ANARCHY COOKBOOK VERSION 2000 - BNRG

3y ago
64 Views
8 Downloads
896.58 KB
241 Pages
Last View : 24d ago
Last Download : 3m ago
Upload by : Helen France
Transcription

ANARCHY COOKBOOK VERSION 2000

Table of Contents1.Counterfeiting Money2.Credit Card Fraud3.Making Plastic Explosives4.Picking Master Locks5.The Arts of Lockpicking I6.The Arts of Lockpicking II7.Solidox Bombs8.High Tech Revenge: The Beigebox9.COý Bombs10.Thermite II Bombs11.Touch Explosives12.Letter Bombs13.Paint Bombs14.Ways to send a car to HELL15.Do you hate school?16.Phone related vandalism17.Highway police radar jamming18.Smoke Bombs19.Mail Box Bombs20.Hot-wiring cars21.Napalm22.Fertilizer Bomb23.Tennis Ball Bomb24.Diskette Bombs25.Unlisted Phone Numbers26.Fuses27.How to make Potassium Nitrate28.Exploding Light bulbs29.Under water igniters30.Home-brew blast cannon31.Chemical Equivalency List32.Phone Taps33.Landmines34.A different Molitov Cocktail35.Phone Systems Tutorial I36.Phone Systems Tutorial II37.Basic Alliance Teleconferencing38.Aqua Box Plans39.Hindenberg Bomb40.How to Kill Someone41.Phone Systems Tutorial III42.Black Box Plans43.The Blotto Box44.Blowgun45.Brown Box Plans46.Calcium Carbide Bomb47.More Ways to Send a Car to Hell48.Ripping off Change Machines49.Clear Box Plans50.CNA Number Listing51.Electronic Terrorism52.Start a Conf. w/o 2600hz or MF53.Dynamite54.Auto Exhaust Flame Thrower55.How to Break into BBs Express56.Firebomb57.Fuse Bomb58.Generic Bomb59.Green Box Plans60.Portable Grenade Launcher61.Basic Hacking Tutorial I62.Basic Hacking Tutorial II63.Hacking DEC's64.Harmless Bombs65.Breaking into Houses66.Hypnotism67.Remote Informer Issue #168.Jackpotting ATM Machines69.Jug Bomb70.Fun at K-Mart71.Mace Substitute72.How to Grow Marijuana73.Match Head Bomb74.Terrorizing McDonalds75."Mentor's" Last Words76.The Myth of the 2600hz Detector77.Blue Box Plans78.Napalm II79.Nitroglycerin Recipe80.Operation: Fuckup81.Stealing Calls from Payphones82.Pool Fun83.Free Postage84.Unstable Explosives85.Weird Drugs86.The Art of Carding87.Recognizing Credit Cards88.How to Get a New Identity89.Remote Informer Issue #290.Remote Informer Issue #391.Remote Informer Issue #492.Remote Informer Issue #593.Phreaker's Guide to Loop Lines94.Ma-Bell Tutorial95.Getting Money out of Pay Phones96.Computer-based PBX97.PC-Pursuit Port Statistics98.Pearl Box Plans99.The Phreak File100.Red Box Plans101.RemObS102.Scarlet Box Plans103.Silver Box Plans104.Bell Trashing105.Canadian WATS Phonebook106.Hacking TRW107.Hacking VAX & UNIX108.Verification Circuits109.White Box Plans110.The BLAST Box111.Dealing with the R&R Operator112.Cellular Phone Phreaking113.Cheesebox Plans114.Start Your Own Conferences

