercepted, disclosed, or intentionally used in violation of this chapter may in a civil action recover from the person or entity which engaged in that ϰ+violation such relief as may be appropriate. (b) RELIEF.--In an action under this section, appropriate relief includes- (1) such preliminary and other equitable or declaratory relief as may be appropriate; (2) damages under subsection (c) and punitive damages in appropriate cases; and (3) a reasonable attorney's fee and other litigation costs reasonably incurred. (c) COMPUTATION OF DAMAGES.--(1) In an action under thisΩY section, if the conduct is in violation of this chapter is the private viewing of a private satellite video communication that is not scrambled or encrypted or if the communication is a radio communication that is transmitted on frequencies allocated under subpart D of part 74 of the rules of the Federal Communications Commission that is not scrambled or encrypted and the conduct is not for a tortious or illegal purpose or for purposes of direct or indirect commercial advantage or pevrivate commercial gain, then the court shall assess damages as follows: (A) If the person who engaged in that conduct has not previously been enjoined under section 2511(5) and has not been found liable in a prior civil action under this section, the court shall assess the greater of the sum of actual damages suffered by the plaintiff, or statutory damages of not less than $50 and not more than $500. (B) If, on one prior occasion, the persoLn who engaged in that conduct has been enjoined under section 2511(5) or has been found liable in a civil action under this section, the court shall assess the greater of the sum of actual damages suffered by the plaintiff, or statutory damages of not less than $100 and not more than $1,000. (2) In any other action under this section, the court may assess as damages whichever is the greater of- (A) the sum of the actual damages suffered by the Ѩ6plaintiff and any profits made by the violator as a result of the violation; or (B) statutory damages of whichever is the greater of $100 a day for each day of violation or $10,000. (d) DEFENSE.--A good faith reliance on- (1) a court warrant or order, a grand jury subpoena, a legislative authorization, or a statutory authorization; (2) a request of an investigative or law enforcement officer under section 2518(7) of this ҋtitle; or (3) a good faith determination that section 2511(3) of this title permitted the conduct complained of; is a complete defense against any civil or criminal action brought under this chapter or any other law. (e) LIMITATION.--A civil action under this section may not be commenced later than two years after the date upon which the claimant first has a reasonable opportunity to discover the violation. { 2521. Injunction against illegal interception ӌy: Whenever it shall appear that any person is engaged or is about to engage in any act which constitutes or will constitute a felony violation of this chapter, the Attorney General may initiate a civil action in a district court of the United States to enjoin such violation. The court shall proceed as soon as practicable to the hearing and determination of such an action, and may, at any time before final determination, enter such a restraining order or prohibition, or take such_* other action, as is warranted to prevent a continuing and substantial injury to the United States or to any person or class of persons for whose protection the action is brought. A proceeding under this section is governed by the Federal Rules of Civil Procedure, except that, if an indictment has been returned against the respondent, discovery is governed by the federal Rules of Criminal Procedure. CHAPTER 121- STORED WIRE AND ELECTRONIC COMMUNICATIONS AND TRANSACTIONAL  RECORDS ACCESS Sec. 2701. Unlawful access to stored communications. 2702. Disclosure of contents. 2703. Requirements for governmental access. 2704. Backup preservation. 2705. Delayed notice. 2706. Cost reimbursement. 2707. Civil action. 2708. Exclusivity of remedies. 2709. Counterintelligence access to telephone toll and transactional records. 2710. Definitions 2701. Unlawful access to stored communications (a) OFFENSE.- Except as provided in subsection (c) of th/Vis section whoever- (1) intentionally accesses without authorization a facility through which an electronic communication service is provided; or (2) intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished as provided in subsection (b) of this section. (b) PUNISHMENT.- The punishment for an offenSSPse under subsection (a) of this section is- (1) if the offense is committed for purposes of commercial advantage, malicious destruction or damage, or private commercial gain- (A) a fine of not more than $250,000 or imprisonment for not more than one year, or both, in the case of a first offense under this subparagraph; and (B) a fine under this title or imprisonment for not more than two years, or both, for any subsequent offense under this subparagraph; and (Cr2) a fine of not more than $5,000 or imprisonment for not more than six months, or both, in any case. (c) EXCEPTIONS.- Subsection (a) of this section does not apply with respect to conduct authorized- (1) by the person or entity providing a wire or electronic communications service; (2) by a user of that service with respect to a communication of or intended for that user; or (3) in section 2703, 2704 or 2518 of this title. { 2702. Disclosure of contents xEv (a) PROHIBITIONS.- Except as provided in subsection (b)- (1) a person or entity operating an electronic communication service to the public shall not knowingly divulge to any person or entity the contents of a communication while in electronic storage by that service; and (2) a person or entity providing remote computing service to the public shall not knowingly divulge to any person or entity the contents of any communication which is carried or maintained on that servporice- (A) on behalf of, and received by means of electronic transmission from (or created by means of computer processing of communications received by means of electronic transmission from), a subscriber or customer of such service; and (B) solely for the purpose of providing storage or computer processing services to such subscriber or customer, if the provider is not authorized to access the contents of any such communications for purposes of providing any services otheۮ|r than storage or computer processing. (b) EXCEPTIONS.- A person or entity may divulge the contents of a communication- (1) to an addressee or intended recipient of such communication or an agent of such addressee or intended recipient; (2) as otherwise authorized in section 2516, 2511(2)(a), or 2703 of this title; (3) with the lawful consent of the originator or an addressee or intended recipient of such communication, or the subscriber in the case of remote ܸIcomputing service; (4) to a person employed or authorized or whose facilities are used to forward such communication to its destination; (5) as may be necessarily incident to the rendition of the service or to the protection of the rights or property of the provider of that service; or (6) to a law enforcement agency, if such contents- (A) were inadvertently obtained by the service provider; and (B) appear to pertain to the commission of a crime. { 2703 e'. Requirements for governmental access (a) CONTENTS OF ELECTRONIC COMMUNICATIONS IN ELECTRONIC STORAGE.- A governmental entity may require the disclosure by a provider of electronic communication service of the contents of an electronic communication, that is in electronic storage in an electronic communications system for one hundred and eighty days or less, only pursuant to a warrant issued under the Federal Rules of Criminal Procedure or equivalent State warrant. A governme Kntal entity may require the disclosure by a provider of electronic communications services of the contents of an electronic communication that has been in storage in an electronic communications system for more than one hundred and eighty days by the means available under subsection (b) of this section. (b) CONTENTS OF ELECTRONIC COMMUNICATIONS IN A REMOTE COMPUTING SERVICE.- (1) A governmental entity may require a provider of remote computing service to disclose the contents o 3f any electronic communication to which this paragraph is made applicable by paragraph (2) of this subsection- (A) without required notice to the subscriber or customer, if the governmental entity obtains a warrant issued under the Federal Rules of Criminal Procedure or equivalent State warrant; or (B) with prior notice from the governmental entity to the subscriber or customer if the governmental entity- (i) uses an administrative subpoena authorized by a Federal o r State statute or a Federal or State grand jury subpoena; or (ii) obtains a court order for such disclosure under subsection (d) of this section; except that delayed notice may be given pursuant to section 2705 of this title. (2) Paragraph (1) is applicable with respect to any electronic communication that is held or maintained on that service- (A) on behalf of, and received by means of electronic transmission from (or created by means of computer processing of com q^kmunications received by means of electronic transmission from), a subscriber or customer of such remote computing service; and (B) solely for the purpose of providing storage or computer processing services to such subscriber or customer, if the provider is not authorized to access the contents of any such communications for purposes of providing any services other than storage or computer processing. (c) RECORDS CONCERNING ELECTRONIC COMMUNICATION SERVICE OR REMOTE COMPUDTING SERVICE.- (1)(A) Except as provided in subparagraph (B), a provider of electronic communication service or remote computing service may disclose a record or other information pertaining to a subscriber to or customer of such service (not including the contents of communications covered by subsection (a) or (b) of this section) to any person other than a governmental entity. (B) A provider of electronic communication service or remote computing service shall disclose a recHord or other information pertaining to a subscriber to or customer of such service (not including the contents of communications covered by subsection (a) or (b) of this section) to a governmental entity only when the governmental entity- (i) uses an administrative subpoena authorized by a Federal or State statute, or a Federal or State grand jury subpoena; (ii) obtains a warrant issued under the Federal Rules of Criminal Procedure or equivalent State warrant; (iii)p obtains a court order for such disclosure under subsection (d) of this section; or (iv) has the consent of the subscriber or customer to such disclosure. (2) A governmental entity receiving records or information under this subsection is not required to provide notice to a subscriber or customer. (d) REQUIREMENTS FOR COURT ORDER.- A court order for disclosure under subsection (b) or (c) of this section shall issue only if the governmental entity shows that there is}k reason to believe the contents of a wire or electronic communication, or the records or other information sought, are relevant to a legitimate law enforcement inquiry. In the case of a State governmental authority, such a court order shall not issue if prohibited by the law of such State. A court issuing an order pursuant to this section, on a motion made promptly by the service provider, may quash or modify such order, if the information or records requested are unusually voluminWgous in nature or compliance with such order otherwise would cause an undue burden on such provider. (e) NO CAUSE OF ACTION AGAINST A PROVIDER DISCLOSING INFORMATION UNDER THIS CHAPTER.- No cause of action shall lie in any court against any provider of wire or electronic communication service, its officers, employees, agents, or other specified persons for providing information, facilities, or assistance in accordance with the terms of a court order, warrant, subpoena or certifiskcation under this chapter. { 2704. Backup preservation (a) BACKUP PRESERVATION.- (1) A governmental entity acting under section 2703(b)(2) may include in its subpoena or court order a requirement that the service provider to whom the request is directed create a backup copy of the contents of the electronic communications sought in order to preserve those communications. Without notifying the subscriber or customer of such subpoena or court order, such service provider shall Icreate such backup copy as soon as practicable consistent with its regular business practices and shall confirm to the governmental entity that such backup copy has been made. Such backup copy shall be created within two business days after receipt by the service provider of the subpoena or court order. (2) Notice to the subscriber or customer shall be made by the governmental entity within three days after receipt of such confirmation, unless such notice is delayed pursuant t2Jo section 2705(a). (3) The service provider shall not destroy such backup copy until the later of -- (A) the delivery of the information; or (B) the resolution of any proceedings (including appeals of any proceeding) concerning the government's subpoena or court order. (4) The service provider shall release such backup copy to the requesting governmental entity no sooner than fourteen days after the governmental entity's notice to the subscriber or customer if]M such service provider -- (A) has not received notice from the subscriber or customer that the subscriber or customer has challenged the governmental entity's request; and (B) has not initiated proceedings to challenge the request of the governmental entity. (5) A governmental entity may seek to require the creation of a backup copy under subsection (a)(1) of this section if in its sole discretion such entity determines that there is reason to believe that notificat뉞ion under section 2703 of this title of the existence of the subpoena or court order may result in destruction of or tampering with evidence. This determination is not subject to challenge by the subscriber or customer or service provider. (b) CUSTOMER CHALLENGES -- (1) Within fourteen days after notice by the governmental entity to the subscriber or customer under subsection (a)(2) of this section, such subscriber or customer may file a motion to quash such subpoena or vacate]' such court order, with copies served upon the governmental entity and with written notice of such challenge to the service provider. A motion to vacate a court order shall be filed in the court which issued such order. A motion to quash a subpoena shall be filed in the appropriate United States district court or State court. Such motion or application shall contain an affidavit or sworn statement -- (A) stating that the applicant is a customer or subscriber to the service fr$om which the contents of electronic communications maintained for him have been sought; and (B) stating the applicant's reasons for believing that the records sought are not relevant to a legitimate law enforcement inquiry or that there has not been substantial inquiry or that there has not been substantial compliance with the provisions of this chapter in some other respect. (2) Service shall be made under this section upon a governmental entity by delivering or mailing lby registered or certified mail a copy of the papers to the person, office, or department specified in the notice which the customer has received pursuant to this chapter. For the purposes of this section, the term "delivery" has the meaning given that term in the Federal Rules of Civil Procedure. (3) If the court finds that the customer has complied with paragraphs (1) an (2) of this subsection, the court shall order the governmental entity to file a sworn response, which mayp9 be filed in camera if the governmental entity includes in its response the reasons which make in camera review appropriate. If the court is unable to determine the motion or application on the basis of the parties' initial allegations and response, the court may conduct such additional proceedings as it deems appropriate. All such proceedings shall be completed and the motion or application decided as soon as practicable after the filing of the governmental entity's response. a* (4) If the court finds that the applicant is not the subscriber or customer for whom the communications sought by the governmental entity are maintained, or that there is a reason to believe that the law enforcement inquiry is legitimate and that the communications sought are relevant to that inquiry, it shall deny the motion or application and order such process enforced. If the court finds that the applicant is the subscriber or customer for whom the communications sought by the gX)dovernmental entity are maintained, and that there is not a reason to believe that the communications sought are relevant to a legitimate law enforcement inquiry, or that there has not been substantial compliance with the provisions of this chapter, it shall order the process quashed. (5) A court order denying a motion or application under this section shall not be deemed a final order and no interlocutory appeal may be taken therefrom by the customer. { 2705. Delayed notice N1y (a) DELAY OF NOTIFICATION --(1) A governmental entity acting under section 2703(b) of this title may -- (A) where a court order is sought, include in the application a request, which the court shall grant, for an order delaying the notification required under section 2703(b) of this title for a period not to exceed ninety days, if the court determines that there is reason to believe that notification of the existence of the court order may have an adverse result described IEin paragraph (2) of this subsection; or (B) where an administrative subpoena authorized by a Federal or State statute or a Federal or State grand jury subpoena is obtained, delay the notification required under section 2703(b) of this title for a period not to exceed ninety days upon the execution of a written certification of a supervisory official that there is reason to believe that notification of the existence of the subpoena may have an adverse result described in paragra Xph (2) of this subsection. (2) An adverse result for the purposes of paragraph (1) of this subsection is -- (A) endangering the life or physical safety of an individual; (B) flight from prosecution; (C) destruction of or tampering with evidence; (D) intimidation of potential witnesses; or (E) otherwise seriously jeopardizing an investigation or unduly delaying a trial. (3) The governmental entity shall maintain a true copy of certification unHc<;:9876543210/.-,+*)('&%$#"!      =!Hder paragraph (1)(B). (4) Extensions of the delay of notification provided in section 2703 of up to ninety days each may be granted by the court upon application, or by certification by a governmental entity, but only in accordance with subsection (b) of this section. (5) Upon expiration of the period of delay of notification under paragraph (1) or (4) of this subsection, the governmental entity shall serve upon, or deliver by registered or first-class mail to, the custom"+er or subscriber a copy of the process or request together with notice that -- (A) states with reasonable specificity the nature of the law enforcement inquiry; and (B) informs such customer or subscriber -- (i) that information maintained for such customer or subscriber by the service provider named in such process or request was supplied to or requested by that governmental authority and the date on which the supplying or request took place. (ii) that notifi#ocation of such customer or subscriber was delayed; (iii) what governmental entity or court made the certification or determination pursuant to which that delay was made; and (iv) which provision of this chapter allowed such delay. (6) As used in this subsection, the term "supervisory official" means the investigative agent in charge or assistant investigative agent in charge or an equivalent of an investigating agency's headquarters or regional office, or the chief $wDprosecuting attorney or the first assistant prosecuting attorney or an equivalent of a prosecuting attorney's headquarters or regional office. (b) PRECLUSION OF NOTICE TO SUBJECT OF GOVERNMENTAL ACCESS. -- A governmental entity acting under section 2703, when it is not required to notify the subscriber or customer under section 2703(b)(1), or to the extent that it may delay such notice pursuant to subsection (a) of this section, may apply to a court for an order commanding a pr%ovider of electronic communications service or remote computing service to whom a warrant, subpoena, or court order is directed, for such period as the court deems appropriate, not to notify any other person of the existence of the warrant, subpoena, or court order. The court shall enter such an order if it determines that there is reason to believe that notification of the existence of the warrant, subpoena, or court order will results in -- (1) endangering the life or physic&.al safety of an individual; (2) flight from prosecution; (3) destruction of or tampering with evidence; (4) intimidation of potential witnesses; or (5) otherwise seriously jeopardizing an investigation or unduly delaying a trial. { 2706. Cost reimbursement (a) PAYMENT -- Except as otherwise provided in subsection (c), a governmental entity obtaining the contents of communications, records, or other information under section 2702, 2703, or 2704 of this '!title shall pay to the person or entity assembling or providing such information a fee for reimbursement for such costs as are reasonably necessary and which have been directly incurred in searching for, assembling, reproducing, or otherwise providing such information. Such reimbursable costs shall include any costs due to necessary disruption of normal operations of any electronic communication service or remote computing service in which such information may be stored. (b) A(7=|MOUNT -- The amount of the fee provided by subsection (a) shall be as mutually agreed by the governmental entity and the person or entity providing the information, or in the absence of agreement, shall be as determined by the court which issued the order for production of such information (or the court before which a criminal prosecution relating to such information would be brought, if no court order was issued for production of the information). (c) The requirement of subsec)ַr tion (a) of this section does not apply with respect to records or other information maintained by a communications common carrier that relate to telephone toll records and telephone listings obtained under section 2703 of this title. The court may, however, order a payment as described in subsection (a) if the court determines the information required is unusually voluminous in nature or otherwise caused an undue burden on the provider. { 2707. Civil action (a) CAUSE OF ACT*kbION. -- Except as provided in section 2703(e), any provider of electronic communication service, subscriber, or customer aggrieved by any violation of this chapter in which the conduct constituting the violation is engaged in with a knowing or intentional state of mind may, in a civil action, recover from the person or entity which engaged in that violation such relief as may be appropriate. (b) RELIEF. -- IN a civil action under this section, appropriate relief includes -- +U (1) such preliminary and other equitable or declaratory relief as may be appropriate; (2) damages under subsection (c); and 1/2 of (b), all of (c) & (d) omitted see p. 514,447 (e) LIMITATION. -- A civil action under this section may not be commenced later than two years after the date upon which the claimant first discovered or had a reasonable opportunity to discover the violation. { 2708. Exclusivity of remedies The remedies and sanctions described in t,?Fhis chapter are the only judicial remedies and sanctions for nonconstitutional violations of this chapter. { 2709. Counterintelligence access to telephone toll and transactional records (a) DUTY TO PROVIDE. -- A wire or electronic communication service provider shall comply with a request for subscriber information and toll billing records information, or electronic communication transactional records in its custody or possession made by the Director of the Federal Bureau of -#Investigation under subsection (b) of this section. (b) REQUIRED CERTIFICATION. -- The Director of the Federal Bureau of Investigation (or an individual within the Federal Bureau of Investigation designated for this purpose by the Director) may request any such information and records if the Director (or the Director's designee) certifies in writing to the wire or electronic communication service provider to which the request is made that -- (1) the information sought is . relevant to an authorized foreign counterintelligence investigation; and (2) there are specific and articulable facts giving reason to believe that the person or entity to whom the information sought pertains is a foreign power or an agent of a foreign power as defined in section 101 of the Foreign Intelligence Surveillance Act of 1978 (50 U.S.C. 1801). (c) PROHIBITION OF CERTAIN DISCLOSURE. -- No wire or electronic communication service provider, or officer, employee, or/HΨn shall be for a period not to exceed sixty days. (d) Non-disclosure Of Existence Of Pen Register Or A Trap And Trace Device.