FREQUENCY : inside the hacker mind FREQ24 September 2003 =========================== 1. A Time To Change 2. Supply and Demand 3. Wi Fi On Linux Made Easy 4. Cracking 101 5. POCSAG Scanning 6. More From The World of the Future 7. Big Brother and You 8. Crosstalk 9. Closing Arguments 10. Crew =========================== Discovery consists of seeing what everyone else has seen and thinking what no one else has thought. -Albert Szent-Gyorgi 1. A Time To Change You might have noticed that Hackermind isnt airing at the moment, well Id like to explain why, and assure you that this is not the end of things. Originally Freq24 was going to begin with the article thats directly below, Supply and Demand, but as time went on I realized this was more important. But before I even begin, let me thank everyone whos supported us through this difficult decision, and even the people who got quite upsetthey felt that way because they love the show so much, and we appreciate that unspoken compliment. Weve never been one to beat around the bush, we tell it like it is, so why stop now. Is this the end of Hackermind? No. Hackermind is a non-profit show that we started making because we wanted to make a fun, enjoyable show that actually spread a message. No one says we [i]have[/i] to air every week, or every month. Were not bound by those rules that make up the business world, or the regular radio world for that matter. No one will cancel us, no one will threaten to cut our funding. And no one will be able to take our voices away from us, not as long as we have the site. The downside, obviously, is that we leave our fans with nothing to listen to. So why are we taking this break? The most compelling reason is because of all thats happened in the past several months. Dash has been going through one of the most difficult times of his life, and Im sure if people understood what he was experiencing they would see why making the show was so extremely difficult. On top of that, he has to work day in, and day out to support his familyleaving little time to worry about a radio show. I too have a lot going on, between personal responsibilities and school, making the entire show by myself proved a daunting task. I often found myself exhausted from stressing over how we were going to make the show that week. Yes, we could have just gone on the air and ventedbut we know our listeners want to be entertained. But how can you focus on entertaining others when you have so much going on? Perhaps stronger people could have, but were not robots. When it all came down to it, the best decision was just to put the show off for a while. Making episodes once a month proved to not be the great idea we had hoped for, although we do apologize for our timing. We understand many people were disappointed to learn the show had gone on hiatus the very day they were expecting an episode. Maybe if youd seen all we went through trying to get that show made youd understand. We fought down to the wire to make it, and make it greatbut when the realities of life came crashing down we realized we were only postponing the inevitable. And had we made the announcement the day before, or the day after, people would have been just as upset. So what does the future hold for the show? As we said, we have no intention on giving it up. Naturally people may feel resentment, some may threaten to leave all together if they dont get an episode soon. All I can say is so be it, because theres honestly nothing we can do at the moment. On the other hand, we do hope everyone realizes that www.hackermind.net is still there. It still has a message board, it still has the newest issues of Frequency, and were still stopping by the chat and conline every now and then. We cant say for sure when the show will be back, but we hope you appreciate our situation enough to stick around. We intend to continue spreading the word, and encourage others to do the same. Theres no reason for only one or two hacker shows on the net, instead of complaining about not getting Hackermind, start making your own show! Can you imagine what would happen if thousands of hackers started their own shows? Instead of seeing sites with old programs and flaming skulls when someone searches for hacker on yahoo, theyll see a thousand shows all expressing the way hackers really are. Itd be a revolution, and its one that begins with you. Start a show, spread the wordone more show means an even louder voice. Say it loud, and say it proud, because before you know it well be back. screamer ============================================================================== 2. *** Supply and Demand *** By: Screamer Chaotix Long ago, consumers dictated what was needed. Businesses started up to meet these needs, and in perfect unison, the two bodies worked together to create a balanced economy. But as I said, this was a long time ago. The entire meaning of supply and demand has changed, the power has been all but completely removed from the consumers hands. Now, everythings different, but this change will most likely only be temporary. In our more modern world, the consumer now finds that he or she has to pretend to demand something, just so a multi-billion dollar business wont lose precious millions. Take the RIAA for example. Heres a group thats so terrified of losing its grasp on the music industry that its actually resorting to what can only be called scare tactics. By threatening the little guy with lawsuits, computer intrusions, and downright DoSing, the RIAA hopes to quell the sudden boom of internet file sharing. The same goes for other, smaller organizations, such as Perfect 10 magazine. Recently, Perfect 10 won a lawsuit that declared it was illegal to post pictures from their magazine on the internet, or pictures of celebrities that werent authorized to be online. What are we talking about here? Were talking about bytes of data in JPEG format placed into HTML code on a computer network. In case anyone hadnt noticed, the internet is designed to share files and information, its one of the single greatest communications revolutions of all time! How can any business hope to control what bytes of data wind up cruising through its many interlocking lines? Again, these are scare tactics. Scare tactics which are committed by equally scared businesses. Businesses that are afraid theyll no longer be needed tomorrow. And while I still argue that file sharing does not hurt the entertainment industry, theyre right. Eventually, and Im talking over the course of the next hundred years or so, they will no longer be needed. Supply and demand will dictate that men no longer have to pay 9 dollars for a single copy of Perfect 10why do that when similar material is provided online for free? The same can be said for the RIAA, why should people bother listening to that great brainwasher known as FM radio when they have file sharing services? They also have independent sites that will give fair, unbiased reviewsso who needs the hassle of paying 20 dollars for one CD that may or may not be worth it. I could go on and on giving examples of companies whose services will no longer be needed in the coming years, but I think the ones Ive mentioned will be sufficient. Do I want to see people lose jobs? No, but lets rememberno one hires a blacksmith anymore. Does this mean I should feel bad for not owning a horse? Technology evolves, and as it does, renders some occupations unnecessary. If the company fights the future, theyre only doing so because they want to hold onto their jobs for as long as possible, which is quite understandable. However, times are changing, as they always have been. And soon, supply and demand will win out. People will no longer demand CDs, magazines, or other material that can now be provided for absolutely nothing. So what can these businesses hope to do? In the case of both the RIAA and MPAA, I say let them go down. I quote Aaron McGruder when I say, When the music industry crumbles, the only people left making musicwill be those that love making music. The only chance others have is to, as the old saying