You are on page 1of 48

2600

The H acker Quarterly VOLUME SIX, NUMBE "REE

AUTUMN, 1989

COMMUNIST PAYPHONES

Seen in the streets of East Berlin


2600 (ISSN 0749.3851) is pMblished qlUU'erly by 2600 Enlerprises Jill:., 7 Strong '.~
Lane, SetQll./l;et, NY 11733. Second class postage permit paid at Setmdct, New York.
POSTMASTER: Send address changes fA.)
2600, P.O. BOll 752. Middle Island. NY 11953·0752.

Copyright (c) 1989.2600 Enterprises. Inc.

Yearly subsaiplion: U.S. and Canada •• $18 individual. $45 corporate.

Overseas •• $30 individual. $65 corporate.

Back issues available for 1984.1985. 1986. 1987. 1988

at $25 per year. $30 per year overseas.

ADDRESS ALL SUBSCRIPTION CORRESPONDENCE TO:

2600 Subscription Dept., P.O. BOll 752, Middle Island, NY 11953.0752.

FOR LETTERS AND ARTICLE SUBMISSIONS, WRITE TO:

. 2600 Editorial Dept., P.O. BOll 99, Middle Island, NY 11953·0099.

2600 Ollke Line: 516-751-1600,2600 FAX Line: 516-751-16G8

Competition ... It's the next

best thing to being there.

We've just about had it with this asked incredulously. "I said I can't
NYNEX/New York Telephone hear you." aick. We redialed. Sure
strike. Since early August we in the enough, we were connected to
New York region have been living their after-hours recording. Please
with substandard service, long call back when we're open. Right.
delays getting through to informa­ It gets worse. After going
tion, non-responsive repair service, through about a dozen payphones
a suspension of new orders, 50 in the streets of New York without a
minute waits for service reps after single one working properly, after
interminable busy signals, and pay­ losing 75 cents trying to make a
phones that never seem to work. local call, the New York Telephone
Here's an exchange one of us operator suggests we place the call
had while trying to reach a service using a calling card. "I can't access
rep. One hour before dosin~ busy the billing information because of
signal. Three phones were set to the strike," she said. "But I do know
redial mode, each trying the same the surcharge is only 45 cents."
number. After half an hour, suc­ New York Telephone has this
cess! A ring, then a recording. incredible habit of fixing their own
"Due to the work stoppage, there faults by charging you extra.
will be a slight delay answering Another example centers on our
your call. Please hold on, etc." The fax machine, which, according to
announcement repeated every our AT&T bill, was calling people
minute. Finally, at one minute in Delaware and staying on for 15
before closing, a human being minutes. When we started hearing
came on the line. "Hello I can't from people who were trying to
hear you," they said. "What?!" we send us faxes but were instead
continued on page 9

Autumn 1989 2600 Magazine Page 3


Grade "A"

by The Plague door is written "ONE· in large black plastic


WhatlaUAPC? lettering. By the way, you're allowed to go
UAPC stands for University Applications in. Nobody is going to check 10 or anything
Processing Center. This is a computing and like that If you look like a student, no prob­
data processing facility that deals with aca­ lem. The reason for this is that T-1 connects
demic record keeping and prooessing. One to T-2, another shed (blue in color) which
of their jobs is to process student applica­ has many classrooms. The actual UAPC
tions for CUNY (City University of New office is directly to your right as you enter T­
York) schools. Another job, and this is the 1.
part that interests us most, is to process stu­ In each New York City high school, there
dent records for the New York City public is something called a "program office", This
high schools. • room usually contains terminals and big
Nearly all New York City public high
schools are connected to UAPC. There are
116 public high schools in New York City
(with several hundred thousand students).
"If you go to a New
The reasons for interconnection are obvi­
ous. If every school had its own student
York City public
data storage computer, its own proprietary .
software, and its own staff trained on that
high school, the
particular system, the cost would be too
great. Not only that, but data transfer and
chances are 95
statisicaJ analysis would be impossible for
the school system as a whole. As an exam­ percent that your
ple, there would be much paperwork,
chaos, and confusion just to transfer a stu­ school is on UAPC. "
dent from one school to another. Computing
the drop-out rate and other valuable statis­ printers and irs where each school creates
tics like standardized test scores would class schedules for leachers and students,
involve every school sending in reports gen­ among other things. The staff that work in
erated by its own computer system, and these offices are trained at UAPC.
hence more paperwork, more bureaucrats, Technical Information
and more confusion. aboutUAPC
So now you understand why all NYC Enough background; here's the scoop.
high schools are linked by modem to this UAPC computers run on IBM mainframes
one computer. All grades, attendance, (IBM 370 and 3(90). The virtual operating
course records, and schedules for every system that is used is MVS (which is much
New York City high school student are like the familiar VMlCMS). On top of MVS
stored and processed at UAPC. runs Wylbur (pronounced will-burr, not
Where Is UAPC? while-birr), which is sort of like a command
UAPC is located in Brooklyn at shell plus a batch language plus an editor
Kingsborough Community College (across all rolled into one. On top of Wylbur, run the
from Sheepshead Bay at the far end of actual applicalions (jobs) for processing of
Manhattan Beach). The actual computers grade files.
and personnel are in Building T-1 (or simply There are several applications for vari­
building ONE). If you happen to go tmshing ous tasks (enlering grades, entering atten­
there sometime, building T -1 is a one-story dance, class scheduling, generating
tan colored aluminum shed. It looks sort of transcripts, and various other reports).
like a gigantic tool shed. Above the entry These applications are written in a batch-

Page 4 2600 Magazine Autumn 1989


Hacking

like language and are stored on disk in on white paper and divided into nice
source code fonnat The reason for this is columns grouped by academic subject?
that each school has its own way of doing Does your school's program office contain
things (i.e., naming conventions for classes terminals and printers? Is your class sched­
and sections), and the batch programs can ule (a.k.a. program card) printed on 5.5" x .,.
be modified by either UAPC or qualified paper (either heavy-bond white or thin-bond
people who work in each high school~ pr0­ blue)? Is your grade report (a.k.a. report
gram office. These applications are submit­ card) printed on computer paper, about 5.5"
ted to run on the IBM machines with the high (regular width) with a blue Board of Ed
JCL code appended at the top of each logo in the middle, with explanation of
application. grades (in blue) on the back? Do you get lit­
Each school connects to UAPC via a ter­ tle yellow or white laser-printed cards in the
minal and modem and each school is allo­ mail when you play hookey or cut classes?
cated its own directory (or library as the Any of these sound familiar, boys and girls?
batch-heads caR them) on the system. This They should, because almost every New
directory contains the applications Oobs) York City public high school fits all these
that the school uses each day for various categories. If your school fits any of these
activities. Data files are also contained in (especially the punched cards and tenninals
these directories. The data files are in a in the program office), then you can be sure
pretty-much IBM standard fonnat (although that your grades are lurking somewhere in
stored in EBCDIC instead of ASCII). Input the bowels of UAPC.
records for each application are usually fed logging on to UAPC
in using punch-cards or scan-tron type To get on, you're going to need a dial­
readers at the local school. If you've ever up. It's not too much work getting the dial­
gone to a New York City high school you'll up, if you do a little snooping and trashing
know what I mean: the attendance punch­ around the program office at your school,
cards are brought down each day from each you should find it written down somewhere.
homeroom to the program office. Also, each However, I will save you some time and tell
teacher would fill in attendance forms (used you that there are at least 12 dial-ups for
to detect class-cutting) using a number 2 UAPC in the 718-332-51XX number range
pencil. These fonns look like the test fonns and several in the 718-332-55XX range.
for the SAT's. There are many more elsewhere (usually
Sometimes, however, input is entered exchanges local to Kingsborough
manually at the terminal in the program Community College).
office, usually for query type jobs. For You should only connect to UAPC on
instance, if one student lost his class sched­ school days during valid school hours. You
ule and wanted a replacement, he would can connect to UAPC at either 300 or 1200
have to go to the program office and ask for baud. However, in an effort to thwart people
one. They would run that application on the for finding their dial-ups, UAPC will not print
terminal, print up a schedule for that stu­ anything to the screen unless you connect
dent, and give it to him. at the right fonnat and hit a few of the right
How do you know If your school Is on keys. Therefore, you should use the follow­
UAPC? ing procedure in order to connect: Call at
If you go to a New York City public high 300 or 1200 baud, using 7 data bits, even
school, then the chances are 95 percent parity and 1 stop bit (7E1), and local echo
that your school is on UAPC. If you are not (or half duplex). Once connected, hit the
sure, look for the telltale signs at your RUBOUT/DELETE key (ASCII code 127 or
school. Does your homeroom teacher use 255 [hex $7F or $FF]) three times, and then
punch-cards? Is your transcript Iaser-printed hit return twice. You will be greeted with the

Autumn 1989 2600 Magazine PageS


Grade "A"

following: -PASSWORD?" prompt. There is no differ­


ence in access privilege between the vari­
UAPCMVS390A UNE-1G-TEN 11:59:02 ous accounts at each school. They are
03/22/89 simply there so that more than one terminal
at each school can be logged in at the same
11:59 Wednesday 89-03-22
time.
You are signed on to U.A.P.C. Have a
GeHlng The Password
goodda,.
Naturally, you're going to need the pass­
TERMINAL? word if you are serious about doing any­
thing with UAPC. There are several options
When you are prompted for the terminal, here. However, one option that I would not
just enter a letter-two-digit combination (A99 recommend is that you attempt to hack the
works just fine). password by brute force. UAPC has a nasty
You will then be prompted for "USER?", habit of allowing you 4 attempts at the pass­
which is your school's login 10. The format word before it disables that account and
for the username is $HSxxn, where xx is a notifies the security dudes at UAPC. If you
two-letter abbreviation for your school's disable your school's account, your school's
name, and n is a digit from 1 through 9, ind­ program office must call UAPC by voice in
cating the particular account used by the order to reactivate it. There is a way around
school. N is usually 1, 2, or 3. An example this, if you really want to brute-hack the
of a user 10 is $HSST1 or $HSST2 which account. After three password attempts, you
are the user ID's for Stuyvesant High should hang up and redial, and then do
School in Manhattan. another three attempts, and so on. This will
You can guess at your school's user 10 keep the counter from ever reaching 4 and
(ifs easy enough, for instance Sheepshead disabling the account. Although ifs a pain in
Bay High School would be $HSSBl or the neck, there isn't much we can do about
South Shore High School would be il, However, if you have no plans of ever
$HSSS1, etc.), but a better way is to pick up getting into UAPC and just want to annoy
the trash from the program office. You your school, simply log on as them early
should find stacks of green and white printer each moming and disable their password.
paper that is 132 columns in width. The This will give them a headache to say the
user 10 will be almost everywhere through­ least, having to call up UAPC each day to
out most printouts generated. Remember to reactivate their password.
look for the $HSxxn format. Other ways of getting the password
After entering a valid user 10, what you indude our old favorite, social engineering.
will see next depends on several things. Here there are two options. You can
Normally you should see the -PASS­ attempt to engineer UAPC by voice, thus
WORD?" prompt, but on some accounts saying that you are the school and that you
you may also see a "JOB?" or "KEY­ need the password. Conversely you can
WORD?" prompt. This simply depends on attempt to engineer the school by calling the
the school, however 90 percent of the program office by voice and saying that you
accounts only ask for the PASSWORD. The are from UAPC and that you need them to
JOB and KEYWORD are simply additional change their password to a diagnostic pass­
passwords. However, every user 10 has a word which you will so kindly provide. If
PASSWORD on it. Usually only $HSxxl you're going to do social engineering, make
accounts have JOB or KEYWORD pass­ sure you get some valid people's names at
words. However most schools have several either UAPC or at your school.
accounts (usually 2 or 3), and the $HSxx2 Yet another way to get the password is
and $HSxx3 will usually have only the to do what was done in Wargames, snoop-

Page 6 2600 Magazine Aulumn 1989


Hacking

jng around the program office. They usually machines at DEC headquarters. The same
do not have the password written down. holds true for Wylbur and UAPC.
But, and this is important, you can get the Wylbur also runs on the other IBM
password if you can somehow manage to machines at Kingsborough (which have dif­
look over the shoulder of the terminal opera­ ferent dial-ups, seperate from UAPC), these
tor when he/she is logging in. Remember, machines have no affiliation with the UAPC
they connect to UAPC at half duplex, and machines. Therefore students using these
thus keys are echoed locally, meaning that other machines at Kingsborough must know
you will see the password on the screen as Wylbur as well. Lucky for us, you or any stu­
it is typed. I know this for a fact. dent can purchase (no 10 required) a
If you're hardware inclined, you can tap Wylbur manual at the Kingsborough book­
the line that connects to the modem and ter­ store (Building U) for $4. Just ask the nice
minal. These lines are usually not connect­ lady for the ·Wylbur User's Guide", written
ed to the schools switchboard, and can by Ganesh Nankoo, and tell 'em I sent ya. If
even be exposed outside the building itself. you do get into UAPC, I strongly suggest
Use a tape recorder and a Radio Shack that you buy this manual. It is very informa­
auto-pickup device to tape the transmission tive and can keep your ass out of hot water.
(which is usually 300 baud anyway). Play Some useful commands under Wylbur:
the tape into your own modem (set it on RUN PRINT: run the exec program In
answer) and you'll be able to see the origi­ your active area and print the output.
nate data (including the password) on your RUN FETCH: same as above, but place
screen. If you haven't tapped modem lines output In fetch queue.
before, I do not suggest using this method. FETCH *: fetch the last output and place
Note that UAPC requires each school to Into your active area.
change their password once a month, so LIST: list current active area to screen.
make sure you get the password right after LIST OFF: list current active area to
they change it. This will give you plenty of printer.
time to learn how to use UAPC before you LOCATE: locate all jobs submitted.
attempt any stunts with modifying data. LOCATE *: locate last job submitted.
All About Wylbur LOCATE 056: locate Job 056.
Okay, you're in UAPC, what now? Well, PURGE 056: purge Job 056 which Is on
once in you will be dealing with Wylbur. Like the output queue.
I said before, Wylbur is sort of like a com­ COLLECT: Input/enter data into your
mand shell plus batch language and editor active area.
all built into one. You will know you're in CLEAR ACTIVE: clear your active file in
Wylbur when you are given a 'COM­ memory
MAND?" prompt. USE #name: load the file "name" from
There are some misconceptions about disk Into your active area.
Wylbur that I would like to clear up right SAVE #name: save your active area.
now. When most New York City hackers SET PSW: change your password.
talk about the "grades computer" they sim­ SET KEY: change your keyword.
ply refer to it as Wylbur. This is misleading SHOW OIR: show current files In your
because they are referring to UAPC. Wylbur directory.
is not synonymous with UAPC; the Wylbur SHOW USERS: show current users on
shell is used at many different computing UAPC.
sites which use MVS and IBM mainframes. (Note: your active file is a buffer used
It's sort of like equating VAXNMS to the by the editor. You can list it, save it, clear it,
computers at DEC. VMS is an operating load into it, run exec jobs from it, etc.)
system and has very little to do with the You can also get help on UAPC by typ-