-An order authorizing or approving the installation and use of a pen register or a trap and trace device shall direct that- (1) the order be sealed until otherwise ordered by the court; and (2) the person owning or leasing the line to which the pen register or a trap and trace device is attached, or who has been ordered by the court to prov?gide assistance to the applicant, not disclose the existence of the pen register or trap and trace device or the existence of the investigation to the listed subscriber, or to any other person, unless or until otherwise ordered by the court. { 3124. Assistance in installation and use of a pen register or a trap and trace device (a) Pen Registers.-Upon the request of an attorney for the Government or an officer of a law enforcement agency authorized to install and use a pen re@}_gister under this chapter, a provider of wire or electronic communication service, landlord, custodian, or other person shall furnish such investigative or law enforcement officer forthwith all information, facilities, and technical assistance necessary to accomplish the installation of the pen register unobtrusively and with a minimum of interference with the services that the person so ordered by the court accords the party with respect to whom the installation and use is to take pAO4lace, if such assistance is directed by a court order as provided in section 3123(b)(2) of this title. (b) Trap And Trace Device.-Upon the request of an attorney for the Government or an officer of a law enforcement agency authorized to receive the results of a trap and trace device under this chapter, a provider of a wire or electronic communication service, landlord, custodian, or other person shall install such device forthwith on the appropriate line and shall furnish suchB%1^ investigative or law enforcement officer all additional information, facilities and technical assistance including installation and operation of the device unobtrusively and with a minimum of interference with the services that the person so ordered by the court accords the party with respect to whom the installation and use is to take place, if such installation and assistance is directed by a court order as provided in section 3123(b)(2) of this title. Unless otherwise ordered byCǞun the court, the results of the trap and trace device shall be furnished to the officer of a law enforcement agency, designated in the court, at reasonable intervals during regular business hours for the duration of the order. (c) Compensation.-A provider of a wire or electronic communication service, landlord, custodian, or other person who furnishes facilities or technical assistance pursuant to this section shall be reasonably compensated for such reasonable expenses incurreD.d in providing such facilities and assistance. (d) No Cause Of Action Against A Provider Disclosing Information Under This Chapter.-No cause of action shall lie in any court against any provider of a wire or electronic communication service, its officers, employees, agents, or other specified persons for providing information, facilities, or assistance in accordance with the terms of a court order under this chapter. (e) Defense.-A good faith reliance on a court order, EMa legislative authorization, or a statutory authorization is a complete defense against any civil or criminal action brought under this chapter or any other law. { 3125. Reports concerning pen registers and trap and trace devices The Attorney General shall annually report to Congress on the number of pen register orders and orders for trap and trace devices applied for by law enforcement agencies of the Department of Justice. { 3126. Definitions for chapter As used inFaV this chapter- (1) the terms "wire communication", "electronic communication", and "electronic communication service" have the meanings set forth for such terms in section 2510 of this title; (2) the term "court of competent jurisdiction" means- (A) a district court of the United States (including a magistrate of such a court) or a United States Court of Appeals; or (B) a court of general criminal jurisdiction of a State authorized by the law of that StateG> to enter orders authorizing the use of a pen register or a trap and trace device; (3) the term "pen register" means a device which records or decodes electronic or other impulses which identify the numbers dialed or otherwise transmitted on the telephone line to which such device is attached, but such term does not include any device used by a provider or customer of a wire or electronic communication service for billing, or recording as an incident to billing, for communicatH pions services provided by such provider or any device used by a provider or customer of a wire communication service for cost accounting or other like purposes in the ordinary course of its business; (4) the term "trap and trace" device means a device which captures the incoming electronic or other impulses which identify the originating number of an instrument or device from which a wire or electronic communication was transmitted; (5) the term "attorney for the GovernIment" has the meaning given such term for the purposes of the Federal Rules of Criminal Procedure; and (6) the term "State" means a State, the District of Columbia, Puerto Rico, and any other possession or territory of the United States. =============================================================================== A lawyer's review and perspective of the ECPA =============================================================================== WHEJanVN IS LISTENING TO THE RADIO A CRIME? By FRANK TERRANELLA The federal Electronic Communications Privacy Act has turned many radio listeners into criminals. The problem is, most of them don't know about it. I will attempt here to describe in very non-legalistic and general terms (extremely difficult for a lawyer), exactly what listening is legal and what is illegal. Section 2511 of the Federal Criminal Statutes (18 U.S.C.) is where most of the actioK tn is in this field. The statute is primarily a wiretap and bug statute and only recently has been expanded to include radio listening. I will not be discussing the provisions dealing with oral communications or wiretaps and bugging devices here. The statute starts out by saying that it is illegal to intentionally intercept, disclose or use the contents of any wire or electronic communication. The statute then goes on to carve out exceptions to this general rule. It is imL!c!portant to understand what the law means by wire or electronic communication. A wire communication is any communication over a telephone or other wire. However, the definition specifically includes cellular telephones and excludes cordless telephones (even though both involve the use of radio and wire transmission). An electronic communication includes all radio transmissions, but excludes cordless telephones and pagers. After making a blanket prohibition of intercepting all M"*>electronic (i.e. radio) transmissions, the statute lists the exceptions. The first exception is that it is legal to listen to all radio transmissions which are "readily accessible to the general public." This term is defined in the statute to mean radio signals which are (1) not encrypted, scrambled, carried on a subcarrier or other signal subsidiary to a radio transmission; (2) not transmitted over a common carrier communications system (such as the phone company); (3) not specialN# $8 transmissions such as point-to-point private relay transmissions for the broadcast services, not meant for reception by the general public. The next exception to the general rule is that it is legal to listen to all radio broadcasts "relating to ships, aircraft, vehicles or persons in distress." The statute also says that it is legal to listen to a broadcast by any governmental, law enforcement, civil defense, private land mobile or public safety communications system, includinO$Og police and fire, which are readily accessible to the general public. It is also legal to listen to transmissions on the amateur bands, citizens band or general mobile radio services as well as any marine or aeronautical communications system and cordless telephone transmission. Finally, it is not illegal to intercept satellite transmissions of cable programming as long as the transmission is not encrypted, there is no monetary gain by the viewer, and there is no marketing sP%X%(ystem available (meaning no one is selling the rights to view the programming via satellite). There is also an interesting section of the statute which may provide a loophole for lawyers defending clients charged with a violation of this law. The statute says that it is not illegal to intercept a radio transmission which is causing interference with any lawfully operating station (including ham radio operators), or is causing interference with any consumer electronic equipment, Q&e&^to the extent necessary to identify the source of the interference. I can see a lawyer arguing that his client was only listening to that cellular telephone transmission because it was interfering with his client's reception on the 23 centimeter band. After all of the exceptions are carved out, the bottom line is that the only radio frequency transmissions which are off limits are those which are not readily accessible to the general public, as that term is defined in the statutR',tce. The definition of "readily accessible to the general public" is stated in the statute as follows: (a) not scrambled or encrypted; (b) not transmitted using modulation techniques whose essential parameters have been withheld from the public with the intention of preserving the privacy of such communication; (c) not carried on a subcarrier or other signal subsidiary to a radio transmission; (d) not transmitted over a communiS(6'cation system provided by a common carrier, unless the communication is a tone only paging system communication; (e) not transmitted on frequencies allocated under part 25; subpart D,E, or F of part 74; or part 94 of the Rules of the Federal Communications Commission, unless, in the case of a communication transmitted on a frequency allocated under part 74 that is not exclusively allocated to broadcast auxiliary serviT)Asces, the communication is a two-way voice communication by radio. The first two of these are no problem. If the signal is scrambled, law-abiding DXers will leave it alone. Paragraph (c) begins the real restrictions on DXers. Under the statutory definition, signals on a subcarrier, such as the types being experimented with in television at the moment, are not readily accessible to the general public and are not permitted listening. The next section poses the greU*ݥatest problem for DXers. Under the definition, any signal, other than a tone, which is transmitted by a common carrier is off limits. The FCC defines a common carrier as "any person engaged in rendering communication service for hire to the public." (47 CFR 21.2) The statutory definition given in 47 U.S.C. 153(h) is a bit more specific in that it specifically excludes radio broadcasters who, through sale of commercials, do render a communication service for hire. But, even with thV+|>`e removal of broadcasters, this definition is very broad and will include, beyond obvious services such as cellular telephone, just about every utility station on the face of the earth. The types of radio transmissions made off limits to DXers by paragraph (e) are certain satellite communications, certain microwave communications, and auxiliary stations to broadcasters used for such things as feeds from the mobile van back to the studio or from the studio to the transmitter. TheW,0 frequencies of these services are all above 1 Gigahertz except for the bands 928-929 MHz and 944-960 Mhz. The exception to this is the frequency assignment given to remote broadcast pickup stations under subpart D of part 74. This service, which is off-limits to DXers, is assigned bits and pieces of the radio spectrum from 1606 kHz through 455.925 Mhz. Twenty-six frequencies in the shortwave bands are allocated to this service. The allocations are scattered between 25.87 Mhz andX-8X 26.47 Mhz, but unless you have a copy of the FCC Rules and Regulations, there is no easy way for a DXer to know that listening to these transmissions is a federal offense. This is precisely why I maintain that this law is unenforceable. In order for a prosecution under 18 U.S.C. 2511 to be successful, the government must prove beyond a reasonable doubt that the DXer intentionally intercepted a protected transmission. Since even attorneys are unsure what frequencies are off-liY.uJmits, how can the government hope to prove that a DXer who happens upon one of these federally-legislated minefields in the radio spectrum, actually intended to do so? It should be noted that the Communications Act of 1934 (47 U.S.C. 605) has not been repealed by the new law. It is still illegal, as it has been since at least 1934, to divulge the contents of any transmission except for general broadcast stations, amateur radio and CB transmissions, and transmissions relating toZ/>% ships, aircraft, vehicles or persons in distress. A recent case (Edwards v. State Farm Insurance Co., 833 F.2d 535) concluded that in order to prove an offense under this statute, the speaker must have held a subjective expectation of privacy that was justifiable under the circumstances. I hope that this brief trip through the legal maze of communications privacy has been useful. I can see the day coming when some industrious lawyer, defending a client of means, decides to cha[01jllenge this unjust law. The basis is very simple. Just as there is no Fourth Amendment right of privacy where there is no reasonable expectation of privacy, so too there should not be a statutory right of privacy where anyone with a receiver can listen in. To use an analogy, the providers of cellular service want the right to parade down Main Street with no clothes on and then prosecute anyone who looks. This is simply unfair and unrealistic. And beyond that, our First Amendme\1D+nt freedom of speech has a corollary freedom to be informed and to gather information. This freedom must extend to the spoken as well as the printed word, as long as no reasonable expectations of privacy are violated. Anyone with a receiver should be entitled to hear anything which is broadcast in the clear over the "public" airwaves for the simple reason that it is not reasonable for anyone to transmit in this manner and expect this transmission to be private. An expectation of p]2qrivacy can only be achieved by scrambling the signal, not by governmental decree. ------------------------------------------------------------------------------- FRANK TERRANELLA is an attorney, ham radio operator and short wave listener (not necessarily in that order). =============================================================================== Modifying two scanners for cellular reception =========================================================================^3(L====== The word "modifying" in this case is wrong. That implies that there is a _conversion_ process whereby you can cause your scanner to suddenly begin receiving cellular mobile telephone calls. This is wrong thinking. A scanner that is _designed_ to receive those frequencies above 512 MHz can have those frequencies RESTORED (_sometimes_). A scanner that covers from 30-512 MHz can NEVER receive 800-900 MHz frequencies without the aid of an external RF converter. Many time_4Ms you will see messages from people asking how to modify such-and-such a receiver to pick up CMT. The sad truth is, the answer is $$$, as that's what it will take to get a new scanner that covers those frequencies. Some older scanners (most of them in fact) have no modifications so that they will cover these frequencies. There may be cosmetic changes, such as the addition of an S-meter, or squelch or tone improvement, but there will never, ever be anything that can be done to `5vsrmost of them to make them cover CMT. The PRO-2004/2005/34 receivers originally had those frequencies, but had them blocked out. Restoring those frequencies was simply a matter of _unblocking_ them. There was really no "modifying" taking place. If a scanner was never intended to cover 800 MHz, it never will. You can get RF converters that will convert 800-912 MHz down to 400-512 MHz, however, and these should work on all scanners. MOST SCANNERS CANNOT BE MODIFIED OR CHANGED TO Ra6aECEIVE THE CMT FREQUENCIES. There are a handful of exceptions to this. It started out with the Realistic PRO-2004 and the PRO-34, and went to the PRO-2005. To restore CMT for the 2004, open the radio and turn it upside down. You'll see a large metal box. Carefully remove the cover. Find diode D-513. It may be in the line of diodes, or it may be on the bottom of the PC board, in which case you'll have to VERY carefully remove the board. In either case, the cure is the same.b7@ Clip one leg of D-513 to restore CMT frequencies. If you're careful, you can unsolder this diode and place it in the empty spot at D-510. That will give you 400 channels instead of 300. For the PRO-2005, the procedure is the same, except you clip one leg of D-502 to restore cellular reception. In the 2004, put a 1N914 diode in D-514 and you'll increase your scan/search speed by 25%. Watch your diode polarity! For the PRO-2005, it's D-501, which is on the display board bec8hind the keyboard. Adding D-504 to the PRO-2005 will DELETE 66-88 MHz coverage -- TV channels, radio control, etc., so don't add D-504!!!! As far as is known, there is no channel expansion capability on the order of the PRO-2004 for the PRO-2005. 400 channels appears to be its limit. The PRO-34 handheld can also have CMT restored, and all can be modified to receive 6,400 channels (3,200 on the PRO-34), but that's beyond the capability of this article. I could have typed in thd9~ e directions for restoring CMT to the PRO-34, but you really need pictures to go with the modification. The original article was in "Popular Communications." All these are described in great detail in the "Scanner Modification Handbook" by Bill Cheek, available from CRB Research Books, Inc., PO Box 56, Commack, New York, 11725. It's $17.95 + $2.00 postage and handling, but is well worth the price due to the treasure trove of info that's in it. =====================================e:k1========================================== How to discover other scanner modifications =============================================================================== HOW TO 'DISCOVER' THOSE NEAT RADIO MODIFICATIONS by Bob Parnass, AJ9S How do the people that discover modifications to radios go about finding them? Good question! The first rule of thumb is to obtain service manuals, as they contain more thaf;In just troubleshooting information. For example, the alignment procedure outlined in the Regency K500 and M400 service manuals describes how to circumvent the frequency limit checking firmware, which allows out of band frequency programming. The Uniden 200/205XLT service manual describes a keyboard sequence that clears most of the 200 memory channels, and loads the others with bizarre test frequencies. Service manuals often describe the circuit changes in models intended for eg<;,mxport to other countries. This can reveal features disabled for some customers but enabled for others. A good library of IC and semiconductor data books is very helpful, although radio service manuals can also include IC internal diagrams. Old TTL databooks are no longer enough. The transition to surface mount components in radios like the Uniden/Bearcat 760XLT is motivation for acquiring data books for leadless components. Although some modifications involve discovery oh>:Նf "hidden" features, many others involve designing new circuitry or applying old circuitry from another radio. I can't claim credit for many "add/delete a diode" modifications, but here are the factors that accounted for a few other modifications. ***** Recognize Common Radio Circuits ***** Modification: Improve the squelch on the PRO-24, PRO-2004, 800XLT, etc. Motivation: Unsatisfied with stock performance. Almost all modern scanners use MC3357, MC3359, or Jap=DCBA@?