Professional Documents
Culture Documents
AUTUMN, 1989
COMMUNIST PAYPHONES
We've just about had it with this asked incredulously. "I said I can't
NYNEX/New York Telephone hear you." aick. We redialed. Sure
strike. Since early August we in the enough, we were connected to
New York region have been living their after-hours recording. Please
with substandard service, long call back when we're open. Right.
delays getting through to informa It gets worse. After going
tion, non-responsive repair service, through about a dozen payphones
a suspension of new orders, 50 in the streets of New York without a
minute waits for service reps after single one working properly, after
interminable busy signals, and pay losing 75 cents trying to make a
phones that never seem to work. local call, the New York Telephone
Here's an exchange one of us operator suggests we place the call
had while trying to reach a service using a calling card. "I can't access
rep. One hour before dosin~ busy the billing information because of
signal. Three phones were set to the strike," she said. "But I do know
redial mode, each trying the same the surcharge is only 45 cents."
number. After half an hour, suc New York Telephone has this
cess! A ring, then a recording. incredible habit of fixing their own
"Due to the work stoppage, there faults by charging you extra.
will be a slight delay answering Another example centers on our
your call. Please hold on, etc." The fax machine, which, according to
announcement repeated every our AT&T bill, was calling people
minute. Finally, at one minute in Delaware and staying on for 15
before closing, a human being minutes. When we started hearing
came on the line. "Hello I can't from people who were trying to
hear you," they said. "What?!" we send us faxes but were instead
continued on page 9
like language and are stored on disk in on white paper and divided into nice
source code fonnat The reason for this is columns grouped by academic subject?
that each school has its own way of doing Does your school's program office contain
things (i.e., naming conventions for classes terminals and printers? Is your class sched
and sections), and the batch programs can ule (a.k.a. program card) printed on 5.5" x .,.
be modified by either UAPC or qualified paper (either heavy-bond white or thin-bond
people who work in each high school~ pr0 blue)? Is your grade report (a.k.a. report
gram office. These applications are submit card) printed on computer paper, about 5.5"
ted to run on the IBM machines with the high (regular width) with a blue Board of Ed
JCL code appended at the top of each logo in the middle, with explanation of
application. grades (in blue) on the back? Do you get lit
Each school connects to UAPC via a ter tle yellow or white laser-printed cards in the
minal and modem and each school is allo mail when you play hookey or cut classes?
cated its own directory (or library as the Any of these sound familiar, boys and girls?
batch-heads caR them) on the system. This They should, because almost every New
directory contains the applications Oobs) York City public high school fits all these
that the school uses each day for various categories. If your school fits any of these
activities. Data files are also contained in (especially the punched cards and tenninals
these directories. The data files are in a in the program office), then you can be sure
pretty-much IBM standard fonnat (although that your grades are lurking somewhere in
stored in EBCDIC instead of ASCII). Input the bowels of UAPC.
records for each application are usually fed logging on to UAPC
in using punch-cards or scan-tron type To get on, you're going to need a dial
readers at the local school. If you've ever up. It's not too much work getting the dial
gone to a New York City high school you'll up, if you do a little snooping and trashing
know what I mean: the attendance punch around the program office at your school,
cards are brought down each day from each you should find it written down somewhere.
homeroom to the program office. Also, each However, I will save you some time and tell
teacher would fill in attendance forms (used you that there are at least 12 dial-ups for
to detect class-cutting) using a number 2 UAPC in the 718-332-51XX number range
pencil. These fonns look like the test fonns and several in the 718-332-55XX range.
for the SAT's. There are many more elsewhere (usually
Sometimes, however, input is entered exchanges local to Kingsborough
manually at the terminal in the program Community College).
office, usually for query type jobs. For You should only connect to UAPC on
instance, if one student lost his class sched school days during valid school hours. You
ule and wanted a replacement, he would can connect to UAPC at either 300 or 1200
have to go to the program office and ask for baud. However, in an effort to thwart people
one. They would run that application on the for finding their dial-ups, UAPC will not print
terminal, print up a schedule for that stu anything to the screen unless you connect
dent, and give it to him. at the right fonnat and hit a few of the right
How do you know If your school Is on keys. Therefore, you should use the follow
UAPC? ing procedure in order to connect: Call at
If you go to a New York City public high 300 or 1200 baud, using 7 data bits, even
school, then the chances are 95 percent parity and 1 stop bit (7E1), and local echo
that your school is on UAPC. If you are not (or half duplex). Once connected, hit the
sure, look for the telltale signs at your RUBOUT/DELETE key (ASCII code 127 or
school. Does your homeroom teacher use 255 [hex $7F or $FF]) three times, and then
punch-cards? Is your transcript Iaser-printed hit return twice. You will be greeted with the
jng around the program office. They usually machines at DEC headquarters. The same
do not have the password written down. holds true for Wylbur and UAPC.
