AOH :: P23-03.TXT

Subdivisions (Part 3 of The Vicious Circle Trilogy)

                                ==Phrack Inc.==

                      Volume Two, Issue 23, File 3 of 12

       <>                                                            <>
       <>                        Subdivisions                        <>
       <>                        ~~~~~~~~~~~~                        <>
       <>          Part Three Of The Vicious Circle Trilogy          <>
       <>                                                            <>
       <>  A Study On The Occurrence Of Groups Within The Community  <>
       <>                                                            <>
       <>                Presented by Knight Lightning               <>
       <>                       August 8, 1988                       <>
       <>                                                            <>

               A Rose By Any Other Name... Would Smell As Sweet


          The Administration \ Advanced Telecommunications, Inc./ATI
         ALIAS \ American Tone Travelers \ Anarchy Inc. \ Apple Mafia
  The Association \ Atlantic Pirates Guild/APG \ Bad Ass Mother Fuckers/BAMF
    Bellcore \ Bell Shock Force/BSF \ Black Bag \ Camorra \ C&M Productions
   Catholics Anonymous \ Chaos Computer Club \ Chief Executive Officers/CEO
 Circle Of Death \ Circle Of Deneb \ Club X \ Coalition of Hi-Tech Pirates/CHP
        Coast-To-Coast \ Corrupt Computing \ Cult Of The Dead Cow/-cDc-
    Custom Retaliations \ Damage Inc. \ D&B Communications \ The Dange Gang
            Dec Hunters \ Digital Gang/DG \ DPAK \ Eastern Alliance
          The Elite Hackers Guild \ Elite Phreakers and Hackers Club
  The Elite Society Of America \ EPG \ Executives Of Crime \ Extasyy (Elite)
   Fargo 4A \ Farmers Of Doom/FOD \ The Federation \ Feds R Us \ First Class
          Five O \ Five Star \ Force Hackers \ The 414s \ Hack-A-Trip
Hackers Of America/HOA \ High Mountain Hackers \ High Society \ The Hitchhikers
       IBM Syndicate \ The Ice Pirates Imperial Warlords \ Inner Circle
                        Inner Circle II \ Insanity Inc.
International Computer Underground Bandits/ICUB \ Justice League of America/JLA
     Kaos Inc. \ Knights Of Shadow/KOS \ Knights Of The Round Table/KOTRT
       League Of Adepts/LOA \ Legion Of Doom/LOD \ Legion Of Hackers/LOH
       Lords Of Chaos \ Lunitic Labs, Unlimited \ Master Hackers \ MAD!
            The Marauders \ MD/PhD \ Metal Communications, Inc./MCI
  MetalliBashers, Inc./MBI \ Metro Communications \ Midwest Pirates Guild/MPG
       NASA Elite \ The NATO Association \ Neon Knights \ Nihilist Order
Order Of The Rose \ OSS \ Pacific Pirates Guild/PPG \ Phantom Access Associates
                PHido PHreaks \ Phlash \ PhoneLine Phantoms/PLP
              Phone Phreakers Of America/PPOA \ Phortune 500/P500
               Phreak Hack Delinquents \ Phreak Hack Destroyers
         Phreakers, Hackers, And Laundromat Employees Gang/PHALSE Gang
     Phreaks Against Geeks/PAG \ Phreaks Against Phreaks Against Geeks/PAP
      Phreaks and Hackers of America \ Phreaks Anonymous World Wide/PAWW
             Project Genesis \ The Punk Mafia/TPM \ The Racketeers
 Red Dawn Text Files/RDTF \ Roscoe Gang \ SABRE \ Secret Circle of Pirates/SCP
   Secret Service \ 707 Club \ Shadow Brotherhood \ Sharp Inc. \ 65C02 Elite
    Spectral Force \ Star League \ Stowaways \ Strata-Crackers \ The Phrim
     Team Hackers '86 \ Team Hackers '87 \ TeleComputist Newsletter Staff
 Tribunal Of Knowledge/TOK \ Triple Entente \ Turn Over And Die Syndrome/TOADS
  300 Club \ 1200 Club \ 2300 Club \ 2600 Club \ 2601 Club \ 2AF \ Ware Brigade
           The Warelords \ WASP \ The United Soft WareZ Force/TuSwF
                       United Technical Underground/UTU

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Its literally unbelievable just how many different groups and organizations
there are or have been in the phreak/hack/pirate community.  The list of 130
groups displayed above is probably still just a fraction of the actual amount
of groups that there have been, but those are the only ones I am aware of at
this time.