>i?anese pin equivalent chips, which contain the IF, squelch, limiter & discriminator circuitry. Older Bearcat and Regency scanners, like the BC300 and M400, often hid the identity of their IC with "house numbers" painted over them. I compared these ICs pin for pin with the MC3357 and other known radio ICs to unmask their true identity. Having the Motorola IC data sheet and scanner service manuals made learning the chip internals easy, so I found the way to decrease hysteresis involvej@qd changing one resistor. ***** Be Curious ***** Modification: Trick the Icom R-71A to tune below 100 kHz. Motivation: Curiosity. Tried manipulating several front panel controls at the same time to see if I could confuse the microprocessor into doing something neat. I did. ***** Study the Schematic, Look for Unused Pins ***** Modification: Double the memory in the R-7000 (also published by another radio hobbyist). Motivation:kAE curiosity. I studied the schematic of the R-7000, and looked up the memory IC in a data book. Icom grounded an address lead, so only 1/2 the chip capacity was used. Not having enough time to try the idea on my own radio, I suggested the idea Jack Albert, who writes the RTTY column in "Monitoring Times", who used his R-7000 as a guinea pig. ***** Borrow Circuits from Other Radio Models ***** Modification: S-meter circuit for Bearcat scanners (unpublished). MotivalBz-tion: wanted to use scanners for transmitter hunting. I looked for other radios that used the same IF/squelch chip and already featured S-meters (like the Kenwood TR- 2600A, IC-28A, IC228H, etc.) I grafted their S-meter circuitry to my scanners. ***** Vary Parameters and Measure the Impact ***** Modification: Speed up the R-7000 scan rate. Motivation: dissatisfied with stock performance. I studied the radio schematic, found the components that determined scan mC~rate, and substituted various values of resistance, measuring the affect of each change. ***** Apply Simple Theory ***** Modification: COR light for the PRO-2004. Motivation: make scanner easier to use in a roomful of other active radios. Having studied the schematics of many scanners, I was familiar with FM receiver and scanner circuitry. I used service manual and found the proper point in the circuit where a logic level signal was produced depending onnD'I whether a signal was absent or present. Again, the PRO-2004 used a popular IF/squelch chip. I used the simplest transistor switching principles to design a COR light circuit. ***** Fashion a Test Harness ***** Marvin Moss used an interesting approach to explore his portable scanner. He wired the diodes in the diode matrix of his Radio Shack PRO-34 to separate DIP switches so he could experiment with switching in and out different combinations of diodes. o ***** All That Glitters is Not Gold ***** I always find other peoples' modifications very interesting, although not all are meritorious. For instance, avoid changing the crystal or RC time constant circuitry used as a clock for the microprocessor controller in your receiver. The controller performs many functions, so this alteration can produce undesirable side effects which outweigh any small increase in scan rate. and out different combinations of diodes. EFϒIHGFf2X 025rEG}ޭNEC P-100 ---===========================[ NEC P-100 ]============================--- I was recently asked to obtain some information on the NEC P100 for a friend. Here is the information I found. Kei -=- NEC P4,P100 WIRING: 1 2 3 4 5 6 ----------------------- ---------------- (O) 1 X X 4 5 6 X X ----------------------- EH ---------------- 7 8 9 X X X P4 BASE ,KEYS DOWN P100 BASE ,KEYS UP P4 P100 REF 1 1 7 REF 4 4 2 REF 5 5 9 REF 6 6 3 2 x 2N 3904 Tranistors (Looking at it flat side legs down!) 1 2 3 2 x IN Diodes 2 x 10k Resistor Pin 1 ----------------------------------------------------------|-----| 1 EIq | Pin 2 -- Diode >|------------ Centre Leg Transistor One 0 | K | Pin 4 -- Diode >|------------ Centre Leg Transistor Two r | e 1 Pin 12 --Leg 3 on Tranistor Two bridged on here -- REF 6 -------s 0 K Pin 13 -------------------------------------Ev]`------ REF 4 r e Pin 15 - Leg 3 on Tranistor One bridged on here - REF 5 -------------s Pins 18 To 25 --- Leg 1 Of Trans One & Two ---- REF 1 N.B. you must bridge pins 18-25 with solder so they are as 1 ok! BOTH RESISTORS MAY NOT BE NEEDED ON SOME COMPUTOR MODELS REF 1 = 1 7 REF 4 = 4 2 REF 5 = 5 9 REF 6 = 6 3 K Pin 13 -------------------------------------JKύPONMLK 2Qi012rJLlFortell Systems ---=========================[ Fortell Systems ]=======================--- Original USA text by Phantom Phreaker Re-written with UK information by Kei Fortell systems seem to be a system to monitor lines. They can only be used to monitor lines within their own areacode. A Fortell system is at 0800 622280. When you call, you will hear: 'Taradyne Fortell system. Please enter ID' The ID for this system is 0000# 0000#. AfJMpDter you type that in (DTMF) it will ask 'please enter line number' where you then type the PRE+SUFF of the number you wish to check within the NPA of the Fortell. Type 0171 xXxxXx. After you enter a number, it will repeat the number you entered. Now it will ask you to 'please enter mode'. The modes are: 1-Calling on other line 2-Calling on test line 3-Line test results If you enter mode 1, you will have these commands available: 1-Fault location 2-Other testing 7-Test ok, MonitoJN r 8-Hang up 9-Enter next line number If you enter 7 here, it will repeat what you selected, and ask for an ID code which can be any 6 digit number followed by a *. Now it will dial and tell you: 'Subscriber busy-busy-monitor test in progress conversation on line-short on line' 2-Monitor test 3-Overide and test 4-Wait for idle If you enter 2, (Monitor Test) it will tell you the busy status again. If you enter 3, it will override, or tell you 'Not available in this CO'. If yJOM8ou enter 4, (Wait for idle) it will wait until the line is idle. If you enter 1 (Fault Location) at the main list you will get these options: 1-Open location 3-Short location 4-Cross location 5-Ground location 8-Hang up If you enter 2 (Other testing) here, you will have these commands: 2-Loop Ground OHMS 3-Dial tone test 5-Pair ID 8-Hang up If you enter Mode 2, you will have these options:(Other testing) 2-Other testing 7-Test ok, Monitor 8-Hang up 9-Enter next line number IJPW 9t will repeat what you selected. If you select 2 here, you will now have these commands: 2-Loop Ground Omhs 8-Hang up If you select 7 at the main list after mode 2, it will ask for an ID which is any 6 digit number followed by a *. Now it will dial and check the number. If the number is busy, it will say 'Subcriber busy-monitor-test in progress- conversation on line-short on line-please hang up-waiting for idle' Now you can just type * to go back to the main list of commands. IfJah7 you enter MODE 3, if you have done a test before, it will give you the results of the test. If you haven't done a test, it will tell you so with 'No test results available' You can abort back to the main commands list by typing a *. By typing a 9 at several places you will be taken back to the beginning where it asks you to 'enter line number' nversation on line-short on line-please hang up-waiting for idle' Now you can just type * to go back to the main list of commands. IfQRϗTSR2T 019rQSBT Payphone Charges ---======================[ BT Payphone Charges ]======================--- Call charges from BT payphones and cardphones on modern exchanges Weekend Economy Daytime Mon-Fri, 6pm-8am Mon-Fri, 8am-6pm min pence min pence min seconds per seconds per seconds pence per per 10p minute peQTr 10p minute per 10p minute Local calls 105.0 5.71 105.0 5.71 75.0 8.00 Non-local calls under 76.0 7.89 75.0 8.00 32.5 18.46 35 miles National long distance 76.0 7.89 50.1 11.98 28.5 21.05 calls Calls to PCN mobiles 33.0 18.18 33.0 18.18 17.5 34.29 Calls to other 12.0 50.00 12.0 50.00 8.0 75.00 mobiles Notes * AQ_esed their relationship with their customers. Right? WC1: Yeah. GA: And Billy Idol's pretty famous. WC1: So, would that be like fraud though? I mean, connecting to the system without paying could be fraud, I could see that. GA: I would imagine there's numerous crimes. I would imagine there's fraud, trespassing, tampering 'cause you went into someone's account and did something, right? WC1: Yeah. GA: Isn't there also interstate telephone stuff? WC1: Oh, well. Alright. Do you knoU0Tw how long this is gonna be, because I'm kind of paying for the call. And I'm kind of right now wanting to go format my hard drive, so... GA: I don't think this ten or fifteen minutes will make a huge difference in your life. WC1: Do you think I should totally format my hard drive right now? GA: You want to know what I think? WC1: What? GA: I think your friends are your biggest leak. I think everybody you told anything to is who's going to do you in. WC1: They're actually the lU1]ast people I'm worrying about, my friends. GA: Well then you're probably okay. WC1: Do you have any intention on trying to get more information to help me or are you only interested in collecting the information further? I guess I'm just wondering. GA: My primary interest is in not compromising my readers and subscribers and interviewees and staff which is whose mail was compromised, and making sure that their real names and their real activities don't get all over the world. My sU2,Becondary interest is in getting a good story out of this. Because I don't really feel very good about the fact that the WELL called the FBI in on this magazine. I mean, if you think about that, that has political ramifications. And I think they should have talked to me first and I think they should have let me handle it myself. It was my account. And they took all that power away from me, and I'm much more angry at them than I am at you. I think there's a huge difference between looU3Spking and spreading, and I think that if you came in and you looked at my mail and you took Billy Idol's mail and blah, blah, blah, and it ends there, it's one thing. I think if it starts showing up on Usenet groups and all the different places where things can get posted, and gets posted on BBSs, I can see where I and they'd be a whole lot madder. WC1: I have a whole lot more valuable stuff that I'd put on news groups if I was going to post, but I don't really post that much. GA: TU4>he lesson from this should be that if you are going to proceed with a life where you go in and you look, and you take, that you should learn to keep the spoils to yourself or, at most, to your one associate. WC1: Most of my friends keep the stuff to themselves anyway. GA: What do you think about a system that was compromised and that they have proof was compromised, that doesn't tell the users to change their passwords? What do you think about a system who calls the FBI in and tellU5.Hs the FBI about my mail five days before they tell me it was taken? WC1: They told them what was in the mail? GA: They didn't tell me they didn't. WC1: Now, I'm totally being honest here. Now, you have me kind of curious what's in your mail. I mean, not like I want to know now, but you're kind of making me feel like there must have been something really important in your mail that you're so concerned. GA: No, not at all. It's just that I protect people's privacy and I guarantee tU6hat in print. WC1: Oh. GA: And so I wonder if I can be sued by every single one of my staff members whose names you got? WC1: Just totally 100% be assured that I definitely was never interested in you enough to want even to know who you were or even read your mail. I really don't remember anything from your mail and I never took your mail and I never gave it to anybody. So that's all you really have to know about that. GA: Okay. WC1: That's the truth. (heavy sigh) Damn, I'm gonnU79a get raided, aren't I? GA: I mean, where does this system that's just been compromised send the system manager off to Paris on vacation? WC1: I know I'm gonna get raided now. I know it's gonna happen. I know it. God, Do you think that's a good possibility? GA: I don't know enough about this sort of thing. I didn't even know people go in and read other people's mail until you told me. WC1: Did you have any more questions or anything? GA: How hard is the WELL to break into compaU8`red to all the other places you've been? WC1: No system is hard to break into. When you say break into, do you just mean to get on there? GA: To get root. They said you're the first person who ever got root. (ed. note: root access means you own the machine and can do anything to it) That's what they were so pissed at. WC1: I'll say it isn't hard to get on but it's hard to get root. From a standpoint of getting on a system, I can get into any system. To get root is totally a differU9\ nent matter but, in this case, it wasn't hard to get root. GA: Okay. WC1: Normally, on the WELL I think it would be hard, but I think that they just got careless with certain things. GA: Do you really believe they fixed them? WC1: Really, I have a feeling if I logged in right now, and looked at a specific thing that I got root with, that it would probably still be there. Yeah, it's possible unless they, like you said, they were totally monitoring me, though, so who knows? Maybe thU:l ey know about it. GA: Maybe, but even so, if you're saying nothing's secure, then there must be other ways to see it. WC1: But, really no type of approach in the way I took it. It was more or less kind of a common sense kind of thing. That you know enough about how the shell works... GA: I don't. What systems have you tried to get into that you can't? Anything? WC1: There hasn't been a system that I couldn't get into, but there are some systems that I couldn't get root on. And thU;p.6ere are systems I wouldn't even try because one, the people on there, the security is so good that I just know from reputation that I couldn't. And I have friends who have tried and weren't able to. GA: Do you want to name them? Or would that be dangerous? WC1: I'll name one site that I wasn't able to get root on. The EFF network. I wasn't able to get root on there, but, to be fair to me I didn't try that long, too. GA: Someone trojaned them, right? WC1: That wasn't me. I did reaU<١;d that. That wasn't me. GA: Okay. WC1: Trojans aren't my style, Ethernet sniffing is. To sniff the Ethernet device means to log activities that go through the Ethernet device. GA: I learn something new every day! WC1: I used to patch to a net but I don't do that very much anymore. It's much more work to go to patch everything than it is to just sniff what's going through the system. GA: Now that you know that in this case the WELL called in the FBI, do you think the stakes have U=3increased where it's not worth cracking systems in the future? WC1: In order to answer the question, I'd have to say why I felt safe hacking the WELL. GA: Please do. WC1: I guess because of all the security people that were on there, and the number of hackers that were on there, I must have felt that since all these other hackers were on there, that the WELL was a place that welcomed them. That's one half of it and then there's another half. I'm not sure if you know this, but therU>,T}e was, in the past, something that the WELL put out challenging hackers to try to compromise the security of their system. GA: Do you think you could get a copy of that? WC1: It's in CuD from what someone told me. And I have a friend right now looking trying to find which one it is. (ed. note: we checked with both the WELL and CuD and both denied any such challenge to hackers) GA: Okay, so the WELL put out a challenge and the WELL welcomed hackers so that made them a better choiceU?޽? WC1: I guess that made it a better choice, what I felt was a more safe choice. It was also a challenge and there were a lot of interesting people there. GA: I would think MindVOX has interesting people, too. WC1: Except the people that I named before have secured that site and MindVOX is kind of in heavy shell accounts to begin with. And, even if I did get a shell account there, I've had friends that I know that I could safely say know everything I know, and a lot more, that havU@e$#e secured the site and I wouldn't want to go and undo the work that they've done. GA: Do you use your home phone or your work phone when you do this stuff? WC1: I never, ever use my work phone. I have always kept my work out of this. GA: Good for you, because that only complicates the problem. WC1: I like my boss and I like my work. And because if my life gets screwed up, that's my life but if I screw up my work, then I've screwed up other people's lives and I've lost my job and UAdYthen my life is still screwed up at the same time. So I have always stayed away from hacking at work. Does that matter when they decide to close in on me? GA: Sure. WC1: They can still go after my work? Even though I've been doing it only at home? GA: Well, with drug dealers, they certainly do that. They try very hard to tell the boss what the employee was doing. But it would make a big difference that you didn't do it from work. WC1: Why, do you think they could still get it, orUB:ders to go to my work anyway? GA: Oh, I was thinking more in terms of the fact that your employers would feel much more comfortable if it hit the newspaper or something. Generally when people get busted, it hits the newspaper, especially if you live in a small town. WC1: But I'm saying all my boss cares about is if they show up there. And then my boss would fire me. GA: If you didn't hack from there, they wouldn't know about there. Until they found you. WC1: I've had law enforcemUC,8ent show up at my work before, not for hacking from there but from my house. GA: Well then you know the answer better than me. WC1: But they didn't raid the place in a raid when they take stuff, because my work is computers. It's not likely that they'd take my work computers if nothing was ever on them I think that there's a possibility that they only know my handle and they don't know my real info. They would know it came from (names state), not because they did a trace, but I thiUDnk that CompuServe could probably just have records of where the connection came from because CompuServe has different ports in every city in the world. The connection would have shown up in their audit logs as just going to the WELL. The WELL, from the very beginning, would have known it came from CompuServe just by what TTY it came in on. That's my guess. And even if they didn't, they have to know that it came from the WELL anyway because they have to put that in their billing. GAUE?X: Right. WC1: And that the billing's going directly to you, then they have you. 