You are on page 1of 24

2600

Volume 4, Number 2 February, 1987 $2


2600 WANTS YOU!
Join the staff of 2600. It is simple.
Just compile any information you have so it is easily
understandable and send it to us. We accept hardcopy and uploads.
We will also accept information on floppies-call us if you wish to
do that.

We need:
• Profiles of long distance companies
• Profiles of computer systems
• Reviews of popular security devices
• Lists of interesting phone numbers
• Lists of interesting reference books and magazines
• Updated tutorials on using things like ADS, CNA
• Interesting true stories
• Data that can be a good reference
• Maps of computer networks
• AnalysIs of new legislation

We would like:
• Legitimate access to various computer networks
• You to continue to send your comments and questions
• You to continue to send clippings from local papers and
magazines
• You to help keep us informed

Things we could always use:


* Printers, computers, telephones, and interesting devices
* More modernized office equipment
* A 2400 baud modem

/( you send an article or data, please request a by-line otherwise we


will not print one.
/( you send us hardware, please make sure it is not stolen. We do
'
not want your troubles.

We pay our writers a small amount. Perhaps that will be the


incentive you need. We also pay people who get advertising for us.
Call us for more details.

All contributors, please send your gifts to: 2600, P,O, Box 99,
Middle Island, NY 11953-0099, or call 5167512600.

Page 2 February, 1 987 2600


his observations.
We've been swamped with mail from
We've also got an article on
people who either wanted to renew at
COSMOS that many readers will no
the old rate or who wanted to comment doubt fail to understand entirely. This
on our new style. Please forgive us if we has always been a problem for us here as
seem to take a little longer to process
we must constantly try to please both
your particular request-this avalanche the beginners and the advanced hackers
far outweighed our wildest dreams.
among us. One thing we believe
This probably means we're doing
everyone can get out of this article is a
quite well, but it's always hard to be
realization of all of the different ways
conclusive. Our experiments with several
your phone service can be categorized
newstands across the country appears to
and how easy it is to change this with a
be succeeding as well, and we hope to simple stroke of the keyboard. It might
have a distributor before long. Before lend some insight as to why you didn't
long, 2600 will be a household word. get what you askedfor or perhaps how
Look for a list of newstands we can be you managed to wind up with a prison
found at in a future issue.
phone line.
This month we're happy to present an
Phones and computers are incredible
exclusive interview with one of Britain's
and the two together can be quite scary.
most notorious hackers, Hugo Cornwall.
The purpose of our magazine is to show
It's one of many we'll be presenting and
you what's going on with both-in as
we think there's a lot to be learned from many ways as possible.

STAFFBOX

Editor and Publisher


Twenty Six Hundred

Associate Editors
Eric Corley David Ruderman

Office Manager PSOS Operations


Helen Victory Tom Blich

Writers: John Drake, Paul Estev, Dan Foley, Mr. French,


Emmanuel Goldstein, Chester Holmes, The Kid & Company,
Lex Luthor, Bill from RNOC, Mike Salerno, The Shadow, Silent
Switchman, and the usual anonymous bunch.

Artists: Dan Holder, Mike Marshall, Tish Va Iter Koch.

2600 (ISSS 11741)-3X5 I ) is puhlished mamhlr hr 2{)()O Fmcrprises, Inc., 7 StrunK:' I1me, Setauket, NY 11733.
Second class postaKe permit pendinK at Setauket, Nell' }·ork.

POSTMASTER: Send address changes to 2600. P.O. Hox 752. Middle Island. NY 11953-{)752.
Year!, subscription: U.S. and Canada $15 individual. $40 corporate. Overseas $25 individual. $55
corporate.

2600 February, 1 987 Page 3


AN INTERVIEW WITH HUGO
by Jolin Dllu those parts of the radio spectrum that are not terribly
Where did you get your alias from? well advertised. In most countries in the world,
It was actually derived over a rather drunken lunch western world, you can buy books that tell you where
with the publisher, all that I had decided that it was to all the various services lie. You can't in this country or
be a pseudonym, but I will explain genesis. Originally it you couldn't until very recently and I say [it] was great
was going to be Hugo Cornwell with an " E" rather than fun trying to work out the pattern of the allocation of
an "A" because David Cornwell is the real name of John the frequency bands and then using radio scanners [to]
Le Carre, a spy writer who I rather admire-he has also actually eavesdrop on them. You know although some
got a nurnber of talented brothers and sisters. So the of the stuff is now more widely known, there is a lot of
original thought was that it was going to be, in order to the stuff that isn't known. There are a handful of people
mislead the public, yet another member of a very in this country who are really rather good at it.
talented family. How do the laws in the U. K. versus the U. S. encourage
But at the tirne a nurnber of the Elite hackers were this type of investigation?
operating under the name Pensanze, a SIG called How do they encourage it? Well they discourage it
Pensanze which had originally been called The Pirates really. It is done in two ways. First of all there is a lot
of Pensanze for fairly obvious reasons. So Pensanze is less published in this country. We have got much
in Cornwall, so that's how I came about. So we decided tougher about what we publish. We don't have a
to call it Cornwall with an "An and Hugo was chosen as Freedom of Information act. Anything that is generated
a Christian name sirnply because I think it is one of the by the government is deemed to be secret unless [it]
less likely names I could possibly have. has been specifically released for publication so there
How did you start off as a hacker? is a hell of a lot less information that is openly
Not very deliberately. I got into communicating available. So there is that one aspect. The other aspect
computers probably very early round about '78 and I is that a lot of our laws are all enveloping in theory
just got very curious about what was going on in big though they're widely ignored in practice. There is a
cornputers and liked to drop in and eavesdrop and no contrast to the United States in particular. I know less
one particularly seemed to mind and I never thought of about Canada and that is if you look specifically at
it particularly as naughty or illegal but if I picked up a hacking there is no specific anti-hacking legislation.
phone number or a password then I simply carried on You can be done for stealing telephone time if you look
collecting it. I ended up with a few sheets full of these at telephone hacking, stealing electricity sometimes.
things and I would pass them around to friends out of You can be done for stealing CPU time on a computer
curiosity and it wasn't probably until '82 or '83 that I and recently they have done to people for forgery which
became aware that there were not just other people is basically using passwords to which they are not
collecting [in a] similar sort of way but there was a entitled and that case is going to appeal.
proper culture outlet called Hacking and I said, "OK, What was your motivation for writing 'The Hacker'S
well I suppose I am a hacker." Handbook"?
What did you do previous to haCking-did you have The motivation was that I was asked to do it and it was
any other interests that were along the same line? very very easy. The way it happened was a man who
I guess I have been interested in what I call in the book was a hacker by interest and a publisher by profession
the larger area of tech phreaking. In other words, wrote/scrawled a note on a bulletin board saying does
making technology misbehave in the nicest possible anyone want to write a book on hacking and I wrote
way. I got interested in that when I was an back not very seriously, in effect saying [you] cannot
undergraduate at Oxford and everyone I knew was be serious, it can't be done. He wrote back, said I don't
interested in Phone Phreaking and that in fact one of know, call me back and we will have a chat about it. I
the best phone phreakers was one of the dons and in rang up, said/listed all the obvious things, why all the
the primitive sort of phone system that operated there obvious reasons shouldn't be published and he sort of
you could really do a lot. So I was interested in that. had a debate with me and at the end of it I felt maybe it
I certainly got interested in what we over here in could be done. I wrote him a synopsis within 24 hours.
England called bunker hunting. In other words, trying 24 hours afterwards he said it was terrific, would I
to find out secret sites used by the govemment and mind waiting two or three days till he had his editorial
also by the U.S. government. There was partly a meeting, but he wanted to do the book and at the end of
political motive in that but it was really rather a lot of all of that, you know within one week, beginning of the
fun. week I hadn't thought of writing the book, I hadn't
I got interested also in the brief illegal citizen band thought of writing any book in fact and at the end of the
radio thing that was going on in this country. I got a week I actually had a contract.
radio amateur license and I got also very interested in So I would have never written a synopsis for the

Page 4 February, 1987 2600


CORNWALL a British hacker/author

book, I would have never hawked it around publishers first edition the schematic was there complete with
but since there was the opportunity and I had already values for the various components and then gradually
thought about the synopsis, I thought, well why not everything disappeared. I don't know that British
and I did. There was no great bumlng desire, there was Telecom did anything very much other than to
an opportunity...so I went ahead and did it. condemn I the book I and what the publishers decided
What has been the publiclbusiness and media response not unreasonably that things were getting a little bit
to your book? hot and they I anticipated I trouble and removed the
There was a great deal of interest, the book was for stuff so that they could show that they were being
several weeks on the Sunday Times Best Seller List so responsible. I think that is the way it happened. British
It was competing with some pretty popular Items. I Telecom said that they didn't approve of that sort of
think it got popular interest largely because a reporter thing, that you know there are hackers on British
on the Sunday Times rang up the head of The Computer Telecom's staff as you might expect so you know I
Security Squad at Scotland Yard I and I asked his think to answer to my certain knowledge a lot of people
comments. The man hadn't read the book but said Within British Telecom found It amusing and I also have
sufficient for her to be able to headline a story ''Yard reason to believe that some of the British Telecom
Condemns Hacker Book". This Immediately made the Security people were not displeased about the book
book appear very very important and very very serious because it made everyone a lot more alert about the
and alier that it took on a life of its own and I was from use of passwords.
my amenity the whole thing with a great degree of There is some evidence also to show that quite a few
amusement. of the books were actually sold either to computer
Those people who knew anything about hacking security people or sold by them to, if you like, their
decided that it was not a very interesting book and I customers in essence to say, "Look how easy it all is,
never thought that it would do but it obviously excited read this book and be aware.
"

a lot of other interest. I think people created the book How would you say that U. K. hackers would be
for themselves-they badly wanted a book about different from U.S. hackers?
hacking, they wanted to make hackers into some sort I think that the difference is of sublety rather than of
of modem myth and my book happened to be around to essence. I think there are two areas of difference. First
capture all of that interest. Though there was a great of all my guess is that the majority of U.K. people, U.K.
deal of luck in it. computer enthusiasts, that have modems probably
One of the effects of the Scotland Yard acquired them about two or three years after the
condemnation is that the books that hadn't been very majority of U. S equivalents.
widely distributed up till then, the original print run was That's really a question of how modems are sold.
very small, disappeared very rapidly from the When I first got interested In computers, the only
bookshops and it created a further myth that the book modems that were available were from British
had been banned in some way so everyone was rushing Telecom. You couldn't buy them over the counter in the
around like mad to get hold of them until about a few shop and you had to buy them on rental and they were
weeks when the book trade had recovered, copies were very expensive. If you had them, you either had fairly
there, people grabbed it like crazy for fear that it [was I illicit ones, ones that had been modified from U.S. use
really going to disappear. and that was only of limited use or you had these very
About two weeks after the book was published, a expensive ones which were registered with British
couple of guys were arrested for hacking the Prestel Telecom.
system and the newspaper reporters decided that one So you got this two or three year gap. The second
of those people was me, so there were headlines saying way I think is that again although it wasn't the case for
"Hacker Author Arrested" and things like that and me, most British enthusiasts, their first database they
again it wasn't true but it all helped sales. called into was going to be Prestel which is a video text
It was really quite a phenomena and I do say to all system 75/1200 baud. The communication software
hackers the attention that the book got was somewhat that they had was for that as well. It meant that a lot of
undeserved and I feel a little bit apologetic among their Lacking was either into Prestel or into systems
serious hackers for sort of getting lucky. which looked like it. Of course there was the university
In the first book you had a schematic for the Black Box. situation in the states where people would tend to be
In the sequel it wasn't there. What was British looking at microl clue de grass teletype services
Telecom's response to the book and how did it 300/300. I suppose that American hobbyists would
mfluence you in a s�uel? call into The Source or into a BBS. After Prestel had
Well, the decision to take it out wasn't mine, it was the been going for a bit then In the early eighties you
publishers. in fact it went in three stages. It was in the started to get the BBS which people used 300/300. I
(cont inued on page II)
2600 February, 1 987 Pal:e 5
some cosmos documentation
by Sir WiIIillll • The H-LiNE indicates a HUNT and is required
This article is intended for the serious in most transactions. Generally it refers to either
COSMOS hacker. Many basic and fundamental order data, or inquiry and report data.
functions of COSMOS were left out intentionally, • The I-LINE indicates that INWARD movement

such as logging onto COSMOS, etc. This is is required, as when telephone service is being
meant as an introduction in the operation and use installed.
of COSMOS (COmputer System for Mainframe • The O-LiNE indicates the transaction requires
Operations) . OUTWARD movement, as when a telephone line
SysIam Ovarview is disconnected.
COSMOS aids in the follOWing functions: To finish the transaction, type a "."-to abort,
• maintaining accurate records (for orders) pound on the keyboard, or hit a Control-C. After a
• processing work/service orders and keeping successful transaction has occurred, a double
track of their status asterisk normally appears before the answer ( ** ) .
• maintaining shortest jumpers on the MDF CDSNIX
• load balancing on the switching systems COSNIX is the operating system of COSMOS.
• issuing reports Some COSNIX shell commands are the same as
COSMOS can be run on a DEC PDP 1 1 /45 , the UNIX (I assume familiarity with the UNIX
PDP 1 1 /70 , or an An 3820 operating system) :
Login l S (.,thn . . . ) - Ii.t I ih.
COSMOS identifies itself by its unique logon: - Y.u con u.. thi. t. lind ill .thor c O.lind ••
bv li,tin. i • •nd ibin.
;LOGIN: CAT .,thna.. - CAT.n.h. Iii. IYI,. cantonh)
PASSWORD: SH [-colk."tu"l [ar.l
in.uti.ulpul c ••••• ds : ). ». (. « .• di.it
lie" - Thi. invok.s th. CDSNll oroorallina hnol1aol.
Yo u c a n h a ck p a s s w o r d s , u s u a l l y 4 - Th. niantic. Df th i s cOI.and Ir. too vari.d
alphanumeric characters-try SSOX, NAOX t.o,.I.In. Sullico t o .. v. it is .Ioos!
idfntical to th. Unh ·SW cO'lund.
where X is a number. There are easier ways to get - for IUtDJ!, sh co••and sht ..,nts u,;
an account on COSMOS; i.e. social engineering a - CA S E •• rd IN [ •• tlern : paltornl .. li.t;;l.sac
- FOR n, .. fiN wordl DO Iist DONE
COSMOS support line. Wire Centers (WC) are 2
- [F list THEN Ii,t .. . !ELSE Iistl FI
alphanumeric characters representing each - lI.t

central office. - MHllE Ii,t DO 1i.1 DONE


- YARIABlES
Once you are on the system, you have full - .. positional .raua.nt
access to the COSMOS program. There is no .
- 11 1,,1 ."cut.d c.. .nd bv tho .holl

security hierarchy while running the COSMOS - I' pro f CU


nUlb.,
.
- IHO"E h .. dirtcl.rv
program. Every user has full access to all the - OTHER CO""ANDS
- 1 •• ln [".1
capabilities of COSMOS. However, there is a
- SET [".1
security hierarchy in the operating system. For - .. it

example, not everyone can edit /etc/passwd on CDS"OS I t •• Prtli n ••nd Foro.to

COSMOS-only a user with the root user ID 0:1 P,.fh Dolinl tiD. F.rnt
can do that. The shell privs of a user have nothing 1:•• 2:11.II'II:II2.aS2.a==a.=:22==•• :r••• .
.= . :11: •• : ..........

to do with COSMOS itself. AlT Alhrn.1 f Al T YES Dr All NO


AO AnDci.ltd .rder AO YES or AO NO
Transaction Code Formal BAY BAY I SIS) • lESS) BAY I 10.I.B.&)
To have COSMOS perform some action, you BI BANk ISIS) 9J( I
Bl Brido. lilter Bl 1111
must enter a transaction. All transaction codes BTN o
Billin. T. lo.h n. Nullbor BTH lIl-ml
share a common format. In addition, there are CA C.blt Nu.bor CA 1111

specific rules for each transaction as specified in CAT C.nlr.. Trflto.nl cod. CA l li
CC C.II Counl CC XI
this article. m Cu.I •• Callin. F ••tu" CCF 111111

Generic Formal CCS m COUNT m 11.1 OR CCS m.1


CG Conl,ol Grouo C& I
MCl xxx (CR) MHERE m IS A SPECIFIC TRANSACTION CODE CH Choic. ifni CH II
H II .. llito.21.lc (CR) H-lINE CP r,bl. P,i, CP IIII-Ill X
I ito.lilto.21.lc (CR) I-LINE CR C.ble Pai, R.na. CR III 1-1 III-1m
o ito.liit •• 21.lc (CR) D-lINE m t
C nt r. . Nu.ber en 1111
R ito.IJito.21.lc (CR) RE"ARKS DD OUt Oah DO ""-OD-11

Page 6 February, 1987 2600


that may be useful
DIP 010 D.tion DIP YES IHD) 5N6 SNitch 6roup SM6 I
01 DUI! Til. 01 ftft-DD-Yl TC To C.bI. lC 11m
ECS EquiDlfnt Chu of S'fvirl m 111m T6 T,) ,,,hon, Nu.bfr RanD' T6 111-IlIHIIl

ED Enter Dito ED ""-DD-Yl lK Trunk H l m -1 ll1

ED Error hindlino oo ti cn ED II ICE. CN. 5E. SK) TL Pr.li, TN Ii,t ID IL 1I ... . 1I


EGF E ou ip l ,n t Futurfl EGF IIIl TN T. hohon. Nulb" TN Ill-Ill I
FC Frol c.blo FC IllI1 TP Ti. p.ir TP IIIX-IIIX
FDD F"I. Du. D oto FDO Nft-DD-Yi TR T,r.in .l NUlb (lr IR 1111
FEA Fu tur. FEA lUI TT T .I.o hon. NUlb. r T ype 11 I
Ii.Idl [II R. T IROTAllYlTDUCHTONEI TYP hOt lESS. lIB. m. SIS) TYP III
121 5 1.1.",). I I"n•••,to ..ion). M Ino II ..,.) US USDC US 11111
[3J E 1....nti.ll. Ninon ....nli.1l USE Usn, USE 6 0r S
[4J 6 I.round Ihrl). L 1100. lI.rl) ML Mork Locali on ML I. ALl. CPC. AON. tic
FR NDF nUlbor FR II MD Mork Drd.r H.lb.r NO 11.... 11
650 6round Ihrl o.lion 650 I 11.3) MPH Mork Pock ••• HUlb.r MPH III
HF Hunt frol hhph on. nu ahr HF XII-IIII NPT Mork Pock... T.p. MPT III
H6 Hunt ,rOUD H6 II IN lono Nu.bor IH III
HT Hunl To I.I•• hon. nuabor HT 111-1111
KEY R.anl Ch.... k.,
LC Duloul li n. Counl LC IXII lino Equi pI.nt Sht..
C.blt Plir SlotUI
lCC li nl! elus Codl!' lCe III MK Nortinq
MK Workina
OF COlp.ny
LDC locotlon 12-di.1I Ir...) LDC 11111 SP S",eial uftQaurd ", obe tian
TJ Tr.nk and Junctor
LS li.t LS NEM Sft SDee ial Sa h au ird ", nur l.
LTH lin. Trunk H.hork 12ESS) UN II TS Tnt
Oft D .. i.n.d t 55"
LV l.,.I lESS) LV II OP Dtli ontd t SSP "5 fti se,11.n,aul

"AI nUilUI nluf of .ntih "AI II on; DnlOn.a 1..1((Ult RS R. ..rvtd

"0 No n th NO II 1I L.ft in dllconn.ct UK UnknoMn

"00 "odult Nulb.r "DO lU DI Del" ti .o EX E"ludod

m "inilul Vlluf of .ntih NIH II 10J.9 SF Soar.


HHI T.hohon. P,.fiJ Nuab., NNI III RS A'SlrVE!d PC P.ndin9 Conn.ct

HUN MUlLb., of IIIr..lt.r5 HUN 1111 ill( Unknown PO P.ndinq disconntet

"RD ",ssao, A.ohhr DPli on "RD YES INDI EX E"Iud.d 1I L.ft in dllconnect
DC Ord.r CIo" oelll SF Spart FU Futuro
DO Duhut �.,ic. DB 1111 PC Ptndinq Connrct
O£ OffiCI E.uiOl.nt PD Pondin, Dhconntet
NO. lESS DE III-III-III
NO. 2 ESS DE IIHIII Strv iu Order Tvl"s
HD. 3 E SS DE 111-1111 T.Itphono MUlb.r Shtul NC He. Connee t
liB DE 1111-111-11 or MK Morkin. CD COlphlt Di Iconn.ct
DE lUl-IlIl-Il NP Non DubI !shod CH Ch.. o.
51B O£ III-Ill-II AU Auxiliary F Fr..

SIS DE Ill-III DF COlD.. ' T To

DP Doh 0. .1 Pr i nt out OP III TJ Trunk ..d Junctor SS Susaension of SfJ'yiu


O PT Party Assionlrnt OPT I 11-3) TS T ..t RS R.,tor.tion of SO"!,,
ORO 5."1,, Drd.r NUlb.r DRB 11.11 125 ftAl l ftS "il"II... o•• R R...rk
DT Sirvi r, Drd.r Tv!), DT II RS RfSfrVE!d

PDF P"forr.d "OF PDF " Uk Unkno.n


EX E"I.dod
Pl Cireult nUlber IPRIVATE LINE) PL IIII1Il1
AV AvoIl.bIo
PR" Par,l.tor PRft 1111111
DO Di 5coAn,et - DDl'ra t or I nhruot
PRI P"hrr.d Rill lono PRI
D" Di l eonn. e t - "uhin. Inhr c 'Dt
PlY Party n ••b.r PlY C
CD Ch....d - O)."tor Inltre.pt
PIIt Print Nork Code PMC III
CN Ch.. ..d - ""hin. ", chi..
IPBT. VBT. PCT. ReF. RBT. CD". USR)
SF SOilr,
RC Rf."h on cablt Dlir RC III I II XIII
PC hndino CannKt
RCM RIC.nt Ch.n.o Mord RCM 1111111
PO Pending Dhconn.ct
RO R.I .... Dote RD II-IJ-II
RE R,,,rh on 'QuiD.tnt RE 11... 1
REP Re.r i nt ilpti on REP!
Rll ReI.. RLI 1111
R"r. Ruar ks Rftr. 11....11 SfrviCt Drd .. and Mork Drd.r Slot....
Tohphonl Nuabor TvDII
RT R.nrh on T. ) .ohon. Nu.ber RT II..... 11 P PendinG
B Bu,ino..
RM SUDnre55 'fe.nt chino! lesuq. RN N " ftOF cOloI.tion onIv
C Coin
RI R.I t Ion. RI X A PAD cOlpI.hon
o C.I ••n,
SC S(lrviu Cat(loorv SC RES or SC BUS C final cOlpltlion
Good
SDF S(lcond.rv "DF SOF II
Dth..
SE SDrcial EauiDI.nt NUlhlr SE 11 .. . 11
C.ntrll
56 S(lDa.ntation S6 I So"ic. Drd.r--SICondar. Statui
ST Status of load Droups 51 II P P.ndi nq
510 Lin. Eouipl.n! Statu. STD II J J.opard.
S TP Cab I . p.ir Slo tu , Nilhh. I d
[WKI .orkin •• [ El l E"Iud.d. rFU) futu,.
STT T.I ••ho.. HUlb.r Shtul STT II
SN S.i tch lib. ESS SW X
(continued on page 14)
SNC S.t Mork Cod. SNC II 26()() February, 1987 Page 7
the telecotn infortner BY DAN FOLEY

Cellular Phreaking instructions on programming their


The future hinted in the D ecember phone's cellular ID's inside the repair
issue of 2600 is already here. Cellular manual. And even if the ID is encoded
f raud is becoming a concern of the in a ROM, you can j ust bum a copy.
CPe's (Cellular Phone Companies). R umor has it that cellular R O M s are
Much f raud is from the same old already available on the black market.
source-the theft of cellular phones or Perfect for you r local terrorist to call in
even the entire car, resulting with the death threats and be untraceable, as the
new "owner" maki ng calls on the autho rities would accuse t he wrong
victim's cellular ID (and phone bill). person.
A nother form of f raud is from roamers The Largest Cellular Companies
(cellular users using their phones in a The largest cellular system in the
different city from where t hey signed up) world encompasses almost the entire
who don't bother to let the C PC in the Gulf of Mexico. On J uly 15 Coastel (sic)
new city know their billing info. Communications began serving from
Roaming will become more prevalent as Brownsville, Texas to Mobile, Alabama,
more people buy cellular phones and use with a switching office in Lafayette,
them while they travel. However this Louisiana, and cell sites on offshore
form of f raud will soon become a thing platforms out to about 160 m iles from
of the past, as the C Pe's are creating a the coast. Coastel plans to target the oil
national billing data clearinghouse business, fishing and other commercial
which will ensure that bills will reach the marine operations. A irtime averages
right user. This clearinghouse will also $1 .00 a minute, rather expensive, but
(further in the future) allow someone to they do provide a specialized service.
call a cellular telephone, and the call will Cellular rates average about 60 cents a
be correctly routed to wherever in the minute peak.
United States the phone happens to be. The largest cellular telephone
Of more interest to the readers of 2600 company is now Southwestern Bell
is something that is quickly growing and Corp. It bought out M etromedia's
represents the most dangerous threat to nonwireline rights for $1.65 billion. The
CPe's billing. Spoofing another cellular FCC originally broke the cellular
user's lD isn't as hard as it seemed. frequencies into three bands, giving one
Some of the more exotic schemes to the local telephone company (the
involve reading cellular ID's off of the wireline carrier), one to a nonwireline
airwaves as calls are being placed. Most carrier, and saved one for the future.
CPe's don't even bother to encrypt the However the distinction has become
I D signals (and you don't even need to academic as more R BOCs ( Regional
decrypt if the encryption algorithm Bell Operating Companies) purchase
doesn't include time and date stamping). cellular rights in other cities (with our
But there is even a simpler method than local phone revenues we subsidize their
using an "ether" box (so called because investment in real estate, manufacturing,
the box snatches I D's out of the and all sorts of things having nothing to
"ether'). do with our dial tone). Southwestern
The easiest method by far needs the Bell now competes against Nynex in
complicity of a cellular phone repair or Boston and New York, Bell Atlantic in
installation shop. For many brands of Philadelphia and Baltimorej
phone the cellular I D is not in a ROM Washington, and Ameritech in Chicago
l ike "they " tell you, but i nstead is and Dallas. It also got about 500,000
programmable. M otorola, for one, is paging custome rs in n ineteen cities. US
supposed to have easy-to-follow West also competes against a fellow
(continued on page 16)
Page 8 February, 1987 2600
oH MIGHTy' n;L t:: pHON �
MONOPoL� You ARE G1<fAf
AND MUCH TiPPoLU£fZFuL •• 0

g:'

� .

-���--------��--�
2600 February. 1 987 Page 9
NlISt� Business
I it31
Rei Cn:(l(1/il!:or:
3J.? Mc(ro f>ark,
Rochester. {lJPIV York 1462.1
7161475-8000
A Rochester Tel Company

February 2. 1987

Dear RCI Customer:

AS RCI continues to grow and expand its long distance


services. we have become susceptible to a problem faoing
all long distance companies_ Toll Fraud or making long
distance calls on another individual's account -- is an
industry-wide problem that has been increasing steadily.

We are concerned about Toll Fraud. and are adding 3 - digit


Personal Identification Numbers (PIN) to help prevent abuse
on our customers' lines. Similar to a bank PIlI code.
customers will be required to dial their PIN code following
their authorization code.

Within the next several weeks. you will receive your


Personal Identification Number and dialing instructions.
We will also tell you on what date you should begin using
your code.

If your telephone equipment is programmed to dial RCI


access numbers and authorization codes. we will have to
work with you to re-program your eqUipment. To avoid any
service interruption. please contact Judy Allen in our
Customer Service Department. toll free. at 1- 800--828 2733
by February 18. 1987. Judy will also be able to answer any
other questions you have about this program.

Suzanne Crouse
Customer Service Assistant Manager
RCI Corporation

..................... ............................................. � ....................................................................... .......... .

US SPRINT
8001 STEMMONS
DALLAS TX 75247 E-MAIL TM

02 6
02/03/86 MTAA

Attention: US Sprint Customer

A review of the number of calls made on each customer code is a


part of our deily maintenance program. A recent review of your
account shows a significant increase in calls as compared to your
previous usage.

We were unable to contact you by telephone today to discuss this,


and because we were concerned the calls being made on your code
were unauthorized, we have suspended the code in question and will
issue a new code as soon as you contact our Customer Service
Department. Call us toll free at: 1-800-531-4646

We apologize for any inconvenience caused by this procedure and


thank you for your continued business with US Sprint.

Sincerely,
WE SEEM TO BE GETTING LETTERS LIKE THESE EVERY
US Sprint COUPLE OF WEEKS. SOME, LIKE SPRINT, CANT EVEN
GET THE DATE CORRECT!

Page 10 February, 1987 2600


CORNWALL (continued/rom paKe 5)

also think that because there were so many video text It works is that the gateway opens to receive a
services, Prestel and type U H services to look at that command string from you and it closes, the command
on the whole British hackers weren't so much string is processed in the remote computer, the
interested in big computer networks so it took them a gateway opens to give you the answer and closes again
bit longer to discover PSS and the various university so on and so forth. Any more slightly more complicated
networks like JANET (Joint Academic Network) and interaction is unbelievably slow.
things like that. You could run an online service with view data as
In essence there is very little difference in the culture the front end processor, but it looks ridiculous, it
but a slight difference of preoccupation in terms of behaves in a ridiculous fonnat, so for certain types of
what they are looking for. services I suppose it's not too bad, it's like retaining a
As a system, what do you think of Pres tel? horse and buggy type of system when everyone is
You could go on and on and on about that. Prestel is going around in gas driven internal combustion
extremely interesting as a matter of history. It had engines.
enonnous ambitions, but its ambitions were all fonned Can you see Pres tel evolving from what it is now ?
about the year 1975 which was eons before anyone I don't think it will do, they're trying to make it evolve
visualized the home computer as being possible, so but I think it is going to remain as a historic curiosity.
Prestel visualizes and suffers from it. People accessing It's fairly [acceptable 1 in one or two industries,
computers via their television sets. Which is why you particularly the travel trade; it's quite useful for fast
got a 40 by 24 character display, these rather curious moving financial data. It will make very, very small
graphics which was a function of the belief that movements but it will be relying on its installed user
base. The way people are using it now is via emulators
on personal computers. On my personal computer I
obviously got video text, Prestel in other words type
software and it's no effort to call into Prestel or any of
the other online services.

"... this idea that the hacker I just can't see any electronic publisher saying,
"Christ Almighty, we're really going to have to use this
can somehow figh t back, thing, this is wonderfuL" In fact, most electronic

that s the reason why non­ publishers nowadays publish in a variety of fonnats,
they publish in an online fonnat, they publish in a
hacker s admire them so videotext fonnat, and of course if their material is
much. " suitable they would also be thinking about publishing
in a CD ROM type fonnat and anything else that
becomes available. It's merely a fonnat and the
decision to publish in it is "well, are there going to be
enough people out there to make it worth my while?"
Electronic publishing in the form that you mentIOned,
how does it work over here, everything is online?
memory was going to be unbelievably expensive and
Well, you have a variety of systems, electronic
that 1 k of display memory was really as far as you
publishing for the financial community, which is
could go.
obviously the most lucrative area, is still very hardware
Also that the ordinary untrained person could never
bound in that if you want to get the service then the
be expected to actually type words into a machine, you
way the supplier wants to let you have it is that you
had to have all your commands being sole numbers. So
have to buy his hardware and feed it down the leased
you got this curious electronic card file type of
line as well as getting the service.
structure and everything is available via pages or very
That's the case with Reuters, they are under a lot of
simple numeric routing commands. Because Prestel is
pressure to get rid of that and that is applied to most
stuck with all of this sort of thing and if you like human
other services. You can hack into them because there is
knowledge about computers moved on fast, Prestel has
always exhibition/demonstration lines, dial-up lines
to become more sophisticated, remain compatible with
available and then if you can fiddle with a personal
its 1975 fonnat and a lot of the things you would want
computer system cleverly, you can get the services.
to be doing on a public access database, unbelievably
Other fonns are basically available online and you get
clumsy. For example, you can order things, all the
it via PSS which is the British Telecom equivalent to
shopping and what have you, but you have to do it via a
Telenet or Tymnet.
system called a gateway which is essentially, the way
(cont inued on paKe 15)
2600 February, 1987 Page II
Some Suggestions particular company's codes, it would
be a full time job to keep track. Almost
Dear 2600: every day some long distance company
I would like to thank you for your somewhere changes their code
superb magazine. It would be a big plus pattern. Some even have more than
this year if you could: 1) Show people one pattern. And quite a few have
what to do with a blue box now,before codes of varying lengths. If it's any
its death; 2) Teach how to hack a code help, our Mel codes are all five digits
with or without a computer like in your and our Sprint codes are nine. Beyond
May 1986 issue; 3) Put out a list of that it starts getting complicated.
exchanges like 950-1088 or 950-1033 We've printed full isntructions in the
e t c . w i t h t h e equ i v a l e n t i n 800 past as to how blue boxes are used.
numbers and also tell us how many They do still work perfectly from a few
digits for their access code since it locations to a few locations, but they
appears that some of them have more become fewer every day.
digits than originally.
I observed in Manhattan some
Some Numbers
fellows dial 950-1088, enter a valid Dear 2600:
access code plus a number (with the Here are some phun numbers to call
517,219,601,or 505 area code and in the 716 area code:
trunk it with 2600 hertz then KP 809 688-3000 to 688-3040-University of
XXX - XXXX ST and reach their party in Buffalo (VAX/CYBER)
Santo Domingo. I wonder whether you 878-5533 and 878-4 611-Bu ffalo
could explain how they avoid CCIS. State Computing Service
In your May 1986 issue,page 3-38 874-3751-Computer Science
there is an algorithm by Nynex Phreak 681-8700-BOCES
which was one of the best. It was good 856-072O-Ticketron Buffalo
for one month as described, but 836-0000,837-0000,850-0000,854-
apparently some executive at MCI read 0000, 85 5-0000, 856-0000-weird
that article and in June the message tone.
was changed to confuse people but I don't understand these numbers
with a little ingenuity you could still with weird tones and suffixes of
hack numbers according to the same OOOO-is there any explanation to this?
explained principle. I had kept a list of And does this happen in other area
codes which I used until December 24, codes? Thanks.
1986 on which day their computer Silver Bandit
invalidated all my codes. I would Yes, it happens everywhere. Those
greatly like to know how many digits are probably test numbers from the
they use in their access code. Enclosed phone company. Why don't you call
is a self addressed envelope so that you one and have it show up on your local
could provide me with a reply. bill? Then call the phone company and
The Perpetrator demand to know who that number
Here's your reply in a different belongs to and why it's on your bill.
envelope. We wish we had the time to That's the easiest way.
reply personally to all of the letters we
get but we simply do not.
On Cellular Phones
We've published lists in the past of Dear 2600:
950 numbers and 800 numbers as Congratulations for begi n ning to
well. We'll be doing this again shortly. publish articles on cellular telephones!
As far as how many digits are in a The only thing wrong with the article