In the past John Maxfield has estimated that there are about 50,000
hackers/phreaks/pirates operating in the United States today.  That figure has
multiplied to to a point where it probably comes close to 500,000.  Believe it
or not, almost everyone has been a member of one of the above groups (or
perhaps a group not mentioned) at one time or another.

Today's telecom security consultants and law enforcement agencies know this too
and that is how group affiliations can be turned against us.

What does being in a group mean?  In the modem community being in a group is
supposed to mean that the people in the group work on projects together and
trade specific information that people outside of the group are not allowed to
access and by the same token, have no way to get it.  However, obviously the
people in the group all feel that the other people with whom they are sharing
information, can be trusted and are worthy of associating with them to begin
with.  So when you stop and think about it, if there was no group, the people
in question would still be trading information and would still trust each other
because they would not have formed the group unless this criteria was met in
the first place.  So in truth, being in a group really means nothing on the
basis previously mentioned.

You see in the modem community, being in a group really is more like a power
trip or a "security blanket" for people who feel that they need to let people
know that they associate with a specific clique in the hopes that the
popularity of some of the other members will lend popularity to themselves.

Many groups form in such a way that they try to make it look otherwise and thus
begins the real problem.  Some groups are formed by a person who tries to get a
lot of guys together that he feels knows a lot or seems to post a lot of good
information - Bad Move; If you are going to form a group at all, stick with
people who you know can be trusted (can you really ever "know" who can be
trusted?) and then out of those people form your group or choose who you feel
should be in it.

Anyway, to prove that they are elite, most groups begin to gather specific data
for giving to group members, and this includes handing out their own names and
phone numbers with other members of the group.  They feel a false loyalty and
psychologically create such utter faith in all the members that the faith is
ultimately blind and based on hopes and aspirations of greatness.

What is the best way for a security agent or informant to blend in with the
modem community?  Join as many groups as possible, start gathering data on
the members, and spread your handle throughout the community to become "well

Example:  Taken From Phrack World News Issue XV;

           [This article has been edited for this presentation. -KL]
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Mad Hatter; Informant?                                            July 31, 1987
We at Phrack Inc. have uncovered a significant amount of information that has
led us to the belief that Mad Hatter is an informant for some law enforcement

When Taran King, Cheap Shades, Forest Ranger, and Knight Lightning arrived at
Control C's in Chicago, Illinois, Mad Hatter had already searched the place and
had found some papers that could only have done ^C harm.   We destroyed this
information and thought everything was ok.  However, as it turns out, we
searched Mad Hatter's bags and found a duplicate set of this information and
the general hypothesis was they he intended to leave it behind as incriminating

Mad Hatter had also brought down several disks for the purpose of copying
Phantasie Realm.  Please note; PR was an IBM program and MH has an apple.

Control C told us that when he went to pick Mad Hatter up at the bus terminal,
he watched the bus pull in and saw everyone who disembarked.  Suddenly Mad
Hatter was there, but not from the bus he was supposed to have come in on.  In
addition to this, he had baking soda wrapped in a five dollar bill that he
tried to pass off as cocaine.  Perhaps to make us think he was cool or

Mad Hatter constantly tried to get left behind at ^C's apartment for unknown
reasons. He also was seen at a neighbor's apartment making unauthorized calls
into the city of Chicago.  When asked who he called, his reply was "Don't worry
about it."  Mad Hatter had absolutely no money with him during PartyCon (and
incidentally he ate everything in ^C's refrigerator) and yet he insisted that
although he had taken the bus down and had return trip tickets for the bus,
that he would fly back home.  How was this going to be achieved?  He had no
money and even if he could get a refund for the bus tickets, he would still be
over $200 short.  When asked how he was going to do this, his reply was "Don't
worry about it."

On Saturday night while on the way to the Hard Rock Cafe, Mad Hatter asked
Control C for the location of his computer system and other items 4 times.
This is information that Hatter did not need to know, but perhaps a SS agent or
someone could use very nicely.

When Phrack Inc. discovered that Dan The Operator was an FBI informant and made
the news public, several people were criticizing him on Free World II Private.
Mad Hatter on the other hand, stood up for Noah and said that he was still his
friend despite what had happened.  Then later when he realized that people were
questioning his legitimacy, his original posts were deleted and he started
saying how much he wanted to kill Dan The Operator and that he hated him.

Mad Hatter already has admitted to knowing that Dan The Operator was an FBI
informant prior to SummerCon '87.  He says the reason he didn't tell anyone is
because he assumed we already knew.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
When Mad Hatter first entered the phreak/hack world, he joined;

                     Phreaks Anonymous World Wide (PAWW),
                     MetalliBashers, Inc (MBI),
                     Order of The Rose, and
                     Cult of The Dead Cow (-cDc-).