'Cause they know exactly what days and times you were there. Right, they have to bill for the time, I guess the WELL, that goes through CompuServe, so they have to know when people come from the WELL so they have to log that anyway. That's a normal thing for them to log. And then, I guess, CompuServe could keep logs and say where that, where that connection came from, what city. So they might know the cUFpity and state or general area and so that's how they could know that. Then they could know my handle from monitoring my IRC activity. GA: Or from other people who they talked to. Who are probably the same exact people that you're referring to who were interested in security and hacking. WC1: If they raided me and they found absolutely nothing here at my house that was even interesting for them, would that be bad for them? GA: From what you've told me, your CompuServe record might UGbe a problem. WC1: My CompuServe record? I don't have a CompuServe account. GA: Okay, so wherever you went into CompuServe from, it can't be traced back to you? WC1: I didn't say that. I called from home to CompuServe but I don't have a CompuServe account to give to you. What I'm saying, in other words... GA: You hacked CompuServe? WC1: No. You can just dial CompuServe and from the host prompt type WELL. You don't even have to log into CompuServe! I don't know, a lot of people mUH= ight not know that. A lot of people do. GA: Sounds like a security leak of CompuServe's. WC1: I would think it's the opposite. If I'd have known what I know right now from you, I would have used a very multi-layered approach from the Internet. Maybe exchanging my connections from all over the world. I would have gone through Australia and Germany. The other ones maybe. But wouldn't that have been horrible, but maybe it would have been worth it. Now I wish I didn't call from (names H1UUIu-state), because now they know what area I'm from. GA: I was curious as to what magazines you read. WC1: PC Computing, also electronic magazines like FBI magazine, Phrack, of course, CuD. GA: And people are curious as to what type of computer you use. WC1: It's just a 286 machine, I've never really seen where it mattered, but, out of curiosity, if they want to know, that's what it was. It wasn't even a very good machine. GA: No, slow. But, I guess it's all text, so... WC1: Yeah.UJfyښ GA: How many other people besides yourself do you think are out there cracking systems just to read mail? WC1: Like a count of how many people? GA: Yeah, a rough guess. WC1: Do you mean people like me who are into it really heavily that just do that or do you include people at the universities who get curious and that just try to break security? I think hundreds and hundreds as far as students at universities around the world, that just like to play with security and see what thUKey can do. Maybe even thousands. But, I'd say there are under a hundred serious crackers. GA: Do people who do what you do, let's say there are under a hundred, do they trade the mail kind of like people who trade Grateful Dead tapes and people who trade prank phone calls? WC1: Like would we trade our treasures that we find? Yeah, sure. Most of the time, not even trade. If we know each other closely, if we find something good, we give it to each other. We don't insist on a trade. IULJE'm just saying it's not on a trade-by-trade basis. We help each other out. But that's not always true. There are a lot of hackers that just don't get along with anyone, that just like to work alone. GA: Now you can see why. WC1: I have enemies and I have people that I like and work closely with. But the group I work with is anywhere maybe within a range of two to four people, but nothing larger than that. Not large groups when I say groups. Do you think that me doing this interviewUMqa with you has helped my situation at all? GA: If I'm subpoenaed into a courtroom and I'm asked to testify against you, provided that as of today my mail goes no further, I would testify in your behalf that I don't think you did anything serious enough to warrant jail time. WC1: Oh. You can be connected to a computer, you're not really thinking about other people's feelings. You're just on a system, it's boring. GA: And I can understand where you think a celebrity like Billy Idol hUN6as less feelings than an individual. Public figures do have feelings though. WC1: Do you think he's probably pissed off about it? Or do you think he probably thinks it's cute? (ed. note: we invited Mr. Idol to comment but received no reply) GA: I think that you should realize, I'm not sure they told him. I just don't know how honest they're being with everybody. But I think that you should realize in the future that the more power and clout somebody has, the more money and time theUO92y have to fight it, the more likely that they're going to. WC1: I'm going to go right now, but anyway, I guess I should just say that there was never any personal hacking against you and there was nothing, I guess, for you to worry about. I guess all the worry is on me. My friends don't have anything to worry about. Because of you they only know about me. I'll never say anything about my other friend. I don't care if it means I'll go to jail. There isn't a chance in Hell that they'lUP9Hl ever get any info out of me about my friend. GA: Well, I do thank you for calling. WC1: Oh, okay, well, thanks for, I guess, all the, I don't know, it's weird thanking for information. GA: Why? WC1: I don't know. GA: Because you usually steal it? WC1: Funny how you first put it in your statement of purpose when you first connected to me and I never really thought of myself as a deviant, but... GA: We're all deviants. Society defines somebody who picks their nose in public isUQA- deviant, somebody who masturbates is deviant, if you think about it, everybody is deviant in one way or another. Let's hope so, 'cause I'm trying to build a magazine catering to them. WC1: I guess I've always thought there are two factors that should be really important when you hack. One is total lack of any malicious intent, and two is to hack from a stealth approach, like more defensively than offensively. But, that's, I guess, the approach that really hasn't worked for me, sincURe apparently, it looks like I'm about to get popped really hard. Okay. I guess I'll let you go just in the interest of keeping my phone bill down. GA: Thanks, bye. WC1: Bye. You can imagine all the thoughts that went through my mind as I hung up the phone. I confess the overwhelming one was that I wanted this guy to call me back. I was sure he knew all sorts of things about computers that I didn't, and I surely knew more about deviance. I found him intriguing as hell and I forgavUS͢e him. I was also intrigued by the idea that there had been two WELL crackers. I posted this on the WELL and was promptly ignored. Later I learned there were at least eight people who explored the WELL and its mail. I personally believe the number is higher but was unable to confirm this before we went to press. A back door was activated and the password disclosed to friends who flocked to the WELL for weeks before the WELL got wise. One of these crackers used fakemail to send me mUTu ~]ail which I was led to believe came from somebody else. (ed. note: for those unfamiliar with the concept of fakemail, it is possible to send electronic mail to someone which has the return address of anyone you choose. Mail can be sent, for example, as Bill Clinton from the White House. When the person answers "Bill," the mail gets routed to the impersonator instead.) Another WELL cracker helped hinm out and got so interested in me that he also accessed my account at Netaxs.Com and UUused it to enter IRC as me. In addition, he created two other accounts there using my real data! I can only hope he didn't hack from them. He is still bothering me on IRC as we go to press. Someone thought the problem serious enough to give me his data including his social security number. I hope he will get the message when he reads this to finally leave me alone. I tried to befriend him, even gave him a copy of Gray Areas. No luck. I admire his skills even though I find him to be mUV#khalicious and destructive in his dealings with both people and systems. A third WELL cracker has been rude to me on IRC from day one. It was months before I realized why my presence there threatened him so. I don't know a few of the other WELL crackers (no contact of any kind) and there are two others who have been very decent to me. One of these turned up as a sort of "Christmas present." I had mentioned in my speech at HoHoCon (see review elsewhere this issue) that I was working UW on a piece on the WELL break-in. Several days after I got home my phone rang and the caller asked if I was interested in a second exclusive interview! I am grateful to him for coming forward and for whoever at HoHoCon decided to send him our way. The trust in us (and in me) was the best holiday present I received this year. We offered this cracker anonymity for speaking with us, and immunity if we are ever questioned or asked to testify against him. I am also declining to reveal how UXWI am sure this person told me the truth. It's quite clear he called ready to talk and there was no hesitation in his answers to my questions. This guy is sharp. I found him to be one of the most articulate and intelligent people I have ever interviewed. Netta Gilboa: I guess we should start by asking, what do you most want people to know about the WELL break-in, that you think might not be covered already? Well Cracker 2: I'd say that a lot of people acted like it was a great big UY6zfdeal, but it really wasn't anything spectacular, except the fact that it happened to be the WELL. GA: Um hm. WC2: I just think that people really over-reacted and thought, "Wow," but the WELL's really nothing that hasn't probably been penetrated before, but this time it was exploited because there were mistakes made. That's what I would say. GA: And how many people went into the WELL? WC2: Um, as far as I know, only like four or five. GA: And how come at least seven or nine are UZH|~claiming that they did? WC2: I don't know, I really don't. That's as far as I know. GA: Okay. Is it possible though that other groups or individuals were there that you don't even know about? WC2: Oh, completely possible. Just as it's possible to be in one machine and have it patched and do this and that, and, you know, it's just one machine that's been repatched and patched and patched over again and different people get root different ways and different people do things differenU[e%tly. It's completely possible, but I'd take it for face value. What I would do is consider the source, you know, and I'm sure that you do. Someone was telling me about a story he had heard third hand about it, and it was up to, like, twenty hackers,so there was twenty hackers in the WELL, and it was patched and blah, blah, blah. And then the story just got all screwed up and... GA: I did hear there was a back door put in and a password given out. WC2: Yeah, well, a password given oU\hjsut? GA: Um hm. WC2: Not distributed widely. I'm sure that there could have been a few more people that got in than I knew about. But at the time we started talking about it, there was only four or five, max. GA: And how many weeks did this go on for? WC2: A long time. GA: Months? WC2: Um, I would say possibly two months, but that was a while ago, I don't really recall. You know, when you target a site, it's kind of hard to keep up with everything. GA: And the four or five, or U]?however many there were, were they all going into other sites at the same time, too? WC2: Oh, yeah. And still are. GA: Okay. Is there any relationship between the WELL incident and the Panix incident? (ed. note: described later in this article) WC2: Huh? Yes. GA: Okay. Ay other comments you want to make on that? WC2: It's not part of some big master plan, but I'd say there is a connection. GA: Okay. WC2: I don't want you to think it's a big conspiracy, but, yes. (ed. note: I pU^mourposely did not press this issue further due to the hundreds of sites involved in the Panix break-in. I almost don't want to know. Proving that there was a connection between the two was enough for me) GA: Okay. Do you think people, not necessarily anyone you know, are still in the WELL and still have root there now? WC2: Yes. GA: And do you think that the fact that they changed to Solaris instead of the Sun operating system makes any difference in terms of people trying to penetU_.rate it now or in the future? WC2: I think they're total idiots for doing that. GA: And why is that? WC2: Because they're just starting over with their problems before, and my guess, the reason they are doing that is because they wanted to start over, from a new fresh source that wasn't patched and patched and patched or whatever. GA: They claim that the decision to convert was planned before they knew that they were pentrated. WC2: Well, that's what they claim. People claim a lU`dot of things. GA: Okay. WC2: That's just how I feel about it. (ed. note: Peter M. Shipley, UNIX System Administrator for TRW Financial Systems, Inc., who had nothing to do with the WELL incident, confirmed for us that there are many known security holes in Solaris and that he considers it far more unsecure that the Sun operating system) GA: Uh huh. What did you guys do when you were in the WELL? WC2: Well, personally? Or as a group? I can't speak for everyone else. I would say thUatat a lot of mail, um, there was someone involved that was trying to do something that involved getting into other networks from the WELL since it is connected to other machines overseas and progress was being made to use the WELL as a jumping point to other places. GA: What did you guys play around with when you were in there? Anybody read conferences? WC2: I didn't. I just looked through the mail and saw what was on there and looked for famous people, and just laughed a lot. GA: Ub.What was the best thing you saw? WC2: Your mail stuck out! GA: Heh, heh. (ed. note: by now, months after the fact, I am able to crack up laughing at the thought) WC2: How about credit cards? There was a credit card in somebody's mail from one person to another and it just said, "Hey, you know, this is my credit card, my expiration date, and here's my information, blah, blah, blah, blah, blah." I suppose, they just are stupid. GA: Interesting. WC2: That's not the best. The best tUcvhing was actually being in it and looking around, I guess, I don't know, a lot of people maybe don't feel the same way as I do, but, when you're in a system and you're taking it over, and you know the people on it really have no idea that you're there, in a way you feel cool. But in another way, when you go on reading someone's mail and after you grab like 300K of somebody's mail, you know something about this person that this person will never know about you. You feel like maybe youUde,'re a voyeur that shouldn't be there. Kind of like the conquest was over. GA: Ever have an interest in meeting anyone after you've read their mail? Like to get to know them in real life, without them knowing why you want to get to know them? WC2: As a matter of fact, yes, but not on that system. GA: Okay. Did it work out? WC2: I called that person. Talked to him for a while, and it was a site that I was on for a while. GA: Back to the WELL. Was their credit card data taken that Uetyou know of? WC2: Um, yeah, but that wasn't, like, motivation. I could say, "Yes, and No." I can't speak for other people. GA: Okay. WC2: Yeah, I saw information and I took it. GA: Okay, but, no one that you know has used it, right? WC2: No, as far as I know, no. GA: Okay, how about their password file? WC2: What about it? GA: Um, they claim no one could use it easily because it was encrypted somehow, shadowed, whatever that means. WC2: The shadowed password file? That doesnUfm't mean anything. Not really. Yeah, it means something, but, if you already have root on the system, what do you need a password file for, except to find out who the users are? Just because you know the password file doesn't mean anything. I personally don't even use the password file because you don't even need it. There's newer ways to hack than getting into a password file and crack it. I mean with a sniffer... GA: Nobody's mail is safe because there can be sniffers anywhere and UgHHeverywhere at any given time, right? WC2: Well, there are new things coming out that can protect against it. That's not new technology, it's just becoming public right now. But the sniffer's pretty powerful, back to your question. Actually, there's just newer ways to hack then getting in and getting a password file, just because it has a shadow password file, like Linux has a shadow password file, okay? That's a bigger hole than it is a help. You can get a remote shell on a Linux boUh7lx running shadow passwords super easy, and then you don't even have to see the password file. What I'm saying is the password file is pretty much a moot point. GA: What advice would you give to the WELL about an operating system to use and how to secure their system? If any. WC2: How to secure their system? I'd just say, watch their links of who they go through. I don't know, they're a target sort of, you know, because of the people that are on it. GA: Okay. WC2: Because there arUigRe gonna be people out there that say, "Hey, wow, Billy Idol." The advice that I would give about an operating system? Their administrator is a fairly knowledgeable guy and he's fairly skilled. I don't care how good of a hacker you are, if somebody's sniffing your account and you're not protected against it, I don't care how big your password is. GA: Um hm. WC2: You know, there's passwords, they could be a string of 17, 20 numbers, you know, we're gonna see it going in and it's gonnUj7ua come out, and it doesn't matter if you change your password every day GA: Um hm. WC2: If you're coming in to a site, you know, you have to watch. My advice would actually be to the users not the administrator. My advice would be to the users to change your passwords frequently. If you have anything sensitive on line, I mean, PGP is public, if you have something sensitive. As far as an operating system, to answer your question, System V, maybe, something with a little less bugs. Uk¾u`Or SEO, but see, SEO's system it's secure but it doesn't have all that many features. GA: Okay. WC2: You know? The admin really can do nothing about this except using a utility like S/key. It utilizes a one-time password format where everytime you log in, you use a different password and it keeps track of it and it's all automated, it's really nice. There are other ways, too, that use one-time passwords. I would just say you can't really protect against something that you're not reUlz3ǖally looking for, you know? You have to keep track of all your system files and there's a pretty easy way to check to see what files change daily. It goes by the date. Wisner was a hacker himself and this isn't new technology. GA: Were there really 40 megs of mail taken from the WELL or how much? WC2: I'd say more. GA: More? WC2: Maybe, maybe more. GA: But at least 40 megs. WC2: Really, Idol's mail alone was like 600K, I think. GA: And mine must have been 200-300K easy. So theUmĔcre's mail on hundreds of users. Right? WC2: There could be. You don't just go in and penetrate everybody's mail. You just go around and see if anybody's was interesting. You know? I personally didn't download any; that's too big. What are you going to do with it? There's not really a file going around with everybody's mail in it. It's more like extracts of the stuff that was on-line. GA: Okay. WC2: Because it's not easy to download, especially if you're telneting through 16 differUn(ent sites or something to get to the site. GA: Okay. Was there any altered mail or any fake mail sent or received? WC2: To my knowledge? GA: Yeah. WC2: Before, after or during? GA: Yeah. WC2: Um, uh, I don't know; I heard rumors, but they're just rumors. To my knowledge, I have no idea of any of that going on. I heard a rumor but I can't verify it so I don't want to say. You tell me. You tell me. Was there any? GA: I think so, yeah. WC2: Oh yeah? GA: Yeah. WC2: Oh, okay, weUoƟgkll maybe it was private. GA: You know, involving mine, I think so. WC2: As far as I know, no, but... GA: How long have you been entering systems? Just in general. WC2: Over a dozen years. GA: Okay. And you're in your twenties now or thirties? WC2: Yeah, twenties. GA: What's the attraction to people's mail? WC2: I guess it's kind of like that voyeur in everyone that wants to find out what's going on and being into something that they're not supposed to. That's just the allure Upof something, there's tons of mail and there's tons of systems I've been on where I haven't even looked at people's mailboxes. What I'll do is look at all the names that are on there and if I see a name of a girl maybe that I knew or the name of an old girlfriend, I'll just go in and look at their mail. GA: Um hm. WC2: And usually, guys' mail and girls' mail is different. Girls will talk about just bulls--- and guys usually talk business unless you're talking to their wife or sometUq֊hing. I read people's mail, this one guy, I mean they went through an entire divorce over a period of like a year and a half. And once I started reading it, I just couldn't stop, it was like a soap opera. But generally I don't prey on people's mail. I do check the admin's mail all the time, so administrators should know their mail gets read all the time. GA: Do you feel bad for the people whose mail you do see? WC2: No. Very rarely. I told you before that I don't like to read mail UrTi^if I really feel like I'm a voyeur, but something interesting like that divorce, that doesn't happen all the time, but that particular case, I happened to be on that system that long and I just kept looking at those people's mail. GA: Do you share the treasures that you get off of different systems with your friends? WC2: Oh, sure. With my friends. Underlined. GA: Okay. And what are some of the best things that have come across the screens over the years? WC2: Satellites, at leasUsa}Yt two. GA: What does that mean? WC2: Satellites, you know, like in space? Like, um, this one satellite for the Department of Energy or something like that, or maybe it was Environmental Resources or something like that. GA: Uh huh. WC2: It had 35 millimeter cameras. It would come on and tell me there's a 35mm camera up and everything was working okay and stuff like that. And then another satellite I was in was a communication satellite, that's pretty rad. And, major magazines. MaUtShjor newspapers. GA: Like their BBSs for their employees or what? WC2: No, their mail system. Uh, the most fascinating? I don't know, cellular computers, government computers. The most fascinating thing that I have ever seen, I really liked that satellite, because just the idea of being able to control it! Oh, I know one. There used to be this chat system called QSD. Have you heard of that? GA: Yeah, it's mentioned throughout this issue. I've never seen it personally. WC2: Well, IUuU was on QSD one time, and I had this Prime computer up in Canada and it had PrimeNet on it and it had like twelve outgoing pads on it, so I logged into QSD like 12-15 times, filled it up with all of me. GA: Um hm. WC2: It was just powerful because it was in a different country, I had complete control over this computer and I think that's the fascination. Complete control. I had complete control of that computer for a period of maybe six months. GA: Any other neat things you've seeUvM_n over the years? WC2: Yeah. Interpol. GA: Which is the British police system, right? WC2: Yeah. International police. That's probably the biggest. The raddest. Pull people's criminal records and stuff. See if there's, you know... GA: Anyone you knew? WC2: Yeah. GA: Was there? WC2: No. I pulled a couple of people, you can pull them by just about anything. There's just tons of stuff. GA: More people getting computerized every day! WC2: Well, let's see, climate control systemUwݒs, Interpol, Satellites, grocery stores, phone companies, computers over in Japan, bank computers, funds transfer, stuff like that. GA: Have you changed or altered anything anywhere you've been? WC2: Mmm, I've altered stuff everywhere I go. Be more specific. GA: Well, for example, you mentioned bank transfers. You've the knowledge to get in there, it must be awfully tempting to transfer funds. WC2: Uh, yeah, but it's kind of tough, because there's all these paper records. You havUx*ye to, if you were going to pull it off, you'd have to really do it quick. GA: So, most of what you've altered is just to cover up the fact that you've been there. WC2: Yes, I checked it out and I saw that it worked, and yes, I could have at one time physically gone in and transferred X amount of money into account blah, blah blah, you know? GA: Um hm. WC2: Yeah, and all the stuff for fun? GA: Um hm. WC2: Sure. Sure. Let me think. I don't know, it could be as simple as fakemail Uy!kor no wipe on the time for a computer. And both take about the same amount of time. You can wipe out somebody's entire system in one command once you're in. Of course, they can back it up. GA: Not everyone does. Heh heh. WC2: No, hardly anyone does. Or if they do, they're old tapes, you know? GA: Um hm. WC2: One of the oldest laws is, "Thou shalt back up," and hardly anybody does, you know, maybe occasionally, but everybody's always busy and has something else to do. I back up reUzM5^ligiously. GA: And change your password frequently? WC2: And change my password frequently and PGP everything and keep my computer completely locked out, but maybe I'm paranoid. GA: Well, we're going to get to that in a second. I was just going to ask you, is there any place you can't get into or any place you couldn't get root on over the years? WC2: There was one place that I couldn't get into that I really wanted to and it was like this germ warfare kind of deal. I had an accoU{unt that I had picked up somewhere and it had been on the computer, but I couldn't get root. There was nothing I could do, it was a military site. That was me personally, but there's lots of other places that I didn't and now I may be able to. As you grow older, your skills get better and more diverse. GA: Do you or would you hack for money? WC2: Do I? No. Would I? It depends. Like, you can't just generally say yes or no. Have I ever in the past? I profited somewhat in a minor way.U|ӁT The opportunities are there. Like anybody will tell you, the opportunities are there, but, it depends if it was for the government or if was for another government, GA: Or for a kid wanting to change his grades? WC2: Stupid stuff like that, no, I would never do anything as childish as that. Corporate takeovers are possible, put companies out of business if you really wanted to. And like I said, it can all be proven. Evidence is there. One of the worst things you can do in this kinU} h3d of an environment is lie. If you lie, it's gonna come back to you and if you lose your respectability among your peers, you have nothing. GA: Hackers tend to be paranoid with good reason. Does it ever get to you? Either when you're on a system or after you've been there? WC2: Oh, hell yeah, I've been on a system when something weird has happened because it just wasn't supposed to happen, you know, something out of the ordinary would happen. I've been on a system, a really big sysU~}tem, went to patch something, and as soon as I patched it, the computer locked up and I didn't have time to cover my trail because I had been in the heat of things. And I'd been through a bunch of different links and the response time was slow from the remote machine. Because if you are trying to hide yourself, you go through a bunch of different machines, and somewhere in there you hope to lose your trail. So I was on this machine and I was patching it so I could get back in, and I U\Ccopied the file and I went to adjust it to make it look like it hadn't been tampered with, and the machine hung up. Click. So I called it back and it was off the Net. I called it back, called it back and called it back and called it back and continued to call back, and no response. So, it was dead, and the originating address that I started on was a legitimate account, which is generally a bad idea, so I was kind of paranoid, but sure, paranoia strikes all the time. But, generally, U:I mean, if you're in a machine and you're doing something you're not supposed to be doing, if you can't handle the stress, then you shouldn't be there in the first place. You know? GA: Heh, heh. Is there anything else that you want to add? Or anything else you want to bring up? WC2: As far as the WELL, people should just really realize that this wasn't like something personal, you know, like this wasn't personal against anyone that was hurt, it's just something that happens every dUظuay and people don't hear about it. I'd say, maybe 50 to a 100 sites just in a day get compromised. That's just a guess. And the WELL just happened to be one of them and the only reason it was popularized was that there were people on there that have accounts and are famous people that really are no one in the cyber community at all. Like Billy Idol, he's just riding that wave that everybody's talking about and I truly believe that. Maybe he's interested in it, and he's capitalizing oUn it and that's his right. GA: Right. David Crosby's music has nothing really to do with computers. WC2: No, not at all. People just want access to the Net, you know, and, people just totally over-reacted to that. And personally, as far as Hacker #1 goes, I think what he did was stupid. GA: In terms of what? WC2: In terms of speaking up. Calling the system administrator of the WELL. GA: Ah, yes. WC2: Dumb, dumb. Whose side is he on? And what made him do that? Guilt? I highly doUHubt it. If he were guilty, he wouldn't have done it in the first place. You know? GA: Paranoia? WC2: Paranoia, very possibly, that's a very good trait of his. You know? GA: Um hm. Comes through loud and clear in his interview. Heh heh, heh. Thank you! WC2: Happy holidays. The conversations with the crackers I interviewed, and my growing awareness of how big a story the WELL break-in really was, led to my spending hundreds of hours talking to hackers. I learned much fromUy this and have literally thousands of dollars of phone and legal bills to prove it. The biggest surprise was that some of the WELL's stored mail was copied. This means that any of the 7000+ WELL users who saved their E-mail during this time period might now have that mail in the posession of dozens of hackers. Few of these WELL users know this, of course. Some will read it for the first time here. We were unable to convince any of the hackers to give us the mail. I made it clear I wU#{xas interested in printing portions of the password file and the hackers were no doubt too scared to cooperate. Enough of them told me they had seen my mail and what was in it, though, that I have no doubt it is out there. The next surprise was that there was nothing unusual about the WELL break-in. The WELL is not that much more vulnerable than any other site. They are just despised by some members of the hacking community. During the time I researched this article over 250 other siU^\?tes were broken into. Of particular note is the sniffer installed at Panix.Com. By the time they noticed it (up to a month after the fact), over 200 sites had to be notified that their passwords were insecure. These included: MindVOX, Yale Univ., MIT, Stanford Univ., Cyberspace.com, Delphi, Harvard Univ., Netcom.Com, World, Columbia Univ., etc. And, of course, the WELL was on the list. To their credit, unlike the WELL, Panix went public. Kudos to them for not hiding it as other sitesUE do. CERT (Computer Emergency Response Team) announced this on October 19, 1993, only 34 days after the WELL called me. Guess who did it? Cracker #2 confirms my suspicions that it was some of the same people who cracked the WELL. If hacking is a mindset, cracking is a seven day a week pastime that usually ends only when the cracker is caught, or his computer breaks, or he quits cold turkey. Someone had been very busy during these 34 days. A clear lesson here is that these sniffers U4fdo get used. All electronic mail is therefore vulnerable. Even if the mail at your site is safe on any given day, the mail at the sites it is being sent to may not be. I no longer trust electronic mail. I no longer can believe it is from the person it says it is, and I wonder who else will see our reply. Cyberspace can become a very unfriendly place as your consciousness of its dark side grows. But what of the WELL? Are they blameless since they were invaded too? Hardly. First of aUt3ll, it burns me to no end that we were charged full price for on-line services during the months this happened. Since the WELL has only a truncated log, they have no idea if we were charged for time used by others. Considering the thousands of dollars this experience cost us (just so far!), I'd say the WELL is negligent in not offering us a credit of some kind. Secondly, the first cracker interviewed above ended up calling the WELL to come clean. Their system administrator, Bill WisUner, came to me for confirmation that we'd spoken to the same guy. I could not confirm or deny anything until that cracker got word to me many days later that I had his permission to do so. Yet, I called the WELL in October and again in November to discuss my investigation and, on both occasions, they didn't return the call. This shows a thorough lack of concern for their customers and a desire to sweep things under the rug. I called to tell them that on over a dozen occasions after U⻣T7they considered the problem "solved," upon logging in I was not told there was new mail waiting when in fact there was. This was a possible signal that someone had been in my account. One of the many WELL crackers bragged to me that he had been in the WELL in mid-October. I believe him. Guess what? The WELL is going to read it here first. Then there's the matter of the FBI being called in. There are moments when I believe Gray Areas, Inc. has more to fear from elements of the hackinU pg community than it ever could from any government investigators. But, the WELL put us at risk to have the FBI visit us with no warning. They also discussed us to some unknown degree with the FBI and charged us the monthly fees as if it were business as usual. Further, they determined with the FBI that we would not incur over $10,000 damage from this (ed. note: this is the minimum amount needed before the FBI will get involved in a case). It was not solely their decision to make. I fU]z+eel awful for their customers who don't have national magazines in which to get their sides across. To be fair, the WELL has stated that they will talk to customers first in the future if another break-in occurs. Let's hope so. Since I am still being harassed on IRC and see no end to the rumors and jerks, all of which originate from this break-in, this story is hardly over for me even now. We may still have over $10,000 worth of damage, especially after this article appears. In betweU޲en there have also been all sorts of unwanted voice calls, tampering with my PC Pursuit account, stolen trash, an attempt to take down out PBX (bahaha - we don't have one), etc. It's worth noting the WELL didn't ask customers to change their passwords for over three weeks after they contacted me. That seems like an ironic lack of interest in securing their system while just a few weeks before they were worried enough about it to have called in the FBI. The WELL originally found outU that they were being entered when one of their users (whom, of course, I exchanged E-mail with) came forward to tell them her boyfriend had heard details of her mail about him and their sex life. The crackers had been bragging. The WELL went "public" by opening a topic in the News conference section of their on-line conferences. It was called "System Security: Oxymoron Or What?" That title hardly tells users the WELL was penetrated! They posted nothing in the log-on screens so the aUVTaverage user never even saw it. At $2 an hour to be connected to the WELL (plus the cost of the long distance call), I surely never read the News conference. While they did issue a few pointers to it, they did not put any pointers in the Hack/Crack conference or in the Factsheet Five /Zines conference or in the Grateful Dead conferences. It's all too clear why the Hack/Crack conference should have been clued in. Considering how many other magazine's mail was involved (ed. note: here'˯UUMxs a very partial list of the other magazines we correspondedand with who were definitely affected: Computer underground Digest, 2600, Crypt Newsletter, Virus News Intl., Phrack. In addition, while not mentioned specidfically in the interviews here, it is likely other magazines with accounts on the WELL were tampered with also. and that many, if not most, WELL users are Deadheads and spend the bulk of their time only in those conferences, this seems to me to be a large oversight. OnlUy two short articles have appeared about the WELL break-in. One of these was in Crypt Newsletter (an electronic publication) and the other was in Dark Tangent's column in New Media. Both publications referred to there being only one cracker, and to the problem being resolved quickly by the WELL. Both are wrong. I spoke to Dark Tangent and he agreed more than one cracker was involved. Yet he said his editor gave him very little space to devote to it and felt the words of the WELL systUAem administrator would be perceived as more credible than those of a cracker. Gray Areas prints all points of view. We print the truth when we know it, not just what's politically correct or what we have room for. We paid to add 16 pages to this issue because the truth demanded that much space. We sent an advance copy of this article to the WELL and offered them the chance to comment. Below was their reply. For more information on the WELL, call (415)332-4335. Message 10: From gaiU}T?l Tue Jan 11 14:32:26 1994 From: Gail Ann Williams To: grayarea Subject: Comments On Article Hi, Netta, Thanks for sending us the proof copy of the article about the intrusion into your mailbox on the WELL. It's a powerful pair of interviews, and your accounts of having your privacy violated are strong stuff. We noticed a couple of points that are not accurate, or that don't match our knowledge of the events. Perhaps another perspective will shed some additional light. Matisse EnzeUT~r, the WELL staffer who called you originally, never meant to permanently swear you to secrecy. He asked you to keep it confidential while we tried to figure out who it was and how it was being done. Matisse is a relentless advocate of civil liberties and free speech, and if he left a different impression it was a misunderstanding. At the time, he reported back to his staffmates that you'd agreed to remain silent about it until we found the security holes, and that you initiated and UC~offered to show us the text before it was printed, for fact-checking. This left us no doubt you'd be writing your story. There was never an intention of getting your promise not to publish, and if that impression was created, we're sorry. As you pointed out in the article, we put it out in news, the most visited conference on the WELL, ourselves at the point that we stopped tracking the cracker's activities. So far as we know, the FBI did not investigate this incident. We did not giUE{ve them any information on what users files were involved, so you can relax about the possibility of the FBI having been pointed to your mail. Seems they require a high dollar amount of damage to get interested. The purchase of the new Sun required testing, budgeting, bids, and other interminable behind the scenes chores. It was in the works for months before this series of events, and the choice of the Solaris operating system was moot, since that's what the system runs. That failuU[re to show that new mail had arrived was a missing feature in Solaris and not evidence of mail tampering. There was a discussion of the unwanted change in the system status and upgrade topics. So many people missed seeing that message that Wisner hacked it to work the way it did on the old OS. We're sorry that change made you uneasy in the context of having been intruded upon. After he announded the crack in news, WELL general manager Maurice Weitman posted this to the discussion thUere: "In retrospect, we made a flub. We should have contacted those affected earlier, but we were too concerned that we'd blow the cover of the trap. We will not do that in the future. We will notify those affected immediately." It was just us staffers, not a lawyer, who debated what to do. Id you ask yourself what you'd do in a similar situation, you can see that you'd have many concerns on behalf of your users. We had an ongoing discussion of whether trying to identify the weakneUsses he'd exploited was in fact the right approach. The WELL staff is sensitive to many gray areas, and this situation touched upon several. As Maurice posted, we'd handle it differently next time and we're sorry it happened at all. Gail Williams for the WELL Staff We're keeping our WELL account. We don't store mail anymore and we try not to send much either. Electronic mail is no longer fun for me. I don't know if it ever will be again. It's not that I care if every hacker in the U>#world knows my secrets, it's just that I can't give them that information on other people. However, because this E-mail address is listed in our back issues it makes sense to keep the account open. We subscribe to a few electronic publications and it's as good a place as any to receive them. We also check the WELL for Grateful Dead ticket information and set lists. But I am not impressed that the WELL called the FBI and the Secret Service instead of an attorney or their users. I beliUaeve if the FBI or Secret Service had been interested that the WELL would have spoken to them about us without telling us. It amazes me that they continue even after seeing this piece to refer to a lone cracker! Their response indicates they believe my phone calls to them were unfounded. So I went back and checked. My phone bills shows calls to the WELL made on 9/23/93 and on 11/10/93. The first call was definitely before the switch to Solaris and the second call involved pre-Solaris UNdates as well. You decide if you think they do the maximum amount possible to protect their system and their users. They clearly do not believe the results of my research. Also, consider that I found these crackers, they could have too by going undercover. Their system administrator was once a major player in the hacking community. We wonder what they will do the next time they are entered. If you believe the crackers, it is, alas, most likely just a matter of time. "Be on my side,Ua4 I'll be on your side" -Neil Young The big change is that in the four months since I began working on this piece I've broken contact with several friends and colleagues. Some of the friendships I had were 100% electronic. I've lost some other friends who don't wish to use caution in what they say on the phone. I simply can't have them in my life anymore. Other friends put the whole thing in perspective by spending a few days repeatedly uttering the names and data of people they'd liU!ke to see hurt by any hackers who may be listening. That got old fast. I have chased this story long and hard. I have taken it personally, and even been harassed for it, and for caring about hackers as a whole. In the process I have lost the respect of two hackers I once considered friends and I have gained the respect of many others. Please bear in mind that how hackers treat me has great impact on how this publication will treat hackers. People who live in glass houses should not UMwPkeep throwing stones. I have made a very sincere attempt to change the media's treatment of hackers. I will continue to dop so if you let me. I will print all of your mail on this subject, friend or foe. If you've read through this whole piece, it must have made you think. Please send us a letter and share your thoughts. Thanks. ers. Please bear in mind that how hackers treat me has great impact on how this publication will treat hackers. People who live in glass houses should not ¡3PhreakingOnly.exe.infopb:k."sh"!<("n.?@?@;@p;@|@;@p@@ @?D`D37DD?D D3DD~?D*"/// --------v-l-6-&---,,,,]p_2;49H_2;31H_2;48H_2;32H_2;47H_2;33H_2;46H 2;34H_2;45H_2;35H_2;44H_2;36H_2;43H_2;37H 2;42H_2;38H_2;41H_2;39H_2;40H_2;40H_2;39H_2;41H_3;79H 3;1H|3;78H 3;2H 3;77H|3;3H 3;76H 3;4H 3;75H 3;5H 3;74H 3;6H 3;73H 3;7H 3;72H 3;8H 3;71H 3;9H 3;70H 3;10H|3;69H 3;11H 3;68H|3;12H 3;67H 3;13H 3;66H|3;14H|3;65H 3;15H 3;64H 3;16H 3;63H 3;17H 3;62H 3;18H 3;61H 3;19H|3;60H 3;20H 3;59H|3;21H 3;58H 3;22H 3;57H 3;23H 3;56H 3;24H 3;55H]$|3;25H 3;54H 3;26H 3;53H 3;27H 3;52H 3;28H|3;51H 3;29H 3;50H|3;30H 3;49H 3;31H 3;48H 3;32H_3;47H 3;33H_3;46H|3;34H_3;45H 3;35H_3;44H 3;36H_3;43H 3;37H|3;42H 3;38H 3;41H 3;39H 3;40H 3;40H 3;39H 3;41H 4;79H 4;1H|4;78H 4;2H 4;77H|4;3H 4;76H_4;4H 4;75H_4;5H 4;74H_4;6H 4;73H_4;7H 4;72H_4;8H 4;71H_4;9H 4;70H 4;10H|4;69H 4;11H 4;68H|4;12H 4;67H 4;13H 4;66H:4;14H:4;65H 4;15H 4;64H 4;16H 4;63H 4;17H 4;62H 4;18H 4;61H 4;19H]U:|4;60H 4;20H 4;59H:4;21H 4;58H=4;22H 4;57H=4;23H 4;56H=4;24H 4;55H|4;25H 4;54H 4;26HO4;53H 4;27H 4;52H 4;28H|4;51H 4;29H 4;50H:4;30H 4;49H 4;31H 4;48H 4;32H_4;47H 4;33H_4;46H|4;34H_4;45H 4;35H_4;44H 4;36H_4;43H 4;37H|4;42H 4;38H 4;41HO4;39H 4;40H 4;40H 4;39H 4;41HO5;79H 5;1H|5;78H 5;2H 5;77H|5;3H 5;76H 5;4H 5;75H 5;5H 5;74H 5;6H 5;73H 5;7H 5;72H 5;8HO5;71H\5;9H 5;70H 5;10H|5;69H 5;11H 5;68H|5;12H 5;67H 5;13H 5;66H]i(.5;14H 5;65H 5;15H 5;64H 5;16H 5;63H.5;17H 5;62H 5;18H 5;61H 5;19H|5;60H 5;20H 5;59H|5;21H 5;58H 5;22H 5;57H 5;23H_5;56H 5;24H_5;55H:5;25H_5;54H-5;26H_5;53H-5;27H_5;52H-5;28H|5;51H 5;29H 5;50H 5;30H 5;49H 5;31H 5;48H 5;32H 5;47H 5;33H 5;46H|5;34H 5;45H 5;35H 5;44H 5;36H 5;43H 5;37H|5;42H 5;38H 5;41H 5;39H 5;40H 5;40H 5;39H 5;41H 6;79H 6;1H|6;78H 6;2H 6;77H|6;3H 6;76H 6;4H_6;75H 6;5H_6;74H 6;6H_6;73H 6;7H_6;72H 6;8]+H_6;71H 6;9H_6;70H 6;10H|6;69H 6;11H 6;68H|6;12H 6;67H 6;13H 6;66H 6;14H:6;65H 6;15H 6;64H 6;16H 6;63H:6;17H 6;62H 6;18H 6;61H 6;19H|6;60H 6;20H 6;59H|6;21H 6;58H 6;22H 6;57H 6;23H 6;56H 6;24H 6;55H|6;25H 6;54H 6;26H 6;53H 6;27H 6;52H 6;28H|6;51H 6;29H 6;50H:6;30H 6;49H 6;31H 6;48H 6;32H 6;47H 6;33H 6;46H|6;34H 6;45H 6;35H 6;44H 6;36H 6;43H 6;37H|6;42H 6;38H 6;41H:6;39H 6;40H 6;40H 6;39H 6;41H:7;79H 7;1H|7;78H 7;2H]_7;77H|7;3H_7;76H_7;4H_7;75H_7;5H|7;74H_7;6H 7;73H_7;7H 7;72H_7;8H 7;71H_7;9H 7;70H_7;10H|7;69H_7;11H_7;68H|7;12H_7;67H_7;13H_7;66H_7;14H|7;65H_7;15H_7;64H_7;16H_7;63H|7;17H_7;62H_7;18H_7;61H_7;19H|7;60H_7;20H_7;59H|7;21H_7;58H_7;22H_7;57H_7;23H_7;56H_7;24H_7;55H|7;25H|7;54H_7;26H_7;53H_7;27H_7;52H_7;28H|7;51H_7;29H_7;50H|7;30H_7;49H_7;31H_7;48H_7;32H_7;47H_7;33H_7;46H|7;34H_7;45H_7;35H_7;44H_7;36H_7;43H_7;37H|7;4] JO2H_7;38H_7;41H|7;39H_7;40H_7;40H_7;39H_7;41H|8;79H 8;1H 8;78H 8;2H 8;77H 8;3H 8;76H 8;4H 8;75H 8;5H 8;74H 8;6H 8;73H 8;7H 8;72H 8;8H 8;71H 8;9H 8;70H 8;10H 8;69H 8;11H 8;68H 8;12H_8;67H 8;13H_8;66H 8;14H_8;65H 8;15H_8;64H 8;16H_8;63H 8;17H_8;62H_8;18H_8;61H_8;19H_8;60H_8;20H 8;59H_8;21H_8;58H_8;22H_8;57H_8;23H_8;56H_8;24H_8;55H_8;25H_8;54H_8;26H_8;53H_8;27H_8;52H 8;28H_8;51H 8;29H 8;50H 8;30H_8;49H 8;31H_8;48H 8;3]  l>2H_8;47H_8;33H 8;46H_8;34H 8;45H_8;35H 8;44H_8;36H 8;43H_8;37H 8;42H 8;38H 8;41H 8;39H 8;40H 8;40H 8;39H 8;41H 9;79H 9;1H 9;78H 9;2H 9;77H 9;3H 9;76H 9;4H 9;75H 9;5H 9;74H 9;6H 9;73H 9;7H 9;72H 9;8H 9;71H 9;9H 9;70H 9;10H 9;69H 9;11H|9;68H 9;12H 9;67H 9;13H 9;66H 9;14H 9;65H 9;15H 9;64H 9;16H 9;63H\9;17H 9;62H 9;18H 9;61H 9;19H 9;60H 9;20H|9;59H 9;21H 9;58H 9;22H 9;57H 9;23H 9;56H 9;24H 9;55H 9;25H 9;54H 9;26H 9;5] 3H\9;27H|9;52H 9;28H 9;51H 9;29H|9;50H 9;30H 9;49H 9;31H 9;48H 9;32H 9;47H/9;33H|9;46H 9;34H 9;45H 9;35H 9;44H 9;36H 9;43H 9;37H_9;42H|9;38H_9;41H_9;39H_9;40H_9;40H_9;39H_9;41H_10;79H 10;1H 10;78H 10;2H 10;77H 10;3H 10;76H 10;4H 10;75H 10;5H 10;74H 10;6H 10;73H 10;7H 10;72H 10;8H 10;71H 10;9H 10;70H 10;10H 10;69H 10;11H|10;68H 10;12H 10;67H 10;13H 10;66H 10;14H 10;65H 10;15H 10;64H\10;16H 10;63H 10;17H 10;62H 10;18H 10] AX;61H 10;19H 10;60H 10;20H|10;59H_10;21H 10;58H_10;22H 10;57H_10;23H 10;56H_10;24H 10;55H_10;25H 10;54H\10;26H 10;53H 10;27H:10;52H 10;28H 10;51H 10;29H|10;50H 10;30H 10;49H 10;31H 10;48H 10;32H 10;47H 10;33H|10;46H/10;34H 10;45H 10;35H 10;44H 10;36H 10;43H 10;37H\10;42H|10;38H 10;41H 10;39H 10;40H 10;40H 10;39H 10;41H 11;79H 11;1H 11;78H 11;2H 11;77H 11;3H+11;76H 11;4HK11;75H 11;5H11;74H 11;6H11;73H 11;7H+11;72H 11;8H 11] G;71H 11;9H 11;70H 11;10H 11;69H 11;11H|11;68H 11;12H 11;67H 11;13H 11;66H 11;14H 11;65H 11;15H 11;64H/11;16HO11;63H 11;17H 11;62H 11;18H 11;61H 11;19H 11;60H 11;20H|11;59H/11;21H 11;58H 11;22H 11;57H 11;23H 11;56H 11;24H.11;55H 11;25H 11;54H_11;26H 11;53H 11;27H.11;52H 11;28H 11;51H 11;29H|11;50H_11;30H 11;49H 11;31H 11;48H 11;32H_11;47H 11;33H|11;46H 11;34H_11;45H/11;35H_11;44H 11;36H_11;43H 11;37H_11;42H:11;38H\11;41H 11;]g6s39H 11;40H 11;40H 11;39H 11;41H 12;79H 12;1H 12;78H 12;2H 12;77H 12;3H 12;76H 12;4H 12;75H 12;5H 12;74H 12;6H 12;73H 12;7H 12;72H 12;8H 12;71H 12;9H 12;70H 12;10H 12;69H 12;11H|12;68H 12;12H 12;67H 12;13H 12;66H 12;14H 12;65H 12;15H 12;64H 12;16H 12;63H/12;17H 12;62H 12;18H 12;61H 12;19H 12;60H 12;20H|12;59H 12;21H 12;58H/12;22H 12;57H_12;23H 12;56H_12;24H:12;55H|12;25H 12;54H 12;26H 12;53H|12;27H 12;52H_12;28H 12;51H|12;2].n9H|12;50H 12;30H 12;49H|12;31H 12;48H_12;32H 12;47H_12;33H 12;46H 12;34H 12;45H 12;35H 12;44H/12;36H 12;43H 12;37H 12;42H 12;38H|12;41H 12;39H\12;40H 12;40H 12;39H\12;41H 13;79H 13;1H 13;78H 13;2H 13;77H 13;3H 13;76H 13;4H 13;75H 13;5H 13;74H 13;6H 13;73H 13;7H 13;72H 13;8H 13;71H 13;9H 13;70H 13;10H 13;69H 13;11H|13;68H 13;12H_13;67H 13;13H_13;66H 13;14H_13;65H 13;15H_13;64H 13;16H_13;63H 13;17H_13;62H/13;18H_13;61H 13;19]H_13;60H 13;20H|13;59H 13;21H_13;58H 13;22H_13;57H/13;23H_13;56H_13;24H|13;55H 13;25H_13;54H 13;26H_13;53H 13;27H_13;52H_13;28H_13;51H 13;29H|13;50H 13;30H_13;49H 13;31H_13;48H_13;32H_13;47H_13;33H_13;46H|13;34H_13;45H 13;35H_13;44H 13;36H_13;43H/13;37H_13;42H 13;38H|13;41H 13;39H/13;40H 13;40H 13;39H/13;41H 14;79H 14;1H 14;78H 14;2H 14;77H 14;3H 14;76H 14;4H 14;75H 14;5H 14;74H 14;6H 14;73H 14;7H 14;72H 14;8H 14;71H 14;9H] 14;70H 14;10H 14;69H 14;11H 14;68H 14;12H 14;67H 14;13H 14;66H 14;14H 14;65H 14;15H 14;64H 14;16H 14;63H 14;17H 14;62H 14;18H 14;61H/14;19H 14;60H 14;20H 14;59H 14;21H 14;58H 14;22H 14;57H 14;23H 14;56H/14;24H 14;55H|14;25H 14;54H 14;26H 14;53H|14;27H 14;52H_14;28H 14;51H|14;29H 14;50H 14;30H 14;49H|14;31H 14;48H_14;32H 14;47H_14;33H 14;46H 14;34H 14;45H 14;35H 14;44H 14;36H 14;43H 14;37H\14;42H/14;38H 14;41H 14;39H 14;40H] 6 14;40H 14;39H 14;41H 15;79H 15;1H 15;78H 15;2H 15;77H 15;3H 15;76H 15;4H 15;75H 15;5H 15;74H 15;6H 15;73H 15;7H 15;72H 15;8H 15;71H 15;9H 15;70H 15;10H 15;69H 15;11H 15;68H 15;12H 15;67H 15;13H 15;66H 15;14H 15;65H 15;15H 15;64H 15;16H 15;63H 15;17H 15;62H 15;18H 15;61H 15;19H 15;60H/15;20H 15;59H 15;21H 15;58H 15;22H 15;57H 15;23H 15;56H 15;24H 15;55H/15;25H 15;54H 15;26H 15;53H_15;27H 15;52H 15;28H 15;51H 15;29H 15;50H ] x;15;30H 15;49H 15;31H 15;48H_15;32H 15;47H_15;33H 15;46H|15;34H 15;45H 15;35H 15;44H 15;36H 15;43H 15;37H 15;42H 15;38H\15;41H/15;39H 15;40H 15;40H 15;39H 15;41H/16;79H 16;1H 16;78H 16;2H 16;77H 16;3H 16;76H 16;4H 16;75H 16;5H 16;74H 16;6H 16;73H 16;7H 16;72H 16;8H 16;71H 16;9H 16;70H 16;10H 16;69H 16;11H 16;68H 16;12H 16;67H 16;13H 16;66H 16;14H 16;65H 16;15H 16;64H 16;16H 16;63H 16;17H 16;62H 16;18H 16;61H 16;19H 16;60H ] n16;20H 16;59H/16;21H 16;58H_16;22H 16;57H 16;23H 16;56H 16;24H 16;55H\16;25H 16;54H_16;26H 16;53H|16;27H 16;52H 16;28H 16;51H|16;29H 16;50H_16;30H 16;49H|16;31H 16;48H 16;32H 16;47H 16;33H 16;46H 16;34H 16;45H 16;35H 16;44H 16;36H 16;43H 16;37H 16;42H 16;38H 16;41H 16;39H\16;40H/16;40H/16;39H\16;41H 17;79H 17;1H 17;78H 17;2H 17;77H 17;3H 17;76H 17;4H 17;75H 17;5H 17;74H 17;6H 17;73H 17;7H 17;72H 17;8H 17;71H 17;9H 17;70H 1] Ԩf7;10H 17;69H 17;11H 17;68H 17;12H 17;67H 17;13H 17;66H 17;14H 17;65H 17;15H 17;64H 17;16H 17;63H 17;17H 17;62H 17;18H 17;61H 17;19H 17;60H 17;20H 17;59H 17;21H 17;58H 17;22H 17;57H/17;23H 17;56H\17;24H 17;55H 17;25H 17;54H 17;26H 17;53H 17;27H 17;52H 17;28H 17;51H 17;29H 17;50H 17;30H 17;49H 17;31H 17;48H 17;32H 17;47H 17;33H 17;46H 17;34H 17;45H 17;35H 17;44H 17;36H 17;43H 17;37H 17;42H 17;38H 17;41H 17;39H 17;40H 17;40H 1]4=7;39H 17;41H 18;79H 18;1H 18;78H 18;2H 18;77H 18;3H 18;76H 18;4H 18;75H 18;5H 18;74H 18;6H 18;73H 18;7H 18;72H 18;8H 18;71H 18;9H 18;70H 18;10H 18;69H 18;11H 18;68H 18;12H 18;67H 18;13H 18;66H 18;14H 18;65H 18;15H 18;64H 18;16H 18;63H 18;17H 18;62H 18;18H 18;61H 18;19H 18;60H 18;20H 18;59H 18;21H 18;58H 18;22H 18;57H 18;23H 18;56H 18;24H 18;55H 18;25H 18;54H 18;26H 18;53H 18;27H 18;52H 18;28H 18;51H 18;29H 18;50H 18;30H 18]:0;49H 18;31H 18;48H 18;32H 18;47H 18;33H 18;46H 18;34H 18;45H 18;35H 18;44H 18;36H 18;43H 18;37H 18;42H 18;38H 18;41H 18;39H 18;40H 18;40H 18;39H 18;41H 19;79H 19;1H 19;78H 19;2H 19;77H 19;3H 19;76H 19;4H 19;75H 19;5H 19;74H 19;6H-19;73H 19;7H=19;72H 19;8H=19;71H 19;9H=19;70H 19;10H[19;69H 19;11H 19;68H 19;12HC19;67H 19;13HA19;66H 19;14HR19;65H 19;15HN19;64H 19;16HA19;63H 19;17HG19;62H-19;18HE19;61H=19;19H 19;60H=19;20HP19;]Al59H=19;21HR19;58H]19;22HE19;57H 19;23HS19;56H619;24HE19;55H919;25HN19;54H-19;26HT19;53H619;27HS19;52H019;28H 19;51H-19;29HP19;50H319;30HH19;49H219;31HR19;48H 19;32HE19;47HN19;33HA19;46HO19;34HK19;45H 19;35HI19;44H719;36HN19;43H 19;37HG19;42HY19;38H 19;41HL19;39HO19;40HN19;40HN19;39HO19;41HL20;79H 20;1H 20;78H 20;2H 20;77H 20;3H 20;76H 20;4H 20;75H 20;5H 20;74H 20;6H 20;73H 20;7H 20;72H 20;8H 20;71H 20;9H 20;70H 20;10H 20;6]rRT9H 20;11H 20;68H 20;12H 20;67H 20;13H 20;66H 20;14H 20;65H 20;15H 20;64H 20;16H 20;63H 20;17H 20;62H 20;18H 20;61H 20;19H 20;60H 20;20H 20;59H 20;21H 20;58H 20;22H 20;57H 20;23H 20;56H 20;24H 20;55H 20;25H 20;54H 20;26H 20;53H 20;27H 20;52H 20;28H 20;51H 20;29H 20;50H 20;30H 20;49H 20;31H 20;48H 20;32H 20;47H 20;33H 20;46H 20;34H 20;45H 20;35H 20;44H 20;36H 20;43H 20;37H 20;42H 20;38H 20;41H 20;39H 20;40H 20;40H 20;39H 20;4]E1H =19;21HR19;58H]19;22HE19;57H 19;23HS19;56H619;24HE19;55H919;25HN19;54H-19;26HT19;53H619;27HS19;52H019;28H 19;51H-19;29HP19;50H319;30HH19;49H219;31HR19;48H 19;32HE19;47HN19;33HA19;46HO19;34HK19;45H 19;35HI19;44H719;36HN19;43H 19;37HG19;42HY19;38H 19;41HL19;39HO19;40HN19;40HN19;39HO19;41HL20;79H 20;1H 20;78H 20;2H 20;77H 20;3H 20;76H 20;4H 20;75H 20;5H 20;74H 20;6H 20;73H 20;7H 20;72H 20;8H 20;71H 20;9H 20;70H 20;10H 20;6u R Startup-Sequence\Wassign NIL: Env: ram: free ON type s/PO7.TxT setpatch QUIET zgif >NIL: PO7.GIF PhreakingOnly.exe NIL: ; Phreaking Only is copyright (c) Carnage 1996 0;21H 20;58H 20;22H 20;57H 20;23H 20;56H 20;24H 20;55H 20;25H 20;54H 20;26H 20;53H 20;27H 20;52H 20;28H 20;51H 20;29H 20;50H 20;30H 20;49H 20;31H 20;48H 20;32H 20;47H 20;33H 20;46H 20;34H 20;45H 20;35H 20;44H 20;36H 20;43H 20;37H 20;42H 20;38H 20;41H 20;39H 20;40H 20;40H 20;39H 20;4M+  Type ,ammNUH720|&P~Cp$,KN$@ J gprAQA"M$v,JN+@JfN|"$N&`N+@ <rHA,KNT+@Jf,JN|"$N&`nr @1|!| m+A+A+HgR mHHHg@phfp+@`pnfp+@`(HH+@A"C$ ,JNF`zJgzJgSJjAn~+H`zA+m~+HJfd"m Y+H+I gPB"$-,JNJg*N|.ptЀf~+mAB"C$ NF`~Jf"m i"(,JN m+@"$<N+@.N|."-NJf m+HA"C$ NF` -g8Jf2"$<N+@JfN|.+mA"C$ NF`Z -g"N "- Ja.Jg "-,JN"-,JNBJf"-NJgN|.ptЀf~"-,JN` -g"A$,JNF`Jgm "t,JN& 0f~`~ -g",JN -g",JN"m,KNN"-,JN"J,KNb`0|"P ipz!@ LLN]Nudos.libraryFROM/A/M,TO/K,OPT/K,HEX/S,NUMBER/S$VER: type 37.2 (21.1.91) Option '%lc' ignored Type can't do both HEX and NUMBER 2No files to type TYPE can't open %s 0123456789ABCDEF%04lx: %s %5ld %sNUH72.,&Hp*+@",KN+@Rg2JfJf p ... 09Az$@"< <X,xNT.gGIFfh*e\*eP*eD* j>]iRFz A +H$ x<;g <!g2<,g8"G,xNNNuA",mNL`A",mNLNuRpg`p((H+@0p((H+@,A H瀀"-0$ax+@8Fo2+A4gHz6Hx/-0Hy$/-,Hy#/Hy%/Hy2"O,mN+@O(gHzHx/Hyp"ON+@ Og -4@g4SBz m$r*0<C($&z|hc| cE E|,cE ,UN*,fJg@B N*,g4 FO"OpX"<N Jg2/Do2H OXL@|NuOXA",mNLpr`H>(|"$<,mN*g@"tvN"vNzm&",xNT,g.$",mN",mN L@|NuA",mNL`A",mNL`H(oT0/D>R@ld?@D*NGy%Ey%Cy%Ay%SE|(@؄A؄B؄C@؄A؄B؄C@؄A؄B؄C@؄A؄B؄CQ0246Ej,MGy%Ey%Cy%Ay%*/SE|(؄@؄A؄B؄C@؄A؄B؄C@؄A؄B؄C@؄A؄B؄CQ0246EjLNuH(oT0/D>R@ldV?@DGy%Ey%Cy%Ay%(oXSE|x4@LLD@DADBDCQ0246EjLNuH(oT0/D>R@ldP?@W,h4DGy%Ey%Cy%Ay%(oXSE|3 QQEjLNu/ $oHABA31Q4g&SBg*Q/I(tIBC(ԀHA$_Nu$_HA0XNuHB o$,h ha0 @$AJLBk/J` H?>OH S@>/K/L/ABo:,JK$M(Mrxpkev6RC?C|>RG/O t6/6GRKBDC ЂnaFg2Q:SNaC Ђna2@Fe"gGgpKe0Gc 4H@GbQ:SNad)RK2 e | dDRCgݻWSEj~:S nNa`O$L|NuCannot open file Cannot allocate memory for loading This is not a GIF file Cannot allocate ZIV buffer (16K) Cannot find a suitable display mode Unable to open screen Unable to open window Cannot allocate colour map H?:|Ng$@ r,xNT,g(@(9C9CBB B rNT)@g*Nf)@g|S.tG,o$rN&gD @!j$!E!Dڄ!l!|RQG."$*&,N Q L\NuG,o$$grN`"l,xN`"E,xNN"F,xNN" GL,o$N`H02$H"*g R$(&*N RjJjgH,x jNJf jN`Sj&@&k "+ k$fp` +%KgBLL Nupr`p`H02$H gjJjg j,xNJgSj` jN`G,o6*`$rNQ j,xN`"jNN",oN"J,xNNLL Nug$@ r,xNT,g(@(9C9CBB B rNT)@g*Nf)@g|S.tG,o$rN&gD @!j$!E!Dڄ!l!|RQG."$*&,N Q L\NuG,o$$grN`"l,xN`"E,xNN"F,xNN" !pr"R]Devsp"#۠\#system-configuration!"84MP 'N @p<L?C    @` @D ,genericK B  pV`zGIFZ0f~)! i>WzzWԛ-Kw]i]W,XN4A3.-~uiA } 5蓓nyRve|& 7{zw츝H)dU>w۲5iw LȮk \ދOqY^Kd`>).t>goP-fAlx h⢞)bRiRV"(U0P9"T_4GHZ{Ỡlz7~J h|*|vc bHUqoed:q?|%?e(g _WZYAu|D!RM#ԢcEEbO&wv޹o4oPx ( ] jsB8xZ)2oо26dowY7][BKwVPE5MEH <֧ZN C} eWӮJtGtM 8A(:V3 q]'mzƑמ:w1cT?Gn: nI(҄BP0h08S^$BClef¨ O c!*E!&L/DBH!q Zxn05\0ӤβsF ̪-LMSUfթ8icAç (A&eӫʫ)mV6 EzRUPy'1$[LSUV0^mJ0!1ura͉X Mg8 #6QVƒ\$=7ȁg_UD2D  wiBbat!0]Z( /g ! P0d` au0r0j9“s,aC"De  V!~0JH{RH>%L{ZHyFH53-< LU;LC~jL_`pǰe3ؘ0֎ ؕ-4knz 003 h^'0fxcxvw5zϟ!Ԗ;x\OF#~V 4͞ncOniaY٤vIg םn;dbw ԖFų=h5hwv]?f< RƑoջo47V(qb_{+CQ]綔Ȋ#-~[N]7 ̢ -:QK]\4p.Gq:M:\@0$8`$ x:*fФ |ldnO+ryJYb4 }OᡮЭ['_ .݆48V FV= WmG¾ÔrXVB:G9 P"q):Kidlw6:Ɠ&8Ʃ'V#úÁ<F;BY׀qxB'I^tc9ơJw%@o&"~QL7't#$֧GT%?@; |fvocWžǔv ؠ 3]~G6J_%g9|Or{%ҕJAuqލf9DjTK@ }/;s ERN ^Û#MqGC- R?,*l=-M9ɅCMY|a ( r dHU}N9uGaWBlPݜ?nJ XIv仨ÁQǙaw{ƳG48+Dn<@Fҡ%i X\ͯռ]]nU^W8O/w|뀴Q_  kC3rUd]w/zsŰt1Vi˭+Vʳ!~~&оCwZ~M[Zb*g^ֵ~q I}q%o|=1ue٫n%^.7F9R3oZNS:V٨E7hMܕr_ZWkV.%~ U|4<'`_Լ5+fj]!Kv҂`*sݟ=u5`FWr3ϋ?0eεP}-8˖S7\Ek sdNKU)S',7=sm 't# 1ww)Cf ucH_|Ә7$ڽc\2p@n"J{S0_#}Q)? 'i`/Eܴ!ıo$mxkDy93ɭw qzJ3f}@/$-F3Ts5\I >rAQ+f?`TGS90) JCܽ|Sa=] -/T&F |쇌?mEoǀޏJCx~̨{wEGxh.T<_A& O5p)|]h%}R= f7s'}R=ųn!⑪`+4H7Su9K.yŅ=7hYLF8rT^GDM?όr!'I(Udr]=HZpWFȋ] Rcc&$xݴh','_ldXԴl47tofPЭuw]ZwM1>NY?s"j??8r#> :QGmd:T%uԬOvHr㼕d]y"Xx봦k8ƌWA: k&Me=T0P1löSE5>DKZDz?FOYq4S71bHe`)lJςzpe`AMmx/( `qMY,"Dʠ?ZLBx> O"WX97 +2'P%ɊKc2GX @7(XU㓾Ȁ;@c2ǎ"Ex~k`xZ}O!40/ˤV#+~Ο+(`AU$ʛioI>mf9|J3C{N2> giu"ةq&EEPK7n#P `?s, IP'| $r Fn;/ĤQ2_aπ0AU#rđȰ0ٞwx^x3r)x r?NU~:L)_'!ͧ _+?;E{.X^5y$n AVU8X`]C7sy?{@X7x oy>e-Pv齞 ~< ƻ9>i`3N:NJd6kt@/9πCz Q#7t@Sus4.-ѳY"~g27ZRR#S+3Y_'F%F'OXOWA >ڕ 5 1t@\ /]O9D^<;b WZԢĭ *0?w=þHDLCqn #S9ȯpVg sr27B0+1>+;H`Q|qw)acSJS|qʎ=j t-[CtG[4 T{߳RbJԈ"L}ܩPKaa4*L}OSk*$5"$b/)C֝$Ś>g:  HJ#| of) F23wy;S&ݓ:X5Kq!^ H!A!A^C%{}`lC*wc_z^+ś|\a{kF1'Gt_C*?$W|= # U׃P./sǟOb+祓Oz% ͭWnj~'uB$yыF.6競 4Q؜qKha`s[^ThuJR#$_p|='Bw3?m!`l_JFlԧ\(I/%O :2ZGkxɩjU["!} UM&ȪǾpKd%F'|+MM)!4t{NAsЖ?/:B>5-~axSgKrŋژJk% 6W;XvP_|'k nݫ]M%N ყF`ؔ^IhF>M:kK,*O}ﴍ\^u3{|GN'ύ;<_@{<e9K^o!9/}2!0<21_'qπ90i1WMxN(.Aο4Nr9 `Im4I^ /A:*uGVmAza{XTl؝\,>.w;݈0s ;#IZD{ I҈vGAAM6`r0h7T zqnJ25b%V,3o`|4cBD~[opz/9QсOeMNۉ…DЦ&5/7" su JgѥK%LL]i*[4:+*Pc$ua/e@R\xlpS"|I̼~5G &R(N\u4fAJf FNжz\bUHsnKFP?ejVL`BPLҜ ,X>2NoBFIi= zF J";sX~ @S&Y`7n`(=^u:JdO(dE_//by :/R[{dA}B@ hUDZiM:s,(: /HIH `RMPP|%P'5|=,P&ҎX|dm J/Z<,Д:Ÿ/H6Vrbc~, -bu&Ne] l}2́yx  y fQN:p(pZAHӾ*jzf t̲}ّ.,uRId{'&R` p/"tq"@ݍ6݂҄YFmE n:oe¤IfdN{1Rb nŭ5MӐv)"m) OA!_cf6Sv =E1!;H%[#)`z. ^M"g j,a4pS i%q@6/Td5o@ӈilq 94d h`Q74`q0.P*gL2aH 4w );uzke [?i֭/bk Bmk5"̴iW#ƠJ=+u36;l /`;h,wFIE6P"B:kn}ʾ*LTbhcڇ\x ,CO:1&-Cl&uNZ';ɾ;ߝa=$S7rzPml+vplU6w ]x1+`RAa#.n F T'nUَJP"7j+Pf%U|EwP`r70 ^eEC7k?NǏNlJF*))[{4.w7R,<z{~1~.ջК2{i R/4BIx>Cyr!cg㽐B!tuB=,`Þ."!p}߁LABI2-5Ǖ#+ %@' aG\!Y!m1b\=J.!ik7cmt!z ui|usm22e{k ^Tŏԋ%0iAC/ m 5Mx$>*ʦ ! 8  C^aq+MTʂP p{.WB*ZL$`0][.9\$5U Sf"+].wQH4xr&SPMU20z#TK9yYXN9lGT=}A6|O\JR3v~$V@w#no@AyD8y\z^/֥, <{pBSj%AH* Tn>(5ۦ/wekkbWĴmR>N:`ِ#8"~273S[|g֒ : XPP!@. /2h6_`ɬxM5j뙝hc=ChHwemocm d`u]ǀդر|+tY't ,/R-,\&C bCN1A0eδӕ!kj9@W '77c'{LUt-[|ͥϴK gs :qo# V\`=4X1.ox?d?&1c+*K_?sp]ŭ(TS|;#.l A ;._u ; @Sh+KԹNj0ulN GZl̩Y5"BײaGA]B; 61M^hpS8S6ݦIgm.084/nmYw Gށ7Xv}H0x ?J } G5)nVE#cΚ<:X{y0IYbhŴ:4 \_[^Yn? }Ed8v78x׳S_#xB+# ib~ W'Ll[^SH|YO"9DžK/+xɓrc#AX?'[aˑX f%1AS fnc̓muci:fU{|0rd<.`$2P\("WS29I$ET1Fjڇ/"n X,||W棍v8c܄VU$::#PV?C;`&ohnlW-qX 0F5M.A9.1yƼ&pvbPi[y~R_ځ?tx\Q@`ZA )6PڡFjdBXF5gLq(y&PSՑG >(m" ɔL#@q-SHiEUL W9$ՔsJ8HQ|c7reNhG \+҆'c'LfDbi)#00n.ٟ`1Kųء oÍcÌ#C)i7RɎx#~`H!"hIDնf YU|lKɽ)v^5s!oKCIs|ȾrI2wх *]IsV~ʚ7cV:K'ʠ=w;(|Q6d ;/"12Aڱ:*+tv+zPBvT2n)"Tu ]:9/뼯up ?Vލzo|Ə ?dGC!1pu< [e)UȮ"zmKđqѰK@SreJ1Um a;`oB]?P:ka@ch a ЂHaQ8SK2 ! "1bo]]2vKvgM8`r-l->J]ԭZK`m nQ;JNtTUE)U>Rp ƨ XI` gV(lȱf;[⊜k $1JUĥ[ % f_g% Z"C=ɰpfwcuЉhDX+rJTlϔp~qy>o">H/ B!?XIW~;mH xE"`,@@RWC95`ugƫ'H9 THhw>/`dy3<8Kz?ǻ(&myy # ɡjA`-T 􄥋r_] >,p@K o]J !EKơEB.Hi!S(]Tjh3.HOz#FfF LyFʱ}~q~_5M_:VIJ{;`1:Zs:'#9U%]SP `]棊Œ҅la 6/U=!t8 \{-]شYDžN w>5Jg|3cҟJI_<7wZ~PD*:ת:r-"vG* F* 5`=by#GtE>r !J,Ȉ6'ƪD"Hp~LTd[k7d_DJFL)!rjEB~[۽[d\0(-o&gѐ<4yϭ?`.L#ʙ|94C)9477ܸqgp7o޼ugo߾/ܹs.{Ç;:::;;y r=dX,(JN*Bɐ ()J777wp*˫_~||| o 7x 5!C :tÇ1bȑ#G=zFnر>nܸqǏ.,,lĉσ 4Wu` "~C*ѿ\w:,M BgPO3'vOe)dnSao_[8s}p'Q)g|}8fXgE1y#byQq_T׺򟵓_p_̋7xݚwo hRI#{4e<1M;);t,n s[Z%xn;ߝurwxLRfxּ?~pd}-.^NB@#lK-z}~?ዥ/*u4q[ %ApL,oYC5h?? O8ɱK3yj_\Vxp}翆e,GjT{:zh(0ue!-aՊ蕝'ڊҠzgeNPڨ3>p,>S3%?|9[ oP?^mre/$v Aސ)&9S6ưKڻT]';Zw5ʋHWV;/%?n'C׼%B~_2?O:W^? MIGTXUWU o{=#>W{w\o ũG=?NmmřvMa|{ooJؾcˤgj}/%u[|NtN/NIJf12P"3:t4RN;eZd5b&&!bw"ƁAKaT +9o{?[PKDY  B <{B0둯2q&@өb,\[ӿuդ`%vrx!i“l`+a gPKD DL0  aF NETCRACK.EXEPK4d1Ydy  @>SPLIT.EXEPK'*FMRKantiexe.zip&XPKb b+ ANTIEXE.ASMn6:ЭQ:Iv| ڡM\Úum iKOI7Ju^e<(Ɏxtd ,@L*/9Wrl~x0bBΖ0f; pt(Q zf \A9  cXnҕ੤#$ :׋WB p%ϓk{kh :ABAEy؆}?gA۠U-|+Fak1M^g=:xqkręѝ.^E$ 童$*3!up@Bf"V9;L32oFjC=g/%R vrJi1EX@XSQ~t(:ON oʙ ȝ&d"x,m8F̃D+\ ʌT'fc WhfMJ&c]b[:Wrޭ(Ցf%uGJb_p 4dؙZgysp?{ .&c  @)ñHi@!cw`NB=raqsy4"J(%!! zhJ]LO?}4;fJ* 3ʅ(U"ɦ|T(pYL-*ͼPːJ~'1+CFnqNjƅi}ܕLŅgP/7‘{{[%~NqE"LE8&L,5(deip'VIڥlNepf<pmp?Ibu}9܈bpr=>G[/_}Շ˩<=){o9ezBRF*vݴ+wxK4V: Y3&>ap GJ_8n${25438yMvUio!2^0H6+\ .u&ks+} ɷ$O )7 +ش$0snTyJ2~s^mh'*,*ީ嶩i1רG&f|a⻑ C.XÚd[# CY?kLyR-5{Zs{4I9)AǴ0)9#![gs%yRN`FËK6sB6)\iMvZ{[n$`vX3,vӶ3~2[M 㬆xfyU^TWxl/ DP@ʤ硢 Ǟ 􁠽H9^{8o%/qxpi{qG6Kf)g&76tT&~_Q}ݡY_$16=Ƣ{[عnmFI9U;'] oxr6x3?&7,vjupk͞1›'T 9á٣7fP:s,U& fd@87=ivY{4?>ƨaGZy|>/Νj:X#Щor{T2z6=g\ P?PKb b+  ANTIEXE.ASMPK99FMRKaoh95_v5.zip0& &RPKW1LffA INSTALL.EXE{XW7\U6:*jdH hP`x f`9Xff2apLNNɛ7x2NMp hn#7!CPU4̙{}_{Z{b8KeF̍%?2~a&{= ُ&މK?rpaфz&;&bŏ0҉>P|2mz&I925==n(V׳kU#epʔ$,U2gb-k]V%Zj_=Oj8e3GRJYVFGk7A^gycEQZ~cעViaO/⮨Vbl21eRVsNf Ť̪JY~' 0ۿcmMUCdŤl6Q@pGRTضǶl~?ۺ%uw#=呭۷Ϻ3uki{-51ٻ-?FGSJSX0!쯃x>7W6u←`ф=={4C'p1 `%ee887Ӳ5es6P0.Xr,яwy6y<݁>=~}q;PΖږ/_`R]~Ue+,_r!K&0 /rsXW._\h[s99\/[t)^\jGN2iͥMve@j.W -;?ϸwnJzzMscWKdٳz8L]Lф9-F?fIoj]1 nה(ᔶZ#-cYgQbKԏdVf|@-*n<=2zC!x$c,UB%&r:XQCːcq N9cS^ҿВmカ7s{cH^1fs~~Mc,Hwa,W~'Ev7tᝠMHȽeOk3?qY;#or)e?/a1cX| vbXծY-c)GV^cxgu+%-#kYQRU Qh=t1X1jxmN~/)4Vmѫ4gns,[&?ߣ$SwG-HmfvKRECL K=dgşmR aڸg92ɶwYܳ&y嵬TF07k m'Y . kVeM&gc ^k?\zRnl&c,v\'_ ),gߴ}\(RWlJz"wp7leldΨZo0p)OYj:Vʥ7쏘vEh0E"҄N3T8 6br;n]ٯXp`~=:Yh3sGIhh"kΟX~dgpF>UT%{ҵC,% oox!Q_lxhرr²uԏX!E ޶=5?S`,)ޑ"F<$0W~o[_Z)WKpSSzm?(ɍ/PRar)Q~o1r Wl;0Di'댊P(}afKnMR\R07^U}~}1FlE)YY %>+u{ۗɳ,z}`Pp{:f*첬OEuHVZ4:ґ e[Kˬs&l/Ĝ 42Â==.kR^| oZ>[7\٢*?YͳjU{d(O C)=\ +mT:9$[vtɂvkTx۰]tuVeIIB{OXo/ܔ'ATbl^%qz:N>VdZ; 6kHo^Y>p ۅYrr~,x6CpeR3;ޭKkWh_E>Q?EvGh/'o^rhrRzS.P$ ,oGtXEr |TE<&jNI*-ۭQMjujE?-vgk+wB5q@{py/wP9$[rj~.7 XSP(>lGz5_ k:!%4~+f:ɳU\N)_vW'70W@_ٵJEx$ӏPk Rk88w=\\_S=U}$`x9 : GrʹբړѤups-鷩kpT/@pZF,vè^kzUq~ v(lo2GɡLAeVPeIޢ2U'TvFp01.WHO|biRf?y+rw\RNj~S*{~r65޳^ҏ{VvaJ-Kˍ)#3 )apCCDܞ7d5|g.%[ hIuV|A/:3=}>=ܘ'{"i&g _6ؕDw"SRtZ;:ɵ?ݞ.ʳUtqU;i6]~s[E ZS)iXO#+d^<$MeEb?)whdo/{-©ԑud͚M*[i%:lofu ÃNq_ ˿3K[NlK1hwT7f_r@ˆhfճ.0jב~*R`ᏍŠ>ko[5ϱYKbJ)^68b+Qs)g n-E`n*:?&/:|{8w*GYBӿO"jQ_xw_E4:-l 槟x~֩ގS5)fEu=z&{ɵ`η'y-' cEԣn:4DJsAp sOPL@D&;Uyg[L7Db% ޭ3^Kp"ҪN>&SW$d8,%^љ B0GJ&#!rfуzF96♺R!ʘZ#${.% ĈF6N|I4xcؼ^>!W4Ao{|)=DiZeU24"] DOf%Ψw_5Ќ41{yG޳~gkȚȠjD<pWgeңAT=Zq}*yV?^ѢIUzENT\IEG<7K  //L]!#b%Cpb.M0&pqwEU~FoZFOi |E%TʇsQd Y<%з_v/}n^Y-F+彻V@I;TvQ,/U'd@a0̝ [6M^FrE$|=ytds2|!r^Lz\b)@ 4-qคW>$R눦宨.oL8)HSw$w/Cg% yFH%fC(ծᣄUOΘNJ~S:Q>SH_nvHJ%ROʿHM_驱H$eRlLyK"}a>'jkp̧. ƓU(wE)kr0GAV8յ R&vh]MMa$0զBj񢱀Ǡ@q"!<1޳g3LVd FZ^ۧ9˺(2 uIJn=06d?˻KzxB޺BD~ |P%%:~S27 8ς֮!IJǀb̥|+ts!9333y"3C;g] >ɼ`P-e` 87_r|JBeB= %Ө#Gԉ3ZٓdgtB{I.)r E`)]o?wp~:xC{ՋYTR&_tzK/|g^=-g6 W9F4e|Gcx$5r-rJLƳ[`4 ĦQFue}.OS2A'[wB!}I.+8QIt,u4lЏī 1&qNwFsNB=UUD$GXх>%Gz_/{+.`| : -5Ɂ'ژ%sbA- +OC$5x |i&UXXUO#,C_cw%ȈB[tʛ Abc t`>BUL$^XB'a)F"109heyE{߮+L:` DO%< Zf.9S3Ifә5PK;Y[»QH6*x+N)r%rωI/'?ZŁN ZCrN1!ko|Y.m }L`%*L3a1oFN?UG@P%!$Зz <$`R 'z,#m Z @Yӥe-iZⰺjgrư;UkMH[txsO;RkdEY2`/DaHj 1H"~:ôb)Iw6O'~p~x( ܁MHz5"/V͗KXWfg+6#ִY{l,J;"v0 R7-OxO@t,3(NW4kP@ l@ߙS'P$MgI?jeÊ( pdJ6Uv;TuiC"Sfr,=Ţi*@qQ#6rEg/w%#kuZΜ9:zK<&Q1R4,u-YxP揢M-`ƶ흷َ'gsU°Q|ӿuP4ZGF$5GЯ%52~%&}=ן%lńxM& 'KJ^tv:j5|&A7PńfV+o*噯<:2vԃ# gyELbBE\GMz6|zs0[Ah6Y59-#sIH㉟xs`@Lܤ&{v98)('\Ԓ-q O߻b~%Hd>"I%ƾ?Lԓ;s|si⟌Gqcc>hAp ۀNSR%#`NJ|?r]'Mselwֳ|< |\?g44ڐzg=Ѣ ]M%'b\)U=MdA1xGgcmi?3G&8[/ғNމNCj.qr9'~̠t?}XԞx筓5eF2j/K7T0jJ2CH.\RA>ր% uIT۝svs&8f14<Ǵizo'ڗI5YwF}BW2Mn/$]"g. =Yœ*5(0Nb֧N^c*NU^X @q`44eHQy "+B/8ĕWh츆l>^[Zū$ZŞ[kNQshS#h/Css7;=6'՝D:XQ9@ZB"eX ::1AXnf*u#n&q歮σ>a"^J&Lȧ5h:6NJJWEYE +D 91d=WX0lV-1jPM'ó 3ةY;3;0Jܔrfˌr%SaƗEpl⮤9ٺ'gӹ 0A-&<5D;'0?W,Ѵ*!e4d0m3Rho@-$VO)(ZOG˪|F}_5dpgd'>prݏ<7_*XK6Xvv-:V# |2-^݊>;U68{sX1 L>U~T4KDU%[f43hK'F^?.y~vX:9M] 6V!}y'gDcaEC2AH$ûh^! 5I$Ee";T Z,!{*W!jHs< {owXI7 gE7ڦFd?B?)>!\P 1G̴3gXEF-:ЅAi9뫷b5_ =8Jw}|< Ƿ{kd XW`[|0J0- dBnתvMI8yxN {0pD i(_jAkʙhF-: ~.r,sL !n6 PAzZ]Q 8Hpe2bKw|";/ug"^ tk`껓S%ELИzy?4@ Z @X6pL$Ctվ0v5-Bs>KR2&s0$ׇ`e0/u(UzZd4H+x56RHD zlQk:GB.PA a$WA<)aUֽv Vo!װH'+d)F)? 9uu]@8 ][uİo2Ϫ+OwaщdX!0+ =hwV?GuƢ%@ To:6 z"efNfջNR}rűVIc| *i%Q)'xo8B]X)wT>]G+~~wF#}WH0qVeˆ|\cңVJK823EA"WWA adQ2EʷGl4h숢q@3ĺuA&=76Al|Qd‚(-/>'ŵ},jv_}`oBXp ,Ο52S7UL7CZi~Ʌ,,ŐQj9eM@b^@P9}"&P7{o7cc8s1Y`!}ģ K3sGWtN&+d|ƒ'ow˾~uNzo'pTg @mb@:*GMv'u"GЬa>ہ/d'j֥w' ;'Xh@2bfhǷ2 l[_`/Ѥn[LO;~wݺ|PϏajuʪ;v&ZH+ƐM͓R Z/uzKtɄd>Fy45d$ }W=2khn4slm*z _1=jdTnrl- B2\: 7蚰Ns'r8-Ճ\&\ryo݌&G6QēFR}tO~A aEqbKdK፣YYj˰J\SlD𺑾:&_oNw& א +,Lފ&hXFl>;o]'I̹ZPAA~syP>M"^$>D!5@|X4X 3Z-b> ,qR=Wٰ#Hcc6Pÿf\t⽀^B"BWh|i0z]QIj|bhó54c)0t;Y_b>~ĪQG5z]zeOEz7r!.EI,%tF =O*DAHX5p+#5t_Q C>-fVz]zZ#9~MJxOEP3 P}.հ =In%] IBg7$wndQ[|Gi(<vz&%VLS= _DlFs WޏaZø/9~H .R_n$IV.If&$Pr)ϚV#t?W%%z TXwg =\)Ů!=}頉GJB^Ҭ) c.\3TspF!s:'k`4 ༁s~38#^05[J*2G`æSz3i?W*bu.q7ϳLp-T;{æGKOMX誸:9 r_uTR102ew#Ld8vǰLa2kmG%gT ETʴ</~pe< 3Һ[({2ЇA+l"7U*ă@Ģʨ-zMMnYqC.򺅴OæJ۠zېʞ=o YYKjVpf#e$ݼƐfnZAdlĽbKXsZ ?9&~ᣃوKQ'^2At#^5 NYd%F0"dwfuMi:щ݂nqGlˤBz{=D;p犈PifXG2J0j1DZ3mS1'sq[V徹b*neȭ2a `3.Rʹ1?GأV܈%?fݭbQ";ɪ:'ZI]ہ+ ƓyfV}.Vzj2I5OrJϋ[$ '~QymkM_@Eވ'[\HLR~/5n°3ZA mF ̳~ڈ \ׇȰ)XFG=k<%k=|Ed[E\ش_rgb럙CLm~aN uE JlxE".W,Rfa@?j?Y^-9Yѫ|3S{"{^h"G Ɠ_*3OϔwDm( <Ƹb'[ >l}^xiZRW+dž(ŐQ-8Yj;B᥉Џaď 5Crizrb'SHxJy eGDzu5#(ǡ'KbJ:I\*킉3P偀[^4@"W=G5} b$>X_2 ^u*Zg@{W2_cf`cu,B$p" ^<~+Kdo F(kJ~~( 29]zˆYANs9K 7߮2B]6?E&[[ ʡ#WRf&?& Ų} XSKY9(Wd"i"?G[ɏdP9ӴEE{G' _^l:X 굇3*-|.fu #q Qi *fG<[9[ l|=*O%='Rևke=yڝO\zq{ N~Z|UjE*.݂N. -_Y{ Exɡ[m`lr@]A_q?7E٬ m gŸ~yz~IeSw ji܂ ՗+鍻/.c}3y*6BsmF:wǰ@n4s;ӺG,un| 9E]G] UDN*/ [|&tc,։ hU=tErښj^owr1Ǐ cy2VHu_#!Ǜe㡽FZ) 9T!2\|PO -|T\&KVf+XC)4,s4eehBsjK.澐neI}qh_VE T}k{,ΐ󹆂N+& s*Z4P'@\xW2vpW\s0*B?ƾdXu k{MJQ~aSq90 [PnC.=ضsn8F3-P CZđ8Pl/]jDB]T:+;ȱ C[Uu{IPFRJB@@$DBDR$so=9{[cƈ95Z@)*!ʕf-00GS\@A<@YC?7C@B'u]翩Wگ8* {0U>I-vwm9pu#oܿs:Ws$A㣃sip?psm_O/Bn;,,w,?|?^ aHy-;1{Ig_]yos4Mm9 Hkr$4;U5yOno31/wzwb'ed/UNݐKHF p_@ F.ӟ l64&) ALDDh~MpPbne[LJr=+A~l/RMlWeQhXHa'T9F]wCo6Ańq`1$q&t7ڣ#9yVO9o(47"r#5 D DFf bXȠŇRَBlP[;wp1TkT`'d)?X?C rl**RTh  h}36R/ZnV f[5 _ LjStk߈5 A^vwWڕ@5 e{K¶~'L'0bY俓WſBŃo$d'0rH2?,3 ?7oj;c7YI|lsl&>yi @ U L0<APsLm9{6HFS Ukߴ~tсn|g{- ?RE,]AH`A:s0{X7%]*OVi7YY* Ʌ ݃σ @$m!۫ - h߅`](B^,{4@)g_$wuSS?bSss1) /7riAG7i>u~9 [:_7l)/?'X<<o#Y[>.R>BcÖM30Ȓ}D ?5fDG4SPlA-}ZL]PAMX<1bbLnԿJv81< ij5?lx/}.:M"&~`1P nb0wH`{S> ~P_`&b(oƀR;g~؜q=B< ׃@߄𡠻ㅱp;ۻVk.%$ u?ߍwrw6svwwq@OP/l҅Bt@܁>jڀx}^ @ !(..ϯ#A>B 18<݀BLrm˱ fXϯ蘀 0RBe?xn@^9`AGa@QE8=^Kl'*ى"tg*M}M8@oxXh -+'W8͟S$$( >P(!ު@AG!C2'?dx)'QA1dxڊ A qx juMB/ԄX@<@Y >H>___eH?\B+]iA=6tC@{ EbCP(T jWp*BFpZc.8\ ' K%vvwI})zty /]H+IȫȨ ^>DۼHAHHq0IH.p.i_fE%+?ׯg|(B K/\XXEYSVDQ =,h\ܭ %`8nxXXyہ \@>rv񲱥p5vqv.NVΞ 5!<5'?<+э+| pqWu/; ,':/5s3$9q2d\],,ܭ@|d| qrfsɂT8.x.P`BvTf~~JorV,8 9Z # y4SB<ۭ1zBGB9Oz4.jtD;&:E k~e _GK^;sN`?d}m+]:pl>ffnٟA1X@YLXFm~D/lc^[,xU(Tr[y,%#z-9#QF&]:ұ ,}bE2>#{)LS>VۭʢfcdIc"0C)x=M3MT 1:\ƻi X7yߓFomrwڤI؉DԶ:M݊{ޙp?ZDCu酳{iaUdy)V[Vh,\ja)Lܽ4,Br0[[,n3ͪ)\LѴƘȹ SVe!Ac.!W%e2-Ƒܷ=K:!d#|}2 a1% = VF/[%:z"x<\eSYy8fZޔtVJ>J?ٺAǏ+iZttnX?|26].rL\}Js lƔ n$ݑA֊̒1E;Sy\ZKp۪UN'*ҢgggH8~#ˆW_A7LzyDx'B!3h4j;GGrxU]ɴtSsOe_ 0cx58r_JNψ27:k}EFgA]@% q_>fgYy/X, E&1}OL&(,$沷Ϫ%7ٸ 61bݫbcw6=bmBZV_'2t}W?ǎ>%D>)4n֫8Ⓡ#T(ĵd E94>,fQ"ئn$b|鏕F—0G4P[Ko B,#ͧ9*4E$MDyJY!!%U^d?_IQLQ0^ ׏36´JDP?R_~,{cVI@Ds!4u&+k'~6Er%O_v rN!''Լ EZN d*{#mJsO+O˯/^IQ%5TZ}6|'G$@%{c 1HF;7k\$̲glOrd-S`")V܉>I玵kkHfň8x|7︖~##^PJ:j°&k zo@j!ޠltY-^`wd&QD~q#Ge-!#t$2IN돩p]1~TiJcoRʟ5+Z~_ {Ȯlsզ?L]+^-s֋;t(8(-i(KXHǎ˫.D}}рAWDDH#n5?U!u{ aʃϸU:s]q\ͥ>p)Fm8mwV)Zٳ} }w6?Tmw~o);nQ:GG$DmUDx-%>2m=aq|n=oC?:6( E9$;x?:1q Q~3W0}ŋW$?