Page 12 February, 1987 2600


letters
was the title-"a look at the future Some time ago, a school adminis­
phreaking world". Cellular telephone trator named Johnny Jones was
phreaking is not in the future. To my accused of stealing school funds.
k nowledge, cellular telephone Unknown to him his telephone had
phreaking has been going on for about been tapped.
four years in at least one major This is an excerpt from the Miami
metropolitan area. The lack of detailed Herald newspaper:
information on cellular telephone 'Why, you may have wondered, did
phreaking in this publication has thus Johnny Jones continue to call his
far placed 2600 in the dark ages. friend in Maryland despite the
Computer assisted blue boxing is still suspicion that his phone was tapped?
essentially the same as blue boxing in B e c a u s e , t r a n s c r i p t s o f tho s e
the dark ages of 1961. The same MF conversations disclose, Jones believed
tones were used in 1961 and the he had a secret number that told him
phreakers were very successful. The whether his phone was tapped. Jones
advantages of using cellular mentioned the number in almost every
telephones for phreaking and hacking conversation with his friend and
instead of using land lines is explained that if you call the number,
outstanding. Cellular phones are the your phone is clean. If you call and get a
most immune to tracing even if used busy signal, your phone is tapped.
from a fixed location and it is virtually "Wrong, 'That's a test number for
impossible to be nailed if you use one telephone installers: says a Southern
from a different location every time and Bell spokesman. 'When they go out,
for short duration or while you are installers have to hook up a lot of wires,
travelling on a highway. and that number is a final checkpoint to
You mentioned in the article that for see if they've got the right ones
detailed info you should consult ElA connected.' The spokesman says the
StandardCIS-3-A. This publication has phone company has lots of test
been outdated and has been replaced numbers and a rumor for almost every
with I S3-C. Everyone interested in one. 'As for the number Jones called, if
using cellular phones to their full you call it and get a busy signal, it
potential should order all the simply means the line is busy, not that
publications on the subject from EIA, your phone is tapped.' "
2001 I Street NW, Washington, DC The number, incidentally, isn't
20006, or you can call them at located in some supersecret vault in
202 -457 -4900. Langley, VA. It's in an electronic
The New Age Phreaker switching station off Red Road in South
We have yet to hear from a group of Dade. OK, OK. Call 1-200-666-6763.
cellular phreakers, though we don't
doubt they exist. By the way, have the
Newspeakers among us begun saying If you have a letter to send to us, feel
celtels yet? free to write. Don't ramble on for too
ANI Trouble long or we'll have to chop bits out.
Th e address to wr ite to is 2600
Dear 2600: Letters Editor, PO Box 99, Middle
The man who asked the question in Island, NY 11953,
the "Letter You Wrote" page, in the
November issue, signed "Frustrated in
Miami" regarding his ANI, evidently
didn't read the Miami newspapers.

2600 February, 1987 Page 13


cosmos (continued/rom page 7)

Error Hlndling MAP Manual Assignment Parameters


Service order transactions interact with the MAL Manual Assignment list
user frequently. Each time the transaction is TSW Total Service Order Withdraw
ready for new input, it will respond with an
underscore at the beginning of the new line. This Transactions Defined
indicates that the preceding line is correct. If an
error does occur, the transaction will respond SOE-Service Order Establishment:
with an error message and prompt for correction. Establishes a pending service order. The types of
When an error occurs, you have 4 choices: 1 . orders are: NC, CD, CH, F, T, SS, RS, A, RF.
Re-enter the entire field correctly; 2 . Enter line­ Reassociations are treated as change orders.
feed to ignore (checks rest of line) ; 3. Enter a ";" • H-LiNES must contain ORO, �O, and OT.

to disregard the present circuit; 4. Enter a "."­ Optional facilities: FW,RW, FOO, AD,FR,SG,
the transaction will disregard all input and exit. and either OT or �C.
H-LiNE Inputs • I and 0 LINES may contain US,FEA, CP,DE ,

H-LiNE input for the service order trio TN, RZ, NNX, PL, TP, TK, BL, SE, CON,MR,
SOE/CSA/TSA is being rigidly defined according BTN, RC, RE,RT, STC, STN, STO,CCF,LCC,
to three categories. These categories contain and RTI.
fundamentally different types of order/facility • ESS orders requiring coordination by the

information for the order. recent change input center may be flagg ed with
Category 1 : ORO, OT, �O, FOO, �C, OT, SG, an input of "RW C".
EO, LC. Example of an NC (New Connect):
Category 2: US, FEA, CCF, CAT, BTN, SS, AD, Mel SOE
H ORO NClmlliOD 01-01-8./OT NC/FOO 02-05-8./OT
A"
RZ, FA,GP/CG, CTX /CG/MGINNX, LON, RTI. 1 CP llllHlllll/OE '!TN 'IUS 2FR/FEA RNNL
Category 3: FW, RW.
Category 1 items are primary-once defined they
cannot be changed by conflicting category 2 and Example of a CD (Complete Disconnect):
3 lines. 1ICI SOE
H ORO CDlmlliDD 01-01-85/0T CD
Service Order Transactions o TN 5n-lB22

Transaction Definition
Example of a CH (Change):
SOE Service Order Input NCI SOE
TDZ Telephone Number Assignment lists H ORD CHmU/OT CH/DD 01-01-8./TN 53�-1822

LDZ Line Equipment Assignment list o TN 53H8221STN CO


I TN ,
SOH Service Order withheld
SOM Service Order Modification
SOC Service Order Cancellation Example of SS (Suspension):
SOW Service Order Withdraw MCI sO[
H ORD SSIllIllUT SSIDD 01-01-8.
SCM Service Order Completion by MDF o TN 531-1822155 58
SCP Service Order Completion by PAD
SCA Service Order Completion Automatic
TDZ-Telephone Number Assignments List:
SCF Service Order Completion for
List the indicated number of spare directory
MDF automatic
numbers for a NNX code, and directory number
SCI Spare Cable pair inquiry
Change Due Date type.
COD
• Up to 25 directory numbers can be specified,
BAI Bridge Lifter Assignment Inquiry
using the prefix LC.
LAI Line Equipment Assignment Inquiry
Telephone Numbers Assignment Inquiry Example:
NAI
Nel TOZ
TAl Tie pair assignment Inquiry H NNI 53�/TT 6/lC 7 IlC can be uo to 251
EDZ Facility Emergency Assignment list
for backup
(continued un page 20)

Page 14 February, 1987 2600


CORNWALL (evllIinuedj'rOIll page II)

H ood, you know not a great deal is known about Robin


There are also data-nets that use a Prestel l ike Hood, but the great thing was that he stole from the
format but are not Prestel and you can get a number 01 rich to give to the poor and that probably is why he is
serv ices that way as well for example the equ ivalent to . remembered
T RW for credi t checking data is cal led C N N , that's I think it is this idea that the hacker can somehow
avai lable in the video text format . That doesn't come fight back, that's the reason why non-hackers adm i re
out v i a post a l , it comes out v i a its own data network them so much . I am afraid I don't bel ieve that hackers
and t here are other data networks w it h other serv ices are s u f f i c i e n t l y g o o d or s u f f i c i e n t l y powerf u l o r
on them as wel l . So that's basically how it works. sufficiently able t o combat that . I d o think that every
Have you planned any future books on computer now and t hen though what a hacker can do is if he is
crime? very lucky, expose the stupidity [ o f ] some of the power
Wel l , I am writing a much more serious book at the that is held on computers and maybe Just enough that
moment called "Data Theft" which is intended for the there is that element of defense that you're looking for.
ch ief execut ive officer of the C O O market and that is But on the whole I wou ld say the outlook for
encourag ing those peop le to the bel ief that they can't people/individuals in the computer age is not terribly
leave data security to a mere techn ical funct ionary . good .
Though it is much more preoccupied with industrial
esp ionage and frau d . I t is not going to be in any way a
tongue and cheek book . "Out of the I nner C i rcle" was
The Hacker's Handbook
a l l eged to be a book on computer security, but IS
by Hugo Cornwall
manifested for hackers . This is a book on computer E- Arthur Brown Company, Alexandria, MN
security and i t is intended for chief executive officers 1 69 pages
and I don't think hackers wou ld f i nd it of any d i rect $ 1 2.95
interest t hough I hope they are going to read i t . Review by Roland DuHon
O n e of t h e t h i ngs I do want to get over is t h i s notion Strangely enoug h , this book actually l i ves up
that most computer crime is comm itted by insiders ,
to i t s t i t le . The author's stated pu rpose is to help
computer criminals are norma l l y employed by their
the reader "grasp the methodology" and "develop
victims. I want to talk alot about pol ice training or
the appropriate atti tudes and sk i l ls , prov ide
rather the lack of It and lack of responsive Criminal
code to cope with it. I st i l l see that there is a lot of room
esse n t i a l b a c k g r o u n d and some ref erence
for f ro l icking w i t h technology and I really like to materi al , and point you in the right directions for
promote hacking to what I bel i eve is its rightful more knowledge . " In this he succeeds , and in the
p l ace-something for a tiny, t iny minority to amuse meantime he gives us a l ively and entertaining
themselves w i t h , W ithout actually causing any serious view of the world of Brit ish hacking.
harm to anybody . The early chapters of the H andbook discuss
In the book "The Rise of the Computer S ta te " the the technical deta i ls of computer
author put forward the premise tha t there is no defense
commun i cat ions , the typical hacker's equ i pmen t ,
agamst computer bureaucracy and having fifes built up
a n d t h e types o f serv ices or "targets" that a
on pretty well everybody, everything, and every move.
hacker might be interested i n . The techn ical
Could you see hackers as a possible defense?
I have been asked this ques t i on in a sl ightly different exp lanations are c lear and accurate , and are
form before . Not rea l l y , I t h i n k the mode of defense is neither too d i fficult for the beg i nner nor so simple
that a l t hough these f i les can be bu i l t up, the f i les that the seasoned system cruncher might not
themselves are not necessarily terribly rel iable. learn a few detai ls from them . I n general , the
One of the great problems with interpret ive data is ent i re book appears to be an excel lent beg inner's
that they col lect together so much information and so manua l , a very good i ntermed iate manual , and
much goss ip that al though they can have i t a l l on the enjoyab le though certainly not indispensible
screen i n f ront of them they don't know whether it's
re ad i n g for those who s t y l e t h e m s e l v e s
terribly rel iable. The value of the hacker I think is [ a ]
"advanced" .
somewhat dubious one i n a l l o f this. One of the reasons
Two m o re c h a p t e rs d i s c u s s " h a c k e r ' s
why I think there is so much room in people's hearts for
the hacker is that they bel ieve the hacker is going to
i n te l l igence" a n d "hacker's techniques" . Then
prov ide that sort of defense which you were describing. computer networks and vidtex are discussed . The
I actual l y wrote a p iece for one of the papers about it vidtex (also known as viewdata or videotext )
[ about ] folk heroes arising , for example K ing Arthur is chapter is interest ing for American readers since
a very potent figure, Robin H ood is a very potent none of those types of serv ices are avai lable
f i gure, and the potency of these t h ings is that K i ng here , and i t's always interest ing to know what's
A rthur is gOing to be I the l one and future king . Robin (evllIinued un page 21)
2600 February. 1987 Page 15
telecom informer (continued/rom page 8)