goes, get with the times. Some magazines, such as FHM, Stuff, and Maxim, have already hopped on the internet bandwagon. By posting snippets of their articles, and virtually all of their pictures online, theyre hoping to attract a younger generation to actually go to the store and purchase their magazine. Theres still a demand there after all, but rather than fighting the inevitable theyre taking the necessary steps to evolve with it. As long as people can get something for free, theres no demand, and that means theres no reason to pay. Thats a simple fact, popular or not. Ironically, no one complained when pets.com went out of business. Pets.com didnt go on CNN and say it will begin going to peoples houses and taking away their pets. But the RIAA however, does have that power. And with that power will make you feel like a rotten criminal for trading things as people have done throughout history. Of course, its only a matter of time. With each new year, technology progresses to a point where the demands of the people will once again be met. The only question is, who will be there to supply them? -screamer =========================================================================== 3. *** Wi Fi On Linux Made Easy *** By: dual_parallel (www.oldskoolphreak.com) Running Linux? Want to use 802.11b with Linux? Think that you have to use Windows to get a wireless adapter that's easy to install and use? Well you don't, and this article will show you the easiest way to get wireless working in Linux. First some assumptions: 1. The reader has basic Linux knowledge (that's all you'll need). 2. The reader has a computer, preferably a laptop. 3. The reader owns or has access to a wireless access point (WAP). 4. The reader can acquire a Lucent/Orinoco 802.11b adapter. This last assumption is not absolutely necessary, but this article will focus on the Orinoco card, which is widely supported and the best card next to the Cisco AIR-LMC352 [1]. Actually, this article will show the _two_ easiest ways to get wireless working in Linux. This first method utilizes an install of Red Hat 7.3. The second will use a Linux-on-CD distro. Red Hat is a powerful distribution with a wide range of hardware support. Included in the Red Hat 7.3 release is native support for the Orinoco adapter. To get it up and running, insert your adapter and install Red Hat with GNOME, choosing Custom under Installation Type. (The test installs for this article used Medium firewall rules, allowing incoming SSH.) When you get to Selecting Package Groups, either select Laptop Support or click Select individual packages and, under System Environment, select Wireless Tools under Base and kernel-pcmcia-cs under Kernel. Ok, you've completed installation - now set up your card. Click the GNOME menu, Programs, System, Internet Configuration Wizard. Under Device Type, choose Ethernet connection. Click Next. Select Other Ethernet Card. Click Next. For Adapter, choose PCMCIA wavelan_cs, and choose eth0 for Device. Leave everything under Resource alone. Click Next. Enter a host name if you want and Automatically obtain IP address with DHCP to get your IP from your WAP. Click Next, then Finish. Click Apply and Close. Don't worry about activating the interface. After this, perform the following four steps [2]. Make backups of all configuration files before you edit them, i.e. linux:~ # cp somefile somefile.bak 1. Fix /etc/sysconfig/pcmcia - Backup your file and change the options to the following: PCMCIA=yes PCIC=i82365 PCIC_OPTS= CORE_OPTS= CARDMGR_OPTS= SCHEME=essidany PCIC= may say yenta_socket or something else - just leave it. 2. Fix /etc/pcmcia/network - Replace the comment in the start section that reads, "We don't do *anything* here. We get a hotplug event when the ethX device is registered, and we bring the device up there" with the following: 'start') [ -f /etc/sysconfig/network-scripts/ifcfg-${device} ] && \ /etc/sysconfig/network-scripts/ifup ifcfg-${device} ;; 3. Configure the interface eth0 - Since the /etc/pcmcia/network start $device script is going to try to up the device (default eth0), you need to make sure you have that interface configured for dhcp. Start vi and manually change the /etc/sysconfig/network-scripts/ifcfg-eth0 file to read: DEVICE="eth0" ONBOOT="yes" BOOTPROTO="dhcp" 4. Restart the pcmcia script - To test it /etc/init.d/pcmcia restart. You should now have access on your wireless access point. If it's not working, go ahead and give your machine a reboot. If that doesn't do it, check that the rest of your network is working properly and double check your config files. The next method uses an amazing distribution called Knoppix [3]. Knoppix is a full, Debian-based distro on a bootable CD. Knoppix uses KDE, Konqueror, includes OpenOffice.org and many other packages. Knoppix also includes the orinoco_cs module for the ubiquitous Lucent card. Knoppix is such a well designed distro, the instructions for wireless access are beyond rudimentary: 1. Insert Knoppix CD 2. Insert Wi-Fi adapter 3. Reboot It's that simple. As long as your CD drive is bootable (change your BIOS settings or make a boot floppy if it isn't), Knoppix will load the Orinoco drivers and set up dhcp for the interface. Boot up next to a working WAP and you'll be online in no time. As previously stated, a Lucent/Orinoco card is not absolutely necessary. The two methods presented were also tested with a Prism II PCMCIA Wi-Fi adapter (a Belkin F5D6020 to be exact). After a reboot, Red Hat will recognize the Prism II card and load the wvlan_cs module instead of the wavelan_cs module and everything should work fine. Now that you're wireless with Linux, start exploring. Knoppix includes wavemon, Gwireless is a GNOME-based client you may find useful, get the latest Ethereal and do some sniffing, check out Wellenreiter and Kismet... Few things done in Windows cannot be done in Linux, wireless access included. Hopefully any myth that Linux is the least bit unfriendly when it comes to Wi-Fi has been dispelled. References ---------- [1] Dragorn. The Comprehensive Guide to 802.11b Networks. 2600: The Hacker Quarterly, Vol. 19, No. 2. [2] Allison, B. http://jackal.dnsalias.com:8080/public/misc/wireless/ wireless.html [3] http://www.knopper.net/knoppix/index-en.html ========================================================================= 4. *** Cracking 101 *** By: Sir Cracksalot OK, what the hell is this article doing in Frequency? (Notice how I blatantly assume it will be published, haha, dont worry, it will ;)). Cracking is usually considered a crime, but Im here today to inform, not encourage people to break the law. Cracking, or the act of breaking security just to get the goods, is also frowned upon in the community. I suppose this is a good thing, how can we improve our image with people running around breaking the law just for kicks? Nonetheless I support the spreading of information, and because I dont think any information is bad information, I present this article to you. If youd like to think of it as a tool to help you get pr0n, be my guest. If you consider it a security advisory to all vulnerable websites out there, thats fine too. The true point of this article is to share information with both sides, and even though its written from the side of the cracker, websites can get a better idea of what exactly is being used against them. Your average cracker (Please note that I dont use cracker to symbolize criminal hacker, Im strictly referring to someone who cracks passwords. They too may have enjoy playing with computers just as much as the next person, so who am I to label them as being different from hackers?) isnt very bright, they usually want to get into a site and grab whatever they can. But if youre one of these people, how do you get in, get out, and protect yourself at the same time? The most obvious way would a brute force attack on the login screen. Of course, more advanced people would prefer to attack the actual sitewhich can be risky considering many pr0n sites use web space providers. Therefore, if you want to get into the site youll either have to get the owners password, or root the entire machine (dangerous because providers usually know a lot about their systems). If you go the safe way, youll need to follow a few steps. 