But, and this is important, you can get the Wylbur also runs on the other IBM
password if you can somehow manage to machines at Kingsborough (which have dif
look over the shoulder of the terminal opera ferent dial-ups, seperate from UAPC), these
tor when he/she is logging in. Remember, machines have no affiliation with the UAPC
they connect to UAPC at half duplex, and machines. Therefore students using these
thus keys are echoed locally, meaning that other machines at Kingsborough must know
you will see the password on the screen as Wylbur as well. Lucky for us, you or any stu
it is typed. I know this for a fact. dent can purchase (no 10 required) a
If you're hardware inclined, you can tap Wylbur manual at the Kingsborough book
the line that connects to the modem and ter store (Building U) for $4. Just ask the nice
minal. These lines are usually not connect lady for the ·Wylbur User's Guide", written
ed to the schools switchboard, and can by Ganesh Nankoo, and tell 'em I sent ya. If
even be exposed outside the building itself. you do get into UAPC, I strongly suggest
Use a tape recorder and a Radio Shack that you buy this manual. It is very informa
auto-pickup device to tape the transmission tive and can keep your ass out of hot water.
(which is usually 300 baud anyway). Play Some useful commands under Wylbur:
the tape into your own modem (set it on RUN PRINT: run the exec program In
answer) and you'll be able to see the origi your active area and print the output.
nate data (including the password) on your RUN FETCH: same as above, but place
screen. If you haven't tapped modem lines output In fetch queue.
before, I do not suggest using this method. FETCH *: fetch the last output and place
Note that UAPC requires each school to Into your active area.
change their password once a month, so LIST: list current active area to screen.
make sure you get the password right after LIST OFF: list current active area to
they change it. This will give you plenty of printer.
time to learn how to use UAPC before you LOCATE: locate all jobs submitted.
attempt any stunts with modifying data. LOCATE *: locate last job submitted.
All About Wylbur LOCATE 056: locate Job 056.
Okay, you're in UAPC, what now? Well, PURGE 056: purge Job 056 which Is on
once in you will be dealing with Wylbur. Like the output queue.
I said before, Wylbur is sort of like a com COLLECT: Input/enter data into your
mand shell plus batch language and editor active area.
all built into one. You will know you're in CLEAR ACTIVE: clear your active file in
Wylbur when you are given a 'COM memory
MAND?" prompt. USE #name: load the file "name" from
There are some misconceptions about disk Into your active area.
Wylbur that I would like to clear up right SAVE #name: save your active area.
now. When most New York City hackers SET PSW: change your password.
talk about the "grades computer" they sim SET KEY: change your keyword.
ply refer to it as Wylbur. This is misleading SHOW OIR: show current files In your
because they are referring to UAPC. Wylbur directory.
is not synonymous with UAPC; the Wylbur SHOW USERS: show current users on
shell is used at many different computing UAPC.
sites which use MVS and IBM mainframes. (Note: your active file is a buffer used
It's sort of like equating VAXNMS to the by the editor. You can list it, save it, clear it,
computers at DEC. VMS is an operating load into it, run exec jobs from it, etc.)
system and has very little to do with the You can also get help on UAPC by typ-
ing HELP HELP (yes, twice. One HELP will must use one of the above Wylbur com·
not do the trick). mands to find and PURGE the output of
Applications That Run on UAPC. completed jobs. If you do not PURGE
Once inside UAPC, you may have very output, it has a good chance of being
lillie contact with Wylbur itself, and you will printed out at the program office when
see a "WHICH JOB?" prompt instead of the print the output of all the jobs that they
"COMMAND?" prompt. The reason for this milled.
is because most of the timo the applications Changing Grades
are all automated and accessed from Clearly, this thought has crossed your
menus that are run by batch files which exe mind in the past few minutes, so let me
cute when you log in. begin by saying that I do not recommend
Thus, the system is VHry friendly. You changing any records on UAPC. You can
may see a menu that asks you if you want use UAPC to get all kinds of useful informa·
to view a transcript, view a schedule, admit tion on people and never get in trouble.
a student, dismiss a student, transfer a stu If you do hope to change grades and get
dent, add classes, delete classes, etc. You away with it, there are several things to con·
simply choose what you want to do. Via sider, You must remember that your guid
these menus you will be ahle to do anything ance counselor has physical backups of all
that the school adminiftrators can do, your grades in his/her little notebook. If
including changing grades. Sometimes, you've gone to your counselor for advice on
however, there are no menus, and you will which classes to take, you'll recognize the
have to execute commands yourself. A list book of which I speak. The grades in this
of these commands can be gotten using book are not generated by UAP C but
one of the HELP menus. Here are some of instead entered into the books at the end of
the jobs you can execute: ABSCOR, each grading period by the counselors
ABSINFO, ABSREP, ACADROP, ACAIN using a pen or pencil. This physical record
FO,ACAMSTR,ADDSECT,ADDROP, is only used as backup in case UAPC gets
ADRPLST, BATINFO, ABSINO, wiped out or something like that.