R HOC, PacTel , in San D iego . int ra-LATA tandem site for the proper
800 number allocation routing.
I t used to be that you could tell the H owever. d o n 't bother to remember
geographical location of an 800-NXX this. W hen Hel lcore final ly fin ishes the
number by the NXX part . XX2 's were new Ad vanced 800 service the I N W ATS
intrastate. X X 7 's were in Canada. and buyer can route his or her incom ing ca l l
every p refix represented a n area code. th rough a different carrier depending nn
H owever, about five years ago AT&T the originating point or the t ime of ca l l ,
introduced " Advanced 800 Service" as w e l l as sending i t to a d iffe rent
which permitted any I N W ATS ( I nward company office. When this happe n s , a l l
W ide A rea Telephone Service) ca l l to be 800 ca lls w i l l have to b e s e n t to the
routed anywhere in the U S . and even to nearest tandem switch a nd get routed
different destinations depend ing on both based on all t h is info . The local teleo
the time of day and where the caller will get the money for providing the
placed t he cal l . Thus 800-D I A L ITT routing service.
would reach the nearest ITT billing As far as I know only AT&T gets
complaint center du ring t he day, and at your 900 cal l s . which were never
night the cal l could instead reach a main grouped accord ing to geography. Trivia
office left open. The company has to pay fact number I : I N W ATS num bers in
for the normal 800 I N W ATS l ines and England (to the U S . I nternat ional
then a n extra cou p le o f hund red a INW A TS furt her confuse� the
month for the "vanity" number and a geographica l determ i nation) are of the
few cents fo r each t ranslation of end form 08OO-XX-XX-X X . Only AT&T
phone line by time or location. provides this. Trivia fact 2 : I N W A TS
U ntil Fal l 1986 if your CO was was not int rod uced in 1967 as stated in
switched over to equal access your 800 the December 2600, page 3 -9 5 . The first
cal l was routed to AT&1 no matter interstate I N W ATS l ines were in 196 7 ,
what your defaul t carrier. But now your b u t intrastate I N WA T S started in 1 96 6 .
CO must route all 800 calls to M C I Airfone Update
which have a n y o f these "excha nges ": The future of Airfone, the pay
234, 2 8 3 , 284, 288 , 289. 274, 3 3 3 , 3 6 5 , telephone for use on a i rline fl ights is in
444 , 45 6 , 627, 666, 6 7 8 , 727, 759, 777, limbo. Airfo ne's experimental l icense
825, 876 . 8 8 8 , 9 3 7 , 950, 9 5 5 , and 999 . US expires at the end of 1 98 7 , and the FCC
Sprint gets 728 and W U D M etrophone will not reconsider its J a nuary 1 98 5
gets those to 9 8 8 . The ind ivid ual HOC 's decision refusing permanent frequencies.
get the X X 2 exchanges (as these are Ai rfone ex pects to continue with over
fi lled with intrastate W A TS lines ) . M o re 300 plane phones a nd the 65 gro u nd
exchanges w i l l undou bted ly be grabbed stations even though there is no
by other carriers as they begin to offer provision for frequency allocat ion.
800 service . I d o n 't know what happens Airfone hopes to be al lowed to use
if your company 's 800 number's cellular frequencies.
exchange gets taken over by Bargin
Bob's Telefone K ompany. H opefully
you get to keep the old p rovider, but this
would rea lly make it tough to route .
Do n 't know what happens either if your
clever little phone number "word "
Remember
belongs to Hargin Bob. guess you gotta the Greed iestl
suffer. If your CO isn 't equal accessable
yet, it j ust k icks the ca l l onto the nearest

Page 16 February, 1 987 2600


More Nast� Business

U U U Q U U U U U U U U UU U U U U U U U U U U U U U U U U U U U U U U
U U N C L A . • 1 F 1 , D U
3 U U U U UU U U U U U U U U UU U U U U U U U U U U U U U U U U U U U

10UTlNE
'
� 0 7 1 7 1 9Z SEP . .. ZYI

'M C No U A I N I NC T O N DC

TO .AYOp

If
U II CL A I " "/ N 0 1 " 0 0l" � .., , ,

NAYOp a U I I ..
S U 8J I T E L E P HO N E c a ED I T CARD fRAUD

1 . T E L EP H O N E CREDI T CARD FRAUD CONT I HU E S TO O C CU R D ES P I T E


AGCR ES S I V E I Nt T I A T I YE S BY C OINANDS A N D T H E HELP OF T HE N A YA L
I N V E S T I CA T I V E . IE R V I CE .

2. C O N T I A R ' T O ' O ' � L A I I E L I E F . T H E R E I I H O F R E E LO H e D I S TA H C E


T E L E P H O HE ' E RY I C E F O . O U R ' E O ' L E T O C A L L A H Y Y H E R E I N T H E
C O N T I N E N T A L U N I T E D I T A T E I O R O Y E R S EA I . N A Y Y ' E O P LE U S I N G
U N AU TH O R I ZE D C R E D I T C A R D H U N 8 E R I A R E B T E A L I N G F R O " C O I "U H I C A T I ON S
C O NP AN I ES . N D l. t NC I N ' D I I C RE D I T T O T H E N B E L � E S A N D T H E H A Y Y .
I I I U C E OF T E L E P H O N E C R ED I T C •• D - N U N I E . I O. F R A U D U L E N T U S E O F
A U T H O R l Z A T l O H C O D E 11 0 " " . 1 U L I; M O T I E T O L E R A T E D . Y IOLATORS
. R E S U B J E C T T O C I I II I N A L P I O I E C U T I O N U M D E R T H E U C M J A H D C I Y I L
S T A r u r E I � A ' Y E L L . 1 A D M I II I S T R A T I Y E A C T I O N .

3 . AN A c e . E S I I V E ' . 0 0 1 . " OF I D U CA T i o N . A .... I E N E H a l o H A HD


' U N I S N II E N T I S N E E D E D T O I T E II TNI T IDE .
It

" 7 1 /2 9 a ftt D 3 1 1
Oal9
2 90 / 1 9 . 9 7 Z 07 1 7 1 9 % SEP . ..
eNO W AS H I N G T O N DC

UUUUUUUUUU UUUUUUUUUUUUU
UUUUUUUUUUUU U
U U II C L A I I J F I E D
U
, u , a u u , u u Q U' • • • • I . U I U U I U
U U U U U U U U UI U U

26()() February. 1987 Page 17


NEW DE VEL OPMENTS
They 've done it again. Our phone doubt .
company has figured out a way to make That 's not enough? O K , here 's some
a profit out of absolutely nothing. W h ile more. If the tirst three numbers you ask
we must commend them for their ever­ for aren't ava ilable ( w h ich doesn 't
present ingenuity, we must also point necessa rily mean they 're be ing used ) ,
out that this is indeed the very last guess what happens? "A fee of $20 will
straw . apply for each 3-number search beyond
We a l l know how u nj ustified the the initial one . " Twenty d o l lars J ust to
charge for touch-tone service is. Touch apply for a number! And there 's no
tones make phone company equipment guarantee you'll even get it ! It could go
operate a lot faster, yet people can be on forever!
foo led into thinking they're gett ing Obviously, the phone company is
"access" to some k ind of premium going to clean up on this if people are
service. But the fact is that we all have foolish enough to fa l l for it . One right
access i n the first p lace and the only way after the other, we 're seeing services that
the phone company can change this is to have always been free develop charges .
invent a machine that makes your touch While some changes in serv ice are
tones useless if you haven 't paid . That 's necessary because of the d ivest iture, this
why touch tones work regardless of is certainly not one of them. I t 's time
whether o r not you pay for them on some nasty letters were written to our
older phone systems. They 're not e lected officials who have the power to
sophisticated enough to operate that do something about it.
horrible machine. Remember�you 're Gold numbe rs indeed . Would anyone
not actually paying for the service� care to speculate on what they 're going
you 're paying for not being d isconnected to t ry next'!
from the service . M eanwhile there 's an entirely new
The newest ripoff is a feature called service that has sprung into being
"gold numbers ". Do you remember the overnight . I t 's called PRS and it 's being
days when you could get a phone used by M ountain Bel l and Pacific Bell.
installed and ask if you could get a PRS stands for Personal R esponse
particular number? If the number was System and means exactly the opposite.
ava i lable, you 'd be able to get it in most It seems that when you call up a
cases. J ust l i ke that . Well, you can kiss directo ry assistance operator in those
those days goodbye. regions, the voice you hear saying, "Can
"For less than a quarter a day , " the I help you? " or "What city, please? " is
cheery little N ew Y ork Telephone actually a record ing! Each operator
pamphlet says, "you could have a records their own "greeting" and it plays
number that is easy to remember when they pick up. This, accord ing to
because of repeat ing or sequential d igits . the company, gives the operator some
Or you m ight select any available 7-d igit t ime to rest between calls. In fact, they
combination of numbers to suit your like to refer to it as "the Pause that
need s, perhaps trying for a number that Refreshes and Satisfies . " They say the
t ranslates into a word o r phrase . " customers j ust love it because the
I s n 't this brilliant? As if nobody had recording sounds so friendly and upbeat.
ever thought of selecting their own G ive us a brea k ! I t 's j ust another way of
phone number befo re ! And, since they turning those poor operators into
were smart enough to come up with the machines . There 's already a reco rd ing
idea , they 've natura lly earned the right that gives the number, now there 's one
to charge us $3 a month for one of these that picks up the phone ! W hat's left'!
n umbers o r $6 a month for business
custome rs . M a intenance charges, no