1. Get a Cracker Program So many to choose from, but the best two are wwwhack and my personal favorite, webcracker. Each have their advantages and disadvantages. wwwhack is great for html based logins (ie: sites whose logins are in the html of the page, not in a cgi prompt). Unfortunately, getting a copy of wwwhack is easier said than done. I wont even bother posting a link, because most places you can download it from will be gone by the time you read this. Plus, if you download an old version it wont let you use it AT ALL. Itll direct you to www.wwwhack.com, which the last time I checked, wasnt even there. SOL. webcracker, however, is easier to obtain. Just google for it and you should get a few thousand hits. Its benefit is that its great against cgi logins, and like wwwhack, allows you to connect through a proxy (which Ill cover next.) 2. Find a Proxy True, most pr0n sites dont know shit about web security, but whatever you do USE A PROXY! Both wwwhack and webcracker let you use them, so do it. Sure it might run a bit slower, but youll feel a lot more relaxed. For webcracker, click options and then go to advanced. There youll see the option to connect through a proxy. Enter the proxy ip and port, and youre all set. For a list of proxies, I like to visit http://tools.rosinstrument.com/proxy/. 3. Get a Wordlist (or two, or three) Let me stop for a moment and say that, aside from the proxy, this is the most important step. I know many of you will ignore it, choosing to take the quicker route, but when you fail and come back, Ill be laughing at you. Too often people use the wordlists that come with webcracker, and while fine on SOME sites, the majority of the time they wont work at all. What you need is the perfect wordlist, which of course, doesnt exist. Fortunately you can get close, heres how. webcracker allows you to use a combo list, meaning both usernames and passwords are in the same list. In wwwhack, the user/pass must be separated by a colon (:), and in webcracker by a tab. For example: WWWHACK user:pass WEBCRACKER user pass But what kind of usernames and passwords should you get? The most common misconception is guy name and adult passes. While dirty words are commonly used as passwords to adult sites, first names alone are not. People will use bdavis or jhoff, and so on. The best combo lists are the ones that provide usernames and passwords that have worked before, on other sites. Frequently people use the same usernames and passwords everywhere they go, so trying a list of well known logins will actually bring you great results, if the list is long enough of course. Then again, dont get carried away. An unabridged dictionary for the password list (if you choose not to use a combo list) will do you little good when most of the usernames arent even used. Imagine spending 17 hours going through all passwords for one username, when the username doesnt even exist and youll catch my drift. Try www.accessdriver.com if youd like a nice combo list generator. Oh, and since youll have to convert the (:) style lists to the tab ones (or vice versa), heres a trick. Open the combo list in notepad, and if its a (:) file, delete the first : you see and insert a tab. Now, copy the space the tab created and go to edit. Select replace, and make it change all :s into tabs by pasting the tab you copied into the replace with bar. Select replace all, and watch it go! If you decide to go with two separate wordlists, one for usernames and the other passwords, for the love of Gomer Pyle be sure the password list will change around the username slightly. This way, a username of bill becomes llib and bill2 etc. The bottom line is this, youll need to try several dozen wordlists before you actually crack a site. But whatever you do, dont give upmost sites never get cracked because people give up without trying enough wordlists. Persistence may pay off (then again it might not, but well cover that later). Now, youre ready to start cracking. You have the proxy set, the address of the login, and your wordlist. All you need to do is input the information (easy enough, just read the programs manual) and set it on its way. But, whats this? 17 logins found?! 100 found?! 1000?! WOOHOO!!! Cool your jets there Maverick, you just hit the latest and greatest web security featuresand youre fucked. PROBLEMS: A thousand valid logins means the site was able to tell you were brute forcing and decided to block all further attempts, sorry, but thats the world in which we live. You may also encounter and even slightly odder problem, and the reason perseverance may not pay off, but I may have a way around it. It goes like this: You crack a site, but when you login the site drops you back at the main page. Again, a security feature, one I encountered after trying to crack a site for 2 days straightbut how can we use it to our advantage? Frequently adult sites have partners that they share customers with. For example, an account on xxx.com will also get you access to yyy.com. Many times Ive found that cracking xxx.com will also give me a valid pass for yyy.com, even though xxx wont let me login. Sometimes it doesnt work both ways though, usually the site with the better security will know your user/pass is garbage no matter what. Still, look around the site for any other sites that may be offered and try cracking those, perhaps if you find a valid login you can come back to the site you want and try it, couldnt hurt. The final problem is known as moved permanently. This IDS will calmly remove any account you crack, giving both you and the legitimate user a very bad day. But again, in this modern day we pr0n obsessed crackers have to deal with itIm still waiting for webcracker 5.0, surely someone can come up with a fix. ETHICS: Now the question of the moment, how do I feel about cracking? As I said before, this article is designed to share information, not to upset any of you more advanced hackers out there. Surely you think I give the community a bad name, but I assure you, I know the difference between running a cracker prog and actually bumming code. As for getting into the sites, I cant really condone it. However, many sites will charge 30-40 a month, and a lot of the stuff cant even be saved. I remember one particular site I joined that gave me more hassles than anything else, and didnt even have much of the girl I joined to see! ( Dont ya hate when that happens?) Now, had I cracked into it ahead of time, I could have saved myself a lot of money, and not had it robbed from me more or less. Go ahead, try to get your money back from an adult site, yeah right. Sure its illegal, but lying to people to get their money is morally wrong, so Ill let you be the judge. CONCLUSION: Perseverance usually pays off, unless you find that your cracked user/pass isnt even accepted. Wordlists will be the most help to you, even though you might get a headache trying to figure out which works the best. And even then theres security, but there are a few upshots to all this. Even when I havent used a proxy, most websites know so little about security that Ive NEVER been asked to stop. Ive never been disconnected from my isp, and Johnny Law has never shown up at my door. I still encourage people to use a proxy if theyre going to commit these illegal acts, but sites can protect themselves by installing better security. That however, is a whole nother article. 5. *** POCSAG Scanning *** By: w1nt3rmut3 [The following list is a snippet of a POCSAG scan conducted by w1nt3rmut3.] 1574432 4:47:27 PM 9/9/2002 3 POCSAG 1200 2505 0423905 4:47:27 PM 9/9/2002 4 POCSAG 1200 TONE ONLY 1533539 4:47:27 PM 9/9/2002 3 POCSAG 1200 68 1533133 4:47:28 PM 9/9/2002 1 POCSAG 1200 SHARON DONNA HAS ORDERS FOR U IN ARBOR MAILBOX 1554823 4:47:28 PM 9/9/2002 3 POCSAG 1200 7676466 0520736 4:47:28 PM 9/9/2002 1 POCSAG 1200 Kleen Test Products located at 1611 Sunset Rd, Port Washingto. 1926532 4:47:29 PM 9/9/2002 2 POCSAG 1200 _ 1584197 4:47:29 PM 9/9/2002 2 POCSAG 1200 TONE ONLY 0668269 4:47:29 PM 9/9/2002 3 POCSAG 1200 0945390 4:47:29 PM 9/9/2002 2 POCSAG 1200 TONE ONLY 0080887 4:47:29 PM 9/9/2002 4 POCSAG 1200 cO_YS]OAR]AhQKA _ A e_IkGiS_]A eKCY@fKKA$kgisAnQK]Ar_kABeeSmK]@(e_sA6af:/ 0292274 4:47:43 PM 9/9/2002 3 POCSAG 512 7043149 0465101 4:47:43 PM 9/9/2002 2 POCSAG 512 8381 0773*- 4623*-50 0465111 4:47:44 PM 9/9/2002 2 POCSAG 512 8381 0773*- 4623*-50 0465114 4:47:44 PM 9/9/2002 2 POCSAG 512 8381 0773*- 4623*-50 1572337 4:47:50 PM 9/9/2002 2 POCSAG 1200 eX+da rp 98E \" . 0037173 4:47:50 PM 9/9/2002 1 POCSAG 1200 TONE ONLY 0170405 4:47:50 PM 9/9/2002 1 POCSAG 1200 1 969 1071182 4:47:50 PM 9/9/2002 4 POCSAG 1200 TONE ONLY 0858159 4:47:50 PM 9/9/2002 3 POCSAG 1200 kV T% 8 D h99 4[ W{ 0022838 4:47:50 PM 9/9/2002 3 POCSAG 1200 2811*29 1570079 4:47:51 PM 9/9/2002 3 POCSAG 1200 4431 0021232 4:48:00 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 382 0014646 4:48:01 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 382 1576880 4:48:03 PM 9/9/2002 1 POCSAG 512 THIS IS A TEST PERIODIC0PAGE SEQUENTIED 1889719 4:48:04 PM 9/9/2002 1 POCSAG 512 585492866839-50 0367106 4:48:04 PM 9/9/2002 1 POCSAG 512 314-3663 0401267 4:48:05 PM 9/9/2002 2 POCSAG 512 8381 0773*- 4623*-50 0031430 4:48:05 PM 9/9/2002 3 POCSAG 512 337-12 0016864 4:48:22 PM 9/9/2002 3 POCSAG 1200 3502061-911911 1567890 4:48:22 PM 9/9/2002 2 POCSAG 1200 8381 0773*- 4623*-50 1556580 4:48:22 PM 9/9/2002 3 POCSAG 1200 1179 0015477 4:48:22 PM 9/9/2002 3 POCSAG 1200 1139 1576800 4:48:22 PM 9/9/2002 4 POCSAG 1200 4274993 0520643 4:48:22 PM 9/9/2002 3 POCSAG 1200 9703935 1554515 4:48:23 PM 9/9/2002 1 POCSAG 1200 8381 0773*- 4623*-50 0504531 4:48:23 PM 9/9/2002 2 POCSAG 1200 223 0074002 4:48:47 PM 9/9/2002 3 POCSAG 512 7085792100-2154 0433806 4:48:47 PM 9/9/2002 3 POCSAG 512 677-0471 0032087 4:48:48 PM 9/9/2002 1 POCSAG 512 7739078995-611 0482434 4:48:48 PM 9/9/2002 3 POCSAG 512 8056717 0789540 4:48:58 PM 9/9/2002 B FLEX 3200 96- 0985512 4:49:08 PM 9/9/2002 3 POCSAG 2400 L 3fL +fL 3fL 3VL /eL 3^L 3 ` 3 2034857 4:49:08 PM 9/9/2002 3 POCSAG 2400 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 1061 0380550 4:49:33 PM 9/9/2002 1 POCSAG 2400 682-6166 0231446 4:49:33 PM 9/9/2002 1 POCSAG 2400 571-0866 0510771 4:49:34 PM 9/9/2002 A FLEX 3200 33485 00000000? 4:49:42 PM 9/9/2002 A FLEX 3200 & 000000? 4:49:42 PM 9/9/2002 A FLEX 3200 415 281-6752 000000? 4:49:42 PM 9/9/2002 A FLEX 3200 77777777777 0479079 4:49:42 PM 9/9/2002 B FLEX 3200 9343-002-002 0443606 4:49:42 PM 9/9/2002 B FLEX 3200 733 0076113 4:49:46 PM 9/9/2002 2 POCSAG 2400 229-8116 0565395 4:49:46 PM 9/9/2002 1 POCSAG 2400 310 288-9990 0506889 4:49:46 PM 9/9/2002 1 POCSAG 2400 86638155262048 0985512 4:50:08 PM 9/9/2002 3 POCSAG 2400 L 3fL +fL 3fL 3VL /eL 3^L 3 ` 3 2034857 4:50:08 PM 9/9/2002 3 POCSAG 2400 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 1062 1573962 4:50:49 PM 9/9/2002 1 POCSAG 1200 FRANK - CAROLINE DIAZ DOB 05/27/70 PCP AGAIBY RE: MESSAGE LEFT TO START A NEW RX 5520889 [87] 1983715 4:50:50 PM 9/9/2002 1 POCSAG 1200 WHC+da rp 98E \" . WHC+d 0021232 4:50:51 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 385 0014646 4:50:52 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 385 0021415 4:50:52 PM 9/9/2002 3 POCSAG 1200 6473385 0985512 4:51:04 PM 9/9/2002 3 POCSAG 2400 L 3fL +fL 3fL 3VL /eL 3^L 3 ` 3 2034857 4:51:04 PM 9/9/2002 3 POCSAG 2400 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 1063 0212267 4:51:04 PM 9/9/2002 1 POCSAG 2400 916 992-2910 0484372 4:51:04 PM 9/9/2002 1 POCSAG 2400 73*5 65330 1576880 4:51:11 PM 9/9/2002 1 POCSAG 512 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 385 0060610 4:51:17 PM 9/9/2002 1 POCSAG 2400 112-110 1764780 4:51:17 PM 9/9/2002 1 POCSAG 2400 927-1998 0016350 4:51:20 PM 9/9/2002 1 POCSAG 1200 23 DEBBIE LINDSTROM LAKE FOREST ACADEMY/CATERING SODEXHO-CORP SERVICES 847-615-3257-- I'M OFF TOMRW, PLS CL ME BACK-MISSD YOUR CL EARLI END 2096615 4:51:26 PM 9/9/2002 4 POCSAG 1200 VV`rch Paging-- ---Businqe9 0868092 4:51:26 PM 9/9/2002 2 POCSAG 1200 TONE ONLY 2020781 4:51:26 PM 9/9/2002 1 POCSAG 1200 dgX- 0095734 4:51:26 PM 9/9/2002 4 POCSAG 1200 rldCo]An_eWKegABgWADC]WekaiGsAF_keiATkIOKAh_APKYaAhQK[ANKiAZSYYS_]gA^MAH_YYCegAR]AfKmKeC]GKAL@PKCYiQA`Cs[K]igAhQKsAnKeKA`e _[SgKI]@@|.CY[ CeiAfCsgAfCYKgA^kiY__WARgAZ_eKAfiCEYKAf_ALCeAhQSgAZ_]iQ]@@@@@@@`?2 0162567 4:51:35 PM 9/9/2002 2 POCSAG 512 --Arch@` 2046313 4:51:35 PM 9/9/2002 4 POCSAG 512 0470*50*65 1750146 4:51:36 PM 9/9/2002 4 POCSAG 512 zy4 : 0868092 4:51:36 PM 9/9/2002 2 POCSAG 512 TONE ONLY 2020781 4:51:36 PM 9/9/2002 1 POCSAG 512 dgX- 0095734 4:51:37 PM 9/9/2002 4 POCSAG 512 rldCo]An_eWKegABgWADC]WekaiGsAF_keiATkIOKAh_APKYaAhQK[ANKiAZSYYS_]gA^MAH_YYCegAR]AfKmKeC]GKAL@PKCYiQA`Cs @]igAhQKsAnKeKA`e _[SgKI]@@|.CY[ CeiAfCsgAfCYKgA^kiY__WARgAZ`KAfiCEYKAf_ALCeAhQSgAZ_]iQ]@@@@@@@@@@@@@>SL 1181884 4:51:41 PM 9/9/2002 4 POCSAG 512 H ; Hy[ h 0571494 4:51:41 PM 9/9/2002 1 POCSAG 512 TONE ONLY 1883447 4:51:41 PM 9/9/2002 4 POCSAG 512 TONE ONLY 0920119 4:51:42 PM 9/9/2002 4 POCSAG 512 q0w5y:8zq< 8y7zr1zt7 1p p 0223159 4:51:49 PM 9/9/2002 1 POCSAG 2400 *Business News* >Fmr WorldCom workers ask bankruptcy court judge to help them get millions of dollars in severance & healt h payments they were promised. >Wal-Mart says sales outlook is more stable so far this month. >SLI to file for Chapter 11 bankruptcy protection. >Snap-On slashes its 3Q earnings forecast. >Americans increase their borrowing in July by largest p ercentage in 8 months. >Crude futures prices rise after early decline. >Frank Merlotti Jr. is appointed president of Steel case North America, effective Sept. 30... ******************* (c)2002 DATACAST(R) www.datacastnews.com 0500740 4:51:56 PM 9/9/2002 1 POCSAG 1200 From HFD> The Association is going to enter the Chili cook-off at Taste of Homewood Fall Fest Saturday Sept. 21st. If anyo ne would like to help make the Chili please contact me. Thanks Jason P. [51] 1569495 4:51:58 PM 9/9/2002 1 POCSAG 1200 From HFD> The Association is going to enter the Chili cook-off 1100675 4:51:59 PM 9/9/2002 2 POCSAG 1200 (CGiK 0777012 4:51:59 PM 9/9/2002 1 POCSAG 1200 TONE ONLY 0272349 4:51:59 PM 9/9/2002 4 POCSAG 1200 TONE ONLY 1812445 4:51:59 PM 9/9/2002 4 POCSAG 1200 w7 0078214 4:51:59 PM 9/9/2002 4 POCSAG 1200 ll 1554516 4:52:00 PM 9/9/2002 2 POCSAG 1200 From HFD> The Association is going to enter the Chili cook-off at Taste of HomewO ` Fall Fest Saturday Sept. 21st. If`07|7 w2Pkw: 1650755 4:52:01 PM 9/9/2002 3 POCSAG 1200 N^ " B.f j ^. 1143158 4:52:01 PM 9/9/2002 3 POCSAG 1200 TONE ONLY 0792087 4:52:01 PM 9/9/2002 2 POCSAG 1200 TONE ONLY 1518815 4:52:02 PM 9/9/2002 4 POCSAG 1200 4 8vrpy2Pq77zp1:Pv2 *t0wu9 epy77 ( P- [n 0502480 4:52:03 PM 9/9/2002 3 POCSAG 1200 222-3434 1577510 4:52:03 PM 9/9/2002 2 POCSAG 1200 From HFD> The Association is going to enter the Chili cook-off at Taste of Homewo/2 c066 1251966 4:52:04 PM 9/9/2002 1 POCSAG 1200 TONE ONLY 1882158 4:52:04 PM 9/9/2002 3 POCSAG 1200 TONE ONLY 0724159 4:52:04 PM 9/9/2002 4 POCSAG 1200 TONE ONLY 1527375 4:52:04 PM 9/9/2002 3 POCSAG 1200 ay Sept. 21st. If anygn2Pkw: 1650757 4:52:05 PM 9/9/2002 3 POCSAG 1200 N^ " B.f j >] D ] 4 M N] <^ 4|mM? Cc: Wipke, John W > Subject: Peer Review Tool > Auto forwarded by a Rule > The system is back up now. Tim Paz was also h 1570808 4:52:59 PM 9/9/2002 3 POCSAG 1200 2504444 0019178 4:52:59 PM 9/9/2002 3 POCSAG 1200 3346251 0016373 4:53:00 PM 9/9/2002 3 POCSAG 1200 3122456870 0014646 4:53:00 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 387 0021232 4:53:00 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 387 1556543 4:53:01 PM 9/9/2002 3 POCSAG 1200 1937 1576880 4:53:07 PM 9/9/2002 1 POCSAG 512 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 387 1571822 4:53:09 PM 9/9/2002 3 POCSAG 512 2522 0017599 4:53:09 PM 9/9/2002 3 POCSAG 512 841-3706 0448191 4:53:10 PM 9/9/2002 3 POCSAG 512 8394166 0667351 4:53:15 PM 9/9/2002 B FLEX 6400 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 4942 0564836 4:53:44 PM 9/9/2002 1 POCSAG 2400 275-4042 1845181 4:53:44 PM 9/9/2002 1 POCSAG 2400 720-7031 1531512 4:53:51 PM 9/9/2002 3 POCSAG 512 7676060 0068666 4:53:51 PM 9/9/2002 1 POCSAG 512 338-7 0039462 4:54:00 PM 9/9/2002 B FLEX 3200 284-5016 0985512 4:54:08 PM 9/9/2002 3 POCSAG 2400 L 3fL +fL 3fL 3VL /eL 3^L 3 ` 3 2034857 4:54:08 PM 9/9/2002 3 POCSAG 2400 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 1066 1056272 4:54:09 PM 9/9/2002 A FLEX 3200 904-0813 0027686 4:54:15 PM 9/9/2002 B FLEX 6400 ...tice NOTICE: msgcnt 492 vxfs:.. 