115.Gold Box Plans116.The History of ESS117.The Lunch Box118.Olive Box Plans119.The Tron Box120.More TRW Info121."Phreaker's Phunhouse"122.Phrack Magazine-Vol. 3, Issue 27123.Phrack Magazine-Vol. 3, Issue 27124.Phrack Magazine-Vol. 3, Issue 28125.Phrack Magazine-Vol. 3, Issue 28126.Phrack Magazine-Vol. 3, Issue 28127.Phrack Magazine-Vol. 3, Issue 30128.Phrack Magazine-Vol. 3, Issue 30129.Phrack Magazine-Vol. 3, Issue 30130.Sodium Chlorate131.Mercury Fulminate132.Improvised Black Powder133.Nitric Acid134.Dust Bomb Instructions135.Carbon-Tet Explosive136.Making Picric Acid from Aspirin137.Reclamation of RDX from C-4138.Egg-based Gelled Flame Fuels139.Clothespin Switch140.Flexible Plate Switch141.Low Signature System [Silencers]142.Delay Igniter From Cigarette143.Nicotine144.Dried Seed Timer145.Nail Grenade146.Bell Glossary147.Phone Dial Locks -- Beat'em148.Exchange Scanning149.A Short History of Phreaking150."Secrets of the Little Blue Box"151.The History of British Phreaking152."Bad as Shit"153.Telenet154.Fucking with the Operator155.Phrack Magazine-Vol. 1, Issue 1156.International Country Codes List157.Infinity Transmitter Plans158.LSD159.Bananas160.Yummy Marihuana Recipes161.Peanuts162.Chemical Fire Bottle163.Igniter from Book Matches164."Red or White Powder" Propellant165.Pipe Hand Grenade166.European Credit Card Fraud167.Potassium Bomb168.Your Legal Rights169.Juvenile Offenders' Rights170.Down The Road Missle171.Fun With Shotgun Shells172.Surveillance Equipment173.Drip Timer174.Stealing175.Miscellaneous176.Shaving cream bomb177.Ripping off change machines II178.Lockpicking the EASY way179.Anarchy 'N' Explosives Prelude180.Anarchy 'N' Explosives Vol. 1181.Anarchy 'N' Explosives Vol. 2182.Anarchy 'N' Explosives Vol. 3183.Anarchy 'N' Explosives Vol. 4184.Anarchy 'N' Explosives Vol. 5185.Explosives and Propellants186.Lockpicking III187.Chemical Equivalent List II188.Nitroglycerin II189.Cellulose Nitrate190.Starter Explosives191.Flash Powder192.Exploding Pens193.Revised Pipe Bombs194.* SAFETY * A MUST READ!195.Ammonium TriIodide196.Sulfuric Acid & Amm. Nitrate III197.Black Powder III198.Nitrocellulose199.RDX200.The Black Gate BBS201.ANFOS202.Picric Acid II203.Bottled Explosives204.Dry Ice205.Fuses / Ignitors / Delays206.Film Canister Bombs207.Book Bombs208.Phone Bombs209.Special Ammunition210.Rocketry211.Pipe Cannon II212.Smoke Bombs213.Firecrackers214.Suppliers II215.Lab-Raid Checklist216.Misc Anarchy217.Combo Locks II218.Misc Anarchy II219.Thermite IV