Page 1 8 February, 1987 2600


2600 marketplace
D O C U M E NTAT I O N on e l ectro n i c & d i g i t a l
P B X ' s a n d sw i tc h i ng syst e m s . W i l l i n g t o
trade/purchase. A l so look i n g for B e l l
System Pract ices and other such
p a r a p h e r n a l i a . Write to B i l l , c/o 2600, PO
B ox 7 5 2 B , M iddle I s l a nd, N Y 1 1 95 3 .
C E L L U LA R T E L E P H O N E I N F O R M AT I O N
WANTE D . I w i l l pay a modest fee for i nfo
w h i c h has not yet been p u b l ished in 2600.
Please desc r i be the type of i nfo that you
h ave a nd n a m e yo u r p r i c e . M r . B . , P . O . Box
2895, B rooklyn, N Y 1 1 202 .
MAN UALS OR I N STRUCTI O N S N E E D E D for
two modems l a be l ed D a t a p h o n e C h a n n e l
I nterface. O ne has l a b e l o n t h e outside t h a t
says : 44A2 S e r i es 1 , Data M o u n t i n g , S D -
1 D247-0 1 - J 2 3 a n d t h e other says : 44A2
DATA MTG , S D - 1 D 247-0 1 -J 2 3 , S E R I E S 1
83 MG 1 2 . The boards on t h e i n s ide a r e
l a be led : D A S 8 2 9 B - L l A, S E R I E S 4, 8 1 M G 3
a n d DAS 829B L 1 A, S E R I ES 5, 8 4 M G 04.
S e n d i nfo to: P . O . Box 50346, R a l e i g h , N C
27650.
P R I VATE I NVESTIGATO R wants to hear
from 2600 readers who have e l ectro n i c
eq u ipment h e c a n buy c h e a p ! G a s l a m p
Pr ivate Eye i s i nto E l ectro n i c C o u n t e r -
m e a s u res/TSCM i n t h e trade p a r l a nce. 425
"F" Street, S a n D i ego, CA 92 1 0 1 . ( 6 1 9 )
2 3 9 - 6 99 1 .
TAP BACK I S S U E S-com p l ete col l ect ion,
vo l . 1 - 83 plus s u p p lementa l reports and
schematics. Approx. 400 pages of q u a l ity
copies sent via U PS or U S M a i l . $ 1 00
i n c l u des d e l ivery. Send cas h , check o r M O
(payable to P E l ) . C a s h s e n t s a m e day, others
a l l ow 4 weeks, to: Pete G . , Post Office Box
463, Mt. La u re l , NJ 08054
HEY YO U ! T h i s is the c h a nce you 've been
wa i t i ng fo r ! A new s e r v i c e o f 2 600
M a g az i n e . G ot somet h i n g to se l l ? Look i n g
f o r somet h i n g to buy? O r t r a d e ? T h i s i s t h e
p l a ce ! And it's f r e e to s u bs c r i bers ! J ust
send u s w h a tever you want to say (without
m a k i ng it too long ) a n d we ' l l print it ! And, if
you send i n t h e o n ly ad we get, you ' l l get t h e
e n t i r e page to yourse l f ! O n ly peop l e p l ease,
no b u s i nesses !
Dead l i n e for M a rch issu e : 3 / 1 / 8 7 .

2600 February, 1 987 Page 1 9


cosmos (continued/rom page 14)

Output example would look similar to this: COO-Change Due Date:


Change due date of a service or frame order
"E�ER6ENCY fAC I L I T Y A S S I GN"ENT L I ST 0 1 -0 1 -8. Example:
RESERVED L I NE EQUI P"ENI
m CnD
. . NO SPARE LINE EQUI P"ENT fOUND
H ORO CH- X X X m / l M m - I B22
AVA I LABLE D I RECTORY NUMBERS ! 7 1
I DO 0 1 -0 1 -8.
53H m
534 - m X . etc •
.. IRANSACI I ON COMPLETED
Output Example:
. . ORO CH- l X l l l DUE DATE 0 1 -0 1 -8.
SOW-Service Order Withdrawal:
Withdraws most recent version of a service order.
• O rder number must refer to the latest version . NAI-Telephone Number Assignment Inquiry:
The H - L i N E c i rcuit I D Prov i des from 1 to 25 spare telephone numbers
ident ifies the order. Valid c i rcuit identif iers are : compat ible with the input specifications.
TN , X N , P L , C P , D E . a n d T K . • I nput is an H - L i N E with the TN type and N N X

Example: o r RZ entries . The status o f the TN supp l ied w i l l


b e modif ied t o reserved i f S T is speci f ied o n the
�Cl SD�
H ORD NC- l X X I X / TN 5 3 4 - 1 822 H-LiNE.
Example:
vex MAl
H I I X I NN I 534/S1 RS
SCP-Service Order Completion by PAD:
Record i n the Service O rder F i l e the completion
of an order by PAO . (This shows first available spare in prelix 534.)
• Standard SXX H l i ne input.

Example: MAP-Manual Assignment Parameter:


Perm its the PAO to establ ish the parameters that
w i l l const itute the PAD Open-of- Day report .
VCl H ord CDX l X X l X ITN 53' - I B22

vex "AP
I NNI 5341ECS I R IEQf TNNL l L C 50 • • tc .
SCA-Service Order Completion Automatic:
Enters final completion on a l l service orders ( for l ine equ i pment)
which have been or are not requ i red to be
completed by the M D F , are not in a held or ( for telephone numbers of type B . 1 0)
j eopardy status, and are due prior to or on the I NNI 534111 BILC 1 0

current date .
• Two due dates may be entered on the H - L l N E ; ( Thanks to Loki, Evel Eye, and Sir Galahad for
SCA w i l l complete orders due o n o r between the their contributions. )
dates . Addit ional options are OT (order type ) ,
O R O , and S G .
Example: I n the future we wil l be devoting
more time to just what COSMOS
m SCA
means to the average person and
(complete all orders on or before this due date) how it can effect and disrupt their
l ives. There are many other computer
Example2: systems that are capable of doing all
kinds of other things to your personal
NCISCA
H nn O I - O I -B./O I NC
l ives. We welcome information and
comments on them a l l .
(complete all NC (new connect orders) Write to 2600, PO Box 99, M iddle
Island , NY 1 1 953-0099 . Or cal l the
office at (516) 751 -2600 .