CLASSLST, CODELlST, CUTINFO, CUT Comparisions between UAPC transcripts
DEL, FIXCODES, FIXOFCL, HITRAN, and the physical record are almost never
GRDUPDT, LATCOR. LATINO, MAIL, done, unless there is some kind 01 dis
NGRUPDT, OFCLLlST, PUNROST, REGIS agreement between the student and the
TER, REOADRP, REOINFO, REOUPDTE, school regarding the transcript itself.. II you
SCAN, SCHEDULE, SKED, TRAN, do plan to make a clean run, you had better
TRANUPDT. cover all the angles. This means bribing
You can drop straighl i'nto Wylbur by some stupid kid to borrow the book for a lit
sending a <BREAK>, This will cause your tle while so that you can make some modifi
menu shell program to stop executing. If cations, give the dude $20, and make sure
you happen to leave the menu system and he doesn't know who you are
do drop into Wylbur (with its "COMMAND?" Guinea Pigs
prompt) you can get back to the menu sys Before modifying either your
tem by typing RUN. This will execute the record or your UAPC grades, I would
menu shell program that is currently in your strongly suggest using a guinea pig test
active area. subject. What this means is that you should
Remember that each time you or your pick some kid, any kid, who gOES to your
menu program submits a job (i.e., to school and that you have never mel and
a grade), the job will be executed and never plan to meet, change their glJdes,
output will be placed on the fetch queue. If purge the output on the fetch que'Je, !>It light
you don't want to leave a trail, then you for a few days, and v,olch what !-1('1ppens
Keep a close eye on your test subject. If you You can still bailout at this point and
notice the kid getting suspended or federal your life will proceed normally. However if
agents running around your school or you do change your grades (both physicany
something like that, you know that you bet and on UAPC) and nothing happens to you
ter not mess with UAPC, at least not in your for several weeks, you can be almost 100
school anyway. If nothing happens, then percent sure that you got mNay with it. Since
you should decide whether to take the risk both records (physical and UAPC) have
of changing your own grades. been changed, there can be no discrepan
If you consider the use of innocent cies. Only your previous teachers will know
human guinea pigs to be distasteful. then what grades they gave you, and by now
you had better be prepared to risk your ass they Will have forgotten who you are. Only
by using yourself instead. I do not consider your transcript speaks for them now. If you
it to be distasteful, but then again I am do get mNa.)' with it, you can start mailing out
dewid of all ethics and morals anyway. those applications for Stanford and MIT.
Enough Already
The Galactic Hacker Party could pie in strange and distant lands
very well have been the strangest who also had developed an infatu
gathering of computer hackers ation with knowledge and a strong
ever to have assembled. It wasn't desire to share it. It was at the
just a meeting of silicon-heads who same time a bit disconcerting to
talked binary for three days. It see this enthusiastic spirit, and to
wasn't simply a group of rowdy wonder why it would seem so
individuals out to give the authori strange back horne in America.
ties a headache and cause general like any good conference, the
chaos wherever they ventured. Nor best things happened behind the
was it merely an ensemble of scenes. That's where the contacts
bizarre, crazy, and ultra-paranoid were made and the methods
types, like the ones who make it to divulged. Press from all over the
the 2600 monthly meetings in New world showed up, as did people
York. The Galactic Hacker Party from all walks of life. It was a
was all three of these put together, _ curiosity shop, a coming together
and a good bit more. of il'lCJliring minds.
The conference took place at But enough poeticS. What does
the Paradiso Cultural Center in this all mean? Well, for starters, it's
Amsterdam on August 2nd, 3rd, injected us with some new enthusi
and 4th. Hackers and techno-rats asm and some brand new knowl
from all over the world converged edge. We tend to forget that there's
on the scene, some remaining for a world of diversity out there, differ
quite some time afterwards. ent lifestyles, alternative ways of
Information about computer sys accomplishing things.
tems, phone systems, famous The Germans taught us the
hackers, govemmental regulations, importance of organization. In
privacy abuses, and new toys Hamburg alone, there's at least
flowed freely and openly. Since one meeting of hackers a week.
there are no laws against hacking They play with computers, com
in The Netherlands, there were vir pare magazines (in West Germany
tually no restrictions placed on any there are several magazines that
body. deal with hacking), and figure out
Representatives from the Chaos their various strategies. Hacking is
Computer Club (West Germany), much more political in West
Hack-Tic (The Netherlands), and Germany than any other country.
2600 met for the first time, along The Dutch showed us how,
with hackers from many other above all else, having fun is what
countries. We tried to figure out the really matters. Learning about the
best way to pool our resources, to things that you're really interested
share information, and to support in can be the most fun of all. In The
one another's existence. It was Netherlands, what the authorities
most heartening to see other peo do or think is less than secondary.
The openness of Dutch society here are the USA Direct numbers
helps to foster this healthy attitude. from various countries:
We, the Americans, shared our Australia: 0014-881-011;
beloved and practical hacking tra Austria: 022-903-011; Bahamas:
ditions, like the art of trashing. 800-872-2881; Belgium: 11-0010;
Almost as soon as we raided our Bermuda: 800-872-2881; Brazil:
first trash bin, the anti-authority 000-8010; British Virgin Islands:
Dutch figured that the dumpster of 800-872-2881; Cayman Islands:
a police station would be the best 1872; Denmark: 0430-0010;
place to get info! We must now live Dominica: 800-872-2881;
with the knowledge of what we Dominican Republic: 800-872
have started. 2881; Finland: 9800-100-10;
We also helped to convey the France: 19-0011; Gambia: 001
importance of thorough scanning. 199-220-0010; Grenada: 872;
It's easy to get discouraged in Greece: 00-800-1311; Guatamala:
countries that don't have the 199; Hong Kong: 008-1111;
wealth of services that we've Hungary: 00-36-0111; Italy: 172
grown accustomed to. But, regard 1011; Jamaica: 0-800-872-2881;
less of how primitive or restrictive a Japan: 0039-111; New Zealand:
phone system may appear, scan 000-911 ; The Nether1ands: 06-022
ning almost always accomplishes 9111; Norway: 050-12-011;
something. There are now people Singapore: 800-0011; St. Kitts:
scanning in both East and West 800-872-2881; St. Martin: 800
Germany, as well as The 1011; Sweden: 020-795-611;
Netherlands, England, Belgium, Switzerland: 046-05-0011; United
and France, discovering strange Kingdom: 0800-89-0011; West
tones, dialing shortcuts, ringbacks, Germany: 0130-0010.
and other nice things. Now you may be curious as to
Calling To The U.S.A. why we printed those numbers if
One thing we'd like to advise they're such a rip-off. Because it
those of you who travel abroad in doesn't have to be a rip-off if you're
the future. Do not use USA direct smart about it. You can use USA
to makecalls! It may be cheaper Direct to call person-to-person COl
than dialing direct from Europe, but lect to someone who isn't there.
it's still a great deal more expen The person who answers will then
sive than most people seem to get your number and call you back.
realize. While a three-minute call to No matter what service they use,
New York may cost something like the cost will be substantially less.
$8, so will a 10 second call, as the USA Direct is also a great way to
initial billing is for the first three get free directory assistance for
minutes. After that, it's at least $1 anywhere in the U.S. That's right,
per minute. It's extraordinarily easy they charge 60 cents per call over
to rack up a huge bill. By the way, here, but from overseas it's free!
continued on page 45
The following plea was sent by British business which needs to stay in touch 24
Tefecom to the British people. hours a day. A big advantage is that callers
British Telecom is asking customers to need only ring one number - wherever you
be patient - and to listen for the changes happen to be.
which are taking place as a result of its All you need is an approved multi-fre
annual multi-million pound investment pr0 quency 'phone which plugs in to the usual
gramme. socket
Many people dislike change. Others may Another option is a three-way calling
feel changes are of questionable value. A conference facility, where business meet
lot of money is being spent - but on what? ings can be held down the telephone line. It
That old familiar sight, the red telephone can also be used for family conferences.
box, is disappearing from view. Some pe0 Think of the savings on telephone bills!
ple see this as a change for the worse - yet Other developments will be useful to the
the new tough, easy-clean booths, with non-business user. Itemised billing is being
clear telephone keypads make life a touch progressively introduced, and another facili
easier for thousands who would not or could ty will enable you to ring a number and
not previously use a public telephone. check immediately what a call has cost.
A few people even dislike having a The all-talking, singing, dancing
push-button, digital 'phone in their home, exchange is just around the corner, with
instead of the old 'dial' variety - yet without everything geared towards helping the cus
the switch the vast potential of telecommu tomer get the best possible use out of the
nications technology could not be 'phone.
unleashed. The average digital exchange is capable
Questions are often raised about the of transmitting around 250 'messages', from
high numbers of bright yellow vans spotted helping you to find out what a call has cost
around the country, and the traffic problems to sencing a polite message to remind you
they sometimes cause. But British Telecom to replace your handset. If polite requests
engineers often have to park at inconve fail, it resorts to a Howler - a screech which
nient points temporarily, simply to carry out win alert you even if you do happen to be at
installation and repair work. the bottom of the gardenl
British Telecom is working hard to The inside of the exchange has been
improve service to its customers, and to transformed, too. The old, conventional
offer the best possible value for money. switching equipment has been replaced by
Most people will have heard about the net rows of blue and grey cabinets housing
work 'going digital', and ultimately this will printed circuit boards. .
revolutionise the way we communicate. One floor of equipment replaces what
However, until all the cables and equip used to take up two floors, and the technol
ment are in place to link up the entire coun ogy is getting more compact all the time.
try, the customer down the road may not The new equipment is cleaner, virtually
fully appreciate the changes which are tak maintenance free, and much quieter.
ingplaoo. If a fault occurs, the card controlling that
Once the actual telephone exchange particular line is replaced with another, and
where your fine is connected 'goes digital', it the problem card is sent away for repair.
can open up a whole new range of commu The size of the mainframe computer has
nications possibilities. Under an optional also reduced, and the battery back-up units
package of Star Services, calls can be for are clean and maintenance free.
warded to another number anywhere in the It all heralds another world, but although
country under automatic call diversion the 'character' may have changed, the new
invaluable, for example, for the one-man hi-tech equipment is making everyone's life
(continued on page 30)
Page 12 2600 Magazjne Autumn 1989
The death of COSMOS?
In the summer edition of COSMOS Until then we are the stewards who
Currents, a newsletter put out by must keep COSMOS running effe
Pacific Bel1,IPacific Telesis, the death ciently [sic]." And then a few rousing
of COSMOS is said to be on the way. choruses of the company song.
"Tired of those old outdated dial-up A new telephone number has also
COSMOS TfY43's?" one of the arti been announced for the COSMOS
cles reads. "Well, get ready to kiss Client Community that encompasses
them goodbye. To better secure COS everything from simple repair to the
MOS, all dial-up machines are being COSMOS Hotline, MIZAR Hotline.
replaced with Private Line terminals. the CCTACs, the DDTAC, placing an
Funds have been approved for their order, etc. That number (81l-DATA)
removal, to be replaced with new can only be reached from within
CITOH 326's (or some equivalent California and is answered by a voice
hardware). This project is being done response unit that directs the call.
to comply with the Pacific Bell Has anyone else heard anything
Security Information Policies. and to about SWITCH or its equivalent in
prepare the way for the eventual other parts of the country? If so, for
replacement of COSMOS with the ward the info here.
new SWITCH producL"
All that we know about SWITCH is
that it used to be called ASCOT and
~
that there was an article about its
future in the spring edition of COS
MOS Currents. They go on to bril STAFF
liantly deduct that "the main cause of Edltor-In-Chlef
hackers breaking into the COSMOS Emmanuel Goldstein
database has been access to the dial-up Artwork
COSMOS network. This project will
eliminate that theeaL What remaining
Holly Kaufman Spruch
staff and Systems Technology person Ken Copel
nel that must remain on dial-up cir Design
cuits will be secured through other Zelda and the Right Thumb
means (Le., tokens)." Tokens? As in
coins? Token minorities? What could Writers: Eric Corley, John
they be referring to? Drake, Paul Estev, Mr.
"More users [of COSMOS] also
translates into more people that have French, The Glitch, The
access to the database, and hence the Infidel, The Plague, David
opportunity to degrade its integrity. Ruderman, Bernie S., Lou
The long range answer to many of Scannon, Silent Switchman,
these types of concerns will be forth Violence, and the growing
coming with the availability of anonymous bunch.
SWITCH in the early to mid 19908.
HackerFWl 'D'
2600 received many calls from the Persons attempting to call the probation
media in the days before the dreaded office in Delray Beach, FL early in June
"Friday The 13th Virus" was supposed to were connected to a phone sex hotline oper
strike. We tried to tell them not to panic ated by a woman named 'Tina' instead.
but it didn't work. Some people actually According to Southern Bell. someone
were given the day off because their accessed the central office with a modem
employers didn't want the computer to and reprogranuned their computer in such a
power up on that day. Once again. the way that calls intended for the probation
media fueled a nonexistent fire. We'll office were instead routed to a New York
repeat here what we told them. Viruses can based phone sex line. "People are calling
occur at any time. The odds of being the Department of Corrections and getting
infected are relatively small. The odds of some kind of sex palace," said Thomas
being adversely effected are next to noth Slingluff, a spokesman for the Palm Beach
ing if you take some basic precautions: County Probation Department. Southern
know the source of your software. keep Bell officials said it was the flrst time their
backups religiously, don't let fools tell you switching equipment had been maliciously
what to do, etc. The viruses set to go off on reprogrammed by an outside computer
the 12th and 13th are no different from any intruder. Southern Bell provides the local
other in that relatively few people will ever phone service for Florida, Georgia, North
see them. Carolina and South Carolina.
The only difference is that we know
about it beforehand and have plenty of Telco Literature
time to let our imaginations run wild. We What kind of people are the phone
suggested that users who were concerned companies hiring as writers? This blurb
could simply change the date on their com was spotted in the July/August issue of the
puter to the virus date to see if anything MCI customer newsletter, MCI
unusual happened. Connections: 'The sun begins to set over
After all. the computer doesn't really the Golden Gate. The grill's been lit. The
"know" the date, right? The media cicadas sing. A sizzling steak brings back
didn't go for that, saying it was too teCh memories of the summer of '82... that
nical. rooftop cookout with Doug. Even though
continued on page 38
47EL
,iij::::!
4TEL is a loop testing system tested. The number entered will be
mainly used by General Telephone read back to ensure correct entry.
(GTE) that consists of a Voice The system will then ask for the
Response System and a Craft user to enter the mode. The modes
Dispatch Section as well as the are:
. facilities and equipment used for 1 : Calling on other Une•
testing functions. The following text 2: Calling on test line. ,
will attempt to dispel many of the 3: Line test results. .
4TEL myths that have been creat h is possible on some VRS's to
ed in the past years, such as the get a listing of the modes by dialing
o
idea that it can be used to eaves when the voice prompts. Line
drop on lines within its serving tests are possible from both modes
area. The information provided has 1 and 2 by dialing the octothorpe
been gained from company publi (#) key. The results of the test will
cations and from personal experi be announced along with the
ence. A 4TEL is not the same thing . length of the cable in miles.
as a REMOBS, which stands for Bridged ringers, if any, will also be
Remote Observation. noted. Mode 3, the line test results
The portion of the system that section, will tell the user there are
much of the phreaklhack popula no test results available unless
tion is familiar with is the Voice they have been previously entered.