1576880 4:54:23 PM 9/9/2002 1 POCSAG 512 THIS IS A TEST PERIODIC p_GE SEQUENTIED 1889719 4:54:24 PM 9/9/2002 1 POCSAG 512 58549286683 -50 0512244 4:54:24 PM 9/9/2002 3 POCSAG 512 4252400 0585881 4:54:28 PM 9/9/2002 1 POCSAG 2400 342795 1532879 4:54:57 PM 9/9/2002 1 POCSAG 1200 From: corinne.dombeck@aurora.org - Loren - Tim Mahone wOald like 1 ticket placed at Will Call. Also, I asked Joan Wilk t7 Xps"P| 1929302 4:54:58 PM 9/9/2002 2 POCSAG 1200 63386 0929439 4:54:58 PM 9/9/2002 2 POCSAG 1200 TONE ONLY 0141103 4:54:58 PM 9/9/2002 3 POCSAG 1200 d not receive her 2 tickets and you w24 0623159 4:54:58 PM 9/9/2002 4 POCSAG 1200 eavKAhQK[ABiA.SYYA CYYABY'; Q" ;/ 1690885 4:54:59 PM 9/9/2002 2 POCSAG 1200 _ 1881966 4:54:59 PM 9/9/2002 4 POCSAG 1200 TONE ONLY 2005039 4:54:59 PM 9/9/2002 3 POCSAG 1200 fV=9 0021232 4:55:00 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 389 0014646 4:55:01 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 389 2078794 4:55:22 PM 9/9/2002 1 POCSAG 2400 818 760-7499 000000? 4:55:23 PM 9/9/2002 A FLEX 3200 380-1006 000000? 4:55:23 PM 9/9/2002 A FLEX 3200 554-1834 000000? 4:55:23 PM 9/9/2002 B FLEX 3200 616 445-8557 0295378 4:55:23 PM 9/9/2002 A FLEX 3200 7011-1 0409686 4:55:23 PM 9/9/2002 B FLEX 3200 411-7063-411-411 0065275 4:55:41 PM 9/9/2002 1 POCSAG 2400 739-4501 000000? 4:55:42 PM 9/9/2002 C FLEX 3200 " L dL 1576880 4:56:07 PM 9/9/2002 1 POCSAG 512 THIS IS A TEST Ceg 0575940 4:56:07 PM 9/9/2002 1 POCSAG 512 02808 1979461 4:56:07 PM 9/9/2002 2 POCSAG 512 TONE ONLY 1464885 4:56:07 PM 9/9/2002 1 POCSAG 512 TONE ONLY 1486102 4:56:07 PM 9/9/2002 4 POCSAG 512 J 0078351 4:56:07 PM 9/9/2002 1 POCSAG 512 TONE ONLY 1889719 4:56:08 PM 9/9/2002 1 POCSAG 512 585492866938-50 0474562 4:56:08 PM 9/9/2002 3 POCSAG 512 7733399432 0194189 4:56:08 PM 9/9/2002 3 POCSAG 512 7290242 0017958 4:56:09 PM 9/9/2002 3 POCSAG 512 2364-22 1569384 4:56:11 PM 9/9/2002 1 POCSAG 1200 From: pager@household.com - (From HFC0874) 630 521 3474 Becky, the two slots available are 9/11-11:30-1:00 or 9/12-from 4- 5:30-I know you did not want lunch times- which would you prefer??a.: 0673834 4:56:13 PM 9/9/2002 3 POCSAG 1200 ?M 1770907 4:56:13 PM 9/9/2002 4 POCSAG 1200 1t2r :tuq b 0908477 4:56:13 PM 9/9/2002 4 POCSAG 1200 TONE ONLY 1002518 4:56:13 PM 9/9/2002 3 POCSAG 1200 ,-w 1008319 4:56:13 PM 9/9/2002 2 POCSAG 1200 5468322222 0019009 4:56:13 PM 9/9/2002 3 POCSAG 1200 70620 0019187 4:56:13 PM 9/9/2002 3 POCSAG 1200 8053590 0019036 4:56:13 PM 9/9/2002 4 POCSAG 1200 1262617859 0503206 4:56:13 PM 9/9/2002 3 POCSAG 1200 7499685 0465201 4:56:13 PM 9/9/2002 3 POCSAG 1200 7623283 1556708 4:56:14 PM 9/9/2002 3 POCSAG 1200 1257 0568825 4:56:17 PM 9/9/2002 C FLEX 6400 NOCC05 alarm_q_s - 0007 NTW BU Conversion 217 0 0525155 4:56:23 PM 9/9/2002 A FLEX 3200 662-7777 1533464 4:56:38 PM 9/9/2002 2 POCSAG 1200 GAPDEV00:EDTSCDCL/THDAVIDH/201678:DAL400/EDTSCDCL/THDAVIDH:Job 201678/THDAVIDH/EDTSCDCL has exceeded 3600 CPU seconds. [13 ] 0460032 4:56:45 PM 9/9/2002 A FLEX 6400 ake it up to you > this week? > > K > > [20] 0484363 4:56:49 PM 9/9/2002 1 POCSAG 2400 651+3 0021232 4:56:59 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 391 0465201 4:57:00 PM 9/9/2002 3 POCSAG 1200 7623283 0504547 4:57:00 PM 9/9/2002 3 POCSAG 1200 5999728-9090 0014646 4:57:00 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST Ceg 0575938 4:57:00 PM 9/9/2002 1 POCSAG 1200 02868 1979459 4:57:00 PM 9/9/2002 2 POCSAG 1200 TONE ONLY 1464883 4:57:00 PM 9/9/2002 1 POCSAG 1200 TONE ONLY 1486100 4:57:00 PM 9/9/2002 4 POCSAG 1200 I 0078349 4:57:00 PM 9/9/2002 1 POCSAG 1200 TONE ONLY 1889717 4:57:00 PM 9/9/2002 1 POCSAG 1200 2 2* 0195384 4:57:02 PM 9/9/2002 3 POCSAG 512 8482728-19 0392026 4:57:02 PM 9/9/2002 3 POCSAG 512 12627851126 1576880 4:57:03 PM 9/9/2002 1 POCSAG 512 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 391 0774261 4:57:25 PM 9/9/2002 B FLEX 3200 506-0537 000000? 4:57:32 PM 9/9/2002 D FLEX 6400 --mm----oo ,|}m % }) }m- ))=) S 0044923 4:57:36 PM 9/9/2002 1 POCSAG 2400 310 605-6911 2035459 4:57:36 PM 9/9/2002 2 POCSAG 2400 31 0691048 4:57:45 PM 9/9/2002 1 POCSAG 1200 TONE ONLY 0727160 4:57:45 PM 9/9/2002 2 POCSAG 1200 TONE ONLY 0224849 4:57:45 PM 9/9/2002 1 POCSAG 1200 TONE ONLY 0723185 4:57:45 PM 9/9/2002 1 POCSAG 1200 TONE ONLY 1754970 4:57:45 PM 9/9/2002 2 POCSAG 1200 TONE ONLY 1992490 4:57:45 PM 9/9/2002 2 POCSAG 1200 *746 0850211 4:57:45 PM 9/9/2002 2 POCSAG 1200 TONE ONLY 0517516 4:57:45 PM 9/9/2002 4 POCSAG 1200 +:|_#Kd1Y 1597678 4:57:45 PM 9/9/2002 1 POCSAG 1200 TONE ONLY 1576880 4:57:50 PM 9/9/2002 1 POCSAG 512 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 392 0415196 4:57:52 PM 9/9/2002 4 POCSAG 512 2723-241-5 1570015 4:57:52 PM 9/9/2002 1 POCSAG 512 1of1|Sch Call|AC|CR|D|HPAQN0LXR|ETA: 10-SEP-02 16:00|| 1568320 4:58:01 PM 9/9/2002 3 POCSAG 1200 4249091 1574234 4:58:01 PM 9/9/2002 1 POCSAG 1200 bb: opal msgs went purple [20] 1576800 4:58:02 PM 9/9/2002 4 POCSAG 1200 7608992 0013043 4:58:02 PM 9/9/2002 3 POCSAG 1200 5361 0473910 4:58:02 PM 9/9/2002 3 POCSAG 1200 247 1557727 4:58:02 PM 9/9/2002 3 POCSAG 1200 222 1532830 4:58:03 PM 9/9/2002 1 POCSAG 1200 From: al.coca@aurora.org Subject: Keys - Please call me at your earliest convinience at 5670 [46] 0985512 4:58:05 PM 9/9/2002 3 POCSAG 2400 L 3fL +fL 3fL 3VL /eL 3^L 3 p 2034857 4:58:06 PM 9/9/2002 3 POCSAG 2400 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 1070 0102955 4:58:06 PM 9/9/2002 1 POCSAG 2400 615 258-1124 0568825 4:58:12 PM 9/9/2002 C FLEX 6400 NOCC06 alarm_q_s - 0007 NTW BU Conversion 237 0 0068666 4:58:15 PM 9/9/2002 1 POCSAG 512 338-8 0300923 4:58:28 PM 9/9/2002 1 POCSAG 2400 6289-4 0527976 4:58:39 PM 9/9/2002 1 POCSAG 2400 503-3707 0487833 4:58:39 PM 9/9/2002 1 POCSAG 2400 5637000-8804 0065275 4:58:39 PM 9/9/2002 1 POCSAG 2400 739-4501 0580929 4:58:39 PM 9/9/2002 1 POCSAG 2400 599-3244 1022163 4:58:39 PM 9/9/2002 1 POCSAG 2400 773-9278743-20 1558432 4:58:54 PM 9/9/2002 3 POCSAG 1200 123-123 1574234 4:58:54 PM 9/9/2002 1 POCSAG 1200 bb: opal disk went purple [21] 0021232 4:58:54 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 393 1574419 4:58:55 PM 9/9/2002 3 POCSAG 1200 7854875 0012964 4:58:55 PM 9/9/2002 3 POCSAG 1200 4144613351-9 1580318 4:58:55 PM 9/9/2002 4 POCSAG 1200 4146302930 0016648 4:58:55 PM 9/9/2002 3 POCSAG 1200 7' 1573880 4:58:57 PM 9/9/2002 3 POCSAG 1200 6028 1574234 4:58:58 PM 9/9/2002 1 POCSAG 1200 bb: opal procs went purple [22] 1571755 4:58:58 PM 9/9/2002 3 POCSAG 1200 8477063700 0014646 4:58:58 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 393 0323256 4:59:11 PM 9/9/2002 3 POCSAG 512 2622535010 0079931 4:59:11 PM 9/9/2002 1 POCSAG 512 9084845307 1576880 4:59:12 PM 9/9/2002 1 POCSAG 512 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 393 1105952 4:59:15 PM 9/9/2002 1 POCSAG 512 251 0067674 4:59:15 PM 9/9/2002 1 POCSAG 512 2049327 0469952 4:59:20 PM 9/9/2002 1 POCSAG 1200 From: 'gt8158@aol.com Subject: gt8158 last chance - End Of Summer Travel Contest! Congratulations! gt8158 You have been se lected as a special finalist in our Summer Sp ectacular Travel Giveaway! Just complete the special finalists' registration form and be sure to inc [07] 1041708 4:59:24 PM 9/9/2002 2 POCSAG 1200 It's really cooled off here - hope you don't mind that I turned the air off. Luv u2 [67] 0165960 4:59:36 PM 9/9/2002 1 POCSAG 2400 986-0984 1798449 4:59:36 PM 9/9/2002 1 POCSAG 2400 39419 0048370 4:59:36 PM 9/9/2002 1 POCSAG 2400 310-5506-411 2002727 4:59:36 PM 9/9/2002 1 POCSAG 2400 504 244-9141 0367725 4:59:47 PM 9/9/2002 3 POCSAG 512 HN 2" 0433806 4:59:47 PM 9/9/2002 3 POCSAG 512 387-8818 0035582 4:59:48 PM 9/9/2002 1 POCSAG 512 22446074 0155207 4:59:49 PM 9/9/2002 1 POCSAG 512 77- 0985512 5:00:05 PM 9/9/2002 3 POCSAG 2400 L 3fL +fL 3fL 3VL /eL 3^L 3 p 3 0121361 5:00:06 PM 9/9/2002 1 POCSAG 2400 680-0263 1824091 5:00:06 PM 9/9/2002 1 POCSAG 2400 781 883-1629 2034857 5:00:06 PM 9/9/2002 3 POCSAG 2400 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 1072 1573688 5:00:13 PM 9/9/2002 3 POCSAG 1200 24 0013169 5:00:13 PM 9/9/2002 3 POCSAG 1200 858 1534043 5:00:13 PM 9/9/2002 3 POCSAG 1200 6562202 0479204 5:00:13 PM 9/9/2002 4 POCSAG 1200 3517 0020973 5:00:13 PM 9/9/2002 3 POCSAG 1200 2451876 0258627 5:00:14 PM 9/9/2002 3 POCSAG 1200 2628987107 0017908 5:00:14 PM 9/9/2002 3 POCSAG 1200 2627800512 0014603 5:00:14 PM 9/9/2002 3 POCSAG 1200 12625425133 0247893 5:00:25 PM 9/9/2002 B FLEX 3200 265-4240 0781719 5:00:25 PM 9/9/2002 B FLEX 3200 914 879-3755 2073650 5:00:33 PM 9/9/2002 3 POCSAG 2400 374-3653 0496700 5:00:33 PM 9/9/2002 1 POCSAG 2400 714 393-2135 1750042 5:00:33 PM 9/9/2002 1 POCSAG 2400 954 351-0091 0886673 5:00:34 PM 9/9/2002 A FLEX 3200 78 1917221 5:00:52 PM 9/9/2002 1 POCSAG 2400 973-3449 0021232 5:01:08 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 395 0477355 5:01:08 PM 9/9/2002 3 POCSAG 1200 3128550324 0017373 5:01:08 PM 9/9/2002 3 POCSAG 1200 80047962-4 0247862 5:01:08 PM 9/9/2002 2 POCSAG 1200 2079159 5:01:08 PM 9/9/2002 4 POCSAG 1200 5495519 1573411 5:01:09 PM 9/9/2002 3 POCSAG 1200 2117 1534139 5:01:10 PM 9/9/2002 1 POCSAG 1200 From: logfetch@andrew.com Subject: AOPBACKUP2K3 RESTORES - 24 x 7 Scheduled Event [14] 2097135 5:01:17 PM 9/9/2002 4 POCSAG 1200 -,sch Paging-- *** U.S. Weather ** ***** Tomorrow **** Albq 76/54 PCloudy Atl 90/68 MSunn 0162567 5:01:29 PM 9/9/2002 4 POCSAG 512 --Arch Paging-- *** U.S. Weather ** ***** Tomorrow **** Albq 76/54 `_Cloudy Atl 90/68 MSunn 1569568 5:01:53 PM 9/9/2002 3 POCSAG 1200 18 1568969 5:01:53 PM 9/9/2002 3 POCSAG 1200 19 0023043 5:01:53 PM 9/9/2002 1 POCSAG 1200 9231184 0014646 5:01:54 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 396 1530903 5:01:54 PM 9/9/2002 3 POCSAG 1200 2505 0560328 5:01:54 PM 9/9/2002 3 POCSAG 1200 ~ 0550689 5:01:54 PM 9/9/2002 4 POCSAG 1200 TONE ONLY 1051850 5:01:54 PM 9/9/2002 4 POCSAG 1200 WHC+da rp 98E \" . WHC+da rp 9 0021232 5:01:55 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 396 1576880 5:01:57 PM 9/9/2002 1 POCSAG 512 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 396 0248111 5:01:59 PM 9/9/2002 3 POCSAG 512 7219540 1238895 5:02:00 PM 9/9/2002 3 POCSAG 512 4130420 0985512 5:02:08 PM 9/9/2002 3 POCSAG 2400 L 3fL +fL 3fL 3VL /eL 3^L 3 p 3 2034857 5:02:08 PM 9/9/2002 3 POCSAG 2400 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 1074 0507856 5:02:21 PM 9/9/2002 1 POCSAG 2400 102 2024138 5:02:21 PM 9/9/2002 1 POCSAG 2400 377-1012 0599638 5:02:21 PM 9/9/2002 2 POCSAG 2400 609-3236 0066447 5:02:21 PM 9/9/2002 1 POCSAG 2400 703 764-3733 1574400 5:02:30 PM 9/9/2002 4 POCSAG 1200 3683307 1570817 5:02:30 PM 9/9/2002 3 POCSAG 1200 4893920 1574581 5:02:30 PM 9/9/2002 3 POCSAG 1200 6972777 1569238 5:02:30 PM 9/9/2002 3 POCSAG 1200 2167 1554416 5:02:30 PM 9/9/2002 3 POCSAG 1200 1432 1571110 5:02:31 PM 9/9/2002 3 POCSAG 1200 4565018 0503360 5:02:31 PM 9/9/2002 3 POCSAG 1200 6630 1238895 5:02:48 PM 9/9/2002 3 POCSAG 512 3550420 0021232 5:02:52 PM 9/9/2002 1 POCSAG 1200 THIS IS A TEST PERIODIC PAGE SEQUENTIAL NUMBER 397 ============================================================================ 6. *** More From The World of the Future *** This article originally ran on www.securityfocus.com, and comes from Kevin Poulsen. It gives us a glimpse of what may happen if law enforcement gets their way, and is something we should all be aware of. -------------------------------------------------------- 'T0rn' Arrest Alarms White Hats, Advocates A raid on the alleged author of a well-known hacker toolkit is raising eyebrows among electronic civil libertarians, and putting security researchers on guard. By Kevin Poulsen, Sep 24 2002 1:58PM It could almost pass as a routine computer crime case -- a year-long probe leads Scotland Yard cybercops to a home in the upscale London suburb of Surbiton, where they seize computer equipment and arrest a 21-year-old man under the UK's 1990 Computer Misuse Act. But last Thursday's raid was anything but routine, because the unnamed suspect, who has not yet been formally charged, isn't accused of cracking computers, launching a denial of service attack or distributing a virus. Instead, the joint Scotland Yard/FBI investigation is focused on his alleged authorship of the "T0rnkit," a collection of custom programs that help an intruder hide their presence on a hacked Linux machine. It's apparently the first time the UK's national computer crime law has been used to crack down on a programmer for writing a tool with malicious applications -- and it's a chilling development to some security researchers and electronic civil libertarians. "I would definitely see it as troublesome," says Lee Tien, senior staff attorney at the Electronic Frontier Foundation. "It's something we have to look at very closely, because the general idea that you can go after someone criminally for simply writing a program raises issues." T0rnkit first began showing up on hacked boxes two years ago. Like other so-called "rootkits," it includes programs that an intruder can drop into place over genuine system commands that render the attacker invisible to the computer's administrator. A replacement "ps" command, for example, will omit the hacker's network sniffer from a list of processes running on the machine, where an unadulterated version of the command would finger the intruder. The package also includes a backdoor function that allows the attacker to covertly return to a machine that they've hacked. "The more recent ones have had loadable kernel modules, distributed denial of service tools, and stuff like that," says Dave Dittrich, senior security engineer at the University of Washington. "Most of the versions are circulated in the underground, and they're tightly held." In 2001, Chinese virus writers incorporated a modified T0rnkit into the nasty "Lion" worm. But the kit itself is not a virus; it can't spread on its own accord. And the man arrested last week -- now free pending an October 19th court appearance -- is not accused of breaking into any computers, or of falling in with Chinese cybergangs. "The writing and distribution of the tool is the offense," a Scotland Yard spokesman confirmed in a telephone interview Monday. And that worries some computer security researchers, who find it all to easy to visualize themselves in the position of the anonymous UK suspect. So-called "white hat" hackers often create programs with potentially malicious applications as an exercise, or to advance the published research base -- active intruders tend to keep their work private. "I've written tools myself that have only marginal social value, so it actually concerns me quite a bit," says Mark Loveless, a senior security analyst with Bindview Corporation. "I'm worried that something like that could happen to someone just because they have a high profile." "Pretty Frightening" Researchers are even publicly working on a rootkit for Windows NT machines, a project that's headed -- not by anonymous denizens of the cyber underground -- but by Greg Hoglund, co-founder and CTO of security software company Cenzic, Inc. Aside from research projects, many security professionals use hacker tools to perform legitimate "penetration tests" against clients. And some of the most common security tools like nmap or TCPdump can be used for good or ill. "If they're arresting guys just for writing tools, that's pretty frightening," says Steve Manzuik, co-moderator of the VulnWatch security mailing list. "I guess anyone who's written a security type tool should be concerned if this is going to become the next trend." It's not a trend yet, but outlawing hacker tools has never been far from law enforcement thoughts. Last year 33 countries, including the UK and the U.S., signed the Council of Europe's international