1. Counterfeiting Moneyby The Jolly RogerBefore reading this article, it would be a very good idea to get a book on photo offset printing, for this is the method used in counterfeiting UScurrency. If you are familiar with this method of printing, counterfeiting should be a simple task for you.Genuine currency is made by a process called "gravure", which involves etching a metal block. Since etching a metal block is impossible to doby hand, photo offset printing comes into the process.Photo offset printing starts by making negatives of the currency with a camera, and putting the negatives on a piece of masking material(usually orange in color). The stripped negatives, commonly called "flats", are then exposed to a lithographic plate with an arc light plate maker.The burned plates are then developed with the proper developing chemical. One at a time, these plates are wrapped around the plate cylinderof the press.The press to use should be an 11 by 14 offset, such as the AB Dick 360. Make 2 negatives of the portrait side of the bill, and 1 of the backside. After developing them and letting them dry, take them to a light table. Using opaque on one of the portrait sides, touch out all the green,which is the seal and the serial numbers. The back side does not require any retouching, because it is allone color. Now, make sure all of the negatives are registered (lined up correctly) on the flats. By the way, every time you need another serialnumber, shoot 1 negative of the portrait side, cut out the serial number, and remove the old serial number from the flat replacing it with the newone.Now you have all 3 flats, and each represents a different color: black, and 2 shades of green (the two shades of green are created by mixinginks). Now you are ready to burn the plates. Take a lithographic plate and etch three marks on it. These marks must be 2 and 9/16 inches apart,starting on one of the short edges. Do the same thing to 2 more plates. Then, take 1 of the flats and place it on the plate, exactly lining the shortedge up with the edge of the plate. Burn it, move it up to the next mark, and cover up the exposed area you have already burned. Burn that,and do the same thing 2 more times, moving the flat up one more mark. Do the same process with the other 2 flats (each on a separate plate).Develop all three plates. You should now have 4 images on each plate with an equal space between each bill.The paper you will need will not match exactly, but it will do for most situations. The paper to use should have a 25% rag content. By the way,Disaperf computer paper (invisible perforation) does the job well. Take the paper and load it into the press. Be sure to set the air, buckle, andpaper thickness right. Start with the black plate (the plate without the serial numbers). Wrap it around the cylinder and load black ink in. Makesure you run more than you need because there will be a lot of rejects. Then, while that is printing, mix the inks for the serial numbers and theback side. You will need to add some white and maybe yellow to the serial number ink. You also need to add black to the back side. Experimentuntil you get it right. Now, clean the press and print the other side. You will now have a bill with no green seal or serial numbers. Print a fewwith one serial number, make another and repeat. Keep doing this until you have as many different numbers as you want. Then cut the bills tothe exact size with a paper cutter. You should have printed a large amount of money by now, but there is still one problem; the paper is purewhite. To dye it, mix the following in a pan: 2 cups of hot water, 4 tea bags, and about 16 to 20 drops of green food coloring (experiment withthis). Dip one of the bills in and compare it to a genuine US bill. Make the necessary adjustments, and dye all the bills. Also, it is a good idea tomake them look used. For example, wrinkle them, rub coffee grinds on them, etc.As before mentioned, unless you are familiar with photo offset printing, most of the information in this article will be fairly hard to understand.Along with getting a book on photo offset printing, try to see the movie "To Live and Die in LA". It is about a counterfeiter, and the producerdoes a pretty good job of showing how to counterfeit. A good book on the subject is "The Poor Man's James Bond".If all of this seems too complicated to you, there is one other method available for counterfeiting: The Canon color laser copier. The Canon canreplicate ANYTHING in vibrant color, including US currency. But, once again, the main problem in counterfeiting is the paper used. So,experiment, and good luck!2. Credit Card Fraudby The Jolly RogerFor most of you out there, money is hard to come by. Until now:With the recent advent of plastic money (credit cards), it is easy to use someone else's credit card to order the items you have always desiredin life. The stakes are high, but the payoff is worth it.Step One: Getting the credit card informationFirst off, you must obtain the crucial item: someone's credit card number. The best way to get credit card numbers is to take the blue carbonsused in a credit card transaction at your local department store. These can usually be found in the garbage can next to the register, or for themore daring, in the garbage dumpster behind the store. But, due to the large amount of credit card fraud, many stores have opted to use acarbonless transaction sheet, making things much more difficult. This is where your phone comes in handy.First, look up someone in the phone book, and obtain as much information as possible about them. Then, during business hours, call in a veryconvincing voice - "Hello, this is John Doe from the Visa Credit Card Fraud Investigations Department. We have been informed that your credit

card may have been used for fraudulent purposes, so will you please read off the numbers appearing on your Visa card for verification." Ofcourse, use your imagination! Believe it or not, many people will fall for this ploy and give out their credit information.Now, assuming that you have your victim's credit card number, you should be able to decipher the information given.Step Two: Recognizing information from carbon copiesCard example:[American Express]XXXX XXXXXX XXXXXMM/Y1 THRU MM/Y2JOE SHMOEExplanation:MM/Y1 is the date the card was issued, and MM/Y2 is the expiration date. The American Express Gold Card has numbers XXXXXX XXXXXXXXXXXXXXXX, and is covered for up to 5000.00, even if the card holder is broke.[Mastercard]5XXX XXXX XXXX XXXXXXXX AAA DD-MM-YY MM/YYJOE SHMOEExplanation:XXXX in the second row may be asked for during the ordering process. The first date is when the card was new, and the second is when thecard expires. The most frequent number combination used is 5424 1800 XXXX XXXX. There are many of these cards in circulation, but many ofthese are on wanted lists, so check these first.[Visa]4XXX XXX(X) XXX(X) XXX(X)MM/YY MM/YY*VISAJOE SHMOEExplanation:Visa is the most abundant card, and is accepted almost everywhere. The "*VISA" is sometimes replaced with "BWG", or followed with aspecial code. These codes are as follows:[1] MM/YY*VISA V - Preferred Card[2] MM/YY*VISA CV - Classic Card[3] MM/YY*VISA PV - Premier CardPreferred Cards are backed with money, and are much safer to use. Classic Cards are newer, harder to reproduce cards with decentbacking. Premier Cards are Classic Cards with Preferred coverage. Common numbers are 4448 020 XXX XXX, 4254 5123 6000 XXXX, and4254 5123 8500 XXXX. Any 4712 1250 XXXX XXXX cards are IBM Credit Union cards, and are risky to use, although they are usually coveredfor large purchases.Step Three: Testing creditYou should now have a Visa, Mastercard, or American Express credit card number, with the victim's address, zip code, and phone number.By the way, if you have problems getting the address, most phone companies offer the Address Tracking Service, which is a special numberyou call that will give you an address from aphone number, at a nominal charge. Now you need to check the balance of credit on the credit card (to make sure you don't run out of money),and you must also make sure that the card isn't stolen. To do this you must obtain a phone number that businesses use to check out creditcards during purchases. If you go to a department store, watch the cashier when someone makes a credit card purchase. He/she will usuallycall a phone number, give the credit information, and then give what is called a "Merchant Number". These numbers are usually written downon or around the register. It is easy to either find these numbers and copy them, or to wait until they call one in. Watch what they dial and waitfor the 8 digit (usually) merchant number. Once you call the number, in a calm voice, read off the account number, merchant number, amount,and expiration date. The credit bureau will tell you if it is OK, and will give you an authorization number. Pretend you are writing this numberdown, and repeat it back to them to check it. Ignore this number completely, for it serves no real purpose. However, once you do this, the bankremoves dollars equal to what you told them, because the card was supposedly used to make a purchase. Sometimes you can trick theoperator by telling her the customer changed his mind and decided not to charge it. Of course, some will not allow this. Remember at all times

that you are supposed to be a store clerk calling to check out the card for a purchase. Act like you are talking with a customer when he/she"cancels".Step Four: The dropOnce the cards are cleared, you must find a place to have the package sent. NEVER use a drop more than once. The following are typical dropsites:[1] An empty houseAn empty house makes an excellent place to send things. Send the package UPS, and leave a note on the door saying, "UPS. I work days, 8 to6. Could you please leave the package on the back door step?" You can find dozens of houses from a real estate agent by telling them youwant to look around for a house. Ask for a list of twenty houses for sale, and tell them you will check out the area. Do so, until you find onethat suits your needs.[2] Rent A SpotU-Haul sometimes rents spaces where you can have packages sent and signed for. End your space when the package arrives.[3] People's housesFind someone you do not know, and have the package sent there. Call ahead saying that "I called the store and they sent the package to thewrong address. It was already sent, but can you keep it there for me?" This is a very reliable way if you keep calm when talking to the people.Do NOT try post office boxes. Most of the time, UPS will not deliver to a post office box, and many people have been caught in the pastattempting to use a post office box. Also, when you have determined a drop site, keep an eye on it for suspicious characters and cars thathave not been there before.Step Five: Making the transactionYou should now have a reliable credit card number with all the necessary billing information, and a good drop site.The best place to order from is catalogues, and mail order houses. It is in your best interest to place the phone call from a pay phone,especially if it is a 1-800 number. Now, when you call, don't try to disguise your voice, thinking you will trick the salesperson into believing youare an adult. These folks are trained to detect this, so your best bet is to order in your own voice. They will ask for the following: name, nameas it appears on card, phone number, billing address, expiration date, method of shipping, and product. Ask if they offer UPS Red shipping(next day arrival), because it gives them less time to research an order. If you are using American Express, you might have a bit of a problemshipping to an address other than the billing address. Also, if the salesperson starts to ask questions, do NOT hang up. Simply talk your wayout of the situation, so you won't encourage investigation on the order.If everything goes right, you should have the product, free of charge. Insurance picks up the tab, and no one is any wiser. Be careful, and trynot to order anything over 500. In some states, UPS requires a signature for anything over 200, not to mention that anything over 200 isdefined as grand theft, as well as credit fraud. Get caught doing this, and you will bite it for a couple of years. Good luck!3. Making Plastic Explosives from Bleachby The Jolly RogerPotassium chlorate is an extremely volatile explosive compound, and has been used in the past as the main explosive filler in grenades, landmines, and mortar rounds by such countries as France and Germany. Common household bleach contains a small amount of potassiumchlorate, which can be extracted by the procedure that follows.First off, you must obtain:1.A heat source (hot plate, stove, etc.)2.A hydrometer, or battery hydrometer3.A large Pyrex, or enameled steel container (to weigh chemicals)4.Potassium chloride(sold as a salt substitute at health and nutrition stores)Take one gallon of bleach, place it in the container, and begin heating it. While this solution heats, weigh out 63 grams of potassium chloride andadd this to the bleach being heated. Constantly check the solution being heated with the hydrometer, and boil until you get a reading of 1.3. Ifusing a battery hydrometer, boil until you read a FULL charge.Take the solution and allow it to cool in a refrigerator until it is between room temperature and 0øC. Filter out the crystals that have formed andsave them. Boil this solution again and cool as before. Filter and save the crystals.