Autumn 1989 2600 Magazine Page 7


Grade "A"

ing HELP HELP (yes, twice. One HELP will must use one of the above Wylbur com·
not do the trick). mands to find and PURGE the output of
Applications That Run on UAPC. completed jobs. If you do not PURGE
Once inside UAPC, you may have very output, it has a good chance of being
lillie contact with Wylbur itself, and you will printed out at the program office when
see a "WHICH JOB?" prompt instead of the print the output of all the jobs that they
"COMMAND?" prompt. The reason for this milled.
is because most of the timo the applications Changing Grades
are all automated and accessed from Clearly, this thought has crossed your
menus that are run by batch files which exe­ mind in the past few minutes, so let me
cute when you log in. begin by saying that I do not recommend
Thus, the system is VHry friendly. You changing any records on UAPC. You can
may see a menu that asks you if you want use UAPC to get all kinds of useful informa·
to view a transcript, view a schedule, admit tion on people and never get in trouble.
a student, dismiss a student, transfer a stu­ If you do hope to change grades and get
dent, add classes, delete classes, etc. You away with it, there are several things to con·
simply choose what you want to do. Via sider, You must remember that your guid
these menus you will be ahle to do anything ance counselor has physical backups of all
that the school adminiftrators can do, your grades in his/her little notebook. If
including changing grades. Sometimes, you've gone to your counselor for advice on
however, there are no menus, and you will which classes to take, you'll recognize the
have to execute commands yourself. A list book of which I speak. The grades in this
of these commands can be gotten using book are not generated by UAP C but
one of the HELP menus. Here are some of instead entered into the books at the end of
the jobs you can execute: ABSCOR, each grading period by the counselors
ABSINFO, ABSREP, ACADROP, ACAIN­ using a pen or pencil. This physical record
FO,ACAMSTR,ADDSECT,ADDROP, is only used as backup in case UAPC gets
ADRPLST, BATINFO, ABSINO, wiped out or something like that.
CLASSLST, CODELlST, CUTINFO, CUT­ Comparisions between UAPC transcripts
DEL, FIXCODES, FIXOFCL, HITRAN, and the physical record are almost never
GRDUPDT, LATCOR. LATINO, MAIL, done, unless there is some kind 01 dis­
NGRUPDT, OFCLLlST, PUNROST, REGIS­ agreement between the student and the
TER, REOADRP, REOINFO, REOUPDTE, school regarding the transcript itself.. II you
SCAN, SCHEDULE, SKED, TRAN, do plan to make a clean run, you had better
TRANUPDT. cover all the angles. This means bribing
You can drop straighl i'nto Wylbur by some stupid kid to borrow the book for a lit­
sending a <BREAK>, This will cause your tle while so that you can make some modifi­
menu shell program to stop executing. If cations, give the dude $20, and make sure
you happen to leave the menu system and he doesn't know who you are
do drop into Wylbur (with its "COMMAND?" Guinea Pigs
prompt) you can get back to the menu sys­ Before modifying either your
tem by typing RUN. This will execute the record or your UAPC grades, I would
menu shell program that is currently in your strongly suggest using a guinea pig test
active area. subject. What this means is that you should
Remember that each time you or your pick some kid, any kid, who gOES to your
menu program submits a job (i.e., to school and that you have never mel and
a grade), the job will be executed and never plan to meet, change their glJdes,
output will be placed on the fetch queue. If purge the output on the fetch que'Je, !>It light
you don't want to leave a trail, then you for a few days, and v,olch what !-1('1ppens

Page 8 260() Magazine Autumn 1989


Hacking

Keep a close eye on your test subject. If you You can still bailout at this point and
notice the kid getting suspended or federal your life will proceed normally. However if
agents running around your school or you do change your grades (both physicany
something like that, you know that you bet­ and on UAPC) and nothing happens to you
ter not mess with UAPC, at least not in your for several weeks, you can be almost 100
school anyway. If nothing happens, then percent sure that you got mNay with it. Since
you should decide whether to take the risk both records (physical and UAPC) have
of changing your own grades. been changed, there can be no discrepan­
If you consider the use of innocent cies. Only your previous teachers will know
human guinea pigs to be distasteful. then what grades they gave you, and by now
you had better be prepared to risk your ass they Will have forgotten who you are. Only
by using yourself instead. I do not consider your transcript speaks for them now. If you
it to be distasteful, but then again I am do get mNa.)' with it, you can start mailing out
dewid of all ethics and morals anyway. those applications for Stanford and MIT.

Enough Already

(continued from page 3)


getting strange human beings in could obtain a local usage list for
another location, we realized what only $1.50.
had happened. Again. An incom­ In 1984, we made reference to
petent repairman had routed our the AT&T strike of 1983. The strik­
fax line into someone's house. They ers weren't paid, the customers
got our calls and we got their bill. were charged full price for poor
Apparently, the problem was fixed service, and the company made
without us ever being notified. lots of unearned money. The same
New York Telephone says there's is true today of NYNEX/New
no way for us to get credit for the York Telephone. With all the con­
local calls these people must have fusion that divestiture brought, we
made or for the service interruption now at least have options to AT&T.
because what happened to us sim­ With New York Telephone, there is
ply wasn't possible. If we wanted no choice. No competition. And it's
more information, though, we high time there was.

Autumn 1989 2600 Magazine Page 9


THE GALACTIC

The Galactic Hacker Party could pie in strange and distant lands
very well have been the strangest who also had developed an infatu­
gathering of computer hackers ation with knowledge and a strong
ever to have assembled. It wasn't desire to share it. It was at the
just a meeting of silicon-heads who same time a bit disconcerting to
talked binary for three days. It see this enthusiastic spirit, and to
wasn't simply a group of rowdy wonder why it would seem so
individuals out to give the authori­ strange back horne in America.
ties a headache and cause general like any good conference, the
chaos wherever they ventured. Nor best things happened behind the
was it merely an ensemble of scenes. That's where the contacts
bizarre, crazy, and ultra-paranoid were made and the methods
types, like the ones who make it to divulged. Press from all over the
the 2600 monthly meetings in New world showed up, as did people
York. The Galactic Hacker Party from all walks of life. It was a
was all three of these put together, _ curiosity shop, a coming together
and a good bit more. of il'lCJliring minds.
The conference took place at But enough poeticS. What does
the Paradiso Cultural Center in this all mean? Well, for starters, it's
Amsterdam on August 2nd, 3rd, injected us with some new enthusi­
and 4th. Hackers and techno-rats asm and some brand new knowl­
from all over the world converged edge. We tend to forget that there's
on the scene, some remaining for a world of diversity out there, differ­
quite some time afterwards. ent lifestyles, alternative ways of
Information about computer sys­ accomplishing things.
tems, phone systems, famous The Germans taught us the
hackers, govemmental regulations, importance of organization. In
privacy abuses, and new toys Hamburg alone, there's at least
flowed freely and openly. Since one meeting of hackers a week.
there are no laws against hacking They play with computers, com­
in The Netherlands, there were vir­ pare magazines (in West Germany
tually no restrictions placed on any­ there are several magazines that
body. deal with hacking), and figure out
Representatives from the Chaos their various strategies. Hacking is
Computer Club (West Germany), much more political in West
Hack-Tic (The Netherlands), and Germany than any other country.
2600 met for the first time, along The Dutch showed us how,
with hackers from many other above all else, having fun is what
countries. We tried to figure out the really matters. Learning about the
best way to pool our resources, to things that you're really interested
share information, and to support in can be the most fun of all. In The
one another's existence. It was Netherlands, what the authorities
most heartening to see other peo­ do or think is less than secondary.

Page 10 2600 Magazine Autumn 1989


HACKER PARTY

The openness of Dutch society here are the USA Direct numbers
helps to foster this healthy attitude. from various countries:
We, the Americans, shared our Australia: 0014-881-011;
beloved and practical hacking tra­ Austria: 022-903-011; Bahamas:
ditions, like the art of trashing. 800-872-2881; Belgium: 11-0010;
Almost as soon as we raided our Bermuda: 800-872-2881; Brazil:
first trash bin, the anti-authority 000-8010; British Virgin Islands:
Dutch figured that the dumpster of 800-872-2881; Cayman Islands:
a police station would be the best 1872; Denmark: 0430-0010;
place to get info! We must now live Dominica: 800-872-2881;
with the knowledge of what we Dominican Republic: 800-872­
have started. 2881; Finland: 9800-100-10;
We also helped to convey the France: 19-0011; Gambia: 001­
importance of thorough scanning. 199-220-0010; Grenada: 872;
It's easy to get discouraged in Greece: 00-800-1311; Guatamala:
countries that don't have the 199; Hong Kong: 008-1111;
wealth of services that we've Hungary: 00-36-0111; Italy: 172­
grown accustomed to. But, regard­ 1011; Jamaica: 0-800-872-2881;
less of how primitive or restrictive a Japan: 0039-111; New Zealand:
phone system may appear, scan­ 000-911 ; The Nether1ands: 06-022­
ning almost always accomplishes 9111; Norway: 050-12-011;
something. There are now people Singapore: 800-0011; St. Kitts:
scanning in both East and West 800-872-2881; St. Martin: 800­
Germany, as well as The 1011; Sweden: 020-795-611;
Netherlands, England, Belgium, Switzerland: 046-05-0011; United
and France, discovering strange Kingdom: 0800-89-0011; West
tones, dialing shortcuts, ringbacks, Germany: 0130-0010.
and other nice things. Now you may be curious as to
Calling To The U.S.A. why we printed those numbers if
One thing we'd like to advise they're such a rip-off. Because it
those of you who travel abroad in doesn't have to be a rip-off if you're
the future. Do not use USA direct smart about it. You can use USA
to makecalls! It may be cheaper Direct to call person-to-person COl­
than dialing direct from Europe, but lect to someone who isn't there.
it's still a great deal more expen­ The person who answers will then
sive than most people seem to get your number and call you back.
realize. While a three-minute call to No matter what service they use,
New York may cost something like the cost will be substantially less.
$8, so will a 10 second call, as the USA Direct is also a great way to
initial billing is for the first three get free directory assistance for
minutes. After that, it's at least $1 anywhere in the U.S. That's right,
per minute. It's extraordinarily easy they charge 60 cents per call over
to rack up a huge bill. By the way, here, but from overseas it's free!
continued on page 45

Autumn 1989 2600 Magazine Page 11


British TelecolD: Guilty

The following plea was sent by British business which needs to stay in touch 24
Tefecom to the British people. hours a day. A big advantage is that callers
British Telecom is asking customers to need only ring one number - wherever you
be patient - and to listen for the changes happen to be.
which are taking place as a result of its All you need is an approved multi-fre­
annual multi-million pound investment pr0­ quency 'phone which plugs in to the usual
gramme. socket
Many people dislike change. Others may Another option is a three-way calling
feel changes are of questionable value. A conference facility, where business meet­
lot of money is being spent - but on what? ings can be held down the telephone line. It
That old familiar sight, the red telephone can also be used for family conferences.
box, is disappearing from view. Some pe0­ Think of the savings on telephone bills!
ple see this as a change for the worse - yet Other developments will be useful to the
the new tough, easy-clean booths, with non-business user. Itemised billing is being
clear telephone keypads make life a touch progressively introduced, and another facili­
easier for thousands who would not or could ty will enable you to ring a number and
not previously use a public telephone. check immediately what a call has cost.
A few people even dislike having a The all-talking, singing, dancing
push-button, digital 'phone in their home, exchange is just around the corner, with
instead of the old 'dial' variety - yet without everything geared towards helping the cus­
the switch the vast potential of telecommu­ tomer get the best possible use out of the
nications technology could not be 'phone.
unleashed. The average digital exchange is capable
Questions are often raised about the of transmitting around 250 'messages', from
high numbers of bright yellow vans spotted helping you to find out what a call has cost
around the country, and the traffic problems to sencing a polite message to remind you
they sometimes cause. But British Telecom to replace your handset. If polite requests
engineers often have to park at inconve­ fail, it resorts to a Howler - a screech which
nient points temporarily, simply to carry out win alert you even if you do happen to be at
installation and repair work. the bottom of the gardenl
British Telecom is working hard to The inside of the exchange has been
improve service to its customers, and to transformed, too. The old, conventional
offer the best possible value for money. switching equipment has been replaced by
Most people will have heard about the net­ rows of blue and grey cabinets housing
work 'going digital', and ultimately this will printed circuit boards. .
revolutionise the way we communicate. One floor of equipment replaces what
However, until all the cables and equip­ used to take up two floors, and the technol­
ment are in place to link up the entire coun­ ogy is getting more compact all the time.
try, the customer down the road may not The new equipment is cleaner, virtually
fully appreciate the changes which are tak­ maintenance free, and much quieter.
ingplaoo. If a fault occurs, the card controlling that
Once the actual telephone exchange particular line is replaced with another, and
where your fine is connected 'goes digital', it the problem card is sent away for repair.
can open up a whole new range of commu­ The size of the mainframe computer has
nications possibilities. Under an optional also reduced, and the battery back-up units
package of Star Services, calls can be for­ are clean and maintenance free.
warded to another number anywhere in the It all heralds another world, but although
country under automatic call diversion ­ the 'character' may have changed, the new
invaluable, for example, for the one-man hi-tech equipment is making everyone's life
(continued on page 30)
Page 12 2600 Magazjne Autumn 1989
The death of COSMOS?

In the summer edition of COSMOS Until then we are the stewards who
Currents, a newsletter put out by must keep COSMOS running effe­
Pacific Bel1,IPacific Telesis, the death ciently [sic]." And then a few rousing
of COSMOS is said to be on the way. choruses of the company song.
"Tired of those old outdated dial-up A new telephone number has also
COSMOS TfY43's?" one of the arti­ been announced for the COSMOS
cles reads. "Well, get ready to kiss Client Community that encompasses
them goodbye. To better secure COS­ everything from simple repair to the
MOS, all dial-up machines are being COSMOS Hotline, MIZAR Hotline.
replaced with Private Line terminals. the CCTACs, the DDTAC, placing an
Funds have been approved for their order, etc. That number (81l-DATA)
removal, to be replaced with new can only be reached from within
CITOH 326's (or some equivalent California and is answered by a voice
hardware). This project is being done response unit that directs the call.
to comply with the Pacific Bell Has anyone else heard anything
Security Information Policies. and to about SWITCH or its equivalent in
prepare the way for the eventual other parts of the country? If so, for­
replacement of COSMOS with the ward the info here.
new SWITCH producL"
All that we know about SWITCH is
that it used to be called ASCOT and
~
that there was an article about its
future in the spring edition of COS­
MOS Currents. They go on to bril­ STAFF
liantly deduct that "the main cause of Edltor-In-Chlef
hackers breaking into the COSMOS Emmanuel Goldstein
database has been access to the dial-up Artwork
COSMOS network. This project will
eliminate that theeaL What remaining
Holly Kaufman Spruch
staff and Systems Technology person­ Ken Copel
nel that must remain on dial-up cir­ Design
cuits will be secured through other Zelda and the Right Thumb
means (Le., tokens)." Tokens? As in
coins? Token minorities? What could Writers: Eric Corley, John
they be referring to? Drake, Paul Estev, Mr.
"More users [of COSMOS] also
translates into more people that have French, The Glitch, The
access to the database, and hence the Infidel, The Plague, David
opportunity to degrade its integrity. Ruderman, Bernie S., Lou
The long range answer to many of Scannon, Silent Switchman,
these types of concerns will be forth­ Violence, and the growing
coming with the availability of anonymous bunch.
SWITCH in the early to mid 19908.

Autumn 1989 2600 Magazine Page 13


Technological Marvels probation officer's beeper goes off and the
us Sprint swears that its billing prob­ prisoner gets a visit It seems easy enough
lems are ending. They're introducing a to fool for now. A series of tapes would be
new system meant to replace all the old good enough to act as a substitute for the
systems that never quite agreed to forced real voice and they could be played on
integration. Does this mean that Sprint will demand by an accomplice while the pris­
stop sending us bills for six-month old oner is on his/her way to a new location.
calls? Stay tuned. (By the way, it's perfect­ And once helshe gets there, call forwarding
ly all right to pay those bills six months will take care of the rest. Naturally, the
late. At least with us it is.) solution to the shortcomings will eventual­
ly be cameras. It's probably better than
'I't prison. but a giant step closer to Big
Get ready for the new Sprint Brother. Not to worry, it's for our own
Voicecards. Now in the testing stage" they good, remember?
may soon become commonplace. This is
how they say it will work: "You begin by .
'I't
taking the first two steps you would take in And speaking of surveillance. guess
using the US Sprint FON Card. You dial what N'telsen Media Research has come up
the 800 number and punch in the number with? A brilliant new way of rmding out
you're calling. Then, instead of dialing what people are watching on television.,
your FON Card number, you dial an easy­ that's what! You guessed it, cameras, no
to-remember number, such as your birth bigger than a breadbox, that would.
date" and give a two-second personal ver­ according to the New York: Times, identitY
bal password." If the teclmology is a thou­ members of a household and record, sec­
sand times better than Sprint's billing ond by second, when they are watching
system. it just might work:. Of course" then television, when they leave the room, and
it will be subjected to another more sophis­ even when they avert their eyes to read a
ticated testing stage: us. newspaper. The Nielsen people think it'll
be a big hit because people won't have to
'I't do anything. The device will focus on
Voiceprints of another sort are being facial features, first deciding if a face is
tested in Suffolk County, New York. The recognizable and then whether or not the
authorities are experimenting with an face is directed toward the set. Twenty­
"electronic barbed wire" system, similar to four hams a day.
ones that seem to be popping up allover
the nation. It works like this: the "system" Hacker Spies
calls a prisoner on probation at his home at You may have heard of some computer
any time of the day or night When the per­ hackers being indicted in Hannover, West
son answers, the computer tells him to Germany for KGB spying. While some
name ten states (thereby assuming he/she media have reported a link between these
has had a college-level education). If the people and the Chaos Computer Cub, we
voice doom't match the one in memmy, a find no such link at all. What many fail to
reali.ze is that Chaos reports hacking activi-

Page 14 2600 Magazine Alltumn 1989


ty to the world, much like 2600. They are those ripoff phone numbers that charge
not themselves actively involved. absurd prices. Unlike just about every­
Remember this the next time you read sen­ where else in the country, 976 numbers in
sationalist reports in the papers. parts of Califomia are reachable from other
parts of the country. This means that you 'n
Nynex Bigotry only be charged the rate to California,
One we somehow missed last year .. .it which can be substantially less than a local
seems the Nynex Yellow Pages ha~ prob­ call to a 976 number, especially at night. It
lems with the twentieth century. Heritage of seems that Pacific Bell lacks either the
Pride Incorporated is a Manhattan-based technology or the inclination to block these
gay and lesbian organization. When Nynex calls. But it's possible that your local com­
asked them what category they wanted to pany may have put a block on its end, in
be listed under in the phone book, they which case you'll be denied access. Also.
responded with "Gay and Lesbian only one long distance company seems to
Organizations". That won't do, said Nynex. complete calls to 976 numbers: AT&T. AU
Try something like "Escort Services", the rest will give you error messages of
"Nightclubs", or "Human Services some sort. Some numbers that are reach­
Organizations". Heritage of Pride filed a able: 213 -97 6- WAKE, a computerized
complaint with the New York City Human wake-up service which is only good for
Rights Commission, charging Nynex with waking people up in California, 415-976­
the city's human rights ordinance 4297 and 213-976-9769, a couple of "hol"
which prohibits discrimination on the basis conference lines, and 213-976-1010, a
of sexual orientation. A category for homo­ computerized matchmaker service. Even at
sexual groups in Manhattan could "normal" prices, we think you'll feel
contain over 100 listings. We're not sure ripped off.
how it turned out because we can't gel
ahold of the new yellow pages (Nynex Payphone Choices
strike). Regardless, it will no doubt be Three-quaners of the owners of proper­
replayed all over the country. ty where Bell payphones are located have
chosen AT&T over other long distance
Dial-It News companies for operator-assisted calls on
Pacific Bell has a new 900 service clas­ those phones. MCI got 10 percent, Sprint 8
sification. The 505 exchange will be used percent, and all of the little companies got
for chat services, 303 for sex talk, and 844 the rest (around 7 percent). Some of those
for everything else. Also, a recorded mes­ little companies are AOS companies,
sage at the beginning of the call must give which often charge exhorbitant rates and
the charges. And if charges for either 900 try to make customers think they're using
or 976 calls exceed $75 in one month, AT&T. These percentages are in line with
Pacific Bell will send you a letter telling the choices made by residential customers.
you what a fool you are.
'"B'
'"B' The Missouri Public Service
A way to get sort of even with all of Commission has outlawed AOS companies

Autumn 1989 2600 Magazine Page 15


in businesses (hotels, malls, etc.) and at reduce operator time by one third. The
phones, saling thal these services automatic voice response (A VR) works
are not in the public interest. However, like this: the operator st'.arches for the num­
consumers are still free to be ripped off ber in the usual way by asking for name,
withln their homes if they so choose. locality, and street. The operator keys this
information into the computer. The system
Overseas Access then displays a list of possible numbers on
AT&T is reportedly trying to get per­ the screen. The operator touches a button
mission to make calls to Vietnam, one of a on the keyboard to identify the required
few countries that are impossible to call number and switches over to AYR. The
from the United States. When dialing over­ AVR equipment assembles the number
seas, there are two possibilities: either you message from its store of exchange names
can dial the country direct, assuming you (a major difference from the U.S.) and
have direct overseas dialing capability or numbers recorded by Julie Berry and then
you have to go through an international gives it to the caller. For example, "The
(lOC) operator who places the call for you, number you require is Ipswich, 0473,
sometimes after a lengthy delay. But then 227848. I repeat, 0473, 227848. Please
there are countries like Vietnam, where hold if you need to speak to an operator,"
there is no access at all from the United Ms. Berry had to record all of British
States. Usually it's because of an argument Telecom's 6,000 exchange names, plus the
or a war or something of that nature. But full set of numbers and number combina­
things are looking optimistic for a connec­ tions, in the different inflections with
lion with Vietnam since the government which they are spoken depending on their
there appears interested in having AT&T position in the complete number. For
ring its phones. An agreement also appears example, the last four digits in the number
imminent for direct-dial service to the 01-3565366 are spoken "five three double
Soviet Union (I), now reachable only six"; the inflection on the double six in that
thmugh an operator. Some other countries position is different from that used when
that are currently unreachable are the number "double six five three" is spo­
Cambodia (855), North Korea (850), and ken. Recordings of exchange names of
Albania (355). Nunbers in parentheses are uncertain pronunciation were sent to
those countries' country codes. Vietnam's British Telecom operators in the relevant
country code is 84. If anyone knows of localities for checking, and if necessary, re­
other unreachables or has an alternative recording. For some Welsh names, a
way of reaching these countries, let us Welsh operator sat with Ms. Berry during
know! the recording to make sure the name was
spoken correctly. Earlier this year, call
News From The U.K. handling time was also reduced by intro­
Waits for directory assistance in ducing a recorded message at the begin­
England are commonplace. To help allevi­ ning of the call, much like the systems in
ate this, the voice of actress Julie Berry use in the United States. Each of British
will soon speak the desired phone number Telecom's 10,000 directory assistance
to customers. It's estimated that this will operators records an opening message of

Page 16 2600 Magazine Autumn 1989


"Directory enquiries; what name please?"
that is heard by the caller as the call is Privacy? What's That?
being connected. All of these time-saving According to Boardwatch Magazine.
measures will bring the average human Representative George Gekas of
operator time down from 39 seconds to Pennsylvania has introduced a bill that
about 25 seconds. would require BBS operators and informa­
tion services to provide names and
'0' addresses of persons suspected of using
British Telecom is expected to buy communications networks to commit
Tymnet from McDonnell Douglas for $355 crimes without requiring a search warrant.
million. Tymnet is one of the world's The bill (House Bill 2082) could also force
largest data networks, with local access in phone companies to give this information,
750 U.S. locations. It ought to be interest­ again without a search warranl It's been a
ing having a British phone company run­ bad summer, folks.
ning America's second largest public data
network.- Telenet is, of course, number one. 'D'
The Commissioner of Immigration and
'0' Naturalization. Alan C. Nelson, has pro­
Chatlines have been banned by British posed a nationwide computer system to
Telecom. They had been operating on two verify the identities of all job applicants in
special exchanges: 0898 and 0077. BT cut order to halt the widespread use of fraudu­
off service to eight comparties that didn't lent documents by illegal aliens seeking
obey their order. A spokesperson says, jobs. Similar nationwide computer databas­
"Reports from customers and our own es are being suggested repeatedly by vari­
enquiries suggest that some lines, not nor­ ous governmental agencies. So far,
mally used for chatlines, may have been Congress has been successful in preventing
switched to that purpose. We are continu­ this because civil liberties can still be
ing to monitor the many thousands of tele­ found in their dictionaries. How much
phone lines which have the capability to be longer do we have?
used for chatline services and will cut them
off as we track them down." They've also 'D'
set up a snitch line (0272) 252801 for cus­ Scotland Yard is busy storing informa­
tomers to call if they know of a chatline. tion in electronic databases. Things like
By British Telecom's own defInition. the electronically processed fIngerprints, sus­
ban effects any call in which more than pects' photographs, and full criminal
two people take part in a live conversation. records. When the system is ready (by the
We all know how dangerous that can be. end of 1990). police officers will be able to
fmd out everything there is to know about
One Less Choice a person within minutes. The fully digi­
As of August 1. The Source tized fIngerprint records could allow a
Information Network no longer exists. detective to send an image of a fmgerprint
Compuserve bought its main competitor found at the scene of a crime and receive
and promptly shut it down. within minutes the name and criminal

Autumn 1989 2600 Magtu.ine Page 17


rerord of the SUSpecL The system is known tance calls to a private investigator, accord­
as PNC2. Another system, called ing to a report from the company. Bell also
HOLMES2, will be used to spot discrepan­ routinely let police have information aoout
cies in suspects' stories. The example they long distance records without search war­
use says that if a suspect gives two separate rants. The company said it was disciplining
police forces differing stories, the romput­ 13 employees. but it refused to identify
er will instantly catch the discrepancy. them or descn"be their punishmenL
Policemen just hate being lied to, don't
they? V
The Justice Department has a neat idea
'D' to keep guns out of the hands of felons.
The Christian Science Monitor reports Every citizen will be required to carry a
that Americans are so concerned with get­ "personal smart card". This card would
ting tough on drugs and crime that they've contain your life story, including any crim­
become lax on privacy concerns. inal activity. Gun dealers would never let a
"Anybody with the intelligence of a turnip criminal buy a gun. right? And if you're
has to be concerned about the potential'; not a criminal, you've got absolutely n0th­
for abuse, says Clifford S. Fishman, a law ing to hide. So everyone will be safe. And
professor at the Columbus School of Law happy. And brain-dead, given time.
of Catholic University. According to James
A. Ross. president of Ross Engineering Hackers In Trouble
Inc., some new phone systems have built- . Kevin Mitnick, the computer hacker
in monitoring capabilities, allowing a per­ featured in our spring '89 issue, will have
son to listen in on others' conversations. served a year in jail this December. At that
It's become much easier to "wiretap" a point, he is to be transferred to an addiction
line. Often it can be done by computer. clinic for six months, in order to help cure
Experts are increasingly concerned aoout him of his "disease", After separating the
illegal wiretapping by private individuals. Mitnick myth from the reality, the authori­
A growing number of private detectives ties backed away from many of their origi­
and police forces appear to be engaging in nal allegations. "A lot of the stories we
this activity, with little chance of being originally heard just didn't pan out, so we
detected. The current hysteria over drugs had to give him the benefit of the doubt,"
and crime make it all the more unlikely said James R. Asperger, the assistant U.S,
that Americans will be concerned aoout attorney who handled Mitnick's case.
civil liberties.
V
'D' And Robert Morris, the writer of the
In a related story, Bell of Pennsylvania Internet Worm, is facing 5 years in prison
has acknowledged widespread wrongdoing and a $250,000 fine for that bit of mischief.
by company employees, including giving The 24-year-old was indicted on a single
outsiders the private phone records of its felony count under the 1986 Computer
customers. A Bell employee gave informa­ Fraud and Abuse AcL Nobody was hurt, no
tion about a phone customer's long dis­ valuable data was lost, and we all learned

Page 18. 2600 Magazine Autumn 1989


an important lesson. Why the government
is wasting everyone's time on this is
'D'
beyond us. They must prove that Morris Recently an unknown hacker got into the
intended to cripple the Internet by releasing computer that controls the speed limit on the
the worm that wound up disabling thou­ Burlington-Bristol Bridge near Philadelphia.
sands of machines on November 2, 1988. He proceeded to change the speed limit
We've obtained a copy of the source code from 45 rn.p.h. to 75 rn.p.h. Judges refused
to the worm. If you want to judge for your­ to listen to appeals of those ticketed, saying,
self. send $10 to 2600 Worm, PO Box 752. "'The public should know better than that no
Middle Island, NY 11953. matter what the sign says."