Page 20 February, 1987 2600



(cantinuedfrom page J5 )
reviews
goi ng on elsewhere. As one might expect from a around i n ci rcles placed next to the l i ne that you
British author, the di scussi on of computer want to li sten to. A typical i nductive loop i s the
networks centers around the British public data sucti on cup microphone that sti cks to a
networks, whi ch are si mi li ar to Telenet or telephone handset and records the conversation
Tymnet. without being physically attached to the line. ]
And for those hackers who have too many Overall, The Hacker's Handbook is a good
security officers chasing after them, one chapter book for those hackers who want to broaden their
di scusses "radio computer data", also known as horizons, or who j ust need some new i deas.
radi o teletype or RTTY. This i s not really hacki ng , Hackers on both si des of the pond will get a
but j ust an interesti ng way to use your computer better understandi ng of the mag i cal machinery
when you're not moving satelli tes wi th tank parts that places all thi s ti nti llati ng tele­
ordered from TRW. You need a short wave communicati ons withi n our grasp.
receiver and an interface (which starts at $40) ,
and you wi ll be able to tune in various stations
that use the i ntemational short-wave bands for Automatic Teller Machines III
transferri ng computer data. Sample li sti ng s i n by John J. Williams, MSEE
the book show a news bulleti n about the Enver Consumertronics Co.
Hoxha Automobi le and Tractor Combi ne i n P.O. Drawer 537
Albani a, and some typi cal amateur radi o Alamogordo, NM 883 1 0
conversations. $25.00
Every chapter always has one or two i deas or Review by Lord Phreaker
techniques that the capable hacker can use to Automati c Teller Machines (ATM's) are the
expand hi s or her horizons. Here's one fun i dea wave of the future in banki ng. Proj ections aim at
that rarely gets di scussed, under the heading of 500 , 000 ATM's and Poi nt of Sale terminals
"Hardware Tricks": (POS) i n place by the year 2000 . By 1 990 there
"For the hacker wi th some knowledge of wi ll be $550 bi lli on worth of ATM transacti ons
computer hardware and general electroni cs, and per year. ATM's are becoming a maj or force in the
who is prepared to mess about with circui t banking i ndustry, wi th more than 58 million
di ag rams, a solderi ng i ron and perhaps a Americans usi ng them. But along with the added
voltmeter, log i c probe, or oscilloscope, still convenience and lower costs to banks of using
further possi bi li ti es open up. ATM's, crimes i nvolving these machines have
"One of the most useful bi ts of ki t consists of a grown enormously as ATM use expands.
small, cheap radio receiver (MW/AM band) , a Reported ATM crime i n 1 983 was between
mi crophone, and a tape recorder. Radios i n the $70 and $1 00 million, and estimates run as hi gh
vi ci nity of computers, modems, and telephone as $ 1 billi on. These fi g ures don' t i nclude
lines can readily pi ck up the chirp chirp of digi tal mug g i ng s and other crimes directly agai nst ATM
communi cations wi thout the need of carryi ng out users. Wi th $50 , 000 i n a newly refilled ATM, "a
a physical phone tap. Altematively, an i nducti ve veri table cooki e j ar, " these machi nes are
loop wi th a small low-g ai n amplifier i n the becomi ng the focus of crimi nals. ATM fraud soon
vi ci ni ty of a telephone or li ne will g i ve you a will become a maj or criminal activity.
recording you can analyze later at your lei sure. " J ohn Wi lli ams begi ns hi s pamphlet wi th a
[ An i nducti ve loop i s a long piece of wi re wrapped s eri es of apocalypti c warni ng s about the
repercussi ons of thi s boom in ATM f raud.
According to hi s "Background Information", J ohn
Willi ams i s very convinced of the danger thi s
-
growi ng area of fraud poses to the American

MCC AT&T publi c. Hi s apocalyptic vi si ons get carri ed to


extremes, as he states that "I strongly feel that
all forms of EFT [ Electroni c Funds Transfers,
whi ch i nclude A TM's] are i nstruments of Satan

2600 February, 1987 Page 2 1


revIews
and must be destroyed to prevent enslavement as wel l as encryption schemes . This real ly is the
by the Ant ichrist . " These d i re forebodings are most interest ing and i nformat ive part of the
interspersed throughout the text , complete with ent i re book let , as he in depth d i scusses P I N
references to B i g Brother. W i l l i ams also d i s l i kes encryption and data formats. The technical
the banks and other capitalistic enterprises . H e sect ions on how ATM's and ATM networks
claims i t i s in the banks' best i nterests to operate is also i nterest i n g , al though not specific
suppress stories of ATM fraud losses . ATM enough .
transaction costs are much less than those If you bought the book with the hope of finding
deal ing with l ive human tel lers . In add i tion , out an easy way to break i nto an ATM machine,
Wi l l iams claims that once banks have gotten the forget it. M ost of the methods are suff iciently
p u b l i c to prefer using ATM 's, they w i l l raise vague that you wou ld have to do much more
charges to the customer for ATM transactions. i nvestigation on the top ic anyway ( luck i l y for the
H e also wams against the "omi nous risks to our rest of us) . M any of the phys ical attack methods
freedoms and privacy" as the ATM i nvades the are j ust the same as for pay phones (or any other
home. A l though these claims certainly make armored object , though surprisingly many ATM's
entertaining read ing , they detract from the are only f i re resistant , not burglar or tool
seriousness of the work and make i t too easy to resistant ) , and are really innately obv ious. M any
dismiss . H owever , once one gets beyond these of the successfu l methods used i n the past are
rav i ngs one real izes that there actually is some due to programming mistakes which probab ly
usefu l i nformation t"lere . have been repai red . ATM security seems to be a
One area where [ h e book excels is t h e section rapidly evo lving field , and major ho les are
dea l i ng with protec t i ng oneself from frau d . M any patched as soon as they become apparent . The
of the suggestions are common sense, but many section on computer related break - i n methods
people don't even think of using them . W i l l iams is was especially vague, and much of the material
espec i a l l y c o n c e m e d a b o u t v i o l e n t c r i mes was too general ized , and cou ld be app l i ed to any
against ATM users by muggers . For example, he computer crime .
suggests that one never w i thdraw funds between When one comes to the end of the booklet one
1 0 and m i d n i ght , as criminals can then make two wonders if i t was worth the cost . Twenty-five
days of m aximum withdrawals with your card . dol lars is a lot for fifteen pages ( plus a three page
Wi l l i ams also addresses your legal rights. If a f e e d b a c k q u es t i o n n a i re ) o f b ad l y 15eroxed
violent crime occurs within the ATM lobby , you ravings. Each page, however , is two columns of
can probab ly successfu lly sue the bank for very sma l l print , contai ning some informat ion of
improper safety measures . The section on how wort h , much of which is impossible to f i nd from
many ATM scams work i s helpfu l , as most of any other source . The d iagrams aren't extremely
them involve somehow tricking the victim into helpfu l , mainly being cartoons and pub l ic i ty
revea l i n g his P I N . H e also l ists several wam ing shots . W i l l iams often plugs his other books in the
signs of ATM fraud i n progress or about to work , as wel l as America's Promi se Rad i o , which
happen so one can avoid becom ing another is distracting ( adm itted l y , he also pl ugs 2600 as
v i c t i m . The section on protect ing oneself from "the best s o u rce o n p h o n e and c o m p u t e r
fraud perpetrated by bank employees as wel l as phreak i ng " ) . This cou ld b e a better investment if
more common criminals is indeed valuable, as is the ravi ngs were removed along with a lot of the
the discussion on E FT laws . extemporaneo u s m a t e r i a l . It i s n ' t espec i a l l y
The techn i cal section is i n terest i n g , but not usef u l t o scan through columns o f c l i pp i ngs
very usefu l . W i l l iams focuses on the D iebold tel l i ng that so-and-so stole such-and-such
ATM , wh ich accounts for about 45% of installed amount somewhere. M any o f the c l i ppings really
ATM 's, but one wonders if the i nformation is out have noth ing to do with ATM fraud , and are
of date or only app l ies to one mode l . There is a merely cute f i l ler. My suggest ion to the author for
discussion of several other models as wel l . H e A utomatic Teller Machines I V is to cut out much
d o e s e n t e r i n t o a u s e f u l a n d i n t e rest i n g o f t h e d i a t r i b e s w h i c h d e t ra c t f r o m t h e
exp lanation o f ATM card magnet i c strip formats , seriousness o f the top i c .

Page 22 February, 1 987 2600


ATTE N T I O N
T h e s e a re t h e n ew p r i ce s n ow i n effect . Yo u ca n st i l l save m o n ey
a n d h a ss l e s by r e n ew i n g for two o r t h ree ye a r s .
$ 1 5 . " . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 yea r s u bs c r i pt i o n o r r e n ewa l
$ 2 8 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 yea r s u bs c r i p t i o n or r e n ewa l
$45 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 yea r s u bs c r i p t i o n or r e n ewa l
$40 . . . . . . . . . . . . . . . . . . . 1 yea r corporate s u bsc r i pt i o n or r e n ewa l
$ 7 5 . . . . . . . . . . . . . . . . . . . 2 ye a r corporate s u bsc r i pt i o n o r r e n ewa l
$ 1 1 0 . . . . . . . . . . . . . . . . . 3 yea r corporate s u bsc r i pt i o n o r r e n ewa l
$ 2 5 . . . . . . . . . . . . ove rseas s u bs c r i p t i o n or r e n ewa l ( 1 yea r o n ly)
.

$55 . . ove rseas corporate s u bs c r i p t i o n o r r e n ewa l ( 1 yea r o n l y )


$ 260 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . l i fet i m e s u bscr i pt i o n

B a c k i ss u es h ave n ew p r i ces too . T h ey a r e :

$ 2 5 . . . . . . . . . . . . . . . . . . . 1 984, 1 98 5 , o r 1 986 i ss u es ( 1 2 p e r yea r )


$ 50 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A n y two years
. .

$75 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A I I t h ree yea rs (36 i s s u e s )


. . . . . . .

(Overseas o r d e r s add $5 f o r e a c h yea r ordered)

Send a l l orders to :
2 600
PO B ox 7 5 2
M i dd l e I s l a n d , N Y 1 1 9 53 U . S .A .
( 5 1 6 ) 7 5 1 - 2600

2600 Februar) . 1987 Pa2e 23


CONTENTS

HUGO CORNWALL INTERVI EW . . . . 4


COSMOS GU IDE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6 .

TELECOM IN FORMER . . . . . . . . . . . . . . . . . . . . . .8 .

NASTY BUSIN ESS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10


LETTERS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
N EW DEVELOPMENTS . . . . . . . . . . . . . . . . . . . . 18
2600 MARKETPLACE . . . . . . . . . . . . . . . . . . . . . . 19
PHON E N EWS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20

2600 M agazine
PO Box 752
M iddle Island, NY 1 1 953 U . S . A .

SAVE YOU R AD D R E S S LAB E L FOR LOG I N


TO TH E N EW PRIVATE S ECTO R B U LLETIN BOAR D !
(20 1 ) 3 66-443 1

You might also like