cybercrime treaty, which recommends prohibiting the creation or distribution of a hacking tool with the intent that it be used to commit a crime, though a last minute change to the treaty allows signatory countries to opt out of the provision. So far, laws explicitly outlawing hacker tools are hard to find. The UK's Computer Misuse Act applies to someone who "causes a computer to perform any function with intent to secure access to any program or data held in any computer," knowing that he or she is acting without authorization. The hacker doesn't have to direct the attack against any particular computer to be culpable under the law, which carries up to two years in prison for a first time offense -- seven, if damage resulted. But the legalese, not dissimilar to U.S. computer crime laws, still allows prosecutors some wiggle room. "You might not have a direct offense in the computer crime law, but if there's an aiding and abetting or solicitation -- those inchoate offenses -- you don't necessarily have to have it in the law," says Tien. Jennifer Granick, director of Stanford Law School's Center for Internet and Society, says the result could be a kind of Sklyarov-in-reverse. Following the arrest of a Russian programmer at a Las Vegas conference last year, some cryptographic researchers professed reluctance to make presentations in the U.S. for fear of running afoul of the Digital Millennium Copyright Act, which prohibits distributing or using tools that circumvent copy protection schemes. Depending on what happens in the T0rn case -- which is still in the earliest stage -- U.S. security researchers may develop a reciprocal aversion to the U.K. "If this is really against their law, then you have jurisdictional problems," says Granick. "Anywhere a tool is written, if it becomes available in the UK, that becomes a crime... All sorts of researchers would have to hesitate before visiting the UK." ------------------------------------------------------------ A hammer is a tool, it has a legitimate use. Yes you could bash someone over the head with it, but thats no reason to go and arrest anyone who makes a hammer. It sounds absurd to even suggest such a thing, but this is the direction were heading in within the computer world. Most likely because people dont understand computers, and are more willing to accept whatever law enforcement says so as not to seem ignorant on the matter. Ever notice how people that know nothing about computers are always the first ones to say how evil hackers are? They love acting tough because theyre scared shitless, they try to maintain control over something they will never understand. Unfortunately for coders, hackers, and even just curious computer users, that paranoia is reaching an all time high and may result in people being arrested. And even worse, people supporting those arrests. ======================================================================== 7. *** Big Brother and You *** By: Sad is Tic I noticed something on TV the other day, some lady was caught beating the shit out of her 4 year old daughter in the parking lot of a Kohls department store. Like many other people, I was outraged that someone would take out their anger on their child like that. I found myself rooting for the police to catch her, and even now I hope she never gets to lay a hand on her daughter ever again. But all this footage raised new questions, questions not about child abuse, but about cameras in public places. I turned on Fox News, and there was some guy in a red beret explaining how this event will prove to all those Big Brother fanatics out there that cameras are necessary and can be helpful. Granted, they can be helpfulIm glad the lady got caught. But the argument that cameras are necessary scares me a little. After all, it can be debated whether that camera truly was necessary in that parking lot. You can claim its to zoom in on shoplifters, or to prevent car theft, but please remember most of these cameras can zoom in on you even as you drive off a stores property. So with that in mind, youre technically on camera everywhere you goand I dont think thats something to celebrate. Lets argue that cameras are necessary for a minute, if only to understand what people like red beret man was saying. We should put a camera in the street in front of his house, and zoom it in as close as we can. Hey, if we catch him doing something illegal it will show all us Big Brother fanatics that cameras are necessary. You know, you really have to wonderwhat the hell are these camera supporters really supporting? Do they really want a camera on every corner, do they themselves want to be watched everywhere they go? We all know how violating that is, so why support it? Havent they ever walked through a parking lot, thinking they were alone? As weve heard on Hackermind and in this mag, just imagine that one security guard zooming in on the hot blondewheres your necessity there? These cases are a godsend for corporate America, who already wants to control every move we make. It gets the public on their side, and leaves those Big Brother fanatics out in the cold. People mock them, tell them theyre ridiculous, just because theyre worried about our countrys well being. But then again, it is kind of tough to argue against this casea little girl was savedbut what about what this means for our future? Arent we basically being told that the more cameras we have, the better off we are? Arent we moving closer and closer to that reality once thought of as a paranoid delusion? A reality where people are tracked everywhere they go? 1984 is closer than you may think. If people continue to buy into what others say about cameras being necessary then we may one day find ourselves with no freedom whatsoever. I say again, Im glad the little girl was saved, but lets be careful about how much we open ourselves to the idea of a camera on every corner. And if you think thats crazy, just ask yourself thiswhos watching me right now? =========================================================================== 8. *** Crosstalk *** >Frequency, Whens Freq24 coming out?? [Anonymous] REPLY> It might seem dumb to answer this IN Freq24, but it does give us a chance to say a few words about the ezine. As we said a few months back, its published when its readyand the only way it can be ready is if people like you (insert the Uncle Sam pointing at you picture here) send in those articles! Send them to articles@hackermind.net, or screamer@hackermind.net, whatever sinks your boat. >Frequency, Ive been a long time listener to your show, and I remember you mentioning something about making a real radio show? Wasnt it going to be on AM radio or something like that, whatever happened to it? [Linda Lee] REPLY> We had tried to get some airtime on Southern Connecticut State Universitys radio station, and oddly enough they welcomed a hacker show with open arms. The one condition, I later learned, was that you have to be a spinner for a while, basically you have to do all their work for them before you get your own show. Unfortunately, with only a little over a year remaining at that school (which was obviously cut even shorter when I left) I decided I really didnt want to be their bitch for six months, and only have my own show for the rest of the time. In fact, I cant honestly say I would have ever had my own programwhich would have been Line Noise for those of you interested. Later I wanted to get Hackermind onto shortwave, and havent completely given up on that dream just yet, so well keep you posted. >Frequency, I find it funny you and your readers bash Microsoft so much, considering you yourself admit that your show would be next to impossible without Windows. Dont get me wrong now, Im definitely not saying I like the way Microsoft does business, but how can you say Windows is the scum of the Earth when virtually everyone depends on it? [nerve_ending] REPLY> I dont think you can say we rely on Windows for the things we do, everything weve done can be done on a Linux machine just as well. The reason why we use Windows for the