HackerFWl 'D'
2600 received many calls from the Persons attempting to call the probation
media in the days before the dreaded office in Delray Beach, FL early in June
"Friday The 13th Virus" was supposed to were connected to a phone sex hotline oper­
strike. We tried to tell them not to panic ated by a woman named 'Tina' instead.
but it didn't work. Some people actually According to Southern Bell. someone
were given the day off because their accessed the central office with a modem
employers didn't want the computer to and reprogranuned their computer in such a
power up on that day. Once again. the way that calls intended for the probation
media fueled a nonexistent fire. We'll office were instead routed to a New York­
repeat here what we told them. Viruses can based phone sex line. "People are calling
occur at any time. The odds of being the Department of Corrections and getting
infected are relatively small. The odds of some kind of sex palace," said Thomas
being adversely effected are next to noth­ Slingluff, a spokesman for the Palm Beach
ing if you take some basic precautions: County Probation Department. Southern
know the source of your software. keep Bell officials said it was the flrst time their
backups religiously, don't let fools tell you switching equipment had been maliciously
what to do, etc. The viruses set to go off on reprogrammed by an outside computer
the 12th and 13th are no different from any intruder. Southern Bell provides the local
other in that relatively few people will ever phone service for Florida, Georgia, North
see them. Carolina and South Carolina.
The only difference is that we know
about it beforehand and have plenty of Telco Literature
time to let our imaginations run wild. We What kind of people are the phone
suggested that users who were concerned companies hiring as writers? This blurb
could simply change the date on their com­ was spotted in the July/August issue of the
puter to the virus date to see if anything MCI customer newsletter, MCI
unusual happened. Connections: 'The sun begins to set over
After all. the computer doesn't really the Golden Gate. The grill's been lit. The
"know" the date, right? The media cicadas sing. A sizzling steak brings back
didn't go for that, saying it was too teCh­ memories of the summer of '82... that
nical. rooftop cookout with Doug. Even though
continued on page 38

Autumn 1989 2600 Magazine Page 19


.",;: "

47EL
,iij::::!
4TEL is a loop testing system tested. The number entered will be
mainly used by General Telephone read back to ensure correct entry.
(GTE) that consists of a Voice The system will then ask for the
Response System and a Craft user to enter the mode. The modes
Dispatch Section as well as the are:
. facilities and equipment used for 1 : Calling on other Une•
testing functions. The following text 2: Calling on test line. ,
will attempt to dispel many of the 3: Line test results. .
4TEL myths that have been creat­ h is possible on some VRS's to
ed in the past years, such as the get a listing of the modes by dialing
o
idea that it can be used to eaves­ when the voice prompts. Line
drop on lines within its serving tests are possible from both modes
area. The information provided has 1 and 2 by dialing the octothorpe
been gained from company publi­ (#) key. The results of the test will
cations and from personal experi­ be announced along with the
ence. A 4TEL is not the same thing . length of the cable in miles.
as a REMOBS, which stands for Bridged ringers, if any, will also be
Remote Observation. noted. Mode 3, the line test results
The portion of the system that section, will tell the user there are
much of the phreaklhack popula­ no test results available unless
tion is familiar with is the Voice they have been previously entered.
Response System, which has nor­ The 7 key is the monitor command
mal POTS dialups. This system from both test modes. If there is
greets the user with an announce­ speech on the line, it will be detect­
ment message and then asks for a ed electronically but will not be
password, which is entered in heard by the user. The monitor
DTMF tones. The legitimate use of command is not 'REMOBS'
these dialups is for outSide craft (Remote Observation) but a
personnel (linemen) to caU in, per­ method of determining if the line is
form tests, and receive the results busy due to normal means (con­
for subscribers' lines. The VRS is versation) or due to some trouble
provided so craft personnel can condition at the switch. When the
access the 4TEL system at times system asks for the ID code for a
when no one is at the testboard (at monitor command, the system will
nights or weekends). Through the accept the line number as well as
VRS, up to eight craft technicians the initial password, and even a
can access 4TEL at the same time, secondary password before dial­
enabling them to get more done in ing, but it has not been determined
a smaller amount of time. by the author if this is a standard
After a password has been for every 4TEL. Not just anything
accepted by the system, the elec­ will work for the monitor password
tronic voice will ask for the line however, as it will announce if the
nurnt>er that the user wishes to be ID code entered is invalid or not.

Page 20 2600 Magazine Autumn 1989


If mode 1 is entered, these com­ reported by customers. All lines
mands are available: that have trouble detected upon
1: Fault location. them are printed out in a report at
2: Other Testing. the repair center the next moming
7: Test OK, monitor. where the proper fault location and
8: Hang up. dispatching can be done. The mea­
9: Enter next line number. surement and test unit of the 4TEL
If option 7 is chosen, another system is called a COLT, Central
menu will be available if the line Office Line Tester. which performs
tests busy. all nightly and on-demand tests
2: Monitor test. upon the exchange through local
3: Overlde and test. test trunks.
4: Walt for Idle. There are a few different types
If suboption one (fault location). of COLTs. The standard version
mode one, is chosen, these com­ will serve any CO for up to 10,000
mands are available: subscribers. The COLT RS is used
1: Open location. in rural step-by-step offices
3: Short location. (referred to as "steppers" also) for
4: Cross location. up to 1,300 lines. The Digital COLT
5: Ground location. is used for digital central offices.
8: Hang up. These can have remote Colt
If suboption two (other testing). Measurement Units (CMU's) for
mode one, is chosen. these com­ remote switches which are con­
mands are available: trolled by the Colt Computer Unit
2: Loop ground ohms. (CCU) at the host switch. The CMU
3: Dial tone test. speed calls the CCU at night to
4: Pair 10. start the testing and direct the
8: Hang up. operations. The CMUs in regular
Mode Two Commands end offices have digital links (over
2: Other testing. the normal telephone network) with
7: Test OK, monitor. the SAC, which is how the line test
8: Hang up. results are distributed to the repair
9: Enter next line number. center.
If suboption two (other testing). The 4TEL system can also test
mode two. is selected. these com­ lines upon command by a human
mands are available: operator at the SAC (Service Area
2: Loop ground ohms. Computer). The CRT operator
8: Hang up. enters the line number in the prop­
The 4TEL system's main use is er field and 4TEL runs a full series
for standard testing, which is done of tests as well as displaying past
nightly upon every line in an line history, fault summary, volts
exchange. This locates faults arid and current information, and the
problems before they have to be cable length. The results of the

Autumn 1989 2600 Magar.ine Page 21


testing are displayed in plain age conditions. There are others,
English, as opposed to decimal or but the reader will hopefully get the
other format. on the screen. A dis­ idea from the ones listed above.
patch decision is also displayed CDS
after every line test to determine if Another major part of the 4TEL
a dispatch is needed. system is the Craft Dispatch
SAC's System, which is a DTMF and
The SAC is the centralized focal speech response setup used to
point for 4TEL control and report­ exchange report and schedule
ing. This computer is located in the information between the repair
repair center and distributes center staff and outside craftsper­
test/work information between sons. Linemen call in to get dis­
CRT's and COLT's. The SAC for­ patch information that has been
mats the results of routine testing previously entered by the dispatch­
into a daily advisory report as men­ er. CDS plays back the info one
tioned earlier. field at a time. When the craft per-
There are several types of 4TEL . sonnel is ready to receive the next
reports that are worth noting. The field of information, he simply says
DISPATCH report lists troubles 'Go' and the system continues. A
that can have an immediate dis­ printer at the repair center informs
patch for them. These also tell the the dispatcher when a craftsperson
location of the fault (cable. CO, sta­ has received a report. When the
tion, etc.) and are claSSified into trouble is taken care of, a comple­
two types, moderate and severe, tion report is done on the CDS in
relating to how service affecting the which it asks for the closeout and
problem may be. The CABLE schedule, one field at a time, to be
report lists all new cable faults. A entered in DTMF and in speech.
plant status report summarizes the The clerk at the repair center then
condition of the outside plant and closes the trouble on the
totals them per individual SAC/4TEL system after the line is
exchange. In these reports, trouble tested a final time to ensure proper
conditions can be listed in a variety operation.
of ways. CROSSES and WETS CDS may also have audit trails
refer to line insulation faults and of every transaction for a certain
may indicate water penetration of time period. So to summarize the
the cable. SHORTS and work flow for involving the CDS:
GROUNDS are insulation faults at irate customer calls the clerk at the
the station set. OPENS refer to a repair center. The information is
broken, or "open" ring or tip lead in forwarded to the dispatcher who
a cable pair. BACKGROUND enters it into CDS. Craft personnel
refers to electrical noise caused by call in and receive the messages,
power lines being nearby. ABNOR­ do the required work, then file a
MAL VOLTAGE indicates high volt- completion report. The clerk then

Page 22 2600 MagtlZine Autumn 1989


• • •· .·.····.4TEL······:·······

closes out the trouble in tests (totalizer, coin relay. etc.). as


SAC/4TEl. well as all the standard tests which
The Digital Concentrator were covered above. A pair identifi­
Measurement Unit is another com­ cation can also be done, in which a
ponent of the 4TEL testing equip­ tone is placed on the pair to help
ment that is used to test lines in those at terminal cabinets locate
digital concentrators such as the that specific one, similar to the
GTE MXU and the NTI-OPM. They LMOSlMLT tone applique function.
are located inside Digital Loop Miscellaneous Notes
Carrier System remote terminals or If a user enters the number of
huts and consist of a circuit board the 4TEL system they have dialed
and measuring system. It provides in upon. the system will announce
AC and DC measurements of sub­ an intercept. A user cannot moni­
scriber loops, as well as all the nor­ torltest Directory Assistance
mal test/measurement functions through 4TEl. Lines that are out of
such as fault description and loca­ the system's NPA can be tested
tion, dispatch messages, and spe­ also. but a 1 has to be dialed
cial tests. The DCMU can test the before the number just like an ordi­
lines of an individual DLC remote nary toll call. The 4TEL VRS will
terminal, or a group of terminals give the user a "beep" tone after a
that are located together. The few seconds of waiting for input. If
capacity of terminals that the the user doesn't enter anything. the
DCMU can test is determined by VRS will disconnect. A version of
analysiS of test traffic and econom­ the 4TEL system is also used by
ic factors as well. Both the CRT at Rochester Tel in New York, and
the SAC and the VRS are compati­ there may be other independent
ble with the DCMU. These units companies that use the system.
are self calibrating, unlike the Try to find out what system you're
PMU's of an LMOS supported served by. If you're in a Bell area, it
Loop Testing System. The 4TEL will most likely not be 4TEL, but
CCU is linked to the DCMU via LMOS.
either a 1200 baud dialup or a ded­ I hope that this article has
icated link, depending upon the helped readers to better under­
size of the exchange. stand the way the 4TEL system
Some of the tests that 4TEL per­ operates. Again. there may be
forms are loop and ground resis­ some differences depending upon
tance (which detects resistance the area and the company.
faults and sheath ground prob­
lems). dial tone test (in which the Thanks to the small group of
number of times dial tone can be people who contributed additional
drawn during a certain period is information to the contents of this
recorded), busy line monitoring article.
(not BLV or REMOBS), coin station

Autumn 1989 2600 Magazine Page 23


words from

Mobile Telephone Info A Southern ANI


Dear 2600: Dear 2800:
The article 'Scanning for Calls· That number in Atlanta (yes, this is
appearing in the Summer 1989 issue a weird one) is 940-222-2222. (Noth:ng
mistakenly identifies the phone service happens until the lOth digit is entered.)
using 451-459 mhz as cellular phone You get a computer voice telling you
service. IMTS/MTS, old style mobile your number.
telephone service, service is found JOb
between 454-455 mhz, 152-153 mhz,
and 35.26-35.66 mhz. This service can
be provided by either the phone compa­
ny or an RCC (Radio Common Carrier).
ROIM Horrors
RCC's can also provide paging services. Dear 2800:
While these frequencies are not locked Columbia University has recently
out of most scanners, they are illegal to installed a new digital ROLM system to
intercept due to the passage of the replace the old centrex. 'Ibis change
ECPAjust like cellular. has angered many students for the fol­
Since the IMTS/MTS service pro­ lowing reasons:
viders were not the major force behind The system is incompatible with
the passage of the ECPA. unlike the cel­ modems and answering machines and
lular industry, and scanners capable of the university charges "rental fees· for
intercepting their frequencies have been data-comm equipped telephones as well
on the market since the epoch: the ser­ as for space on the Phonemall voice
vices on these frequencies have been II:l.CSSB# system.
left unprotected by scanner manufac­ They've blocked all access to 976
turers. 'Ibe media's focus on cellular and 540 numbers simply because the
service may also have been a factor. billing software on their "slate of the
For informational purposes here are art· system is not able to track them.
the Mobile Telephone Channel They slap a $5 surcharge on every
Assignments for the above ranges: conect call received.
ZO: 35.26 ZF: 35.30 ZH: 35.34 You have to dial 9 digits
ZM: 35.38 ZA: 35.42 Zi: 35.46 (91 +Personal Security Code) just to get
ZR: 35.50 ZB: 35.54 ZW: 35.62 an off-campus dialtone.
ZL: 35.66 11: 150.180 13: 150.210 They impose a $100 limit on the
JL: 150.510 1: 152.030 3: 152.060 Personal Security Code (PSC). If your
5: 152.090 7: 152.120 9: 152.150 account runs over $100, they turn yow­
YL: 152.540 JP: 152.570 YP: 152.600 PSC off. even if it's in the middle of a
YJ: 152.630 YK: 152.660 JS: 152.690 billing cycle, and even if they didn't
YS: 152.720 YR: 152.750 YK: 152.780 bother to let you know that your
JR: 152.810 28: 252.200 21: 454.025 account was nearing $100.
22: 454.050 23: 454.075 24: 454.100 The system bills you for a call 45
25: 454.125 26: 454.150 27: 454.175 seconds after you stop dialing regard­
29: 454.225 30: 454.250 31: 454.275 less of whether or not the call goes
32: 454.300 33: 454.325 34: 454.350 through. If you call long distance and
gC: 454,375 QJ: 454.400 gD: 454.425 let the phone ring more than a few
gA: 454.450 gE: 454.475 gp: 454.500 times, you're billed for it even if the per­
gK: 454.525 gB: 454.550 gO: 454.575 son doesn't answer.
gR: 454.600 gy: 454.625 gF: 454.650. The local calls are now timed as
Koo IyoDo opposed to the untlmed trunks we used
to have.
'Ibere are only 400 trunks for over

Page 24 2600 Magazine Autumn 1989


our readers

8,000 phones. Re-orders are not money Jrom the phone system now
uncommon. because the buts they send to students
The phone-mail answering machine are much higher than the bUls that
type service does not have enough come Jrom the phone companies. In
channels. You could find the message­ other words, New York Telephone
waiting Ught flashing on your station, doesn't chmye the unf.uers!ty Jor uncom·
but you might have to dial the message pleted ca11s. Yet the unf.uerslty charges
retrieve code 15 or 20 times because the students. Where does the money
you can't get a cireuit. go? It's getting to the point where some
Is there any FCC ruling that the uni­ unf.uersities are as sleazy as AOS com'
versity is violating by imposing these panles.
restrictions on us? Their atti­ At least Columbia olfers you the
tude is more one of, "Well, that's Just choice oj putting in your own lines.
the way it is. If you don't like it. pay Stony Brook olfers no suchJreedom.
New York Telephone to draw wires into 'The wimpy student government thinks
your room." Indeed, I have put in a pri­ they accomplished something by win­
vate line. But there are a lot of people ning the rightJor a student not to have
who just cannot afford to do that, and a phone at all, rather than winning the
are beir1g shafted right up to their ton­ right to choose one system over the
sils. Any advice? other.
gmw A company called BITEK has moved
in to handle baUng. 'They developed a
If you haven't already, read our notorious reputation Jor ignoring stu­
Spring 1988 issue where we describe dent complaints about bills. Finally,
how such a system was installed at the someone broke into their PhonemaU
State Unf.uers!ty oj New York at Stony account (which they never changed
Brook with a lot oj the same problems. Jrom the deJault password), and
Not much has changed there; inJact changed the outgoing message to:
many things have gotten worse. "Hello. This is BITEK and we don't care
Frequently every phone on campus about your problems!" You can hear
appears to be busy because the unf.uer­ their current message by calltng (516)
sity reJuses to buy enough incoming 632·9050. They've also just installed a
trunks. Outgoing calls are ojtenjust as "state-of-the·art" automated billing c0m­
hard.. A recent test revealed a waft oj puter that sounds Wee it belongs on Lost
25 minutes just to get an outside opera­ In Space. Call (516) 632-9055 to hear
tor (it had nothing to do with the NYNEX that
strike). Outside operators rtifuse to but As Jar as we know, there's nothing
to the originating number because the Ulegal about what Columbia and Stony
exchange isn't recognized as an actual Brook are doing. But it's damn immoral
telephone company exchange and they to rip people olf and make already
have no way to veriJy your identity. chaotic Uves even worse. There are
And ROLM can't handle call supervision ways oj getting euen, like scanning out
so everything bUls aJter 45 seconds, the entire Phonemad system and clog­
even international calls, where it can ging up the system withjunk maU (not
easUy take that long just to get a busy using your own eJdension, ojcourse). Or
signal. For a corporate setting where calling someone on campus and send­
individual preJerence really doesn't ing a symphony oj touch tones. The
matter, ROLM may be bearable. ButJer ROLM switch war dutifully keep the line
a unf.uersity setting, no system couldbe open untU the concert is over, rendering
worse, that isJor the students. We hap. the recipient's phone useless. But the
pen to know that Stony Brook makes most elJectf.ue way is to complain untU