Response System, which has nor The 7 key is the monitor command
mal POTS dialups. This system from both test modes. If there is
greets the user with an announce speech on the line, it will be detect
ment message and then asks for a ed electronically but will not be
password, which is entered in heard by the user. The monitor
DTMF tones. The legitimate use of command is not 'REMOBS'
these dialups is for outSide craft (Remote Observation) but a
personnel (linemen) to caU in, per method of determining if the line is
form tests, and receive the results busy due to normal means (con
for subscribers' lines. The VRS is versation) or due to some trouble
provided so craft personnel can condition at the switch. When the
access the 4TEL system at times system asks for the ID code for a
when no one is at the testboard (at monitor command, the system will
nights or weekends). Through the accept the line number as well as
VRS, up to eight craft technicians the initial password, and even a
can access 4TEL at the same time, secondary password before dial
enabling them to get more done in ing, but it has not been determined
a smaller amount of time. by the author if this is a standard
After a password has been for every 4TEL. Not just anything
accepted by the system, the elec will work for the monitor password
tronic voice will ask for the line however, as it will announce if the
nurnt>er that the user wishes to be ID code entered is invalid or not.
8,000 phones. Re-orders are not money Jrom the phone system now
uncommon. because the buts they send to students
The phone-mail answering machine are much higher than the bUls that
type service does not have enough come Jrom the phone companies. In
channels. You could find the message other words, New York Telephone
waiting Ught flashing on your station, doesn't chmye the unf.uers!ty Jor uncom·
but you might have to dial the message pleted ca11s. Yet the unf.uerslty charges
retrieve code 15 or 20 times because the students. Where does the money
you can't get a cireuit. go? It's getting to the point where some
Is there any FCC ruling that the uni unf.uersities are as sleazy as AOS com'
versity is violating by imposing these panles.
restrictions on us? Their atti At least Columbia olfers you the
tude is more one of, "Well, that's Just choice oj putting in your own lines.
the way it is. If you don't like it. pay Stony Brook olfers no suchJreedom.
New York Telephone to draw wires into 'The wimpy student government thinks
your room." Indeed, I have put in a pri they accomplished something by win
vate line. But there are a lot of people ning the rightJor a student not to have
who just cannot afford to do that, and a phone at all, rather than winning the
are beir1g shafted right up to their ton right to choose one system over the
sils. Any advice? other.
gmw A company called BITEK has moved
in to handle baUng. 'They developed a
If you haven't already, read our notorious reputation Jor ignoring stu
Spring 1988 issue where we describe dent complaints about bills. Finally,
how such a system was installed at the someone broke into their PhonemaU
State Unf.uers!ty oj New York at Stony account (which they never changed
Brook with a lot oj the same problems. Jrom the deJault password), and
Not much has changed there; inJact changed the outgoing message to:
many things have gotten worse. "Hello. This is BITEK and we don't care
Frequently every phone on campus about your problems!" You can hear
appears to be busy because the unf.uer their current message by calltng (516)
sity reJuses to buy enough incoming 632·9050. They've also just installed a
trunks. Outgoing calls are ojtenjust as "state-of-the·art" automated billing c0m
hard.. A recent test revealed a waft oj puter that sounds Wee it belongs on Lost
25 minutes just to get an outside opera In Space. Call (516) 632-9055 to hear
tor (it had nothing to do with the NYNEX that
strike). Outside operators rtifuse to but As Jar as we know, there's nothing
to the originating number because the Ulegal about what Columbia and Stony
exchange isn't recognized as an actual Brook are doing. But it's damn immoral
telephone company exchange and they to rip people olf and make already
have no way to veriJy your identity. chaotic Uves even worse. There are
And ROLM can't handle call supervision ways oj getting euen, like scanning out
so everything bUls aJter 45 seconds, the entire Phonemad system and clog
even international calls, where it can ging up the system withjunk maU (not
easUy take that long just to get a busy using your own eJdension, ojcourse). Or
signal. For a corporate setting where calling someone on campus and send
individual preJerence really doesn't ing a symphony oj touch tones. The
matter, ROLM may be bearable. ButJer ROLM switch war dutifully keep the line
a unf.uersity setting, no system couldbe open untU the concert is over, rendering
worse, that isJor the students. We hap. the recipient's phone useless. But the
pen to know that Stony Brook makes most elJectf.ue way is to complain untU
First off, in a coun:by where a com Box 4. Carthage. TX 75633: "50, you
puter hacker is locked tq:) in sdttary con think your best friend may be running
finement while sadistic murderers aren't, around with your girlfriend, eh?? Or is
you'U forylve us if we belf.eve someone he just a plaln back-stabbe!? Whatever
who claims their batt is unreasonably the case, if you have two phone lines
high. Even if It was a blatant lie, It cer and the call-waiting feature on one of
tainly is conceivable and we chose to the lines, you can tap his phone line
treat it as such. if you. have ir!folTl1iltfon and listen to his conversations if he has
to the contrary, please share It. call-waiting alsoll l} Call up your friend
Now, about your blue-bale problems: with the phone you wish to listen to his
you need facts, not assumptions. conversation with. When he answers
Obviously, something has changed in call-waiting (he's already on the phone
your area since not aU BOO numbers and you are the second caller), then
would change thefr characteristics on the you either just sit there quietly or say,
same day. Ffnd out what happened. 00 ~rm sony. I have the wrong number." 2)
you. get a new switching system? Did the Next, you wait until he returns to his
routing somehow get changed? You must original call (the one you interrupted)
go to this oJftce that you. belIeve to be a and he puts you on hold. 3) Now, pick
step and see if your old method works up your other phone line and call your
there. if it does, then you know where call-Waiting. 4) Answer your call-wait
the restrictions are being applied, rrwJn1y ing. 5) Now go back to him. (Answer.