show is because the nic we currently have is not compatible with Linux, so we have little choice. Youll probably argue that the nic doesnt work because Linux isnt that great, but then again, if the world wasnt dominated by Microsoft, maybe it would. Frankly, I think weve pointed out that all operating systems have their strengths and weaknesses, but the Linux OS (and all open unix systems for that matter) is much more receptive to hackers and what they want to do. Windows is simply not an operating system designed to be hackedactually its just designed to be fucked with, but thats beside the point. >Screamer, There was a reply to a letter you wrote in the newest issue of 2600 (19/2) in which Buster Doney says youre dead wrong about campus records. You say they shouldnt be open for anyone and everyone to see, he says all information should be kept free. 2600 seems to agree with you, but I was wondering how you felt about that. [Sharee] REPLY> All information should be free, weve all heard that before, who am I to go against it? Ill tell you the truth, Ive never agreed with that statement. I think that all educational information should be free, ie: information about how things work, whats going on where, and other public facts. Personal information about an individual is a bit different, which is why we never condone putting a Trojan into someones Win98 machine. Theres nothing in there that you can learn more about computers from, probably only personal pictures and email, etc. You cant deny there is a fine line between personal information, and information that should be available. But if you cant tell the difference between someone knowing a unix exploit, and someone getting your phone number (from a publicly accessible database no less), then I really feel sorry for you. 2600 states that individuals should have control over their private data, and I agree with that one hundred percent. The article was about a school (UCONN Storrs if you must know) putting students private data on publicly accessible computers without their knowledge, and thats simply not right. >Frequency, I love being a hacker, but I realized something not too long ago. In order to be the best of the best, you have to pretty much sit in your room all day and all night doing nothing but writing C. I myself cant do that, it drives me up the wallIm wondering what your readers think, am I still a hacker? I play with computers, but I dont live and breathe them, I want to have a life too. Just a question Im asking myself more than anyone else I guess. Love your magazine! [Jason] REPLY> Its true the best hackers generally do sit at their computers day in and day out, but just because youre not as obsessed doesnt mean you cant be a hacker. If you have that drive were always talking about, and enjoy learning about computers and making them do things theyve never done before, then youre a hacker. The important thing is to not focus on being the best, just learn about whatever interests you and try to share with the community whenever you discover something. Personally I know where youre coming from, I love computers, phones, and radio, but I also have other hobbies. I love writing, making television shows, meeting the ladies, etc. Everybodys different, just have fun and try not to worry about titles too much. >Screamer, Youre what, 21 now? How much longer until you join the adult world and start hating hackers? It seems to happen to almost everyone else, just dont want to see it happen to you too. [Camrun] REPLY> Joining the adult world doesnt make you hate hackers, being brainwashed by it does. Since I was a kid Ive found myself relating to hackers more than anyone else, and the idea of suddenly throwing that away someday and becoming a mindless corporate zombie is absurd. I might become a sysadmin someday, but that doesnt mean I have to suddenly hate hackers. Why not use my knowledge to enlighten whoever I work for? Explain to them that these hacker kids could be a great, free, security consultant? In short, I dont feel any closer to Microsoft than I did ten years ago. >Screamer, Hey scream, didnt some chick say she was gonna go down on you during the show or some shit? Thats fucked up, that ever happen?? [Anonymousfor his own sake] REPLY> I recall that being Linda Lee, she wrote in again this month. Ask her, well never tell. Of course, we dont ask for donations, so if any other ladies would like to volunteer their services feel free to email me. Im now being informed our female audience just went from 3 to 0odd. >Frequency, 1. Jack Daniels or Smirnoff Vodka? 2. Jessica Alba or Shakira? 3. OpenBSD or Linux? 4. Phrack or 2600? 5. Coke or Pepsi? REPLY> You ask for letters, you get thishey Ill play along. 1. Jack 2. Jessica Alba 3. Linux 4. Both 5. Jolt 9. *** Closing Arguments *** Alright weve had entirely way too much emotion this month. Folks, stop being sad! Hackermind will be back, we just need a little breather. Now lets get on to some happy news, I just checked the number of subscribers we have for this ezine, and were only 5 away from breaking the 200 mark. Thats right, 195 unique subscribers all getting Frequency in their email, hows that for progress? When we started, I remember sending this thing out to about 7 people, and now 195 are subscribed, and who knows how many more download it. Now, back to the annoying stuff. Ehost is giving us more shit this year, in regards to our renewal of Hackermind.net. Dont worry, and dont get your hopes up, we still have control of it, but it seems like giving false information is becoming increasingly more difficult. Seems like you always have to give up your privacy these days. Dont they realize that people dont want the world using whois to find out where they live? Apparently not. In response to the lady that beat her kid on camera, I agree with Mr. Tic. Im glad theyre putting the bitch on ice, but using it as a way to sell the idea of a camera on every corner is sickening. You could probably shove a camera up someones ass and record a crime, but that doesnt mean I want to walk around with one up there. Laugh while you can, freedom is slipping further and further away. Since I seem to be jumping from topic to topic anyway, a note about the cover. Its a mock up of the show 24, which happens to be one of our favorites around here. Not only are they hacker-friendly (read the character profile for Jamey Farrell), their site even discusses how certain technologies can be used against people. Its rare you see a show that acknowledges not EVERYONE thinks the same exact way. That, and its just really fucking cool. Visit www.fox.com/24 for further information, and tune in on October 29th for the season premiere to see what were talking about. I suppose I should also shout out the four other people at the CT2600 meeting. Meeting Tom Icom was a blast, the guy is really cool. I wish there had been more people there, especially more my age, but theres always next month. Plus it gave me a chance to meet up with my good buddy, and UCONN student, Panther, who I rarely get to see nowadays. We wound up having more fun talking about computer stuff on our own, but it was nice to catch up. Big up to Panther! And lastly, thanks to everyone who supported us in some of the difficult decisions we had to make this month. It wasnt easy, but were convinced what weve decided on is for the best. This is a vacation, so party as Screams house! just dont touch my beerno Im seriousbring your owntouch my Heinys and you diegot me? Good. :) -screamer ========================================================================= 10. *** Crew *** Editor in Chief Screamer Chaotix Webmaster Dash Interrupt Network Administrator Leland D. Peng NT Specialist Unreal Radio Specialist w1nt3rmut3 Writers dual_parallel, Sir Cracksalot, w1nt3rmut3, Sad is Tic Shout Outs Radio FreeK America, Dave, Rene, Joel Surnow and Robert Cochran, members of the Emmy academy that voted for 24, Godless Phreak HACKERMIND Temporarily Closed For Renovations SEND ARTICLES TO articles@hackermind.net WWW.HACKERMIND.NET 11:59:58 11:59:59 12:00:00