Autumn 1989 2600 Magazine Page 25


letters from people

you're blue in the Jace and to let those Another Request


responsible know what's being said.
about them. Dear 2800:
Good luck. You mean I'm paying $18 a year to
read such stupld. boastful lies such as
those of The Disk Jockey that you
printed in the Letters section in the
A Nagging Question spring '89 issue?? C'mon, you didn't
Dear 2800: really be11eve that crap of the $150,000
How many subscribers do you have cash only. did you?? I mean Jour pages
anyway? of your good magazine were wasted
Tbe .Apple .OIlD because of this letter! Anyway, the rea­
Next to ·Whatever happened to son I am writing is this: Up until a little
TAP?" that's the questfm. we get asked while ago. I was able to use my comput­
the most It's harder to answer than tt er to blue-box. I wou1d simply call up
might seem because 2600 isn't Uke any BOO number (I could even dial 1­
most other magazines. We have a.round BOO and make up the last 7 d1gl.ls), and
1,000 people who get the magazine whenever the BOO number was ringing.
sent directly to them. But don't be answered, busy. or even the recording
deceived by that rather small number. of ·We're sorry. the number you've
Many others (random polls fndIcate at dialed is not In service," I could whistle
least Jour tfmes that number) get what 2600 hertz and box on. Anyway, one
fs knOwn as a .secondary" copy, that day the 2600 hertz would not work
fs, one that has been c::opled by ajrlend anymore. There is still an exchange In
or even electronically transcrtbed. my area that I assume is on step-by­
Naturally, we preJer I.t when people step. 'nIat exchange does not even have
subscnbe directly because tt hel,ps Ia!ep touch tone, call waiting. forwarding.
us going. The most Important thing, etc. (Mine does.) I assume that
though. fs to get the I/'ifonnatfon out. exchange can be blue-boxed off of. In
Close to 1,000 more copies go to varWus the spring '89 issue, you answered a
newsstands and bookstores around the letter that saJd that blue-boxes can still
IOOrld. And whatever else fs left goes to work from an ESS line.
all oj the people that order back fssues Can you please tell me how I can
In the future. So, to answer your ques­ perhaps blue-box from an ESS area? Is
tfon, we don't really know. The num­ it all In the 800 number that I call?
bers Just don't tell the whole story in tIhe 800 number never seemed to mat­
our case. ter before.) I do not want to red·box. I
want to use a bltte-box.
A Request I am sure that if you will print some
Dear 2800: valid. Information concerning ESS and
bltte-boKIng that your readers (and me)
Thank you for publishing such an
Informative well-written magazme. will greatly appreciate it. If you could
I only have one compla1nt. Please tty devote half as much space to this ques­
to deal more with phone phreaklng tion as you did to 'nle Disk Jockey's let­
than hacking. Anyone can get access to ter' fm sure your readers would gain
a phone, but not all of us have comput­ more from it than what they did from
ers and modems to participate In com­ his letter. nmnkyou. One more thing:
puter hacking. has anyone had any compla1nts on the
'Ihank.you. red·box circuit that you printed last
SUII11'J]el"1 Does it work?
ClraD4 Rapl". JII THOR

Page 26 2600 Magazine Autumn 1989


just like you

First off, in a coun:by where a com­ Box 4. Carthage. TX 75633: "50, you
puter hacker is locked tq:) in sdttary con­ think your best friend may be running
finement while sadistic murderers aren't, around with your girlfriend, eh?? Or is
you'U forylve us if we belf.eve someone he just a plaln back-stabbe!? Whatever
who claims their batt is unreasonably the case, if you have two phone lines
high. Even if It was a blatant lie, It cer­ and the call-waiting feature on one of
tainly is conceivable and we chose to the lines, you can tap his phone line
treat it as such. if you. have ir!folTl1iltfon and listen to his conversations if he has
to the contrary, please share It. call-waiting alsoll l} Call up your friend
Now, about your blue-bale problems: with the phone you wish to listen to his
you need facts, not assumptions. conversation with. When he answers
Obviously, something has changed in call-waiting (he's already on the phone
your area since not aU BOO numbers and you are the second caller), then
would change thefr characteristics on the you either just sit there quietly or say,
same day. Ffnd out what happened. 00 ~rm sony. I have the wrong number." 2)
you. get a new switching system? Did the Next, you wait until he returns to his
routing somehow get changed? You must original call (the one you interrupted)
go to this oJftce that you. belIeve to be a and he puts you on hold. 3) Now, pick
step and see if your old method works up your other phone line and call your
there. if it does, then you know where call-Waiting. 4) Answer your call-wait­
the restrictions are being applied, rrwJn1y ing. 5) Now go back to him. (Answer.
in your own ekrhange. if it doesn't work then click back. Click two times,
in the step eJ/rhange, then restricttDns answer, and go back.) 6) Hang up your
are in effect further up the line some­ second line. 7) You are now on the linel
where. Once you. W1derstand what these 8) Listen and remain sllentlll He can
restrlct10ns are, you. can attempt toflnd a hearyouU"
way around them, like routing through a
remote part of Canada, perhaps through We'U be honest. We asked quite a
an 800 number that termtnates there, It few people to test It out and nobody
aU depends on what has changed. It was able to make it work. But nobody
sounds as if you were able to box off said such a thing was impossible. if it
your outgoing trunks in the past which is does work, it probably only works with­
why it didn't matter what number you. in the same central o..fPce, maybe even
dialed. If these have changed, it wUll1OU! the same exchange. if you can get two
only work if the remote tnmk is stfU ~ lines in the same central o1ftce that
able. Keep in mind that blue-boxing is each have call wc:litfrlg. by all means try
dangerous, particul.arIy in an ESS area. it out. If it works, let us know what your
The only complaint we've had about exchange is. if this capabLUty does
the red box circuit in the Summer '88 exist, it's probably aflaw in a particular
issue is that the schematic is too small. type of switch. We'U let you know what
For a bigger copy, send us a stamp or weflndout.
an SASE.

The Call-Waiting
Interesting Numbers
Dear 2600:
Phone Tap
You may have seen the bumper
Dear 2600: stickers about that say:
Can you please tell me if this really DOWl' UKE MY DRIVING?
works? . CAIL l-BOO-EAT-SHrr
From Alternative Inphormation. PO One day I got Inspired and dialed it.
Amazingly enough, there was a record-

Autumn 1989 2600 Magazine Page 27


letters, letters

ing there promising to explain the two-part series (A Hacker's Guide to


bumper sticker if I only dialed a 900 UNIX) quite interesting. I commend Red
number somewhere. How much money KnIght on his or her following the true
he would extract from my wallet in the spirit of hacking: learning about some­
process was unclear. But the idea of thing through experimentation. I would
advertising a 900 number via an 800 like to make a few remarks which may
number is certainly a new one, at least prove useful to people who will follow in
tome. Red's footsteps.
First, there are two major versions
You think that's sleazy? Maybe, but of UNIX: AT&T and Berkeley. Minor
we can top Lt. A baseball player in variations on these major versions
Califom1a offered to tell the real story abound. The AT&T version is used
behind his drug arrest, but only if you mainly in the "commercial" world and
call a specf.al 900 number. Still another for all practical purposes, it doesn't
has you call a 900 number which tells support computer networking. The
you to call another 900 number. Berkeley version differs in many subtle
ways (most of which make it friendlier
Dear 2800: to programmem and users), but a pri­
Could you say something about the mary difference is its thorough support
number 900-xxx-OOOO? By changing -of TCPlIP networking. (Hacking com­
the prefix and adding the 0000 to the puter networks is a topic worthy of a
end you get a recording that identifies separate article.) The Berkeley version
the 900 exchange provider. Maybe is used by many universities, and it
someone can give some insight to this. also forms the basis for the version of
It's almost like the 700-555-4141 long UNIX supported by Sun Microsystems.
distance service. Second, login names may include
LK any characters and may be any length
'There's not much we can add ID what up to and including 8 characters. Ad­
you saki. eJtrePt ID be carejid when dial­ ministrators discourage upper case
ing a 900 rwmber as it may tJun around login names, due to UNIX's attempt to
and bill youJor a special call. If you look determine whether you are logging in
in our Spring '89 issue, you'll see a c0m­ from an upper-case only terminal (a
plete list oj preftxes and their corre­ now obsolete feature).
sponding companies Jor both 800 and Third, different UNIX versions differ
900 exr:hanges. By the way, 800-~ in the password requirements,
0000 gives you that Iriformatton. as welL although all have a maximum of 8
Also, if you want to hear what other charactem. The standard way for UNIX
companies' messages sound like, simply to handle passwords is to use the pass­
preJix the 700-555-4141 verification word as the key to a modified DES
number with the carrier access prefix. encryption routine, and encrypt the
For example, 10222-700-555-4141 will value zero. The resulting 64 bit value-is
get you MCl's verification message, translated to a printable form and
10288-700-555-4141 will get you AT&T, stored as the encrypted password. The
etc. Look in this issue somewhere Jor a DES encryption accounts for the 64 bit
complete list oj canier access prefixes. (8 chamct~ l1m1t. The DES encryption
algorithm is "broken" in one of 4,096
ways to prevent searching the encryp­
UNIX Hacking tion space and to keep hardW'dl"e DES
encryption devices from being used in
Dear 2800: attacks.
As a long-time UNIX systems pro­ Fourth, there are three different
gram and secur11¥ officer, I found the

Page 28 2600 MagazbJe Autumn 1989


and more letters

shells available: phone) commands can then be entered.'


Bourne shell: /bin/sh - all systems Upon reading this information (from
C shell: /binicsh - Berkeley systems the California Micro Devices Data
Korn sheD: /bln/ksh - recent AT&T Applications for the 08880 DTMF
systems Transceiver), I promptly went down to
'They all difl'er In detatI, but achieve the local mall where I knew there would
the same goal. Look in the last field in be some "intelligent payphones·. For
/etc/password to determlnewh1ch shell some reason, the numbers of the two
a user prefers (others can be Invoked as payphones I found were printed on the
desired). outside of the phone. Armed with this
Fifth, the directory lost+ found is not information, I went home and proceeded
where all removed mes go, but rather to dtaI up the payphones. During the
where all 8les go when recovered after a rtngback. I tried beeping In a few DTMF
system crash. .tones, but to no avaU. But after a few
Sixth. the sysadm command Is rings, a computerized voice came on
AT&T UNIX-specific. which advised the o~rator that this was
I would also like to mention that a public phone (and therefore collect
there Is 11 wide nmge of books available calls should not be directed to it). When
on UNIX operation and programm1ng. (l the voice stopped, I tried some DTMF
know, that's cheating.) However, there tones once again. The phone beeped
Is one book that I highly recommend: some tones back and then eventually
UNIX System Security by Patrick H. hung up. After calling back a few times, I
Wood and Stephen O. Kochan. Hayden stumbled Into something remarkable. I
Books UNIX System Library, 1987, began to hear the sounds of cars starl­
ISBN 0-8104-6267-2­ ing and people talking. I had somehow
It only covers AT&T UNIX (and caused the payphone to monitor the
hence misses out on real networking) area near the payphone and transmit
but does an excellent job. these sounds back to me at the other
fin end of the line. Needless to say. I was
quite surprised. I began to ponder sever­
InteUtgent Payplwnes al questions: is this legal? What
Dear2800:
legitimate purpose Is there for a function
•Any person having the phone num­ like this on a payphone? Should the gen­
ber and passwon:l of a spec1flc intelligent eral public know? It seems to me that we
payphone can do such things as pro­ should experiment more with these pri­
vate payphones and see what other hid­
gram the calling rates, check the
amount of coin in the box or even check den features they may have.
to see if the phone has been vandaHzed. Mr. Upsetter
An FCC approved data access ammge­
By aU means, experiment. We'd like
ment must be used to connect the sys­ to know what formats exlst for the
security phones, Le., how marty digits,
tem to telephone lines with an automatic
ring detect cIreu1t answering incoming
when are they entered, etc. In answer
calls. Upon receiving an incoming call, to your other question, U's probably
the software could be set up such that legal. although for what purpose U's
the payphone Issues a false ringback intended we're hard pressed to say.
tone or busy tone to discourage unau­
thorized users. Personnel with the pass­ Retarded Payplwnes
won:l. howevcr, could simply enter DTMF DeIII' 2600:
codes over the fa1se call progress tones In the Spring '89 edition. I read your
to gain access. Once the passwon:l has article on How Payphones Really Work
been correctly entered (from any D1MF and enjoyed it immensely. I thought that

Autumn 1989 2600 Magadne Page 29


post-script

it was a very accurate and informative It's hard to experiment with some­
piece. ContimJe the excellent \YOrk. thIng without havlng access to It. That's
Now that 1 have given your ego a why people whoftnd themselves locked
boost. 1 will ask for a favor. Could you u,p with these ltd-phones have to fry
please il'lclutie in one of the next articles everythIng possible. It Is enHreIy possi­
a piece on "'collect on1y phones* as I am ble there are no holes, ansldering what
incareerated at the present time and an the purpose of these phones Is. In that
that is avaJlable to use from this crow­ case, there are star options. For
bar hotel are those damnable gadgets. instance, Just suppose you called a
They are the most exasperating items vofcemail system or an answering
ever invented, as you are unable to call machine that answers the phone with
800 numbers or to bill to a th1Id ~ the message: "'HeUo? (pause] Why oj
or even he able to use a telephone credit course I'U accept charges.· if you're
card with them. 1be ~ you are call­ ludcy enough to gain access to a uofoe
ing must pay the emorbltant prices I'I"IICUI system that allows you to dial out.
which they charge for collect calls, and you'U be able to maIce phone caUs (and
who the hell wants to try to convince rack up two bUls at the same time).
indMduals to accept collect calls? There Unless your DTMF pad gets cut off qfter
has to he a way around these mecha­ a connectton Is made, In which case
nized monsters, and any :Info which you ' you'U need a white box (portable DTMF
could possibly print about them \YOuld generatorl to hold up to the mouthpiece.
be greatly appreciated. And that's probably Illegal to possess In
ID.carceratecl prison. Readers, any ways out?