If you were a security agent or a loser hacker turned informant and you wanted
to mix in with the phreak/hack community, wouldn't you try to join as many
groups as possible to spread your name?
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Phreaks Anonymous World Wide, MetalliBashers, Inc., Order of The Rose, and
Cult of The Dead Cow, not exactly the toughest groups to join and once there is
one security person in the group, he is bound to vouch for others, etc.  So
while he spreads his name as an elite modem user throughout the community, he
is busy gathering information on group members who are foolish enough to trust

Its not bad enough that some groups are easy enough to infiltrate as it is, but
does anyone remember this?

Taken From Phrack World News Issue XI;
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Phortune 500:  Phreakdom's Newest Organization               February 16, 1987
For those of you who are in the least bit interested, Phortune 500 is a group
of telecommunication hobbyists who's goal is to spread information as well as
further their own knowledge in the world of telecommunications.  This new
group was formed by:

    Brew Associates / Handsomest One / Lord Lawless / The Renegade Chemist
          Quinton J. Miranda / Striker / The Mad Hacker / The Spiker

These eight members are also known as Board Of Directors (BOD).  They don't
claim to be *Elite* in the sense that they are they world's greatest hacker,
but they ARE somewhat picky about their members.  They prefer someone who knows
a bit about everything and has talents exclusive to him/herself.

One of the projects that Phortune 500 has completed is an individual password
AE type system.  It's called TransPhor.  It was written and created by Brew
Associates.  It has been Beta tested on The Undergraduate Lounge (Sysoped by
Quinton J. Miranda).   It is due to be released to the public throughout the
next few months.

Phortune 500 has been in operation for about 4 months, and has released two
newsletters of their own.  The Phortune 500 Newsletter is quite like the
"People" of contemporary magazines.  While some magazines cover the deep
technical aspects of the world in which we communicate, their newsletter tries
to cover the lighter side while throwing in information that they feel is "of
technical nature."  The third issue is due to be released by the end of this
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
             *>=-> The Phortune 500 Membership Questionnaire <-=<*

Note:  The following information is of a totally confidential nature.  The
       reason you may find this so lengthy and in depth is for our knowledge of
       you.  We, with Phortune 500, feel as though we should know prospective
       members well before we allow them into our organization.  Pending the
       answers you supply us, you will be admitted to Phortune 500 as a charter
       member.  Please answer the following completely...

Handle                          :
First Name                      :
Voice Phone Number              :
Data Phone Number               :
City & State                    :
Age                             :
Occupation (If Applicable)      :
Place of Employment (Optional)  :
Work Phone Number   (Optional)  :
Computer Type                   :
Modem Type                      :
Interests                       :
Areas Of Expertise              :
References (No More Than Three) :
Major Accomplishments (If Any)  :
Answer In 50 Words Or Less;

^*^  What Is Phortune 500 in Your Opinion?

^*^  Why Do You Want To Be Involved With Phortune 500?

^*^  How Can You Contribute to Phortune 500?

Please answer each question to the best of your ability and then return to any
Phortune 500 Board of Directors Member Or a Phortune 500 BBS:

           The Private Connection (Limited Membership) 219-322-7266
           The Undergraduate AE   (Private Files Only) 602-990-1573
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

An actual application form for joining a group.  Perhaps the concept was a good
one, perhaps not, but from a standpoint of publicity and security, this was a
complete and utter catastrophe.

Basically we are all here to learn in one way or another.  Groups and clubs
in our community only seem to segregate it and at a time when everyone should
be pulling together, this is not such a good idea.  Privacy and security are
important factors that motivate these sects within the society, but ultimately
are the final consequences worth the trouble of creating a group?

If groups had not been created, there would not be as much attention on the
phreak/hack community as there is right now.  When group names start spreading,
it starts the law enforcement agencies into a panic that its big time organized
crime.  This allows them to justify more time and money into the apprehension
of computer criminals and usually they go after the big names; the people in
the most "elite" groups.

Now before you, a member of a group, start criticizing this file, please
understand, I am not referring to any particular groups here, just groups in
general.  Any and all comments made about MBI, -cDc-, PAWW, OOTR, and P500
should not be taken personally and were used only as examples of how groups can
be potential security problems.

There are some groups that are worthwhile organizations and its obvious because
that have existed through the years and been productive.  However, the only way
to keep this community alive is for everyone to work together to protect and
learn from each other.

:Knight Lightning

                              "The Future Is Now"


AOH Site layout & design copyright © 2006 AOH