Take the crystals that have been saved, and mix them with distilled water in the following proportions: 56 grams per 100 milliliters distilledwater. Heat this solution until it boils and allow to cool. Filter the solution and save the crystals that form upon cooling. This process ofpurification is called "fractional crystallization". These crystals should be relatively pure potassium chlorate.Powder these to the consistency of face powder, and heat gently to drive off all moisture.Now, melt five parts Vaseline with five parts wax. Dissolve this in white gasoline (camp stove gasoline), and pour this liquid on 90 partspotassium chlorate (the powdered crystals from above) into a plastic bowl. Knead this liquid into the potassium chlorate until intimately mixed.Allow all gasoline to evaporate.Finally, place this explosive into a cool, dry place. Avoid friction, sulfur, sulfides, and phosphorous compounds. This explosive is best moldedto the desired shape and density of 1.3 grams in a cube and dipped in wax until water proof. These block type charges guarantee the highestdetonation velocity. Also, a blasting cap of at least a 3 grade must be used.The presence of the afore mentioned compounds (sulfur, sulfides, etc.) results in mixtures that are or can become highly sensitive and willpossibly decompose explosively while in st

61.Basic Hacking Tutorial I 62.Basic Hacking Tutorial II 63.Hacking DEC's 64.Harmless Bombs 65.Breaking into Houses 66.Hypnotism 67.Remote Informer Issue #1 68.Jackpotting ATM Machines 69.Jug Bomb 70.Fun at K-Mart 71.Mace Substitute 72.How to Grow Marijuana 73.Match Head Bomb 74.Terrorizing McDonalds 75."Mentor's" Last Words

Related Documents:

SAP has developed a new radio frequency (RF) concept. This RF cookbook helps developers to begin working in the RF framework. It answers frequently asked questions and helps to avoid common errors. This RF cookbook also provides some useful tips about the standard layout and screen structure that should be applied in the standard transactions.File Size: 299KBPage Count: 59Explore further[PDF] SAP EWM RF Cookbook - Free Download PDFdlscrib.comEWM RF Cookbook SAP blog of John Kristensenjksap.wordpress.comRF Cookbook - Part I Description - SAP Communityarchive.sap.comRF Cookbook - Part I Descriptiondocshare01.docshare.tipsSAP EWM RF Framework - SlideSharewww.slideshare.netRecommended to you based on what's popular Feedback

Active Filter Cookbook, CMOS Cookbook, TTL Cook book, RTL Cookbook (out of print), TVT Cookbook, Cheap Video Cookbook, Son of Cheap Video, The Hex adecimal Chronicles, The Incredible Secret M

Naked Persian Turkey Burgers The Skinnytaste Cookbook Perfect Poultry 156 6 6 6 Orecchiette with Sausage, Baby Kale, and Bell Pepper The Skinnytaste Cookbook Perfect Poultry 181 11 11 4. RECIPE COOKBOOK CHAPTER PG SP Roasted Poblanos Rellenos with Chicken The Skinnytaste Cookbook Perfect Poultry 173 7 10 5

How To Cook (use this Arduino cookbook) What Is This Cookbook? This Arduino circuits and programming instruction guide is organized into a "cookbook" style layout. The cookbook illustrates how to create and write various arduino based circuits and programs. These instructions are organized into "Recipes" or instruction guides that can be

1 Page Practical Anarchy “Practical Anarchy” is the second in a three-volume series on an

ANARCHY IN A COLD WAR Anarchy in a Cold War first appeared in a very limited Hooligan Press draft edition in the late 1980s. Shortly afterwards Hooligan Press, an anarcho

Some Quotes on Anarchy, Leviathan, and State On the nature of anarchy: from Thomas Hobbes, Leviathan (1651) "Whatsoever therefore is consequent to time of Warre, where every man is Enemy to every man; the same is consequent to the time wherein men live without other secu-

The Baldrige Excellence Framework empowers your organization to reach its goals, improve results, and become more competitive. Thousands of organizations around the world use the Baldrige Excellence Framework to improve and get sustainable results. Those recognized as national role models receive the Malcolm Baldrige National Quality Award, a Presidential award. At the Quality Texas Foundation .