British TeleeolD: Guilty

(contiuned from page 12)


easier. Once it is all digital. calls will be con­
Some people may not want the com­ nected in split seconds. and the line will be
plete new range of features offered by a sharp and clear.
fully digital system, but most will approve In the meantime, if you see a British
the changes which give them fast, clear T efecom engineer up a telephone pole or
communication, with fewer breakdowns and down a manhole - pfease remember he is
less maintenance needed. That is where trying to bring you the best possible service.
British Telecom is heading. wherever you may live.
As the old saying goes - a chain is only Did you get the feeling that perhaps the
as strong as its weakest link. Hence, until public isn't too happy with old BT? Of ,all
every connection end to end of a telephone the phone companies we've ever come
call is fully digital, you may not notice any across, these folks seem to haw the guiJtj..
difference in the clarity of the fine. est consciences.

I. your computer
-
HACIQlC I'll 2II1II3 noo DL AMSTaltWoI
/1

Page 30 2600 Magazjne Autumn 1989


THIS IS THE BEST FAX WE'VE GOrrEN SO FAR,
NOT COUNTING ARTiClES. YOURS COULD MAKE IT
TO THE WINTER ISSUE. KEEP THEM COMING IN.
(516) 751-2608111

Autumn 1989 2600 Magazine Page 31


REMOBS

by The Infidel traI office. In large cities, many units may be


Technically, REMOBS stands for REMote needed to cover an entire NPA, and so, your
Service OBservation System. But in plain, REMOBS may not be able to reach every
everyday English, irs Ma Belfs way of watch­ number you try. That means that you'l most
ing what you do on the phone. likely need more that one REMOBS to cover
This is far more dangerOus to the phreak one area or city. This also means that it will
than the DNR (Dialed Number Recorder), not be able to access out-of-LATA numbers.
which begins recording as soon as you pick After dialing !he target number, if that line
up the phone in order to catch the numbers is being used, you11 instantly be connected
you dial. I
with the conversation, and they, as I've said
The REMOBS allows anyone to tap into before, will never know you're there. If you
your line, Without clicks, beeps, noises, vol­ J
should lock into the target number when ifs
ume or voltage drop (sorry guys, but those not in use, you won't hear any1hing - just line
voltage meters on the line won't cut it here), noise and maybe some crosstalk, rather than
and most importantly of all. it can be done hearing the actual ciaJ tone, as you would if
without the need of a hard-line tap. Thafs you had made a direct line tap. With the
what makes the REMOBS so dangerous ­ REMOBS, you don't acI.uaIIy -connect" with
ifs done from remote. In other words, from the customer's line; you simply monitor it
any touch tone phone. When the customer picks up the phone,
The REMOBS was meant for observa­ you'll hear their ciaJ tone, the person c:iaIing
tional purposes. When designed, it was the number and the conversation, and then
devised so ~nemen and fellow telco employ­ !he person hanging up again. You could stay
ees couldn't indiscriminately access any­ there all day, but thars not too smart
one's line and make calls off of it, while Though your keypad may not be heard
providing the person monitoring the lne safe­ by the line you're monitoring, the REMOBS
ty from detection. The signal coming out of itself does recognize the tones. To discon­
the mouthpiece and keypad of the observer's nect the unit from the current tap, enter a
phone will not make it " the target number's digit, most often the last digit of the access
end. So, your victim cannot hear you when code. After you disconnect, you'. get the sec­
you lock onto his line, nor can he hear when ond tone again, prompting you for another
you drop off. This isn't a gizmo like the divert­ seven digit number; you don't have to reenler
er or the gold box; irs totally cifferent. the access code. When you're done with the
When you call up the REMOBS unit, you REMOBS altogether, instead of hitting the
wi. hear a tone which lasts for about 2 sec­ last digit of your access code to reset !he unit
onds. You then have about 5 seconds to key for another number, you must enler another
in the access code or the REMOBS will hang digit. which varies from unit to unit, to discon­
up. The access code is diHarant, depending nect totally so the unit can be used again.
on the unit, ranging from tw'o digits up to fIVe, Ifs important not to just hang up from. the

but most commonly being four. When enler­ REMOBS, or it win slay connecmd to the line

ing the code from the touch tone keypad, you set it for, and will not accept other calls

each digit must be held down for about a until ifs reset manually, which win draw atten­
second for the unit to receive it When you tion to it, your target, and most important of

key in the correct code, you'll hear another a1I,you.

tone and the unit will wait for !he 7-digit target Keep in mind that REMOBSs vary from

telephone number. network to netwOfk, and pethaps even state

But here's the catch: due to the volume of to state, so you win have to experiment with it

exchanges present within an NPA, the unit to see what keys perform what function.

itself is limited to covering only a small Havephun....

region, usually within the confines of a cen­

Page 32 2600 Magazine Autumn 1989


Gee...GTE Telcos

In this issue we printed an article As we mentioned, Automatic


about 4TEl, a testing system used Electric skipped the crossbar phase
by GTE. What quite a few people of evolution. But GTE wanted to
don't realize is that GTE hasn't been instali a crossbar switch at one point.
involved only with Sprint, a long dis­ So they contracted a French compa­
tance company. For many years, ny to make a crossbar switch for a
GTE has been operating local phone Texas location. Instead, they
companies in areas known as non­ received this horrible piece or junk
Bell regions. that got numbers wrong, connected
Their equipment is made by a people together who didn't want to be
company called Automatic Electric, connected together, among other
located in Illinois. (We've heard things. One day, the machine that
reports that AT&T has bought them, played the non-working number
to make things even more confusing.) announcement broke down. GTE
This company only made step, elec­ couldn't get parts for it. So an enter­
tronic, and digital switches, complete­ prising switchman t09k a Code-A­
ly skipping over crossbar. One of Phone 700 answering machine,
their early electronic switches was recorded a unumber out of service"
known as the EAX #1 and was intro­ message, put the machine jn play
duced in the early seventies. It had mode, hooked it through a push-to­
very few custom calling features. An talk handset, and held the button
annoying trait of their call waiting fea­ down with a piece of tape. Everyone
ture was that it signalled you after who called a non-working number in
each and every ring, making it very that exchange would get connected
hard to ignore. together after the recording cut off.
Eventually, the EAX #1 was But one day the motor in the answer­
scrapped and replaced by the EAX ing machine burned out; it was run­
#2 in the mid seventies. You could ning 24 hours a day after all. For a
distinguish this switch by the loud while anyone who called a non-work­
1100 cyle tone between rings that ing number in the 214-423 exchange
indicated a number wasn't in service. would instantly get connected togeth­
Also, GTE's busy signals would time er. Today, that exchange is served by
out after about 18 cycles. Another aGTD#5.
characteristic: if you came in on The GTD #5 has different custom
someone else's call waiting, you calling packages, known as smart
could hear a short bit of the conver­ call, smarter call, and smartest call.
sation you were interrupting right The smartest package offers call for­
before the ring, which was about 50 warding. call waiting, three way,
percent longer than a normal ring. speed dialing (8 and 30 entries). can­
The EAX #5 was introduced cel call waiting, one number redial,
around 1980. It was soon renamed save call (like a redial but with a spe­
the GTD #5 (General Telephone cial code), and call camping (calls
Digital #5). It was more sophisticated, you when person you're trying to
with no clicks at any point in the con­ reach isn't busy). A person who has
nection. call waiting will hear call waiting

Autumn 1989 2600 Magazine Page 33


beeps if a call comes in while the first days looking for an apartment in the
call is on hold and they're talking to west/southwest Los Angeles area
the second call. Whether this is a (almost all covered by GTE). driving
design flaw or a feature is unclear. All around with a car full of newspapers
custom calling features can be and a pocketful of dimes. It got so I
accessed on the second line, unlike wouldn't even bother stopping at a
Bell companies, who only offer can­ GTE payphone unless there were at
cel call waiting on the second line. least two of them together. as only
Many of those who live in GTE then was it likely that I'd find a single
land do not sing a happy tune, partic­ working phone. The defective phones
ularly those who don't have digital were in nice areas and had no signs
switches. Here are some observa­ of exterior damage - they just didn't
tions: work. Often they'd be sitting there
"The telephone 'service'. if I may emitting strange clicking and thunking
use the term lightly, was abominable. noises, as if they couldn't quite digest
I personally experienced all of the that fast coin. Others would appear to
horrors (lousy call completion rate, be fine until you put a dime in."
wildly wrong numbers, nOisy-and-not­ Then there was this observation:
just-white-noise lines), and then "One of the interesting operations
some.» that GTE participates in when you
"I know a fair number of people for have not paid your phone bill is to
whom Pacific Telephone vs. GTE not disconnect your line, but rather to
was a factor in choosing a place to block outgoing calls ... except 800's.
live - and not the least important When they did this to me, I didn't care
factor by far.» because I almost never made any
"For year after year here in local calls. One call to the Sprint 800
Durham, North Carolina I put up with number and I could make all the long
wild buzzes on the line; picking up distance calls I wanted."
the phone to dial, only to find other Naturally, we'd like to hear of any
people on the line in the middle of a experiences from our readers in GTE
conversation; not getting important land.
calls because ny phone wouldn't ring
properly; touch tones that weren't This article was written with the
buffered well enough and were con­ help of Silent Switchman and Mr.
verted to pulse anyway (if you dialed Ed. AnglY comments were extra.cted
too fast, you had to start all over); from The Telecom Digest, a
dropped connections in the middle of newsletter distributed on the com­
a conversation; frequent wrong num­ puter networks.
bers not even remotely similar to my
number. These were not isolated
things every couple of months - it
was all the time.»
GTE payphones don't get very
good reviews either:
"' once spent a miserable two
tr

Page 34 2600 Magazine Autumn 1989


Nowadays,

we fix a problem before

there is a problem.

Th.. ~s-w alfr""parh ... All ........ trwfn)' ~" .our ~1II""hir« hrlt..... !QIIit.... h. "00 hrntat. it I:toI ~

"';t~· ma........t ollUldn"t ~""""IJf'Af""':dll"" kirh.flp."1mHal. \\'.....tlwt..Jmt .... III ..... pa,.­
br"""'.......
t ...... ~Qrt'"'otMrlhi. ~at.rn.tINll"'UftlfJl'IIIfInl.
Wod;m,;mtt"1lnF••rantiri ......... he turA. ""ni.,.. IJ!II 11.(' hllIl to .to ....,.. nnt Mob-With,..",.. ""flI"WlI'If! difftor..
IJlIIIr .... pnIl..nlial ..... ~. . . . .N'hMl'llr'f'.....,...,.. l"imll~. ~ • •~.f~..,.nd

Thrn . . " ..... .,al ho_ln~n' Rnnwonl'l... wtw ..~w...... Wf' h~1. fnF in!<fanno, 10 the- USA.
,..... ""fI".. 1rw-,. '.-nlt. ,ohl·...... Rid,,,...t lin-ttlt ......4tM' l:tft<. ~ ("01\'ttf'h't...,. __ I..uk IItf: All ytJtU .. i1If~. "'}won
.,....,rI .... "' ..... S-tM'ft"':.. . . . . . . . . .It.... (~U..Il'('t.b1f'' 1!"..ininI!'. ..ftMlnwntat..... 311M' thr fib. C"fImt'iIt to j ...r t...m

IIIf~.Jp.:mtylllf'f"l..... 1V' .... t_!l ......Q:!II(' ,r likf'fl


' .... mai",....."",, ..............
,...~t'flo""""- WrU!'f'Olil ....IHI.. flf sniff tIM' wyt'ntfl ,,",II«' Aleut Whit-boT- fu.1!- mt
_ _ It.:.",'.l"nIY1rn~,.t .. !'..h-.. fr"'~. ,..".,. In liw IM"'- ....".,.trrJl Ntl:1
tt... ...."Jll-rrnohirm. Ro.... ~ltbf.bo:Y!lt,. '1I1f'nf",\liuhI" ..... _ . . . . - . - ..........

AN INTERNAL BRmSH lFLECOM ADVERTISEMENT.

YOU WONT GET A BETTER PICTURE OF A BT PAYPHONE.

AT LEAST, NOT FROM US.

Autumn 1989 2600 Magazine Page 35


Voice Mail Hacking...

by Aristotle a Genesis system, look into it. Chances are


There are four models of the Genesis you will be able to get on easily.
Voice Mailbox Systems (VMS). They all A Genesis system has the following dis­
have the good VMS features, like voice data tinguishable characteristics: 1) If you hit "0.
compression, ability to send messages to during the announcement, it will prompt you
other users, user definable passwords (I for the password. 2) If you hit "II", it will go to
believe up to 10 digits), user definable a phonebook system. The phonebook is
opening message, ability to review mes­ used to look up users' boxes by spelling out
sage when recording, and a separate phone their names.
number for each box. When the target Genesis system is
How To Hack The VMS found, do the following: 1) Find a mailbox
The first step is to find the voice mail with an announcement that says, "I am tak­
system. The easiest way to find a system is ing a message for mailbox number XXX." 2)
to look in the yellow pages under telephone During this announcement, press the "0"
answering services and/or equipment c0m­ key and wait for the password prompt. 3) At
panies. I found a system in Louisville, this prompt, press "0" again. This is almost
Kentucky that was listed with the name always the password for the unused box. If
VoiceNnk. Its number is 502-429-9200. it is not "O", then go to the next open box. 4)
After finding the VMS, you must find out . Now that you have control, change your
what type of system it is. There are many password and follow the friencly directions.
different types, each with their own unique It is extremely user-friencly so you should
characteristics. If you find that the system is have fun.

...NYN EX Style

In mid-August the NYNEX Business card numbers and expiration dates. The FBI
Centers' nationwide voice mail information was reportecly notified, but was only inter­
system was penetrated by unauthorized ested in the credt fraud issue; not in securi­
individuals. According to Randy Hareford, ty problems with the system. Interestingly,
voice mail administrator at NYNEX, numer­ NYNEX has always maintained that mes­
ous "kids, maybe twelve or thirteen years sages on the system were not retrievable by
old", who "didn't know what they were anyone other than the addressee.
doing" took over 38 of approximately 1900 The security breach allegedly brought
voice mailboxes on the system. the system down one evening and later
Dialup modem numbers used to manage resulted in a system broadcast to all users
the system were posted on at least two bul­ warning them not to convey sensitive infor­
letin boards and sent to other interlopers via mation on the system, instead suggesting
the voice mail system, but most of the "more secure" methods such as the U.S.
encroachment was blamed on the use of Mail, IBM PROFS, and the direct-dial tele­
"easy passwords· chosen by legitimate phone network. While most of the abused
users. The callers identified themselves with mailbox passwords were deleted and reas­
aliases such as Flight Commander, Knight signed after two weeks, the system admin­
Caller, Blackbeard, Chris Columbus, Photo istrator received one message offering
Bug, Easy E, Ray Gun, Mr. Upright, information about other compromised mail­
Teenage Warrior, and Mr. Six. boxes and the security loopholes used in
According to Hereford, at least one mes­ exchange for legitimate voice mail privi­
sage passed between purloined mailboxes leges. The offer was neither accepted nor
contained information detailing stolen credit replied to.