in your own ekrhange. if it doesn't work then click back. Click two times,
in the step eJ/rhange, then restricttDns answer, and go back.) 6) Hang up your
are in effect further up the line some second line. 7) You are now on the linel
where. Once you. W1derstand what these 8) Listen and remain sllentlll He can
restrlct10ns are, you. can attempt toflnd a hearyouU"
way around them, like routing through a
remote part of Canada, perhaps through We'U be honest. We asked quite a
an 800 number that termtnates there, It few people to test It out and nobody
aU depends on what has changed. It was able to make it work. But nobody
sounds as if you were able to box off said such a thing was impossible. if it
your outgoing trunks in the past which is does work, it probably only works with
why it didn't matter what number you. in the same central o..fPce, maybe even
dialed. If these have changed, it wUll1OU! the same exchange. if you can get two
only work if the remote tnmk is stfU ~ lines in the same central o1ftce that
able. Keep in mind that blue-boxing is each have call wc:litfrlg. by all means try
dangerous, particul.arIy in an ESS area. it out. If it works, let us know what your
The only complaint we've had about exchange is. if this capabLUty does
the red box circuit in the Summer '88 exist, it's probably aflaw in a particular
issue is that the schematic is too small. type of switch. We'U let you know what
For a bigger copy, send us a stamp or weflndout.
an SASE.
The Call-Waiting
Interesting Numbers
Dear 2600:
Phone Tap
You may have seen the bumper
Dear 2600: stickers about that say:
Can you please tell me if this really DOWl' UKE MY DRIVING?
works? . CAIL l-BOO-EAT-SHrr
From Alternative Inphormation. PO One day I got Inspired and dialed it.
Amazingly enough, there was a record-
it was a very accurate and informative It's hard to experiment with some
piece. ContimJe the excellent \YOrk. thIng without havlng access to It. That's
Now that 1 have given your ego a why people whoftnd themselves locked
boost. 1 will ask for a favor. Could you u,p with these ltd-phones have to fry
please il'lclutie in one of the next articles everythIng possible. It Is enHreIy possi
a piece on "'collect on1y phones* as I am ble there are no holes, ansldering what
incareerated at the present time and an the purpose of these phones Is. In that
that is avaJlable to use from this crow case, there are star options. For
bar hotel are those damnable gadgets. instance, Just suppose you called a
They are the most exasperating items vofcemail system or an answering
ever invented, as you are unable to call machine that answers the phone with
800 numbers or to bill to a th1Id ~ the message: "'HeUo? (pause] Why oj
or even he able to use a telephone credit course I'U accept charges.· if you're
card with them. 1be ~ you are call ludcy enough to gain access to a uofoe
ing must pay the emorbltant prices I'I"IICUI system that allows you to dial out.
which they charge for collect calls, and you'U be able to maIce phone caUs (and
who the hell wants to try to convince rack up two bUls at the same time).
indMduals to accept collect calls? There Unless your DTMF pad gets cut off qfter
has to he a way around these mecha a connectton Is made, In which case
nized monsters, and any :Info which you ' you'U need a white box (portable DTMF
could possibly print about them \YOuld generatorl to hold up to the mouthpiece.
be greatly appreciated. And that's probably Illegal to possess In
ID.carceratecl prison. Readers, any ways out?
I. your computer
-
HACIQlC I'll 2II1II3 noo DL AMSTaltWoI
/1
but most commonly being four. When enler REMOBS, or it win slay connecmd to the line
ing the code from the touch tone keypad, you set it for, and will not accept other calls
each digit must be held down for about a until ifs reset manually, which win draw atten
second for the unit to receive it When you tion to it, your target, and most important of
tone and the unit will wait for !he 7-digit target Keep in mind that REMOBSs vary from
But here's the catch: due to the volume of to state, so you win have to experiment with it
exchanges present within an NPA, the unit to see what keys perform what function.
there is a problem.
Th.. ~s-w alfr""parh ... All ........ trwfn)' ~" .our ~1II""hir« hrlt..... !QIIit.... h. "00 hrntat. it I:toI ~
"';t~· ma........t ollUldn"t ~""""IJf'Af""':dll"" kirh.flp."1mHal. \\'.....tlwt..Jmt .... III ..... pa,.
br"""'.......
t ...... ~Qrt'"'otMrlhi. ~at.rn.tINll"'UftlfJl'IIIfInl.
Wod;m,;mtt"1lnF••rantiri ......... he turA. ""ni.,.. IJ!II 11.(' hllIl to .to ....,.. nnt Mob-With,..",.. ""flI"WlI'If! difftor..
IJlIIIr .... pnIl..nlial ..... ~. . . . .N'hMl'llr'f'.....,...,.. l"imll~. ~ • •~.f~..,.nd
Thrn . . " ..... .,al ho_ln~n' Rnnwonl'l... wtw ..~w...... Wf' h~1. fnF in!<fanno, 10 the- USA.