øøEmptyrZzx~ m,iJ`z^UQEt}RArticlespstύwvutR001rsuzKF _______ _______ ___ ________ _______ _______ ___ _______ ____ | ____| | | | | | | | | | ____| |===:___ ___| | O |===: O | | | | O | | | | | O | ____| | | _|___ K | | | | | | | | | | : | |e |_______|_______|___| |__| |_______|____|__|___|___|___|________|i Hi and welcome to another edition of Phreaking Only. Major changes thissva issue as some people outside Carnage figured that the interface needed improving as they didn't like it. If they still don't like it, don't get it. Phreaking Only is aimed at beginners. Read the disclaimer for more information. This issue features a new interface built on Zebedee's disk structure by Ruiner. It's more like a diskmagazine so you should find the interface pretty familiar. It was completed in a 2 day period so if you find any bugs, don't tell anyone or they'll all wanswCt some. 8) Carnage, although based in the UK, is a multi-platform group. Our members exist both on the Amiga scene and the PC scene as well as on the boards, the demo scene, the H+P scene and others. We cannot be typecast as one thing or another as even we don't know what the sum of the group is supposed to be. To me we are a bunch of guys having phun with our computers anyway we want to and we occasionally give something back to those we encounter. Enjoy the disk. s/A Kei^Carnage is a multi-platform group. Our members exist both on the Amiga scene and the PC scene as well as on the boards, the demo scene, the H+P scene and others. We cannot be typecast as one thing or another as even we don't know what the sum of the group is supposed to be. To me we are a bunch of guys having phun with our computers anyway we want to and we occasionally give something back to those we encounter. Enjoy the disk. xyωR}|{zy'R002rxz dk ________ ___ ________ ________ ___ ________ ___ ________ _______________ | | | ____| | | | | | | ____| | | |===: | | | | O |===: | ____| O | | O | |_____ | -----: _|__|_ | | . . | | ____| | | | | | | : | | : : | | | |________|___|________|________|________|_|____|___|__|__|__|_______|____|__| x{&[ Kei ---===[ DISCLAIMER ]===--- This production was produced by the Carnage crew for informational purposes only. The articles included are intended to educate not initiate. We bare no responsibility whatsoever should any readers take it upon themselves to try out anything stated within the said articles. That said I hope you enjoy this production. If you have any comments or would like to help out then contact ax|`kny of our bulletin boards. Find the numbers. 8) Phreaking Only 7's code, interface, music, gfx and ascii art is copyright Carnage 1996. All other material is copyright by the authors. Phreaking Only can be obtained from any Carnage BBS before it's official release date and any other BBS after the official release date. For this issue, the release date is 23-06-96. It is freely distributable and can be sold in any PD library as long as they list it in their catalogue as 'Phreakingx} Only 7 By Carnage'. Like it says in issue 1, Phreaking Only is intended for people with an interest in phreaking and hacking who wish to know that little bit more than the powers that be wish them to know. Serious phreakers need not read this magazine although I know some do as they keep phoning me up to point out a few mistakes in the text files or that there isn't enough advanced material available. From this issue onwards we are testing a new interface so bare with us shouldx]2' you find any bugs. Kei ---===[ EOF ]===--- h to know that little bit more than the powers that be wish them to know. Serious phreakers need not read this magazine although I know some do as they keep phoning me up to point out a few mistakes in the text files or that there isn't enough advanced material available. From this issue onwards we are testing a new interface so bare with us should~ϊR003r~}4 _________ ________ ________ ________ ___ ________ ________ | | | _____| | | | _____| | | O | _____| |===:___ ___| | | ------: _____| | O | | | | |_____ |K | | | | | | | | | |e |_________|_____|__|________|________|___| |__| |________|i Here are the credits for issue 7 of Phreaking Only: Magazine Code : Ruiner Magazin~n8e Gfx Menus : Kei Magazine Gfx backdrop : WiZzard Magazine Pointer : Merlin Music Module : Shade/ex-CRN Loading Picture : Amida Ascii : Kei Article Editing : Kei Article Supply : Kei & Cage Bug Fixes : Merlin ThanX to Zebedee for his TextFX program used on the loading ascii. _________ ________ ________ ________ ________ ________ | | | _____| _____| | _____| ~ѧ_ | ______| O | _____| _____|___ ___| | | \ | _____| | | | | |_____ | | | | | | | | | | |_________|_____|__|________|________| |__| |________| The guys who worked on this production would like to greet the following: All the Carnage dudes! Dead Head/NFA Dooba/ex-SOC DT214/Void Flecky Flenco/Indy Freak/NFA Furrball/Strobe^Ultima Horror/Indy Jay/Ultima^Void ~S'K Killit/ex-Void Koffin Blood/Syndicate L8-X/GHD Ninj/Syndicate^Strobe Phantom/Syndicate Psionic/ex-SOC Snoopy/Void Sparhawk/Indy Tinbin/Syndicate Violator/APC Ziploc/LOC And all the guys we know! 8))) The guys who worked on this production would like to greet the following: All the Carnage dudes! Dead Head/NFA Dooba/ex-SOC DT214/Void Flecky Flenco/Indy Freak/NFA Furrball/Strobe^Ultima Horror/Indy Jay/Ultima^Void O2L004rvZKAccess All Areas ACCESS ALL AREAS II Computer Security & Hacking Conference 6th - 7th July, 1996 (Saturday & Sunday) London, UK Conference Update v1.00 (01/05/96) - --------------------------------WHAT-IT-IS-------------------------------- Following the success of last years event, Access All Areas II - Computer Security and Hackin͍g Conference, is to be held in London later this year. It is aimed at computer hackers, phone phreaks, computer security professionals, cyberpunks, law enforcement officials, net surfers, programmers, and the computer underground. This will be a conference for people that are interested in various aspects of computer culture. Respected industry professionals, legal experts and computer hackers will be presenting talks about such subjects as illegitimate computer access, telephone &fraud, legal aspects and much, much more. It will be a chance for all sides of the computer world to get together, discuss major issues, learn new tricks, educate others and meet "The Enemy". - -------------------------------WHERE-IT-IS-------------------------------- Access All Areas II is to be held during the first weekend of July 1996 at City University in Northampton Square, London. Northampton Square is located in central London with the Angel being the closest tube statiGon, which is only a short walk from the venue. - -----------------------------WHAT-WILL-HAPPEN----------------------------- A large lecture theatre will be used for talks by computer security professionals, legal experts and hackers alike. The topics under discussion will include computer hacking, phone phreaking, computer fraud, telephone fraud, encryption technology, privacy, big brother and the secret services, biometrics, cellular telephones, pagers, magstrips, smart card tecuDhnology, UNIX security risks, legal aspects and much, much more. Technical workshops on several of the topics listed above, will also be running throughout the conference. An Internet link, being provided for the duration of the conference by Easynet, will be connected to a Local Area Network allowing World Wide Web access, Internet Relay Chat sessions, and Cu-See-Me video conferences to take place. A limited number of connections will also be provided so that conference delegates can connect laptop computers to the LAN. A video projector will be showing various films, documentaries and other unique hacker related footage. A full range of refreshments will be available at the event. - --------------------------------SPEAKERS---------------------------------- This is a provisional list of speakers for Access All Areas II. Additional guests will be announced as they are confirmed. o Bryan Clough is the author of Approaching Zero: Data Crime and the  1 Computer Underworld. Approaching Zero included two incidents of credit card fraud which excited a disproportionate amount of interest and led to his second book Cheating at Cards - Plastic Fraud: Sharp Practices and Naive systems. He will be speaking about Plastic Fraud and More Secure Payment Systems. o Simon Davies is one of the world's leading experts on privacy and technology. In 1990 he founded the international watchdog  organization Privacy International, and since then has led campaigns across the world on a vast range of surveillance issues. He is a Visiting Law Fellow in the University of Essex and the University of Greenwich, and is Senior Research Associate in Chicago's John Marshall Law School. He now lives in London with his computer. o Dan O'Brien hacks the media. His work includes a one man show about his 80's hacking experiences which tr G_ansferred to the West End, writing for Wired, and appearences on TV and Radio as "some sort of expert". He also presents "Guerrilla TV", the BBC 2 show about camcorder activism. He currently edits Need To Know, the British geekzine. He will talk a lot of theory, but promises to include code listings! o Robert Schifreen is a journalist specialising in computer security. He was involved with the Prestel computer hacking case. o D r Alan Solomon is a virus technology expert and founder of S&S International. o The Dark Tangent is the organiser of Def Con, the US hacker convention that is held annually in the unreal world of Las Vegas, Nevada. He also operates the Def Con voice bridge which is frequented by phreaks and Feds alike! o Vamprella hales from sunny California and will be speaking extensively about the recent Tower Records hack in her talk entitled Z "Guilty on Both Counts". - ------------------------------SPECIAL-EVENTS------------------------------ A number of special events are planned for the duration of the conference. o HACK THE BORDERWARE FIREWALL SERVER COMPETITION The BorderWare Firewall Server(tm) is the complete Internet gateway and security system in one. It prevents access by unauthorized users to a trusted internal network while giving internal users the benefits of full acces ~s to the Internet. Border Network Technologies Europe will be bringing along their BorderWare Firewall Server and challenge anyone to try and break through during the conference. A generous prize will be on offer for any successful attack. The Firewall will be connected to the local network, protecting a second network and UNIX system running SMTP and the usual network services (FTP, Telnet, etc). An attack will be judged successfu ̅l if the Firewall can be penetrated and a file can be retrieved from the internal UNIX system. Full rules will be available at the conference. - -----------------------------------COST----------------------------------- The price of admission will be 25.00 UKP cash only per person at the door and will include a door pass and conference programme. - -------------------------------REGISTRATION------------------------------- Registration will take place at tg^"he door on the morning of Saturday 6th July from 11:00am. The Conference will commence at 12:00 noon. Lectures and workshops will run until late Saturday night and will continue on Sunday 7th July from 12:00 noon until 6:00pm. Pre-registration is not available. - ------------------------------ACCOMMODATION------------------------------- A limited amount of accommodation is available for the duration of the conference in University Halls of Residence. All prices quoted are per 5person, per night and include a Continental breakfast. Finsbury Hall : 19.50 UKP Walter Sickert Hall : 30.00 UKP All bookings must be made directly with the University. They accept payment by cash, cheque and credit card. To make a booking call the relevant number... Finsbury Hall : +44 (0)171 477 8811 Walter Sickert Hall : +44 (0)171 477 8822 - -----------------------------MORE-INFORMATION----------------------------_v- More detailed information about the event, including a map of the area, is available on the Access All Areas web page... http://www.access.org.uk An Access All Areas mailing list has also been set up for general discussion about the event. To join the list either visit the Access All Areas web page and use the automated form, or send an email to majordomo@access.org.uk with the following in the body of the message... subscribe aaa-list your.name@your.domain.c$om If you have any further questions about Access All Areas II, please contact one of the following... Email : info@access.org.uk Web : http://www.access.org.uk Tel : +44 (0)973 500 202 Fax : +44 (0)1428 727 100 he list either visit the Access All Areas web page and use the automated form, or send an email to majordomo@access.org.uk with the following in the body of the message... subscribe aaa-list your.name@your.domain.cGtB2YW026r*$NEC P3 ---===========================[ NEC P3 ]==============================--- The NEC P3 is the most popular cellular phone among phreakers so just for you here's some info on the P3. -=- NEC P3 Pinout & How to Build a Modem Adapter (Written in crappy english by SkioS, 1995) Well if you've got a NEC-P3 and want to use it with your modem I hope this file helps you make the wirings... you'll need some electronic skills... First you hav+Fe to buy one of these lighter adapters in order to get a connector for the phone, most of them will come with all the pins and are quite easy to open (usually just two screws). If you're lucky pins will be already numbered on the adapter, if not use the following pinout: _____________________ / /| |--------------------| | As seen when you get the cable (NOT the phone !!) | 6 1 _ | | and look at it from outside (before opening it) | hn (_) | | | 12 7 | | |____________________|/ Pins are as follows: 1 - Audio out (EAR) 2 - Audio out (EAR/SPEAKER) 3 - Audio out (SPEAKER) 4 - SDATA (Serial Data) 5 - No Connect 6 - VCC (+8v) 7 - No Connect 8 - Audio in (MIC) 9 - GND 10 - BUSY +ں11 - SCLK (Serial Clock) 12 - GND As you see Audio is sent out on several pins. The most usual is to get it from pin 2, but I *guess* you can get it also from pin 1 for modem usage. Also you'll have to make 2 pullups on pins 2 & 3 to let the phone know it's attached to an external device and stop using its own ear, mic & speaker. Do it as follows: 3-----/\/\/\----- Vcc 2-----/\/\/\----- Vcc 1 k | 47 k ә | |-----> Audio Out Well, once you know how to get audio in & out from the phone just get that file from DaveX on how to build a modem andapter for the Motorola phones and build it just the same. You should use capacitors in order to provide DC isolation. It's also a good idea to power the phone from the adapter, that way you won't run out of batteries :)) If you've got any doubts or comments just leave me a note (SkioS) on some board like Arrested Development, Hackers Haven or DAC-UK... Have fun !!! -=- P3 Test operations and more. ============================ Orignal Text file name for Upload is P3TST001.TXT (P3 TeST Manual) compiled and uploaded by Jono Bono (or soon to be just Jono) if you have any further information to contribute please add it then re-upload this file as the next avalible number. i.Ge. P3TST002.TXT etc. To SYSOP, please ensure any future uploads and amendments of this file have been done correctly. i.e. The file is still laid out in the same way with all instructions including this top section. Thanks ....JoNo. *** If you have examples of how to make use of some of the comands, please add them to the end of this file under the "Notes and Examples" section or put them in another file ***. ALSO... Please keep this file as basic ASCII (i.e. keyboard ASCII textXk, only) and keep each line to a maximium 77 chars (i.e. last character in a long line would be in column 77 on your text editor), so that users of all different systems can view it and edit it. If you want to print this file then you may need to space it into 66 line pages (dependant on Printer and/or System). Please "do not" include this spacing in any altered files that you may re-upload. **** leave the above intact and change the line below if you re-upload **** Current File  "m= P3TST001.TXT dated 24/09/94 uploaded by Jono Bono (Jono). ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ Useful information that relates to the modified test chip avalible for the NEC P3 mobile phones (May not cover all avalible commands). Please note: The contents of this entire document are for informational purposes only and must not be used to break any laws, if you use any of this information you are soley responceable for you own actions. OK! H Qere are some of the new and most useful commands. ================================================== To enter the phone's serial number and phone number. ---------------------------------------------------- Power On, Enter ESN (11 digits) on keypad then STO 69, the phone should now switch back to the display. (DO NOT enter eleven 0's sto 69, this will disable the phone completely and beyond normal reset, can be useful ). Note: If you ever need to use the eleven 0's then don'  Yt throw your phone away as there still are ways to reset it. Then press RCL *, RCL # 01 (test mode entered), RCL #71 and the phone number will appear. Just enter the new phone number. i.e. providers code (4 digits) and then number (6 digits). The provider code translations are as follows; (please add to this list and re-upload this document, thanks). (0374) = 2345 (VodaFone) System A. (0378) = 2343 (VodaFone) System A. (0831) = 2344 (VodaFone) System A. (0836) = 2340 (VodaFone) e System A. ----------------------------------- (0585) = 2349 (Cellnet) System B. (0850) = 2346 (Cellnet) System B. (0860) = 2342 (Cellnet) System B. Press # for the rest of the phone menu or just to ensure that the number has been stored. The only other item that needs to be changed is SYS=A or B. You can also change the real numbers prefix, but this is only for "real" number display purposes on the function command. i.e. FCN 33 will display 0836-XXXXXX or whatever, but the phon ٔe's number according to the cell system is really 2340-XXXXXX. You may also wish to play with the other settings, but please note the originals before doing so. Once you have altered all of your settings, (note pressing # stores the setting, and moves to the next) press and hold CLR once the display is blank, press RCL # 02 to reboot the phone. Alternatively, you can just press PWR to turn it off, and PWR to turn it back on. Any further information on these extra options will benM appreciated. (Please note them here and re-upload this document). The lock code is obviously just the phone's lock code, however, it doesn't serve much good with a modified P3 rom, since one can jump into test mode from full lock! And then change the lock code....(You must enter test mode by pulling out the battery, and quickly putting it back in.) Home area has many possible values, however, for the purpose of the general Cellphone Phreaker, only three are used. If you have a VoD)dafone ESN^MIN pair, then enter 02051 here. This essentially means that you can receive calls on the other person's number.....The other values for home area are simply to tell the Cell where you live in the country. If you have a Cellnet ESN^MIN pair, then enter 03600, and if you don't want to receive calls, enter 00000. Note that if the other person has there phone turned on at the time that you use yours for incoming calls, then the Cell will automatically kill the ESN^MIN pair. ORoam is for future use, and will not be used....It is basically for phones with Dual Nams, so they can use both Cellnet and Vodafone on the same ESN^MIN pair. Timer SW. This should always be on Voice CH. This is basically how the Cell will charge you fo the calls.....Voice CH works on both Cellnet and VodaFone, but Charge RT only works on Cellnet....This tells you how many units you have spent (Using FCN 1 menu.) Priority should basically be set rather high. If your local Cell is b8FXusy, and there are no free cells, and you have a priority of 15, then someone else will be disconnected, and your call will be allowed! Call Timer. This serves little for the Cellular Phreaker. It is best to leave this on Call Out. The function only is significant to those who actually pay the phone bill! To make the phone scan all avalible channels (Voice only). ========================================================== Later in this document will be some test commands, to enter tXYest mode on the modified chip you will always need to enter the ESN again, then RCL * and RCL #01 for test mode. (NOTE: There is a faster way of entering the test mode by simply removing the battery and quicly putting it back, the phone will go into test mode.) To Scan (Once in test mode) press RCL # 12 (Speaker on), RCL # 69 then 4 digits (channel to start), then # (see this option in test manual text later in this document for more details). Use * to pause. i.e. If you ente>Fr 0001 as the channel, the phone will start scanning each channel from 1 to 600 and then 1329 to 2047. As soon as you hear voice you can press * to stay on that channel and * again to move on. Start of Test Commands. ======================= These are listed as they are in the test manual, but please note that some commands may be different or act differently due to the modification on the chip. --------------------------------------------------------------------------- Taken from DQ>CU: 0708A Top of page reads: 147-102650X322A TR5E1320-22A APPENDIX A Test commands - - through keypad. NOTE: Enter each command by pressing RCL key, # key, and the proper command number. Some commands require additional numbers after a hyphen followed by the # key. RCL, #, Number RCL, #, Number, Additional Number, # When you enter the commands through the keypad, always give SUSPEND command (RCL, #, 01) before you press other commands except STATUS (RCL, #, 03) and STATUS REPEAT (RCL. #, 61, 1, #). 0---------------17--------------33-----------------------------------------77 ^ ^ ^ ^ Above is the coloumn ruler where each of the next sections starts and ends. Most remark paragraphs start at col 33 unless the Function name is long, then it will start at 1 or 2 spaces after the Function name. Notice that no chara- -cter is placed after col 77 (max). Key Entry L~ Function Name Remarks ========= ============= ======= RCL, #, 01 SUSPEND All dots come on (not on Modified test chip) It terminates the normal mode, performs initialization and awaits further test commands. RCL, #, 02 RESTART It teminates the test mode, enters the normal mode and restarts the call processing tasks. oF You hear a wake-up tone and momentarily the phone number appears on the display. You are now at receiving standby mode (normal mode). RCL, #, 03 STATUS It shows the status information of the unit by 16 digits on the display. ---------- ---------- Example: 119110 AAABCD 0003100363 EFG6HIJKKKK ---------- ---------- Where: AAA: Shows RSSI (Receiver Signal Strength) Value ranging from 000 through to 255 (3 digits). B: Shows RXM (Receiver Audio Mute) or Receiver audio gate on/off. 1 = muted or gate off. C: Shows TXM (Transmitter Audio Mute) or Transmitter audio gate on/off. 1 = muted or gate off. D: Shows WS (Word SynDchronization) in FOCC. 1 =WS acquired. E: Shows B/I (Current state of the busy idle bit of FOCC). 