Page 36 2600 Magazine Autumn 1989


PUNCHING PAY PHONES

By Micro Surgeon/West Coast Phreaks

Remember in the movie War­ As with any ploy there are


games when David needed to limitations and problems. Long
make a call, and had no money. distance calls cannot be made,
He did so by opening the mouth­ because a different method is
piece and touching a piece of used to verify the deposited
metal from the inside of mouth­ coins. One of the main problems
piece to the plate of the pay is that a mild shock (not to death
phone. Believe it or not this ar­ of course) may be experienced.
chaic technique still works in the A less serious problem can be
most sophisticated areas, includ­ that the mouthpiece may be dam­
ing all BOC'S (Bell Operating aged, by punching to hard or in
Companies) DTF (dial tone ftrst) the wrong place, rendering the
pay phones. This technique phone useless.
does not, however, work on pri­ Punching pay phones is noth­
vate pay phones. ing new, and I certainly didn't
To make a local call, without discover this art. Of course a
using coins (or slugs), first Red Box will work much better,
punch a small hole (see diagram) but it could have inadvertently
with something sharp (ie. a nail) been left at home. What one
through the existing outer plastic should understand is that this
holes into the inner (metal) technique will work and that it's
mouthpiece. This gives access not just a bit of telephone histo­
to the inner magnetic coil. Next ry.
dial the ftrst six digits of the lo­
cal number and before dialing
the last digit, touch the nail to the
face plate, holding it there as you
press the last digit. This whole
process of touching the nail to
the face plate, pressing the sev­
enth digit, and simultaneously
releasing it from face plate as the
button is let go, should all be
done within one second. Timing
can be critical. Essentially the
phone is being grounded, and as
a result BOC's are fooled into
thinking that sufficient funds
have been deposited for local A Pay Phone Handset Receiver
calls.
Autumn 1989 2600 Magazine Page 37
continued from page 19
it's only 7:30 pm, Lynn reaches for the Technology Marches Back
phone call to call him in New York. A French computer system fouled up
Introducing the new MCI Prime-Time big-time when it misread some data.
Plan.... " Or how about this from Sprint's 41,000 Parisians who were supposed to
FON Line Newsletter: ''On average. most have been fmed for fairly minor offenses
Americans will move 11 times during their found themselves receiving computerized
lives, coping with a process that can be letters accusing them of all sorts of bizarre
exhilarating, exhausting, and expensive. crimes.
Although moving can often be stressful, Apparently the coding used in the sys­
planning ahead can ease the transition and tem got mixed up, meaning that people
save wear and tear on your nerves and your who were supposed to have been fined for
wallet.... " Five more paragraphs elapse speeding were instead fmed for pimping.
before the Irrst mention is made of US "There were a lot of cases of living off
Sprint and how it wouldn't be a bad idea to immoral earnings, racketeering, and mur­
have a Sprint calling card. We suspect this der'" said a City Hall official. "The
kind of cagey sales pitch won't exactly go . accused persons will be receiving latters of
over big but at least it's giving those writ­ apology. Instead of receiving summonses
ers from the slush pile a place to go. on criminal charges, they should have
been sent reminders of unpaid motoring
Calling Card Tutorials fines." Motorists ticketed for failing to
For those who feel like wasting a bit of stop at a red light were fmed for "import­
time, give a call to the AT&T "calling card ing unauthorized vetinary medications",
tutorial" line. By dialing 1-800-255-3439. while those whose only offense was cross­
you can experience the excitement of using ing a solid white line on the road were
an AT&T calling card by making a simulated charged with "night fishing in a place
telephone call! A narrator guides you through reserved for IlSh breeding".
this exciting process. MCI has a "test drive"
number that takes you thmugh the adventure 'Ir
of using an MCI card. They can be reached at New York Telephone repairmen are
1-800-95O-TEST. In both cases. valid calling being sent on wild goose chases. This is
card numbers are not necessary. thanks to a new computerized repair service
introduced in the midst of the Nynex strike.
Another Telco Ripoff Now you no longer have to talk to a service
C&P Telephone is said to be scarnming representative, unless you don't have a
the public in the Washington DC area. It touch tone phone. Customers key in their
seems that local calls in Washington OC phone number and then go through a menu.
are 20 cents, while in neighboring "Are you having trouble getting a dial
Maryland and Virginia they're 25 cents. In tone?" the computer asks. "Press 1 for yes, 2
Washington DC, none of the phones are for no." Other categories include trouble
marked for price and many people are making calls, static on the line, trouble
fooled into depositing 25 cents instead of receiving calls, or trouble with custom call­
20. The phones don't even give any extra ing features. If you answer yes to any of
time to callers who put in too much.

Page 38 2600 Magazine Autumn 1989


these, you dive into another menu where the repair service. New York Telephone does
computer attempts to isolate the problem by not give out this number. They've also
asking more yeslno questions. The whole introduced an automated credit operator
process takes about three times longer than which is reachable by dialing 211. You can
talking to a human being but it saves New either hang up at the tone for a local credit
York Telephone the expense of human or touch tone the number you dialed. Again,
employees. And as for the wild goose chas­ it takes longer than the equivalent with a
es, it is possible to completely foul up the human being.
system by making lots and lots of calls, each And if you don't have a touch tone
time entering a different number. A repair­ phone, you get connected with a recording
man will be dispatched for each and every that tells you to wait until after the strike is
call. Hackers will have fun because they over.
don't have to use their voices and the sys­
tem is accessible from payphones. It's also And Finally
possible to dispatch a repairman by accident Some words from the Beijing youth
since there's no way to abort The system daily: "In recent days, people in Beijing
confums the date the repairman will be out who nannally love to make phone calls
but never asks the customer to verify in case have suddenly become cautious, and many
they've changed their mind. People who of them sayan the phone 'Let's write or
want to bypass all of this garbage can call chat face to face instead, otherwise we
890-6611 toll-free and reach a human at might get into trouble....

Lair of the INTERNET Worm

by Dark Overlord
These days wonns & viruses seem the in thing to do. Most hackers (and crackers)
have a friend who has a friend who is a "super genius" and wrote one that did amaz­
ing things, did wonders, scrambled eggs, etc.... Any programer worth half the ram in
their system can write a worm and/or virus without much difficulty. The information
provided in most magazines and newspapers on the subject is utter crap.
The decompiled source code to the "Internet Worm" is now available from 2600
magazine. The code is based on an effort of reverse engineering. This source, when
compiled, will generate the same executable that the "Great" Internet Worm was
made out of. I can't say where I got this code because s/he does not wish to have
their name (handle) echoing around these circles.
The personality/attack strategy of this worm was to reach as many hosts as possi­
ble rather then attempting to access higher privileges on an infected host
Please note that all of the attacks used by the Internet Worm have been fixed on
almost all systems that use the Internet. If there is sufficient interest I may do a
detailed write-up on how the attacks used by the Internet Worm worked. There are
still many more holes in UNIX to be abused. Thus it is possible that, with a week­
end's worth of work, this worm could ,ride again. (But I would not do that, would 11)

If you want a copy oftlu! source cadi! (with comments). send $10 to 2600 Worm, PO
Box 752, Middle Island, NY 11953.

Autumn 1989 2600 Magazine Page 39


7~-7tUte b

1209 1336 1477 1633

697 1 2 3 A

770 4 5 6 B

852 7 8 9 C

941 * 0 # 0

Each touch tone is a combination of two tones. For instance, 3 is 697


hertz and 1477 hertz. This diagram also contains the four extra tones that
every touch tone phone is capable of producing. These tones are used in
the U.S. military phone network (Autovon) for establishing the importance
of the call. We'd like to hear specifics of any further uses for them.

Special Information Tones (S.!.T.)


We've all heard these. They're the special tones you get right before
you hear a recording telling you the number you've reached is out of ser­
vice. They're also used for a multitude of other conditions. The purpose of
these tones is to permit an automatic Call Disposition Analyzer (CDA) to
differentiate between a human voice and a recorded announcement, and
to categorize the type of recorded announcement.

Special Information Tones are a series of three tones at the beginning


of an intercepted call.

SIT Tone type and usages


Period Frequency DeSignation
SSL LLL IC - Intercept - Vacant # or AIS, etc.
LLL LLL NC - No Circuit (Inter-LATA carrier)
LSL HLL VC • Vacant Code
SLL HLL RO· Reorder Announcement (Inter-LATA Carrier)
LSS LHL #1 • Additional Reserved Code
SLL LHL RO - Reorder Announcement
SSL HHL #2 • Additional Reserved Code
LLL LLL NC - No Circuit, Emergency, or Trunk Blockage
Period duration: S=Short (274 msec) , L=Long (380 msec)
Frequency: L=Low (913.8 hz 1370.6 hz 1776.7 hz)
H=High (985.2 hz 1428.5 hZ)
This information was taken from a central office recorder/announcer
installation manual circa 1983.

Page 40 2600 Magazine Autumn 1989


2600 MARKETPLACE

HACKING AND PHREAKING SOFT­ Display. Will gladly pay for copying and mail-
WARE for the IBM and Hayes compatible
costs, or reasonable price for genuine
modems. The best war dialers, extender
manual. Does anyone know anything about
scanners, and hacking programs. $8.00,
this machine? Bernie S., 144 W. Eagle Rd.,
shipping and handling. Make
Suite 108, Havertown, PA 19083.
payable to Tim S., P.O Box 2511,

FOR SALE: DEC VAXNMS manuals for


Bellingham, WA 98227·2511.

FOR SALE: Manual for stepping switches


VMS 4.2. All manuals are in mint condi­
(c) 1964. This is a true collector's item, with tion, some still in the shrink-wrap. This is
detailed explanations, diagrams, theory, and the best source for VMS knowledge any­
practical hints. $15 or trade for Applecat where! Contact me for more info. Kurt P.,
Tone Recognition program. FOR SALE: POB 11282, Blacksburg, VA, 24062-1282.
Genuine Bell phone handset. Orange WANTED: Schematic and/or block dia­
w/tone, pulse, mute, listen-talk, status lights. gram for G.E. TDM-114B-13 data set.
Fully functional. Box John B. Riley, 914
and belt clip N. Cordova St.,
080. 00 you have something to sell1

Are you looking for something


Burbank, CA
Please post to S.
to buy? Or trade? This Is the place!
91505-2925.
POB 31451,
River Station, Roch­ The 2600 Marketplace Is free to
INCARCERATED
ester, NY 14627. subscribers! Send your ad to:
COMPUTER
TAP BACK ISSUES, 2600 Marketplace, P.O. Box 99,
TECHNO-DROID
complete set Vol 1­ Middle Island, NY 11953.
would like to hear
Include your address label.
from anyone inter­
91 of QUALITY
copies from origi- ested in computer
nals. Includes schematics and indexes. technology and its unusual applications.
postpaid. Via UPS or First Class Mail. Would like to receive (from those willing to
Copy of 1971 Esquire article "The Secrets donate) photocopies of interesting comput­
of the Little Blue Box" $5 & large SASE er schematics, articles, and how-to instruc­
w/45 cents of stamps. Pete G., PO Box
463, Mt. Laurel, NJ 08054. We are the tions for exotic projects, etc. Write to:
Original! Robert Joe Jackson, Jr., Memphis U
WANTED: Information or documentation 32875"()19, Memphis Federal Correctional
on Natural Microsystems' WATSON VIS Inst., P.O. Box 34550, Memphis, TN 38184.
Option. Will be used for upcoming 2600 WILL TRADE: My knowledge of
voice mail board. Urgent need! Contact the game of Blackjack for information into
the 2600 office (516) 751-2600. hacking and phreaking. J. Klein, 2558
2600 MEETINGS. First Friday of the Valley View #111, Las Vegas, NV 89102.
month at the Citicorp Center--from 6 to 8 FOI, PSTN, ANAC, are you lost in telephone
pm in the Market, 153 E 53rd St., NY. acronyms? Don't be confused anymore!
Come by, drop off articles, ask questions. Send for my list of over 300 phone and com­
Call 516-751-2600 for stili more info or to munications acronyms, only $4. Jay H.,
request a meeting in your city. 2722 Glenwick PI., La Jolla, CA 92037.
WANTED: Technical/operations manual or
any technical data on North-east Electronics Deadline for Winter Marketplace:
TTS-2762R MF & Loop Signaling 1211/89.

Autumn 1989 26()() Magazine Page 41


1111111'1,
•• 11'1" ••• CARRIER I I I •

loo01-MidAmerican LD (Replblic 10202-ExecuLines 10298-Thrif!\in~


Telecom) 10203-Cypress Telecom munications 10302·Austir. Besttiroe
l0002-AmeriCaJl LOC (Cy!eij 10303·MidAme rican LD (Republic
10003-RCI Corporation 10204-Un~ed Telephone long Telecom)
loo07-Tel America Distance 10SI1·SavaNe! (American Network,
100 II-Metromedia Long Distaree 102Q&.Un~ed Telephone Long Starnet)
loo12-Char1erCorplration (Tri-J) Distance 1031a-long Distance Savers
l0013-Access Services 10211·RCI 10321·Southland Systems
l0021-Mercury 10212-Cal US 10322-American Sharecom
loo22-MCI Telecommunications 10213-Long Oistaree Telephone 10324-Firsl Communication
l0023-Texnet Savers 10331-Texustel
1oo24-Petricta Com munications 10214·Tyler Telecom 10333-US Sprint
Systems 10215-Star Tel 01 Abilene 10336-Rorida Digftal Network
10028-Texnel I02t7-Ca11 US 10338-Midco CommunicaflOns
loo30-Valu-Line of WiChita Falls 10219-CaU USA 10339·Communication Cable Laying
loo31-Teltec Saving Communications 10220-Westem Union Teleg~h 10343-Communication Cable Laying
1oo33-US Sprint 10222-MCI Telecommunications 10345-AC Teleconnect (Alternative
lOO36-Long Distance Savers 10223-Cab1e &Wireless Communication)
l0039-Elearonic Office Centers 01 Communication (lOX)
t0350·Dia~Net
America (EOITech) 10224-American Communications
10355-US LiAI
loo42·First Phone 10227-ATH Communications (Call
10357·Man~owoc Long Distance
1oo44-Allnet Communication Services America)
Service
(LOX, Lex~eij 10229-Bay Communications
10362-EIeClranic Office Centers of
1oo53·American Networ\< (StarneQ 10232-Superior Telecom
America (EOITech)
loo56-American Satellne 10233-De1ta Communications
10363·Te~Toll (Econ·O·Oial of
10057·Long Distance Satell~ l0234-AC Teleconnect (Aftemative
Bishop)

l0059-COMNET Communication) 10369-American Satellne

loo60-VaIu-Line of West Texas 10237-lnter-Comm Telephone 10373-Econo·Line Wam

lOO63-COMNET 10039-Woof Communications (AC1) 10375-Western Union Telegraph

lOO69·VlCOM 10241-American Long lines 10385-The Switchboard

loo70-National Telephone Exchange 10242-Choice Information Systems 10393-Execulines of Rorida

1ooSO·AMTEL Systems 10044-Automated Communications 10400-American Sharecom

loo84·Long Distance Service (LOS) 10245-TaconicLong Distance Service 10404·MidAmerican LO (Republic

lOOBS·WesTel 10250·Dial-Net Telecom)


lOO88-Satelfite Business Systems 10252-Long DistancelUSA 10412-Penn Telecom
(MCI) 10253-litel Telecommunications 10428-lnter-Comm
10089·Telephone Systems 10255-A1I-State Communications 10432-Ughtcall
lOO90·WesTel 10256-American Sharecom l0435-Call-USA
1oo93-Rainbow Com munications 10260·Advanced Communications 10436-lndiana Swrtch
loo95·Souti1west Communications Systems
10440·Tex·Net
lOO99·AmeriCail 10263-Com Systems (Sun Dial
10441·Escondido
10122·RCA Global Communications Communications)
10442-First Phone
10137-AlI Americ";J Ctbles and Radio 10068-Compute·A-CaIl
10444-Allnet Communication Services
(In) 10276-CP National (American
(LOX, Lexitel)
10142-First Phone Network, Starnet)
10455·Telecom long Distance
10146·ARGO Communications 100M·American Telenet
10456·ARGO Communications
10188-Satellite Business Systems 100fJ6-CIark Telecommunications
t0462·American Network Services
10287·ATS Communications
104M·Houston Network
10088-AT&T Communications
104S5-lntelco

Page 42 2600 Magazine Autumn 1989


III.ACCESS ...... CODES .. I • I I

I0466-lrtemationa! ClffiQI Networks Communications (MCij


100000-GLtW 1070Heivua 10895-Texason Line
1047l-1-1aJ-Rad Communicali:lns 10709-e1·America 10897-1.eslMl Hammond (Phone
10480-Chico Telecom (Cal America) 10717-Pass Word America)
10488-Uniled Slates Transmission 10726-Procom 10898-Sa1eRe Business Systems
Systems (ITT) 10727-tol1l'O&Comtel (MCij
10505-San Marcos Long Dis1anoe 10735-Marinetle·Menominee lds 10910-MonlgomeryTelemarketing
10515-Burlington Te\eP1One 10737-National Telecommunications Communication
10529-Southern Oregon Long I0741-ClayDesta 10915·Tele Tech
Distance 107<12-Phone America of Carofina 10933·North American
10532-Long Distance America 10743·Peninsula Long Distance Communications
10033-Long Distance Discount Service 10936-Ranlow Communications
10536-long Distance Managemenl 10747·StandaId Information Services 10937·Aa:ess long Oistanoe
10550-ValJ-line of Alexandria I0755·Sears Communication 10938·Aa:ess long Distance
10551-Pltsburg Communication 10757·Pace Long Distance Service 10951·Transamerica
Systems 10759-Telenet Communication (US Telecommunications
10552-F1rst Phone Sprint) IQ955..United Communications
10555-TeleSphere Networks 107EO·American Satellite 10960-Aa:ess Plus
10566-Cab1e &Wlflliess 10766-Yav~ Telephone Exchange 10963-Tenex Communications
Communication (TDX) 10771·Telesystems l0969-OiaJ.Ne1
10567-Advanced Matteting Services 10777-US Sprint 10985_ricaCalling
(Dial Anywhere) 10785-01ympia Telecom 10986-MCI Telecommunications
10579-Unlel System (Lincoln 10786-Shared Use Netwolk Service 10987-ClayDesta Communications
Telephone LO) 10787-Star Tel of Abiene 1098S·Western Union Telegr~
10590-WlSCOnsin 10788-ASCI's Telephone Express 10991·Access Long Distance
Telecommunications Tech NelWolk 10999·Unfted Stales Transmission
10599-Texas Long Or;tance Conroe 10789·Microtel Systems (ITT)
106OI-DiscountCommunications I0792-Southwest Communications
Services
l08oo-SateIco Only a few codes are Iile~ to work
100000Biz Tel Long Distance
10801·MidAmerican lD (Reptblic:) in any one area The easiest way 10
Telephone
10827·TCS Netwolk Services find a working code is 10 dial the code
10622-Metro America
10833·Business Telecom followed by 700·555-4141 and listen
Communications I0835·RCVTeletonned for a verification message from the
100000Econo-Une Midland 10839-Cabie &Wireless company_ Alew 01 these companies
l0ti46-C0ntact America Communication (TDX) don' offer verilication messages and
10652-New Jersey Bell 10847·VIP Connections on~ wolk in alew locations. 10698,
1000000incinnati Bell Long Distance 10850·TK Communications lor example, is used 10 route local
10655-Ken-Tel Service 10852·Telecommunications Systems calls via New York Telephone. But
10660-Tex-Net 10859·Valu·line of LongYMlw since all local calls are routed through
10666-Southwest Communications 10866-AIascom New York Telephone anyway, it
10675-Netwolk Services 10872-Telecommunications Services doesn' really serve much purpose
1068O-Midwest Telephone Service 10874·TIi-Tel Communications except to oa:asiona/Iy get around
10682-Ashland Call America 10879-Thrltycall (Lintel Systems) PBX restridions_
10000000cogdoches 1088l-Coastal Telephone
Telecommunications
10882·Tuck Data Communications
10687-NTS Communicali:lns
10883·TTl Midland-Odessa
10698-New Yolk Telephone
10884·TTI Midland·Odessa
10700·Tel-America

10704-lnler·Exchange

10885·The CommuniGroup
10888·Satel~te Business Systems fr

Autumn 1989 2600 Magazine Page 43


Timely TELEPHONE Tips

WHEN yOU RECEIVE A WHEN YOU MAKE A

TELEPHONE CALL TELEPHONE CALL

Alway. RememlJe, to Always RememlJe, to

I. ANSWER AS PROMPTLY AS POSSIBLE.


L PLAN AN EFF£CTJVE CORVEIISAnOlt.
Try 10 _ v beIore .-ad rIDq,
Get your Ihou<:IhIl bl ant.. h<oIora ealI.I.u;.

2. IDENTlFY YOURSELF WHEN ANSWElIlNG,


2. PLACE THE CALL YO'OllSELF. EXCEPT Dr

"MI, JIrowu'. ollie., MIn ~.


SPECIAL CIRCUMSTANCES.

"P...oan.L M......•
Make ..... you _ 011 the Ibla ready 10 IaDt
whn the caIhd penoa \a reached.
S. SPEAIt DISTINCTLY AND PLEJl.SAJm.Y,

Hold ..oulhJ>Mca ",en up ta Iroat of l1poI.


lL HAVE THE CORRECT MUMlIER (OB EXTE!f..

SlON) IK MmD.

4. AVOID TRITE OR ABJltlPT PHRASES.

"Who'. ealllDqr , , , '1_ • _nl..


Co-.It your ~. or panooalllUlDha:r
UIIf.
''H.'. buay," , , , "H.'. bl com.r.oca."

"H.'s !lad up." • , • "Re ...., ID."


e. LISTEN FOB DllU. TORE ••• DW CARE­
FtlLLy.

5. VOLUNTEER THE ''WHEII.tABOUTS AND s.. .,........t IDformatIoD.pa;a bl your cBnco

WHENABOUTS" OF AN ABSENT PEllSOlt.


tory.
''HI em bl reached bl Mr, ,..... ~ , ••
Extamd011 209e." S. IDENTIFY YOURSELF IMMEDIATELY TO THE
''H. \a cui 01 Ibe buIIdbl; UDIIl 3 o'dodto.. FIRST PERSON ANSWE1IlNG THE CALLED
"May I locat. hlDl and uk hlDl 10 eaJl your TELEPHONE.
''Th\a \a Mr. Yo............. May I _Ilk 10 Mr.

6. VOLUNTEER YOUR OWN ASSISTANCE.


Hod;..........r

',. th... la...1hbl; I could dor


"Could I halp youT' ••• "or &nyODI alaar t, IDENTlFY ALSO. WHEN HELPFUL, YOUR

OroCE AND PURPOSE IK CALLING.

7. REQUEST IDENTITY' OF CAtLEII ONLY


WHEN NECESSARY. AND Dr A TACTFUL "MI. JIro--. bl AccouDto • • • nttIII'IIID; Mr.
MJUmEIl a..-'. calL"
"May I ha,.. your _er' 7. Aft WHETHER CALLED PEIISON HAS "TIME
"May I .d: ",ho thIa Ia. pl....r TO TALI: NOW" IF CALL IS LlDLY TO
BE LENGTHY.
8. EXPLADr OFF·T1fE.1.Jl'r£ DELAys'
'1". In th. Bl.-cao you ",ai, . . .omeDlr e. my TO COMPLETE YOUR BUSINESS ON ONE
CALL BY SECURmG IHFORMAnON OD
9. TAn: MESSAGES WlLLmGLY. LEAVING A MESSAGE.
Writ••••• ul!al detal\a OD • auIlehl. m....<:18
IOrDll d.U,.... proIDpt\y. .. VOLUNTEER YOUR EXTENSION AND THE
BEST TIME TO REACH YOU Dr CASE
10. TRANSFER ELSEWHERE ONLY WHEN YOU YOU REQUEST A "CJl.LL.BACLH
mow DEFINITELY THE CORRECT PER­
SON OR NUMBER. IlL IEEP YOUR CONVEllSllnOH BRIEF .AND
01,.1 call.. th... lacta baiore truuofel1'lDq. IIUSIl'IESSLIKE

FROM A DEFENSE DEPARTMENT PHONE BOOK

Page 44 2600 Magazine Au/umn 1989


THE GALACTIC HACKER PARTY

continued from page 11


While we're at it. we might as stupid. Why is it necessary to print
well pass along the toll-free num­ these credit cards with all 14 digits
bers to get the equivalent services screaming for attention? They
in other oountries. Calling these will could be much more inconspicu­
oonnect you to an operator in the ous. Or better still. the phone num­
following countries. They will ber portion (which is usually what
expect you to provide a means of the first ten digits oomprise) can be
billing and to know who you're call­ eliminated entirely, since most peo­
ing: ple are capable of remembering
Australia: 800-682-2878; this. Right now, a simple glance at
France: 800-537-2623; Hong the numbers is all it takes.
Kong: 800-992-2323; Italy: 800­ Since this was, in fact. our
543-7662; Japan: 800-543-0051; phone bill. we thought we'd share
The Netherlands: 800-432-0031; some of it with you. Feel free to
Panama: 800-872-6106; Singa­ find out who these people are and
pore: 800-822-6588; South Korea: who they know overseas that may
800-822-8256; United Kingdom: have placed the calls. AT&T may
800-445-5667; West Germany: have already figured it out since
800-292-0049. they've had two months to do it.
A Problem 415-422-3772 (lawrence
Not all went smoothly, as is the livermore labs)
case sometimes. Apparently. some 301-345-5053
low-life memorized a 2600 AT&T 617-868-5765
Calling Card number. which, fortu­ 718-768-7431 (Brooklyn. was
nately, was unused by us. It was called most frequently)
very easy to isolate the $3,000 413-637-2870
worth of fraudulent calls billed to it. There are many more, but these
We should emphasize that such an appeared most frequently. We sus­
occurence is very much the excep­ pect the person who did this didn't
tion. In hacker circles. there's an realize that American phone bills
unwritten rule: don't screw each come with complete itemization,
other (we're speaking metaphori­ that is. the day and time of the call,
cally for the moment). Whoever did the number called, and the location
this is not a hacker in the true the call came from. In a surprising
sense, but a lowly, deceitful crimi­ amount of oountries. this informa­
nal. Unfortunately, many people tion still isn't provided. Based on
judge hackers by the actions of the information given to us, it
such criminals. It's just not true; appears obvious that the person
hackers have a very high code of lives in England. made a visit to
ethics for the most part. Amsterdam for the oonvention. and
We think it's also important to then went to West Germany for a
throw some of the blame on AT&T. week before returning home. It's
for continuing to be incredibly also obvious that they kept the

Autumn 1989 2600 Magazine Page 45


THE GALACTIC HACKER PARTY

code to themselves, as no two In Europe, the hackers are con­


calls overlap. tinually expanding their grasp on
We'd like to know what the technology, from pirate radio to
hackers of the world think we voice mail systems to videotex to
should do about this. Suppose we well-organized computer networks.
find out who it is? Do we tell Here, we seem to be reverting to
AT&T? Do we tell the world? Do one-upmanship and conformity
we forget it ever happened? What when we should be finding new
is the proper response in your toys of technology to play with and
eyes? shape to our needs. What hap­
What's Next pened to the huge conference
We must emphasize that this calls, the hundreds of hacker bul­
was the only truly negative thing letin boards, the clever pranks. the
that happened as a result of the legendary phone phreaks? Are we
Galactic Hacker Party. We hope afraid? Are we losing our spirit? Or
that what came out of this confer­ are we just getting comfortably
ence will strengthen the spirit of dumb?
hackers everywhere. In America, A look through these pages will
we need that strength desperately. tell you that there are plenty of enti­
You may have noticed that our ties just aching to gain control of
bulletin board network has pretty technology and in due time, the
much collapsed, for varying rea­ individual. This magazine is only
sons. Unfortunately, it seems to one voice. We need more.
reflect a growing inertia, a lack of If you think you can do some­
spirit. When we started operating thing, then you can. People all over
88S's, we expected them to grow the world know and understand the
and flourish. Why hasn't this hap­ spirit of the hackers. It's up to all of
pened? us to keep it going.

Signale zur Warnung


'·ZIVIL.'
<~"
i~v.~
.. D..et

~ 31'1110
En_,nung
l

Page 46 2600 Magazine Autumn 1989


NOW HEAR THIS

At 2600, we don't exactly go out of our way to


nag you about when your subscription is going
to end. You won't find yourself getting those
glossy nders with free pens and digital
quartz clocks and all that crap. We believe
our subscr are intel enough to look
at their address label and see if their sub­
scription is about to . If it is or if
you want to extend it, just 11 out the form
below ( label should be on the other side)
and send to our address (also on the other
side). You don't get self addressed stamped
envelopes from us. But the time and money we
save will go towards making 2600 as good and
informative as it can be.

1r

INDIVIDUAL SUBSCRIPTION

U 1 year/$18 0 2 years/$33 0 3 years/$48

CORPORATE SUBSCRIPTION

f.J 1 year/$45 0 2 years/$85 f.J 3 years/$125

OVERSEAS SUBSCRIPTION

i.J 1 year, individual/$30 0 1 year, corporatel$65

LIFETIME SUBSCRiPtiON

U $260 (you'll never have to deal with this again)

BACK ISSUES (never out of date)

I.J 1984/$25 01985/$25 0 19861$25 I.J 1987/$25

o 1988/$25
TOTAL AMOUNT ENCLOSED: ~I________~
Contained Within...

fti,-----­
I
----,

the nynex strike


grade "at! hacking
I

galactic hacker party


3

10
british telecom's guilty conscience 12

I the death of COSMOS?


what's going on
13
14

I the secrets of 4TEL


letters
20

24
I
I REMOBS
GTE horrors
32

33
I

I voice mail hacking


punching payphones
36

37
I

I useful frequencies 40

.JI

2600 marketplace 41

----------
L.:rrier access codes 42

2600 Magazine
PO BOH 152
Middle Island, NY 1195l U.S.A.
I,"CONO C"" eo'''G'
Permit PAID at
Forwordlng and Address [orrectlon Requelted East Setauket. N Y
11"/33
ISSN 0749"3851

....

.~

tho

You might also like