,..... ""fI".. 1rw-,. '.-nlt. ,ohl·...... Rid,,,...t lin-ttlt ......4tM' l:tft<. ~ ("01\'ttf'h't...,. __ I..uk IItf: All ytJtU .. i1If~. "'}won
.,....,rI .... "' ..... S-tM'ft"':.. . . . . . . . . .It.... (~U..Il'('t.b1f'' 1!"..ininI!'. ..ftMlnwntat..... 311M' thr fib. C"fImt'iIt to j ...r t...m
...NYN EX Style
In mid-August the NYNEX Business card numbers and expiration dates. The FBI
Centers' nationwide voice mail information was reportecly notified, but was only inter
system was penetrated by unauthorized ested in the credt fraud issue; not in securi
individuals. According to Randy Hareford, ty problems with the system. Interestingly,
voice mail administrator at NYNEX, numer NYNEX has always maintained that mes
ous "kids, maybe twelve or thirteen years sages on the system were not retrievable by
old", who "didn't know what they were anyone other than the addressee.
doing" took over 38 of approximately 1900 The security breach allegedly brought
voice mailboxes on the system. the system down one evening and later
Dialup modem numbers used to manage resulted in a system broadcast to all users
the system were posted on at least two bul warning them not to convey sensitive infor
letin boards and sent to other interlopers via mation on the system, instead suggesting
the voice mail system, but most of the "more secure" methods such as the U.S.
encroachment was blamed on the use of Mail, IBM PROFS, and the direct-dial tele
"easy passwords· chosen by legitimate phone network. While most of the abused
users. The callers identified themselves with mailbox passwords were deleted and reas
aliases such as Flight Commander, Knight signed after two weeks, the system admin
Caller, Blackbeard, Chris Columbus, Photo istrator received one message offering
Bug, Easy E, Ray Gun, Mr. Upright, information about other compromised mail
Teenage Warrior, and Mr. Six. boxes and the security loopholes used in
According to Hereford, at least one mes exchange for legitimate voice mail privi
sage passed between purloined mailboxes leges. The offer was neither accepted nor
contained information detailing stolen credit replied to.
by Dark Overlord
These days wonns & viruses seem the in thing to do. Most hackers (and crackers)
have a friend who has a friend who is a "super genius" and wrote one that did amaz
ing things, did wonders, scrambled eggs, etc.... Any programer worth half the ram in
their system can write a worm and/or virus without much difficulty. The information
provided in most magazines and newspapers on the subject is utter crap.
The decompiled source code to the "Internet Worm" is now available from 2600
magazine. The code is based on an effort of reverse engineering. This source, when
compiled, will generate the same executable that the "Great" Internet Worm was
made out of. I can't say where I got this code because s/he does not wish to have
their name (handle) echoing around these circles.
The personality/attack strategy of this worm was to reach as many hosts as possi
ble rather then attempting to access higher privileges on an infected host
Please note that all of the attacks used by the Internet Worm have been fixed on
almost all systems that use the Internet. If there is sufficient interest I may do a
detailed write-up on how the attacks used by the Internet Worm worked. There are
still many more holes in UNIX to be abused. Thus it is possible that, with a week
end's worth of work, this worm could ,ride again. (But I would not do that, would 11)
If you want a copy oftlu! source cadi! (with comments). send $10 to 2600 Worm, PO
Box 752, Middle Island, NY 11953.
697 1 2 3 A
770 4 5 6 B
852 7 8 9 C
941 * 0 # 0
HACKING AND PHREAKING SOFT Display. Will gladly pay for copying and mail-
WARE for the IBM and Hayes compatible
costs, or reasonable price for genuine
modems. The best war dialers, extender
manual. Does anyone know anything about
scanners, and hacking programs. $8.00,
this machine? Bernie S., 144 W. Eagle Rd.,
shipping and handling. Make
Suite 108, Havertown, PA 19083.
payable to Tim S., P.O Box 2511,
10704-lnler·Exchange
10885·The CommuniGroup
10888·Satel~te Business Systems fr
"P...oan.L M......•
Make ..... you _ 011 the Ibla ready 10 IaDt
whn the caIhd penoa \a reached.
S. SPEAIt DISTINCTLY AND PLEJl.SAJm.Y,
SlON) IK MmD.
~ 31'1110
En_,nung
l
1r
INDIVIDUAL SUBSCRIPTION
CORPORATE SUBSCRIPTION
OVERSEAS SUBSCRIPTION
LIFETIME SUBSCRiPtiON
o 1988/$25
TOTAL AMOUNT ENCLOSED: ~I________~
Contained Within...
fti,-----
I
----,
10
british telecom's guilty conscience 12
24
I
I REMOBS
GTE horrors
32
33
I
37
I
I useful frequencies 40
.JI
2600 marketplace 41
----------
L.:rrier access codes 42
2600 Magazine
PO BOH 152
Middle Island, NY 1195l U.S.A.
I,"CONO C"" eo'''G'
Permit PAID at
Forwordlng and Address [orrectlon Requelted East Setauket. N Y
11"/33
ISSN 0749"3851
....
.~
tho