1 = idle 0 = busy. F: Shows CARR (carrier) on/off. 1 = off. G: Shows ST (Signalling Tone) on/off. 1 = ST on. H: Shows SAT (Supervisory Audio Tone) on/off. 0 = 5970Hz, 1 = 6000Hz, 2 = 6030Hz and 3 = No SAT. I: Shows MODE. 1 = Control chann el, 0 = Voice channel. J: Shows Transmission Power Reduction Level. 0 = No reduction. 1 = No reduction. 2 = No reduction. 3 = -4dB. 4 = -8dB. 5 = -12dB. 6 = -16dB. 7 = -20dB. KKKK: Shows Channel Number, ranging from 0000 through 06UB00 & 1329 through 2047 (4 digit). RCL, #, 04 RESET Reset the autonomous timer to zero. RCL, #, 06 INIT Initialize the transceiver unit to the following state; Carrier off. Attenuation 0dB. Receiver-Audio muted. Transmit-Audio muted. Signal%ing Tone (ST) off. Autonomous timer reset and it's periodic. SAT off. DTMF and Audio tones off. Received-voice Volume Max. Compandor off. RCL, #, 07 CARRIER-ON Turn the TX carrier on. RCL, #, 08 CARRIER-OFF Turn the TX carrier off. RCL, #, 09 LOAD-SYNTH Set the synthesizer to the channel specifiQ@ed by up to 4 digits followed by # key (up to 4 digits = 0 through 600, 1329 through 2047). --------- --------- Example: TEST MODE TEST MODE Pressing 333 and # 09- 09-333 --------- --------- RCL, #, 10 SET-ATTN Set the RF power attenuation to the value specified by 1 digit followed byyA the # key (1 digit = 0 through 7). ---------- Example: TEST MODE Pressing 4 for 8dB reduction 10-4 ---------- 0 to 2 = No reduction. 3 = -4dB, 4 = -8dB, 5 = -12dB, 6 = -16db, 7 = -20dB. RCL, #, 11 RXMUTE Mute the receive-audio signal. No audio signal comes from the speatJker. RCL, #, 12 RXUNMUTE Unmute the receive-audio signal. Noise or Voice comes from the speaker. RCL, #, 13 TXMUTE Mute the Transmit-audio signal. RCL, #, 14 TXUNMUTE Unmute the Transmit-audio signal. RCL, #, 15 RESET OFF Discontinue periodic resetting of the autonomous timer (allow timer to time out). RCL, #, 16 STON Transmit a continuious Signalling  :nTone (ST). RCL, #, 17 STOFF Stop transmission of Signalling Tone (ST). RCL, #, 23 VERSION Show the software version-information on the display. ---------- V-2.0 (V-9011) ---------- RCL, #, 24 READ SN Show the production serial number of the phone. i!3.e. ---------- Serial No. 22A-000001 ---------- RCL, #, 32 SATON Enable the transmit of SAT. One digit follow- -ing the command code shall contain the color code of the SAT frequency that the transceiv- -er unit may expect to receive. SAT shall" 4I0 be transmitted if the carrier is currently on. COLOR CODE DIGIT. SAT FREQUENCY. ================= ============== 0 5970Hz 1 6000Hz 2 6030Hz RCL, #, 33 SATOFF Disable the transmission of SAT.#kĞ RCL, #, 34 CDATA Transmits 6 bytes NAM data as 240 bits data. DEFAULT = 01, 02, 03, 04, 05, 06 (No TX ON). RCL, #, 35 HIGH TONE ON Activate the high audio tone (1150 Hz) and apply it to the receive-audio line. You hear the high tone from the speaker. RCL, #, 36 HIGH TONE OFF Deactivate the high audio tone. Tone stops. RCL, #, 37 LOW TONE ON Activ$yΕate the low audio tone (770Hz) and apply it to the receive-audio line. You hear the low tone from the speaker. RCL, #, 38 LOW TONE OFF Deactivate the low audio tone. Tone stops. RCL, #, 39 INVM Initialize non-volatile memory. Set registra- -tion memory and clear all the speed-dial memories. Set the Lock State to activate %N[3 (Fully Locked). RCL, #, 42 DTMF ON It sounds DTMF tones, a responce from each pressed key. It sends the signal to RX AUDIO and TX AUDIO lines. RCL, #, 43 DTMFOFF Deactivates DTMF generator. DTMF tones stop. RCL, #, 48 TONE-OFF Deactivate alert tone and external call alert. The alert tones stop. RCL, #, 49 TX-DISE &_ Deactivate TX ENABLE line. Disable the transmitter. RCL, #, 50 STATUS REPEAT Status Repeat at Test Mode. (TEST MODE) RCL, #, 51 MON Monitors the port status. " ABCD" (Mid line of LCD display). A: HOOK 1 = ON HOOK B: EXT PS 1 = BATTERY MOUNTED C: ADP MON 1 = AD'V APTER CONNECTED D: HF MON 1 = HANDS FREE RCL, #, 57 TX-ENABLE Activate TX ENABLE line. Enable transmitter. RCL, #, 60 AUDIO PATH Set the Audio Path. " 60-X" (Mid line of LCD display). X: 0 = HF 1 = SPK 2 = ALT 3 = HS RCL, #, 61 STATUS-REPEAT Wit(Ahout suspend. It shows the status information of the unit by 16 digits every second. ---------- ---------- Example: TEST MODE TEST MODE Press 1 and # for display on. 61- 61-1 Press 0 and # for display off. ---------- ---------- After the setting, press RCL, #, 02. The wake-up tone and display co)bme on. The 16 digit status information appears. ---------- ---------- Example: 119110 AAABCD 0003100363 EFGHIJKKKK ---------- ---------- Where: AAA: Shows RSSI (Receiver Signal Strength) Value ranging from 000 through to 255 (3 digits). B: Shows RXM (Receiver Audio Mute) or Receiver audio gate on/off. 1 = muted or gate off. *}ഊ C: Shows TXM (Transmitter Audio Mute) or Transmitter audio gate on/off. 1 = muted or gate off. D: Shows WS (Word Synchronization) in FOCC. 1 =WS acquired. E: Shows B/I (Current state of the busy idle bit of FOCC). 1 = idle 0 = busy. F: Shows CARR (carrier) on/off. 1 = off. G: Shows ST (Signalling Tone) on/off. 1 = ST on. H: S+&:>hows SAT (Supervisory Audio Tone) on/off. 0 = 5970Hz, 1 = 6000Hz, 2 = 6030Hz and 3 = No SAT. I: Shows MODE. 1 = Control channel, 0 = Voice channel. J: Shows Transmission Power Reduction Level. 0 to 2 = No reduction. 3 = -4dB. 4 = -8dB. 5 = -12dB. 6 = -16dB. , 7 = -20dB. KKKK: Shows Channel Number, ranging from 0000 through 0600 & 1329 through 2047 (4 digit). RCL, #, 69 SCAN SLOW Measure the Received Signal Stength Indicati- -on (RSSI) signal at each channel. Shows each channel number and it's RSSI level on the display. Example: ---------- ---------- TEST MODE T-uEST MODE Simply press # key or 69- 69-1 press channel number and #. ---------- ---------- To activate the SCAN SLOW command, press RCL. # 69, XXXX, #. Where XXXX = starting channel number (1 through 6000, 1329 through 2047). If you don't enter the channel number and press # key, then the channel will begin from 0001. The unit measures the R.l1SSI at each channel, scanning from the channel number you set. The scanning speed is 0.5secs per channel. The unit shows each channel number and it's RSSI level on the display "XXXX-sss" (On Mid line). ---------- TEST MODE Where: XXXX = Channel number XXXX-sss sss = RSSI ---------- Pressing * key while scanning causes the unit to pause/ŕE_. Pressing * key again resumes scanning. To end scanning press the # key. The radio channel will be fixed at the first channel number and is ready to accept other commands. If you press other keys other than the * or # the unit ignores them and gives back a short alarm tone. RCL, #, 70 KEYPAD PROGRAM2 Allow you to do NAM programming via the keypad. See appendix C. 0z(t RCL, #, 71 KEYPAD PROGRAM1 Allow you to do NAM programming via the Keypad. See appendix C. NOTE: This file contains the reference from Appendix A only. If you have or can get information from appendix C, please add it to the end of this file. RCL, #, 72 I/O DATA OUT Writes data (0-255) or I/O (0-127). Address is 00FF00H-0FF7FH 1ǫ6OXXX YYY (Mid Line) XXX = Address YYY = Write Data RCL, #, 73 AEC ON Turns AEC (Automatic Efficiency Control) on. RCL, #, 74 AEC OFF Turns AEC (Automatic Efficiency Control) off. RCL, #, 75 CDATA OFF Stops CDATA transmission. RCL, #, 77 LOAD SYNTH 2 CH assignation to TX/RX synth. "TXXXXRYYYY" (Mid Line). 2u! XXXX = TX channel YYYY = RX channel RCL, #, 78 SET DEFAULT DATA It writes default data into AF IC & EEPROM. RCL, #, 79 WRITE ADJUST DATA It writes to AF IC and EEPROM the adjust- (MAX DEV.) -ment data that specifies the MAX deviation for each unit. RCL, #, 80 WRITE ADJUST DATA It writes to AF IC and EEPROM the adjust- (EXT IN) 3)skh-ment data that specifies the EXT IN data for each unit. RCL, #, 81 WRITE ADJUST DATA It writes to AF IC and EEPROM the adjust- (DTMF) -ment data that specifies the DTMF data for each unit. RCL, #, 82 WRITE ADJUST DATA It writes to AF IC and EEPROM the adjust- (MIC) -ment data that specifies the MIC data for each unit4mdp. RCL, #, 83 WRITE ADJUST DATA It writes to AF IC and EEPROM the adjust- (TX DATA) -ment data that specifies the TX data for each unit. RCL, #, 84 WRITE ADJUST DATA It writes to AF IC and EEPROM the adjust- (SAT) -ment data that specifies the SAT data for each unit. RCL, #, 85 WRITE ADJUST DATA It writes to AF IC and EEPROM the adjust- 5˶F (RX DATA) -ment data that specifies the RX data for each unit. RCL, #, 86 WRITE ADJUST DATA Sets power level and specific data of each (POW LEVEL) unit in EEPROM with 7 byte.(P0-P7, Spec, Data). Specific Data: Fine adjustment of output power level. Example. RCL, #, 86, ___ #, ___ #. RCL, #, 87 WRITE DAT65A(RSSI) Writes A/D transformed data of +10dBuV to EEPROM to set at the position between block two and three of the RSSI indication. (between **--- and ***--). RCL, #, 88 MOD TRACKING ADJ VCO Modulation Senstivity. RCL, #, 90 BATT Shows the A/D converted value of the battery Voltage. " XXX" (Mid Line). 7E XXX = 0 to 255. (0 = fucked!). RCL, #, 91 TEMP Shows the A/D converted value of the Temperature inside the unit. XXX = 0 to 255. (000 = fried!). RCL, #, 94 COMPANDOR ON Set the compandor circuit on. RCL, #, 95 COMPANDOR OFF Set the compandor circuit off. RCL, #, 99 KEYPADPROGC++ Write applications to run with the Intel 80386, 4868!l family of processors via the units keypad. Example: Write DOS and Windows applications in C++, write a Bluebox prog etc. Refer to the P3 C++ prog ref for further info also refer to DOS and Windows references. Note: This function only works with the P3 I/O card f9Tsor connection to the CPU of a PC. Note: All information given in this file is from Appendix A of the P3 Test ROM manual, it is documented as per appendix A apart from the last couple of remarks under BATT and TEMP (i.e. Fucked! and Fried!) also the last test code 99 is a load of rubbish, well after writing all this long boring tech file about a phone that can do everything! I could resist added it! . Notes and Examples. =================== This section has been put here for you :ORto add further notes about funtions you have found. Then please re-upload as next revision. ---------------------------------------------------------------------------- i.e. 1) Using the Phone capture other ID's. (I wish). by DREAMER. In test mode use RCL, #, 98 and take down all the information that pops up every second. *** Example only, put yours like this below ***. ---------------------------------------------------------------------------- -;ѩgt=- -----//-> [ELLpHoNE [rAcKiNG [oRpoRaTioN <-\\----- The following text contains all the info required to Re-program your P3's ESN and MIN. First the Cable:- Instructions for Wiring and Connection of PC to NEC "P3" Unit. Note: Connections are made via the PC's "Printer" Port - LPT1 Pinout for P3 Eliminator plug viewed from the Solder tag side. Pins are as follows: 1 - Audio out (EAR) 2 - Audio out (EAR/SPEAKER) <s3 - Audio out (SPEAKER) 4 - SDATA (Serial Data) 1 2 3 4 5 6 5 - No Connect o o o o o o 6 - VCC (+8v) O 7 - No Connect o o o o o o 8 - Audio in (MIC) 7 8 9 1 1 1 9 - GND 0 1 2 10 - BUSY 11 - SCLK (Serial Clock) =ӽT 12 - GND P3 cable connection pinout. 25 Way 'D' (Male) - P3 Adapter Plug Pin - 12 Pin - 4 Pin - 13 Pin - 10 Pin - 15 Pin - 11 Pin - 25 Pin - 12 Link the Following Connections in the 25 Way Connector as follows with Signal Diodes. (1N4148) Pin - 3 ----[ | >BSc]---- Pin - 12 Pin - 6 ----[ | ]---- Pin - 13 (+) ----[ |< ]---- P3 cable connection diagram viewed from the Solder tag side. 25 Pin D-plug Eliminator Plug (Male) Eliminator + Volts ::::::::::::::::::::::::::::::::::::: : Pin 3 ::::::|<1N4148:::: : : : Pin 12 :::::::::::::::::::::::::::::::::: : ?W+ : : : : o o o o o o Aerial Socket--> O o o o o o o : : : : : : Pin 13 :::::::::::::::::::::::::::::::::: : : : : : Pin 6 ::::::|<1N4148:::: : : : : @nPin 15 :::::::::::::::::::::::::::::::::::: : : Pin 25 :::::::::::::::::::::::::::::::::::::: : Eliminator : - volts ::::::::::::::::::::::::::::::::::::: Note Diode Protocol: Cathode (+) ::::|<1n4148::::: Anode (-) Eliminator +/- volts connections are optional, but save your battery. Connect a 12 power supply to the Lighter adapter plug, centre pin is + volts cAPonnection. Parts list:- P3 eliminator Cable(The one that plugs into the bottom of phone with all pins, some only have 2 pins, avoid these!) 1N4148 Signal diodes. 25 Way Male 'D' Connector + cover. 5 core screened cable. NEC P300 NAM programming: Note: Write down all the Nam settings before changing any values so the phone can be returned to original settings if required. ACCESSING PROGRAMMING MODE: 1. With the power off connect the NEC programming aBؚdapter. 2. Turn power on. 3. Run Read.exe 4. Note Number on Display (Current ESN). 5. Press and hold CLR till display shows TEST MODE. 6. Press RCL # 7 1. 7. Press # to increment and store each step. 8. At any time press and hold CLR to goto TEST MODE display. 9. From TEST MODE display Press RCL # 0 2 to Reset phone. PROGRAMMING DATA STEP# #OF DIGITS/RANGE DISPLAY DESCRIPTION 01 10 DIGITS Phone No. MIN (AREA CODE & TEL#) 02 C~ê4 DIGITS Lock Code LOCK CODE 03 00000 - 32767 Home Area SYSTEM ID Cellnet=03600,Vodafone=02051 04 0 OR 1 Sys Select 0=Vodafone,1=Cellnet (0=B, 1=A) 05 4 Digits System No. Dialing Code i.e. 0850 06 0 OR 1 Roam 0=No,1=Yes (Always 0) 07 0 OR 1 Timer SW. 0=Charge RT,1=Voice Charge (Always 1) 08 00 - 99 Priority Normally about 9,set it tDDo 15 09 0 OR 1 Call Timer 0=All,1=Call out (set to 0) LOCK & UNLOCK: F 6 four digit code then press 1 and scroll with volume keys to select: Normal, PL (Partial Lock), FL (Full Lock), press STO to store. ESN programming: 1. With the power off connect the NEC programming adapter. 2. Turn power on. 3. Run Read.exe 4. Note Number on Display (Current ESN). 5. Press and hold CLR. 6. Press RCL # 0 2.(To Reset phone) 7. Run Chip.exe 8. Press P toEۗg> select P300 9. Type in ESN, Format= AA/BB/CC/DDDDD 10. Press Enter. Thats all the info you require to program the Nam, the ESN and to make the cable required. I have included a file on the Test Rom functions (P3TST002.TXT) which has some other info that is Helpful. Also included are the programs Read.EXE and Chip.EXE for reading and programming the P3's ESN!!!! Some other files which are of use are:- P3UTIL09.ZIP by Skios P3MODEM.ZIP by Skios Available from all good BBS's Fzincluding DAC-UK, Vicious Circle II and Orbital. Greets to: T-force, Phoenix, The Bitch, Hagar, Blackthorn, Rob/CSL, Pulse, Scribla, Smurf Skios, Sir Snooze and not forgetting Smeg Servant!!!! If you have got any questions, comments etc leave me (TuRbO) mail on any of the BBS's mentioned above! [*] TuRbO [*] [*] FaSt WaReZ/CCC [*] -----//-> [ELLpHoNE [rAcKiNG [oRpoRaTioN <-\\----- Note: The creators Gn of PHREAKING ONLY place this and similar texts here to satisfy your curiosity as to how certain phone techniques are done. We can not be held responsible if you TRY to use any of the information written here. ot any questions, comments etc leave me (TuRbO) mail on any of the BBS's mentioned above! [*] TuRbO [*] [*] FaSt WaReZ/CCC [*] -----//-> [ELLpHoNE [rAcKiNG [oRpoRaTioN <-\\----- Note: The creators pN38libsp߆YR7Menu5pв ____________ ___ _______ _______ ______\ | / | | | | | _____\ | / :===: : | | _____|\ : / | | . . | O | | > < | | : | | |/ : \K |___|__|____|_______|_______/ | \ /_____|____\ INDEX *H$I/,n0N,_JgXp'"</,n(N:,_Jg<&@<->**g <r j/,n,N,_&g|&'@ m h <"<22/,n,N,_(B@H@"afH0"BAHAaTL (*Jg`&<"ƒg `40f0< 4SB7B7@(7F7G*AL'H,At'H07mpv4-g"J-6gB|,4"-- rN& K"HG r N&E`@ Jg/+//,N%POJg``R;["/(,m,n4N"B/HxBHm/HmHmHmHm/-aO,J@g mRP SJn&m"J,k(NN&m",k4N$m&o0"$ ,j4NJf""/,,j4N",j4NA"$-,j4N~ Gc+@Jfdr$ ,j4N -JjD`pLLN]NuNUH32&HA"$<,k4N.Jg"N,`"t,k4N‘+H+H+H+HC+I+|+Hp+@Hx/HmN"bO A"C$ E& ,k4NJgF -gJg @"7A~ m 7@ -gJg @"7A m 7@",k4N",k4NRfD",k4N"NLLN]NuENV:sys/diskfontXDPI/N,YDPI/N,XDOTP/N,YDOTP/N,SYMSETNUH/2&IHA+HC(*.,;|+H+H+I"-,m,n4N KJfS/@$"tn/ HmN Hx.HmN!O&@ AJgHz/ N rPOJfnHz/ N PPOA"t,m,n4N(BA",m,n4N*JgrtN+@g "N"$-NJf|` *JjnA/H ",k4Nj.JgT P$@p0* f& <rHA,k(NT&@ g m B+K mXHm//H0NvHz//4N.0//8NO o(JfS( rF;AmP7jJ*L@p*M@p7@*Lg+j;@`RmQmA,m,n,NJf0-gT mmR@7@+jH"< KE` K"J""PA,m,n,N&@ fB;|R&m +g",k4Nd~&m$m"$ ,k4NJfr,k4N|rtҁfdJg;|`JgR "<NXr,m,n(NT+@g02- @0"1AE&m`A"Jp@"Q&S f$mJg ",j4Nd&m` S/H "K,j(NN&o f",j4N&m gr$ N"N"/$N -LLN]Nu.font.otag/H2&N$I"J,k(NNLLNuNUH72&m$mBz/- HmN@A",k4N.//@,N&Hz//0NJOA"$<,k4N.Jg"A$vNQfp fd"tvN"vN"-fH ",k(NT+@Jg2$"&-N#",k4Nְf|$B` gg -ѪRP -戼e <r m,k,N$@ gJg6 l/(/ NJPOJg""l Q/ /H$N XOB"o ,k(NbJfH/ HmNHzHmN&OCp,k(N$@ gf/ NXO)@f "J,k(Nb`LB/-/</- /</,NOJg$"l Q/ /H$NvXO"o ,k(NbB`zJg ",k4NJg"m,k(NN+H -LLN]Nu.otag.library.fontNUH?2&m>-p0A pp0,"r2*/H( gD0(""k^$I;@f*B"ҁ"kf,It<"kb,I2(h< `hp0-r2-$HBBB,$$H4*6*(B2*BDHH-gg JDnRm`@nRm Ѐ"kf2"kb20*2*4* HHH0,@c"r2v6JjRr2-҃;@;At4v6, (؂*t4p0-(؅4-H¸o;D`4-Hºl$;Bt4*Ԃ8"j $It42-Ht4r2,$ NZЀr2-ҁ"kX&I0-;@`p o(0(*rʁ 2(@;A`2pmr$@p0$&Bt4&ᣇTTpm0-J@n o(0Hr2ҁ m$Hp0,$Ѐ m&HSm+J+K0-J@nn0,*@Q;fv)F&2-4-9A,9B.``p;@2,*Gfr9@.9@,)A&,܆p @g Gf kb"H2`&  k^ & kf0,,0 kb0,.00-LLN]NuNU`H?:I&mBBm`0-HABRm mm$H+J+H)H m(f /HmnNHx.HmnNjO$@ f$m` |BHmn/- / a`O $@+J f$m` V$m|m <rDҁ J,k,NrHҁe|m <r JNJgm <rHҁ JNrPҁem < JNJg @"($BBHB;A;B` ;k~;k < JN$@ g *"BAHA$<Ā;A6]2;B` ;k;k~$m*g < jNJg @"($BBHB;A;B < jNJg @"($BBHB;A;B <r jN.Jf <r jN. <"< mN+@JfH9j*g;|p;@;@ < r mN$@ g>~>Jg60Hްlb(`ST2lSDHHJ^DHH€f;j~$m`$0*md;@ްlb mc;@Rp m0(m0-2-ܲ@ct4`r2$JBg9B`0- @g9@p0-r2-t4-6-/B0tH/@( /A,"/0N"/,N"/(Nr2-\Z6-;@ Nr2,HABA.;@`Fp0-r2-t4-/@( /A,rHN"N"/,N"/(NrH@H9@$m*gJmBHx/<$/,NdOJg"BHx/<$/,NHOJgmAn"HJfS Hz/N&POAn+H;l-m*@B-+|p0-r2-HABA,+F+|p0-r2-HABA*+EBA+HA,k0N+@JgT @"Y"@ i/H,/ "AA$o0$j N$_ @f$m g"JN+J$m`"mNx$m`0*lfn0*gDr2 < J <,k,N 4Jg @"($BBHB0-f$/- m// / NO+@g$m`|Rp m0(mt$m < r J,k,NJgH < r JNr2-t4-v6,/A,"NB"N"/,N.B@H@9@`B < r JN"t4-/A,"NrҁNJ"/,N"<@N89@J@f&p0-2,/@( "/(NrN9@J@f9|B//<//<//</,NݸO Jg$m`\$m*gN-mfF < r m,k,Nf,BHx /<Hxu/</,N\OJfm*gP-mfH < r m,k,Nf.B/</< HxF/< /,NOJfmp9| ";@;@;@;@;@;@;@;@`H mfBHx%/</,NܮO(`0-HB//</,N܎O(JfBHm/< /,N܀OJf0-H mC#Jhg m0(r2(?@(H(0-Hl ;@0/(Ht4( v6ւ(0-Hl ;@0-raAmBrzAn<2(Ht4(v6( Ђl0(ClRmRmRm` 0(ClRm0(m0-l"l9@"mo @g;@Rm mo0-l"T@2-4-H9A H҂(r2,H(o t4&RJvփ rN,r2, 9A 0/(l$m`r2-t҂ rNЀ2,4/(&HցrbFց(D9@$ rHA,k(N:$@ f$m` J !|pdNu$J +J5|C",m// /H2NPO0,5@JmmL| M2, SA5APr5AR4,"BV4-BW6,$5C\ o*Cv%I "t ҂%A^4/(&H҃%Ab&Hփ҃%Af҃%AX @ !G!|!F !|!Er!A!A0,$H4-RBv6A!8.v6,9@$p6-H9B*l0-vCl2-Cl Al~`~p0"t/B// abO2,";@;A`,0-r2p0-$v//// aBC0OmRm0-mo < r m,k,NJg0,r2,"4-H”.R";@;A`F0-HЀ jf"jb02@0-Alp0,,T;AHo ;@`$mSm0-J@j0-5@NB*M ;@`0-HЀ J"hf$I2"hb04-H,h^$<Ė6-A@H?@, JjR?@(H.0/,&BAmH҇6/(;A"C;A`6/(CHЇ;@;A0-J@j62-B.Ho*HDo0-HЇ;@;B`J0-mr;A`:J@o62-B.Hl*"DHo0-HЇ;@;B`0-mr;A42Sm$m0-J@j`80,"rnAb( mnm rim2pnЀ jf"jb02@9A5lN ,g"@ Q//H,N*XO"o(,k(NbJg "m,k(NN g/ / NfPO+@Jf "*,k4Nd$m f(0-"H//-/-/-/-/- / NO$@ -gg "@,k0N L\N]NuNUH2&m A'H@0+J2+P@eS@7@Pp+M@M+Lgp+L@@L$k` U'@A6/H "J,m,n0NJg(,m,n(N|/ /-N.,m,n(Nv /`pLLN]NuFONTS:NUH2&m $m/ HmN A",m,n4N./N O A",m,n4Nj. P&@ Qg8 kfA/-/HNN ./-aO $@ f",m,n4Nd LLN]NuNUH72&m >-<-:-,m,n(N|"m i0$H`JEf pC*Jg0*kfp+r*fBm+g <r k,m,n,N+@gj;| j <"< h ,m,n,N+@g>p0-2-4+/@ "/ N tr2-4-6*/@ N Z fJmf$ j(g J"S,m,n(N$@ f gRj,m,n(Nv `,m,n(NvBm`0- m$H0*kfp+r*fJGg+gJjg <r k,m,n,N+@glp*a0*"< J <r,m,n,N+@g>p0-2-4+/@ "/ NLr2-4-6*/@ N2 f/- // /-a2O$@ g `Rm0-FmpLLN]NuNUH0&m$m >-<- JC""";j Hr2/-Hx///-Hm/ a^OJfp0*Ѐ;@ Hr2/-B///-Hm/ a(OJfz*f20*H;@ Hr2/-B///-Hm/ aOJf@-g"A`Jg"A`6g @`$pL N]NuNUH2&m>-",;|$m RfPBm`<0- mC CY/ "@ m,k0N$_Fo ,0-;@Rm0-jm`Bm`n0- mC Y$@0(g(r2 </ "J$H m,k0N$_*`/ "J m,k0N$_*Fo ,0-;@Rm0- mhm0-J@kF m$H/- m// / aO/@Jg$m" g "J,k0N /`Bj0-J@j -LLN]NuNUH72&N+H mC""" m",k4N+@0-f;|AP/H$,k(NzA,k0N/@ JgD @C" Y"h/I,/ "AA$o0$j N$_* Ef o$,k(N / `\$mHx:/NbPOJg/HmNPO`$HzHmoq6NPOA"$&<,k4NBm;|A"$<,k4N.Jgp"A$vNYfTp0- f@0-,Jg2 r,k(N:$@ g "$ &,k4Nְg"B ,k(N.",k4N+J fBm gGr&a.a& :|g "@,xNb :|g"@Nb.zJL|Nu  GSg`CDrQ !H@<?gH ᘰ|ongH@off*g infog`&a4NuaNu"-A$&<c,zNNu(-"A$v,zN"-A$&<NSfNu :H@<?g ᘰ|ongH@off*ginfog"A$v N m hv$"NA$"6<N`f,.,xN*@Jg,xC:BNC<"g,xC BNC"g,@aNu"-tv,z NAC|#H EN!J!|E !@ -Vi      R0Assign*JNUH?20|"P+HM+N+H+|z+H/I4,IC2p$N&@ K/H0 gp/rCQC" A$v,KN/@,JfN|"$N&`b~B$m"J/I(" gB&J`Rp:gJ+fp:fJ+fg " pcA(z&o0+H`B m+Hg P`$H -gr+A`8Jf JfJgr+A`Jf"/(fr+A+A+A+A" f*JfJf JfJgr+A+A+A+AJVDHHJVDHHJVDHHJVDHHЃЂЁroAjz&o0+H`8J(gNJfFJf> #&o0"<,KNJg"<0tN&z.<0`&o0*-JgZHm/ < K"o0aPO+@gzpf,KN|`p.`"/($ ,KNJ@fC+IN|.`| g,Jf&" t,KN,JfA+HN|.+J`Z&o0*-JfJgr,KNr"$/(vNT/@$JgTr @f&Jg "$NJ@gJg2"/($NJf$JgAb`Ax+J+o(+HN|.rNlJg"NJ$fJf"/($NJfA+HN|."N`Jg\",KNHm/ < K"o0azPO+@gzpf,KN|`p.`D"/($ ,KNJ@f4 3(A+HN|.`$"/($,KNRgA+HN|.p+@+EJf gX m$P f&o0Jg,$o( g$r,KNr"$ vNT$@ g" N`rNlJf *-JgzxBE`RJfG:|`pfG6|`G>|JgJg" ,o0NLA+H @&o0/@$",KNr$@ fC~+IN|.*-`Jg" $/(&,KNT$@ gp+@ *( @HHC I Ca JgSgDSg`F *gA`A&HJgA`A"HJfS KCa` &jpl`pAbCap *Sg UgLSg|` * o0C _Ra&j g` pA4Ca2 + o0Cax&S f`pACa KJfS  KCapACa`bpACa KJfS  KCapACa`.JfRpfxpACa`pACa&o0" $,KNN$@ fT"/$,KNl KCa.Jgz"t,KN&`BR$mX+Jpm&o0Jo A ",KNL*-JgJf A z+H+m` m+PpШ "H,o4N.+mJf -g"A$,KNF"/,,KN"N2"K,o4Nb`0|"P ipz!@zJfJgz LLN]Nudos.libraryNAME,TARGET/ *M,LIST/S,EXISTS/S,DISMOUNT/S,DEFER/S,PATH/S,ADD/S,REMOVE/S,VOLS/S,DIRS/S,DEVICES/S$VER: assign 37.4 (25.4.91) Invalid device name %s Only one of ADD, SUB, PATH, or DEFER allowed Can't assign %s Can't find %s Can't subtract %s from %s Can't add %s to %s Can't cancel %s Volumes: Directories: Devices: [Mounted] + <> [] %s: not assigned Volume: ???Assign would refer to itself NUH12.&I+HJg  @"($A gJ Sfz&m ` SfGr`*RXm켇mGz`R m &jE+J`br,mNl LLN]NuH0&H$I~`R2xgr:fJ2xfBp`"pmA `  J"K`SdB3xpL Nupr am zn am zn fJfNu!2&I+H`X +Jo@$k.`2"<,mNJg <0`2pdn $" NRpddJn` +gpg` B&S fLLN]NuNUH72&m.H|r,mNr/@ Jf A `B$m `A"Ka&@ K+HfxeRW001nusEdTempA.288reg @,xNA N *gz$@&j.Nur(jx fIx` DASf< `g g(@`pd"<,xN:Jg((@)|DAS)|`NuAx"P `g I`(H&pd,xN.(Nu(jx g DASf `g f`zNu(@`p,zNb*pr0*2*((D@DA J,zNX0*2* ((4*j4+ 6*j6+BCD@DA JN EN\Nu"-A$v,zNNuaIap,zlNb*( B (6B6A>p g0"@ ig ig i g i%g I`(( QJf EN\ JN8r ,zN:aTNua}aJp,zNb*/ G`r"c #g @  "Q&_%l %l6 ,j",j J,zN ,j", j JNX EN\aa J,zRN8Nu"-gAX$v,zJN`"-gAj$v',z0N`intuition.librarydos.libraryc ERROR: wd_UserData occupied! ON/s,OFF/s,INFO/s,?/s: Usage: 33m 0m