========================

                        THE HACKERS TOOLS

                     ========================



 The oscilloscope is the most valuable piece of equipment to the hacker.
With this device the secrets of all but the most secure systems are laid
bare. A dual trace model is essential as normally two signals have to be
examined and compared. Television synch triggering is an advantage. A
ten megahertz bandwidth is the ideal lower limit. A few professional
hackers use digital storage oscilloscopes. While these scopes are useful,
the majority of professional hackers try to use the least amount of
equipment as possible. This may seem strange in some respects. The
system designers developed the system with high cost test equipment.
They try to make their system as secure as possible against the best
equipped hacker. They fall into the trap of thinking that they have
developed the ultimate system. By using the minimum of equipment, the
hacker forces himself to innovate. The use of the scope will be covered
later.


 The next item of equipment is a video test signal generator. This device
can be cost anything form thirty pounds to three thousand pounds.
A lot of hackers rely on microcomputers to provide the test signals. There
is a disadvantage in this use of a computer. Computers generate a lot of
R.F noise and as a result the case of the computer has to be coated in
some sort of R.F shield. A suitable aerosol is available from a number of
suppliers.


 Professional hackers generally use computers to provide their test signals.
This may seem strange as you would expect them to use the best possible
equipment. The computer is more versatile than an ordinary video
generator. It is almost impossible to find two identical test cards. Most of
them carry station identifiers. This fact is not of any great significance
with analogue signals but with digital encryption it can be essential. Most
digital scrambling systems are hacked during the test card period. Services
rarely scramble from the start and so the hacker has access to the test
card. The computer generates this test card and compares it to a
'snapshot" of the encrypted signal. With complex systems, the
comparison process can take up to six weeks or longer.


 The next piece of equipment is the low pass filter. This is a very useful
item when the signal being examined is noisy. A cut-off frequency of one
megahertz is commonest. This unit is used to remove most of the video
information from the signal so that the synch signals can be observed.


 A digital storage oscilloscope is an expensive item that a lot of hackers
cannot afford. There is a way around this problem - build a digital storage
circuit. There are basically four circuits involved an analogue to digital
converter a RAM storage circuit, a digital to analogue converter and some
triggering circuitry. A number of designs have been published in various
electronic journals so the constructional details will not be given here.
The most valuable use of the oscilloscope is in comparative analysis of
two signals. A dual trace scope is virtually essential as it is very difficult
to do any serious work with a single trace unit. Some hackers use an
oscilloscope multiplexer. One such unit is available from Thandar Ltd.
The main disadvantage of such units, after their cost, is their bandwidth.
The majority of those on the market have an upper limit of five hundred
kilohertz. This is all right for looking at synch signals but is useless for
video or high speed digital signals. When designing and building a
multiplexer the main thing to ensure is that the sampling frequency is at
least three times the maximum signal frequency. In order to make the
device as future proof as possible an upper signal frequency limit of
twelve megahertz Is recommended.


 There are some hacker programs available for microcomputers. They are
aimed at the professional hacker rather than the amateur. The program
user draws the scrambled video waveform on the screen using a graphics
tablet. The  program then  analyses  the waveform and first draws the
block diagram for the descrambler and also produces a circuit for the
descrambler. The waveform and the circuit are then stored so that a
library of scrambling systems is built up. Don't bother trying to find such
a program in any magazine or journal as they are only available through
the elite hacker networks.


 Database programs are available for virtually every computer. Such a
program can be a powerful ally when it comes to storing your information
on various scrambling systems. The main headings for the information
would be system type , audio type , suppressed synch , frame inversion ,
line inversion, digital video and digital) audio. A new scrambling system
could then be checked against a list of known systems and a list of known
descrambler circuit blocks could be suggested for dealing with the system.
The template for such a database is given below. This particular format
is known to be in use by a number of the top European hacker networks.
The same type of database is used throughout these networks in order to
ensure the rapid exchange of data on any new system.


 This template is also used by the Scramble Fax newsletter and as such is
a standard format. It is most commonly implemented in Database where
the user is allowed to have large text memo sections in some key points.



===========================
HACKER'S DATABASE TEMPLATE.
===========================

System File Reference:
System Name:
Start Date:
Audio Type:
Video Inverted:
Video line Inversion:
Video Frame Inversion:
Random Line Inversion:
Alternate Line Inversion:
Alternate Frame Inversion:
Horizontal Synch Suppression:
Frame Synch Suppression:
Horizontal Synch Replacement:
Frame Synch Replecement:
Pulse Suppression:
Sine Suppression:
Line Delay:
Audio On FM Carrier:
Audio On Sideband:
Audio Spectrum Inversion:
MAC System: Digitised Audio:
DESed Digital Audio:
Origin Of System:
Media Cross References:
Pro Media References:
Other Users Of System:
Descrembler Circuit Known:
Possible Useful Circuits:
Availability Of Official Descramblers:
Custom ICs Used:
Function Of Custom ICs:
Descrembler Addressing: