You are on page 1of 48

,

2600
The Hacker Quarterly

VOLUME SIX, NUMBER ONE


SPRING,1989
MINIMIZE

MINIMIZE is a procedure used during periods of crisis


or other abnormal periods to reduce the volume of record and
long distance telephone traffic ordinarily transmitted electrically.
MINIMIZE applies to ALL users of DOD communications
systems, including originators of card and tape traffic.
Procedure.. When MINIMIZE is imposed, users of DOD
electrical communications facilities must determine that:
1. The information to be forwarded is required to
avoid a seriously detrimental impact on mission accom­
plishment or safety of life.
2. Electrical transmission is the only way to get the
information to the addressee in sufficient time to accom­
plish .its purpose.
Alternate Means of Communications. The US mail, the
US Armed Forces Courier Service, or an individual as a courier
or messenger should be used instead of using electrical means
when MINIMIZE is imposed.

Authority to Impose and Cancel MINIMIZE. Com­


manders are authorized to' 'impose ~IINIMIZE within their
command or area of command responsibility unless specifically
denied by appropriate higher authority. The Joint Chiefs of Staff
impose it worldwide as well as in any specific area. The Joint
Chiefs of Staff or the commander concerned, as appropriate, will
cancel M.INIMIZE when no longer required.

Authority. Allied Communications Publication (ACP)


121 US Supplement-1
260() (/SSN 0749-385/) is published quarterly by 2600 Enterprises Inc., 7 Strong's
Lane, Setauket, NY 11733. Second class postage permit paid at Setauket, New York.
POSTMASTER: Send address changes to
2600, P.O. Box 752, Middle Island, NY 11953-0752.

Copyright (c) 1989,2600 Enterprises, Inc.

Yearly subscription: U.S. and Canada -- S18 individual, $45 corporate.

Overseas -- S30 individual, $65 corporate.

Back issues available for 1984, 1985, 1986, 1987

at 525 per year, $30 per year overseas.

ADDRESS ALL SUBSCRIPTION CORRESPONDENCE TO:

2600 Subscription Dept., P.O. Box 752, Middle Island, NY 11953-0752.

FOR LETTERS AND ARTICLE SLBMISSIONS, WRITE TO:

2600 Editorial Dept., P.O. Box 99, Middle Island, NY 11953-0099.

26()O OtTice Line: 516-751-2600

...
HACKERS IN JAIL
Story Number One: By now Hollywood celebrities such as Kristy
we've probably all heard about McNichol, authorities said.
Kevin Mitnick. Late last year, this Over the past few months, sever­
computer hacker was arrested after al federal court judges have refused
being turned in by his friend, who at separate hearings to set bail for
explained it all by saying, "You're a Mitnick, contending there would be
menace to society." no way to protect society from him
Mitnick has been described in the if he were freed.
media as 25, an overweight, bespec­ Mitnick's fami! y and attorney
tacled computer junkie known as a said prosecutors have no evidence
"dark side" hacker for his willing­ for the accusations and that they are
ness to use the computer as a blowing the case out of proportion,
weapon. His high school computer either out of fear or misunderstand­
hobby was said to have turned into ing of the technology.
a lasting obsession. Mitnick has an amazing history,
He allegedly used computers at to say the least. He and a friend
schools and businesses to break into logged into a North American Air
Defense Department computer sys­ Defense Command computer in
tems, sabotage business computers, Colorado Springs in 1979. The friend
and electronically harass anyone -­ said they did not interfere with any
including a probation officer and defense operation. "We just got in,
FBI agents -- who got in his way. looked around, and got out."
He also learned how to disrupt Computer security investigators
telephone company operations and said that as a teenager Mr. Mitnick
disconnected the phones of belonged to a shadowy Southern
(continued on page 20)
Spring 1989 2600 Magazine Page 3
MORE ON

by Red Knight su [login name]


Phreakers/Hackers Underground The su command allows one to
Network switch users to a super user or to
This ;s the conclusion of a two-part another user. Very important -- could
article. Part One appeared in our be used to switch to super user
last issue. accounts.
More UNIX Commands $ su sysadm
man [command] or [c/r1 - will give password:
you help for a command. This su command will be logged in
help - available on some UNIX sys­ lusr/adm/sulog and this file of all files
tems. is carefully monitored by the system
mkdir [dir name(s)] - makes a direc­ administrator. Suppose you hacked
tory. into john's account and then switched
rmdir [dir name(s}] removes a direc­ to the sysadm account. Your
tory. You won't be able to remove the lusr/adm/sulog entry would look like
directory if it contains files. this:
rm [file name(s)] - removes files. rm • SU 04/19/88 21 :00 + tty 12 john­
will erase all files in the current directo­sysadm
ry. Be careful! Some options are: [-f Therefore the S.A. (system admin­
unconditional removal] [-i prompts istrator) would know that john switched
user for y or n]. to the sysadm account on 4/19/88 at
write [login name] - to write to other
logged in. users. Sort of a chat.
mesg [on] roy] - doesn't allow others to
send you messages using the write "Do not use login

command. Wall used by system adm


overrides it. names like Hacker,

$ [file name] - to execute any file.


Cracker, Phreak, etc."

we [file name] - counts words, char­


acters, lines in a file.
sUy [modes] set terminal 110 for the
current devices.
sort [filename1 - sorts and merges 21 :00 hours.
files -- many options. Searching For Valid Login Names
spell [file name] > [file name] - the Type in:
second file is where the misspelled $ who (this command informs the user
words are entered. of other users on the system)
date [+%m%d%y*] [+%H%%M%S] ­ cathy tty1 april 19 2:30
displays date according to options. john tty2 april 19 2:19
at [or] [-I] [job] - does a specified job dipal tty3 april 19 2:31
at a specified time. The -r removes all tty is the users terminal The date
previously scheduled jobs. The -I and time shown are those of their
reports the job number and status of logins.
all jobs scheduled. /ete/passwd File
write [login] [tty] - sends a message The etclpasswd is a vital file to cat.
to the login name.

Page 4 2600 Magazine Spring 1989


HACKING UNIX

It contains login names of all users If password aging is active the user
including super user accounts and is forced to change the password at
their passwords. In the newer SVR3 regular intervals. One may be able to
releases security is tightened by mov­ tell just by looking at the letclpasswd
ing the encrypted passwords from file when the password is allowed to
letc/passwd to letc/shadow which be changed and when it is compulsory
makes it only readable by root. This is to change it. For example, the entry:
optional, of course. john:chlps11,43:34:3:John
$ cat letc/passwd Scezerend:lusrljohn:
root:D943/sys34:0:1 :0000:/: The password contains an exten­
sysadm:k54doPerate:0:O:adminis­ sion of (,43) which means that john
tration:usr/admin:lbin/rsh has to change the password at least
check fsys: locked;:O :O:check file every six weeks and can keep it for at
system :/u srladmin:lbin/rsh least three weeks. The format used is
john:chips11 :34:3:john scezerend:l­ [password].Mmww. The M is the maxi­
usr/john: mum number of weeks before the
$ password has to be changed and m is
If you have reached this far, cap­ the minimum period before the pass­
ture this file as soon as possible. This word can be changed. The ww indi­
is a typical output of an etc/passwd cates when the password was last
file. The entries are separated by a M:M. changed.
There may be up to seven fields in
each line. let's look at the "sysadm" Aging chart:
example. The first field has the login --1--­
name, in this case sysadm. The sec­ Character 1# of weeks
ond field contains the password. The 10
third field contains the user 10 ("0" is I 11

the root). Next comes the group 10 0-9 12-11

and then the account which contains A-Z 112-37

the user's full name, etc. The sixth a-z 138-63


field has the login directory which -----1---­
defines the full path name of the par­
ticular account and the last field con­ From the above, anyone can deter­
tains the program to be executed. The mine the number of weeks when one
password entry in the field of the can change the password. The '"ww" is
checkfsys account in the above exam­ automatically added telling when the
ple is "locked;". This means that the password was last changed.
account checkfsys cannot be If Shadowing is Active
accessed remotely. The ";" acts as an If the shadowing is active the
unused encryption character. A space letclpasswd will look like this:
is also used for this purpose. You will root:x:0:1 :0000:1:
find this in many small UNIX systems sysadm:x:O:O:administration:/usrl
where the system administrator han­ admin:lbinlrsh
dles all maintenance. The password is substituted by "x·.
Password Aging The letc/shadow file is only readable

Spring 1989 2600 Magazine PageS


HACKING ON UNIX

by root and will look similar to this: This command is also used to send
root:D943/sys34:5288:: mail to remote systems. Suppose you
Cathy:masai1 :5055:7:120 wanted to send mail to john on a
The first field contains the user's 10. remote called ATI01. You would type
The second contains the password. in:
The password will be NONE if remote $ mail ATI01 !john
logins are deactivated. The third con­ Mail can be sent to several users
tains a code of when the password just by entering more login names
was last changed, The fourth and the after issuing the mail command.
fifth contain the minimum and the Using mailx is the same basic for­
maximum number of days for pass­ mat.
word changes. (It's rare that you will $ mallx john
find this in the super user logins due to subject: (this allows you to enter
their hard-to-guess passwords.) the subject)
letc/options Directory (line #1)
The etcloptions directory will con­ (line #2)
sist of utilities available in the system. (After you finish, enter "-.". More
For example: commands are available like -p, -r,
-rwxr-xr-x 1 root sys 40 april -v. -m, -h, -b, etc.)
1 :00 uucp.name After you logon to the system, your
account may have mail waiting. You
letc/group will be notified "You have mail". To
The file has each group on the sys­ read it enter:
tem. Each line will have four entries $ mail
separated by a ":", An example of con­ (line #1)
catenated letc/group: (line #2)
root::O:root (line #3)
adm::2:adm,root ?
bluebox::70: $
The format is: group name:pass­ After the message you will be
word:group 10:109in names. It's very prompted with a question mark. Here
unlikely that groups will have pass­ you have a choice of deleting the mes­
words assigned to them. The 10 "0" is sage by entering "d", saving it to view
assigned to "I". it later by entering "s", or just press
Sending and Receiving Messages enter to view the next message.
Two programs are used to manage Super User Commands
this. They are mail and mailx. The dif­ sysadm adduser - will take you
ference between them is that mailx is through a routine to add a user.
fancier and gives you many choices Enter this:
like replying, using editors, etc.
The basic format for sending mail
is: $ sysadm adduser
$ mail [Iogin(s)] password:
(Now one would enter the text.
After finishing, enter ..... (a period) on (this is what you will see)
the next blank line.) Process running subcommand

Page 6 2600 Magazine Spring 1989


GENERAL INFORMATION
USE OF OFFICIAL TELEPHONES FOR
PERSONAL BUSINESS •
OC .r.. Ir.
3. Avoid system gturation, MOl' Long OJ.tlnee c,lI, from the
anempted in the middle of the mornlng or
afternoon. When thi. happen......... limply ar. not enough

circuits to han<h tNery caN. An.mp1 to plac. C,II, through­


T.S.phon•• ar. not to H uMe! by .tnpSOy.... fot ~tSOnat out the day. Many c..l1i at. comp"'.c:i "ttat' ift the earty
momina or late afCemoon wnen ttwre ...... competition for
mupge. except in c... of emergency. U.. p.y station. 10Qt8.d in
conyenient • • • in all buildinQ.. Chief of 8ur. . . I f ' upected to , citcuits..
cooperate In Heuring strid ob..rv~ of this instruction and lach 4.11 • "ekeui.. buay- fKOfding ill MCoun.rH. bang up .nd try
1M""'" tmnnt • ,.lep/loM .... 1m OJ he< _ ~ .~ble for ito your e.n 'ate,.
"'-,_. .5. If IIIe call ~ of _ u.gency _ dela", _ _ bI _lied
",II
....,in
_1M Def_ _.1101\0"1_ "",/hi.. of Iba <ir<uit
1 M o y . - and noqunt herlhia _ _•.
I• will bI pn>yided • _IIIIv _ _, of long

. _
and IOIophone nu_
_ _ wlHcllwili inciudecalllnti_._. lime
Iengtft of <all (In mlIMM/.
"'1.0. .
"'*
of 1M clll. _ ••
1. 1MN "'_ _ do not opjlly ,. 4311RH....... Of 15I-S"".

jMeIpatI-- .,.. . • ~,
. t. C..... " - Diott_ _...lion l... jNR + 1115-1212)
1.=~~·~1:=~~~~'£6
......_ . CIllo to _ . Code -lOll" .,._.
10. _ 10 poe- • Iv< __ Code numbo.. moot tr.quondy
..-. ,r .'
.CONFERENCE CALLS. ;,

. , .,
. . . . ' .............. 211.421.....,. ....... _ _ _ _ ..........

. .,..
'Z,J,

Spring 1989 2600 Magazine Pag/' 7


HACKER'S GUIDE

'adduser'
Hacker, Cracker, Phreak, etc. This is a
USER MANAGEMENT
total giveaway. The process of adding
a user won't last very long, The S.A,
Anytime you want to quit, type "q".
will know when he checks out the
If you are not sure how to answer
letclpasswd file.
any prompt, type "?" for help.

If a default appears in the question,


sysadm mod user - this utility allows
press <RETURN> for the default.
one to modify users. Do not abuse!
Enter user's full name [?,q]: (enter
Enter this:
the name you want)
$ sysadm moduser
Enter user's login ID [?,q]: (the ID
Password:
you want to use)
(This is what you will see)
Enter user's ID number (default
MODIFYING USER'S LOGIN
50000) [?,q) [?,q]: (press return)

Enter group ID number or group


1) chgloginld (This Is to change the

name: (any name from letc/group)


login 10)

Enter user's login home directory:


2) chgpassword (Changing pass­
(enter lusrlname)
word)

3) chgshell (Changing directory.

This Is the Information for the new


DEFAULT = Ibln/sh)

login:

User's name: (name)


ENTER A NUMBER, NAME, INITIAL

login ID: (ID)


PART OF NAME, OR ? OR <NUM­
users ID: 50000
BER>? FOR HELP, Q TO QUIT

group ID or name:

home dlrectory:lusr/name
Try every one of them out. Do not
Do you -want to install, edit, skip
change someone's password. It cre­
[I,e,s,q]? (enter "I" to Install)
ates havoc. If you do decide to change
Login Installed
it, write the original one down some­
Do you want to give the user a
where and change it back. Try not to
password? [y,n] (it's better to enter
leave too many traces after you have
one)
had your fun.
New password:
sysadm deluser - this is used to
Re-enter password:
delete a user.
Enter this:
Do you want to add another login?
$ sysadm deluser
Password:
This is the process to add a user. (This will be the screen output)
Since you hacked into a super user Running subcommand 'deluser'
account, you can make another super from menu 'usermgmt'
user account by doing the following: USER MANAGEMENT
enter 0 as a user and a group 10 and This function completely removes
enter the home directory as the user, their mail file, home directo­
lusr/admin. This will give you as much ry. and all files below their home direc­
access as the sysadm account. tory from the machine.
Caution: Do not use login names like

Page 8 2600 Magazine Spring 1989


TO UNIX

Enter login ID you wish to remove


computer's name. the time it can be
(q): (cathy)
reached, login 10. password. tele­
'cathy' belongs to 'Cathy Franklin'
phone numbers, etc.
whose home directory is lusr/cathy
devices - interconnected with systems
Do you want to remove the login ID
file. Also contains baud rate, port, etc.
'cathy'? [y,n,?q]: (y)
dialcodes - contains abbreviations for
phone numbers that can be used in
/usr/cathy and all files under it have
the systems file.
been deleted.
Other files are dialers. sysfiles, per­
missions, poll. devconfig.
Enter login 10· you wish to remove
BNU Administrative Files
(q):
There are five administrative files
present. These files are created in the
Other Super User Commands lusr/spool directory. They are respon­
wall [text] control-d - sends an sible for various BNU processes.
announcement to users logged in (will 1M - this file is used to hold temporary
override mesg -n command). Execute data. When transferring the files from
only from I. a remote to local the
letc/newgrp - used to become a lusrfspool/uucpl{name of the remote
member of a group.
sysadm delgroup - deletes groups.
sysadm diskuse - shows free space,
etc. "BNU allows you to
sysadm whoson - self-explanatory. communicate with other
sysadm Isgroup -lists groups.
sysadm mklineset - hunts various remote UN/Xes without
sequences. logging offthe one you're
sysadm Isuser - lists all the users and
their login names. presently on."
Basic Networking Utility (BHU)
The BNU is a unique feature in
UNIX. Some systems may not have comPuter] creates this in the following
this installed. BNU allows you to com­ format: TM [Process Identification
municate with other remoteUNIXes Number].(ddd]. The ddd is a 3 digit
without logging off the one you're number (sequential) starting with "0".
presently on. BNU also allows file A typical example would be:
transfers between computers. Most TM322.012. This file is then moved
UNIX System V's will have this feature into the path defined by the C.sysnxxx
installed. file.
The user programs like cu, uux, X - executes files. Created in the
etc. are located in the lusrlbin directo­lusrlspool before you execute the
ry. commands in remote. The format used
Basic Networking Files to name this file is X.sysnxxxx where
lusr/lib/uucp/(file name] sys stands for the remote name and n
systems - cu command to establish is the priority level. The xxxx is a
link. It contains info on the remote

Spring 1989 2600 Magazine Page 9


MORE ON

sequence assigned by the uucp. cu - this command allows one to logon


These files always contain the name to the local as well as the remote
of the file, computer and file name to UNIX (ora non UNIX) without having
receive, person's login and computer to hang up. This is useful for transfer­
name, and the command string. ring files.
LCK - the lock file created in the $ cu [-s baud rate](-o odd parity)[-e
lusrispoolJlocks directory. This is used even parityJl-1 name of comm line]
when devices are being used. telephone number· 1systemname
Prevents. usage of the same calling To view system names that you
device. Format used: LeK.str where can communicate with, use the
the str is a device name. The lock file 'unname' command.
contains the. PIO n~ed to lock. $ cu -s3OO 3=9872344 (9872344 is
C.sysnxxx • created in the usr/spool the telephone number)
directory. TtJese are the work files. connected
Used when work is in line for remote login:
password:

Local Strings
- •• will log you off the remote terminal
but not the local.
."Do not change some·­
-! - win log you off on the local without
disconnecting the line from the
one's password. It
remote.
creates havoc."
ccontroi-d> - puts .you back on the
remote UNIX..
-%take [file name] -takes a copy of
the file name and copies it to the local
executions. The format is the same as (the directory which you are in y.
the X.sysnxxxx. The work files cootain -%put [file name] - reverse of above.
the full path name of the file to be -$[command)- aHows the execution
sent, path name of the destination(TM of a command to the local from
Transfers), remote login name to be remote.
notified after the file transmission is ct
complete, user's login name, and the ct allows the local to connect to the
name of the programs used (uucp, remote. Initiates a getty on a remote
uupick, etc.). terminal. Useful when using a remote
. 0 - the data files. Format used is terminal.
D.systmxxxxyyy. These files are creat­ $ ct [-h prevent automatic hang
ed when specified in a command to up)[--s bps rate][-wt set a time to call
copy to the spool directory. The back abbreviated tmins] telephone
'systm" is the remote name, xxxx: are number
the four digits sequentially assigned by uux
the uucp. The yyy is a sub sequence To execute commands on a remote
number. (UNIX to UNIX)
Logging Onto Remote $ uux (- use standard output][-n pre­
and Sending, Receiving Flies vent mail notlflcation][-p also use

Page 10 2600 Magazine Spring 1989


HACKING UNIX

standard output] command-string $ uucp -m -s bbss hackers


uucp unix2!/usr/todd/hackers
uucp copies files from one's com­ What this would do is send the file
puter to the home directory 01 a user in hackers from your computer to the
a remote system. This also works remote's lusrltodd/hackers. todd would
when copying files from one directory get mail that said that a file had been
to another in the remole. The remote sent to him. unix2 is the name of the
user will be notified by mail. This com­ remote.
mand becomes useful when copying Options for uucp:
files from a remote to your local sys­ -c don't copy files to spool directory
tem. The uucp requires the uucico -C copy to spool
daemon to call up the remote and to -s [file name] - this file will contain the
perlorm file login sequence, file trans­ file status (above is bbss)
ier, and notification of the user by mail. -r don't start the comm program (uuci­
Daemons are programs running in co) yet
the background. The three daemons in -j print job number (for above
a UNIX are uucico, uusched, and unix2e903)
uuxqt. -m send mail when file is complete
uuxqt - remote execution. This dae­ Now suppose you wanted to
mon is executed by uudemon.hour receive a file called kenya which is in
started by cron. uuxqt searches in the the usr/dan/usa directory to your home
spool directory for an executable file directory lusr/john. Assuming that the
named X.file sent from the remote sys­ local system's name is ATT01 and you
tem. When it finds the file it obtains the are currently working in lusr/dan/usa,
processes which are to be executed. you would type in:
The next step is to find out if the pro­ $ uucp kenya ATT01 !/usrl
cesses are available at the time. If john/kenya
they are it checks permission and if uuto
everything is OK it proceeds to the The uuto command allows one to
background process. send a file to a remote user and can
uucico - this daemon is very impor­ also be used to send files locally.
tant. It is responsible for establishing a $ uuto [file name] [system!Iogin
connection to the remote. It also name] (omit system name if local)
checks permission. performs login pro­ Conclusion
cedures, transfers, and executes files. There's always more to say about
It also notifies the user by mail. This UNIX but this is enough for now. I
daemon is called upon by uucp, uuto, hope t have made the UNIX operating
uux commands. system a little more familiar. The con­
uusched - this is executed by the tents of this article are all accurate to
shell script called uudemon.hour. This the best of my knowledge.
daemon acts as a randomizer before Remember not to abuse any sys­
the uucico daemon is called. tems you hack into. A true hacker
Usage of uucp Command doesn't like to wreck but prefers to
$ uucp [options] [full path name] file learn.
[destination path] file
Example:

Spring 1989 2600 Magazine Page J I


ever wonder who owns

by Scott Stntton

@ The TELECOM DIGEST

800 service is offered by various lEGs. Each NXX in the 800 SAG is assigned to a given
carrier. who is responsible for assigning numbers from that block to customers, and
providing 10 digit translation. When you as Joe Customer dial 1-800-222-1234 (made up
number, please don't bother them) it will initiate the following sequence

1. If you are in an Electronic Office (DMS-l 00, DMS-200, lA ESS, #5 ESS) the 800-222
will be translated to "AT&T" and search for an opening in a trunk group marked for 800
origination. Should none be found, bump to step 3.

2. II you are in a non-electronic office (SX8, XB, and some flavors of it will go to the
access tandem that you're office "homes" on, where 800-222 will be translated 10 "AT&T"

3. Find a trunk in a trunk group marked for 800 origination. Should none be found. give the
customer a recording "Due to network congestion, your 800 call could not be completed" or
die, or whatever. (Depends on phase of moon, etc.)

4. The end office will then send the following pulse-stream (in MF)

KP + II + 3/10D + ST + KP + 800 2221234 + ST

(note that this is a simplification, there are some fine points of ANI spills that are beyond
the scope of this article)

II 2 information digits ... typical values are


00 normal ANI 10 digits follow
01 ONI line ... NPA follows
02 ANI failure ... NPA follows
3/10D 3 or 10 digits. Either the NPA, or the entire 10 digit number.
KP and ST are control tones.

5. The carrier receives all of this (and probably throws the ANI into the bit bucket) and

translates the 800 number to what's called a PTN, or Plant Test Number. For example

617-555-9111. Then, the call is routed as if the customer had dialed that 10 digit number.

01 course, the billing data is marked as an 800 call, so the subscriber receiving the call

pays the appropriate amount.

800 Service and OCN Translation Table

Under Equal Access, any long distance company can carry 1-800 traffic. Which carrier
gets the call is determined (at the moment) by the NNX of the number. 1-800-528-1234 is
carried by AT&T while 1-800-888-1800 is carried by MGI.

The carrier must have Feature Group D presence for originating calls from the originating
exchange (either direct, or through an access tandem).
In the future, when GelS becomes wide-spread, a query will be made in the database
[Who gets 1-800-985-1234?] and the call will be routed appropriately. To clarify. Now the
carrier is determined by the NXX. In the future, the carrier will be determined by the entire

Page 12 2600 Magazine Spring 1989


all those 800 numbers?

seven digits.

A similar situation exists with 900 service. Each carrier can reserve NXX's from BeliCore
(the people who among a zillion other tasks are in charge of handing out prefixes and area
codes). They're not cheap! To get the actual number is free (when you meet certain
qualifications), but to get it "turned on" in a LATA costs you money, depending on (1) how
many prefixes you're getting, (2) whether it's 800 or 900 service, (3) how many
tandems/end offices are in the LATA. It requires a discrete amount of labor for each office,
because each routing table must be modified.

Of the 800 possible NXX's, 409 are currently assigned. A long distance carrier can get one
800 and four 900 numbers just for the paperwork. But to get more than that, you have to
show that you're 70% full now, and demonstrate a real need for the capacity.

I have included the entire 800-NXX to long-distance carrier translation table. Note that not
every NXX is valid in every area.

Revised 800/0CN Translation Table


Effective 10 October 1988

221 ATX 222 ATX 223 ATX 224 LDL 225 ATX
226 MIC 227 ATX 228 ATX 229 TOX 230 NTK
231 ATX 232 ATX 233 ATX 234 MCI 235 ATX
236 SCH 237 ATX 238 ATX 2390LT 240 SIR
241 ATX 242 ATX 243 ATX 244 --- 245 ATX
246 --- 247 ATX 248 ATX 249 --- 250 --­
251 ATX 252 ATX 253 ATX 254 nu 255 ATX
256 LSI 257 ATX 258 ATX 259 260 --­
261 SCH 262 ATX 263 CAN 2641CT 265 CAN
266 CSY 267 CAN 268 CAN 269 FOG 270-­
271 --- 272 ATX 273 274 MCI 275 ITT
276 ONE 277 SNT 278 279 MAL 280 AOG
281 --- 282 ATX 283 MCI 284 MCI 285 --­
286 --- 287 288 MCI 289 MCI 290 --­
291 --- 292 ATX 293 PRO 294 295 --­
296 --- 297 ARE 298 299 CYT

321 ATX 322 ATX 323 ATX 324 HNI 325 ATX
326 UTC 327 ATX 328 ATX 329 TET 330 TET
331 ATX 332 ATX 333 MCI 334 ATX 335 SCH
336 ATX 337 FST 338 ATX 339 340 --­
341 ATX 342 ATX 343 ATX 344 ATX 345 ATX
346 ATX 347 UTC 348 ATX 349 OCT 350 CSY
351 ATX 352 ATX 353 354 -- 355-­
356 ATX 357 358 ATX 359 UTC 360 --­
361 CAN 362 ATX 363 CAN 364 HNI 365 MCI
366 UTC 367 ATX 368 ATX 369 TOO 370 TOO
371 --- 372 ATX 373 TOO 374 - 375 TNO
376 --- 377 GTS 378 379 -- 380 --­

Spring 1989 2600 Magazine Page 13


the long awaited

381 -- 382 ATX 383 TOO 384 FOT 385 CAB


386 TBO 387 CAN 388 --- 389 -- 390 --­
391 -- 392 ATX 393 EXF 394 -- 395 --­
396 -- 397 TOO 398 399 ARZ

421 ATX 422 ATX 423 ATX 424 ATX 425 TIH
426 ATX 427 428 ATX 429 -- 430 -­
431 ATX 432 ATX 433 ATX 434 AGN 435 ATX
436 ION 437 ATX 438 ATX 439 -- 440 TXN
441 ATX 442 ATX 443 ATX 444 MCI 445 ATX
446 ATX 447 ATX 448 ATX 449 450 USL
451 ATX 452ATX 453ATX 454ALN 455
456 MCI 457 ATX 458 ATX 459 - 460-­
461 CAN 462 ATX 463 CAN 464 - 465 CAN
466 ALN 4671CT 468 ATX 469 --- 470 --­
471 ALN 472 ATX 473 -- 474 --- 475 TOO
476 TOO 477 --- 478 AAM 479 -- 480 --­
481 -- 482 ATX 483 -- 484 TOO 485 TOO
486 TDX 487 488 489 TOM 490
491 - 492 ATX 493 -- 494 - 495 --­
496 -- 497 --- 498 --- 499 --­

521 ATX 522 ATX 523 ATX 524 ATX 525 ATX
526 ATX 527 ATX 528 ATX 529 MIT 530 --­
531 ATX 532 ATX 533 ATX 534 -- 535 ATX
536 AlN -537 ATX 538 ATX 539 540
541 ATX 542ATX 543ATX 544ATX 545ATX
546 UTC 547 ATX 548 ATX 549 --- 550 CMA
551 ATX .552 ATX 553 ATX 554 ATX 555 ATX
556 ATX 557 ALN 558 ATX 559 -- 560 --­
561 CAN 562 ATX 563 CAN 564 -- 565 CAN
566 ALN 567 CAN 568 - 569 --- 570 -­
571 -- 572 ATX 573 --- 574 AMM 575 -­
576 577 GTS 578 --- 579 LNS 580 WES
581 -- 582 ATX 583 TOO 584 TOO 585­
586 ATC 587 LTO 588 ATC 589 LGT 590 --­
591 -- 592 ATX 593 TOO 594 TOO 595 --­
596 - 597 598 599

621 ATX 622 ATX 623 - 624 ATX 625 NLD


626 ATX 627 MCI 628 ATX 629 -- 630 ­
631 ATX 632 ATX 633 ATX 634 ATX 635 ATX
636 COU 637 ATX 638 ATX 639 BUR 640­
641 ATX 642 ATX 643 ATX 644 CMA 645 ATX
646 - 647 ATX 648 ATX 649 --- 650 -­
651 -- 652 ATX 653 -- 654 ATX 655-­
656 -- 657 TOO 658 TOO 659 -- 660 -­
661 CAN 662 ATX 663 CAN 664 UTC 665 CAN
666 MCI 667 CAN 668 CAN 669 UTC 670

Page 14 2600 Magazine Spring 1989


800 translation table!

671 --- 672 ATX 673 TOD 674 TOO 675


676 --- 677 678 MCI 679 --- 680 --­
681 --- 682 ATX 683 MTD 684 --- 685
686 lGT 687 NTS 688 --- 689 --- 690
691 --- 692 ATX 693 --- 694 --- 695
696 --- 697 698 NYC 699 PLG

720 TGN 721 722 ATX 723 --- 724 RTC


725 SAN 726 UTC 727 MCI 728 TOO 729 UTC
730 --- 731 732 ATX 733 UTC 734 --­
735 UTC 736 UTC 737 MEC 738 MEC 739
740 --- 741 MIC 742 ATX 743 EDS 744 --­
745 --- 746 747 TOD 748 TOO 749 TOD
750 --- 751 --- 752 ATX 753 --- 754 TSH
755 --- 756 757 TID 758 --- 759 MCI
760 --- 761 762 ATX 763 --- 764 AAM
765 --- 766 --- 767 UTC 768 SNT 769
770 GCN 771 SNT 772 ATX 773 CUX 774
775 --- 776 UTC 777 MCI 778 UTe 779 TOO
780 TOO 781 --- 782 ATX 783 ALN 784 ALG
785 SNH 786'1 787 788 --- 789 TMU
790 --- 791 --- 792 ATX 793 --- 794 --­
795 --- 796 797 TID 798 TOD 799

821 ATX 822 ATX 823 THA 824 ATX 825 MCI
826 ATX 827 UTe 828 ATX 829 UTe 830 --­
831 ATX 832 ATX 833 ATX 834 --- 835 ATX
836 TOO 837 TOD 838 839 VST 840 --­
841 ATX 842 ATX 843 ATX 844 LDD 845 ATX
846 --- 847 ATX 848 ATX 849 --- 850 TKC
851 ATX 852 ATX 853 854 ATX 855 ATX
856 --- 857 TLS 858 ATX 859 --- 860 --­
861 --- 862 ATX 863 ALN 864 TEN 865 --­
866 --- 867 --- 868 SNT 869 UTC 870 --­
871 --- 872 ATX 873 MCI 874 ATX 875 ALN
876 MCI 877 UTC 878 ALN 879 --- 880 NAS
881 NAS 882 ATX 883 884 --- 885 ATX
886 AlN 887 ETS 888 Mel 889 --- 890 --­
891 --- 892 ATX 893 894 895 --­
896 TXN 897 --- 898 CGI 899 TDX

921 --- 922 ATX 923 ALN 924 --- 925 --­
926 --- 927 --- 928 CIS 929 --- 930 --­
931 --- 932 ATX 933 934 --- 935 --­
936 RBW 937 MCI 938 939 --- 940 TSF

941 --- 942 ATX 943 944 --- 945 --­


946 --- 947 --- 948 949 --- 950 MCI

951 BMl 952 ATX 953 954 955 MCI

Spring 1989 2600 Magazine Page 15


800 exchange translations

956 --- 957 958 "2 959 "2 960 CNO


961 --- 962 ATX 963 soc 964 --- 965
966 TDX 967 -- 968 TED 969 TDX 970
971 --­ 972 ATX 973 974 975 --­
976 -­ 9n --­ 978 -­ 979 --­ 980 --­
981 --­ 982 ATX 983 WUT 984 -­ 985 --­
986 WUT 987 988 WUT 989 lOX 990­
991 992 ATX 993 --- 994 -- 995
996 VOA 997 998 --- 999 MCI

NOTES:

*1 RELEASED FOR FUTURE ASSIGNMENT

'2 -- These NXX codes are generally reserved for test applications. They may be reserved

for access tandem testing from an end office.

NOle also: the following NXX's are dedicated for RCCP (Radio Common Carrier Paging)

under the discretion of the local exchange carrier:

202,212,302,312,402,412,502,512,602,612, 702, 712,802,812,902,and912.

OCN Reference Usl:

ADG - Advantage Network, Inc. AGN - AMRIGON


ALG Allnet Communication Services AMM Access Long Distance
AAM ALASCOM ARE American Express TRS
ARZ - All1eriCall Corporation (Calif.) ATC Action Telecom Co.
ATX AT&T BML - Phone America
BUR - Burlington Tel. CAB - Hedges Communications
CAN - Telcom Canada CNO - COMTEL of New Orleans
CQU - Co'nQuest Comm. Corp CSY - COM Systems
CUX Compu-Tellnc, CYT - ClayDesta Communications
DCT - Direct Communications, Inc. DLT - Delta Communications, Inc.
EDS - Electronic Data Systems Corp. ETS Eastern Telephone Systems, Inc.
EXF Execulines of Florida, Inc. FOG First Digital Network
FDN - Florida Digital Network FDT Friend Technologies
FST- First Data Resources GCN General Communications, Inc.
GTS - Telenel Comm, Corp, HNI - Houston Network, Inc.
ITT - United States Transmission Sys LDD - LDDS-II, Inc.
LDL - Long Distance for Less LGT - LlTEL
LNS - Lintel Systems lSI - Long Distance Savers
LTQ Long Distance for Less MAL - MIDAMERICAN
MCI MCI Telecommunications Corp. MOE Meade Associates
MEC Mercury, Inc. MIC - Microtel. Inc.
MIT - Midco Communications MTD Metromedia Long Distance
NLD - National Data Corp. NTK - Network Telemanagement Svcs.
NTS - NTS Communications ONC - OMNICALL, Inc.
ONE - One Call Communications, Inc. PHE - Phone Mail, Inc.
PLG - Pilgrim Telephone Co. PRO - PROTO-COL
RBW R-Comm RTC RCI Corporation

Page 16 2600 Magazine Spring 1989


and 900 translations too!

SAN - Satelco SCH - Schneider Communications


SOY - TElVlIE Corp. SIR - Southem Interexchange Services
SlS - Southland Systems, Inc. SNH - Sunshine Telephone Co.
SNT - Southern Net, Inc. sec - State of California
TBO - Telecable Corp. TOO - Teleconnect
TDX - Cable & Wireless Comm. TED - TeleDiaI America
TEM - Telesystems, Inc. TEN Telesphere Network, Inc.
TET - Teltec Savings Comm. Co. TGN - Telemanagement Consult' Corp.
THA - Touch America TID - TMC South Central Indiana
TKC - TK Communications, Inc. TLS - TELE-SAV
TMU - Tel-America, Inc. TNO - ATC Cignal Communications
TOM - TMC of Montgomery TOR - mc of Orlando
TSF SOUTH-TEl TSH - Tel-Share
TIH - Tele Tech, Inc. TIU - Total-Tel USA
TXN Tex-Net USL U.S. Unk Long Distance
UTC - U.S. Telcom, Inc. (U.S. Sprint) VOA Valu-Une
VST - STAR-LINE WES- Westel
WUT - Western Union Telegraph Co.

NOTE: Where local telcos, such as Illinois Bell offer 800 service, they purchase blocks ot
numbers from AT&T on prefixes assigned to AT&T. They are free to purchase blocks of
numbers from any carrier of their choice however.

900 Series Prefix to OCN translation table

Please note that this differs from the 800 table, because much fewer of the 900 NXXs are
assigned.

200 ATX 202 AME 210 ATX 220 ATX 221 TDX
222 ONC 223 TDX 225 PAC 226 MCI 233 TDX
234 TEN 240 USW 248 AME 250 ATX 258 TEN
254 TIU 255 SNT 260 ATX 264 ADG 266 CSY
272 BLA 273 CAN 275 ITI 280 AME 282 LGT
283 PAC 288 GNW297 CAN 300 ATX 301 AME
302 AME 303 PAC 321 TEN 322 TDX 327 ETS
329ATX 331 TET 332 PLG 333 USW335 BLA
342 ATX 344 ATX 345 ALN 346 UTE 350 ATX
364 GNW366 ONC 369 TEN 370 ATX 3n GTS
386 UTE 388 SNT 399 ARZ 400 ATX 407 ATX
410 ATX 420 ATX 422 ALN 426 PLG 428 AME
430 USW 444 ONC 445 PHE 446 Mel 450 AME
451 CAN 456 TEN 463 UTE 478 AAM 479 ARZ
480 ATX 483 GMW488 ONC 490 USW 500 ATX
505 PAC 520 ATX 529 MIT 536 BUR 540 ALN
543 ALN 545 GCA 550 ALN 555 ATX 567 ALN
580 USW 590 ATX 595 CAN 600 ATX 620 AME

Spring 1989 2600 Magazine Page 17


900 translations &

624 PAC 626 CSY 628 AME 630 CAN 633 MIT

639 PLG 643 CAN 645 CAN 650 ATX 654 TEN

656 SNT 660 ATX 661 UTE 663 MOE 665 ALN

666 ONC 670 CAN 677 CAN 678 Mel 680 ATX

686 LTG 690 CAN 698 NYT 699 PLG 701 BLA

710 TGN 720 ATX 722 PAC 724 RTC 725 SNT

727 GCA 730 ATX 771ii CSY 740 ATX 741 TEN

746 ITT 750 CAN 753 ALN 765 ALN 773 ATX

777 PAC 778 AME 780 AME 786 ATX 790 CAN

792 CAN 801 BLA 820 ATX 830 CAN 843 PAC

844 PAC 847 UTE 850 ATX 860 ATX 866 AAM

870 CAN 872 TEN 887 ETS 888 CIS 900 mx

901 BLA 903 ATX 909 ATX 924 AME 932 ATX

948 ARZ 949 MIC 963 TEN 970 MIC 971 MIC

972 MIC 973 MIC 974 ALN 975 ALN 976 ATX

988 MCI 990 Mel 991 AlG 993 SNT 999 TEN

With 900 service, you pay more for the information than for the transport of the call. This

varies typically from 35 cents to a few dollars for either a timed service, or a "as long as

you like" duration-sensitive service. There are two sub-species of 900 service, AT&T and

"everybody else".

Everybody else is handled exactly as 800 service above, except the IEC will probably use
the ANI information to send you a b~1. (Either direcUy, or through your BOC, each situation
is governed by applicable tariffs and contractual arrangements between the I EC and the
BOC.)

AT&T 900 is a curious monster indeed. It was designed as a "mass termination" service.
When you dial a 900 number by AT&T (such as the "hear space shuttle mission audio"
number) you get routed to one of twelve "nodes" strewn throughout the countrY. These
nodes are each capable of terminating 9,000 calls per second. There are several options
available, where the customer and/or the IP pay for all/part of the call. The big difference
between 800 and AT&T 900 is not "who pays for the call" (there are free 900 numbers) but
"how many people can it hancle at once". The IP is responsible for providing program
audio. AT&T is prohibited from providing audio-program services (i.e., tape recorded
messages). As with any rule, there are exceptions to these as well.

Additional OCN's:

. AME - Ameritech BLA - Bell Atlantic


GCA - GTE California GMW - GTE Mdwest
GNW - GTE Northwest NYT - New York Telephone
PAC - Pac Bell USW U.S. West
UTE - United Tel

Glossary:

ANI - Automatic Number Identification. An MF sequence that identifies your line for toll
billing information. Often confused with ANAC (Automatic Number Announcement Circuit)

Page 18 2600 Magazine Spring 1989


glossary of terms

which reads your number back in a synthesized voice.

BOC • Bell Operating Company. An often misused term that in general usage means "your
local exchange carrier." Since most of the telephones in the country are served by what
used to be the Bell system, we tend to use the term. The proper term in this case, however
IS "Exchange Carrier [EC)". They provide service within your LATA.

FG-A· Feature Group A Line Side termination for long Distance carriers. The old 555­
1234 for Widget Telephone Company, then dial an access code, and the number style
dialing is called FG-A.

FG-B· Feature Group B. Trunk Side termination for long Distance carriers. 950 service.
This is LATA wide service, and doesn't cost the customer message units. ANI is only
provided when the trunks terminate in the End Office (as opposed to an access tandem),

FG-D· Feature Group D. Trunk Side termination, Provides 10xxx dialing, 1+ pre­
subscription dialing, and Equal Access 8001900 service. Only available in electronic offices
and some 5XB offices (through a beastie called an Adjunct Frame.)

GAB· Group Audio Bridging. Where several people call the same number, to talk to other
people calling the same number. "Party" or "Chat" lines.

IEC· Inter-Exchange Carrier. Someone who actually carries calls from place to place.
AT&T, Sprint. MCI are aliIECs,

IP • Information Provider. Someone who sells a value-added service over the telephone.
Where you pay for the information you're receiving, as well as the cost of transport of the
call.

NXX • Notation convention for what used to be called a ·prefix". N represents the digits 2
through 9, and X represents the digits 0 through 9. There are 800 valid NXX combinations,
but some are reserved for local use. (411 for Directory, 611 for Repair Bureau, 911 for
emergency, etc,)

ONI· Operator Number Identification. In areas with some styles of party-line service, the
CO cannot tell who you are, and the operator will come on and say, "What number are you
calling from?", You can lie, they have to trust you, They may know which prefix you're
coming from, though,

PTN· Plant Test Number. A regular 10 digit number assigned with your inward WATS line,
This may NOT be a "dialable" number from the local CO. (A friend has a WATS line in
Amherst, MA [413-549, #5 ESS] and you cannot dial the PTN locally, but you can if you
come in on a toll trunk.)

SAC· Special Area Code. Bellcore speak for area codes that aren't really places, but

classes of service.

Spring 1989 2600 Magazine Page 19

... _ - - _.... - - - - - - ­
.

(continued from page 3)


HACKERS

California group of computer enthu­ Mr. Mitnick was supposedly able


siasts, the Roscoe Gang, who met in to avoid being apprehended by tam­
a pizza parlor in the Los Angeles pering with telephone company
area. The group also stayed in con­ switching equipment to mask his
tact through a variety of computer location. An internal memo of the
bulletin board systems, including Pacific Telephone Company indicat­
one, 8BBS Santa Clara, California, ed that Mitnick had compromised
run by employees of Digital. all of that company's switching sys­
In 1981 Mr. Mitnick and three tems.
other group members were arrested Investigators believe that Mitnick
on charges of stealing technical may have been the instigator of a
manuals from the Pacific Telephone false report released by a news ser­
Company. Mr. Mitnick was convict­ vice in April 1988 that Security
ed and served six months in a youth Pacific National Bank lost $400 mil­
detention center. lion in the fIrst quarter of 1988. The
He was caught again by report, which was released to the
University of Southern California NY Stock Exchange and other wire
officials in 1983 trying to break into services, was distributed four days
the school's computers. In another after Mitnick had been turned down
incident, Mr. Mitnick fled to Israel to for a job at Security Pacific.
avoid prosecution after being The false information could have
accused of tampering with a com­ caused huge losses for the bank had
puter storing credit information at it reached investors, but the hoax
TRW. was uncovered before that could
In December 1987 he was convict­ happen.
ed of stealing software from The prosecutor said Mitnick also
Microport Systems in Santa Cruz, penetrated an NSA computer and
and was sentenced to 36 months of obtained telephone billing data for
probation. the agency and several of its
What made Mitnick "the best", employees.
according to a friend, was his ability As of this writing, Mitnick has
to talk people into giving him privi­ been sentenced to a year in jail. They
leged information. He would call an won't even let him use the phone,
official with a company he wanted out of fear of what he might do.
to penetrate and say he was in the
maintenance department and need­ Story Number Two: An 18-year­
ed a computer password. He was so old telephone phreak from Chicago
convincing that they would give who electronically broke into U.S.
him the necessary names or num­ military computers and AT&T com­
bers. puters and copied 55 programs was

Page 20 2600 Magazine Spring 1989


IN JAIL

sentenced to nine months in prison logged into computers of Illinois


on Tuesday, February 14 in Federal Bell Telephone Company and the
District Court, Rochester Telephone Company.
Herbert Zinn, Jr. was found Assistant United States Attorney
guilty of violating the Computer William Cook said that Zinn
Fraud and Abuse Act of 1986 by obtained access to the AT&T IIllinois
judge Paul E. Plunkett. In addition Bell computers from computer bul­
t() a prison term, Zinn must pay a lerin board systems, which he
51ll,OOO finc and s(,rYe two ilnd a described as '",just high-tech street
half years of federal probation when gangs", During his bench trial in
rl'kL!~('d from prison, January, Zinn spoke in his own
United Statc Attorney Anton R
H
, defcl1sL', saying that he copll'd the
Valukas sind, "The Zmn case \vill programs to educate himself, and
,efVC to dpnlonstratc the dirL'ctior, not to sell them or share them with
we ilre going to go with these cases other phreaks, The programs copied
in the future, Our intertion is to included very complex software
prnsecute vely, What we relating to computer design and arti­
tmdertook ;" to address the problem final mtell!gence, Also copied was
(,i L:llauthorized compute! intrus!(ln, soft\van: used by the BOCs (Bell
an all-too-common problem that j" Operating Companies) for billing
difficult to uncover and difficult to and accounting on long distal~Cl'
prosecute .. telephone calls.
7inn, ~l drllpuut from Mather The authorities didn't find it diffi­
Schoo! Chlcago, was 16 at cult to identify Zllln, But rather than
the ~ime hl' committed the intru­ move immediately, they decided tll
Slons, using his home and give him enough time to make their
modem, Usmg the handle "Shod ow caS(' stronger For over two mon ths,
HiHvk", Zinn broke into a Bell Labs all calls from his telephone were
computer ill an carefully audlted. His activities un
AT & T compl<tcl' in Bu ington, cumputcrs throughout the Unit('d
~Drth Ctlrc:.Lna/ and 3n &T (U1Tt" C;lates were noted, Jnd log~ were
PUl('f ilt Robhl:" Alr h,rd' BZlSC ll' representati\'e~ from
(~cors13. ~{, c;;;~:-.>ifiL'd r!"~at(;rial \va~ "prInt made available note:, from
bt~t the gu\'('rIU1H~n t vic;..v:" their investigation of hiS calb on
:,;,n"itJ\'c" the programs :hcir network. Finally, the 'big
,.'c,n1p tf'Y 0sed b\' ar:d the Zmn residencl' \\',:0>
'\JATO whi the- L,.~, FBI Jgents, AT&T secuTlt\
I t"10n, ;:"':iI)I"l \:(~~, and
HACKERS

and other computer peripheral That's good for a fine of maybe $100.
devices were confiscated. He and a friend walked into the
As of this writing, Zinn is still in North American Air Defense
jail. Command Center one day. They
.. >t>t
didn't break anything and they soon
Conclusions: This is without a left. Had they been caught, they
doubt one of the most disturbing would have been thrown off the
articles we've printed since we grounds, maybe arrested for tres­
began publishing in 1984. When passing and held overnight. The
people actually start winding up in person who left the door open
jail because of playing with comput­ would be fired.
ers, it's time to start asking some Mitnick managed to manipulate
very serious questions. central office switches by walking
Let's start with the Mitnick story. through their doors and adjusting
Here we have what appears to be a them. Nobody questioned him or
malicious person who is determined tried to stop him. He called up a
to get those who have crossed him. news service and told them a fake
OK, not very nice. In fact, this could story about a bank which they
well be a nasty, vindictive human almost printed. Again, nobody ques­
being. And we've already proven tioned him.
that he has a history of trouble with In our society, such a person
the law. But is this enough to lock would be classified as a mischief
him up without bail? maker, at worst a real pain in the
In regular life in almost any ass. Such people curren tly exist all
democratic society, the answer over the place. But because Mitnick
would be a resounding no. But there used computers to perform his mis­
are special circumstances here: com­ chief, he's another John Hinckley.
puters. Doing nasty things with Society is indeed endangered by
computers has become infinitely what's happening here. But Mitnick
worse than doing nasty things with­ has nothing at all to do with it. He is
out computers. That's why a mur­ simply demonstrating how vulnera­
derer would get bail so much easier ble our information and our way of
than Kevin Mitnick. Because of com­ life has become. If one person can
puters. cause such chaos, then clearly the
So let's try and pretend that com­ system is falling apart at the seams.
puters don't really exist. Where does The Zinn case is equally
that leave us? He would have to deplorable. A bright kid is languish­
have disconnected Kristy ing in prison because he didn't
McNichol's phone using wire dip­ know when to stop exploring. The
pers. Vandalism, maybe trespassing. authorities admit they did nothing

Page 22 2600 Magazine Spring 1989


IN JAIL

to stop him so that he would get the hackers uncover. While hackers
himself in deeper. What would have are far from being knights in shining
been wrong with a simple warning? armor, the notion of their being
It might have been enough to stop criminals is so far from the truth that
him from logging into any more sys­ it's almost funny. These are kids
tems. There would have been no doing what kids have done for all
trial and an intelligent 18-year-old time. The only difference here is that
would not be locked away. they've learned how to use a tool
All of the papers accused Zinn of that the rest of us have ignored. And
stealing software. But nothing was unless more of us know how to use
taken. All he did was copy some pro­ this tool, there will be many more
grams. If these programs were so abuses. Not just abuses of the tool.
valuable, why in hell was he able to Abuses by the tool. That's where the
download them over the phone real danger is.
lines? To even suggest that this is We take a very hard line on this.
the same as stealing is a gross distor­ Hacking is not wrong. Hacking is
tion. There is not one shred of evi­ healthy. Hacking is not the same as
dence that this kid meant to sell stealing. Hacking uncovers design
these programs or benefit in any flaws and security deficiencies.
way except his own knowledge. Above all else, hacking proves that
This isn't surprising -- most hackers the ingenuity of a single mind is still
are primarily interested in learning. the most powerful tool of all.
But they say a message had to be We arc hackers. We always will
sent to stop this kind of thing from be. Our spirits will not be crushed
happening. The message here is that by these horrible happenings. Call
our nation's brightest kids are being us co-conspirators, fellow anarchists,
imprisoned for being a little too whatever you want. We intend to
inquisitive. And that's a frightening keep learning. To suppress this
thought. desire is contrary to everything that
Judges should consider what is human.
actually took place and forget about Like the authors who rose to
the fact that computers were defend Salman Rushdie from the
involved. Would it even be a crime long arm of hysteria, we must rise to
if computers weren't involved? And defend those endangered by the
what about intent? Did the person hacker witchhunts. After all, they
willfully do something that could be can't lock us all up. And unless they
detrimental to an organization? Or do, hacking is here to stay.
was that simply a side-effect of the
organization's carelessness?
Much can be learned from what

Spring 1989 2600 Magazine Page 23


THE FIRST LETTERS

Wargames Dialer should hear a tone) then hang


up again. 590 from a payphone
Dear 2600: leaves the phone "off hook".
In your Spring 1988 issue Radio Shack sells this nifty
(Volume 5, Number 1), you had little device that lets you for­
a listing for the "Wargames ward your calls to another
Dialer Program". What comput­ number. I have found that you
er was this written for? I own can call a number, leave it
an Apple / / c, and it will work unprogrammed. and then you
for it, if you change line 30 will get a dial tone. It is battery
from: operated and AC operated. This
30 PRINT Q$ n " N$
is great for beige boxing at
to home.
30 PRINT "ATDT "N$ KH
I don't know what modem
type you wrote it for, but the Blue Box
change will fIx it to operate on Questions
a Hayes compatible modem.
Thanks alot for the great mag! Dear 2600:
Phloyd Scaarl Since taking control of
Somewhere in the trunks via blue boxing thru
Underground long distance companies is
nearly common knowledge. I
More ANI's ask you this question;
Dear 2600: Why, even when a trunk is
The ANI for 817 (Fort Worth, secured. is it very difficult to
Texas) is 211. Now, how about patch a call through?
a list of ringback numbers? It seems as if certain trunk­
RR able prefixes are all only local
calls and outside calls to differ­
Dear 2600: ent area codes and prefixes are J
ANI is 511 in area code 716. impossible.
The ANI for 602 is 593-5010. Also. what do the squares
that contain different symbols
Dear 2600: on the front cover mean?
The ANI for the 509 area is Santa Claus
560, then enter 1 until the Santa's Workshop, N.P.
computer comes on. The ring­ Things are just not the same
back is 571 plus the last four as they were years ago. It is
digits of the phone number, possible to seize a trunk and
hang up, pick it up again (you still not be able to accomplish

PageU 2600 Magazine Spring 1989


OF 1989

much. depending on what kind You always print ways to


oj restrictions are enabled by hack other computers and
the company involved. print numbers of far-away
The little squares on the BBS's, but for us guys that do
Jront cover are exactly what not live in large metropolitan
they appear to be. Shocked? cities. this is useless to us IF
we have to pay for the call!
Dear 2600: Your magazine has a heavy
I enjoyed blue boxing in my interest on computers. but why
home town for about two years can't you print more on
until November 7. 1987. phreaking instead of hacking?
Suddenly the 2600 hertz tone After all. your magazine is
would not break the 800 line named 2600! Not Unix V3.0!
anymore. so I assume that we Boxed In
switched to ESS. although TX
another exchange in my home Blue boxes can still work
town is still "blue-boxable". Is Jrom an ESS line. although it is
there any way around this? generally a bit more danger­
Perhaps calling from an ESS to ous. We suspect the change
a crossbar exchange and then took place somewhere between
boxing? your exchange and the 800
Is my blue box totally use­ number.
less in my exchange now? While blue boxing is a great
Should I throw it out the win­ way to explore the phone sys­
dow and resort to those dan­ tem, you should know that it's
gerous access codes? extremely dangerous. especial­
Could you please tell me any ly Jrom your home phone.
other ways of obtaining a Jree Access codes are also danger­
phone call under ESS condi­ ous to use Jrom your home
tions (besides using someone phone or Jrom any phoneJor an
else's access code and red box­ extended period. Red boxing
ing)? (sending coin tones Jrom a pay­
I was used to calling BBS's phone) is probably saJer since
for hours at a time. Now I can't ii's hard Jor the phone compa­
even do that due to the rates of ny to know that those aren't
long distance! Could you please real quarters it's hearing. But if
print some uses of blue boxes a particular phone has been
under ESS and other ways for abused a lot, you could have
phone phreaks to obtain ser­ problems if you continue to red
vice? boxJrom it.

Spring 1989 2600 Magazine Page 25


LETTERS: THE VOICE

Your troubles are not unique. thing. Of course they played


But there are always ways games like "Let's just go inside
around the system. Keep and talk this all over." I have
expertmenting and you'll most always known better than to
certainly fmd one. keep anything in my apartment
A Scary Tale that could incriminate me. but
why attempt to make their job
Dear 2600: any easier?
Let this be a warning to Well, that was six months
those who engage in illegal ago. I am still in jail.
activity. That night I was driven 250
On June 27, 1988, I came miles to a small, conservative
home from being out with farm town, a place I had never
friends at 1:45 in the morning. been to in my life. At my
I parked my car in front of my
arraignment three days later. I
apartment and got out. I am found out that I was being
nonnally a very security mind­ charged with six counts of
ed person, always looking over computer fraud-related
my shoulder, never getting charges, and my bond is a
overconfident with my sense of hefty $150,000. cash only. My
security. Many people know me parents live in another part of
in . the IBM/Apple the country, and I have few
modem/hacking world, but I connections with them any­
never let people know me too more, and unlike your average
well. juvenile, I can't call mummy
Or so I thought. and daddy up and expect them
As I stepped up my walkway
to come running. cash in hand.
to my buildIng, I heard some­ Now I can handle having to
one call my name. Before I serve time for my own mis­
turned around, I knew some­ takes. but the way I was
thing was wrong. FBI agents as caught will show you that
well as state police and local everybody who does anything
detectives had been watching illegal better be careful.
and waiting for me all day. In In February, 1988, I met
no time there were police cars with a person who I had known
everywhere. and I was shoved through various bulletin
up against a car and searched boards. I was going to school in
and handcuffed, the whole the state he was from, so we
neighborhood ablaze with decided to meet each other.
flashing lights. I drove and met him, ate din-
Of course I didn't say any­

Page 26 2600 Magazine Spring 1989


OF OUR READERS

nero and talked. He and I got tinue.


along quite well. but at no Many people underestimate
pOint did he ever know my police investigators or the FBI.
"real" name. Of course in the Don't ever let yourself be part
"modem community". relation­ of that group.
ships like that are common My friend was questioned
and understood. several times after that. I now
That was the last time I saw have all transcripts of all con­
him. versations. He told various
About a month later. this names of people all over the
friend was visited by state country who had supplied him
police as well as security peo­ with codes, passwords,
ple from Sprint. Apparently accounts, etc. He also said that
another "hacker" (I'm using he had a friend who was cur­
that term loosely) had an argu­ rently living in the state. who
ment with said friend. and as a was involved with various
type of revenge. called Sprint activities similar to his own. He
Security and reported that said told the police what he knew of
friend was a habitual code me, which wasn't too much. as
abuser. It took very little time well as what he thought my
for security people from Sprint first and last name was.
and his local telco to put a Some time later. the police
DNR-type register on his two returned and asked him if he
step-by-step phone lines. had any more information. as
Two months and 30 rolls of they had been able to find
DNR paper later, a search war­ nothing on this other person he
rant was obtained. His resi­ had mentioned. He could think
dence (he is a juvenile) was of little else. except that he
searched, and all computer thought I had lived in a partic­
and telephone equipment was ular place prior to my living in
taken and brought to a state his state.
police post for examination. At The police wrote to that
t his time, said friend was place and state. giving a basic
smart enough to not talk with­ age and description. and asked
out a lawyer present. so the for copies of any mug shots
police left, leaving him with his they might have fitting that
parents, no charges pending at description.
that time. Many years ago. some
He was smart to keep quiet. friends and I were arrested for
Too bad this trend did not con­ trying to purchase alcohol

Spring /989 2600 Magazine Page 27


LETTERS

underage. Although the went through my office. I have


charges were dropped. that pic­ lost six months of my life that
ture stayed on file. can never be replaced.
The police came back to this My arrest made every paper
individual and presented sever­ in the state. so of course my
al dozen photogn~phs of the future in this state looks bleak
people who had fit that The juvenile is facing possi­
description. ble probation.
The police repOJ t says that My message in this is that if
he "without hesital ion pointed you engage in illegal activities.
out photograph #:i3 as being you must trust nobody. There
the individual he knew." is not one person you can
The next day. warrants were trust. \Vhen more than one
issued. and today. here I am in person is caught, courts usual­
a county jail. ly offer "plea bargains" or less
Since that time. r have said time to those willing to testify
absolutely nothing. I did not against their friends. I cannot
talk to anyone and try to lie. or hold a grudge against the per­
offer to turn anyone else in. I son that put me in here. I'd 1)('
simply refused to talk to any­ lying if I said I never did any­
body for any reason. I had to thing wrong. but you call bet
front $5.000 to a lawyer. and that 99 percent of the time. it
because I have net said any­ will be somebody else thai gelS
thing or made any statement. I attention put on you, not your·
may be able to walk away from self. It is terrible that we now
this. uncharged. live in an age where our friends
But. the damage is done. I today are testifying against liS
was in my final year of college tomorrow.
and taking summer courses. i If you ever fmd yourself in a
had an excellent job with a well Similar situa[ ion, I can IH'ver
known DoD contractor, and my stress to you 11mv Important it
future looked gooct I was no is to not say a thing. not
longer doing anything iHega1. make any statement
and was keeping straight. The police are nOI. here to help
All of that is gon.~ now. Even you. Do not try to lie or mislead
if I come out of t:lis without them. Thev have more
char£!,ts, I have 10;jt an enUre resources ;'i" dl!~, I han YCll
sellws;er of schoo. and hay~'
little t thai joL
arrested. but sadly enough. if anything, you did. it sure
when leaned on. it is amazing doesn't sound as if you are
how many people will 'break". being treated fairly. You imply
The police are good at what that you've been sitting in Jail
they do. They know how to for six months without being
scare you. They have told me charged with anything. If this
several times that I am looking is true, get rid of your lawyer
at 36 years. and go back to those same
The best and only thing you newspapers that reported
can do for yourself at that what happened. Go public and
point is to hire a lawyer. They get some people behind you.
can find out exactly what the Naturally, if you feel this
police have on you, and what may backfire and encourage
your real position is. If the the authorities to file charges,
juvenile had listened to me ear­ don't do it. Once you're out,
Her. neither of us would be in however, let the truth be
this Situation. I only hope I can known. If you think the system
reach those out there that he is screwing you, speaking out
has told on before they find about it may prevent the same
themselves in a similar situa­ thing from happening to others.
tion. If this is nothing more than a
Every time you leave your case offraudulent phone calls.
phone number on a bulletin sitting in Jail for six months is
board. you expose yourself. preposterous. Even credit card
You trust that the sysop will fraud. which to us is nothing
not reveal that information to less than stealing. should be
anyone. Frankly. you are risk­ dealt with by making the
ing your freedom every time. offender compensate the victim
In today's "hacker world". for their losses. Apparently.
people are going to have to bet­ though, not everyone holds this
ter secure themselves if they view.
want to avoid a situation simi­ We have some difficulty
lar to the one I am in. understanding why you're not
Wish me luck. answering any questions. If
The Disk Jockey you don't know any names or
Your letter provides a great details. you really can't put the
deal of sobering insight. We finger on anyone. If you do
hope this is not wasted on our know names and you're pro­
readers. tecting them. then you are
While we don't know what, indeed being quite noble. But

(continued on page 46)


Spring 1989 2600 Magazine Page 29
HOW PA YPHONES

by The Infidel David in War Games). the A-type


Fortress phones, a.k.a. pay­ set. would produce a dialtone only
phones, are something that every after a coin was deposited. These
phreak should have had experi­ were also rotary phones. As ESS
ence with at least once in their emerged, with such options as 911
career. Such devices as the red and 411 directory assistance. the
box and the green box also make need for a dialtone-first phone
the fortress a great place to emerged. the C-type station. which
phreak from. In this article, I will try resulted in the dialtone-first rotary
to explain how a payphone works, phone.
and how one can (ab)use it. With the advent of touch tone.
Basically, payphones are not calling cards, and long-distance
too different from normal phones, carriers. payphones developed
requiring all the speech and sig­ into the touch tone. dialtone-first
naling facilities of ordinary tele­ public telephone. As you may
phones, but, in addition, requiring have noticed. the intermediate
signals to handle the charge for telephone, "the rotary. dialtone-first
the call with the money inserted. phone is very hard to come by
However, the payphone itself has these days, obviously due to the
undergone some changes through increasing demand in the many
the years. services now offered by Ma Bell
Some Pay phone History and other companies which take
In most coin telephones, the advantage of the touch tone ser­
stations operate on a pre-pay vice.
basis, that is, the coins must be Up until 1978, signalling for coin
deposited before the call can be deposits was accomplished by a
completed. A few of the older cen­ single-frequency tone, sent in
tral offices using step-by-step pulses, as they are today. As an
equipment that had only a few Automated Coin Toll Service
public telephones accepted (ACTS) appeared necessary, to
deposits after completion of the automate the routine functions of
call. This form of operation, post­ TSPS (Traffic Service Position
pay coin service, was chosen usu­ System) Operators, there devel­
ally because of the long distance oped a need for improvements in
between the local community dial the station to prevent Simulation of
office and the serving toll switch­ the coin signals, and therefore, toll
board, which often resulted in fraud. As a result, before the intro­
large costs due to the returning of duction of TSPS/ACTS, all coin
coins on uncompleted calls. sets manufactured after 1977 were
The older versions of pre-pay­ then equipped with dual-frequency
phones (the ones made famous by oscillators. These coin boxes

Page 30 2600 Magazine Spring 1989


REALLYWORK

produced the current form of coin rate of charging of the call. This
signalling, the dual-frequency arrangement lets you insert coins
tone. This resulted in the D-type into the phone at any time during
station, which, due to its power the call, but its main disadvantage
requirements and electronic com­ is that the speech transmission
ponents, rather than mechanical, must be interrupted while the coin
could only be used in a dialtone­ value is signalled to the exchange.
first environment, and is, therefore, Thus, the property of requesting
what we see today. a coin for a call is not in the
Operation Logic phone, but in the exchange itself.
As noted above, the payphone If you were to take a payphone
is, essentially, the same as a cus­ home with you and hook it up to
tomer-owned telephone, with the your line, it would not request a
main difference being, quite obvi­
ously, the presence of the coin
box.
In the design of the coin box, "Owning a payphone,
the following must be considered.
The coin box can be very sophisti­
especially in high
cated, to handle many functions, traffic areas, can be
thus requiring a very simple
exchange to just receive all billing
quite advantageous. "
information from the phone itseH.
Or, vice versa, the coin box can be
quite simple, and the exchange coin deposit. On the other hand, if
can be much more complex, to you were to tap into a payphone
interpret the data from the box line and tried to place a call, you
needed to place the call and would get the familiar coin deposit
charge a toll for it. request message.
Today's standard Western What Happens To Your Money?
Electric/AT& T telephone follows When you first put your coin in
the latter, a more simple coin box the slot. it is tested for size, weight
design. These boxes, signal for­ and material. Size is determined
ward to the exchange the value of by the size of the slot the coin
each coin inserted, using tone passes through, as well as the
pulses. This technique requires coin chute it slides through in the
Coin and Fee Check (C and Fe) phone itself. A coin that is too
equipment in the exchange, large is not allowed into the phone
ACTS, to carry out the call itseH, while one too small just falls
accounting necessary between the through without having accom­
value of the coins inserted and the plished anything. Material is identi-

Spring 1989 2600 Magazine Page 31


THE MYSTERY OF

tied by the use of magnetic fields; human speech, since the human
slugs will be deflected, while coins voice can only produce one tone
will not. If the coin is right, it is at a time, and is also more difficult
allowed to hit a sprocket, which to simulate electronically, in an
when hit by the coin, spins a cer­ effort to prevent fraud. To identify
tain amount of times, determined the value of the coin, the tone is
by its weight. This spinning of the sent to the exchange in pulses.
sprocket controls a tone generator Nickel Tone: One 60 millisecond
within the telephone, which cre­ pulse (1700 Hz + 2200 Hz)
ates the coin deposit tones, which, Dime Tone: Two 60 millisecond
in turn, the exchange then inter­ pulses separated by 60 millisec­
prets to determine the amount to onds (1700 Hz + 2200 Hz)
credit the customer. Quaner Tone: Five 35 millisecond
As the payphone can accept pulses separated by 35 millisec­
only three different coins, there are onds (1700 Hz + 2200 Hz)
three coin signals to identify each As mentioned earlier, the main
one. The signal consists of 1700 problem with this design is that the
Hz and 2200 Hz tones generated conversation is interrupted by the
together to produce a dual-fre­ insertion of coins, which can be
quency tone. The dual tone is quite annoying on long-distance
more efficient. because it cannot calls placed on peak hours, when
be confused with (or simulated by) the rates are highest. Yet, since
the tones do interrupt the speech
transmission, a phreak can send,
along with the speech transmis­
STAFF sion, these same tones, generated
(formerly STAFFBOX) artificially by a device known as
the red box.
Editor-In-Chlef
After the coins have been
Emmanuel Goldstein
accounted for, they are held in a
hopper, which is controlled by a
Artwork

Holly Kaufman Spruch


single-coil relay. This relay is con­
llsh Valter Koch
trolled by the application of nega­
tive or positive DC voltage,
Write,,: Eric Corley. John Drake. depending on whether the coins
Mr. French. The Glitch. Chester are to be returned or collected.
Holmes. The Infidel. Red Knight. Bill The line reversal can occur by one
from RNOC. David Ruderman. lou of two ways. One way the line
Seannon. Mike VLtlas. and the
growing anonymous bunch. reversal can be accomplished is at
the phone itself, via the switch­
hook. In the on-hook position, the

Page 32 2600 Magazine Spring 1989


FORTRESS PHONES

hopper will not allow coins to fall not going to put money in a phone
through, and so, they must be just because a machine asks you
released by lifting the handset to to. If you've been coerced into
cause a line reversal and activate handing over your money, it's also
the relay. The second way in ACTS which then thanks you.
which a line reversal can occur is Alternate Designs
by remote, from ACTS. ACTS can An alternate telephone design
signal the station to either collect allows for a drastically less com­
or return the coins. The signals are plex exchange, while requiring a
also in the form of dual-frequency much more sophisticated coin box.
tone bursts. Three signals ACTS A payphone equipped with a
can send to the fortress are the "pay at any time" box allows for
Coin Collect. Coin Return, and meter pulse signals to be sent
Ringback. These tones are also from the exchange to the pay­
known as green box tones. The phone, with the coin box perform­
frequencies of these tones are as ill9 the call accounting. The meter
follows: pulses may be signals at 50 Hz, or
Coin Collect: 700 Hz + 1100 Hz tones of 12 kHz or 16 kHz,
(900ms) depending on the network.
Coin Return: 1100 Hz + 1700 Hz Therefore, the insertion of coins
(900ms) will not interfere with the conversa­
Ringback: 700 Hz + 1700 Hz tion. Coins inserted prior to the call
(900ms) being established, and during the
The function of the first two call, are held suspended until the
should be obvious, but the control logic within the payphone
Ringback may be unclear. When (rather than the exchange) deter­
you walk away from a phone after mines that they need to be collect­
not having depOSited money for ed. Coins remaining in suspension
overtime, the phone rings. That's are returned to the user when the
ACTS. It's not actually "calling" the payphone goes on-hook. When no
payphone, but sending a signal to more coins are held in credit and
the station to order it to ring. When the next meter pulse is received,
you pick up the phone and hear the payphone requests coin inser­
the message, "Please deposit 40 tion and then clears the calt after
cents," that's also ACTS playing the designated grace period has
the recording. After you hang up elapsed. If only part of the value of
again or don't deposit your the credit held in suspension
change, ACTS signals a TSPS needs to be collected when the
operator, who then breaks in and phone goes on-hook, the remain­
asks for the money personally, der will be lost, unless the phone
since Telco knows you're definitely is equipped with a "follow on call"

Spring 1989 2600 Magazine Page 33


COINBOX

button to credit the unused portion ber being dialed, amount of money
to a call made immediately after­ on credit, time allowed for credit,
wards. This design, seen in and time elapsed. Both of these
England, is somewhat similar to telephones cost somewhere in the
the privately owned payphones range of $2500-$3500, depending
available here. on the manufacturer and dealer.
Since the local telephone net­
work will only allow their pay­
phones to be connected to their
special ACTS lines, privately "The main advantage
owned payphones cannot use the
ACTS to perform call accounting
of the payphone, to
for it. Thus, these phones must be the phreak, is that it
installed on a normal subscriber's
line, a drastically less complex
provides anonymity. "
exchange, and, as a result, such
phones require a much more
Though they appear quite differ­
sophisticated coin box.
ent, these phones do not differ as
Owning a payphone, especially
much intemally.
in high-traffic areas, can be quite
80th units require billing equip­
advantageous, since the owner
ment within the unit itself, since
keeps all coins collected, but only
normal customer lines cannot aid
in the long run, because he has to
the phone in that capacity. As a
pay for the line fee as well as the
charge for the call placed. Yet, at result, these phones contain a
"Rating Module", which includes a
25 cents a call, and the current
database with all inter-LATA rates
peak rate being 10.2 cents, the
and site-specific rates, as well as a
profits can be worthwhile. This
profit is, however, substantially clock, to determine when to apply
diminished by the expensive price off-peak discount rates. As rates
change over time, the module can
tag of these units, costing between
be upgraded or replaced to
$2000 and $2500 each.
accommodate them, making these
There are essentially two types
of payphones out that can be pur­ units quite flexible in that respect.
chased. One type is basically a These telephones must also be
Western Electric/AT& T look-alike. able to discriminate between slugs
and the different denominations of
The other is the newer and fancier
electronic payphone, complete coins, which they do in a manner
with LCD digital display. Such very similar to the standard pay­
phones.
phones offer sophisticated fea­
The main difference between
tures such as LCD display of num-

Page 34 2600 Magazine Spring 1989


CORNER

the two types of privately owned the owner of the phone for those
payphones is the manner in which calls, since the calls are being
each places the call. placed through the PBX, and the
On the Telco copies, the billing PBX has a toll-free dialup.
equipment within the unit receives However, there are many disad­
the number to be dialed from the vantages to this setup. Most
keypad, compares that number to notably, a local network operator
the number of the line on which it cannot be reached through this
is installed (pre-programmed by arrangement. If you dial '0', the
the owner/installer), requests the operator will be one selected by
appropriate fee from the caller and the company that owns the PBX
then places the call itseH; the key­ used by the telephone. These
pad does not generate the actual operators are much more limited
touch tones which place the call. than the local network TSPS oper­
The majority of the digital mod­ ators. They cannot perform such
els, however, place calls through a tasks as collect call placement,
PBX. often owned by ITI. and the third party billing of calls, calling
owner. in turn. pays the company card calls, customer identification
for the calls made and keeps the for person-to-person calls, and
remaining dividends. The fact that busy line verification. Another
these units utilize PBX's is not a problem is that calling card calls
condition required by the unit, but cannot be made from these
rather the choice of the manufac­ phones. This is due to the fact that
turer, seeking increased profits by ACCS (Automated Calling Card
the use of their own lines to place Service) and ACTS. which auto­
the calls for which they can then mate basic TSPS functions, are
charge a fee. not available from within the PBX,
When you make a call with this and even if they were, the touch
telephone, the number you enter tones needed to enter the card
with the keypad is shown on the number cannot be generated
LCD display and is then processed directly from the keypad. This lack
by the billing equipment. After of touch tone access also prohibits
requesting the corresponding fee. calls through other long-distance
the call is placed through the PBX. carriers via the 950 exchange.
This results in the rapid sequence Directory assistance is also inac­
of touch tones heard when placing cessible and 911 calls cannot be
a call with this phone. What the placed. Many bugs in the design
phone does is dial the PBX and can also make the phone inopera­
then enter an access code used ble or make it enter a
solely by the payphones. That "Maintenance Mode" just by hitting
way, the local network will not bill it hard enough, since many of
(continued on page 42)
Spring /989 2600 Magazine Page 35
Ri poffs & Scams FCC to shut them down entire­
ly), there are more than 200 oth­
In response to a massive ers that are unaffected by the
amount of complaints, the FCC guidelines.
has set new guidelines for five As mentioned in our Winter
AOS companies. These guide­ 1988-89 issue, MCI has been a
lines say nothing at all about player in this dishonest game,
rates, but they do insist that the routing some of its zero plus calls
companies allow the customer ac­ to National Telephone Services
cess to other long distance com­ (NTS). We received calls, letters,
panies. When AOS operators and e-mail from around the coun­
handle the customer's calls, the try telling us that this practice
customer must be told and he was working all over.
must be provided with Strangely enough, as
rate information if of early March, we
he requests it. can no longer get
What they are zero plus calls
doing is assum­ to go through
ing that if cus­ via MCI. While
tomers are this is not ex­
given a choice, actly the public
they won't choose statement we
to be ripped off by had in mind, it
the AO.s company. It could be a positive step
makes sense on paper, but if the whole country follows
one has to wonder what these suit.
con artists are thinking up to get Speaking of NTS, our bill
around the newest stumbling came recently. We had experi­
blocks. mented with "zero plus" calls
The five telephone companies when we found out that they
are: Telesphere Network Inc. of were being routed through an
Oakbrook Terrace, IL (the ones AOS. We were billed over four
that run some of the ripoff 900 dollars for a collect call to our­
services as well); National Tele­ selves, in which the word "NO"
phone Services Inc. of Rockville, was stated emphatically. We also
MD (our old friends); Central were billed over three dollars for
Corporation of Fort Lauderdale, calls that we hung up on after
FL; Payline Systems Inc. of Port­ hearing the first ring. Sputtering
land, OR; and International with rage, we called NTS's un­
Telecharge Inc. of Dallas, TX. listed 800 number (800-288­
While these are five of the 0606). (Their listed number
biggest AOS companies (con­ (800-999-0687), which comes up
sumer groups had wanted the as "National Telephone West

Page 36 2600 Magazine Spring 1989


Coast Regional Service", is con­ American Express gold card. In
veniently provided by none other addition, the phone call they
than MCl. How convenient.) It were urged to make wound up
took a very long time to get costing $50.20! You see, there's
through, but when we did, the no limit on the amount that
person there promised us credit these sleasebags can charge for
without any hassle. Apparently, phone calls to their "premium"
angry people make such compa­ numbers.
nies blink. In this case, the Baltimore
Angry people also seem to based company was ordered to
have had an effect on Hyatt Ho­ pay a $2,000 fine. They also have
tels. They got tired of listening to to stop what they're doing. Re­
complaints from guests about the funds for the suckers are being
outrageous cost of phone calls made available through the New
made through the AOS company York State Attorney General.
that had been serving the entire ***
chain. They were dumped in fa­ In Seattle, a TV station
vor of AT&T. According to Gor­ showed a half-hour paid ad for a
don Kerr, vice president for Dial-a-Santa service. The catch:
management information sys­ it urged children to call in to a
tems at Hyatt's corporate offices, pay line, by holding the tele­
"The reality is that the service phone up to the TV set while the
was only of acceptable to poor show played Touch-Thnes.
quality, there were oftentimes
delays in putting calls through,
and the charges were, frankly,
outrageous."
Long Distance
*** Censorship
In what may be one of the Yet another threat to BBS op­
most brazen ripoffs in these erators -- at least one long dis­
parts in recent memory, a compa­ tance company has taken it upon
ny called International Shoppers themselves to decide whether or
Spree Inc. called New York tele­ not the contents of electronic bul­
phone numbers with a recorded letin boards are acceptable. If
announcement between October they decide that they are not, the
and February. People who picked long distance company will block
up the phone heard a high pres­ access to that number! This chi1l­
sure sales pitch urging them to ing bit of news comes from Tele­
immediately can 540-GOLD so connect, a long distance company
that they could obtain a "gold based in Cedar Rapids, Iowa. Ap­
card". Anyone stupid enough to parently Teleconnect has blocked
do this soon found out that their access to BBS's that they suspect
gold card was not the same as an of having access codes posted on

Spring 1989 2600 Magazine Page 37


them. find that you're no longer able to
While the other major long reach either the CIA or the NSA
distance companies don't block on Teleconnect, you can thank
individual numbers. they all us. We had to report them .- the
claim that it would be within amount of codes those people
their rights to do this. They point pass around is staggering.
to the Electronic Communica­
tions Secrecy Act of 1986 which
states that "phone companies can
monitor, intercept, and disclose
Foulups &
lines for reasons of non-payment Blunders
or illegal behavior." The following blurb appeared
It doesn't take much of a brain in recent Florida phone bills:
to figure out that this legislation "You can suspend, restore or
is aimed at "direct fraud" like disconnect your Florida home
blue boxing or using codes. If a telephone service at your conve·
long distance company detects nience with Southern Bell's
this kind of activity on its lines, RightTouch service. You can use
they have the right to monitor RightTouch service 24 hours a
the line, intercept the conversa­ day, seven days a week by dialing
tion and disclose the phone 1-800-826-6290 from a touch­
numbers to the proper authori­ tone telephone [anywhere in the
ties (FBI, police, America's Most country]. There is no additional
Wanted, etc.). That is the extent charge for using the service, al­
of it. To believe that they can ac­ though the normal charge for
tually prevent the outside world restoring your phone service still
from communicating with some­ applies.
one they "suspect" of being evil is "To access RightTouch service,
completely wrong. To practice you will need the personal access
this is not only offensive to code (PAC) shown below. This
democracy, but illegal. code has been assigned to your
Naturally, we have now put telephone number and should be
Teleconnect up there with MCI protected as you would a credit
on our official boycott list. We card. Once you dial the Right­
hope that those of you who some­ Touch service number, easy-to­
how signed up with Teleconnect follow verbal instructions will
manage to "block" their number guide you through the ordering
from your phone because of processing to suspend, restore or
THEIR illegal actions. And, by disconnect your phone service."
all means, add fuel to the fire by Need we say any more?
reporting all "suspect" numbers
immediately to Teleconnect (800­ ***
There was a problem with the
728-7000, ask for Dana). If you billing computer at North Caroli-

Page 38 2600 Magazine Spring 1989


na State University. It seems ing misused by employers. One of
that the program used to gener­ the provisions of the' UK Data
ate the bills wouldcorreetly gen­ Protection Act gives individuals
erate a student's bi11, but then the right to obtain copies of infor­
address it to the wrong student. mati on held about them in many
The problem was discovered af­ computers. But it's being report­
ter 6000 bills were mailed to the ed that employers are forcing
wrong students. prospective employees to use
*** that right to find out and reveal
An engineer's mistake para­ information about themselves.
lyzed downtown traffic for six An example cited is that onocal
minutes in Orlando, Florida last authorities checking up on taxi
October' when signals remained drivers before granting trading
red during lunch hour and forced licenses.
the city to caB out police on Not many of these potential
horseback to unclog intersec­ employees are likely to object.
tions. since they-obviously want the job
Traffic engineers replacing a they're pursuing. Aftd all kinds of
piece of Orlando's sophisticated information about it persori,
traffic light synchronizing sys­ much of which is not supposed to
tem Tuesday forgot to plug in a be anyone else's business, ap~
cable, freezing the signals at 34 pears in these computers.
intersections, mostly along 01'­
lando's busy north-south thor­
oughfaresjust after 12:30 p.m.
"It wasn't a glitch in the sys­
Mischief Makers
tem. It was during an installa­ Michael Ba~brook gave, his
tion. Someone forgot to plug in a college network managerliia
couple of machines," said may­ scare when he planteq a message
oral aide Joe Mittiga. 'saying that a Viru!) waS ~iye on
Somehow, that comes across a college.sys,tem. Banbrook's
as a glitch 'tc>', us.· A simple human message appeared whenever a
error can cause a snowballing ef­ user mistyped .8 password. The

fect when computers are in­ standard m~sage would be "You


volved. The "glitch", here is the are not an auth.oriseduser". It
degree to which a computer sys­ was replaced by the brief but sin­
tem can foul up society when one ister "A virus is up and running".
little thing goes wrong. When the message was discov­
ered by the college network man­
ager, Banbrook was immediately
forbidden access to any comput­
Abuse . ... ers at the St. Francis Xavier Col­
A British law intended to pre­ lege at Clapham in South
vent computer misuse is itself be­ London.

Spring 1989 2600 Magazine Page 39


The 17~year-old says that he that bank."
has uncovered a basic weakness At last, instead ofjust punish­
in the college's 64 node RM Nim­ ing the ingenious people who fig­
bus network that runs MS-DOS. ure out ways around the system,
"All anyone has to do is we're holding accountable the
change a five~line DOS batch clods who let it happen.
file," he said. ***
Banbrook was suspended from Lab Notes: "An unauthorized
computer science classes and for­ user copied and modified pass­
bidden to use the college comput­ word files to insert an extra priv­
ers for a week before it was ileged user account and
discovered that no virus existed. attempted to alter system pro­
*** grams. This incident was noticed
Also in England, a 17-year-old at Lawrence Livermore by pro­
junior cashier cheated the Na­ grammers who took protective
tional Westminster Bank out of actions, and we have notified
one million pounds in a computer other sites that were affected."
fraud case. But when the case
got to court, Judge Helen Palin
criticized the bank for lax securi­
ty and refused to make a com­
pensation order for the 15,000
pounds which the bank has not .~~~~·qfi§~~·Q~~ .
been able to recover.
After being given access to the GlI• •~lqq

bank's computer system, the


cashiet began by paying 10
pounds into his own account. He
then paid himself 12,000 in
imaginary checks. Later, be
Ce:=.:)
····,·1iif,········
transferred a credit for 984,252 2600·~a
pounds into the account of a (YOJ~_j·
friend and celebrated by buying 402-"564-.S18
50 bottles of champagne. *
The judge said, "One of the .26q~~".·.
worrying features of this case is ·lMRlX\'IC).·
that a young man who hasn't 703...,m~6591
long left school is able to work
the system in the NatWest bank 2.6QO_81$

on a number of occasions without (T• •l~)

being found out. Indeed, the gen­ >118~358;;,<920•..

eral chat within the bank seems


to be how easy it is to defraud
_ltL··OIJPfi••buRs

Page 40 2600 Magaz.bre Spring 1989


2600 Marketplace

LEARN ABOUT SATELLITES, red and blue box plan, vending


DESCRAMBLlNG, CABLE TV! Read machines lock pickgun/tools. I will
The Blank Box Newsletter, 100 Bride pay good cash for any of the above.
St., #27, Hot Springs, AR 71901 or call Send all info to Mr. Griffith, 25
501-321-1845. Amaranth Crt, Toronto, ONT Canada
DESPERATELY NEED COpy of M6A 2P1.
"Inside Commodore DOS" by Gerald WANTED: Any hacking programs for
Neufeld and Richard Immers. Will the Atari ST. Will trade. Also in need
Buy, trade, etc. for same. Fred A. of good blue box plans. Would love to
Gingher, PO Box 10132, Wilmington, hear from other persons interested in
DE 19850. P/H from Lexington, KY. Aristotle,
FOR SALE: DEC VAX/VMS manuals 606-258-2219.
for VMS 4.2. This includes ALL manu­ COMPUTERIZED LEARNING
als (systems manuals and users USER'S GROUP, ELECTRONICS is
guides) and for those inter­
those orange ested in learn-
binders. Contact DO you have something to sell? Are ing electronics
me for more you looking for something to buy? Or and related
info. Kurt P., PO trade? This is the place! The 2600 technologies as
Box 11282, Marketplace is free to subscribers! well as those
Blacksburg, VA Send your ad to: 2600 Marketplace, interested in
24062-1282. P.O. Box 99, Middle Island, NY 11953. developing,
WANTED: Text Include your address label. eva I u a tin g,
f i I e s / Only people please, no businesses. sharing, and
Countlegger / selling hard­
Ph rack news clippings on hackers, ware and software to do so. Write
phreaks, etc. from newspapers and CLUGE, 207 East School Street, Kent,
magazines. Willing to payor trade. Ohio 44240-3837 or call 216-678-4611.
Send a list to KH, N. 11107 Roundup, WANTED: Red box and/or blue box,
Mead, WA 99021. tone chips for making boxes,
TAP BACK ISSUES, complete set Vol. Macintosh software for trade via mail
1-91 of QUALITY copies from origi­ or modem and vending machine lock­
nals. Includes schematics and indexes. pick gun/tools. Douglas, PO Box 8022,
S100 postpaid via UPS or First Class Richmond, IN 47374.
Mail. Cash/MO sent same day, checks 2600 MEETINGS. First Friday of the
to Pete G., P.O. Box 463, Mt. Laurel, NJ month at the Citicorp Center-from 6
08054. We are the original; all others to 8 pm in the Market (also known as
are copies! the lobby with the tables where all of
APPLECAT: I need the touch-tone the weirdos hang out). Located at 153
decoder chip and software for an East 53rd Street, New York City. Come
Apple Cat 202. If you have one to sell, by, drop off articles, ask questions.
please post to S. Foxx, 430 Dundee Call 516-751-2600 for still more info or
Drive, Blue Bell, PA 19422-2440. to request a meeting in your city.
W ANTED: Any hacking, phreaking Deadline for Summer Marketplace:
software for an IBM computer, also 6/1189.
Spring 1989 2600 Magazine Page 41
(continued from page 35 )
PAYPHONES

these stations are not very secure, Phone Abuse


in some cases made from nothing In this last section, I will discuss
more than plastic. In some units, how you can use the knowledge
the touch tone access is available, obtained from above to use to your
yet the telephones are not config­ advantage when dealing with
ured to accept 950 calls as toll­ these telephones. I am not going
free, again inconveniencing the to get into such topics as phone ,
customer. theft and vandalism -- I'll leave that
The Telco copies are not much up to your imagination.
better. Operator assistance is limit­ The main advantage of the pay­
ed to that which can be obtained phone, to the phreak, is that it pro­
from home lines. Again, calls can­ vides anonymity. This makes the
not be completed through long-dis­ payphone a perfect location for
tance carriers since the station is blue boxing, engineering opera­
not configured to accept toll-free tors, and other Telco employees,
950 calls, although these tele­ modeming (for the more daring),
phones are usually configured to and general experimentation.
allow AT&T calling card calls (0+ Yet, perhaps the most famous
calls) to be placed through it. aspect of phreaking regarding the
The Cheese Box payphone is the use of the red
There are files circulating about box. As mentioned above, the red
the modemlphreak world regard­ box is used to simulate the tones
ing a device known as a cheese that signal ACTS that money has
box. According to the files, when been deposited in the phone and
one forwards his number to an ACTS may place the call and
Intercept Operator within his pre­ begin billing (if service is timed).
fix, all subsequent outgoing calls The red box is used by dialing the
made will be prompted for coin desired number first and then,
insertion, supposedly turning the when ACTS asks for the change,
subscriber's telephone into a pay­ using the red box to send the coin •
phone. It should be quite obvious Signals. In an attempt to stop red
that this is impossible, since not boxing, the payphone checks to
only does the Intercept Operator see if the first coin is real, by con­
have nothing to do with pay­ ducting a ground test. To circum­
phones, coin accounting, and vent this, at least one coin must be
ACTS, but it also seems quite deposited -- a nickel is sufficient.
impossible that one's line could However, the number must be
become interfaced with ACTS sim­ dialed first since ACTS must return
ply by forwarding it to an operator. your coins before reminding you
Obviously, these files are bogus. that you have insufficient credit to
place the call. Afterwards, any

Page 42 2600 Magazine Spring 1989


IN DETAIL

subsequent deposits required can number in Phone B and when


be red boxed successfully, and the ACTS asks you for the amount
duration of the call can be as long required, deposit a nickel in Phone
as you like. B. Now put the two handsets of
Red box schematics have the phones together (the wires are
proven to be hard to come by and long enough to reach across the
are notoriously a pain to build, not booths) with the earpiece of Phone
only in the somewhat more com­ A held tight against the mouth­
plex circuit design than the simple piece of Phone B. It doesn't matter
tone generators used in blue, where the other two ends are. The
beige and similar boxes, but also purpose of this is to get the sound
in the fact that they are hard to of the deposit tones from Phone
tune precisely, since not only is a A's earpiece into the mouthpiece
frequency counter needed, but of Phone B. Then simply keep
also an oscilloscope, both of which depositing coins in Phone A until
are hard to come by and are very ACTS thanks you for using AT&T.
expensive. If you were smart, you only used
However, there are alternatives. quarters in Phone A, so you could
One method is to locate a pay­ get some credit towards overtime.
phone that produces the coin Since a number was never dialed
deposit tones quite loudly when with Phone A, when you hang up,
coins are inserted. You can then all the change will be returned to
record the tones with a Walkman (I you.
do not recommend a micro-cas­ Red boxes are very useful but
sette recorder for this. because
they are not stable enough for the
precision required by ACTS) and
simply play them back into the
mouthpiece when you want to
place a call just as you would if
you had an actual red box. When
you record the tones, record most­
ly quarters, since, obviously, they
are worth the most calling time.
But if you don't have your trusty
Walkman with you, there is still
another way. Simply find a set of
two payphones (or more) with at
least one that generates loud coin
deposit tones. This phone will be
Phone A. Now dial the desired

Spring 1989 2600 Magazine Page 43


NICKELS, DIMES,

not convenient for local calls, circuit the phone throughout the
though they will, of course, work. entire dialing procedure and once
Another method for placing local completed, immediately and rapid­
calls free of charge is very similar ly connect and disconnect your
to what David did in War Games to "jumper", which, if done properly
the payphone. The problem with will allow the call to be placed.
that method is that Telco has now A more direct approach to pay­
sealed all mouthpieces on the pay­ phone abuse is actually making
phones. However, by puncturing money from it. To accomplish this,
the mouthpiece with a nail, the you. need access to the line feed­
metal inside it will be exposed. ing the telephone. This is often
There are two variations on this easiest in cases when the tele­
"nail" or "paper clip trick", depend­ phone is in a location that is below
ing on the telephone in use. ground and the main distribution
On the older D-types, by either cable is in the ground above the
placing a nail or a paper clip in the telephone's location, such as the
hole made in the mouthpiece and lower levels of buildings and sub­
then touching the other end to any ways. If you are able to get to the
metal part of the phone, a short wires, then cut them, or least one,
circuit will occur which will render so that the dialtone has been lost.
the keypad inoperable. If this is the Wire colors are irrelevant here
case, then dial all digits of the since I have seen many different
number except for the last as you colors used, ranging from blue to
would normally and then short cir­ striped mutticolor. By cutting wires,
cuit the phone. While doing that, you should have the effect of cut­
hold down the last digit of the ting all power to the phone. When
number, disconnect the "jumper" someone walks up to the tele­
you have made and then release phone, he doesn't usually listen for
the key. If this doesn't work, try a diattone and simply deposits his
rapidly connecting and disconnect­ quarter. The quarter then falls into
ing the jumper while holding down the hopper, and since there is no
the last digit. The call should then power to cause a line reversal, the
be placed. What happens is the relay will not release the coin. The
short circuit causes the coin sig­ coins can then be retrieved by
naler to malfunction and send a reconnecting the wires and flicking
coin Signal, while also shorting out the switch hook to initiate a line
the station, so that it passes the reversal, which will resutt in a coin
ground test. return.
On the newer payphones, the A word of warning: Telco moni­
short circuit will not deactivate the tors their payphones and knows
keypad. In this case, simply short when to expect the coin box to be

Page 44 2600 Magazine Spring 1989


AND QUARTERS

full. Computer-based operations since they are sent at durations of


systems aid collection by prepar­ 50ms.
ing lists of coin boxes that are can­ Perhaps even more interesting
didates for collection, taking into with these phones is that the oper­
account location and projected ator will not identify the phone
activity. The coins collected are number you are calling from. She
counted and entered into the oper­ does, however, appear to have
ations system. Discrepancies ANI capabilities, since one opera­
between actual and expected rev­ tor confided that she knew the
enue are reported to Telco securi­ number, yet was not allowed to
ty, which investigates them and release it. There is a reason for
reports potential security prob­ this. These telephones can be ser­
lems. Routine station inspections viced from remote, being equipped
are also performed during collec­ with an internal 300 baud modem.
tion, and out-of-service or haz­ The phones enter the
ardous conditions are reported "Maintenance Mode" when they
immediately for repair. are connected to, and are there­
The privately owned electronic fore "Out of Service", as the dis­
payphones are just as susceptible play shows. Others will enter a
to attack, if not more so. Most "Maintenance Mode" only at a spe­
notably, just by hitting the digital cific time of day, when activity is
ones hard enough in the area of lowest, and only then can they be
the coin slot sometimes causes reached. From remote, diagnostic
the payphone to enter a functions can be performed, as
"Maintenance Mode", where the well as the ability to poll the unit to
LCD display shows something to determine the amount of money in
the effect of "Not in Service the coin box, plus an accounting of
Maintenance Mode" and then local and long-distance calls,
prompts you for a password, though these functions will, of
which, when entered, places you course, differ from phone to
in a diagnostic/maintenance pro­ phone.
gram. The "Telco copies" also contain
Another notable weakness lies a 300 baud modem. Since ANI is
in the touch tones the digital tele­ locked out from the keypad, the
phones produce when it places a number can only obtained through
call through the PBX. If you can the operator; she is not aware that
record them and identify them, you you are calling from a payphone,
will have a number and working since the station has been
access code for the PBX used by installed on a standard customer
the telephone. Identification of the line. Since 0+ calls are available
tones is rather difficult, though, through this unit, Directory

Spring /989 2600 Magazine Page 45


LETTERS
(continued from page 29)
are you sure this is what you
want to do? In other words, do

SCRAMBLE FACTS

you owe these people any­


thing? And are you expecting
A three minute program

something in return? Odds are devoted to news and

you won't get it views, technical tips, and

Regardless of how you new product information.

choose to handle this, your life The contents are specific

is not over, You're having a


to the TVRO (television

very unpleasant experience,


granted. But you will recover receive only) industry

from it and you will benefii (satellite TV for the

from it if you try. Be honest home owner).

and open and reach out to oth­ (718) 343-0130


ers as you have in this letter. (costs only a phone call)
Don't concentrate on how mis­
erable things are and on what
opportunities have been lost. if

you acknowledge your mis­


takes and refuse to let them
defeat- you, anything is still
possible.
Please keep us updated as
to your Situation. PAYPHONES

Assistance can be obtained for


TO SEND A LETTER free by dialing O-NPA-555-1212­
Since the telephone is configured
TO 2600. DO THE not to charge for calls placed with
FOLLOWING: O's before them (to allow for calling
1) Write it. card calls) the call is free.
Conclusion
2) Mail it to us I have tried to make this article
through the U.S. mail. as informative and accurate as
Our address is: possible, obtaining information
from various manuals as well as
2600 personal experience. Since pay­
PO Box 99 phones are public, the best way to
Middle Island. NY learn about them is simply to
experiment with them on your
11953-0099 own. Good luck.

Page 46 2600 Magazine Spring 1989


NOW HEAR THIS

At 2600, we don't exactly go out of our way to


nag you about when your subscription is going
to end. You won't find yourself getting those
glossy reminders with free pens and dig al
quartz clocks and all that crap. We bel
our subscribers are intelligent enough to look
at their address label and see if their
scription is about to expire. If it is or if
you want to extend it, just 11 out the
below (your label should be on the other side)
and send to our address (also on the
side). You don't get self addressed stamped
envelopes from us. But the time and money we
save will go towards making 2600 as good and
informative as can be.

INDIVIDUAL SUBSCRIPTiON

.:J 1 year/$18 0 2 years/$33 0 3 years/$48

CORPORATE SUBSCRIPTION

::J 1 year/$45 0 2 years/$85 0 3 years/$125

OVERSEAS SUBSCRIPTION

::J 1 year, individual/$30 0 1 year, corporate/$65

LIFETIME SUBSCRIPTION

o $260 (you'll never have to deal with this again)

BACK ISSUES (never out of date)

.,) 1984/$25 0 1985/$25 0 1986/$25 0 1987/$25


o 1988/$25
TOTAL AMOUNT ENCLOSED:
In These Pages...

r----------,

I I
hackers in jail 3
I the wonders of unix 4 I
800 & 900 exchanges 12
I letters I 24
I
I payphones explained 30
I
I news from around 36
I
I 2600 marketplace 41

L. ________ --.J

SECOND CLASS P9STAGE

Permit Issued at

2600 Magazine East Setauket, NY

PO BOH 752 11733

Middle Islend, NY 11953 U.S.R.


Forwarding lind Rddress Correction Requested L - -_ _ _- - I

-.,.....-

You might also like